EU Cyber Resilience Act — Guide for Security Engineer
What the CRA means for your role, your team, and your day-to-day responsibilities.
The Cyber Resilience Act places concrete technical obligations on the teams who build and maintain secure products. Security engineers are responsible for implementing the Annex I security controls, operating vulnerability management processes, and providing the evidence that underpins a product's Declaration of Conformity. This guide translates each obligation into engineering practice.
Your CRA responsibilities:
- ›Implement Annex I Part I security-by-design controls in product architecture
- ›Maintain an accurate and up-to-date Software Bill of Materials (SBOM) for each product
- ›Triage CVEs against components listed in the SBOM and determine exploitability
- ›Operate or support the PSIRT in meeting Article 14 notification timelines
- ›Produce security test evidence for inclusion in the technical file
- ›Configure and publish a machine-readable CVD policy (security.txt)
- ›Conduct threat modelling and document residual risks in the technical file
CRA accountability for security engineers
Under Article 13, the manufacturer bears primary responsibility for product security, but that accountability flows directly to the engineering teams who make design decisions. Security engineers are expected to implement the security requirements set out in Annex I Part I, covering areas including secure configuration, minimal attack surface, protection of data in transit and at rest, and the ability to receive security updates. Failures at the engineering level — unpatched dependencies, hardcoded credentials, disabled security features — constitute non-conformity that can expose the manufacturer to market surveillance action and financial penalties up to €15 million or 2.5% of global annual turnover.
Implementing Annex I technical requirements
Annex I Part I lists fourteen security properties that products with digital elements must satisfy. These include: minimal attack surface by default, no known exploitable vulnerabilities at the time of placing on the market, the ability to update components securely, confidentiality and integrity of data, protection against unauthorised access, and resilience against denial-of-service conditions. Security engineers should map each requirement to a specific control in the product's architecture — for example, mutual TLS for data-in-transit confidentiality, signed firmware updates for integrity, and rate-limiting on authentication endpoints for resilience. Harmonised standards published under the CRA will provide presumption of conformity; tracking the EN 303 645 and IEC 62443 series is advisable until dedicated CRA standards are adopted.
SBOM management and CVE triage
Annex I Part II requires manufacturers to identify and document components, including by producing a Software Bill of Materials in a machine-readable format such as CycloneDX or SPDX. Security engineers own the accuracy of this SBOM and must ensure it is updated with each release. When new CVEs are published, engineers must assess each one against the product's component inventory: determine whether the vulnerable component is present, whether the vulnerable code path is reachable, and whether the product configuration mitigates the issue. CRA Recital 64 expects vulnerability management to be systematic, not ad hoc. Tooling that automates SBOM generation from build pipelines and watches NVD feeds for affected components significantly reduces manual triage burden.
Working with the PSIRT
Article 14 imposes strict notification timelines on manufacturers: an early warning to ENISA and the relevant national CSIRT within 24 hours of becoming aware of an actively exploited vulnerability, a full notification within 72 hours, and a final report within 14 days. Security engineers are typically the first to assess whether a reported or discovered vulnerability meets the 'actively exploited' threshold. Establishing a clear internal escalation path — from initial triage to PSIRT notification to legal sign-off — ensures that the clock does not run out during internal deliberation. Security engineers should also participate in drafting CSAF advisories, providing the technical accuracy that gives published advisories operational value for downstream users.
Getting started checklist
Begin by auditing the product's existing dependency inventory against NVD for known critical vulnerabilities — this gives an immediate compliance baseline. Next, integrate SBOM generation into the CI/CD pipeline using a tool that outputs CycloneDX or SPDX. Then map each Annex I Part I control to existing architecture documentation and identify gaps. Establish a threat model for the product if one does not exist, and record residual risks in a security assessment document that will form part of the technical file. Publish a security.txt file referencing the CVD contact address, and confirm internally who owns the Article 14 notification obligation. Review the CRA readiness score on CVD Portal to prioritise remaining gaps.
CVD Portal handles your CRA Article 13 obligations automatically.
Public CVD submission portal, 48-hour acknowledgment tracking, Article 14 deadline alerts, and CSAF advisory generation — built for Sec Engs and their teams.
Start your free portalFrequently asked by Sec Engs
Which SBOM format does the CRA require?+
The CRA does not mandate a specific format but requires that the SBOM be machine-readable. The two dominant industry formats are CycloneDX and SPDX. Both satisfy the machine-readability requirement. CycloneDX is increasingly common in vulnerability management toolchains, while SPDX is widely adopted in open-source licence compliance workflows. Either format is acceptable, provided it captures component name, version, supplier, and dependency relationships.
What is the Article 14 early warning deadline?+
Article 14 requires manufacturers to submit an early warning to ENISA and the relevant national CSIRT within 24 hours of becoming aware of an actively exploited vulnerability in their product. A more detailed notification must follow within 72 hours, and a final report — including remediation status — within 14 days. The clock starts from the moment the manufacturer has reasonable grounds to believe exploitation is occurring, not from the moment a patch is ready.
Do security engineers need to produce the technical file themselves?+
Not in full, but security engineers are responsible for producing the technical evidence that the technical file must contain: threat models, security test reports, SBOM, vulnerability assessments, and records of conformity with Annex I controls. The compliance or legal team typically assembles these artefacts into the formal technical file structure, but the substantive security content originates with the engineering team.
Key CRA articles for Sec Engs
Need a CVD policy template your team can deploy today?
Free CRA-compliant templates for every stage — from first CVD policy to full PSIRT programme.