← Role Guides
OperationsCRA Role Guide

EU Cyber Resilience Act — Guide for Sales Engineer & Pre-Sales Consultant

What the CRA means for your role, your team, and your day-to-day responsibilities.

The Cyber Resilience Act is reshaping enterprise procurement. Customers subject to NIS2 are demanding CRA conformity evidence from their technology suppliers as a condition of purchase. Sales engineers and pre-sales consultants are often the first point of contact when these demands arrive — and must be capable of answering accurately, sourcing the right documentation, and positioning the product's compliance status as a competitive advantage. This guide equips sales engineers with the knowledge to handle CRA-related customer conversations confidently.

Your CRA responsibilities:

  • Respond accurately to customer security questionnaires regarding CRA conformity status
  • Source and deliver Declarations of Conformity and technical documentation to enterprise customers when requested
  • Communicate product support period and end-of-life timelines clearly and in writing
  • Escalate customer requests for product-specific security information to the security or product team
  • Position CRA conformity as a differentiator in competitive sales situations
  • Flag customer requirements that may expose product compliance gaps to the product and legal teams
  • Avoid making unsubstantiated conformity claims that could create regulatory or contractual exposure
Operations

CRA as a sales enabler and risk

The CRA creates both commercial opportunity and commercial risk for sales teams. The opportunity: enterprise customers — particularly those subject to NIS2, the DORA regulation, or sector-specific cybersecurity requirements — are under increasing pressure to demonstrate that the products they procure meet baseline security standards. Manufacturers who can produce a credible Declaration of Conformity, an up-to-date SBOM, and documented support commitments will win procurement decisions against competitors who cannot. The risk: sales engineers who make overconfident or inaccurate claims about CRA compliance — asserting CE marking before it is achieved, or understating product limitations in customer questionnaires — create contractual liability and potential regulatory exposure for the manufacturer. Accuracy is non-negotiable.

CRA reference:Article 13, Article 23

Answering customer security questionnaires

Enterprise customers, especially those in regulated sectors, routinely send multi-hundred-question security questionnaires as part of supplier qualification. CRA-related questions you can expect include: Does the product have a CE mark under the CRA? Has a conformity assessment been completed, and by which route? Is an SBOM available? What is the CVD policy and contact address? What is the product's support period and EOL date? Does the manufacturer have a published process for issuing security patches? Sales engineers should not answer these questions from memory. The product security or compliance team should maintain a master security questionnaire response document, updated with each product version, that sales engineers draw on. Responses must be accurate as of the date of the questionnaire — mark any items as 'in progress' rather than claiming conformity that has not been formally confirmed.

CRA reference:Article 13, Annex I

DoC and technical documentation requests

Article 23 requires manufacturers to make the Declaration of Conformity (DoC) available to market surveillance authorities and, where relevant, to customers. The DoC is a formal document signed by the manufacturer that declares the product meets the requirements of the CRA and any other applicable EU directives. Enterprise customers increasingly request the DoC as part of supplier due diligence. Sales engineers should know where the DoC is held and the process for sharing it with customers — typically a controlled copy request through the legal or regulatory affairs team. Customers may also request the technical file; while the full technical file need not be shared, a technical summary or a subset of test reports may satisfy the customer's due diligence requirement. Coordinate with the compliance team before sharing any technical documentation.

CRA reference:Article 23, Annex V

Communicating EOL timelines to customers

Article 13 requires manufacturers to define and communicate a support period at the time of placing the product on the market. This must be an honest representation of the period during which security updates will be provided. Enterprise customers who integrate a product into critical infrastructure or long-lived systems need to understand whether the product's support period is compatible with their operational lifecycle. Sales engineers must communicate EOL dates accurately and in writing, and must not promise extended support informally without confirming availability with the product team. When a product's EOL date approaches, customers should receive formal advance notice — the CRA encourages manufacturers to notify users when the support period is ending so they can make informed decisions about continued use or migration.

CRA reference:Article 13(8), Article 13(11)

Getting started checklist

Request a current version of the master security questionnaire response document from the product security or compliance team and store it in the sales knowledge base. Confirm with the product team what each product's CRA classification is (Default, Class I, or Class II Important) and what the conformity assessment status is. Identify where the Declaration of Conformity is held and what the process is for providing a copy to a customer. Confirm the support period and EOL date for every product in your portfolio and update CRM records accordingly. Attend an internal briefing with the PSIRT or security team to understand the CVD process and how to direct customers who report a potential vulnerability. Flag any customer questionnaire questions you cannot confidently answer to the compliance team for resolution.

CRA reference:Article 13, Article 23, Annex V

CVD Portal handles your CRA Article 13 obligations automatically.

Public CVD submission portal, 48-hour acknowledgment tracking, Article 14 deadline alerts, and CSAF advisory generation — built for Sales Engs and their teams.

Start your free portal

Frequently asked by Sales Engs

Can sales engineers share the product's SBOM with customers?+

SBOMs may be commercially sensitive because they reveal the complete dependency tree of a product, which could expose competitive information about the technology stack. Manufacturers typically do not share full SBOMs publicly but may share them under NDA with enterprise customers who have a legitimate compliance need. Sales engineers should direct SBOM requests to the product security or legal team rather than sharing independently. Some manufacturers offer a VEX (Vulnerability Exploitability eXchange) statement instead, which tells customers whether specific CVEs affect the product without revealing the full component inventory.

What if a customer asks whether we are CRA-compliant before our conformity assessment is complete?+

Honesty is essential. If the conformity assessment is not yet complete, state that clearly: 'We are currently completing our CRA conformity assessment ahead of the December 2027 application date. We can share our roadmap and current readiness posture.' Do not claim CE marking under the CRA before it has been formally achieved. False conformity claims constitute a regulatory breach under Article 13 and can also give rise to contractual misrepresentation claims from customers. A credible conformity roadmap, backed by a CRA readiness score, is a more defensible position than an unsupported conformity assertion.

What are the consequences if a customer suffers a breach and our product had a known unpatched vulnerability?+

This is a product liability question that legal counsel should address, but sales engineers should understand the basic landscape. The CRA introduces a duty to ensure products are free from known exploitable vulnerabilities at the time of placing on the market, and to issue security updates during the support period. If a product had a known vulnerability for which a patch was not issued, and a customer suffered harm as a result, both regulatory enforcement action and civil liability claims are plausible. Accurate EOL and support period communication — in writing — is therefore a risk management measure as well as a CRA compliance obligation.

Need a CVD policy template your team can deploy today?

Free CRA-compliant templates for every stage — from first CVD policy to full PSIRT programme.

Browse templates →