FAQEUCyber Resilience Act

EU Cyber Resilience Act FAQ Vulnerability Handling

Use this CRA FAQ to understand the lifecycle vulnerability-handling duties in Annex I Part II, what manufacturers must do for component vulnerabilities, and how disclosure and upstream-fix sharing rules work.

Built for product security, engineering, legal, and compliance teams managing vulnerability handling and disclosure under the CRA.

Author
Sorena AI
Published
Mar 10, 2026
Updated
Mar 10, 2026
Sections
29

Structured answer sets in this page tree.

Primary sources
4

Cited legal and guidance references.

Publication metadata
Sorena AI
Published Mar 10, 2026
Updated Mar 10, 2026
Overview

The CRA requires more than just patching: manufacturers must document vulnerabilities, assess risks, handle component issues, maintain disclosure and reporting channels, and keep update distribution working across the support period. This FAQ explains the Annex I Part II lifecycle duties, the limits of Article 13(6) upstream duties, and how vulnerability handling differs from the narrower Article 14 incident-reporting regime.

Search this module

Find a question or answer quickly

29 of 29 sections
Section 1

What does the CRA require manufacturers to do for vulnerability handling over the product lifecycle?

Annex I Part II requires manufacturers to:

- identify and document vulnerabilities and components, including a software bill of materials

- address and remediate vulnerabilities without delay, including through security updates

- apply effective and regular security tests and reviews

- disclose information about fixed vulnerabilities once a security update is available, subject to a limited justified delay option

- enforce a coordinated vulnerability disclosure policy

- facilitate vulnerability reporting, including for third-party components in the product

- provide secure update-distribution mechanisms and, where applicable, automatic security updates

- disseminate security updates without delay and, unless the tailor-made exception applies, free of charge

Citations
Recommended next step

Use EU Cyber Resilience Act FAQ Vulnerability Handling as a cited research workflow

Research Copilot can turn EU Cyber Resilience Act FAQ Vulnerability Handling into a reusable cited workflow for teams implementing EU Cyber Resilience Act FAQ.

Section 2

Does the CRA require a patch for every vulnerability discovered during the support period?

No.

The Commission FAQ says the CRA does not require a patch for every vulnerability. The manufacturer must assess the risk the vulnerability poses and ensure that remedies are put in place without delay. Depending on the risk, the right remedy may be an immediate patch, a mitigation, configuration guidance, an advisory, documentation changes, or another appropriate measure.

Citations
Section 3

What does "without delay" mean in practice for CRA vulnerability handling?

The CRA does not define one universal deadline for remediation under Annex I Part II point (2). The Commission FAQ treats it as risk-based. High-risk vulnerabilities may require immediate patching, while lower-risk issues may be handled through other timely remedies.

What matters is that the manufacturer assesses the vulnerability promptly and takes an appropriate remediation or mitigation path without unjustified delay.

Citations
Section 4

Must CRA security updates be separate from functionality updates?

Where technically feasible, yes.

The CRA says new security updates must be provided separately from functionality updates where technically feasible. Recital 57 explains that this is meant to avoid forcing users to install feature changes just to receive security fixes.

Citations
Section 5

Can a security update and a functionality update be combined in one release?

Yes, where separation is not technically feasible.

The Commission FAQ gives examples where a security fix necessarily changes functionality, such as replacing an unsafe parser with a safer one that changes product behaviour, or disabling a vulnerable interface. In those cases, the CRA does not require artificial separation.

Citations
Section 6

Do vulnerability-handling obligations apply only when the product is first sold?

No.

Manufacturers must ensure, when placing the product on the market and for the support period, that vulnerabilities of the product, including its components, are handled effectively and in accordance with Annex I Part II.

Citations
Section 7

Do vulnerability-handling obligations cover integrated components too?

Yes.

The CRA and the Commission FAQ both state that the vulnerability-handling obligations apply to the product in its entirety, including integrated components.

Citations
Section 8

What must the manufacturer do if it finds a vulnerability in an integrated component?

The manufacturer must report the vulnerability to the person or entity manufacturing or maintaining the component, address and remediate the vulnerability in its own product, and share the relevant code or documentation if it developed a hardware or software modification to fix the component vulnerability.

Citations
Section 9

Can the integrating manufacturer rely on the component manufacturer to fix component vulnerabilities?

Sometimes, but not completely.

If the component is itself subject to CRA obligations, the integrating manufacturer can rely in part on the component manufacturer's vulnerability-handling work. But the integrating manufacturer still has to fulfil the CRA obligations for its own product, including keeping users informed and ensuring the overall product remains compliant.

If the component is not subject to CRA vulnerability-handling obligations, the integrating manufacturer must still handle the issue in its own product, including by other means if necessary.

Citations
Section 10

What if the integrated component is no longer supported by its own developer?

That does not remove the product manufacturer's CRA duty.

The Commission FAQ says that if a product still has an active support period and a vulnerability in an integrated component can no longer be addressed through the component's own support path, the manufacturer of the product must remediate the issue by other means, such as switching out the component or developing a patch autonomously.

Citations
Section 11

Does the manufacturer need to support every version of a software product?

Not always.

Article 13(10) allows the manufacturer, under specific conditions, to ensure compliance with the remediation obligation only for the latest substantially modified version it has placed on the market. That is allowed only if users of earlier versions can access the latest version free of charge and without additional costs to adjust their hardware or software environment.

Section 12

If a hardware product cannot run the latest software version, can the manufacturer stop updating it?

No.

Recital 40 says that where a hardware product is not compatible with the latest version of the operating system it was originally delivered with, the manufacturer should continue to provide security updates at least for the latest compatible version for the support period.

Section 13

Is the manufacturer responsible for users actually installing CRA security updates?

No, but the manufacturer is responsible for making the update path work properly.

The CRA requires mechanisms for secure distribution, automatic security updates where applicable, notification to users, and dissemination without delay. The Commission FAQ says the manufacturer is not responsible under the CRA if a user does not install updates, for example because the user opted out.

Citations
Section 14

Must CRA security updates be free of charge?

Yes, unless the tailor-made exception applies.

Annex I Part II point (8) requires that security updates addressing identified security issues be disseminated without delay and free of charge, unless otherwise agreed between the manufacturer and a business user in relation to a tailor-made product.

Citations
Section 15

Must each CRA security update remain available after release?

Yes.

Article 13(9) says each security update made available during the support period must remain available for at least 10 years after it is issued or for the remainder of the support period, whichever is longer.

Citations
Section 16

Can a manufacturer keep public software archives of older unsupported versions?

Yes.

Article 13(11) says manufacturers may maintain public software archives enhancing user access to historical versions. If they do, users must be clearly informed in an easily accessible manner about the risks associated with using unsupported software.

Citations
Section 17

Must manufacturers test and review product security regularly?

Yes.

Annex I Part II point (3) requires effective and regular tests and reviews of the security of the product. Article 13(7) also requires the manufacturer to systematically document relevant cybersecurity aspects and, where applicable, update the cybersecurity risk assessment.

Citations
Section 18

Must manufacturers publicly disclose information about fixed vulnerabilities?

Yes, once a security update has been made available.

Annex I Part II point (4) requires disclosure of information about fixed vulnerabilities, including the vulnerability description, affected products, impact, severity, and clear remediation information. The CRA allows delay only in duly justified cases where publication risk outweighs publication benefit until users have had the possibility to apply the patch.

Citations
Section 19

Must manufacturers have a coordinated vulnerability disclosure policy and a reporting contact?

Yes.

Annex I Part II points (5) and (6) require a coordinated vulnerability disclosure policy and measures to facilitate sharing of information about potential vulnerabilities, including a contact address. Article 13(17) and Annex II also require a single point of contact for users.

Citations
Section 20

What happens if a vulnerability cannot be fixed adequately?

The manufacturer must take the corrective measures necessary to bring the product back into conformity, or withdraw or recall it, as appropriate.

The Commission FAQ says recall or withdrawal is likely to be exceptional, but it can be required where a very significant vulnerability cannot be adequately addressed, especially for hardware products.

Section 21

Must the manufacturer systematically document vulnerabilities it becomes aware of and update the risk assessment where necessary?

Yes.

Article 13(7) requires the manufacturer to systematically document, in a manner proportionate to the nature and cybersecurity risks, relevant cybersecurity aspects concerning the product, including vulnerabilities of which it becomes aware and relevant information provided by third parties. Where applicable, it must also update the cybersecurity risk assessment.

The Commission FAQ adds that this includes updating the risk assessment where relevant information about the product's cybersecurity emerges from regular tests and reviews.

Citations
Section 22

Is CRA vulnerability handling broader than the mandatory reporting duties in Article 14?

Yes.

Vulnerability handling under Article 13 and Annex I Part II applies more broadly during the support period. It covers identifying, documenting, assessing, remediating, testing, updating, disclosing fixed vulnerabilities, and handling component vulnerabilities.

Article 14 is narrower. It applies only when the manufacturer becomes aware of an actively exploited vulnerability or of a severe incident having an impact on the security of the product. So not every vulnerability-handling event triggers mandatory CRA reporting, even though it may still require remediation or other action under Annex I Part II.

Citations
Section 23

Can a manufacturer voluntarily report vulnerabilities even when Article 14 mandatory reporting does not apply?

Yes.

Article 15 provides for voluntary notification of actively exploited vulnerabilities and severe incidents. The Commission FAQ also gives examples where mandatory reporting does not apply, such as a zero-day vulnerability with no reliable evidence of malicious exploitation, or a vulnerability in an integrated component that is not exploitable in the manufacturer's own product. In those cases, voluntary reporting remains possible.

That does not replace the manufacturer's ordinary vulnerability-handling duties. For example, where the issue concerns an integrated component, Article 13(6) still requires reporting the vulnerability to the person or entity manufacturing or maintaining that component.

Citations
Section 24

Do the manufacturer's vulnerability-handling procedures need to cover both internal findings and external reports?

Yes.

Article 13(8) requires appropriate policies and procedures to process and remediate potential vulnerabilities reported from internal or external sources. So the CRA does not treat internal testing, internal security reviews, researcher disclosures, customer reports, and similar outside inputs as separate optional tracks. The handling process has to be able to deal with both.

ISO/IEC 30111 in the local CRA corpus points in the same direction as practical implementation guidance: it treats vulnerability handling as covering internally found vulnerabilities, externally reported vulnerabilities, and publicly disclosed vulnerabilities that reach the vendor from outside.

Citations
Section 25

Does Article 13(6) require upstream reporting for every security issue involving an integrated component?

No.

The March 2026 draft guidance says manufacturers are required to report upstream only the vulnerabilities that exist in the integrated component itself, and only for the version of that component that they actually integrate. They are not required to report upstream vulnerabilities that arise only from the way the manufacturer integrated that component with its own code or with other components.

The same draft guidance adds that where integration reveals useful security-relevant information about the component that was not apparent in isolation, manufacturers are encouraged to share that information upstream, but that is framed as good practice rather than as the strict Article 13(6) duty.

Section 26

Is upstream reporting or fix-sharing still required if the component has no maintainer or the manufacturer uses its own independent fork?

Not in those cases.

The March 2026 draft guidance says upstream reporting is not required where the component no longer has a maintainer, or where the manufacturer has duplicated a free and open-source component and no longer relies on the original maintainer for new versions or security fixes. But the same guidance also warns that a manufacturer is not treated as maintaining an independent fork if it still relies on the upstream project for new versions or security fixes, for example by regularly synchronising local copies with upstream.

Section 27

Must a security fix shared upstream be machine-readable, and does the CRA require the maintainer to accept it?

The fix should be shared in a machine-readable form where appropriate, but the CRA does not require maintainer acceptance.

The March 2026 draft guidance says a manufacturer sharing an upstream fix should, where appropriate, share it in a machine-readable format, such as a merge request, in a way that can be verified and integrated by the maintainer. For free and open-source components, the fix should be shared in a way compatible with the component's licence, and manufacturers should generally follow the maintainer's guidelines on how fixes should be shared.

But the same guidance is explicit that the CRA does not require manufacturers to ensure that their fixes are accepted or integrated upstream, and it does not require manufacturers to accept a maintainer's proposed fix if they prefer another suitable mitigation.

Section 28

Does the CRA require a bug bounty programme, and can vulnerability reporting be channelled anonymously via a CSIRT?

A bug bounty is not mandatory, but the CRA framework does allow coordinated and even anonymous reporting paths.

Recital 76 says coordinated vulnerability disclosure policies should facilitate the reporting of vulnerabilities either directly to the manufacturer or indirectly and, where requested, anonymously via CSIRTs designated as coordinators under Directive (EU) 2022/2555. The same recital says manufacturers should be able to use bug bounty programmes as part of those policies, but it does not make bug bounties compulsory.

Citations
Section 29

Are the public-disclosure rule for fixed vulnerabilities and the user-notice rule for actively exploited vulnerabilities or severe incidents the same obligation?

No.

Annex I Part II point (4) concerns fixed vulnerabilities: once a security update has been made available, the manufacturer must share and publicly disclose information about those fixed vulnerabilities, subject to the limited justified delay option. Article 14(8), by contrast, concerns actively exploited vulnerabilities and severe incidents and requires manufacturers to inform impacted users and, where appropriate, all users.

The March 2026 draft guidance adds that Article 14(8) is risk-based and proportionate. It does not require indiscriminate public disclosure in every case, and detailed information may in some situations be limited to the relevant affected users or customers.

Citations
Primary sources

References and citations

data.europa.eu29 citations
Referenced sections
  • Article 13(6)-(11), Annex I Part II
  • Annex I Part II point (2), Article 13(8)
  • Annex I Part II point (2), recital 57
Show 22 more
  • Annex I Part II point (2)
  • Article 13(8), recital 34
  • Article 13(6), Article 13(8), recital 34
  • Article 13(6), recital 34
  • Article 13(8), Annex I Part II point (2)
  • Article 13(10), recital 40
  • recital 40
  • Article 6, Annex I Part I point (2)(c), Annex I Part II points (7) and (8), recital 56
  • Annex I Part II point (8), recital 64
  • Article 13(9)
  • Article 13(11)
  • Annex I Part II point (3), Article 13(7)
  • Annex I Part II point (4)
  • Article 13(17), Annex I Part II points (5) and (6), Annex II points 1-2
  • Article 13(21)
  • Article 13(7), Annex I Part II point (3)
  • Article 13(7)-(8), Article 14(1), Article 14(3), Annex I Part II
  • Article 13(6), Article 15
  • Article 13(8), fourth subparagraph
  • Article 13(6)
  • Annex I Part II point (5), recital 76
  • Article 14(8), Annex I Part II point (4)
ec.europa.eu16 citations
Referenced sections
  • section 4.3.1
  • section 4.3.5
  • sections 4.3.6 and 4.3.7
Show 8 more
  • section 4.3.6
  • section 4.3.2
  • section 4.3.3
  • sections 4.2.5 and 4.3.3
  • section 4.3.4
  • section 4.1.8
  • sections 4.3.1 and 5.1
  • sections 5.1 and 5.4
Related guides

Explore more topics

Applicability Test | EU Cyber Resilience Act, CRA Product Security and CE Marking
Use this CRA applicability test to confirm product scope, exclusions, remote data processing boundaries, operator role, product classification.
Checklist | EU Cyber Resilience Act, CRA Product Security and CE Marking
Use this Cyber Resilience Act checklist to assign owners, deadlines, evidence, and release gates for scope, Annex I controls, support period operations.
Compliance Program | EU Cyber Resilience Act, CRA Product Security and CE Marking
Build a CRA compliance program that covers product scope, governance, engineering controls, support period operations, Article 14 reporting.
Conformity Assessment and CE Marking | EU Cyber Resilience Act, CRA Product Security and CE Marking
Choose the right CRA conformity route, prepare the declaration of conformity, structure the technical file.
CRA Blue Guide Concepts FAQ | Placing on the Market, Making Available, Distance Sales
CRA FAQ on Blue Guide concepts used in Cyber Resilience Act interpretation: placing on the market, making available, putting into service, online sales.
CRA CE Marking FAQ | Meaning, Placement Rules, Software Labeling, Notified Bodies
CRA CE marking FAQ covering what the mark means, when it is mandatory, software and website placement rules, packaging fallback, notified body numbers.
CRA Component Due Diligence FAQ | Third-Party Components, FOSS, SBOM, Vulnerabilities
CRA component due diligence FAQ covering third-party components, FOSS, CE-marked components, SBOM review, risk-based checks, upstream vulnerability reporting.
CRA Conformity Assessment Routes FAQ | Module A, Module B+C, Module H, Critical and Important Products
CRA FAQ on conformity assessment routes covering module A, module B+C, module H, important and critical products, harmonised standards, certification schemes.
CRA Core Functionality FAQ | Important Products, Critical Products, Classification
CRA FAQ on core functionality covering classification of important and critical products, ancillary functions, integrated components.
CRA Cybersecurity Risk Assessment FAQ | Article 13, Threat Modelling, Variants, Constraints
CRA FAQ on cybersecurity risk assessment covering Article 13, threat modelling, intended purpose, foreseeable misuse, external dependencies, documentation.
CRA Declaration of Conformity FAQ | Full vs Simplified, Languages, Updates, Duties
CRA FAQ on the EU declaration of conformity covering full and simplified formats, required contents, languages, updates, single declarations across EU laws.
CRA Economic Operators FAQ | Manufacturers, Importers, Distributors, Authorised Representatives
CRA FAQ on economic operators covering manufacturer, authorised representative, importer, distributor, responsible operator rules, checks, traceability.
CRA Essential Cybersecurity Requirements FAQ | Annex I Part I and Part II
CRA FAQ on the essential cybersecurity requirements covering Annex I Part I and Part II, applicability, evidence, interoperability constraints.
CRA FAQ Hub | Blue Guide Concepts, CE Marking, Component Due Diligence
Browse the CRA FAQ hub for Blue Guide market-access concepts, CE marking, and component due diligence.
CRA Hardware and Software Boundaries FAQ | Product Scope, Combined Products, Source Code
CRA FAQ on hardware and software boundaries covering combined products, standalone software, source code, companion apps, remote data processing.
CRA Harmonised Standards and Common Specifications FAQ | Presumption of Conformity, OJ Publication
CRA FAQ on harmonised standards, common specifications, and certification schemes covering presumption of conformity, Official Journal publication.
CRA Important and Critical Products FAQ | Annex III, Annex IV, Core Functionality
CRA FAQ on important and critical products covering Annex III and Annex IV classification, core functionality, conformity routes, FOSS rule limits.
CRA Integrated Components and Dependencies FAQ | Due Diligence, RDPS, Third-Party Components
CRA FAQ on integrated components and dependencies covering due diligence, third-party components, RDPS, cloud dependencies, upstream fixes, FOSS dependencies.
CRA Interplay With Other EU Laws FAQ | RED, AI Act, GDPR, Data Act, EHDS, Machinery
CRA FAQ on interplay with other EU laws covering exclusions, overlap with RED, AI Act, GDPR, Data Act, EHDS, Machinery, GPSR, NIS2, aviation, marine.
CRA Known Exploitable Vulnerabilities at Launch FAQ | Placement on the Market, CVEs, Late Discoveries
CRA FAQ on known exploitable vulnerabilities at launch covering the launch-time rule, exploitability, known vulnerabilities, CVEs, compensating controls.
CRA Legacy Products FAQ | Pre-2027 Products, Reporting, Grandfathering, Substantial Modification
CRA FAQ on legacy products covering pre-11 December 2027 products, Article 14 reporting, continued sale, substantial modification, spare parts, old designs.
CRA Manufacturer Obligations FAQ | Article 13 Duties, Support Period, Reporting, Documentation
CRA FAQ on manufacturer obligations covering Article 13 duties, risk assessment, support periods, vulnerability handling, reporting, documentation.
CRA Market Surveillance and Enforcement FAQ | Authorities, Safeguards, Sweeps, Formal Non-Compliance
CRA FAQ on market surveillance and enforcement covering authorities, investigations, safeguard procedures, formal non-compliance, sweeps, joint activities.
CRA Module A FAQ | Internal Control, Self-Assessment, Eligibility, Documentation
CRA FAQ on module A covering internal control, eligible products, class I limits, FOSS exception, technical documentation, testing, CE marking.
CRA Module B+C FAQ | EU-Type Examination, Conformity to Type, Notified Bodies
CRA FAQ on module B+C covering EU-type examination, conformity to type, notified-body role, certificate changes, production control, CE marking.
CRA Module H FAQ | Full Quality Assurance, Notified Body Surveillance, CE Marking
CRA FAQ on module H covering full quality assurance, quality-system approval, notified-body surveillance, scope changes, CE marking, language rules, records.
CRA Notified Bodies FAQ | Notification, Scope, NANDO, Independence, Competence
CRA FAQ on notified bodies covering notification, competence, independence, NANDO scope, accreditation, cross-border choice, subcontracting.
CRA Open-Source Software FAQ | FOSS, Commercial Activity, Stewards, Donations, Paid Editions
CRA FAQ on open-source software covering FOSS qualification, commercial activity, donations, paid support, stewards, contributors, repositories.
CRA Over-the-Air Updates FAQ | OTA, Automatic Updates, Secure Distribution, Offline Paths
CRA FAQ on over-the-air updates covering OTA versus automatic updates, secure distribution, screenless products, gateways, offline update paths.
CRA Penalties and Fines FAQ | Fine Tiers, Turnover Caps, SME Carve-Outs, Stewards
CRA FAQ on penalties and fines covering Article 64 fine tiers, turnover caps, SME carve-outs, steward exemptions, cumulative fines, criminal sanctions.
CRA Product Families FAQ | Variants, Shared Assessments, Family Reuse, Conformity Scope
CRA FAQ on product families covering shared risk assessments, family-wide documentation reuse, cybersecurity-relevant variant differences.
CRA Remote Data Processing Solutions FAQ | RDPS Scope, Cloud Services, SaaS Boundaries, Documentation
CRA FAQ on remote data processing solutions covering Article 3(2) RDPS tests, cloud-service boundaries, websites and portals, third-party SaaS, backend scope.
CRA Repairs and Spare Parts FAQ | Repairs, Refurbishment, Spare-Part Exemption, Compatibility
CRA FAQ on repairs and spare parts covering substantial modification, Article 2(6) identical spare parts, non-identical replacements.
CRA Reporting Obligations FAQ | Article 14 Deadlines, CSIRT Filing, User Notices, Legacy Products
CRA FAQ on reporting obligations covering Article 14 deadlines, actively exploited vulnerabilities, severe incidents, CSIRT routing, user notifications.
CRA Scope FAQ | Products with Digital Elements, Connections, Software, Exclusions
CRA FAQ on scope and products with digital elements covering software, firmware, components, direct and indirect connections, offline products, exclusions.
CRA Secure-by-Default FAQ | Default Configuration, Auto Updates, Tailor-Made Limits
CRA FAQ on secure by default covering Annex I default configuration, automatic security updates, opt-outs, components, inapplicability.
CRA Security Updates vs Functionality Updates FAQ | Separation, Free Updates, Article 13(10)
CRA FAQ on security updates versus functionality updates covering separation where technically feasible, free security updates, automatic updates.
CRA Substantial Modification FAQ | Post-Market Changes, New Manufacturer, Legacy Products
CRA FAQ on substantial modification covering Article 3(30), software updates, repairs, new manufacturer status, conformity reassessment.
CRA Support Period FAQ | Placement on the Market, Unit-Level Timing, Update Availability
CRA FAQ on support periods covering Article 13(8), placement on the market timing, unit-level support periods, standalone software, update availability.
CRA Tailor-Made Products FAQ | Business-User Exception, Paid Updates, Evidence
CRA FAQ on tailor-made products covering the narrow business-user carve-out, secure-by-default and paid-update deviations, required evidence.
CRA Technical Documentation FAQ | Annex VII, Languages, Authority Access, Updates
CRA FAQ on technical documentation covering Annex VII content, timing, languages, versioning, authority access, reused documentation, simplified formats.
CRA Transition Period FAQ | Key Dates, Legacy Products, Pre-CRA Stock, RED Interplay
CRA FAQ on the transition period covering entry into force, phased application dates, legacy products, stock and customs timing, standalone software.
CRA Update Availability and Archives FAQ | Article 13(9), Archives, Historical Versions
CRA FAQ on update availability and software archives covering Article 13(9), Article 13(10), Article 13(11), retention of issued security updates.
CRA User Information and Transparency FAQ | Annex II, Support Disclosure, User Notices
CRA FAQ on user information and transparency covering Annex II instructions, support-period disclosure, end-of-support notices, vulnerability notices.
CRA vs RED Cybersecurity Delegated Act | EU Cyber Resilience Act, CRA Product Security and CE Marking
Compare the Cyber Resilience Act with the RED cybersecurity delegated act so you can decide which products fall under which rule, what dates apply.
CRA vs UK PSTI Act | EU Cyber Resilience Act, CRA Product Security and CE Marking
Compare the EU Cyber Resilience Act with the UK PSTI product security regime so your team can plan dual market compliance without mixing two different rule.
Deadlines and Compliance Calendar | EU Cyber Resilience Act, CRA Product Security and CE Marking
Track the CRA entry into force date, the notified body date, the reporting start date, and the main application date.
Essential Cybersecurity Requirements | EU Cyber Resilience Act, CRA Product Security and CE Marking
Understand the CRA essential cybersecurity requirements in Annex I.
Penalties and Fines | EU Cyber Resilience Act, CRA Product Security and CE Marking
Understand the CRA administrative fine tiers in Article 64, the conduct that attracts the highest penalties, and the evidence that reduces enforcement exposure.
Products with Digital Elements Scope | EU Cyber Resilience Act, CRA Product Security and CE Marking
Understand what counts as a product with digital elements under the CRA, how remote data processing fits, and where the scope boundary usually causes mistakes.
Reporting Obligations | EU Cyber Resilience Act, CRA Product Security and CE Marking
Prepare for CRA Article 14 reporting, including the twenty four hour early warning, the seventy two hour notification, final reports, CSIRT routing.
Requirements | EU Cyber Resilience Act, CRA Product Security and CE Marking
Review the full CRA requirement set, including manufacturer duties, operator duties, support period rules, user information, corrective action, reporting.
SBOM and Vulnerability Management Template | EU Cyber Resilience Act, CRA Product Security and CE Marking
Use this CRA SBOM and vulnerability management template to structure dependency records, triage, remediation, advisory publication, and support period evidence.
Technical Documentation and Audit File | EU Cyber Resilience Act, CRA Product Security and CE Marking
Build a CRA technical documentation file that covers product definition, risk assessment, support period, Annex I mapping, standards use, test evidence.
Vulnerability Handling and Disclosure | EU Cyber Resilience Act, CRA Product Security and CE Marking
Build a CRA vulnerability handling system that covers SBOM, intake, triage, remediation, coordinated vulnerability disclosure, secure updates.