{"id":72531,"date":"2025-09-02T14:37:20","date_gmt":"2025-09-02T12:37:20","guid":{"rendered":"https:\/\/fhi.nl\/nieuws\/cyber-resilience-act-critical-cybersecurity-requirements\/"},"modified":"2025-09-02T14:37:20","modified_gmt":"2025-09-02T12:37:20","slug":"cyber-resilience-act-critical-cybersecurity-requirements","status":"publish","type":"news","link":"https:\/\/fhi.nl\/en\/news\/cyber-resilience-act-critical-cybersecurity-requirements\/","title":{"rendered":"Cyber Resilience Act: Critical Cybersecurity Requirements"},"content":{"rendered":"<header id=\"header\" class=\"header header--low\">\n\n\t\n\t\t\t<div class=\"header__background header__background--graphic\"><\/div>\n\t\n\t<div class=\"container\">\n\t\t<div class=\"header__content\">\n\t\t\t<div class=\"header__first header__first--alone\">\n\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t<h1 class=\"header__title\" >\n\t\t\t\t\tCyber Resilience Act: Critical Cybersecurity Requirements\t\t\t\t<\/h1>\n\n\t\t\t\t<div class=\"header__dots-line\">\n\t\t\t\t\t<svg width=\"431\" height=\"9\" viewbox=\"0 0 431 9\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M430.799 4.192a1.136 1.136 0 1 1-2.272-.001 1.136 1.136 0 0 1 2.272 0Zm-27.272 0a1.135 1.135 0 1 1-2.27 0 1.135 1.135 0 0 1 2.27 0Zm-27.27 0a1.136 1.136 0 1 1-2.272-.001 1.136 1.136 0 0 1 2.272 0Zm-27.272 0a1.39 1.39 0 1 1-2.78 0 1.39 1.39 0 0 1 2.78 0Zm-27.78 0a1.645 1.645 0 1 1-3.29 0 1.645 1.645 0 0 1 3.29 0Zm-28.29 0a1.9 1.9 0 1 1-3.799 0 1.9 1.9 0 0 1 3.799 0Zm-28.799 0a2.154 2.154 0 1 1-4.308 0 2.154 2.154 0 0 1 4.308 0Zm-29.308 0a2.41 2.41 0 1 1-4.819 0 2.41 2.41 0 0 1 4.819 0Zm-29.819 0a2.663 2.663 0 1 1-5.326.001 2.663 2.663 0 0 1 5.326-.001Zm-30.327 0a2.919 2.919 0 1 1-5.837 0 2.919 2.919 0 0 1 5.837 0Zm-30.837 0a3.173 3.173 0 1 1-6.345.001 3.173 3.173 0 0 1 6.345 0Zm-31.346 0a3.428 3.428 0 1 1-6.856 0 3.428 3.428 0 0 1 6.856 0Zm-31.856 0a3.683 3.683 0 1 1-7.365 0 3.683 3.683 0 0 1 7.365 0Zm-32.365 0a3.937 3.937 0 1 1-7.875 0 3.937 3.937 0 0 1 7.875 0Zm-32.874 0a4.192 4.192 0 1 1-8.384 0 4.192 4.192 0 0 1 8.384 0Z\" fill=\"#FFF960\"\/><\/svg>\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\n\t\t<\/div>\n\t<\/div>\n<\/header>\n\n\n\n<div class=\"text bg--white\">\n\t<div class=\"container\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"text__content text__content--1-col\">\n\t\t\t<div id=\"pl-6449\"  class=\"panel-layout\" ><div id=\"pg-6449-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-6449-0-0\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><div id=\"pgc-6449-0-1\"  class=\"panel-grid-cell panel-grid-cell-mobile-last\" ><div id=\"panel-6449-0-1-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><span style=\"text-decoration: underline;\"><strong>The EU Cyber Resilience Act (CRA)<\/strong><\/span> entered into force on December 10, 2024, introducing mandatory cybersecurity requirements for manufacturers and retailers of products containing digital elements. For embedded developers, this regulation represents a fundamental shift in how connected devices must be designed, developed, and maintained throughout their lifecycle.<\/p>\n<h4><strong>What is the Cyber Resilience Act?<\/strong><\/h4>\n<p>The <strong>CRA<\/strong> aims to <strong>safeguard consumers<\/strong> and <strong>businesses<\/strong> buying software or hardware products with a digital component, addressing inadequate cybersecurity levels and lack of timely security updates in many products. The regulation applies to hardware and software products that are connected, directly or indirectly, to another device or network, including <strong>IoT devices<\/strong>, <strong>smart home products<\/strong> and <strong>embedded systems<\/strong>.<\/p>\n<h4 style=\"text-align: left;\">Timeline and Urgency<\/h4>\n<p><strong>Critical Dates:<\/strong><\/p>\n<ul>\n<li><strong>December 11, 2027:<\/strong> Main obligations take effect (36 months after entry into force)<\/li>\n<li><strong>September 11, 2026:<\/strong> Incident reporting requirements begin (21 months after entry into force)<\/li>\n<\/ul>\n<p><strong>The clock is ticking.<\/strong> Product manufacturers have <strong>less than three years<\/strong> to ensure their products comply with <strong>comprehensive cybersecurity requirements<\/strong>. Companies in scope are advised to begin preparing for the far-reaching legislative changes sooner than later.<\/p>\n<h4>Key Requirements for Embedded Products<\/h4>\n<h5>Essential Cybersecurity Standards<\/h5>\n<p>Products must be designed to be <strong>free of known vulnerabilities, have secure settings and access controls, protect data confidentiality, integrity and availability, limit data processing and attack surfaces, mitigate exploitation risks, and provide security logs.<\/strong><\/p>\n<h5>Mandatory Risk Assessment<\/h5>\n<p>Prior to placing products on the EU market, manufacturers must conduct a <strong>comprehensive cybersecurity risk assessment identifying and reducing risks, preventing security incidents, and protecting user health and safety throughout the product&#039;s lifecycle.<\/strong><\/p>\n<h5>Vulnerability Reporting<\/h5>\n<p>Manufacturers must report any actively exploited vulnerability to <strong>ENISA within 24 hours<\/strong> of detection and inform affected users as soon as possible.<\/p>\n<h5>Long-term Support Commitment<\/h5>\n<p>Manufacturers must provide <strong>ongoing support and security updates<\/strong> for <strong>at least five years<\/strong>, with updates remaining available for download for <strong>at least 10 years.<\/strong><\/p>\n<h4>Product Classification Impact<\/h4>\n<p>The CRA categorizes products into <strong>three risk levels:<\/strong><\/p>\n<p><strong>Default Products (90% or devices):<\/strong> Smart toys, TVs, refrigerators, and similar consumer devices can self-assess compliance.<\/p>\n<p><strong>Important Products (Class I):<\/strong> Browsers, password managers, antiviruses, firewalls, VPNs must adhere to harmonized standards or undergo third-party assessment.<\/p>\n<p><strong>Critical Products and Important Products (Class II):<\/strong> General-purpose microprocessors and certain firewalls require mandatory third-party assessment before market placement.<\/p>\n<h4>Compliance Requirements<\/h4>\n<h5><strong>Documentation and Certification<\/strong><\/h5>\n<p>Products meeting regulatory conformity assessment must affix a<strong> CE marking<\/strong>, with clear technical documentation and user instructions including security features and safe use guidelines.<\/p>\n<h5><strong>Supply Chain Security<\/strong><\/h5>\n<p>Manufacturers must ensure that components and software from third-party suppliers meet the <strong>CRA&#039;s cybersecurity requirements<\/strong>, including conducting due diligence and ongoing monitoring.<\/p>\n<h5><strong>Data Retention<\/strong><\/h5>\n<p>Companies must <strong>retain data inventory and documentation<\/strong> for <strong>10 years after being put on market<\/strong> or the support period, whichever is longer<\/p>\n<h4>Penalties and Enforcement<\/h4>\n<p>Non-compliance may result in fines of <strong>up to \u20ac15 million<\/strong> or <strong>2.5% or global annual turnover<\/strong>, whichever is higher. These penalties underscore the regulation&#039;s serious impact on embedded device manufacturers.<\/p>\n<h4><strong>Immediate Actions for Embedded Developers<\/strong><\/h4>\n<ol>\n<li><strong>Assess Product Portfolio:<\/strong> Determine which products fall under CRA scope and their risk classification<\/li>\n<li><strong>Review Development Processes:<\/strong> Integrate security-by-design principles into your development lifecycle<\/li>\n<li><strong>Implement Vulnerability Management:<\/strong> Establish processes for rapid vulnerability detection and reporting<\/li>\n<li><strong>Plan Long-term Support:<\/strong> Budget for extended security update commitments<\/li>\n<li><strong>Evaluate Supply Chain:<\/strong> Audit third-party components and suppliers for CRA compliance<\/li>\n<li><strong>Document Security Measures:<\/strong> Prepare comprehensive technical documentation and risk assessments<\/li>\n<\/ol>\n<h4>Logic Technology&#039;s Support<\/h4>\n<p><strong>The CRA<\/strong> represents both a challenge and an opportunity for embedded developers to build more secure, resilient products.<strong> At Logic Technology, we understand the complexity of implementing comprehensive cybersecurity<\/strong> measures while maintaining product performance and development efficiency.<\/p>\n<p>Our embedded development tools and expertise help you navigate CRA requirements by:<\/p>\n<ul>\n<li>Integrating security testing into your development workflow<\/li>\n<li>Providing static analysis and vulnerability detection capabilities<\/li>\n<li>Supporting secure coding practices and standards compliance<\/li>\n<li>Enabling comprehensive documentation and traceability<\/li>\n<\/ul>\n<p><strong>Don&#039;t wait until 2027.<\/strong> Start preparing your embedded products for CRA compliance today. The regulation&#039;s comprehensive requirements demand immediate attention to avoid costly redesigns and potential market delays.<\/p>\n<p><strong>Ready to ensure CRA compliance?<\/strong> Contact Logic Technology to learn how our embedded development solutions can help you build secure, compliant products that meet the EU&#039;s new cybersecurity standards.<\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-6449-0-2\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><\/div><div id=\"pg-6449-1\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-6449-1-0\"  class=\"panel-grid-cell\" ><div id=\"panel-6449-1-0-0\" class=\"so-panel widget widget_rtw-expert-widget panel-first-child panel-last-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-rtw-expert-widget so-widget-rtw-expert-widget-base\"\n\t\t\t\n\t\t><section class=\"o-expert\">\n\t<div class=\"container\">\n\t\t<div class=\"o-expert__wrapper\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"o-expert__wrapper-left\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"o-expert__wrapper-right\">\n\t\t\t\t<div class=\"top\">\n\t\t\t\t\t<div class=\"expert\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p>\n\t\t\t\t\t\t\t\tGevorg Melikdjanjan\t\t\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p>\n\t\t\t\t\t\t\t\tSecurity | Reliability | DataSolutions\t\t\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"bottom\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p>\n\t\t\t\t\t\t\tWould you like to receive the data sheet?\t\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t\t\t\t<div class=\"o-expert__actions\">\n\t\t\t\t\t\t<div class=\"o-expert__contact-links\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"o-expert__contact-links-separator\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"mailto:g.melikdjanjan@logic.nl\" target=\"_blank\" title=\"E-mail\">\n\t\t\t\t\t\t\t\t\t\t<svg class=\"svg--interface--icon-email-dims\"><use xlink:href=\"https:\/\/logic.nl\/wp-content\/themes\/logic-technology\/images\/svg\/svg-sprite.svg#interface--icon-email\"><\/use><\/svg>\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"tel:+31778200955\" target=\"_blank\" title=\"Phone\">\n\t\t\t\t\t\t\t\t\t\t<svg class=\"svg--interface--icon-phone-dims\"><use xlink:href=\"https:\/\/logic.nl\/wp-content\/themes\/logic-technology\/images\/svg\/svg-sprite.svg#interface--icon-phone\"><\/use><\/svg>\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"a-button button calendly\" href=\"https:\/\/calendly.com\/logic_gevorgmelikdjanjan\" target=\"_blank\">\n\t\t\t\t\t\t\t\t\tSchedule a meeting\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"a-button button chat\" href=\"https:\/\/voice-logic.my3cx.nl:5001\/gevorgmelikdjanjan\" target=\"_blank\">\n\t\t\t\t\t\t\t\t\tChat now\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/section><\/div><\/div><\/div><\/div><div id=\"pg-6449-2\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-6449-2-0\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><div id=\"pgc-6449-2-1\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><div id=\"pgc-6449-2-2\"  class=\"panel-grid-cell panel-grid-cell-empty panel-grid-cell-mobile-last\" ><\/div><div id=\"pgc-6449-2-3\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><\/div><\/div><p>The post <a href=\"https:\/\/logic.nl\/knowledge-center\/cyber-resilience-act-critical-cybersecurity-requirements\/\">Cyber Resilience Act: Critical Cybersecurity Requirements<\/a> appeared first on <a href=\"https:\/\/logic.nl\">Logic Technology<\/a>.<\/p>\n<p>Source: <a href=\"https:\/\/logic.nl\/knowledge-center\/cyber-resilience-act-critical-cybersecurity-requirements\/\">https:\/\/logic.nl\/knowledge-center\/cyber-resilience-act-critical-cybersecurity-requirements\/<\/a><\/p>\t\t<\/div>\n\t<\/div>\n<\/div>\r\n\t<div class=\"articles bg--offwhite automatic\">\r\n\t\t<div class=\"container\">\r\n\t\t\t<div class=\"articles__header\">\r\n\t\t\t\t\t\t\t\t\t<div class='heading-wrapper'><svg width=\"13\" height=\"13\" viewbox=\"0 0 13 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><circle cx=\"6.394\" cy=\"6.5\" r=\"6.394\" fill=\"#000\"\/><\/svg><h2>Related articles<\/h2><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"\/en\/profiel\/logic-technology-b-v\/\" class=\"button button--outline\">view profile<\/a>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<div class=\"post-grid post-grid--no-padding\">\r\n\t\t\t\t\n<a class=\"single-item single-item__articles\" href=\"https:\/\/fhi.nl\/en\/news\/slimme-circuitbreakers-die-stroomverbruik-in-rondom-je-machine-meten\/\" data-id=\"60228\">\n\t<div class=\"single-item__articles-icon\">\n\t\t<svg width=\"35\" height=\"35\" viewbox=\"0 0 35 35\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<mask id=\"mask0_1182_5532\" style=\"mask-type:luminance\" maskunits=\"userSpaceOnUse\" x=\"0\" y=\"0\" width=\"35\" height=\"35\">\n<path d=\"M0 0H35V35H0V0Z\" fill=\"white\"\/>\n<\/mask>\n<g mask=\"url(#mask0_1182_5532)\">\n<path d=\"M5.12695 9.22852H1.02539V31.9238H10.4299C12.2868 31.9238 14.0678 32.6615 15.3809 33.9746H19.6191C20.9322 32.6615 22.7132 31.9238 24.5701 31.9238H33.9746V11.2793H29.873\" stroke=\"#2A5CEE\" stroke-width=\"2\" stroke-miterlimit=\"10\"\/>\n<path d=\"M17.5 9.22852H18.1426C20.0088 7.89544 22.2237 7.17773 24.5615 7.17773H29.873V27.8223H24.5615C22.2237 27.8223 20.0088 28.54 18.1426 29.873H16.8574C14.9912 28.54 12.7763 27.8223 10.4385 27.8223H5.12695V5.12695H9.22852\" stroke=\"#2A5CEE\" stroke-width=\"2\" stroke-miterlimit=\"10\"\/>\n<path d=\"M9.22852 1.02539V21.6699C13.759 21.6699 17.5 25.3425 17.5 29.873V9.22852C17.5 4.698 13.759 1.02539 9.22852 1.02539Z\" stroke=\"#2A5CEE\" stroke-width=\"2\" stroke-miterlimit=\"10\"\/>\n<\/g>\n<\/svg>\n\t<\/div>\n\t<div class=\"single-item__articles-title\"><div class='heading-wrapper'><h3>Smart circuit breakers that measure power consumption in\/around your machine<\/h3><\/div><\/div>\n\t<div class=\"single-item__articles-terms\">\n\t\t\n\t\t\n\t\t\t\t\t\t<span class=\"button button--outline single-item__articles-term--branche single-item__articles-term\">Industrial automation<\/span>\n\t\t\t\t\t\t\t\t<span class=\"button button--outline single-item__articles-term--branche single-item__articles-term\">Industrial Electronics<\/span>\n\t\t\t\t\t\t\t\t<span class=\"button button--outline single-item__articles-term--branche single-item__articles-term\">Electromechanical components<\/span>\n\t\t\t\t\t\t\t\t<span class=\"button button--outline single-item__articles-term--branche single-item__articles-term\">Digitization<\/span>\n\t\t\t\t\t<\/div>\n\t<div class=\"single-item__articles-author-date-wrapper\">\n\t\t\t\t\t<div class=\"single-item__articles-author\">\n\t\t\t\tEATON Industries\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"single-item__articles-date\">\n\t\t\t\tNovember 29, 2024\t\t\t<\/div>\n\t\t\t<\/div>\n<\/a>\n\n<a class=\"single-item single-item__articles\" href=\"https:\/\/fhi.nl\/en\/news\/duurzaam-verwarmen-solid-state-relais-2\/\" data-id=\"53063\">\n\t<div class=\"single-item__articles-icon\">\n\t\t<svg width=\"35\" height=\"35\" viewbox=\"0 0 35 35\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<mask id=\"mask0_1182_5532\" style=\"mask-type:luminance\" maskunits=\"userSpaceOnUse\" x=\"0\" y=\"0\" width=\"35\" height=\"35\">\n<path d=\"M0 0H35V35H0V0Z\" fill=\"white\"\/>\n<\/mask>\n<g mask=\"url(#mask0_1182_5532)\">\n<path d=\"M5.12695 9.22852H1.02539V31.9238H10.4299C12.2868 31.9238 14.0678 32.6615 15.3809 33.9746H19.6191C20.9322 32.6615 22.7132 31.9238 24.5701 31.9238H33.9746V11.2793H29.873\" stroke=\"#2A5CEE\" stroke-width=\"2\" stroke-miterlimit=\"10\"\/>\n<path d=\"M17.5 9.22852H18.1426C20.0088 7.89544 22.2237 7.17773 24.5615 7.17773H29.873V27.8223H24.5615C22.2237 27.8223 20.0088 28.54 18.1426 29.873H16.8574C14.9912 28.54 12.7763 27.8223 10.4385 27.8223H5.12695V5.12695H9.22852\" stroke=\"#2A5CEE\" stroke-width=\"2\" stroke-miterlimit=\"10\"\/>\n<path d=\"M9.22852 1.02539V21.6699C13.759 21.6699 17.5 25.3425 17.5 29.873V9.22852C17.5 4.698 13.759 1.02539 9.22852 1.02539Z\" stroke=\"#2A5CEE\" stroke-width=\"2\" stroke-miterlimit=\"10\"\/>\n<\/g>\n<\/svg>\n\t<\/div>\n\t<div class=\"single-item__articles-title\"><div class='heading-wrapper'><h3>Sustainable heating? Solid state relay!<\/h3><\/div><\/div>\n\t<div class=\"single-item__articles-terms\">\n\t\t\n\t\t\n\t\t\t\t\t\t<span class=\"button button--outline single-item__articles-term--branche single-item__articles-term\">Heating and cooling equipment<\/span>\n\t\t\t\t\t\t\t\t<span class=\"button button--outline single-item__articles-term--branche single-item__articles-term\">Members content<\/span>\n\t\t\t\t\t<\/div>\n\t<div class=\"single-item__articles-author-date-wrapper\">\n\t\t\t\t\t<div class=\"single-item__articles-author\">\n\t\t\t\tElincom Electronics BV\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"single-item__articles-date\">\n\t\t\t\tSeptember 17, 2024\t\t\t<\/div>\n\t\t\t<\/div>\n<\/a>\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"featured_media":0,"template":"","branches":[],"events":[],"secretariat":[],"categories":[],"themes_tax":[],"content_types":[],"class_list":["post-72531","news","type-news","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Resilience Act: Critical Cybersecurity Requirements - FHI, federatie van technologiebranches<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fhi.nl\/en\/nieuws\/cyber-resilience-act-critical-cybersecurity-requirements\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Resilience Act: Critical Cybersecurity Requirements - FHI, federatie van technologiebranches\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fhi.nl\/en\/nieuws\/cyber-resilience-act-critical-cybersecurity-requirements\/\" \/>\n<meta property=\"og:site_name\" content=\"FHI, federatie van technologiebranches\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/fhi.nl\/nieuws\/cyber-resilience-act-critical-cybersecurity-requirements\/\",\"url\":\"https:\/\/fhi.nl\/nieuws\/cyber-resilience-act-critical-cybersecurity-requirements\/\",\"name\":\"Cyber Resilience Act: Critical Cybersecurity Requirements - FHI, federatie van technologiebranches\",\"isPartOf\":{\"@id\":\"https:\/\/fhi.nl\/#website\"},\"datePublished\":\"2025-09-02T12:37:20+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/fhi.nl\/nieuws\/cyber-resilience-act-critical-cybersecurity-requirements\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/fhi.nl\/nieuws\/cyber-resilience-act-critical-cybersecurity-requirements\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/fhi.nl\/nieuws\/cyber-resilience-act-critical-cybersecurity-requirements\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/fhi.nl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Nieuws\",\"item\":\"https:\/\/fhi.nl\/nieuws\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Resilience Act: Critical Cybersecurity Requirements\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/fhi.nl\/#website\",\"url\":\"https:\/\/fhi.nl\/\",\"name\":\"FHI, federatie van technologiebranches\",\"description\":\"Nederlandse branchevereniging voor technologiebranches\",\"publisher\":{\"@id\":\"https:\/\/fhi.nl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/fhi.nl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/fhi.nl\/#organization\",\"name\":\"FHI, federatie van technologiebranches\",\"url\":\"https:\/\/fhi.nl\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/fhi.nl\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/fhi.nl\/app\/uploads\/2024\/06\/3-e1722349014385.png\",\"contentUrl\":\"https:\/\/fhi.nl\/app\/uploads\/2024\/06\/3-e1722349014385.png\",\"width\":732,\"height\":136,\"caption\":\"FHI, federatie van technologiebranches\"},\"image\":{\"@id\":\"https:\/\/fhi.nl\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/fhi-federation-of-technology-branches\",\"https:\/\/www.instagram.com\/fhi_nl\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Resilience Act: Critical Cybersecurity Requirements - FHI, Federation of Technology Industries","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fhi.nl\/en\/nieuws\/cyber-resilience-act-critical-cybersecurity-requirements\/","og_locale":"en_GB","og_type":"article","og_title":"Cyber Resilience Act: Critical Cybersecurity Requirements - FHI, federatie van technologiebranches","og_url":"https:\/\/fhi.nl\/en\/nieuws\/cyber-resilience-act-critical-cybersecurity-requirements\/","og_site_name":"FHI, federatie van technologiebranches","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/fhi.nl\/nieuws\/cyber-resilience-act-critical-cybersecurity-requirements\/","url":"https:\/\/fhi.nl\/nieuws\/cyber-resilience-act-critical-cybersecurity-requirements\/","name":"Cyber Resilience Act: Critical Cybersecurity Requirements - FHI, Federation of Technology Industries","isPartOf":{"@id":"https:\/\/fhi.nl\/#website"},"datePublished":"2025-09-02T12:37:20+00:00","breadcrumb":{"@id":"https:\/\/fhi.nl\/nieuws\/cyber-resilience-act-critical-cybersecurity-requirements\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fhi.nl\/nieuws\/cyber-resilience-act-critical-cybersecurity-requirements\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/fhi.nl\/nieuws\/cyber-resilience-act-critical-cybersecurity-requirements\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/fhi.nl\/"},{"@type":"ListItem","position":2,"name":"Nieuws","item":"https:\/\/fhi.nl\/nieuws\/"},{"@type":"ListItem","position":3,"name":"Cyber Resilience Act: Critical Cybersecurity Requirements"}]},{"@type":"WebSite","@id":"https:\/\/fhi.nl\/#website","url":"https:\/\/fhi.nl\/","name":"FHI, federation of technology industries","description":"Dutch trade association for technology industries","publisher":{"@id":"https:\/\/fhi.nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fhi.nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/fhi.nl\/#organization","name":"FHI, federation of technology industries","url":"https:\/\/fhi.nl\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/fhi.nl\/#\/schema\/logo\/image\/","url":"https:\/\/fhi.nl\/app\/uploads\/2024\/06\/3-e1722349014385.png","contentUrl":"https:\/\/fhi.nl\/app\/uploads\/2024\/06\/3-e1722349014385.png","width":732,"height":136,"caption":"FHI, federatie van technologiebranches"},"image":{"@id":"https:\/\/fhi.nl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/fhi-federation-of-technology-branches","https:\/\/www.instagram.com\/fhi_nl\/"]}]}},"_links":{"self":[{"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/news\/72531","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/news"}],"about":[{"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/types\/news"}],"version-history":[{"count":0,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/news\/72531\/revisions"}],"wp:attachment":[{"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/media?parent=72531"}],"wp:term":[{"taxonomy":"branches","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/branches?post=72531"},{"taxonomy":"events","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/events?post=72531"},{"taxonomy":"secretariat","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/secretariat?post=72531"},{"taxonomy":"categories","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/categories?post=72531"},{"taxonomy":"themes","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/themes_tax?post=72531"},{"taxonomy":"content_types","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/content_types?post=72531"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}