<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>X (V. Antipenko);</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>Compliance in Manufacturing: Applying the FAST Method to NIS2 and the CRA</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Vjatšeslav Antipenko</string-name>
          <email>vjatseslav.antipenko@ut.ee</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Raimundas Matulevičius</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Forum</institution>
          ,
          <addr-line>Doctoral Consortium, Business Case and Tool Forum, Workshops</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>University of Tartu</institution>
          ,
          <addr-line>Ülikooli 18, 50090 Tartu</addr-line>
          ,
          <country country="EE">Estonia</country>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2026</year>
      </pub-date>
      <volume>000</volume>
      <fpage>0</fpage>
      <lpage>0002</lpage>
      <abstract>
        <p>Industrial organisations face increasing pressure to comply with evolving security regulations, including the NIS2 Directive (NIS2) and the Cyber Resilience Act (CRA). Yet translating legal obligations into operational practices remains a persistent challenge, especially for manufacturers in automated environments. This paper addresses this gap by aligning the FAST method -a function-driven threat modelling method for identifying and treating security threats-with obligations extracted from NIS2 and CRA. We elicit, classify, and refine regulatory requirements into acceptance criteria, mapping them to FAST artefacts using a requirements engineering approach grounded in Breaux and Antón's methodology. The resulting compliance artefact was validated through expert feedback. Our findings demonstrate that FAST provides a viable pathway for operationalising regulatory compliance through function- and asset-level risk analysis, ofering a foundation for future implementation and audit readiness. 1 PoEM2025: Companion Proceedings of the 18th IFIP Working Conference on the Practice of Enterprise Modeling: PoEM ∗Corresponding author.</p>
      </abstract>
      <kwd-group>
        <kwd>security compliance</kwd>
        <kwd>NIS2 Directive</kwd>
        <kwd>Cyber Resilience Act</kwd>
        <kwd>risk management</kwd>
        <kwd>industrial automation</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>CEUR
ISSN1613-0073</p>
    </sec>
    <sec id="sec-2">
      <title>1. Introduction</title>
      <p>
        The digitalisation of industrial operations has transformed manufacturing, integrating
automation, connected supply chains, and real-time data to sustain competitiveness [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. Yet this
connectivity exposes production environments to increasingly sophisticated cyber threats [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
      <p>
        Unlike conventional IT systems, manufacturing relies on complex cyber-physical
infrastructures that are often built on legacy technology [
        <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
        ]. Further convergence of IT and Operational
Technology (OT) has expanded the attack surface, allowing digital compromises to disrupt
physical processes [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. As a result, industrial incidents now cause both financial and operational
harm [6].
      </p>
      <p>To address these risks, the European Union enacted Directive (EU) 2022/2555 (NIS2) [7] and
Regulation (EU) 2024/2847 (CRA) [8]. Together, they require risk-based measures covering but
not limited to incident response, business continuity, supply-chain assurance, and vulnerability
management [9]. While establishing a foundation for resilience, they also impose demanding
1The compliance artefact, including requirement datasets and FAST mappings, is publicly available at Zenodo:
compliance obligations [10].</p>
      <p>Despite growing attention, translating these high-level legal requirements into practical
industrial applications remains challenging. Existing case studies focus mainly on sectors
such as healthcare or digital services [11, 12], leaving manufacturers with limited guidance
on aligning production systems and governance processes with NIS2 and CRA expectations.
Addressing this gap is essential for both compliance and the long-term resilience of automated
manufacturing.</p>
      <sec id="sec-2-1">
        <title>1.1. Research Challenge</title>
        <p>
          Manufacturers face the task of interpreting general security obligations within highly specialised,
multi-vendor, and often legacy environments [ 13]. Standards such as IEC 62443 provide partial
coverage but do not fully reflect the extended responsibilities introduced by NIS2 and CRA [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ].
        </p>
        <p>Given this, the study asks:
How can manufacturing organisations address security risks to ensure compliance
with NIS2 and CRA?</p>
        <p>Rather than introducing a new framework, we explore how the existing FAST method
(Functions, Assets, Security Threats, Treatments) [14] can be applied as a practical compliance
method. FAST structures risk identification and mitigation in cyber-physical systems, ofering
a basis for aligning manufacturing security practices with regulatory requirements.</p>
        <p>The remainder of this paper is organised as follows: Section 2 summarises the regulatory
and methodological background; Section 3 outlines the compliance validation process; Section
4 presents results; Section 5 reports expert feedback; and Section 6 concludes with reflections
and future work.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>2. Background</title>
      <p>This section outlines the regulatory context of NIS2 and the CRA and introduces the FAST
method, which is subsequently evaluated for its compliance with these regulations.</p>
      <sec id="sec-3-1">
        <title>2.1. Security Regulations: NIS2 and CRA</title>
        <p>Directive 2022/2555 (NIS2) and Regulation 2024/2847 (CRA) jointly define security requirements
across EU critical sectors. NIS2 focuses on organisational risk management for essential and
important entities, while CRA targets product-level security for manufacturers, importers, and
distributors. Together, they aim to establish a coherent European security posture.</p>
        <p>For manufacturers, NIS2 obligations include risk analysis, incident reporting, business
continuity, and supply-chain security [15]. CRA extends these to secure-by-design product
development, vulnerability management, and documentation of security features [16]. In practice,
product and process boundaries overlap: vulnerabilities in embedded devices can endanger
entire production systems [10].</p>
        <p>Although both frameworks promote proactive, risk-based governance, practical guidance
for manufacturers is still limited. Existing examples emphasise other domains [11], leaving
companies to interpret broad legal principles within complex industrial settings [17, 18].</p>
      </sec>
      <sec id="sec-3-2">
        <title>2.2. The FAST Method</title>
        <p>FAST is a method for analysing and mitigating security risks in industrial automation and
cyber-physical systems [14, 19]. Rather than redefining risk management and threat modelling,
it organises existing practices around information processing functions and their supporting
assets. The method comprises four components (Figure 1):
• Functions – Derived from Alter’s Work System Model [20], describing how systems
capture, transmit, store, retrieve, manipulate, and display information.
• Assets – Classified following ISSRM principles [ 21, 22], covering technological and
business assets. Asset classification also informs the Risk Management Plan (R), which
formalises governance and escalation processes.
• Security Threats – Identified using STRIDE [ 23] and MITRE ATT&amp;CK for ICS [24],
supporting exposure analysis.
• Treatments – Mitigation measures selected by feasibility and impact to address identified
threats.</p>
        <p>FAST clarifies how information-processing functions expose assets to attack vectors and
guides the design of targeted countermeasures. FAST produces artefacts—such as threat matrices,
risk classifications, and mitigation plans—that correspond to activities required by security
regulations. Consequently, this study examines the extent to which applying FAST enables an
organisation to achieve regulatory compliance in manufacturing contexts.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>3. Compliance Validation Method</title>
      <p>This section outlines the validation method used to determine whether FAST outputs fulfil
security obligations under the NIS2 Directive and the Cyber Resilience Act. The method adapts
established legal-requirement extraction techniques to the manufacturing domain and follows a
seven-step process: from acquiring and analysing legal text to defining acceptance criteria and
mapping them to FAST components and artefacts. All extracted requirements, classifications,
and mappings are publicly available at Zenodo1.</p>
      <sec id="sec-4-1">
        <title>3.1. Foundations — Adapting Breaux &amp; Antón</title>
        <p>The compliance validation process implemented in this study draws upon the regulatory analysis
method proposed by Breaux and Antón (2008) [25], originally designed for extracting rights,
obligations, and constraints from privacy and security laws such as HIPAA. The method was
selected for its ability to:
• Decompose legal text into semantic components (e.g., obligation, right, constraint,
exception),
• Preserve clause-level traceability,
• Handle legal complexity such as cross-references and conditional duties,
• Translate legal language into actionable, system-relevant requirements.</p>
        <p>Given the layered and actor-specific structure of NIS2 and CRA, a method with these
capabilities is essential. Table 1 compares this approach with alternatives.</p>
        <sec id="sec-4-1-1">
          <title>3.1.1. Expansions to the Validation Method</title>
          <p>To tailor the Breaux &amp; Antón method for security regulation in manufacturing, three targeted
adaptations were introduced.</p>
          <p>(1) Role-Based Filtering: Only obligations relevant to private-sector
entities—manufacturers, importers, and operators of essential or important services—were retained, excluding
state-level policy duties except where they indirectly afect manufacturers.</p>
          <p>(2) Extended Keyword Set: The extraction logic was expanded beyond legal verbs (shall,
must) to include domain-specific terms such as mitigate, govern, and assess, capturing the
technical language common in security legislation.</p>
          <p>(3) FAST Alignment: Each obligation was linked to relevant FAST components—Function (F),
Asset (A), Security Threat (S), Treatment (T), or Risk Management Plan (R)—and corresponding
artefacts. This enables compliance traceability and evidence-based validation during audits.</p>
          <p>Together, these refinements operationalise a transparent and domain-aware compliance
pipeline.</p>
        </sec>
        <sec id="sec-4-1-2">
          <title>3.1.2. Compliance Processing Pipeline</title>
          <p>The compliance pipeline operationalises the adapted Breaux &amp; Antón method as a seven-step
procedure that converts regulatory clauses into testable criteria mapped to FAST artefacts. The
process was implemented through structured text extraction, spreadsheet analysis, and expert
verification to maintain traceability (Table 2).</p>
          <p>FAST artefacts used in step 6, mapping include the threat matrix, asset inventory, control
catalogue, mitigation plan, and residual-risk register. These outputs represent evidence that
can be reviewed or audited against legal obligations. Coverage categories, used in step 7,
describe how completely each legal criterion is addressed within FAST: fully covered (criterion
satisfied), partially covered (criterion addressed in part), conditionally covered (criterion handled
through the Risk Management Plan), and not covered (criterion outside current FAST scope).
All classifications include explicit references to the artefacts used in the assessment.</p>
        </sec>
      </sec>
      <sec id="sec-4-2">
        <title>3.2. Threats to Validity</title>
        <p>The validation process has several limitations considered across four dimensions: construct,
internal, external, and reliability.</p>
        <p>Construct validity concerns whether the study captures security compliance in full. To
cover legal, technical, and organisational aspects, the extraction used an extended keyword set
and role-based filtering. All identified obligations and criteria were jointly reviewed to ensure
consistent interpretation.</p>
        <p>Internal validity relates to whether mappings between legal criteria and FAST components
result from the method rather than bias. Mappings followed predefined rules linking requirement
types to FAST elements and were checked by multiple coders until agreement was reached.
Items outside the FAST scope were recorded under the Risk Management Plan (R).</p>
        <p>External validity addresses generalisability. Results reflect the manufacturing context and
should be replicated in other industrial settings before extending the method to additional
frameworks such as ISO/IEC 27001 or IEC 62443.</p>
        <p>Reliability concerns repeatability. All sources were version-controlled, and the extraction
and mapping rules were documented to allow independent replication.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>4. Findings</title>
      <p>This section presents the results of the compliance validation analysis, focusing on the alignment
between obligations defined in the NIS2 Directive and the Cyber Resilience Act and the outputs
generated by the FAST method. The analysis relies on the traceability model described below,
which links legal obligations—through derived acceptance criteria—to FAST components and
artefacts. The complete dataset, including extracted requirements, classifications, and mappings,
is available at Zenodo2.</p>
      <sec id="sec-5-1">
        <title>4.1. Scope of Extracted Obligations and Criteria Development</title>
        <p>Using the keyword and role-filtering methods from Section 3, we identified 253 obligations in
NIS2 and 342 in CRA. Many concern national authorities or enforcement mechanisms and
were therefore excluded. After filtering for manufacturing-relevant roles such as manufacturers,
suppliers, importers, and essential entities, 40 NIS2 and 96 CRA obligations remained for
assessment.</p>
        <p>Each obligation was decomposed into one or more acceptance criteria, yielding over 160
testable statements. The number per obligation depended on clause complexity: simple
requirements produced a single criterion, while compound or conditional clauses were divided
into multiple items.</p>
      </sec>
      <sec id="sec-5-2">
        <title>4.2. Compliance Traceability Framework</title>
        <p>The compliance traceability framework links each regulatory requirement to the FAST
components and artefacts demonstrating its fulfilment. Each requirement receives a unique legal
reference (e.g., CRA-13-2) and is translated into measurable acceptance criteria. These criteria
are mapped to relevant FAST elements—Function (F), Asset (A), Security Threat (S), Treatment
(T), or Risk Management Plan (R)—and to the artefacts created during implementation. For
each mapping, the coverage level (fully, partially, conditionally, or not covered) and a concise
justification are recorded. Together, these form the compliance validation matrix in Table 3,
providing traceability from legal text to system-level evidence.</p>
      </sec>
      <sec id="sec-5-3">
        <title>4.3. FAST Mapping and Compliance Assessment</title>
        <p>Each acceptance criterion was mapped to one or more FAST components and artefacts to
determine whether outputs from FAST can serve as evidence of compliance. Coverage was
evaluated using four categories: Fully Covered, Partially Covered, Conditionally Covered via
R, and Not Covered. The conditional category refers to obligations met only when explicitly
managed through the Risk Management Plan (R).
while NIS2 more often requires extensions to risk-management activities.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>5. Evaluation: Expert Feedback</title>
      <p>To validate the requirement extraction and assess the practical value of FAST in supporting
compliance, expert feedback was gathered from five professionals with backgrounds in security
law, product security, and public sector governance.</p>
      <sec id="sec-6-1">
        <title>5.1. Procedure and Participants</title>
        <p>The objective of the validation was twofold: (1) to verify the correctness and completeness of
the extracted NIS2 and CRA obligations and their mapping to FAST, and (2) to assess FAST’s
usefulness as a compliance support framework in practice. Experts were sought who could
represent legal, technical, and organisational viewpoints. Twenty professionals with relevant
backgrounds across academia, industry, and the public sector were contacted; five agreed to
participate. The expert group represented both private and public organisations, as well as
diverse roles (Table 5).</p>
        <p>The validation followed two stages. First, participants received the compliance artefact
containing extracted requirements, classification schema, mapped FAST artefacts, and acceptance
criteria. Second, semi-structured interviews were conducted to discuss their feedback, with
several participants also providing written comments.</p>
      </sec>
      <sec id="sec-6-2">
        <title>5.2. Insights from Validation</title>
        <p>Experts found the artefact well structured and traceable: each requirement could be linked to
its legal origin, mapped FAST element, and acceptance criterion. They noted that the explicit
reasoning behind mappings improved credibility and practical usability.</p>
        <p>Interviews highlighted diferences in regulatory scope. NIS2, as a directive, depends on
national transposition, while CRA applies directly across the EU. This creates compliance
overlap—some obligations are immediate under CRA, others arise indirectly through NIS2
implementation. Despite this, experts agreed both laws are risk-based: NIS2 focuses on
organisational resilience and governance, CRA on product design, vulnerability handling, and
lifecycle management.</p>
        <p>Experts outlined several approaches for meeting these requirements:
• Identify critical business processes and related assets, then conduct risk analysis based
on dependencies and threat exposure.
• Follow structured frameworks such as ISO/IEC 27001 or Estonia’s E-ITS standards for
auditable compliance.</p>
        <p>• Perform compliance gap analyses to locate and prioritise control deficiencies.</p>
        <p>Some suggested grouping obligations by domain rather than article for easier use. Others
pointed to supporting materials such as RIA’s sectoral risk analysis templates [30] and ENISA’s
implementation guides [31] as useful complements.</p>
        <p>Experts viewed FAST as a practical, integrative method linking functional and asset-based
risk assessments. Its risk-driven treatment logic enables organisations to tailor controls to
obligation-specific needs, supporting both compliance and operational assurance. For SMEs,
FAST was seen as a clear entry point to handle regulatory complexity by embedding security
and compliance into existing processes rather than adding new layers. Several participants
proposed developing a concise, role-based guide to further assist adoption—identified as a
promising avenue for future work.</p>
      </sec>
      <sec id="sec-6-3">
        <title>5.3. Resulting Adjustments and Reflections</title>
        <p>Expert feedback led to refinements improving clarity and traceability:
• Acceptance criteria were revised to align more closely with regulatory language.
• Role definitions, particularly for notified bodies and economic operators, were clarified.</p>
        <p>The validation mainly examined the regulatory mappings and resulting artefacts, not FAST’s
internal structure. Future studies should extend evaluation to operational scenarios such as
audit planning and system design. Nonetheless, the feedback confirmed FAST’s relevance as a
risk-aware foundation for managing security obligations under NIS2 and CRA.</p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>6. Concluding Remarks and Future Work</title>
      <p>This paper presented a structured alignment of the FAST security framework with obligations
in the NIS2 Directive and the Cyber Resilience Act (CRA). We extracted and classified applicable
requirements, formulated traceable acceptance criteria, and mapped them to actionable FAST
components. Expert review confirmed traceability, legal alignment, and practical utility for
compliance planning.</p>
      <p>A key outcome is that FAST’s risk-based logic aligns with core compliance principles in
both NIS2 and CRA. By embedding obligation fulfilment within function- and asset-level risk
analysis, FAST enables organisations—particularly SMEs—to approach compliance through
structured decision-making rather than reactive checklists. Experts noted that this helps
reconcile organisational obligations under NIS2 with product-focused requirements under CRA,
ofering a unified analytical lens.</p>
      <p>The validation served its intended purpose: to assess whether FAST can meaningfully support
compliance under current regulatory expectations. The evaluation focused on manufacturers
to manage complexity; other roles (e.g., service providers, importers) were not included. The
broader legal context—especially diferences between directives and directly applicable
regulations—remains a challenge for generalisation and automation. FAST does not remove this
complexity but provides a systematic way to navigate it.</p>
      <p>Future work should: (i) deploy FAST in real industrial settings to test operational usability,
including audit planning and risk treatment justification; (ii) expand scope to additional roles
and cross-sectoral dependencies; and (iii) develop a concise, role-based or function-oriented
compliance guide for SMEs, as suggested by experts.</p>
      <p>Overall, this research contributes to bridging evolving regulatory obligations and operational
security practice. As industrial systems become increasingly interconnected and regulated,
structured methods like FAST can serve as a framework for embedding compliance into core
engineering and governance workflows.</p>
    </sec>
    <sec id="sec-8">
      <title>Acknowledgments</title>
      <p>The European Union funds this research under Grant Agreement No. 101087529. Views and
opinions expressed are those of the author(s) only and do not necessarily reflect those of the
European Union or European Research Executive Agency. Neither the European Union nor the
granting authority can be held responsible.</p>
    </sec>
    <sec id="sec-9">
      <title>Declaration on Generative AI</title>
      <p>The authors declare that generative AI tools were used solely for language editing and style
improvement. Specifically, ChatGPT (OpenAI GPT-5, 2025) and Grammarly were employed to
enhance readability, grammar, and clarity of the text. No generative AI tools were used for data
generation, analysis, interpretation, or the formulation of research content. The authors take
full responsibility for the accuracy, originality, and integrity of all scientific content presented
in this paper.
[6] J. Giraldo, E. Sarkar, A. A. Cardenas, M. Maniatakos, M. Kantarcioglu, Security and
privacy in cyber-physical systems: A survey of surveys, IEEE Design Test 34 (2017) 7–17.
doi:10.1109/MDAT.2017.2709310.
[7] European Union, Directive (EU) 2022/2555 of the european parliament and of the council
of 14 december 2022 on measures for a high common level of cybersecurity across the
union (NIS2 Directive), 2022. URL: https://eur-lex.europa.eu/eli/dir/2022/2555, accessed:
2025-01-23.
[8] European Union, Regulation (EU) 2024/2847 of the european parliament and of the council
of 12 december 2024 on measures for a high common level of cybersecurity for
products with digital elements (Cyber Resilience Act), 2024. URL: https://eur-lex.europa.eu/
legal-content/EN/TXT/?uri=CELEX:32024R2847, accessed: 2025-01-23.
[9] N. Vandezande, Cybersecurity in the EU: How the NIS2-directive stacks up against its
predecessor, Computer Law &amp; Security Review 52 (2024) 105890. URL: https://linkinghub.
elsevier.com/retrieve/pii/S0267364923001000. doi:10.1016/j.clsr.2023.105890.
[10] P. Eckhardt, A. Kotovskaia, The EU’s cybersecurity framework: the interplay between the
Cyber Resilience Act and the NIS 2 Directive, International Cybersecurity Law Review 4
(2023) 147–164. URL: https://link.springer.com/10.1365/s43439-023-00084-z. doi:10.1365/
s43439- 023- 00084- z.
[11] A. van Welie, Legislation within cybersecurity: preparing for NIS2 – a detailed framework
in the healthcare sector in the Netherlands, Master’s thesis, Cybersecurity/Turku School
of Economics (TSE) &amp; Tilburg School of Economics and Management (TiSEM), 2024.
[12] Z. S. Li, C. Werner, N. Ernst, D. Damian, Towards privacy compliance: A design science
study in a small organization, Information and Software Technology 146 (2022) 106868. URL:
https://linkinghub.elsevier.com/retrieve/pii/S0950584922000362. doi:10.1016/j.infsof.
2022.106868.
[13] K. A. Parvanov, From Legislation To Practice A Structured Guide for the EU’s Cyber</p>
      <p>Resilience Act, Master Degree Project, University of Skövde, 2024.
[14] V. Antipenko, R. Matulevičius, Functional security in automation: The fast approach, in:
E. Paja, J. Zdravkovic, E. Kavakli, J. Stirna (Eds.), The Practice of Enterprise Modeling,
Springer Nature Switzerland, Cham, 2025, pp. 244–261.
[15] M. Veigurs, T. Lasmanis, A. Romanovs, IT Governance in Critical Sectors: Towards
the NIS2 Implementation, in: 2024 IEEE 65th International Scientific Conference on
Information Technology and Management Science of Riga Technical University (ITMS),
IEEE, Riga, Latvia, 2024, pp. 1–7. URL: https://ieeexplore.ieee.org/document/10741938/.
doi:10.1109/ITMS64072.2024.10741938.
[16] A. J. Jara, I. C. Martinez, J. S. Sanchez, CyberSecurity Resilience Act (CRA) in Practice for
IoT Devices: Getting Ready for the NIS2, in: 2024 IEEE Smart Cities Futures Summit (SCFC),
IEEE, Marrakech, Morocco, 2024, pp. 56–60. URL: https://ieeexplore.ieee.org/document/
10698057/. doi:10.1109/SCFC62024.2024.10698057.
[17] D. Skias, S. Tsekeridou, T. Zahariadis, A. Voulkidis, T.-H. Velivassaki, Demonstration of
alignment of the Pan-European Cybersecurity Incidents Information Sharing Platform
to Cybersecurity policy, regulatory and legislative advancements, in: Proceedings of
the 17th International Conference on Availability, Reliability and Security, ACM, Vienna
Austria, 2022, pp. 1–8. URL: https://dl.acm.org/doi/10.1145/3538969.3544477. doi:10.1145/
3538969.3544477.
[18] Yogosha, Cyber resilience act: A comprehensive guide to compliance and implementation,
n.d. URL: https://yogosha.com/blog/cra-cyber-resilience-act-guide/, accessed: 2025-01-23.
[19] V. Antipenko, R. Matulevičius, Function–threat alignment in cps with fast and mitre
att&amp;ck, in: R. Deneckère, M. Kirikova, J. Grabis (Eds.), Perspectives in Business Informatics
Research, Springer Nature Switzerland, Cham, 2026, pp. 365–379.
[20] S. Alter, The Work System Method: Connecting People, Processes, and IT for Business</p>
      <p>Results, Work System Method, 2006.
[21] É. Dubois, P. Heymans, N. Mayer, R. Matulevičius, A Systematic Approach to Define the
Domain of Information System Security Risk Management, Springer Berlin Heidelberg,
Berlin, Heidelberg, 2010, pp. 289–306. URL: https://doi.org/10.1007/978-3-642-12544-7_16.
doi:10.1007/978- 3- 642- 12544- 7_16.
[22] R. Matulevičius, Fundamentals of secure system modelling, Springer, 2017.
[23] A. Shostack, Threat Modeling: Designing for Security, John Wiley &amp; Sons, 2014.
[24] MITRE, Mitre att&amp;ck for ics (industrial control systems), n.d. URL: https://attack.mitre.</p>
      <p>org/matrices/ics/, accessed: 2025-01-23.
[25] T. Breaux, A. Antón, Analyzing regulatory rules for privacy and security requirements,</p>
      <p>IEEE Transactions on Software Engineering 34 (2008) 5–20. doi: 10.1109/TSE.2007.70746.
[26] J. F. Zarrabi, H. Mouratidis, S. Islam, Extracting security requirements from relevant laws
and regulations, IEEE, 2012.
[27] K. Fatema, C. Debruyne, D. Lewis, D. OSullivan, J. P. Morrison, A.-A. Mazed, A
semiautomated methodology for extracting access control rules from the european data
protection directive, in: 2016 IEEE Security and Privacy Workshops (SPW), IEEE, 2016, pp.
25–32.
[28] S. Islam, H. Mouratidis, S. Wagner, Towards a framework to elicit and manage security
and privacy requirements from laws and regulations, in: R. Wieringa, A. Persson (Eds.),
Requirements Engineering: Foundation for Software Quality, Springer Berlin Heidelberg,
Berlin, Heidelberg, 2010, pp. 255–261.
[29] D. Firesmith, Engineering Safety and Security Related Requirements for Software Intensive</p>
      <p>Systems., in: ICSE Companion, 2007, p. 169.
[30] Estonian Information System Authority, Cybersecurity Assessment and Roadmap
Methodology (v2), Deliverable D2.1, Estonian National Cybersecurity Centre (NCC-EE),
2024. URL: https://www.ria.ee/sites/default/files/documents/2024-09/NCCEE-WP2-D2.
1-Cybersecurity-Assessment-and-Roadmap-Methodology_v2.pdf, accessed: 2025-06-13.
[31] European Union Agency for Cybersecurity (ENISA), Implementation Guidance on
Security Measures: For Public Consultation, Technical Report, ENISA, 2024. URL:
https://www.enisa.europa.eu/sites/default/files/2024-11/Implementation%20guidance%
20on%20security%20measures_FOR%20PUBLIC%20CONSULTATION.pdf, accessed:
2025-06-13.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>European</given-names>
            <surname>Commission</surname>
          </string-name>
          .
          <article-title>Directorate General for Energy.</article-title>
          , ECORYS.,
          <article-title>The net-zero manufacturing industry landscape across Member States: final report</article-title>
          .,
          <string-name>
            <surname>Publications</surname>
            <given-names>Ofice</given-names>
          </string-name>
          ,
          <string-name>
            <surname>LU</surname>
          </string-name>
          ,
          <year>2025</year>
          . URL: https://data.europa.eu/doi/10.2833/2249632.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>European</given-names>
            <surname>Union</surname>
          </string-name>
          <article-title>Agency for Cybersecurity.</article-title>
          ,
          <source>ENISA threat landscape</source>
          <year>2024</year>
          :
          <article-title>July 2023 to June 2024</article-title>
          ., Publications Ofice,
          <string-name>
            <surname>LU</surname>
          </string-name>
          ,
          <year>2024</year>
          . URL: https://data.europa.eu/doi/10.2824/0710888.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>E. A.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <article-title>Cyber physical systems: Design challenges</article-title>
          ,
          <source>in: 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC)</source>
          ,
          <year>2008</year>
          , pp.
          <fpage>363</fpage>
          -
          <lpage>369</lpage>
          . doi:
          <volume>10</volume>
          .1109/ISORC.
          <year>2008</year>
          .
          <volume>25</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>A.</given-names>
            <surname>Ocaka</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. O.</given-names>
            <surname>Briain</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Davy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Barrett</surname>
          </string-name>
          ,
          <article-title>Cybersecurity threats, vulnerabilities, mitigation measures in industrial control and automation systems: A technical review</article-title>
          ,
          <source>in: 2022 Cyber Research Conference - Ireland (Cyber-RCI)</source>
          ,
          <year>2022</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          . doi:
          <volume>10</volume>
          .1109/Cyber- RCI55324.
          <year>2022</year>
          .
          <volume>10032665</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>G.</given-names>
            <surname>Murray</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. N.</given-names>
            <surname>Johnstone</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Valli</surname>
          </string-name>
          ,
          <article-title>The convergence of it and ot in critical infrastructure</article-title>
          ,
          <source>in: Proceedings of the 15th Australian Information Security Management Conference</source>
          ,
          <year>2017</year>
          , pp.
          <fpage>149</fpage>
          -
          <lpage>155</lpage>
          . URL: https://ro.ecu.edu.au/ism/217/. doi:
          <volume>10</volume>
          .4225/75/5a84f7b595b4e.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>