EU Regulation | Product Security
Cyber Resilience Act:
Obligations for Manufacturers
of Digital Products.
The CRA (Regulation (EU) 2024/2847) is the first binding EU regulation on the cybersecurity of digital products. Manufacturers across Europe must ensure SBOM obligations, vulnerability management and 5-year security updates by December 2027. Non-EU manufacturers exporting to the EU are equally affected.
Last updated: March 2026 - reviewed by certified experts
- Affected manufacturers in the EU
- 7,000+
- Full application
- Dec. 2027
- Maximum fine
- EUR 15 M
- Mandatory security updates
- 5 years
Overview
What is the Cyber Resilience Act?
The Cyber Resilience Act (Regulation (EU) 2024/2847) is the first binding EU regulation that attaches cybersecurity requirements directly to products with digital elements. It was published in the Official Journal of the EU on 14 December 2024 and entered into force on 12 December 2024.
The CRA closes a critical gap: while NIS-2 obliges service operators, the CRA governs the security of the products themselves - from development through market launch to end of lifecycle. Every connected product sold must in future be demonstrably built securely and maintained permanently.
The most important paradigm shift: security becomes a legal product property - no longer an optional add-on. Products without evidence of compliance may no longer be placed on the EU market. This applies equally to non-EU manufacturers who export products to the EU.
CRA at a Glance
- EU Regulation
- Regulation (EU) 2024/2847
- Published
- 14 December 2024 (Official Journal of the EU)
- In force
- 12 December 2024
- Full application
- 12 December 2027 (reporting obligations from Sept. 2026)
- Authority (DE)
- Federal Office for Information Security (BSI)
- Max. fine
- EUR 15 M / 2.5% global turnover
Reporting obligations from September 2026
The reporting obligation for actively exploited vulnerabilities applies from September 2026. Manufacturers must have established the necessary processes and BSI contacts by then.
Scope
Which Products Are Affected by the CRA?
The CRA distinguishes three criticality classes with different conformity assessment requirements. The classification determines whether self-assessment is sufficient or an independent notified body is required.
Self-Assessment
Conformity assessment by the manufacturer itself (EU declaration of conformity)
Third-Party Audit
Audit by a notified body (independent accredited inspection body) required
Strictest Requirements
Smart cards, HSMs, root CA products - strictest conformity obligations and European certification schemes
Self-assessment possible - Fine for violation up to EUR 10 M or 2% of turnover
- Consumer routers and switches Home network devices with internet access
- Smart home devices Smart plugs, cameras, door locks
- Wearables Smartwatches, fitness trackers with network connectivity
- Consumer electronics Smart TVs, connected speakers, set-top boxes
- Industrial control systems (Class I) Simple PLCs and embedded components
- General software Browsers, email clients, office applications
- Mobile devices (non-critical) Smartphones, tablets without special function
- Connected toys Interactive toys with network connectivity
Notified body required - Fine for violation up to EUR 15 M or 2.5% of turnover
- Firewalls and UTM systems Network security and packet filtering
- ICS/SCADA systems Industrial control systems, operational technology
- VPN gateways Virtual private network concentrators
- Encryption and PKI products HSM, certificate management, cryptographic modules
- Operating systems (general) Desktop and server OS with security functions
- Microcontrollers with security function Trusted execution environments, secure enclaves
- Industrial IoT gateways OT and IT network interconnects
- Network monitoring tools IDS/IPS, SIEM sensors
Importers and distributors - indirect obligations
Importers of products from outside the EU assume the manufacturer's position if the manufacturer has no EU establishment. Distributors are obliged to check CE marking and resell only CRA-compliant products (Art. 19, 20 CRA).
Which class applies to your product?
The classification determines your compliance effort and conformity assessment requirements. In a free initial consultation we review your products and provide a definitive assessment.
Annex I CRA
The 8 Core Obligations of the Cyber Resilience Act
The CRA defines binding security requirements in Annex I for all phases of the product lifecycle - from conception through development to end of support. The requirements apply to all manufacturers regardless of product category.
Secure by Design & Default
Products must be designed from the ground up with security objectives (Art. 13(1) CRA). Default configurations must be secure: no preset default passwords, unnecessary services disabled, minimal attack surface. Security requirements must be considered throughout the entire product development process (Secure Development Life Cycle).
Test product securityVulnerability Management & Disclosure
Manufacturers must establish a structured process for receiving, assessing and remedying vulnerabilities (Annex I Part II CRA). Coordinated Vulnerability Disclosure (CVD) must be enabled. Discovered vulnerabilities must be remedied and documented promptly. A contact channel for vulnerability reports must be publicly known.
Vulnerability management consultingSBOM - Software Bill of Materials
Manufacturers must create and maintain a complete list of all software components (SBOM) (Art. 13(3) CRA). The SBOM must capture all direct and transitive dependencies, contain version information and be kept current. It must be made available to market surveillance authorities on request. Accepted formats: SPDX (ISO 5962) or CycloneDX.
SBOM & Supply Chain SecuritySecurity Updates (minimum 5 years)
Manufacturers are obliged to provide security updates for at least 5 years or the expected product lifetime (Art. 13(8) CRA). Updates must be provided free of charge, promptly and without delay. Users must be actively informed about available updates. Transparent communication is required after the end of support.
CE Marking with Cyber Conformity
Products with digital elements may only be placed on the market after the CRA enters into force if they bear the CE marking for cybersecurity (Art. 28 CRA). The marking demonstrates conformity with CRA requirements. It must be obtained before placing on the market and includes a conformity assessment.
Conformity Assessment (Self-Assessment / Third-Party)
Class I products (normal criticality) can be declared conformant through self-assessment (Art. 32 CRA). Class II products (increased criticality) require an independent audit by an accredited conformity assessment body (notified body). Critical products (Annex III) are subject to the strictest requirements. Assessment results must be documented and retained.
Request CRA assessmentMandatory Reporting of Exploited Vulnerabilities
Manufacturers must report actively exploited vulnerabilities to ENISA and the national authority (in Germany: BSI) within 24 hours (Art. 14 CRA). A detailed report follows within 72 hours. This reporting obligation applies regardless of whether the manufacturer discovered the vulnerability themselves or was informed by a third party. The BSI acts as the national coordination point.
Technical Documentation
Manufacturers must create comprehensive technical documentation and retain it for 10 years after placing on the market (Art. 31 CRA). This includes: product description, security concept, risk analysis, design and manufacturing documents, SBOM, test results, EU declaration of conformity. The documentation must be made available to market surveillance authorities on request at any time.
Note: The eight requirements apply to all manufacturers. For Class II products the EU Commission may issue delegated acts defining additional sector-specific requirements - comparable to the European cybersecurity certification schemes under the ENISA CSA (EU 2019/881).
„The Cyber Resilience Act fundamentally changes the rules for software development. Security is no longer a feature - it is a mandatory product property. Companies that start building compliant processes now will have a significant competitive advantage in 2027.“
Chris Wojzechowski
Auditor with §31 BSIG audit methodology competence · AWARE7 GmbH
FAQ
Frequently Asked Questions about the Cyber Resilience Act
The most important questions about the CRA - answered with practical focus.
Who is affected by the Cyber Resilience Act?
What is the difference between Class I and Class II products?
When does the Cyber Resilience Act fully apply?
What fines are imposed for CRA violations?
How do the Cyber Resilience Act and NIS-2 interact?
What must a CRA-compliant SBOM contain?
How much does CRA compliance cost?
Does the CRA also apply to open-source software?
What role does the BSI play in the Cyber Resilience Act?
How does AWARE7 prepare manufacturers for the CRA?
Aus dem Blog
Weiterführende Artikel
Alle ArtikelSoftware Supply Chain Security: Warum SolarWinds jeden betreffen kann
CRA Readiness Check
In a free initial consultation, we classify your products, assess the compliance gap against CRA requirements, and develop a prioritised action plan with timeline and fixed-price proposal.
Kostenlos · 30 Minuten · Unverbindlich