Scope of the CRA Penetration Testing Services
Our service focuses on identifying security weaknesses in digital products by simulating real-world cyberattacks, ensuring compliance with the CRA's essential cybersecurity requirements, including the following:
- Ensuring your product is delivered without any known exploitable vulnerabilities;
- Ensuring your product is delivered with a secure by default configuration, including the possibility to reset the product to its original state;
- Ensuring your product is protected from unauthorized access;
- Ensuring confidentiality of data stored, transmitted or otherwise processed by your product is adequately protected;
- Ensuring integrity of data stored, transmitted or otherwise processed by your product is adequately protected;
- Ensuring your product only processes data that are adequate, relevant and limited to what is necessary in relation to the intended use of the product;
- Ensuring your product is sufficiently robust against denial of service attacks;
- Ensuring your product minimizes negative impact on availability of services provided by other devices or networks;
- Ensuring your product is designed, developed and produced to limit attack surface;
- Ensuring your product is designed, developed and produced to reduce impact of cyber security incidents;
- Ensuring your product provides security related information by recording and/or monitoring relevant internal activity, including the access to or modification of data, services or functions;
- Ensuring vulnerabilities in your product can be addressed through security update;
- Ensuring your organization applies effective and regular tests and reviews of the security of the product with digital elements;
Target Products for Evaluation
- Critical Products as per CRA
- Hardware Devices with Security Boxes
- Smart meter gateways
- Smartcards or similar devices, including secure elements
- Important Products as per CRA
- Class I - network management systems, boot managers, routers, modems, switches, microprocessors and microcontrollers with security-related functionalities, ASICs and FPGAs with security related functionalities, smart home virtual assistants, smart door locks and monitoring systems, baby monitors, Internet-connected toys, personal wearable products etc.
- Class II - hypervisors, firewalls, IPS, tamper-resistant microprocessors and microcontrollers
- Other products falling under CRA requirements
Deliverables & Reporting Upon completion, we will provide:
Penetration Testing Report detailing vulnerabilities, exploit paths, and potential business impact.
Technical Risk Assessment mapping security gaps against CRA requirements.
Remediation Plan & Security Recommendations.
Certification Readiness Evaluation to ensure compliance before official audits.
Why Choose Us?
- Expertise in EU Regulations: Our team specializes in penetration testing and cyber security audits aligned with EU cybersecurity laws (e.g., UNECE R155).
- Advanced Security Testing Techniques: Utilizing cutting-edge tools and ethical hacking methodologies aligned with ISO 21434, IEC 62443, NIST, and ENISA guidelines.
- End-to-End Support: From vulnerability discovery to remediation and certification readiness.
We look forward to helping you achieve full Cyber Resilience Act (CRA) compliance and strengthen your cybersecurity posture through penetration testing.