Cyber Resilience Act (CRA) – Ihre Produkte sicher und konform
From analysis to implementation
Tailored for industrial systems and embedded software
The Cyber Resilience Act introduces new requirements for manufacturers of connected products.
We support you in implementing your systems efficiently, pragmatically, and in full compliance with regulations.
Your Challenge
Many companies are facing similar questions:
- Which of our products are affected by the CRA?
- What requirements apply specifically to embedded systems?
- What is the gap between our current state and compliance?
- How can security requirements be implemented efficiently?
At the same time, risks are increasing due to:
- regulatory sanctions
- liability issues
- security incidents
Our Solution: End-to-End CRA Compliance
We support you in a structured manner from analysis to implementation, with a strong focus on industrial applications and embedded software.
CRA Gap Analysis
- Assessment of your existing products
- Identification of risks and gaps
- Prioritization based on effort and impact
Security Engineering
- Secure software and firmware development
- Architecture reviews for embedded systems
- Implementation according to best practices (e.g., IEC 62443)
Compliance & Documentation
- Support with technical documentation
- Evidence and documentation for authorities
- Preparation for conformity assessments
Testing & Validation
- Security reviews
- Penetration testing
- Verification of CRA requirements
Lifecycle Security
- Update and patch strategies
- Vulnerability management
- Operational security throughout the entire product lifecycle
Our Approach
A clearly structured process tailored to industrial development projects:
- Analysis: Assessment of current state and products
- Evaluation: Alignment with CRA requirements
- Implementation: Technical integration of security measures
- Documentation: Creation of all required evidence
- Support: Guidance through to successful compliance
Fachliche Partnerschaft
Simon Künzli
Lecturer for secure IoT systems at ZHAW and expert in cybersecurity for embedded systems.
Sotronik maintains a professional partnership and technical exchange with external experts such as Simon Künzli to integrate the latest developments related to the Cyber Resilience Act into customer projects in a practical way.
→ Further education:
WBK Security in Embedded Systems
We collaborate with leading experts from academia and industry.