Guide

EU Cyber Resilience Act (CRA): What Every Manufacturer Needs to Know Before September 2026

If your company makes anything that contains software — the European Union has a new law that directly affects you.

If your company makes anything that contains software — a smart lock, an industrial sensor, a mobile app, a router, or even a connected toy — the European Union has a new law that directly affects you. It’s the Cyber Resilience Act (CRA), and its first mandatory deadline falls on 11 September 2026.

Overlooking it could cost you up to EUR 15 million.

This guide explains what the CRA is, who it applies to, what you need to do, and how much time you really have.


What Is the Cyber Resilience Act?

The Cyber Resilience Act is an EU regulation that introduces mandatory cybersecurity requirements for all products with digital elements sold on the European market. It was signed on 10 December 2024.

In simple terms: if your product contains software or firmware and you sell it in the EU, you now have to prove it is secure — not just at launch, but throughout its entire lifecycle.

Before the CRA, cybersecurity for most products was voluntary. Manufacturers could ship devices with known vulnerabilities, skip security updates, and face no legal consequences. The CRA changes that. It makes product cybersecurity a legal obligation — much like the CE marking already ensures physical safety.


Who Is Affected?

The CRA covers every company that manufactures, imports, or distributes products with digital elements on the EU market. This also applies to non-EU companies selling to European customers.

Companies that ARE in scope:

Companies that are NOT in scope:


Two Deadlines You Cannot Miss

Most companies assume they have until December 2027 to prepare. That is a dangerous mistake.

Deadline 1: 11 September 2026 — Vulnerability Reporting Obligation

From that day, all manufacturers must report:

Deadline 2: 11 December 2027 — Full Compliance


What Exactly Does the CRA Require?

1. Product Security (13 requirements)

2. Vulnerability Handling (8 requirements)


The 24-Hour Reporting Obligation — How Does It Work?

StepDeadlineWhat to include
Early warning24 hoursExistence of the vulnerability, suspected activities, affected EU countries
Full notification72 hoursProduct details, nature of the exploit, severity assessment, remediation measures
Final report14 daysRoot cause analysis, detailed description, threat actor information, update details

Product Categories

Default Category (~90% of products)

Most products — Bluetooth speakers, smart home gadgets, general software. Compliance through self-assessment.

Important — Class I

Smart home security devices, routers, VPNs, password managers, connected toys. Requires third-party lab certification or compliance with a harmonised standard.

Important — Class II

Operating systems, hypervisors, containers, industrial firewalls. Requires mandatory third-party assessment.

Critical

Smart meter gateways, smart cards, hardware security modules. Requires EU cybersecurity certification (EUCC).


Penalties

ViolationMaximum fine
Non-compliance with essential requirementsEUR 15M / 2.5% of turnover
Failure to meet reporting obligationsEUR 10M / 2% of turnover
Incorrect information to authoritiesEUR 5M / 1% of turnover

What You Should Do Now: A Practical Checklist

  1. Check whether the CRA applies to you. Does your product contain software or firmware? Is it sold on the EU market?
  2. Classify your products. Determine the category: Default, Important (Class I/II), or Critical.
  3. Generate an SBOM for every product. CycloneDX or SPDX — a complete list of components.
  4. Set up continuous vulnerability monitoring. NVD, CISA KEV, GitHub Advisories, OSV.
  5. Prepare an incident reporting procedure. 24h/72h/14-day templates. Assign roles. Test the procedure.
  6. Document everything. Risk assessments, security architecture, SBOM records — retention for 10 years.

Conclusion

The Cyber Resilience Act is the most significant cybersecurity regulation for product manufacturers in EU history. It transforms product security from a voluntary best practice into a legal requirement with serious financial consequences.

Companies that prepare early will not only avoid penalties — they will gain a competitive advantage. In a market where buyers increasingly demand evidence of security, CRA compliance becomes a trust signal.

The first deadline is 11 September 2026. The time to act is now.


Sources

  1. European Commission — Cyber Resilience Act
  2. European Commission — CRA Reporting Obligations
  3. ENISA — Single Reporting Platform
  4. European Commission — CRA and Open Source Software
  5. Hogan Lovells — EU CRA: Key Milestones 2026

Get Ready for the CRA with CRAready

Automatic SBOM generation, vulnerability monitoring, and incident reporting — all in one tool.

Start for free