<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: CRA Evidence</title>
    <description>The latest articles on DEV Community by CRA Evidence (@craevidence).</description>
    <link>https://dev.to/craevidence</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Forganization%2Fprofile_image%2F12933%2Ff59bebbc-f910-4e70-a699-3b04ebcb0fbe.png</url>
      <title>DEV Community: CRA Evidence</title>
      <link>https://dev.to/craevidence</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/craevidence"/>
    <language>en</language>
    <item>
      <title>ENISA's Secure by Design Playbook: What It Means for Product Teams Under the CRA</title>
      <dc:creator>Joan Romero</dc:creator>
      <pubDate>Wed, 08 Apr 2026 07:35:40 +0000</pubDate>
      <link>https://dev.to/craevidence/enisas-secure-by-design-playbook-what-it-means-for-product-teams-under-the-cra-35a4</link>
      <guid>https://dev.to/craevidence/enisas-secure-by-design-playbook-what-it-means-for-product-teams-under-the-cra-35a4</guid>
      <description>&lt;p&gt;On 19 March 2026, ENISA published the &lt;em&gt;Security by Design and Default Playbook&lt;/em&gt; (v0.4), a draft for public consultation. Most CRA guidance published so far targets legal and compliance teams. This one is aimed at the people building the product.&lt;/p&gt;

&lt;h2&gt;
  
  
  Summary
&lt;/h2&gt;

&lt;p&gt;The core deliverable: 22 one-page playbooks. Each one takes a security principle and breaks it into a checklist, a minimum evidence set, and a release gate you can copy into your pre-release review. The principles split into two pillars: Secure by Design (14 principles, how the system is engineered) and Secure by Default (8 principles, how the product behaves on first deployment).&lt;/p&gt;

&lt;p&gt;Beyond the playbooks, the document defines 8 risk management activities and a 5-step threat modelling process built for teams without a dedicated security function. Annex C maps all 22 principles to specific CRA Annex I requirements.&lt;/p&gt;

&lt;p&gt;This is a working document. Here's what engineers will actually use from it.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Playbook Format
&lt;/h2&gt;

&lt;p&gt;Each of the 22 playbooks follows the same five-section structure:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Principle&lt;/strong&gt;: the security concept&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Objective&lt;/strong&gt;: what it achieves and what failure modes it prevents&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Checklist&lt;/strong&gt;: highest-impact actions, scoped for lean teams&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Minimum evidence&lt;/strong&gt;: the smallest artefact set that demonstrates the checklist was completed&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Release gate&lt;/strong&gt;: pass/fail criteria, copy-pasteable into a release review or CI gate&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;The evidence and release gate sections are the most useful parts. They give you a definition of done that is concrete enough to put in a PR template or a release checklist. No security theatre, no vague "ensure security is considered" language.&lt;/p&gt;

&lt;h3&gt;
  
  
  Playbook 4.13 in full: Vulnerability &amp;amp; patch management
&lt;/h3&gt;

&lt;p&gt;To show the depth of the format, here is Playbook 4.13 as it appears in the document.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Principle:&lt;/strong&gt; Vulnerability and patch management should be practical, repeatable, and prioritised by risk. Teams need a simple intake path for researchers and customers to report issues, and an internal triage process that produces decisions quickly.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Objective:&lt;/strong&gt; Identify, prioritise, and remediate vulnerabilities fast enough to reduce real-world exposure across code, dependencies, infrastructure, and firmware. Focus: a simple intake-to-fix workflow, clear SLAs, and an update mechanism that makes patching reliable.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Checklist:&lt;/strong&gt;&lt;/p&gt;

&lt;div class="table-wrapper-paragraph"&gt;&lt;table&gt;
&lt;thead&gt;
&lt;tr&gt;
&lt;th&gt;Action&lt;/th&gt;
&lt;th&gt;Details&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Establish intake channels&lt;/td&gt;
&lt;td&gt;Dependency scanning, SAST/DAST findings, supplier advisories, customer reports, security email. Assign a single owner for triage.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Triage and prioritise consistently&lt;/td&gt;
&lt;td&gt;Lightweight severity (Critical/High/Med/Low) plus "internet-exposed?" and "known exploited?" flags. Decision: fix now, mitigate, accept (time-bound), or defer with rationale.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Patch dependencies proactively&lt;/td&gt;
&lt;td&gt;Regular cadence (weekly/monthly). Pin versions, remove unused dependencies, track transitives.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Fix, test, and release securely&lt;/td&gt;
&lt;td&gt;Review and test fixes; verify no regressions in auth/authz and input validation. For devices/IoT: secure OTA path and safe rollback.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Communicate and close the loop&lt;/td&gt;
&lt;td&gt;Track affected versions, customers, mitigation guidance. Publish release notes or advisories. Confirm rollout and update the risk register.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;&lt;/div&gt;

&lt;p&gt;&lt;strong&gt;Minimum evidence:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Vuln tracking board: issue, severity, affected components/versions, owner, status, target date&lt;/li&gt;
&lt;li&gt;Defined SLAs: Critical triage within 48 hours; remediation target within X days (set to your reality)&lt;/li&gt;
&lt;li&gt;CI scan evidence: dependency scanning + SAST outputs (and DAST where applicable)&lt;/li&gt;
&lt;li&gt;Proactive dependency patches: SBOM or dependency inventory per release&lt;/li&gt;
&lt;li&gt;Patch release record: link from vuln ticket to PRs to tests to release version to rollout confirmation&lt;/li&gt;
&lt;li&gt;Exception log: accepted risks with owner, expiry, and compensating controls&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Release gate:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Dependency and SAST scans run; Critical/High findings addressed or documented exception with owner and expiry&lt;/li&gt;
&lt;li&gt;SBOM generated and stored for the release&lt;/li&gt;
&lt;li&gt;Known vulnerabilities triaged with severity, owner, and target date&lt;/li&gt;
&lt;li&gt;Patch process validated: fix reviewed, tests passed, release notes updated&lt;/li&gt;
&lt;li&gt;For internet-exposed components: Critical/High mitigations in place before release&lt;/li&gt;
&lt;li&gt;Accepted residual risk is time-bound and tracked&lt;/li&gt;
&lt;li&gt;OTA/update (if applicable) validated for secure delivery; rollback documented&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;That is the complete playbook. One page in the document, self-contained, ready to implement. The other 21 playbooks follow the same structure.&lt;/p&gt;

&lt;h2&gt;
  
  
  The Threat Modelling Process
&lt;/h2&gt;

&lt;p&gt;The playbook defines a 5-step threat modelling process built on STRIDE (Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege). The explicit target: teams with no dedicated security function, where threat modelling currently competes with feature delivery.&lt;/p&gt;

&lt;p&gt;The anti-patterns ENISA calls out: treating threat modelling as a one-off compliance exercise, building models too detailed to stay current, and skipping it after significant product changes.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 1: Define scope and security objectives.&lt;/strong&gt; Time-box this. Capture what's in/out of scope, the deployment context, and the assumptions you're relying on (e.g., "customer network is untrusted", "cloud APIs are internet-exposed"). State the security objectives. Identify the crown jewels. Deliverable: 1-page "Threat Model Scope &amp;amp; Objectives".&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 2: Model the system.&lt;/strong&gt; A single simple architecture or data-flow diagram: main components, external entities, data stores, entry points, data flows. DFD-style is the fastest. The document says "don't overthink it." Deliverable: diagram covering components, entities, stores, entry points.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 3: Mark trust boundaries and privileged paths.&lt;/strong&gt; Annotate the diagram where data, identities, and execution contexts cross from trusted to untrusted zones. Identify highest-privilege operations: firmware/OTA update, remote admin, key provisioning, identity issuance. Deliverable: diagram with trust boundaries, privileged paths, top assets.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 4: Identify and prioritise top threats.&lt;/strong&gt; A short list of realistic abuse cases mapped to entry points and boundaries: "credential stuffing to account takeover", "malicious update", "API authorisation bypass", "MITM on onboarding". Rank with High/Med/Low based on impact and plausibility. Deliverable: threats table with 5-10 abuse cases, impact and likelihood, top risks list.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Step 5: Define mitigations, secure defaults, and verification.&lt;/strong&gt; For each top threat: mitigation strategy, required controls, and the secure-by-default setting that should ship (e.g., "admin interface disabled by default", "no default passwords", "signed updates enforced"). Map each control to a verification method: CI checks, tests, config validation, release gate. Define re-run triggers: new internet-exposed interface, auth model change, new sensitive data, new critical dependency. Deliverable: Controls, Defaults, and Verification checklist.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;&lt;strong&gt;The document's own calibration:&lt;/strong&gt; even 2 hours of collaborative threat modelling with your team produces actionable results. Minimum viable, then refine.&lt;/p&gt;
&lt;/blockquote&gt;

&lt;h2&gt;
  
  
  Machine-Readable Security Manifests
&lt;/h2&gt;

&lt;p&gt;Section 5 is the most forward-looking part of the document. The shift it describes: from static PDF compliance evidence to machine-readable, verifiable security attestations that your CI/CD pipeline and customers can automatically verify.&lt;/p&gt;

&lt;p&gt;A machine-readable security attestation is a structured claim (JSON or YAML) asserting that a specific security control or process has been met. Unlike a PDF audit report, it can be generated by your pipeline, consumed by automated systems, and updated continuously. Security becomes intrinsic to the release process rather than a post-delivery check.&lt;/p&gt;

&lt;p&gt;The document defines four properties these attestations should have:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Demonstrability&lt;/strong&gt;: you can show that requirements were implemented, not just claim it&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Verifiability&lt;/strong&gt;: an independent party can programmatically authenticate and validate the integrity of claims&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Reusability&lt;/strong&gt;: attestations plug into existing agile quality gates and can be built on across releases&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Reliability&lt;/strong&gt;: customers and supply chain partners can rely on them for due diligence&lt;/li&gt;
&lt;/ul&gt;

&lt;h3&gt;
  
  
  The four-layer model
&lt;/h3&gt;

&lt;p&gt;The playbook illustrates a hierarchical structure where every high-level security claim is backed by granular technical evidence:&lt;/p&gt;

&lt;ol&gt;
&lt;li&gt;
&lt;strong&gt;Metadata &amp;amp; Attestation&lt;/strong&gt; (Identity domain): product identity, versioning, manufacturer's cryptographic signature&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Control Layer&lt;/strong&gt; (Governance domain): structured security objectives aligned with requirements and regulations&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Implementation Layer&lt;/strong&gt; (Operational domain): maps specific threats to implemented mitigations, design principles, default settings&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Assessment &amp;amp; Verification Layer&lt;/strong&gt; (Evidence domain): machine-readable pass/fail results from automated gates, with links to SBOMs&lt;/li&gt;
&lt;/ol&gt;

&lt;p&gt;The document also defines two access tiers: a &lt;strong&gt;Public-Facing JSON&lt;/strong&gt; with high-level claims, and a &lt;strong&gt;Restricted Technical Overlay&lt;/strong&gt; with encrypted tool configurations and test telemetry.&lt;/p&gt;

&lt;h3&gt;
  
  
  Where this fits in the existing ecosystem
&lt;/h3&gt;

&lt;p&gt;The playbook situates MRSM within standards that already exist:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;OSCAL&lt;/strong&gt; (NIST): compliance as code, standardised security control catalogues, assessment results&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;CycloneDX CDXA&lt;/strong&gt; (OWASP/ECMA-424): expanded from SBOM to a full transparency standard, including attestations and VEX&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;OpenSSF Security Insights&lt;/strong&gt;: machine-readable security facts in YAML&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;OWASP ASVS&lt;/strong&gt;: application security verification requirements&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;TC54&lt;/strong&gt; (Ecma International): Transparency Exchange API for SBOM and attestation discovery&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;MRSM is illustrative, not a proposed standard. But the trajectory it describes is real: CRA conformity evidence is moving from PDF folders to verifiable artifacts.&lt;/p&gt;

&lt;h2&gt;
  
  
  Where to Start
&lt;/h2&gt;

&lt;p&gt;Pick one upcoming release and apply three playbooks. Not all 22.&lt;/p&gt;

&lt;p&gt;Four playbooks that work for almost any team:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;Playbook 4.9&lt;/strong&gt; (Secure coding practices): SAST/SCA in CI, banned patterns, security-sensitive PR review. Most teams can wire this into an existing pipeline in a day.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Playbook 4.13&lt;/strong&gt; (Vulnerability management): the one above. If you have no defined triage process today, this comes first.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Playbook 4.2&lt;/strong&gt; (Least privilege): minimum permissions per role and service. Audit it against what's actually running in production.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Playbook 4.16&lt;/strong&gt; (Restrictive initial access): no shared or default credentials. Enforce before the next release ships.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;For threat modelling: the 5-step process above is calibrated for a 2-hour session with a whiteboard. Run it before your next architecture change.&lt;/p&gt;

&lt;p&gt;Use the release gate criteria as your pre-release agenda. They are the fastest path from "no formal security review" to a repeatable, documented process.&lt;/p&gt;

&lt;p&gt;The full playbook is available from ENISA as a v0.4 draft during the consultation period.&lt;/p&gt;




&lt;p&gt;&lt;strong&gt;Official source:&lt;/strong&gt; &lt;a href="https://www.enisa.europa.eu/sites/default/files/2026-03/ENISA_Secure_By_Design_and_Default_Playbook_v0.4_draft_for_consultation.pdf" rel="noopener noreferrer"&gt;ENISA Security by Design and Default Playbook v0.4 (PDF)&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Full reference guide:&lt;/strong&gt; &lt;a href="https://craevidence.com/blog/enisa-secure-by-design-playbook-cra" rel="noopener noreferrer"&gt;ENISA's Secure by Design Playbook: What It Means for Product Teams Under the CRA&lt;/a&gt; , covers all 22 principles, the full lifecycle phase table, and the complete CRA Annex I mapping.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;This article is for informational purposes only and does not constitute legal advice.&lt;/em&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>compliance</category>
      <category>devops</category>
      <category>europe</category>
    </item>
  </channel>
</rss>
