← Industry Guides
HealthcareCRA Guide

EU Cyber Resilience Act Guide for Home Health Monitoring Device Manufacturers

Standard Default (wellness devices); Important Class I or II (medical-grade connected devices)

Manufacturers of connected home health devices — including blood pressure monitors, pulse oximeters, blood glucose meters, and smart scales with network connectivity — must comply with the CRA in addition to any applicable Medical Device Regulation requirements. These devices collect sensitive physiological data in consumer home environments and must meet stringent security-by-design standards. The consumer deployment context means that usability and security must be engineered together, with automatic update mechanisms and clear end-of-support policies particularly important.

Article 13Article 14Annex IArticle 10Article 11Article 3
Deadline: September 2026Classification: Standard Default (wellness devices); Important Class I or II (medical-grade connected devices)

CRA Scope: Medical Devices vs. Wellness Products

The CRA applies to home health monitoring devices regardless of whether they are regulated as medical devices under MDR 2017/745. The classification question for CRA purposes focuses on product function and risk profile: consumer wellness devices — such as smart scales, step counters, and general-purpose heart rate monitors — that make no medical claims and are not intended for clinical monitoring are likely Default-category products subject to standard CRA requirements. Devices that are regulated as medical devices under MDR, including connected blood pressure monitors used to support clinical decisions, blood glucose meters, and pulse oximeters used for patient self-monitoring under medical supervision, require classification analysis that considers both regulatory frameworks. Where an MDR-regulated device is also a network-connected product, the CRA applies in full. The intersection of consumer distribution channels and medical-grade function creates classification complexity that must be resolved product by product.

CRA reference:Article 3(1), Article 7

Consumer Security Requirements Under Annex I

Home health devices deployed in consumer environments must meet Annex I security requirements in a context where users are not IT professionals and may include elderly or chronically ill individuals. Core obligations include: shipping devices without default shared credentials — each device must have a unique credential or require account creation before activation; implementing automatic software and firmware update mechanisms that operate without user intervention; encrypting all health data transmitted to cloud services; supporting account deletion and full data erasure when requested; and minimising data collection to what is clinically or functionally necessary. The SBOM requirement applies to both device firmware and companion smartphone applications. User-facing privacy notices must accurately describe what data is collected and how it is secured. Manufacturers must clearly state the security support period at point of sale — for consumer health devices, this should be a minimum of five years.

CRA reference:Annex I Parts I and II

CVD Policy Requirements Under Article 13

Article 13 requires manufacturers to publish a CVD policy with a dedicated security reporting channel. For consumer health device manufacturers, the CVD policy must be accessible to security researchers who discover vulnerabilities but also legible to patients and healthcare providers who may encounter unusual device behaviour. The policy should specify: a dedicated security email address and ideally a web-based reporting form; a commitment to acknowledge reports within 5 working days; and a process for notifying the manufacturer's medical device competent authority contact where a vulnerability has potential patient safety implications. Manufacturers should also maintain a public security advisory page documenting resolved vulnerabilities, firmware versions affected, and update availability. This transparency is both a regulatory expectation under the CRA and increasingly a consumer trust requirement in the health technology market.

CRA reference:Article 13(6), Article 13(7)

Article 14 Incident Reporting for Consumer Health Devices

Article 14 requires notification to the relevant national CSIRT within 24 hours of confirmed active exploitation. For consumer health device vendors, active exploitation typically manifests through cloud platform compromise — affecting account credentials, health data access, or device firmware delivery — rather than direct field device exploitation. Vendors must have monitoring in place at the cloud platform level to detect anomalous access patterns indicating potential exploitation. The 24-hour notification window requires a pre-established incident response team with clear authority to file regulatory notifications. Because health data is special category data under GDPR, a cloud platform breach affecting patient health records simultaneously triggers GDPR data breach notification obligations to the relevant data protection authority within 72 hours. Incident response plans must coordinate both notification obligations.

CRA reference:Article 14(1), Article 14(2)

CE Marking and Conformity Assessment

Consumer wellness devices and Default-category home health products may self-declare CRA conformity. Manufacturers should select applicable harmonised standards — ETSI EN 303 645 (IoT device security) is the most directly applicable standard for consumer home health devices and covers requirements including default credential elimination, update mechanisms, and vulnerability disclosure. The technical file must include: product architecture documentation; threat model; SBOM; evidence of security testing (penetration testing or structured security review); CVD policy documentation; and the declaration of conformity. MDR-regulated home health devices subject to notified body assessment under MDR should explore coordinated CRA assessment with the same notified body where the notified body holds dual accreditation. The CRA CE mark and MDR CE mark are distinct — both must appear on applicable products after September 2026.

CRA reference:Article 24, Article 28, Annex VIII

CVD Portal handles your CRA Article 13 obligations automatically.

Public CVD submission portal, 48-hour acknowledgment tracking, Article 14 deadline alerts, and CSAF advisory generation. Free forever for Home Health Monitoring Device Manufacturers.

Start your free portal

Frequently asked

Our connected blood pressure monitor is sold as a consumer product, not a medical device. Does the CRA apply?+

Yes. The CRA applies to any product with digital elements placed on the EU market, regardless of whether it is regulated as a medical device. If your blood pressure monitor connects to a smartphone app or cloud service — even for data logging or trend visualisation — it is a product with digital elements in scope. The applicable classification (Default or Important) depends on whether the product makes medical claims and the degree of network connectivity. As a consumer health product sold at retail, you would likely self-declare conformity against ETSI EN 303 645, but you must still establish a CVD policy, maintain an SBOM, and implement Annex I security controls.

We are a small manufacturer with limited engineering resources. Which CRA obligations are most urgent to address?+

Prioritise in this order: first, eliminate default shared credentials in your current product line — this is both the highest-risk vulnerability and the CRA's most fundamental requirement; second, implement automatic firmware update capability if your devices do not already support it; third, establish a CVD policy and security.txt file, which can be done quickly using hosted platforms like CVD Portal; fourth, begin SBOM generation using software composition analysis tooling on your firmware and app codebases. Threat modelling, penetration testing, and technical file compilation can follow once these foundations are in place. The September 2026 deadline is firm — start the most impactful changes immediately.

How long must we support home health devices with security updates under the CRA?+

The CRA requires security update support for the lesser of the expected product lifetime or five years from last placement on the market. For consumer health devices sold at retail, 'expected product lifetime' is typically 3–5 years for entry-level products and up to 7–10 years for premium devices. You must clearly state the security support period at point of sale and notify customers in advance of end-of-support. If a device's hardware cannot support continued security updates, you must provide customers with clear information about the end-of-support date and any available data migration options when the device is replaced.

Need a CVD policy template for Home Health Monitoring Device Manufacturers?

Download a free CRA-compliant vulnerability disclosure policy and deploy it in minutes.

Browse templates →