← CRA Glossary
Product Security Engineering

Threat Actor

A threat actor is an entity — individual, group, or organisation — that poses a cybersecurity threat by intentionally or unintentionally conducting activities that can harm systems, data, or users. Understanding relevant threat actors is a required input to the risk assessments and threat models mandated by the CRA.

A threat actor is an entity — individual, group, or organisation — that poses a cybersecurity threat by intentionally or unintentionally conducting activities that can harm systems, data, or users. Understanding relevant threat actors is a required input to the risk assessments and threat models mandated by the CRA.

Product Security Engineering

What Is a Threat Actor?

A threat actor is any entity that intentionally or unintentionally causes harm to a system, organisation, or individual through cyber means. In security risk assessments, identifying relevant threat actors is a foundational step — the controls needed to defend against a nation-state attacker are very different from those needed against a curious teenager. Threat actors are typically characterised by: motivation (financial, political, ideological, competitive espionage, disruption); capability (skill level, access to zero-day exploits, resources); opportunity (access to the target, knowledge of its vulnerabilities); and typical tactics (phishing, supply chain attacks, physical access, insider threats). For manufacturers performing CRA risk assessments, the threat actor profile shapes which threats are credible and therefore which mitigations are proportionate.

CRA reference:Annex I

Threat Actor Categories Relevant to CRA Products

For CRA-covered products, the most relevant threat actor categories are:

  • Cybercriminal groups: Financially motivated actors using ransomware, credential theft, and botnet recruitment. IoT devices are prime targets for botnet recruitment (Mirai-style attacks). Industrial equipment may be targeted for ransomware extortion.
  • Nation-state attackers: State-sponsored groups with high capabilities and specific geopolitical objectives. Relevant for Important Class products in critical infrastructure sectors. Use advanced persistent threat (APT) techniques.
  • Industrial spies: Corporate espionage actors targeting intellectual property. Relevant for products in competitive industries where design data is valuable.
  • Script kiddies / opportunistic attackers: Low-capability actors using publicly available exploit tools against known vulnerabilities. These actors are the most common threat to consumer devices — they scan for unpatched, internet-exposed products at scale.
  • Insider threats: Malicious or negligent insiders with legitimate access to systems. Relevant to manufacturing security and supply chain integrity.
CRA reference:Annex I

Using Threat Actor Profiles in CRA Risk Assessments

CRA Annex I requires manufacturers to conduct a cybersecurity risk assessment. Threat actor profiles are an input to this assessment. The process:

  1. Identify credible threat actors: Based on the product category, sector, and geographic market, determine which threat actor types are likely to target the product. A consumer smart home device will primarily face opportunistic attackers; an industrial SCADA component may face nation-state actors.
  1. Map actor capabilities to attack vectors: For each relevant threat actor, identify the attack vectors they are likely to use given their capability level — automated vulnerability scanning, exploitation of published CVEs, supply chain compromise, or zero-day research.
  1. Assess impact scenarios: For each actor × attack vector combination, assess the potential impact on the product and its users.
  1. Design proportionate controls: Controls should be proportionate to the credibility and severity of the threats identified — over-engineering against implausible threats wastes resources.
CRA reference:Annex I

MITRE ATT&CK for Threat Actor Profiling

MITRE ATT&CK is a globally accessible, publicly available knowledge base of adversary tactics, techniques, and procedures (TTPs) based on real-world observations. It provides structured threat actor profiles and technique libraries that manufacturers can use to ground their CRA threat models in observed attacker behaviour. For IoT and ICS products, MITRE ATT&CK for ICS and ATT&CK for Mobile provide sector-specific technique matrices. Using ATT&CK in threat modelling:

  • Map the product's attack surface to relevant ATT&CK techniques (Initial Access, Persistence, Privilege Escalation, etc.).
  • Identify which techniques are plausible given the product's connectivity and deployment context.
  • Design detection and prevention controls targeting the highest-risk techniques.
  • Document the ATT&CK technique coverage in the Annex VII threat model to demonstrate a structured, evidence-based approach to risk assessment.

CVD Portal makes Threat Actor compliance straightforward.

Public CVD submission portal, acknowledgment tracking, Article 14 deadline alerts, and CSAF advisory generation. Free forever for EU manufacturers.

Start your free portal

Frequently asked

Does the CRA require manufacturers to document threat actors in their risk assessment?+

The CRA requires a cybersecurity risk assessment but does not prescribe a specific methodology or require explicit threat actor documentation. However, a meaningful risk assessment inherently requires considering who the threats come from. A risk assessment that only lists generic 'attacker' threats without considering actor capability and motivation is less useful for designing proportionate controls and may be challenged by a Notified Body or MSA as insufficiently rigorous. Documenting threat actor profiles explicitly demonstrates a structured approach that strengthens the conformity assessment case.

Should a small consumer device manufacturer be concerned about nation-state threats?+

In most cases, no — nation-state attackers focus their sophisticated capabilities on high-value targets (critical infrastructure, defence, government systems). A manufacturer of smart light bulbs or home routers faces primarily opportunistic cybercriminal threats. The CRA's principle of proportionality means that controls should match the credible threat. However, consumer IoT devices that aggregate large numbers of units are sometimes targeted by nation-state-linked actors to create infrastructure for future operations — botnet recruitment is not exclusively a criminal activity. Including a proportionate consideration of this scenario in the threat model is appropriate.

How do threat actors relate to CVSS scoring?+

CVSS base scores are calculated independently of threat actor context — they measure the theoretical maximum severity of a vulnerability in an idealised scenario. Threat actor profiling helps contextualise CVSS scores for a specific product's deployment. CVSS v4.0's threat metrics (specifically the Active Exploitation metric) start to bridge this gap. In practice, threat actor intelligence is used alongside CVSS scores in vulnerability prioritisation: a CVSS 7.0 vulnerability being actively targeted by a sophisticated actor relevant to the product's sector may warrant faster remediation than a CVSS 9.0 vulnerability with no known attacker interest.

Related terms

Threat ModelingThreat modeling is a structured technique for identifying, prioritising, and mitigating security threats to a system during its design phase by systematically analysing what could go wrong, who might cause it, and what the impact would be. It is the foundational practice that enables manufacturers to meet the CRA's requirement for risk-informed, secure-by-design product development.Threat IntelligenceThreat intelligence is evidence-based information about existing or emerging cybersecurity threats — including attacker TTPs, indicators of compromise, and exploitation trends — that enables organisations to make informed decisions about their security posture. For CRA manufacturers, threat intelligence feeds the threat modelling and active exploitation monitoring processes.Cybersecurity Risk AssessmentA cybersecurity risk assessment is a systematic process of identifying, analysing, and evaluating security threats and vulnerabilities that could affect a product or system, then determining appropriate mitigations. The EU Cyber Resilience Act requires manufacturers to conduct and document a cybersecurity risk assessment as a precondition for market placement.Attack SurfaceThe attack surface of a product is the totality of different points — interfaces, APIs, protocols, hardware ports, and user inputs — through which an attacker could attempt to enter or extract data from a system. Reducing attack surface is a core principle of the CRA's essential cybersecurity requirements.

Browse the full CRA Compliance Checklist

See how Threat Actor fits into your complete CRA compliance programme.

View checklists →