LFEL1001: conformity assessment section is inaccurate
The section linked below about "conformity and oversight" mentions that critical and closed important products cannot use internal control. This is not accurate as Article 32.2 of CRA explicitly requires for Important Class I products to use Module B or H only when they don't fully comply with the requirements of Annex I. Quoting: "Where, in assessing the compliance of an important product with digital elements that falls under class I as set out in Annex III and the processes put in place by its manufacturer with the essential cybersecurity requirements set out in Annex I, the manufacturer has not applied or has applied only in part harmonised standards ..."
That is, products under Important Class I can use internal control when they fully comply with the requirements set out in Annex I. At the same time, I cannot find any requirement for open source or closed source in the conformity assessment requirements of CRA. The reference to closed source seems innaccurate.
A way to express it:
- Critical and Important Class II: cannot use internal control
Comments
-
First, THANK YOU for your feedback! We had many reviewers, but you can never have too many. The rules for CRA compliance are quite complicated. We were trying to simplify it without being misleading. So let's take a look...
I agree that CRA 32(2) is the key text. It says:
"2. Where, in assessing the compliance of an important product with digital elements that falls under class I as set out in Annex III and the processes put in place by its manufacturer with the essential cybersecurity requirements set out in Annex I, the manufacturer has not applied or has applied only in part harmonised standards, common specifications or European cybersecurity certification schemes at assurance level at least ‘substantial’ as referred to in Article 27, or where such harmonised standards, common specifications or European cybersecurity certification schemes do not exist, the product with digital elements concerned and the processes put in place by the manufacturer shall be submitted with regard to those essential cybersecurity requirements to either of the following procedures:
(a) the EU-type examination procedure (based on moduleset out in Annex VIII followed by conformity to EU-type based on internal production control (based on module C) set out in Annex VIII; or
(b) a conformity assessment based on full quality assurance (based on module H) set out in Annex VIII."Today we don't have such "harmonised standards" or similar, so you can't use internal control (self-assessment) today. But obviously that is the hope & intent over time.
We said:
- Critical & closed important: cannot use internal control
You suggested:
- Critical and Important Class II: cannot use internal control
That might be an improvement, but doesn't deal with the exception for OSS.
You also said, " At the same time, I cannot find any requirement for open source or closed source in the conformity assessment requirements of CRA. The reference to closed source seems innaccurate."
This was our attempt to explain CRA article 32(5). This text says:
"5. Manufacturers of products with digital elements qualifying as free and open-source software, which fall under the categories set out in Annex III, shall be able to demonstrate conformity with the essential cybersecurity requirements set out in Annex I by using one of the procedures referred to in paragraph 1 of this Article, provided that the technical documentation referred to in Article 31 is made available to the public at the time of the placing on the market of those products."If it's OSS and important and the technical documentation is public, then "one of the procedures" must be used. One of those procedures is internal control (self-assessment), so to me it appears important OSS can use internal control, with the caveat that it must publicly release the technical documentation. You could reasonably argue that 32(5) and 32(2) conflict, but I don't think so. 32(2) says you DON'T meet certain specs then you can't self-assess, but if you do I don't see the conflict.
So I guess I'd tweak that one line further to:
- Critical and Closed Important Class II: cannot use internal control
Do you agree?
0 -
This is not accurate as Article 32.2 of CRA explicitly requires for Important Class I products to use Module B or H only when they don't fully comply with the requirements of Annex I.
All software is required to fully comply with the requirements of Annex I, as applicable (due to risk analysis), even if it's "default". What's at issue in CRA article 32(2) is whether or not there are clarifying documents like harmonised standards.
0 -
Here's the corresponding script that I hope fixes the concern, with changes in bold:
Since most software is “default”, you can use internal control for most software. However, for PDEs that are critical, or are important class II and closed source software, you cannot use internal control. PDEs that are OSS and important may use internal control if the technical documentation is made public per article 32(5). For important or critical software, see article 32 for the specific list of procedures allowed.
Does that address your concern?
1 -
Actually, let's ad a little more. How about this (bold for change)?
Since most software is “default”, you can use internal control for most software. However, for PDEs that are critical, or are important class II and closed source software, you cannot use internal control. PDEs that are OSS and important may be able to use internal control if the technical documentation is made public per article 32(5). For important or critical software, see article 32 for the specific list of procedures allowed, as the rules are somewhat complex.
Critical & closed important class II: cannot use internal control
...
Since most software is “default”, you can use internal control for most software. However, for PDEs that are critical, or are important class II and closed source software, you cannot use internal control. PDEs that are OSS and important may be able to use internal control if the technical documentation is made public per article 32(5)*. For important or critical software, see article 32 for the specific list of procedures allowed **, as the rules are somewhat complex.
1 -
Actually, let's add a little more. How about this (bold for change)?
Critical & closed important class II: cannot use internal control
...
Since most software is “default”, you can use internal control for most software. However, for PDEs that are critical, or are important class II and closed source software, you cannot use internal control. PDEs that are OSS and important may be able to use internal control if the technical documentation is made public per article 32(5). For important or critical software, see article 32 for the specific list of procedures allowed ,as the rules are somewhat complex.
0 -
Any last comments before we tweak the material?
0 -
@dwheeler said:
First, THANK YOU for your feedback! We had many reviewers, but you can never have too many. The rules for CRA compliance are quite complicated. We were trying to simplify it without being misleading. So let's take a look...I agree that CRA 32(2) is the key text. It says:
"2. Where, in assessing the compliance of an important product with digital elements that falls under class I as set out in Annex III and the processes put in place by its manufacturer with the essential cybersecurity requirements set out in Annex I, the manufacturer has not applied or has applied only in part harmonised standards, common specifications or European cybersecurity certification schemes at assurance level at least ‘substantial’ as referred to in Article 27, or where such harmonised standards, common specifications or European cybersecurity certification schemes do not exist, the product with digital elements concerned and the processes put in place by the manufacturer shall be submitted with regard to those essential cybersecurity requirements to either of the following procedures:
(a) the EU-type examination procedure (based on moduleset out in Annex VIII followed by conformity to EU-type based on internal production control (based on module C) set out in Annex VIII; or
(b) a conformity assessment based on full quality assurance (based on module H) set out in Annex VIII."Today we don't have such "harmonised standards" or similar, so you can't use internal control (self-assessment) today. But obviously that is the hope & intent over time.
We said:
- Critical & closed important: cannot use internal control
You suggested:
- Critical and Important Class II: cannot use internal control
That might be an improvement, but doesn't deal with the exception for OSS.
You also said, " At the same time, I cannot find any requirement for open source or closed source in the conformity assessment requirements of CRA. The reference to closed source seems innaccurate."
This was our attempt to explain CRA article 32(5). This text says:
"5. Manufacturers of products with digital elements qualifying as free and open-source software, which fall under the categories set out in Annex III, shall be able to demonstrate conformity with the essential cybersecurity requirements set out in Annex I by using one of the procedures referred to in paragraph 1 of this Article, provided that the technical documentation referred to in Article 31 is made available to the public at the time of the placing on the market of those products."If it's OSS and important and the technical documentation is public, then "one of the procedures" must be used. One of those procedures is internal control (self-assessment), so to me it appears important OSS can use internal control, with the caveat that it must publicly release the technical documentation. You could reasonably argue that 32(5) and 32(2) conflict, but I don't think so. 32(2) says you DON'T meet certain specs then you can't self-assess, but if you do I don't see the conflict.
So I guess I'd tweak that one line further to:
- Critical and Closed Important Class II: cannot use internal control
Do you agree?
Yes, you have very good point on the open source. I have missed the implications of paragraph 5. The tweak you propose seems great. As "closed product" may have multiple interpretations, a further minor suggestion is to call out "closed source" as opposed to "closed".
0 -
I didn't get a notification of the response so I probably missed the window. However the changes look great! There is a smaller suggestion regarding closed, but that's more minor if the changes are already in place.
Just wanted to say, the content is really impressive. Even top consultants in the field would be envious!
0 -
Thank you again for the thoughtful feedback and kind words! The updates have now been posted.
0
Categories
- All Categories
- 142 LFX Mentorship
- 142 LFX Mentorship: Linux Kernel
- 817 Linux Foundation IT Professional Programs
- 368 Cloud Engineer IT Professional Program
- 167 Advanced Cloud Engineer IT Professional Program
- 83 DevOps Engineer IT Professional Program
- 132 Cloud Native Developer IT Professional Program
- 122 Express Training Courses
- 122 Express Courses - Discussion Forum
- Microlearning - Discussion Forum
- 6.6K Training Courses
- 40 LFC110 Class Forum - Discontinued
- 66 LFC131 Class Forum
- 39 LFD102 Class Forum
- 236 LFD103 Class Forum
- 22 LFD110 Class Forum
- 44 LFD121 Class Forum
- 1 LFD123 Class Forum
- LFD125 Class Forum
- 17 LFD133 Class Forum
- 6 LFD134 Class Forum
- 17 LFD137 Class Forum
- 70 LFD201 Class Forum
- 3 LFD210 Class Forum
- 2 LFD210-CN Class Forum
- 2 LFD213 Class Forum - Discontinued
- 128 LFD232 Class Forum - Discontinued
- 1 LFD233 Class Forum
- 3 LFD237 Class Forum
- 23 LFD254 Class Forum
- 689 LFD259 Class Forum
- 110 LFD272 Class Forum
- 3 LFD272-JP クラス フォーラム
- 10 LFD273 Class Forum
- 251 LFS101 Class Forum
- 2 LFS111 Class Forum
- 3 LFS112 Class Forum
- 3 LFS116 Class Forum
- 3 LFS118 Class Forum
- 1 LFS120 Class Forum
- 3 LFS142 Class Forum
- 3 LFS144 Class Forum
- 3 LFS145 Class Forum
- 1 LFS146 Class Forum
- 16 LFS148 Class Forum
- 8 LFS151 Class Forum
- 1 LFS157 Class Forum
- 17 LFS158 Class Forum
- LFS158-JP クラス フォーラム
- 5 LFS162 Class Forum
- 1 LFS166 Class Forum
- 3 LFS167 Class Forum
- 1 LFS170 Class Forum
- 1 LFS171 Class Forum
- 2 LFS178 Class Forum
- 2 LFS180 Class Forum
- 2 LFS182 Class Forum
- 4 LFS183 Class Forum
- 30 LFS200 Class Forum
- 737 LFS201 Class Forum - Discontinued
- 2 LFS201-JP クラス フォーラム
- 17 LFS203 Class Forum
- 118 LFS207 Class Forum
- 2 LFS207-DE-Klassenforum
- LFS207-JP クラス フォーラム
- 302 LFS211 Class Forum
- 55 LFS216 Class Forum
- 50 LFS241 Class Forum
- 43 LFS242 Class Forum
- 37 LFS243 Class Forum
- 13 LFS244 Class Forum
- 6 LFS245 Class Forum
- LFS246 Class Forum
- LFS248 Class Forum
- 108 LFS250 Class Forum
- 1 LFS250-JP クラス フォーラム
- LFS251 Class Forum
- 145 LFS253 Class Forum
- LFS254 Class Forum
- 2 LFS255 Class Forum
- 13 LFS256 Class Forum
- 1 LFS257 Class Forum
- 1.3K LFS258 Class Forum
- 11 LFS258-JP クラス フォーラム
- 116 LFS260 Class Forum
- 156 LFS261 Class Forum
- 41 LFS262 Class Forum
- 82 LFS263 Class Forum - Discontinued
- 15 LFS264 Class Forum - Discontinued
- 11 LFS266 Class Forum - Discontinued
- 23 LFS267 Class Forum
- 25 LFS268 Class Forum
- 29 LFS269 Class Forum
- 7 LFS270 Class Forum
- 200 LFS272 Class Forum
- 1 LFS272-JP クラス フォーラム
- 2 LFS147 Class Forum
- LFS274 Class Forum
- 3 LFS281 Class Forum
- 18 LFW111 Class Forum
- 257 LFW211 Class Forum
- 179 LFW212 Class Forum
- 15 SKF100 Class Forum
- SKF200 Class Forum
- 2 SKF201 Class Forum
- 791 Hardware
- 199 Drivers
- 68 I/O Devices
- 37 Monitors
- 98 Multimedia
- 174 Networking
- 91 Printers & Scanners
- 85 Storage
- 754 Linux Distributions
- 82 Debian
- 67 Fedora
- 16 Linux Mint
- 13 Mageia
- 23 openSUSE
- 149 Red Hat Enterprise
- 31 Slackware
- 13 SUSE Enterprise
- 351 Ubuntu
- 465 Linux System Administration
- 39 Cloud Computing
- 71 Command Line/Scripting
- Github systems admin projects
- 95 Linux Security
- 78 Network Management
- 101 System Management
- 47 Web Management
- 56 Mobile Computing
- 18 Android
- 28 Development
- 1.2K New to Linux
- 1K Getting Started with Linux
- 366 Off Topic
- 114 Introductions
- 171 Small Talk
- 26 Study Material
- 534 Programming and Development
- 304 Kernel Development
- 223 Software Development
- 1.8K Software
- 212 Applications
- 182 Command Line
- 3 Compiling/Installing
- 405 Games
- 311 Installation
- 79 All In Program
- 79 All In Forum
Upcoming Training
-
August 20, 2018
Kubernetes Administration (LFS458)
-
August 20, 2018
Linux System Administration (LFS301)
-
August 27, 2018
Open Source Virtualization (LFS462)
-
August 27, 2018
Linux Kernel Debugging and Security (LFD440)