The Cyber Resilience Act is intended to protect against products with inadequate IT security functions. The requirements affect the entire life cycle. But what does this mean in concrete terms and which companies are affected?
Companies should act now and make cyber security an integral part of their strategy.
(Image: Johannes - stock.adobe.com / AI-generated)
Dr.-Ing. Rodrigo do Carmo is Head of Manufacturing & Information Security at secunet.
The Cyber Resilience Act (CRA) complements the EU cybersecurity strategy by creating the technical basis for secure products and thus making a significant contribution to the security of the internal market. It is primarily aimed at manufacturers, but also contains obligations for importers and distributors with regard to the further marketing of products in the supply chain. The CRA aims to increase the cybersecurity level of hardware and software and protect users from harm.
Whether Small And Medium-Sized Enterprises or Large Corporations: the CRA Applies To All
Whether laptops, smartwatches or networked machines: with a few exceptions, the CRA regulates all products with digital components. In addition to software and hardware products, their solutions for the remote processing of data required for functionality are also affected. This includes all products that process or exchange data. The CRA will therefore also be part of the CE marking that every product must have when it is launched on the market.
This poses technical challenges, particularly in terms of production and maintenance, which can be financially and operationally demanding, especially for small and medium-sized enterprises. CRA-compliant products must contain technical components such as embedded hardware security modules that ensure secure encryption and data integrity protection. The same applies to the exchange of certificates to verify the authenticity of users or entities for which a public key infrastructure is required. Depending on the maturity of the implementation and the risk assessment of the product, companies must provide different budgets for the improvement or implementation of cyber security requirements.
Security Categories And Control: Action Protects Against Penalties
The CRA guarantees compliance with the new requirements through various control mechanisms and sanctions. Manufacturers must prove the conformity of their products through specific procedures, which are divided into different safety categories depending on the type of product and the respective process requirements:
"Basic category" applies to all products with digital components.
"Important products" can be Class I security-related products such as password managers, browsers or systems for the management of security information and events (SIEM) or Class II products with security components such as firewalls, intrusion detection systems and intrusion prevention systems and hypervisors (basic operating systems of virtualized cloud platforms).
"Critical products" are smart meter gateways in smart metering systems, hardware devices with security boxes and smart cards, where security is considered a central feature of the entire product.
Whether companies have to carry out the conformity assessment procedure themselves or involve an external body depends on the respective product category. However, if the implementation of the requirements is not or only insufficiently fulfilled, high fines may be imposed. These can amount to several million euros or up to 2.5 percent of the global turnover of the previous financial year.
Cybersecurity for Greater Resilience: What Companies Should Do Now
To protect their business, companies should act now and make cyber security an integral part of their strategy. To begin with, a GAP analysis is recommended to understand the gaps between the status quo and the requirements of the CRA. Once the weak points have been identified, risks can be assessed and specific measures derived
Established standards and guidelines can provide guidance. Technical standards such as the IEC 62443 family or ISO/IEC 27001 support the introduction of systematic approaches to securing IT and OT systems. EU regulatory frameworks, including the NIS 2 Directive, the RED Directive (Radio Equipment Directive), the General Data Protection Regulation (GDPR) and the new EU Machinery Regulation (MVO), which will come into force in January 2027, provide additional specifications and requirements. Core elements of information security such as risk and vulnerability management are also crucial for a holistic cyber security strategy.
Even if it initially requires capacity and effort, the CRA is an opportunity for companies to become more resilient. And since the CRA was adopted in October 2024, the clock has been ticking: all requirements must be implemented in various stages by December 2027. If companies consider cyber security in all processes from the outset, this can give them a competitive advantage.
Date: 08.12.2025
Naturally, we always handle your personal data responsibly. Any personal data we receive from you is processed in accordance with applicable data protection legislation. For detailed information please see our privacy policy.
Consent to the use of data for promotional purposes
I hereby consent to Vogel Communications Group GmbH & Co. KG, Max-Planck-Str. 7-9, 97082 Würzburg including any affiliated companies according to §§ 15 et seq. AktG (hereafter: Vogel Communications Group) using my e-mail address to send editorial newsletters. A list of all affiliated companies can be found here
Newsletter content may include all products and services of any companies mentioned above, including for example specialist journals and books, events and fairs as well as event-related products and services, print and digital media offers and services such as additional (editorial) newsletters, raffles, lead campaigns, market research both online and offline, specialist webportals and e-learning offers. In case my personal telephone number has also been collected, it may be used for offers of aforementioned products, for services of the companies mentioned above, and market research purposes.
Additionally, my consent also includes the processing of my email address and telephone number for data matching for marketing purposes with select advertising partners such as LinkedIn, Google, and Meta. For this, Vogel Communications Group may transmit said data in hashed form to the advertising partners who then use said data to determine whether I am also a member of the mentioned advertising partner portals. Vogel Communications Group uses this feature for the purposes of re-targeting (up-selling, cross-selling, and customer loyalty), generating so-called look-alike audiences for acquisition of new customers, and as basis for exclusion for on-going advertising campaigns. Further information can be found in section “data matching for marketing purposes”.
In case I access protected data on Internet portals of Vogel Communications Group including any affiliated companies according to §§ 15 et seq. AktG, I need to provide further data in order to register for the access to such content. In return for this free access to editorial content, my data may be used in accordance with this consent for the purposes stated here. This does not apply to data matching for marketing purposes.
Right of revocation
I understand that I can revoke my consent at will. My revocation does not change the lawfulness of data processing that was conducted based on my consent leading up to my revocation. One option to declare my revocation is to use the contact form found at https://contact.vogel.de. In case I no longer wish to receive certain newsletters, I have subscribed to, I can also click on the unsubscribe link included at the end of a newsletter. Further information regarding my right of revocation and the implementation of it as well as the consequences of my revocation can be found in the data protection declaration, section editorial newsletter.