← Role Guides
OperationsCRA Role Guide

EU Cyber Resilience Act — Guide for Supply Chain & Vendor Risk Manager

What the CRA means for your role, your team, and your day-to-day responsibilities.

Supply Chain and Vendor Risk Managers are responsible for ensuring that the components, software libraries, and services sourced from third parties do not introduce cybersecurity risk that the manufacturer cannot manage — and cannot adequately disclose in the technical file. Annex I §10 of the CRA explicitly requires manufacturers to address the security of the software and hardware supply chain. This guide explains how Supply Chain Managers operationalise that requirement across vendor assessment, contractual controls, SBOM collection, and open-source governance.

Your CRA responsibilities:

  • Maintain a classified inventory of all third-party suppliers of components, firmware, software, and services integral to regulated products
  • Conduct pre-engagement and periodic security assessments of supply chain participants
  • Negotiate and enforce CRA-aligned contractual security obligations with all material suppliers
  • Operate the SBOM collection and management process for third-party and open-source components
  • Monitor supplier security advisory channels and feed CVE disclosures into the PSIRT triage queue
  • Manage open-source component governance including licence compliance and vulnerability tracking
  • Coordinate with the compliance team to ensure supply chain evidence is available for the technical file
Operations

CRA Supply Chain Obligations

Annex I Part I §10 of the CRA requires manufacturers to ensure the security of products throughout the supply chain, including the integrity of components obtained from third parties. This is a manufacturer obligation — you cannot delegate legal responsibility for supply chain security to your suppliers, but you must have contractual and operational controls that make compliance achievable.

The supply chain obligation operates at multiple levels:

  • Hardware components: ICs, modules, and sub-assemblies that bear firmware or perform security functions must be sourced from suppliers who can provide security specifications, CVE disclosure commitments, and SBOM data
  • Software libraries and SDKs: commercial software components integrated into the product must come with SBOM data, security advisory channels, and patch delivery commitments
  • Contract manufacturers: organisations that manufacture the product under the brand's name are part of the supply chain — the Authorised Representative and Importer roles under Article 13(15) must be clearly contractually defined
  • Cloud and SaaS dependencies: third-party APIs and services integral to product function are supply chain components — their security posture and incident notification obligations must be governed by contract

The supply chain risk assessment should be included in the technical file as evidence that Annex I §10 obligations are being met.

CRA reference:Annex I Part I §10, Article 13

Vendor Security Assessments and Contractual Requirements

A CRA-aligned vendor security assessment programme operates in two phases: pre-engagement assessment before a supplier is approved, and periodic re-assessment during the relationship.

Pre-engagement assessment criteria:

  • Does the supplier have a vulnerability disclosure policy and a public security advisory channel?
  • Can the supplier provide SBOM data for the components they supply in CycloneDX or SPDX format?
  • What is the supplier's track record on CVE disclosure and patch delivery timelines?
  • Is the supplier ISO 27001 or IEC 62443 certified, or equivalent?

Minimum contractual requirements for material suppliers:

  • CVE disclosure obligation: supplier must notify within a defined SLA (recommend 48 hours) of any CVE in components supplied that could affect the manufacturer's products
  • SBOM provision: supplier must provide and maintain an SBOM in a machine-readable format, updated with each new component version
  • Patch delivery commitment: supplier must deliver security patches within a defined timeline consistent with the manufacturer's Article 14 notification obligations
  • Audit rights: the manufacturer must retain the right to audit supplier security controls or request third-party assessment evidence
  • Incident notification: supplier must notify the manufacturer of any security incident affecting the supplied component within 24 hours
CRA reference:Annex I Part I §10, Article 14

SBOM Collection and Management Across the Supply Chain

Article 13(6) requires manufacturers to identify and document the components of their products with digital elements. Building a complete product SBOM requires collecting SBOM data from suppliers — a process that must be operational and continuous, not a one-time request.

Supplier SBOM collection process:

  • Formalise SBOM as a procurement requirement: add SBOM provision (format: CycloneDX 1.5+ or SPDX 2.3+) as a contractual deliverable for all new supplier relationships involving software or firmware components
  • Establish a supplier SBOM repository: maintain a centralised store of supplier-provided SBOMs, versioned and linked to the component versions in your product SBOM
  • Automate SBOM currency: track supplier component versions against your product's current SBOM — when a supplier releases a new version, trigger an automated request for the updated SBOM
  • SBOM gap register: maintain a register of components for which SBOM data has not yet been obtained — treat gaps as supply chain risk items with target closure dates
  • Merge supplier SBOMs into product SBOM: the product SBOM held in the technical file must include transitive dependencies from suppliers — software tooling can merge supplier-provided SBOMs into the top-level product SBOM automatically

SBOM completeness is increasingly a focus of notified body assessments — gaps in supplier SBOM coverage are a common finding.

CRA reference:Article 13(6), Annex V

Open-Source Component Governance

Open-source software components represent a significant proportion of most connected products' codebases and are a primary vector for supply chain vulnerabilities. Annex I §10 applies to open-source components as much as to commercial suppliers — and in many ways the governance challenge is greater because there is no contractual relationship to enforce.

CRA-aligned open-source governance programme:

  • Component inventory: maintain a complete inventory of all open-source components used in each product, including version, licence, and the upstream security advisory channel (NVD, OSV, GitHub Advisories)
  • Lifecycle monitoring: subscribe to vulnerability advisories for all material open-source components — use a structured feed rather than manual checking
  • Maintenance status assessment: before adopting a new open-source dependency, assess the project's maintenance status — abandoned or dormant projects create unresolvable CVE risk
  • Licence governance: track licence obligations for all open-source components; copyleft licences (GPL, AGPL) may restrict the ability to deliver security patches in proprietary-licensed products without triggering licence obligations
  • Commercial support as risk mitigation: for critical open-source components with no active community maintenance, consider commercial support arrangements that include security patch backport commitments

The open-source governance policy and component register should be maintained by the Supply Chain Manager and shared with Engineering for compliance.

CRA reference:Annex I Part I §10

Getting Started Checklist

Practical first steps for Supply Chain Managers building CRA compliance into their programme:

  • Classify the supplier base: identify all suppliers whose components, software, or services are integral to regulated products — segment by criticality (firmware, security components, communication modules as highest priority)
  • Audit existing contracts for CRA-relevant obligations — identify contracts with material suppliers that lack CVE disclosure, SBOM provision, and patch delivery terms and prioritise renegotiation
  • Launch SBOM collection campaign: contact all Tier 1 suppliers with a formal request for SBOM data in CycloneDX or SPDX format; establish the gap register for non-responders
  • Establish a supplier security advisory monitoring process: register for security advisory feeds from all material suppliers and route alerts to the PSIRT triage queue
  • Review open-source component inventory: work with Engineering to produce a complete list of open-source dependencies across all in-scope products — identify components that are abandoned, unlicensed, or have critical unpatched CVEs
  • Draft CRA-aligned supplier contract addendum: work with Legal to produce a standard contract addendum for existing and new suppliers covering the minimum security obligations
  • Run the CVD Portal CRA Readiness Score to benchmark supply chain coverage against Annex I §10 expectations

CVD Portal handles your CRA Article 13 obligations automatically.

Public CVD submission portal, 48-hour acknowledgment tracking, Article 14 deadline alerts, and CSAF advisory generation — built for Supply Chains and their teams.

Start your free portal

Frequently asked by Supply Chains

Can a manufacturer rely on a supplier's CE marking to satisfy CRA supply chain requirements?+

Not automatically. A supplier's CE marking under another directive (e.g., the Radio Equipment Directive) does not confirm CRA conformity. The CRA has its own conformity assessment requirements, and a component's compliance under another framework does not transfer to CRA compliance for the integrated product. Manufacturers must independently verify that components meet Annex I requirements in the context of their product, and must obtain SBOM data and security specifications regardless of the component's CE marking status.

What should we do if a critical supplier refuses to provide SBOM data?+

Refusal to provide SBOM data is a supply chain risk that must be documented and escalated. Practical options include: requiring the supplier to provide an independent audit confirming SBOM completeness without releasing the data directly; engaging a third-party bill-of-materials extraction service for the component; or treating the component as high-risk in the technical file with a compensating control narrative. In the longer term, supplier SBOM provision should become a contractual condition — if a supplier will not accept this term, they should be flagged for replacement.

How does the CRA affect relationships with contract manufacturers who build products under the manufacturer's brand?+

Contract manufacturers who produce products under the brand's name are part of the regulated supply chain. The brand owner (as manufacturer in the CRA's meaning) remains legally responsible for conformity, but must have contractual controls with the contract manufacturer covering: adherence to the agreed bill of materials, no unauthorised component substitutions, access for audit, and security incident notification. Article 13(15) addresses importers and distributors separately — ensure your contract manufacturing agreement clearly establishes roles and obligations.

Need a CVD policy template your team can deploy today?

Free CRA-compliant templates for every stage — from first CVD policy to full PSIRT programme.

Browse templates →