Technical article

ENISA: Security by Design and Default Playbook

Practical Guide to “Security by Design and Default” for Small and Medium-Sized Enterprises


Share Article
Share Button Linkedin Share Button Xing Share Button X Share Button Email

With the “Secure by Design and Default Playbook,” ENISA, the European Union Agency for Cybersecurity, outlines for the first time how manufacturers of products with digital elements can implement the requirements of the Cyber Resilience Act (CRA) from both a technical and organizational perspective.

The practical guide is aimed specifically at software and IoT manufacturers and aims to systematically embed cybersecurity throughout the entire product lifecycle. In our brief overview, we have summarized the document’s key points concisely.

 

What are the objectives of the ENISA Playbook, and how is it structured?

ENISA’s approach is based on the consistent integration of security early in the development process, a concept known in technical terminology as “shift left.” Security requirements thus do not begin during testing or in production, but rather at the stages of requirements definition, architectural design, and technology selection. This lifecycle-oriented approach encompasses the phases of development, deployment, operation, maintenance, and decommissioning.

The so-called “Playbook” structures the requirements into 22 principles, which are divided into the categories “Secure by Design” and “Secure by Default.” These are implemented through specific technical measures, verification requirements, and approval criteria.

Key technical requirements include standardized threat modeling, secure software architectures based on established principles (such as least privilege and defense-in-depth), secure default configurations, and continuous vulnerability management. These are complemented by requirements for monitoring, incident response, and recoverability. As a result, resilience is understood as an integral part of operational activities. One innovative element is the “Machine-Readable Security Manifest” (MRSM). It enables the structured, machine-readable documentation of security measures and their verification. This makes compliance automatable and scalable, representing a decisive step toward regulatory compliance.

In addition to technical measures, ENISA also emphasizes organizational aspects such as clear responsibilities, the integration of security into product decisions, and the securing of supply chains. Security is thus positioned as an interdisciplinary task spanning development, operations, and management.

Overall, the Playbook marks a paradigm shift: cybersecurity is evolving from a downstream add-on function to an integral, verifiable component of the entire product lifecycle. For manufacturers, this means not only increased regulatory requirements but also the need to fundamentally realign their development processes.

The key message is: cybersecurity is a continuous process, not a one-time feature.
 

What is the purpose of the 22 security principles?

The Playbook defines 22 specific principles, which are broadly categorized into “Secure by Design” (14 principles) and “Secure by Default” (eight principles).

Each of the 22 principles is explained in greater detail in Chapter 4 of the ENISA document (titled “Playbook”) based on the criteria of objectives, technical implementation elements, evidence (verification requirements), and release criteria (approval criteria).

The goal of this playbook is to translate security principles from the conceptual level into concrete, implementable engineering and operational practices. To this end, clear implementation steps as well as verifiable and binding criteria are defined for each principle, so that security becomes a measurable and auditable integral part of the development process.

The 22 principles are uniformly structured to enable standardized and repeatable application.

  • Principle: Concrete security concept (e.g., hardening, access control, updatability).
  • Objective: What the principle is intended to achieve and which sources of error it reduces.
  • Checklist: The measures with the greatest impact that should be implemented (designed so that they can be implemented in lean/small teams).
  • Minimum Proof: Concrete evidence (e.g., configuration statuses, logs, test results, SBOMs) demonstrating the implementation of the measures.
  • Release Criteria: Formalized “pass/fail” criteria that can be automatically checked in release processes to ensure compliance with the unchanged security level.

 

What specific requirements can be derived for OT systems?

In OT-specific architecture and network design, the focus is on the consistent segmentation of industrial systems. The foundation is a zone and conduit model based on the IEC 62443 series of standards, which divides systems into clearly defined security zones and specifically controls the communication links between them. In addition, a strict separation of IT and OT networks is required to prevent attackers from moving between networks and to limit the impact of security incidents.
The commonly assumed physical separation (“air gap”) must not be regarded as a guarantee of security. Instead, real, necessary connections—such as those for maintenance, monitoring, or data integration—must be explicitly identified and secured through controlled gateways. This includes, in particular, the use of firewalls, protocol gateways, and monitored interfaces.

There is also a particular focus on securing remote access, which is unavoidable in industrial environments. This should be conducted exclusively via hardened access mechanisms, such as the use of VPN connections in combination with multi-factor authentication, as well as dedicated *jump hosts, to prevent direct access to critical systems.


*A jump host is a specially secured computer that serves as a central, controlled access point for securely accessing internal, protected systems from an external network (e.g., the Internet).
 

Seminar tip

Efficient CE marking and risk assessment of machines


Our 2-day seminar Efficient CE marking and risk assessment of machinery and plants deals with requirements for safe design of machinery – and covers both the Machinery Directive 2006/42/EC and the new Machinery Regulation (EU) 2023/1230.

Why is threat modeling a mandatory process in OT?

In OT environments, threat modeling must be established as a mandatory component of the engineering process. In doing so, typical attack scenarios specific to industrial systems must be systematically taken into account. This includes, in particular, the targeted manipulation of PLC logic, through which physical processes can be directly influenced. Risks posed by insecure or misconfigured industrial communication protocols such as Modbus or OPC UA must also be addressed, as these often lack adequate security mechanisms.

Another key attack scenario is lateral movement via engineering workstations. These often serve as bridge systems between IT and OT networks and therefore represent an attractive target for attackers. Furthermore, supply chain attacks, particularly in the context of compromised firmware or manipulated update mechanisms, are becoming increasingly significant.

Central to this is the requirement that threat modeling in OT go beyond traditional IT security considerations, as it must necessarily also incorporate the impacts on physical processes as well as safety-related functions. Only in this way can the actual risk profile of industrial systems be realistically assessed and effectively addressed.
 

What role do risk management and operational safety play in the broader context?

The playbook defines eight key activities in the areas of risk management and operational security. These must be established as continuous processes. They include, in particular, systematic vulnerability management for the ongoing identification and remediation of security vulnerabilities, clearly structured incident response processes for a rapid and coordinated response to security incidents, and robust backup and recovery strategies to ensure operational continuity in the event of a disruption. In addition, comprehensive measures for security monitoring and logging are required to detect attacks early and analyze them in a traceable manner.

Central to this is the underlying understanding of resilience: This is not defined as a goal in the system architecture, but is understood as an operational capability that must be actively implemented, reviewed, and continuously improved during ongoing operations.
 

What is the Machine-Readable Security Manifest (MRSM), and how is it used for traceability?

A central, innovative component of the guide is the concept of the “Machine-Readable Security Manifest” (MRSM). This is an approach to the structured, machine-readable representation of security evidence. The goal is to document security requirements in a systematic and traceable manner.

At its core, the MRSM links declarative security claims with concrete technical evidence such as configuration data, test results, or logs. This creates a robust and, at the same time, automatable foundation for assessing a product’s security level.

A key benefit lies in supporting automated compliance checks, for example during audits. In this way, MRSM addresses a central challenge of regulatory requirements: providing verifiable and scalable compliance documentation that goes beyond purely static or manual evidence.
 

How are the requirements of the Cyber Resilience Act (CRA) specifically implemented in the Playbook?

Appendix C of the Playbook provides a direct mapping of the 22 security principles to the requirements in Appendix I of the Cyber Resilience Act (CRA). This establishes clear obligations for manufacturers: security measures must be demonstrably implemented throughout the entire product lifecycle, vulnerabilities must be actively managed, and security updates must be provided on an ongoing basis. Thus, cybersecurity becomes a mandatory regulatory requirement and is no longer optional.
 

Conclusion

ENISA’s “Secure by Design and Default” playbook provides a practical yet structured framework for systematically integrating cybersecurity throughout the entire product lifecycle. Of particular note is the consistent, practical implementation of security requirements. Rather than abstract guidelines, the focus is on concrete measures, verifiable evidence, and clear approval criteria.

For manufacturers—especially in the context of the Cyber Resilience Act—this represents a significant paradigm shift. Security is no longer viewed as a supplementary measure but as an integral part of development, operations, and organization. By introducing standardized processes such as threat modeling, continuous vulnerability management, and automatable compliance verification, both the security level and traceability can be enhanced.

The Playbook offers a valuable framework, particularly for industrial and OT environments, as it bridges regulatory requirements with realistic operational conditions. At the same time, implementation requires close integration of engineering, operations, and organization, as well as adaptation of existing development and operational processes.
Overall, the ENISA Playbook thus creates a robust foundation for implementing and embedding cybersecurity in an efficient, sustainable, and verifiable manner.
 

Download the Playbook

You can open and download version 0.9 (final draft) of the ENISA Security by Design and Default Playbook via the following link.


ENISA Security by Design and Default Playbook


Posted on: 2026-04-03

Author

Wolfgang Reich
CE marking and safety expert HTL electrical engineering, specialising in power engineering (Dipl.-HTL-Ing.),  20 years of experience in CE marking, machine safety, conversion of machines, electrical engineering and explosion protection, 10 years of which at TÜV Austria and Intertek Deutschland GmbH. Chairman of the master craftsman examination commission in the Styrian Chamber of Commerce for mechatronics (automation technology and electronics).

E-Mail: wolfgang.reich@ibf-solutions.com


Share Article
Share Button Linkedin Share Button Xing Share Button X Share Button Email

Support by IBF

CE Software Safexpert

CE software for systematic and professional safety engineering

Seminars

Practical seminars on aspects of risk assessment and ce marking

Stay Up-to-Date!

With the CE InfoService you stay informed about important developments in the field of product safety.