Essential Cybersecurity Requirements

How Dispel’s products meet the Essential Cybersecurity Requirements set out in Annex I, Parts I and II of Regulation (EU) 2024/2847

This document provides a high-level description of how Dispel meets the Essential Cybersecurity Requirements set out in Annex I, Parts I and II of Regulation (EU) 2024/2847 (Cyber Resilience Act, or "CRA") for the digital elements listed below. Corporate IT systems, internal tooling, and unrelated SaaS components are out of scope except where they directly support the security properties of the listed products.

Digital Elements in Scope

  • Dispel Applications (macOS, iOS, Windows)

  • Wicket ESI

CRA Requirements

Annex I, Part I: Secure-by-Design and Development

CRA Requirement
Conformity Statement

Protection against unauthorized access

The products implement authenticated and authorized access mechanisms appropriate to their operating environments, preventing unauthorized logical access.

Confidentiality of data

Data processed, stored, or transmitted by the products is protected using industry-standard cryptographic mechanisms by default.

Integrity of data, commands, and code

Integrity protections are applied to product code, configuration, commands, and updates to prevent unauthorized modification.

Availability and resilience

The products are designed to remain available and to fail safely under adverse conditions, including resilience to common attack techniques.

Secure-by-default configuration

Products are delivered with secure default configurations that do not require additional hardening to achieve baseline security.

Minimization of attack surface

Only necessary services, interfaces, and permissions are enabled by default; unnecessary functionality is disabled or excluded.

Protection from known vulnerabilities

Known vulnerabilities in product components are identified and addressed prior to release.

Secure update mechanisms

Updates are delivered through authenticated and integrity-protected mechanisms to prevent tampering.

Secure lifecycle support

Security updates are provided for a defined support period appropriate to the product lifecycle.

Logging and monitoring (where appropriate)

Security-relevant events are recorded or surfaced in a manner appropriate to the product’s role and environment.

Least privilege

Products operate using the minimum privileges required for their intended functionality.

Protection against malicious code execution

Measures are implemented to prevent unauthorized or malicious code execution within the product.

Secure interoperability

Interactions with operating systems and external components are designed and implemented securely.

Resistance to common attack techniques

Product design considers common attack vectors such as spoofing, replay, tampering, and privilege escalation.

Annex I, Part II: Vulnerability Handling and Post-Market Obligations

CRA Requirement
Conformity Statement

Vulnerability handling process

A documented vulnerability handling process is maintained for the products in scope.

Coordinated Vulnerability Disclosure (CVD)

A public channel exists for the responsible disclosure of security vulnerabilities.

Vulnerability intake and triage

Reported vulnerabilities are assessed, prioritized, and tracked based on severity and impact.

Timely remediation

Security vulnerabilities are remediated without undue delay.

Secure distribution of fixes

Security fixes are distributed using the same secure update mechanisms as standard releases.

User and customer communication

Users are informed of relevant security issues when appropriate.

Exploitation awareness

Information about known or suspected exploitation is monitored and considered during response activities.

Regulatory reporting

Procedures exist to report actively exploited vulnerabilities to relevant EU authorities when required by law.

Software Bill of Materials (SBOM)

Software composition information is maintained for the products.

Record retention

Records relating to vulnerabilities and remediation actions are retained for regulatory review.

Last updated