← Industry Guides
Industrial & ManufacturingCRA Guide

EU Cyber Resilience Act Guide for Facilities Management & CAFM System Vendors

Standard Default (standalone CAFM software); Important Class I if integrated with building control systems

Vendors of computer-aided facilities management (CAFM) software, integrated workplace management systems (IWMS), and IoT-connected building maintenance platforms sold to EU customers are manufacturers of products with digital elements under the CRA. CAFM systems increasingly integrate with building management systems, access control, energy management, and workplace sensor networks — creating complex connected architectures that must be secured under Annex I. Vendors must establish CVD programmes and incident notification capabilities by September 2026.

Article 13Article 14Annex IArticle 10Article 11Article 3
Deadline: September 2026Classification: Standard Default (standalone CAFM software); Important Class I if integrated with building control systems

CRA Scope and Classification for CAFM Platforms

CAFM and IWMS software products sold to EU customers — including computerised maintenance management systems (CMMS), workplace booking platforms, IoT-connected occupancy monitoring systems, energy management software, and integrated building operations platforms — are products with digital elements under Article 3(1). Standalone CAFM software without direct connections to building control systems is likely a Default-category product subject to standard CRA requirements. However, CAFM platforms integrated with BMS (building management systems), HVAC control, access control, or energy management systems — where the CAFM platform can issue control commands or configuration changes to building systems — may qualify as Important Products Class I or Class II. The increasing convergence of CAFM and BMS functionality in integrated workplace platforms requires vendors to classify based on the highest-risk integration capability offered.

CRA reference:Article 3(1), Article 7

Technical Security for Integrated Workplace Management

CAFM and IWMS platforms typically collect and process sensitive operational data — maintenance schedules, occupancy patterns, energy consumption, and access event records — while connecting to building systems across multiple integration interfaces. Annex I requirements include: implementing authenticated and encrypted APIs for all integrations with building systems and IoT sensors; enforcing role-based access control with separation between facilities managers, contractors, and read-only occupants; providing multi-factor authentication for administrator access to the CAFM platform; securing mobile applications used by maintenance personnel with certificate-pinning and encrypted local storage; ensuring all data at rest is encrypted particularly for sensitive occupancy and access event records; and implementing comprehensive audit logs of all maintenance actions, configuration changes, and system access. The SBOM must cover the CAFM application platform, any mobile apps, and middleware components used for building system integration.

CRA reference:Annex I Parts I and II

CVD Policy Under Article 13

Article 13 requires a published CVD policy with a dedicated security reporting channel. For CAFM vendors, the CVD programme must handle: security researcher reports on the platform and its APIs; reports from facilities management professionals who identify unusual system behaviour; and internal security testing findings from periodic platform security reviews. The CVD policy should specify how security advisories are communicated to enterprise customers, many of whom will have their own change management processes governing when software updates can be applied. For vulnerabilities in CAFM components integrated with building control systems, the CVD policy should address coordination with building system vendors and the potential need for coordinated disclosure where the vulnerability spans multiple integrated systems. A machine-readable security.txt file at the vendor's primary domain establishes the standard researcher discovery mechanism.

CRA reference:Article 13(6), Article 13(7)

Article 14 Incident Reporting

Article 14 requires notification to the relevant national CSIRT within 24 hours of confirmed active exploitation. For CAFM platform vendors, exploitation scenarios include: unauthorised access to building occupancy data enabling criminal targeting of unoccupied properties; compromise of access event records exposing sensitive information about personnel movements; and, for platforms integrated with building control, potentially unauthorised modification of HVAC or access control settings. The incident response plan must include cloud platform monitoring capable of detecting exploitation, a rapid customer notification process for active incidents, and pre-established CSIRT contact details for member states where the platform is deployed. Enterprise customers using the CAFM platform to manage NIS2-regulated facilities will have their own incident reporting obligations — vendor notifications must provide sufficient detail to support customers' regulatory responses.

CRA reference:Article 14(1), Article 14(2)

Conformity Assessment and Enterprise Procurement

Default-category CAFM software may self-declare CRA conformity. The technical file should demonstrate the platform's security architecture, API security controls, data encryption approach, and vulnerability management programme. ISO/IEC 27001 certification of the vendor's information security management system, while not a substitute for CRA conformity, provides valuable supporting evidence and is increasingly expected by enterprise facility management customers. For CAFM vendors seeking to win contracts with public sector organisations (government buildings, hospitals, universities), CRA CE marking will become a standard procurement requirement alongside NIS2 supply chain security questionnaire responses. Vendors should prepare a compliance summary document — covering CRA CE marking status, security update policy, CVD policy URL, and incident notification commitment — for inclusion in enterprise tender responses.

CRA reference:Article 24, Article 28, Annex VIII

CVD Portal handles your CRA Article 13 obligations automatically.

Public CVD submission portal, 48-hour acknowledgment tracking, Article 14 deadline alerts, and CSAF advisory generation. Free forever for Facilities Management & CAFM System Vendors.

Start your free portal

Frequently asked

Our CAFM system integrates with dozens of different BMS and IoT sensor vendors through APIs and middleware. Does the security of these integrations fall under our CRA obligations?+

Your CRA obligations extend to the security of the interfaces your CAFM product exposes and uses. For APIs and integration connectors that your platform provides, you are responsible for ensuring they are secured against authentication bypass, injection attacks, and data exposure. For third-party APIs your platform consumes, you must assess and document the security assumptions and requirements in your threat model. If a third-party integration partner's API is insecure, you should implement validation and sanitisation on data received from that interface and document the limitation. Supply contracts with integration partners should include security requirements aligned with your CRA obligations.

Our CAFM platform is sold as a SaaS product hosted in our data centre. Are we in scope as a SaaS vendor?+

Yes. SaaS products sold commercially to EU customers are products with digital elements under the CRA. As a SaaS CAFM vendor, you are the manufacturer responsible for Annex I security requirements, Article 13 CVD policy, and Article 14 notification obligations. Your cloud infrastructure security — data encryption, access control, vulnerability management, incident detection — must meet Annex I standards. Your technical file should document the SaaS platform security architecture, your shared responsibility model for customer data security, and your incident response procedures. ISO 27001 and SOC 2 Type II certifications support the technical file but do not replace CRA conformity documentation.

Our CAFM product processes employee location data from IoT occupancy sensors. How does GDPR interact with our CRA obligations?+

Employee location and occupancy data is personal data under GDPR. Your CAFM platform is both a product with digital elements subject to the CRA and a data controller or processor subject to GDPR, depending on the contract structure with your customers. GDPR data protection by design and by default requirements (Article 25) align closely with Annex I security requirements — implementing these effectively satisfies obligations under both frameworks. Specific GDPR obligations include: data minimisation (only collect location data necessary for the stated purpose), access controls preventing unauthorised access to employee location records, retention limits, and data subject rights procedures. CRA and GDPR compliance should be addressed together in your product development and privacy engineering processes.

Need a CVD policy template for Facilities Management & CAFM System Vendors?

Download a free CRA-compliant vulnerability disclosure policy and deploy it in minutes.

Browse templates →