<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>CRA Compliance - Regulus</title>
	<atom:link href="https://goregulus.com/category/cra-compliance/feed/" rel="self" type="application/rss+xml" />
	<link>https://goregulus.com/category/cra-compliance/</link>
	<description>Regulus provides compliance tools for EU cybersecurity regulations, helping manufacturers, IoT vendors and digital product teams meet Cyber Resilience Act requirements.</description>
	<lastBuildDate>Sun, 21 Dec 2025 12:04:23 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://goregulus.com/wp-content/uploads/2026/01/cropped-favicon-32x32.png</url>
	<title>CRA Compliance - Regulus</title>
	<link>https://goregulus.com/category/cra-compliance/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Cyber Resilience Act Compliance Roadmap 2025–2027: Complete Guide</title>
		<link>https://goregulus.com/cra-compliance/cyber-resilience-act-compliance-roadmap/</link>
		
		<dc:creator><![CDATA[Igor Smith]]></dc:creator>
		<pubDate>Thu, 18 Dec 2025 11:26:38 +0000</pubDate>
				<category><![CDATA[CRA Compliance]]></category>
		<guid isPermaLink="false">https://goregulus.com/?p=1260</guid>

					<description><![CDATA[<p>This long-form guide provides a complete Cyber Resilience Act compliance roadmap for manufacturers, importers and distributors of products with digital elements. It explains CRA scope, obligations, deadlines 2025–2027, key technical requirements and documentation, and links to detailed articles, templates and checklists to help you move from awareness to execution.</p>
<p>La entrada <a href="https://goregulus.com/cra-compliance/cyber-resilience-act-compliance-roadmap/">Cyber Resilience Act Compliance Roadmap 2025–2027: Complete Guide</a> se publicó primero en <a href="https://goregulus.com">Regulus</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong>Cyber Resilience Act compliance</strong> is quickly becoming a strategic topic for any organisation building connected devices, embedded systems, firmware-based products or software with digital elements for the EU market. The CRA does not just add “a few security controls”. It introduces a complete regulatory framework for product cybersecurity, with deadlines between 2025 and 2027, strict documentation requirements and significant penalties for non-compliance.</p>



<p>This guide is designed as a practical <strong>Cyber Resilience Act compliance roadmap</strong> for manufacturers, importers and distributors. It connects the main CRA concepts – scope, roles, deadlines, risk assessment, secure development, documentation, SBOM, vulnerability handling, conformity assessment and enforcement – into a coherent plan. Throughout the article, we link to in-depth guides and templates hosted on Regulus so you can go deeper in each area.</p>



<p>If you are just starting, you can read this guide end-to-end. If you already understand the basics, jump directly to the sections that matter most for your organisation and use the links to detailed CRA articles, checklists and documentation resources.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">1. Why Cyber Resilience Act compliance matters now</h2>



<p>The CRA aims to create a uniform baseline of cybersecurity for <em>products with digital elements</em> placed on the EU market. It applies to a wide spectrum of hardware and software, including:</p>



<ul class="wp-block-list">
<li>Connected consumer and industrial devices (IoT, IIoT, OT gateways).</li>



<li>Embedded systems, firmware-driven products and controllers.</li>



<li>Software that processes data remotely and interacts with networked environments.</li>



<li>Combined hardware–software products where the software is essential to the function.</li>
</ul>



<p>For these products, <strong>Cyber Resilience Act compliance</strong> introduces mandatory obligations on risk assessment, secure by design/default, vulnerability handling, updates, logging and monitoring, lifecycle support and technical documentation. It also defines strong penalties (up to €15 million or 2.5% of global turnover) and powerful enforcement tools, including recalls, withdrawals and market bans.</p>



<p>Rather than treating CRA as a late-stage legal add-on, forward-looking organisations treat it as a driver for improving their entire product security lifecycle.</p>



<figure class="wp-block-image size-full"><img fetchpriority="high" decoding="async" width="610" height="390" src="https://goregulus.com/wp-content/uploads/2025/12/cra-compliance-lifecycle-overview.jpg" alt="Cyber Resilience Act compliance covers the full product lifecycle, from scope and risk assessment to documentation and post-market surveillance." class="wp-image-1263" srcset="https://goregulus.com/wp-content/uploads/2025/12/cra-compliance-lifecycle-overview.jpg 610w, https://goregulus.com/wp-content/uploads/2025/12/cra-compliance-lifecycle-overview-300x192.jpg 300w" sizes="(max-width: 610px) 100vw, 610px" /><figcaption class="wp-element-caption">Cyber Resilience Act compliance covers the full product lifecycle, from scope and risk assessment to documentation and post-market surveillance.</figcaption></figure>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">2. Step 1 – Clarify CRA scope and applicability</h2>



<p>Any Cyber Resilience Act compliance roadmap starts with a clear view of whether and how the CRA applies to your products. Without this, you risk over- or under-scoping your efforts.</p>



<h3 class="wp-block-heading">2.1 Determine if your products are in scope</h3>



<p>The CRA applies to <em>products with digital elements</em> placed on the EU market. This includes most hardware and software that:</p>



<ul class="wp-block-list">
<li>Contains software or embedded software.</li>



<li>Has direct or indirect network connectivity.</li>



<li>Processes, transmits or stores digital data.</li>
</ul>



<p>Some product categories are covered by sectoral legislation (for example, certain medical devices and automotive systems) and may be partially or fully excluded. Similarly, pure SaaS without installable components is typically out of scope. To work through these nuances in detail, use our in-depth guides:</p>



<ul class="wp-block-list">
<li><a href="https://goregulus.com/applicability-classification/cyber-resilience-act-applicability/" target="_blank" rel="noreferrer noopener">Cyber Resilience Act Applicability: Does the CRA Apply to Your Product?</a></li>



<li><a href="https://goregulus.com/cra-basics/cra-scope/" target="_blank" rel="noreferrer noopener">CRA Scope Explained: What Products Are In and Out</a></li>
</ul>



<h3 class="wp-block-heading">2.2 Map your product portfolio and roles</h3>



<p>Once you know which product types are likely to be in scope, you need to map actual products and roles:</p>



<ul class="wp-block-list">
<li>Create an inventory of all products with digital elements you place, or plan to place, on the EU market.</li>



<li>For each product, determine whether you are acting as manufacturer, importer, distributor or a combination.</li>



<li>Identify where you might unintentionally become a manufacturer (for example, if you rebrand or substantially modify a product).</li>
</ul>



<p>For a structured view of responsibilities, see our guide on <a href="https://goregulus.com/cra-compliance/cra-manufacturer-obligations/" target="_blank" rel="noreferrer noopener">CRA Manufacturer, Importer and Distributor Obligations</a>.</p>



<h3 class="wp-block-heading">2.3 Understand Default vs Critical Class</h3>



<p>Products are further divided into classes, often summarised as Default and Critical, depending on their impact and use. Your <strong>Cyber Resilience Act compliance</strong> plan must account for this classification, because it determines the conformity assessment route and overall risk level. For a deeper dive, see:</p>



<ul class="wp-block-list">
<li><a href="https://goregulus.com/cra-basics/cra-scope/" target="_blank" rel="noreferrer noopener">CRA Scope: What Products Are In / Out?</a></li>



<li><a href="https://goregulus.com/cra-compliance/cra-risk-assessment/" target="_blank" rel="noreferrer noopener">CRA Risk Assessment Guide</a></li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">3. Step 2 – Build your CRA risk assessment foundation</h2>



<p>Risk assessment is at the heart of <strong>Cyber Resilience Act compliance</strong>. The regulation expects manufacturers to understand threats and vulnerabilities affecting their products with digital elements, and to use that understanding as input for design and control selection.</p>



<h3 class="wp-block-heading">3.1 Product-level cybersecurity risk assessment</h3>



<p>Your CRA risk assessment should typically cover:</p>



<ul class="wp-block-list">
<li>Architecture, interfaces and data flows.</li>



<li>Assets (functions, data, services) that require protection.</li>



<li>Threat scenarios and likely attack paths.</li>



<li>Vulnerabilities in architecture and components (including third-party and open source).</li>



<li>Impact and likelihood ratings that drive prioritisation.</li>
</ul>



<p>We provide a detailed methodology, including example structures and templates, in our <a href="https://goregulus.com/cra-compliance/cra-risk-assessment/" target="_blank" rel="noreferrer noopener">CRA Risk Assessment Guide</a>.</p>



<h3 class="wp-block-heading">3.2 Connecting risk assessment to controls and design</h3>



<p>Risk assessment is not just a document. For credible Cyber Resilience Act compliance, regulators expect a clear link between risk assessment results and:</p>



<ul class="wp-block-list">
<li>Security requirements for the product.</li>



<li>Architecture and design choices (for example, segmentation, authentication, encryption).</li>



<li>Operational controls (logging, monitoring, update strategies).</li>
</ul>



<p>This traceability also becomes part of your technical documentation, which we cover in Section 5.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">4. Step 3 – Align your development lifecycle with CRA requirements</h2>



<p>Once you understand your risk landscape, the next step in the <strong>Cyber Resilience Act compliance roadmap</strong> is integrating cybersecurity into your development lifecycle.</p>



<h3 class="wp-block-heading">4.1 Secure by design and by default</h3>



<p>The CRA explicitly requires that products with digital elements are designed and developed according to secure by design and secure by default principles. In practice, this implies:</p>



<ul class="wp-block-list">
<li>Defining security and safety objectives early in the lifecycle.</li>



<li>Minimising attack surface and unnecessary functionality.</li>



<li>Applying least privilege, strong authentication and robust access control.</li>



<li>Providing secure default configurations and avoiding weak or hard-coded credentials.</li>
</ul>



<h3 class="wp-block-heading">4.2 Secure Development Lifecycle (SDL)</h3>



<p>A structured SDL is one of the most effective tools for CRA compliance. It ensures that security activities are embedded into stages such as requirements, design, implementation, verification and release.</p>



<p>We explore this in detail in <a href="https://goregulus.com/cra-requirements/cra-secure-development-lifecycle-sdl/" target="_blank" rel="noreferrer noopener">CRA Secure Development Lifecycle (SDL): Practical Guide for Manufacturers</a>, including specific activities you can adopt and how to scale them across multiple product lines.</p>



<h3 class="wp-block-heading">4.3 Logging, monitoring and post-market surveillance</h3>



<p>Cyber Resilience Act compliance is not limited to pre-market design. The regulation expects manufacturers to monitor products after deployment and detect security-relevant events. Logging and monitoring requirements include:</p>



<ul class="wp-block-list">
<li>Generating logs for security-significant events (authentication, changes, updates).</li>



<li>Protecting logs against tampering and unauthorised access.</li>



<li>Using logs to investigate incidents and support reporting obligations.</li>
</ul>



<p>See our in-depth article on <a href="https://goregulus.com/cra-requirements/cra-logging-monitoring-requirements/" target="_blank" rel="noreferrer noopener">CRA Logging and Monitoring Requirements</a> for a detailed breakdown.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">5. Step 4 – Build CRA-ready technical documentation</h2>



<p>Even if your controls are strong, <strong>Cyber Resilience Act compliance</strong> will be judged partly on your documentation. Your technical file must show how you meet the essential requirements and support conformity assessment.</p>



<h3 class="wp-block-heading">5.1 Technical documentation (Annex II and VII)</h3>



<p>A CRA technical file usually includes:</p>



<ul class="wp-block-list">
<li>Product description, intended use and target environment.</li>



<li>Architecture and data flow diagrams.</li>



<li>Security controls and rationale, linked to risk assessment outcomes.</li>



<li>SBOM and third-party component inventory.</li>



<li>Vulnerability handling and update procedures.</li>



<li>Logging and monitoring approach.</li>



<li>Testing and validation evidence.</li>
</ul>



<p>Use our article <a href="https://goregulus.com/cra-documentation/cyber-resilience-act-technical-documentation/" target="_blank" rel="noreferrer noopener">Cyber Resilience Act Technical Documentation: Complete Guide</a> and <a href="https://goregulus.com/cra-documentation/cra-technical-file-structure/" target="_blank" rel="noreferrer noopener">CRA Technical File Structure</a> as blueprints.</p>



<h3 class="wp-block-heading">5.2 SBOM and supply-chain visibility</h3>



<p>Many of the CRA obligations connect to supply-chain transparency. A reliable SBOM helps you:</p>



<ul class="wp-block-list">
<li>Understand which libraries, components and frameworks your product depends on.</li>



<li>React quickly to new vulnerabilities in third-party components.</li>



<li>Demonstrate due diligence to regulators and customers.</li>
</ul>



<p>We explain expectations and practical implementation strategies in <a href="https://goregulus.com/cra-documentation/cra-sbom-requirements/" target="_blank" rel="noreferrer noopener">CRA SBOM Requirements: Complete Guide</a>.</p>



<h3 class="wp-block-heading">5.3 Declaration of Conformity (DoC)</h3>



<p>Your EU Declaration of Conformity is the formal document where you state that your product meets CRA requirements (and any other applicable legislation). It must be based on your technical documentation and conformity assessment route.</p>



<p>See <a href="https://goregulus.com/cra-documentation/cra-declaration-of-conformity/" target="_blank" rel="noreferrer noopener">CRA Declaration of Conformity (DoC) Guide</a> for structure, mandatory content and example formulations.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">6. Step 5 – Implement vulnerability handling and update management</h2>



<p>Vulnerability handling is one of the most visible aspects of <strong>Cyber Resilience Act compliance</strong>. The CRA expects manufacturers to maintain continuous processes for identifying, evaluating, mitigating and communicating vulnerabilities throughout the support period.</p>



<h3 class="wp-block-heading">6.1 Vulnerability handling requirements</h3>



<p>Key elements include:</p>



<ul class="wp-block-list">
<li>A documented vulnerability handling policy and process.</li>



<li>Publicly available channels for vulnerability reporting (for example, security.txt, web forms, dedicated email).</li>



<li>Prioritisation based on severity, exploitability and impact.</li>



<li>Documentation of analysis, decisions and remediation steps.</li>
</ul>



<p>We cover these responsibilities in depth in <a href="https://goregulus.com/cra-requirements/cra-vulnerability-handling/">CRA Vulnerability Handling Requirements (Annex I – Section 2)</a>.</p>



<h3 class="wp-block-heading">6.2 Update and patch management</h3>



<p>Secure and timely updates are essential. Your CRA compliance roadmap should include:</p>



<ul class="wp-block-list">
<li>Mechanisms for authenticated and integrity-verified updates.</li>



<li>Processes for planning, testing and deploying security patches.</li>



<li>Clear communication to customers about update availability and impact.</li>
</ul>



<p>For technical and organisational patterns, see <a href="https://goregulus.com/cra-requirements/cra-update-requirements/" target="_blank" rel="noreferrer noopener">CRA Update &amp; Patch Management Requirements: Complete Guide</a>.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">7. Step 6 – Choose the right CRA conformity assessment route</h2>



<p>Depending on the classification of your products and the standards you use, <strong>Cyber Resilience Act compliance</strong> may require different conformity assessment approaches:</p>



<ul class="wp-block-list">
<li><strong>Internal control</strong> (self-assessment) for many Default Class products that implement harmonised standards.</li>



<li><strong>Third-party conformity assessment</strong> for certain important or critical products, or where harmonised standards are not fully applied.</li>
</ul>



<p>We explain how to choose and implement the right route in <a href="https://goregulus.com/cra-compliance/cra-conformity-assessment/" target="_blank" rel="noreferrer noopener">CRA Conformity Assessment: Internal Control vs Third-Party Assessment</a>.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">8. Step 7 – Align with CRA deadlines 2025–2027</h2>



<p>A realistic <strong>Cyber Resilience Act compliance roadmap</strong> must be aligned with the CRA timeline. The regulation includes a transition period leading up to full applicability in December 2027, with some obligations (such as reporting actively exploited vulnerabilities) taking effect earlier.</p>



<p>In practical terms:</p>



<ul class="wp-block-list">
<li>Use 2025–2026 to build or mature your risk assessment, SDL, documentation and vulnerability handling processes.</li>



<li>Ensure that new products entering the EU market during the transition are designed with CRA requirements in mind from the start.</li>



<li>By late 2027, your portfolio should have a clear conformity path for each in-scope product.</li>
</ul>



<p>For detailed dates and planning suggestions, see <a href="https://goregulus.com/cra-compliance/cra-deadlines-2025-2027/" target="_blank" rel="noreferrer noopener">CRA Deadlines 2025–2027: Key Dates and What Manufacturers Must Do</a>.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">9. Step 8 – Understand penalties and enforcement risk</h2>



<p>No roadmap is complete without understanding the risk of inaction. As explained in our dedicated article on <a href="https://goregulus.com/cra-compliance/cra-penalties-enforcement/" target="_blank" rel="noreferrer noopener">CRA Penalties and Enforcement</a>, the CRA introduces significant administrative fines and strong enforcement powers.</p>



<p>Key points:</p>



<ul class="wp-block-list">
<li>Top-tier fines can reach €15 million or 2.5% of global annual turnover for serious infringements.</li>



<li>Authorities can order recalls, withdrawals and bans on making products available.</li>



<li>Importers and distributors can also be targeted, especially if they place obviously non-compliant products on the market.</li>
</ul>



<p>The best mitigation for CRA enforcement risk is a transparent, documented compliance programme with clear responsibilities, traceability and continuous improvement.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">10. Using the Regulus CRA Readiness Checklist and resources</h2>



<p>To make the <strong>Cyber Resilience Act compliance</strong> roadmap more actionable, we have created a downloadable checklist and a set of supporting resources:</p>



<ul class="wp-block-list">
<li><a href="https://goregulus.com/resources/cra-checklist/" target="_blank" rel="noreferrer noopener">CRA Readiness Checklist</a> – assess scope, roles, risk assessment, SDL, documentation, SBOM, vulnerability handling and roadmap status.</li>



<li><a href="https://goregulus.com/resources/" target="_blank" rel="noreferrer noopener">CRA Resources Library</a> – curated checklists, guides and templates.</li>



<li>In-depth blog articles for specific topics across CRA basics, documentation, requirements and conformity assessment.</li>
</ul>



<p>Use the checklist to establish a baseline and revisit it periodically as your products and processes evolve.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<figure class="wp-block-image size-full"><img decoding="async" width="610" height="390" src="https://goregulus.com/wp-content/uploads/2025/12/cra-compliance-building-blocks.jpg" alt="Stacked blocks representing key building blocks of Cyber Resilience Act compliance such as risk assessment, SDL, SBOM and vulnerability handling" class="wp-image-1262" srcset="https://goregulus.com/wp-content/uploads/2025/12/cra-compliance-building-blocks.jpg 610w, https://goregulus.com/wp-content/uploads/2025/12/cra-compliance-building-blocks-300x192.jpg 300w" sizes="(max-width: 610px) 100vw, 610px" /><figcaption class="wp-element-caption">Risk assessment, secure development, SBOM and vulnerability handling are core building blocks of Cyber Resilience Act compliance.</figcaption></figure>



<h2 class="wp-block-heading">11. Cyber Resilience Act compliance – FAQs</h2>



<h3 class="wp-block-heading">11.1 Who needs Cyber Resilience Act compliance?</h3>



<p>Any organisation that manufactures, imports or distributes products with digital elements in the EU may need <strong>Cyber Resilience Act compliance</strong>. This includes manufacturers of connected devices, embedded systems, firmware-based products and combined hardware–software solutions.</p>



<h3 class="wp-block-heading">11.2 Does CRA apply to pure SaaS?</h3>



<p>Pure SaaS services without installable software or firmware are generally out of scope. However, SaaS offerings that control or update in-scope hardware, distribute firmware or include installable agents may bring the overall solution into CRA scope. It is essential to analyse the architecture rather than relying on labels like “SaaS”.</p>



<h3 class="wp-block-heading">11.3 How long does CRA compliance take?</h3>



<p>The answer depends on your current maturity. Organisations with existing secure development practices, vulnerability handling and structured documentation will move faster. Others may need the full transition period to build these capabilities. In any case, starting early is one of the most effective ways to reduce enforcement risk.</p>



<h3 class="wp-block-heading">11.4 Can we rely only on external consultants?</h3>



<p>Consultants can help interpret the regulation and design frameworks, but Cyber Resilience Act compliance ultimately depends on what your organisation actually does – the security of your products, your documentation and your post-market processes. Responsibility cannot be outsourced.</p>



<h3 class="wp-block-heading">11.5 How does CRA relate to other regulations like GDPR and NIS2?</h3>



<p>GDPR focuses on personal data protection; NIS2 focuses on network and information system security for essential and important entities. The CRA complements them by focusing on the cybersecurity of products with digital elements. Many organisations will need to manage all three frameworks in parallel.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">12. How Regulus supports your Cyber Resilience Act compliance roadmap</h2>



<p>Regulus is building self-service tools to help EU digital product companies operationalise <strong>Cyber Resilience Act compliance</strong> in a structured, repeatable way. Instead of managing CRA work in static spreadsheets and scattered documents, we aim to provide:</p>



<ul class="wp-block-list">
<li><strong>Scope and role mapping workflows</strong> to clarify which products are in scope and what CRA obligations apply.</li>



<li><strong>Requirements mapping views</strong> that connect regulation text to concrete security controls, documentation tasks and processes.</li>



<li><strong>Documentation templates</strong> for technical files, SBOM, risk assessments, vulnerability handling and Declarations of Conformity.</li>



<li><strong>Readiness dashboards</strong> aligned with CRA deadlines 2025–2027 so you can track gaps and progress in real time.</li>
</ul>



<p>To move forward:</p>



<ol class="wp-block-list">
<li>Download the <a href="https://goregulus.com/resources/cra-checklist/" target="_blank" rel="noreferrer noopener">CRA Readiness Checklist</a> and perform an initial assessment.</li>



<li>Deep dive into specific topics through the <a href="https://goregulus.com/blog/" target="_blank" rel="noreferrer noopener">Regulus CRA Blog</a> and <a href="https://goregulus.com/resources/" target="_blank" rel="noreferrer noopener">Resources</a>.</li>



<li>Join the <a href="https://goregulus.com/early-access/">Regulus Early Access</a> list to receive updates on tools that support your CRA roadmap.</li>
</ol>
<p>La entrada <a href="https://goregulus.com/cra-compliance/cyber-resilience-act-compliance-roadmap/">Cyber Resilience Act Compliance Roadmap 2025–2027: Complete Guide</a> se publicó primero en <a href="https://goregulus.com">Regulus</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CRA Penalties and Enforcement: Complete Guide</title>
		<link>https://goregulus.com/cra-compliance/cra-penalties-enforcement/</link>
		
		<dc:creator><![CDATA[Igor Smith]]></dc:creator>
		<pubDate>Thu, 18 Dec 2025 11:11:34 +0000</pubDate>
				<category><![CDATA[CRA Compliance]]></category>
		<guid isPermaLink="false">https://goregulus.com/?p=1254</guid>

					<description><![CDATA[<p>CRA penalties can reach up to €15 million or 2.5% of global annual turnover, and authorities can also order recalls, withdrawals and market bans. This guide explains how CRA penalties work, the different fine tiers, how enforcement is applied in practice and what manufacturers, importers and distributors can do to reduce enforcement risk.</p>
<p>La entrada <a href="https://goregulus.com/cra-compliance/cra-penalties-enforcement/">CRA Penalties and Enforcement: Complete Guide</a> se publicó primero en <a href="https://goregulus.com">Regulus</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong>CRA penalties</strong> are one of the main reasons manufacturers, importers and distributors are paying attention to the Cyber Resilience Act. The regulation does not only introduce new cybersecurity requirements. It also defines strict financial sanctions and powerful enforcement tools that can remove non-compliant products from the EU market.</p>



<p>In this guide we explain how CRA penalties are structured, which violations trigger the highest fines, what additional enforcement powers authorities have and how organisations can reduce the risk of sanctions through a structured compliance programme. The article is written for product, engineering, legal and security teams preparing their roadmap for CRA enforcement between 2025 and 2027.</p>



<p>If you are new to the CRA, start with our overview on <a href="https://goregulus.com/cra-basics/cyber-resilience-act/" target="_blank" rel="noreferrer noopener">Cyber Resilience Act requirements, scope and how to prepare</a>, then use this guide to understand the consequences of non-compliance.</p>



<figure class="wp-block-image size-full"><img decoding="async" width="610" height="390" src="https://goregulus.com/wp-content/uploads/2025/12/cra-penalties-tier-structure.jpg" alt="Diagram showing CRA penalties tier structure from lower to highest fines" class="wp-image-1257" srcset="https://goregulus.com/wp-content/uploads/2025/12/cra-penalties-tier-structure.jpg 610w, https://goregulus.com/wp-content/uploads/2025/12/cra-penalties-tier-structure-300x192.jpg 300w" sizes="(max-width: 610px) 100vw, 610px" /><figcaption class="wp-element-caption">CRA penalties combine financial fines with strong enforcement powers such as product withdrawal, recalls and market bans for non-compliant digital products.</figcaption></figure>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">1. What are CRA penalties and why do they matter?</h2>



<p>Under the Cyber Resilience Act, non-compliance can lead to administrative fines that are comparable to GDPR in magnitude. The highest <strong>CRA penalties</strong> can reach up to <strong>€15 million or 2.5% of the company’s total worldwide annual turnover</strong>, whichever is higher, for the most serious infringements such as failing to meet essential cybersecurity requirements or reporting duties.</p>



<p>In addition to the financial CRA penalties, market surveillance authorities can order product recalls, withdrawals and bans on making a product available on the market. For many manufacturers, losing access to the EU market can be more damaging than the fines themselves.</p>



<p>For this reason, CRA penalties are not only a legal topic. They shape product strategy, risk appetite, engineering priorities and post-market support commitments.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">2. CRA penalty tiers and maximum fines</h2>



<p>The Cyber Resilience Act uses a tiered structure for fines. Different categories of infringements trigger different maximum <strong>CRA penalties</strong>. The amounts are aligned with GDPR style sanctions and can scale with the size of the undertaking.</p>



<h3 class="wp-block-heading">2.1 Highest tier – essential cybersecurity requirements and reporting</h3>



<p>The most serious infringements involve core cybersecurity obligations, such as:</p>



<ul class="wp-block-list">
<li>Failure to comply with essential cybersecurity requirements in Annex I.</li>



<li>Placing products on the market without required conformity assessment.</li>



<li>Using CE marking without fulfilling CRA conditions.</li>



<li>Failure to comply with vulnerability and incident reporting obligations.</li>
</ul>



<p>These violations can trigger CRA penalties of up to:</p>



<ul class="wp-block-list">
<li><strong>€15 million</strong>, or</li>



<li><strong>2.5% of the total worldwide annual turnover</strong> of the previous financial year,</li>
</ul>



<p>whichever amount is higher.</p>



<h3 class="wp-block-heading">2.2 Mid-tier – other obligations under the CRA</h3>



<p>Less severe, but still significant, infringements include failure to comply with other CRA obligations, for example:</p>



<ul class="wp-block-list">
<li>Inadequate technical documentation.</li>



<li>Failure to perform proper risk assessment.</li>



<li>Missing or incomplete vulnerability handling procedures.</li>



<li>Inconsistent application of secure development and lifecycle requirements.</li>
</ul>



<p>These issues can lead to CRA penalties of up to:</p>



<ul class="wp-block-list">
<li><strong>€10 million</strong>, or</li>



<li><strong>2% of total worldwide annual turnover</strong>,</li>
</ul>



<p>whichever is higher.</p>



<h3 class="wp-block-heading">2.3 Lower tier – incorrect or misleading information</h3>



<p>The lowest tier of CRA penalties still represents a serious risk. It targets behaviour such as:</p>



<ul class="wp-block-list">
<li>Providing incorrect, incomplete or misleading information to authorities.</li>



<li>Obstructing market surveillance activities.</li>



<li>Refusing to provide documentation when requested.</li>
</ul>



<p>These infringements can result in fines of up to:</p>



<ul class="wp-block-list">
<li><strong>€5 million</strong>, or</li>



<li><strong>1% of total worldwide annual turnover</strong>,</li>
</ul>



<p>whichever is higher.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">3. Enforcement powers beyond CRA penalties</h2>



<p>Financial sanctions are only part of the enforcement toolbox. The CRA gives national market surveillance authorities a wide range of powers that can be used in combination with or instead of monetary fines.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="610" height="390" src="https://goregulus.com/wp-content/uploads/2025/12/cra-enforcement-impact-market-access.jpg" alt="Graphic showing how CRA penalties, recalls and market bans affect product access to the EU market" class="wp-image-1256" srcset="https://goregulus.com/wp-content/uploads/2025/12/cra-enforcement-impact-market-access.jpg 610w, https://goregulus.com/wp-content/uploads/2025/12/cra-enforcement-impact-market-access-300x192.jpg 300w" sizes="auto, (max-width: 610px) 100vw, 610px" /><figcaption class="wp-element-caption">Beyond fines, CRA enforcement can lead to product withdrawal, recalls and loss of EU market access.</figcaption></figure>



<h3 class="wp-block-heading">3.1 Product withdrawal and recall</h3>



<p>Authorities can require economic operators to:</p>



<ul class="wp-block-list">
<li><strong>Withdraw</strong> non-compliant products from the market, preventing them from being made available to new customers.</li>



<li><strong>Recall</strong> products that have already been supplied to users, forcing the manufacturer or importer to recover and remediate or destroy affected units.</li>
</ul>



<p>For companies with large installed bases, the operational and reputational impact of a recall can far exceed direct CRA penalties.</p>



<h3 class="wp-block-heading">3.2 Prohibition on making products available</h3>



<p>In severe cases, authorities can issue decisions that temporarily or permanently:</p>



<ul class="wp-block-list">
<li>Prohibit a product from being placed on the EU market.</li>



<li>Restrict its availability until non-conformities are resolved.</li>
</ul>



<p>This effectively removes the product from the EU market and can have a decisive impact on revenues and customer relationships.</p>



<h3 class="wp-block-heading">3.3 Corrective actions and public communication</h3>



<p>Authorities can also require economic operators to:</p>



<ul class="wp-block-list">
<li>Implement specific corrective actions, such as security updates, configuration changes or architectural mitigations.</li>



<li>Inform customers and users about the risks, the non-compliance and the corrective steps being taken.</li>
</ul>



<p>These measures are part of the broader enforcement landscape and are often combined with CRA penalties in high-profile cases.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">4. Typical non-compliance scenarios that trigger CRA penalties</h2>



<p>While every case is different, several recurring patterns are likely to attract attention from authorities and lead to CRA penalties or other enforcement measures.</p>



<h3 class="wp-block-heading">4.1 Shipping products with known vulnerabilities and no update path</h3>



<p>Examples include:</p>



<ul class="wp-block-list">
<li>IoT devices that ship with hard-coded or unchangeable default passwords.</li>



<li>Embedded devices without secure update mechanisms or no update mechanisms at all.</li>



<li>Software components with publicly known vulnerabilities that remain unpatched.</li>
</ul>



<p>These situations point directly at failures to meet essential cybersecurity requirements and vulnerability handling obligations, which can fall in the highest tier of CRA penalties.</p>



<h3 class="wp-block-heading">4.2 Incomplete or missing technical documentation</h3>



<p>Another common scenario is when manufacturers cannot provide technical documentation that demonstrates compliance with Annex I, Annex II and Annex VII. Typical gaps include:</p>



<ul class="wp-block-list">
<li>No structured risk assessment.</li>



<li>No Software Bill of Materials (SBOM).</li>



<li>No documented vulnerability handling or incident response procedures.</li>



<li>Missing information about update mechanisms or lifecycle support.</li>
</ul>



<p>These issues are closely linked to mid-tier CRA penalties and can also trigger corrective actions. For a detailed breakdown of documentation expectations, see our guide to <a href="https://goregulus.com/cra-documentation/cyber-resilience-act-technical-documentation/" target="_blank" rel="noreferrer noopener">CRA technical documentation</a>.</p>



<h3 class="wp-block-heading">4.3 Misleading information to authorities or notified bodies</h3>



<p>Providing incorrect, incomplete or misleading information during conformity assessment or market surveillance is directly addressed in the CRA penalty structure. Even if the technical compliance issues are limited, lack of transparency can escalate enforcement and lead to separate fines.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">5. Who faces CRA penalties: manufacturers, importers and distributors</h2>



<p>CRA penalties can apply to any economic operator that violates the regulation, but manufacturers carry the heaviest exposure because they are responsible for design, development, documentation and lifecycle security.</p>



<ul class="wp-block-list">
<li><strong>Manufacturers</strong> face the full range of CRA penalties if they fail to meet essential requirements, do not implement vulnerability handling processes or place non-compliant products on the market.</li>



<li><strong>Importers</strong> can be sanctioned if they place products on the EU market that they know or should know are not CRA compliant.</li>



<li><strong>Distributors</strong> can be targeted if they make clearly non-compliant products available or ignore obligations to cooperate with authorities.</li>
</ul>



<p>Importantly, importers and distributors can become manufacturers in the eyes of the CRA if they rebrand products or substantially modify them in ways that affect cybersecurity. In that case they inherit the full set of manufacturer obligations and the associated CRA penalties. For a detailed breakdown of responsibilities, see our guide on <a href="https://goregulus.com/cra-compliance/cra-manufacturer-obligations/">CRA manufacturer, importer and distributor obligations</a>.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">6. How CRA penalties interact with deadlines and transition periods</h2>



<p>The CRA is expected to apply fully from December 2027, with some obligations, such as vulnerability and incident reporting, becoming effective earlier. This transition period is designed to give organisations time to adapt their processes and architecture to the new requirements.</p>



<p>In practice, this means:</p>



<ul class="wp-block-list">
<li>Authorities will expect visible progress towards compliance during the transition period.</li>



<li>Companies that ignore preparation entirely are more likely to face early enforcement actions once the CRA is applicable.</li>



<li>Those that can demonstrate active risk assessment, documentation and vulnerability handling will be better positioned if issues arise.</li>
</ul>



<p>For more details on key dates and milestones, see our article on <a href="https://goregulus.com/cra-compliance/cra-deadlines-2025-2027/" target="_blank" rel="noreferrer noopener">CRA deadlines 2025–2027</a>.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">7. How to reduce CRA penalty and enforcement risk</h2>



<p>The most effective way to reduce exposure to CRA penalties is to treat the regulation as a product and process improvement framework rather than a last-minute compliance exercise. Several measures are particularly important.</p>



<h3 class="wp-block-heading">7.1 Build a CRA risk assessment and classification baseline</h3>



<p>Start with a structured CRA risk assessment for each product with digital elements. This is essential for:</p>



<ul class="wp-block-list">
<li>Identifying relevant threats and vulnerabilities.</li>



<li>Determining whether the product is Default or Critical Class.</li>



<li>Choosing the right conformity assessment route.</li>
</ul>



<p>You can follow the methodology described in our <a href="https://goregulus.com/cra-compliance/cra-risk-assessment/" target="_blank" rel="noreferrer noopener">CRA risk assessment guide</a>.</p>



<h3 class="wp-block-heading">7.2 Implement vulnerability handling and update processes early</h3>



<p>Because reporting obligations and lifecycle security are central to the CRA, gaps in vulnerability management are likely to attract enforcement attention. To reduce CRA penalty risk, manufacturers should:</p>



<ul class="wp-block-list">
<li>Define a vulnerability handling policy and workflow.</li>



<li>Set up a clear intake channel for vulnerability reports.</li>



<li>Integrate secure update and patch management processes.</li>
</ul>



<p>Our articles on <a href="https://goregulus.com/cra-requirements/cra-vulnerability-handling/" target="_blank" rel="noreferrer noopener">CRA vulnerability handling requirements</a> and <a href="https://goregulus.com/cra-requirements/cra-update-requirements/" target="_blank" rel="noreferrer noopener">CRA update and patch management</a> provide detailed guidance.</p>



<h3 class="wp-block-heading">7.3 Create audit-ready technical documentation</h3>



<p>Because mid-tier CRA penalties are closely linked to documentation gaps, building a robust technical file significantly reduces enforcement risk. Focus on:</p>



<ul class="wp-block-list">
<li>Risk assessment documentation and traceability to controls.</li>



<li>SBOM and third-party component tracking.</li>



<li>Logging, monitoring and post-market surveillance procedures.</li>



<li>Declaration of Conformity that correctly references applicable legislation.</li>
</ul>



<p>Our checklist-style article on <a href="https://goregulus.com/cra-documentation/cra-technical-file-structure/" target="_blank" rel="noreferrer noopener">CRA technical file structure</a> can be used as a blueprint.</p>



<h3 class="wp-block-heading">7.4 Align governance and roles with CRA expectations</h3>



<p>Finally, CRA penalties often arise in environments where responsibilities are unclear. Manufacturers, importers and distributors should assign:</p>



<ul class="wp-block-list">
<li>A clear CRA compliance owner.</li>



<li>Defined responsibilities for vulnerability handling and incident reporting.</li>



<li>Processes for escalating potential non-compliance and cooperating with authorities.</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">8. CRA penalties – frequently asked questions</h2>



<h3 class="wp-block-heading">8.1 What are the maximum CRA penalties for non-compliance?</h3>



<p>The highest <strong>CRA penalties</strong> can reach up to €15 million or 2.5% of the company’s worldwide annual turnover for the preceding financial year, whichever amount is higher. This tier applies to serious breaches of essential cybersecurity requirements and key reporting obligations.</p>



<h3 class="wp-block-heading">8.2 Are CRA penalties similar to GDPR fines?</h3>



<p>Yes. CRA penalties follow a similar logic to GDPR: percentage of global turnover, use of the higher amount and a tiered structure based on seriousness of the infringement. However, the CRA focuses on cybersecurity and product security rather than data protection.</p>



<h3 class="wp-block-heading">8.3 Can small or medium enterprises also face CRA penalties?</h3>



<p>Yes. CRA penalties can apply to organisations of any size. While authorities may consider proportionality, the regulation does not exempt SMEs from essential cybersecurity requirements. Using proportionality as a planning assumption is risky.</p>



<h3 class="wp-block-heading">8.4 Are fines the only consequence of CRA non-compliance?</h3>



<p>No. Authorities can combine CRA penalties with product recalls, withdrawals, bans on market access and requirements to implement specific corrective actions. Reputational damage and operational disruption are often more costly than the fines themselves.</p>



<h3 class="wp-block-heading">8.5 How can manufacturers show they are reducing CRA penalty risk?</h3>



<p>Manufacturers can reduce their CRA penalty exposure by documenting a clear compliance programme. Evidence of structured risk assessment, secure development practices, vulnerability handling and technical documentation will be important if an incident or investigation occurs.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">9. How Regulus helps you avoid CRA penalties</h2>



<p>Regulus is focused on helping EU digital product companies turn CRA requirements into practical workflows that reduce enforcement risk. Instead of relying only on manual spreadsheets, you can use structured tools to:</p>



<ul class="wp-block-list">
<li><strong>Assess CRA applicability and scope</strong> – determine which products are in scope and what obligations apply.</li>



<li><strong>Map requirements to controls</strong> – connect Annex I and documentation expectations to specific implementation tasks.</li>



<li><strong>Structure technical documentation</strong> – build a CRA-ready technical file with clear traceability.</li>



<li><strong>Track CRA readiness over time</strong> – monitor gaps that could lead to CRA penalties if left unresolved.</li>
</ul>



<p>To start reducing CRA enforcement risk:</p>



<ol class="wp-block-list">
<li>Download the <a href="https://goregulus.com/resources/cra-checklist/" target="_blank" rel="noreferrer noopener">CRA Readiness Checklist</a> to assess gaps across scope, documentation and lifecycle security.</li>



<li>Explore our <a href="https://goregulus.com/blog/" target="_blank" rel="noreferrer noopener">CRA articles and technical guides</a> to deepen your understanding.</li>



<li>Join the <a href="https://goregulus.com/early-access/" target="_blank" rel="noreferrer noopener">Regulus Early Access</a> list to receive updates on tools that help you operationalise CRA compliance.</li>
</ol>
<p>La entrada <a href="https://goregulus.com/cra-compliance/cra-penalties-enforcement/">CRA Penalties and Enforcement: Complete Guide</a> se publicó primero en <a href="https://goregulus.com">Regulus</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CRA Manufacturer, Importer and Distributor Obligations: Complete Guide</title>
		<link>https://goregulus.com/cra-compliance/cra-manufacturer-obligations/</link>
		
		<dc:creator><![CDATA[Igor Smith]]></dc:creator>
		<pubDate>Thu, 18 Dec 2025 10:56:10 +0000</pubDate>
				<category><![CDATA[CRA Compliance]]></category>
		<guid isPermaLink="false">https://goregulus.com/?p=1249</guid>

					<description><![CDATA[<p>The Cyber Resilience Act introduces specific obligations for manufacturers, importers and distributors of products with digital elements in the EU. This guide explains CRA manufacturer obligations in depth, shows how importer and distributor duties compare and clarifies when an importer or reseller becomes a manufacturer in the eyes of the regulation.</p>
<p>La entrada <a href="https://goregulus.com/cra-compliance/cra-manufacturer-obligations/">CRA Manufacturer, Importer and Distributor Obligations: Complete Guide</a> se publicó primero en <a href="https://goregulus.com">Regulus</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The Cyber Resilience Act introduces detailed <strong>CRA manufacturer obligations</strong> and extends specific duties to importers and distributors of products with digital elements. For any organisation placing connected products, embedded systems, firmware-based devices or software with remote data processing on the EU market, understanding who is responsible for what is critical.</p>



<p>This guide explains how the CRA allocates responsibilities across manufacturers, importers and distributors, when an importer or reseller is treated as a manufacturer and what practical steps each role should take to be ready for enforcement. It is written for product, engineering, security and compliance teams who need a concrete mapping rather than high-level summaries.</p>



<p>If you are still validating whether your products fall under the CRA, start with our article on <a href="https://goregulus.com/applicability-classification/cyber-resilience-act-applicability/" target="_blank" rel="noreferrer noopener">Cyber Resilience Act applicability</a> and our overview of <a href="https://goregulus.com/cra-basics/cra-scope/">CRA requirements, scope and how to prepare</a>.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="610" height="390" src="https://goregulus.com/wp-content/uploads/2025/12/cra-responsibility-shift-importer-distributor-to-manufacturer.jpg" alt="Table style diagram showing CRA manufacturer obligations with importer and distributor roles in a RACI matrix" class="wp-image-1252" srcset="https://goregulus.com/wp-content/uploads/2025/12/cra-responsibility-shift-importer-distributor-to-manufacturer.jpg 610w, https://goregulus.com/wp-content/uploads/2025/12/cra-responsibility-shift-importer-distributor-to-manufacturer-300x192.jpg 300w" sizes="auto, (max-width: 610px) 100vw, 610px" /><figcaption class="wp-element-caption">The CRA assigns the most extensive obligations to manufacturers, while importers and distributors must verify compliance and support market surveillance.</figcaption></figure>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">1. Economic operators under the Cyber Resilience Act</h2>



<p>The CRA uses a familiar New Legislative Framework structure. It defines several <strong>economic operators</strong> involved in making products with digital elements available on the EU market:</p>



<ul class="wp-block-list">
<li><strong>Manufacturer</strong> – designs, develops or manufactures the product and markets it under their name or trademark.</li>



<li><strong>Importer</strong> – places on the EU market a product with digital elements that bears the name or trademark of a person established outside the Union.</li>



<li><strong>Distributor</strong> – makes a product available on the EU market in the supply chain without affecting its properties.</li>



<li><strong>Authorised representative</strong> – acts on behalf of the manufacturer for specific tasks.</li>
</ul>



<p>From a practical point of view, CRA manufacturer obligations are the heaviest. Manufacturers must ensure security by design and by default, run cybersecurity risk assessments, implement vulnerability handling processes, perform conformity assessment, draw up technical documentation and keep products secure during the defined support period.</p>



<p>Importers and distributors have lighter, but still important duties. They must verify that only compliant products with a valid CE marking and technical documentation reach customers, and they must cooperate with authorities, especially when non-conformities or incidents are discovered.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">2. CRA manufacturer obligations in detail</h2>



<p>Manufacturers are at the center of CRA compliance because they control the design, development and support of the product with digital elements. At a high level, <strong>CRA manufacturer obligations</strong> cover five main areas: risk assessment, secure design and development, vulnerability handling, documentation and conformity assessment.</p>



<h3 class="wp-block-heading">2.1 Cybersecurity risk assessment and secure design</h3>



<p>Manufacturers must perform a structured cybersecurity risk assessment for each product with digital elements. This assessment should consider intended purpose, reasonably foreseeable use, interfaces, data flows and dependencies. The outcome must influence architecture, design decisions and security controls.</p>



<ul class="wp-block-list">
<li>Document risks and link them to security requirements and controls.</li>



<li>Ensure the product is designed according to secure by design and secure by default principles.</li>



<li>Consider the entire lifecycle, including updates, decommissioning and end of support.</li>
</ul>



<p>For a deeper discussion of risk assessment expectations, see our guide to <a href="https://goregulus.com/cra-compliance/cra-risk-assessment/">CRA risk assessment</a>.</p>



<h3 class="wp-block-heading">2.2 Secure development lifecycle and testing</h3>



<p>Manufacturers are expected to integrate cybersecurity into their development lifecycle. In practice, this means:</p>



<ul class="wp-block-list">
<li>Defining security requirements early in the lifecycle, not only at the end.</li>



<li>Embedding security activities in design, implementation, integration and system testing.</li>



<li>Performing security testing that matches the risk level of the product.</li>



<li>Ensuring that vulnerabilities found before release are triaged and addressed according to their severity.</li>
</ul>



<p>You can find a more detailed breakdown in our article on the <a href="https://goregulus.com/cra-requirements/cra-secure-development-lifecycle-sdl/" target="_blank" rel="noreferrer noopener">CRA Secure Development Lifecycle (SDL)</a>.</p>



<h3 class="wp-block-heading">2.3 Vulnerability handling and incident reporting</h3>



<p>One of the most visible CRA manufacturer obligations is the requirement to set up and maintain a vulnerability handling process that stays in place throughout the support period. Key elements include:</p>



<ul class="wp-block-list">
<li>A documented vulnerability handling policy and workflow.</li>



<li>Clear intake channels for vulnerability reports from researchers, customers and partners.</li>



<li>Prioritisation, remediation and communication processes based on severity and exploitability.</li>



<li>Timely reporting of actively exploited vulnerabilities and severe incidents to the single reporting platform and the designated CSIRT.</li>
</ul>



<p>We cover these topics in depth in our guide on <a href="https://goregulus.com/cra-requirements/cra-vulnerability-handling/">CRA vulnerability handling requirements</a> and in our article on <a href="https://goregulus.com/cra-requirements/cra-update-requirements/">CRA update and patch management</a>.</p>



<h3 class="wp-block-heading">2.4 Technical documentation and Declaration of Conformity</h3>



<p>Manufacturers must create and maintain a technical file that demonstrates how the product meets essential cybersecurity requirements. This documentation is central to CRA manufacturer obligations and must be available to market surveillance authorities on request.</p>



<ul class="wp-block-list">
<li>Technical documentation in line with Annex II and Annex VII.</li>



<li>Risk assessment, security architecture, SBOM, logging and monitoring descriptions.</li>



<li>Test results, vulnerability handling procedures and update processes.</li>



<li>An EU Declaration of Conformity referencing the CRA and other relevant legislation.</li>
</ul>



<p>For structured templates and examples, see our article on <a href="https://goregulus.com/cra-documentation/cyber-resilience-act-technical-documentation/" target="_blank" rel="noreferrer noopener">CRA technical documentation</a> and the guide to the <a href="https://goregulus.com/cra-compliance/cra-conformity-assessment/">CRA Declaration of Conformity</a>.</p>



<h3 class="wp-block-heading">2.5 Support period and lifecycle obligations</h3>



<p>Manufacturers must define and communicate a support period for each product with digital elements and are expected to keep the product secure during that period. This includes:</p>



<ul class="wp-block-list">
<li>Providing security updates that address known vulnerabilities.</li>



<li>Communicating lifecycle information, including end-of-support dates.</li>



<li>Reassessing risk when new threats or vulnerabilities emerge.</li>
</ul>



<p>All of these elements contribute directly to CRA manufacturer obligations and will be scrutinised if a product is involved in a serious incident or enforcement action.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">3. CRA importer obligations – verifying compliance before entry</h2>



<p>Importers act as the gateway for products with digital elements entering the EU market. They are not expected to redesign the product, but they share responsibility for ensuring that only compliant products are placed on the market. CRA importer obligations include several due diligence and documentation checks.</p>



<h3 class="wp-block-heading">3.1 Verifying manufacturer compliance</h3>



<p>Before placing a product on the EU market, importers must verify that:</p>



<ul class="wp-block-list">
<li>The product has been subject to the appropriate conformity assessment procedures.</li>



<li>The manufacturer has drawn up the EU Declaration of Conformity.</li>



<li>CE marking is affixed correctly and corresponds to the product and its cybersecurity claims.</li>



<li>The required technical documentation exists and can be made available to authorities upon request.</li>
</ul>



<p>In practice, CRA importer obligations mean checking that the manufacturer actually behaves like a CRA-compliant manufacturer, not just relying on marketing claims.</p>



<h3 class="wp-block-heading">3.2 Labelling, instructions and traceability</h3>



<p>Importers must also ensure that:</p>



<ul class="wp-block-list">
<li>The product bears the manufacturer’s name, registered trade name or trademark and contact details.</li>



<li>Where required, the importer’s name and contact details are indicated on the product, its packaging or accompanying documentation.</li>



<li>Required safety and cybersecurity information, including instructions for use and support period, are provided in the correct language.</li>
</ul>



<h3 class="wp-block-heading">3.3 Acting on suspected non-compliance or risks</h3>



<p>If an importer has reason to believe that a product is not CRA compliant or presents a significant cybersecurity risk, they must:</p>



<ul class="wp-block-list">
<li>Refrain from placing the product on the market until it is compliant.</li>



<li>Inform the manufacturer and, where necessary, notify relevant market surveillance authorities.</li>



<li>Cooperate in any corrective actions, recalls or withdrawals requested by authorities.</li>
</ul>



<p>Importers who ignore these CRA importer obligations risk being treated as part of the non-compliance, even if they did not design the product.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">4. CRA distributor obligations – responsibility in the last mile</h2>



<p>Distributors are the last link in the chain before a product reaches end users. Their obligations are lighter than those of manufacturers and importers, but they still play an important role in CRA enforcement and market surveillance.</p>



<h3 class="wp-block-heading">4.1 Basic checks before making products available</h3>



<p>Before making a product available on the market, distributors must verify that:</p>



<ul class="wp-block-list">
<li>CE marking is present on the product.</li>



<li>The product is accompanied by the required documentation and instructions.</li>



<li>Any safety or cybersecurity warnings or restrictions indicated by the manufacturer are respected.</li>



<li>The product appears to be in conformity and does not show obvious signs of non-compliance.</li>
</ul>



<p>These checks are part of core CRA distributor obligations and are designed to avoid obviously non-compliant products remaining in circulation.</p>



<h3 class="wp-block-heading">4.2 Storage, transport and information</h3>



<p>Distributors must also ensure that the way they store and transport products does not compromise their compliance with CRA requirements. For example, they should not remove labels, alter packaging or ignore manufacturer communications about vulnerabilities or recalls.</p>



<h3 class="wp-block-heading">4.3 Responding to non-conformities</h3>



<p>If a distributor has reason to believe that a product is not in conformity or presents a risk:</p>



<ul class="wp-block-list">
<li>They must not make the product available on the market.</li>



<li>They should inform the manufacturer or importer.</li>



<li>Where necessary, they should cooperate with market surveillance authorities in implementing corrective actions, including recall or withdrawal.</li>
</ul>



<p>While CRA distributor obligations are narrower, distributors that repeatedly ignore obvious non-compliance can become enforcement targets, especially where they act as major channels for risky products.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">5. When importers and distributors become manufacturers</h2>



<p>A critical point in the CRA is that roles are determined by actual behaviour, not just job titles. In some cases, importers and distributors are treated as manufacturers and therefore inherit all <strong>CRA manufacturer obligations</strong>.</p>



<h3 class="wp-block-heading">5.1 Placing products under your own name or brand</h3>



<p>An importer or distributor becomes a manufacturer in the eyes of the CRA if they:</p>



<ul class="wp-block-list">
<li>Place a product with digital elements on the market under their own name or trademark.</li>



<li>Rebrand products in a way that makes them appear to be the original manufacturer.</li>
</ul>



<p>In such cases, authorities will look to the rebranding entity as the manufacturer, with full responsibility for design, documentation and vulnerability handling.</p>



<h3 class="wp-block-heading">5.2 Substantial modifications affecting cybersecurity</h3>



<p>An importer or distributor also becomes the manufacturer if they perform a <strong>substantial modification</strong> that affects the product’s compliance with essential cybersecurity requirements or its intended purpose. Examples include:</p>



<ul class="wp-block-list">
<li>Replacing firmware or software with a custom build that changes security properties.</li>



<li>Adding remote management features or cloud components essential to product operation.</li>



<li>Integrating third-party components that materially change the risk profile.</li>
</ul>



<p>Once they cross this line, they must meet the same CRA manufacturer obligations as the original manufacturer, including technical documentation, conformity assessment and vulnerability handling processes for the modified product.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="610" height="390" src="https://goregulus.com/wp-content/uploads/2025/12/cra-obligations-raci-matrix.jpg" alt="Flow diagram showing when CRA importer and distributor obligations escalate to full manufacturer responsibilities" class="wp-image-1251" srcset="https://goregulus.com/wp-content/uploads/2025/12/cra-obligations-raci-matrix.jpg 610w, https://goregulus.com/wp-content/uploads/2025/12/cra-obligations-raci-matrix-300x192.jpg 300w" sizes="auto, (max-width: 610px) 100vw, 610px" /><figcaption class="wp-element-caption">Importers and distributors that rebrand or substantially modify a product can become manufacturers under the CRA and inherit full obligations.</figcaption></figure>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">6. Shared obligations and practical RACI view</h2>



<p>While each role has its own focus, many CRA duties are shared across manufacturers, importers and distributors. Thinking in terms of a RACI matrix (Responsible, Accountable, Consulted, Informed) can help clarify ownership.</p>



<h3 class="wp-block-heading">6.1 Examples of shared obligations</h3>



<ul class="wp-block-list">
<li><strong>Ensuring only compliant products reach the EU market</strong> Manufacturers – Responsible and Accountable Importers – Responsible for verification Distributors – Responsible for basic checks</li>



<li><strong>Vulnerability handling and communication</strong> Manufacturers – Own the process and reporting Importers – Must inform manufacturers and, where necessary, authorities Distributors – Must forward information and support corrective actions</li>



<li><strong>Documentation and traceability</strong> Manufacturers – Maintain technical documentation and Declaration of Conformity Importers – Keep documentation available for authorities Distributors – Ensure documentation and instructions accompany the product</li>
</ul>



<p>Mapping CRA manufacturer obligations and their importer and distributor counterparts in this way is a useful step when preparing for audits and supervisory questions.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">7. How this fits with CRA deadlines and enforcement</h2>



<p>The timing of your implementation matters. The CRA defines a transition period that culminates in full applicability in December 2027. Reporting obligations for actively exploited vulnerabilities and severe incidents start earlier, which means manufacturers must have at least a basic vulnerability handling process in place before that date.</p>



<p>For a detailed overview, see our article on <a href="https://goregulus.com/cra-compliance/cra-deadlines-2025-2027/" target="_blank" rel="noreferrer noopener">CRA deadlines 2025–2027</a> and our guide on <a href="https://goregulus.com/cra-compliance/cra-penalties-enforcement/" target="_blank" rel="noreferrer noopener">CRA penalties and enforcement</a>.</p>



<p>In practice:</p>



<ul class="wp-block-list">
<li>Manufacturers that ignore risk assessment, technical documentation and vulnerability handling are at highest risk of enforcement.</li>



<li>Importers and distributors that continue to sell clearly non-compliant products despite warnings are also likely to attract attention.</li>



<li>Operators who can show structured work toward CRA compliance are in a stronger position if an incident or investigation occurs.</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">8. CRA manufacturer, importer and distributor obligations – FAQs</h2>



<h3 class="wp-block-heading">8.1 Who has the main responsibility for CRA compliance?</h3>



<p>Manufacturers have the primary responsibility. They must design and build products to meet essential cybersecurity requirements, maintain vulnerability handling processes, manage documentation and ensure the product remains secure during its support period. CRA manufacturer obligations are the most extensive in the regulation.</p>



<h3 class="wp-block-heading">8.2 What are the most important CRA importer obligations?</h3>



<p>Importers must ensure that only compliant products enter the EU market. They need to verify that the correct conformity assessment has been performed, that the Declaration of Conformity exists, that CE marking is present and that documentation is available. They must also refrain from placing obviously non-compliant or risky products on the market.</p>



<h3 class="wp-block-heading">8.3 What do CRA distributor obligations cover in practice?</h3>



<p>Distributors focus on the last mile. They must check that CE marking and required documentation are present, that instructions and safety information accompany the product and that they do not place products on the market that are clearly non-compliant. They also need to cooperate with authorities and manufacturers in recalls and corrective actions.</p>



<h3 class="wp-block-heading">8.4 When do importers and distributors become manufacturers?</h3>



<p>An importer or distributor is treated as a manufacturer when they place products on the market under their own name or trademark, or when they substantially modify the product in a way that affects cybersecurity or its intended purpose. In that case, they inherit the full set of CRA manufacturer obligations.</p>



<h3 class="wp-block-heading">8.5 Do micro and small enterprises have different obligations?</h3>



<p>The CRA recognises the situation of micro and small enterprises in some recitals and supporting measures, but the core obligations around secure design, vulnerability handling and documentation still apply where their products present cybersecurity risks. Enforcement may take proportionality into account, but it does not exempt these organisations from their responsibilities.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">9. How Regulus helps economic operators operationalise CRA</h2>



<p>Regulus is focused on helping EU digital product companies turn CRA manufacturer obligations, importer diligence and distributor checks into repeatable workflows instead of ad-hoc spreadsheets.</p>



<ul class="wp-block-list">
<li><strong>Scope and role mapping</strong> – clarify which products fall under the CRA, what role you play for each product and where you might accidentally become a manufacturer.</li>



<li><strong>Requirements mapping</strong> – connect CRA obligations to concrete controls, processes and documentation tasks for each role.</li>



<li><strong>Documentation templates</strong> – structure your technical file, CRA risk assessment, SBOM, vulnerability handling procedures and Declaration of Conformity.</li>



<li><strong>Readiness tracking</strong> – follow your progress against CRA deadlines and identify where manufacturer, importer or distributor obligations are still unmet.</li>
</ul>



<p>To move forward:</p>



<ol class="wp-block-list">
<li>Download our <a href="https://goregulus.com/resources/cra-checklist/" target="_blank" rel="noreferrer noopener">CRA Readiness Checklist</a> and use it to assess current gaps.</li>



<li>Review CRA basics, scope and documentation in the <a href="https://goregulus.com/resources/" target="_blank" rel="noreferrer noopener">Regulus Resources</a> section.</li>



<li>Join the <a href="https://goregulus.com/early-access/">Regulus Early Access</a> list to receive updates on tools that support CRA manufacturer obligations and related workflows.</li>
</ol>
<p>La entrada <a href="https://goregulus.com/cra-compliance/cra-manufacturer-obligations/">CRA Manufacturer, Importer and Distributor Obligations: Complete Guide</a> se publicó primero en <a href="https://goregulus.com">Regulus</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CRA Deadlines 2025–2027: Key Dates and What Manufacturers Must Do</title>
		<link>https://goregulus.com/cra-compliance/cra-deadlines-2025-2027/</link>
		
		<dc:creator><![CDATA[Igor Smith]]></dc:creator>
		<pubDate>Tue, 16 Dec 2025 08:30:15 +0000</pubDate>
				<category><![CDATA[CRA Compliance]]></category>
		<guid isPermaLink="false">https://goregulus.com/?p=1213</guid>

					<description><![CDATA[<p>Understand CRA deadlines 2025–2027. This guide explains the official Cyber Resilience Act timeline, what changes in 2025, 2026 and 2027, and how manufacturers, importers and distributors should plan their compliance roadmap.</p>
<p>La entrada <a href="https://goregulus.com/cra-compliance/cra-deadlines-2025-2027/">CRA Deadlines 2025–2027: Key Dates and What Manufacturers Must Do</a> se publicó primero en <a href="https://goregulus.com">Regulus</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><strong>CRA deadlines 2025 2027</strong> are not just abstract regulatory dates. They define when manufacturers, importers and distributors of products with digital elements must have their Cyber Resilience Act compliance in place. Many teams still assume that “everything happens in 2027”, but the first hard obligations arrive much earlier, especially around vulnerability reporting.</p>



<p>In this guide we break down the official Cyber Resilience Act timeline, explain what happens in 2025, 2026 and 2027, and show how to build a realistic CRA roadmap for your products. We will focus on what the CRA deadlines mean for manufacturers of connected devices, embedded systems, firmware-driven products and other products with digital elements.</p>



<p>For a broader overview of the regulation, see our article on <a href="https://goregulus.com/cra-basics/cra-scope/">Cyber Resilience Act requirements, scope and how to prepare</a>, and for product-level analysis, read our <a href="https://goregulus.com/applicability-classification/cyber-resilience-act-applicability/" target="_blank" rel="noreferrer noopener">CRA applicability guide</a>.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="610" height="390" src="https://goregulus.com/wp-content/uploads/2025/12/cra-deadlines-2026-reporting.jpg" alt="Timeline of CRA deadlines 2025 2027 showing vulnerability reporting in 2026 and full application in 2027" class="wp-image-1216" srcset="https://goregulus.com/wp-content/uploads/2025/12/cra-deadlines-2026-reporting.jpg 610w, https://goregulus.com/wp-content/uploads/2025/12/cra-deadlines-2026-reporting-300x192.jpg 300w" sizes="auto, (max-width: 610px) 100vw, 610px" /><figcaption class="wp-element-caption">CRA deadlines 2025–2027: first vulnerability reporting obligations start in 2026, with full Cyber Resilience Act application in December 2027.</figcaption></figure>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">1. CRA deadlines 2025 2027 at a glance</h2>



<p>Before diving into practical planning, it is useful to have a clear picture of the main CRA deadlines 2025 2027. At a high level, the timeline looks like this:</p>



<ul class="wp-block-list">
<li><strong>December 2024</strong>: the Cyber Resilience Act enters into force at EU level.</li>



<li><strong>2025</strong>: transition and preparation year – no hard application yet, but the clock is running and guidance begins to emerge.</li>



<li><strong>11 June 2026</strong>: provisions on designation and notification of conformity assessment bodies start to apply (Chapter IV).</li>



<li><strong>11 September 2026</strong>: vulnerability and incident reporting obligations (for actively exploited vulnerabilities and significant incidents) become mandatory.</li>



<li><strong>11 December 2027</strong>: main CRA obligations become fully applicable; products with digital elements placed on the EU market must meet CRA cybersecurity, documentation and conformity assessment requirements.</li>
</ul>



<p>From the perspective of a manufacturer, this means that serious reporting obligations start in <strong>2026</strong>, while full product compliance (including CE marking under CRA) must be in place by <strong>December 2027</strong> for new products placed on the market.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">2. CRA timeline explained: from entry into force to full application</h2>



<p>The CRA follows a familiar regulation pattern: entry into force, transition period, then full application. Understanding this structure is essential to interpret CRA deadlines 2025 2027 correctly.</p>



<h3 class="wp-block-heading">2.1 Entry into force and transition period</h3>



<p>The Cyber Resilience Act is already law at EU level. After entry into force, there is a multi-year transition period before most obligations apply to manufacturers and other economic operators. This is the window during which organisations are expected to:</p>



<ul class="wp-block-list">
<li>Map their product portfolio and determine CRA applicability.</li>



<li>Perform initial CRA risk assessments for in-scope products.</li>



<li>Design secure update, logging and vulnerability handling processes.</li>



<li>Prepare technical documentation and conformity strategies.</li>
</ul>



<p>Practically, the transition period is where you set up the foundations rather than wait for the final CRA deadline to react in a rush.</p>



<h3 class="wp-block-heading">2.2 Early application of specific CRA obligations</h3>



<p>Not all CRA provisions start at the same time. Some obligations are deliberately brought forward before full application, especially those that enable the whole framework:</p>



<ul class="wp-block-list">
<li>Notification and designation of conformity assessment bodies, so that they are ready before manufacturers need them.</li>



<li>Vulnerability and incident reporting for products with digital elements, so that authorities have early visibility of serious issues.</li>
</ul>



<p>This is why, in practice, <strong>2026</strong> is not a quiet year. It is when reporting expectations start to bite, even though full CE-level compliance under CRA only becomes mandatory in late 2027.</p>



<h3 class="wp-block-heading">2.3 Full application of main obligations</h3>



<p>From late 2027 onwards, the CRA is fully applicable. This means that products with digital elements placed on the EU market must:</p>



<ul class="wp-block-list">
<li>Meet the CRA essential cybersecurity requirements.</li>



<li>Follow the appropriate conformity assessment route (internal control or third-party involvement, depending on classification and risk).</li>



<li>Be supported by technical documentation and a Declaration of Conformity that covers CRA and other relevant legislation.</li>
</ul>



<p>At this point, CRA becomes part of the standard regulatory backdrop alongside CE marking and sector-specific regulations.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">3. What CRA deadlines mean in 2025</h2>



<p>While there is no formal “2025 CRA deadline” in the regulation text, the year is strategically important. It is the first full year after entry into force and the earliest realistic starting point for serious CRA readiness work.</p>



<h3 class="wp-block-heading">3.1 2025: inventory, applicability and gap analysis</h3>



<p>In 2025, organisations should focus on building clarity rather than rushing into scattered implementation. Typical priorities include:</p>



<ul class="wp-block-list">
<li>Building a complete inventory of products with digital elements across the portfolio.</li>



<li>Running high-level CRA applicability checks for each product (in scope vs out of scope, default vs higher-impact categories).</li>



<li>Performing initial CRA risk assessments for representative products.</li>



<li>Identifying major gaps in secure development, vulnerability handling, update mechanisms and documentation.</li>
</ul>



<p>Our <a href="https://goregulus.com/resources/cra-checklist/" target="_blank" rel="noreferrer noopener">CRA Readiness Checklist</a> is designed to support exactly this phase: mapping where you are today versus where you need to be by 2026–2027.</p>



<h3 class="wp-block-heading">3.2 2025 for importers and distributors</h3>



<p>Importers and distributors should also use 2025 to:</p>



<ul class="wp-block-list">
<li>Identify which supplier products fall under CRA scope.</li>



<li>Clarify contractual responsibilities for vulnerability handling, updates and documentation.</li>



<li>Plan how they will verify CRA conformity and documentation from 2027 onwards.</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">4. CRA deadlines in 2026: reporting obligations and infrastructure</h2>



<p>The real “first hard date” in the CRA deadlines 2025 2027 is <strong>11 September 2026</strong></p>



<h3 class="wp-block-heading"><strong>4.1 September 2026 – vulnerability and incident reporting</strong></h3>



<p>From 11 September 2026, manufacturers (and in some cases other economic operators) must:</p>



<ul class="wp-block-list">
<li>Report actively exploited vulnerabilities in their products with digital elements to the relevant EU-level bodies / national CSIRTs within defined timelines.</li>



<li>Report significant cybersecurity incidents affecting the security of CRA-covered products.</li>



<li>Maintain processes and evidence to show how they identify, analyse and remediate vulnerabilities.</li>
</ul>



<p>Several legal and technical analyses point out that these obligations apply regardless of when the product was first placed on the market, which means legacy products still in support are within scope of the reporting framework.</p>



<h3 class="wp-block-heading">4.2 What you should have in place by 2026</h3>



<p>By the time reporting obligations go live, organisations should already have:</p>



<ul class="wp-block-list">
<li>A documented vulnerability handling process aligned with CRA expectations.</li>



<li>Clear reporting lines, internal SLAs and responsibilities for vulnerability triage and incident response.</li>



<li>Logging and monitoring capabilities sufficient to detect potential incidents involving their products.</li>



<li>Initial versions of CRA technical documentation for key products, even if they will be refined before 2027.</li>
</ul>



<p>If these foundations are not in place by 2026, it will be very difficult to satisfy reporting obligations in practice.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="610" height="390" src="https://goregulus.com/wp-content/uploads/2025/12/cra-deadlines-2025-2027-timeline.jpg" alt="Diagram of CRA deadlines 2025 2027 highlighting the 2026 reporting obligations for vulnerabilities and incidents" class="wp-image-1215" srcset="https://goregulus.com/wp-content/uploads/2025/12/cra-deadlines-2025-2027-timeline.jpg 610w, https://goregulus.com/wp-content/uploads/2025/12/cra-deadlines-2025-2027-timeline-300x192.jpg 300w" sizes="auto, (max-width: 610px) 100vw, 610px" /><figcaption class="wp-element-caption">The CRA deadlines 2025–2027 include an early milestone in 2026, when vulnerability and incident reporting obligations become mandatory.</figcaption></figure>



<h3 class="wp-block-heading">4.3 Conformity assessment ecosystem in 2026</h3>



<p>In parallel, from mid-2026 onwards, Member States start designating and notifying conformity assessment bodies under CRA. This is a prerequisite for products that will require third-party assessment, and it is one reason why manufacturers cannot leave all conformity decisions to the last minute in 2027.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">5. CRA deadlines in 2027: full application and market impact</h2>



<p>The final and most visible milestone in the CRA deadlines 2025 2027 is the date when main obligations become fully applicable, currently planned for <strong>11 December 2027</strong>.</p>



<h3 class="wp-block-heading">5.1 What full application means for products</h3>



<p>From full application onwards, when you place a product with digital elements on the EU market, you are expected to:</p>



<ul class="wp-block-list">
<li>Have implemented security-by-design and security-by-default controls aligned with CRA essential requirements.</li>



<li>Have performed the appropriate conformity assessment route for that product (self-assessment vs notified body, depending on classification and risk).</li>



<li>Maintain a CRA-compliant technical file, including risk assessment, architecture, security controls, testing evidence, logging and vulnerability handling descriptions.</li>



<li>Issue and keep available a Declaration of Conformity that lists CRA and other applicable acts, and apply CE marking accordingly.</li>
</ul>



<p>Products that do not meet CRA requirements may be restricted, withdrawn or prevented from being placed on the market, and supervisory authorities can apply administrative fines.</p>



<h3 class="wp-block-heading">5.2 Existing vs new products at the 2027 deadline</h3>



<p>A frequent question is what happens to products already on the market before full application. In simplified terms:</p>



<ul class="wp-block-list">
<li><strong>New products placed on the market after the CRA full application date</strong> are expected to fully comply with CRA requirements.</li>



<li><strong>Existing products already in the field</strong> may still be affected by vulnerability reporting and support commitments, especially if you continue to ship updates or sell new units after the deadline.</li>
</ul>



<p>This nuance makes it even more important to understand your product lifecycle, support policies and CRA roadmap well before 2027.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">6. Building a CRA roadmap around deadlines 2025 2027</h2>



<p>The most useful way to think about CRA deadlines is not as isolated dates, but as anchors for a structured roadmap. Below is a practical view of what to do in each period.</p>



<h3 class="wp-block-heading">6.1 2025 – foundation and visibility</h3>



<ul class="wp-block-list">
<li>Create and validate your inventory of products with digital elements.</li>



<li>Run CRA applicability and classification for each product (or at least for your main families).</li>



<li>Perform initial CRA risk assessments and identify high-risk products and components.</li>



<li>Define your high-level CRA strategy: which products will be prioritised, which processes must change, who owns what.</li>
</ul>



<h3 class="wp-block-heading">6.2 2026 – processes and reporting readiness</h3>



<ul class="wp-block-list">
<li>Formalise your vulnerability handling process and reporting playbooks.</li>



<li>Implement logging and monitoring capabilities that support CRA detection expectations.</li>



<li>Align secure development lifecycle (SDL) practices with CRA requirements for new releases.</li>



<li>Produce the first versions of CRA technical documentation for priority products.</li>
</ul>



<p>If you need guidance on SDL, see our article on <a href="https://goregulus.com/cra-requirements/cra-secure-development-lifecycle-sdl/" target="_blank" rel="noreferrer noopener">CRA secure development lifecycle</a>.</p>



<h3 class="wp-block-heading">6.3 2027 – product-level conformity and documentation</h3>



<ul class="wp-block-list">
<li>Complete technical files and risk documentation for in-scope products.</li>



<li>Decide and apply the appropriate CRA conformity assessment routes per product.</li>



<li>Finalise Declaration of Conformity templates that include CRA alongside other legislation.</li>



<li>Prepare internal training and documentation so that sales, support and partners understand CRA implications.</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">7. CRA deadlines 2025 2027: FAQs for manufacturers</h2>



<h3 class="wp-block-heading">7.1 Do CRA deadlines apply to non-EU manufacturers?</h3>



<p>Yes. CRA obligations apply based on where the product is placed on the market, not where the manufacturer is located. Non-EU manufacturers selling products with digital elements into the EU must meet the same deadlines and requirements as EU manufacturers.</p>



<h3 class="wp-block-heading">7.2 What if we cannot meet CRA requirements by 2027?</h3>



<p>If products with digital elements do not meet CRA requirements when placed on the EU market after full application, they may be restricted or withdrawn by market surveillance authorities. This makes early planning for CRA deadlines 2025 2027 essential.</p>



<h3 class="wp-block-heading">7.3 Are pure SaaS products affected by CRA deadlines?</h3>



<p>Pure SaaS services without distributed software, firmware or hardware are generally out of CRA scope, although they may be regulated by other frameworks (e.g. NIS2 or data protection law). However, SaaS that distributes agents, firmware, apps or controls devices with digital elements can fall under CRA, and therefore indirectly under these deadlines.</p>



<h3 class="wp-block-heading">7.4 How do CRA deadlines interact with other regulations?</h3>



<p>The CRA complements, but does not replace, other EU acts such as NIS2, sector-specific safety regulations or data-protection rules. For many organisations, CRA deadlines 2025 2027 will overlap with NIS2 implementation and evolving sectoral guidance.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">8. How Regulus can help you plan for CRA deadlines 2025 2027</h2>



<p>Regulus is focused on helping EU digital product companies structure their response to CRA deadlines 2025 2027 in a practical way. Instead of working with static spreadsheets and scattered notes, our goal is to provide:</p>



<ul class="wp-block-list">
<li><strong>CRA scope and classification workflows</strong> that clarify which products are in scope before 2026.</li>



<li><strong>Requirements mapping</strong> that links CRA articles and essential requirements to concrete controls and documentation.</li>



<li><strong>Documentation templates</strong> for technical files, risk assessments, SBOM, vulnerability handling and CRA declarations.</li>



<li><strong>Readiness views and roadmaps</strong> aligned with the key CRA deadlines in 2026 and 2027.</li>
</ul>



<p>To move forward:</p>



<ol class="wp-block-list">
<li>Download our <a href="https://goregulus.com/resources/cra-checklist/" target="_blank" rel="noreferrer noopener">CRA Readiness Checklist</a> to assess your current position against CRA deadlines 2025 2027.</li>



<li>Review the CRA basics and documentation guides in the <a href="https://goregulus.com/resources/" target="_blank" rel="noreferrer noopener">Regulus Resources</a> section.</li>



<li>Join the <a href="https://goregulus.com/early-access/">Regulus Early Access</a> list to receive updates on CRA tooling for scope analysis, documentation and roadmap tracking.</li>
</ol>
<p>La entrada <a href="https://goregulus.com/cra-compliance/cra-deadlines-2025-2027/">CRA Deadlines 2025–2027: Key Dates and What Manufacturers Must Do</a> se publicó primero en <a href="https://goregulus.com">Regulus</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CRA Risk Assessment: Requirements, Methodology &#038; Templates</title>
		<link>https://goregulus.com/cra-compliance/cra-risk-assessment/</link>
		
		<dc:creator><![CDATA[Igor Smith]]></dc:creator>
		<pubDate>Sat, 29 Nov 2025 14:58:24 +0000</pubDate>
				<category><![CDATA[CRA Compliance]]></category>
		<guid isPermaLink="false">https://goregulus.com/?p=1009</guid>

					<description><![CDATA[<p>A complete, in-depth guide to CRA cybersecurity risk assessments. Learn how to meet Annex I, II and VII requirements, structure a compliant analysis, build threat models, document vulnerabilities, evaluate risks, map mitigations and prepare audit-ready technical documentation for Cyber Resilience Act conformity.</p>
<p>La entrada <a href="https://goregulus.com/cra-compliance/cra-risk-assessment/">CRA Risk Assessment: Requirements, Methodology &amp; Templates</a> se publicó primero en <a href="https://goregulus.com">Regulus</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A CRA risk assessment is one of the most critical components of Cyber Resilience Act compliance. Before any manufacturer, importer or digital product vendor can classify their product, define security measures or prepare technical documentation, they must conduct a structured CRA risk assessment to identify cybersecurity threats, evaluate potential impact and determine the appropriate conformity requirements.</p>



<p>In this guide, we break down the <strong>full CRA risk assessment process</strong>, including methodology, documentation requirements, threat modelling practices and examples aligned with EU regulatory expectations. Whether you build embedded systems, IoT devices, firmware, software components or connected hardware, this article explains how to perform a CRA-aligned risk assessment that stands up to regulatory scrutiny.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">What Is a CRA Risk Assessment?</h2>



<p>A CRA risk assessment is a structured evaluation required under the EU Cyber Resilience Act. It ensures that manufacturers identify cybersecurity threats, analyse vulnerabilities and document the security measures needed to comply with Annex I, Annex II and Annex VII of the regulation. The CRA risk assessment directly influences product classification, conformity requirements and technical documentation.</p>



<p>According to <a href="https://www.enisa.europa.eu/topics/threat-risk-management" target="_blank" rel="noreferrer noopener">ENISA guidance on risk management</a>, effective cybersecurity assessments must follow a clear methodology that includes threat identification, likelihood estimation and impact evaluation. The CRA expects the same level of structure and traceability.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="610" height="390" src="https://goregulus.com/wp-content/uploads/2025/11/cra-risk-assessment-process.jpg" alt="CRA risk assessment process diagram" class="wp-image-1016" srcset="https://goregulus.com/wp-content/uploads/2025/11/cra-risk-assessment-process.jpg 610w, https://goregulus.com/wp-content/uploads/2025/11/cra-risk-assessment-process-300x192.jpg 300w" sizes="auto, (max-width: 610px) 100vw, 610px" /><figcaption class="wp-element-caption">Overview of the CRA risk assessment workflow.</figcaption></figure>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">Why the CRA Requires a Formal Risk Assessment</h2>



<p>The Cyber Resilience Act makes risk assessment mandatory because it forms the foundation of secure-by-design and secure-by-default principles. Without a CRA risk assessment, an organisation cannot demonstrate that the product’s security controls are justified, proportionate and aligned with the threats relevant to its functionality.</p>



<ul class="wp-block-list">
<li>It ensures security measures are based on objective risk levels, not assumptions.</li>



<li>It determines whether a product is Default Class or Critical Class.</li>



<li>It directly influences the conformity assessment route.</li>



<li>It ensures that vulnerabilities and attack surfaces are properly documented.</li>



<li>It supports lifecycle security and post-market obligations.</li>
</ul>



<p><a href="https://digital-strategy.ec.europa.eu/en/policies/cyber-resilience-act" target="_blank" rel="noreferrer noopener">Official European Commission CRA overview</a></p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">Risk Assessment Requirements Under the Cyber Resilience Act</h2>



<p>The CRA does not prescribe a specific methodology, but it requires manufacturers to follow a structured and documented approach. At minimum, every CRA risk assessment must include:</p>



<ul class="wp-block-list">
<li>Identification of intended use and reasonably foreseeable misuse.</li>



<li>Identification of assets, attack surfaces and entry points.</li>



<li>Threat modelling (e.g., STRIDE, LINDDUN, attack trees).</li>



<li>Vulnerability analysis based on the product’s architecture.</li>



<li>Risk evaluation using likelihood and impact criteria.</li>



<li>Definition of risk-treatment actions and security measures.</li>



<li>Traceability between risks and implemented mitigations.</li>
</ul>



<p>This aligns with best practices from <a href="https://www.iso.org/standard/56742.html" target="_blank" rel="noreferrer noopener">ISO/IEC 62443</a> and <a href="https://www.iso.org/standard/75281.html" target="_blank" rel="noreferrer noopener">ISO/IEC 27005</a>, both of which are referenced in EU cybersecurity guidance.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">CRA Risk Assessment Framework: Step-by-Step</h2>



<h3 class="wp-block-heading">1. Define the Product and Its Operational Context</h3>



<p>The Cyber Resilience Act risk assessment begins with a technical description of the product, including architecture, interfaces, data flows and connectivity. This establishes the baseline for identifying vulnerabilities and attack surfaces.</p>



<h3 class="wp-block-heading">2. Identify Assets and Attack Surfaces</h3>



<p>Common CRA-relevant assets include firmware, communication channels, authentication mechanisms, cryptographic operations and user data. Each asset must be mapped to potential attack paths.</p>



<h3 class="wp-block-heading">3. Conduct Threat Modelling</h3>



<p>Threat modelling methods such as STRIDE or attack trees help structure the analysis. The CRA does not require a specific model but expects a justified, repeatable approach.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="620" height="413" src="https://goregulus.com/wp-content/uploads/2025/11/cra-threat-modelling-example.png" alt="Image of vulnerabilities based on architecture" class="wp-image-1015" srcset="https://goregulus.com/wp-content/uploads/2025/11/cra-threat-modelling-example.png 620w, https://goregulus.com/wp-content/uploads/2025/11/cra-threat-modelling-example-300x200.png 300w" sizes="auto, (max-width: 620px) 100vw, 620px" /></figure>



<h3 class="wp-block-heading">4. Analyse Vulnerabilities</h3>



<p>The CRA expects manufacturers to identify both known and potential vulnerabilities based on architecture, dependency chains and third-party components. This ties directly to SBOM requirements and open-source management.</p>



<h3 class="wp-block-heading">5. Evaluate Likelihood and Impact</h3>



<p>Risks must be evaluated using clear criteria. Impact should consider safety, data integrity, security degradation, service continuity and downstream consequences.</p>



<h3 class="wp-block-heading">6. Define Mitigation Measures</h3>



<p>Security measures must be proportional to the risks identified and aligned with Annex I requirements, including secure configuration, update mechanisms, vulnerability handling and cryptographic protections.</p>



<h3 class="wp-block-heading">7. Document Traceability</h3>



<p>Regulators expect a traceability matrix linking:</p>



<ul class="wp-block-list">
<li>Risk → Vulnerability → Mitigation → CRA requirement → Evidence</li>
</ul>



<p>This is essential for audits and for the CRA technical documentation file.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">Risk Assessment Examples for IoT, Embedded and Software Products</h2>



<h3 class="wp-block-heading">Example 1: IoT Sensor</h3>



<ul class="wp-block-list">
<li>Threat: network interception</li>



<li>Vulnerability: unencrypted communication</li>



<li>Impact: confidentiality breach</li>



<li>Mitigation: TLS 1.3 with certificate-based authentication</li>
</ul>



<h3 class="wp-block-heading">Example 2: Embedded Controller</h3>



<ul class="wp-block-list">
<li>Threat: local access exploitation</li>



<li>Vulnerability: insecure debug interface</li>



<li>Impact: unauthorised firmware modification</li>



<li>Mitigation: secure boot, interface locking and debug authentication</li>
</ul>



<h3 class="wp-block-heading">Example 3: Software Application</h3>



<ul class="wp-block-list">
<li>Threat: supply-chain compromise</li>



<li>Vulnerability: outdated open-source package</li>



<li>Impact: remote code execution</li>



<li>Mitigation: SBOM tracking and automated dependency monitoring</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">How CRA Risk Assessment Influences Product Classification</h2>



<p>The CRA risk assessment is the primary input for determining whether a product belongs to Default Class or Critical Class. Critical Class products must follow a more rigorous conformity assessment and involve a notified body.</p>



<p>Risk factors that increase the likelihood of Critical Class classification include:</p>



<ul class="wp-block-list">
<li>Connectivity to critical infrastructure</li>



<li>Potential impact on safety or essential services</li>



<li>High-value data processing</li>



<li>Integration into industrial environments</li>
</ul>



<p>Full guide: <a href="https://goregulus.com/applicability-classification/cyber-resilience-act-applicability/">CRA applicability &amp; product classification</a></p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">Documenting Your Cyber Resilience Act Risk Assessment</h2>



<p>Under Annex II and Annex VII, manufacturers must include the Cyber Resilience Act risk assessment in their technical documentation. At minimum, documentation must cover:</p>



<ul class="wp-block-list">
<li>Risk assessment methodology</li>



<li>Threat and asset identification</li>



<li>Risk tables and evaluation</li>



<li>Security controls and mitigations</li>



<li>Traceability mapping</li>
</ul>



<p>This documentation must remain available for 10 years after the product is placed on the market.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">Conclusion</h2>



<p>A CRA risk assessment is a mandatory, foundational activity for Cyber Resilience Act compliance. It shapes product classification, guides security design, informs technical documentation and ensures that products meet EU cybersecurity expectations. Organisations that begin the CRA risk assessment process early will reduce compliance risk, accelerate audits and improve the security quality of their digital products.</p>
<p>La entrada <a href="https://goregulus.com/cra-compliance/cra-risk-assessment/">CRA Risk Assessment: Requirements, Methodology &amp; Templates</a> se publicó primero en <a href="https://goregulus.com">Regulus</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CRA Conformity Assessment: Internal Control vs Third-Party Assessment (Complete Guide)</title>
		<link>https://goregulus.com/cra-compliance/cra-conformity-assessment/</link>
		
		<dc:creator><![CDATA[Igor Smith]]></dc:creator>
		<pubDate>Wed, 26 Nov 2025 09:15:53 +0000</pubDate>
				<category><![CDATA[CRA Compliance]]></category>
		<guid isPermaLink="false">https://goregulus.com/?p=543</guid>

					<description><![CDATA[<p>Understand how CRA conformity assessment works under the Cyber Resilience Act, including the differences between Internal Control and Third-Party Assessment, when each pathway applies, and what manufacturers must prepare to achieve compliance.</p>
<p>La entrada <a href="https://goregulus.com/cra-compliance/cra-conformity-assessment/">CRA Conformity Assessment: Internal Control vs Third-Party Assessment (Complete Guide)</a> se publicó primero en <a href="https://goregulus.com">Regulus</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The Cyber Resilience Act (CRA) introduces two distinct <strong>conformity assessment procedures</strong> that manufacturers must follow before placing a Product with Digital Elements (PDE) on the EU market. Understanding which procedure applies to your product is one of the most important compliance decisions you will make.</p>



<p>This guide explains both conformity routes—<strong>Internal Control</strong> and <strong>Third-Party Assessment</strong>—in depth, including requirements, documentation, testing expectations, timelines, and the criteria that determine your conformity path.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">1. What Is a Conformity Assessment Under the CRA?</h2>



<p>A conformity assessment is the formal process used to verify that a digital product meets the <strong>Essential Cybersecurity Requirements</strong> in Annex I of the CRA. It includes:</p>



<ul class="wp-block-list">
<li>Technical documentation</li>



<li>Security design and architecture evidence</li>



<li>Vulnerability handling processes</li>



<li>Secure update mechanisms</li>



<li>Post-market monitoring plans</li>



<li>Testing and validation results</li>
</ul>



<p>You cannot place a product on the EU market without completing a conformity assessment.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">2. The Two CRA Conformity Assessment Procedures</h2>



<p>The CRA offers two routes:</p>



<ol class="wp-block-list">
<li><strong>Internal Control (Self-Assessment)</strong> – available only for Default Class products</li>



<li><strong>Third-Party Assessment (Notified Body)</strong> – mandatory for Critical Class products</li>
</ol>



<p>Your conformity route depends entirely on your <strong>product classification</strong>.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">3. Internal Control (Default Class Products)</h2>



<p>Internal Control is a self-assessment process that allows manufacturers to:</p>



<ul class="wp-block-list">
<li>Prepare technical documentation internally</li>



<li>Conduct their own testing and validation</li>



<li>Prepare an EU Declaration of Conformity</li>



<li>Affix the CE marking without external review</li>
</ul>



<p>This route applies to <strong>Default Class products</strong>, which represent standard-risk digital products.</p>



<h3 class="wp-block-heading">3.1 Requirements of Internal Control</h3>



<p>Manufacturers must:</p>



<ul class="wp-block-list">
<li>Create and maintain all <strong>technical documentation</strong> required in Annex II</li>



<li>Perform <strong>security testing</strong> aligned with Annex I</li>



<li>Implement <strong>secure update mechanisms</strong></li>



<li>Document vulnerability handling procedures</li>



<li>Prepare a <strong>post-market monitoring plan</strong></li>



<li>Compile an <strong>EU Declaration of Conformity</strong></li>
</ul>



<p>Authorities may review this documentation at any time.</p>



<h3 class="wp-block-heading">3.2 Who Can Use Internal Control?</h3>



<p>Products that fall under the Default Class—meaning they do not meet any of the criteria for Critical Class—may use this route.</p>



<p>Examples include:</p>



<ul class="wp-block-list">
<li>Developer tools without direct safety impact</li>



<li>General-purpose embedded controllers</li>



<li>Consumer IoT devices not used in critical contexts</li>



<li>Software applications that do not interface with critical systems</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">4. Third-Party Conformity Assessment (Critical Class Products)</h2>



<p>If your product is classified as <strong>Critical Class</strong>, you must undergo a full review by a <strong>Notified Body</strong>. This is a significantly more rigorous process.</p>



<h3 class="wp-block-heading">4.1 What the Notified Body Examines</h3>



<p>A Notified Body will:</p>



<ul class="wp-block-list">
<li>Review your architecture documentation</li>



<li>Review your secure development processes</li>



<li>Conduct penetration testing or verify your test results</li>



<li>Verify the correctness of your vulnerability management process</li>



<li>Validate your secure update mechanism</li>



<li>Assess your post-market monitoring design</li>



<li>Ensure SBOM coverage and supply-chain monitoring</li>



<li>Assess risk management decisions</li>
</ul>



<p>The Notified Body may request revisions or additional testing.</p>



<h3 class="wp-block-heading">4.2 When Third-Party Assessment Is Mandatory</h3>



<p>You must undergo a third-party assessment if your product is considered <strong>Critical Class</strong> according to Annex III. This includes products where:</p>



<ul class="wp-block-list">
<li>Security failures could significantly disrupt critical infrastructure</li>



<li>The product processes highly sensitive data</li>



<li>The product manages industrial control or operational technology</li>



<li>The product performs network security or gateway functions</li>
</ul>



<p>If any Critical Class criteria apply, Internal Control is not allowed.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">5. Comparison: Internal Control vs Third-Party Assessment</h2>



<figure class="wp-block-table"><table class="has-fixed-layout"><thead><tr><th>Aspect</th><th>Internal Control</th><th>Third-Party Assessment</th></tr></thead><tbody><tr><td>Eligibility</td><td>Default Class products only</td><td>Critical Class products only</td></tr><tr><td>Documentation</td><td>Self-prepared</td><td>Reviewed by Notified Body</td></tr><tr><td>Testing</td><td>Internal testing permitted</td><td>External testing or verification required</td></tr><tr><td>Timeline</td><td>Weeks</td><td>Months</td></tr><tr><td>Cost</td><td>Low</td><td>High</td></tr><tr><td>Regulatory Risk</td><td>Higher, if documentation is weak</td><td>Lower, due to external validation</td></tr></tbody></table></figure>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">6. Documentation Requirements for Conformity Assessment</h2>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="683" src="https://goregulus.com/wp-content/uploads/2025/11/cra-notified-body-assessment-1024x683.png" alt="Diagram showing the steps of a CRA third-party conformity assessment by a notified body." class="wp-image-544" srcset="https://goregulus.com/wp-content/uploads/2025/11/cra-notified-body-assessment-1024x683.png 1024w, https://goregulus.com/wp-content/uploads/2025/11/cra-notified-body-assessment-300x200.png 300w, https://goregulus.com/wp-content/uploads/2025/11/cra-notified-body-assessment-768x512.png 768w, https://goregulus.com/wp-content/uploads/2025/11/cra-notified-body-assessment.png 1536w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /><figcaption class="wp-element-caption">Critical Class products require independent assessment by a notified body.</figcaption></figure>



<p>Annex II requires manufacturers to prepare extensive documentation, including:</p>



<ul class="wp-block-list">
<li>Product architecture</li>



<li>Secure design principles</li>



<li>Threat models</li>



<li>SBOM (Software Bill of Materials)</li>



<li>Update mechanisms</li>



<li>Vulnerability handling workflows</li>



<li>Security testing evidence</li>



<li>Post-market monitoring plan</li>
</ul>



<p>This documentation must be maintained for the full support period.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">7. Key Steps of the Conformity Assessment Process</h2>



<ol class="wp-block-list">
<li>Determine whether your product is Default or Critical Class</li>



<li>Define your conformity route (Internal or Third-Party)</li>



<li>Prepare Annex II technical documentation</li>



<li>Perform security testing and validation</li>



<li>Document all processes and evidence</li>



<li>Complete EU Declaration of Conformity</li>



<li>Affix CE marking</li>



<li>Maintain documentation for authorities</li>
</ol>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">8. Common Mistakes to Avoid</h2>



<ul class="wp-block-list">
<li>Incorrectly assuming a product is Default Class</li>



<li>Missing evidence for update validation</li>



<li>Incomplete SBOM or dependency tracking</li>



<li>Not documenting security testing</li>



<li>Weak post-market monitoring plans</li>



<li>Not preparing risk assessments or threat models</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">9. How Regulus Helps Manufacturers</h2>



<p>Regulus simplifies CRA conformity by providing:</p>



<ul class="wp-block-list">
<li>Automatic Default vs Critical Class classification</li>



<li>Conformity route selection</li>



<li>Annex II documentation templates</li>



<li>Security testing and validation checklists</li>



<li>SBOM generation and monitoring</li>



<li>Post-market monitoring workflows</li>
</ul>



<p>Start by evaluating your product: <a href="https://goregulus.com/applicability-classification/cyber-resilience-act-applicability/"><strong>CRA Applicability Checker</strong></a></p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">Conclusion</h2>



<p>Choosing the correct conformity assessment route is essential for meeting CRA requirements. Default Class products may use Internal Control, but Critical Class products require third-party validation from a Notified Body. Preparing documentation early and aligning your security practices with Annex I ensures a smoother path to compliance.</p>



<p>For templates and guidance, visit our <a href="https://goregulus.com/resources/">CRA Resources</a>.</p>
<p>La entrada <a href="https://goregulus.com/cra-compliance/cra-conformity-assessment/">CRA Conformity Assessment: Internal Control vs Third-Party Assessment (Complete Guide)</a> se publicó primero en <a href="https://goregulus.com">Regulus</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
