{"id":6022,"date":"2024-11-25T08:07:23","date_gmt":"2024-11-25T08:07:23","guid":{"rendered":"https:\/\/gitprotect.io\/blog\/?p=6022"},"modified":"2025-01-31T09:02:19","modified_gmt":"2025-01-31T09:02:19","slug":"cyber-resilience-act-what-does-it-mean-for-your-digital-business","status":"publish","type":"post","link":"https:\/\/gitprotect.io\/blog\/cyber-resilience-act-what-does-it-mean-for-your-digital-business\/","title":{"rendered":"Cyber Resilience Act: What Does It Mean For Your Digital Business?"},"content":{"rendered":"\n<p>Software developers push thousands of lines of code every day, helping enterprises shape the tools and applications we all rely on, starting from <a href=\"https:\/\/gitprotect.io\/industries\/finance-and-banking.html\" target=\"_blank\" rel=\"noreferrer noopener\"><u>banking<\/u><\/a> to entertainment. However, we shouldn\u2019t forget that behind every successful deployment lies a hidden challenge &#8211; what cyber security measures should be taken to protect the source code, hardware and software products, and critical company and customer data?\u00a0<\/p>\n\n\n\n<!--more-->\n\n\n\n<p>To help digital businesses address cyber threats and improve their cyber resilience, the European Commission proposed Cyber Resilience Act (CRA). So, let\u2019s get a sneak peek at what CRA is, how to meet its requirements, and actually who should follow that regulation.&nbsp;<\/p>\n\n\n\n\n\n<h2 class=\"wp-block-heading\">EU Cyber Resilience Act: who is it for?<\/h2>\n\n\n\n<p>Before we jump at understanding what the CRA is, let\u2019s figure out who this cyber legislation is for. Well, the reach of it is wide &#8211; from the companies that operate within the European Union to those that operate outside but supply their services or products to the EU markets.&nbsp;<\/p>\n\n\n\n<p>Digital technologies such as smart devices, operating systems, software &#8211; all of the mentioned is in the focus of the CRA. A broad range of industries, encompassing hardware and software manufacturers, Internet of Things (IoT), device providers, and developers of network-connected critical infrastructure should follow the requirements of the Cyber Resilience Act.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Are there any exceptions?<\/h3>\n\n\n\n<p>Free and open-source software that is freely available and not generating income doesn\u2019t fall under the Cyber Resilience Act.<\/p>\n\n\n\n<p>The exception here is open-source software from which developers can derive income, for example, if it has paid support or commercial data use &#8211; then, it will need to comply with the CRA.&nbsp;<\/p>\n\n\n\n<p>Also, pure SaaS providers that do not process remote data are excluded from the CRA and they shouldn\u2019t comply with the regulation\u2019s requirements.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What the EU Cyber Resilience Act is<\/h2>\n\n\n\n<p>Proposed in 2022 by the European Commission and passed by the European Parliament in March 2024, the EU Cyber Resilience Act comes into force on December 10th, 2024. Since that moment organizations have 3 years to ensure that their services and products meet the CRA\u2019s requirements to remain eligible for operating in the EU.<\/p>\n\n\n\n<p>The main goal of this EU legislation is to address the issue of low-level cybersecurity measures and vulnerabilities that companies face. According to <a href=\"https:\/\/www.cyberresilienceact.eu\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><u>the CRA\u2019s findings<\/u><\/a>:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>\u201cEuropean organizations are the most targeted in the world by cyber attacks\u2026 Attacks will cost US$ 10.5 trillion by 2025, a 15% increase in cost every year.\u201d<\/em><\/p>\n<\/blockquote>\n\n\n\n<h3 class=\"wp-block-heading\">The key CRA\u2019s goals<\/h3>\n\n\n\n<p>Well, let\u2019s sum up the top goals the European Commission sees by adopting the legislation:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Ensure higher levels of security for all internet-connected devices and software in the European single market<\/li>\n\n\n\n<li>Mandate manufacturers to maintain cybersecurity responsibility throughout a product\u2019s life cycle<\/li>\n\n\n\n<li>Provide customers with accurate and comprehensive information about their products&#8217; cybersecurity features<\/li>\n\n\n\n<li>Harmonize regulatory requirements to eliminate overlaps and simplify compliance for device manufacturers<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">The top benefits of complying with the Cyber Resilience Act<\/h3>\n\n\n\n<p>Why does the European Cyber Resilience Act matter? Why not take a look at the benefits it brings to both businesses and their customers? So, the the cybersecurity act:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>ensures a unified approach to IoT security across the EU, simplifying compliance for manufacturers and avoiding regulatory overlap;<\/li>\n\n\n\n<li>reduces the risk of cyberattacks, safeguarding businesses and consumers from data breaches, financial losses, and reputational harm;<\/li>\n\n\n\n<li>helps prevent costly data breach incidents, potentially saving businesses millions;<\/li>\n\n\n\n<li>boosts customer trust through improved security, encouraging demand for secure digital products;<\/li>\n\n\n\n<li>provides clear, accessible information about devices, empowering customers to make informed choices;<\/li>\n\n\n\n<li>strengthens data and privacy safeguards, ensuring IoT-collected data is secure from breaches.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Risk-based classification of products and services<\/h3>\n\n\n\n<p>According to the associated cybersecurity risk level, the EU CRA divides products into a few categories:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>default or a non-critical one, which covers 90% of all the products on the EU market,<\/li>\n\n\n\n<li>important, which, in turn, is divided into Class I and Class II,<\/li>\n\n\n\n<li>and critical.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">Default or non-compliance products<\/h4>\n\n\n\n<p>As we have already mentioned the majority of products, to be precise, almost 90% fall into this category. Such products as smart coffee makers or refrigerators, games, photo editing software, non-critical wearables, like fitness trackers, and so on this group.<\/p>\n\n\n\n<p>However, while they have lower risk, they are still subject to the general cybersecurity and vulnerability handling requirements of the CRA.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Important products<\/h4>\n\n\n\n<p>The EU Cyber Resilience Act divides important products into two categories. The first is Class I, which includes password managers, operating systems, identity management systems and privileged access management software, security information and event management (SIEM) systems, VPNs, boot managers, personal wearable products, and medical devices for health monitoring and children, and so on.<\/p>\n\n\n\n<p>The products from Class II relate to higher cybersecurity risk than those from Class I. Here we can mention tamper-resistant microprocessors and microcontrollers, firewalls, intrusion detection or prevention systems, antiviruses and anti-malware, etc.&nbsp;<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Critical products<\/h4>\n\n\n\n<p>To the most regulated group, we can attribute smartcards or similar devices that include secure elements, secure hardware devices with security boxes, cryptoprocessors, and more.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What are your duties within the CRA?<\/h2>\n\n\n\n<p>The EU Cyber Resilience Act places a wide range of duties on hardware and software producers. And these obligations cover the entire product lifecycle, covering both cybersecurity requirements and vulnerability ones. So, the essential cybersecurity requirements of the CRA include:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>Requirement<\/strong><\/td><td><strong>Explanation<\/strong><\/td><\/tr><tr><td><strong>Risk-based design<\/strong><\/td><td>Ensure security based on the associated cybersecurity risks during the design and development phase, and the production<\/td><\/tr><tr><td><strong>No exploitable vulnerabilities<\/strong><\/td><td>Products must be free of known exploitable vulnerabilities when released<\/td><\/tr><tr><td><strong>Secure-by-default Configuration<\/strong><\/td><td>Offer a secure default configuration with reset options for tailored solutions<\/td><\/tr><tr><td><strong>Security updates<\/strong><\/td><td>Provide mechanisms for timely updates, including automatic updates with user opt-out options<\/td><\/tr><tr><td><strong>Access control<\/strong><\/td><td>Protect against unauthorized access using authentication and access management systems and appropriate control mechanisms<\/td><\/tr><tr><td><strong>Data protection<\/strong><\/td><td>Safeguard data confidentiality with encryption and other state-of-the-art methods<\/td><\/tr><tr><td><strong>Data integrity<\/strong><\/td><td>Prevent unauthorized modifications and report data corruption<\/td><\/tr><tr><td><strong>Data minimization<\/strong><\/td><td>Limit data processing to what is necessary for the product&#8217;s purpose<\/td><\/tr><tr><td><strong>Function availability<\/strong><\/td><td>Maintain essential functions after cybersecurity incidents using resilience measures<\/td><\/tr><tr><td><strong>Minimized interference<\/strong><\/td><td>Avoid negatively impacting other devices or networks&#8217; availability<\/td><\/tr><tr><td><strong>Attack surface limitation<\/strong><\/td><td>Design to reduce external interfaces vulnerable to attacks<\/td><\/tr><tr><td><strong>Incident mitigation<\/strong><\/td><td>Use mechanisms to minimize the impact of incidents<\/td><\/tr><tr><td><strong>Activity monitoring<\/strong><\/td><td>Record internal activities like data access and modifications, with opt-out options for users<\/td><\/tr><tr><td><strong>Data removal<\/strong><\/td><td>Provide users the ability to securely erase data and transfer it securely when needed<\/td><\/tr><tr><td><strong>Vulnerability documentation<\/strong><\/td><td>Identify and document vulnerabilities with a software bill of materials<\/td><\/tr><tr><td><strong>Rapid remediation<\/strong><\/td><td>Address vulnerabilities without delay and provide security updates<\/td><\/tr><tr><td><strong>Regular testing<\/strong><\/td><td>Conduct periodic security tests and reviews<\/td><\/tr><tr><td><strong>Public disclosure<\/strong><\/td><td>Share information on fixed vulnerabilities, impacts, and mitigation steps post-update<\/td><\/tr><tr><td><strong>Disclosure policy<\/strong><\/td><td>Implement a coordinated vulnerability disclosure policy<\/td><\/tr><tr><td><strong>Information sharing<\/strong><\/td><td>Enable reporting of vulnerabilities through a dedicated contact channel<\/td><\/tr><tr><td><strong>Update distribution<\/strong><\/td><td>Ensure secure and timely updates, with security updates provided separately from functionality updates<\/td><\/tr><tr><td><strong>Free security updates<\/strong><\/td><td>Offer security updates free of charge, accompanied by clear advisory messages<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Meeting compliance &#8211; steps to take<\/h2>\n\n\n\n<p>Even though the EU Cyber Resilience Act will come into full force after December 11th, 2027, it\u2019s already time to start thinking about how to meet the legislation\u2019s requirements.&nbsp;<\/p>\n\n\n\n<p>First, it\u2019s important to understand for which group, non-critical, important (Class I and Class II), or critical, the digital product or service you provide falls into.<\/p>\n\n\n\n<p>After that, it\u2019s vital to assess your security measures and how they meet the EU CRA requirements. Thus, you will be able to build a strategy to complete these security gaps until the regulation is in its full effect.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The EU CRA and other compliance regulations<\/h3>\n\n\n\n<p>The Cyber Resilience Act is a vital part of the European Commission\u2019s strategy for improving and strengthening the cybersecurity posture of organizations that operate in the European Union. The regulation complements the <a href=\"https:\/\/gitprotect.io\/blog\/nis-2-explained-security-compliance-path\/\" target=\"_blank\" rel=\"noreferrer noopener\"><u>NIS 2 Directive<\/u><\/a> (Network and Information Security Directive), which came into effect on January 16th, 2023.\u00a0<\/p>\n\n\n\n<p>Though the CRA and NIS2 have a lot in common they are a bit different. The Cyber Resilience Act addresses a wider range of digital products and services without any focus on industries or sectors. The NIS 2 Directive, on the other hand, focal point is on particular industries and vital infrastructures.<\/p>\n\n\n\n<p>What is worth mentioning is that if an organization that provides software is already covered by the NIS2 Directive, it doesn\u2019t need to comply with the CRA for features already covered in it, as both the NIS2 and the CRA meet similar cybersecurity requirements under the European regulations.&nbsp;<\/p>\n\n\n\n<p>Moreover, if the organization has already complied with the AI Regulation, it may also not need to comply with the CRA. Why? High-risk AI systems already covered by the AI Regulation do not need to meet full CRA requirements unless features not covered by the AI Regulation are relevant.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The CRA and backup &amp; Disaster Recovery<\/h2>\n\n\n\n<p>The EU CRA, like other straightened security regulations requires organizations to react fast to disasters and ensure resilience in case of an incident. Here are just some of the quotes from <a href=\"https:\/\/www.cyberresilienceact.eu\/the-cyber-resilience-act-annex-eu\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\"><u>the CRA\u2019s Annexes<\/u><\/a>:\u00a0<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p><em>\u201cOn the basis of the cybersecurity risk assessment referred to in Article 13(2) and where applicable, products with digital elements shall: [\u2026]<\/em><\/p>\n\n\n\n<p><em>(k) be designed, developed and produced to reduce the impact of an incident using appropriate exploitation mitigation mechanisms and techniques; [&#8230;]<\/em><\/p>\n\n\n\n<p><em>(h) protect the availability of essential and basic functions, also after an incident, including through resilience and mitigation measures against denial-of-service attacks;\u201d<\/em><\/p>\n<\/blockquote>\n\n\n\n<p>It means that properly built <a href=\"https:\/\/gitprotect.io\/blog\/devops-security-data-protection-best-practices\/\" target=\"_blank\" rel=\"noreferrer noopener\"><u>data protection measures<\/u><\/a>, including backup and Disaster Recovery, are important for organizations to ensure their cyber resilience and business continuity.<\/p>\n\n\n\n<p>With <a href=\"https:\/\/gitprotect.io\/\" target=\"_blank\" rel=\"noreferrer noopener\"><u>GitProtect backup &amp; Disaster Recovery software for DevOps<\/u><\/a>, digital companies can make sure that in any incident, they can restore their data quickly and eliminate data loss.<\/p>\n\n\n\n<p class=\"has-background\" style=\"background-color:#f4fafe\"><a href=\"https:\/\/gitprotect.io\/sign-up.html\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>[FREE TRIAL] Ensure compliant DevOps backup and recovery with a 14-day trial<\/strong><\/a><strong>\ud83d\ude80<\/strong><br><br><a href=\"https:\/\/calendly.com\/d\/3s9-n9z-pgc\/gitprotect-live-demo?month=2024-11\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>[CUSTOM DEMO] Let\u2019s talk about how backup &amp; DR software for DevOps tools can help you mitigate the risks<\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Software developers push thousands of lines of code every day, helping enterprises shape the tools and applications we all rely on, starting from banking to entertainment. However, we shouldn\u2019t forget that behind every successful deployment lies a hidden challenge &#8211; what cyber security measures should be taken to protect the source code, hardware and software products, and critical company and customer data?\u00a0<\/p>\n","protected":false},"author":8,"featured_media":6025,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[100,4,2,3,70,73],"tags":[],"class_list":["post-6022","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-azure-devops","category-bitbucket","category-git-backup-101","category-github","category-gitlab","category-jira","post--single"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Resilience Act: What Does It Mean For Your Digital Business? - Blog | GitProtect.io<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/gitprotect.io\/blog\/cyber-resilience-act-what-does-it-mean-for-your-digital-business\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Resilience Act: What Does It Mean For Your Digital Business? - Blog | GitProtect.io\" \/>\n<meta property=\"og:description\" content=\"Software developers push thousands of lines of code every day, helping enterprises shape the tools and applications we all rely on, starting from banking to entertainment. However, we shouldn\u2019t forget that behind every successful deployment lies a hidden challenge &#8211; what cyber security measures should be taken to protect the source code, hardware and software products, and critical company and customer data?\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/gitprotect.io\/blog\/cyber-resilience-act-what-does-it-mean-for-your-digital-business\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog | GitProtect.io\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XoperoSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-25T08:07:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-31T09:02:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/11\/CRA-top-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Daria Kulikova, Content Writer at GitProtect.io\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@GitProtectio\" \/>\n<meta name=\"twitter:site\" content=\"@GitProtectio\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Daria Kulikova, Content Writer at GitProtect.io\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/gitprotect.io\/blog\/cyber-resilience-act-what-does-it-mean-for-your-digital-business\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/cyber-resilience-act-what-does-it-mean-for-your-digital-business\/\"},\"author\":{\"name\":\"Daria Kulikova, Content Writer at GitProtect.io\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/6618fde5a7cf7e327fefa4f0035466d3\"},\"headline\":\"Cyber Resilience Act: What Does It Mean For Your Digital Business?\",\"datePublished\":\"2024-11-25T08:07:23+00:00\",\"dateModified\":\"2025-01-31T09:02:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/cyber-resilience-act-what-does-it-mean-for-your-digital-business\/\"},\"wordCount\":1665,\"publisher\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/cyber-resilience-act-what-does-it-mean-for-your-digital-business\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/11\/CRA-top-1.png\",\"articleSection\":[\"Azure DevOps\",\"Bitbucket\",\"Git Backup 101\",\"GitHub\",\"GitLab\",\"Jira\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/gitprotect.io\/blog\/cyber-resilience-act-what-does-it-mean-for-your-digital-business\/\",\"url\":\"https:\/\/gitprotect.io\/blog\/cyber-resilience-act-what-does-it-mean-for-your-digital-business\/\",\"name\":\"Cyber Resilience Act: What Does It Mean For Your Digital Business? - Blog | GitProtect.io\",\"isPartOf\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/cyber-resilience-act-what-does-it-mean-for-your-digital-business\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/cyber-resilience-act-what-does-it-mean-for-your-digital-business\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/11\/CRA-top-1.png\",\"datePublished\":\"2024-11-25T08:07:23+00:00\",\"dateModified\":\"2025-01-31T09:02:19+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/cyber-resilience-act-what-does-it-mean-for-your-digital-business\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/gitprotect.io\/blog\/cyber-resilience-act-what-does-it-mean-for-your-digital-business\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gitprotect.io\/blog\/cyber-resilience-act-what-does-it-mean-for-your-digital-business\/#primaryimage\",\"url\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/11\/CRA-top-1.png\",\"contentUrl\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/11\/CRA-top-1.png\",\"width\":1200,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/gitprotect.io\/blog\/cyber-resilience-act-what-does-it-mean-for-your-digital-business\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\/\/gitprotect.io\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Resilience Act: What Does It Mean For Your Digital Business?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#website\",\"url\":\"https:\/\/gitprotect.io\/blog\/\",\"name\":\"GitProtect.io Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/gitprotect.io\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#organization\",\"name\":\"GitProtect.io\",\"url\":\"https:\/\/gitprotect.io\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/05\/favicon-528x528-1.png\",\"contentUrl\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/05\/favicon-528x528-1.png\",\"width\":528,\"height\":528,\"caption\":\"GitProtect.io\"},\"image\":{\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/XoperoSoftware\/\",\"https:\/\/x.com\/GitProtectio\",\"https:\/\/www.linkedin.com\/company\/xopero-software\/\",\"https:\/\/www.youtube.com\/channel\/UCiEnl6n0mIO6w7twccz-l2w\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/6618fde5a7cf7e327fefa4f0035466d3\",\"name\":\"Daria Kulikova, Content Writer at GitProtect.io\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/09\/daria-kulikova-content-writer-at-gitprotect.io_avatar-96x96.jpg\",\"contentUrl\":\"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/09\/daria-kulikova-content-writer-at-gitprotect.io_avatar-96x96.jpg\",\"caption\":\"Daria Kulikova, Content Writer at GitProtect.io\"},\"description\":\"Daria is a Content Specialist at GitProtect.io, who has a degree in linguistics and an extensive translation background in different areas, including technology, IT, economics, etc. She loves self-improvement, so when she is offline, it\u2019s easy to find her learning and expanding her knowledge in Cybersecurity, and DevSecOps.\",\"url\":\"https:\/\/gitprotect.io\/blog\/author\/daria-kulikova\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Resilience Act: What Does It Mean For Your Digital Business? - Blog | GitProtect.io","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/gitprotect.io\/blog\/cyber-resilience-act-what-does-it-mean-for-your-digital-business\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Resilience Act: What Does It Mean For Your Digital Business? - Blog | GitProtect.io","og_description":"Software developers push thousands of lines of code every day, helping enterprises shape the tools and applications we all rely on, starting from banking to entertainment. However, we shouldn\u2019t forget that behind every successful deployment lies a hidden challenge &#8211; what cyber security measures should be taken to protect the source code, hardware and software products, and critical company and customer data?\u00a0","og_url":"https:\/\/gitprotect.io\/blog\/cyber-resilience-act-what-does-it-mean-for-your-digital-business\/","og_site_name":"Blog | GitProtect.io","article_publisher":"https:\/\/www.facebook.com\/XoperoSoftware\/","article_published_time":"2024-11-25T08:07:23+00:00","article_modified_time":"2025-01-31T09:02:19+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/11\/CRA-top-1.png","type":"image\/png"}],"author":"Daria Kulikova, Content Writer at GitProtect.io","twitter_card":"summary_large_image","twitter_creator":"@GitProtectio","twitter_site":"@GitProtectio","twitter_misc":{"Written by":"Daria Kulikova, Content Writer at GitProtect.io","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/gitprotect.io\/blog\/cyber-resilience-act-what-does-it-mean-for-your-digital-business\/#article","isPartOf":{"@id":"https:\/\/gitprotect.io\/blog\/cyber-resilience-act-what-does-it-mean-for-your-digital-business\/"},"author":{"name":"Daria Kulikova, Content Writer at GitProtect.io","@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/6618fde5a7cf7e327fefa4f0035466d3"},"headline":"Cyber Resilience Act: What Does It Mean For Your Digital Business?","datePublished":"2024-11-25T08:07:23+00:00","dateModified":"2025-01-31T09:02:19+00:00","mainEntityOfPage":{"@id":"https:\/\/gitprotect.io\/blog\/cyber-resilience-act-what-does-it-mean-for-your-digital-business\/"},"wordCount":1665,"publisher":{"@id":"https:\/\/gitprotect.io\/blog\/#organization"},"image":{"@id":"https:\/\/gitprotect.io\/blog\/cyber-resilience-act-what-does-it-mean-for-your-digital-business\/#primaryimage"},"thumbnailUrl":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/11\/CRA-top-1.png","articleSection":["Azure DevOps","Bitbucket","Git Backup 101","GitHub","GitLab","Jira"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/gitprotect.io\/blog\/cyber-resilience-act-what-does-it-mean-for-your-digital-business\/","url":"https:\/\/gitprotect.io\/blog\/cyber-resilience-act-what-does-it-mean-for-your-digital-business\/","name":"Cyber Resilience Act: What Does It Mean For Your Digital Business? - Blog | GitProtect.io","isPartOf":{"@id":"https:\/\/gitprotect.io\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/gitprotect.io\/blog\/cyber-resilience-act-what-does-it-mean-for-your-digital-business\/#primaryimage"},"image":{"@id":"https:\/\/gitprotect.io\/blog\/cyber-resilience-act-what-does-it-mean-for-your-digital-business\/#primaryimage"},"thumbnailUrl":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/11\/CRA-top-1.png","datePublished":"2024-11-25T08:07:23+00:00","dateModified":"2025-01-31T09:02:19+00:00","breadcrumb":{"@id":"https:\/\/gitprotect.io\/blog\/cyber-resilience-act-what-does-it-mean-for-your-digital-business\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/gitprotect.io\/blog\/cyber-resilience-act-what-does-it-mean-for-your-digital-business\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gitprotect.io\/blog\/cyber-resilience-act-what-does-it-mean-for-your-digital-business\/#primaryimage","url":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/11\/CRA-top-1.png","contentUrl":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/11\/CRA-top-1.png","width":1200,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/gitprotect.io\/blog\/cyber-resilience-act-what-does-it-mean-for-your-digital-business\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/gitprotect.io\/blog\/"},{"@type":"ListItem","position":2,"name":"Cyber Resilience Act: What Does It Mean For Your Digital Business?"}]},{"@type":"WebSite","@id":"https:\/\/gitprotect.io\/blog\/#website","url":"https:\/\/gitprotect.io\/blog\/","name":"GitProtect.io Blog","description":"","publisher":{"@id":"https:\/\/gitprotect.io\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/gitprotect.io\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/gitprotect.io\/blog\/#organization","name":"GitProtect.io","url":"https:\/\/gitprotect.io\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/05\/favicon-528x528-1.png","contentUrl":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2023\/05\/favicon-528x528-1.png","width":528,"height":528,"caption":"GitProtect.io"},"image":{"@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XoperoSoftware\/","https:\/\/x.com\/GitProtectio","https:\/\/www.linkedin.com\/company\/xopero-software\/","https:\/\/www.youtube.com\/channel\/UCiEnl6n0mIO6w7twccz-l2w"]},{"@type":"Person","@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/6618fde5a7cf7e327fefa4f0035466d3","name":"Daria Kulikova, Content Writer at GitProtect.io","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gitprotect.io\/blog\/#\/schema\/person\/image\/","url":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/09\/daria-kulikova-content-writer-at-gitprotect.io_avatar-96x96.jpg","contentUrl":"https:\/\/gitprotect.io\/blog\/wp-content\/uploads\/2024\/09\/daria-kulikova-content-writer-at-gitprotect.io_avatar-96x96.jpg","caption":"Daria Kulikova, Content Writer at GitProtect.io"},"description":"Daria is a Content Specialist at GitProtect.io, who has a degree in linguistics and an extensive translation background in different areas, including technology, IT, economics, etc. She loves self-improvement, so when she is offline, it\u2019s easy to find her learning and expanding her knowledge in Cybersecurity, and DevSecOps.","url":"https:\/\/gitprotect.io\/blog\/author\/daria-kulikova\/"}]}},"_links":{"self":[{"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/posts\/6022","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/comments?post=6022"}],"version-history":[{"count":4,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/posts\/6022\/revisions"}],"predecessor-version":[{"id":6027,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/posts\/6022\/revisions\/6027"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/media\/6025"}],"wp:attachment":[{"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/media?parent=6022"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/categories?post=6022"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gitprotect.io\/blog\/wp-json\/wp\/v2\/tags?post=6022"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}