Summary is AI-generated, newsdesk-reviewed
  • EU CRA requires SBOMs to identify vulnerabilities in networked devices and software.
  • ONEKEY launches enriched SBOM feature, including vulnerability classification and easy-to-use documentation.
  • Automated workflows improve vulnerability management, helping compliance with EU's Cyber Resilience Act.

The introduction of the EU Cyber Resilience Act (CRA) mandates that manufacturers and distributors of digital products with internet connectivity must provide a detailed Software Bill of Materials (SBOM). This requirement aims to expose potential software vulnerabilities, allowing them to be addressed promptly.

Under the CRA, networked devices, machines, and systems are required to have an exhaustive list of all programs, libraries, frameworks, and dependencies, including precise version numbers, licencing information, authorship details, and known security vulnerabilities. Manufacturers are facing challenges due to incomplete data from suppliers, resulting in SBOMs that often lack the necessary information to meet EU regulatory standards.

SBOM enhancement by ONEKEY

ONEKEY has introduced an innovative update to its platform, enhancing its capability to assess device

Düsseldorf-based cybersecurity firm ONEKEY has introduced an innovative update to its platform, enhancing its capability to assess device software (firmware) for security threats and generate enriched SBOMs.

These comprehensive Software Bills of Materials not only highlight vulnerabilities but also provide risk assessments within a single, consolidated file. According to ONEKEY's CEO, Jan Wendenburg, this turns the SBOM into a "security passport" that incorporates risk evaluation.

Wendenburg further stated, "The often complex supply chains and the frequent lack of understanding of EU-specific regulations among suppliers outside the European Union make it difficult to comply with the requirements of the Cyber Resilience Act." He views the new platform feature as a substantial step forward in addressing these compliance challenges.

Expanding beyond detection

The addition of this feature is part of ONEKEY’s broader strategy to bolster its platform, moving beyond mere vulnerability detection. Previously focused on identifying software weaknesses, the platform now aims to support manufacturers in managing these vulnerabilities more efficiently. "Identifying deficiencies is only the first step," comments Wendenburg. The enhanced platform aims to streamline cumbersome manual tasks, facilitating easier CRA compliance.

Through automated workflows, contextual evaluations, and audit-ready documentation, security and compliance teams can react more swiftly and adhere to regulatory standards. Wendenburg emphasised, "By enabling the platform to take on more and more routine tasks, we are giving specialists more time to focus on their most important task: maximising the security of their devices, machines, and systems."

Find out about secure physical access control systems through layered cybersecurity practices.

In case you missed it

What are emerging applications for physical security in transportation?
What are emerging applications for physical security in transportation?

Transportation systems need robust physical security to protect human life, to ensure economic stability, and to maintain national security. Because transportation involves moving...

Gallagher & Fortified enhance perimeter security solutions
Gallagher & Fortified enhance perimeter security solutions

Global security manufacturer - Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years...

Genetec: Data sovereignty in physical security
Genetec: Data sovereignty in physical security

Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more survei...