Cyber Resilience Act

Cyber Resilience Act: What Counts Now

Security obligations for products

The Cyber Resilience Act (CRA) - An Overview of the Key Requirements
14.05.2026
Security

After the first part focused on the strategic importance of the Cyber Resilience Act (CRA), it is now time to get specific: What requirements will companies actually have to meet, and what does this mean in practice?

 

The CRA is deliberately designed not to provide abstract guidelines, but to define clear, verifiable obligations. This is precisely what makes it so effective and at the same time so challenging.

Area of Application: Products with Digital Elements

At the heart of the CRA are all "products with digital elements" - a deliberately broad term. This includes:

  • Software products of any kind
  • Networked devices (IoT)
  • embedded systems in industrial environments

The decisive differentiation is made via the risk potential:

  • Non-critical products are subject to standard requirements
  • Critical products (e.g., safety-relevant components) must meet significantly stricter testing and verification requirements

A key element here is the CE marking: in the future, it will also certify a product's cybersecurity and will be a prerequisite for sales in the EU market. For many companies, this means that security will become part of the formal product approval process.

Secure by Design & Secure by Default

One of the most important principles of the CRA is also one of the most demanding: security must be anchored in the product from the outset. This includes in particular:

  • Minimizing the attack surface
    Only necessary functions and interfaces - no unnecessary open flanks
  • Secure by default
    Products must not be delivered with insecure default configurations
  • Lifecycle view
    Security does not end with the release, but encompasses the entire lifecycle - including updates and support

In practice, there is often a gap: Development processes are functionally optimized, but not consistently aligned with security. It is precisely at this point that it is decided whether CRA requirements are integrated efficiently or have to be "retrofitted" later at great expense.

Vulnerability Management & Reporting Obligations

The CRA mandates vulnerability management as an ongoing task. Core requirements are:

  • Active treatment of vulnerabilities
    Companies must systematically identify, assess, and fix known and actively exploited vulnerabilities
  • 24-hour reporting obligation to ENISA
    If a vulnerability is actively exploited, this must be reported within 24 hours
  • Coordinated Vulnerability Disclosure
    Clear processes for dealing with externally reported vulnerabilities
  • Software Bill of Materials (SBOM)
    Transparency about deployed software components and dependencies

This area in particular shows the extent to which CRA requires operational capabilities. It is not enough to define guidelines - companies must be able to manage vulnerabilities in real time. In practice, it is clear that without structured processes and clear responsibilities, implementation quickly becomes an organizational challenge.

Documentation & Conformity Assessment

In addition to technical measures, the CRA attaches great importance to traceability. Companies must provide comprehensive documentation:

  • Technical documentation
    Safety concepts, architecture, risk assessments
  • EU declaration of conformity
    Official confirmation that the product meets all requirements
  • Internal control procedures
    Processes for continuously ensuring compliance

These requirements affect not only engineering teams but also governance, quality management, and compliance functions. Experience has shown that one of the biggest challenges here is combining technical implementation and regulatory verification.

Sanctions for Violations

The CRA is not a "soft law". Violations have tangible consequences:

  • Substantial fines
    Depending on the severity and scope of the infringement
  • Distribution bans
    Products can be withdrawn from the market or not approved in the first place
  • Reputational risks
    Security flaws are becoming increasingly public and business-critical

This makes it clear: compliance is not optional, but business-critical.

Mini-Check: Are You affected?

 

A quick reality check for companies:

  • Does your product contain software or digital components?
  • Is your product offered or operated on the EU market?
  • Do you have transparency about the software component used (SBOM)?
  • Can you document safety measures and decisions in a comprehensible way?

If you cannot clearly answer "yes" to several of these questions, you need to take action.

Conclusion

The Cyber Resilience Act translates cybersecurity into concrete, verifiable requirements along the entire product life cycle. For many companies, this means a profound change: from selective security measures to structured, end-to-end processes.

 

Organizations that operationalize these requirements early on and integrate them into their product development not only achieve compliance but also build sustainable stability and market trust.

Further Information on the Cyber Resilience Act (CRA)

The Cyber Resilience Act (CRA) - Why companies need to act now

The Cyber Resilience Act is coming: New EU regulations make cybersecurity mandatory. Find out what this means for your products and processes

Vulnerability Management with VAREDY

Identify and fix vulnerabilities in time with vulnerability management and effectively minimize the risk of cyberattacks.

Written by

82428-2 Schäfers-1
Patrick Schäfers
Expert for cyber security & vulnerability management

As Head of Security Projects, Patrick Schäfers is responsible for secure IT processes and strategic vulnerability management. He has been with Arvato Systems for ten years and has many years of experience focusing on IT security, information security, and business processes.

Learn more about this author