{"id":79016,"date":"2026-02-19T14:17:45","date_gmt":"2026-02-19T13:17:45","guid":{"rendered":"https:\/\/fhi.nl\/?page_id=79016"},"modified":"2026-02-19T14:25:27","modified_gmt":"2026-02-19T13:25:27","slug":"cybersecurity-of-embedded-systems-under-the-cyber-resilience-act-secure-operating-systems-and-device-management-as-key-enablers","status":"publish","type":"page","link":"https:\/\/fhi.nl\/en\/cybersecurity-of-embedded-systems-under-the-cyber-resilience-act-secure-operating-systems-and-device-management-as-key-enablers\/","title":{"rendered":"Cybersecurity of Embedded Systems under the Cyber Resilience Act: Secure Operating Systems and Device Management as Key Enablers"},"content":{"rendered":"<header id=\"header\" class=\"header header--low header--branch\">\n\n\t\n\t\t\t<div class=\"header__background header__background--graphic\"><\/div>\n\t\n\t<div class=\"container\">\n\t\t<div class=\"header__content\">\n\t\t\t<div class=\"header__first\">\n\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"header__navigation-button\">\n\t\t\t\t\t\t<a class=\"header__navigation-button__arrow\" target=\"_self\" href=\"https:\/\/fhi.nl\/en\/programma-dene\/\">\n\t\t\t\t\t\t\t<svg width=\"56\" height=\"33\" viewbox=\"0 0 56 33\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><rect x=\"56\" y=\"33\" width=\"56\" height=\"33\" rx=\"16.5\" transform=\"rotate(180 56 33)\" fill=\"#2dd881\"\/><path d=\"M22.262 22.456 16.294 16.5l5.968-5.956M39.706 16.5H16.293\" stroke=\"#fff\" stroke-width=\"2\" stroke-linecap=\"round\"\/><\/svg> Back to program\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t<h1 class=\"header__title\" >\n\t\t\t\t\tCybersecurity of Embedded Systems under the Cyber Resilience Act: Secure Operating Systems and Device Management as Key Enablers\t\t\t\t<\/h1>\n\n\t\t\t\t<div class=\"header__dots-line\">\n\t\t\t\t\t<svg width=\"431\" height=\"9\" viewbox=\"0 0 431 9\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M430.799 4.192a1.136 1.136 0 1 1-2.272-.001 1.136 1.136 0 0 1 2.272 0Zm-27.272 0a1.135 1.135 0 1 1-2.27 0 1.135 1.135 0 0 1 2.27 0Zm-27.27 0a1.136 1.136 0 1 1-2.272-.001 1.136 1.136 0 0 1 2.272 0Zm-27.272 0a1.39 1.39 0 1 1-2.78 0 1.39 1.39 0 0 1 2.78 0Zm-27.78 0a1.645 1.645 0 1 1-3.29 0 1.645 1.645 0 0 1 3.29 0Zm-28.29 0a1.9 1.9 0 1 1-3.799 0 1.9 1.9 0 0 1 3.799 0Zm-28.799 0a2.154 2.154 0 1 1-4.308 0 2.154 2.154 0 0 1 4.308 0Zm-29.308 0a2.41 2.41 0 1 1-4.819 0 2.41 2.41 0 0 1 4.819 0Zm-29.819 0a2.663 2.663 0 1 1-5.326.001 2.663 2.663 0 0 1 5.326-.001Zm-30.327 0a2.919 2.919 0 1 1-5.837 0 2.919 2.919 0 0 1 5.837 0Zm-30.837 0a3.173 3.173 0 1 1-6.345.001 3.173 3.173 0 0 1 6.345 0Zm-31.346 0a3.428 3.428 0 1 1-6.856 0 3.428 3.428 0 0 1 6.856 0Zm-31.856 0a3.683 3.683 0 1 1-7.365 0 3.683 3.683 0 0 1 7.365 0Zm-32.365 0a3.937 3.937 0 1 1-7.875 0 3.937 3.937 0 0 1 7.875 0Zm-32.874 0a4.192 4.192 0 1 1-8.384 0 4.192 4.192 0 0 1 8.384 0Z\" fill=\"#FFF960\"\/><\/svg>\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\t\t\t\t<div class=\"header__second\">\n\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"header__branch-logos\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/fhi.nl\/app\/uploads\/2024\/02\/Industriele-elektronica.svg\" class=\"header__branch-logo\" alt=\"\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t\t\n\t\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t<\/div>\n<\/header>\n\n\t<div class=\"header__meta\">\n\t<div class=\"container\">\n\t\t<div class=\"header__meta__category\">\n\n\t\t\t\t\t\t\t<div class=\"header__meta__detail\">\n\t\t\t\t\t<div>Branch<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/fhi.nl\/en\/kennishub\/?_branches_kennishub=industriele-elektronica\" class=\"header__meta__detail--branch\">\n\t\t\t\t\t\t\t\tIndustrial Electronics\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\n<div class=\"image-text bg--offwhite\">\n\t<div class=\"container\">\n\t\t<div class=\"image-text__wrapper image-text__wrapper--reverse\">\n\t\t\t<div class=\"image-text-image image-text-image--default\">\n\t\t\t\t\t\t\t\t\t<svg width=\"551\" height=\"326\" viewbox=\"0 0 551 326\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M539.801 241.758a5.29 5.29 0 0 1 5.29-5.286 5.29 5.29 0 0 1 5.29 5.286 5.29 5.29 0 0 1-5.29 5.287 5.29 5.29 0 0 1-5.29-5.287Zm-38.199-.002a4.968 4.968 0 0 1 4.968-4.965 4.968 4.968 0 0 1 4.969 4.965 4.968 4.968 0 0 1-9.937 0Zm-38.204.001a4.647 4.647 0 0 1 9.295 0 4.647 4.647 0 0 1-9.295 0Zm-38.199.001a4.326 4.326 0 0 1 8.652 0 4.326 4.326 0 0 1-8.652 0Zm-38.183-.004a4.004 4.004 0 0 1 8.009 0 4.005 4.005 0 0 1-8.009 0Zm-38.2.006a3.683 3.683 0 0 1 7.366 0 3.682 3.682 0 0 1-7.366 0Zm-38.191-.002a3.361 3.361 0 0 1 6.723 0 3.36 3.36 0 0 1-6.723 0Zm-38.203.001a3.04 3.04 0 0 1 6.08 0 3.04 3.04 0 0 1-6.08 0Zm-38.211.001a2.718 2.718 0 1 1 5.436.002 2.718 2.718 0 0 1-5.436-.002Zm-38.199-.002a2.397 2.397 0 1 1 4.793.001 2.397 2.397 0 0 1-4.793-.001Zm-38.192-.001a2.076 2.076 0 0 1 4.152 0 2.076 2.076 0 0 1-4.152 0Zm-38.203-.001a1.754 1.754 0 1 1 3.509.003 1.754 1.754 0 0 1-3.509-.003Zm-38.191.001a1.433 1.433 0 1 1 2.865.002 1.433 1.433 0 0 1-2.865-.002Zm458.375 39.376a5.29 5.29 0 0 1 5.29-5.286 5.29 5.29 0 0 1 5.29 5.286 5.29 5.29 0 0 1-5.29 5.287 5.29 5.29 0 0 1-5.29-5.287Zm-38.199.001a4.968 4.968 0 0 1 4.968-4.965 4.968 4.968 0 0 1 4.969 4.965 4.968 4.968 0 0 1-9.937 0Zm-38.204-.002a4.647 4.647 0 0 1 9.295 0 4.647 4.647 0 0 1-9.295 0Zm-38.199.001a4.326 4.326 0 0 1 8.652 0 4.326 4.326 0 0 1-8.652 0Zm-38.183-.002a4.004 4.004 0 0 1 8.009 0 4.005 4.005 0 0 1-8.009 0Zm-38.2.001a3.683 3.683 0 0 1 7.366 0 3.682 3.682 0 0 1-7.366 0Zm-38.191.001a3.361 3.361 0 0 1 6.723 0 3.36 3.36 0 0 1-6.723 0Zm-38.203.001a3.04 3.04 0 0 1 6.08 0 3.04 3.04 0 0 1-6.08 0Zm-38.211.001a2.718 2.718 0 1 1 5.436.002 2.718 2.718 0 0 1-5.436-.002Zm-38.199-.002a2.397 2.397 0 1 1 4.793.001 2.397 2.397 0 0 1-4.793-.001Zm-38.192-.001a2.076 2.076 0 0 1 4.152 0 2.076 2.076 0 0 1-4.152 0Zm-38.203-.001a1.754 1.754 0 1 1 3.509.003 1.754 1.754 0 0 1-3.509-.003Zm-38.191.001a1.433 1.433 0 1 1 2.865.002 1.433 1.433 0 0 1-2.865-.002Zm458.375 39.392a5.29 5.29 0 0 1 5.29-5.287 5.29 5.29 0 0 1 5.29 5.287 5.29 5.29 0 0 1-5.29 5.287 5.29 5.29 0 0 1-5.29-5.287Zm-38.199-.002a4.969 4.969 0 0 1 9.937 0 4.968 4.968 0 0 1-4.969 4.965 4.968 4.968 0 0 1-4.968-4.965Zm-38.204.001a4.647 4.647 0 0 1 9.295 0 4.647 4.647 0 0 1-9.295 0Zm-38.199.001a4.326 4.326 0 0 1 8.652 0 4.326 4.326 0 0 1-8.652 0Zm-38.183-.004a4.004 4.004 0 0 1 8.009 0 4.004 4.004 0 0 1-4.005 4.001 4.003 4.003 0 0 1-4.004-4.001Zm-38.2.003a3.683 3.683 0 0 1 7.366 0 3.682 3.682 0 0 1-7.366 0Zm-38.191 0a3.361 3.361 0 0 1 6.723 0 3.361 3.361 0 0 1-6.723 0Zm-38.203.001a3.04 3.04 0 0 1 6.08 0 3.04 3.04 0 0 1-6.08 0Zm-38.211.001a2.719 2.719 0 0 1 5.437 0 2.718 2.718 0 0 1-5.437 0Zm-38.199-.002a2.397 2.397 0 1 1 4.794.002 2.397 2.397 0 0 1-4.794-.002Zm-38.192-.001c0-1.146.93-2.074 2.076-2.074a2.075 2.075 0 1 1-2.076 2.074Zm-38.203 0a1.754 1.754 0 0 1 3.509 0 1.754 1.754 0 0 1-3.509 0Zm-38.191.001a1.433 1.433 0 1 1 2.865.002 1.433 1.433 0 0 1-2.865-.002ZM462.227 5.287a5.29 5.29 0 0 1 10.58 0 5.29 5.29 0 0 1-10.58 0Zm-38.196-.002a4.969 4.969 0 0 1 9.938 0 4.969 4.969 0 0 1-9.938 0Zm-38.207 0a4.647 4.647 0 0 1 9.295 0 4.647 4.647 0 0 1-9.295 0Zm-38.207.001a4.326 4.326 0 0 1 8.652 0 4.326 4.326 0 0 1-8.652 0Zm-38.172-.002a4.005 4.005 0 0 1 8.009 0 4.005 4.005 0 0 1-8.009 0Zm-38.203.006a3.683 3.683 0 0 1 7.366 0 3.682 3.682 0 0 1-7.366 0Zm-38.187-.004a3.361 3.361 0 0 1 6.723 0 3.361 3.361 0 0 1-6.723 0Zm-38.203.001a3.04 3.04 0 0 1 6.08 0 3.04 3.04 0 0 1-6.08 0Zm-38.215.001a2.718 2.718 0 1 1 5.436.002 2.718 2.718 0 0 1-5.436-.002Zm-38.207-.002a2.397 2.397 0 1 1 4.794.002 2.397 2.397 0 0 1-4.794-.002Zm-38.184-.001a2.076 2.076 0 1 1 4.152.002 2.076 2.076 0 0 1-4.152-.002Zm-38.203 0a1.754 1.754 0 1 1 3.509.002 1.754 1.754 0 0 1-3.509-.002Zm-38.191.001a1.433 1.433 0 1 1 2.865.001 1.433 1.433 0 0 1-2.865-.001Zm458.375 39.378a5.29 5.29 0 0 1 10.58 0 5.29 5.29 0 0 1-10.58 0Zm-38.196-.001a4.969 4.969 0 0 1 9.938 0 4.969 4.969 0 0 1-9.938 0Zm-38.207 0a4.647 4.647 0 0 1 9.295 0 4.647 4.647 0 0 1-9.295 0Zm-38.207.001a4.326 4.326 0 0 1 8.652 0 4.326 4.326 0 0 1-8.652 0Zm-38.172-.002a4.005 4.005 0 0 1 8.009 0 4.004 4.004 0 0 1-8.009 0Zm-38.203.004a3.683 3.683 0 0 1 7.366 0 3.683 3.683 0 0 1-7.366 0Zm-38.187-.002a3.361 3.361 0 0 1 6.723 0 3.361 3.361 0 0 1-6.723 0Zm-38.203.001a3.04 3.04 0 0 1 6.08 0 3.04 3.04 0 0 1-6.08 0Zm-38.215.001a2.718 2.718 0 0 1 5.437 0 2.718 2.718 0 0 1-5.437 0Zm-38.207-.002a2.397 2.397 0 1 1 4.794.002 2.397 2.397 0 0 1-4.794-.002Zm-38.184-.001a2.076 2.076 0 1 1 4.152.002 2.076 2.076 0 0 1-4.152-.002Zm-38.203 0a1.754 1.754 0 1 1 3.509.002 1.754 1.754 0 0 1-3.509-.002Zm-38.191.001a1.433 1.433 0 1 1 2.865.001 1.433 1.433 0 0 1-2.865-.001ZM0 202.38a5.29 5.29 0 0 1 5.29-5.286 5.29 5.29 0 0 1 5.29 5.286 5.29 5.29 0 0 1-10.58 0Zm38.848.001a4.968 4.968 0 0 1 4.968-4.965 4.968 4.968 0 0 1 4.97 4.965 4.968 4.968 0 0 1-9.938 0Zm38.828-.002a4.647 4.647 0 0 1 4.647-4.644 4.647 4.647 0 0 1 4.647 4.644 4.647 4.647 0 0 1-4.647 4.644 4.647 4.647 0 0 1-4.647-4.644Zm38.836.001a4.326 4.326 0 0 1 8.652 0 4.326 4.326 0 0 1-8.652 0Zm38.843-.002a4.005 4.005 0 0 1 8.009 0 4.004 4.004 0 0 1-8.009 0Zm38.856.001a3.683 3.683 0 0 1 7.366 0 3.683 3.683 0 0 1-7.366 0Zm38.832.001a3.361 3.361 0 0 1 6.723 0 3.36 3.36 0 0 1-6.723 0Zm38.844.001a3.04 3.04 0 0 1 6.08 0 3.04 3.04 0 0 1-6.08 0Zm38.84.001a2.718 2.718 0 1 1 5.436.002 2.718 2.718 0 0 1-5.436-.002Zm38.847-.002a2.397 2.397 0 0 1 4.795 0 2.396 2.396 0 0 1-2.397 2.395 2.397 2.397 0 0 1-2.398-2.395Zm38.832-.001a2.076 2.076 0 0 1 4.152 0 2.076 2.076 0 0 1-4.152 0Zm38.832 0a1.754 1.754 0 1 1 3.509.001 1.754 1.754 0 0 1-3.509-.001Zm38.848-.002a1.433 1.433 0 1 1 2.867.003 1.433 1.433 0 0 1-2.867-.003ZM0 162.993a5.29 5.29 0 0 1 10.58 0 5.29 5.29 0 0 1-5.29 5.286A5.29 5.29 0 0 1 0 162.993Zm38.848-.002a4.968 4.968 0 0 1 9.937 0 4.968 4.968 0 0 1-4.969 4.965 4.968 4.968 0 0 1-4.968-4.965Zm38.828.001a4.647 4.647 0 0 1 9.294 0 4.647 4.647 0 0 1-9.294 0Zm38.836 0a4.326 4.326 0 0 1 8.652 0 4.326 4.326 0 0 1-8.652 0Zm38.843-.004a4.004 4.004 0 0 1 4.005-4.001 4.003 4.003 0 0 1 4.004 4.001 4.004 4.004 0 0 1-8.009 0Zm38.856.003a3.682 3.682 0 0 1 7.366 0 3.683 3.683 0 0 1-7.366 0Zm38.832.001a3.361 3.361 0 0 1 6.723 0 3.361 3.361 0 0 1-6.723 0Zm38.844.001a3.04 3.04 0 0 1 6.08 0 3.04 3.04 0 0 1-6.08 0Zm38.84.001a2.718 2.718 0 1 1 5.436.002 2.718 2.718 0 0 1-5.436-.002Zm38.847-.002a2.397 2.397 0 0 1 4.795 0 2.397 2.397 0 0 1-4.795 0Zm38.832-.001a2.076 2.076 0 0 1 4.152 0c0 1.146-.93 2.074-2.076 2.074a2.075 2.075 0 0 1-2.076-2.074Zm38.832 0a1.754 1.754 0 0 1 3.509 0 1.754 1.754 0 0 1-3.509 0Zm38.848-.001a1.433 1.433 0 1 1 2.865.001 1.433 1.433 0 0 1-2.865-.001ZM0 123.424a5.29 5.29 0 0 1 5.29-5.286 5.29 5.29 0 0 1 5.29 5.286 5.29 5.29 0 0 1-10.58 0Zm38.848-.002a4.968 4.968 0 0 1 4.968-4.965 4.968 4.968 0 0 1 4.97 4.965 4.968 4.968 0 0 1-9.938 0Zm38.828.001a4.647 4.647 0 0 1 4.647-4.644 4.647 4.647 0 0 1 4.647 4.644 4.647 4.647 0 0 1-4.647 4.644 4.647 4.647 0 0 1-4.647-4.644Zm38.836.001a4.326 4.326 0 0 1 8.652 0 4.326 4.326 0 0 1-8.652 0Zm38.843-.004a4.005 4.005 0 0 1 8.009 0 4.004 4.004 0 0 1-8.009 0Zm38.856.003a3.683 3.683 0 0 1 7.366 0 3.683 3.683 0 0 1-7.366 0Zm38.832.001a3.362 3.362 0 0 1 6.723 0 3.36 3.36 0 0 1-6.723 0Zm38.844.001a3.04 3.04 0 0 1 6.08 0 3.04 3.04 0 0 1-6.08 0Zm38.84.001a2.718 2.718 0 1 1 5.436.002 2.718 2.718 0 0 1-5.436-.002Zm38.847-.002a2.397 2.397 0 0 1 4.795 0 2.396 2.396 0 0 1-2.397 2.395 2.397 2.397 0 0 1-2.398-2.395Zm38.832-.001a2.076 2.076 0 0 1 4.152 0 2.076 2.076 0 0 1-4.152 0Zm38.832-.001a1.754 1.754 0 1 1 3.509.003 1.754 1.754 0 0 1-3.509-.003Zm38.848-.001a1.433 1.433 0 1 1 2.867.003 1.433 1.433 0 0 1-2.867-.003ZM0 84.037a5.29 5.29 0 0 1 5.29-5.287 5.29 5.29 0 0 1 5.29 5.287 5.29 5.29 0 0 1-5.29 5.286A5.29 5.29 0 0 1 0 84.037Zm38.848 0a4.968 4.968 0 0 1 9.937 0 4.968 4.968 0 0 1-4.969 4.966 4.968 4.968 0 0 1-4.968-4.966Zm38.828-.002a4.647 4.647 0 0 1 9.294 0 4.647 4.647 0 0 1-9.294 0Zm38.836.001a4.326 4.326 0 0 1 8.652 0 4.326 4.326 0 0 1-8.652 0Zm38.843-.001a4.005 4.005 0 0 1 8.009 0 4.004 4.004 0 0 1-8.009 0Zm38.856 0a3.682 3.682 0 0 1 7.366 0 3.682 3.682 0 0 1-7.366 0Zm38.832.001a3.361 3.361 0 0 1 6.723 0 3.361 3.361 0 0 1-6.723 0Zm38.844.001a3.04 3.04 0 0 1 6.08 0 3.04 3.04 0 0 1-6.08 0Zm38.84.001a2.718 2.718 0 1 1 5.436.002 2.718 2.718 0 0 1-5.436-.002Zm38.847-.002a2.397 2.397 0 0 1 4.795 0 2.397 2.397 0 0 1-4.795 0Zm38.832-.001a2.076 2.076 0 1 1 4.151.002 2.076 2.076 0 0 1-4.151-.002Zm38.832 0a1.754 1.754 0 1 1 3.509.002 1.754 1.754 0 0 1-3.509-.002Zm38.848-.001a1.433 1.433 0 1 1 2.866.001 1.433 1.433 0 0 1-2.866-.001Z\" fill=\"#2A5CEE\"\/><\/svg>\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t<div class=\"image-text-content\">\n\t\t\t\t\t\t\t\t\t<div class='heading-wrapper'><svg width=\"13\" height=\"13\" viewbox=\"0 0 13 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><circle cx=\"6.394\" cy=\"6.5\" r=\"6.394\" fill=\"#000\"\/><\/svg><h2 class='image-text-content__title'>11.30 \u2013 11.55<\/h2><\/div>\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"image-text-content__text\"><p>The increasing connectivity of embedded systems in the world of Internet of Things (IoT) across industrial, medical, and consumer domains has significantly expanded their attack surface. With the adoption of the Cyber Resilience Act (CRA) in 2024, a harmonized cybersecurity framework for products with digital elements has been established across the EU. The entered into force in 2024, with most substantive obligations becoming applicable from December 2027, while mandatory regulatory vulnerability reporting obligations apply earlier, from September 2026. The CRA requires that products be designed, developed, and maintained according to state-of-the-art cybersecurity practices. Annex I mandates effective vulnerability handling and timely security updates, stating that products must be delivered \u201cwithout known exploitable vulnerabilities\u201d and equipped with secure update mechanisms by default.<\/p>\n<p>A major technical challenge lies in implementing secure and verifiable update mechanisms for resource-constrained embedded devices. The CRA requires that products \u201censure that vulnerabilities can be addressed through security updates\u201d and provide mechanisms for the \u201csecure distribution of updates.\u201d Therefore, device management infrastructures must enable authenticated, integrity-protected, and fail-safe remote updates while ensuring traceability and compliance with coordinated vulnerability disclosure and reporting obligations. Equally important is the deployment of a secure, hardware-optimized operating system forming a trusted computing base, including secure boot, minimal attack surface, tailored to the specific embedded system.<\/p>\n<p>Speaker: Frank Geissler, Sales Director \u2013 Kontron AIS (on behalf of Telerex Nederland)<\/p>\n<p><a class=\"header__button button\" href=\"https:\/\/events.fhi.nl\/DesignAutomationEmbeddedSystems-2026\" target=\"_blank\" rel=\"noopener\">Register<\/a><\/p>\n<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":43,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"branches":[13],"events":[361],"secretariat":[],"categories":[],"themes_tax":[],"class_list":["post-79016","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity of Embedded Systems under the Cyber Resilience Act: Secure Operating Systems and Device Management as Key Enablers - FHI, federatie van technologiebranches<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fhi.nl\/en\/cybersecurity-of-embedded-systems-under-the-cyber-resilience-act-secure-operating-systems-and-device-management-as-key-enablers\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity of Embedded Systems under the Cyber Resilience Act: Secure Operating Systems and Device Management as Key Enablers - FHI, federatie van technologiebranches\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fhi.nl\/en\/cybersecurity-of-embedded-systems-under-the-cyber-resilience-act-secure-operating-systems-and-device-management-as-key-enablers\/\" \/>\n<meta property=\"og:site_name\" content=\"FHI, federatie van technologiebranches\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-19T13:25:27+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/fhi.nl\/cybersecurity-of-embedded-systems-under-the-cyber-resilience-act-secure-operating-systems-and-device-management-as-key-enablers\/\",\"url\":\"https:\/\/fhi.nl\/cybersecurity-of-embedded-systems-under-the-cyber-resilience-act-secure-operating-systems-and-device-management-as-key-enablers\/\",\"name\":\"Cybersecurity of Embedded Systems under the Cyber Resilience Act: Secure Operating Systems and Device Management as Key Enablers - FHI, federatie van technologiebranches\",\"isPartOf\":{\"@id\":\"https:\/\/fhi.nl\/#website\"},\"datePublished\":\"2026-02-19T13:17:45+00:00\",\"dateModified\":\"2026-02-19T13:25:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/fhi.nl\/cybersecurity-of-embedded-systems-under-the-cyber-resilience-act-secure-operating-systems-and-device-management-as-key-enablers\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/fhi.nl\/cybersecurity-of-embedded-systems-under-the-cyber-resilience-act-secure-operating-systems-and-device-management-as-key-enablers\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/fhi.nl\/cybersecurity-of-embedded-systems-under-the-cyber-resilience-act-secure-operating-systems-and-device-management-as-key-enablers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/fhi.nl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity of Embedded Systems under the Cyber Resilience Act: Secure Operating Systems and Device Management as Key Enablers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/fhi.nl\/#website\",\"url\":\"https:\/\/fhi.nl\/\",\"name\":\"FHI, federatie van technologiebranches\",\"description\":\"Nederlandse branchevereniging voor technologiebranches\",\"publisher\":{\"@id\":\"https:\/\/fhi.nl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/fhi.nl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/fhi.nl\/#organization\",\"name\":\"FHI, federatie van technologiebranches\",\"url\":\"https:\/\/fhi.nl\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/fhi.nl\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/fhi.nl\/app\/uploads\/2024\/06\/3-e1722349014385.png\",\"contentUrl\":\"https:\/\/fhi.nl\/app\/uploads\/2024\/06\/3-e1722349014385.png\",\"width\":732,\"height\":136,\"caption\":\"FHI, federatie van technologiebranches\"},\"image\":{\"@id\":\"https:\/\/fhi.nl\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/fhi-federation-of-technology-branches\",\"https:\/\/www.instagram.com\/fhi_nl\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity of Embedded Systems under the Cyber Resilience Act: Secure Operating Systems and Device Management as Key Enablers - FHI, federatie van technologiebranches","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fhi.nl\/en\/cybersecurity-of-embedded-systems-under-the-cyber-resilience-act-secure-operating-systems-and-device-management-as-key-enablers\/","og_locale":"en_GB","og_type":"article","og_title":"Cybersecurity of Embedded Systems under the Cyber Resilience Act: Secure Operating Systems and Device Management as Key Enablers - FHI, federatie van technologiebranches","og_url":"https:\/\/fhi.nl\/en\/cybersecurity-of-embedded-systems-under-the-cyber-resilience-act-secure-operating-systems-and-device-management-as-key-enablers\/","og_site_name":"FHI, federatie van technologiebranches","article_modified_time":"2026-02-19T13:25:27+00:00","twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/fhi.nl\/cybersecurity-of-embedded-systems-under-the-cyber-resilience-act-secure-operating-systems-and-device-management-as-key-enablers\/","url":"https:\/\/fhi.nl\/cybersecurity-of-embedded-systems-under-the-cyber-resilience-act-secure-operating-systems-and-device-management-as-key-enablers\/","name":"Cybersecurity of Embedded Systems under the Cyber Resilience Act: Secure Operating Systems and Device Management as Key Enablers - FHI, federatie van technologiebranches","isPartOf":{"@id":"https:\/\/fhi.nl\/#website"},"datePublished":"2026-02-19T13:17:45+00:00","dateModified":"2026-02-19T13:25:27+00:00","breadcrumb":{"@id":"https:\/\/fhi.nl\/cybersecurity-of-embedded-systems-under-the-cyber-resilience-act-secure-operating-systems-and-device-management-as-key-enablers\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fhi.nl\/cybersecurity-of-embedded-systems-under-the-cyber-resilience-act-secure-operating-systems-and-device-management-as-key-enablers\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/fhi.nl\/cybersecurity-of-embedded-systems-under-the-cyber-resilience-act-secure-operating-systems-and-device-management-as-key-enablers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/fhi.nl\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity of Embedded Systems under the Cyber Resilience Act: Secure Operating Systems and Device Management as Key Enablers"}]},{"@type":"WebSite","@id":"https:\/\/fhi.nl\/#website","url":"https:\/\/fhi.nl\/","name":"FHI, federation of technology industries","description":"Dutch trade association for technology industries","publisher":{"@id":"https:\/\/fhi.nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fhi.nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/fhi.nl\/#organization","name":"FHI, federation of technology industries","url":"https:\/\/fhi.nl\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/fhi.nl\/#\/schema\/logo\/image\/","url":"https:\/\/fhi.nl\/app\/uploads\/2024\/06\/3-e1722349014385.png","contentUrl":"https:\/\/fhi.nl\/app\/uploads\/2024\/06\/3-e1722349014385.png","width":732,"height":136,"caption":"FHI, federatie van technologiebranches"},"image":{"@id":"https:\/\/fhi.nl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/fhi-federation-of-technology-branches","https:\/\/www.instagram.com\/fhi_nl\/"]}]}},"_links":{"self":[{"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/pages\/79016","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/users\/43"}],"replies":[{"embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/comments?post=79016"}],"version-history":[{"count":2,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/pages\/79016\/revisions"}],"predecessor-version":[{"id":79019,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/pages\/79016\/revisions\/79019"}],"wp:attachment":[{"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/media?parent=79016"}],"wp:term":[{"taxonomy":"branches","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/branches?post=79016"},{"taxonomy":"events","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/events?post=79016"},{"taxonomy":"secretariat","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/secretariat?post=79016"},{"taxonomy":"categories","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/categories?post=79016"},{"taxonomy":"themes","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/themes_tax?post=79016"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}