← Industry Guides
Aerospace & DefenceCRA Guide

EU Cyber Resilience Act Guide for Avionics & Aerospace Systems Manufacturers

Important — Class II for safety-critical avionics; Class I for ground support and maintenance software

Avionics and aerospace systems manufacturers selling products to EU civil aviation operators are subject to the CRA for their commercially distributed digital products, creating a new regulatory layer alongside existing EASA certification requirements. While military-use products are generally excluded from CRA scope, commercial avionics — including flight management systems, communications equipment, and ground support software sold under commercial contracts — fall within the regulation. Manufacturers must determine scope carefully and establish CVD and incident reporting capabilities that complement EASA's safety reporting framework.

Article 13Article 14Annex IAnnex IIIArticle 10Article 3
Deadline: September 2026Classification: Important — Class II for safety-critical avionics; Class I for ground support and maintenance software

CRA Scope: Civil Avionics vs. Defence Exclusion

The CRA explicitly excludes products intended exclusively for national security, defence, and military purposes under Article 2(2). Manufacturers of purely military avionics systems are therefore outside CRA scope. However, dual-use avionics products — and commercial civil avionics sold under non-defence contracts — are in scope. This includes flight management system software, aircraft communication addressing and reporting systems (ACARS), avionics networking equipment, electronic flight bags (EFBs), ground-based maintenance software, and flight data monitoring systems sold commercially. Manufacturers of both military and civil product lines must carefully assess which of their products are exclusively for defence use and document this exclusion clearly. Products sold commercially through distribution channels with possible dual-use cannot claim the defence exclusion.

CRA reference:Article 2(2), Article 3(1)

Technical Security Obligations Under Annex I

For commercially distributed avionics and aerospace software, Annex I imposes security-by-design obligations that must be reconciled with existing DO-326A and DO-356A airworthiness security processes. Required measures include: implementing access controls that prevent unauthorised modification of safety-critical parameters; ensuring software update mechanisms are authenticated and integrity-verified, consistent with DO-326A security risk assessment requirements; maintaining comprehensive SBOMs for all software components, including DO-178C-certified flight software; providing secure default configurations with documented hardening guidance; and implementing audit logging for all security-relevant operations in ground-based maintenance systems. For embedded avionics products, the Annex I requirement to support security updates must be balanced against EASA supplemental type certificate (STC) requirements for in-service modifications.

CRA reference:Annex I Parts I and II

CVD Policy Under Article 13 for Aerospace Manufacturers

Article 13 requires aerospace manufacturers to publish a coordinated vulnerability disclosure policy for commercially distributed products in scope. The aerospace sector has well-established safety reporting mechanisms — Mandatory Occurrence Reporting (MOR) under EU 376/2014 — but these address safety events rather than cybersecurity vulnerability reports. A dedicated CVD policy must exist alongside safety reporting, handling security researcher reports, penetration test findings, and third-party vulnerability intelligence. The CVD policy must specify: a dedicated security reporting contact separate from safety reporting channels; acknowledgment and response timelines; and a process for coordinating with EASA and ENISA where a security vulnerability has potential safety implications. Manufacturers should document the interaction between CVD and safety reporting processes to ensure vulnerabilities with dual safety/security relevance are handled through both channels.

CRA reference:Article 13(6), Article 13(7)

Article 14 Notification and Interaction with EASA Safety Reporting

Article 14 requires notification to the relevant national CSIRT within 24 hours of confirmed active exploitation. For avionics products, active exploitation of a cybersecurity vulnerability may simultaneously trigger EASA safety reporting obligations if the exploitation could affect airworthiness. Manufacturers must establish incident response procedures that coordinate between cybersecurity teams and safety/airworthiness teams, ensuring that the 24-hour CSIRT notification and any concurrent EASA occurrence report are consistent and mutually referenced. Pre-established relationships with EASA's cybersecurity team and national aviation authority cybersecurity contacts will facilitate rapid multi-channel notification. The 14-day detailed incident report required by Article 14 should document the safety assessment performed alongside the cybersecurity impact analysis.

CRA reference:Article 14(1), Article 14(2), Article 14(3)

Conformity Assessment Pathway

Safety-critical avionics products placed on the commercial market are likely Class II under Annex III, requiring notified body assessment. Ground support software, maintenance information systems, and flight data monitoring platforms may qualify as Class I, permitting self-declaration. For Class II products, manufacturers should consider whether notified bodies with aerospace domain expertise are available — the intersection of CRA conformity assessment and avionics knowledge requires assessors who understand both regulatory frameworks. The CRA technical file must include a cybersecurity risk assessment that cross-references the DO-326A airworthiness security process and IASAS (Information Assurance Security Assessment) documentation where applicable. This cross-referencing approach leverages existing EASA compliance documentation to reduce duplicated effort.

CRA reference:Article 24, Article 25, Annex VIII

CVD Portal handles your CRA Article 13 obligations automatically.

Public CVD submission portal, 48-hour acknowledgment tracking, Article 14 deadline alerts, and CSAF advisory generation. Free forever for Avionics & Aerospace Systems Manufacturers.

Start your free portal

Frequently asked

Our products are certified to DO-326A. Does this satisfy the CRA's security requirements?+

DO-326A provides an airworthiness security process framework that addresses many of the same principles as the CRA's Annex I requirements — threat analysis, security architecture, security testing. However, DO-326A certification does not constitute CRA conformity assessment and cannot substitute for CE marking obligations. The two frameworks are complementary: DO-326A documentation provides strong evidence for the CRA technical file, and manufacturers can leverage existing airworthiness security documentation to streamline CRA compliance. A gap analysis against Annex I requirements — particularly SBOM obligations, CVD policy, and Article 14 notification procedures — will identify what additional work is needed.

How do we handle the SBOM requirement for DO-178C-certified flight software where source code disclosure is controlled?+

The CRA's SBOM obligation requires a machine-readable inventory of components — it does not require public disclosure of the SBOM itself. Your SBOM must be maintained internally and made available to market surveillance authorities on request. Component-level information (package names, versions, and known vulnerabilities) is generally sufficient — detailed source code is not required. For proprietary components developed in-house, the SBOM should capture the component identity, version, and the internal vulnerability tracking reference. Established SBOM formats (SPDX, CycloneDX) support confidentiality designations and access controls.

Are Electronic Flight Bags (EFBs) in CRA scope, and how are they classified?+

EFBs sold as commercial products to airlines or flight operations departments are in scope as products with digital elements. Classification depends on EFB type: Type A EFBs (portable, non-connected) used purely for document display are likely Class I. Type B and Type C EFBs with network connectivity, real-time data integration, or interfaces to avionics systems carry greater security risk and may qualify as Class II depending on their integration depth. EFB application software sold through commercial distribution — including app stores for tablet-based EFBs — is also in scope. Vendors should conduct classification analysis per EFB product variant.

Need a CVD policy template for Avionics & Aerospace Systems Manufacturers?

Download a free CRA-compliant vulnerability disclosure policy and deploy it in minutes.

Browse templates →