← Industry Guides
Energy & UtilitiesCRA Guide

EU Cyber Resilience Act Guide for Smart Meter & AMI Manufacturers

Important Class I — smart metering infrastructure is energy critical infrastructure by design

Smart meter and Advanced Metering Infrastructure (AMI) manufacturers placing electricity, gas, and water metering products on the EU market face Important Class I classification under the CRA. Smart meters are deployed at scale across EU households — over 225 million units projected by 2027 — making systematic vulnerabilities in metering hardware or the AMI communication network a critical infrastructure concern that regulators will scrutinise closely.

Article 13Article 14Annex IAnnex IIIArticle 11Article 10
Deadline: September 2026Classification: Important Class I — smart metering infrastructure is energy critical infrastructure by design

CRA Scope and Classification for Smart Metering Products

Smart meters (electricity, gas, water), data concentrators, AMI head-end systems, meter data management systems (MDMS), and in-home display units with network interfaces are products with digital elements within CRA scope. The energy-critical infrastructure context of smart metering places these products firmly in Important Class I.

The scale of smart meter deployment — each unit communicating metering data and receiving remote commands from the DSO — makes the CRA's security requirements particularly consequential. A vulnerability affecting a widely deployed smart meter model could potentially be exploited at scale across millions of installations. Manufacturers must assess each product generation independently: the communication module (RF mesh, PLC, cellular), the meter head firmware, the data concentrator, and any associated AMI software are all products with digital elements requiring compliance.

CRA reference:Article 6, Annex III

Technical Security Requirements for Metering Products

Smart meter security has been subject to industry standards for years — DLMS/COSEM, PRIME, G3-PLC, and various national metering security specifications. CRA Annex I formalises and extends these requirements:

  • Authenticated metering data: All metering data transmitted to DSO head-end systems must be authenticated and integrity-protected. DLMS/COSEM security suites provide the mechanism; compliance must be mandatory, not optional.
  • Encrypted command channels: Remote disconnect, tariff management, and firmware update commands must be encrypted and authenticated. Unauthenticated disconnect commands in metering protocols are a known attack vector.
  • Firmware update authentication: Over-the-air firmware updates via RF mesh or PLC must be cryptographically signed. Broadcast firmware updates are prohibited.
  • Key management: Long-lived symmetric keys shared across meter populations represent a systemic risk. Manufacturers should support unique per-device keys or PKI-based asymmetric authentication.
  • Tamper detection: Physical tamper events must be logged and reported to the DSO management system.
CRA reference:Annex I

CVD Policy and Article 13 in the Metering Sector

Smart meter manufacturers typically supply products to distribution system operators (DSOs) under tightly specified procurement contracts. This B2B-only distribution model does not exempt manufacturers from Article 13's CVD policy requirement — the policy must be publicly accessible regardless of the customer base.

  • Cover all products including meter heads, communication modules, data concentrators, and head-end software
  • Be accessible to energy sector security researchers and national CERTs who monitor metering infrastructure
  • Define a response process that coordinates with DSO customers, who are the operators of the metering systems and have independent NIS2 obligations for their infrastructure security
  • Commit to security advisory publication in CSAF 2.0 format, enabling automated processing by DSO vulnerability management systems

Given the scale of deployment, meter manufacturers should establish direct notification relationships with major DSO customers to ensure that patches reach the field before public disclosure where possible.

CRA reference:Article 13(1), Article 13(6)

Article 14 Incident Reporting for Metering Vulnerabilities

An actively exploited smart meter vulnerability affecting millions of units simultaneously constitutes a potential critical infrastructure incident. Article 14's 24-hour ENISA notification requirement must be integrated into a multi-track incident response process:

  1. ENISA (CRA Article 14 — 24 hours)
  2. National energy regulatory authority (NIS2 critical infrastructure — 24 hours for significant incidents)
  3. DSO customers — immediate direct notification, as DSOs may need to implement emergency operational procedures
  4. National CSIRT — particularly where mass exploitation across the metering estate is possible

Manufacturers should pre-agree incident response coordination protocols with their major DSO customers so that Article 14 notifications and operational responses are synchronised. The 72-hour detailed ENISA report must describe the affected product versions, exploitation method, and available mitigations including any emergency firmware update availability.

CRA reference:Article 14(1), Article 14(2)

Conformity Assessment and Metering Standards Alignment

Smart meter manufacturers face a complex standards landscape: OIML (measurement accuracy), IEC 62056 (DLMS/COSEM), EN 62052/62053 (metering standards), and national metering standards coexist with the CRA's cybersecurity conformity requirements. The CRA conformity assessment is additive to measurement accuracy certification — both are required for market placement.

  1. The metering product's digital elements (communication module, firmware) must be assessed against Annex I Part I requirements
  2. The vulnerability management process (Annex I Part II) must demonstrate SBOM maintenance, patch delivery capability, and CVD policy operation
  3. The technical file must document the security architecture, including the key management approach and communication protocol security configuration

Manufacturers supplying into multiple EU member states must be aware that some national smart metering specifications include cybersecurity requirements that may be more stringent than the CRA minimum. Where national requirements exceed CRA requirements, both must be satisfied. Begin notified body engagement by Q1 2026 to allow adequate time for assessment before the September 2026 deadline.

CRA reference:Article 24, Annex VIII

CVD Portal handles your CRA Article 13 obligations automatically.

Public CVD submission portal, 48-hour acknowledgment tracking, Article 14 deadline alerts, and CSAF advisory generation. Free forever for Smart Meter & AMI Manufacturers.

Start your free portal

Frequently asked

Are smart gas and water meters subject to the CRA, or only electricity meters?+

All smart meters with network interfaces and digital processing capabilities are products with digital elements within CRA scope — including gas, water, and heat meters. The classification as Important Class I reflects the critical infrastructure context of utility metering, regardless of the specific utility type. Gas and water metering manufacturers should note that the metering accuracy certification requirements (under MID — Measuring Instruments Directive) apply separately and concurrently with CRA requirements. Both sets of conformity requirements must be satisfied before CE marking.

Who bears CRA responsibility when a DSO specifies the meter design and the manufacturer builds to spec?+

The entity placing the product on the EU market bears primary CRA responsibility as the manufacturer. If the manufacturer places the smart meter on the market under their own brand name — even when built to DSO specifications — the manufacturer is responsible for CRA conformity. If the DSO takes on the product and places it on market themselves, the CRA manufacturer obligations may transfer. In practice, most DSO procurement contracts specify that the meter supplier is responsible for regulatory compliance. Manufacturers should review their contracts and ensure that CRA compliance is explicitly allocated and that the DSO's security specifications are aligned with CRA Annex I requirements.

How do we manage the long deployment lifecycle of smart meters under the CRA?+

Smart meters have operational lifetimes of 10–20 years, far exceeding typical consumer electronics. The CRA requires manufacturers to provide security updates throughout the declared supported lifetime. For metering manufacturers, this means: declaring a realistic supported lifetime aligned with DSO contract terms (typically 15–20 years for utility infrastructure), establishing a security update delivery infrastructure that can operate for that full period, maintaining vulnerability monitoring capabilities for legacy meter generations, and planning the economic model for long-term support before products are placed on market. The cost of CRA-compliant lifecycle support must be factored into metering product pricing and DSO contract terms.

Need a CVD policy template for Smart Meter & AMI Manufacturers?

Download a free CRA-compliant vulnerability disclosure policy and deploy it in minutes.

Browse templates →