Cyber Resilience Act: Requirements, Scope, and How to Prepare Before 2027

The Cyber Resilience Act (CRA) is one of the most impactful EU cybersecurity regulations ever introduced. It establishes mandatory security requirements for all products with digital elements—software, firmware, connected hardware, IoT devices, and embedded systems—throughout their entire lifecycle. The CRA will reshape how digital products are designed, developed, tested, documented, supported, updated, and monitored. With…

The Cyber Resilience Act (CRA) is one of the most impactful EU cybersecurity regulations ever introduced. It establishes mandatory security requirements for all products with digital elements—software, firmware, connected hardware, IoT devices, and embedded systems—throughout their entire lifecycle.

The CRA will reshape how digital products are designed, developed, tested, documented, supported, updated, and monitored. With enforcement arriving between 2025 and 2027, organisations must begin preparing now to avoid legal risk, market disruption, and costly non-compliance.

This guide provides a deep, expert-level overview of the Cyber Resilience Act: scope, roles, classification, essential requirements, documentation, reporting obligations, conformity assessments, and actionable preparation steps.


What Is the Cyber Resilience Act?

The CRA is an EU-wide regulation designed to strengthen cybersecurity across digital products. Unlike voluntary standards or sector-specific directives, the CRA applies universally to any product with digital elements placed on the EU market.

Its main objectives are to:

  • Reduce the number of insecure digital products sold in the EU
  • Require cybersecurity-by-design and security-by-default practices
  • Establish consistent vulnerability handling and disclosure processes
  • Introduce mandatory incident reporting for exploited vulnerabilities
  • Guarantee long-term support and security updates
  • Ensure transparent and verifiable technical documentation

According to the European Commission, the CRA addresses “systemic weaknesses in digital product security due to lack of incentives and lack of harmonisation”. Source: European Commission Press Release.

In effect, the CRA enforces cybersecurity requirements comparable to safety requirements under the CE marking framework.


CRA Scope: What Products Does the Cyber Resilience Act Apply To?

The CRA applies to any product with digital elements (PDE) that is:

  • Software (installable or distributed binaries)
  • IoT products (consumer or industrial)
  • Connected hardware
  • Embedded systems with firmware
  • Standalone software delivered on physical media
  • Hardware modules containing digital functionality
  • Digital components integrated into other products

If a product interacts with a network, processes data, receives updates, or operates via firmware or software, it is almost always in scope.

Products NOT in scope

Some categories are excluded, based on Article 2:

  • Pure SaaS platforms without distributed software components
  • Products already covered by sectoral cybersecurity legislation (e.g., medical devices, automotive ECUs)
  • Open-source software developed outside a commercial activity
  • Products used exclusively for national security or military purposes

For a detailed applicability analysis, see our guide: CRA Applicability: Does the CRA Apply to Your Product?


Who Must Comply With the Cyber Resilience Act?

The CRA follows the New Legislative Framework (NLF) and applies to all economic operators involved in placing a digital product on the EU market:

1. Manufacturers

Manufacturers bear the most obligations, including:

  • Secure design and development processes
  • Conformity assessment and CE marking
  • Technical documentation (Annex II & VII)
  • Security updates throughout the support period
  • Vulnerability handling and post-market monitoring
  • Incident reporting

2. Importers

Importers must verify that products coming from outside the EU comply with CRA requirements before being placed on the market.

3. Distributors

Distributors must verify labelling, documentation completeness, and ensure conformity before making products available.

4. Authorised Representatives

They may carry out tasks delegated by the manufacturer but cannot assume liability for insecure products.


CRA Product Classification: Default vs Critical Class

The CRA introduces two categories:

  • Default Class: Most products fall here
  • Critical Class: Higher-risk products requiring stricter assessments

Default Class Products

These include general-purpose software, embedded products, IoT devices, developer tools, and typical firmware-driven hardware.

Default Class obligations include:

  • Secure design and development
  • Secure update mechanisms
  • Lifecycle risk management
  • Conformity based on internal control
  • Complete CRA technical documentation

Critical Class Products

Critical Class includes systems where vulnerabilities can affect:

  • Industrial operations
  • Critical infrastructure
  • Access controls
  • Security functions
  • Core connectivity components

Critical Class often requires:

  • Third-party conformity assessment
  • More rigorous documentation
  • Enhanced vulnerability and patching procedures

To determine your class, start with our free evaluation tool: CRA Applicability Checker


Essential Security Requirements (Annex I)

Lifecycle diagram illustrating secure design, development, testing, updates, and vulnerability management under CRA Annex I
The CRA requires secure-by-design practices across the entire product lifecycle.

Annex I defines the mandatory security controls for all digital products. These include:

1. Secure-by-design and secure-by-default architecture

  • Minimisation of attack surface
  • Least privilege
  • Secure default configurations

2. Protection from known vulnerabilities

  • CVE tracking
  • SBOM integrity
  • Dependency monitoring

3. Secure development practices

  • Threat modelling
  • Static and dynamic testing
  • Code review processes

4. Supply chain security

  • Supplier validation
  • Dependency integrity checks

5. Vulnerability handling capabilities

  • Intake and triage
  • Remediation workflows
  • Coordinated disclosure
Flowchart showing vulnerability intake, triage, remediation, and coordinated disclosure processes
Vulnerability handling is a core requirement under Annex I of the CRA.

6. Update mechanisms

  • Secure patch delivery
  • Cryptographically signed updates
  • Rollback protections

Technical Documentation Requirements (Annex II & VII)

Manufacturers must produce and maintain a comprehensive technical file that includes:

  • Product description and intended purpose
  • Architecture diagrams and component mapping
  • Security controls and implementation details
  • Vulnerability handling processes
  • Update strategy and lifecycle support
  • Evidence of conformity assessment
Diagram showing the structure of CRA technical documentation including architecture, controls, updates, and risk management
Manufacturers must maintain detailed technical documentation aligned with Annex II and Annex VII.

To simplify documentation, download our template: CRA Readiness Checklist (PDF)


Incident Reporting Requirements

Manufacturers must report:

  • Exploited vulnerabilities (within a fixed timeline)
  • Severe cybersecurity incidents

Reports must be submitted to:

  • National CSIRTs
  • ENISA (when required)

External reference: ENISA – Official EU Cyber Agency


CRA Timeline 2025–2027

The rollout includes:

  • 2025: Regulation enters into force
  • 2026: Preparation and alignment window
  • 2027: Full mandatory compliance and enforcement

Companies that begin early can reduce cost, risk, and operational friction significantly.


How to Prepare for the Cyber Resilience Act

1. Assess Applicability and Classification

Determine whether your product is Default or Critical Class. Start here: CRA Applicability Checker

2. Conduct a Product Inventory

List firmware, software modules, embedded components, connectivity features, and update mechanisms.

3. Establish Secure Development Practices

Build security into each lifecycle phase:

  • Threat modelling
  • Secure coding standards
  • Secure build pipelines
  • Static analysis, fuzzing, penetration testing

External benchmark:
NIST Secure Software Development Framework (SSDF)

4. Build CRA Technical Documentation

Create and maintain a living technical file aligned with Annex II and VII.

5. Implement Vulnerability Handling Workflows

Define intake, triage, remediation, and disclosure processes.

6. Prepare for Conformity Assessment

Default Class → internal control
Critical Class → external notified body in many cases


Conclusion

The Cyber Resilience Act introduces a new era of EU cybersecurity regulation. Its impact will be profound: stronger product security, improved patching practices, and more trustworthy digital ecosystems.

To accelerate your readiness, start with our full library of resources: Cyber Resilience Act Resources

Early preparation is the most valuable advantage you can secure.

More
Privacy Overview

This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.

This site is registered on wpml.org as a development site. Switch to a production site key to remove this banner.