top of page

EU Cyber Resilience Act Compliance: Professional Training for Embedded Systems

Price

Inquiry

Duration

1 Day

EU Cyber Resilience Act Compliance: Professional Training for Embedded Systems



The "Cyber Resilience Act (CRA) and Embedded Systems" course is designed to equip embedded system developers and product managers with a comprehensive understanding of the EU Cyber Resilience Act. Participants will learn to implement essential cybersecurity requirements. The course covers compliance pathways, including CE marking and conformity assessments, and provides practical strategies for securing embedded systems. Additionally, it highlights ready tools and solutions to ensure adherence to the regulation while enhancing product resilience. 


Objectives:

Gain a clear understanding of the EU Cyber Resilience Act and its impact on digital products.

Learn the key cybersecurity requirements for products with digital elements to ensure compliance.

Discover the compliance process, including CE marking and conformity assessments.

Understand how to implement cybersecurity measures for embedded devices throughout their lifecycle.

Explore market-ready solutions and tools to help businesses meet the Act’s requirements.


Course outline:

Introduction to the Cyber Resilience Act

  • Overview and objectives of the Regulation.

  • Key challenges in cybersecurity for products with digital elements

  • Scope and applicability: Products and entities impacted by the Act

  • Relation to existing EU laws like NIS2, GDPR, and Cybersecurity Act


Essential Cybersecurity Requirements

  • Requirements for secure design and development of products

  • Vulnerability management obligations, including updates and disclosures

  • Transparency measures: Informing users about vulnerabilities and support periods

  • Handling substantial modifications in digital products


Compliance and Conformity Assessment

  • CE marking and conformity procedures for digital products

  • Classification of products (important vs. critical)

  • Case study: Applying conformity assessments to embedded systems


Lifecycle Security Management

  • Obligations for manufacturers: From development to end-of-support

  • Securing supply chains and third-party components

  • Best practices for risk assessments and due diligence


Implementations for Cyber Resilience Compliance

  • Security Solutions

    • Built-in security features Yocto Project, Zephyr RTOS

    • Hardware-based security modules (e.g., TPMs, Secure Elements).

    • Secure boot mechanisms and encrypted storage solutions.

  • Compliance Tools and Frameworks

    • Vulnerability scanning tools (e.g., CVE checkers)

    • Automated tools for compliance documentation and CE marking


Communication Protocols and Network Systems

  • Cyber Resilience Requirements

    • Ensuring communication integrity and data encryption as per the Act

    • Addressing risks in networked embedded systems

  • Secure Communication Protocols

    • Importance of secure protocols (e.g., TLS, DTLS, SSH) in embedded systems.

    • Overview of industrial and IoT-specific protocols

    • Protocol vulnerabilities and mitigation strategies

  • Network System Security:

    • Implementing secure configurations for embedded network devices

    • Techniques for securing wireless communications


Target Audience

  • Embedded system developers

  • Product managers


Prerequisites

  • Basic Knowledge of Embedded Systems

Course Environment

Evaluation


Nohau Training Partner

This course is provided by a Nohau Training Partner, a trusted provider of hands-on training for professionals in embedded systems, software development, and engineering.

Nohau Training Partner
bottom of page