EU Cyber Resilience Act — Guide for Startup Founder & CEO (First-Time CRA Compliance)
What the CRA means for your role, your team, and your day-to-day responsibilities.
The Cyber Resilience Act applies to startups that manufacture products with digital elements sold in the EU market, regardless of company size. There are no SME exemptions from the core obligations, though the regulation includes some proportionality provisions around compliance cost assessments. For first-time founders navigating CRA compliance, the challenge is achieving conformity efficiently — without over-engineering the process — while meeting the key obligations around vulnerability management, SBOM, and CVD policy. This guide provides a practical starting point.
Your CRA responsibilities:
- ›Determine whether each product is in scope for the CRA and classify it as Default, Class I, or Class II Important
- ›Implement a minimum viable vulnerability management process covering SBOM, CVE triage, and patch issuance
- ›Publish a CVD policy and machine-readable security contact (security.txt)
- ›Produce and maintain a technical file with evidence of Annex I conformity
- ›Complete and sign an EU Declaration of Conformity before placing the product on the EU market
- ›Appoint an EU Authorised Representative if the company is not established in the EU
- ›Communicate product support periods and EOL dates on product packaging or documentation
CRA scope for startups
The CRA applies to any product with digital elements placed on the EU market — whether manufactured by a large corporation or a two-person startup. If your product is a physical device with network connectivity, a consumer software application, or a software component integrated into other products, it is almost certainly in scope. The key exclusions are: products developed solely for national security or defence purposes; open-source software developed outside of commercial activity (see the stewardship exemption); and certain regulated product categories that fall under sector-specific legislation. Most startup hardware and SaaS products are in scope. The first task is to run each product through the classification test: Default (self-assessment), Class I Important (self-assessment or harmonised standard), or Class II Important (mandatory notified body). Annex III lists the Important Product categories.
Minimum viable CRA compliance
Startups should not attempt to implement every possible security control before achieving minimum CRA compliance. The core obligations are: shipping a product free of known exploitable vulnerabilities; maintaining an SBOM for each product in a machine-readable format; having a CVD policy and a working security contact; committing to and delivering security updates for a defined support period; and completing a conformity assessment (self-assessment for Default and most Class I products). The technical file for a simple Default-class product can be surprisingly tractable: an architecture document, a threat model, SBOM, static analysis run records, and a signed Declaration of Conformity. Start with these, add to the file with each release, and build process maturity incrementally rather than attempting a big-bang compliance programme.
Build vs buy vs outsource for CRA tooling
Startups must make pragmatic decisions about CRA tooling. SBOM generation should almost always use an existing open-source or commercial tool integrated into the CI/CD pipeline — building SBOM generation from scratch is not a sensible use of engineering time. Vulnerability scanning against the SBOM can similarly be automated using existing CVE database integrations. For the technical file, a structured set of documents in version control is sufficient — specialist document management systems are rarely necessary at the startup stage. CVD policy publication requires only a security.txt file at the correct URL and a monitored inbox. Penetration testing is one area where external specialist engagement is often worth the cost, as it provides independent evidence for the technical file and finds issues that internal teams miss. For Class II Important Products, the notified body assessment cannot be avoided and should be budgeted.
Investor due diligence and CRA readiness
Institutional investors in EU-market B2B and hardware startups are increasingly incorporating regulatory compliance into due diligence, and the CRA is becoming a standard diligence item. Series A and later investors will ask: which products are in scope, what classification applies, what is the conformity assessment timeline, and are there material regulatory risks that could affect the business? Founders who can demonstrate a credible compliance posture — even if conformity assessment is not yet complete — are substantially better positioned than those who have not considered CRA obligations at all. A CRA readiness score provides a structured snapshot of current posture. Founders should also understand that a non-compliant product could be withdrawn from the EU market by a national competent authority, which represents a material business risk that investors will want to see managed.
Getting started checklist
List every product you sell or plan to sell in the EU and confirm it is in scope for the CRA. Classify each product as Default, Class I, or Class II Important using Annex III and available ENISA guidance. For each product, generate an SBOM from the current build and run it against NVD — address any critical findings before the next release. Publish a security.txt file referencing a monitored disclosure email address and draft a one-page CVD policy. Start a technical file folder for each product: add the architecture document, threat model, and SBOM as initial content. If the company is outside the EU, engage a specialist to serve as EU Authorised Representative. Run the CRA readiness score on CVD Portal to get a structured view of remaining gaps and prioritise accordingly.
CVD Portal handles your CRA Article 13 obligations automatically.
Public CVD submission portal, 48-hour acknowledgment tracking, Article 14 deadline alerts, and CSAF advisory generation — built for Founders and their teams.
Start your free portalFrequently asked by Founders
Are there any CRA exemptions or reduced obligations for startups or SMEs?+
The CRA does not exempt SMEs or startups from its core obligations. All in-scope products must conform with Annex I, complete a conformity assessment, and carry CE marking regardless of manufacturer size. However, the regulation requires the Commission to take SME interests into account in implementing measures, and national competent authorities are expected to apply proportionality in enforcement. ENISA is developing guidance and tooling specifically aimed at SMEs. The practical implication is that SMEs have the same legal obligations but may benefit from more accessible compliance resources and proportionate regulatory engagement when issues arise.
What happens if my product is non-compliant on the December 2027 application date?+
A non-compliant product placed on the EU market after 11 December 2027 will be in breach of the CRA. National market surveillance authorities can require the manufacturer to bring the product into conformity, restrict its sale, or order its withdrawal. For products already on the market, enforcement is more nuanced — market surveillance focuses on products as they are actively sold. The practical priority for startups is to achieve conformity for new products before the application date and to establish a remediation plan for existing products that will still be actively marketed after that date.
Can I rely on a cloud service provider's security certifications to cover CRA obligations for my product?+
Partially. If your product uses infrastructure services from a cloud provider who holds ISO 27001 certification or equivalent, that provides some evidence of the security of the hosting environment. However, the CRA's Annex I obligations relate to the product you manufacture — including the application code, the authentication mechanisms, the update delivery process, and the dependency chain. Cloud infrastructure security does not substitute for product-level security conformity. You remain responsible for the security of your application layer, your SBOM, your CVD process, and your patch issuance capabilities regardless of your cloud provider's certifications.
Key CRA articles for Founders
Need a CVD policy template your team can deploy today?
Free CRA-compliant templates for every stage — from first CVD policy to full PSIRT programme.