Initiatives for
As the national authority for Cybersecurity the CCB has developed several initiatives for specific publics which are presented here.
The Cyber Resilience Act (CRA) was published on 20 November 2024. This new EU regulation contains “horizontal cybersecurity requirements for products with digital elements”. In other words, it imposes minimum cybersecurity requirements for all connected products put on the EU market, making the so-called “internet of things” (IoT) more secure. The new rules will apply in all EU countries and will be implemented in phases. Ultimately, the CRA is expected to contribute to the CCB’s vision of making Belgium more cyber-secure by ensuring that its citizens and organisations, whether public or private, are less vulnerable to cyberattacks.
see also the FAQ below
Citizens and organisations increasingly rely on connected products in their day-to-day activities. Just think of smartphones, smart cameras used for security purposes, smart meters used to optimise electricity production and consumption, etc. At the same time, many connected products put on the market still have low cybersecurity standards (e.g. weak default passwords, no encryption of data…), making them ideal targets for cyberattacks. Such small weaknesses can even cause severe supply-chain attacks in essential entities, with potentially severe impact for our entire economy and society. Because users are often not aware of the risks and are insufficiently equipped to protect themselves, the CRA is designed to ensure that manufacturers do their part in designing products that are more cyber secure and in making it easier for users to maintain the products in a secure state throughout the whole product lifecycle.
Products covered by the CRA range from low-cost consumer products to B2B software and high-end complex industrial systems. More specifically, “products with digital elements” are defined as products that can be connected to a device or network of some sort and include:
The following products are however not covered by the CRA requirements:
All manufacturers placing products on the EU market must comply with the CRA even if they are based outside the EU. For instance, the CRA applies to a US developer selling a mobile app on European phones or to a Chinese manufacturer selling solar panels in Belgium.
The CRA primarily imposes obligations on manufacturers (in terms of design, conformity assessment of their products, reporting of vulnerabilities and incidents, transparency towards users…) to ensure that their products are secure before they are put on the EU market, but also afterwards throughout the whole lifecycle of the product.
The CRA also includes provisions affecting other operators such as importers, distributors, open source software stewards (such as foundations), conformity assessment bodies (CABs) and public authorities (national cybersecurity agencies, market surveillance authorities).
The major novelty of the CRA is that it defines a minimum level of cybersecurity for all connected products that are available on the EU market – something that did not previously exist. For instance:
Yes, and no. On the one hand, the CRA contains a single set of cybersecurity requirements in that will apply to all connected products, no matter whether they are cheap or expensive, whether they are used by individual consumers or sophisticated business users. The requirements to report vulnerabilities and to clearly indicate the end of the support period on the product, for example, apply to all types of products.
On the other hand, the procedure to assess whether products are in conformity with the CRA rules are different for standard products and for products deemed more sensitive from a cybersecurity point of view. These products, called “important” or “critical” products, are listed in Annexes III & IV of the Regulation (e.g. password managers, firewalls, smartcards, smart meters…). They will have to undergo stricter conformity assessment procedures, e.g. by obtaining an EU cybersecurity certification (or corresponding national certification), by being assessed for compliance by a third party auditor under the existing product legislation framework (NLF), or – in limited cases – by complying with harmonised standards recognised at European level to cover the CRA requirements.
Importantly, non-commercial open source software such as software whose source code is publicly available and which is can be downloaded free of charge, is not subject to the CRA obligations, in recognition that many open source projects are based on the contribution of volunteers and that imposing strict legal obligations on such projects could risk undermining their very existence.
Other types of open source software are however distributed on a commercial basis and may be used on a large scale by individuals and organisations worldwide. Such software should be treated the same way as other commercial software and is thus subject to the same CRA requirements.
That said, the CRA foresees a special regime for commercial open source software maintained under a foundation model, in recognition that foundations typically act as “stewards” of open source projects and cannot be held liable for the work of individual developers. Under the special regime created by the CRA, open source software stewards will not have to undergo CRA conformity assessment procedures but will have to document their cybersecurity policy. They will also have to report severe incidents and vulnerabilities in which they are involved, and will be encouraged to take part in voluntary security attestation programmes.
In order to ensure that small and micro enterprises are not put at a disadvantage compared to larger firms, the CRA includes several provisions aimed at reducing the compliance burden for SMEs. Examples of such measures include the possibility for SMEs to use a simplified format for issuing the technical documentation of their products and the obligation for conformity assessment bodies to take a company’s size into account when determining the amount of fees to be paid for a conformity assessment.
Public authorities will also have a key role to play in supporting smaller manufacturers in their compliance efforts. The European Commission committed to publish CRA guidance specially targeted at SMEs, while each EU country has to establish a dedicated channel for communication with micro- and small enterprises to respond to their queries and requests for advice on CRA implementation.
Today, consumers usually find it difficult to know whether a connected product is sufficiently secure, or whether it can easily be hacked by third parties. Thanks to the CRA, European consumers will have the guarantee that the products they buy in the EU comply with minimum standards and do not have, for example, a major known vulnerability, or weak default settings.
But the CRA also empowers consumers to make more informed choices by requiring transparency from manufacturers on the level of cybersecurity offered by their products. One of the key novelties of the CRA is that it requires manufacturers to clearly indicate, on the product, on its packaging or on an easily accessible webpage, the date until when security updates will be provided for the product. In other words, users will be able to compare products not only based on their price and features, but also on the length of the support period – an important indicator to ensure that products can be used in a secure way during their expected lifetime.
By promoting cybersecurity by default and by design, by mandating the reporting of actively exploited vulnerabilities and by ensuring a sound patching process, the CRA will help the CCB achieve its vision of making Belgium one of the least vulnerable countries in the cyber domain. As the national authority for cybersecurity, the CCB:
The CRA officially enters into force 20 days after its publication, i.e. on 10 December 2024. Because it is an EU regulation and not a directive, it is directly applicable in all EU countries without the need for national transposition. A transition period is however foreseen to ensure that economic operators have sufficient time to adapt to the new requirements. The implementation of the CRA will thus occur in different phrases from the end of 2024 to 2027:
The Cyber Resilience Act (CRA) was adopted on 20/11/2024. Here are some preliminary answers to the most frequently asked questions about this new European regulation and how it will be applied in Belgium. Please keep it mind that the guidance provided here is for informational purposes only and is not intended as legal advice. The legal text of the CRA, once published, will prevail over any of the explanations provided here.
The Cyber Resilience Act is the first European regulation that imposes minimum cybersecurity requirements for all connected products put on the EU market. Its objective: making the so-called “internet of things” (IoT) more secure. The new rules will apply in all EU countries and will be implemented in phases. The CRA is ultimately expected to contribute to the CCB’s vision of making Belgium more cyber-secure by ensuring that its citizens and organisations, whether public or private, are less vulnerable to cyberattacks.
Citizens and organisations increasingly rely on connected products in their day to day. At the same time, many connected products put on the market still have low cybersecurity standards (e.g. weak default passwords, no encryption of data, difficult update processes…), making them ideal targets for cyberattacks. Because users are often not aware of the risks and are insufficiently equipped to protect themselves, the CRA is designed to ensure that manufacturers do their part in designing products that are more cyber secure and in making it easier for users to maintain the products in a secure state throughout the whole product lifecycle.
Products to be covered by the CRA range from low-cost consumer products to B2B software and high-end complex industrial systems. More specifically, “products with digital elements” are defined as products that can be connected to a device or network of some sort and include:
Products NOT subject to the CRA requirements include non-commercial open source software, cloud services and software as a service (SaaS), the last two being already regulated under the NIS2 Directive.
All manufacturers placing products on the EU market will have to comply with the CRA even if they are based outside the EU. For instance, the CRA applies to a US developer selling a mobile app on European phones or to a Chinese manufacturer selling solar panels in Belgium. Moreover, distributors and importers of connected products will also have to ensure compliance.
The major novelty of the CRA is that it defines a minimum level of cybersecurity for all connected products that are available on the EU market – something that did not previously exist. For instance:
Yes, and no. On the one hand, the CRA contains a single set of cybersecurity requirements in that will apply to all connected products, no matter whether they are cheap or expensive, whether they are used by individual consumers or sophisticated business users. The requirements to report vulnerabilities and to clearly indicate the end of the support period on the product, for example, will apply to all types of products.
On the other hand, the procedure to assess whether products are in conformity with the CRA rules will be different for standard products and for products deemed more sensitive from a cybersecurity point of view. These products are called “important” or “critical” products and listed in Annexes III & IV of the Regulation (e.g. password managers, firewalls, smartcards, smart meters…). They will have to undergo stricter conformity assessment procedures, e.g. by obtaining an EU cybersecurity certification (or corresponding national certification), by being assessed for compliance by a third party auditor under the existing product legislation framework (NLF), or – in limited cases – by complying with harmonised standards recognised at European level to cover the CRA requirements. The EU is now working on developing the necessary standards for these of products.
Importantly, non-commercial open source software is not subject to the CRA obligations, in recognition that many open source projects are based on the contribution of volunteers and that imposing strict legal obligations on such projects could risk undermining their very existence.
Other types of software distributed on a commercial basis will however be treated the same way as closed-source commercial software and thus be subject to the same CRA requirements. As an exception to this category, the CRA foresees a special regime for commercial open source software maintained under a foundation model, in recognition that foundations typically act as “stewards” of open source projects and cannot be held liable for the work of individual developers.
However, since so many commercial products heavily rely on free and open source software, the CRA closes the loophole by obliging manufacturers (or distributers or importers) of these products to make sure that the open source software they use is secure. In this manner, the possibility of supply chain attacks is limited.
In order to ensure that small and micro enterprises are not put at a disadvantage compared to larger firms, the CRA includes several provisions aimed at reducing the compliance burden for SMEs. Examples of such measures include the possibility for SMEs to use a simplified format for issuing the technical documentation of their products and the obligation for conformity assessment bodies to take a company’s size into account when determining the amount of fees to be paid for a conformity assessment.
Public authorities will also have a key role to play in supporting smaller manufacturers in their compliance efforts. The European Commission committed to publish CRA guidance specially targeted at SMEs, while each EU country has to establish a dedicated channel for communication with micro- and small enterprises to respond to their queries and requests for advice on CRA implementation.
First, it is important to stress that manufacturers will only have to report actively exploited vulnerabilities to the single reporting platform. This means that the vulnerabilities notified under the CRA will already have been used.by malicious actors to perform cyberattacks.
Secondly, the purpose of the single reporting platform is to ensure a smooth and efficient transmission of information on vulnerabilities and incidents between national cybersecurity agencies (Computer Security Computer Security Incident Response Teams), and with ENISA. The platform will not store sensitive information about, for example, unpatched vulnerabilities. Several technical, operational and organisational safeguards will be put in place to ensure that the platform is developed and operates in a fully secure manner, with special attention given to the confidentiality of the data transmitted.
Finally, the single reporting platform established by the CRA should not be confused with the European vulnerability database established by the NIS2 Directive.
Today, consumers usually find it difficult to know whether a connected product is sufficiently secure, or whether it can easily be hacked by third parties. Thanks to the CRA, European consumers will have the guarantee that the products they buy in the EU comply with minimum standards and do not have, for example, a major known vulnerability, or weak default settings.
But the CRA also empowers consumers to make more informed choices by requiring transparency from manufacturers on the level of cybersecurity offered by their products. One of the key novelties of the CRA is that it requires manufacturers to clearly indicate, on the product, on its packaging or on an easily accessible webpage, the date until when security updates will be provided for the product. In other words, users will be able to compare products not only based on their price and features, but also on the length of the support period – an important indicator to ensure that products can be used in a secure way during their expected lifetime.
Because the CRA is an EU regulation and not a directive, it will be directly applicable in all EU countries without the need for national transposition. A transition period is however foreseen to ensure market operators have sufficient time to adapt to the new requirements. The European Parliament has already voted on a preliminary version of the text. Following a legal-linguistic review, the Act is expected to be officially voted into law by the newly elected European parliament and by the Council of the EU at the end of the summer of 2024. The final text will then be published in the Official Journal of the EU and will enter into force 20 days later. The implementation of the CRA will then occur in different phrases from the end of 2024 to 2027: