Secure Development Lifecycle (SDLC)
A Secure Development Lifecycle (SDLC) is a software and product development process that integrates security activities — threat modelling, security requirements, code review, security testing — at every stage of development. CRA Annex I requires manufacturers to address security throughout the product development lifecycle.
A Secure Development Lifecycle (SDLC) is a software and product development process that integrates security activities — threat modelling, security requirements, code review, security testing — at every stage of development. CRA Annex I requires manufacturers to address security throughout the product development lifecycle.
Product Security EngineeringWhat Is a Secure Development Lifecycle?
A Secure Development Lifecycle (SDLC) — sometimes called Secure SDLC or SSDLC — is a product development process that embeds security activities at each phase of development rather than treating security as a final-stage add-on. The concept was popularised by Microsoft's Security Development Lifecycle (SDL), published in the early 2000s, and has since been formalised in standards such as ISO/IEC 27034 (Application Security) and NIST SP 800-64. An SDLC typically includes: security requirements definition, threat modelling, secure design review, secure coding guidelines, static analysis (SAST), dynamic testing (DAST), penetration testing, and security-focused code review. The principle is 'shift left' — finding and fixing security issues early in development when they are cheapest to address.
CRA Requirements for SDLC
The CRA's Annex I essential requirements include obligations that directly map to SDLC activities:
- Risk assessment: Manufacturers must assess cybersecurity risks — this is the threat modelling phase of the SDLC.
- Secure design: Products must be designed with security in mind (secure by design and secure by default).
- Testing: Products must be tested for security — specifically to verify the absence of known exploitable vulnerabilities.
- Vulnerability management integration: The SDLC must connect to post-market vulnerability handling — vulnerabilities discovered post-launch must be able to be fixed through the development process.
The Annex VII technical documentation requirements implicitly require SDLC records: risk assessment documents, design review records, security test reports, and code review findings must all be retained as evidence of conformity.
SDLC Activities by Development Phase
A CRA-aligned SDLC should include the following activities by phase:
Requirements phase: Define security requirements based on the product's threat model; identify applicable CRA essential requirements; document regulatory compliance requirements.
Design phase: Conduct architecture threat modelling (STRIDE or PASTA methodology); design security controls for identified threats; review design against CRA Annex I requirements; document security architecture decisions.
Implementation phase: Apply secure coding standards; use SAST tools in the CI/CD pipeline; conduct peer security code review for security-sensitive components; manage dependency selection and SBOM tracking.
Testing phase: Conduct DAST/fuzzing against network-exposed interfaces; perform penetration testing of the final product build; verify all threat model mitigations are implemented and functional.
Release phase: Final security review; SBOM generation and sign-off; declaration of conformity preparation; CVD policy publication verification.
Maintenance phase: SBOM-based vulnerability monitoring; CVD report intake and triage; security patch development; security advisory publication.
SDLC for Hardware-Software Products
CRA-covered products often combine hardware and software — embedded systems, IoT devices, industrial equipment. SDLC for hardware-software products requires extending traditional software-focused SDLC practices:
- Hardware threat modelling: Physical attack vectors (JTAG access, UART debug, chip-off, side-channel analysis) must be in scope for the threat model.
- Hardware security review: PCB layout review for debug interface exposure; component selection review for security features (HSM availability, TrustZone support).
- Manufacturing security: Security-critical manufacturing steps (key injection, Secure Boot fuse programming, JTAG lockdown) must be documented and verified processes.
- Supply chain review: Hardware component supply chain security review — sourcing from trusted suppliers, component authenticity verification.
These hardware-specific SDLC activities should be documented in the Annex VII technical file alongside software-focused security activities.
CVD Portal makes Secure Development Lifecycle (SDLC) compliance straightforward.
Public CVD submission portal, acknowledgment tracking, Article 14 deadline alerts, and CSAF advisory generation. Free forever for EU manufacturers.
Start your free portalFrequently asked
Does the CRA require a specific SDLC standard or framework?+
No. The CRA requires that security is addressed throughout the product development lifecycle but does not mandate a specific framework. Recognised frameworks include Microsoft SDL, NIST SSDF (Secure Software Development Framework, SP 800-218), OWASP SAMM, and ISO/IEC 27034. IEC 62443-4-1 provides an SDLC framework specifically for industrial control system products. Manufacturers should adopt a recognised framework appropriate to their product category and development methodology, document it in the technical file, and demonstrate its application with evidence.
How does SDLC relate to the conformity assessment process?+
SDLC evidence is a key component of the Annex VII technical file. A well-documented SDLC — with threat models, security test reports, code review records, and SBOM — provides the primary evidence that the product was developed in compliance with CRA essential requirements. For Notified Body assessments (required for Important Class II products), the Notified Body will review SDLC documentation alongside product testing to assess compliance. Strong SDLC documentation significantly streamlines the Notified Body assessment process.
Can a startup or small manufacturer implement an SDLC without large team resources?+
Yes. SDLC practices scale to organisation size. A small team can implement a lightweight SDLC using: a simple threat model template for each new product; automated SAST and SCA tools integrated into their CI/CD pipeline (many have free tiers for small organisations); a checklist-based security review before each major release; and a CycloneDX SBOM generated automatically on every build. The key is consistency and documentation — a simple, consistent process with evidence is more valuable for CRA compliance than a sophisticated process poorly documented.
Related terms
Browse the full CRA Compliance Checklist
See how Secure Development Lifecycle (SDLC) fits into your complete CRA compliance programme.