← Industry Guides
HealthcareCRA Guide

EU Cyber Resilience Act Guide for Point-of-Care Diagnostics & IVD Manufacturers

Important — Class I or Class II; correlates strongly with IVDR risk classification

Point-of-care diagnostic and in vitro diagnostic (IVD) manufacturers placing network-connected diagnostic instruments and software on the EU market face obligations under both the IVDR (2017/746) and the CRA. Connected blood analysers, point-of-care PCR systems, and laboratory information management interfaces that transmit test results electronically are products with digital elements. The interaction between IVDR conformity assessment and CRA requirements creates dual compliance obligations that must be carefully managed across product development and post-market activities.

Article 13Article 14Annex IAnnex IIIArticle 10Article 11
Deadline: September 2026Classification: Important — Class I or Class II; correlates strongly with IVDR risk classification

CRA Scope and IVDR Interaction

In vitro diagnostic instruments with digital interfaces — including connected blood gas analysers, haematology analysers with LIS (laboratory information system) interfaces, point-of-care PCR and lateral flow readers with data transmission capabilities, and diagnostic software platforms classified as IVDs under IVDR — are products with digital elements subject to the CRA. The IVDR already imposes cybersecurity requirements under its general safety and performance requirements (Annex I, Chapter I), but CRA obligations are additive rather than replaced by IVDR compliance. The CRA classification for IVD instruments should be assessed considering the instrument's role in clinical decision-making: high-complexity diagnostic instruments used in intensive care or oncology diagnostics carry higher consequence of data integrity failure and are stronger candidates for Class II Important Products. IVDR Class D IVDs (highest risk, such as HIV and blood group testing) are particularly likely to require Class II CRA classification.

CRA reference:Article 3(1), Annex III, Article 2(1)

Technical Security for Diagnostic Instruments and Connectivity

Point-of-care diagnostic instruments are increasingly integrated into clinical networks — connected to LIS, EHR systems, and cloud-based result repositories. This connectivity creates attack surfaces that did not exist in standalone instrument generations. Annex I security requirements for IVD manufacturers include: encrypting all result data transmissions using current TLS standards; implementing authenticated access to instrument management interfaces, including local touchscreens and remote service ports; ensuring that diagnostic result integrity is maintained and any modification to transmitted results is detectable through cryptographic checksums or signing; eliminating default service credentials used by field engineers, replacing them with individual authenticated service accounts; and providing firmware update mechanisms that do not require instrument downtime during routine clinical use where operationally feasible. The SBOM must cover both the instrument firmware and any companion middleware used for result routing and LIS integration.

CRA reference:Annex I Parts I and II

CVD Policy Under Article 13 for Diagnostic Manufacturers

Article 13 mandates a published CVD policy. For IVD manufacturers, the CVD policy must interface with IVDR post-market surveillance obligations and the periodic safety update report (PSUR) requirement for Class C and D IVDs. A vulnerability discovered in a diagnostic instrument that could affect result accuracy or data integrity may simultaneously be a safety issue requiring notification under IVDR Article 82 (serious incidents) and a cybersecurity issue requiring CVD handling. The CVD policy must specify how these two reporting streams are coordinated, who has authority to make IVDR safety notifications versus CRA cybersecurity notifications, and how the manufacturer communicates security updates to laboratory customers without disrupting clinical operations. Healthcare-specific disclosure timelines may be longer than typical software CVD timelines due to the need to validate that security patches do not affect diagnostic performance.

CRA reference:Article 13(6), Article 13(7)

Article 14 Incident Reporting in Clinical Settings

Article 14 notification obligations require the manufacturer to notify the relevant national CSIRT within 24 hours of confirmed active exploitation. For diagnostic instruments, exploitation scenarios — result data tampering, unauthorised result access, instrument command injection — could affect patient diagnoses and treatment decisions. Manufacturers must maintain monitoring capabilities that can detect anomalous access to diagnostic instruments or unusual patterns in result transmission data. The 24-hour notification window requires pre-established incident response procedures. Concurrent with CRA notification, IVDR Article 82 may require notification to the competent authority for serious incidents — defined as events that could lead to patient harm — within 2 days (immediate threat) or 15 days (serious incident). Both notification obligations must be triggered simultaneously by the same incident response activation.

CRA reference:Article 14(1), Article 14(2), Article 14(3)

Coordinating IVDR and CRA Conformity Assessment

IVD manufacturers with Class C or D products already subject to notified body assessment under IVDR should explore coordinating CRA assessment with their existing notified body, where the notified body holds dual IVDR and CRA accreditation. The technical files for IVDR and CRA purposes overlap significantly in areas of risk management, security architecture, and post-market surveillance — a coordinated assessment approach can leverage shared documentation and reduce the overall assessment burden. For IVDR Class A and B IVDs (self-certification), the CRA assessment pathway is also self-declaration unless the CRA classification is Important Class II. Manufacturers should complete their CRA classification analysis before concluding their IVDR conformity approach, as the two assessments may interact in how technical documentation is structured.

CRA reference:Article 24, Article 25, Annex VIII

CVD Portal handles your CRA Article 13 obligations automatically.

Public CVD submission portal, 48-hour acknowledgment tracking, Article 14 deadline alerts, and CSAF advisory generation. Free forever for Point-of-Care Diagnostics & IVD Manufacturers.

Start your free portal

Frequently asked

Our point-of-care analyser is connected to the hospital LIS but operates in a restricted clinical network. Does 'network connectivity' still bring us in scope?+

Yes. The CRA applies to products that can connect to another device or network — the physical or logical characteristics of that network do not determine scope. An analyser with an Ethernet port connected to a hospital LIS is a product with digital elements regardless of whether that hospital network is air-gapped, VLAN-segmented, or otherwise restricted. The relevant question for CRA obligations is whether the product has been placed on the EU market — not how it is deployed by the customer. Your security obligations under Annex I, including CVD policy and incident notification, apply to the product regardless of deployment context.

How does CRA SBOM disclosure interact with our trade-secret obligations for diagnostic algorithm software?+

The CRA requires you to maintain an SBOM — it does not require you to publicly disclose it. The SBOM must be available to market surveillance authorities on request but is not required to be published. Component-level SBOM information (package names, versions, known CVEs) does not typically constitute disclosure of trade-secret algorithms. Proprietary diagnostic algorithm components should be listed in the SBOM with sufficient identification to support vulnerability tracking, but the algorithmic logic itself is not part of the SBOM. Consult legal counsel to determine appropriate SBOM disclosure levels for components where trade secret concerns are most acute.

We discovered a vulnerability in our diagnostic software that could theoretically allow result manipulation. Do we notify CSIRT even before we know if it has been exploited?+

The CRA's 24-hour notification obligation under Article 14 is triggered when you become aware of an actively exploited vulnerability — not by vulnerability discovery alone. Discovery of a vulnerability without evidence of exploitation does not trigger the 24-hour notification. However, you must report the vulnerability through your own CVD process, issue a security update without undue delay, and communicate the update and interim mitigations to customers. If, during your investigation, you determine the vulnerability has been actively exploited, the 24-hour clock starts from the point you become aware of the exploitation. Document your investigation timeline carefully.

Need a CVD policy template for Point-of-Care Diagnostics & IVD Manufacturers?

Download a free CRA-compliant vulnerability disclosure policy and deploy it in minutes.

Browse templates →