EU Cyber Resilience Act Guide for Industrial Automation & PLC Vendors
Important Class I for network-connected OT products; Critical Class II for components managing critical infrastructure processes
Industrial automation vendors placing programmable logic controllers, SCADA components, industrial gateways, and HMI systems on the EU market must comply with the EU Cyber Resilience Act by September 2026. OT products connecting to operational technology networks or managing industrial processes are broadly classified as Important Class I under Annex III. The CRA introduces mandatory CVD policies and incident reporting obligations that many OT vendors currently lack entirely.
CRA Scope and Classification for OT Products
The CRA applies to PLCs, DCS components, industrial gateways, SCADA servers, HMI terminals, and industrial routers placed on the EU market. Annex III classification is determined by the product's function and network exposure. OT products that can affect industrial process control, manage energy distribution, or interface with safety instrumented systems (SIS) are classified as Important Class I at minimum.
Products deployed in critical infrastructure sectors — energy generation, water treatment, manufacturing of hazardous materials — may be assessed as Critical Class II depending on the specific functionality and the criticality of the processes they control. Vendors must not rely on customer deployment context alone; classification is determined by the product's capabilities as designed and placed on market, not the customer's particular installation. A PLC with a built-in Ethernet interface and remote programming capability is Class I regardless of whether the customer operates it in a critical facility.
Key Technical Security Obligations for Industrial Products
OT product vendors face particularly demanding Annex I obligations because many legacy PLC and SCADA architectures were designed without cybersecurity as a primary concern. The CRA requires:
- Elimination of default credentials: All PLCs and HMIs must require credential configuration at first use. Factory-default username/password combinations are prohibited.
- Authenticated firmware updates: Industrial firmware update mechanisms must be cryptographically authenticated. Unauthenticated TFTP-based update paths must be eliminated.
- Network segmentation support: Devices must support, and ideally enforce, network segmentation — either via built-in firewall rules or by operating correctly in segmented OT network topologies.
- Audit logging: Devices must generate security-relevant audit logs (login events, configuration changes, firmware updates) accessible to authorised operators.
- SBOM: A software bill of materials must be maintained, including real-time OS components, protocol stacks (Modbus, PROFINET, EtherNet/IP), and any third-party libraries.
Vendors with products already certified under IEC 62443-4-2 (component security requirements) will find substantial alignment with CRA Annex I obligations.
CVD Policy and Article 13 for OT Vendors
Many OT vendors have historically handled vulnerability reports through informal sales or technical support channels, without a formal CVD programme. Article 13 of the CRA makes a formal, publicly disclosed CVD policy mandatory for all products with digital elements.
- Be publicly accessible via a
security.txtfile or dedicated security disclosure page - Cover all CRA-scoped product lines, including legacy products still within their supported lifetime
- Define submission channels that are accessible to both sophisticated security researchers and industrial operators who may identify anomalous behaviour in the field
- Commit to acknowledgement within a defined timeframe and to remediation communication to affected customers
OT vendors should consider that their customer base — manufacturing plants, utilities, infrastructure operators — may have contractual or regulatory obligations that require them to receive timely security advisories. The CVD policy must therefore include a downstream communication commitment, not merely an internal triage process. CVD Portal supports CSAF 2.0 advisory generation for each resolved vulnerability, enabling automated distribution to subscribed asset owners.
Article 14 Incident Reporting for Industrial Vulnerabilities
Article 14 requires ENISA notification within 24 hours of becoming aware that a vulnerability in a product is being actively exploited. For OT vendors, this creates an operational challenge: industrial environments are often air-gapped or minimally monitored, meaning exploitation of a PLC vulnerability may be detected by a customer weeks or months after it begins.
Vendors should establish clear procedures for when the 24-hour clock starts: upon receipt of credible exploitation intelligence, whether from a customer, a security researcher, a national CSIRT, or threat intelligence monitoring. The initial ENISA notification confirms the product and the nature of the exploit; detailed technical content follows in the 72-hour report.
For ICS vulnerabilities, vendors should also co-ordinate with ENISA's ICS-CERT liaison contacts and relevant national CERTs (e.g., BSI in Germany, ANSSI in France) who maintain sectoral oversight of industrial cybersecurity incidents. CVD Portal integrates Article 14 deadline tracking with configurable multi-stakeholder notification workflows.
Conformity Assessment and IEC 62443 Alignment
Class I OT products require third-party conformity assessment. For industrial automation vendors, IEC 62443-4-2 certification provides the most direct alignment with CRA Annex I requirements and may reduce the scope of additional notified body assessment work.
- Annex I Part I technical security requirements (secure defaults, update integrity, network access control)
- Annex I Part II vulnerability management process (SBOM, patch process, CVD policy)
- Technical file completeness — architecture documentation, threat model, conformity declaration
- CVD policy operational status
Vendors managing large product portfolios with multiple hardware generations should prioritise products still under active development for compliance remediation; end-of-life products that are nevertheless within their CRA-declared supported lifetime must also satisfy the Annex I Part II ongoing obligations (vulnerability monitoring and patching). Plan for notified body engagement by Q1 2026.
CVD Portal handles your CRA Article 13 obligations automatically.
Public CVD submission portal, 48-hour acknowledgment tracking, Article 14 deadline alerts, and CSAF advisory generation. Free forever for Industrial Automation & PLC Vendors.
Start your free portalFrequently asked
Are older PLC products already in the field subject to the CRA?+
The CRA applies to products placed on the EU market after the enforcement date of September 2026. Products already installed in customer facilities before that date are not retroactively subject to CRA conformity assessment. However, if a vendor continues to sell the same product model after September 2026, those new placements must be CRA-compliant. Vendors who have committed to continued sales of existing product lines must therefore either bring those products into compliance or discontinue EU sales. The CRA's vulnerability management obligations (Annex I Part II) also apply to products within their declared supported lifetime.
Does IEC 62443 certification satisfy CRA conformity assessment requirements?+
IEC 62443-4-2 certification at Security Level 2 or above covers significant ground that overlaps with CRA Annex I requirements and will serve as strong supporting evidence in a CRA notified body assessment. However, it is not a complete substitute. The CRA requires a specific conformity assessment procedure under Article 24, and the notified body must verify conformity with all CRA Annex I obligations, including the explicit CVD policy requirement (Article 13) and SBOM maintenance. The European Commission may publish a harmonised standard based on IEC 62443 that, if cited in the Official Journal, would create a presumption of conformity.
How do we handle vulnerabilities in third-party protocol stacks (e.g., EtherNet/IP, PROFINET)?+
Third-party protocol stacks included in your product are your responsibility under the CRA. If a vulnerability is discovered in an embedded EtherNet/IP or PROFINET stack used in your product, you are required to assess the impact on your product, communicate with the upstream component supplier to obtain a patch, and issue a security update to your customers within a reasonable timeframe. Your SBOM must identify all protocol stack components and their versions. Upstream supplier contracts should include provisions requiring timely security notification and patch delivery.
Key CRA articles for Industrial Automation & PLC Vendors
Need a CVD policy template for Industrial Automation & PLC Vendors?
Download a free CRA-compliant vulnerability disclosure policy and deploy it in minutes.