<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[Product Cybersecurity – EU CRA, FDA & Automotive Cybersecurity Experts]]></title><description><![CDATA[Product Cybersecurity Group bridges law and engineering with firmware analysis, vulnerability research, and EU CRA, FDA, and automotive cybersecurity consulting for connected devices.]]></description><link>https://blog.productcybersecurity.com</link><generator>RSS for Node</generator><lastBuildDate>Wed, 08 Apr 2026 15:37:42 GMT</lastBuildDate><atom:link href="https://blog.productcybersecurity.com/rss.xml" rel="self" type="application/rss+xml"/><language><![CDATA[en]]></language><ttl>60</ttl><item><title><![CDATA[The EU Cyber Resilience Act: The End of “Ship and Forget”]]></title><description><![CDATA[The era of voluntary security is over.
For years, device manufacturers treated firmware like packaging: ship the hardware, maybe push one update, then move on to the next product line. That model has been dying for a while. The European Union just pu...]]></description><link>https://blog.productcybersecurity.com/the-eu-cyber-resilience-act-the-end-of-ship-and-forget</link><guid isPermaLink="true">https://blog.productcybersecurity.com/the-eu-cyber-resilience-act-the-end-of-ship-and-forget</guid><category><![CDATA[product cybersecurity]]></category><category><![CDATA[EU CRA]]></category><category><![CDATA[Cyber Resilience Act]]></category><category><![CDATA[CRA]]></category><category><![CDATA[cybersecurity]]></category><category><![CDATA[Regulations]]></category><dc:creator><![CDATA[Tyson Benson]]></dc:creator><pubDate>Tue, 16 Dec 2025 20:10:12 GMT</pubDate><enclosure url="https://cdn.hashnode.com/res/hashnode/image/upload/v1765915417499/2978c94d-ece2-4964-bf9d-2f634d9e419d.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>The era of voluntary security is over.</p>
<p>For years, device manufacturers treated firmware like packaging: ship the hardware, maybe push one update, then move on to the next product line. That model has been dying for a while. The European Union just put a legal bullet in its head.</p>
<p>The EU Cyber Resilience Act (CRA) is not a guideline, a “best practice,” or a suggestion. It is a market access requirement. If your connected product does not meet its requirements, you do not sell in the EU. Full stop.</p>
<hr />
<h2 id="heading-the-scope-everything-that-connects">The Scope: Everything That Connects</h2>
<p>If your product is “directly or indirectly connectable,” it is in scope. If it has a chip and can talk to anything else, i.e., cloud, phone, local network, or field bus, you are on the hook. Hobby projects are largely out of scope, and some domains (like medical and automotive) are handled under their own regimes (think R155), but if you are selling a commercial connected product, you are in the blast radius.</p>
<p>This is where many manufacturers underestimate the impact: they assume CRA is for “security products.” It is not. It is for security of products - everything from smart toasters to industrial sensors to children’s “smart” toys.</p>
<hr />
<h2 id="heading-pillar-1-secure-by-default">Pillar 1: Secure by Default</h2>
<p>“No more admin/admin.”</p>
<p>If someone like me can extract your firmware and find hardcoded secrets, debug backdoors, or unauthenticated management interfaces, you are non‑compliant before the product ever hits a shelf. You will be expected to show your homework: how you assessed the components you integrated, your threat model, and your secure development practices.</p>
<p>“Vendor said the chip was secure” is no longer a defense. Blind trust in a component supplier is now a liability, not a shield.</p>
<hr />
<h2 id="heading-pillar-2-the-important-vs-critical-trap">Pillar 2: The “Important” vs “Critical” Trap</h2>
<p>Not every product is treated equally under the CRA.</p>
<ul>
<li><p>General-purpose connected products can typically go through a self-assessment.</p>
</li>
<li><p>“Important” and “Critical” products (for example, certain firewalls, microcontrollers, or industrial control components) must go through a third-party conformity assessment.</p>
</li>
</ul>
<p>That distinction matters because it creates a bottleneck. Third-party assessment capacity will not magically scale overnight. If you wait until 2027 to look for an auditor, you will be standing in line behind every other unprepared manufacturer with a hard deadline and finished hardware.</p>
<hr />
<h2 id="heading-pillar-3-the-forever-support-cycle">Pillar 3: The “Forever” Support Cycle</h2>
<p>Security support is no longer “nice to have” or “we’ll do it until the next model ships.” You are now legally required to provide vulnerability fixes for the expected product lifetime, often five years or more.</p>
<p>Here is the part that catches people off guard: substantial modifications reset the compliance clock. If you push a major firmware update that changes the risk profile, the law treats that as a “new” product. The support timer starts over. You cannot simply declare a product “End of Life” to dodge your obligations and walk away.</p>
<hr />
<h2 id="heading-the-timeline-is-already-running">The Timeline Is Already Running</h2>
<p>The CRA is not a distant, hypothetical future. The clock has started.</p>
<ul>
<li><p>Entry into force: the law is already on the books.</p>
</li>
<li><p>21 months after entry into force, mandatory vulnerability and incident reporting obligations activate — you no longer get to quietly bury security incidents.</p>
</li>
<li><p>By the end of 2027, full compliance is required. If you are not ready, your devices can be effectively “bricked at the border,” stuck in warehouses while compliant competitors ship.</p>
</li>
</ul>
<p>The companies that treat this as a three-year runway will be fine. The ones that treat it as a three-year grace period will not.</p>
<hr />
<h2 id="heading-the-sbom-requirement-know-your-code">The SBOM Requirement: Know Your Code</h2>
<p>The CRA effectively asks a simple question: do you actually know what is in your binaries?</p>
<p>You will need a Software Bill of Materials (SBOM) that enumerates the open-source components and third-party code inside your firmware. If a vulnerable library like Log4j (or its spiritual successor) is buried three levels deep in your dependency tree, that risk is now explicitly yours to own and manage.</p>
<p>Even open-source “stewards” and maintainers have obligations under the CRA, though lighter than those of commercial manufacturers. The era of “we just published the code, whatever happens happens” is ending as well.</p>
<hr />
<h2 id="heading-the-cost-of-ignoring-this">The Cost of Ignoring This</h2>
<p>Non-compliance penalties can go up to €15 million or 2.5% of global annual turnover, whichever is higher. That is not a slap on the wrist; it could ben existential risk for many product lines as well as a board-level concern for anyone selling at scale.</p>
<p>And fines are only part of the story. Lost market access, forced recalls, and reputational damage are often more expensive than the regulatory penalty itself.</p>
<hr />
<h2 id="heading-how-the-product-cybersecurity-group-helps">How The Product Cybersecurity Group Helps</h2>
<p>This is where most organizations underestimate the challenge: you cannot “PowerPoint your way” into CRA compliance. Someone has to actually pull your firmware apart, inventory the components, and map what you are shipping today against what the law now requires.</p>
<p>At Product Cybersecurity Group, that is what we do. We don’t just read the law; we read the code. Our hybrid legal‑technical audits:</p>
<ul>
<li><p>Extract and analyze your firmware instead of relying on aspirational design documents.</p>
</li>
<li><p>Build an SBOM tied to what you actually ship, not what you think you ship.</p>
</li>
<li><p>Map your current technical reality against your legal and regulatory obligations under the CRA.</p>
</li>
</ul>
<p>If you are building or shipping connected products into the EU and want to know whether you are actually ready - not just “we think we’re fine” ready - this is the time to find out, while there is still room in the calendar and before regulators, auditors, or customers force the issue.</p>
<p>Don’t wait for someone else to brick your product for you.</p>
]]></content:encoded></item></channel></rss>