← Role Guides
SecurityCRA Role Guide

EU Cyber Resilience Act — Guide for Chief Information Security Officer (CISO)

What the CRA means for your role, your team, and your day-to-day responsibilities.

The CISO is the operational heart of CRA compliance: responsible for the coordinated vulnerability disclosure policy, PSIRT leadership, and the Article 14 obligation to notify ENISA and relevant CSIRTs within 24 hours of discovering an actively exploited vulnerability. Unlike the CTO's programme ownership, the CISO's role is continuous — monitoring, responding, and reporting throughout the product's entire support lifetime.

Your CRA responsibilities:

  • Own and operate the coordinated vulnerability disclosure (CVD) policy and programme
  • Lead the Product Security Incident Response Team (PSIRT) function
  • Execute Article 14 early warning and notification obligations to ENISA/CSIRT
  • Commission and oversee the security testing programme against Annex I requirements
  • Operate threat intelligence processes to identify active exploitation of product vulnerabilities
Security

The CISO's CRA Accountability

The CISO holds operational accountability for the two most time-sensitive obligations in the CRA: coordinated vulnerability disclosure and Article 14 incident notification. When a vulnerability is discovered in a product — whether by internal testing, an external researcher, or active exploitation in the wild — the clock starts immediately. The CISO must ensure the organisation can triage, assess severity, and if necessary notify ENISA within 24 hours of learning of active exploitation. These are not aspirational standards; they are hard legal deadlines. CISOs who have not rehearsed this process before an incident will struggle to meet the obligation under pressure.

CRA reference:Article 14, Article 11

Day-to-Day CRA Obligations

The CISO's daily CRA workload centres on three areas. CVD programme operations: maintaining a published security.txt file and vulnerability intake channel, triaging incoming researcher reports, and managing disclosure timelines. Vulnerability monitoring: continuously monitoring NVD, vendor advisories, and threat intelligence feeds for CVEs affecting components on your product SBOMs. When a match is found, the CISO must initiate the internal severity assessment and coordinate the patch response with engineering. Security testing governance: ensuring your penetration testing, fuzzing, and code review programmes are documented and produce evidence suitable for inclusion in the Annex IV technical file. Testing evidence must be retained throughout the product's support period.

CRA reference:Article 11, Article 14, Annex I, Annex IV

Working with Other Functions

Effective CRA security operations require close coordination across functions. With Engineering/CTO: the CISO needs direct authority to escalate patch priority and must be embedded in SBOM governance to ensure vulnerability monitoring has accurate component data. With Legal Counsel: the CISO and Legal must agree in advance on the decision criteria for triggering an Article 14 notification — waiting for legal review during the 24-hour window is too slow. Pre-agreed thresholds and a notification template should be signed off before any incident occurs. With Procurement: the CISO should define the minimum security requirements suppliers must meet and review their CVD policies as part of supplier onboarding.

CRA reference:Article 14, Article 13

Common Traps for CISOs

The most critical trap is confusing the 24-hour early warning with the full notification. Article 14 requires a two-stage process: an early warning within 24 hours of becoming aware of an actively exploited vulnerability, followed by a complete notification within 72 hours. Many CISOs focus only on the 72-hour deadline and miss the early warning obligation entirely. A second trap is maintaining a CVD policy that is never tested — a published security.txt and an intake email are not a CVD programme unless they are regularly exercised. A third trap is scoping your security testing narrowly: Annex I requires security testing across the product's expected attack surface, not just a network penetration test.

CRA reference:Article 14, Article 11, Annex I

Getting Started Checklist for the CISO

Use this checklist to establish your CRA security operations baseline:

  1. Publish a security.txt file at the standard path for all product domains and your corporate site
  2. Draft and publish a CVD policy covering intake, triage SLAs, researcher acknowledgement, and disclosure timelines
  3. Map your SBOM inventory — confirm you receive SBOM data from all product engineering teams and can perform automated CVE matching
  4. Pre-draft your Article 14 notification template and agree trigger criteria with Legal Counsel in advance
  5. Run a tabletop exercise simulating an actively exploited product vulnerability — can you execute the 24-hour early warning?
  6. Review your penetration testing programme for Annex I coverage gaps
CRA reference:Article 11, Article 14, Annex I

CVD Portal handles your CRA Article 13 obligations automatically.

Public CVD submission portal, 48-hour acknowledgment tracking, Article 14 deadline alerts, and CSAF advisory generation — built for CISOs and their teams.

Start your free portal

Frequently asked by CISOs

What exactly triggers the 24-hour Article 14 early warning obligation?+

The 24-hour early warning is triggered when the manufacturer becomes aware that a vulnerability in their product is being **actively exploited**. This is distinct from merely discovering a vulnerability — passive discovery without evidence of exploitation triggers different timelines. Active exploitation means there is evidence that a threat actor is using the vulnerability in attacks in the wild. The CISO must establish clear internal criteria for what constitutes 'awareness' and ensure that information flows from threat intelligence and SOC teams to the notification decision-maker without delay.

Do we need a formal PSIRT, or can CVD be handled by the security team generally?+

The CRA does not mandate a named PSIRT function, but it requires the capability: a defined intake process, documented triage procedures, ability to execute Article 14 notifications, and coordination of patch releases. Whether this capability sits in a dedicated PSIRT team or is distributed across your security engineering function is an internal decision. What matters is that roles, responsibilities, and escalation paths are documented, trained, and regularly exercised — not that you have a formal PSIRT label.

How do we handle a vulnerability reported by an external researcher under the CRA?+

When a researcher submits a vulnerability report, the CRA requires you to acknowledge receipt, triage the report, and respond within a reasonable timeframe. Your CVD policy should specify your response SLAs — typically 5 business days for acknowledgement and 90 days for resolution or a status update. If the vulnerability is confirmed and actively exploited, Article 14 obligations are triggered independently of the disclosure timeline. Researchers should never be threatened with legal action for good-faith disclosure; doing so violates Article 11's intent and creates significant reputational risk.

Need a CVD policy template your team can deploy today?

Free CRA-compliant templates for every stage — from first CVD policy to full PSIRT programme.

Browse templates →