{"id":3636,"date":"2026-04-12T16:52:25","date_gmt":"2026-04-12T14:52:25","guid":{"rendered":"https:\/\/www.steffiscloud.de\/?post_type=glossary&#038;p=3636"},"modified":"2026-04-12T16:52:27","modified_gmt":"2026-04-12T14:52:27","slug":"cyber-resilience-act-eu","status":"publish","type":"glossary","link":"https:\/\/www.steffiscloud.de\/en\/glossary-en\/cyber-resilience-act-eu\/","title":{"rendered":"Cyber Resilience Act (EU)"},"content":{"rendered":"<p>Cyber Resilience Act (EU)<br><br>The Cyber Resilience Act is a European Union regulation that sets mandatory <a class=\"glossaryLink\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt; &amp;lt;!-- wp:table --&amp;gt;\n&amp;lt;figure class=&amp;quot;wp-block-table&amp;quot;&amp;gt;&amp;lt;table class=&amp;quot;has-fixed-layout&amp;quot;&amp;gt;&amp;lt;tbody&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;Cybersecurity&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Cybersecurity refers to the protection of systems, networks, and data from digital attacks, unauthorized access, and damage.&amp;lt;\/td&amp;gt;&amp;lt;\/tr&amp;gt;&amp;lt;\/tbody&amp;gt;&amp;lt;\/table&amp;gt;&amp;lt;\/figure&amp;gt;\n&amp;lt;!-- \/wp:table --&amp;gt; &lt;\/div&gt;\" href=\"https:\/\/www.steffiscloud.de\/en\/glossary-en\/cybersecurity\/\" data-mobile-support=\"0\" data-gt-translate-attributes='[{\"attribute\":\"data-cmtooltip\", \"format\":\"html\"}]' tabindex=\"0\" role=\"link\">cybersecurity<\/a> requirements for products with digital elements. It requires manufacturers to design, develop, and maintain secure products throughout their lifecycle, including vulnerability management, regular updates, and clear security documentation to protect users from cyber risks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Resilience Act (EU) The Cyber Resilience Act is a European Union regulation that sets mandatory <a class=\"glossaryLink\" aria-describedby=\"tt\" data-cmtooltip=\"&lt;div class=glossaryItemBody&gt; &amp;lt;!-- wp:table --&amp;gt;\n&amp;lt;figure class=&amp;quot;wp-block-table&amp;quot;&amp;gt;&amp;lt;table class=&amp;quot;has-fixed-layout&amp;quot;&amp;gt;&amp;lt;tbody&amp;gt;&amp;lt;tr&amp;gt;&amp;lt;td&amp;gt;Cybersecurity&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;Cybersecurity refers to the protection of systems, networks, and data from digital attacks, unauthorized access, and damage.&amp;lt;\/td&amp;gt;&amp;lt;\/tr&amp;gt;&amp;lt;\/tbody&amp;gt;&amp;lt;\/table&amp;gt;&amp;lt;\/figure&amp;gt;\n&amp;lt;!-- \/wp:table --&amp;gt; &lt;\/div&gt;\" href=\"https:\/\/www.steffiscloud.de\/en\/glossary-en\/cybersecurity\/\" data-mobile-support=\"0\" data-gt-translate-attributes='[{\"attribute\":\"data-cmtooltip\", \"format\":\"html\"}]' tabindex=\"0\" role=\"link\">cybersecurity<\/a> requirements for products [&#x2026;]<\/p>\n","protected":false},"author":1,"featured_media":0,"menu_order":162,"template":"","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"glossary-categories":[],"glossary-tags":[],"glossary-languages":[19],"glossary-cat":[],"class_list":["post-3636","glossary","type-glossary","status-publish","hentry","glossary-languages-en"],"post_title":"Cyber Resilience Act (EU)","post_content":"<!-- wp:paragraph -->\n<p>Cyber Resilience Act (EU)<br><br>The Cyber Resilience Act is a European Union regulation that sets mandatory cybersecurity requirements for products with digital elements. It requires manufacturers to design, develop, and maintain secure products throughout their lifecycle, including vulnerability management, regular updates, and clear security documentation to protect users from cyber risks.<\/p>\n<!-- \/wp:paragraph -->","related_terms":"","external_url":"","internal_reference_id":"","_links":{"self":[{"href":"https:\/\/www.steffiscloud.de\/en\/wp-json\/wp\/v2\/glossary\/3636","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.steffiscloud.de\/en\/wp-json\/wp\/v2\/glossary"}],"about":[{"href":"https:\/\/www.steffiscloud.de\/en\/wp-json\/wp\/v2\/types\/glossary"}],"author":[{"embeddable":true,"href":"https:\/\/www.steffiscloud.de\/en\/wp-json\/wp\/v2\/users\/1"}],"version-history":[{"count":0,"href":"https:\/\/www.steffiscloud.de\/en\/wp-json\/wp\/v2\/glossary\/3636\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.steffiscloud.de\/en\/wp-json\/wp\/v2\/media?parent=3636"}],"wp:term":[{"taxonomy":"glossary-categories","embeddable":true,"href":"https:\/\/www.steffiscloud.de\/en\/wp-json\/wp\/v2\/glossary-categories?post=3636"},{"taxonomy":"glossary-tags","embeddable":true,"href":"https:\/\/www.steffiscloud.de\/en\/wp-json\/wp\/v2\/glossary-tags?post=3636"},{"taxonomy":"glossary-languages","embeddable":true,"href":"https:\/\/www.steffiscloud.de\/en\/wp-json\/wp\/v2\/glossary-languages?post=3636"},{"taxonomy":"glossary-cat","embeddable":true,"href":"https:\/\/www.steffiscloud.de\/en\/wp-json\/wp\/v2\/glossary-cat?post=3636"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}