Skip to main content

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [List Home]
Re: [open-regulatory-compliance] CRA Standardisation request
  • From: Steffen Zimmermann <steffen.zimmermann@xxxxxxxx>
  • Date: Mon, 17 Feb 2025 11:56:21 +0000
  • Accept-language: de-DE, en-US
  • Arc-authentication-results: i=3; mx.microsoft.com 1; spf=pass (sender ip is 52.17.62.50) smtp.rcpttodomain=eclipse-foundation.org smtp.mailfrom=vdma.org; dmarc=pass (p=quarantine sp=reject pct=100) action=none header.from=vdma.org; dkim=pass (signature was verified) header.d=vdma.org; arc=pass (0 oda=1 ltdi=1 spf=[1,1,smtp.mailfrom=vdma.org] dkim=[1,1,header.d=vdma.org] dmarc=[1,1,header.from=vdma.org])
  • Arc-authentication-results: i=2; mx.avanan.net; arc=pass; dkim=none header.d=none
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=vdma.org; dmarc=pass action=none header.from=vdma.org; dkim=pass header.d=vdma.org; arc=none
  • Arc-message-signature: i=3; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=9yu4PPp5J52WoB8quw1nEZc14TJMhrG8v2IjKpzdcEM=; b=lwKJAOX7XcqLFpj3PsKvbAPrZrnVhcT/hBI7z/BUZnXkXmAMi8KG7Gmilbj0YkxiuawIM+acy6dh7xn0qWf6LwfDSfD+yozpCYtidkVeM+Ymd/rYitPglo2jyIPTJU5F7Z9oIlx2GxHSY5Nq08OVaFgnr9RLdWLqikXvwJ1yfEB9KcIoyc+AOY3DdNvs9zpknAAzq1HrEXp98OCRZnKW0FIUPvzCLdzUQaCWBsCWJbcb0na+UQfZu2UFRp7KgLGyD08TXYWuS0oKkJrANSro/Zk3lGO2YsYX7DGeyRZCTBtr7Jip/gw58WBALEr75irFk4Xt8n+Y0nyo5zjpR/PM0g==
  • Arc-message-signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=avanan.net; s=arcselector01; t=1739793393; h=from : to : subject : date : message-id : content-type : mime-version; bh=9yu4PPp5J52WoB8quw1nEZc14TJMhrG8v2IjKpzdcEM=; b=YTevkCfI1j+FAx464Dp+bDpgw65JxR5kTIG21AKK3vAlkQhOgEb6UNZVYH9KgGCOtJemA Ri+G0LSGQpTsU2QuFSCM2/AC1EahU+4LYTiZDKF6hddSCHHBdz1XEM6vgVkCRDnsiVKu1fi 9K2qL7GXKTgxDymlRCuax+jp2zC3rkA=
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=9yu4PPp5J52WoB8quw1nEZc14TJMhrG8v2IjKpzdcEM=; b=rVoKrEY0orX162WaB4tdLOe0ygtT5tFt3QvlzcKVclJ1yLSG7BpNZ0qrRwZyDYlzX2LS/9tW5A+opfOJZOyp81aIBtjVFXHuNnDFm12wmCL7FVpvFbY+/5+R60aaYUsSwwzt04ShjzcQ1PFQLHgnqKD60I98IgwtxLLMUXAszrit91lUZowcFRnfKQkdpODI+ZRfIqLTWuD+eAg7j2wY+9kNwqdQdRDnPWoFlhVpNmSuOMpVjeSr6yavyinBmIu6G1krnfovADweCXtrSQHR/n1FnA3rKIvAMniq/8yRUcYmKSAGe2DZXXYRn8351mvQY56ap9UTom4yZILPyZfNJQ==
  • Arc-seal: i=3; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=pass; b=Rgt23ox2AgIaInAXwuOgOb9KEtZb7Y9neFcZLpFN4p4kiMCDzElvdv3ZtI1QR+YBb4VAsI7PvvVrxCNW+g9kh70+QuUKEjRvFrRlmH0MXLtW5ljXhw/BHNuNCdw7NosgTOyGSAwQPIfmase7shsep1Si4X4VR4TTKtLINsL4m3wKwEqnszx9slTtLGLFF1eg4SiuEj9UdlG3vtZFTjrE8306+XryINhewpMX0fXktjRxmtwYWuKDo/8cDGrjl9mhTIB6yAdW7cTDSXGnp+/vH1KMtUXUXM8D7EobJUFatcR5HYzP+02BFZPYYaM2BNihEZWh1Dpbe8S9XOeqjjr+oA==
  • Arc-seal: i=2; cv=pass; a=rsa-sha256; d=avanan.net; s=arcselector01; t=1739793393; b=TZS8k5Ek7QcI/OCAdp/A3GJAg35HTJUnQbxFWmF3GM+Lm8fsanlWJIECLm37g9lM3HqCQ TZaS/IccdOAt42F53H74r35dddF+3T0H5SNipQrDndBLH1mFmDJMEuwrRiLHsnVR/cJzEB1 s2c30M/n/IL5XX9CKK95fGvFToULAlw=
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=dVphrxhn1ZbL9s0bhoOG7tobOHnvwLTMu/j+l4yC33L/GOV0j59Z//LGmwo236V06ozVIAvMs1tZddRGcFweoD7y2mh0I3Xte1oWsC1DAxF13Fd3dGBIct9siq9VKr1S8FsDP1QZq7mIPeuxD65QjIuXIuQHmHjsON+mvVfMz1SFhic4hOzTMi/cNbYMcFHTUQ4g9RftTkFFW9Qr2B2fIA8vC24UFnmQhxLLt0yhIdgJIv4YYWCH6hTiizK73HWJMpYeQOtE73la9HUdKnoyrEpqyJp/AUYXYmhsAitjh8hB9GJmpYR+jfsPtuaJyDA0i2RxODlSsHVpiGm0BA1fpw==
  • Delivered-to: open-regulatory-compliance@xxxxxxxxxxx
  • List-archive: <https://www.eclipse.org/mailman/private/open-regulatory-compliance/>
  • List-help: <mailto:open-regulatory-compliance-request@eclipse.org?subject=help>
  • List-subscribe: <https://www.eclipse.org/mailman/listinfo/open-regulatory-compliance>, <mailto:open-regulatory-compliance-request@eclipse.org?subject=subscribe>
  • List-unsubscribe: <https://www.eclipse.org/mailman/options/open-regulatory-compliance>, <mailto:open-regulatory-compliance-request@eclipse.org?subject=unsubscribe>
  • Thread-index: AQHbbyqrPvVFFLjQZkefyaRAkyUwxrMneGuAgAAFWYCAAAIlAIADNLLggAHkKICACMzGAIAAAt+AgAAQtHCABYSMAIAKudOAgADYFICABLuBAIAAAaeAgAAXhgCAACNZoQ==
  • Thread-topic: [open-regulatory-compliance] CRA Standardisation request

Hi all,

the Commission stated last week that a study by ENISA will soon be published on how EUCC can work with the CRA. 

Viele Grüße,
Best Regards,

Steffen Zimmermann
Industrial Security @ VDMA

…sent from my mobile phone, please excuse any typos

Am 17.02.2025 um 10:50 schrieb Marta Rybczynska via open-regulatory-compliance <open-regulatory-compliance@xxxxxxxxxxx>:




On Mon, Feb 17, 2025 at 9:25 AM Olle E. Johansson <oej@xxxxxxxxxx> wrote:


On 17 Feb 2025, at 09:19, Marta Rybczynska <marta.rybczynska@xxxxxxxxxxxxxxxxxxxxxx> wrote:

Yes, the EUCC applies to third party certification, but it mentions the CRA. Also it makes sense to have the vulnerability reporting process the same in both cases, as there is no reason (IMO) to make them different.
I think the requirements are different. For certified products (in this document) there seems to me like there’s a requirement to report all vulnerabilities. For the rest of products there’s a requirement to report exploited vulnerabilities. I have to read this doc again to understand the details, but there’s discussions about re-certification. I remember discussions with Enisa a long time ago where they clamed that all vulnerabilities in an SBOM would be non-compliance. The doc doesn’t discuss VEX files where a vendor can report their triage results either.

Again, clarification would be good. I may be totally wrong :-)

You're right, in the CC (Common Criteria) scheme there's a need to report vulnerabilities to the certification issuer. There are also expected timelines for various severities. I find it also interesting that they describe in detail the process of confirmation of a vulnerability: not everything reported is considered a vulnerability. This could be useful as an example for the CRA-related processes.

However, the general flow of the process is what we see in security processes typical to open source projects.

One thing I'm missing in the EUCC vs CRA is the clear mention of notifying the upstream, if the issue is in a different product.
 

Also, some open source components with their processes may (and do) end up as components of certified solutions. Common requirement would make the process easier for everyone.
Yes, that’s a concern. How would that affect the relationship between the vendor and the project? 
<room for discussion>

This is something that is already happening. CC certifications have been there for years and of course they include products with open source components.

The innovation of the CRA is that it forces reporting upstream. From what I know, this is not the case with CC.

Kind regards,
Marta
 

/O

Kind regards,
Marta


On Fri, Feb 14, 2025 at 9:03 AM Olle E. Johansson via open-regulatory-compliance <open-regulatory-compliance@xxxxxxxxxxx> wrote:
Note that this does not apply to all products affected by the CRA, only the small percentage that are in the classes important and critical and need third party certification. 

/O

On 13 Feb 2025, at 20:10, Dick Brooks via open-regulatory-compliance <open-regulatory-compliance@xxxxxxxxxxx> wrote:

FYI: February 2025 EUCC endorsement of vulnerability disclosure management practices is consistent with US adoption of IEC 29147:2018. Harmonization of cybersecurity vulnerability management practices following IEC 29147:2018 would be good, IMO; https://certification.enisa.europa.eu/publications/eucc-guidelines-vulnerability-management-and-disclosure-and-eccg-opinion_en
 
FYI: The CISA Software Acquisition Guide recommendations for vulnerability management are consistent with this latest guidance from Europe (February 2025): 
 
The holders of EUCC certificates should use the following standard for the general guidelines related to vulnerability disclosure: 
 ISO/IEC 29147:2018 Information technology - Security techniques - Vulnerability disclosure.
 
Here is the CISA Software Acquisition Guide language that aligns with this EUCC guidance: (https://cisa.gov/sag) 
 
NIST SP 800-161r1 RA-5 and “NIST Guidance” as specified in OMB M-22-18, call for the issuance of vulnerability disclosure reports (VDR) as an attestation showing that a software supplier has checked each component in a software product SBOM for vulnerabilities and reports the status of each vulnerability discovered, following recommendations for coordinate vulnerability disclosure programs contained in IEC 29147:2018. A VDR is a machine-readable artifact and is considered a “product centric” artifact. A VDR is issued simultaneously with a SBOM at product release and remains online as a living document. It is updated by the software supplier when new vulnerabilities affect the product to which the VDR is attesting. This enables a consumer to know if the software product is affected when a new vulnerability is reported.
 
NOTE: NIST has renamed “Vulnerability Disclosure Report” to “Vulnerability Advisory Report” in SP 800-161r1-upd1 to align more closely with IEC 29147:2018 vernacular and eliminate any confusion with a “vulnerability report” that researchers produce and submit to software suppliers. NIST VDR/VAR are produced by software suppliers and provided to software customers to inform of any vulnerabilities in a software product. NIST recommends that software suppliers ensure that SBOM’s and vulnerability advisory reports are maintained and aligned:

Enhancing Capabilities

  • Ensure that third-party suppliers continuously enrich SBOM data with a VAR.
  • Acquiring entities should develop risk management and measurement capabilities to dynamically monitor the impacts of SBOM-related VARs. Acquiring organizations should align with asset inventories for further risk exposure and criticality calculations.[5]
 
 
Thanks,
 
Dick Brooks
<image007.png>
  
<image008.png>
 
<image009.png>
Active Member of the CISA Critical Manufacturing Sector, 
Sector Coordinating Council – A Public-Private Partnership
 
Risk always exists, but trust must be earned and awarded.
Tel: +1 978-696-1788
 
 
From: open-regulatory-compliance <open-regulatory-compliance-bounces@xxxxxxxxxxx> On Behalf Of Tobie Langel via open-regulatory-compliance
Sent: Thursday, February 6, 2025 6:23 PM
To: Open Regulatory Compliance Working Group <open-regulatory-compliance@xxxxxxxxxxx>
Cc: Tobie Langel <tobie@xxxxxxxxxxxxxx>
Subject: Re: [open-regulatory-compliance] CRA Standardisation request
 
The final request has been published by the Commission and is available here: https://ec.europa.eu/transparency/documents-register/detail?ref=C(2025)618&lang=en
 
--tobie
 
On Mon, Feb 3, 2025 at 12:08PM Steffen Zimmermann via open-regulatory-compliance <open-regulatory-compliance@xxxxxxxxxxx> wrote:
Hi all, 
 
look here for the CRA SReq (not yet published):
 
 
Mit den besten Grüßen,
 
Steffen Zimmermann
Industrial Security @ VDMA
 
 
Von: open-regulatory-compliance <open-regulatory-compliance-bounces@xxxxxxxxxxx> Im Auftrag von Simon Phipps via open-regulatory-compliance
Gesendet: Montag, 3. Februar 2025 11:07
An: Open Regulatory Compliance Working Group <open-regulatory-compliance@xxxxxxxxxxx>
Cc: Simon Phipps <webmink@xxxxxxxxxxxxxx>
Betreff: Re: [open-regulatory-compliance] CRA Standardisation request
 
Yes, Felipe mentioned the OSR was due to be published today.
 
{Terse? Mobile! Typo? Dictated!}
 
On Mon, 3 Feb 2025, 10:57 Lars Francke via open-regulatory-compliance, <open-regulatory-compliance@xxxxxxxxxxx> wrote:
A representative from the commission said at FOSDEM yesterday that they hope for the final request to be published this week.
 

I think he mentioned it is on the agenda today but I might misremember that part.

Lars Francke <lars.francke@xxxxxxxxx> schrieb am Di., 28. Jan. 2025, 20:33:
Hi Steffen, everyone,

yes, that's the latest draft that was circulated in December which
could be commented on until January 20. It also said "This is a formal
step to endorse the draft standardisation request, and as such
modifications are not expected during this process." so I don't expect
any differences but the final one has not been published as far as I
can tell.

Cheers,
Lars

On Mon, Jan 27, 2025 at 3:42
PM Steffen Zimmermann via
open-regulatory-compliance <open-regulatory-compliance@xxxxxxxxxxx>
wrote:
>
> Hi,
>
>
>
> find the SReq here (published in December):
>
>
>
> https://draftable.com/compare/CUdwceoGvyYS
>
>
>
> Mit den besten Grüßen,
>
>
>
> Steffen Zimmermann
>
> Industrial Security @ VDMA
>
>
>
>
>
> Von: open-regulatory-compliance <open-regulatory-compliance-bounces@xxxxxxxxxxx> Im Auftrag von Tobie Langel via open-regulatory-compliance
> Gesendet: Samstag, 25. Januar 2025 14:44
> An: Open Regulatory Compliance Working Group <open-regulatory-compliance@xxxxxxxxxxx>
> Cc: Tobie Langel <tobie@xxxxxxxxxxxxxx>
> Betreff: Re: [open-regulatory-compliance] CRA Standardisation request
>
>
>
> Thanks Lars,
>
>
>
> That matches my understanding too: afaik, things are moving forward but an updated draft hasn't been made publicly available nor has the finalized text been published.
>
>
>
> --tobie
>
>
>
> On Sat, Jan 25, 2025 at 2:36
PM Lars Francke via open-regulatory-compliance <open-regulatory-compliance@xxxxxxxxxxx> wrote:
>
> I don't have time to go to all the meetings and read all the documents but from my understanding we (ESOs) had until 20 January to comment/vote on the last draft item.
>
> Some work has already been distributed between CEN and ETSI, not all of it is clear yet as far as I know. Some experts are still missing for some of the vertical standards I think.
>
> But we got to vote on a few NWIs already (New Work Items): https://boss.cen.eu/reference-material/guidancedoc/pages/tcnewwi/
>
>
>
> I honestly have trouble navigating the whole process still but the summary is: No final "SReq" yet but it's all going according to plan.
>
>
>
> Simon Phipps via open-regulatory-compliance <open-regulatory-compliance@xxxxxxxxxxx> schrieb am Sa., 25. Jan. 2025, 14:17:
>
> As far as I am aware it has still not actually been finalised and issued to the ESOs, but someone may know better than me.
>
>
>
> S.
>
>
>
>
>
> On Sat, Jan 25, 2025 at 1:11
PM Andrew Katz via open-regulatory-compliance <open-regulatory-compliance@xxxxxxxxxxx> wrote:
>
> Hi All
>
>
>
> A quick question: I’ve managed to the find the draft standardisation request from the European Commission for the 41 (?) standards under the CRA. Presumably this text was finalised at around the same time as the Act was published in the OJ. I’ve tried looking, but have yet to find it. Does anyone have a copy or a link?
>
>
>
> This is all I have: https://ec.europa.eu/docsroom/documents/58974
>
>
>
> All the best
>
>
>
>
>
> Andrew
>
>
>
>
>
>
>
>
> Andrew Katz
> Orcro Limited
> +44 20 7170 5943
> +44 7970 835001
> orcro.co.uk
>
> 86-90 Paul Street, London, EC2A 4NE, UK
>
>
> Orcro Limited is a limited company registered in England and Wales under Number 11173406. Registered office is c/o Saffery, St John’s Court, Easton Street, High Wycombe, Buckinghamshire, England, HP11 1JX. VAT number: GB 289 7831 32. Orcro Limited is not regulated as a law firm and does not provide legal advice. Individuals’ qualifications are as set out in their bio page. Reference to an individual as a lawyer, solicitor or paralegal does not mean that they are acting in that capacity as an Orcro staff member.
>
> Data protection: we process your personal data to keep in touch with you, to carry out work for you or your organisation, for internal administration (including employment) for regulatory purposes and for limited marketing purposes (for which you can require us to stop at any time). For more information see https://orcro.co.uk/privacy-summary/ or contact team@xxxxxxxxxxx
>
>
>
> _______________________________________________
> open-regulatory-compliance mailing list
> open-regulatory-compliance@xxxxxxxxxxx
> To unsubscribe from this list, visit https://accounts.eclipse.org
>
>
>
>
> --
>
> Simon Phipps
>
> Supporting Software Heritage at ORC
>
> Meshed Insights Ltd.
>
> _______________________________________________
> open-regulatory-compliance mailing list
> open-regulatory-compliance@xxxxxxxxxxx
> To unsubscribe from this list, visit https://accounts.eclipse.org
>
> _______________________________________________
> open-regulatory-compliance mailing list
> open-regulatory-compliance@xxxxxxxxxxx
> To unsubscribe from this list, visit https://accounts.eclipse.org
>
> _______________________________________________
> open-regulatory-compliance mailing list
> open-regulatory-compliance@xxxxxxxxxxx
> To unsubscribe from this list, visit https://accounts.eclipse.org
_______________________________________________
open-regulatory-compliance mailing list
open-regulatory-compliance@xxxxxxxxxxx
To unsubscribe from this list, visit https://accounts.eclipse.org
_______________________________________________
open-regulatory-compliance mailing list
open-regulatory-compliance@xxxxxxxxxxx
To unsubscribe from this list, visit https://accounts.eclipse.org
_______________________________________________
open-regulatory-compliance mailing list
open-regulatory-compliance@xxxxxxxxxxx
To unsubscribe from this list, visit https://accounts.eclipse.org

_______________________________________________
open-regulatory-compliance mailing list
open-regulatory-compliance@xxxxxxxxxxx
To unsubscribe from this list, visit https://accounts.eclipse.org

_______________________________________________
open-regulatory-compliance mailing list
open-regulatory-compliance@xxxxxxxxxxx
To unsubscribe from this list, visit https://accounts.eclipse.org

PNG image

PNG image

PNG image


Back to the top