Annex I of the EU Cyber Resilience Act defines the essential cybersecurity requirements that all in-scope products must satisfy before CE marking and EU market access. It covers two sets of requirements: Part I covers product security properties (design and development), and Part II covers vulnerability handling processes (post-market obligations).
Structure: Part I and Part II
Annex I is divided into two parts:
Part I — Product Properties: Security requirements that must be built into the product before it is placed on the market. These are engineering and design requirements.
Part II — Vulnerability Handling: Post-market obligations for how manufacturers manage vulnerabilities discovered after the product is sold. These are operational and process requirements.
Both parts are mandatory for all in-scope products. Part I determines whether a product can receive CE marking. Part II governs ongoing obligations throughout the product's supported life.
Part I: Product Security Properties (Design Requirements)
Part I requires that products be designed and developed to:
- No known exploitable vulnerabilities — Products must be placed on the market without known vulnerabilities that could be exploited.
- Secure default configurations — Default settings must be secure; insecure defaults must be opt-in, not opt-out.
- Protection against unauthorised access — Authentication, access controls, and least-privilege principles must be implemented.
- Data protection — Personal and sensitive data must be protected at rest and in transit using appropriate cryptography.
- Attack surface minimisation — Unnecessary interfaces, ports, and services must be disabled or removed.
- Availability protection — Products must be resilient against denial-of-service attacks.
- Limited data collection — Products must collect only the minimum data necessary for their function (data minimisation).
- Auditability — Security-relevant events must be logged in a way that supports incident investigation.
- Secure update capability — Products must support a mechanism for receiving and verifying security updates.
Part II: Vulnerability Handling Requirements
Part II sets out what manufacturers must do after a product is on the market:
- CVD policy — Maintain a publicly accessible coordinated vulnerability disclosure policy (implements Article 13).
- Vulnerability remediation — Address discovered vulnerabilities without undue delay, including distributing security updates.
- Disclosure of vulnerability information — Publish information about fixed vulnerabilities, including CVE identifiers where applicable.
- No-charge security updates — Security updates must be provided free of charge to users for the product's supported life.
- CSAF advisories — Publish machine-readable security advisories in CSAF 2.0 format for significant vulnerabilities.
- Support period — Products must have a defined security support period appropriate to their expected use life (minimum 5 years for most product classes).
The 'No Known Vulnerabilities' Requirement
One of the most operationally significant Part I requirements is that products must be placed on the market without known exploitable vulnerabilities.
- Known vulnerabilities in third-party components (checked against CVE databases, vendor advisories, and SBOMs) must be addressed before release.
- Security testing must be conducted before placing products on the market.
- A Software Bill of Materials (SBOM) should be maintained to track component vulnerabilities.
This requirement places a practical obligation on manufacturers to perform pre-release vulnerability scanning and to maintain SBOM data for all components.
Secure Update Requirements
Annex I Part I(9) requires that products support a secure update mechanism. This means:
- Updates must be digitally signed or otherwise verifiable by the device.
- The update mechanism itself must be resistant to attack (e.g., update-in-transit attacks, rollback attacks).
- Users must be notified when security updates are available.
- For products that cannot receive over-the-air updates, there must be a documented alternative update process.
This requirement has major implications for embedded systems, industrial IoT, and medical devices where over-the-air updates are not standard practice.
Free Security Updates and Support Period
Annex I Part II(4) requires that security updates be provided free of charge throughout the product's supported life. Combined with the support period requirement, this means:
- You must define and publicly disclose the security support period for each product.
- Security patches cannot be paywalled or tied to a paid support contract.
- The support period should be commensurate with the expected use life of the product — which for many IoT and industrial products can be 10–20 years.
This requirement has significant commercial implications for manufacturers who currently monetise ongoing security support.
Conformity Assessment Against Annex I
To obtain CE marking for a product with digital elements, manufacturers must demonstrate conformity with Annex I requirements through one of three conformity assessment routes:
- Self-assessment — Available for most products (Default Class). The manufacturer conducts and documents their own conformity assessment.
- Third-party audit — Required for Important Class products (listed in Annex III). A notified body reviews the technical documentation.
- EU type-examination — Required for Critical Class products. Full third-party examination of the product.
For all routes, the manufacturer must maintain a technical file documenting how each Annex I requirement is met.
CVD Portal helps you comply with Annex I automatically.
Public submission portal, 48-hour acknowledgment tracking, Article 14 deadline alerts, and CSAF advisory generation. Free forever.
Start your free portalFrequently asked
What is the minimum security support period required by Annex I?+
The CRA does not prescribe a fixed number of years for all products. It requires that the support period be appropriate to the product's expected use life and the nature of the product. The European Commission is expected to publish guidance on minimum support periods by product class. As a baseline, most commentary suggests a minimum of 5 years for consumer products and longer for industrial and critical infrastructure products.
Does Annex I apply to B2B products or only consumer products?+
Annex I applies to all in-scope products with digital elements, regardless of whether they are sold to businesses or consumers. The CRA's scope covers products placed on the EU market, not just consumer goods.
Is an SBOM mandatory under Annex I?+
An SBOM is not explicitly mandated by Annex I text, but it is practically necessary to comply with the 'no known vulnerabilities' requirement and to manage vulnerability handling obligations. The European Commission's guidance and most conformity assessment bodies expect SBOM data as part of the technical file.
What cryptographic standards satisfy the data protection requirement?+
The CRA does not mandate specific algorithms. The requirement is to use 'state of the art' cryptography appropriate to the product's threat model. In practice, this means TLS 1.2+ for transport security, AES-128 or higher for data at rest, and avoiding known-broken algorithms like MD5, SHA-1, or DES.
Related CRA Articles
Need a CVD policy that satisfies Annex I?
Download a free CRA-compliant template and deploy it in minutes.