CRA Guide

EU Cyber Resilience Act — Article by Article

Plain-English explanations of every CRA obligation relevant to manufacturers of products with digital elements. Effective September 2026.

CVD & Incident Reporting

Product & Manufacturer Obligations

Annexes — Product Classification

Other Articles

Annex II

Information and Instructions to Users Required Under the CRA

Annex II defines the minimum information and instructions that manufacturers must provide to users of products with digital elements. This user-facing information package is a legally required element of CRA compliance - it enables users to assess the security properties of a product before purchase and to take appropriate action throughout the product's lifetime. Failure to provide the required information is a CRA violation subject to penalties under Article 32.

Read →
Annex IX

Simplified EU Declaration of Conformity for Space-Constrained Products

Annex IX provides a simplified format for the EU Declaration of Conformity intended for products where space, form factor, or product type makes it impractical to include the full Annex V declaration in the packaging or product documentation. The simplified declaration contains a short statement and a URL pointing to the full online declaration. It is most commonly used for miniaturised hardware products, embedded components, and digital products distributed without physical packaging.

Read →
Annex VII

Technical Documentation Requirements Under the CRA

Annex VII specifies the content of the technical documentation that manufacturers must prepare and maintain to support CRA compliance. The technical file is the complete evidence base demonstrating that a product meets the essential requirements - it includes product design documentation, cybersecurity risk assessments, software bills of materials, test results, and references to the CVD policy. This documentation must be available to market surveillance authorities on request and must be maintained for 10 years after the last product is placed on the market.

Read →
Annex VIII

List of Harmonised Standards and Technical Specifications

Annex VIII is the reference list of harmonised European standards and technical specifications published in the EU Official Journal that create a presumption of conformity with CRA essential requirements. Manufacturers who apply listed standards benefit from the presumption of conformity under Article 8 - meaning authorities cannot challenge compliance for requirements covered by those standards without evidence of non-compliance. The list evolves as new harmonised standards are developed and designated.

Read →
Article 1

Subject Matter and Purpose of the Cyber Resilience Act

Article 1 establishes the overarching purpose of the EU Cyber Resilience Act: to ensure that products with digital elements placed on the EU market meet baseline cybersecurity requirements throughout their lifecycle. It sets the foundation for all subsequent obligations by defining what the regulation aims to achieve and why. Manufacturers, importers, and distributors operating in the EU single market must understand Article 1 as the lens through which all other provisions are interpreted.

Read →
Article 12

Notification of Conformity Assessment Bodies to the European Commission

Article 12 establishes the process by which member states notify the European Commission of conformity assessment bodies authorised to perform third-party CRA assessments. Notified bodies are the organisations that conduct mandatory third-party conformity assessments for Class I and Class II products listed in Annex III. Understanding the notified body framework is essential for manufacturers of higher-risk products who require third-party certification rather than self-declaration.

Read →
Article 15

Post-Market Monitoring Obligations for Manufacturers

Article 15 establishes that CRA compliance is not a one-time exercise completed at product launch. Manufacturers must actively monitor their products for newly discovered vulnerabilities throughout the product's support period and take prompt corrective action when vulnerabilities are identified. This ongoing monitoring obligation is one of the most operationally demanding requirements of the CRA and requires manufacturers to build continuous security processes into their product management operations.

Read →
Article 16

Authorised Representatives: EU Presence for Non-EU Manufacturers

Article 16 requires manufacturers established outside the European Union who place products with digital elements on the EU market to appoint an authorised representative established within the EU. The authorised representative is the legal point of contact for national market surveillance authorities, ENISA, and other competent bodies. This provision ensures that there is always an EU-based entity accountable for CRA compliance, regardless of where the manufacturer is located.

Read →
Article 17

Importer Obligations Under the Cyber Resilience Act

Article 17 places specific obligations on importers - entities that bring products with digital elements manufactured outside the EU into the EU market for the first time. Importers must verify that manufacturers have met their CRA obligations before placing products on the market, and they bear personal liability for non-compliant products they import. This provision creates a compliance gateway role for importers within the EU supply chain.

Read →
Article 18

Distributor Obligations Under the Cyber Resilience Act

Article 18 addresses distributors - entities in the supply chain that make products with digital elements available on the EU market but who are not the manufacturer or importer. Distributors have lighter obligations than manufacturers and importers, but they still have a duty to verify that products are compliant before making them available and to cooperate with authorities when issues arise. Distributors who modify products or sell them under their own name take on manufacturer-level obligations.

Read →
Article 19

When Importers and Distributors Are Treated as Manufacturers

Article 19 closes a potential compliance gap by treating importers and distributors as manufacturers - with the full weight of manufacturer obligations - in two key scenarios: when they place a product on the market under their own name or brand, and when they modify a product in a way that could affect its compliance with CRA requirements. This provision prevents companies from avoiding CRA obligations by acting as intermediaries while substantively behaving as manufacturers.

Read →
Article 2

Scope and Exclusions Under the Cyber Resilience Act

Article 2 defines the scope of the CRA - which products and economic operators are covered - and sets out important exclusions for sectors already regulated under other EU frameworks. Understanding the scope boundaries is critical for manufacturers who operate across multiple product categories or who supply products to regulated industries such as medical devices, aviation, or automotive. Where exclusions apply, the CRA does not impose additional obligations, but the underlying sector regulation typically has its own cybersecurity requirements.

Read →
Article 21

General Obligations of Economic Operators

Article 21 establishes overarching obligations that apply to all economic operators in the CRA supply chain - manufacturers, importers, authorised representatives, and distributors. It creates cross-cutting requirements for supply chain transparency, cooperation with authorities, and information sharing that complement the more specific obligations in earlier articles. Article 21 ensures that the entire distribution chain, not just manufacturers, contributes to market surveillance and compliance.

Read →
Article 24

Notification of Conformity Assessment Bodies

Article 24 specifies the requirements that conformity assessment bodies must meet before a member state can notify them to the European Commission for CRA purposes. It establishes the competence, independence, and impartiality criteria that notified bodies must demonstrate, and the ongoing obligations they bear once notified. For manufacturers, understanding Article 24 helps in evaluating whether a potential assessment body genuinely qualifies to conduct CRA conformity assessments.

Read →
Article 25

Conformity Assessment Procedures: Module A vs Third-Party Assessment

Article 25 specifies which conformity assessment procedure applies to different categories of products with digital elements. Default-class products can use Module A (manufacturer self-assessment and declaration), while higher-risk Class I and Class II products listed in Annex III require third-party involvement through a notified body. Understanding which procedure applies to your product is the starting point for planning your CRA conformity pathway.

Read →
Article 26

Union Testing Facilities Operated by ENISA

Article 26 establishes Union testing facilities to be operated by or designated by the European Union Agency for Cybersecurity (ENISA). These facilities provide independent testing capacity that national market surveillance authorities can use to assess products, investigate compliance, and conduct enforcement activities. Union testing facilities enhance the EU's capacity to identify non-compliant products in the market and provide neutral, high-quality technical assessments to support enforcement.

Read →
Article 27

Market Surveillance Coordination Between EU Member States

Article 27 establishes the framework for coordinating market surveillance activities across EU member states. Because the EU single market means products flow freely across borders, a non-compliant product identified in one member state may be on sale in 26 others. Article 27 ensures national surveillance authorities share information, coordinate investigations, and apply consistent enforcement standards so that manufacturers cannot exploit differences in national enforcement capacity.

Read →
Article 28

ENISA's Role: European Vulnerability Database and Coordination

Article 28 defines the European Union Agency for Cybersecurity's (ENISA) operational roles under the CRA. Central to these is the establishment and operation of the European Vulnerability Database (EVDB), which serves as the EU's authoritative registry of vulnerabilities in CRA-regulated products. Article 28 also establishes ENISA's coordination functions in vulnerability disclosure, its advisory role to manufacturers and member states, and its responsibility for maintaining the infrastructure through which Article 14 notifications are processed.

Read →
Article 29

Reporting Infrastructure for Article 14 Vulnerability Notifications

Article 29 establishes the technical infrastructure for the Article 14 notification system - specifically the single reporting platform operated under ENISA's coordination through which manufacturers submit vulnerability notifications and significant incident reports to national CSIRTs. This platform is the operational backbone of the CRA's mandatory early warning and reporting regime, translating the legal obligations in Article 14 into a practical, standardised submission process.

Read →
Article 30

Joint Investigations Between National Market Surveillance Authorities

Article 30 establishes the legal and procedural framework for national market surveillance authorities to conduct joint investigations into suspected CRA non-compliance. Joint investigations are particularly important where a manufacturer's products are sold across multiple EU member states, where the manufacturer is established in a third country, or where the cybersecurity risk has cross-border implications. Joint investigations allow authorities to pool resources and present a unified enforcement front.

Read →
Article 32

Penalties for CRA Non-Compliance

Article 32 establishes the penalty regime for CRA violations - one of the most demanding in EU product regulation. Fines of up to €15 million or 2.5% of global annual turnover apply to the most serious violations of essential requirements and vulnerability handling obligations. These are maximum penalties; member states set the precise enforcement framework within these limits. Understanding the penalty structure is essential for risk quantification and compliance investment decisions.

Read →
Article 4

Free Movement of CRA-Compliant Products in the EU Single Market

Article 4 is the market access provision at the heart of the CRA's regulatory logic: products that satisfy the essential cybersecurity requirements and bear the CE marking are entitled to free movement throughout the EU single market. Member states cannot impose additional national cybersecurity requirements on CE-marked products without specific EU authorisation. This provision benefits manufacturers by creating a single compliance pathway for the entire EU market rather than requiring country-by-country certification.

Read →
Article 5

Essential Cybersecurity Requirements for Products with Digital Elements

Article 5 is the pivotal compliance provision of the CRA: it requires manufacturers to ensure their products with digital elements satisfy the essential requirements set out in Annex I. Annex I is divided into two parts - Part I covers the security properties products must have at the point of design and manufacture, and Part II covers the vulnerability handling processes manufacturers must maintain after placing products on the market. Compliance with Article 5 is the condition for bearing the CE marking and accessing the EU single market.

Read →
Article 7

Harmonised Standards and Presumption of Conformity

Article 7 establishes the role of harmonised European standards (EN standards) as the primary technical tool for demonstrating CRA compliance. When a manufacturer applies a harmonised standard that has been published in the EU Official Journal, the product is presumed to meet the essential requirements covered by that standard. This presumption of conformity significantly simplifies the conformity assessment process and reduces the burden of proof on manufacturers.

Read →
Article 8

Presumption of Conformity Through Harmonised Standards

Article 8 operationalises the presumption of conformity benefit introduced by Article 7. It establishes that products which conform to harmonised standards published in the EU Official Journal are presumed to satisfy the essential requirements in Annex I to the extent those standards cover those requirements. This provision is the legal mechanism that makes harmonised standards the preferred compliance tool for manufacturers seeking market access with minimal third-party assessment.

Read →
Article 9

Formal Objections to Harmonised Standards

Article 9 establishes a safeguard mechanism: if the European Commission determines that a harmonised standard does not fully satisfy the essential cybersecurity requirements it purports to cover, the Commission can raise a formal objection, potentially withdrawing the presumption of conformity for that standard. This provision protects the integrity of the CRA's requirements by ensuring that harmonised standards cannot be used to create a weaker compliance regime than the regulation intends.

Read →

Deadline · 11 September 2026

Only three of these articles are legally required by September 2026.

EN 18031 §5.3.3.4, §5.3.2.4, §5.4.3.4 — intake channel, triage playbook, paper trail.

See what's required →

Ready to meet your CRA obligations?

CVD Portal provides a complete vulnerability disclosure programme — free for Article 14 compliance, for all manufacturers placing products with digital elements on the EU market.

Set up your free portal