EU Cyber Resilience Act Guide for Oil & Gas Automation Vendors
Important — Class I or Class II depending on safety function
Oil and gas automation vendors supplying SCADA systems, RTUs, and PLCs to EU operators fall within the CRA's scope as manufacturers of products with digital elements used in critical infrastructure. The regulation imposes mandatory vulnerability disclosure policies, secure-by-design requirements, and 24-hour incident reporting obligations that significantly expand existing IEC 62443 compliance programmes. Vendors must align security documentation, conformity assessment, and post-market monitoring with CRA timelines by September 2026.
CRA Scope and Classification for Oil & Gas Automation
Automation products supplied to EU oil and gas operators — including SCADA front-ends, remote terminal units (RTUs), programmable logic controllers (PLCs), historian servers, and safety instrumented system (SIS) components — qualify as products with digital elements under Article 3(1) of the CRA. Classification depends on functional criticality: PLCs and SIS components performing safety or process-shutdown functions are likely Class II Important Products under Annex III, requiring third-party conformity assessment by a notified body. General-purpose SCADA servers and historian platforms may qualify as Class I if they do not directly actuate physical processes. Vendors should conduct a documented classification analysis before selecting their conformity pathway. Software-only products such as HMI applications also fall within scope if distributed commercially to EU operators, regardless of whether they are embedded in hardware.
Key Technical Security Obligations Under Annex I
Annex I Part I of the CRA requires oil and gas automation products to be designed with security as a fundamental property. For OT vendors this means: applying the principle of least privilege to all service accounts and remote access channels; enforcing authenticated and encrypted communications on all field protocols where the underlying standard permits (e.g. OPC-UA security profiles, DNP3 Secure Authentication v5); providing documented secure configuration baselines for each product; ensuring firmware and software update mechanisms are authenticated and integrity-verified; and supporting mechanisms to clear all sensitive operational data on decommissioning. Vendors must also maintain a software bill of materials (SBOM) in a machine-readable format covering all components including third-party libraries. Annex I Part II imposes ongoing obligations to actively monitor for vulnerabilities in distributed products and to issue updates without undue delay.
Coordinated Vulnerability Disclosure and Article 13 Requirements
Article 13 of the CRA mandates that manufacturers establish and publish a coordinated vulnerability disclosure (CVD) policy. For oil and gas automation vendors, this policy must specify a dedicated, publicly accessible reporting channel — typically a security contact email and a machine-readable security.txt file — and commit to acknowledging reports within defined timeframes. Because OT vulnerabilities in energy infrastructure are frequently reported by ICS security researchers and national CERT/CC teams, vendors should ensure their CVD policy explicitly accommodates coordinated multi-party disclosure, including interaction with ENISA and sector-specific CERTs. The policy must cover how discovered vulnerabilities are triaged, remediated, and communicated to affected operators. CVD Portal provides compliant hosted disclosure programmes that generate security.txt files and manage researcher communications, substantially reducing the administrative burden for vendors without dedicated product security teams.
Article 14 Incident and Vulnerability Reporting
Article 14 requires manufacturers to notify ENISA — via the relevant national CSIRT — within 24 hours of becoming aware of any actively exploited vulnerability in a product placed on the EU market, and within 72 hours for significant incidents affecting product security. For oil and gas automation vendors, this obligation is operationally demanding: field-deployed products may be in service for 15–20 years, meaning vendors must maintain vulnerability tracking across legacy product lines long after active development has ceased. The 24-hour notification window requires vendors to have pre-established incident response procedures, a designated security officer authorised to make regulatory notifications, and direct contact details for relevant national CSIRTs in each EU member state where products are deployed. Early notification must be followed by a detailed report within 14 days covering the vulnerability, affected versions, and available mitigations.
Conformity Assessment Pathway
Class II oil and gas automation products require conformity assessment by an EU notified body under Module H (full quality assurance) or Module B+C (type examination plus production quality assurance). Vendors should begin notified body engagement at least 12 months before their target market date, as assessment queues for OT products are expected to be lengthy. Class I products may use the manufacturer's self-declaration of conformity against a harmonised standard — IEC 62443-4-1 (secure product development lifecycle) and IEC 62443-4-2 (component security requirements) are the most relevant candidate harmonised standards currently under CEN/CENELEC mandate. Regardless of pathway, vendors must compile a complete technical file including threat model, SBOM, vulnerability management procedures, security testing evidence, and the declaration of conformity. The CE marking and technical file must be maintained and updated for the entire product support period.
Transition Planning and Legacy Product Strategy
Oil and gas vendors face a distinctive challenge: large installed bases of legacy automation products that were never designed with CRA-compliant security features. The CRA applies to products placed on the market after September 2026, so existing installed products are not directly in scope — however, any firmware update, significant feature release, or product variant placed on the market after the deadline triggers full compliance obligations. Vendors should conduct an inventory of all actively sold product lines, identify which will require CRA compliance work, and determine which legacy products will be end-of-life before September 2026. For products that will remain in active sale, a structured security remediation roadmap — aligned with the IEC 62443-4-1 secure development lifecycle — should be established immediately. Customers should be proactively informed of the vendor's CRA readiness timeline.
CVD Portal handles your CRA Article 13 obligations automatically.
Public CVD submission portal, 48-hour acknowledgment tracking, Article 14 deadline alerts, and CSAF advisory generation. Free forever for Oil & Gas Automation Vendors.
Start your free portalFrequently asked
Do our products qualify as Critical Infrastructure under the CRA, and does that change our obligations?+
The CRA does not create a separate 'critical infrastructure' category. However, oil and gas automation components that perform safety or process-shutdown functions are likely classified as Important Products Class II under Annex III, which triggers mandatory third-party conformity assessment by a notified body rather than self-declaration. Separately, the NIS2 Directive imposes cybersecurity obligations on energy sector operators — your customers — and their procurement requirements will increasingly demand CRA-compliant products as evidence of supplier due diligence.
Our PLCs use proprietary field protocols that predate modern cryptography. How does the CRA apply?+
Annex I requires security measures appropriate to the risks, which includes authenticated communications where technically feasible. Where legacy protocols cannot support encryption or authentication natively, vendors must implement compensating controls at the gateway or network layer and document these limitations in their technical file. The CRA does not prohibit legacy protocol support, but vendors must demonstrate that they have assessed the risk and implemented proportionate mitigations. Providing hardening guides and secure network architecture documentation to customers is also a Annex I Part II obligation.
How long must we support CRA-compliant products with security updates?+
The CRA requires manufacturers to support products with security updates for the expected product lifetime or a minimum of five years, whichever is shorter. For industrial automation products in oil and gas, expected lifetimes routinely exceed 10–15 years. Vendors must declare the support period at point of sale and must not discontinue security updates before that period expires without providing a documented transition path for customers. Planning security update pipelines for long-lifecycle OT products is a significant engineering investment that must be budgeted into product roadmaps immediately.
Key CRA articles for Oil & Gas Automation Vendors
Need a CVD policy template for Oil & Gas Automation Vendors?
Download a free CRA-compliant vulnerability disclosure policy and deploy it in minutes.