Roman Zhukov - Making EU CRA (Cyber Resilience Act) simplified and non-scary for OSS contributors
By Øredev Conference
Summary
Topics Covered
- CRA Scope Encompasses All Software
- Manufacturers Bear All CRA Obligations
- Open Source Excluded Unless Monetized
- OPS Baseline Maps Directly to CRA
- CRA Forces Supply Chain Security
Full Transcript
[music] I lived in heaven as a developer.
My source code was a beautiful create creation and I dedicated myself to the whole open source void. I was so relaxed
until something happened. This guy came and they took the music down and put my cocktail away.
And the worst thing about it, they didn't mention anything about living.
Welcome to the new world of EU library resilience act. And that is how some of
resilience act. And that is how some of us as a developers especially in the open source world feel ourselves about the CRA. But I hope I can demystify some
the CRA. But I hope I can demystify some of the things about the regulation itself during this this talk and also provide some technical advice how to
navigate it. Welcome everybody again. My
navigate it. Welcome everybody again. My
name is uh Roman and I'm from Ireland.
Um the beautiful home of Guinness James and all of these good things. Um also I work for Red Hat uh when I'm principal architect and responsible for uh strategic community and industry
engagement in security space but also and I'm practitioner I work in security for almost 20 years uh doing all the things from uh vulner vulnerability
response to architecting uh the systems and defending enterprise and products from cyber attacks. But recently in the um in the last year I jumped into this
compliance activity uh into the EU cyber resilience act as an expert uh for the European standardization organizations
uh because this thing matters and um if we don't do it right, it's uh going to provide a lot of harm to the ecosystem and to all of us actually.
Um and yes also I am huge supporter of open source and uh typically um help open source projects on their security journey.
All right. Um what is CU cyber resilience act? Um I think it's good to
resilience act? Um I think it's good to start with the definition of this thing.
This is regulation. Okay. that aims to safeguard consumers and businesses buying or using so-called PTE products with digital elements with introduction
of mandatory cyber security requirements for manufacturers of these pro products throughout the entire life cycle and notably its supply chain. Also imagine
third parties and open source components that are obviously included in all of the products that you can um see uh out
there and CRA actually applicable to um all who does commercial activity in or with EU so that it's not really solely EU thing especially when we think about
software it's really international thing that's why all of the big American companies and other international companies are actually concerned about this things. And if you're wondering
this things. And if you're wondering what's on the picture, this is the famous cheese picture that's produced by European Commission I think roughly one year ago and represents the good
intention of the cyber resilience act to fix those supply chains that's on the left like holes in the chin and to make it finally right to make security
finally as a mandatory thing for all the products which is good.
Uh now what PTE are um and this is the one of the common misconception when I talk to people um about the scope of the
cyber resilience act. Sometimes we think okay this is only for devices or for the physical things that are out there.
Actually uh PDEs are everywhere as you can see on this picture and the regulation defines the certain classes of this PD that you can see on the
slide. For example, smarthome operating
slide. For example, smarthome operating operating systems or even web browsers, password managers uh or uh firewalls, hypervisors or in the critical category
hardware devices with secure bo boxes, smart mirror gateways, smart guards. Um
I think they're all really important and critical to secure and at least to think about them. Uh that should be secure but
about them. Uh that should be secure but actually everything else is also in in scope. All the consumer devices that are
scope. All the consumer devices that are out there and all the software because PDS includes hardware and software
separately. Okay. And actually
separately. Okay. And actually
everything else is counted roughly as more than 90% of everything else. Um so
that means the scope is really wide is really huge.
Uh now what's out of scope which is very important to mention. Um out of scope products covered by the regulations like automotive medical aviation or um
national security regulations something like that which kind of makes sense. uh
pure websites are out of scope as well as software as a service platforms. But this is with a huge caveat because uh there is still uh yet to be developed
the clear definition for RDPs remote data processing uh solution. Basically
if your cloud is essential to operate with your device say you use your cloud to uh kind of tune in your uh fridge or a microwave or something like that and
this is untouchable from the product.
it's in scope as well but the general clouds solutions like AWS Google and etc when you just rent uh some compute there is out of scope free and open source
software FOS you will hear this um acronym a lot during this presentation if not used in course of commercial activity also out of scope which is great which was not uh in the first
version of cyber resilience act but we as a open source community made sure that we made this exclusion Now uh what could go wrong with this
exception? Um of course everything uh
exception? Um of course everything uh unfortunately uh it could be quite small but I will I will describe what's in this picture. It's uh an email that the
this picture. It's uh an email that the open source project lipsy and maintainer of this pro projects received um a couple of month ago and
that states this is queries for to vendor and the questions are is a secure software development life cycle followed
in your lipy open source library do you comply with CRA requirements and my favorite one do you provide proof of conformity
regarding adherence to U C. And on the left hand side you can see the uh dates um and the date of the email and the uh
int um the the date for required response and thanks for giving us exactly two weeks open sour um big vendor to the open source maintainers to
to respond to this and this is happening. This is actually represents
happening. This is actually represents the huge complexity and the huge misunderstanding of the C CRA across the industry and hopefully that gives you
all the perspective why uh we do these things, why I do these things to kind of explain what CRA actually means to uh everybody and most importantly to work
within these uh officials to make sure they do the right things with implementing the regulations so that opensource ecosystem
uh continue to live uh and ensuring their longevity uh because you know what open source maintainers owe you nothing right and
regulation like is not an exception here. So we definitely don't want to
here. So we definitely don't want to regulate open source and you know right now is a good time to actually make it right instead.
Now um important opensource software roles in cyber resilience act. I think
it's uh really it really would be great to clarify them. There are not all the roles here
them. There are not all the roles here on the slide but to simplify and to uh so that you're not bored with all of these things. Uh there are three main
these things. Uh there are three main key roles related to development related to open source. Uh first of all manufacturers there are key
um there are key actors in the in the act. This is uh who actually develops
act. This is uh who actually develops the product and sells them to the market. Right? This kind of makes sense
market. Right? This kind of makes sense manufacturer. Uh and this is weird to
manufacturer. Uh and this is weird to hear manufacturer for software, right?
This is great to hear or or appropriate to hear manufacturer of a car but not manufacturer of piece of software. But
they're all manufacturers. uh oss
maintainers and contributors as I mentioned they're out of scope uh largely but they are mentioned somehow in the regulation and the uh very
important role is actually first appears in the regulation entirely and in the standards in general we didn't see this role before open source software steward
if you can think of the foundation for example Linux foundation of ASP or Python foundation or um Apache they they
kind of all um typically non-commercial non-for-profit organizations that help to govern open source projects. So those
are stewards. Um the sad news here is that most of the open source projects will not have open source software steward obviously because there's still a lot of projects not even this the kind
of small and hobbyist project but also the big projects that are very popular that just developed by one maintainer or a couple of them and they don't belong
to any of the foundation. So this is very important to keep in mind. Um
now the timeline uh I also found it's useful to put the timeline here because um a lot of us ask uh a lot of uh people ask me these questions during these
multiple days. Um the timeline is
multiple days. Um the timeline is actually pretty hard. The regulation is already here. Um and there is the
already here. Um and there is the timeline you can see on the slide but I would like to um drag your attention to uh the September 2026 where reporting
vulnerability obligations will come to um enforcement and December 2027 is the full application of the law. So
the all of the products that will be a that will be put onto the EU market should be compliant with the CRA after this date.
Uh and fines of course uh there is nothing to do uh you know if there are no fines right uh fines are pretty huge that's why the all of big corporations
and actually small corporations as well small companies that produce software or hardware they are concerned and they're must pay attention to this if not
already uh requirements I didn't mean to didn't mean to include this slide but again during in this uh two three days uh was a lot of question what actually means uh
to comply with CR what the requirements are and I decided just to put them blanket uh list here and most of the manufacturers
that's very important to keep in mind uh like 99% them really for manufacturers and for everybody else like stewards they're they're light regime so that they
supposed to be not enforcable uh but along this manuacture lectures are like all great things that uh we as a security professionals have been
actually um talking about for decades to all of the engineering teams, right? And
all the people out there, hey, do security by design and security by default configurations. Uh do the proper
default configurations. Uh do the proper risk management um vulnerability management, you know, take care of the uh or at least check the actively exploited vulnerabilities, something
like that. uh sbombs also is the big
like that. uh sbombs also is the big thing in the C C array. Some of the new things that's coming up with the conformity assessment and C marking. If
you look at your device like phone or I don't know printer at home, you probably can spot on this C mark uh that is uh affixed to the device. So the same
concept would apply to under the CRA as well. It would be interesting to see how
well. It would be interesting to see how to stick this mark to the piece of software that's hanging out out there in the internet. But we will see and also
the internet. But we will see and also free updates uh for the five years at least support and updates.
Now there are all the kind of requirements and glance uh and they they will be clarified actually under the standardization effort that is ongoing
right now.
Um now uh this chart uh again this is small but I will be giving away the presentation anyway. Um this is the um a
presentation anyway. Um this is the um a lot of people are still asking of course I'm affected or not but what but should I do anything if at all under the CRA if
I somehow work with open source right and I will try to spell this chart for you. So first of all if you contributor
you. So first of all if you contributor to the open source project that are you not maintainer for go down so you don't have any
obligations under s just relax like this guy on the first um on the first slide on the beach. Uh if you're a maintainer of the open source project or or help
somehow to maintain the project and don't take money for anything at all. If
answer is is yes you're out of scope. Um
if you maintain a maintainer and accept donations that covers the actual cost of living and you know the actual cost of the development of the platform that you may use maybe something else you also
don't have obligations under the CRA you're all good only if you're maintainer of the open source project and charge for support service or data
or sell somehow the project or licenses um related to this project you you might be in scope of C but if not you're also
out of scope. This is very important to understand. If you're just developer or
understand. If you're just developer or even open sourcing enthusiast something like this or even take donations but do not earn kind of the real big profits out of your projects you are out of scope. Again this is very important to
scope. Again this is very important to understand.
A couple of other things important to understand uh is yes like to reiterate contributor developer you're out of scope. Just to
make it clear, if you work for company and develop something or contribute to something, don't be bothered, right?
It's it's at minimum it's the company's obligation. If they do some products
obligation. If they do some products or, you know, and sell them, but you are all good. If you're a maintainer, you're
all good. If you're a maintainer, you're out of scope. Don't monetize. If any of those uh you are out of scope, if your project is not a product with digital elements, this is again very important
to understand. I know this is all boring
to understand. I know this is all boring stuff regulations but uh think of documentation or research projects or
alphabets or something uh test that you can put out there uh on the GitHub prepo for example it's all out of scope it's not a product by definition right it's not intended to use in any production
capacity and etc and you are also out of scope if the uh PD is not placed on the EU market which is very sophisticated definition, but it's if it's not
monetized, if you don't sell, um you're out of scope.
Um I hope that makes sense so far.
Um and again, all of the requirements and fines uh for manufacturers for these companies, right, not for maintainers and even not for stewards to some
extent.
Um and yes, if you are still scared a little bit and think that is that is something that is you know uh is going to hit um you're not alone with this
understanding. We're all scared to be
understanding. We're all scared to be quite honest. Um and you're not alone
quite honest. Um and you're not alone here. Uh we can help these brilliant
here. Uh we can help these brilliant guys you can see in the picture. I will
explain uh who does what in this picture. Uh first of all I would start
picture. Uh first of all I would start with the beautiful initiatives um that are um happening out there under Eclipse Foundation. There is the ORC that's why
Foundation. There is the ORC that's why this little ORC picture on the top right corner. Uh this is open regulatory
corner. Uh this is open regulatory compliance working group purely open source. Uh we do awareness and
source. Uh we do awareness and guidances. We do inventory. We help
guidances. We do inventory. We help
projects and manufacturers and everybody actually navigate the CRA compliance. Uh
we will be building specifications and etc. If you go if you want to join, you can simply Google us or or see working group or go to the GitHub or scan the QR
code. It's all free of charge. It's open
code. It's all free of charge. It's open
source. You can jump into the calls without any registrations or SMS or something like like this. So it's good collaborative activity. Please join us
collaborative activity. Please join us uh to work on the beautiful things. What
exactly we do? We for example answer all of these questions that a lot of us actually still have, right? What is CRA?
What's the where's the official text?
What is not in scope of CRA? For
example, is distributing binaries or container images of open source project considered as making it available on the market and therefore your in scope or or
or not. So there are good questions that
or not. So there are good questions that we do uh CRA FAQ for this and now it has a beautiful website cra.corkinggroup.org.
cra.corkinggroup.org.
Uh you can find some of the questions out there or just Google us. Um what
else we do? Um under the uh OpenSSF which stands for uh opensource security foundation which under Linux foundation we do a lot of brilliant things around security.
uh but specifically uh I am co-chairing this global cyber policy working group which is also working to simplify some of the CRA uh requirements
um to the to everybody actually again we're not limiting ourselves to help open-source maintainers um exclusively or manufacturers we want to help
everybody actually to put them all together under the one table so that we can talk to each other which is actually the core point of the cyber resilience act specifically when it comes to open
source ecosystem it demands manufacturers finally to give something back to open source even if it's conversation it's already a good start
so what we do under this working group we do serial clarifications blog post workshops we have done uh the the recent brilliance workshop in gant in Belgium
actually last week um and we do some tools and etc And the beautiful thing is this CRA free class again you can Google
it easily opens uh CRA class which is free of charge and it provides some basics about the cyber resilience act it's not that deep it's super quick but
then you can get the basic understanding first and also you uh get this nice page you can attach credly page to LinkedIn so this quite nice it's already more
than 5k Okay. Uh people uh have taken this class. Again, this is kind of
this class. Again, this is kind of purely free. Uh and if you want to join,
purely free. Uh and if you want to join, just uh join us. We also have the regular meetings. We have the uh
regular meetings. We have the uh materials that you can learn. Uh jump
us, ask questions. Um we're happy to see everybody. Again, open source is so you
everybody. Again, open source is so you can join whenever you want and do whatever you want.
Now, uh what practical things we do? uh
uh it's I promised that's the uh inside the presentation I'm going to show some practical things not only this overview of the regulation but how uh the current
security practices and tools could be as easily as possible uh and as meaningfully as possible applicable to uh projects and that actually would
applicable to open source project but also to um your own pro uh your own products if you work for enterprise or for companies is first of all I'm going to start with this beautiful projects
also under open ssf which called opensource product security baseline this is the framework basically uh as of last
release of October I think 2025 62 requirements across three level of maturity covering eight areas of security practices but if you have a
look at the slides you can see um among others documentation legal uh quality governance they're not purely
security right it's just good practices that uh I think all the projects or definitely product would like to undertake would like to implement uh just because we all want to do the right
things right and we and I think I mean as a former developer I always think that we wanted to do the quality products right the best in class so this is the best practices uh they're focused
they're only must requirements uh no shoot. So there's no like uh wiggle
shoot. So there's no like uh wiggle wiggle which is good and they're realistic and practical to implement. Um
one example is uh this for example I see uh 02.01 01 when a new collaborator is added to your Git repo for example the version control system must require a
manual permission assignment or restrict uh the collaboration permissions kind of makes sense the list privilege uh principle which is one of the core principle of the security overall right
kind of makes sense to do it actually or to enable this capability in whatever uh your favorite g platform you use um now how can it help with the cyber
resilience act uh would be the next good question. Um actually this is already
question. Um actually this is already existing mapping between the uh open source baseline to the other security fra frameworks that are developed by
NIST for example US um agency that's that's uh throw out some of the security requirements and other technical requirements to other popular frameworks
but now uh the group did the mapping to CRA and for example uh just the one top here um uh OPS uh all compiles released
software assets must be delivered with a software bill of materials as bomb basically which is a good practice to do in general of course but in C actually this is a mandate for sbombs now so all
the manufacturers at least would needs to do to produce these sbombs and this is onetoone connection between the good practice that is written in OPS and the
CRA the same is applicable for uh for example documentation must contain security context It kind of makes sense if you produce documentation uh whether it's open source projects or the
products it makes sense to provide some some context right to report the vulnerabilities um and so on and so forth. So this all mapping uh we assume would be really
helpful for manufacturers and developers and companies and also for uh open source projects that's out there to just okay
I'm implementing uh OPS at the certain level and that would help me like almost 100% to cover the CRA requirement
again this is not one but I'm doing the good things and most probably I'm going to be all Right.
Uh also this all things if you pretend you enable all of these so you kind of do this this this and that all these um
combined may help with so-called voluntary artistations uh or uh how um I personally call it um CRA compatible for
uh projects right for the piece of software um the notion of voluntary attestations actually pretty simple It's um it's intended under the C there is a
special section talking about the voluntary attestations for open source project that basically mean if you would like and only if you would like it's not an obligation but that is possible for
you as a project to um do all of these security practices and call yourself a tested kind of CRA compat compatible. I
don't like compliant because for open source project compliance is not a thing right but I do all of these things and that means I'm I'm good so this is
voluntary attitation thing intended to help them then manufacturers to um to make sure that they consume secure third
parties in their own products simple example uh imagine open SSL right or Linux kernel even or some other libraries JC whatever packages you
consume. Um
consume. Um if you as a company who ingest all of this into your own product, if you kind of can check that these guys do a great
job in security, I think you uh would be sleep much better. So that's the uh that's the intention again voluntary thing that's the goal only for those
projects who really want to show off that they do uh good things.
Um uh this is a good picture actually how CRA compatible may look like. Uh
this is the recently published um GitHub repo. Again you can go and check it's
repo. Again you can go and check it's it's all open. It's all free uh by uh this brilliant person James Serling. they um they've done the whole
Serling. they um they've done the whole GitHub preper with how how this could be shown at the at the project itself at
the GitHub preparate for example how to exactly uh how to exactly write down that the project's kind of compatible with essential cyber security requirements or uh how to produce the
conformance assessment evidence how it may look like with all these markdowns and etc. pretty much nice illustration how it potentially could be done. There
is no standardized way so far how to to do this and this is brilliant attempt at least to get some of the sense how it may look like.
Okay. Uh now uh maintainer um do we have any uh open source contributors in the room who contributes to open source?
Yes. Good. um if you are a maintainer uh how to react or if you're a contributor but close to the kind of project governance and etc how to react remember
I showed you the request that put it that way by ugly uh big company hey open source projects are you compliant actually so how to react for these type
of things uh that could be like are you CRA compliant or provide please security related information about your project uh or some or something else. Uh
consider it as a collaboration opportunity, right? If um most of the
opportunity, right? If um most of the open source projects quite obviously are under resourced and they don't want to do anything beyond um the bare minimum
which is absolutely understandable and I get it. Uh but if you have something uh
get it. Uh but if you have something uh that you are not doing and you know you need help with you can express your interest back and say hey why don't you help with this this and that so that we can kind of collectively achieve this
goal of the good security posture for my open source project because I believe you manufacturer actually reach reach out to me because you consume my product
uh my open source projects right so why don't we do this all better together uh point out to another entity who actually monetize your project that could be also
an opportunity to collaborate. Uh for
those advanced maintainers who are not kind of uh monetizing their project but probably would like to or have the good handles with the companies who do this uh kind of good collaboration
opportunity and there are two examples how curl and the brilliant uh Swedish guy Dennis Danberg does this with the uh commercial company and opens also does
this with their commercial company. So
this is kind of uh two um good use cases uh how to navigate this both for open source project and for the uh commercial offering of this open source project.
Don't be overdefensive. Uh I would suggest to provide gentle I'm not your supplier just in case if you don't want to respond again you you don't have to.
You can just think in your head go away and do nothing. But if you still want to respond for some reason, uh just uh provide gentle response. I'm not your
supplier. And in the CRA FAQ that I just
supplier. And in the CRA FAQ that I just showed you under the ORC working group, we have this template that's also in the
screenshot here. Um like how to respond
screenshot here. Um like how to respond uh with the references to the CRA text itself so that these manufacturers go
away of you.
Um now may if you're a maintainer or just open source supporter uh you may wanted to improve security posture of your product and I intentionally crossed
out this CRA because uh to me the uh majority of the things and the spirit of the CRA is actually good and you know it's supposed to lead to the just good
security posture and the quality product and projects. uh what you can do is the
and projects. uh what you can do is the kind of uh simple things enable uh available security features on your favorite g platform. Unfortunately, as I am engaged to a lot of open source
projects out there, I still see they don't enable uh MFA or they don't enable just the native uh security uh features and all all of these scans that are
offered for free as for open source projects for them at the majority of the platforms of the G platform. So just
enable all of these things. Uh check
security and vulnerability management policy. Uh it's uh often the written uh
policy. Uh it's uh often the written uh under the security markdown file and there are a couple of examples. Uh I
also can can you can follow the link and find them out there. Uh but the vulnerability reporting is the major thing under this series. So we probably
would need would like to revisit this explore security baseline. uh as I mentioned this is a good thing. This is
a just good framework of the good security practices and level one even level one is a really good step. Uh that
is nothing really dramatic uh to do in the level one there again just mostly sec secure by default configurations that you wanted to enable and probably
adjust your your documentation a little bit but uh it's it's a fantastic step.
Now if you wanted to go and these three things actually arguably would be enough for the CRA stuff as I mentioned there is no
standardization yet but we are working on kind of making sure uh there the the bare minimum of the good security practice is standardized in some way so
that it's first applicable to the uh majority of the projects if not to everybody and second understandable by all the parties including in all these regulators and etc. So this top three
now if you are a little bit advanced uh document your security development practices there is the another uh specification or framework that called
security uh- insights.yaml YAML that is basically machine readable notation or kind of format of the security practices that you already do for your project.
For example, okay, this is my um you know my uh I do threat modeling or I do SAS scanning, right? Or I do composition analysis scanning or I do sbombs or
something like this. declaration of the good security practices that you actually do but in machine readable format. Quite nice because it could be
format. Quite nice because it could be consumable by others to actually verify uh very quickly and assess your project if they need to. Open the SEF best page
uh I will go to this example uh a little bit later. um document security self
bit later. um document security self assessment also a good practice um as well as sbombs uh generate and store and there are a lot of open source tools of
course to generate uh sbombs and now you can store and analyze them with the open source projects like guac and trustify for example the again completely free and open source project that you can
roll out either within the organization or for open source project to store all of this sbomb information security advisory is combine them all together in machine readable format and have the
nice picture do prioritization quite nice actually with a even user interface if you want if you don't want it's of course uh supports CLI but it's
it's kind of user friendly thing um and about minder I will um tell you just in a minute now automated uh you can ask the
question okay um there are all good security practices but uh it sounds like a little bit manual work which could be at some extent especially when you're working on documentation and etc. But
for some of the things uh you can automate it uh to to some extent and this is uh one example key clock is actually just open source pro project I
think the most popular and most adoptable open source project for SSO um uh kind of management and identity and access management. Uh but if you kind of
access management. Uh but if you kind of look into the GitHub repo itself, it has best practices page which is um justification that this project
implements all of the security practices, all the best security practices and this is nice on the GitHub repo itself so that everybody can go and
check and of course project can brag about that. Um, open SSF scorecard is
about that. Um, open SSF scorecard is also good project uh under of uh open SSF which is um essentially the job that
could be performed in the GitHub actions for example or another automation and periodically can check that the project utilizes all the security practices and
then produce also the batch within the score and all of the security practices are more or less aligned with what I have been talking about previously, right? Whether or not there are any
right? Whether or not there are any dangerous workflows, do you sign your release if you do binary releases? Do
you perform code reviews? Uh how you handle token permissions which is um quite important and actually uh is the um is the very popular attack vector uh
to through the open source project to the companies. That is how uh my
the companies. That is how uh my previous company got hacked a little bit. Um so this is nice automation that
bit. Um so this is nice automation that you could uh implement to the um to the project whether for your own uh project in the company or for the open source
project.
Uh minder uh another brilliant tool under opens and also open source completely that actually implements some of the uh automation out there so they
can roll out some of the policies. Uh
and on the screenshot on the right hand side you can see the YAML files with these configurations for example actions check default permissions uh check pins
tags um you know uh salsa which is uh the the uh framework and standard for provenence for the software. So this is
this this tool can help with automation of all of these good practices that you uh may already uh implement within your projects and open source of course.
Um now uh finally uh why we care as a Red Hat about all of these security things and most importantly about the CRA things. Uh that's actually a good
CRA things. Uh that's actually a good question because we as a company um occupy the weird position uh under the cyber resilience act. We are a
manufacturer because quite obviously we are a vendor of enterprise open source software solutions. think of rail
software solutions. think of rail operating system or open shift uh our cloud uh platform right but also we are open source software stewards uh because
we uh host some of the most popular open source project and support them like Fedora for example operation system oral lama recently and something
like this so we are steward remember this roles right and this manufacturers stewards and also redartters are contributors and maintainers ers for the thousands of
open source projects out there starting from Linux kernel and so on. Okay. And
we also try to lead the efforts on this space. What I've taken uh today is
space. What I've taken uh today is already uh channeled through the standardization efforts and the U official uh officials channels so that we make sure that those good security
practices are actually incorporated in the meaningful and reasonable way into the regulation and the standards.
Um on the positive note, right? Um
hopefully you're not that scared so far.
Uh on the positive note, why CA CRA is good. This is like a compiled message
good. This is like a compiled message that I keep hearing from uh some of the security experts that I talked to and also represent my personal position. CRA
uh actually has a potential to make more for supply chain security and finally aims to fix this problem at scale just in a few years because we have
deadlines, we have this pressure.
Then we as a security experts were lurking uh behind the engineers and trying uh developers to convince just to do the good security things right. So
CRA is naturally a good thing but of course we'll want to make CRA even better uh because that goes far beyond compliance again that's why I jumped
into this activity I'm not necessarily compliance person right but CRA also goes beyond the compliance because uh regardless of your role steward manufacturer maintainer just developer
uh you probably want to join this effort to make it all right right as to make finally the the kind of could uh in collaboration make it all right.
And you can read um other statements uh in the Red Hat Cray blog uh that we do uh also kind of uh good good to good to good to know what what we think about
all these things and takeaways. Um would like to uh leave
and takeaways. Um would like to uh leave you with uh a couple of takeaways. Um do
not stop contributing and support open source because of the CRA. This is the major takeaway, the main one, right?
Please continue to contribute as I showed you. Likely you're out of scope
showed you. Likely you're out of scope actually uh at least as a person, right?
Definitely learn and educate others in uh the community. It's actually free for most of the cases as I showed you classes, you know, and other uh avenues when you can collaborate and learn. Take
is take it as a call for improving quality and security posture for open source. Join community efforts. We need
source. Join community efforts. We need
your voices. This is super important because otherwise we don't know whether what we are offering and what we're working on is applicable to you your
case or not. If it's not, speak up. Join
our efforts. Ask these questions so that we have more voices in the community and opportunity to answer these questions and to address these concerns and again
to make it all right and act now. Uh
this is not like a very long time before uh it all kicks off. uh by following good practices already and automations and tools that I just showed. If you are
like a person who wants to listen not to uh watch uh or read uh there is also a podcast that was recorded um by by me
and uh with with me and Emily Fox also from Red Hat hosted by Mike Sham. This
application security weekly great podcast in general I listen it actually for quite a few years. Uh you can listen also some of our thoughts about CRA there as well.
Um let's build a secure future for all and in open source way in collaborative way. Um
way. Um I hope that was helpful. Thank you very much.
>> [applause]
Loading video analysis...