The European Union is moving forward with the implementation of the Cyber Resilience Act (CRA), a groundbreaking piece of legislation that imposes mandatory cybersecurity standards on all products with digital elements sold within the EU market. The act, which officially entered into force on December 10, 2024, mandates a security-by-design approach and ongoing vulnerability management from manufacturers. While full compliance is not required until late 2027, a critical deadline is approaching: manufacturers must have processes in place to report actively exploited vulnerabilities to authorities within 24 hours by September 11, 2026. This requires immediate preparation from all affected companies.
The Cyber Resilience Act represents a major shift from voluntary standards to legally binding requirements for product security. Its primary objectives are:
Key provisions include:
The CRA has a very broad scope and affects virtually any manufacturer, importer, or distributor that sells products with digital components in the EU. This includes:
The most pressing requirement is related to vulnerability reporting. As of September 11, 2026, manufacturers will be obligated to:
To facilitate this, ENISA is developing a single reporting platform for notifications. European standardization bodies (CEN, CENELEC, ETSI) are also working to develop harmonized standards that will help manufacturers demonstrate compliance.
The CRA will be implemented in phases:
Enforcement will be carried out by national market surveillance authorities in each EU member state. These authorities will have the power to order product recalls and impose significant fines for non-compliance. Penalties can be as high as €15 million or 2.5% of the company's total worldwide annual turnover, whichever is higher.
Manufacturers must begin preparing now to meet the 2026 and 2027 deadlines. Key steps include:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats