This document is under active development and has not been finalised.
Skip to content

7.3 Update Mechanism

Overview

The Update Mechanism ensures that security updates are delivered to users in a secure, authentic, and timely manner.

LEGAL BASIS

Annex I, Part II, No. 7: "The manufacturer shall ensure that security updates are made available to users without delay and free of charge."

Art. 10(12) CRA: The integrity of security updates must be ensured, in particular in the case of automatic installation.

Update Channels

Container-Based Products

Patch verfügbar

    ├── Neues Container-Image bauen
    │   ├── CI/CD Pipeline (automatisch)
    │   ├── Trivy Scan (keine neuen CVEs)
    │   ├── SBOM generieren
    │   └── Cosign signieren

    ├── Image publizieren
    │   ├── GitHub Container Registry (GHCR)
    │   └── Docker Hub (falls konfiguriert)

    ├── Nutzer-Benachrichtigung
    │   ├── GitHub Release mit Changelog
    │   └── Security Advisory (bei CVE-Fixes)

    └── Update durch Nutzer
        ├── docker pull <image>:<new-tag>
        ├── Signatur verifizieren: cosign verify
        └── Container neu starten

Firmware Updates (OTA)

Patch verfügbar

    ├── Firmware bauen
    │   ├── Build-Workflow (ESP32/STM32/Zephyr)
    │   ├── SBOM generieren
    │   └── Cosign signieren

    ├── Firmware publizieren
    │   ├── GitHub Release Asset
    │   └── OTA-Server (signiert)

    ├── OTA-Verteilung
    │   ├── Gerät prüft OTA-Server
    │   ├── Signatur validieren
    │   ├── Hash verifizieren
    │   ├── Firmware installieren
    │   └── Anti-Rollback prüfen

    └── Fallback
        └── Manuelle Update-Möglichkeit (USB/Serial)

Software Packages (NuGet, NPM)

Patch verfügbar

    ├── Paket bauen + publizieren
    │   ├── Registry (NuGet.org, npmjs.com)
    │   └── SBOM als Release Asset

    └── Nutzer aktualisiert
        └── npm update / dotnet update

Integrity Protection

Each update is protected by the following mechanisms:

MechanismContainerFirmwarePackages
Cosign Signature🔧 Planned
SHA256 Hash✅ (Registry)
TLS Transport
Anti-RollbackN/AN/A
Secure Boot ChainN/A✅ (where supported)N/A

Free-of-Charge Provision

Pursuant to Art. 10(7) CRA, all security updates are provided free of charge:

  • Container images via public registries (GHCR)
  • Firmware via GitHub Releases (public download)
  • Software packages via public registries

Update Frequency

Product TypeRegular UpdatesSecurity Updates
Container ImagesAs needed / monthlyImmediately for CRITICAL/HIGH
FirmwareQuarterlyImmediately for CRITICAL/HIGH
Software PackagesAs neededImmediately for CRITICAL/HIGH

Documentation licensed under CC BY-NC 4.0 · Code licensed under MIT