FAQEUCyber Resilience Act

EU Cyber Resilience Act FAQ Cybersecurity Risk Assessment

Use this CRA FAQ to understand what Article 13 requires from the cybersecurity risk assessment, what it must cover, when it must be updated, and how it should deal with constraints, dependencies, variants, and foreseeable misuse.

Built for product security, engineering, legal, certification, and compliance teams documenting CRA risk decisions.

Author
Sorena AI
Published
Mar 10, 2026
Updated
Mar 10, 2026
Sections
26

Structured answer sets in this page tree.

Primary sources
3

Cited legal and guidance references.

Publication metadata
Sorena AI
Published Mar 10, 2026
Updated Mar 10, 2026
Overview

The CRA cybersecurity risk assessment is the foundation for product compliance under Article 13. This FAQ focuses on what the assessment must cover, how it interacts with Annex I and technical documentation, and how manufacturers should handle constraints, external dependencies, lifecycle changes, and product variants.

Search this module

Find a question or answer quickly

26 of 26 sections
Section 1

What does the CRA require from a manufacturer's cybersecurity risk assessment?

The CRA requires manufacturers to carry out a cybersecurity risk assessment for each product with digital elements and to use the outcome of that assessment throughout the product lifecycle.

It is the basis for deciding how the manufacturer will plan, design, develop, produce, deliver and maintain the product so that it meets the CRA's essential cybersecurity requirements.

Recommended next step

Use EU Cyber Resilience Act FAQ Cybersecurity Risk Assessment as a cited research workflow

Research Copilot can turn EU Cyber Resilience Act FAQ Cybersecurity Risk Assessment into a reusable cited workflow for teams implementing EU Cyber Resilience Act FAQ.

Section 2

Does the risk assessment obligation apply only to important or critical products?

No.

The CRA risk assessment obligation applies to all products with digital elements in scope. Whether a product is in the default category or is classified as important or critical does not remove or replace the need for a comprehensive cybersecurity risk assessment.

Citations
Section 3

At what stage must the manufacturer use the cybersecurity risk assessment?

Across the full lifecycle covered by Article 13(2).

The CRA says the manufacturer must take the outcome of the cybersecurity risk assessment into account during the planning, design, development, production, delivery and maintenance phases of the product.

Section 4

Must the cybersecurity risk assessment cover the whole product, including remote data processing and supporting functions?

Yes.

The Commission FAQ says the manufacturer's cybersecurity risk assessment must cover the entire product with digital elements. That includes remote data processing when it is in scope, as well as supporting functions that form part of the product.

Citations
Section 5

Does the CRA mandate a specific cybersecurity risk assessment methodology?

No.

The CRA does not prescribe a single methodology. Manufacturers may choose the method they use, but it must allow them to identify, assess, treat and document the relevant cybersecurity risks in a way that supports compliance with the CRA.

Section 6

Must the threat model reflect the product's intended purpose and deployment context?

Yes.

The Commission FAQ says manufacturers should use a threat-modelling approach that reflects the threats and resulting risks associated with the product's intended purpose and reasonably foreseeable use. That means the assessment may differ for the same type of product depending on where and how it is expected to be used, for example in a residential environment or in critical infrastructure.

Citations
Section 7

What must the cybersecurity risk assessment analyse?

The CRA requires the assessment to analyse the cybersecurity risks associated with the product based on:

- the product's intended purpose

- its reasonably foreseeable use

- the conditions of use

- the time the product is expected to be in use

The Commission FAQ adds that the conditions of use can include the operational environment and the assets to be protected.

Citations
Section 8

Must the risk assessment cover reasonably foreseeable misuse as well as intended use?

Yes.

The CRA definition of reasonably foreseeable use covers use that is likely to result from reasonably foreseeable human behaviour or technical operations or interactions. The Commission FAQ also explains that manufacturers must take reasonably foreseeable misuse into account and communicate significant resulting risks to users where relevant.

Citations
Section 9

Must the manufacturer identify which Annex I requirements apply and how they are implemented?

Yes.

Article 13(3) requires the cybersecurity risk assessment to indicate whether and, if so, how the security requirements relating to product properties in Annex I, Part I, point (2) apply to the product and how they are implemented. It must also indicate how the manufacturer applies Annex I, Part I, point (1) and the vulnerability-handling requirements in Annex I, Part II.

Section 10

What if a manufacturer concludes that a specific essential cybersecurity requirement is not applicable?

The manufacturer can conclude that a specific requirement is not applicable, but it must justify that conclusion clearly in the technical documentation.

That is not a shortcut around the risk assessment. The Commission FAQ and the draft guidance make clear that if relevant risks still exist, the manufacturer must address them through other appropriate measures and explain the resulting limitations, assumptions or conditions of use.

Section 11

Can a manufacturer rely on user instructions instead of product-level security measures?

No, not as a substitute for product security.

The March 2026 draft guidance says cybersecurity risks must be addressed through product-level measures. Information and instructions can support secure installation, deployment and use, but they do not cure a design shortcoming if the product itself does not achieve the required level of cybersecurity.

Section 12

Can a manufacturer decide acceptability based only on internal risk appetite, cost, or commercial strategy?

No.

The March 2026 draft guidance says residual cybersecurity risk must be assessed against the CRA's regulatory threshold, not only against the manufacturer's internal risk tolerance, cost targets or commercial preferences.

Section 13

Can harmonised standards replace the cybersecurity risk assessment?

No.

Harmonised standards, common specifications or certification schemes can support compliance, but they do not replace the manufacturer's duty to identify and assess the relevant cybersecurity risks for the specific product.

Citations
Section 14

Can one risk assessment be used for the CRA and other EU legislation?

Yes, if it still shows compliance with each legal instrument separately.

The Commission FAQ says manufacturers may carry out a single risk assessment covering the needs of different legislation or separate assessments. What matters is that they remain able to demonstrate compliance with each applicable instrument. The CRA also gives an express example for certain products covered by other Union legal acts.

Section 15

When must the cybersecurity risk assessment be documented and updated?

It must be included in the technical documentation when the product is placed on the market, and it must then be updated as appropriate during the support period.

After placement on the market, the manufacturer must also systematically document relevant cybersecurity aspects concerning the product, including vulnerabilities it becomes aware of and relevant information provided by third parties, and update the risk assessment where applicable.

Citations
Section 16

What kinds of events should trigger an update to the CRA cybersecurity risk assessment?

The CRA does not publish a closed list, but the legal text and Commission materials clearly point to updates when relevant cybersecurity aspects change.

That includes, for example:

- newly identified vulnerabilities

- evidence from tests or reviews

- relevant information received from third parties

- changes in dependencies, product variants or operating assumptions that affect cybersecurity

- changes in intended purpose, reasonably foreseeable use or deployment environment

Citations
Section 17

What must the technical documentation include regarding the cybersecurity risk assessment?

The technical documentation must include the risk assessment itself and enough supporting information to show how the product complies with the CRA.

Depending on the product, that can include:

- the product's intended purpose

- system architecture and the relationship between hardware and software elements

- relevant information used to determine the support period

- vulnerability-handling processes

- coordinated vulnerability disclosure information

- technical solutions for secure update distribution

- software bills of materials where applicable

- the standards, specifications or other technical solutions used to meet the essential requirements

Section 18

Does the CRA require the manufacturer to assess risks from external systems and dependencies too?

Yes.

The risk assessment is not limited to threats originating entirely inside the product. The draft guidance explains that manufacturers also need to consider cybersecurity risks arising from external networks, remote services, third-party solutions and other dependencies that can affect the product.

The CRA still regulates the product's response to those risks. It does not turn the manufacturer into the controller of the entire outside environment.

Citations
Section 19

Does the CRA risk assessment also have to consider the impact of cybersecurity issues on health and safety?

Yes.

Article 13(2) says the manufacturer must use the risk assessment to minimise cybersecurity risks, prevent incidents and minimise their impact, including in relation to the health and safety of users.

Section 20

If a product is intended to be integrated into another system, must the manufacturer explain its security assumptions and conditions of use in the CRA cybersecurity risk assessment and user information?

Yes.

The Commission FAQ says manufacturers should inform users and integrators about assumptions and requirements relevant to secure installation, operation and use. That follows from the CRA's focus on intended purpose, reasonably foreseeable use, conditions of use and the user information required by Annex II.

Citations
Section 21

If interoperability or technical constraints prevent the most secure option, can the manufacturer still comply?

Yes, but only if the constraint is identified and justified in the risk assessment and the associated risks are mitigated by other appropriate measures.

The draft guidance explains that some products need to interoperate with existing systems or dependencies that limit which security measures can be applied. In those cases, manufacturers still need to assess the resulting risks, document the constraint, implement compensatory measures where needed, and reassess the position over time.

Citations
Section 22

For a product designed before the CRA applies, is a current cybersecurity risk assessment still required?

Yes.

The March 2026 draft guidance says a manufacturer may place a product designed before the CRA's application date on the market without redesign if it carries out a current cybersecurity risk assessment and can show that the existing design already addresses the relevant risks.

The manufacturer is not required to recreate historical design evidence that does not add security value, but it still must document a current assessment and demonstrate compliance with the CRA before placement on the market.

Citations
Section 23

Can the manufacturer rely on assumptions about professional deployment or controlled environments?

Yes, but only where those assumptions are reasonable for the product's intended purpose and reasonably foreseeable use, and are communicated clearly.

The Commission FAQ says the conditions of use considered in the risk assessment may include supervision, assistance, or other measures normally present in certain professional settings. But the manufacturer cannot ignore other reasonably foreseeable user groups. If the product is likely to be used by consumers or low-skilled users, the risk assessment and the accompanying instructions must reflect that too. Where secure deployment depends on assumptions such as a trusted environment or secure network, the manufacturer should make that clear and warn about significant resulting risks under reasonably foreseeable misuse.

Citations
Section 24

Must the cybersecurity risk assessment look ahead over the product's expected lifetime, not just conditions at launch?

Yes.

The CRA requires the manufacturer to take into account the length of time the product is expected to be in use, and to keep the risk assessment updated as appropriate during the support period. The Commission FAQ adds that the manufacturer should prepare the product so that vulnerabilities, including vulnerabilities in components, can be handled effectively throughout that period, and may consider reasonable projections about changes in the threat landscape. Where certain risks are addressed partly through user information and instructions, those materials should be updated too.

Citations
Section 25

Is Annex I, Part I, point (1) a separate extra requirement even if the other product-property requirements already cover the relevant risks?

Not necessarily.

The March 2026 draft guidance explains that Annex I, Part I, point (1) works as a catch-all for additional cybersecurity risks that are not otherwise adequately addressed through the other applicable product-property requirements. If the risk assessment shows that all relevant cybersecurity risks are already treated through adequate measures implementing the other applicable requirements in Annex I, Part I, point (1) is deemed fulfilled. But if additional risks remain, the manufacturer still has to implement appropriate product-level measures to address them.

Citations
Section 26

Can one cybersecurity risk assessment cover several variants or models?

Yes, but only where the variants genuinely share the same cybersecurity profile.

The March 2026 draft guidance says a manufacturer may rely on a single cybersecurity risk assessment, a single set of technical documentation, and a single conformity assessment where the relevant variants share the same architecture, security-relevant design, intended purpose, and cybersecurity risks. Differences such as housing, colour, form factor, or other non-security-relevant characteristics do not by themselves require separate treatment. But differences that affect communication interfaces, software stacks, update mechanisms, remote connectivity, or other cybersecurity-relevant properties must be reflected in the risk assessment and documentation, and the file must be updated when a new variant changes those properties.

Citations
Primary sources

References and citations

data.europa.eu25 citations
Referenced sections
  • Article 13(2)-(3)
  • Article 13(2)
  • Article 3(1), Article 13(2)
Show 18 more
  • Article 13(3), Article 3(24)
  • Article 13(3)
  • Article 3(24), Annex II, point 5
  • Article 13(4), recital 55
  • Article 13(2)-(3), Annex II
  • Article 13(2)-(3), Annex VII
  • Article 13(4)
  • Article 13(3), Article 13(4), Article 13(7)
  • Article 13(3), Article 13(7), Annex I, Part II, point 3
  • Article 31, Annex VII
  • Article 13(2)-(5)
  • Article 13(3), Annex II
  • Article 13(3)-(4), recital 55
  • Article 13(2)-(4), Article 31
  • Article 3(23)-(25), Article 13(3), Article 13(18), Annex II, points 4, 5 and 8
  • Article 13(3), Article 13(7)-(8)
  • Article 13(3), Annex I, Part I, point 1
  • Article 13(2)-(4), Article 31(2), Annex VII
ec.europa.eu19 citations
Referenced sections
  • section 4.1.1
  • section 3.3, section 4.1.1
  • section 4.1.2
Show 9 more
  • section 3.3, section 4.1.2, section 4.1.4
  • section 4.1.4, section 4.1.6
  • section 4.1.5
  • section 4.1.3
  • section 4.1.7
  • section 4.1.8
  • section 4.1.4
  • section 4.1.4 and section 4.1.5
  • section 4.1.6
ec.europa.eu9 citations
Referenced sections
  • points 28-29
  • points 141-147
  • points 158-161
Show 5 more
  • points 151-157, 177, 185-186
  • points 28-29, Example 6
  • points 30-35 and Example 7
  • section 7.2, points 148 to 150
  • section 7.4, points 158 to 161
Related guides

Explore more topics

Applicability Test | EU Cyber Resilience Act, CRA Product Security and CE Marking
Use this CRA applicability test to confirm product scope, exclusions, remote data processing boundaries, operator role, product classification.
Checklist | EU Cyber Resilience Act, CRA Product Security and CE Marking
Use this Cyber Resilience Act checklist to assign owners, deadlines, evidence, and release gates for scope, Annex I controls, support period operations.
Compliance Program | EU Cyber Resilience Act, CRA Product Security and CE Marking
Build a CRA compliance program that covers product scope, governance, engineering controls, support period operations, Article 14 reporting.
Conformity Assessment and CE Marking | EU Cyber Resilience Act, CRA Product Security and CE Marking
Choose the right CRA conformity route, prepare the declaration of conformity, structure the technical file.
CRA Blue Guide Concepts FAQ | Placing on the Market, Making Available, Distance Sales
CRA FAQ on Blue Guide concepts used in Cyber Resilience Act interpretation: placing on the market, making available, putting into service, online sales.
CRA CE Marking FAQ | Meaning, Placement Rules, Software Labeling, Notified Bodies
CRA CE marking FAQ covering what the mark means, when it is mandatory, software and website placement rules, packaging fallback, notified body numbers.
CRA Component Due Diligence FAQ | Third-Party Components, FOSS, SBOM, Vulnerabilities
CRA component due diligence FAQ covering third-party components, FOSS, CE-marked components, SBOM review, risk-based checks, upstream vulnerability reporting.
CRA Conformity Assessment Routes FAQ | Module A, Module B+C, Module H, Critical and Important Products
CRA FAQ on conformity assessment routes covering module A, module B+C, module H, important and critical products, harmonised standards, certification schemes.
CRA Core Functionality FAQ | Important Products, Critical Products, Classification
CRA FAQ on core functionality covering classification of important and critical products, ancillary functions, integrated components.
CRA Declaration of Conformity FAQ | Full vs Simplified, Languages, Updates, Duties
CRA FAQ on the EU declaration of conformity covering full and simplified formats, required contents, languages, updates, single declarations across EU laws.
CRA Economic Operators FAQ | Manufacturers, Importers, Distributors, Authorised Representatives
CRA FAQ on economic operators covering manufacturer, authorised representative, importer, distributor, responsible operator rules, checks, traceability.
CRA Essential Cybersecurity Requirements FAQ | Annex I Part I and Part II
CRA FAQ on the essential cybersecurity requirements covering Annex I Part I and Part II, applicability, evidence, interoperability constraints.
CRA FAQ Hub | Blue Guide Concepts, CE Marking, Component Due Diligence
Browse the CRA FAQ hub for Blue Guide market-access concepts, CE marking, and component due diligence.
CRA Hardware and Software Boundaries FAQ | Product Scope, Combined Products, Source Code
CRA FAQ on hardware and software boundaries covering combined products, standalone software, source code, companion apps, remote data processing.
CRA Harmonised Standards and Common Specifications FAQ | Presumption of Conformity, OJ Publication
CRA FAQ on harmonised standards, common specifications, and certification schemes covering presumption of conformity, Official Journal publication.
CRA Important and Critical Products FAQ | Annex III, Annex IV, Core Functionality
CRA FAQ on important and critical products covering Annex III and Annex IV classification, core functionality, conformity routes, FOSS rule limits.
CRA Integrated Components and Dependencies FAQ | Due Diligence, RDPS, Third-Party Components
CRA FAQ on integrated components and dependencies covering due diligence, third-party components, RDPS, cloud dependencies, upstream fixes, FOSS dependencies.
CRA Interplay With Other EU Laws FAQ | RED, AI Act, GDPR, Data Act, EHDS, Machinery
CRA FAQ on interplay with other EU laws covering exclusions, overlap with RED, AI Act, GDPR, Data Act, EHDS, Machinery, GPSR, NIS2, aviation, marine.
CRA Known Exploitable Vulnerabilities at Launch FAQ | Placement on the Market, CVEs, Late Discoveries
CRA FAQ on known exploitable vulnerabilities at launch covering the launch-time rule, exploitability, known vulnerabilities, CVEs, compensating controls.
CRA Legacy Products FAQ | Pre-2027 Products, Reporting, Grandfathering, Substantial Modification
CRA FAQ on legacy products covering pre-11 December 2027 products, Article 14 reporting, continued sale, substantial modification, spare parts, old designs.
CRA Manufacturer Obligations FAQ | Article 13 Duties, Support Period, Reporting, Documentation
CRA FAQ on manufacturer obligations covering Article 13 duties, risk assessment, support periods, vulnerability handling, reporting, documentation.
CRA Market Surveillance and Enforcement FAQ | Authorities, Safeguards, Sweeps, Formal Non-Compliance
CRA FAQ on market surveillance and enforcement covering authorities, investigations, safeguard procedures, formal non-compliance, sweeps, joint activities.
CRA Module A FAQ | Internal Control, Self-Assessment, Eligibility, Documentation
CRA FAQ on module A covering internal control, eligible products, class I limits, FOSS exception, technical documentation, testing, CE marking.
CRA Module B+C FAQ | EU-Type Examination, Conformity to Type, Notified Bodies
CRA FAQ on module B+C covering EU-type examination, conformity to type, notified-body role, certificate changes, production control, CE marking.
CRA Module H FAQ | Full Quality Assurance, Notified Body Surveillance, CE Marking
CRA FAQ on module H covering full quality assurance, quality-system approval, notified-body surveillance, scope changes, CE marking, language rules, records.
CRA Notified Bodies FAQ | Notification, Scope, NANDO, Independence, Competence
CRA FAQ on notified bodies covering notification, competence, independence, NANDO scope, accreditation, cross-border choice, subcontracting.
CRA Open-Source Software FAQ | FOSS, Commercial Activity, Stewards, Donations, Paid Editions
CRA FAQ on open-source software covering FOSS qualification, commercial activity, donations, paid support, stewards, contributors, repositories.
CRA Over-the-Air Updates FAQ | OTA, Automatic Updates, Secure Distribution, Offline Paths
CRA FAQ on over-the-air updates covering OTA versus automatic updates, secure distribution, screenless products, gateways, offline update paths.
CRA Penalties and Fines FAQ | Fine Tiers, Turnover Caps, SME Carve-Outs, Stewards
CRA FAQ on penalties and fines covering Article 64 fine tiers, turnover caps, SME carve-outs, steward exemptions, cumulative fines, criminal sanctions.
CRA Product Families FAQ | Variants, Shared Assessments, Family Reuse, Conformity Scope
CRA FAQ on product families covering shared risk assessments, family-wide documentation reuse, cybersecurity-relevant variant differences.
CRA Remote Data Processing Solutions FAQ | RDPS Scope, Cloud Services, SaaS Boundaries, Documentation
CRA FAQ on remote data processing solutions covering Article 3(2) RDPS tests, cloud-service boundaries, websites and portals, third-party SaaS, backend scope.
CRA Repairs and Spare Parts FAQ | Repairs, Refurbishment, Spare-Part Exemption, Compatibility
CRA FAQ on repairs and spare parts covering substantial modification, Article 2(6) identical spare parts, non-identical replacements.
CRA Reporting Obligations FAQ | Article 14 Deadlines, CSIRT Filing, User Notices, Legacy Products
CRA FAQ on reporting obligations covering Article 14 deadlines, actively exploited vulnerabilities, severe incidents, CSIRT routing, user notifications.
CRA Scope FAQ | Products with Digital Elements, Connections, Software, Exclusions
CRA FAQ on scope and products with digital elements covering software, firmware, components, direct and indirect connections, offline products, exclusions.
CRA Secure-by-Default FAQ | Default Configuration, Auto Updates, Tailor-Made Limits
CRA FAQ on secure by default covering Annex I default configuration, automatic security updates, opt-outs, components, inapplicability.
CRA Security Updates vs Functionality Updates FAQ | Separation, Free Updates, Article 13(10)
CRA FAQ on security updates versus functionality updates covering separation where technically feasible, free security updates, automatic updates.
CRA Substantial Modification FAQ | Post-Market Changes, New Manufacturer, Legacy Products
CRA FAQ on substantial modification covering Article 3(30), software updates, repairs, new manufacturer status, conformity reassessment.
CRA Support Period FAQ | Placement on the Market, Unit-Level Timing, Update Availability
CRA FAQ on support periods covering Article 13(8), placement on the market timing, unit-level support periods, standalone software, update availability.
CRA Tailor-Made Products FAQ | Business-User Exception, Paid Updates, Evidence
CRA FAQ on tailor-made products covering the narrow business-user carve-out, secure-by-default and paid-update deviations, required evidence.
CRA Technical Documentation FAQ | Annex VII, Languages, Authority Access, Updates
CRA FAQ on technical documentation covering Annex VII content, timing, languages, versioning, authority access, reused documentation, simplified formats.
CRA Transition Period FAQ | Key Dates, Legacy Products, Pre-CRA Stock, RED Interplay
CRA FAQ on the transition period covering entry into force, phased application dates, legacy products, stock and customs timing, standalone software.
CRA Update Availability and Archives FAQ | Article 13(9), Archives, Historical Versions
CRA FAQ on update availability and software archives covering Article 13(9), Article 13(10), Article 13(11), retention of issued security updates.
CRA User Information and Transparency FAQ | Annex II, Support Disclosure, User Notices
CRA FAQ on user information and transparency covering Annex II instructions, support-period disclosure, end-of-support notices, vulnerability notices.
CRA vs RED Cybersecurity Delegated Act | EU Cyber Resilience Act, CRA Product Security and CE Marking
Compare the Cyber Resilience Act with the RED cybersecurity delegated act so you can decide which products fall under which rule, what dates apply.
CRA vs UK PSTI Act | EU Cyber Resilience Act, CRA Product Security and CE Marking
Compare the EU Cyber Resilience Act with the UK PSTI product security regime so your team can plan dual market compliance without mixing two different rule.
CRA Vulnerability Handling FAQ | Lifecycle Duties, Components, Disclosure, Fix Sharing
CRA FAQ on vulnerability handling covering Annex I Part II duties, component vulnerabilities, upstream reporting and fix sharing.
Deadlines and Compliance Calendar | EU Cyber Resilience Act, CRA Product Security and CE Marking
Track the CRA entry into force date, the notified body date, the reporting start date, and the main application date.
Essential Cybersecurity Requirements | EU Cyber Resilience Act, CRA Product Security and CE Marking
Understand the CRA essential cybersecurity requirements in Annex I.
Penalties and Fines | EU Cyber Resilience Act, CRA Product Security and CE Marking
Understand the CRA administrative fine tiers in Article 64, the conduct that attracts the highest penalties, and the evidence that reduces enforcement exposure.
Products with Digital Elements Scope | EU Cyber Resilience Act, CRA Product Security and CE Marking
Understand what counts as a product with digital elements under the CRA, how remote data processing fits, and where the scope boundary usually causes mistakes.
Reporting Obligations | EU Cyber Resilience Act, CRA Product Security and CE Marking
Prepare for CRA Article 14 reporting, including the twenty four hour early warning, the seventy two hour notification, final reports, CSIRT routing.
Requirements | EU Cyber Resilience Act, CRA Product Security and CE Marking
Review the full CRA requirement set, including manufacturer duties, operator duties, support period rules, user information, corrective action, reporting.
SBOM and Vulnerability Management Template | EU Cyber Resilience Act, CRA Product Security and CE Marking
Use this CRA SBOM and vulnerability management template to structure dependency records, triage, remediation, advisory publication, and support period evidence.
Technical Documentation and Audit File | EU Cyber Resilience Act, CRA Product Security and CE Marking
Build a CRA technical documentation file that covers product definition, risk assessment, support period, Annex I mapping, standards use, test evidence.
Vulnerability Handling and Disclosure | EU Cyber Resilience Act, CRA Product Security and CE Marking
Build a CRA vulnerability handling system that covers SBOM, intake, triage, remediation, coordinated vulnerability disclosure, secure updates.