The Cyber Resilience Act (CRA) is reshaping the cybersecurity landscape for digital products in the European Union. While some regulatory details are still pending clarification, the framework already provides manufacturers and laboratories with a solid foundation to begin preparing. This article summarizes key insights from the Applus+ Laboratories webinar titled CRA: What We Know & What We Don’t Know (Yet), and aligns them with the latest official publications. The video recording is available alongside this article.
The CRA applies to most connected hardware and software products, with full enforcement expected by December 2027. By September 2026, manufacturers must begin reporting actively exploited vulnerabilities and severe incidents. The regulation mandates cybersecurity by design and by default, continuous vulnerability management, and comprehensive technical documentation. These elements are well-established and have been covered extensively in previous Applus+ Laboratories publications.
The CRA outlines several conformity assessment models, each tied to the product’s classification and risk level:
As of October 2025, Module H has emerged as a particularly hot topic. It offers a potentially efficient route to compliance by leveraging audits of a manufacturer’s quality management system—similar in structure to ISO 9001—rather than requiring product-by-product testing. This model could be especially attractive for manufacturers with mature internal processes.
However, several aspects remain unresolved:
Despite these gaps, organizations like Applus+ Laboratories are already working on modular approaches aligned with the New Legislative Framework (NLF) to prepare for Module H implementation.
European standards organizations are actively developing harmonized standards to support CRA compliance. These include:
At the time of publication:
However, several questions remain:
The CRA imposes a comprehensive set of obligations on manufacturers, including:
At the time this article was drafted, while these obligations are well-defined in the regulation, practical implementation remains challenging:
Under the CRA, manufacturers must report:
These must be reported to ENISA and the designated CSIRT via a single reporting platform, following strict timelines:
While the CRA’s foundational requirements are clear, many technical and procedural details are still evolving. As of October 2025, manufacturers can already begin preparing in key areas such as product classification, documentation, vulnerability management, and reporting. Staying informed and engaged with regulatory updates will be essential to ensure compliance and maintain market access.
Applus+ uses first-party and third-party cookies for analytical purposes and to show you personalized advertising based on a profile drawn up based on your browsing habits (eg. visited websites). You can accept all cookies by pressing the "Accept" button or configure or reject their use. Consult our Cookies Policy for more information.
They allow the operation of the website, loading media content and its security. See the cookies we store in our Cookies Policy.
They allow us to know how you interact with the website, the number of visits in the different sections and to create statistics to improve our business practices. See the cookies we store in our Cookies Policy.
Based on your behavior on the website (where you click, how long you browse, etc.) we establish parameters and a profile for you to display ads that correspond to your interests. See the cookies we store in our Cookies Policy.