EU Cyber Resilience Act Guide for Water Treatment & Utilities Automation Vendors
Important — Class II for process control systems; Class I for monitoring platforms
Water treatment and utilities automation vendors supplying SCADA systems, remote telemetry units, and control systems to EU water utilities are subject to the CRA as manufacturers of products critical to essential services. The water sector's classification as critical infrastructure under NIS2 means that automation product vendors face intense scrutiny from both CRA market surveillance authorities and water utility customers implementing their own NIS2 supply chain obligations. Demonstrated CRA compliance is rapidly becoming a mandatory procurement criterion for EU water utility contracts.
CRA Scope and Classification for Water Utility Automation
Automation products supplied to EU water utilities — including SCADA platforms for water treatment plant control, remote telemetry units (RTUs) for distribution network monitoring, pump station controllers, chlorination dosing system controllers, and smart metering concentrators — are products with digital elements under Article 3(1). Water treatment process control systems — particularly those controlling chemical dosing, filtration, and disinfection — are strong candidates for Class II Important Products given their role in ensuring public health through safe drinking water supply. SCADA historian and monitoring-only platforms without direct actuator control may qualify as Class I. Vendors supplying both control and monitoring functionality in an integrated platform should classify based on the highest-risk function. The water sector's designation as critical infrastructure under EU CER Directive and NIS2 elevates the regulatory stakes for product cybersecurity.
Technical Security Obligations for Water System OT
Water treatment automation systems face adversarial interest from both criminal ransomware groups and state-sponsored threat actors targeting critical infrastructure. High-profile attacks on water utilities have demonstrated the public health consequences of SCADA system compromise. Annex I requires: authenticated and encrypted remote access for all operator and maintenance interfaces; elimination of default credentials on all field RTUs, PLCs, and HMI terminals; integrity-verified firmware updates deployable without requiring physical site visits to each remote pumping station; tamper-evident audit logs recording all process control commands and configuration changes; network segmentation documentation separating OT networks from corporate IT and the internet; and robust access control preventing operator-level accounts from modifying control system configuration. The SBOM must cover RTU firmware, SCADA server software, historian databases, and any OPC-UA or similar middleware components used for protocol translation.
CVD Policy Under Article 13 for Water Automation Vendors
Article 13 mandates a published CVD policy. For water automation vendors, the CVD programme must be designed to accommodate: coordination with water sector national CSIRTs and information sharing mechanisms (such as WaterISAC); vulnerability disclosure to ENISA as the competent authority for critical infrastructure cybersecurity; and the operational challenge that water utilities cannot take treatment systems offline for security patching without securing alternative supply arrangements. The CVD policy should establish a security advisory notification system that reaches water utility operators through multiple channels — including direct email notification, ISAC bulletins, and account manager communication — to ensure rapid awareness of critical vulnerabilities. Interim mitigations — network isolation measures, monitoring rule updates — must be documented and rapidly disseminated when a critical vulnerability cannot be immediately patched.
Article 14 Reporting for Critical Infrastructure Products
Article 14 requires notification to the relevant national CSIRT within 24 hours of confirmed active exploitation. For water treatment automation vendors, active exploitation — particularly if it involves manipulation of dosing controls or flow management systems — may constitute a public health emergency requiring simultaneous notification to water sector regulators, public health authorities, and law enforcement, in addition to the CSIRT notification. Vendors must have pre-established communication protocols covering all relevant authorities for this scenario. The incident response plan should include pre-written notification templates for each scenario type, pre-authorisation for incident response team members to make regulatory notifications without executive approval delays, and direct contact details for national CSIRTs and water sector regulators in all EU member states where products are deployed.
Conformity Assessment and Water Sector Procurement
Class II water treatment automation products require notified body assessment. Given the water sector's critical infrastructure status, notified body assessment provides the assurance level that utility procurement teams and regulators expect. For Class I monitoring platforms, self-declaration against IEC 62443 standards is the appropriate pathway. Vendors should prioritise obtaining CRA CE marking as it directly supports compliance with NIS2 supply chain security requirements that water utility customers must meet. Water utility tender specifications in EU member states are already beginning to include CRA compliance requirements as procurement criteria. The technical file should be structured to facilitate extraction of key security information for customer supply chain security questionnaires, reducing the administrative burden on both vendor and customer during the procurement process.
CVD Portal handles your CRA Article 13 obligations automatically.
Public CVD submission portal, 48-hour acknowledgment tracking, Article 14 deadline alerts, and CSAF advisory generation. Free forever for Water Treatment & Utilities Automation Vendors.
Start your free portalFrequently asked
Many of our RTUs are installed in remote pump stations with no reliable internet connectivity. How do we meet the security update obligation?+
The CRA's security update obligation applies to the manufacturer — you must make updates available without undue delay. The mechanism for delivering updates to remote sites with poor connectivity is a design and operational challenge to solve, not an exemption from the requirement. Practical approaches include: cryptographically signed update packages delivered via removable media for sites without internet access; automated update delivery via cellular backup links triggered during defined maintenance windows; and vendor-managed update services using low-bandwidth communication channels. Your technical file should document the update mechanism for each deployment scenario and any limitations, with compensating monitoring and mitigation measures for sites where automated update delivery is not feasible.
A water utility operating our SCADA system experienced a ransomware attack. Are we required to report this under Article 14?+
Article 14 notification is triggered when you — the manufacturer — become aware of an actively exploited vulnerability in your product. If the ransomware attack exploited a vulnerability in your SCADA product specifically, then yes, you must notify the CSIRT within 24 hours of becoming aware of this exploitation. If the attack used a vulnerability in third-party software on the customer's infrastructure (e.g. Windows servers, VPN appliances) rather than a vulnerability in your SCADA product, then Article 14 does not apply to you — though you should offer rapid incident response assistance to the affected customer. Clarifying the precise attack vector quickly is essential for determining your notification obligations.
How should we document security requirements for water utility customers implementing NIS2 supply chain security assessments?+
NIS2 Article 21 requires critical infrastructure operators to assess the cybersecurity of their supply chain. Your CRA technical documentation — including the declaration of conformity, SBOM, security architecture summary, CVD policy, and update policy — directly addresses the information water utilities need for supplier security assessments. Prepare a 'supplier security pack' summarising this information in a format compatible with common procurement questionnaires (e.g. SIG Lite, CAIQ). Make the pack available under NDA where commercially sensitive. CRA CE marking on your products provides a baseline assurance signal that significantly simplifies the utility's supplier assessment process.
Key CRA articles for Water Treatment & Utilities Automation Vendors
Need a CVD policy template for Water Treatment & Utilities Automation Vendors?
Download a free CRA-compliant vulnerability disclosure policy and deploy it in minutes.