Book an Appointment
EU Cyber Resilience Act

EU Cyber Resilience Act (CRA) – From CRA Gap Analysis to Conformity Assessment

We support manufacturers, importers, and distributors with CRA compliance across the entire product lifecycle: Security by Design, Security by Default, vulnerability management, incident reporting processes, and robust evidence management.

CRA in a Nutshell: How to Make Your Products Cyber-Secure

The CRA consolidates product obligations, vulnerability handling, supply chain transparency, and user information requirements into four central pillars. The CRA requires security measures across the entire product lifecycle – not just at initial release.

With the Cyber Resilience Act, the EU establishes a binding legal framework to ensure the security of products with digital elements throughout their entire lifecycle. Manufacturers, importers, and distributors are required to consider Security by Design from the development stage.

Sep 2026Reporting obligations active
Dec 2027Full CRA compliance
€15Mmax. fine for violations
4 Pillars of the CRA

CRA Requirements at a Glance

01

Product requirements: Adequate cybersecurity level, Security-by-Design, Security-by-Default, protection of confidentiality, integrity, and availability

02

Vulnerability handling: Accept reports, regular testing, free security updates with user notification, public vulnerability disclosure

03

Third-party components & supply chain: Software Bill of Materials (SBOM), due diligence for third-party components, tracking potential vulnerabilities to suppliers

04

Minimum manufacturer information: Vulnerability contact point, product identification, intended use information, EU Declaration of Conformity

05

Reporting obligations active from September 11, 2026: 24h early warning, 72h notification, final report within 14 days/1 month

06

Full CRA compliance required by December 11, 2027

Security by Design —
across the entire lifecycle.

The CRA requires security measures not only at release, but continuously — from development to end-of-life.

From Sep 11, 2026

Reporting Obligations for Actively Exploited Vulnerabilities

CRA reporting is a regulatory timeline architecture. Manufacturers bear the burden of proof and assessment for when a reporting trigger occurs and when the deadline starts.

24h

Early Warning

Immediate initial report to ENISA/national authority for actively exploited vulnerabilities.

72h

Notification

Detailed assessment with countermeasures, severity, and affected products.

14 Days

Final Report

Complete vulnerability report including root cause and measures taken.

1 Month

Incident Report

Final report for severe security incidents.

Our Services

Your CRA Compliance at a Glance

Complete Asset Inventories

Systematic capture of digital products, components, and dependencies. Foundation for all subsequent CRA measures.

Vulnerability Management

Continuous identification, assessment, and remediation of vulnerabilities with clear response times per CRA requirements.

Documentation Processes

Structured capture of measures, risk assessments, and compliance evidence – audit-ready and CE-compliant.

Incident Reporting & Obligations

CRA reporting is a regulatory timeline architecture. Manufacturers bear the burden of proof and assessment when a reporting trigger occurs and when the deadline starts.

ISMS & CSMS Integration

Efficiency through integration: Linking ISMS, CSMS, and development processes creates synergies instead of additional bureaucracy.

Team Training

Development and security teams understand Secure-by-Design. Security culture is embedded – for developers, product managers, and executives.

CRA Navigator®

EU CRA Navigator — Are You Prepared?

In collaboration with JUN Legal, we developed the CRA Navigator — a tool for a well-founded initial orientation on the requirements of the EU Cyber Resilience Act.

Impact Check

Immediate assessment of whether and how your products fall under CRA requirements.

Quick Gap Analysis

Quickly identify structural gaps in your security and development processes.

Legally Sound Guidance

Clear classification from secure development methods to vulnerability handling.

Standards & Frameworks

Integrated into Your Existing Compliance Structures

KertosOneTrustVantaTrustSpaceInterValidServiceNowAtlassianDrataSecfixISMS.onlineKertosOneTrustVantaTrustSpaceInterValidServiceNowAtlassianDrataSecfixISMS.online
WizMicrosoft PurviewSAP GRCRSA ArcherMetricStreamLogicGateQualysCompliance.aiNAVEX GlobalDiligentWizMicrosoft PurviewSAP GRCRSA ArcherMetricStreamLogicGateQualysCompliance.aiNAVEX GlobalDiligent
Approach

5 Steps to CRA Readiness

01

Complete Asset Inventories

Systematic capture of digital products, components, and dependencies.

02

Vulnerability Management

Continuous identification, assessment, and remediation with clear response times.

03

Documentation Processes

Structured capture of measures, risk assessments, and compliance evidence.

04

Team Training

Development and security teams understand Secure-by-Design; security culture is embedded.

05

CE Conformity Assessment

Creation of technical documentation, conformity assessment execution, and CE marking per product category.

Cyber-secure products —
from development to end-of-life.

The CRA makes cybersecurity mandatory for all digital products on the EU market.

CRA Services

Our Services for Your CRA Compliance

CRA Gap AnalysisProduct ClassificationSecure Development LifecycleThreat ModelingSBOM ManagementVulnerability ManagementCE Conformity AssessmentTechnical DocumentationReporting Obligations & Incident ResponseDeveloper & Management TrainingISMS & CSMS IntegrationPre-Audits & Mock Assessments

Product Categories Under CRA

Standard products (smartphones, control software) require a self-declaration. Important Class I (IAM, VPN, routers) require harmonized standards or third-party testing. Critical Class II (firewalls, HSMs, smart cards) mandatorily require assessment by a notified body.

FAQ

Frequently Asked Questions

Ganzheitliche CRA-Compliance

Ein Ansprechpartner. Zwei Expertisen. Von der technischen Produktprüfung bis zum Cyber Security Management System — alles aus einer Hand.

Valeri Milke
Ihr Ansprechpartner

Valeri Milke

Begleitet Sie persönlich durch Ihre CRA-Compliance — technisch wie organisatorisch.

Produktsicherheit
Technische Produktsicherheit

Technische Prüfung Ihrer Produkte entlang des gesamten Entwicklungszyklus — vom Design bis zur Konformitätsbewertung nach CRA.

  • Threat Modeling & Security-by-Design
  • Source Code Reviews
  • Security-Testing in CI/CD (SAST, SCA)
  • Penetrationstests
  • Konformitätsbewertung nach CRA
CSMS & Prozesse
CSMS, Organisation & Prozesse

Aufbau tragfähiger Security-Strukturen im Unternehmen — vom Managementsystem bis zu den Meldepflichten gemäß CRA.

  • Aufbau & Implementierung des CSMS
  • SSDLC-Prozesse & Security-Governance
  • Incident Management & PSIRT
  • Meldepflichten nach CRA (24 h / 72 h)
  • CRA-Compliance-Strategie

Ensure CRA Compliance in Time

From CRA gap analysis to conformity assessment – your partner for secure and CE-compliant products. Book CRA experts now.

Book Consultation