Cyber Resilience Act: What Counts Now
Security obligations for products
After the first part focused on the strategic importance of the Cyber Resilience Act (CRA), it is now time to get specific: What requirements will companies actually have to meet, and what does this mean in practice?
The CRA is deliberately designed not to provide abstract guidelines, but to define clear, verifiable obligations. This is precisely what makes it so effective and at the same time so challenging.
Area of Application: Products with Digital Elements
At the heart of the CRA are all "products with digital elements" - a deliberately broad term. This includes:
- Software products of any kind
- Networked devices (IoT)
- embedded systems in industrial environments
The decisive differentiation is made via the risk potential:
- Non-critical products are subject to standard requirements
- Critical products (e.g., safety-relevant components) must meet significantly stricter testing and verification requirements
A key element here is the CE marking: in the future, it will also certify a product's cybersecurity and will be a prerequisite for sales in the EU market. For many companies, this means that security will become part of the formal product approval process.
Secure by Design & Secure by Default
One of the most important principles of the CRA is also one of the most demanding: security must be anchored in the product from the outset. This includes in particular:
- Minimizing the attack surface
Only necessary functions and interfaces - no unnecessary open flanks - Secure by default
Products must not be delivered with insecure default configurations - Lifecycle view
Security does not end with the release, but encompasses the entire lifecycle - including updates and support
In practice, there is often a gap: Development processes are functionally optimized, but not consistently aligned with security. It is precisely at this point that it is decided whether CRA requirements are integrated efficiently or have to be "retrofitted" later at great expense.
Vulnerability Management & Reporting Obligations
The CRA mandates vulnerability management as an ongoing task. Core requirements are:
- Active treatment of vulnerabilities
Companies must systematically identify, assess, and fix known and actively exploited vulnerabilities - 24-hour reporting obligation to ENISA
If a vulnerability is actively exploited, this must be reported within 24 hours - Coordinated Vulnerability Disclosure
Clear processes for dealing with externally reported vulnerabilities - Software Bill of Materials (SBOM)
Transparency about deployed software components and dependencies
This area in particular shows the extent to which CRA requires operational capabilities. It is not enough to define guidelines - companies must be able to manage vulnerabilities in real time. In practice, it is clear that without structured processes and clear responsibilities, implementation quickly becomes an organizational challenge.
Documentation & Conformity Assessment
In addition to technical measures, the CRA attaches great importance to traceability. Companies must provide comprehensive documentation:
- Technical documentation
Safety concepts, architecture, risk assessments - EU declaration of conformity
Official confirmation that the product meets all requirements - Internal control procedures
Processes for continuously ensuring compliance
These requirements affect not only engineering teams but also governance, quality management, and compliance functions. Experience has shown that one of the biggest challenges here is combining technical implementation and regulatory verification.
Sanctions for Violations
The CRA is not a "soft law". Violations have tangible consequences:
- Substantial fines
Depending on the severity and scope of the infringement - Distribution bans
Products can be withdrawn from the market or not approved in the first place - Reputational risks
Security flaws are becoming increasingly public and business-critical
This makes it clear: compliance is not optional, but business-critical.
A quick reality check for companies:
- Does your product contain software or digital components?
- Is your product offered or operated on the EU market?
- Do you have transparency about the software component used (SBOM)?
- Can you document safety measures and decisions in a comprehensible way?
If you cannot clearly answer "yes" to several of these questions, you need to take action.
Conclusion
The Cyber Resilience Act translates cybersecurity into concrete, verifiable requirements along the entire product life cycle. For many companies, this means a profound change: from selective security measures to structured, end-to-end processes.
Organizations that operationalize these requirements early on and integrate them into their product development not only achieve compliance but also build sustainable stability and market trust.
Written by