Cyber Resilience Act
Cyber Resilience Act
Overview
The Cyber Resilience Act (CRA) introduces mandatory cybersecurity requirements for hardware and software products with digital elements. It covers the entire product lifecycle from design through end-of-support and aims to address the proliferation of insecure IoT and software products.[1]
The CRA applies to products placed on the EU market regardless of where they are manufactured.
Application Timeline
| Date | Milestone |
|---|---|
| December 10, 2024 | CRA enters into force |
| September 11, 2026 | Reporting obligations begin |
| December 11, 2027 | Full application of all requirements |
Products in Scope
Covered Products
Products with digital elements that:
- Have a direct or indirect logical or physical data connection to a device or network
- Include hardware and software components
Categories
| Category | Requirements | Examples |
|---|---|---|
| Default | Self-assessment | Most software, basic IoT |
| Important Class I | Standards-based assessment | Browsers, password managers, VPNs, network management |
| Important Class II | Third-party assessment | Operating systems, firewalls, routers, hypervisors |
| Critical | Third-party assessment + certification | Hardware security modules, smart meters, smart cards |
Exemptions
- Open source software (non-commercial development)
- SaaS (covered under other regulations)
- Products already regulated (medical devices, vehicles, aviation)
- Defense and national security products
Essential Cybersecurity Requirements[2]
Security by Design
Products must be designed and developed to ensure:
- Appropriate security level: Based on foreseeable risks
- No known exploitable vulnerabilities: At time of market placement
- Secure default configuration: Including factory reset capability
- Confidentiality protection: For stored, transmitted, and processed data
- Integrity protection: Against unauthorized modification
- Availability: Resilient against denial of service
- Minimal attack surface: Reduce potential attack vectors
- Incident impact limitation: Minimize breach consequences
Authentication and Access Control
- Strong, unique default credentials or user-set on first use
- Protection against brute force attacks
- Secure authentication mechanisms
Data Protection
- Encrypted storage for sensitive data
- Secure data transmission
- Delete or anonymize data when no longer needed
Vulnerability Handling Requirements[3]
Manufacturers must:
- Identify vulnerabilities: Through testing and monitoring
- Document components: Maintain software bill of materials (SBOM)
- Address vulnerabilities: Provide security updates without undue delay
- Disclose vulnerabilities: Coordinate with affected parties
- Security updates: Free updates for defined support period (minimum 5 years)
Vulnerability Reporting
From September 2026, manufacturers must report:
| Report Type | Timeline |
|---|---|
| Actively exploited vulnerability | 24 hours to ENISA |
| Incident with security impact | 24 hours to ENISA/CSIRT |
| Vulnerability notification | 72 hours to ENISA |
Conformity Assessment
| Category | Procedure |
|---|---|
| Default | Self-declaration or EU-type examination |
| Important Class I | Harmonized standards OR third-party assessment |
| Important Class II | Third-party conformity assessment |
| Critical | EU-type examination + production quality assurance |
Products must display CE marking confirming compliance.
Penalties
- Non-compliance: Up to €15 million or 2.5% of global turnover
- Essential requirements breach: Up to €10 million or 2% of turnover
- Other violations: Up to €5 million or 1% of turnover[4]
Developer Action Items
For software and hardware manufacturers:
- Inventory products: Determine which are in scope and their category
- Security by design: Integrate security into development processes
- Vulnerability management: Establish detection and handling procedures
- SBOM creation: Document software components and dependencies
- Support planning: Define and communicate support periods
- Update mechanisms: Build secure update delivery systems
- Conformity preparation: Prepare technical documentation