Cyber Resilience Act (CRA): Obligations for Software and Hardware Manufacturers


Cyber Resilience Act (CRA): Obligations for Software and Hardware Manufacturers

Cyber Resilience Act (CRA): Obligations for Software and Hardware Manufacturers

The Cyber Resilience Act (CRA) is Regulation (EU) 2024/2847. It creates horizontal cybersecurity requirements for products with digital elements placed on the EU market. For software and hardware manufacturers, the CRA turns product security into a lifecycle compliance obligation.

Sources: Regulation (EU) 2024/2847, European Commission CRA summary, European Commission CRA page, ENISA CRA materials.

Key takeaways

  • The CRA entered into force on 10 December 2024.
  • Main obligations apply from 11 December 2027.
  • Article 14 reporting obligations apply earlier, from 11 September 2026.
  • The CRA applies to hardware and software products with digital elements made available on the EU market, subject to defined exclusions.
  • Manufacturers must address security by design, vulnerability handling, conformity assessment, technical documentation, and CE marking.
  • Non-compliance with essential cybersecurity requirements and Articles 13 and 14 can lead to fines up to EUR 15 million or 2.5% of worldwide annual turnover.

Scope of this article

This article explains CRA obligations for manufacturers, importers, distributors, and software teams. It does not replace product-specific legal analysis or conformity-assessment planning.

What is the Cyber Resilience Act?

The CRA is a product-security regulation. It applies across sectors and targets products with digital elements, including software, hardware, and remote data processing solutions that are necessary for a product function. The Commission describes it as a horizontal framework for secure hardware and software in the EU market.

Application timeline

DateMilestoneOperational consequence
10 December 2024Entry into forcePreparation period starts.
11 June 2026Chapter IV appliesConformity-assessment body notification rules apply.
11 September 2026Article 14 appliesReporting obligations for actively exploited vulnerabilities and severe incidents start.
11 December 2027Main application dateCore CRA obligations apply to products with digital elements.

Who is in scope?

The CRA covers economic operators such as manufacturers, authorised representatives, importers, and distributors. The most intensive obligations sit with manufacturers because they control design, development, documentation, vulnerability handling, and conformity assessment.

Open-source software requires careful analysis. The regulation distinguishes non-commercial open-source activity from commercial activity and also introduces the role of open-source software steward. Do not assume every repository is out of scope.

Product categories

CategoryPractical readingCompliance impact
Standard productsProducts with digital elements not listed as important or critical.Manufacturer obligations and conformity assessment apply.
Important class IProducts listed in Annex III with material cybersecurity relevance.More structured conformity expectations.
Important class IIHigher-risk products listed in Annex III.Stronger conformity-assessment burden.
Critical productsProducts listed in Annex IV.Potential certification relevance and higher assurance expectations.

Main manufacturer obligations

  • Design, develop, and produce products according to essential cybersecurity requirements.
  • Document cybersecurity risk assessment and technical controls.
  • Handle vulnerabilities during the support period.
  • Provide security information and instructions to users.
  • Run the appropriate conformity-assessment route.
  • Apply CE marking when requirements are met.

Vulnerability and incident reporting

Article 14 introduces reporting duties for actively exploited vulnerabilities and severe incidents affecting product security. The Commission summary states that these reporting obligations apply from 11 September 2026. Product teams should prepare intake, triage, evidence, and disclosure workflows before that date.

Coordination with NIS 2 and other EU rules

NIS 2 focuses on entities and their cybersecurity risk-management obligations. CRA focuses on products with digital elements. A software vendor can be affected by both: NIS 2 as an entity and CRA as a product manufacturer. Existing Aegister articles on NIS 2, EU Cybersecurity Act revision, Cyber Solidarity Act, and CRA readiness funding provide adjacent context.

Operational checklist

  1. Inventory products and digital components placed on the EU market.
  2. Classify each product category and economic-operator role.
  3. Map secure-by-design controls to the product lifecycle.
  4. Define vulnerability intake, triage, remediation, and disclosure workflow.
  5. Prepare technical documentation and evidence repository.
  6. Assess conformity route and CE-marking plan.
  7. Coordinate CRA reporting with NIS 2, DORA, or sector incident processes.

Secure development lifecycle under the CRA

Manufacturers should translate CRA obligations into the product lifecycle. The practical lifecycle includes product classification, threat modeling, secure design review, dependency control, vulnerability testing, release approval, security update process, and end-of-support communication. Each step should leave evidence.

Lifecycle stepEvidence to keep
Product classificationScope analysis, category decision, role assessment.
Secure designThreat model, architecture review, security requirements.
Build and dependency controlSBOM, dependency review, signing records.
TestingSecurity test results, vulnerability remediation notes.
ReleaseConformity evidence, user security instructions, CE documentation.
Post-marketVulnerability intake, patch records, notification evidence.

Importer and distributor checkpoints

Importers and distributors should not treat CRA as only a manufacturer problem. They need evidence that products are properly identified, accompanied by required documentation, and handled in a way that does not undermine conformity. Procurement teams should therefore request product-security documentation before market placement or distribution.

Vulnerability-handling workflow

  1. Receive vulnerability reports through a monitored channel.
  2. Triage exploitability, affected versions, and product-security impact.
  3. Assign remediation owner and target date.
  4. Prepare user communication and update guidance.
  5. Assess whether Article 14 reporting duties are triggered.
  6. Preserve decision logs and technical evidence.

Penalty and governance implications

The CRA fine ceiling for essential cybersecurity requirements and Articles 13 and 14 is high enough to make product security a board-level risk. Compliance should therefore be tracked in product governance, not left only to engineering teams.

Support-period planning

CRA vulnerability handling is not a one-time release task. Manufacturers must plan how long security updates, vulnerability intake, and user communications will be supported. Regulation text and official summaries should be checked for the product category, but the operational point is simple: the support period must be defined, communicated, and resourced.

Technical documentation pack

  • Product description and intended use.
  • Cybersecurity risk assessment and design decisions.
  • Essential requirement mapping.
  • SBOM or component inventory where applicable.
  • Testing records and vulnerability remediation notes.
  • Conformity assessment evidence.
  • User security instructions and support-period information.

Product team operating model

CRA readiness requires product, engineering, security, legal, and support teams to work together. Engineering owns secure implementation. Security owns threat modeling and validation. Legal and compliance own conformity interpretation. Support owns user communication and vulnerability intake. Product management owns lifecycle decisions and support-period commitments.

Legacy and substantial modification risk

Products already on the market before the main application date still need analysis when they are substantially modified. Product teams should define what counts as a security-relevant change, who approves it, and when technical documentation must be refreshed. This should be part of release governance.

Manufacturers building or refreshing the CRA program often benefit from external CISO support to bridge product engineering, cybersecurity, and legal. Aegister's Virtual CISO service covers product-security governance, vulnerability handling design, conformity-assessment readiness, and coordination with NIS 2 obligations where both regimes apply.

FAQ

When does the CRA apply?

The CRA entered into force on 10 December 2024. Article 14 reporting applies from 11 September 2026. The main obligations apply from 11 December 2027.

Does the CRA apply to software?

Yes, where software is a product with digital elements made available on the EU market, subject to the regulation’s scope and exclusions.

Is CE marking enough?

No. CE marking is the visible outcome of conformity. The underlying evidence, risk assessment, vulnerability handling, and documentation matter.

Official sources

Share this post