FAQ item index

Search every question across CRA sub-FAQs

Find the exact question, open the source answer card, and copy a direct link to the anchored sub-FAQ response.

Indexed coverage
1072of1072items
Across 40 modules • Updated Mar 10, 2026
Author
Sorena AI
Published
Mar 10, 2026
Updated
Mar 10, 2026
CRA Essential Cybersecurity Requirements

Can user instructions compensate for product design shortcomings?

No.

The CRA requires manufacturers to place a compliant product on the market. Information and instructions can support secure installation, operation, integration and deployment, but the draft guidance says they cannot be used to compensate for product-design shortcomings or to justify leaving incompatible risks untreated.

CRA Essential Cybersecurity Requirements

How should Annex I Part I be read in practice?

Part I, point (2) is a structured set of product-security outcomes that the manufacturer must apply where relevant on the basis of the cybersecurity risk assessment.

It covers, among other things:

- no known exploitable vulnerabilities at placement on the market

- secure-by-default configuration

- the ability to address vulnerabilities through security updates

- protection from unauthorised access

- confidentiality and integrity protection

- data minimisation

- protection of essential and basic functions, including after incidents

- attack-surface reduction

- exploitation-mitigation techniques

- security-related logging and monitoring

- secure removal and transfer of data and settings

Citations
CRA Essential Cybersecurity Requirements

Do the essential requirements apply only to the local device, or to the whole product as placed on the market?

They apply to the whole product.

The Commission FAQ says the cybersecurity risk assessment must cover the entire product with digital elements, including remote data processing when it is in scope and supporting functions that form part of the product. The draft guidance likewise explains that risks from external services, networks and other dependencies may need to be addressed through product-level measures so that the product as a whole complies.

CRA Essential Cybersecurity Requirements

What if a specific essential requirement is incompatible with interoperability needs or with other Union law?

The CRA recognises that this can happen, but it is not a free pass.

If a requirement is not applicable because of the nature of the product, the manufacturer must clearly justify that in the technical documentation. Recital 55 and the Commission FAQ give interoperability as an example. If cybersecurity risks still arise in relation to that inapplicable requirement, the manufacturer must address those risks by other appropriate means.

Citations
CRA Essential Cybersecurity Requirements

Do harmonised standards define the only acceptable way to meet the essential requirements?

No.

Harmonised standards are voluntary and do not replace the manufacturer's own duty to assess risks and demonstrate compliance. They can support conformity, but manufacturers may also use other technical means if they document how the applicable essential requirements are met.

Citations
CRA Essential Cybersecurity Requirements

How do CRA Annex I and Annex II work together on the essential cybersecurity requirements and user information?

Annex I sets the substantive cybersecurity outcomes and processes that the product and manufacturer must meet. Annex II requires the manufacturer to give users the information they need to install, operate, update, integrate and decommission the product securely.

That includes, among other things, the intended purpose, security properties, significant cybersecurity-risk circumstances, support-period information, update information, secure decommissioning information, and information needed by downstream integrators.

Citations
CRA Essential Cybersecurity Requirements

How is a manufacturer expected to show that the CRA essential cybersecurity requirements are actually met?

The CRA does not prescribe one evidence format, but it does require the manufacturer to document how the applicable essential requirements are met.

That means the manufacturer needs to show in the cybersecurity risk assessment and technical documentation:

- which Part I requirements are applicable

- how they are implemented

- how Part I point (1) and Part II are applied

- what technical means, standards, specifications or other solutions are used

- what testing, review or other evidence supports those conclusions

Citations
CRA Essential Cybersecurity Requirements

Do the essential cybersecurity requirements apply only to important or critical products?

No.

The essential cybersecurity requirements in Annex I apply horizontally to all products with digital elements that are in scope. The important or critical classification affects the conformity-assessment route, not whether the Annex I requirements apply in the first place.

Citations
CRA Essential Cybersecurity Requirements

Do the essential cybersecurity requirements apply to each individual unit placed on the market, even when products are manufactured in series?

Yes.

Recital 38 makes clear that the essential cybersecurity requirements, including the vulnerability-handling requirements, apply to each individual product with digital elements when it is placed on the market, whether the product is manufactured as an individual unit or in series. The recital gives a practical example: each individual product placed on the market should already have received all security patches or updates available to address relevant security issues at that time.

Citations
CRA Essential Cybersecurity Requirements

Can a manufacturer transfer responsibility for meeting the essential cybersecurity requirements to users, integrators or other third parties?

No.

The March 2026 draft guidance says the CRA does not allow the manufacturer to transfer cybersecurity risk or responsibility to users or third parties. Information and instructions can support secure deployment, operation or integration, and can inform users about residual risks, but the obligation to place a secure product on the market and demonstrate conformity with the essential cybersecurity requirements remains with the manufacturer.

CRA Essential Cybersecurity Requirements

If identified cybersecurity risks cannot be adequately addressed through appropriate measures, can the product still be placed on the market with warnings or accepted residual risk?

No.

The draft guidance says that where identified risks cannot be adequately addressed through appropriate measures, compliance may require changes to the product's design, functionality or intended purpose. Cost or commercial feasibility alone is not a sufficient reason to leave such risks untreated, and warnings cannot justify placing a product on the market where the remaining risks are incompatible with the essential cybersecurity requirements.

Citations
CRA Essential Cybersecurity Requirements

If interoperability requires a less secure measure or protocol, what do the essential cybersecurity requirements expect?

The CRA allows justified constraints, but not an automatic downgrade.

Where a product must interoperate with existing systems that only support an older or less secure approach, the manufacturer may rely on that approach only if it is necessary for interoperability, the associated risks are identified and documented, and other appropriate mitigation measures are implemented. The draft guidance adds that if it is technically feasible to support both the secure and the less secure option, the secure option is expected to be implemented and enabled by default, while the less secure option should be used only where interoperability requires it.

Citations
CRA Hardware and Software Boundaries

What is the key CRA boundary test for deciding whether software forms part of a hardware product?

The draft guidance says the key question is whether the software is necessary for the product to perform its intended functions in light of the product's intended purpose and reasonably foreseeable use.

The delivery channel is not decisive on its own. What matters is whether the hardware is designed to operate together with that software as part of one product concept.

CRA Hardware and Software Boundaries

Does the delivery channel decide whether software is part of the same CRA product boundary?

No.

Software can still be part of the same product even if it is obtained through a separate channel such as an app store, a manufacturer website or another digital link after the hardware is supplied.

CRA Hardware and Software Boundaries

Can software that is not preloaded on the hardware still be part of the same product?

Yes.

The Commission FAQ expressly lists software placed on the market together with hardware even where it is not preloaded, such as printer drivers, laptop operating systems and tools used to design and program FPGAs.

CRA Hardware and Software Boundaries

Are printer drivers part of the same CRA product as the printer?

They can be.

The Commission FAQ gives printer drivers as an example of software that may be placed on the market together with hardware. The draft guidance then makes the point more explicit: where the printer cannot fulfil its intended purpose without the drivers, the printer and the drivers together constitute a single product with digital elements.

CRA Hardware and Software Boundaries

Can a companion mobile app be part of the same CRA product as a hardware device?

Yes, if it is necessary for the product's intended functionality.

The draft guidance gives the example of a fitness wearable and a companion smartphone app that together form one product because they are designed and intended to operate together to deliver the product's functionality.

CRA Hardware and Software Boundaries

If an app is genuinely optional and the device can still perform its intended functions without it, is it automatically part of the same product?

Not automatically.

The draft guidance points to necessity as the decisive factor. If the device can still perform its intended functions without the app, that points away from treating the app as part of the same combined product, although the exact answer still depends on intended purpose and reasonably foreseeable use.

CRA Hardware and Software Boundaries

When is software more likely to be treated as standalone software rather than part of a CRA hardware product boundary?

It is more likely to be treated as standalone software when it is supplied as software in its own right and is not necessary for a hardware product to perform its intended functions.

The Commission FAQ confirms that standalone downloadable software can itself be a product with digital elements. The draft guidance then distinguishes that case from software that forms part of a hardware-software product.

Page 11 of 54