Contact
QR code for the current URL

Story Box-ID: 1227121

achelos GmbH Vattmannstraße 1 33100 Paderborn, Germany http://www.achelos.de
Contact Ms Bianca Dören +49 5251 14212341
Company logo of achelos GmbH

Cyber Resilience Act and industry standard IEC 62443

What's in store for the automation industry

(PresseBox) (Paderborn, )
Products that contain digital elements must be secure throughout their entire life cycle – from development to disposal. This is stipulated by the Cyber Resilience Act (CRA). Manufacturers, integrators and operators of these products must act now. The key to CRA compliance is a public key infrastructure (PKI) for networking IoT devices and a secure development lifecycle.

The European Parliament has launched the Cyber Resilience Act (CRA), the EU law on cyber resilience. Once it has been adopted by the European Council, the parties concerned have 36 months to implement the requirements. 

The CRA affects all products with digital elements – hardware and software – and therefore also industry and its  connected production in the Industrial Internet of Things (IIOT), where devices, machines and components generate, collect and exchange data and process it using industrial control systems. Devices and products that the EU categorises as safety-critical are listed in Annex III of the CRA: These include firewalls, routers, modems and switches for industrial use as well as industrial automation and control systems (IACS).

CRA Annex I: The specific requirements for cyber security

According to the CRA, they must fulfil the following requirements:
  • A secure product and development life cycle (security by design) ensures cyber security throughout the entire life cycle.
  • Continuous vulnerability management is used to document cyber security risks; manufacturers must actively report exploited vulnerabilities and incidents.
  • Software update management ensures that weak points in products are rectified even after the sale: Security updates and patches are required for the expected service life of the product.
Annex I of the CRA sets out what the measures should look like in concrete terms: 

Products with digital elements must be protected against unauthorised access. Risk assessment is the basis for establishing control mechanisms, such as authentication, identity or access management systems. In addition, the integrity of stored, transmitted or otherwise processed data, commands, programs and configurations must be protected against manipulation. 

IEC 62443, an international series of standards for the cyber security of industrial automation systems, provides comprehensive guidelines and requirements that already cover many aspects of cyber security that are also addressed in the CRA. By implementing IEC 62443, both the requirements of the industry and those of the CRA can be met at the same time.

Public key infrastructure (PKI) as the key to CRA compliance

The most important security requirements of the CRA can be met with a public key infrastructure (PKI), the most secure method for connecting IoT devices and industrial control systems. 

As an asymmetric cryptography technology with public and private keys, the PKI enables confidential data exchange. It is implemented by signing and encrypting data, while the authenticity of the keys is guaranteed by digital certificates. This results in four different protective mechanisms: 
  1. The device is given an identity – it is given a birth certificate by the manufacturer during production, which can authenticate it in the network. This ensures that a secure communication channel to the Internet can be established.
  2. Update management is secured with electronic certificates, which the PKI uses to check the authenticity of the software. This prevents unauthorised changes from being made or malware from being introduced. The manufacturer signs firmware updates to identify them as permissible, and updates from third-party providers are also authorised and controlled via certificates.
  3. Secure boot involves checking the integrity code of the device firmware before each start and ensures authentication. 
  4. The PKI also enables secure commissioning of a new device at the operator's premises. To do this, the device is authenticated and then assigned a local device identity.
As a system integrator, achelos provides support in setting up a new PKI or migrating existing systems and can accompany its customers every step of the way, from planning, implementation and provision through to secure operation. 

Secure development lifecycle for CRA-compliant development

CRA-compliant development of control units and systems, taking into account industrial security standards in accordance with IEC 62443, is achieved with a Secure Development Lifecycle (SDL) approach. The entire development process ensures that the final product has no weak points. 

The first step here is an inventory with a gap analysis to identify the gaps in CRA requirements that need to be closed. This is followed by a threat and vulnerability analysis as well as a risk assessment as part of security requirements engineering / TARA. They form the basis for specifying the necessary safety requirements. The security concept and architecture can now be developed in the security architecture engineering process. Embedded security engineering ensures that the update and boot processes of the ICS components are also secure – by implementing cryptographic functions.

In the next step, the ICSs are tested to ensure that they comply with IEC 62443 and other individual security requirements. achelos provides powerful test tools for robustness tests, code analyses and penetration tests. Subsequently, product evaluations in accordance with IEC 62443 have proven to be useful.

Achieving the CRA's cyber security goals with the help of IEC 62443

achelos provides professional and efficient support for the CRA compliance of ICS products, taking into account industrial safety standards in accordance with IEC 62443. Our security engineers support the development of the products and ensure integrated cyber security right from the start. 

achelos GmbH

"We ensure more security in the connected world!"

achelos GmbH is a system house for cybersecurity and digital identity management founded in Paderborn in 2008. The independent provider develops robust solutions and offers service packages in various expansion stages for secure products and applications. For its customers from the fields of healthcare, industry, the public sector, digital payment and telecommunications, achelos translates security standards into viable solutions in line with the requirements of compliance. Customers benefit from this holistic approach – from consulting and conception to software development and certification, and up to and including secure operation. achelos is certified according to ISO 9001, ISO 27001 and Common Criteria and has a prestigious network of partners.

www.achelos.de

The publisher indicated in each case (see company info by clicking on image/title or company info in the right-hand column) is solely responsible for the stories above, the event or job offer shown and for the image and audio material displayed. As a rule, the publisher is also the author of the texts and the attached image, audio and information material. The use of information published here is generally free of charge for personal information and editorial processing. Please clarify any copyright issues with the stated publisher before further use. In case of publication, please send a specimen copy to service@pressebox.de.
Important note:

Systematic data storage as well as the use of even parts of this database are only permitted with the written consent of unn | UNITED NEWS NETWORK GmbH.

unn | UNITED NEWS NETWORK GmbH 2002–2024, All rights reserved

The publisher indicated in each case (see company info by clicking on image/title or company info in the right-hand column) is solely responsible for the stories above, the event or job offer shown and for the image and audio material displayed. As a rule, the publisher is also the author of the texts and the attached image, audio and information material. The use of information published here is generally free of charge for personal information and editorial processing. Please clarify any copyright issues with the stated publisher before further use. In case of publication, please send a specimen copy to service@pressebox.de.