{"id":9087,"date":"2024-04-22T09:50:26","date_gmt":"2024-04-22T07:50:26","guid":{"rendered":"https:\/\/www.arcadsoftware.com\/dot\/?p=9087"},"modified":"2025-02-26T16:11:50","modified_gmt":"2025-02-26T15:11:50","slug":"cyber-resilience-act-cra","status":"publish","type":"post","link":"https:\/\/www.arcadsoftware.com\/dot\/resources\/cyber-resilience-act-cra\/","title":{"rendered":"Cyber Resilience Act (CRA)"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:20px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\" style=\"border-radius:8px;\"><img decoding=\"async\" width=\"940\" height=\"350\" alt=\"Blog Article DOT Cyber Resilience Act CRA\" title=\"dot-blog-cyber-resilience-act\" src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/04\/dot-blog-cyber-resilience-act.jpg\" data-orig-src=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/04\/dot-blog-cyber-resilience-act.jpg\" class=\"lazyload img-responsive wp-image-9082\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27940%27%20height%3D%27350%27%20viewBox%3D%270%200%20940%20350%27%3E%3Crect%20width%3D%27940%27%20height%3D%27350%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/04\/dot-blog-cyber-resilience-act-200x74.jpg 200w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/04\/dot-blog-cyber-resilience-act-400x149.jpg 400w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/04\/dot-blog-cyber-resilience-act-600x223.jpg 600w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/04\/dot-blog-cyber-resilience-act-800x298.jpg 800w, https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/04\/dot-blog-cyber-resilience-act.jpg 940w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 640px) 100vw, 800px\" \/><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:30px;--awb-padding-right:20px;--awb-padding-left:20px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p>The Cyber Resilience Act (CRA) aims to strengthen the protection of consumers and businesses who buy or use products or software incorporating digital components. Adopted in early 2024, this European regulation imposes mandatory cybersecurity requirements to protect consumers and businesses against increasing cyberattacks.<\/p>\n<p>This text explores the main obligations of the CRA, the fines that may apply in the event of non-compliance, and its impact on the open-source community.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-padding-top:25px;--awb-padding-right:25px;--awb-padding-bottom:25px;--awb-padding-left:25px;--awb-bg-color:rgba(0,100,254,0.09);--awb-bg-color-hover:rgba(0,100,254,0.09);--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:40px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-2\" style=\"--awb-content-alignment:left;--awb-font-size:18px;\"><p style=\"text-align: center;\"><b>Summary<\/b><\/p>\n<ol>\n<li><a href=\"#what-is-the-cyber-resilience-act\">What is the Cyber Resilience Act (CRA)?<\/a><\/li>\n<li><a href=\"#who-is-affected-by-this-european-regulation\"> Who is affected by this European regulation?<\/a><\/li>\n<li><a href=\"#what-are-the-objectives-of-the-cyber-resilience-act\">What are the objectives of the Cyber Resilience Act?<\/a><\/li>\n<li><a href=\"#what-are-the-fines-for-non-compliance-with-the-cra\">What are the fines for non-compliance with the CRA?<\/a><\/li>\n<li><a href=\"#what-about-concern-in-the-open-source-world\">What about concern in the open-source world?<\/a><\/li>\n<li><a href=\"#how-can-dot-anonymizer-an-anonymization-solution-hep-comply-with-the-cyber-resilience-act\">How can DOT Anonymizer, an anonymization solution, help comply with the Cyber Resilience Act (CRA)?<\/a><\/li>\n<li><a href=\"#conclusion\">Conclusion<\/a><\/li>\n<\/ol>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-menu-anchor\" id=\"what-is-the-cyber-resilience-act\"><\/div><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:54;line-height:1.14;\">1. What is the Cyber Resilience Act (CRA)?<\/h2><\/div><div class=\"fusion-text fusion-text-3\" style=\"--awb-content-alignment:left;\"><p><b>The Cyber Resilience Act (CRA) is a proposed European Union law intended to enhance the security of digital products such as computer hardware and software.<\/b> This proposed regulation was adopted in early 2024 by the European Commission. <b>The CRA imposes mandatory cybersecurity requirements on manufacturers and retailers to protect consumers and businesses against cyberattacks.<\/b> Indeed, hardware and software products are increasingly subject to cyber-attacks. According to the European Commission, the annual cost of these attacks has been estimated at almost 5.5 trillion euros by 2020.<\/p>\n<p>Manufacturers will have <b>3 years to adapt to the new standards<\/b> after the law comes into force, and they will have to <b>report incidents and vulnerabilities no later than 21 months<\/b> after the law is passed. The CRA aims to promote the safe use of digital products by encouraging a proactive approach to security throughout their lifecycle.<\/p>\n<\/div><div class=\"fusion-menu-anchor\" id=\"who-is-affected-by-this-european-regulation\"><\/div><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:54;line-height:1.14;\">2. Who is affected by this European regulation?<\/h2><\/div><div class=\"fusion-text fusion-text-4\" style=\"--awb-content-alignment:left;\"><p><b>The Cyber Resilience Act (CRA) has been established to reinforce the security of digital products sold on the European single market.<\/b> Unlike the <a href=\"\/dot\/resources\/blog-en\/the-nis-2-directive\/\" target=\"_blank\" rel=\"noopener noreferrer\"><b>NIS2 directive<\/b><\/a>, which concerns a wide range of entities such as cloud providers and healthcare hosts, <b>the CRA specifically targets digital products.<\/b> This includes any hardware or software product with digital elements, such as computers, phones, household appliances, cars, connected toys, as well as systems such as VPNs, antivirus and password managers.<\/p>\n<p><b>The CRA defines three classes of digital products to regulate their cybersecurity. <\/b>The default category, covering 90% of digital solutions, requires only self-assessment. The other two categories, comprising 10% of solutions, require higher levels of assessment, ranging from the application of security standards to evaluations carried out by external third parties. This classification is based on the specific functionality and intended use of the product.<\/p>\n<\/div><div class=\"fusion-menu-anchor\" id=\"what-are-the-objectives-of-the-cyber-resilience-act\"><\/div><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:54;line-height:1.14;\">3. What are the objectives of the Cyber Resilience Act?<\/h2><\/div><div class=\"fusion-text fusion-text-5\" style=\"--awb-content-alignment:left;\"><p>Manufacturers of the products listed above will be required to comply <b>with harmonized cybersecurity rules throughout the product lifecycle, including planning, design, development and maintenance obligations to ensure cybersecurity. <\/b>The CRA aims to:<\/p>\n<ul>\n<li>Reduce product vulnerabilities<\/li>\n<li>Guarantee regular security updates<\/li>\n<li>Improve transparency on product security<\/li>\n<li>Introduce CE marking to indicate compliance with cybersecurity standards.<\/li>\n<\/ul>\n<p><b>In addition, the Cyber Resilience Act establishes a universal cybersecurity basis for all digital products sold in the EU<\/b>, with product categorization and differentiated security assessments based on their level of risk. It clearly assigns responsibility for security to manufacturers and ensures that consumers receive timely security updates after purchase.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_2_3 2_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-padding-top:40px;--awb-padding-right:40px;--awb-padding-bottom:25px;--awb-padding-left:40px;--awb-bg-color:rgba(232,232,232,0.38);--awb-bg-color-hover:rgba(232,232,232,0.38);--awb-bg-size:cover;--awb-border-color:rgb(234, 80, 80);--awb-border-left:7px;--awb-border-style:solid;--awb-width-large:66.666666666667%;--awb-margin-top-large:45px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:45px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-text fusion-text-6\"><p><strong>Guide \u2013 Data Anonymization Keys to a Successful Cross-functional Project<\/strong><\/p>\n<\/div><div style=\"text-align:right;\"><a class=\"fusion-button button-flat button-xlarge button-custom fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" style=\"--button_accent_color:#ea5050;--button_border_color:#ffffff;--button_accent_hover_color:#356897;--button_border_hover_color:#356897;--button_gradient_top_color:rgba(255,255,255,0);--button_gradient_bottom_color:rgba(255,255,255,0);--button_gradient_top_color_hover:rgba(255,255,255,0);--button_gradient_bottom_color_hover:rgba(255,255,255,0);\" target=\"_self\" href=\"\/dot\/resources\/guides-resources\/data-anonymization-keys-to-successful-cross-functional-project\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Download the guide<\/span><i class=\"fa-arrow-right fas awb-button__icon awb-button__icon--default button-icon-right\" aria-hidden=\"true\"><\/i><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_2_3 2_3 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-menu-anchor\" id=\"what-are-the-fines-for-non-compliance-with-the-cra\"><\/div><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:54;line-height:1.14;\">4. What are the fines for non-compliance with the CRA?<\/h2><\/div><div class=\"fusion-text fusion-text-7\" style=\"--awb-content-alignment:left;\"><p>Not complying with the Cyber Resilience Act (CRA) carries considerable fines for companies operating in the European Union.<b> Penalties of up to \u20ac15 million or 2.5% of worldwide sales can be imposed.<\/b><\/p>\n<p>To ensure compliance with the CRA,<b> each Member State will appoint market surveillance authorities responsible for enforcing the law<\/b>. In the event of non-compliance, these authorities have the power to require corrections, restrict the availability of non-compliant products or withdraw them from the market.<\/p>\n<\/div><div class=\"fusion-menu-anchor\" id=\"what-about-concern-in-the-open-source-world\"><\/div><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:54;line-height:1.14;\">5. What about concern in the open-source world?<\/h2><\/div><div class=\"fusion-text fusion-text-8\" style=\"--awb-content-alignment:left;\"><p><b>The Cyber Resilience Act (CRA) raised concerns in the open-source community about its impact on the development of open-source software. <\/b>In the end, the final version of the CRA clearly distinguishes between the development and supply phases of software products based on open code, thus preventing open-source players from being held responsible for any security problems for software products using open code components. Although concerns remain, efforts have been made to integrate the concerns of the open-source community into the CRA and clarify its impact on open-source software development.<\/p>\n<\/div><div class=\"fusion-menu-anchor\" id=\"how-can-dot-anonymizer-an-anonymization-solution-hep-comply-with-the-cyber-resilience-act\"><\/div><div class=\"fusion-title title fusion-title-6 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:54;line-height:1.14;\">6. How can DOT Anonymizer, an anonymization solution, help comply with the Cyber Resilience Act (CRA)?<\/h2><\/div><div class=\"fusion-text fusion-text-9\" style=\"--awb-content-alignment:left;\"><p><b><a href=\"\/dot\/data-masking\/dot-anonymizer\/\" target=\"_blank\" rel=\"noopener noreferrer\">DOT Anonymizer<\/a><\/b> offers a solution to help comply with the CRA, which requires digital products to guarantee the confidentiality and security of user data. <b>It anonymizes personally identifying data, reducing vulnerabilities and helping manufacturers meet security requirements.<\/b> Its integration into digital products can help boost customer confidence and ensure better cybersecurity throughout the European Union.<\/p>\n<\/div><div class=\"fusion-menu-anchor\" id=\"conclusion\"><\/div><div class=\"fusion-title title fusion-title-7 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:12px;--awb-margin-right-small:0px;--awb-margin-bottom-small:24px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:54;line-height:1.14;\">7. Conclusion<\/h2><\/div><div class=\"fusion-text fusion-text-10\" style=\"--awb-content-alignment:left;\"><p>The European Union's Cyber Resilience Act (CRA) represents a major step forward in protecting consumers and businesses against cyber threats.<\/p>\n<p>By imposing strict cybersecurity standards on manufacturers and retailers of digital products, the CRA aims to reduce vulnerabilities, ensure regular security updates, and improve transparency on product security. The fines incurred for non-compliance underline the crucial importance attached to digital security in the European Union. Concerns about the impact on the development of open-source software have been addressed, with efforts to clarify the implications of the CRA.<\/p>\n<p>Overall, the Cyber Resilience Act plays an essential role in creating a more secure and resilient digital environment in Europe.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_2_3 2_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-padding-top:40px;--awb-padding-right:40px;--awb-padding-bottom:25px;--awb-padding-left:40px;--awb-bg-color:rgba(232,232,232,0.38);--awb-bg-color-hover:rgba(232,232,232,0.38);--awb-bg-size:cover;--awb-border-color:rgb(234, 80, 80);--awb-border-left:7px;--awb-border-style:solid;--awb-width-large:66.666666666667%;--awb-margin-top-large:45px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:45px;--awb-spacing-left-large:2.88%;--awb-width-medium:66.666666666667%;--awb-order-medium:0;--awb-spacing-right-medium:2.88%;--awb-spacing-left-medium:2.88%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-column\"><div class=\"fusion-text fusion-text-11\"><p><strong>[Webinar] Protection of personal data: How and when should you anonymize?<\/strong><\/p>\n<\/div><div style=\"text-align:right;\"><a class=\"fusion-button button-flat button-xlarge button-custom fusion-button-default button-2 fusion-button-default-span fusion-button-default-type\" style=\"--button_accent_color:#ea5050;--button_border_color:#ffffff;--button_accent_hover_color:#356897;--button_border_hover_color:#356897;--button_gradient_top_color:rgba(255,255,255,0);--button_gradient_bottom_color:rgba(255,255,255,0);--button_gradient_top_color_hover:rgba(255,255,255,0);--button_gradient_bottom_color_hover:rgba(255,255,255,0);\" target=\"_self\" href=\"\/dot\/resources\/webinars-resources\/protection-of-personal-data-how-and-when-should-you-anonymize\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Watch the Webinar <\/span><i class=\"fa-arrow-right fas awb-button__icon awb-button__icon--default button-icon-right\" aria-hidden=\"true\"><\/i><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1248px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_3_5 3_5 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:60%;--awb-margin-top-large:20px;--awb-spacing-right-large:3.2%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.2%;--awb-width-medium:60%;--awb-order-medium:0;--awb-spacing-right-medium:3.2%;--awb-spacing-left-medium:3.2%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-video fusion-youtube\" style=\"--awb-max-width:560px;--awb-max-height:315px;--awb-align-self:center;--awb-width:100%;\"><div class=\"video-shortcode\"><lite-youtube videoid=\"pPZtMdArCQA\" class=\"landscape\" params=\"wmode=transparent&autoplay=1rel=0&amp;enablejsapi=1\" title=\"YouTube video player 1\" data-button-label=\"Play Video\" width=\"560\" height=\"315\" data-thumbnail-size=\"auto\" data-no-cookie=\"on\"><\/lite-youtube><\/div><\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Cyber Resilience Act (CRA) is intended to reinforce the security of digital products by imposing cybersecurity standards, obligations on manufacturers and fines for non-compliance.<\/p>\n","protected":false},"author":5,"featured_media":9082,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[113,111],"tags":[],"class_list":["post-9087","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en","category-resources"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Resilience Act (CRA) | Blog<\/title>\n<meta name=\"description\" content=\"The objective of the Cyber Resilience Act (CRA) is to reinforce the security of digital products by imposing cybersecurity standards.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/cyber-resilience-act-cra\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Resilience Act (CRA) | Blog\" \/>\n<meta property=\"og:description\" content=\"The objective of the Cyber Resilience Act (CRA) is to reinforce the security of digital products by imposing cybersecurity standards.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.arcadsoftware.com\/dot\/resources\/cyber-resilience-act-cra\/\" \/>\n<meta property=\"og:site_name\" content=\"DOT - Data Oriented Testing\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-22T07:50:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-26T15:11:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/04\/dot-blog-cyber-resilience-act.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"940\" \/>\n\t<meta property=\"og:image:height\" content=\"350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Myriam Goutte\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Myriam Goutte\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/cyber-resilience-act-cra\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/cyber-resilience-act-cra\/\"},\"author\":{\"name\":\"Myriam Goutte\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2\"},\"headline\":\"Cyber Resilience Act (CRA)\",\"datePublished\":\"2024-04-22T07:50:26+00:00\",\"dateModified\":\"2025-02-26T15:11:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/cyber-resilience-act-cra\/\"},\"wordCount\":4204,\"image\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/cyber-resilience-act-cra\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/04\/dot-blog-cyber-resilience-act.jpg\",\"articleSection\":[\"Blog\",\"Resources\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/cyber-resilience-act-cra\/\",\"url\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/cyber-resilience-act-cra\/\",\"name\":\"Cyber Resilience Act (CRA) | Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/cyber-resilience-act-cra\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/cyber-resilience-act-cra\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/04\/dot-blog-cyber-resilience-act.jpg\",\"datePublished\":\"2024-04-22T07:50:26+00:00\",\"dateModified\":\"2025-02-26T15:11:50+00:00\",\"author\":{\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2\"},\"description\":\"The objective of the Cyber Resilience Act (CRA) is to reinforce the security of digital products by imposing cybersecurity standards.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.arcadsoftware.com\/dot\/resources\/cyber-resilience-act-cra\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/resources\/cyber-resilience-act-cra\/#primaryimage\",\"url\":\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/04\/dot-blog-cyber-resilience-act.jpg\",\"contentUrl\":\"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/04\/dot-blog-cyber-resilience-act.jpg\",\"width\":940,\"height\":350,\"caption\":\"Blog Article DOT Cyber Resilience Act CRA\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#website\",\"url\":\"https:\/\/www.arcadsoftware.com\/dot\/\",\"name\":\"DOT - Data Oriented Testing\",\"description\":\"Confidential Data Testing Automation\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.arcadsoftware.com\/dot\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2\",\"name\":\"Myriam Goutte\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Resilience Act (CRA) | Blog","description":"The objective of the Cyber Resilience Act (CRA) is to reinforce the security of digital products by imposing cybersecurity standards.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.arcadsoftware.com\/dot\/resources\/cyber-resilience-act-cra\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Resilience Act (CRA) | Blog","og_description":"The objective of the Cyber Resilience Act (CRA) is to reinforce the security of digital products by imposing cybersecurity standards.","og_url":"https:\/\/www.arcadsoftware.com\/dot\/resources\/cyber-resilience-act-cra\/","og_site_name":"DOT - Data Oriented Testing","article_published_time":"2024-04-22T07:50:26+00:00","article_modified_time":"2025-02-26T15:11:50+00:00","og_image":[{"width":940,"height":350,"url":"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/04\/dot-blog-cyber-resilience-act.jpg","type":"image\/jpeg"}],"author":"Myriam Goutte","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Myriam Goutte","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/cyber-resilience-act-cra\/#article","isPartOf":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/cyber-resilience-act-cra\/"},"author":{"name":"Myriam Goutte","@id":"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2"},"headline":"Cyber Resilience Act (CRA)","datePublished":"2024-04-22T07:50:26+00:00","dateModified":"2025-02-26T15:11:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/cyber-resilience-act-cra\/"},"wordCount":4204,"image":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/cyber-resilience-act-cra\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/04\/dot-blog-cyber-resilience-act.jpg","articleSection":["Blog","Resources"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/cyber-resilience-act-cra\/","url":"https:\/\/www.arcadsoftware.com\/dot\/resources\/cyber-resilience-act-cra\/","name":"Cyber Resilience Act (CRA) | Blog","isPartOf":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/cyber-resilience-act-cra\/#primaryimage"},"image":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/cyber-resilience-act-cra\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/04\/dot-blog-cyber-resilience-act.jpg","datePublished":"2024-04-22T07:50:26+00:00","dateModified":"2025-02-26T15:11:50+00:00","author":{"@id":"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2"},"description":"The objective of the Cyber Resilience Act (CRA) is to reinforce the security of digital products by imposing cybersecurity standards.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.arcadsoftware.com\/dot\/resources\/cyber-resilience-act-cra\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.arcadsoftware.com\/dot\/resources\/cyber-resilience-act-cra\/#primaryimage","url":"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/04\/dot-blog-cyber-resilience-act.jpg","contentUrl":"https:\/\/www.arcadsoftware.com\/dot\/wp-content\/uploads\/2024\/04\/dot-blog-cyber-resilience-act.jpg","width":940,"height":350,"caption":"Blog Article DOT Cyber Resilience Act CRA"},{"@type":"WebSite","@id":"https:\/\/www.arcadsoftware.com\/dot\/#website","url":"https:\/\/www.arcadsoftware.com\/dot\/","name":"DOT - Data Oriented Testing","description":"Confidential Data Testing Automation","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.arcadsoftware.com\/dot\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.arcadsoftware.com\/dot\/#\/schema\/person\/161344f8e2663b24cdcda8d4ca53f7b2","name":"Myriam Goutte"}]}},"_links":{"self":[{"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/posts\/9087","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/comments?post=9087"}],"version-history":[{"count":3,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/posts\/9087\/revisions"}],"predecessor-version":[{"id":10610,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/posts\/9087\/revisions\/10610"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/media\/9082"}],"wp:attachment":[{"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/media?parent=9087"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/categories?post=9087"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.arcadsoftware.com\/dot\/wp-json\/wp\/v2\/tags?post=9087"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}