EU Cyber Resilience Act Guide for Maritime Navigation & Vessel Systems Vendors
Important — Class I or Class II depending on safety-critical function
Vendors of electronic chart display systems (ECDIS), AIS transponders, vessel management systems, and integrated bridge systems sold to EU-flagged vessels or EU ports are subject to the CRA as manufacturers of products with digital elements. Maritime systems face dual regulatory pressure from both the CRA and IMO MSC-FAL.1/Circ.3 cyber risk management guidelines, and vendors must reconcile these frameworks. The integration of navigation systems with satellite communications and shore-side networks significantly expands the attack surface that must be addressed under Annex I.
CRA Scope and Classification for Maritime Systems
Maritime navigation and vessel management products sold to EU operators — including ECDIS systems, AIS Class A and B transponders, integrated bridge systems (IBS), voyage data recorders (VDR), engine management and monitoring systems, and port management information systems — are products with digital elements under Article 3(1) of the CRA. Classification requires function-specific analysis: ECDIS and navigation systems directly affecting vessel collision avoidance and safe navigation are strong candidates for Class II Important Products under Annex III. Engine monitoring systems and cargo management platforms with no direct safety-critical output may qualify as Class I. Vendors must document the classification rationale, taking into account whether the product is part of a safety management system under SOLAS requirements. The CRA applies irrespective of whether the product also satisfies IMO or flag-state type approval requirements.
Technical Security Obligations for Vessel-Deployed Systems
Maritime systems present unique security engineering challenges: they must operate reliably in isolated environments with limited connectivity, while increasingly being accessed remotely by shore-side technical teams. Annex I obligations for maritime vendors include: ensuring that remote access functionality — whether via satellite, cellular, or VSAT — is authenticated and encrypted with no unauthenticated bypass; eliminating default credentials on all management interfaces; providing firmware update mechanisms that function in both connected and air-gapped vessel environments; implementing tamper-evident audit logging that survives power interruptions; and documenting all external interfaces including NMEA 0183/2000 ports, USB interfaces, and network connections to other vessel systems. The SBOM requirement must cover navigation chart software components, database engines, and any real-time operating system components embedded in navigation hardware.
CVD Policy Under Article 13 for Maritime Vendors
Article 13 requires a published coordinated vulnerability disclosure policy. Maritime system vendors have historically operated in a sector with limited security researcher engagement, but this is changing rapidly as the sector's digital connectivity increases. Vendors should establish CVD policies that accommodate: reports from maritime security researchers and classification society cyber teams; interaction with the European Maritime Safety Agency (EMSA) and national maritime CSIRTs; and the operational reality that vessel operators may not be able to apply patches immediately due to voyage schedules and flag-state approval requirements. The CVD policy must specify how vendors communicate vulnerability information and available mitigations to vessel operators when immediate patching is not feasible. A machine-readable security.txt file at the vendor domain is the standard discovery mechanism for researchers.
Article 14 Incident Reporting in Maritime Context
Article 14 requires maritime system vendors to notify the relevant national CSIRT within 24 hours of becoming aware of active exploitation of a vulnerability in a deployed product. For navigation systems, active exploitation could compromise vessel positioning data, enable unauthorised route modifications, or disrupt communications — scenarios with direct safety implications. Vendors must maintain incident response procedures capable of meeting the 24-hour notification window, including out-of-hours escalation paths. When a vulnerability affects vessels at sea, vendors should also establish direct communication channels with vessel operators and ship managers, separate from the regulatory notification process. EMSA and relevant maritime CSIRTs should be included in the vendor's notification contact registry. Incidents involving actual maritime safety consequences must also be reported through existing flag-state and port-state control channels, creating parallel reporting obligations.
Conformity Assessment and Interaction with Maritime Type Approval
Maritime navigation systems often require type approval from flag-state authorities or classification societies under SOLAS and IMO performance standards. The CRA conformity assessment is a separate and additional requirement — CE marking under the CRA does not replace maritime type approval, nor does type approval substitute for CRA conformity. Class II maritime products require notified body assessment. Vendors should investigate whether any notified body offers joint or coordinated assessment services that align with classification society cyber requirements (e.g. IACS UR E26 and E27), which could reduce duplicated audit burden. Class I products may use self-declaration, but must compile full technical documentation including the maritime-specific threat model, SBOM, and security testing evidence. The declaration of conformity must be maintained throughout the product support period.
CVD Portal handles your CRA Article 13 obligations automatically.
Public CVD submission portal, 48-hour acknowledgment tracking, Article 14 deadline alerts, and CSAF advisory generation. Free forever for Maritime Navigation & Vessel Systems Vendors.
Start your free portalFrequently asked
Our ECDIS systems are type-approved under IEC 61174. Does this satisfy CRA conformity requirements?+
No. IEC 61174 type approval addresses navigation performance standards, not the cybersecurity requirements of the CRA. The CRA requires a separate conformity assessment focused on security-by-design, vulnerability management, CVD policy, and SBOM obligations under Annex I. The European Commission is working with standards bodies to develop harmonised standards for maritime systems, but until these are published and referenced in the Official Journal, manufacturers must use existing security standards — such as IEC 62443 — to demonstrate compliance. Both type approval and CRA CE marking will be required for EU market access.
Vessels can be at sea for months without connectivity. How do we meet the firmware update obligations of Annex I?+
Annex I requires that security updates be made available without undue delay — it does not require immediate installation by the operator. Your obligation as a manufacturer is to issue and publish security updates promptly when vulnerabilities are identified. For vessel operators who cannot apply updates immediately, you must provide documented interim mitigations and configuration guidance. Your CVD policy and security advisory processes should clearly communicate update availability, severity, and interim workarounds. Delivery mechanisms for offline update packages — USB media, port-of-call update procedures — should be documented and tested.
Do AIS transponders fall under the CRA, and are they Class I or Class II?+
AIS transponders are products with digital elements and fall within CRA scope. Classification depends on the product type: Class A AIS transponders used for mandatory vessel tracking and collision avoidance are likely Class II given their safety-critical role in maritime traffic management. Class B transponders used by non-SOLAS vessels for optional tracking may qualify as Class I. Vendors should document their classification analysis, taking into account the product's role in vessel safety management systems and whether failure or compromise could affect maritime traffic safety. The classification affects whether self-declaration or notified body assessment is required.
Key CRA articles for Maritime Navigation & Vessel Systems Vendors
Need a CVD policy template for Maritime Navigation & Vessel Systems Vendors?
Download a free CRA-compliant vulnerability disclosure policy and deploy it in minutes.