There is a large number of new EU regulations relating to cyber security. Examples include: Cyber Resilience Act (2024/2847), Radio Equipment Directive (2022/30), GPSR (2023/988), Machinery Regulation (2023/1230), NIS-2 (2022/2555), Product Liability Directive (2024/2853), Construction Products Regulation (2024/3110).
Whether DDoS overload attacks stem from 1.6 million compromised TVs (Vo1d), or 49,000 poorly configured access systems exposing information worth protecting, the motivations for better cyber security of networked end products are manifold.
Fig. Assessment of cyber security risks
Under the Cyber Resilience Act (EU) 2024/2847, manufacturers of products with digital elements are required to carry out a cyber security risk assessment. This takes into account the entire life cycle with its planning, design, development, manufacturing, delivery and maintenance phases.
The aim of this article is to build a mental bridge from product safety-related risk assessment to the assessment of cyber security risks.
The purpose of a risk assessment can be manifold. In my practice, it has mostly been product safety assessments, e.g. in connection with the planning and design of an electrical product (see CENELEC Guide 32:2014), or also during the marketing phase to assess possible product defects and their risks in the field (see RAPEX).
For all those people who also have the product safety-related risk assessment school of thought as a starting point, I would like to outline practical steps that are necessary in the context of cyber security in order to then build on the proven methodology. The proven methodology refers to the estimation of the probability of occurrence in combination with the extent of damage that turns an identified hazard into a risk.
The key question is therefore: How do we move from product safety-related risk assessment to the assessment of cyber security risks?
Dr. Gerhard Wiebe, Johannes Daelen and I, Benjamin Kerger, discuss the regulation of product-related cybersecurity in detail in an article published in February 2025 in Kommunikation & Recht (issue 02, in German).
A frequently encountered visualization to explain cybersecurity risks is formed by three sets of circles that have a common intersection, the so-called triad. The individual sets are
- the threat (=threat),
- the asset worth protecting (=asset)
- and the vulnerability.
The common intersection is the risk.
However, it is unclear which sets must overlap in order to lead to a risk. Alternatively, there are also only two circle quantities, or alternatively the damage (=consequence)
in place of another factor. Personally, none of these metaphorical drawings help me in my practical work.
I take the position that there must first and foremost be a good worth protecting and a protection goal. This couple can be exposed to a threat. However, this threat only becomes a threat through a vulnerability.
At this point, we are already back in safe waters. We have a threat. As with the product safety-related risk assessment, we may now estimate (*) the probability of occurrence and the potential damage and thus arrive at the risk we are looking for. Et voilà!
(*) Why "may" and not "must"?
The toolbox is diverse. There are numerous approaches for identifying threats and assessing risks. See, for example, ETSI TR 103 935 V1.1.1 (2023-12) for alternative methods: STRIDE, DREAD, MITRE ATT&CK, Attack Trees, Data-Centric Threat Modeling, Threat Vulnerability and Risk Analysis (TVRA).
With DREAD, we have an alternative approach to matrix-based risk assessment by determining the probability of occurrence and the extent of damage. The identified threats can be prioritized using the DREAD method. After scoring (e.g. 1 to 10) the individual questions of the DREAD score, the total is calculated and thus provides a priority score for each threat.
- Damage - how bad would an attack be?
- Reproducibility - how easy is the attack to reproduce?
- Exploitability - how much effort is required to launch the attack?
- Affected users - how many people are affected?
- Discoverability - how easy is it to detect the threat?
Depending on the priority indicator, cyber security measures can then be defined and taken in accordance with Annex I Part I of the CRA in order to adequately counter the identified risks.
We look forward to receiving suggestions and exchanging ideas on how you assess cyber security risks in practice. One opportunity for this exchange will be at the 13th GLOBALNORM PRODUCT COMPLIANCE CONFERENCE (in German) on September 16 + 17, 2025 in Berlin.
Author's note
This article has been machine translated into English.
TERMS AND ABBREVIATIONS
The Cyber Resilience Act (2024/2847) sets out cyber security requirements for hardware and software products placed on the market by companies in the European Economic Area.
The Construction Products Regulation (2024/3110) applies to all products that are permanently integrated into construction works and whose function affects the essential requirements of the construction work.
The Radio Equipment Directive (2022/30) sets out the essential health and safety requirements that radio equipment must meet.
The Machinery Directive (2023/1230) specifies, among other things, the health and safety requirements that must be met in the design and construction of machinery and other products within the scope of application before they can be placed on the market or put into service.
NIS-2 (2022/2555) is an EU directive intended to strengthen the level of cyber resilience in the Union.
The Product Liability Directive (2024/2853) tightens product liability law and applies to all products that are placed on the market or put into service after December 9, 2026.
DDoS: Distributed Denial of Service
CENELEC: European Committee for Electrotechnical Standardization