Software Supply Chain Security
Software supply chain security encompasses the practices and controls that ensure the integrity, authenticity, and security of all software components — open-source libraries, commercial off-the-shelf modules, and development toolchains — that are integrated into a product. The CRA places explicit obligations on manufacturers to manage supply chain security throughout the product lifecycle.
Software supply chain security encompasses the practices and controls that ensure the integrity, authenticity, and security of all software components — open-source libraries, commercial off-the-shelf modules, and development toolchains — that are integrated into a product. The CRA places explicit obligations on manufacturers to manage supply chain security throughout the product lifecycle.
Technical SecurityWhat Is Software Supply Chain Security?
Software supply chain security addresses the risks introduced when a product incorporates code or components that the manufacturer did not write: open-source packages, commercial SDKs, licensed firmware, cloud service integrations, and build toolchain components. A supply chain attack occurs when an attacker compromises a trusted upstream component — for example, injecting malicious code into a popular open-source library — and the malicious code is then automatically incorporated into downstream products. High-profile supply chain incidents have demonstrated that a single compromised dependency can affect thousands of products simultaneously. Software Bill of Materials (SBOM) is the foundational tool for supply chain visibility.
Why Supply Chain Security Is a CRA Obligation
Annex I Part I(2)(f) of the CRA requires manufacturers to address and remediate vulnerabilities, explicitly including vulnerabilities in components integrated into the product. Recital 21 acknowledges the risk posed by open-source software in supply chains and encourages manufacturers to perform due diligence on components they integrate. Article 13(5) requires manufacturers to identify and document the components their products contain — the legal basis for the SBOM obligation. Manufacturers cannot disclaim responsibility for a vulnerability in a third-party library simply because they did not write the library: the product is their product and the vulnerability is their obligation.
How Manufacturers Implement Supply Chain Security
A robust supply chain security programme includes: (1) maintaining a complete, machine-readable SBOM in CycloneDX or SPDX format for every product release; (2) conducting Software Composition Analysis (SCA) during CI/CD pipelines to detect known vulnerabilities in dependencies at build time; (3) pinning dependency versions and verifying integrity via cryptographic hashes or signed packages; (4) establishing a policy for evaluating the security posture of new open-source dependencies before integration; (5) subscribing to vulnerability advisories for all integrated components and having a defined process for expedited patching when a critical supply chain vulnerability is disclosed. SBOM data should be updated with every product release.
Common Mistakes
The most pervasive supply chain security error is not knowing what dependencies a product contains. Manufacturers who cannot produce an SBOM cannot assess their exposure when a major open-source vulnerability is disclosed, resulting in reactive fire-fighting rather than planned remediation. A second error is treating SBOM as a one-time deliverable generated at product launch, rather than a living artefact updated with every build. Manufacturers also often neglect indirect (transitive) dependencies: a directly integrated library that itself depends on a vulnerable component is equally a risk, but transitive dependencies are frequently missing from manually maintained SBOMs.
CVD Portal makes Software Supply Chain Security compliance straightforward.
Public CVD submission portal, acknowledgment tracking, Article 14 deadline alerts, and CSAF advisory generation. Free forever for EU manufacturers.
Start your free portalFrequently asked
Is a manufacturer liable for vulnerabilities in open-source components under the CRA?+
Yes. The CRA holds manufacturers responsible for the security of their entire product, including all third-party and open-source components integrated into it. The open-source software steward provisions of the CRA create separate obligations for maintainers of open-source components, but this does not relieve the commercial manufacturer of its duty to identify, assess, and remediate vulnerabilities in components it chooses to integrate. Manufacturers must perform due diligence on the components they adopt.
What is an SBOM and why does the CRA require it?+
A Software Bill of Materials (SBOM) is a machine-readable inventory of all software components in a product, including their versions and known licences. The CRA requires manufacturers to identify and document their product's components (Article 13(5)) so that when a new vulnerability is disclosed in a component, they can quickly determine which of their products are affected and initiate remediation. Without an accurate SBOM, supply chain vulnerability response is guesswork.
What format should a CRA-compliant SBOM use?+
The CRA does not mandate a specific format, but the two dominant industry-standard formats are CycloneDX (maintained by OWASP) and SPDX (an ISO standard, ISO 5962:2021). Both are machine-readable and supported by major SCA tooling. ENISA and the European Commission's guidance documents reference these formats. Manufacturers should choose one and ensure their toolchain generates it automatically as part of each build and release.
Related terms
Browse the full CRA Compliance Checklist
See how Software Supply Chain Security fits into your complete CRA compliance programme.