← Industry Guides
Retail & HospitalityCRA Guide

EU Cyber Resilience Act Guide for Digital Signage & Kiosk Vendors

Default Class for display-only signage; Important Class I for interactive kiosks with payment, biometrics, or sensitive data

Digital signage and kiosk vendors manufacturing networked display systems, interactive self-service kiosks, wayfinding terminals, and digital menu board systems for EU retail, hospitality, and public venue operators must comply with the EU Cyber Resilience Act by September 2026. Kiosks and signage systems connected to corporate networks and content management platforms are products with digital elements that require CRA compliance, with interactive kiosks processing payment or personal data likely classified as Important Class I.

Article 13Article 14Annex IArticle 10Annex IVArticle-3
Deadline: September 2026Classification: Default Class for display-only signage; Important Class I for interactive kiosks with payment, biometrics, or sensitive data

CRA Scope and Classification for Digital Signage and Kiosks

Digital signage hardware — media players, commercial displays with integrated Android/Windows, content management system appliances — and interactive kiosk terminals are products with digital elements within CRA scope when they include network connectivity and embedded software.

Display-only signage systems (media player sending content to display, cloud-managed content delivery) are likely Default Class — limited data processing, no sensitive user data collection. Interactive kiosks — self-service check-in terminals, order and payment kiosks, wayfinding terminals with user data collection, biometric attendance systems — are likely Important Class I where they process payment card data, biometric data, or other sensitive personal information, or where they function as access control points. Vendors must assess each product family: a digital menu board player and an interactive hotel self-check-in kiosk with passport scanning are in very different classification categories.

CRA reference:Article 6, Annex III

Technical Security Requirements for Kiosk and Signage Products

Digital signage and kiosk hardware is frequently deployed in high-traffic public environments with limited physical security supervision — an attacker can interact with a kiosk directly. CRA Annex I requirements are particularly relevant to this attack surface:

  • Kiosk mode hardening: The device's operating system must be hardened to prevent kiosk escape — users must not be able to access the underlying OS from the kiosk interface. Physical access to USB ports must be restricted.
  • Default credential elimination: CMS management interfaces, remote desktop access, and administrative accounts must not use factory default credentials.
  • Encrypted content delivery: Content management traffic between the CMS server and the signage player must be encrypted. Content authentication prevents injection of malicious display content.
  • Authenticated firmware updates: Remote firmware updates to signage hardware and kiosk terminals must be cryptographically authenticated.
  • Physical tamper evidence: Kiosk hardware must support detection or evidence of physical access to internal components, particularly relevant for kiosks with payment modules.
CRA reference:Annex I

CVD Policy and Article 13 for Signage and Kiosk Vendors

Digital signage and kiosk vendors often lack formal CVD programmes — security issues are typically reported informally through sales channels or discovered during customer security audits. Article 13 requires a formal, publicly accessible CVD policy covering all products with digital elements.

  • Cover the signage hardware, CMS software, and companion management platforms
  • Provide a submission channel accessible to security researchers and to the enterprise IT security teams of retail and hospitality customers
  • Define response timelines — particularly important for payment kiosk vulnerabilities where delayed patching creates ongoing financial fraud risk
  • Commit to advisory publication in formats accessible to system integrators and operators

Kiosk vendors serving payment-accepting deployments must coordinate their CVD policy with PCI DSS disclosure obligations. Vulnerabilities in payment-accepting kiosks that affect cardholder data security must be disclosed to payment schemes as well as through the Article 13 CVD process.

CRA reference:Article 13(1), Article 13(6)

Article 14 Incident Reporting for Signage and Kiosk Products

  • Defacement of digital signage networks via CMS vulnerabilities to display malicious content
  • Use of compromised kiosks as network entry points for lateral movement into retail or hospitality networks
  • Payment card skimming via compromised payment kiosk firmware

High-profile digital signage compromises — malicious content displayed on public screens at airports, shopping centres, or transit hubs — attract immediate public attention and media coverage. Vendors should have incident response procedures that include both the ENISA Article 14 notification and direct customer operator notification, enabling rapid content removal and system isolation within the 24-hour notification window.

For payment kiosk incidents, parallel notification to payment card schemes and PCI SSC applies alongside Article 14 reporting.

CRA reference:Article 14(1), Article 14(2)

Conformity Assessment for Kiosk and Signage Products

Default Class signage products may use Module A self-assessment. Class I interactive kiosks require third-party conformity assessment. For kiosk vendors with a mix of Default Class and Class I products, managing the conformity assessment programme requires careful scope management.

  1. Document the classification rationale — confirm display-only function and absence of sensitive data processing
  2. Assess against Annex I Part I — particularly default credential elimination and authenticated update mechanisms
  3. Prepare technical file with architecture documentation and SBOM
  4. Issue EU Declaration of Conformity

For Class I interactive kiosks, third-party assessment is required. Vendors whose kiosks include PCI PTS-certified payment modules should use that certification as supporting evidence for the payment security aspects of CRA assessment, though a full CRA assessment covering the broader kiosk system is still required. Begin notified body engagement in Q1 2026 for products requiring Class I assessment.

CRA reference:Article 24, Annex IV

CVD Portal handles your CRA Article 13 obligations automatically.

Public CVD submission portal, 48-hour acknowledgment tracking, Article 14 deadline alerts, and CSAF advisory generation. Free forever for Digital Signage & Kiosk Vendors.

Start your free portal

Frequently asked

Are cloud-based content management systems for digital signage subject to the CRA?+

Cloud-based CMS platforms for digital signage are within CRA scope for the hardware products (media players, integrated displays) that connect to them. The cloud platform itself may be subject to NIS2 digital service provider obligations rather than CRA product obligations, depending on whether it qualifies as a cloud computing service. Vendors offering signage-as-a-service packages (hardware plus CMS subscription) must ensure CRA compliance for the hardware components and must secure the cloud CMS integration against Annex I requirements — particularly authenticated content delivery and management interface security.

Do kiosk operating system vendor patches need to be applied by the kiosk manufacturer?+

Yes. As the manufacturer of the kiosk product, you are responsible for ensuring that the product's operating system is maintained with security patches throughout the declared supported lifetime. If your kiosk runs Windows or Android, you must maintain the OS patching process and deliver OS security updates to deployed kiosks — you cannot rely on the kiosk operator to apply OS patches independently. Your update delivery mechanism must cover the full software stack, including the OS, browser (if used), middleware, and application software. This is a significant ongoing operational commitment that must be factored into your product support model.

Are outdoor advertising digital displays (DOOH) subject to the CRA?+

Digital out-of-home (DOOH) advertising displays with network connectivity and embedded media player hardware are products with digital elements within CRA scope. The advertiser's CMS platform connects to and manages the physical display hardware — both elements are within CRA scope for the hardware manufacturer. The outdoor display enclosure hardware (without digital elements) may be separate from the digital display module, in which case only the digital module requires CRA compliance. DOOH network operators who deploy and manage signage on behalf of advertisers are not CRA manufacturers for the hardware — that obligation sits with the equipment manufacturer who placed the hardware on the EU market.

Need a CVD policy template for Digital Signage & Kiosk Vendors?

Download a free CRA-compliant vulnerability disclosure policy and deploy it in minutes.

Browse templates →