The Security Standards for Smart Devices Rules 2025 (Schedule 1, Part 1) prescribe three categories of mandatory security requirements for consumer grade relevant connectable products under the Australia Cyber Security Act 2024. These three categories are: requirements in relation to passwords, requirements relating to reports of security issues, and requirements relating to defined support periods and security updates. These requirements are closely aligned with the ETSI EN 303 645 baseline standard and the UK Product Security and Telecommunications Infrastructure Act 2022.
For passwords, the Australia Cyber Security Act 2024 rules require that all passwords for hardware and software of a relevant connectable product must be either unique per product or defined by the user. Passwords that are unique per product must not be based on incremental counters, must not be based on or derived from publicly available information, and must not be based on unique product identifiers such as serial numbers unless an encryption method or keyed hashing algorithm accepted as good industry practice is used. This means universal default passwords such as 'admin' or 'password' are prohibited under the Australia Cyber Security Act 2024.
For vulnerability reporting, the Australia Cyber Security Act 2024 rules require that the manufacturer of a relevant connectable product must publish at least one point of contact for reporting security issues, state when a reporter will receive acknowledgement, and provide status updates until resolution. This information must be accessible, clear, transparent, available without prior request, in English, free of charge, and must not require the reporter to provide personal information.
For defined support periods, the Australia Cyber Security Act 2024 rules require that the manufacturer must publish the period during which security updates will be provided. The defined support period must be expressed as a time period with an end date. The manufacturer must not shorten the defined support period after publication. If extended, the new period must be published as soon as practicable. When the product is offered on a website, the support period must be published with equal prominence alongside the main product characteristics.
The EU Cyber Resilience Act imposes a much more extensive set of essential cybersecurity requirements listed in Annex I. These include secure by design and by default, protection of confidentiality, integrity, and availability, minimisation of data processing, vulnerability handling throughout the lifecycle, provision of security updates for at least five years or the expected product lifetime, SBOM (software bill of materials) documentation, and coordinated vulnerability disclosure. The EU Cyber Resilience Act also requires that products be delivered with a secure default configuration, that all known exploitable vulnerabilities are addressed before placing on the market, and that manufacturers implement a documented vulnerability handling process.
This CRA comparison reveals that the three Australian requirements (passwords, vulnerability contact, support period) represent a focused subset of the EU Cyber Resilience Act essential requirements. A team that satisfies the EU Cyber Resilience Act Annex I requirements will generally also satisfy the Australia Cyber Security Act 2024 smart device standards, but a team that only satisfies the Australian standards will still need significant additional work to meet the EU Cyber Resilience Act.