Introduction

Introduction

Software tools are central to the development, verification, production, and maintenance of safety-related and security-critical systems. Compilers, static analysis tools, model-based development environments, build systems, servers, firewalls, and IT management tools strongly influence the correctness and integrity of resulting products. Faulty, misused, or manipulated tools may introduce systematic errors that propagate across multiple downstream products and remain difficult to detect.

While functional safety standards traditionally address tool confidence in a systematic way, security standards do not and instead focus on system aspects. We call this the “Tool Security Gap”.

Recent cybersecurity incidents demonstrate that tools can also represent dangerous attack vectors within complex software supply chains. Unlike in the safety domain, tools may be even more critical than other aspects and therefore require systematic treatment. The European Union Cyber Resilience Act (CRA) gives tools the same priority as software, since it does not differentiate between software and tools. It introduces binding cybersecurity obligations for products with software (including tools) placed on the market.

Learn more about the CRA in our in-depth article.

Tools, Software, and Libraries in Safety Standards

Tools, Software, and Libraries in Safety Standards

Let's start with the definition of a tool.

In functional safety standards such as ISO 26262 and IEC 61508, a tool is software used to support development, verification, production, or maintenance activities, but is not integrated into the operational system delivered to the end user. Examples include:

  • Compilers

  • Simulators

  • Static analysers

  • Calibration tools

  • Production-line testers

Tools differ from application software executed in the field and from libraries that are reused unchanged within application software. This distinction reflects the indirect influence of tools, whose impact is exerted through development and production processes rather than through runtime behaviour in the deployed system.

Functional safety standards address tool-related risks using structured risk analysis. ISO 26262 introduces the Tool Confidence Level (TCL), derived from assessing potential tool impact and the probability that tool-generated errors would be detected. Depending on the resulting TCL, qualification measures such as validation, controlled usage, compensating verification activities, and documentation may be required. These measures aim to prevent systematic faults without assuming malicious intent.

Tool Confidence Level Diagram Calculation

Tool Security and Existing Cybersecurity Standards: Tool Management in ISO/SAE 21434

Tool Security and Existing Cybersecurity Standards: Tool Management in ISO/SAE 21434

ISO/SAE 21434 requires that tools capable of influencing the cybersecurity of an item or component be managed. This includes tools used during development, production, and maintenance. However, the standard deliberately remains high-level and does not define explicit tool security levels, classification schemes, or qualification objectives, leaving implementation largely to organisational interpretation.

Toolchain and Supply Chain Attacks: Examples Illustrating the Tool Security Gap

Toolchain and Supply Chain Attacks: Examples Illustrating the Tool Security Gap

Several incidents illustrate the systemic risk posed by compromised development tools and dependencies. The Ken Thompson “Trusting Trust” scenario demonstrates how a manipulated compiler can introduce hidden behaviour into all generated binaries. Stuxnet provided the first real-world example of a toolchain attack with direct safety impact by manipulating a PLC development environment while masking abnormal behaviour.

More recent supply chain attacks, such as SolarWinds and the XZ Utils backdoor, show how compromised build processes or widely reused components can silently affect large numbers of downstream users. These examples highlight that development tools and dependencies represent high-value attack targets whose compromise can have widespread, cascading effects.

The EU Cyber Resilience Act: What You Need to Know

The EU Cyber Resilience Act: What You Need to Know

Below, you’ll find answers to some of the most common questions about the EU Cyber Resilience Act (CRA). If you’re a tool provider looking for clear guidance or support, feel free to get in touch with us.

Does the Cyber Resilience Act Apply to Software Tools?

Does the Cyber Resilience Act Apply to Software Tools?

Yes. The Cyber Resilience Act applies to products with digital elements placed on the European market and does not distinguish between application software and development tools. Software tools with digital functionality and network connectivity, such as update mechanisms, license servers, telemetry features, or communication interfaces, may therefore fall within the scope of the regulation.

What CRA Obligations Apply to Software Tools?

What CRA Obligations Apply to Software Tools?

For tools within scope, the CRA requires risk analysis, implementation of appropriate risk reduction measures throughout design, development, and production, vulnerability handling processes, and supporting technical documentation. Transitional provisions apply to unchanged tools, with an initial focus on reporting obligations.

The good news is: if your tool has not significantly changed, you only need to establish the vulnerability reporting.

What Does Article 14 of the CRA Require for Vulnerability Reporting?

What Does Article 14 of the CRA Require for Vulnerability Reporting?

Article 14 of the Cyber Resilience Act defines mandatory vulnerability reporting obligations for manufacturers of products with digital elements. For software tools that remain unchanged, Article 14 constitutes the primary initial CRA requirement. In this phase, manufacturers are required to establish processes to identify, assess, and report actively exploited vulnerabilities and incidents, without yet implementing the full set of risk reduction measures.

Reporting follows a staged approach, including early warnings, formal notifications, and, where applicable, a final report. Clear responsibilities for vulnerability handling and maintained information on affected users or deployments are required. Full CRA compliance becomes mandatory once tools are modified or further developed.

How Does CRA Vulnerability Reporting Work In Practice?

How Does CRA Vulnerability Reporting Work In Practice?

Vulnerability reporting follows a staged approach, including early warnings, formal notifications, and, if needed, a final report. Manufacturers must define clear responsibilities for handling vulnerabilities and maintain accurate information on affected users or deployments.

When Is Full Cra Compliance Required for Software Tools?

When Is Full Cra Compliance Required for Software Tools?

Full CRA compliance becomes mandatory when a tool is modified or further developed. At that point, manufacturers must implement the complete set of obligations, including risk reduction measures, cybersecurity controls, and full technical documentation.

What Processes and Assessments Are Required for CRA Compliance?

What Processes and Assessments Are Required for CRA Compliance?

CRA compliance for tool providers typically starts with setting up vulnerability handling and reporting processes, including defined roles, reporting channels, and documentation artefacts. For new or updated tools, it expands to structured risk analysis, cybersecurity control implementation, residual risk management, and technical documentation. Most development tools can use Module A (self-assessment/internal control) for conformity assessment.

COSAFE: Bringing Clarity and Confidence to Complex Compliance Landscapes

COSAFE: Bringing Clarity and Confidence to Complex Compliance Landscapes

Our Compliance and Safety Framework (COSAFE) integrates requirements from functional safety, cybersecurity, and regulatory frameworks such as ISO 26262, ISO/SAE 21434, and the CRA. It emphasises structured process definition, traceability between requirements and activities, verification planning, and the generation of compliance-relevant documentation.

Guaranteed Certification Readiness With COSAFE by Validas

Guaranteed Certification Readiness With COSAFE by Validas

Within COSAFE, Validas offers a certification guarantee stating that there will be no problems in assessments, no delays, and no extra costs. This guarantee is based on a semi-formal approach to modelling processes, requirements, and compliance. This approach is implemented through the PMT (Process Management Tool).

See how COSAFE simplifies and streamlines compliance across diverse standards.

References

References