← Role Guides
Engineering & TechnologyCRA Role Guide

EU Cyber Resilience Act — Guide for VP of Engineering

What the CRA means for your role, your team, and your day-to-day responsibilities.

The VP of Engineering is the executive accountable for translating CRA requirements into engineering practice across the entire product organisation. Where the CTO sets direction, the VP of Engineering ensures teams are resourced, processes are adopted, and delivery against security obligations is measurable. The CRA imposes ongoing obligations — not just a one-time certification exercise — which means the engineering org must be structured to sustain compliance through product iterations and team changes.

Your CRA responsibilities:

  • Drive CRA readiness across engineering squads, establishing security checkpoints in the SDLC
  • Allocate headcount and sprint capacity to security obligations including vulnerability remediation and SBOM maintenance
  • Champion secure software development lifecycle (SDLC) adoption with measurable engineering KPIs
  • Coordinate cross-team response to vulnerabilities, from triage through patching to disclosure
  • Lead build vs buy decisions for CRA tooling — SBOM generation, vulnerability scanning, OTA infrastructure
Engineering & Technology

This Role's CRA Accountability

The VP of Engineering carries management-level accountability for the technical implementation of CRA obligations. Article 10 places ongoing security obligations on manufacturers throughout the product support period — which means engineering teams cannot treat security as a launch-gate-only concern. The VP of Engineering must embed CRA checkpoints into the SDLC: design review, code review, pre-release security validation, and post-release monitoring. Under Annex I Part II, products must be shipped without known exploitable vulnerabilities — which requires the VP to ensure that unresolved security findings do not get deprioritised in favour of feature work without formal risk acceptance. The VP also owns the engineering response to Article 14 incident reporting windows, which demand fast diagnosis and patch timelines.

CRA reference:Article 10, Annex I Part I and II, Article 14

Day-to-Day Obligations

Day-to-day, a VP of Engineering running a CRA-compliant programme is managing a security backlog alongside the product backlog. This means setting policies for how critical and high CVEs are prioritised — a 30-day remediation SLA for criticals, for example — and ensuring the engineering capacity exists to meet them. Secure SDLC adoption requires that threat modelling, dependency scanning, and security review gates are part of the definition of done for relevant features, not optional additions. The VP of Engineering also approves build vs buy decisions for compliance tooling: whether to integrate SBOM generation into existing CI/CD tooling or procure a dedicated platform, and whether OTA update infrastructure is built in-house or sourced from a qualified vendor.

CRA reference:Article 10, Annex I Part II, Article 13

Cross-Functional Working

The VP of Engineering is the primary peer of the CISO and CTO on CRA matters within the organisation. The CISO sets security policy; the VP of Engineering ensures it is implemented. When the legal counsel raises a regulatory question about the engineering team's practices, the VP of Engineering provides the answer. Coordination with the PSIRT manager is critical during active vulnerability response: the VP of Engineering must ensure that remediation engineers are available, can triage quickly, and that patch delivery does not bottleneck on engineering capacity. The compliance officer needs regular engineering status updates for the technical file and conformity documentation — the VP of Engineering is responsible for ensuring those inputs are accurate and timely.

CRA reference:Article 10, Article 14, Article 13

Common Traps for This Role

The most common VP of Engineering trap in CRA compliance is treating security obligations as a one-time certification project rather than an ongoing engineering discipline. CRA compliance is not achieved and then maintained passively — it requires sustained engineering investment. A second trap is under-resourcing the security backlog: when security work consistently loses prioritisation to feature delivery, the technical debt accumulates until a serious vulnerability exposes the gap. A third trap is building CRA tooling from scratch when qualified off-the-shelf solutions exist — the build vs buy decision should weigh compliance assurance risk, not just cost. Finally, failing to establish clear escalation paths from security engineer to PSIRT to executive for Article 14-triggering events creates dangerous latency.

CRA reference:Article 10, Article 14, Annex I Part II

Getting Started Checklist

Start by mapping your current SDLC against CRA's Annex I obligations and identifying gaps — where are the checkpoints missing, and which teams are most exposed? Conduct a team readiness assessment: do your engineers understand secure coding practices, CRA scope, and how to handle a vulnerability disclosure? Establish a security backlog with clear SLAs for critical, high, and medium findings and confirm you have sprint capacity to meet them. Define the escalation path from security finding to Article 14 notification with named owners at each step. Finally, evaluate your current tooling against SBOM generation, vulnerability scanning, and OTA update requirements — identify gaps and initiate procurement or integration projects with delivery milestones.

CRA reference:Article 10, Annex I, Article 14, Article 13

CVD Portal handles your CRA Article 13 obligations automatically.

Public CVD submission portal, 48-hour acknowledgment tracking, Article 14 deadline alerts, and CSAF advisory generation — built for VP Engs and their teams.

Start your free portal

Frequently asked by VP Engs

How much engineering capacity should we allocate to CRA compliance work?+

There is no universal rule, but a useful benchmark is 15-20% of engineering capacity for teams with significant embedded or firmware products shipping to the EU market. This covers SBOM maintenance, vulnerability scanning and remediation, security reviews, CVD policy operations, and documentation. The actual allocation depends on your product's CRA risk class and the current security debt level. Teams starting from low security maturity will need a higher initial investment that reduces once baseline practices are established and tooling is automated.

Should we build our own SBOM and vulnerability scanning tooling or buy it?+

For most engineering organisations, buy or integrate existing open-standard tooling rather than build from scratch. SBOM generation using established CycloneDX or SPDX tools integrated into your CI/CD pipeline is well-solved. The compliance risk of building custom tooling is that it may generate SBOMs that do not satisfy notified body or market surveillance authority expectations. Reserve engineering investment for the product itself; use proven tooling for compliance infrastructure. Evaluate against your existing DevOps platform's native capabilities before procuring standalone tools.

What does a secure SDLC look like specifically for CRA compliance?+

A CRA-aligned secure SDLC includes threat modelling at design phase for security-relevant features, dependency scanning integrated into the build pipeline with policy gates, a security review checkpoint before release candidate promotion, SBOM generation and archiving at each release, and a defined process for handling vulnerability reports received after shipping. Post-release monitoring — watching for new CVEs affecting shipped components — is an ongoing obligation under Article 10 that goes beyond the development lifecycle itself and requires tooling to sustain.

Need a CVD policy template your team can deploy today?

Free CRA-compliant templates for every stage — from first CVD policy to full PSIRT programme.

Browse templates →