Bsi TR 03183 1 0 - 9 - 0
Bsi TR 03183 1 0 - 9 - 0
Document history
Version Date Description
0.9.0 2024-09-20 Initial Draft
Table 1: History
Table of content
1 Introduction ............................................................................................................................................................................................ 5
1.1 Important Note ........................................................................................................................................................................... 5
2 Requirements Language .................................................................................................................................................................... 6
3 Basics........................................................................................................................................................................................................... 7
3.1 Security objectives and scope............................................................................................................................................... 7
3.2 Roles ................................................................................................................................................................................................. 7
3.2.1 Consumer/User ..................................................................................................................................................................... 7
3.2.2 Manufacturer .......................................................................................................................................................................... 7
3.2.3 Evaluator................................................................................................................................................................................... 8
3.3 Conformity Assessment.......................................................................................................................................................... 8
3.3.1 Target of Evaluation (TOE) ............................................................................................................................................... 8
3.3.2 Time of assessment .............................................................................................................................................................. 8
3.3.3 Requirement structure ....................................................................................................................................................... 8
3.3.4 Assessment procedure ........................................................................................................................................................ 9
4 Risk assessment.................................................................................................................................................................................... 11
4.1 Important Note ......................................................................................................................................................................... 11
4.2 REQ_RA 1 – Risk assessment .............................................................................................................................................. 11
4.2.1 REQ_RA 1.1 ............................................................................................................................................................................ 11
5 Security requirements ...................................................................................................................................................................... 12
5.1 Important Note ......................................................................................................................................................................... 12
5.2 Application Guidance ............................................................................................................................................................ 12
5.3 Essential requirements related to product properties ............................................................................................ 13
5.3.1 REQ_ER 1 - Security by design ..................................................................................................................................... 13
5.3.2 REQ_ER 2 - No known vulnerabilities ...................................................................................................................... 14
5.3.3 REQ_ER 3 – Secure default configuration............................................................................................................... 15
5.3.4 REQ_ER 4 - Security updates......................................................................................................................................... 15
5.3.5 REQ_ER 5 - Access control ............................................................................................................................................. 17
5.3.6 REQ_ER 6 - Confidentiality protection .................................................................................................................... 20
5.3.7 REQ_ER 7 - Integrity protection .................................................................................................................................. 21
5.3.8 REQ_ER 8 – Data minimisation ................................................................................................................................... 23
5.3.9 REQ_ER 9 – Availability of essential and basic functions ................................................................................ 23
5.3.10 REQ_ER 10 - Minimising negative impact.............................................................................................................. 24
5.3.11 REQ_ER 11 - Limit attack surfaces.............................................................................................................................. 25
5.3.12 REQ_ER 12 - Mitigation of incidents ......................................................................................................................... 25
5.3.13 REQ_ER 13 - Recording and monitoring................................................................................................................. 26
5.3.14 REQ_ER 14 - Deletion of data and settings ............................................................................................................. 28
1 Introduction
The tense situation with respect to cybersecurity vulnerabilities has multiple reasons. The main reasons
include firstly the low maturity regarding cybersecurity of products with digital elements as well as secondly
insufficient and incoherent provision of security updates to address them. Additionally the users’ lack of
access to information that enable them to select and securely use products with an adequate level of
cybersecurity. Users can find it difficult to assess whether the software they use has known exploitable
vulnerabilities. For example, many cybersecurity managers had no information about whether their deployed
products were affected by the Log4shell vulnerability, or they sometimes had to wait a long time to receive
the desired information from the manufacturers. Increasing resilience to cyberattacks and technical
disruptions is therefore a key task to mitigate the negative consequences of the cybersecurity threat situation
for administrations, businesses and society. Therefore, all products should meet at least basic cybersecurity
requirements. This includes not only the cybersecurity level and updates as mentioned above, but also the
education of users as to which products have an appropriate level of cybersecurity.
The Cyber Resilience Act (CRA) 1 will create a horizontal legal cybersecurity framework for the entire
European Union (EU) internal market. It will establish cybersecurity requirements for the placing of products
with digital elements on the Union market. This includes minimum requirements for the level of
cybersecurity that all products with digital elements will have to comply with.
This Technical Guideline (TR) is intended to help manufacturers of products with digital elements in
preparing for the upcoming CRA in form of requirements, recommendations, test actions and assessment
criteria based on the (security) objectives stated in or derived from CRA Annex I (Essential Requirements) and
Annex II (Information and Instructions to the User).
Feedback to this Technical Guideline can serve as input for the current and future work in the context of the
draft standardisation request in support of Union policy on cybersecurity requirements for products with
digital elements. This request asks amongst others for the development of standardisation deliverables that
aim to become harmonised standards. Conformity with those harmonised standards would provide
presumption of conformity within their scope.
This Technical Guideline will be:
• further adapted as a living document and requirements may be further concretised in the course of
European standardisation efforts for the CRA and
• be superseded in the current form as soon as its content is covered by the corresponding
standardisation deliverables under the standardisation request mentioned above.
1 https://www.europarl.europa.eu/doceo/document/TA-9-2024-0130_EN.html
2 Requirements Language
The key words “MUST”, “MUST NOT”, “REQUIRED”, “SHALL”, “SHALL NOT”, “SHOULD”, “SHOULD NOT”,
“RECOMMENDED”, “NOT RECOMMENDED”, “MAY”, and “OPTIONAL” in this document are to be
interpreted as described in BCP 14 2 (RFC 2119 3, RFC 8174 4) when, and only when, they appear in all capitals,
as shown here.
2 https://www.rfc-editor.org/info/bcp14
3 https://www.rfc-editor.org/rfc/rfc2119
4 https://www. rfc-editor.org/rfc/rfc8174
3 Basics
3.1 Security objectives and scope
The requirements stated in this Technical Guideline apply to all products with digital elements placed on the
market which includes their remote data processing solutions. They focus primarily on the product directly
and the communication and interaction with their corresponding remote data processing solutions.
Organisational requirements for the operation of remote data processing solutions are not part of this
document and SHOULD follow best practices for Information Security Management System (ISMS), e.g. ISO
27001 based on “IT-Grundschutz” 5.
The requirements stated in this Technical Guideline are intended to mitigate baseline threats that are typically
considered e.g. in use cases for private households or professional use cases for uncritical business processes.
Generally, the security properties of a product with digital elements have to be appropriate to the intended
purpose and reasonably foreseeable use of the product determined by the manufacturer and have to be
designed, produced and maintained accordingly.
The requirements of this Technical Guideline can be used for an assessment on a technology and product
agnostic level. Following this scope, guidance for the assessment is given without technical details on a
possible implementation as especially the implementation of the essential requirements in section 5.3 may
differ widely depending on the type of product, as well as the intended purpose and reasonably foreseeable
use of the product. To address this situation this Technical Guideline gives guidance indicating when a
requirement applies.
This document can be used for assessment in the current state. Nevertheless additional technical information
and examples are planned to be provided in the future to facilitate an implementation of the requirements
depending on the use case.
The requirements for the vulnerability handling process in section 5.4 and documentation obligations in
section 6 are generally valid for all types of products and are independent of the intended purpose and
foreseeable use of the products.
3.2 Roles
The requirements described in this Technical Guideline are based on the interaction between the following
entities.
3.2.1 Consumer/User
Consumers in the scope of this Technical Guideline are end consumers buying products for personal or
professional use. Consumer are generally not redistributing/reselling these products in a commercial manner.
The terms consumer and user are used interchangeable.
As part of the supply chain, if a consumer reuses a product with digital elements as a component for a new
product with digital elements and places it on the market, the consumer takes the role of a manufacturer.
3.2.2 Manufacturer
The CRA defines “manufacturer” as a natural or legal person who develops or manufactures products with
digital elements or has products with digital elements designed, developed or manufactured, and markets
them under its name or trademark, whether for monetisation or free of charge.
5 https://www.bsi.bund.de/EN/Themen/Unternehmen-und-Organisationen/Standards-und-Zertifizierung/IT-
Grundschutz/it-grundschutz_node.html
As the CRA is a market access regulation, “manufacturer” is interpreted as combining the roles of “vendor”
and “creator”.
“Vendor” (German: “Anbieter”) describes the role of the entity that provides the product with digital elements.
Alternatively, but not necessarily with a commercial background, the terms “Supplier” (German: “Lieferant”)
is used.
“Creator” (German: “Ersteller”) describes the role of the entity that authored or created the product with
digital elements.
As this Technical Guideline specifies technical requirements, it uses a different terminology and interprets
“manufacturer” as a combination of the entity that produces tangible goods, such as devices, and the entity
that creates or provides intangible goods, such as software and software components, usually described by
the term “author”. Therefore, this Technical Guideline does not mention the terms “Economic Operator”,
“Distributor” or “Importer” as defined by the CRA, as the roles of these parties are unrelated to the technical
requirements stated here. These technical requirements are independent of the role which is fulfilling them.
3.2.3 Evaluator
The entity applying the assessment criteria to the requirements of this Technical Guideline. The evaluator
may be the manufacturer itself or a third-party testing body.
When in doubt the evaluator MAY request additional information from the manufacturer, to justify
any delays and ascertain that the manufacturer acted as soon as possible.
• Document and publish: If a requirement states that something must be documented, this means that
the manufacturer possesses a record which is not necessarily available for public access. Publish
means that something is documented and available for public access.
The overall verdict “PASS” is given if all applicable mandatory (MUST) requirements are marked as “PASS”
and all applicable recommendations (SHOULD) are either marked as:
• “PASS” or
• marked as “FAIL” or “INCONCLUSIVE” with a sufficient justification why the recommendation is
not met.
Otherwise the overall verdict is “FAIL”.
4 Risk assessment
To evaluate the cybersecurity risk related to the TOE the manufacturer has to perform a risk assessment. To
be able to get a full overview of the risks related to the TOE, the risk assessment has to consider the complete
life cycle of the TOE. This includes the planning, design, development and production phase, as well as the
deliver, maintenance phase/support period and decommission by the user. The risk assessment also has to
consider the product’s intended purpose, as well as the reasonably foreseeable use by the customer. Based on
the intended purpose and reasonably foreseeable use, the manufacturer has to derive potential threats and
threat agents as well as their probability of occurrence and impact on the security of the TOE, including the
risk for health and safety of the consumer.
5 Security requirements
To minimise the cybersecurity risks throughout the TOE’s lifecycle (planning, design, development,
manufacturing, delivery, maintenance and decommission by the user), including when using third-party
components, as well as during the support period, the manufacturer has to ensure the conformity of their
product, at least with the essential requirements set out in section 5.3. These are intended to ensure an
appropriate baseline level of cybersecurity according to best practices.
This Technical Guideline raises no claim of completeness and no claim of providing a tailor-made solution as
this is highly dependent on the specific product and the associated risk determined by the manufacturer.
Another criterion is the potential attack surface and opportunity. This correlates on how the TOE
communicates with other products with digital elements and how it can be physically accessed. A TOE which
only communicates via local interfaces may pose a lower risk regarding security, than a TOE which is
permanently connected to a public network.
Public network:
The TOE communicates via a Wide Area Network (WAN).
Local network:
The TOE communicates via a local network (WLAN, Bluetooth, etc.) but has no capabilities to access the WAN.
Local (Public):
The TOE uses local interfaces without network access (e.g. USB, NFC and local Application Programming
Interfaces (API)). The TOE is foreseeably used in a public space and can be locally interacted with by anyone
in a substantial time frame, e.g. an automated kiosk.
Local (Restricted Public):
The TOE uses local interfaces without network access (e.g. USB, NFC and local Application Programming
Interfaces (API)). The TOE is foreseeably used in a public space and can be locally interacted with by anyone
without supervision for a short period of time, e.g. temporarily unsupervised private notebook.
Local (Restricted):
The TOE uses local interfaces without network access (USB, NFC and local Application Programming
Interfaces (API)). The TOE is foreseeably used in a physically restricted environment, which can only be
accessed by selected individuals, e.g. Smart TV for Home Entertainment or Office Printer.
Security requirements stated in this Technical Guideline may depend on the data assets or communicative
capabilities of the TOE. This is indicated by a corresponding condition.
If a TOE does not meet a requirement based on the communicative capabilities, it is possible to transfer the
risk associated with the communication by delegating the requirements to a separate proxy product. This is
only possible if the TOE ensures that the relevant communication is only possible via the proxy product, e.g.
by establishing a trust relationship with the proxy for remote network communication.
The condition represents guidance to facilitate the decision if a requirement applies.
Requirement
• The manufacturer MUST document and implement a process which ensures that the TOE is designed,
developed and produced with an appropriate level of cybersecurity, based on the risk assessment in
section 4.2.
Assessment criteria
• The evaluator MUST assess that the process is based on the risk assessment and contains appropriate
mitigation strategies for the documented risks.
Requirement
• The manufacturer MUST follow best practices for the secure (software-) development lifecycle e.g.
OWASP SAMM, BSI TR-03185, ISO 27034.
Assessment criteria
• The evaluator MUST assess that the documented process contains best practices for secure
governance, design, implementation and testing of the product before set on the market and
afterwards following e.g. OWASP SAMM, BSI TR-03185 and ISO 27034.
Requirement
• The manufacturer MUST ensure that the TOE is updated to the newest available software/firmware
version during or before the initial setup.
Assessment criteria
• The evaluator MUST assess that the newest security update is installed on the TOE before the first
usage by the user.
Requirement
• The manufacturer MUST test, if the security properties of the TOE are working correctly following
section 5.4.3.1 before making the TOE available.
• The manufacturer MUST document the result of the test.
• The manufacturer MUST fix all known actively exploited vulnerabilities before making the TOE
available.
Assessment criteria
• The evaluator MUST assess that the TOE is tested following section 5.4.3.1 before being made
available.
• The evaluator MUST assess that the results of the test are documented.
• The evaluator MUST check that actively exploited vulnerabilities of the TOE known to the
manufacturer are fixed before being made available.
Recommendation
• The manufacturer SHOULD fix all known exploitable vulnerabilities before making the TOE
available.
Assessment criteria
• The evaluator SHOULD check that exploitable vulnerabilities of the TOE known to the manufacturer
are fixed before being made available.
Requirement
• The TOE MUST be able to be reset to its original state. The original state consists of the deletion of all
local user data, resetting the software to the initial or newest version and resetting the default
configuration.
Condition
• The TOE can be configured.
Assessment criteria
• The evaluator MUST assess that the TOE can be reset to its original state through a factory reset or
reinstallation.
Requirement
• The software of the TOE MUST NOT contain hard coded security data and critical security data.
Condition
• The TOE stores security data or critical security data specific to the TOE.
Assessment criteria
• The evaluator MUST assess that security data and critical security data are not hard coded in the
software of the TOE.
Requirement
• The manufacturer MUST ensure that the TOE and its components are updateable. This MAY exclude
all components which cannot be updated, because of the security architecture or technical
limitations.
Assessment criteria
• The evaluator MUST assess that all relevant components of the TOE can be updated.
• For non-updatable components, the evaluator MUST assess that the absence of an update
functionality for the component is otherwise justified, because of the security architecture or
technical limitations.
Requirement
• The TOE MUST have a mechanism for the secure installation of updates. This includes verifying the
integrity and authenticity of the update package using best practices.
Condition
• The TOE can be updated.
Assessment criteria
• The evaluator MUST assess that the design and cryptographic methods used for the update
mechanism prevent misuse by an attacker (e.g. forging of malicious update packages). This includes
verifying the integrity and authenticity of the update package using best practice cryptography.
Requirement
• The TOE MUST have an automatic update mechanism, which is activated as the default setting.
Condition
• The TOE has an at least temporary connection to an update source.
Assessment criteria
• The evaluator MUST check that the automatic update mechanism is activated as the default setting.
• The evaluator MUST assess that the TOE checks for updates in an appropriate regular interval.
• The evaluator MUST assess that the TOE is updated automatically to the latest version.
Requirement
• The TOE MUST have an easy-to-use opt-out mechanism for the automatic update.
• The TOE MUST notify the user that updates are available.
Assessment criteria
• The evaluator MUST assess that the automatic update mechanism can be disabled easily.
• The evaluator MUST assess that the user is notified that updates are available, but the update is not
installed without the user consent if the automatic update is disabled.
Requirement
• The user MUST be able to postpone automatic updates. The TOE MUST repeatedly remind the user
to install the update after an appropriate timeframe.
• Security updates and bugfixes without new functionalities or impact on the usage of the product MAY
be installed without the option to postpone.
Condition
• The TOE has an at least temporary connection to an update source.
• The automatic update mechanism is enabled.
• The installation of the update temporarily disrupts the core functionality of the TOE.
Assessment criteria
• The evaluator MUST assess that the user can postpone functional updates or updates interrupting the
functionality of the TOE, e.g. restart of the TOE.
• The evaluator MUST assess that the user is reminded repeatedly to install the postponed update
within an appropriate timeframe.
Requirement
• The TOE MUST notify the user with sufficient information if an update cannot be installed. This
MUST also containing the reason, why the update cannot be installed.
Condition
• The TOE can be updated.
Assessment criteria
• The evaluator MUST assess that the user is notified if an update cannot be installed, e.g. temporarily
insufficient storage or failed connection.
Requirement
• The TOE MUST implement mechanisms for access control with regard to different types of users,
possible capabilities and access scenarios.
Assessment criteria
• The evaluator MUST assess that the described access control mechanisms handle all relevant user
roles, product functions and access scenarios.
• The evaluator MUST assess that the described mechanisms are sufficient to protect the TOE against
unauthorised access.
Requirement
• The TOE MUST NOT use default passwords, i.e. passwords common to multiple instances of the
product, after the initial setup.
Condition
• The TOE uses passwords for authentication.
Assessment criteria
• The evaluator MUST assess that the product does not use default passwords, i.e. preconfigured
password that are equal for several instances of the TOE, in any other state than before the initial
setup.
• If a default password is used before the initial setup, the evaluator MUST assess that the user is
required to set an individual password during the initial setup of the TOE.
Requirement
• The TOE MUST ensure that generated passwords, API keys and other secrets used for authentication
are generated with a mechanism that reduces the risk of automated attacks against a class or type of
product. This includes pre-installed secrets only used in the factory state as well as secrets generated
during runtime.
Condition
• The TOE uses generated secrets for authentication.
Assessment criteria
• The evaluator MUST assess that the generation mechanism does not induce obvious regularities in
the resulting passwords, e.g. incremental counters (such as "password1", "password2" and so on) can
be obvious regularities.
• The evaluator MUST assess that the generation mechanism does not induce common strings or other
common patterns in the resulting passwords.
• The evaluator MUST assess that the generation mechanism induces passwords, which are related in
an obvious way to public information, e.g. MAC addresses, WLAN SSIDs, name, type and description
of a device.
• The evaluator MUST assess that the generation mechanism induces passwords, which are considered
appropriate in terms of complexity.
Requirement
• The TOE MUST use best practice cryptography to authenticate users, appropriate to the properties of
the technology, risk and usage.
Condition
• The TOE uses authentication.
Assessment criteria
• The evaluator MUST assess that authentication data is not sent in clear text over an unencrypted
channel.
• The evaluator MUST assess that authentication data is protected using best practice cryptography.
Requirement
• The TOE MUST provide a simple mechanism to change the authentication data used by the
authenticated user or an authenticated administrator.
Condition
• The TOE uses authentication.
Assessment criteria
• The evaluator MUST assess that the authenticated user or the authenticated administrator is able to
change their authentication data, e.g. password or key.
Requirement
• The TOE MUST implement a mechanism to make brute force attacks on the authentication
mechanisms over network interfaces impracticable.
• Condition
• The TOE uses authentication.
Assessment criteria
• The evaluator MUST assess that the TOE does not allow unlimited and unhindered failed
authentication attempts and reacts after a certain number of attempts in an appropriate manner to
make brute force attack impractical, e.g. by time delay after X failed attempts, by locking the access,
by requiring a second factor.
• The evaluator MUST assess that passwords or other secrets used for authentication, are complex
enough to avoid brute force attacks, e.g. long enough, multiple types of characters, checked against
dictionaries or enhanced by other authentication features or factors.
Requirement
• The TOE MUST NOT give information about what authentication data was incorrect for a failed
authentication attempt.
Assessment criteria
• The evaluator MUST assess that the TOE does not provide information about the correct
authentication data during a failed authentication attempt.
Requirement
• The TOE MUST implement means to report and identify possible unauthorised access attempts.
Assessment criteria
• The evaluator MUST assess that the TOE is able to identify and report failed authentication attempts,
i.e. authentication attempts with invalid credentials.
• The evaluator MUST assess that the failed login attempts can be reviewed by the user.
Requirement
• The TOE MUST use best practice cryptography to communicate securely, suitable for the
corresponding use case.
Condition
• The TOE communicates over a local or public network and transmits personal data, sensitive personal
data, sensitive system data or security data.
Assessment criteria
• The evaluator MUST assess that the TOE uses best practice cryptography. This includes cryptographic
primitives and algorithms as well as protection against brute force and replay attacks.
Recommendation
• The TOE SHOULD use reviewed or evaluated implementations to deliver network and security
functionalities which are actively maintained, particularly in the field of cryptography.
Condition
• The TOE uses cryptography for transmitting personal data, sensitive personal data, sensitive system
data or security data over a local or public network.
Assessment criteria
• The evaluator MUST assess that the TOE uses reviewed or evaluated cryptographic implementations.
• The evaluator MUST assess that the cryptographic implementations are actively maintained.
Recommendation
• The TOE SHOULD NOT transmit long term security data 6.
• Instead of long term security data, the TOE SHOULD use temporary security data with limited
validity for communication, e.g. message digest keys, session keys and nonces.
6 Long term security data is valid indefinitely or a substantial time, e.g. 180 days, until actively changed by the
user.
Assessment criteria
• The evaluator MUST assess that the TOE avoids transmitting long term security data in a
reconstructable way wherever possible.
• If long term security data is transmitted in a reconstructable way, the evaluator MUST assess that the
reason for transmission is appropriate to the properties of the technology, risk and usage.
Requirement
• The confidentiality of security data and critical security data stored by the TOE must be protected.
Encryption and other cryptographic mechanisms MUST follow best practices.
Condition
• The TOE stores security data and critical security data.
Assessment criteria
• If the TOE uses cryptography to protect the confidentiality of stored security data and critical security
data the evaluator MUST assess that the TOE uses cryptography following best practices.
• If the TOE uses other or additional mechanisms to secure stored security data and critical security
data, e.g. a permission system or a specially secured storage with cryptographic functions, the
evaluator MUST assess that these mechanisms are appropriate to secure security data and critical
security data.
Requirement
• The manufacturer MUST follow secure management processes for security data that relate to the TOE
or associated services.
Condition
• The TOE uses security data generated by the manufacturer.
Assessment criteria
• The evaluator MUST assess that the secure management of critical security data covers the whole life
cycle of a critical security parameter by considering all of the following aspects of its life cycle:
o Generation, and
o Provisioning, and
o Storage, and
o Updates, and
o Decommissioning, archival, and destruction processes to handle the expiration and
compromise.
Recommendation
• The TOE SHOULD be able to verify its own integrity, to prevent tampering with security properties
of the TOE. If the verification fails, the TOE MUST give the user the option to restore the integrity of
the TOE. There is typically an external or internal component required for the verification which
cannot be verified itself and has to be otherwise protected against unwanted tampering, e.g. boat
loader or external verification service.
Condition
• The TOE stores sensitive user or system data.
Assessment criteria
• The evaluator MUST assess that the TOE verifies its own integrity before usage in a manner sufficient
to prevent tampering with security data.
• The evaluator MUST assess that the user is warned and given restoration options, if the validation
fails.
• If the TOE uses cryptography to ensure its integrity, e.g. via hash values and/or signatures, the
evaluator MUST assess that the TOE uses cryptography following best practices.
Requirement
• The TOE MUST perform the installation of additional software in an atomic manner, e.g. reset the
TOE to the state before the installation of the new software in case of an error or cancelation during
the installation process.
Condition
• The TOE allows installation of additional software, e.g. apps or plugins.
Assessment criteria
• The evaluator MUST assess that a failed or cancelled installation is reverted in such a way, that the
possible remains of the installation have no impact on the TOE or user and the installation can be
retried.
Requirement
• A user MUST be able to uninstall software installed by the user her/himself.
Condition
• The TOE allows installation of additional software, e.g. apps or plugins.
Assessment criteria
• The evaluator MUST assess that a user can uninstall software installed by the user her/himself.
Requirement
• The TOE MUST preserve its own integrity during normal operation by handling security relevant
system resources in an ordered manner to prevent unwanted system states e.g. by using
transactions/exclusive access when writing security relevant data, only using allocated program
memory, releasing resources when unused.
Assessment criteria
• The evaluator MUST assess that the TOE handles its own resources in an ordered manner, this
includes amongst other access to the file system, usage of network connections, used/allocated
memory and handling of other shared resources.
Requirement
• The TOE MUST only collect and process data which is necessary to fulfil its intended purpose and
reasonably foreseeable use.
Assessment criteria
• The evaluator MUST assess that the process of the specified data is necessary for the intended purpose
and reasonably foreseeable use of the TOE.
• The evaluator MUST check that only the specified data is collected and processed by the TOE.
Requirement
• It MUST be possible to operate the TOE with a default configuration. In this configuration only the
interfaces necessary for the core function of the TOE are activated.
Assessment criteria
• The evaluator MUST check that the TOE can be operated with a default configuration.
• The evaluator MUST check that all unnecessary interfaces are deactivated.
Requirement
• The TOE MUST be able to resume secure operation after a temporary interruption.
Assessment criteria
• The evaluator MUST assess that the TOE is able to resume secure operation after a temporary
interruption. This includes common interruptions like power loss, network loss or network traffic
overload, not available services.
Requirement
• The TOE MUST maintain local safety functions even during a loss of network.
Condition
• The TOE serves a basic safety function, e.g. smart locks, smoke detector, etc.
Assessment criteria
• The evaluator MUST assess that local safety functions are maintained during a loss of network.
Requirement
• The TOE MUST maintain its core functionality even without available remote data processing
solutions.
Condition
• The TOE does not require remote data processing solutions for its intended purpose, e.g. telemetry
data processing, digital rights management, etc.
Assessment criteria
• The evaluator MUST assess that the TOE maintains its core functionality even without available
remote data processing solutions.
Requirement
• The TOE MUST handle network resources in an ordered manner during normal operation.
Assessment criteria
• The evaluator MUST assess that the TOE handles network resources in an ordered manner during
normal operation, i.e. in such a manner that network resources are only used appropriately to the
TOEs intended purpose and reasonably foreseeable use and that they are released if not needed
anymore.
Requirement
• The TOE MUST communicate with other products in an orderly fashion and enables the other
products to react to errors.
Assessment criteria
• The evaluator MUST assess that the TOE provides services following well-defined protocols and
enables external products to react appropriately to errors in the provided services.
• The evaluator MUST assess that the used protocols and interfaces intended for external use are
sufficiently documented for the use by external products. This documentation is not necessarily free
of charge.
Requirement
• The TOE MUST deactivate interfaces and services not required for usage by default.
Assessment criteria
• The evaluator MUST assess that only interfaces and services needed for the initial setup are enabled
before the first usage by the user.
• The evaluator MUST assess, which interfaces and services are required for the usage of the TOE.
• The evaluator MUST assess that only these interfaces and services are enabled by default.
Requirement
• The TOE MUST deactivate debug interfaces and functions, which can be used to bypass the security
functions of the TOE by default. Debug interfaces of the TOE MAY be retrospectively be reactivated
by an authorized user or administrator.
Condition
• The TOE has debug interfaces with a local (public), local (public restricted), local network or public
network access.
Assessment criteria
• The evaluator MUST assess that all debug interfaces are disabled by default.
• If the TOE contains debug interfaces or services which can be reenabled, the evaluator MUST assess
that those interfaces can only be willingfully enabled by an authorized user.
• The evaluator MUST assess that the user is sufficiently warned, when a debug interface is activated.
Note: The requirements listed in sections 5.3.3, 5.3.4, 5.3.6, 5.3.7, 5.3.9, 5.3.10 already consider exploitation
mitigation mechanisms and techniques, therefore they are not considered again here.
Requirement
• The TOE MUST be operated with the least necessary privileges by default.
Assessment criteria
• The evaluator MUST assess that the TOE only uses the least necessary privileges required to fulfil its
current function by default.
Requirement
• The TOE MUST enforce a permission system for interfaces provided for other products. The
permission system MUST be granular enough to control the usage of the interface.
Condition
• The TOE provides interfaces to communicate with other products.
Assessment criteria
• The evaluator MUST assess that the TOE has a permission system for interfaces provided to other
products.
• The evaluator MUST assess that the permission system of the TOE is granular enough to control
access over the interface and enables a product communicating with the interface to operate with the
least necessary privileges.
• The evaluator MUST assess that the permission system is enforced by the TOE and other products are
not able to obtain additional privileges not granted by the TOE, i.e. no unintended privilege escalation.
Requirement
• The TOE MUST have implemented a mechanism to record and monitor all security relevant setting
modifications.
• The TOE MUST record all setting modifications by default.
Assessment criteria
• The evaluator MUST assess that there is a mechanism implemented on the TOE to record and
monitor all setting modifications.
• The evaluator MUST assess that the recorded data contains enough information to analyse anomalies
in security relevant setting modifications. This includes at least the initiator, the time and the
content/type of the change in the settings.
• The evaluator MUST check that the setting modifications are recorded by default.
Requirement
• The TOE MUST have implemented a mechanism to record and monitor all user authentications.
• The TOE MUST record all user authentications by default.
Assessment criteria
• The evaluator MUST assess that there is a mechanism implemented on the TOE to record and
monitor all user authentications.
• The evaluator MUST assess that the recorded data contains enough information to analyse anomalies
in user authentications. This includes at least the time of authentication, the accessed interface or
function, the source of the authentication if available and the result of the authentication attempt.
• The evaluator MUST check that the user authentications are recorded by default.
Requirement
• The TOE MUST have implemented a mechanism to record and monitor the status of all services
belonging to the TOE.
• The TOE MUST record the status of all services belonging to the TOE by default.
Assessment criteria
• The evaluator MUST assess that there is a mechanism implemented on the TOE to record and
monitor the status of all services belonging to the TOE.
• The evaluator MUST assess that the recorded information contains enough information to analyse
anomalies in service activities. This includes at least the start up time of a service and a regular status
update.
• The evaluator MUST check that the status of all services belonging to the TOE are recorded by default.
Requirement
• It MUST be possible to deactivate the recording and monitoring activities by an authorized user.
Assessment criteria
• The evaluator MUST check that it is possible, for an authorized user, to deactivate and reactivate the
recording and monitoring.
• The evaluator MUST check that the activation and deactivation of the recording and monitoring
activities are recorded.
Requirement
• The TOE MUST be able to record and monitor network data to detect possible security anomalies in
the network communication.
Condition
Requirement
• The TOE MUST be able to provide recorded data for a sufficient timeframe to facilitate a retrospective
analysis.
Assessment criteria
• The evaluator MUST assess that the collected recorded data can be analysed to detect possible security
anomalies retrospectively e.g. by storing the recorded data long enough (locally or remotely) to enable
an analysis.
Requirement
• The TOE MUST ensure that recorded data cannot be used to facilitate a security incident.
Assessment criteria
• The evaluator MUST assess that the recorded data exposing a security risk can only be accessed by
authorized entities.
• The evaluator MUST assess that the recorded data does not contain unnecessary data exposing more
risk than necessary by default, e.g. do not log personal data or secrets on the default log level.
• Additional information MAY be recorded on a case by case basis for debugging purposes.
Requirement
• The TOE MUST ensure that recoding and monitoring is resilient against common disruptions and
that problems during the recording and monitoring of security relevant data have no impact on the
functionality of the TOE.
Assessment criteria
• The evaluator MUST assess that the recoding and monitoring mechanism is resilient against common
disruption, e.g. loss of power, low storage or network outages.
• The evaluator MUST assess, those problems with the recording and monitoring mechanism have no
impact on the basic functionality of the TOE.
Requirement
• The TOE MUST have implemented an easy-to-use mechanism to delete all personal data on the TOE.
Assessment criteria
• The evaluator MUST assess that there is an easy-to-use mechanism implemented on the TOE to delete
all personal data stored on the TOE.
• The evaluator MUST check that all personal data is deleted on the TOE.
Requirement
• The TOE MUST have implemented an easy-to-use mechanism to delete all system data and to revert
all modified settings back to their default values on the TOE.
Assessment criteria
• The evaluator MUST assess that there is implemented an easy-to-use mechanism on the TOE to delete
all system data and settings stored on the TOE.
• The evaluator MUST check that all system data and settings are deleted on the TOE.
• The evaluator MUST check that modified settings are reverted to their default values on the TOE.
Requirement
• The TOE MUST have implemented an easy-to-use mechanism to delete all data, belonging to the
user, stored on the remote data processing solutions of the TOE, e.g. cloud services.
Assessment criteria
• The evaluator MUST assess that there is implemented an easy-to-use mechanism on the TOE to delete
all data, belonging to the user, stored remote data processing solutions belonging to the TOE.
• The evaluator MUST check that all data, belonging to the user, is deleted on the remote data
processing solutions of the TOE.
Requirement
• The TOE MUST have implemented an easy-to-use mechanism to revert all data and modified settings
back to the factory default.
Assessment criteria
• The evaluator MUST assess that there is implemented an easy-to-use mechanism on the TOE to revert
all data back to their factory default.
• The evaluator MUST check that all personal data is deleted on the TOE.
• The evaluator MUST check that all system data and modified settings are deleted on the TOE.
• The evaluator MUST check that modified settings are reverted to their default values on the TOE.
• The evaluator MUST check that all personal data is deleted on services belonging to the TOE.
• The evaluator MUST check that all modified system data is deleted on services belonging to the TOE.
• The evaluator MUST check that all settings are reverted back to their default value for the usage of
the remote data processing solutions of the TOE.
Requirement
• The TOE MUST transfer personal and system data in a secure way following the requirements in
sections 5.3.6 and 5.3.7.
Assessment criteria
• The evaluator MUST check that all requirements in sections 5.3.6 and 5.3.7 are passed.
Requirement
• The manufacturer MUST document all software components of the TOE in a Software Bill of
Materials (SBOM) according to BSI TR-03183-2.
• The manufacturer MUST document all hardware components with digital elements of the TOE.
Assessment criteria
• The evaluator MUST check that there is an SBOM documenting the software components of the TOE.
• The evaluator MUST assess that the SBOM is compliant to BSI TR-03183-2.
• The evaluator MUST assess that the hardware components with digital elements are documented.
Requirement
• The manufacturer MUST have a process in place to identify vulnerabilities affecting the TOE.
• The manufacturer MAY use the SBOM for the TOE to match its components against vulnerability
databases, e.g. Common/European/ National Vunerability Database (CVD/EUVD/NVD).
• The manufacturer MUST document these vulnerabilities, what impact they have on the TOE and how
they can be mitigated.
Assessment criteria
• The evaluator MUST assess that there a process in place to identify vulnerabilities affecting the TOE.
• The evaluator MUST assess that vulnerabilities and their mitigation measures are documented.
Requirement
• The manufacturer MUST ensure that identified vulnerabilities are addressed and corrected, i.e. by
providing an update or otherwise mitigating a vulnerability, in a timely feasible manner.
Assessment criteria
• The evaluator MUST assess that the manufacturer has documented and implemented a process
according to which identified vulnerabilities are analysed without undue delay and assessed
according to the associated risk of the vulnerability. This assessment MUST include, if the
vulnerability is or can be actively exploited.
• The evaluator MUST assess that the manufacturer has documented and implemented a process to
address and correct vulnerabilities in a timely feasible manner.
• The evaluator MUST assess that the documented and implemented process addresses high risk
vulnerabilities or actively exploited vulnerabilities by providing security updates or other mitigations
as soon as possible without waiting for a functional update or an otherwise planned update.
Requirement
• The manufacturer MUST document and implement a process to test, if the security properties of the
TOE are implemented correctly.
• The manufacturer MUST test the security properties of the TOE regularly.
Assessment criteria
• The evaluator MUST assess that the manufacturer documented and implemented a process to test
the security properties of the TOE.
• The evaluator MUST assess that the manufacturer tests the security properties of the TOE regularly,
e.g. every three months or with every major change to the product.
• The evaluator MUST assess that the test includes at least the assessment criteria with the security
requirements of this Technical Guideline.
• The evaluator MUST assess that the assessment criteria contains a sufficient functional assessment
for every security requirement or if no functional assessment is performed that a sufficiently
plausible justification is given and documented following section 3.3.4.
Requirement
• The manufacturer MUST inform the user about vulnerabilities affecting the TOE using Security
Advisories.
• The manufacturer MAY publicly inform about vulnerabilities affecting the TOE using Security
Advisories.
• The Security Advisories MUST contain information regarding the impact of the vulnerability and
how to mitigate it.
Assessment criteria
• The evaluator MUST assess that the manufacturer has documented and implemented a process to
inform about vulnerabilities affecting the TOE with Security Advisories.
• The evaluator MUST check that the Security Advisories contain information on impact, temporary
mitigation measures and ways to fix the vulnerability.
Requirement
• The manufacturer MUST provide the Security Advisories in a machine processable way.
Assessment criteria
• The evaluator MUST assess that the Security Advisories are published in a machine processable way.
Recommendation
• The manufacturer SHOULD use the Common Security Advisory Framework 7 (CSAF) in accordance
with BSI TR-03191.
Assessment criteria
7 https://csaf.io/
• The evaluator MUST assess that the Common Security Advisory Framework is used to publish
Security Advisories.
Requirement
• The manufacturer MUST have published and implemented a vulnerability disclosure process
according to BSI TR-03183-3.
Assessment criteria
• The evaluator MUST assess that the manufacturer has documented and implemented a vulnerability
disclosure process.
• The evaluator MUST assess that the manufacturer has published an easy-to-reach contact option to
report vulnerabilities as part of vulnerability disclosure policy.
• The evaluator MUST assess that the vulnerability disclosure process is compliant to BSI TR-03183-3.
Requirement
• The manufacturer MUST provide a mechanism for the distribution of updates according to section
5.3.4.
Assessment criteria
• The evaluator MUST check that all requirements in section 5.3.4 are passed.
Requirement
• The manufacturer MUST provide a mechanism for the addressing of updates according to sections
5.3.2, 5.3.4 and 5.3.6.
Assessment criteria
• The evaluator MUST check that all requirements in sections 5.3.2, 5.3.4 and 5.3.6 are passed.
Requirement
• The manufacturer MUST provide a user documentation or guidance on application of updates
according to section 6.2.4.
Assessment criteria
• The evaluator MUST check that all requirements in section 6.2.4 are passed.
6 Documentation obligations
6.1 Technical documentation
The technical documentation has to be compiled by the manufacturer according to the following
requirements. It might be published by the manufacturer, but it is not required, as some of these
documentation contain sensibel information.
Requirement
• The technical documentation MUST contain the intended purpose of the TOE.
• The technical documentation MUST contain the versions of software affecting compliance with the
essential requirements stated in section 5.3.
Assessment criteria
• The evaluator MUST assess that the intended purpose of the TOE is documented.
• The evaluator MUST assess that the versions of software affecting compliance with the essential
requirements are documented.
Requirement
• The technical documentation MUST contain photographs or illustrations showing external features,
marking and internal layout of the TOE.
Condition
• The TOE is a hardware device or has a hardware component.
Assessment criteria
• The evaluator MUST check that the documentation includes photographs or illustrations showing
external features, marking and internal layout of the TOE.
Requirement
• The technical documentation MUST contain the information on the design, development and
production of the TOE regarding its security properties.
Assessment criteria
• The evaluator MUST assess that the technical documentation includes the information on the design,
development and production of the TOE regarding its security properties. This includes, where
applicable, drawings, schemes and a description of the system architecture explaining how software
components build on or feed into each other and integrate into the overall process.
Requirement
• The technical documentation MUST contain the vulnerability handling process documented in
section 0.
Assessment criteria
• The evaluator MUST check that the documentation according to the requirements in section 5.4 is
available.
Requirement
• The technical documentation MUST contain the risk assessment process documented in section 4.2.
Assessment criteria
• The evaluator MUST check that the documentation according to the requirements in section 4.2 is
available.
Requirement
• The technical documentation MUST contain how the support period is determined according to the
risk assessment requirements in section 4.2.
Assessment criteria
• The evaluator MUST check that the requirements in section 4.2 are passed.
Requirement stated in the current draft of the CRA Annex VII: The technical documentation shall contain
reports of the tests carried out to verify the conformity of the product with digital elements and of the
vulnerability handling processes with the applicable essential requirements.
Requirement
• The technical documentation MUST contain how the assessment of the essential requirements set
out in section 5.3 and the vulnerability handling requirements set out in section 5.4 was performed.
• Every decision made during the assessment, used methods or results MUST be documented. This
includes the reasoning behind made decisions.
Assessment criteria
• The evaluator MUST assess that the process of the performed assessment criteria is adequately
documented.
Requirement
• The technical documentation MUST contain the SBOM created according to section 5.4.1.
Assessment criteria
• The evaluator MUST check that the requirements set out in section 5.4.1 are passed.
Requirement
• The published user documentation related to the TOE MUST contain the name, registered trade name
or registered trademark of the manufacturer, and the postal address, the email address or other digital
contact as well as, where available, the website with the means to contact the manufacturer.
Assessment criteria
• The evaluator MUST check that the user documentation is published and contains name, registered
trade name or registered trademark of the manufacturer, and the postal address, the email address or
other digital contact as well as, where available, the website with the means to contact the
manufacturer.
Requirement
• The user documentation related to the TOE MUST contain the name and type and any additional
information enabling the unique identification of the TOE.
Assessment criteria
• The evaluator MUST check that the user documentation contains the name and type and any
additional information enabling the unique identification of the TOE.
• The evaluator MUST assess that the TOE is uniquely identifiable.
Requirement
• The user documentation related to the TOE MUST contain information on the intended purpose of
the TOE.
Assessment criteria
• The evaluator MUST assess that the intended purpose of the TOE is documented in the user
documentation.
Requirement
• The user documentation related to the TOE MUST contain information on any known or foreseeable
circumstances, related to the use of the product with digital elements, in accordance with its intended
purpose or under conditions of reasonably foreseeable misuse, which may lead to significant
cybersecurity risks.
Assessment criteria
• The evaluator MUST assess that the user documentation contains information on any known or
foreseeable circumstances, related to the use of the product with digital elements, in accordance with
its intended purpose or under conditions of reasonably foreseeable misuse, which may lead to
significant cybersecurity risks.
Requirement
• The user documentation related to the TOE MUST contain the type of technical security support
offered by the manufacturer and the end-date of the support period during which users can expect
vulnerabilities to be handled and to receive security updates.
Assessment criteria
• The evaluator MUST assess that the user documentation contains the type of technical security
support offered by the manufacturer and the end-date of the support period during which users can
expect vulnerabilities to be handled and to receive security updates.
Requirement
• The user documentation related to the TOE MUST contain detailed information on the necessary
measures during initial commissioning and throughout the lifetime of the TOE to ensure its secure
use.
• The user documentation related to the TOE MUST contain detailed information on how
modifications to the TOE can affect the security of data.
• The user documentation related to the TOE MUST contain detailed information on how security-
relevant updates can be installed.
• The user documentation related to the TOE MUST contain detailed information on the secure
decommissioning of the product with digital elements, including information on how user data can
be securely removed.
• The user documentation related to the TOE MUST contain detailed information on how the default
setting enabling the automatic installation of security updates can be turned off.
• The user documentation related to the TOE MUST contain detailed information on where the TOE is
intended for integration into other products with digital elements and the information necessary for
the integrator to comply with the essential requirements.
Assessment criteria
• The evaluator MUST assess that the user documentation contains detailed information on the
necessary measures during initial commissioning and throughout the lifetime of the TOE to ensure
its secure use.
• The evaluator MUST assess that the user documentation contains detailed information on how
modifications to the TOE can affect the security of data.
• The evaluator MUST assess that the user documentation contains detailed information on how
security-relevant updates can be installed.
• The evaluator MUST assess that the user documentation contains detailed information on the secure
decommissioning of the product with digital elements, including information on how user data can
be securely removed.
• The evaluator MUST assess that the user documentation contains detailed information on how the
default setting enabling the automatic installation of security updates can be turned off.
• The evaluator MUST assess that the user documentation contains detailed information on where the
TOE is intended for integration into other products with digital elements and the information
necessary for the integrator to comply with the essential requirements.
Recommendation
• The user documentation related to the TOE MAY contain the SBOM created according to section 5.4.1.
Condition:
• The SBOM for the TOE is published.
Assessment criteria
• The evaluator MUST check that the requirements set out in section 5.4.1 are passed.
• The evaluator MUST check that the SBOM is publicly available.
7 Annex
This Annex provides an overview over related standards which have been considered and build upon during
the development of the requirements set out in this document.
Requirement ETSI EN 303 645 EN IEC 62443 other standards
REQ_RA 1 – Risk assessment
REQ_RA 1.1 SR-1, SR-2 ISO 27005
REQ_ER 1 - Security by design
REQ_ER 1.1 62443-4-1:
SR-1, SR-2, SR-3, SR-4, SR-
5, SVV-1, SVV-2, DM-3,
DM-4
REQ_ER 1.2 ETSI EN 303 645 (5.6-9) 62443-4-1:
SD-1, SD-2, SD-3, SD-4
REQ_ER 2 - No known vulnerabilities
REQ_ER 2.1 ETSI EN 303 645 (5.3-4, 5.3-5) 62443-4-1:
SUM-5
REQ_ER 2.2 ETSI EN 303 645 (5.3-8) 62443-4-1:
SV-1, SVV-3, DM-1, DM-2,
DM-3, DM-4
REC_ER 2.3 ETSI EN 303 645 (5.3-8) 62443-4-1:
DM-1, DM-2, DM-3, DM-4
REQ_ER 3 – Secure default configuration
REQ_ER 3.1 ETSI EN 303 645 (5.11-1) 62443-4-2:
CR 7.4
REQ_ER 3.2 ETSI EN 303 645 (5.4-3)
REQ_ER 4 - Security updates
REQ_ER 4.1 ETSI EN 303 645 (5.3-1) 62443-4-2:
CR 3.10
REQ_ER 4.2 ETSI EN 303 645 (5.3-2) 62443-4-2:
CR 3.10
REQ_ER 4.3 ETSI EN 303 645 (5.3-5)
REQ_ER 4.4 ETSI EN 303 645 (5.3-5)
REQ_ER 4.5 ETSI EN 303 645 (5.3-3)
REQ_ER 4.6 ETSI EN 303 645 (5.3-3) 62443-4-2:
CR 3.7
REQ_ER 5 - Access control