Amanita Security

1 Followers
0 Following
8 Posts
Trusted cybersecurity services for product manufacturers
Websitehttps://www.amanitasecurity.com/

Following our initial article on the Cyber Resilience Act's objectives, weโ€™re back with a comprehensive exploration of its essential requirements. ๐Ÿ”

In our latest article, "Reflections on Cyber Resilience Act Requirements," we break down the technical aspects including:

- Ensuring no known exploitable vulnerabilities when products hit the market.
- Adopting a 'Secure by Default' stance while allowing tailored solutions.
- Implementing robust mechanisms for automated security updates.
- Upholding data confidentiality, integrity, and resilience against unauthorized access or manipulations.
- Minimizing attack surfaces and ensuring product lifecycle security.
- etc.

Read the full article here: https://www.amanitasecurity.com/posts/reflections-on-cyber-resilience-act-requirements/

These requirements will mean more than pure compliance โ€” it requires instilling a culture of security by design and by default when developing your connected devices. But interpreting and implementing these intricate mandates can be challenging, especially when balancing time to market and cost.

Ready but not sure where to start? Donโ€™t navigate these waters alone. Reach out for a friendly chat and discover how we can assist you.
Feel free to contact us at [email protected] for personalized advice and solutions tailored to your organizationโ€™s unique needs.

#IoTSecurity #ProductSecurity #SecureByDesign #EURegulations #CyberResilience

Reflections on Cyber Resilience Act Requirements

If we are to summarize the requirements of the Cyber Resilience Act, we can state that products must be secure by design, secure by default, and without known vulnerabilities. Itโ€™s necessary to protect the confidentiality and integrity of your products and its data, and not become part of a botnet. Prevent data loss and ensure it is possible to detect when something goes wrong through logging and telemetry, while remaining privacy conscious. And if, despite all good intentions, a vulnerability is identified, ensure they can be rectified by applying updates in a timely manner.

Amanita Security

๐—›๐—ผ๐˜„ ๐˜๐—ผ ๐—ด๐—ฒ๐˜ ๐˜€๐˜๐—ฎ๐—ฟ๐˜๐—ฒ๐—ฑ ๐˜„๐—ถ๐˜๐—ต ๐˜๐—ต๐—ฒ ๐—˜๐—จ ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ ๐—ฅ๐—ฒ๐˜€๐—ถ๐—น๐—ถ๐—ฒ๐—ป๐—ฐ๐—ฒ ๐—”๐—ฐ๐˜ ?

It mandates secure design, development, and maintenance for digital devices, addressing low cybersecurity levels and lack of information.

Key Points:

1๏ธโƒฃ Prescribes essential (technical) & vulnerability handling requirements.

2๏ธโƒฃ Applies to most companies from 2026 onwards.

3๏ธโƒฃ Manufacturers must ensure third-party component security.

4๏ธโƒฃ Non-compliance can lead to hefty fines. ๏ธ

Now's the time to start prepping! ๐Ÿ› ๏ธ

Read all about it now in the first part of this multi-part series: https://www.amanitasecurity.com/posts/approaching-the-eu-cyber-resilience-act/

Need help? Amanita Consulting has your back!

#cyberresilience #productsecurity #manufacturing #EURegulations #AmanitaSecurity

Approaching the EU Cyber Resilience Act

The EU Cyber Resilience Act is a new regulation introducing mandatory cybersecurity requirements for products with digital elements. The Act aims to improve product security, handle vulnerabilities, and increase transparency. With compliance starting in 2026, it impacts manufacturers, importers, and distributors of technology in the European market. The article provides a comprehensive overview of the Actโ€™s requirements, exemptions, consequences, and its impact on the supply chain and your organisation.

Amanita Security

๐Ÿ” ๐—˜๐˜…๐—ฝ๐—น๐—ผ๐—ฟ๐—ฒ ๐—ผ๐˜‚๐—ฟ ๐—˜๐—จ ๐—ฐ๐˜†๐—ฏ๐—ฒ๐—ฟ๐˜€๐—ฒ๐—ฐ๐˜‚๐—ฟ๐—ถ๐˜๐˜† ๐—ฟ๐—ฒ๐—ด๐˜‚๐—น๐—ฎ๐˜๐—ถ๐—ผ๐—ป๐˜€ ๐˜๐—ถ๐—บ๐—ฒ๐—น๐—ถ๐—ป๐—ฒ !

At Amanita Security, we track fourteen European legislative acts that impact the cybersecurity landscape for product manufacturers across different industries.

Our latest resource provides clear answers to the two most pressing questions in one handy table:
1. What legislation do we need to comply with?
2. By when must we comply?

Staying informed about these regulations is crucial for ensuring your products remain conform and effectively mitigate cybersecurity risks.

Check it now (and don't forget to bookmark): https://www.amanitasecurity.com/posts/european-cybersecurity-regulations-product-manufacturing-timeline/

Need help integrating these regulatory changes into your technology stack and organisation? Donโ€™t hesitate to **get in touch** for personalised help.

#Cybersecurity #Productsecurity #Manufacturing #Regulations #AmanitaSecurity

EU Cybersecurity Regulations Timeline

Stay updated on the EU's evolving cybersecurity regulations for product manufacturers. Amanita Security tracks fourteen significant legal acts, detailing their current legislative status, entry into force, and applicability dates.

Amanita Security

๐ˆ๐ฌ ๐ฒ๐จ๐ฎ๐ซ ๐ฉ๐ซ๐จ๐๐ฎ๐œ๐ญ ๐ซ๐ž๐š๐๐ฒ ๐Ÿ๐จ๐ซ ๐ญ๐ก๐ž ๐ง๐ž๐ฐ ๐ฐ๐š๐ฏ๐ž ๐จ๐Ÿ ๐„๐ฎ๐ซ๐จ๐ฉ๐ž๐š๐ง ๐œ๐ฒ๐›๐ž๐ซ๐ฌ๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐ซ๐ž๐ ๐ฎ๐ฅ๐š๐ญ๐ข๐จ๐ง๐ฌ?

In our latest article, we break down the essential regulations and requirements you need to know about, including:
โœ… General Product Safety Regulation
โœ… Product Liability Directive
โœ… Radio Equipment Directive
โœ… Cyber Resilience Act
โœ… Machinery Regulation

Read the full article here: https://www.amanitasecurity.com/posts/european-cybersecurity-regulations-for-product-manufacturers/

#Cybersecurity #Regulations #Manufacturing #ProductSecurity #RadioEquipment

EU Security Regulations For Manufacturers

Understanding and navigating the complex EU cybersecurity regulations is crucial for product manufacturers. This article outlines key legislation manufacturers must comply with to maintain product security throughout its lifecycle.

Amanita Security
๐—ฃ๐—ฟ๐—ผ๐—ด๐—ฟ๐—ฒ๐˜€๐˜€ ๐—ถ๐—ป ๐—–๐˜†๐—ฏ๐—ฒ๐—ฟ ๐—ฅ๐—ฒ๐˜€๐—ถ๐—น๐—ถ๐—ฒ๐—ป๐—ฐ๐—ฒ ๐—”๐—ฐ๐˜ ๐—ฟ๐—ฒ๐—พ๐˜‚๐—ถ๐—ฟ๐—ฒ๐—บ๐—ฒ๐—ป๐˜s
Two significant steps were recently taken towards further clarification of the European Cyber Resilience Act (CRA) requirements:

1. ๐—›๐—ฎ๐—ฟ๐—บ๐—ผ๐—ป๐—ถ๐˜‡๐—ถ๐—ป๐—ด ๐˜๐—ฒ๐—ฐ๐—ต๐—ป๐—ถ๐—ฐ๐—ฎ๐—น ๐˜€๐˜๐—ฎ๐—ป๐—ฑ๐—ฎ๐—ฟ๐—ฑ๐˜€
The European Union called upon the European standards organisations (CEN, CENELEC, ETSI) to define harmonized technical standards in support of the CRA. A total of forty-one (41) deliverables have been requested covering all the technical and vulnerability handling requirements of the CRA.
This is important as companies conforming with these future technical standards will be presumed to be in compliance with the regulation.

2. ๐— ๐—ฎ๐—ฝ๐—ฝ๐—ถ๐—ป๐—ด ๐—–๐—ฅ๐—” ๐—ฟ๐—ฒ๐—พ๐˜‚๐—ถ๐—ฟ๐—ฒ๐—บ๐—ฒ๐—ป๐˜๐˜€ ๐˜๐—ผ ๐—ถ๐—ป๐˜๐—ฒ๐—ฟ๐—ป๐—ฎ๐˜๐—ถ๐—ผ๐—ป๐—ฎ๐—น ๐˜€๐˜๐—ฎ๐—ป๐—ฑ๐—ฎ๐—ฟ๐—ฑ๐˜€
ENISA provided a mapping of the Cyber Resilience Act requirements towards other international Cyber Security standards. The ETSI EN 303 645 - Cyber Security for Consumer Internet of Things: Baseline Requirements standard is currently the only one that fully aligns with the essential technical requirements of the CRA. Other common standards, such as IEC 62443-4-2, meet 7 out of 13 requirements.
As for vulnerability handling requirements, no current international standards meet all CRA requirements. ISO/IEC 30111 - Security Techniques: Vulnerability Handling Processes comes closest by fulfilling 5 out of 8 vulnerability handling requirements.

We can conclude that most companies will need to put in additional effort to comply with this upcoming regulation.
Companies that want to integrate these future requirements into their current planning can prepare by working towards EN 303 645 and ISO 30111, thereby reducing future adaptation needs.

The Linux Kernel projectโ€™s new CVE Numbering Authority places a large burden on product manufacturers due to the assignment of CVEs for non-security issues. Our latest article discusses the complexities introduced by the new CVE assignment process, the challenges of frequent updates for electronic devices, and challenges that lay ahead for the engineering teams.

Read the article at https://www.amanitasecurity.com/posts/dear-linux-kernel-cna-what-have-you-done/

Dear Linux Kernel CNA, What Have You Done ?

The Linux Kernel projectโ€™s new CVE Numbering Authority (CNA) has a large impact on product manufacturers. Explore the complexities introduced by the new CVE assignment process, the challenges of frequent updates for electronic devices, and the burden placed on organizations due to the assignment of CVEs for non-security issues.

We might all need a reminder on how to properly interpret security assurance levels in the context of EU cybersecurity legislation. They are very easy to be misunderstood.

Read more at https://www.amanitasecurity.com/posts/true-meaning-security-assurance-levels/

The True Meaning of Security Assurance Levels

Security Assurance Levels used in EU legislation are very easy to be misunderstood, we might all need a reminder about their true meaning

I am very excited to announce the launch of Amanita Security, a new security consulting company dedicated to providing trusted cybersecurity services to product manufacturers.

Product manufacturers are expected to experience a significant shift towards improved cybersecurity in the next few years. This is not only out of necessity to ensure more secure products, but due to the new regulations being established.

Amanita Security is all about helping manufacturers succeed with this transition in a holistic manner, by ensuring technical product security is achieved from circuit board to the cloud, and by integrating sensible approaches to cybersecurity into your product lifecycle and processes.

When you partner with Amanita Security, you can expect first-class tailormade, independent projects that help meet your security objectives.
Amanitaโ€™s approach is firmly rooted in decades of deep technical, domain and organisational expertise, paired with a friendly, proactive collaborative approach.

You can read more about our services, our vision and values on the new website: https://www.amanitasecurity.com

Join me in in this new exciting adventure, and let us know how we can assist with your product cybersecurity needs!

Amanita Security

Trusted Cybersecurity Services for Product Manufacturers