The Cyber Resilience Act (CRA) is a European Union regulation aimed at ensuring some level of cybersecurity for products with digital elements placed on the EU market depending on its criticality. Its primary objective is to enhance the overall cybersecurity posture by embedding security throughout the entire lifecycle product with digital elements from design and development to post-market support.
For manufacturers, the CRA represents a significant shift in regulatory expectations, placing clear responsibilities on them to deliver secure products by default and to manage vulnerabilities effectively over time. Understanding and complying with the CRA is essential not only for legal market access but also for maintaining customer trust, avoiding penalties, and staying competitive in an increasingly security-conscious market.
Placing on the market is defined as 'making a product available on the Union market for the first time with a view to its distribution or use within the Union, whether for reward or free of charge and irrespective of the selling technique'.
According to the Blue Guide, it is important to remark that a new batch of an existing product will need to be compliant with the new requirements even if the version is the same than before the deadline.
CRA applies to manufacturers, importers and distributors and major obligations are:
It is important to remark that the reporting obligations apply to all products. According to Article 69 (3), obligations extend to all products with digital elements, even those sold before 11 Dec 2027. So, from 11 Sept 2026, any product still on the market, including those placed before 2026, must have processes to detect and report vulnerabilities.
The CRA applies to “products with digital elements” (PDEs), which include both hardware and software, as well as associated remote data processing solutions. To be covered, the product’s use must foreseeably involve either a logical or a physical connection to a network or another device.
The categorization of a product under the CRA is the first step, as it determines which conformity assessment procedures will apply. The Regulation foresees different levels of assessment depending on whether a product is classified under the general default category of PDEs or falls within a higher-risk class (Important and Critical).
The different conformity assessment routes depending on the categorization are outlined in the accompanying diagram for clarity.
Check in which category your product falls in Annex III and IV of CRA text. Depending on the category, self-assessment is allowed.
Guidance is expected from the European Commission and implementing acts to help manufacturers and providers determine the correct categorization. In the meantime, the Commission has drafted the technical description of the categories of important and critical products in Draft implementing regulation - Ares (2025) 2037850 and Annex - Ares(2025)2037850 in Technical description of important and critical products with digital elements. Note that this document is still under discussion.
Excluded from CRA are product categories already regulated by specific EU frameworks:
Be careful because pertaining to a sector does not mean you are excluded. The idea behind the CRA is that products covered by other regulations.
Standards are being built for Important (Class I and II) and Critical products, and manufacturers and stakeholders are open to contribute. Standardization request for CRA in Mandate606 shows that 41 topics shall be covered by different standards that are categorized in three types of standards:
Type “A” does not give presumption of conformity. Types “A” and “B” serve as a basis for defining “Type C” standards, and Type C standards will later on provide presumption of conformity.
These are the expected deadlines for the standards:
Yes. Some of the defined non-compliance are:
The CRA includes a category for open source stewards which are those commercializing or supporting open source products. They are obligated to uphold cybersecurity policies, cooperate with authorities, and support responsible vulnerability disclosure. Non-commercial open source projects may be exempt.
The best practices for CRA engagement.
We help our customers get ahead of compliance deadlines by offering:
Applus+ uses first-party and third-party cookies for analytical purposes and to show you personalized advertising based on a profile drawn up based on your browsing habits (eg. visited websites). You can accept all cookies by pressing the "Accept" button or configure or reject their use. Consult our Cookies Policy for more information.
They allow the operation of the website, loading media content and its security. See the cookies we store in our Cookies Policy.
They allow us to know how you interact with the website, the number of visits in the different sections and to create statistics to improve our business practices. See the cookies we store in our Cookies Policy.
Based on your behavior on the website (where you click, how long you browse, etc.) we establish parameters and a profile for you to display ads that correspond to your interests. See the cookies we store in our Cookies Policy.