Getting Started with the Cyber Resilience Act
The Cyber Resilience Act (CRA) establishes mandatory cybersecurity requirements for products with digital elements sold on the EU market. This covers hardware and software products that can connect to a device or network - from IoT devices and operating systems to firmware and standalone software applications. The CRA entered into force on December 10, 2024. Reporting obligations for actively exploited vulnerabilities begin September 11, 2026, and the full set of product security requirements becomes enforceable on December 11, 2027. Matproof maps CRA obligations to controls, evidence workflows, and vulnerability management processes so manufacturers can demonstrate compliance to market surveillance authorities.Activate the CRA under Settings - Frameworks - Cyber Resilience Act. Controls are pre-populated based on whether your products are classified as default, important (Class I or II), or critical.
Am I in Scope?
The CRA applies to any organization that places products with digital elements on the EU market:| Role | Definition | Key Obligations |
|---|---|---|
| Manufacturer | Develops or has a product developed and markets it under their name | Full compliance: secure by design, vulnerability handling, technical documentation, conformity assessment |
| Importer | Places a product from a non-EU manufacturer on the EU market | Verify manufacturer compliance, ensure product bears CE marking, maintain documentation |
| Distributor | Makes a product available on the EU market (without modifying it) | Verify CE marking and documentation, report known vulnerabilities to manufacturer |
Product Classification
The CRA uses a tiered classification for products with digital elements:| Category | Examples | Conformity Assessment |
|---|---|---|
| Default | Most consumer and business software, IoT devices without critical functions | Self-assessment (Annex VIII) |
| Important - Class I | Password managers, VPNs, network management systems, security information and event management (SIEM) | Harmonised standard or third-party assessment |
| Important - Class II | Operating systems, firewalls, tamper-resistant microprocessors, industrial automation systems | Third-party assessment required |
| Critical | Hardware devices with security boxes, smart meter gateways, smartcards | European cybersecurity certification required |
Key Enforcement Dates
| Date | Milestone |
|---|---|
| December 10, 2024 | Regulation enters into force |
| June 11, 2026 | Conformity assessment bodies can begin operating |
| September 11, 2026 | Vulnerability and incident reporting obligations apply |
| December 11, 2027 | Full enforcement - all product security requirements, conformity assessments, penalties apply |
Core Requirements in Matproof
Secure by Design
ControlsProducts must be designed and developed with appropriate cybersecurity measures from the start. No known exploitable vulnerabilities at time of release.
Vulnerability Handling
Incidents, ControlsManufacturers must identify and remediate vulnerabilities throughout the product’s expected lifetime (minimum 5 years). Provide security updates free of charge.
Technical Documentation
Evidence, PoliciesMaintain documentation covering security architecture, risk assessment, SBOM (Software Bill of Materials), and testing results.
Conformity Assessment
Audit ProgramsComplete the applicable conformity assessment procedure before placing the product on the market. Affix CE marking.
Incident Reporting
IncidentsReport actively exploited vulnerabilities to ENISA within 24 hours of becoming aware. Report severe incidents within 72 hours.
Security Updates
ControlsProvide timely, free security updates for the entire support period. Document your update delivery mechanism.
Recommended Implementation Plan
List every product your organization manufactures, imports, or distributes that connects to a device or network.
From September 2026, you must report actively exploited vulnerabilities to ENISA within 24 hours of becoming aware. Set up your reporting workflow before this deadline.
Penalties
| Violation | Maximum Penalty |
|---|---|
| Essential cybersecurity requirements (Annex I) | Up to 15M EUR or 2.5% of global annual turnover, whichever is higher |
| Other CRA obligations | Up to 10M EUR or 2% of global annual turnover, whichever is higher |
| Incorrect or misleading information to authorities | Up to 5M EUR or 1% of global annual turnover, whichever is higher |
Next Steps
- Risk Management - product security risk assessments
- Incidents - vulnerability reporting and handling workflows
- Audit Programs - conformity assessment procedures
- Vendor Risk - managing third-party component risks in your supply chain