Skip to main content

News about Topic "Password Manager"

Preparing PassSecurium for the EU Cyber Resilience Act (CRA)

Cybersecurity regulation in Europe is entering a new phase.

With the adoption of the EU Cyber Resilience Act (CRA), cybersecurity is no longer just a matter of best practices or voluntary standards. It is becoming a legally enforceable requirement for manufacturers of digital products.

For companies developing software or connected systems, the CRA introduces new obligations related to secure product design, vulnerability management, transparency, and incident reporting. Organizations that fail to comply may face substantial penalties — up to €15 million or 2.5% of global annual turnover.

At ALPEIN Software, we are preparing our PassSecurium business password manager to meet these requirements well before the regulation reaches full enforcement.

This article explains what the CRA is, who it applies to, and how we are preparing PassSecurium to comply with its cybersecurity requirements.

What is the EU Cyber Resilience Act?

The Cyber Resilience Act (Regulation EU 2024/2847) is a European regulation that establishes mandatory cybersecurity requirements for products with digital elements that are placed on the EU market.

These include:

  • Software products
  • Network and security tools
  • IoT devices
  • Hardware with embedded software
  • Business applications and enterprise systems

The goal of the CRA is to ensure that products sold in the EU are:

  • Secure by design
  • Secure by default
  • Supported with security updates
  • Transparent about vulnerabilities

The regulation introduces cybersecurity obligations throughout the entire lifecycle of a product, from development and release to vulnerability handling and user notification.

In practical terms, the CRA moves cybersecurity from recommendation to legal obligation.

Who the CRA applies to

The CRA applies to manufacturers, importers, and distributors of products with digital elements that are placed on the EU market.

This includes:

  • EU-based companies
  • Non-EU companies selling products to EU customers

For software vendors, the key point is simple:

If your product is distributed or sold within the EU, the CRA applies.

This means that Swiss software companies — including those selling enterprise security solutions — must also comply when serving EU customers.

Product classification under the CRA

The regulation classifies digital products into different categories based on cybersecurity risk.

Default category

Approximately 90% of products fall into this category.

Examples include:

  • Standard software applications
  • Consumer electronics
  • Lower-risk IoT devices

These products typically undergo self-assessment for conformity.

Important products — Class I

Certain products that play a critical role in security or identity management fall into Important Class I.

Examples include:

  • Password managers
  • Browsers
  • VPN solutions
  • Identity management systems
  • Network management software

PassSecurium falls into this category.

This classification reflects the fact that password managers store sensitive credentials and therefore require stronger cybersecurity guarantees.

Important Class I products may undergo:

Self-assessment using harmonized standards

or

Third-party conformity assessment

Important products — Class II

Higher-risk infrastructure software falls into this category, such as:

  • Firewalls
  • Intrusion detection systems
  • Operating systems
  • Hypervisors
  • Public key infrastructure (PKI) systems (cryptography)

These products require mandatory third-party assessment.

Critical Products

Critical digital components include:

  • Hardware security modules
  • Smart cards
  • Secure cryptoprocessors

These require European Union Cybersecurity Certification Scheme on Common Criteria (EUCC) certification at substantial or high assurance levels.

CRA implementation timeline

The CRA introduces a phased implementation timeline, giving manufacturers time to prepare.

Entry into force

10 December 2024

The regulation officially entered into force, and companies are expected to begin compliance planning.

Typical activities during this phase include:

  • Product classification
  • Gap analysis against CRA requirements
  • Assigning internal compliance ownership
  •  

Mandatory vulnerability reporting

11 September 2026

This is one of the most significant milestones.

Manufacturers must implement the ability to:

  • Report actively exploited vulnerabilities
  • Notify authorities via the ENISA reporting platform
  • Provide structured incident reports

Full Enforcement

11 December 2027

From this date onward:

  • All essential cybersecurity requirements must be met
  • Technical documentation must be complete
  • Conformity assessments must be finalized
  • CE marking must be applied
  • An EU Declaration of Conformity must be issued

Essential cybersecurity requirements

The CRA defines essential cybersecurity requirements in Annex I. These requirements form the core of the regulation and apply to software products such as password managers.

Below are some of the most relevant principles.

Secure by design and Secure by default

Products must be designed with cybersecurity as a core architectural principle.

For PassSecurium, this includes:

  • risk-based security architecture
  • hardened default configurations
  • strong authentication mechanisms
  • secure credential storage design

Users should not need to manually enable security features to achieve a safe configuration.

No known exploitable vulnerabilities

Products must not be released with known exploitable vulnerabilities.

This requires:

  • security review before release
  • vulnerability testing
  • controlled software release processes

Access control

Products must prevent unauthorized access through appropriate authentication and authorization mechanisms.

For a password manager, this includes:

  • multi-factor authentication
  • role-based access control
  • least-privilege access models
  • secure integration with identity providers

Confidentiality, integrity, and availability

Products must ensure the protection of data:

  • Confidentiality through encryption
  • Integrity through tamper protection
  • Availability through resilient system architecture

Minimizing the attack surface

The CRA requires products to limit exposure to unnecessary interfaces and external access points.

This includes:

  • restricting external interfaces
  • minimizing exposed services
  • carefully controlling APIs

Security logging and monitoring

Products must record security-relevant events to enable monitoring and incident analysis.

For enterprise products such as password managers, logging capabilities are essential for:

  • auditability
  • incident investigation
  • compliance reporting

Secure update mechanisms

Manufacturers must provide mechanisms for distributing security updates securely.

This includes:

  • update integrity verification
  • authenticated update delivery
  • rollback capabilities

Vulnerability handling requirements

Annex I also defines requirements for how vendors handle vulnerabilities.

Software bill of materials (SBOM)

Manufacturers must maintain a machine-readable inventory of software components. SBOMs improve supply chain transparency and help identify vulnerable components.

Vulnerability remediation

Vulnerabilities must be:

  • identified
  • assessed
  • fixed without undue delay

Security updates must be distributed to affected users.

Coordinated vulnerability disclosure

Manufacturers must establish a public vulnerability disclosure process.

This includes:

  • a public contact for reporting vulnerabilities
  • documented internal processes
  • responsible disclosure procedures

Incident and vulnerability reporting

Manufacturers must report actively exploited vulnerabilities to ENISA through the CRA Single Reporting Platform.

This ensures faster cross-border cybersecurity coordination.

Standards supporting CRA compliance

The CRA allows manufacturers to demonstrate compliance with the essential cybersecurity requirements through harmonized European standards (Article 27).

Until CRA-specific harmonized standards are formally published, widely adopted international standards such as IEC 62443 (Secure product development lifecycle), ISO/IEC 27001 (Information security management systems), ISO 31000 (Risk management methodology), and ISO/IEC 29147/30111 (Vulnerability disclosure and handling) can serve as supporting frameworks for implementing secure development, vulnerability handling, and risk management practices.

Compliance with harmonized standards can create a presumption of conformity under the regulation.

Our CRA preparation roadmap

Preparing for CRA compliance is a multi-year process.

Our internal roadmap includes several key steps.

Phase 1 – Compliance planning

  • Appoint CRA compliance owner
  • Inventory products and components
  • Classify products under CRA categories
  • Perform gap analysis against Annex I requirements

Phase 2 – Security infrastructure

  • Implement SBOM generation
  • Establish vulnerability tracking processes
  • Develop incident reporting procedures
  • Prepare technical documentation

Phase 3 – Reporting and testing

  • Register on the ENISA reporting platform
  • Implement 24-hour vulnerability reporting capability
  • Test vulnerability reporting workflows
  • Establish coordinated vulnerability disclosure processes

Phase 4 – Conformity assessment

  • Identify appropriate conformity assessment bodies
  • Complete technical documentation
  • Perform final security testing
  • Prepare CE marking and EU Declaration of Conformity

The final compliance deadline is 11 December 2027.

Conclusion

The Cyber Resilience Act represents a fundamental shift in how cybersecurity is regulated in Europe.

Instead of relying on voluntary standards, the CRA introduces mandatory security requirements for digital products.

For cybersecurity vendors, this regulation reinforces a principle that should already be standard:

Security must be built into the product lifecycle — from architecture and development to vulnerability management and transparency.

At ALPEIN Software, we are preparing PassSecurium for CRA compliance through a structured implementation roadmap aligned with international security standards.

Our goal is not only regulatory compliance, but also maintaining a high level of security, transparency, and trust for our customers in Switzerland and across Europe.

 

Sources:

https://digital-strategy.ec.europa.eu/en/policies/cyber-resilience-act

Still have questions?

Don’t settle for compromises! Do you have specific requirements? Let us know – we’re happy to address them individually.

We’re here to help you choose the right PassSecurium™ version and tailor it to your needs.

 

Contact FAQ 

Keep up with the news
Bleiben Sie auf dem Laufenden