
The CRA applies to virtually all "products with digital elements" placed on the EU market, from smart bulbs to industrial control systems.
Who is affected? If your product connects to a device or network, it falls under this regulation. Who is excluded? Products already covered by specific sectoral legislation, such as Medical Devices (MDR/IVDR), Vehicles, and Civil Aviation equipment, are generally exempt to avoid double regulation.
The regulation classifies products based on their core functionality:
Important Products (Class I & II): Identity management systems, routers, industrial firewalls, and microcontrollers.
Critical Products: Smart meter gateways and secure elements.
Default (Uncategorized) Products: Everything else. Even "default" products must meet the same essential cybersecurity requirements.
The difference lies in the conformity assessment. While default products often allow for manufacturer self-assessment (Module A), Important and Critical products require stricter evaluation by a Notified Body. This stricter evaluation typically follows one of two paths: the EU type examination (Module B+C) or Module H, which is a Full Quality Assurance system. Module H allows manufacturers with a robust, audited quality system to manage compliance more autonomously compared to the product-by-product testing of Module B+C.
To understand how these categories fit into the broader ecosystem, read our analysis on The CRA as the Cornerstone of the EU Cybersecurity Ecosystem.

Product classification determines your path to compliance. Source: Freepik
The CRA defines the "what" through its Essential Cybersecurity Requirements (Annex I). These are split into two pillars: security properties of the product and vulnerability handling processes. Key obligations include:
Secure by Default: Products must ship with secure settings and offer a "reset" function.
No Known Vulnerabilities: Products cannot be placed on the market with known exploitable vulnerabilities.
Automatic Updates: Security updates should be automatic by default where feasible.
Reporting Obligations (Crucial New Rule): Manufacturers must report actively exploited vulnerabilities and severe incidents to the authorities within strict deadlines: an early warning within 24 hours and a notification within 72 hours.
Early Planning Checklist for CRA Compliance
Implement an SBOM: Generate a machine-readable record of all software components and dependencies.
Establish a Reporting Protocol: Set up a 24/7 channel to ensure you can meet the 24-hour early warning requirement for incidents.
Define the Support Period: Clearly state how long the product will receive security updates (minimum 5 years is the baseline expectation).
Appoint an Authorized Representative: If you are a non-EU manufacturer, you must mandate a representative within the EU to handle authority requests.
Review Your Supply Chain: Perform "due diligence" on all third-party components. If you integrate a component and substantially modify it, you legally become the manufacturer.
Avoiding Common Pitfalls
Many manufacturers underestimate the scope of the CRA. Frequent mistakes include:
Assuming "Not Critical" Means "No Rules": Even unclassified products must meet essential requirements and usually require a CE mark.
Ignoring the "Integrator" Trap: If you import a product and rebrand it or modify its security functions, you assume all manufacturer responsibilities.
Confusing Functional and Security Updates: These must be separated to ensure security patches are not delayed by feature disputes.
When manufacturers integrate the Cyber Resilience Act requirements into their development lifecycle, the benefits extend far beyond avoiding fines:
Market Trust: A CE mark backed by CRA compliance signals to customers that your product is secure and supported.
Supply Chain Transparency: Maintaining an SBOM allows for rapid response when new vulnerabilities emerge.
Reduced Liability: Documented "due diligence" in component selection protects you if a third-party part fails.
By contrast, treating CRA compliance as an afterthought creates massive technical debt. Retrofitting "secure by design" principles or setting up a 24-hour reporting line overnight is virtually impossible. Early adoption transforms compliance from a roadblock into a streamlined process.
The Cyber Resilience Act is reshaping the digital single market. It demands that products be secure by design, free of known vulnerabilities, and supported by a robust incident reporting process. By embedding these requirements early, leveraging tools like SBOMs and Risk Assessments, manufacturers can avoid launch delays and build lasting trust. QIMA CCLab is ready to guide you through every step, from classification to final certification. The best time to start your CRA journey is now. Don't wait for the deadline to catch you off guard!
Understanding the CRA is one thing; proving compliance is another. This is where QIMA CCLab supports manufacturers in navigating the transition from voluntary standards to mandatory EU law. QIMA CCLab provides:
Gap Analysis & Product Classification: Determining whether your product is "Important," "Critical," or "Default" based on its core functionality.
Risk Assessment Support: Helping you build the mandatory risk analysis that underpins your entire technical file.
Vulnerability Handling Process Design: Setting up the organizational workflows for Coordinated Vulnerability Disclosure (CVD) and the critical reporting mechanism.
Pre-Compliance Testing: Conducting penetration tests and fuzzing to ensure "no known vulnerabilities" exist at launch.
Documentation Preparation: Assisting with the creation of the Technical Documentation, including SBOMs and user instructions.
Coordination with Notified Bodies: Guiding you through Module B+C or the comprehensive Module H assessments for critical product categories.
Drawing on deep expertise in industrial and consumer cybersecurity, QIMA CCLab ensures your compliance strategy is not just a paperwork exercise, but a competitive advantage.
What is “Module A” and how does it relate to the CRA?
“Module A” refers to the Internal Production Control conformity assessment procedure. Under the CRA, it allows manufacturers to self-declare conformity if they fully implement relevant harmonised standards. Manufacturers using Module A must implement internal processes ensuring their product meets all essential cybersecurity requirements, then issue an EU Declaration of Conformity, taking full legal responsibility.
What is “Presumption of Conformity” (PoC)?
Presumption of Conformity means that a product is presumed to meet CRA requirements if it complies with harmonised standards (hENs) published in the Official Journal of the European Union. However, PoC only applies to the aspects covered by the standards; any uncovered risks must be handled separately. (Important: No harmonised standards have yet been published under the CRA. Therefore, full Presumption of Conformity is currently impossible, and manufacturers must rely on alternative assessment methods until standards are finalised).
Can all products achieve full PoC under Module A?
No. Under the CRA, only Class I products listed in Annex III (“important products with digital elements”) can achieve full PoC by applying harmonised standards. For other product classes, only partial PoC will be possible.
How do harmonised standards (hEN) support CRA compliance?
Harmonised standards form the technical backbone for demonstrating CRA compliance. The EN 18031 series is expected to form the basis for future CRA harmonised standards. Once published, they will provide manufacturers with clear, recognised methods to meet cybersecurity and vulnerability management requirements. Until published in the Official Journal, compliance must rely on custom technical documentation and risk assessments.
Related Articles