Harbor Deep Dive: Vulnerability Scanning, SBOM, Image Signing
TL;DR A modern container registry is now a central compliance tool, especially in the context of the …
Diese Serie erklärt systematisch, wie moderne Software compliant entwickelt und betrieben wird – von EU-Regulierungen bis zur technischen Umsetzung.
With the Cyber Resilience Act, the EU is establishing a horizontal legal framework for the cybersecurity of products with digital elements for the first time. The CRA comes into force on August 20, 2024, with most obligations applying after a transition period of 36 months—likely from late summer 2027. Certain parts, particularly those related to vulnerability disclosure and reporting, will take effect earlier.
Importantly, the CRA complements existing regulations such as NIS2 but does not replace them. While NIS2 primarily addresses operators of critical services, the CRA targets manufacturers, importers, and distributors of hardware and software. Those placing products in Europe today will need to demonstrate that cybersecurity is systematically considered throughout the entire lifecycle.
For technically responsible executives, this means cybersecurity shifts from being a “best practice” to a legally binding product attribute—with clear requirements for architecture, processes, and documentation.
The CRA refers to “Products with Digital Elements” (PDE). This includes:
Once a product is connected to other devices or networks, it typically falls within the CRA’s scope. Purely internal enterprise software without “market placement” may be exempt, but hybrid scenarios (e.g., OEM software deployed at customers) are clearly in scope.
A core aspect of the CRA is risk-based classification:
Non-Classified PDE
Standard products without critical security functions. They are subject to general CRA obligations but can usually demonstrate compliance through internal self-assessment.
Important Class I
Products whose core function fulfills security-relevant tasks (e.g., authentication solutions, certain endpoint security or network components). Here, the requirements for risk analysis, testing, and documentation increase. Self-assessment remains possible if harmonized standards are consistently applied.
Important Class II
Products with particularly high potential damage impact (e.g., intrusion detection/prevention systems, central security gateways). For these, third-party assessments by “Notified Bodies” are mandatory, including an examination of product design and development processes.
Critical Products
Product categories designated as “Critical” by delegated acts may be subject to mandatory EU certification (e.g., EUCC at “substantial” or higher). A comprehensive security evaluation is obligatory.
The classification does not determine whether you need to take security seriously—that is always the case—but how deep your compliance demonstration must go. Strategically, it is wise to map your product range early: What PDE do we have? Into which categories do they likely fall? What compliance paths arise from this?
Perhaps the most significant paradigm shift in the CRA is the consistent lifecycle perspective. Cybersecurity is no longer just a feature of the delivered version but of the entire product lifecycle.
Security by Design becomes a mandatory principle. The CRA expects, among other things:
For executives, this means security must explicitly become part of the product development process—with clear responsibilities, quality gates, and the necessary governance. Informal “we already make it secure” promises will no longer suffice.
A complete and maintained Software Bill of Materials (SBOM) is a central requirement to fulfill CRA obligations. Without an SBOM, you cannot:
The CRA requires manufacturers to know which components they use, how they are maintained, and how they handle vulnerabilities. Practically, this means:
An SBOM is only as valuable as the vulnerability management built upon it. The CRA demands:
This is more than “occasional scanning.” A structured CVE management process is required, connecting engineering, product management, legal, and support—and one that can be substantiated to authorities and customers if necessary.
The CRA mandates that security updates be provided over the expected usage period—with minimum periods of several years. In practice, this means:
Here, technical and organizational questions intersect with business models. Those who previously had short or unclear support cycles must now define and document them structurally. This also affects managed offerings and services; a well-defined support model becomes a compliance component.
The CRA makes coordinated vulnerability disclosure (CVD) mandatory. Manufacturers must:
Additionally, there are reporting obligations to authorities: Serious security incidents and actively exploited vulnerabilities must be reported via a central ENISA portal—within tight deadlines:
For organizations, this means incident response and vulnerability management must not remain purely technical topics for the ops team. Clearly defined roles, escalation paths, and prepared communication lines are needed—both internally and externally.
The CRA addresses a reality that many engineering teams already feel: The real risks often lie not in their own code but in the supply chain.
Technically, the CRA addresses particularly:
If a critical vulnerability in a component becomes known, you as a manufacturer must:
Particularly interesting is the explicit inclusion of non-technical risk factors: jurisdiction, state influence possibilities, economic dependencies. This results in:
Thus, the CRA connects cybersecurity with digital sovereignty. For European technology providers, this is a structural opportunity: Those who can offer transparent, traceable supply chains with high resilience score not only in compliance but also in building trust.
The technical requirements are only one side. Equally crucial is how you organize yourself. Three levers are particularly effective based on experience:
Product Mapping and Classification
Create an overview of all products and components entering the EU market. Provisionally assign them to CRA categories and derive where third-party assessment or certification will likely be required.
Establish Lifecycle Governance
Enhance your product development process with explicit security gates: requirements, architecture reviews, SBOM and CVE checks, release criteria. It is important that these steps are documented and auditable.
Define Incident and Vulnerability Organization
Determine who is responsible for
TL;DR A modern container registry is now a central compliance tool, especially in the context of the …
TL;DR Harbor is an open-source container registry (CNCF Graduated Project) that combines registry …
TL;DR Deterministic security checks in the cloud-native environment are based on three pillars: …