{"id":5531,"date":"2025-04-23T11:30:43","date_gmt":"2025-04-23T09:30:43","guid":{"rendered":"https:\/\/www.bayoomed.com\/?post_type=news&#038;p=5531"},"modified":"2025-04-23T13:07:44","modified_gmt":"2025-04-23T11:07:44","slug":"cyber-resilience-act-cra-and-healthcare-software","status":"publish","type":"news","link":"https:\/\/www.bayoomed.com\/en\/news\/cyber-resilience-act-cra-and-healthcare-software\/","title":{"rendered":"Cyber Resilience Act (CRA) and healthcare software"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:calc( 70vw + );margin-left: calc(- \/ 2 );margin-right: calc(- \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p> <span class=\"TextRun SCXW105327263 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW105327263 BCX0\">What impact will the new EU law have on medical devices, accompanying apps and cloud services?<\/span><\/span> <\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:calc( 70vw + );margin-left: calc(- \/ 2 );margin-right: calc(- \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-bottom:25px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:39;line-height:var(--awb-typography1-line-height);\"><span class=\"TextRun SCXW69257895 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW69257895 BCX0\">Introduction<\/span><\/span><\/h2><\/div><div class=\"fusion-text fusion-text-2\"><p><span data-contrast=\"auto\">Digitalization in the healthcare sector is growing rapidly. More and more processes, devices and applications are being networked or moved to the cloud. At the same time, data protection and cyber security requirements are increasing. Not only patient data is particularly worth protecting &#8211; attacks on medical systems can also cause life-threatening situations. <\/span><\/p>\n<p><span data-contrast=\"auto\">Until now, medical devices in the EU have primarily been subject to the Medical Device Regulation (MDR) and (where relevant) other standards, such as IEC 81001-5-1, which specifically regulates cyber security requirements for medical software. With the new Cyber Resilience Act (CRA), the EU is now creating a further, far-reaching level of regulation. Interestingly, although medical devices themselves are exempt from the CRA because they are already regulated by the MDR and IVDR, the CRA applies to digital components, services and applications that are not medical devices as defined by the MDR\/IVDR &#8211; and this increasingly affects the healthcare sector. <\/span><\/p>\n<p><span data-contrast=\"auto\">In this blog post, we take a look at what the Cyber Resilience Act regulates, why it has a significant impact on manufacturers in the healthcare market despite the exclusion of medical devices and how it interacts with other directives such as NIS2 or US requirements. In addition, we provide a compact checklist that shows what companies should pay attention to now. <\/span><\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:calc( 70vw + );margin-left: calc(- \/ 2 );margin-right: calc(- \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-bottom:25px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:39;line-height:var(--awb-typography1-line-height);\"><span class=\"TextRun SCXW119581923 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW119581923 BCX0\">What is the <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW119581923 BCX0\">Cyber<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW119581923 BCX0\">Resilience<\/span><span class=\"NormalTextRun SCXW119581923 BCX0\"> Act?<\/span><\/span><\/h2><\/div><div class=\"fusion-text fusion-text-3\"><p>The Cyber Resilience Act (CRA) is a planned EU law that aims to drastically increase the cyber security of products with digital elements. These include:<\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{\" data-aria-posinset=\"1\" data-aria-level=\"1\">Software (e.g. apps, operating systems, communication applications)<\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{\" data-aria-posinset=\"2\" data-aria-level=\"1\">IoT devices (e.g. smart wearables, networked household appliances)<\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"1\" data-list-defn-props=\"{\" data-aria-posinset=\"3\" data-aria-level=\"1\">Industrial controllers that have direct or indirect Internet connections<\/li>\n<\/ul>\n<p>The aim of the CRA is to define uniform minimum standards for IT security throughout the entire product life cycle: from development (&#8220;security by design&#8221;) to market launch and operation through to patch and update management. In concrete terms, this means for manufacturers:<\/p>\n<\/div><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-1 fusion-columns-total-4 fusion-content-boxes-1 content-boxes-timeline-vertical content-left content-boxes-timeline-layout content-boxes-icon-with-title fusion-delayed-animation\" style=\"--awb-title-color:var(--awb-color4);--awb-circlecolor-hover:var(--awb-color4);--awb-item-margin-bottom:5px;--awb-margin-bottom:0px;--awb-hover-accent-color:var(--awb-color4);--awb-circle-hover-accent-color:var(--awb-color4);\" data-animation-delay=\"350\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-circlecolor-hover:var(--awb-color4);--awb-content-padding-left:70px;\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon icon-hover-animation-fade fusion-animated\" data-animationType=\"fadeIn\" data-animationDuration=\"0.25\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\" style=\"margin-top:13px;\"><div class=\"icon\" style=\"margin-top:-13px;margin-bottom:-13px;-webkit-animation-duration: 350ms;animation-duration: 350ms;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color4);box-sizing:content-box;height:50px;width:50px;line-height:50px;border-radius:50%;font-size:25px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-angle-right fas circle-yes\"><\/i><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:24px;--fontSize:24;line-height:var(--awb-typography1-line-height);\">Commitment to safety measures<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\r\n<p><span class=\"NormalTextRun SCXW193313399 BCX0\">Products with digital elements must comply with certain basic standards, such as secure communication, encrypted data transmission and mechanisms to defend against typical threats (e.g. SQL- <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW193313399 BCX0\">injections<\/span><span class=\"NormalTextRun SCXW193313399 BCX0\">DDoS attacks).<\/span><\/p>\r\n<\/div><div class=\"content-box-shortcode-timeline-vertical\" style=\"border-color:var(--awb-color8);left:40px;top:25px;-webkit-transition-duration: 350ms;animation-duration: 350ms;\"><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-circlecolor-hover:var(--awb-color4);--awb-content-padding-left:70px;\" class=\"fusion-column content-box-column content-box-column content-box-column-2 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon icon-hover-animation-fade fusion-animated\" data-animationType=\"fadeIn\" data-animationDuration=\"0.25\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\" style=\"margin-top:13px;\"><div class=\"icon\" style=\"margin-top:-13px;margin-bottom:-13px;-webkit-animation-duration: 350ms;animation-duration: 350ms;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color4);box-sizing:content-box;height:50px;width:50px;line-height:50px;border-radius:50%;font-size:25px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-angle-right fas circle-yes\"><\/i><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:24px;--fontSize:24;line-height:var(--awb-typography1-line-height);\">Transparency about security gaps<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\r\n<p><span class=\"TextRun SCXW202565246 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW202565246 BCX0\">Processes must be established to promptly rectify identified vulnerabilities. Security vulnerabilities must be disclosed, e.g. to authorities and users. <\/span><\/span><\/p>\r\n<\/div><div class=\"content-box-shortcode-timeline-vertical\" style=\"border-color:var(--awb-color8);left:40px;top:25px;-webkit-transition-duration: 350ms;animation-duration: 350ms;\"><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-circlecolor-hover:var(--awb-color4);--awb-content-padding-left:70px;\" class=\"fusion-column content-box-column content-box-column content-box-column-3 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon icon-hover-animation-fade fusion-animated\" data-animationType=\"fadeIn\" data-animationDuration=\"0.25\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\" style=\"margin-top:13px;\"><div class=\"icon\" style=\"margin-top:-13px;margin-bottom:-13px;-webkit-animation-duration: 350ms;animation-duration: 350ms;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color4);box-sizing:content-box;height:50px;width:50px;line-height:50px;border-radius:50%;font-size:25px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-angle-right fas circle-yes\"><\/i><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:24px;--fontSize:24;line-height:var(--awb-typography1-line-height);\">Uniform CE marking for networked products<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\r\n<p><span class=\"TextRun SCXW150141686 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW150141686 BCX0\">Compliance with the CRA requirements is integrated into the CE marking. Anyone who places their products on the market in the EU without meeting the CRA requirements risks severe penalties. <\/span><\/span><\/p>\r\n<\/div><div class=\"content-box-shortcode-timeline-vertical\" style=\"border-color:var(--awb-color8);left:40px;top:25px;-webkit-transition-duration: 350ms;animation-duration: 350ms;\"><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-circlecolor-hover:var(--awb-color4);--awb-content-padding-left:70px;\" class=\"fusion-column content-box-column content-box-column content-box-column-4 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon icon-hover-animation-fade fusion-animated\" data-animationType=\"fadeIn\" data-animationDuration=\"0.25\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\" style=\"margin-top:13px;\"><div class=\"icon\" style=\"margin-top:-13px;margin-bottom:-13px;-webkit-animation-duration: 350ms;animation-duration: 350ms;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color4);box-sizing:content-box;height:50px;width:50px;line-height:50px;border-radius:50%;font-size:25px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-angle-right fas circle-yes\"><\/i><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:24px;--fontSize:24;line-height:var(--awb-typography1-line-height);\">Life cycle approach<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\r\n<p><span class=\"TextRun SCXW262041826 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW262041826 BCX0\">The manufacturer&#8217;s responsibility does not end with the sale, but includes a defined period during which security updates must be provided. The transition phase after the CRA comes into force is expected to last several years. It is currently expected to come into force in 2024 and last around 36 months, which could mean full compliance from around 2027. <\/span><\/span><\/p>\r\n<\/div><div class=\"content-box-shortcode-timeline-vertical\" style=\"border-color:var(--awb-color8);left:40px;top:25px;-webkit-transition-duration: 350ms;animation-duration: 350ms;\"><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><div class=\"fusion-text fusion-text-4\"><p><span class=\"TextRun SCXW34663977 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW34663977 BCX0\">The CRA is thus responding to the high number of cyberattacks associated with the increased use of digital technologies and networked devices. For manufacturers in all sectors &#8211; but especially in the healthcare sector &#8211; the law creates a binding framework for greater cyber security. <\/span><\/span><\/p>\n<\/div><div class=\"fusion-image-element \" style=\"--awb-margin-bottom:30px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\" style=\"border-radius:10px;\"><img decoding=\"async\" width=\"1200\" height=\"800\" alt=\"BAYOOMED-Cyber_Resilience_Act\" title=\"BAYOOMED-Cyber_Resilience_Act\" src=\"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/04\/BAYOOMED-Cyber_Resilience_Act.jpg\" class=\"img-responsive wp-image-5528\" srcset=\"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/04\/BAYOOMED-Cyber_Resilience_Act-200x133.jpg 200w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/04\/BAYOOMED-Cyber_Resilience_Act-400x267.jpg 400w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/04\/BAYOOMED-Cyber_Resilience_Act-600x400.jpg 600w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/04\/BAYOOMED-Cyber_Resilience_Act-800x533.jpg 800w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/04\/BAYOOMED-Cyber_Resilience_Act.jpg 1200w\" sizes=\"(max-width: 1100px) 100vw, 1200px\" \/><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:calc( 70vw + );margin-left: calc(- \/ 2 );margin-right: calc(- \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-bottom:25px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:39;line-height:var(--awb-typography1-line-height);\"><span class=\"TextRun SCXW49849888 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW49849888 BCX0\">Significance for the healthcare sector<\/span><\/span><\/h2><\/div><div class=\"fusion-text fusion-text-5\"><p><span class=\"TextRun SCXW160731860 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW160731860 BCX0\">Although medical devices (e.g. certified surgical robots, implants, insulin pumps) are excluded per se from the scope of the CRA because they are already comprehensively regulated by the MDR, IVDR and standards such as IEC 81001-5-1, the new law nevertheless has a considerable pull effect on the healthcare sector. Why?<\/span><\/span><\/p>\n<\/div><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-1 fusion-columns-total-4 fusion-content-boxes-2 content-boxes-timeline-vertical content-left content-boxes-timeline-layout content-boxes-icon-with-title fusion-delayed-animation\" style=\"--awb-title-color:var(--awb-color4);--awb-circlecolor-hover:var(--awb-color4);--awb-item-margin-bottom:5px;--awb-margin-bottom:0px;--awb-hover-accent-color:var(--awb-color4);--awb-circle-hover-accent-color:var(--awb-color4);\" data-animation-delay=\"350\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-circlecolor-hover:var(--awb-color4);--awb-content-padding-left:70px;\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon icon-hover-animation-fade fusion-animated\" data-animationType=\"fadeIn\" data-animationDuration=\"0.25\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\" style=\"margin-top:13px;\"><div class=\"icon\" style=\"margin-top:-13px;margin-bottom:-13px;-webkit-animation-duration: 350ms;animation-duration: 350ms;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color4);box-sizing:content-box;height:50px;width:50px;line-height:50px;border-radius:50%;font-size:25px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-angle-right fas circle-yes\"><\/i><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:24px;--fontSize:24;line-height:var(--awb-typography1-line-height);\">Companion apps and cloud services<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\r\n<p>Many medical devices use additional apps or cloud components that are not themselves medical devices. It is precisely these parts that fall under the CRA because they are &#8220;products with digital elements&#8221; and are not already covered by the MDR within the meaning of the law.<\/p>\r\n<ul>\r\n<li data-leveltext=\"o\" data-font=\"Courier New\" data-listid=\"3\" data-list-defn-props=\"{\" data-aria-posinset=\"1\" data-aria-level=\"2\">Example: Insulin pumps are classified as medical devices and must comply with MDR\/IVDR. However, the associated app for dosage control or evaluation of measured values may not be a medical device. It is therefore subject to the CRA.<\/li>\r\n<\/ul>\r\n<\/div><div class=\"content-box-shortcode-timeline-vertical\" style=\"border-color:var(--awb-color8);left:40px;top:25px;-webkit-transition-duration: 350ms;animation-duration: 350ms;\"><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-circlecolor-hover:var(--awb-color4);--awb-content-padding-left:70px;\" class=\"fusion-column content-box-column content-box-column content-box-column-2 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon icon-hover-animation-fade fusion-animated\" data-animationType=\"fadeIn\" data-animationDuration=\"0.25\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\" style=\"margin-top:13px;\"><div class=\"icon\" style=\"margin-top:-13px;margin-bottom:-13px;-webkit-animation-duration: 350ms;animation-duration: 350ms;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color4);box-sizing:content-box;height:50px;width:50px;line-height:50px;border-radius:50%;font-size:25px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-angle-right fas circle-yes\"><\/i><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:24px;--fontSize:24;line-height:var(--awb-typography1-line-height);\">Devices used in the hospital environment<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\r\n<p><span class=\"TextRun SCXW35881828 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW35881828 BCX0\">Networked devices (e.g. telemedicine platforms, patient apps) can be covered by the CRA obligation if they are essential for operation but do not legally comply with medical device status.<\/span><\/span><\/p>\r\n<\/div><div class=\"content-box-shortcode-timeline-vertical\" style=\"border-color:var(--awb-color8);left:40px;top:25px;-webkit-transition-duration: 350ms;animation-duration: 350ms;\"><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-circlecolor-hover:var(--awb-color4);--awb-content-padding-left:70px;\" class=\"fusion-column content-box-column content-box-column content-box-column-3 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon icon-hover-animation-fade fusion-animated\" data-animationType=\"fadeIn\" data-animationDuration=\"0.25\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\" style=\"margin-top:13px;\"><div class=\"icon\" style=\"margin-top:-13px;margin-bottom:-13px;-webkit-animation-duration: 350ms;animation-duration: 350ms;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color4);box-sizing:content-box;height:50px;width:50px;line-height:50px;border-radius:50%;font-size:25px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-angle-right fas circle-yes\"><\/i><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:24px;--fontSize:24;line-height:var(--awb-typography1-line-height);\">Link with NIS2<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\r\n<p><span class=\"TextRun SCXW130820903 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW130820903 BCX0\">The revised <\/span><\/span><span class=\"TextRun SCXW130820903 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW130820903 BCX0\">NIS2 Directive<\/span><\/span><span class=\"TextRun SCXW130820903 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW130820903 BCX0\"> forces operators of critical infrastructures (including the healthcare sector and hospitals) to meet higher security standards. Anyone supplying devices or software (under CRA) to such institutions must provide the required standards and documentation. This is the only way for hospitals to ensure their own NIS2 compliance. <\/span><\/span><\/p>\r\n<\/div><div class=\"content-box-shortcode-timeline-vertical\" style=\"border-color:var(--awb-color8);left:40px;top:25px;-webkit-transition-duration: 350ms;animation-duration: 350ms;\"><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-circlecolor-hover:var(--awb-color4);--awb-content-padding-left:70px;\" class=\"fusion-column content-box-column content-box-column content-box-column-4 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon icon-hover-animation-fade fusion-animated\" data-animationType=\"fadeIn\" data-animationDuration=\"0.25\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\" style=\"margin-top:13px;\"><div class=\"icon\" style=\"margin-top:-13px;margin-bottom:-13px;-webkit-animation-duration: 350ms;animation-duration: 350ms;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color4);box-sizing:content-box;height:50px;width:50px;line-height:50px;border-radius:50%;font-size:25px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-angle-right fas circle-yes\"><\/i><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:24px;--fontSize:24;line-height:var(--awb-typography1-line-height);\">Data security and patient well-being<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\r\n<p><span class=\"TextRun SCXW33463775 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW33463775 BCX0\">In view of the sensitive nature of healthcare data and the high risk of cyberattacks, it is essential for manufacturers and operators to work closely together and <\/span><span class=\"NormalTextRun SCXW33463775 BCX0\">exchange information on cybersecurity measures &#8211; regardless of whether the respective application is &#8220;only&#8221; covered by the CRA or &#8220;also&#8221; by the MDR.<\/span><\/span><\/p>\r\n<\/div><div class=\"content-box-shortcode-timeline-vertical\" style=\"border-color:var(--awb-color8);left:40px;top:25px;-webkit-transition-duration: 350ms;animation-duration: 350ms;\"><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><div class=\"fusion-text fusion-text-6\"><p><span class=\"TextRun SCXW75939728 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW75939728 BCX0\">Medical devices (as defined by the MDR\/IVDR) already have strict requirements for <\/span><\/span><span class=\"TextRun SCXW75939728 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW75939728 BCX0\">cyber security<\/span><\/span><span class=\"TextRun SCXW75939728 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW75939728 BCX0\">. IEC 81001-5-1 specifies these requirements for software by providing a standardized framework for risk management and technical protective measures. Manufacturers must therefore prove that their medical devices are secure and can be protected against tampering or data leaks, for example. <\/span><\/span><\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:calc( 70vw + );margin-left: calc(- \/ 2 );margin-right: calc(- \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-bottom:25px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:39;line-height:var(--awb-typography1-line-height);\"><span class=\"TextRun SCXW44934648 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW44934648 BCX0\">CRA: &#8220;Expansion&#8221; of the regulatory spectrum<\/span><\/span><\/h2><\/div><div class=\"fusion-text fusion-text-7\"><p><span data-contrast=\"auto\">The Cyber Resilience Act comes into play when digital functions or systems do not fall within the scope of the MDR. Instead, the uniform requirements of the CRA now apply. In certain aspects, the CRA can even go beyond the MDR requirements, for example when it comes to reporting security vulnerabilities to authorities or regular patch management. <\/span><span data-ccp-props=\"{\"> <\/p>\n<p>Practical example:<\/span><\/p>\n<\/div><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-2 fusion-columns-total-2 fusion-content-boxes-3 content-boxes-icon-on-top content-left\" style=\"--awb-title-color:var(--awb-color4);--awb-circlecolor-hover:var(--awb-color4);--awb-item-margin-bottom:5px;--awb-margin-bottom:0px;--awb-hover-accent-color:var(--awb-color4);--awb-circle-hover-accent-color:var(--awb-color4);\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-circlecolor-hover:var(--awb-color4);\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-6 col-md-6 col-sm-6 fusion-content-box-hover content-box-column-first-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon icon-hover-animation-fade\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color4);box-sizing:content-box;height:50px;width:50px;line-height:50px;border-radius:50%;font-size:25px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-mobile-alt fas circle-yes\"><\/i><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:24px;--fontSize:24;line-height:var(--awb-typography1-line-height);\">Companion app for data evaluation on the smartphone:<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\r\n<p><span class=\"TextRun SCXW14341543 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW14341543 BCX0\">Subject to the CRA as it is not a medical device itself.<\/span><\/span><\/p>\r\n<\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-circlecolor-hover:var(--awb-color4);\" class=\"fusion-column content-box-column content-box-column content-box-column-2 col-lg-6 col-md-6 col-sm-6 fusion-content-box-hover content-box-column-last content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon icon-hover-animation-fade\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\"><div class=\"icon\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color4);box-sizing:content-box;height:50px;width:50px;line-height:50px;border-radius:50%;font-size:25px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-cloud fas circle-yes\"><\/i><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:24px;--fontSize:24;line-height:var(--awb-typography1-line-height);\">Cloud backend for medical software<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\r\n<p><span data-contrast=\"auto\">Rather CRA-relevant if no medical device status exists.<\/span><\/p>\r\n<p>&nbsp;<\/p>\r\n<\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-6 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:calc( 70vw + );margin-left: calc(- \/ 2 );margin-right: calc(- \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-bottom:25px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:39;line-height:var(--awb-typography1-line-height);\"><span class=\"TextRun SCXW144351257 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW144351257 BCX0\">NIS2 for operators and manufacturers<\/span><\/span><\/h2><\/div><div class=\"fusion-text fusion-text-8\"><p><span class=\"TextRun SCXW208894721 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW208894721 BCX0\">The NIS2 Directive, updated in 2023, strengthens cybersecurity in critical infrastructures (including the healthcare sector). Hospitals and other &#8220;operators of essential services&#8221; must now meet increased requirements for risk analysis, incident management and reporting obligations. To ensure that this works smoothly, manufacturers are required to design their products (whether medical devices or not) to be secure and to provide their customers with sufficient technical information. <\/span><\/span><\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-7 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:calc( 70vw + );margin-left: calc(- \/ 2 );margin-right: calc(- \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-6 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-bottom:25px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:39;line-height:var(--awb-typography1-line-height);\"><span class=\"TextRun SCXW44170116 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW44170116 BCX0\">A look at the USA: FDA and Co.<\/span><\/span><\/h2><\/div><div class=\"fusion-text fusion-text-9\"><p><span class=\"TextRun SCXW86013264 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW86013264 BCX0\">In the USA, the FDA (Food and Drug Administration) is a leader in the regulation of <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW86013264 BCX0\">cyber<\/span><span class=\"NormalTextRun SCXW86013264 BCX0\"> Security in the medical device sector. However, there is no direct counterpart to the <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW86013264 BCX0\">Cyber<\/span> <span class=\"NormalTextRun SpellingErrorV2Themed SCXW86013264 BCX0\">Resilience<\/span><span class=\"NormalTextRun SCXW86013264 BCX0\"> Act. The &#8220;U.S. <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW86013264 BCX0\">Cyber<\/span><span class=\"NormalTextRun SCXW86013264 BCX0\"> Trust Mark Act&#8221; relies more on voluntary measures and is more focused on the consumer market. International manufacturers must therefore comply with EU requirements (CRA, MDR, IVDR) and US standards (FDA <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW86013264 BCX0\">Guidances<\/span><span class=\"NormalTextRun SCXW86013264 BCX0\">), provided they operate in both markets.<\/span><\/span><\/p>\n<\/div><div class=\"fusion-image-element \" style=\"--awb-margin-bottom:30px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\" style=\"border-radius:10px;\"><img decoding=\"async\" width=\"1200\" height=\"800\" alt=\"BAYOOMED-Richtlinien\" title=\"BAYOOMED-Richtlinien\" src=\"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/04\/BAYOOMED-Richtlinien.jpg\" class=\"img-responsive wp-image-5530\" srcset=\"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/04\/BAYOOMED-Richtlinien-200x133.jpg 200w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/04\/BAYOOMED-Richtlinien-400x267.jpg 400w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/04\/BAYOOMED-Richtlinien-600x400.jpg 600w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/04\/BAYOOMED-Richtlinien-800x533.jpg 800w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/04\/BAYOOMED-Richtlinien.jpg 1200w\" sizes=\"(max-width: 1100px) 100vw, 1200px\" \/><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-8 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:calc( 70vw + );margin-left: calc(- \/ 2 );margin-right: calc(- \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-7 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-bottom:25px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:39;line-height:var(--awb-typography1-line-height);\"><span class=\"TextRun SCXW73791931 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW73791931 BCX0\">Consequences for manufacturers of healthcare software<\/span><\/span><\/h2><\/div><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-1 fusion-columns-total-3 fusion-content-boxes-4 content-boxes-timeline-vertical content-left content-boxes-timeline-layout content-boxes-icon-with-title fusion-delayed-animation\" style=\"--awb-title-color:var(--awb-color4);--awb-circlecolor-hover:var(--awb-color4);--awb-item-margin-bottom:5px;--awb-margin-bottom:0px;--awb-hover-accent-color:var(--awb-color4);--awb-circle-hover-accent-color:var(--awb-color4);\" data-animation-delay=\"350\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-circlecolor-hover:var(--awb-color4);--awb-content-padding-left:70px;\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon icon-hover-animation-fade fusion-animated\" data-animationType=\"fadeIn\" data-animationDuration=\"0.25\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\" style=\"margin-top:13px;\"><div class=\"icon\" style=\"margin-top:-13px;margin-bottom:-13px;-webkit-animation-duration: 350ms;animation-duration: 350ms;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color4);box-sizing:content-box;height:50px;width:50px;line-height:50px;border-radius:50%;font-size:25px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-angle-right fas circle-yes\"><\/i><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:24px;--fontSize:24;line-height:var(--awb-typography1-line-height);\">Separate consideration of medical device software and other components<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\r\n<p><span class=\"TextRun SCXW217370723 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW217370723 BCX0\">It is crucial to clarify at an early stage which parts of the product (e.g. firmware, app, cloud components) fall under the MDR and which must meet the CRA requirements.<\/span><\/span><\/p>\r\n<\/div><div class=\"content-box-shortcode-timeline-vertical\" style=\"border-color:var(--awb-color8);left:40px;top:25px;-webkit-transition-duration: 350ms;animation-duration: 350ms;\"><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-circlecolor-hover:var(--awb-color4);--awb-content-padding-left:70px;\" class=\"fusion-column content-box-column content-box-column content-box-column-2 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon icon-hover-animation-fade fusion-animated\" data-animationType=\"fadeIn\" data-animationDuration=\"0.25\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\" style=\"margin-top:13px;\"><div class=\"icon\" style=\"margin-top:-13px;margin-bottom:-13px;-webkit-animation-duration: 350ms;animation-duration: 350ms;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color4);box-sizing:content-box;height:50px;width:50px;line-height:50px;border-radius:50%;font-size:25px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-angle-right fas circle-yes\"><\/i><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:24px;--fontSize:24;line-height:var(--awb-typography1-line-height);\">Documentation and reporting obligation<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\r\n<p><span class=\"TextRun SCXW194208539 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW194208539 BCX0\">Similar to MDR\/IVDR, the CRA requires conscientious documentation of all safety measures. In addition <\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW194208539 BCX0\">includes<\/span><span class=\"NormalTextRun SCXW194208539 BCX0\"> regular patch management and reporting relevant security vulnerabilities to authorities and customers.<\/span><\/span><\/p>\r\n<\/div><div class=\"content-box-shortcode-timeline-vertical\" style=\"border-color:var(--awb-color8);left:40px;top:25px;-webkit-transition-duration: 350ms;animation-duration: 350ms;\"><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-circlecolor-hover:var(--awb-color4);--awb-content-padding-left:70px;\" class=\"fusion-column content-box-column content-box-column content-box-column-3 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon icon-hover-animation-fade fusion-animated\" data-animationType=\"fadeIn\" data-animationDuration=\"0.25\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\" style=\"margin-top:13px;\"><div class=\"icon\" style=\"margin-top:-13px;margin-bottom:-13px;-webkit-animation-duration: 350ms;animation-duration: 350ms;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color4);box-sizing:content-box;height:50px;width:50px;line-height:50px;border-radius:50%;font-size:25px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-angle-right fas circle-yes\"><\/i><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:24px;--fontSize:24;line-height:var(--awb-typography1-line-height);\">Risk analysis and \u201csecurity by design\u201d<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\r\n<p><span class=\"NormalTextRun SCXW89936890 BCX0\">Both MDR and CRA require holistic risk assessments: What are the potential vulnerabilities? How can attacks be minimized? Manufacturers must proactively integrate security measures into the development process (&#8220;Security <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW89936890 BCX0\">by<\/span><span class=\"NormalTextRun SCXW89936890 BCX0\"> Design&#8221;) and configure products securely by default (&#8220;Security <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW89936890 BCX0\">by<\/span><span class=\"NormalTextRun SCXW89936890 BCX0\"> default&#8221;).<\/span><\/p>\r\n<\/div><div class=\"content-box-shortcode-timeline-vertical\" style=\"border-color:var(--awb-color8);left:40px;top:25px;-webkit-transition-duration: 350ms;animation-duration: 350ms;\"><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-9 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:calc( 70vw + );margin-left: calc(- \/ 2 );margin-right: calc(- \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-8 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-bottom:25px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:39;line-height:var(--awb-typography1-line-height);\"><span class=\"TextRun SCXW238637183 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW238637183 BCX0\">Checklist:<br \/><\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW238637183 BCX0\">Cyber<\/span><span class=\"NormalTextRun SCXW238637183 BCX0\"> Security for manufacturers<\/span><\/span><\/h2><\/div><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-1 fusion-columns-total-5 fusion-content-boxes-5 content-boxes-timeline-vertical content-left content-boxes-timeline-layout content-boxes-icon-with-title fusion-delayed-animation\" style=\"--awb-title-color:var(--awb-color4);--awb-circlecolor-hover:var(--awb-color4);--awb-item-margin-bottom:5px;--awb-margin-bottom:0px;--awb-hover-accent-color:var(--awb-color4);--awb-circle-hover-accent-color:var(--awb-color4);\" data-animation-delay=\"350\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-circlecolor-hover:var(--awb-color4);--awb-content-padding-left:70px;\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon icon-hover-animation-fade fusion-animated\" data-animationType=\"fadeIn\" data-animationDuration=\"0.25\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\" style=\"margin-top:13px;\"><div class=\"icon\" style=\"margin-top:-13px;margin-bottom:-13px;-webkit-animation-duration: 350ms;animation-duration: 350ms;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color4);box-sizing:content-box;height:50px;width:50px;line-height:50px;border-radius:50%;font-size:25px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-check fas circle-yes\"><\/i><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:24px;--fontSize:24;line-height:var(--awb-typography1-line-height);\">Threat and risk analysis<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\r\n<p><span class=\"TextRun SCXW70540242 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW70540242 BCX0\">Use standardized methods such as STRIDE (to identify different risk types) and CVSS (Common <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW70540242 BCX0\">Vulnerability<\/span><span class=\"NormalTextRun SCXW70540242 BCX0\"> Scoring System) to prioritize vulnerabilities.<\/span><\/span><\/p>\r\n<\/div><div class=\"content-box-shortcode-timeline-vertical\" style=\"border-color:var(--awb-color8);left:40px;top:25px;-webkit-transition-duration: 350ms;animation-duration: 350ms;\"><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-circlecolor-hover:var(--awb-color4);--awb-content-padding-left:70px;\" class=\"fusion-column content-box-column content-box-column content-box-column-2 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon icon-hover-animation-fade fusion-animated\" data-animationType=\"fadeIn\" data-animationDuration=\"0.25\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\" style=\"margin-top:13px;\"><div class=\"icon\" style=\"margin-top:-13px;margin-bottom:-13px;-webkit-animation-duration: 350ms;animation-duration: 350ms;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color4);box-sizing:content-box;height:50px;width:50px;line-height:50px;border-radius:50%;font-size:25px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-check fas circle-yes\"><\/i><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:24px;--fontSize:24;line-height:var(--awb-typography1-line-height);\">Security by Design <\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\r\n<p><span class=\"TextRun SCXW104453456 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW104453456 BCX0\">Integrate protective measures as early as the design and development phase.<\/span><\/span><\/p>\r\n<\/div><div class=\"content-box-shortcode-timeline-vertical\" style=\"border-color:var(--awb-color8);left:40px;top:25px;-webkit-transition-duration: 350ms;animation-duration: 350ms;\"><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-circlecolor-hover:var(--awb-color4);--awb-content-padding-left:70px;\" class=\"fusion-column content-box-column content-box-column content-box-column-3 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon icon-hover-animation-fade fusion-animated\" data-animationType=\"fadeIn\" data-animationDuration=\"0.25\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\" style=\"margin-top:13px;\"><div class=\"icon\" style=\"margin-top:-13px;margin-bottom:-13px;-webkit-animation-duration: 350ms;animation-duration: 350ms;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color4);box-sizing:content-box;height:50px;width:50px;line-height:50px;border-radius:50%;font-size:25px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-check fas circle-yes\"><\/i><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:24px;--fontSize:24;line-height:var(--awb-typography1-line-height);\">Software Bill of Materials (SBOM) <\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\r\n<p><span class=\"TextRun SCXW163556550 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW163556550 BCX0\">Keep an inventory of all software components used (open source and proprietary).<\/span><\/span><\/p>\r\n<\/div><div class=\"content-box-shortcode-timeline-vertical\" style=\"border-color:var(--awb-color8);left:40px;top:25px;-webkit-transition-duration: 350ms;animation-duration: 350ms;\"><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-circlecolor-hover:var(--awb-color4);--awb-content-padding-left:70px;\" class=\"fusion-column content-box-column content-box-column content-box-column-4 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon icon-hover-animation-fade fusion-animated\" data-animationType=\"fadeIn\" data-animationDuration=\"0.25\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\" style=\"margin-top:13px;\"><div class=\"icon\" style=\"margin-top:-13px;margin-bottom:-13px;-webkit-animation-duration: 350ms;animation-duration: 350ms;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color4);box-sizing:content-box;height:50px;width:50px;line-height:50px;border-radius:50%;font-size:25px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-check fas circle-yes\"><\/i><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:24px;--fontSize:24;line-height:var(--awb-typography1-line-height);\">CVE Analysis<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\r\n<p><span class=\"TextRun SCXW148392674 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW148392674 BCX0\">Check known security gaps at least once a year (preferably monthly) using your SBOM.<\/span><\/span><\/p>\r\n<\/div><div class=\"content-box-shortcode-timeline-vertical\" style=\"border-color:var(--awb-color8);left:40px;top:25px;-webkit-transition-duration: 350ms;animation-duration: 350ms;\"><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-circlecolor-hover:var(--awb-color4);--awb-content-padding-left:70px;\" class=\"fusion-column content-box-column content-box-column content-box-column-5 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon icon-hover-animation-fade fusion-animated\" data-animationType=\"fadeIn\" data-animationDuration=\"0.25\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\" style=\"margin-top:13px;\"><div class=\"icon\" style=\"margin-top:-13px;margin-bottom:-13px;-webkit-animation-duration: 350ms;animation-duration: 350ms;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color4);box-sizing:content-box;height:50px;width:50px;line-height:50px;border-radius:50%;font-size:25px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-check fas circle-yes\"><\/i><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:24px;--fontSize:24;line-height:var(--awb-typography1-line-height);\">Independent penetration tests<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\r\n<p><span class=\"TextRun SCXW82674505 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW82674505 BCX0\">Carry out regular <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW82674505 BCX0\">pentests<\/span><span class=\"NormalTextRun SCXW82674505 BCX0\"> by external experts to detect potential weaknesses at an early stage.<\/span><\/span><\/p>\r\n<\/div><div class=\"content-box-shortcode-timeline-vertical\" style=\"border-color:var(--awb-color8);left:40px;top:25px;-webkit-transition-duration: 350ms;animation-duration: 350ms;\"><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-10 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:calc( 70vw + );margin-left: calc(- \/ 2 );margin-right: calc(- \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-9 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-bottom:25px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:39;line-height:var(--awb-typography1-line-height);\"><span class=\"TextRun SCXW202514558 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW202514558 BCX0\">Additional meaningful activities<\/span><\/span><\/h2><\/div><div class=\"fusion-content-boxes content-boxes columns row fusion-columns-1 fusion-columns-total-4 fusion-content-boxes-6 content-boxes-timeline-vertical content-left content-boxes-timeline-layout content-boxes-icon-with-title fusion-delayed-animation\" style=\"--awb-title-color:var(--awb-color4);--awb-circlecolor-hover:var(--awb-color4);--awb-item-margin-bottom:5px;--awb-margin-bottom:0px;--awb-hover-accent-color:var(--awb-color4);--awb-circle-hover-accent-color:var(--awb-color4);\" data-animation-delay=\"350\" data-animationOffset=\"top-into-view\"><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-circlecolor-hover:var(--awb-color4);--awb-content-padding-left:70px;\" class=\"fusion-column content-box-column content-box-column content-box-column-1 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon icon-hover-animation-fade fusion-animated\" data-animationType=\"fadeIn\" data-animationDuration=\"0.25\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\" style=\"margin-top:13px;\"><div class=\"icon\" style=\"margin-top:-13px;margin-bottom:-13px;-webkit-animation-duration: 350ms;animation-duration: 350ms;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color4);box-sizing:content-box;height:50px;width:50px;line-height:50px;border-radius:50%;font-size:25px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-angle-right fas circle-yes\"><\/i><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:24px;--fontSize:24;line-height:var(--awb-typography1-line-height);\">GDPR compliance<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\r\n<p><span class=\"TextRun SCXW179835741 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW179835741 BCX0\">Pay attention to the protection of personal data. Cybersecurity and data protection go hand in hand here. <\/span><\/span><\/p>\r\n<\/div><div class=\"content-box-shortcode-timeline-vertical\" style=\"border-color:var(--awb-color8);left:40px;top:25px;-webkit-transition-duration: 350ms;animation-duration: 350ms;\"><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-circlecolor-hover:var(--awb-color4);--awb-content-padding-left:70px;\" class=\"fusion-column content-box-column content-box-column content-box-column-2 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon icon-hover-animation-fade fusion-animated\" data-animationType=\"fadeIn\" data-animationDuration=\"0.25\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\" style=\"margin-top:13px;\"><div class=\"icon\" style=\"margin-top:-13px;margin-bottom:-13px;-webkit-animation-duration: 350ms;animation-duration: 350ms;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color4);box-sizing:content-box;height:50px;width:50px;line-height:50px;border-radius:50%;font-size:25px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-angle-right fas circle-yes\"><\/i><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:24px;--fontSize:24;line-height:var(--awb-typography1-line-height);\">Privacy by Design <\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\r\n<p><span class=\"TextRun SCXW180438777 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW180438777 BCX0\">Only use the data that you really need and delete superfluous data records early on.<\/span><\/span><\/p>\r\n<\/div><div class=\"content-box-shortcode-timeline-vertical\" style=\"border-color:var(--awb-color8);left:40px;top:25px;-webkit-transition-duration: 350ms;animation-duration: 350ms;\"><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-circlecolor-hover:var(--awb-color4);--awb-content-padding-left:70px;\" class=\"fusion-column content-box-column content-box-column content-box-column-3 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon icon-hover-animation-fade fusion-animated\" data-animationType=\"fadeIn\" data-animationDuration=\"0.25\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\" style=\"margin-top:13px;\"><div class=\"icon\" style=\"margin-top:-13px;margin-bottom:-13px;-webkit-animation-duration: 350ms;animation-duration: 350ms;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color4);box-sizing:content-box;height:50px;width:50px;line-height:50px;border-radius:50%;font-size:25px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-angle-right fas circle-yes\"><\/i><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:24px;--fontSize:24;line-height:var(--awb-typography1-line-height);\">Optimized security concepts<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\r\n<p><span class=\"TextRun SCXW82657935 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW82657935 BCX0\">Reduce attack surfaces by minimizing authorizations and interfaces.<\/span><\/span><\/p>\r\n<\/div><div class=\"content-box-shortcode-timeline-vertical\" style=\"border-color:var(--awb-color8);left:40px;top:25px;-webkit-transition-duration: 350ms;animation-duration: 350ms;\"><\/div><\/div><\/div><div style=\"--awb-backgroundcolor:rgba(255,255,255,0);--awb-circlecolor-hover:var(--awb-color4);--awb-content-padding-left:70px;\" class=\"fusion-column content-box-column content-box-column content-box-column-4 col-lg-12 col-md-12 col-sm-12 fusion-content-box-hover content-box-column-last content-box-column-last-in-row\"><div class=\"col content-box-wrapper content-wrapper link-area-link-icon icon-hover-animation-fade fusion-animated\" data-animationType=\"fadeIn\" data-animationDuration=\"0.25\" data-animationOffset=\"top-into-view\"><div class=\"heading heading-with-icon icon-left\" style=\"margin-top:13px;\"><div class=\"icon\" style=\"margin-top:-13px;margin-bottom:-13px;-webkit-animation-duration: 350ms;animation-duration: 350ms;\"><i style=\"border-color:var(--awb-color8);border-width:0px;background-color:var(--awb-color4);box-sizing:content-box;height:50px;width:50px;line-height:50px;border-radius:50%;font-size:25px;\" aria-hidden=\"true\" class=\"fontawesome-icon fa-angle-right fas circle-yes\"><\/i><\/div><h3 class=\"content-box-heading fusion-responsive-typography-calculated\" style=\"--h3_typography-font-size:24px;--fontSize:24;line-height:var(--awb-typography1-line-height);\">Improved management of vulnerabilities<\/h3><\/div><div class=\"fusion-clearfix\"><\/div><div class=\"content-container\">\r\n<p><span class=\"TextRun SCXW155318477 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW155318477 BCX0\">Set up structured update and patch processes in order to be able to react promptly to new threats.<\/span><\/span><\/p>\r\n<\/div><div class=\"content-box-shortcode-timeline-vertical\" style=\"border-color:var(--awb-color8);left:40px;top:25px;-webkit-transition-duration: 350ms;animation-duration: 350ms;\"><\/div><\/div><\/div><div class=\"fusion-clearfix\"><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-11 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:calc( 70vw + );margin-left: calc(- \/ 2 );margin-right: calc(- \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-10 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-10 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-bottom:25px;--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:39;line-height:var(--awb-typography1-line-height);\"><span class=\"TextRun SCXW134243094 BCX0\" lang=\"DE-DE\" xml:lang=\"DE-DE\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW134243094 BCX0\">Conclusion and outlook<\/span><\/span><\/h2><\/div><div class=\"fusion-text fusion-text-10\"><p><span data-contrast=\"auto\">Although the Cyber Resilience Act formally excludes medical devices that are already regulated by the MDR and IVDR, it is clear that networked software components in the healthcare sector can still fall within the scope of the CRA. Apps, cloud services and peripheral systems in particular, which are used in addition to medical devices, are subject to the strict requirements of the CRA. <\/span><\/p>\n<p><span data-contrast=\"auto\">This creates an extended regulatory framework that takes account of the increasing cyber threats and promotes a holistic approach to security in the healthcare sector. Companies operating in the healthcare sector should therefore take the following steps at an early stage: <\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"8\" data-list-defn-props=\"{\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Identify<\/span><\/b><span data-contrast=\"auto\">which parts of their products fall under the CRA and which under MDR\/IVDR.<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"8\" data-list-defn-props=\"{\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Merging<\/span><\/b><span data-contrast=\"auto\"> requirements into a common compliance and security concept.<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"8\" data-list-defn-props=\"{\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"auto\">Exchange<\/span><\/b><span data-contrast=\"auto\"> with clinics and other operators who have to comply with NIS2 obligations.<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">With the CRA, the EU is sending a clear signal for more security in networked systems. In view of the transitional period, which is expected to last until 2027, there is still some time &#8211; but given the dynamic threat situation, it is worth starting implementation immediately. Only those who think &#8220;security by design&#8221; today and establish seamless processes will be able to survive in the long term in an environment characterized by an increasing number of guidelines and gain the trust of patients, users and institutions in the long term. <\/span><\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-12 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:calc( 70vw + );margin-left: calc(- \/ 2 );margin-right: calc(- \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-11 fusion_builder_column_1_5 1_5 fusion-flex-column fusion-flex-align-self-stretch\" style=\"--awb-bg-size:cover;--awb-width-large:20%;--awb-margin-top-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:calc( 0 * calc( 100% - ) );--awb-width-medium:20%;--awb-order-medium:0;--awb-spacing-left-medium:calc( 0 * calc( 100% - ) );--awb-width-small:100%;--awb-order-small:0;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><i class=\"fb-icon-element-1 fb-icon-element fontawesome-icon fa-hand-holding-medical fas circle-yes\" style=\"--awb-circlebordersize:0px;--awb-font-size:70.4px;--awb-width:140.8px;--awb-height:140.8px;--awb-line-height:140.8px;--awb-margin-top:0;--awb-margin-right:0;--awb-margin-bottom:0;--awb-margin-left:0;--awb-align-self:center;\"><\/i><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-12 fusion_builder_column_4_5 4_5 fusion-flex-column\" style=\"--awb-padding-top:60px;--awb-padding-right:60px;--awb-padding-bottom:60px;--awb-padding-left:60px;--awb-overflow:hidden;--awb-bg-color:var(--awb-color7);--awb-bg-color-hover:var(--awb-color7);--awb-bg-size:cover;--awb-border-radius:60px 60px 60px 60px;--awb-width-large:80%;--awb-margin-top-large:0px;--awb-spacing-right-large:calc( 0 * calc( 100% - ) );--awb-margin-bottom-large:20px;--awb-spacing-left-large:calc( 0 * calc( 100% - ) );--awb-width-medium:80%;--awb-order-medium:0;--awb-spacing-right-medium:calc( 0 * calc( 100% - ) );--awb-spacing-left-medium:calc( 0 * calc( 100% - ) );--awb-width-small:100%;--awb-order-small:0;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-11\" style=\"--awb-text-color:var(--awb-color1);\"><p>The experts at BAYOOMED and BAYOOCARE support you in the development of your digital health application &#8211; from regulatory consulting to post-market surveillance (PMS). Arrange an appointment for an initial consultation.<\/p>\n<\/div><div ><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" style=\"--button-border-radius-top-left:30px;--button-border-radius-top-right:30px;--button-border-radius-bottom-right:30px;--button-border-radius-bottom-left:30px;\" target=\"_self\" href=\"https:\/\/www.bayoomed.com\/en\/#contact\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Contact us now<\/span><\/a><\/div><\/div><\/div><\/div><\/div><\/p>","protected":false},"author":5,"featured_media":5526,"template":"","categories":[45],"class_list":["post-5531","news","type-news","status-publish","has-post-thumbnail","hentry","category-news-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cyber Resilience Act: Healthcare software | BAYOOMED<\/title>\n<meta name=\"description\" content=\"Cyber Resilience Act: What changes for healthcare software manufacturers? Find out about new requirements now.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.bayoomed.com\/en\/news\/cyber-resilience-act-cra-and-healthcare-software\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Resilience Act (CRA) and healthcare software\" \/>\n<meta property=\"og:description\" content=\"Cyber Resilience Act: What changes for healthcare software manufacturers? Find out about new requirements now.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.bayoomed.com\/en\/news\/cyber-resilience-act-cra-and-healthcare-software\/\" \/>\n<meta property=\"og:site_name\" content=\"BAYOOMED\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-23T11:07:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/04\/BAYOOMED-Gesundheitssoftware.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/cyber-resilience-act-cra-and-healthcare-software\\\/\",\"url\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/cyber-resilience-act-cra-and-healthcare-software\\\/\",\"name\":\"Cyber Resilience Act: Healthcare software | BAYOOMED\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/cyber-resilience-act-cra-and-healthcare-software\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/cyber-resilience-act-cra-and-healthcare-software\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.bayoomed.com\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2025\\\/04\\\/BAYOOMED-Gesundheitssoftware.jpg\",\"datePublished\":\"2025-04-23T09:30:43+00:00\",\"dateModified\":\"2025-04-23T11:07:44+00:00\",\"description\":\"Cyber Resilience Act: What changes for healthcare software manufacturers? Find out about new requirements now.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/cyber-resilience-act-cra-and-healthcare-software\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/cyber-resilience-act-cra-and-healthcare-software\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/cyber-resilience-act-cra-and-healthcare-software\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.bayoomed.com\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2025\\\/04\\\/BAYOOMED-Gesundheitssoftware.jpg\",\"contentUrl\":\"https:\\\/\\\/www.bayoomed.com\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2025\\\/04\\\/BAYOOMED-Gesundheitssoftware.jpg\",\"width\":1200,\"height\":800,\"caption\":\"Cyber Resilience Act (CRA) und Gesundheitssoftware\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/cyber-resilience-act-cra-and-healthcare-software\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"News\",\"item\":\"https:\\\/\\\/www.bayoomed.com\\\/news\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Resilience Act (CRA) and healthcare software\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/#website\",\"url\":\"https:\\\/\\\/www.bayoomed.com\\\/\",\"name\":\"BAYOOMED\",\"description\":\"We engineer medical software\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.bayoomed.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cyber Resilience Act: Healthcare software | BAYOOMED","description":"Cyber Resilience Act: What changes for healthcare software manufacturers? Find out about new requirements now.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.bayoomed.com\/en\/news\/cyber-resilience-act-cra-and-healthcare-software\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Resilience Act (CRA) and healthcare software","og_description":"Cyber Resilience Act: What changes for healthcare software manufacturers? Find out about new requirements now.","og_url":"https:\/\/www.bayoomed.com\/en\/news\/cyber-resilience-act-cra-and-healthcare-software\/","og_site_name":"BAYOOMED","article_modified_time":"2025-04-23T11:07:44+00:00","og_image":[{"width":1200,"height":800,"url":"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/04\/BAYOOMED-Gesundheitssoftware.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.bayoomed.com\/en\/news\/cyber-resilience-act-cra-and-healthcare-software\/","url":"https:\/\/www.bayoomed.com\/en\/news\/cyber-resilience-act-cra-and-healthcare-software\/","name":"Cyber Resilience Act: Healthcare software | BAYOOMED","isPartOf":{"@id":"https:\/\/www.bayoomed.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.bayoomed.com\/en\/news\/cyber-resilience-act-cra-and-healthcare-software\/#primaryimage"},"image":{"@id":"https:\/\/www.bayoomed.com\/en\/news\/cyber-resilience-act-cra-and-healthcare-software\/#primaryimage"},"thumbnailUrl":"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/04\/BAYOOMED-Gesundheitssoftware.jpg","datePublished":"2025-04-23T09:30:43+00:00","dateModified":"2025-04-23T11:07:44+00:00","description":"Cyber Resilience Act: What changes for healthcare software manufacturers? Find out about new requirements now.","breadcrumb":{"@id":"https:\/\/www.bayoomed.com\/en\/news\/cyber-resilience-act-cra-and-healthcare-software\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.bayoomed.com\/en\/news\/cyber-resilience-act-cra-and-healthcare-software\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.bayoomed.com\/en\/news\/cyber-resilience-act-cra-and-healthcare-software\/#primaryimage","url":"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/04\/BAYOOMED-Gesundheitssoftware.jpg","contentUrl":"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/04\/BAYOOMED-Gesundheitssoftware.jpg","width":1200,"height":800,"caption":"Cyber Resilience Act (CRA) und Gesundheitssoftware"},{"@type":"BreadcrumbList","@id":"https:\/\/www.bayoomed.com\/en\/news\/cyber-resilience-act-cra-and-healthcare-software\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.bayoomed.com\/en\/"},{"@type":"ListItem","position":2,"name":"News","item":"https:\/\/www.bayoomed.com\/news\/"},{"@type":"ListItem","position":3,"name":"Cyber Resilience Act (CRA) and healthcare software"}]},{"@type":"WebSite","@id":"https:\/\/www.bayoomed.com\/#website","url":"https:\/\/www.bayoomed.com\/","name":"BAYOOMED","description":"We engineer medical software","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.bayoomed.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"acf":[],"_links":{"self":[{"href":"https:\/\/www.bayoomed.com\/en\/wp-json\/wp\/v2\/news\/5531","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bayoomed.com\/en\/wp-json\/wp\/v2\/news"}],"about":[{"href":"https:\/\/www.bayoomed.com\/en\/wp-json\/wp\/v2\/types\/news"}],"author":[{"embeddable":true,"href":"https:\/\/www.bayoomed.com\/en\/wp-json\/wp\/v2\/users\/5"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bayoomed.com\/en\/wp-json\/wp\/v2\/media\/5526"}],"wp:attachment":[{"href":"https:\/\/www.bayoomed.com\/en\/wp-json\/wp\/v2\/media?parent=5531"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bayoomed.com\/en\/wp-json\/wp\/v2\/categories?post=5531"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}