Skip to main content

Follow Me

Join Viktor, a proud nerd and seasoned entrepreneur, whose academic journey at Santa Clara University in Silicon Valley sparked a career marked by innovation and foresight. From his college days, Viktor embarked on an entrepreneurial path, beginning with YippieMove, a groundbreaking email migration service, and continuing with a series of bootstrapped ventures.

CRA Explained: What the Cyber Resilience Act Means for Device Manufacturers with Sarah Fluchs

Play On Listen to podcast on YouTube Listen to podcast on Spotify Listen to podcast on Apple Listen to podcast on Amazon music
16 DEC • 2025 1 hour 6 mins
Share:

What happens when long-lifecycle hardware meets modern cybersecurity expectations? In this episode of Nerding Out with Viktor, I sit down with Sarah Fluchs, CTO and OT cybersecurity expert, to break down how the Cyber Resilience Act (CRA) is shifting the way secure products are built, maintained, and supported across the EU market.

Sarah began her career as a mechanical and process engineer before moving into OT security, eventually earning a PhD in security-by-design. Her research intersected directly with the early drafts of the CRA, which led to her appointment on the EU Commission’s CRA expert group. That first-hand involvement gives her a rare blend of technical and policy perspective on a piece of legislation that touches every device manufacturer.

As the conversation unfolds, we explore the friction between CRA’s security goals and the practical realities of embedded systems. From OTA update limitations to certification constraints, Sarah outlines the challenges manufacturers face and how they’re adapting. We dig into why “patch it fast” doesn’t scale in OT environments, and how CRA’s five-year support requirement forces companies to rethink lifecycle planning from the ground up.

The discussion also turns to SBOMs: what they are, why they matter, and the very real difficulty of generating them in legacy systems. Along the way, we touch on tooling, data quality, versioning, and the operational mess behind making software components traceable and auditable across complex supply chains.

Underlying it all is a simple message: CRA compliance isn’t about ticking boxes. Done right, it’s a path to stronger engineering practices, deeper supply chain accountability, and better product security. For anyone building secure, connected devices in a regulated world, this episode offers a practical guide to what’s coming and how to prepare.

Transcript

Show/Hide Transcript
[00:00] Sarah Fluchs
I know why people look at industrial controllers and say, well, this looks like, I mean, I once had the analogy.
[00:07] Sarah Fluchs
It looks a bit like if you have a PS5 and then you put a Game Boy next to it, that's what a PSA looks like.
[00:13] Sarah Fluchs
It looks old fashioned, but then again it has to work in rough operational conditions.
[00:19] Sarah Fluchs
There's vibration, there is dust, there is heat, there's everything that it doesn't love.
[00:24] Sarah Fluchs
Right.
[00:25] Sarah Fluchs
So.
[00:26] Sarah Fluchs
And these things still work for 20 years and counting.
[00:31] Viktor Petersson
Welcome back to another episode of Nerding out with Viktor. Today, we got to do an episode on CRA or EU Cyber Resilience act.
[00:39] Viktor Petersson
And I thought, why not bring on a proper expert?
[00:43] Viktor Petersson
I've talked a lot about CRA over the last year on the show, but I want to bring on a real expert.
[00:47] Viktor Petersson
So today I'm with me, Sarah Flux.
[00:50] Viktor Petersson
Welcome, Sarah.
[00:52] Sarah Fluchs
Hello.
[00:52] Sarah Fluchs
Thanks for having me.
[00:54] Viktor Petersson
Sarah, you are definitely an authority and you've been involved in CRA for quite some time.
[00:59] Viktor Petersson
But before we dive into CRA and all the implications that it has to come with it.
[01:05] Viktor Petersson
For people who are selling into the European market, maybe let's start by giving people some backstory about yourself.
[01:10] Viktor Petersson
You've been in the tech world and kind of around this world for a while, so give people a kind of backstory so we can kind of shape the conversation, understand the context of where you're coming from.
[01:20] Sarah Fluchs
Okay, well, I work in OT cybersecurity, so my background really is in engineering, not in cyber security.
[01:29] Sarah Fluchs
I'm one of the persons that were first in engineering and then kind of took the direction into cyber as we say nowadays.
[01:39] Sarah Fluchs
And I work for company, I'm the CTO of a company who does consulting in auto cybersecurity space.
[01:47] Sarah Fluchs
And we, as the cto, I'm responsible for methodologies and for all the things that we do that make sure that we keep at the bleeding edge of what's going on in OT cybersecurity.
[02:00] Sarah Fluchs
And that's why I've always been involved in standardization, because that plays a big role in cybersecurity, as we all know, and also in regulation because it's just one of our driving factors.
[02:12] Sarah Fluchs
And I did a PhD in security by design for OT and during that time that was exactly the time when COA first came up.
[02:21] Sarah Fluchs
So that's when I kind of stumbled upon coa.
[02:24] Sarah Fluchs
I write a monthly newsletter and that's always my time to read up on all the things that sound interesting.
[02:32] Sarah Fluchs
And back in 2022, I think nobody talked about CRA yet and just a draft came up and I read through this and really was drawn into that because I was like, oh, wow, this is going to be a really big thing.
[02:46] Sarah Fluchs
It's going to make a difference.
[02:47] Sarah Fluchs
And that's exactly the thing that I'm researching my PhD.
[02:51] Sarah Fluchs
So naturally I was intrigued.
[02:53] Sarah Fluchs
Yeah, that's how it was how I came to cra.
[02:56] Sarah Fluchs
And this year I was selected to be on the CRA expert group for the EU Commission.
[03:01] Sarah Fluchs
And that of course is great because you get a close up on all the debates that are going on around cyber.
[03:09] Sarah Fluchs
The Cyber Resilience Act.
[03:12] Viktor Petersson
I mean, there's a lot to unpack there, but I think people have been at least.
[03:17] Viktor Petersson
Well, I guess maybe for people who are not familiar with the OT world, maybe we stop by there.
[03:21] Viktor Petersson
Like what's ot?
[03:22] Viktor Petersson
I mean, people come.
[03:23] Viktor Petersson
I guess most my audience we're watching, they're from the it, cyber security space.
[03:28] Viktor Petersson
Ot, kind of a tangential industry with some overlap.
[03:31] Viktor Petersson
So maybe we can stop unpacking that before we dive into the.
[03:34] Sarah Fluchs
Yeah, absolutely.
[03:35] Sarah Fluchs
I have sympathy for everybody who doesn't know what OT is.
[03:38] Sarah Fluchs
So that's fine.
[03:39] Sarah Fluchs
When I started out in ot wasn't even a word.
[03:41] Sarah Fluchs
So that's kind of new.
[03:43] Sarah Fluchs
And people that work in ot, that other people from the outside call as working in ot, don't see themselves as working in ot, interestingly.
[03:51] Sarah Fluchs
So what's ot?
[03:52] Sarah Fluchs
Ot?
[03:53] Sarah Fluchs
So the official translation is operation technology.
[03:56] Sarah Fluchs
I also like to refer to it as the other technologies.
[03:59] Sarah Fluchs
So everything is not it.
[04:01] Sarah Fluchs
So it's basically.
[04:03] Sarah Fluchs
And that's also how it came about.
[04:04] Sarah Fluchs
It was an IT people term for this strange other technology that somehow also is our networks.
[04:11] Sarah Fluchs
And it's basically all the kind of electronic technology that operates some kind of physical process.
[04:20] Sarah Fluchs
So industrial plant or wastewater plant or a production plant or our energy grid or all these things are operated by ot, so by controllers, microcontrollers, programmable logic controllers or control systems and all these things that belong to that.
[04:41] Sarah Fluchs
So that's ot and how.
[04:43] Viktor Petersson
I guess there is a.
[04:45] Sarah Fluchs
If.
[04:45] Viktor Petersson
I guess if you do a Venn diagram there you have industrial Iot, which is kind of like a.
[04:50] Viktor Petersson
Which moves somewhat into that space as well.
[04:52] Sarah Fluchs
Absolutely.
[04:53] Sarah Fluchs
Yeah.
[04:54] Viktor Petersson
I guess it's murky what.
[04:55] Viktor Petersson
Where things belong, I suppose.
[04:57] Viktor Petersson
I guess.
[04:58] Sarah Fluchs
Yeah, absolutely.
[04:59] Sarah Fluchs
And I'm not a fan of really getting too much caught up in definitions on what belongs to OT and what doesn't because it doesn't really help.
[05:07] Viktor Petersson
Yeah, and.
[05:08] Viktor Petersson
And your PhD being secure by design in this OT world or this.
[05:16] Viktor Petersson
People who have had at least a Little bit of exposure to this world, they usually come away screaming because they realize that a lot of them are not very secure.
[05:26] Viktor Petersson
Secure at very best is an afterthought, if it's a thought at all.
[05:30] Viktor Petersson
How do you end up in that world at all?
[05:32] Viktor Petersson
Because that's.
[05:33] Viktor Petersson
It's almost.
[05:34] Viktor Petersson
Yeah, cra I, as we will speak about in a moment will change this hopefully.
[05:39] Viktor Petersson
But yeah, what's your exposure in that world like?
[05:42] Viktor Petersson
How do you get it drawn into that in the first place?
[05:45] Sarah Fluchs
You mean security by design in general.
[05:48] Viktor Petersson
In the OT world?
[05:50] Viktor Petersson
I guess because that's.
[05:51] Viktor Petersson
It feels like security is the leading edge in the cyber security space in general.
[05:56] Sarah Fluchs
That's right.
[05:56] Viktor Petersson
The OT world is 30 years behind in many ways.
[06:00] Viktor Petersson
So merging these portals, that's a very.
[06:02] Sarah Fluchs
IT person thing to say.
[06:03] Sarah Fluchs
You know, it's actually.
[06:06] Sarah Fluchs
Well, it's.
[06:07] Sarah Fluchs
It's been one of the long conversations of IT people always saying, well, if OT could just do things like we've been doing then for 30 years, they would be fine.
[06:15] Sarah Fluchs
And the thing is it doesn't work that way.
[06:18] Sarah Fluchs
And at the same time OT is ahead in other ways.
[06:23] Sarah Fluchs
So it's like it's a really specific kind of technology that is really good at specifically what it does.
[06:30] Sarah Fluchs
And it also, if it's from an engineer's perspective.
[06:34] Sarah Fluchs
That's always what bothered me about it when I first looked into IT responsible for security engineering when I started out in consulting.
[06:42] Sarah Fluchs
And so I sat down and said, okay, what is security engineering?
[06:46] Sarah Fluchs
And then I found out that IT people really have a very broad understanding of what engineer counts as engineering.
[06:55] Sarah Fluchs
So if, I mean I'm a mechanical engineer and then a process engineer.
[07:01] Sarah Fluchs
So when I think about engineering, I think about there's a problem.
[07:05] Sarah Fluchs
We've got, we do a drawing, we've got diagram, we've got a methodology to solve this, we do some calculations and then we've got couple of options how to solve this.
[07:12] Sarah Fluchs
And then we engineer a solution and in it's more or less, well, here's your list of best practices and you choose one.
[07:20] Sarah Fluchs
And then that's engineering.
[07:21] Sarah Fluchs
And that's kind of for an OT person, that's not how that works.
[07:25] Sarah Fluchs
So that feels like chrystal ball looking, but not like engineering.
[07:30] Sarah Fluchs
It feels like witchcraft, but not like engineering.
[07:33] Sarah Fluchs
And that really, I think that is just the first difference that people need to understand when they say OT could just do things the same way.
[07:41] Sarah Fluchs
Like we didn't know they can because I mean the things that are OT in there, they are surrounded by a lot of more technology.
[07:48] Sarah Fluchs
And if you frog something up there, then really they could have a nuclear power plant blowing up or you could have people's lives injured.
[07:59] Sarah Fluchs
So they are a lot more conservative about how things are and what the controllers can do and what the systems can do.
[08:07] Sarah Fluchs
And that's a good thing, not a bad thing.
[08:10] Sarah Fluchs
And also they're very good at staying focused on the essential functionality of a certain component and not having everything around that just because you can.
[08:22] Sarah Fluchs
And I think these are things so fundamental differences that people really need to understand before they judge about the other disciplines.
[08:29] Sarah Fluchs
So it's the same for ot.
[08:30] Sarah Fluchs
So they also like to sneer at it and say, well that's not really engineering.
[08:36] Sarah Fluchs
It's not really that they change everything every day and it's not made for decades.
[08:43] Sarah Fluchs
It's, it's going to be exchanged in five years anyway.
[08:46] Sarah Fluchs
So it helps if you have a bit more respect from both sides towards the other side.
[08:53] Sarah Fluchs
Actually that's a very fair point.
[08:54] Viktor Petersson
I mean, I think you said something here which is very interesting to me, which is the whole, the lifespan, the life cycle which is very like, if you're talking about like cloud engineering or whatever you want to call it these days, right?
[09:06] Viktor Petersson
Like that operates in weeks, months, years maybe, but it's not, you're not thinking that long term at all.
[09:16] Viktor Petersson
Like it's kind of almost going back to the mainframe world analogy, right?
[09:20] Viktor Petersson
Like they were built for the long run.
[09:22] Viktor Petersson
Cloud workloads are ephemeral and they'll be replaced shortly, right?
[09:25] Viktor Petersson
So the, but this is really interesting, particularly if you talk about maintainability for a long time, right?
[09:32] Viktor Petersson
Zero trust in all these concepts.
[09:35] Viktor Petersson
They talk a lot about like how you are going to patch vulnerabilities and how you got to main do lifecycle management of these.
[09:44] Viktor Petersson
Like those concepts are very different in OT world, right?
[09:49] Viktor Petersson
How, how you do like package managers are not necessarily a thing at all in that world, right?
[09:58] Sarah Fluchs
Software works differently in that world of times.
[10:01] Viktor Petersson
Yes, exactly.
[10:04] Sarah Fluchs
And it's in every plant, in every industrial plant.
[10:06] Sarah Fluchs
When you work around you find at least one person that says look, and this PLC here that has been running for 20 years without a single day of downtime, imagine that in it.
[10:14] Sarah Fluchs
I mean that's a superpower.
[10:16] Sarah Fluchs
Imagine we could do that in it.
[10:18] Sarah Fluchs
And before it managed to do that, I don't want to get advice from it how to do resilient systems, you know, because that's it's really, it's.
[10:28] Sarah Fluchs
I get it.
[10:29] Sarah Fluchs
I know why people look at industrial controllers and say, well, this looks like.
[10:33] Sarah Fluchs
I mean, I once had the analogy.
[10:36] Sarah Fluchs
It looks a bit like if you have a PS5 and then you put a Game Boy next to it, that's what a PSA looks like.
[10:43] Sarah Fluchs
It looks old fashioned, but then again it has to work in rough operational conditions.
[10:48] Sarah Fluchs
There's vibration, there is dust, there is heat.
[10:51] Sarah Fluchs
There's everything that it doesn't love.
[10:53] Sarah Fluchs
Right, so.
[10:55] Sarah Fluchs
And these things still work for 20 years and counting.
[11:00] Viktor Petersson
Yeah, sorry, I was just going to say, like, how.
[11:05] Sarah Fluchs
Do you view.
[11:06] Viktor Petersson
I mean, OTA being something that is kind of expected in the modern era of IOT and IIoT.
[11:13] Viktor Petersson
Right.
[11:14] Viktor Petersson
That's not necessarily something that fits in traditional worldviews from ot.
[11:19] Viktor Petersson
Right.
[11:20] Viktor Petersson
Doing like pushing OTA updates over every few days or months or weeks or so.
[11:25] Viktor Petersson
How does that kind of narrative fit into traditional OT in your world?
[11:30] Viktor Petersson
Because I guess that's the segue into cra, which is very tightly controlled, that you must be able to do certain things like this, right?
[11:37] Sarah Fluchs
Yeah, right.
[11:37] Sarah Fluchs
And that's actually a hard thing to do for many people in ot because it's not like, I mean, it's pretty clear that you can't just restart a nuclear power plant every two days.
[11:49] Sarah Fluchs
Doesn't work.
[11:51] Sarah Fluchs
So if there's a Windows patch day and then next week there's the next Windows patch day, then that's something that drives engineers crazy in plants like that.
[11:59] Sarah Fluchs
But still, of course there is things like IT and OT convergence.
[12:04] Sarah Fluchs
Of course there is more and more commercial off the shelf technology and more normal IT technology being used in OT as well.
[12:13] Sarah Fluchs
I mean, at the end of the day, most control system servers are run on Windows, so it's not like we're immune against any of these things.
[12:26] Sarah Fluchs
But still, if you.
[12:30] Sarah Fluchs
Patching in general needs a different approach in ot because oftentimes you lose warranties or liabilities.
[12:38] Sarah Fluchs
If you just patch control systems, for example, you can't just put a patch on there because then the control system vendor says, okay, I'm out, no liability anymore.
[12:47] Sarah Fluchs
Taken because you've changed the system.
[12:49] Sarah Fluchs
Sometimes these systems have certifications, so for example, for safety certifications.
[12:55] Sarah Fluchs
So there really comes a.
[12:58] Sarah Fluchs
Or someone else or any kind of company who really certifies the software as is.
[13:03] Sarah Fluchs
And you're not allowed to change a bit about that because otherwise you lose certification.
[13:08] Sarah Fluchs
And regaining certification is a process that can take months.
[13:13] Sarah Fluchs
So it's not as easy as saying, okay, well Then just deploy that patch and then you're good to go.
[13:18] Sarah Fluchs
And that's also one of the problems that many manufacturers in the industrial sector see currently when they look at CRA and say okay, we're supposed to deliver products without exploitable vulnerabilities and also patch them immediately when they come up.
[13:35] Sarah Fluchs
That's actually a problem because we can't just take everything out of the market.
[13:38] Sarah Fluchs
And also it's a problem for operators.
[13:40] Sarah Fluchs
We can't just always have three month standstills just because there is a patch and then we need to recertify for example.
[13:50] Viktor Petersson
Yeah, because it's complete polar opposite needs.
[13:53] Viktor Petersson
Right.
[13:53] Viktor Petersson
Because I mean modern software kind of assumes that you can do this stuff but then there are.
[13:59] Sarah Fluchs
That's right, yeah.
[14:00] Viktor Petersson
You kind of in particular if you're using a bad example like the JavaScript world where you're like, it just thinks like things will be, they have a six month life cycle then like this new library.
[14:10] Sarah Fluchs
Isn't it kind of weird that we accept it as normal that you need to update software like five times a day?
[14:15] Sarah Fluchs
I mean.
[14:16] Viktor Petersson
Oh yeah, it's kind of crazy.
[14:18] Viktor Petersson
You're absolutely right.
[14:21] Sarah Fluchs
How has that become normal?
[14:22] Sarah Fluchs
I mean how is that supposed to be good engineering?
[14:25] Sarah Fluchs
But it is the way the things work in it.
[14:28] Sarah Fluchs
That's right, yeah, absolutely.
[14:30] Viktor Petersson
I mean, but I guess what I'm saying is like with looming pressure to be able to conduct these updates, there are completely bipolar requirements and the suppliers or the manufacturer of these devices, there must be a rock and hard place.
[14:47] Viktor Petersson
Right.
[14:47] Viktor Petersson
Because on the one hand they need to have all these strict compliance regulations from that they cannot change things and simultaneously they have to change things.
[14:58] Sarah Fluchs
Yeah, that's right.
[14:59] Viktor Petersson
It must be, that's very different from say software which is like updates.
[15:04] Sarah Fluchs
It is, absolutely.
[15:05] Viktor Petersson
Yeah.
[15:05] Sarah Fluchs
And the approach that's very likely going to be taken, that's also the approach that already is being taken towards patch management and ot, that you just don't have this patch everything as soon as possible approach.
[15:18] Sarah Fluchs
But you do a lot more of down to earth prioritization of okay, what really needs to be patched and what really is a risk because the risk on the other side.
[15:30] Sarah Fluchs
So there's always, I mean the risk for don't patch is kind of clear because then you have the vulnerability.
[15:35] Sarah Fluchs
But in OT there's also a large risk of patch because if you patch there's also, I mean there's cost because sometimes there needs to be downtime for these patches and there's also a risk of Things not working and then patches need to be rolled back and things like that.
[15:51] Sarah Fluchs
So that's just a risk equation that goes a lot more towards not patch, if in doubt, not don't patch or have kind of compensating measures or also.
[16:03] Sarah Fluchs
And that's also how things work in CRA for some systems.
[16:08] Sarah Fluchs
You just limit where they can be operated, what the intended purpose is.
[16:13] Sarah Fluchs
So I can say, okay, this is something that absolutely cannot be connected to the Internet, for example.
[16:18] Sarah Fluchs
And then you can afford to not patch as fast as you would for other systems, for example.
[16:23] Viktor Petersson
Yeah, because I mean it's not like to use a cloud.
[16:26] Viktor Petersson
You don't have a staging nuclear facility where you can just run your tests and then you.
[16:31] Sarah Fluchs
Right, so if you brought that up, then it doesn't matter that much.
[16:36] Sarah Fluchs
Exactly.
[16:36] Sarah Fluchs
So things just don't work that way in ot.
[16:39] Sarah Fluchs
That's right, yeah.
[16:40] Viktor Petersson
Yeah.
[16:41] Viktor Petersson
So it's very different the world, but.
[16:43] Viktor Petersson
All right, so we kind of have worked.
[16:45] Viktor Petersson
We mentioned our CRA multiple times and maybe you became a much more domain expert than myself in this domain.
[16:53] Viktor Petersson
What's a cra?
[16:55] Viktor Petersson
Let's give people assume.
[16:56] Viktor Petersson
People do not know what it is.
[16:57] Viktor Petersson
Assume that you're a company selling in hardware into European market and you have never heard of this, which I literally had a conversation this week with.
[17:07] Viktor Petersson
Well, last week, sorry.
[17:08] Viktor Petersson
With a vendor that have no idea about this stuff.
[17:12] Viktor Petersson
And a lot of people still, even though ratification is starting next year, are very unaware what this even means to them.
[17:21] Viktor Petersson
Right, so let's start there.
[17:23] Viktor Petersson
You're a vendor selling into the European market.
[17:25] Viktor Petersson
What do you need to know?
[17:26] Viktor Petersson
Like explain it as I know nothing about this.
[17:30] Sarah Fluchs
I think the most important thing to mention is that there are certain cybersecurity requirements.
[17:34] Sarah Fluchs
If you don't meet them, then you won't be able to sell your product anymore into the European Union.
[17:40] Sarah Fluchs
And that's also the first thing that especially companies that are not from the European Union really have to.
[17:47] Sarah Fluchs
Let's sink in a bit and to swallow because how can they even prohibit me from selling products?
[17:53] Sarah Fluchs
But yes, they can and they can based on cybersecurity.
[17:56] Sarah Fluchs
And that indeed is something very new.
[17:58] Sarah Fluchs
I think that's indeed something unique globally.
[18:02] Sarah Fluchs
I'm not aware of any other region who has such strict cybersecurity requirements for products that even can prevent people from placing the product on the market.
[18:13] Sarah Fluchs
And I like to explain it best, I think compared to other products because essentially in the European Union we've had this very same mechanisms for a long time for other products.
[18:27] Sarah Fluchs
It's always been for safety reasons.
[18:29] Sarah Fluchs
So it's always.
[18:31] Sarah Fluchs
When a product is at risk, can put its buyer or its user at risk.
[18:36] Sarah Fluchs
Then there are some.
[18:38] Sarah Fluchs
There is a CE marking stands for conformity.
[18:41] Sarah Fluchs
European.
[18:43] Sarah Fluchs
So for European conformity, that's a, C and E, and I've probably seen that before.
[18:48] Sarah Fluchs
And let's say, for example, it's on sunglasses.
[18:51] Sarah Fluchs
So if you buy sunglasses, then of course there needs to be proper UV protection, because otherwise people put them on and if they don't have the protection, they assume they have the protection, then they can hurt their eyes.
[19:01] Sarah Fluchs
So that's why there is a CD marking order on these sunglasses.
[19:05] Sarah Fluchs
And that's.
[19:06] Sarah Fluchs
And the CE marking means that manufacturers pledge to be in conformity with the relevant European regulations for this type of product.
[19:19] Sarah Fluchs
And what's new about CRA now is that really such a CE marking gets applied on pretty much everything you have on your desk.
[19:26] Sarah Fluchs
So on every digital product.
[19:29] Sarah Fluchs
So from smartphones and laptops and pretty much everything.
[19:33] Viktor Petersson
Bluetooth.
[19:33] Viktor Petersson
So like even that one?
[19:34] Sarah Fluchs
Yeah, well.
[19:36] Sarah Fluchs
Well, then maybe that as well.
[19:38] Sarah Fluchs
Yeah.
[19:39] Sarah Fluchs
So there's going to be a CE marking on that and the CE marking is going to mean it's in conformity with all the European Union regulation, including the Cyber Resilience Act.
[19:49] Viktor Petersson
So you spent a lot of time doing advisory work with companies and in your consulting work you now need to conform.
[20:00] Viktor Petersson
So that's clear.
[20:01] Viktor Petersson
But what does that actually mean?
[20:03] Viktor Petersson
If you're selling?
[20:05] Viktor Petersson
The terminology is device, but I'm forgetting.
[20:12] Sarah Fluchs
The product with digital elements.
[20:14] Viktor Petersson
That's exactly.
[20:16] Viktor Petersson
You're selling, probably, and you're going into the European market.
[20:20] Viktor Petersson
You have now assessed that I can't ignore the European market for strategic reasons or whatnot.
[20:25] Viktor Petersson
Right.
[20:25] Viktor Petersson
And you're not going to sell it.
[20:27] Viktor Petersson
All right.
[20:27] Viktor Petersson
Where do I start to even become compliant as a vendor?
[20:32] Sarah Fluchs
Yeah.
[20:33] Sarah Fluchs
So obviously, first step is, as a vendor, see which of your products actually need to be compliant.
[20:43] Sarah Fluchs
There are some categories of important and critical products that have some stricter not requirements, but a stricter requirements for proving the conformity.
[20:53] Sarah Fluchs
The requirements are the same for all.
[20:56] Sarah Fluchs
When you've done that, what you have is the basis of the CRA.
[21:01] Sarah Fluchs
If you only want to read two pages of the CRA, take Annex 1, because that's the essential requirements and that's the requirements that actually you need to be in conformity with.
[21:12] Sarah Fluchs
So, and that's two parts.
[21:14] Sarah Fluchs
The first part is basically technical requirements.
[21:16] Sarah Fluchs
They're worded very broadly.
[21:18] Sarah Fluchs
So there are things like integrity protection or make sure the personal data is protected.
[21:24] Sarah Fluchs
So nothing that comes as a surprise for a security person, to be honest.
[21:29] Sarah Fluchs
And then the second part is about vulnerability handling because really a large part of CRA is about vulnerability handling and that also makes it different from all the other product legislation we have in the European Union.
[21:42] Sarah Fluchs
Because obviously, I mean if a product, if you think about product safety, then you produce it in conformity with some kind of legislation and test this UV protection for example, and then you're done.
[21:53] Sarah Fluchs
Unless you find a mistake in your production and, or something.
[21:57] Sarah Fluchs
But that's really not that often.
[22:00] Sarah Fluchs
But in cybersecurity we have vulnerabilities that can come up anytime and that really makes CRA so different.
[22:08] Sarah Fluchs
So the thing that think that's most.
[22:14] Sarah Fluchs
Maybe hardest for manufacturers to believe and also to meet is that they actually have to have a support period defined for the products that has to be at least five years or as long as the products lifespan is.
[22:29] Sarah Fluchs
And they have to deliver security updates for free during that lifespan.
[22:35] Sarah Fluchs
And that's a big one of course, because.
[22:38] Viktor Petersson
Yeah, and there's a lot to unpack there.
[22:39] Sarah Fluchs
Right.
[22:40] Viktor Petersson
For the first one is five years.
[22:41] Viktor Petersson
And that is even if you have a product today with existing SKU and that's placed in market, the clock.
[22:47] Viktor Petersson
And this is where I've seen a lot of people confused about cra.
[22:50] Viktor Petersson
Like when that five year time period starts, if I have a product that I've already had manufacturing and I'm placing that in the market today and I'm selling that today with an existing sku, does a clock start from the first customer buys it?
[23:09] Viktor Petersson
Does it start when I first started manufacturing?
[23:11] Viktor Petersson
So like it's three years from that period?
[23:14] Viktor Petersson
Like how does that actually clock work?
[23:16] Sarah Fluchs
Yeah, the concept of placing on the market is a bit hard to grasp also because it has a lot of legal deep dives you could do and say okay, in that case.
[23:28] Sarah Fluchs
But generally you can say placing on the market is when a manufacturer first sells that product to someone.
[23:36] Sarah Fluchs
It can be a distributor, it can be the end customer, but it is the first time it leaves the manufacturers facilities a contract assigned to sell the product to someone, whoever it is.
[23:49] Sarah Fluchs
And what's also important for the CRA to understand CRA is there's no such thing as a product type or anything.
[23:55] Sarah Fluchs
So the CRA always applies to each individual product.
[23:59] Sarah Fluchs
That also means if you buy a laptop, see how it doesn't apply now, but if you buy a laptop on the 1st of January 2028, then it has five years of support period and that ends on the 1st of January 2033.
[24:15] Sarah Fluchs
And if you buy it six months later, then that laptop you buy six months later has a support period that ends six months later.
[24:23] Sarah Fluchs
So it's actually for every instance that's sold.
[24:26] Viktor Petersson
This is extremely complicated in supply chain because you as a manufacturer do not control your entire supply chain per se.
[24:38] Viktor Petersson
You might have sold it to a distributor who sit on these for three years and then they finally sell them.
[24:44] Viktor Petersson
But you as a manufacturer still obligated to support it when it gets to the hand of the customer.
[24:50] Sarah Fluchs
No, no you're not.
[24:51] Sarah Fluchs
No, you're not.
[24:52] Sarah Fluchs
No, you're not.
[24:52] Sarah Fluchs
Because that could be.
[24:53] Sarah Fluchs
Would be impossible for manufacturers to control as you.
[24:57] Sarah Fluchs
Right.
[24:58] Sarah Fluchs
So you as a manufacturer, you're obliged to support the product for the five years or whatever the support period is starting when you sell it to a distributor.
[25:10] Sarah Fluchs
So if it sits as a distributor serves for five years, then theoretically you could buy a product as an end customer that doesn't have any support anymore.
[25:18] Viktor Petersson
Right.
[25:18] Viktor Petersson
So it's void and void as the clock starts when you ship it off to your distributor or your end customer, depending on.
[25:26] Viktor Petersson
On that first.
[25:27] Sarah Fluchs
Because otherwise there's no way for the manufacturers to know.
[25:32] Viktor Petersson
That was kind of my point.
[25:32] Viktor Petersson
Right.
[25:33] Viktor Petersson
Because then you have like essentially infinite life cycle for a given device which.
[25:38] Sarah Fluchs
Is not relative complicated enough as is.
[25:40] Sarah Fluchs
So because theoretically you have for a single product you can have multiple endlessly many different dates of end of support, period.
[25:49] Sarah Fluchs
And I actually think there will be pragmatic ways how manufacturers deal with it.
[25:54] Sarah Fluchs
So when I discuss that, the most likely case is that I say, okay, we just have an end of support date and the first product that we sell, if someone sells, buys it earlier, then they just get longer support, but the guaranteed support is just five years.
[26:09] Sarah Fluchs
And then so that you don't have to maintain multiple support end dates for the same type of product, but different instances because you're getting crazy administrating there.
[26:20] Viktor Petersson
Yeah, yeah, exactly.
[26:22] Viktor Petersson
And that's.
[26:23] Viktor Petersson
Yeah, it gets really difficult.
[26:24] Viktor Petersson
And also.
[26:24] Viktor Petersson
So now let's talk about what that actually means to make sure you provide security updates for all these devices that you send.
[26:32] Viktor Petersson
Because we talk about vulnerabilities and patching all those things.
[26:36] Viktor Petersson
It's not really a solved problem today to do like.
[26:39] Viktor Petersson
There's no unified way of doing software and security updates across products in the market.
[26:45] Viktor Petersson
Right.
[26:45] Viktor Petersson
It varies a lot.
[26:46] Viktor Petersson
Like the way you do that for a light bulb is very different than you do from a laptop, which is very different from a. I don't know, a camera, right.
[26:55] Viktor Petersson
What have you seen so far like in terms of, I mean, are you expecting to see more involvement in that space?
[27:05] Viktor Petersson
Because right now like IoT is kind of very fragmented to say the least when it comes to OTA and updates.
[27:13] Viktor Petersson
How, I mean, how do you expect this kind of change the landscape really?
[27:18] Viktor Petersson
Because it does.
[27:20] Viktor Petersson
You can't really expect people walk around with USB stick and update things.
[27:24] Viktor Petersson
Right?
[27:25] Viktor Petersson
That's not really.
[27:26] Sarah Fluchs
Well, and then an ot, the thing really is CRA doesn't prescribe how updates are to be rolled out.
[27:35] Sarah Fluchs
So I know that in other legislations, I think also for automotive, there are requirements to do it over the air.
[27:43] Sarah Fluchs
There's no such requirement in the cra.
[27:46] Sarah Fluchs
There is a requirement that you can do it, that you must be able to do it automatically if technically feasible.
[27:56] Sarah Fluchs
And also, and that's something that came in after a lot of industry feedback and also that there must be a way to turn off the automatic updates because that again in OT really matters.
[28:09] Sarah Fluchs
And we have a lot of.
[28:10] Sarah Fluchs
So if you're looking at industrial manufacturers, so automatic updates are great for consumer devices and having them turned on is great for consumer devices unless the consumer chooses not to connect them to the Internet, which is sometimes security advice.
[28:24] Sarah Fluchs
So then you have this conflicting advice of do connect, don't connect to the Internet, but do enable the automatic updates.
[28:30] Sarah Fluchs
And then, well, that's a deadlock.
[28:32] Sarah Fluchs
But for industrial manufacturers, oftentimes customers at all want automatic updates.
[28:40] Sarah Fluchs
So it's like the worst thing that can happen to them because then they, I mean we've talked about software not being changed and certifications and doing that automatically is even worse.
[28:52] Sarah Fluchs
So we do have a lot of industrial manufacturers as customers who actually say the default for us is not doing it automatically.
[28:59] Sarah Fluchs
And we're putting in our user instructions information that we don't do it automatically because it doesn't make any sense.
[29:05] Sarah Fluchs
It would just increase risk and not lower risk.
[29:09] Sarah Fluchs
Okay.
[29:11] Sarah Fluchs
And then yes, people walk in with USB sticks and update devices.
[29:14] Sarah Fluchs
That's how it works.
[29:16] Sarah Fluchs
And sometimes even industrial space, sometimes even customers aren't even allowed or don't even know how to update these things themselves.
[29:24] Sarah Fluchs
They call any kind of contractor or service provider and they walk in with the so called USB stick and update the devices.
[29:32] Sarah Fluchs
So that is completely normal.
[29:34] Viktor Petersson
Yeah, it's a very different world.
[29:36] Sarah Fluchs
It is a different world.
[29:38] Sarah Fluchs
Yes, it is.
[29:40] Viktor Petersson
I think it's hard not to move on to SBOMs from here, I guess.
[29:46] Sarah Fluchs
Which is.
[29:48] Viktor Petersson
The litmus test for if you know your software supply Chain.
[29:51] Viktor Petersson
I've had Alan Friedman on the show, I had Steve Springett on the show and had a bunch of people in the S bomb world who've spoken about this.
[29:57] Viktor Petersson
I guess if people really want to know about SBOMs, they should probably go back and watch those episodes.
[30:01] Viktor Petersson
But.
[30:01] Viktor Petersson
But what?
[30:03] Viktor Petersson
I'm.
[30:03] Viktor Petersson
I assume people do know what an SBOM is by now and people who are watching this from your side of the world, like in your side of the world in the sense of the OT world.
[30:14] Viktor Petersson
Building sboms for a Python application or a Rust application is fairly straightforward.
[30:21] Viktor Petersson
Doing that for the embedded world, very different problem space.
[30:26] Viktor Petersson
Right.
[30:28] Viktor Petersson
I co led one of the CIS like working groups for SBOM generation with the guy from Lockheed and they are now trying to figure out how to do S bombs from like 30 year old C code.
[30:37] Viktor Petersson
Right.
[30:38] Viktor Petersson
And that's a very different problem.
[30:42] Viktor Petersson
I'm sure you've seen something similar.
[30:43] Viktor Petersson
Like what have you seen there in.
[30:45] Viktor Petersson
In people's journey to try to generate SBoMS for what generally we call legacy systems.
[30:51] Sarah Fluchs
Right?
[30:52] Sarah Fluchs
Yeah.
[30:53] Sarah Fluchs
I mean probably you have a lot of more hands on experience on that.
[30:56] Sarah Fluchs
I would be really interested in what your experience on generating embedded SBoM is.
[31:05] Sarah Fluchs
I think the first thing is that people start to realize that they need to do their SBOM at all.
[31:11] Sarah Fluchs
Because I mean it's the first time there really is a requirement to have an SBoM.
[31:16] Sarah Fluchs
And a lot of discussions that I see are first based around, okay, we create that SBoM.
[31:22] Sarah Fluchs
I mean, they're not obliged by the CRA to also share it with their customers.
[31:27] Sarah Fluchs
But of course many customers would like to have it because they themselves are also coa regulated.
[31:33] Sarah Fluchs
So if they use the product for using it into another product.
[31:37] Sarah Fluchs
So that's a big discussion with a lot of manufacturers saying we don't want to share it because it doesn't even help you because then you get the updates from us anyway about vulnerabilities.
[31:46] Sarah Fluchs
So why would we even share it?
[31:48] Sarah Fluchs
I would be interested in your opinion on that actually.
[31:51] Sarah Fluchs
What's in there?
[31:54] Viktor Petersson
This is a conversation I've had many times and a lot of opinions either side.
[31:59] Viktor Petersson
Right.
[32:02] Viktor Petersson
Is an SBOM good to be shared publicly?
[32:06] Viktor Petersson
The answer is it depends.
[32:07] Viktor Petersson
Right.
[32:07] Viktor Petersson
And I think to me the reason why it's important to start with is it's a litmus test.
[32:12] Viktor Petersson
Do you actually understand what goes into your software?
[32:14] Viktor Petersson
I think that's a good starting point.
[32:16] Viktor Petersson
Right.
[32:17] Viktor Petersson
And I think dealing with that in the legacy world is very difficult.
[32:22] Sarah Fluchs
Difficult.
[32:22] Viktor Petersson
Right.
[32:22] Viktor Petersson
But I think the sharing side of it is something that I will see if the appetite increases for it over time.
[32:31] Viktor Petersson
I think we're going to have, I mean you have the requirement, I believe you need to archive it for five years, I think for every release, right?
[32:38] Sarah Fluchs
Yeah, I think five, ten.
[32:41] Viktor Petersson
Yeah, it's something like that.
[32:43] Viktor Petersson
Yeah.
[32:43] Viktor Petersson
But, but that means that regardless how you generated set S bomb for your product, you still need to have a lifecycle part of it.
[32:50] Viktor Petersson
Right?
[32:50] Viktor Petersson
You need to build and store it somewhere.
[32:53] Viktor Petersson
And I mean we have just referenced the CISA Sharing Primer, which I'm sure you've read as well for SBoM, the share primer that was written a few years ago.
[33:02] Viktor Petersson
It's not a solved problem.
[33:03] Viktor Petersson
People don't actually do it properly.
[33:05] Viktor Petersson
Like I've spoken with so many CISOs and they're like, yeah, I get as mess bombs, I chucked them at SharePoint and that's it.
[33:12] Viktor Petersson
And so the lifecycle of things is a problem that I'm passionate about, like trying to solve myself because I think that's a big problem.
[33:19] Sarah Fluchs
Like, and also then the version management and the differences.
[33:23] Sarah Fluchs
So how do I quickly track the difference between an S bomb from five years ago and two years ago?
[33:30] Viktor Petersson
And not only that, because what I discovered when we started doing S boms in the real world is that in a real product, you're not going to have one S bomb.
[33:39] Viktor Petersson
Like you got to have 10, 15 different S BOMs for different parts of your product.
[33:43] Viktor Petersson
Because a product is a composition of multiple components and when you start to release things, you might use four of these, but this component changed.
[33:54] Viktor Petersson
But the top level ASP is now different.
[33:55] Viktor Petersson
Right.
[33:56] Viktor Petersson
So the release management is becoming much more difficult to do and shamed off self plug.
[34:04] Viktor Petersson
That's what we saw with Spamify.
[34:06] Viktor Petersson
But that's kind of the, that's the hard part really.
[34:09] Viktor Petersson
Right.
[34:09] Viktor Petersson
It's like how you do that scale.
[34:11] Viktor Petersson
Because if your top level obligation is that you need to provide an SBOM for a product of a given version, you need to have in four years from now be able to say, oh, version 4.3.2 had these SBOMs.
[34:26] Viktor Petersson
Right.
[34:26] Viktor Petersson
And that's the tricky part.
[34:28] Sarah Fluchs
Yeah.
[34:29] Sarah Fluchs
And then also I think that the, of course there's a requirement to have an SBOM period, but in the end just having an SBOM doesn't help you at all.
[34:40] Sarah Fluchs
So you need to be able to do something with it.
[34:42] Sarah Fluchs
And that's where a lot of conversation starts also industrial sector and I Believe everywhere because people say, okay, now if I have that SBoM, now what?
[34:51] Sarah Fluchs
Because if now a vulnerability comes up, I would expect my SBOM to quickly tell me am I affected or am I not affected.
[34:58] Sarah Fluchs
But for that you need not just an SBoM, you also need to be, need to have the vulnerability reporting in a format that actually corresponds to your SBOM format.
[35:08] Sarah Fluchs
And that's also one of the big things we're talking about.
[35:11] Sarah Fluchs
So here, at least in Europe and in the industrial space, the German BSI also supports it.
[35:22] Sarah Fluchs
There's a lot of discussion about csof.
[35:25] Sarah Fluchs
So a machine readable vulnerability sharing format.
[35:30] Sarah Fluchs
So where you say okay, let's share vulnerabilities and security advisories in a way that is kind of standardized and machine readable so that they can be tied into the SBOM mapping and all that thing.
[35:42] Sarah Fluchs
All those things can theoretically be done automatically because nobody wants to read all these vulnerability advisory PDFs and then try to make sense of that.
[35:51] Sarah Fluchs
So I think these are all the kinds of things.
[35:54] Sarah Fluchs
I mean an S BOM is great, but you also need the entire ecosystem around that for it to work and not just be a giant data dump.
[36:02] Viktor Petersson
Well, yeah, but it's.
[36:03] Viktor Petersson
I think there's one even equally important point here which is garbage in, garbage out, right?
[36:09] Viktor Petersson
Like the quality of your S bum ultimately determines how useful it is.
[36:12] Viktor Petersson
And I think that's.
[36:14] Viktor Petersson
A lot of people have gone through the motion to generate S bombs just to tick the regulatory requirements.
[36:20] Viktor Petersson
But I think, and actually I'm curious about your thoughts on that because unlike say NTIA minimum amount or CISA minimum element, now that's in draft, the cis, sorry, the CRA doesn't explicitly state what the SBOM should look like.
[36:38] Viktor Petersson
Right?
[36:39] Viktor Petersson
It doesn't MTA element and system, they go into very specific details.
[36:43] Viktor Petersson
It should capture this data.
[36:44] Viktor Petersson
It should capture this data.
[36:45] Viktor Petersson
But CRA is much more vague on what that needs to capture.
[36:50] Sarah Fluchs
Right.
[36:52] Sarah Fluchs
They are thinking about.
[36:54] Sarah Fluchs
So the European Commission is, are actually thinking about releasing some more guidance on what it should look like also because to achieve some kind of harmonization of how S BOMs look like across different products.
[37:10] Sarah Fluchs
There's currently actually a study carried out by NISA requesting industry to submit all manufacturers in general to submit what they are currently doing regarding S BOMs and what their preferred formats are, things like that, in order to make sure that the guidance that they are drafting kind of reflects the reality and not has like the most cutting edge best ideas for SBOM that nobody can follow in reality because that's really not what everybody is aiming at.
[37:39] Sarah Fluchs
Even the EU commission isn't aiming at that.
[37:41] Sarah Fluchs
Sometimes we need to stress that.
[37:45] Sarah Fluchs
I really think if manufacturers are worried about unrealistic ASPOM requirements, go to that study and participate and really have a, you don't have to shine there.
[37:55] Sarah Fluchs
Just say what works for you and what doesn't work for you.
[37:57] Sarah Fluchs
Because they're really trying to do that guidance in a way that actually reflects industry needs.
[38:03] Viktor Petersson
I mean I, I think the CISA and NTIA minimum elements are pretty good, right?
[38:08] Viktor Petersson
Because I think they are, I would say they are the gold standards as things stand right now.
[38:14] Viktor Petersson
Are they hard to meet?
[38:15] Viktor Petersson
Well, that exactly is what we tried to set out to test in the working group that we code led.
[38:19] Sarah Fluchs
Right.
[38:20] Viktor Petersson
And the answer is yes, it is rather challenging to do it.
[38:22] Viktor Petersson
It can be done, but it's a rather challenging to do it.
[38:25] Viktor Petersson
And again, coming back very much to what ecosystem are you in?
[38:28] Viktor Petersson
Like doing it for a web app is very straightforward, relatively straightforward.
[38:33] Viktor Petersson
Doing it for embedded C code, a lot more challenging.
[38:37] Viktor Petersson
Right?
[38:38] Sarah Fluchs
That's the problem because many of these things are always tested in like, okay, let's take just the most basic thing that we have and test it and then it works fine.
[38:45] Sarah Fluchs
And then all the other product manufacturers come and say, well, but our product isn't that simple so we don't have to stand our web app.
[38:52] Sarah Fluchs
How about us?
[38:54] Viktor Petersson
Yeah, I mean there are some, I mean what I've seen at least from the embedded world, there are some good things coming out of this.
[39:01] Viktor Petersson
Conan, the package manager for C is almost like a direct response to that.
[39:07] Viktor Petersson
I mean, I'm sure it predates the whole CRA debate, but it's a good slot in way of bringing something that at least you can work with as a package rather than just a file you copy and run, which is traditional speaking.
[39:19] Viktor Petersson
How, how a lot of embedded has been, right.
[39:21] Viktor Petersson
Like you include this library that you had on some file share that is not even versioned and how are you possibly going to do a CV scan about.
[39:30] Viktor Petersson
I guess you could do static code analysis but it's, it gets a lot more murky.
[39:35] Viktor Petersson
Right, but what have you seen on that side?
[39:40] Viktor Petersson
Like what, how when you advising companies, I'd imagine a lot of them do have large legacy code basis, right?
[39:47] Viktor Petersson
Much of it is I would imagine, given OT being C code, I would imagine, right?
[39:54] Viktor Petersson
How, how are they reacting to this?
[39:55] Viktor Petersson
Like are they like, oh, we gotta solve this or like are they trying to put their head in the sand and Just try to ignore the problem altogether.
[40:05] Sarah Fluchs
Well, they.
[40:06] Sarah Fluchs
At least what I can.
[40:08] Sarah Fluchs
What I see, there's always the prejudice that manufacturers are just sitting it out and not doing anything and things like that.
[40:16] Sarah Fluchs
At least that might be biased because people I work with obviously care about CRA and are aware of cra, but all the manufacturers I see are really trying to take that seriously and also often trying to use it as a vehicle to improve on product cybersecurity, often furthering projects they've been trying to promote for years and now they have a reason to do that.
[40:40] Sarah Fluchs
So I mean, an S. BOM isn't if done right, I mean, it's not just a compliance thing to do.
[40:46] Sarah Fluchs
It's something that you do and then tick off the box and then file aside.
[40:50] Sarah Fluchs
But it's also something that really helps you doing software quality, doing version management, doing dependency management, all these things.
[40:58] Sarah Fluchs
So developers usually have an intrinsic motivation to do something like that because they want to get their code in order.
[41:06] Sarah Fluchs
So they're trying to find ways to do that.
[41:10] Sarah Fluchs
Actually.
[41:11] Sarah Fluchs
Yeah, yeah, no, that's okay.
[41:15] Viktor Petersson
No, I was just gonna say to me, an SBOM is just a good litmus test of what, you know, do you.
[41:21] Viktor Petersson
Can you actually tell me what goes into your software?
[41:24] Viktor Petersson
It might not be fully complete.
[41:25] Viktor Petersson
And we all know that like the cause of completeness in SBOM is like you can't measure completeness because you.
[41:31] Viktor Petersson
That's an impossible thing to state that it's complete because how do you know?
[41:37] Viktor Petersson
But, but it's.
[41:37] Sarah Fluchs
And then CRA doesn't even say it needs to be complete.
[41:40] Sarah Fluchs
Just say do your top level dependencies at least.
[41:44] Viktor Petersson
So no transient dependencies are required at all.
[41:47] Sarah Fluchs
No, it explicitly says at least the top level dependencies.
[41:52] Viktor Petersson
Okay.
[41:52] Sarah Fluchs
I think also to make it more doable for companies who are going at it the first time.
[41:58] Viktor Petersson
Yeah, I mean, I think for me at least I.
[42:03] Viktor Petersson
It becomes a good.
[42:04] Viktor Petersson
Like once you start generating these and you can start utility, then you can start using SBoM for operational decisions.
[42:10] Viktor Petersson
Right.
[42:11] Viktor Petersson
You get to a good way of expressing your posture, like CV being one of them.
[42:16] Viktor Petersson
But also like other things like license audits.
[42:19] Viktor Petersson
That's something that people should care about.
[42:22] Viktor Petersson
Like, do I have some open source libraries that breaches my contractual obligation with my other things?
[42:28] Viktor Petersson
Right.
[42:29] Viktor Petersson
Those are things now you can start doing.
[42:31] Viktor Petersson
And that gets even more complicated.
[42:35] Sarah Fluchs
It's so often the case in cybersecurity that in order to do cybersecurity well, you do need to do all the quality things and documentation things that shouldn't be cybersecurity's job, but they are because nobody did it before.
[42:51] Sarah Fluchs
And I think that's the same with SBOMs.
[42:52] Sarah Fluchs
And I see a lot of parallels in the entire risk assessment discussion that we're having around cra because that's kind of the same like for an S pump.
[43:02] Sarah Fluchs
There are a lot of analogies there.
[43:03] Sarah Fluchs
You can do an SBOM just to check off the box and then you have the SBOM and never look at it again.
[43:09] Sarah Fluchs
Or you can use it to actually improve your decision making.
[43:12] Sarah Fluchs
And it's the same with the risk assessment.
[43:13] Sarah Fluchs
The CRA says you need to do a risk assessment.
[43:16] Sarah Fluchs
You can just do a risk assessment, find it away and never look at that thing again.
[43:19] Sarah Fluchs
There's probably going to be, not the best experience, or you can actually use it and see it as a tool and embrace it in order to do better and more informed decisions.
[43:31] Sarah Fluchs
And that's, I think if there's one bottom line, if I should differentiate between manufacturers who are doing CRA compliance well and those who struggle, then that's really that mindset saying, okay, there are these things in the compliance, but I don't look at them for compliance purpose, but I take them and try to use them for improving my security posture.
[43:52] Sarah Fluchs
And then the compliance just pops out in the end.
[43:55] Sarah Fluchs
Because I think that's what the great thing about CRA is.
[43:58] Sarah Fluchs
There wasn't any critical debate on the requirements in cra.
[44:03] Sarah Fluchs
It's like the wish list for every cybersecurity practitioner in the world.
[44:06] Sarah Fluchs
I mean, it's risk based.
[44:07] Sarah Fluchs
There's an SBoM requirement, there's all the cybersecurity basics, there's vulnerability handling, so none of that is debatable, like from a common sense point of view.
[44:16] Sarah Fluchs
So you can really take all that and use that to better your cybersecurity posture and do it well and achieve cyber CRA compliance on the way.
[44:25] Sarah Fluchs
That is entirely possible.
[44:27] Viktor Petersson
Yeah.
[44:27] Viktor Petersson
I mean, to me it's very clear the direction we're heading.
[44:31] Viktor Petersson
Right.
[44:31] Viktor Petersson
Like sboms will come at least if I were to hypothesize a core requirement in almost any compliance framework going forward.
[44:40] Viktor Petersson
Right.
[44:41] Viktor Petersson
Like CRA kind of leading the way.
[44:44] Viktor Petersson
A PCI DS has 4.0 starts asking for software inventory, which is just s bom codified.
[44:50] Viktor Petersson
Right.
[44:51] Viktor Petersson
And I mean, I would be surprised if SOC2, when the next update comes around, doesn't ask for S bomb.
[44:57] Viktor Petersson
Same with ISO.
[44:58] Viktor Petersson
Right.
[44:58] Viktor Petersson
I expect them to follow.
[45:00] Viktor Petersson
Right.
[45:01] Viktor Petersson
And that's, that becomes a universal litmus test in A way.
[45:05] Viktor Petersson
But I think there are some interesting.
[45:07] Sarah Fluchs
And also, I mean, if you have a software manufacturer who's not able to draw up an S bomb, then you should raise serious questions about how they actually code desktop software.
[45:16] Sarah Fluchs
Right.
[45:16] Sarah Fluchs
So that's.
[45:18] Sarah Fluchs
Yes, but it's kind of a software quality thing as well.
[45:21] Sarah Fluchs
I totally understand.
[45:22] Sarah Fluchs
I have sympathy for everybody who hasn't done it yet because it's, it just wasn't a requirement.
[45:27] Sarah Fluchs
It's kind of new.
[45:28] Sarah Fluchs
But every developer who strives to good quality code should get excited about that.
[45:33] Viktor Petersson
Oh yeah, no, I, I guess my only comment on that is that sometimes you depend on other vendors who do not.
[45:42] Sarah Fluchs
That's true.
[45:43] Viktor Petersson
And that's where it's tricky.
[45:44] Viktor Petersson
Like you might want to do the best.
[45:45] Sarah Fluchs
But then here's the great thing about cra.
[45:47] Sarah Fluchs
All your vendors fall under CRA as well.
[45:51] Sarah Fluchs
So they need to have an SBOM as well.
[45:54] Sarah Fluchs
And that's also one thing that I see currently in the industry.
[45:57] Sarah Fluchs
That's why I asked about sharing your opinion on sharing SBOMs, because people know that all manufacturers have to draw up the SBOM anyway.
[46:05] Sarah Fluchs
They start requesting it from their manufacturers in turn because they say, well, you're obligated, obliged to do that anyway, so why don't you share it with us?
[46:13] Sarah Fluchs
And there's always.
[46:14] Sarah Fluchs
I think CRA is also strengthened by the awareness of customers that certain things need to be done at the manufacturer.
[46:23] Sarah Fluchs
So they can as well ask for that to be shared.
[46:25] Sarah Fluchs
That holds true for the SBoM for risk assessment, for vulnerabilities, for all these kind of information that kind of people had to beg for and dig for in the past.
[46:38] Sarah Fluchs
And now it has to be there so it can as well be shared.
[46:41] Sarah Fluchs
And that's a real difference that I see.
[46:43] Viktor Petersson
Yeah.
[46:43] Viktor Petersson
And I think let's go back to the sharing because I think there is more to unpack there because I think there are.
[46:49] Viktor Petersson
Is how you share.
[46:50] Viktor Petersson
Right, Right.
[46:51] Viktor Petersson
I mean, you mentioned already like what.
[46:52] Viktor Petersson
How much should you share?
[46:53] Viktor Petersson
What's like.
[46:54] Viktor Petersson
Because that's an open debate.
[46:56] Viktor Petersson
Like is it in the public?
[46:57] Viktor Petersson
Is it gated?
[46:58] Viktor Petersson
There are many ways to do sharing.
[47:00] Viktor Petersson
Right.
[47:00] Viktor Petersson
But I think the one thing that I'm really excited about Run sharing is he's how we automate that scale.
[47:06] Viktor Petersson
Right.
[47:07] Viktor Petersson
So I'm, I'm working with probably called Transparency Exchange API under Cyclone dx where we try to like standardize the way you discover S pumps and security artifacts.
[47:18] Viktor Petersson
And I think that's an Interesting way of doing that because again, going back to, if you in turn depend on other companies that are part of your supply chain, you need to be able to discover their SBOMs in a programmatic way.
[47:33] Viktor Petersson
You can't just go and say, oh, we just cut the new release which requires a new version of this.
[47:37] Viktor Petersson
Email me your sbom.
[47:38] Viktor Petersson
Like, it doesn't work.
[47:39] Viktor Petersson
It needs to be an automated process that's fully like, oh, I'm requiring this version of your product.
[47:46] Viktor Petersson
Now give me the SBOM for that version of that product.
[47:50] Viktor Petersson
Right.
[47:50] Viktor Petersson
And that's.
[47:51] Sarah Fluchs
Right.
[47:52] Sarah Fluchs
And that's also one of the really smart things that the CRA does, I think because they say, okay, a manufacturer is responsible for this entire product, including all components.
[48:03] Sarah Fluchs
So you're responsible for security of your products, including all the components.
[48:07] Sarah Fluchs
So you need, you better make sure that the components that you have also meet certain cybersecurity standards so that like trickles down the entire supply chain.
[48:15] Sarah Fluchs
And that also holds true for open source components.
[48:19] Sarah Fluchs
Yes, and I think that's, I mean, that's a tricky discussion because I think that's really at a crossroad here.
[48:25] Sarah Fluchs
So either it really strengthens the open source community because manufacturers are forced to contribute more, or it weakens the open source community because manufacturers say I can't take responsibility for that thing because it's open source.
[48:39] Sarah Fluchs
So I'm really curious looking what that is going to look like in the, in the future.
[48:45] Viktor Petersson
That's a big kind of worm.
[48:46] Viktor Petersson
That is probably words, its own episode, I think.
[48:49] Viktor Petersson
Because I think that is.
[48:51] Viktor Petersson
There's a lot to talk about there, right?
[48:53] Sarah Fluchs
Because absolutely, yes.
[48:55] Viktor Petersson
It's completely unrealistic to expect that a one guy or girl library to have the same like SLA for fixing things as a multinational.
[49:08] Sarah Fluchs
But it's not required.
[49:09] Sarah Fluchs
Right.
[49:10] Sarah Fluchs
The thing is, I think what the CRA does right, is I don't want to come across as a CRA fangirl.
[49:15] Sarah Fluchs
I'm just trying to take an optimistic view and to help people see the chances in that what the CRA does right.
[49:25] Sarah Fluchs
I think is that it, or the advantage or the big chance for the open source community is that it really brings that responsibility and accountability question into the open.
[49:37] Sarah Fluchs
Because currently what manufacturers often did is they just use the open source components because they were free, but they didn't really contribute anything.
[49:45] Sarah Fluchs
They didn't really take responsibility for the components we're using because everybody is using it so we can use it like everybody else.
[49:51] Sarah Fluchs
And now The CRA just makes it very explicit who has responsibility.
[49:56] Sarah Fluchs
And with that manufacturers also need to decide how they live up to this responsibility.
[50:03] Sarah Fluchs
Do they commit to the open source project that they're using?
[50:06] Sarah Fluchs
Do they support it if they can't commit, that's also a way to do it.
[50:11] Sarah Fluchs
Do they support the ecosystem around that?
[50:14] Sarah Fluchs
Or do they say, okay, that's all much more expensive than building it ourselves?
[50:18] Sarah Fluchs
Well then fine, then obviously there wasn't a business case for the open source project.
[50:22] Sarah Fluchs
I mean that's fine because it just brings all this, that was implicit.
[50:26] Sarah Fluchs
It, it brings all of these conversations out in the open.
[50:29] Viktor Petersson
Yeah, no, I, I, I mean I am generally speaking optimistic about cra.
[50:36] Viktor Petersson
I think, I'm not one for heavy regulation in general, but I think it's painstakingly clear the fact that security in the, has been a market failure.
[50:48] Viktor Petersson
Right.
[50:49] Viktor Petersson
If there, if nothing has changed, if nothing will change, we will still having the Same debate in 10 years about IoT device with default passwords getting compromised or like nothing will change unless the regulatory pressure to change.
[51:03] Viktor Petersson
Right.
[51:03] Viktor Petersson
So like I'm not, like, I'm not favor of doing heavy handed regulation, but I'm also painstakingly, I think it's basically obvious that something gotta change for us to actually make it make a difference.
[51:16] Sarah Fluchs
Me neither.
[51:17] Sarah Fluchs
And I think I, in an ideal world we didn't need any of those.
[51:22] Sarah Fluchs
So in the deal we didn't need any law at all because people wouldn't murder each other.
[51:27] Sarah Fluchs
Right, Right.
[51:28] Sarah Fluchs
But the problem is right now it's unfair because right now we have security regulation for critical infrastructures, for example.
[51:37] Sarah Fluchs
And they have this problem because they say there's also a lot of industrial sector and they have this problem because they say okay, well we are supposed to take responsibility for the security of our critical infrastructure and then we buy all these components that are complete black box and we don't have any rights to claim anything from the vendors and it's so hard to make them share information about cyber security and to live up to minimum standards and things like that.
[52:05] Sarah Fluchs
So I think it's a bit of putting a bit tilted version of regulation more upright because now manufacturers also have to do their part.
[52:17] Viktor Petersson
Yeah, and I mean it definitely, I mean I, I've dealt with a fair bit of manufacturers in China and so forth and obviously in particular when you're buying software and hardware from there, the security attitude is very different as well.
[52:36] Viktor Petersson
And, and I think that has put generally speaking a disadvantage for western tech companies.
[52:42] Viktor Petersson
In general particular, if you look at like, I mean, baby camera is a good example of something like that.
[52:48] Viktor Petersson
Like where it's usually like the cheapest one is the one who sells the most because people don't really, the average buyer can't tell the difference.
[52:55] Viktor Petersson
Right.
[52:56] Sarah Fluchs
And security is so hard to communicate and so hard to grasp.
[52:59] Sarah Fluchs
Right?
[52:59] Viktor Petersson
Yes, exactly.
[53:01] Viktor Petersson
Like they're like, yes, I can see my baby on my phone, problem solved.
[53:06] Viktor Petersson
Can the rest of the world also do that?
[53:07] Viktor Petersson
Yes.
[53:08] Viktor Petersson
And that's the difference.
[53:09] Sarah Fluchs
Yeah.
[53:10] Sarah Fluchs
And then there are also a lot of people who say, no, I don't use that baby cam on the phone at all because it sure is unsecure.
[53:16] Sarah Fluchs
And that's also not great.
[53:17] Sarah Fluchs
So.
[53:17] Sarah Fluchs
Right.
[53:17] Sarah Fluchs
So finding like a middle ground where we say, okay, we make it transparent what kind of security should be there.
[53:25] Sarah Fluchs
So that is something that people that, who care can request and can take a look at.
[53:30] Sarah Fluchs
And also some others that don't, don't give a, don't give a shit about security are just pushed out of the market.
[53:37] Sarah Fluchs
I don't think that's a bad thing, to be honest.
[53:39] Sarah Fluchs
So I always had a lot of conversations with manufacturers saying, oh, now we're putting European manufacturers at a disadvantage.
[53:45] Sarah Fluchs
But that's not true, actually.
[53:47] Sarah Fluchs
COA puts them at an advantage because at least if they're holding up to higher security standards, because CRA doesn't just apply to European manufacturers, but to all manufacturers who sell to Europe.
[53:58] Viktor Petersson
I mean, I, it all comes down to at the end of the day because I've had this conversation with a lot of people over the last few years and really comes down to once this takes is ratified in the car.
[54:10] Viktor Petersson
I mean, Germany was starting one, the first one to actually put their drafts together.
[54:13] Viktor Petersson
Right.
[54:14] Viktor Petersson
For, for how actually the law is going to look like was not that surprising.
[54:19] Viktor Petersson
Now, now once we enter the actual time window for like where to enforce and it's then going to come down to will this actually be enforced?
[54:29] Viktor Petersson
Right.
[54:29] Viktor Petersson
Because if it will not be enforced and there will not be any examples made out of this, then no vendor is going to actually carry them.
[54:39] Viktor Petersson
Right.
[54:39] Viktor Petersson
And that's going to be the tricky part at the end, like will they care?
[54:43] Sarah Fluchs
The good thing is that it's not just upon market surveillance authorities to enforce it, because I am always, many manufacturers are currently asking me, okay, when are like early market surveillance authorities knocking on our door and trying to probe products?
[55:01] Sarah Fluchs
And of course that can happen, but that's not the most likely case.
[55:04] Sarah Fluchs
What they should be afraid of because I think the much more likely cases that security researchers that's already been there or also competitors of these manufacturers take the product support and file non conformity claims at the market surveillance authorities and then they need to go after that.
[55:23] Sarah Fluchs
So it's really all the things that security researchers have done for ages anyway.
[55:27] Sarah Fluchs
They now have something to like a tool to say okay, if they really find something that puts the product at non conformity with the cra, there's actually a tool for market authorities that force market authorities to go after that.
[55:45] Sarah Fluchs
And this is like the hardest penalty you can give to any manufacturers that they can't sell their product anymore.
[55:54] Sarah Fluchs
I've also heard people saying, hey, but the fines are not high enough.
[55:57] Sarah Fluchs
But it's not about the fines, it's about not being able to place a product on the market.
[56:01] Sarah Fluchs
That's the highest fine you can get.
[56:03] Viktor Petersson
Yeah, I guess my worry I guess is some extent which is voiced by it.
[56:08] Viktor Petersson
It's like is this going to get stuck in court for five years before we see the first actual verdict and then nothing is going to happen in those, in the, in between.
[56:18] Viktor Petersson
I guess like, I guess there are lost com, there's a lot of pr, right?
[56:23] Sarah Fluchs
Could happen, yes, but then at least you got to start somewhere.
[56:27] Sarah Fluchs
So you better start these five years of doing nothing now.
[56:32] Viktor Petersson
That's fair enough.
[56:33] Viktor Petersson
The last thing I wanted to kind of like wrap up here about is talking about like communicating vulnerabilities because that's a big part of the CRA is like how do you communicate vulnerabilities?
[56:43] Viktor Petersson
And, and there are, I mean anybody who works cyber security, often it's like the CVE process and how that works as flawed or it may or may not be.
[56:51] Viktor Petersson
That's, that's a different debate altogether.
[56:54] Viktor Petersson
But communicating that both to consumers and, and the EU side of that, like how, walk me through the, the requirements for the CVE side of ec.
[57:09] Viktor Petersson
Like how does that look like?
[57:11] Viktor Petersson
And, and what does it look like for a manufacturer who's bringing something to the market?
[57:15] Viktor Petersson
Like what does that look like?
[57:16] Viktor Petersson
Because the CV for us is very different.
[57:18] Viktor Petersson
Can be fit in I suppose.
[57:19] Viktor Petersson
But most vendors are not familiar with the CV management side of things.
[57:25] Sarah Fluchs
So what does the vulnerability communication look like?
[57:28] Sarah Fluchs
Is that your question or.
[57:30] Viktor Petersson
No, my question is more like if you're a manager manufacturer selling it to the market and if you're a small manufacturer you have probably never have to dealt with cvs.
[57:39] Viktor Petersson
Right.
[57:39] Viktor Petersson
Or you probably dealt with them in your supply chain.
[57:41] Viktor Petersson
But you've never been had series issued against you.
[57:44] Viktor Petersson
So you are not familiar with the process around that when you're entering the market.
[57:49] Sarah Fluchs
Disclosure and all these kind of things.
[57:51] Viktor Petersson
Exactly, yes.
[57:54] Sarah Fluchs
So I mean what they have to do is there's always, I think there's one basic distinction that people need to be aware of.
[58:03] Sarah Fluchs
It's worded not that great in the cra.
[58:05] Sarah Fluchs
I think there are exploitable vulnerabilities.
[58:10] Sarah Fluchs
These are the things that must not be in your product.
[58:12] Sarah Fluchs
And if exploitable vulnerability is in your product and you must stop selling it, then there are the actively exploited vulnerabilities.
[58:21] Sarah Fluchs
This really is more like a security incident.
[58:24] Sarah Fluchs
So it's really something has happened to your product or somebody has actually exploited something.
[58:30] Sarah Fluchs
So it's not just a vulnerability, it's more like really a insecurity incident.
[58:35] Sarah Fluchs
And for the latter, manufacturers have to report them actually to authorities, to ANISA and to the national CSERTs or National Certs.
[58:48] Sarah Fluchs
And for the former they have to, well, they have to scan for all vulnerabilities and first they have to find out which of those are exploitable.
[58:55] Sarah Fluchs
Which is kind of a term that manufacturers can somehow shape themselves.
[59:01] Sarah Fluchs
So they must decide what is exploitable.
[59:03] Sarah Fluchs
Exploitable for their products, on the circumstances and for those.
[59:09] Sarah Fluchs
Well, that's basically the normal responsible disclosure and also the normal vulnerability handling process that people know that people use.
[59:20] Sarah Fluchs
I don't think there's big changes in there.
[59:22] Sarah Fluchs
So you need to have a fix or a patch, you need to communicate to your customers, you actually have security advisories, all these kind of things.
[59:31] Sarah Fluchs
And you also have to have kind of a contact point where people can approach you about vulnerabilities.
[59:36] Sarah Fluchs
That's the responsible disclosure.
[59:38] Sarah Fluchs
And I think if manufacturers haven't had any vulnerability management process before, then probably the hardest part is really establishing a process to efficiently work down your way of big pile of vulnerabilities that's going to come up if you start doing that.
[01:00:03] Sarah Fluchs
So that probably is the most difficult thing to do in the beginning as.
[01:00:07] Viktor Petersson
Some of us run vulnerability programs.
[01:00:10] Viktor Petersson
I think a lot of people underestimate the workload that comes from managing a vulnerability program with responsible disclosures in particular.
[01:00:19] Viktor Petersson
Now, now in the day of AI, I mean, I can see in one of my coworkers with Screenly, we get so many vulnerability disclosures every day.
[01:00:27] Viktor Petersson
Right.
[01:00:28] Sarah Fluchs
Okay, you need to deal with all of those like, yeah, the problem.
[01:00:32] Viktor Petersson
Is the signal to noise ratio, right.
[01:00:34] Viktor Petersson
Because yes, you might get 100 reports and 99 of them are just AI filings essentially.
[01:00:42] Viktor Petersson
But there might be a super severe one.
[01:00:47] Sarah Fluchs
That's exactly what I mean.
[01:00:48] Sarah Fluchs
So like an efficient mechanism for getting this big pile of information down to what actually matters.
[01:00:54] Sarah Fluchs
So I think that's the biggest challenge in there because I mean the formal reporting, well fine, there's a reporting for reporting portal going to be and you need to find a report there.
[01:01:04] Sarah Fluchs
That's fine.
[01:01:05] Sarah Fluchs
So that's all things that are doable about really managing this influx of information.
[01:01:11] Sarah Fluchs
That's the hardest part.
[01:01:12] Viktor Petersson
I think the triaging is the hard part.
[01:01:15] Viktor Petersson
Finding signals and noise.
[01:01:16] Sarah Fluchs
That's.
[01:01:16] Viktor Petersson
I think that's the hard part.
[01:01:17] Sarah Fluchs
Finding a way to actually, I think an efficient way to define for yourself what an exploitable vulnerability is.
[01:01:24] Sarah Fluchs
So that, and making that decision to what needs to be patched and what doesn't and then communicating that well, yes.
[01:01:33] Sarah Fluchs
I'm hoping that we're getting good industry standards so that people say okay, like this is how you actually, how actually customers want to see vulnerability information and advisories so that we get somehow a standard.
[01:01:47] Sarah Fluchs
I've seen many people or I think CISA also does it using mitre, ATT and CK for example, saying okay, this refers to these mitre, ATT and CK techniques and this is what we recommend you to do.
[01:01:57] Sarah Fluchs
So any kind of structure that is reproducible, I think that would really help.
[01:02:01] Viktor Petersson
Yeah, I think that there is a push right now for kind of a more global, non US centric view of CV publishing.
[01:02:10] Viktor Petersson
Right.
[01:02:10] Viktor Petersson
Because that's been kind of in particular with.
[01:02:13] Viktor Petersson
Well, I don't know where we stand right now which is vulnerability databases and where, but yeah, like, nonetheless, like having a global one that is non US centric is probably a healthy balance I guess as well.
[01:02:28] Sarah Fluchs
The European Union has also, NISA has also published its own.
[01:02:32] Sarah Fluchs
Yeah, euvd.
[01:02:34] Sarah Fluchs
So yes, it's not really a known database but it's an own display of the information.
[01:02:42] Sarah Fluchs
They're not collecting their own information.
[01:02:44] Sarah Fluchs
But that again that is not the most important part.
[01:02:48] Sarah Fluchs
Similar to managing vulnerabilities, it's not hard to write a software to put them in a beautiful table.
[01:02:56] Sarah Fluchs
It's hard to find a way to actually manage that and find a process to manage that at the same time.
[01:03:01] Sarah Fluchs
I think that's what's behind the CVE database.
[01:03:05] Sarah Fluchs
That really is all the work is collecting all these vulnerabilities and writing the advisories and filling the database meaningfully.
[01:03:14] Sarah Fluchs
And I think that is still unanswered.
[01:03:15] Sarah Fluchs
Who's going to do that?
[01:03:17] Viktor Petersson
And I can tell you firsthand working with like both projects like OSV from Google and Dependency track from Cyclone dx.
[01:03:26] Viktor Petersson
The problem is you will have false positives, right because they are not super clean data sets and you will have duplicate names.
[01:03:34] Viktor Petersson
Like I can give you example, we had a high alert firing like the other week saying like super high vulnerability.
[01:03:40] Viktor Petersson
Then you're like on this package and you're like well we're using this package but it's a completely different ecosystem.
[01:03:46] Viktor Petersson
It just happens to have the same name.
[01:03:47] Viktor Petersson
It's just like this for a bit was like a Java package and we had like a Python package but like they had the same name.
[01:03:53] Sarah Fluchs
Isn't that something that AI could somehow solve?
[01:03:55] Sarah Fluchs
I mean finding duplicates or something like that.
[01:03:58] Viktor Petersson
You would think maybe we'll get there one day but I mean at least people started using them more and more right.
[01:04:03] Viktor Petersson
And that's going to help building up these tools and make them better and making the data sets better and more useful.
[01:04:11] Viktor Petersson
So no, this hopefully will a better place in a year from now and when things are starting to shape up.
[01:04:18] Viktor Petersson
So Sarah, we're coming up at the top of the hour here.
[01:04:22] Viktor Petersson
What would you like to say to people that are getting into this?
[01:04:25] Viktor Petersson
Like last final words for people who are looking into getting the CRA cards sorted?
[01:04:31] Viktor Petersson
Any final words of where they need to.
[01:04:34] Viktor Petersson
Yeah, get in touch with you or what, what's your advice?
[01:04:40] Sarah Fluchs
Well what I always advise them to take is one of the first steps is to find their showstoppers in their products because product life cycles, development life cycles take a long time and it really makes sense to right in the beginning really run your products high level through this CRA requirements.
[01:05:01] Sarah Fluchs
Don't wait for any harmonized standard.
[01:05:03] Sarah Fluchs
Take the CRA requirements and see where you might have major showstoppers and work on those because these are the things that are going to take time.
[01:05:11] Sarah Fluchs
And then second start doing the risk assessment because that really is the linchpin and CRA that you need to make all decisions and if you start with those two things quickly plus the vulnerability handling then the rest will fall into place I think.
[01:05:26] Viktor Petersson
Wise words.
[01:05:27] Viktor Petersson
Thank you so much Sarah.
[01:05:28] Viktor Petersson
Thank you for coming on the show.
[01:05:29] Viktor Petersson
Have a good one.
[01:05:30] Sarah Fluchs
Cheers.
[01:05:31] Sarah Fluchs
Thank you for having me.
[01:05:32] Sarah Fluchs
It was lot fun.

Found an error or typo? File PR against this file or the transcript.