FAQEUCyber Resilience Act

EU Cyber Resilience Act FAQ Harmonised Standards and Common Specifications

Use this CRA FAQ to understand when harmonised standards, common specifications, and certification schemes create presumption of conformity, and how they affect route selection and documentation.

Built for engineering, certification, legal, and compliance teams managing CRA conformity evidence.

Author
Sorena AI
Published
Mar 10, 2026
Updated
Mar 10, 2026
Sections
24

Structured answer sets in this page tree.

Primary sources
4

Cited legal and guidance references.

Publication metadata
Sorena AI
Published Mar 10, 2026
Updated Mar 10, 2026
Overview

The CRA gives harmonised standards, common specifications, and certain European cybersecurity certification schemes a specific legal role in demonstrating conformity. This FAQ focuses on when those tools matter, what limits their legal effect, and how manufacturers should document and monitor their use.

Search this module

Find a question or answer quickly

24 of 24 sections
Section 1

What are harmonised standards, common specifications, and European cybersecurity certification schemes under the CRA?

They are the CRA's main technical conformity tools.

Article 27 gives harmonised standards, common specifications, and certain European cybersecurity certification schemes a specific legal role in demonstrating conformity with the CRA's essential cybersecurity requirements. They do not change the requirements themselves, but they can create a presumption of conformity for the requirements they cover.

Citations
Recommended next step

Use EU Cyber Resilience Act FAQ Harmonised Standards and Common Specifications as a cited research workflow

Research Copilot can turn EU Cyber Resilience Act FAQ Harmonised Standards and Common Specifications into a reusable cited workflow for teams implementing EU Cyber Resilience Act FAQ.

Section 2

Are harmonised standards mandatory under the CRA?

No.

The CRA does not require manufacturers to use harmonised standards. They are a voluntary means of demonstrating conformity. If the manufacturer does not use them, it still has to show compliance with the essential cybersecurity requirements by other technical means and document that approach in the technical documentation.

Citations
Section 3

Does every European, ISO, IEC, or ETSI standard automatically give CRA presumption of conformity?

No.

For harmonised standards, the legal effect depends on publication of the reference in the Official Journal of the European Union. If the reference is not published there, the standard does not create a CRA presumption of conformity. The Blue Guide also explains that the legal effect attaches to the relevant European version published by reference in the Official Journal, not simply to the existence of an ISO or IEC base standard.

Citations
Section 4

What does CRA presumption of conformity mean in practice?

It means the product and the manufacturer's processes are presumed to comply with the specific CRA essential cybersecurity requirements covered by the relevant harmonised standard, common specification, or certification scheme.

That presumption is limited. It applies only to the requirements, or parts of requirements, that the conformity tool actually covers.

Citations
Section 5

Do harmonised standards replace the manufacturer's cybersecurity risk assessment?

No.

The Commission FAQ, drawing on the Blue Guide, states that harmonised standards do not replace the legally binding requirements and do not remove the manufacturer's duty to assess the product's risks and determine which CRA requirements are relevant. The manufacturer still has to check whether the standard actually covers the risks of the product.

Citations
Section 6

What if a harmonised standard covers only part of the product or only part of the relevant requirements?

Then the presumption of conformity extends only to the covered part.

The manufacturer still has to address the remaining risks and requirements through other measures and describe that in the technical documentation. The same logic applies where the manufacturer applies only part of a harmonised standard rather than all of the relevant provisions.

Citations
Section 7

For an important product of class I, is it enough if the harmonised standard covers only the product's core functionality?

Potentially, yes for route selection, but not automatically for full product-wide presumption of conformity.

The draft guidance says an important product of class I can remain eligible for the internal control procedure if all applicable requirements of the relevant conformity tool are applied and its scope covers at least the risks related to the product's core functionality. But where the product has additional functions with additional risks, the manufacturer still has to address those risks separately, and the presumption of conformity remains limited to the parts actually covered.

Section 8

What is the difference between horizontal and vertical harmonised standards in the CRA context?

According to the Commission FAQ, horizontal standards are product-agnostic standards intended to provide a generic framework, methodology, and taxonomy for CRA compliance. Vertical standards are product-specific and are meant to address the risks associated with particular intended purposes and reasonably foreseeable uses, especially for Annex III and Annex IV categories.

Section 9

What happens under the CRA if no relevant harmonised standard exists yet?

The absence of a harmonised standard does not prevent CRA compliance.

Manufacturers can still demonstrate conformity through other technical means. In parallel, Article 27 allows the Commission to adopt common specifications in certain fallback situations, and for important products of class I the absence of the relevant conformity tools can affect which conformity assessment route is available.

Citations
Section 10

When can the Commission adopt CRA common specifications?

Only in the fallback situations set out in Article 27.

The CRA allows common specifications where the Commission has already requested harmonised standards and the request was not accepted, the standards were not delivered on time, or the standards do not comply with the request, and no relevant Official Journal reference exists or is expected within a reasonable period.

Citations
Section 11

Do common specifications stay in place once a harmonised standard is published?

Not for the overlapping subject matter.

When the reference of a harmonised standard is published in the Official Journal, the Commission must repeal overlapping common specifications, or overlapping parts of them, that cover the same essential cybersecurity requirements.

Citations
Section 12

Can a manufacturer rely on non-harmonised standards or its own technical specifications instead?

Yes.

The Blue Guide explains that conformity can also be demonstrated through other standards or technical specifications, including international standards, European standards whose references are not published in the Official Journal, or the manufacturer's own specifications. But those routes do not create a presumption of conformity, so the manufacturer has to demonstrate compliance more directly in the technical documentation.

Citations
Section 13

How do European cybersecurity certification schemes interact with the CRA?

They can support CRA conformity in two ways.

First, Article 27(8) gives a presumption of conformity insofar as the EU statement of conformity or certificate under the scheme covers the relevant CRA requirements. Second, where the Commission specifies a scheme under Article 27(9), a European cybersecurity certificate at assurance level at least substantial eliminates the obligation to carry out a separate third-party CRA conformity assessment for the corresponding requirements.

Citations
Section 14

Can important or critical products be compliant even if they do not use harmonised standards?

Yes.

The use of harmonised standards is voluntary. Important and critical products can still be compliant without them, but that can affect the conformity assessment route. In particular, important products of class I move out of the internal control route when the relevant harmonised standards, common specifications, or specified certification schemes are not applied or do not exist.

Citations
Section 15

Can a manufacturer integrate important or critical components that were not designed in accordance with harmonised standards?

Yes.

The Commission FAQ says manufacturers are free to integrate important or critical components that do not follow harmonised standards. Harmonised standards are one way to demonstrate compliance, not a condition for integrating a component.

Section 16

What must the technical documentation say about harmonised standards, common specifications, or certification schemes?

It must identify what was applied and what was not.

Annex VII requires the manufacturer to list the harmonised standards, common specifications, and European cybersecurity certification schemes applied in full or in part. If they were only partly applied, the documentation must specify which parts were used. If they were not applied, the documentation must describe the other solutions adopted and list other relevant technical specifications used to meet the CRA requirements.

Section 17

What happens if the relevant harmonised standards, common specifications, or certification schemes change after a product is already in series production?

The manufacturer has to take those changes into account.

Article 13(14) requires manufacturers to ensure that series products remain in conformity and to adequately take account of changes in the standards, common specifications, or certification schemes by reference to which conformity is declared or verified. The Blue Guide also explains that revised harmonised standards can involve coexistence periods and that manufacturers should monitor Official Journal publications and assess whether updates are needed.

Citations
Section 18

Does relying on harmonised standards, common specifications, or certification schemes prevent CRA enforcement action?

No.

The CRA expressly allows enforcement action where a product's non-compliance is attributed to shortcomings in harmonised standards, common specifications, or certification schemes. In those cases, the Commission can trigger the relevant safeguard or amendment process for the conformity tool itself.

Citations
Section 19

Does the CRA standardisation request, or a harmonised standard that is still unpublished in the Official Journal, already create CRA presumption of conformity?

No.

The standardisation request starts the standards-development process, but it does not itself create presumption of conformity. Even after a European standard is adopted by the ESOs, Article 27(6) requires the Commission to assess it before publishing its reference in the Official Journal. The Blue Guide explains that the publication of the reference in the Official Journal is what starts the presumption of conformity, and that publication is not automatic.

Citations
Section 20

Are common specifications a general mandatory substitute for harmonised standards under the CRA?

No.

Common specifications are an exceptional fallback tool, not a general first-line or automatically mandatory substitute for harmonised standards. Under Article 27(2), the Commission may adopt them only after a standardisation request has already been made and that process has failed, been delayed or not complied with the request, and only where no relevant Official Journal reference has been published or is expected within a reasonable period. Recital 85 explains that this reasonable period should not exceed one year after the drafting deadline. If a manufacturer does not apply the common specifications, it must document what other solutions it uses to meet the CRA requirements.

Citations
Section 21

For an important product of class I, can a manufacturer keep the internal control route if it applies only some of the applicable provisions of the relevant harmonised standard, common specification or certification scheme?

No.

Article 32(2) says that if the manufacturer has not applied, or has applied only in part, the relevant harmonised standards, common specifications or European cybersecurity certification schemes, the product and the manufacturer's processes must be submitted for the corresponding requirements to one of the third-party conformity assessment routes. The draft guidance adds that, to remain eligible for internal control, all applicable requirements of the relevant harmonised standard need to be applied and its scope needs to cover at least the risks related to the product's core functionality.

Section 23

Can a harmonised standard under another EU product law, or the ISO/IEC source text behind a European standard, automatically give CRA presumption of conformity?

No.

As an inference from Article 27 and the Blue Guide, CRA presumption of conformity attaches to the European standard version whose reference is published in the Official Journal for the relevant legal coverage. A standard harmonised under another Union act, or an ISO or IEC base text on its own, can still be used as another technical specification, but it does not automatically create CRA presumption of conformity under the CRA.

Citations
Section 24

What happens if a harmonised standard is revised, published with restrictions, or withdrawn from the Official Journal?

The legal effect can narrow or end.

The Blue Guide explains that the Commission may publish a reference with restrictions, or later maintain, restrict or withdraw the reference after the relevant objection procedures. When a standard is revised, the Official Journal often sets a coexistence period during which both the old and revised references still give presumption of conformity. After the withdrawal date, only the revised standard continues to do so. Manufacturers therefore need to monitor Official Journal publications and take account of those changes for future conformity work and for ongoing series production.

Citations
Primary sources

References and citations

data.europa.eu22 citations
Referenced sections
  • Article 27(1)-(9)
  • Article 27(1), Annex VII point 5
  • Article 27(1)
Show 14 more
  • Article 27(1), Article 27(5), Article 27(8)
  • Article 13(2)-(4), Article 27(1)
  • Article 32(2)
  • Article 27(2), Article 32(2), Annex VII point 5
  • Article 27(2)-(4)
  • Article 27(6)
  • Annex VII point 5
  • Article 27(8)-(9), Article 32(2)-(4)
  • Article 27, Article 32(2)-(4)
  • Article 13(14)
  • Article 54(6)(b), Article 55(3)-(5)
  • Article 27(1), Article 27(6)
  • recital 84, recital 85, recital 87, Article 27(2)-(5), Annex VII point 5
  • Article 27(8)-(9), Article 32(2)-(3)
eur-lex.europa.eu10 citations
Referenced sections
  • sections 4.1.2.2 and 4.1.3
  • sections 4.1.2.2 and 4.1.2.3
  • section 4.1.2.2
Show 4 more
  • section 4.1.3
  • sections 4.1.2.3, 4.1.2.5 and 4.4
  • sections 4.1.2.3 and 4.1.3
  • sections 4.1.2.3, 4.1.2.4 and 4.1.2.5
Related guides

Explore more topics

Applicability Test | EU Cyber Resilience Act, CRA Product Security and CE Marking
Use this CRA applicability test to confirm product scope, exclusions, remote data processing boundaries, operator role, product classification.
Checklist | EU Cyber Resilience Act, CRA Product Security and CE Marking
Use this Cyber Resilience Act checklist to assign owners, deadlines, evidence, and release gates for scope, Annex I controls, support period operations.
Compliance Program | EU Cyber Resilience Act, CRA Product Security and CE Marking
Build a CRA compliance program that covers product scope, governance, engineering controls, support period operations, Article 14 reporting.
Conformity Assessment and CE Marking | EU Cyber Resilience Act, CRA Product Security and CE Marking
Choose the right CRA conformity route, prepare the declaration of conformity, structure the technical file.
CRA Blue Guide Concepts FAQ | Placing on the Market, Making Available, Distance Sales
CRA FAQ on Blue Guide concepts used in Cyber Resilience Act interpretation: placing on the market, making available, putting into service, online sales.
CRA CE Marking FAQ | Meaning, Placement Rules, Software Labeling, Notified Bodies
CRA CE marking FAQ covering what the mark means, when it is mandatory, software and website placement rules, packaging fallback, notified body numbers.
CRA Component Due Diligence FAQ | Third-Party Components, FOSS, SBOM, Vulnerabilities
CRA component due diligence FAQ covering third-party components, FOSS, CE-marked components, SBOM review, risk-based checks, upstream vulnerability reporting.
CRA Conformity Assessment Routes FAQ | Module A, Module B+C, Module H, Critical and Important Products
CRA FAQ on conformity assessment routes covering module A, module B+C, module H, important and critical products, harmonised standards, certification schemes.
CRA Core Functionality FAQ | Important Products, Critical Products, Classification
CRA FAQ on core functionality covering classification of important and critical products, ancillary functions, integrated components.
CRA Cybersecurity Risk Assessment FAQ | Article 13, Threat Modelling, Variants, Constraints
CRA FAQ on cybersecurity risk assessment covering Article 13, threat modelling, intended purpose, foreseeable misuse, external dependencies, documentation.
CRA Declaration of Conformity FAQ | Full vs Simplified, Languages, Updates, Duties
CRA FAQ on the EU declaration of conformity covering full and simplified formats, required contents, languages, updates, single declarations across EU laws.
CRA Economic Operators FAQ | Manufacturers, Importers, Distributors, Authorised Representatives
CRA FAQ on economic operators covering manufacturer, authorised representative, importer, distributor, responsible operator rules, checks, traceability.
CRA Essential Cybersecurity Requirements FAQ | Annex I Part I and Part II
CRA FAQ on the essential cybersecurity requirements covering Annex I Part I and Part II, applicability, evidence, interoperability constraints.
CRA FAQ Hub | Blue Guide Concepts, CE Marking, Component Due Diligence
Browse the CRA FAQ hub for Blue Guide market-access concepts, CE marking, and component due diligence.
CRA Hardware and Software Boundaries FAQ | Product Scope, Combined Products, Source Code
CRA FAQ on hardware and software boundaries covering combined products, standalone software, source code, companion apps, remote data processing.
CRA Important and Critical Products FAQ | Annex III, Annex IV, Core Functionality
CRA FAQ on important and critical products covering Annex III and Annex IV classification, core functionality, conformity routes, FOSS rule limits.
CRA Integrated Components and Dependencies FAQ | Due Diligence, RDPS, Third-Party Components
CRA FAQ on integrated components and dependencies covering due diligence, third-party components, RDPS, cloud dependencies, upstream fixes, FOSS dependencies.
CRA Interplay With Other EU Laws FAQ | RED, AI Act, GDPR, Data Act, EHDS, Machinery
CRA FAQ on interplay with other EU laws covering exclusions, overlap with RED, AI Act, GDPR, Data Act, EHDS, Machinery, GPSR, NIS2, aviation, marine.
CRA Known Exploitable Vulnerabilities at Launch FAQ | Placement on the Market, CVEs, Late Discoveries
CRA FAQ on known exploitable vulnerabilities at launch covering the launch-time rule, exploitability, known vulnerabilities, CVEs, compensating controls.
CRA Legacy Products FAQ | Pre-2027 Products, Reporting, Grandfathering, Substantial Modification
CRA FAQ on legacy products covering pre-11 December 2027 products, Article 14 reporting, continued sale, substantial modification, spare parts, old designs.
CRA Manufacturer Obligations FAQ | Article 13 Duties, Support Period, Reporting, Documentation
CRA FAQ on manufacturer obligations covering Article 13 duties, risk assessment, support periods, vulnerability handling, reporting, documentation.
CRA Market Surveillance and Enforcement FAQ | Authorities, Safeguards, Sweeps, Formal Non-Compliance
CRA FAQ on market surveillance and enforcement covering authorities, investigations, safeguard procedures, formal non-compliance, sweeps, joint activities.
CRA Module A FAQ | Internal Control, Self-Assessment, Eligibility, Documentation
CRA FAQ on module A covering internal control, eligible products, class I limits, FOSS exception, technical documentation, testing, CE marking.
CRA Module B+C FAQ | EU-Type Examination, Conformity to Type, Notified Bodies
CRA FAQ on module B+C covering EU-type examination, conformity to type, notified-body role, certificate changes, production control, CE marking.
CRA Module H FAQ | Full Quality Assurance, Notified Body Surveillance, CE Marking
CRA FAQ on module H covering full quality assurance, quality-system approval, notified-body surveillance, scope changes, CE marking, language rules, records.
CRA Notified Bodies FAQ | Notification, Scope, NANDO, Independence, Competence
CRA FAQ on notified bodies covering notification, competence, independence, NANDO scope, accreditation, cross-border choice, subcontracting.
CRA Open-Source Software FAQ | FOSS, Commercial Activity, Stewards, Donations, Paid Editions
CRA FAQ on open-source software covering FOSS qualification, commercial activity, donations, paid support, stewards, contributors, repositories.
CRA Over-the-Air Updates FAQ | OTA, Automatic Updates, Secure Distribution, Offline Paths
CRA FAQ on over-the-air updates covering OTA versus automatic updates, secure distribution, screenless products, gateways, offline update paths.
CRA Penalties and Fines FAQ | Fine Tiers, Turnover Caps, SME Carve-Outs, Stewards
CRA FAQ on penalties and fines covering Article 64 fine tiers, turnover caps, SME carve-outs, steward exemptions, cumulative fines, criminal sanctions.
CRA Product Families FAQ | Variants, Shared Assessments, Family Reuse, Conformity Scope
CRA FAQ on product families covering shared risk assessments, family-wide documentation reuse, cybersecurity-relevant variant differences.
CRA Remote Data Processing Solutions FAQ | RDPS Scope, Cloud Services, SaaS Boundaries, Documentation
CRA FAQ on remote data processing solutions covering Article 3(2) RDPS tests, cloud-service boundaries, websites and portals, third-party SaaS, backend scope.
CRA Repairs and Spare Parts FAQ | Repairs, Refurbishment, Spare-Part Exemption, Compatibility
CRA FAQ on repairs and spare parts covering substantial modification, Article 2(6) identical spare parts, non-identical replacements.
CRA Reporting Obligations FAQ | Article 14 Deadlines, CSIRT Filing, User Notices, Legacy Products
CRA FAQ on reporting obligations covering Article 14 deadlines, actively exploited vulnerabilities, severe incidents, CSIRT routing, user notifications.
CRA Scope FAQ | Products with Digital Elements, Connections, Software, Exclusions
CRA FAQ on scope and products with digital elements covering software, firmware, components, direct and indirect connections, offline products, exclusions.
CRA Secure-by-Default FAQ | Default Configuration, Auto Updates, Tailor-Made Limits
CRA FAQ on secure by default covering Annex I default configuration, automatic security updates, opt-outs, components, inapplicability.
CRA Security Updates vs Functionality Updates FAQ | Separation, Free Updates, Article 13(10)
CRA FAQ on security updates versus functionality updates covering separation where technically feasible, free security updates, automatic updates.
CRA Substantial Modification FAQ | Post-Market Changes, New Manufacturer, Legacy Products
CRA FAQ on substantial modification covering Article 3(30), software updates, repairs, new manufacturer status, conformity reassessment.
CRA Support Period FAQ | Placement on the Market, Unit-Level Timing, Update Availability
CRA FAQ on support periods covering Article 13(8), placement on the market timing, unit-level support periods, standalone software, update availability.
CRA Tailor-Made Products FAQ | Business-User Exception, Paid Updates, Evidence
CRA FAQ on tailor-made products covering the narrow business-user carve-out, secure-by-default and paid-update deviations, required evidence.
CRA Technical Documentation FAQ | Annex VII, Languages, Authority Access, Updates
CRA FAQ on technical documentation covering Annex VII content, timing, languages, versioning, authority access, reused documentation, simplified formats.
CRA Transition Period FAQ | Key Dates, Legacy Products, Pre-CRA Stock, RED Interplay
CRA FAQ on the transition period covering entry into force, phased application dates, legacy products, stock and customs timing, standalone software.
CRA Update Availability and Archives FAQ | Article 13(9), Archives, Historical Versions
CRA FAQ on update availability and software archives covering Article 13(9), Article 13(10), Article 13(11), retention of issued security updates.
CRA User Information and Transparency FAQ | Annex II, Support Disclosure, User Notices
CRA FAQ on user information and transparency covering Annex II instructions, support-period disclosure, end-of-support notices, vulnerability notices.
CRA vs RED Cybersecurity Delegated Act | EU Cyber Resilience Act, CRA Product Security and CE Marking
Compare the Cyber Resilience Act with the RED cybersecurity delegated act so you can decide which products fall under which rule, what dates apply.
CRA vs UK PSTI Act | EU Cyber Resilience Act, CRA Product Security and CE Marking
Compare the EU Cyber Resilience Act with the UK PSTI product security regime so your team can plan dual market compliance without mixing two different rule.
CRA Vulnerability Handling FAQ | Lifecycle Duties, Components, Disclosure, Fix Sharing
CRA FAQ on vulnerability handling covering Annex I Part II duties, component vulnerabilities, upstream reporting and fix sharing.
Deadlines and Compliance Calendar | EU Cyber Resilience Act, CRA Product Security and CE Marking
Track the CRA entry into force date, the notified body date, the reporting start date, and the main application date.
Essential Cybersecurity Requirements | EU Cyber Resilience Act, CRA Product Security and CE Marking
Understand the CRA essential cybersecurity requirements in Annex I.
Penalties and Fines | EU Cyber Resilience Act, CRA Product Security and CE Marking
Understand the CRA administrative fine tiers in Article 64, the conduct that attracts the highest penalties, and the evidence that reduces enforcement exposure.
Products with Digital Elements Scope | EU Cyber Resilience Act, CRA Product Security and CE Marking
Understand what counts as a product with digital elements under the CRA, how remote data processing fits, and where the scope boundary usually causes mistakes.
Reporting Obligations | EU Cyber Resilience Act, CRA Product Security and CE Marking
Prepare for CRA Article 14 reporting, including the twenty four hour early warning, the seventy two hour notification, final reports, CSIRT routing.
Requirements | EU Cyber Resilience Act, CRA Product Security and CE Marking
Review the full CRA requirement set, including manufacturer duties, operator duties, support period rules, user information, corrective action, reporting.
SBOM and Vulnerability Management Template | EU Cyber Resilience Act, CRA Product Security and CE Marking
Use this CRA SBOM and vulnerability management template to structure dependency records, triage, remediation, advisory publication, and support period evidence.
Technical Documentation and Audit File | EU Cyber Resilience Act, CRA Product Security and CE Marking
Build a CRA technical documentation file that covers product definition, risk assessment, support period, Annex I mapping, standards use, test evidence.
Vulnerability Handling and Disclosure | EU Cyber Resilience Act, CRA Product Security and CE Marking
Build a CRA vulnerability handling system that covers SBOM, intake, triage, remediation, coordinated vulnerability disclosure, secure updates.