IoT & OT Cybersecurity Report 2025
Die Zeit drängt: 68% der Unternehmen sind mit dem neuen Cyber Resilience Act noch nicht vertraut

Zusammenfassung
Auf dem Weg zur Compliance mit dem EU Cyber Resilience Act (CRA) sollten die Unternehmen jetzt einen „Endspurt“ hinlegen, um die Fristen einhalten zu können. Doch in der Wirtschaft ist davon noch wenig zu spüren. Bei einer Umfrage unter 300 Industrieunternehmen kam heraus, dass nur ein knappes Drittel (32 Prozent) der Unternehmen mit den Anforderungen des EU Cyber Resilience Act umfassend vertraut ist. Dementsprechend zögerlich ist die Umsetzung. Lediglich 14 Prozent der befragten Firmen haben bereits umfangreiche Maßnahmen eingeleitet, um für die Einhaltung der CRA-Vorschriften bei ihren vernetzten Geräten, Maschinen und Anlagen zu sorgen.
„Bislang haben viele Hersteller digitaler Geräte, Maschinen und Anlagen vor allem die Funktionalität ihrer Produkte in den Fokus gestellt und die Angreifbarkeit durch Cyberattacken weniger stark im Auge gehabt. Mit dem Cyber Resilience Act ist es nun zwingend erforderlich, beide Aspekte als gleichwertig einzustufen.“ Jan Wendenburg, CEO ONEKEY
ONEKEY wollte im Rahmen der Umfrage wissen, was die größten Herausforderungen sind. Für 37 Prozent der Unternehmen steht demnach die Meldepflicht bei sicherheitskritischen Vorfällen innerhalb von 24 Stunden an erster Stelle. Gleich darauf folgt mit 35 Prozent die Einhaltung der Kriterien „Secure by Design“ und „Secure by Default“. 29 Prozent der Befragten stufen die Erstellung einer Software Bill of Materials als größte Herausforderung ein. Beinahe genauso viele Firmen sehen ein Hauptproblem darin, den Überblick über die Verwaltung von Software-Schwachstellen zu behalten. Lediglich 12 Prozent der Unternehmen haben einen lückenlosen Überblick über die in ihren Geräten, Maschinen und Anlagen verwendeten Programme.

DIGITAL TRANSFORMATION EXPANDS THE ATTACK SURFACE FOR CYBER THREATS.
The Internet of Things (IoT) and Operational Technology (OT) are at the heart of the digital transformation of industrial processes. At the same time, the attack surface for cyber threats is growing. As part of a comprehensive study, ONEKEY examined the current state of IoT and OT security in German-speaking countries. The survey included 300 executives from the fields of industry, IT, OT, and engineering. This report analyzes the key findings, assesses risks, and highlights potential courses of action. A key focus of the survey was the Cyber Resilience Act, the EU regulation aimed at strengthening the cybersecurity of connected products. It requires manufacturers and distributors of digital products with internet connectivity (connected devices, machines, and systems) to implement extensive security measures.
OBLIGATIONS OF MANUFACTURERS AND DISTRIBUTORS
Under the Cyber Resilience Act (CRA), manufacturers must design their products to be secure from the outset (“Security by Design” and “Secure by Default”) and ensure that they continue to meet CRA requirements throughout their entire lifecycle. This includes protection against unauthorized access, safeguarding data integrity and confidentiality, and guaranteeing the availability of functions.
They are also required to report actively exploited vulnerabilities and severe security incidents affecting the safety of their products within 24 hours to the European cybersecurity authority ENISA and the relevant national CSIRT (Computer Security Incident Response Team).
In addition, providers must deliver regular security updates to fix known vulnerabilities and ensure the ongoing security of their products. This also involves comprehensive product documentation, including a Software Bill of Materials (SBOM), to ensure transparency and traceability of components. Compliance with CRA requirements must be documented and proven. Given that product development cycles often span several years, many organizations are already falling behind.
ONLY ONE-THIRD ARE FAMILIAR WITH THE CRA
According to the survey, just under one-third (32 percent) of organizations are thoroughly familiar with the requirements of the EU Cyber Resilience Act. Another 36 percent have at least looked into it. More than a quarter (27 percent), however, have not addressed the topic at all.

SLOW IMPLEMENTATION
Implementation is sluggish. Only 14 percent (!) of the organizations surveyed have already launched extensive measures to ensure compliance with CRA regulations for their connected devices, machines, and systems. On the plus side, 38 percent have at least taken initial steps toward CRA compliance. However, just as many organizations have so far done nothing to meet the new EU requirements.
WORSENING THREAT LANDSCAPE
This reluctance is problematic not only in light of the strict legal requirements and potential consequences of non-compliance but also given the increasing threat posed by hackers and the potential damage involved. Authorities such as the German Federal Office for Information Security (BSI) and the Federal Criminal Police Office (BKA) expect the security situation to continue deteriorating in the coming years. In 2024 alone, the total damage caused by cybercrime incidents in Germany was estimated at €178.6 billion—an increase of €30.4 billion compared to the previous year.

SBOM Worries 29 Percent of Organizations
According to ONEKEY’s survey, the biggest challenge under the Cyber Resilience Act is the obligation to report incidents within 24 hours, cited by 37 percent of organizations. In second place, at 35 percent, is compliance with the principles of “Secure by Design” and “Secure by Default.” For 29 percent, the creation of a Software Bill of Materials (SBOM) and the associated requirement to maintain oversight of all software components and their vulnerabilities is a major concern.
A Software Bill of Materials (SBOM) is a structured list of all software components contained in a digital product—including libraries, dependencies, and versions. It is essentially a “parts list” for software. The SBOM is critical: it enables transparency, speeds up vulnerability management, and is essential for a rapid response to security incidents. Without an SBOM, it is unclear whether a given security vulnerability affects the product in question—potentially with severe consequences for
manufacturers, distributors, and customers. Establishing standardized SBOM processes is therefore a key step toward resilient software security, especially in production environments.

SBOM Worries 29 Percent of Organizations
According to ONEKEY’s survey, the biggest challenge under the Cyber Resilience Act is the obligation to report incidents within 24 hours, cited by 37 percent of organizations. In second place, at 35 percent, is compliance with the principles of “Secure by Design” and “Secure by Default.” For 29 percent, the creation of a Software Bill of Materials (SBOM) and the associated requirement to maintain oversight of all software components and their vulnerabilities is a major concern.
A Software Bill of Materials (SBOM) is a structured list of all software components contained in a digital product—including libraries, dependencies, and versions. It is essentially a “parts list” for software. The SBOM is critical: it enables transparency, speeds up vulnerability management, and is essential for a rapid response to security incidents. Without an SBOM, it is unclear whether a given security vulnerability affects the product in question—potentially with severe consequences for
manufacturers, distributors, and customers. Establishing standardized SBOM processes is therefore a key step toward resilient software security, especially in production environments.
“The CRA requires a detailed listing of all programs, libraries, and dependencies with exact version numbers of each component, information on the respective licenses, and a documented overview including an assessment of all known vulnerabilities and security flaws.” — Jan Wendenburg, CEO, ONEKEY
The survey also found that 44 percent of organizations have begun creating SBOMs for their product portfolios. However, only 12 percent (!) have completed this for all their products, while 32 percent have so far covered only individual products. One-quarter have not started at all, and another quarter either believe they are not affected or remain uncertain about their obligations.
SBOM: Many Organizations Still in the Dark
Despite the clear requirement under the CRA to maintain a Software Bill of Materials, about half of organizations still lack a clear overview in this area. This is particularly striking given that transparency about software components and structured security processes are core building blocks of modern cyber resilience—yet in many companies, they are still not firmly established.
CRA Compliance: Progress Made, but Urgency Still Lacking
Although many shortcomings and gaps remain, the report shows that a significant number of organizations are moving toward CRA compliance. According to the survey, 40 percent regularly carry out firmware and software updates. 27 percent use automated tools for cybersecurity testing. 16 percent rely on third-party audits and certifications.

CRA Compliance: Progress Made, but Urgency Still Lacking
Although many shortcomings and gaps remain, the report shows that a significant number of organizations are moving toward CRA compliance. According to the survey, 40 percent regularly carry out firmware and software updates. 27 percent use automated tools for cybersecurity testing. 16 percent rely on third-party audits and certifications.
CRA-Specific Compliance Still the Exception
Only 15 percent of companies currently have CRA-specific compliance policies in place. However, more than one-third (34 percent) believe their general cybersecurity policies already cover the CRA’s requirements. Meanwhile, 21 percent have not yet factored the Cyber Resilience Act into their compliance frameworks at all.
Nearly One-Third Have Started CRA Training
Just under one-third (32 percent) of the organizations surveyed have begun training their employees specifically on CRA requirements. 30 percent provide such training regularly—at least once a year. Another 28 percent offer CRA-related qualifications occasionally (every two to three years). Nearly one in five (19 percent) provide no knowledge transfer on the Cyber Resilience Act at all.

Responsibility Differs Across Organizations
When asked who is responsible for ensuring CRA compliance, organizations gave very different answers. In 46 percent of cases, the IT security department is in charge; in 21 percent, compliance takes the lead; in 16 percent, the legal department. At 18 percent of companies, top management handles it directly, while 15 percent have assigned responsibility to product development. In many cases, it is likely that responsibility for CRA compliance is shared across multiple departments.
“The EU has created a very comprehensive regulatory framework with the Cyber Resilience Act, ranging from technical standards to reporting obligations. Accordingly, the challenges for industry to fully implement the CRA are significant.” — Jan Wendenburg, CEO, ONEKEY
Unclear Picture of Responsible Roles
A similarly diffuse situation emerges when looking at responsible roles. 18 percent of organizations assign CRA compliance to the product manager, 17 percent to the compliance manager, 15 percent to the Chief Information Security Officer (CISO), 11 percent to the cybersecurity analyst, and 8 percent to the head of software development. Here too, it is likely that responsibilities often overlap across teams and roles.
In practice, 28 percent of the organizations surveyed have formed a cross-departmental working group to make their company “CRA-ready.” In 14 percent, a dedicated team is in place that focuses specifically on meeting CRA requirements. The most common team size is four to ten members (reported by 18 percent of respondents). Nearly one-third (32 percent), however, have not established any working group for the Cyber Resilience Act.

Recommendations for Action
Based on the study results, the following key recommendations emerge for organizations:
1. Secure by Design / Security by Default as a foundation
Align all product development for connected devices, machines, and systems consistently with cybersecurity principles across all phases—design, development, production, and maintenance.
2. Create Transparency
Only through comprehensive SBOMs, regular vulnerability scans, and clear product documentation can organizations achieve the transparency mandated by the CRA.
3. Automated Security and Compliance Training
To meet CRA obligations—especially the reporting requirement and the assurance of cybersecurity throughout the entire product lifecycle—regular, ideally automated, checks of known and newly reported vulnerabilities are essential. This also includes assessing their relevance and documenting the results.
4. Clarify Responsibility
Appoint a dedicated Product Security Officer with IoT/OT expertise. Clearly defined roles and responsibilities across IT, OT, and development teams are also advisable in relation to the CRA.
5. Build Competence – Including with External Partners
Training, continuing education, and partnerships with specialized service providers are crucial—not least to compensate for the shortage of skilled professionals. Without external support and the use of automated solutions—particularly for creating and continuously maintaining complete Software Bills of Materials, as well as monitoring known and emerging vulnerabilities across all digital products—CRA compliance will be difficult to achieve.

Bereit zur automatisierung ihrer Cybersicherheit & Compliance?
Machen Sie Cybersicherheit und Compliance mit ONEKEY effizient und effektiv.