Milan StuteResilience through simplicity. Building focused solutions for hard problems. PhD in cybersecurity.Zola2026-03-17T00:00:00+00:00https://stute.io/atom.xmlDo resilience. Build simply.2026-03-17T00:00:00+00:002026-03-17T00:00:00+00:00
Unknown
https://stute.io/articles/do-resilience-build-simply/<p>The upcoming standards for the EU Cyber Resilience Act (CRA) not only help shape the resilience of the European society but also offer manufacturers an opportunity to build genuinely better products. The standards promote simplicity as a core design principle, which successful products have already adopted. However, those real-world examples also remind us that building resilient products is hard, requiring focus and engineering excellence.</p>
<div data-toc-placeholder></div>
<h2 id="contributing-to-a-resilient-european-society"><a class="zola-anchor" href="#contributing-to-a-resilient-european-society" aria-label="Anchor link for: contributing-to-a-resilient-european-society">Contributing to a resilient European society</a></h2>
<p>It is easy to approach the <a rel="external" title="Regulation (EU) 2024/2847 of the European Parliament and of the Council of 23 October 2024 on horizontal cybersecurity requirements for products with digital elements and amending Regulations (EU) No 168/2013 and (EU) 2019/1020 and Directive (EU) 2020/1828 (Cyber Resilience Act)" href="http://data.europa.eu/eli/reg/2024/2847/oj">CRA</a> as a compliance burden and focus only on <a rel="external" title="Zühlke: Cyber Resilience Act: how the EU security regulation affects business" href="https://www.zuehlke.com/en/insights/cyber-resilience-act-how-the-eu-security-regulation-affects-business">deadlines, cost, and liability</a>. And while that is understandable, it misses the CRA’s main point, stated directly in Recital (1):</p>
<blockquote>
<p>Cyberattacks represent a matter of public interest as they have a critical impact not only on the Union’s economy, but also on democracy as well as consumer safety and health.</p>
</blockquote>
<p>The <a rel="external" title="Browse vulnerabilities by date" href="https://www.cvedetails.com/browse-by-date.php">rise</a> in product security defects<sup class="footnote-reference" id="fr-defect-1"><a href="#fn-defect">1</a></sup> and product security-related incidents over the past decades is not a natural “law” or “phenomenon.” It is the result of an exploding number of connected products and technology that have outpaced security practices, a trend that is <a rel="external" title="Brian Merchant: Lost in the slop layer" href="https://www.bloodinthemachine.com/p/the-slop-layer">accelerated in the face of AI</a>. Recognising that these factors are human-made gives us the option to challenge and change them.</p>
<p>Recital (1) reminds us that manufacturers<sup class="footnote-reference" id="fr-details-1"><a href="#fn-details">2</a></sup> help shape the resilience of the societies their products operate in. And I believe that they should embrace that responsibility, while seizing its opportunities.</p>
<h2 id="building-simple-secure-and-successful-products"><a class="zola-anchor" href="#building-simple-secure-and-successful-products" aria-label="Anchor link for: building-simple-secure-and-successful-products">Building simple, secure, and successful products</a></h2>
<p>In this article, I’m going to make the case that by <a rel="external" title="Zühlke: The complexity trap in cybersecurity" href="https://www.zuehlke.com/en/insights/the-complexity-trap-in-cybersecurity">reducing complexity</a> and instead striving for simplicity, organisations build better products that are likely to be more competitive.</p>
<blockquote>
<p>Complexity is the worst enemy of security.—<a rel="external" title="Schneier on Security: A Plea for Simplicity" href="https://www.schneier.com/essays/archives/1999/11/a_plea_for_simplicit.html">Bruce Schneier (1999)</a></p>
</blockquote>
<p>The “Eierlegende Wollmilchsau,” a German term used to describe something that seems to satisfy all possible needs all at once, is not a recipe for success. Bloat leads to vast configuration options which may produce invalid, insecure, or unsafe states; and obscure features which might not be maintained rigorously and, therefore, have a higher risk of containing defects. Every feature and every line of <a rel="external" title="Pluralistic: Code is a liability (not an asset)" href="https://pluralistic.net/2026/01/06/1000x-liability/">code added creates new liability</a>.
Even high-profile open-source projects such as <a rel="external" title="AISLE Discovered 12 out of 12 OpenSSL Vulnerabilities" href="https://aisle.com/blog/aisle-discovered-12-out-of-12-openssl-vulnerabilities">OpenSSL</a> have defects that have gone unnoticed for decades. One can only conjecture how many defects are lurking in less visible and proprietary systems, something that <a rel="external" title="Anthropic: Making frontier cybersecurity capabilities available to defenders" href="https://www.anthropic.com/news/claude-code-security">recent AI-supported cybersecurity tools</a> might soon reveal at scale.</p>
<p>So, what is the alternative? Simplicity and focus, which facilitate reasoning and reduce the risk of security defects.
Apart from improving security, there is at least anecdotal evidence that products embracing focus and simplicity are genuinely superior. For example, the success of Apple and its products has at least partially been attributed to Steve Jobs’ mantra of <a rel="external" title="Steve Jobs: 'There's Sanity Returning'" href="https://www.bloomberg.com/news/articles/1998-05-25/steve-jobs-theres-sanity-returning">focus and simplicity</a> (note this was before <a rel="external" title="The Guardian: Apple becomes world's first trillion-dollar company" href="https://www.theguardian.com/technology/2018/aug/02/apple-becomes-worlds-first-trillion-dollar-company">Apple became a trillion-dollar company</a>).</p>
<h2 id="simplicity-and-the-41-cra-standards"><a class="zola-anchor" href="#simplicity-and-the-41-cra-standards" aria-label="Anchor link for: simplicity-and-the-41-cra-standards">Simplicity and the 41 CRA standards</a></h2>
<p>The European Commission has <a rel="external" title="Standardisation request M/606" href="https://ec.europa.eu/growth/tools-databases/enorm/mandate/606_en">requested</a> a total of <a rel="external" title="Annex I of standardisation request M/606" href="https://ec.europa.eu/transparency/documents-register/api/files/C(2025)618_1/de00000001069729?rendition=false">41 (!) standards</a> to be developed by <a rel="external" title="European Commission: Key players in European Standardisation" href="https://single-market-economy.ec.europa.eu/single-market/goods/european-standards/key-players-european-standardisation_en">CEN, CENELEC, and ETSI</a>: 15 horizontal standards that apply to all products in scope of the CRA, and 26 vertical standards that apply to specific product categories only. The vertical standards are expected to be <em><a rel="external" href="https://single-market-economy.ec.europa.eu/single-market/goods/european-standards/harmonised-standards_en">harmonised</a></em>, enabling manufacturers to leverage the <a rel="external" title="Section 4.1.2.4 of the ‘Blue Guide’ on the implementation of EU product rules" href="https://ec.europa.eu/docsroom/documents/18027/attachments/1/translations/en/renditions/native">presumption of conformity</a> rule when demonstrating compliance, which is especially relevant for important Class I products.</p>
<p>While I can see the motivation of the European Commission to split requirements into multiple standards, i.e., the mere breadth of products the CRA applies to, having to deal with 41 standards sounds neither focused nor simple.
However, when looking closely at the 15 horizontal standards, they are mapped directly to the 15 essential requirements set out in Annex I of the CRA, which encode well-known security best practices.</p>
<p>In the following, I will look at a selection of them, explain their intent, and discuss relevant real-world product examples.</p>
<h3 id="secure-by-default-configuration"><a class="zola-anchor" href="#secure-by-default-configuration" aria-label="Anchor link for: secure-by-default-configuration">Secure-by-default configuration</a></h3>
<p>Most users neither want nor know how to configure security controls. Secure-by-default configurations (Annex I, Part 1, (2b) of CRA) therefore mean reducing risky choices through user-centric onboarding, no default credentials, adopting deny-by-default access policies, and automatic security updates.</p>
<p>A good example is <a rel="external" title="The Caddy web server" href="https://caddyserver.com">Caddy</a>. It can deploy a production-ready HTTPS reverse proxy with a single command:</p>
<pre><code data-lang="sh">$ caddy reverse-proxy --from example.com --to :9000
</code></pre>
<p>Behind the scenes, Caddy requests and renews the necessary TLS certificates via <a rel="external" title="Automatic Certificate Management Environment (ACME) (RFC 8555)" href="https://datatracker.ietf.org/doc/html/rfc8555">ACME</a> automatically, which reduces the chance of insecure deployment due to accidental misconfigurations.</p>
<p>Another interesting example is Apple’s robust <a rel="external" title="Use AirDrop on your iPhone or iPad (Apple)" href="https://support.apple.com/en-us/119857">configuration options for AirDrop</a>. By default, users can receive content from contacts only. They can temporarily allow content from anyone nearby, but the setting resets after 10 minutes automatically. The automatic reset demonstrates balancing usability with a secure default, which reduces users’ indefinite <a rel="external" title="Cyberflashing (Wikipedia)" href="https://en.wikipedia.org/wiki/Cyberflashing">exposure from insecure settings</a>, just because they decided to share that selfie with an acquaintance during their last vacation.</p>
<h3 id="data-minimisation"><a class="zola-anchor" href="#data-minimisation" aria-label="Anchor link for: data-minimisation">Data minimisation</a></h3>
<p>The principle of data minimisation (Annex I, Part 1, (2g) of CRA) is simple: what is not there, cannot be leaked. In other words, products should only collect, store, or process the data they need to fulfil their purpose. Creating an inventory of what data is processed and why is the first step for improving data minimisation.</p>
<p>For example, the <a rel="external" title="Signal website" href="https://signal.org">Signal</a> and <a rel="external" title="Threema website" href="https://threema.com">Threema</a> messengers aim to minimise the data processed on their servers. In Signal’s case, cleartext messages remain exclusively on end-user devices, while the service stores only the users’ phone numbers and the time of their last online activity.</p>
<p>Failures of data minimisation are common in consumer products, from <a rel="external" href="https://www.technologyreview.com/2022/12/19/1065306/roomba-irobot-robot-vacuums-artificial-intelligence-training-data-privacy/">vacuum robots storing and uploading intimate pictures from homes</a>, <a rel="external" href="https://www.bloomberg.com/news/articles/2019-04-10/is-anyone-listening-to-you-on-alexa-a-global-team-reviews-audio">voice assistants recording private conversations</a>, and, more recently, misconfigured AI tools leaking <a rel="external" title="Matthew Gault: Exposed Moltbook Database Let Anyone Take Control of Any AI Agent on the Site (404 Media, 2026)" href="https://www.404media.co/exposed-moltbook-database-let-anyone-take-control-of-any-ai-agent-on-the-site/">user data</a> and <a rel="external" title="Emanuel Maiberg: Massive AI Chat App Leaked Millions of Users Private Conversations (404 Media, 2026)" href="https://www.404media.co/massive-ai-chat-app-leaked-millions-of-users-private-conversations/">private conversations</a>.</p>
<h3 id="service-availability"><a class="zola-anchor" href="#service-availability" aria-label="Anchor link for: service-availability">Service availability</a></h3>
<p>Service availability (Annex I, Part 1, (2h) of CRA) depends on careful architectural and technological choices.</p>
<p>One positive example is Cloudflare’s use of anycast to deliver services globally under shared IP addresses. This provides automatic failover in case of local outages and typically improves latency at the same time.</p>
<p>Negative examples include IoT devices that depend on Internet connectivity or a vendor-operated cloud service to provide their core functionality. That core functionality becomes unavailable if the local Wi-Fi network fails, the cloud service is unavailable, or the operator <a rel="external" title="Alex Hern: Revolv devices bricked as Google's Nest shuts down smart home company (The Guardian, 2016)" href="https://www.theguardian.com/technology/2016/apr/05/revolv-devices-bricked-google-nest-smart-home">shuts the service down permanently</a>. As a mitigation, products should offer (potentially degraded) core functionality through local interfaces such as physical controls, Wi-Fi, or Bluetooth.</p>
<h3 id="attack-surface-reduction"><a class="zola-anchor" href="#attack-surface-reduction" aria-label="Anchor link for: attack-surface-reduction">Attack surface reduction</a></h3>
<p>Attack surface reduction (Annex I, Part 1, (2j) of CRA) means disabling or removing components that are not needed for the product to function. This includes physical interfaces such as debug ports, logical interfaces such as APIs, and unnecessary software dependencies or cloud integrations. This topic often triggers hard but important discussions.</p>
<p>One such discussion was triggered when researchers <a rel="external" title="Tarlogic detects a hidden feature in the mass-market ESP32 chip that could infect millions of IoT devices (Tarlogic, 2025)" href="https://www.tarlogic.com/news/hidden-feature-esp32-chip-infect-ot-devices/">discovered</a> undocumented commands in the widely used ESP32 microchip. In <a rel="external" title="News Espressif’s Response to Claimed Backdoor and Undocumented Commands in ESP32 Bluetooth Stack (Espressif, 2025)" href="https://www.espressif.com/en/news/Response_ESP32_Bluetooth">response</a>, the manufacturer removed them via firmware updates.</p>
<p>Products such as <a rel="external" title="The Kubernetes Operating System" href="https://www.talos.dev">Talos</a> and <a rel="external" title="What's IncusOS?" href="https://linuxcontainers.org/incus-os/">IncusOS</a> show how to reduce attack surface in practice: Both hypervisor operating systems feature immutable system images, which protect against persistent malware. Also, they disable local shells in favor of a web-based management API, which narrows the attack surface and allows development teams to focus on hardening a single API.</p>
<h2 id="simple-easy"><a class="zola-anchor" href="#simple-easy" aria-label="Anchor link for: simple-easy">Simple ≠ easy</a></h2>
<p>Resilient products do not happen by accident.
They require careful analysis of intended use and context.
They require pairing domain knowledge with deep technical expertise.
They require understanding design and technology intricacies, cutting through noise, and making informed decisions.
This is true for all projects, on all levels and at all scales, from reusable software libraries and hardware components to fully integrated products and large-scale ecosystems.</p>
<p>Creating resilient products is hard. But they are necessary for a successful society. So, let’s build simply.</p>
<section class="footnotes">
<ol class="footnotes-list">
<li id="fn-defect">
<p>Former CISA director Jen Easterly <a rel="external" title="Jessica Lyson: CISA boss: Makers of insecure software must stop enabling today's cyber villains (The Register, 2024)" href="https://www.theregister.com/2024/09/20/cisa_software_cybercrime_villains/">prefers the term <em>product defect</em> over <em>vulnerability</em> to attribute responsibilities clearly</a>. <a href="#fr-defect-1">↩</a></p>
</li>
<li id="fn-details">
<p>The CRA also has importers and distributors in scope. However, I’ll try to keep this article generally simple with respect to details, as there are other great <a rel="external" href="https://digital-strategy.ec.europa.eu/en/library/cyber-resilience-act-implementation-frequently-asked-questions">resources</a> and <a rel="external" href="https://devae.re/posts/cra-substantial-modification/">articles</a> dissecting the intricacies of the CRA. <a href="#fr-details-1">↩</a></p>
</li>
</ol>
</section>