
9
min reading time
The Cyber Resilience Act (CRA) entered into force on 10 December 2024, establishing mandatory cybersecurity requirements for manufacturers of products with digital elements across the European Union. With full application set for 11 December 2027 and reporting obligations beginning 11 September 2026, organizations now face a critical timeline to achieve compliance or risk substantial penalties.
While the CRA aims to safeguard consumers and businesses by ensuring products are designed and maintained with security as a priority, it works alongside other EU cybersecurity initiatives such as the EUCC (European Union Common Criteria). In January 2024, the European Union Agency for Cybersecurity (ENISA) adopted the EUCC as the first scheme within the EU cybersecurity certification framework, creating a comprehensive system that categorizes products by risk level, including "important" and "critical" products subject to stricter obligations.
This article explains the key differences and overlaps between the Cyber Resilience Act and EUCC certification, providing clarity on how these frameworks interact and offering practical guidance on compliance pathways for manufacturers, importers, and distributors facing these new regulatory requirements.

As highlighted in our article ,,The CRA as the Cornerstone of the EU Cybersecurity Ecosystem" the Cyber Resilience Act primarily aims to secure Europe's digital sovereignty and boost the cyber-resilience of European companies. The regulation establishes a comprehensive framework to ensure products with digital elements meet essential security requirements throughout their lifecycle.
The CRA pursues two fundamental objectives. First, it works to enhance the cybersecurity of products with digital elements by establishing horizontal requirements for hardware and software sold in the EU market. Second, it creates conditions enabling users to make informed choices by requiring transparent information about security features.
Furthermore, the CRA promotes responsibility by holding manufacturers accountable for identifying and correcting security risks. This approach reinforces consumer trust and increases market incentives for secure product development.
The regulation applies to a broad category known as "products with digital elements." This is defined as any software or hardware product (and its remote data processing solutions) that connects directly or indirectly to a device or network. To make it easier to understand, the CRA encompasses a wide variety of items we use daily:
As explained in our article, “Beyond 2025: Why RED is the Blueprint for CRA Success” a significant portion of these products, especially wireless devices, are already subject to strict cybersecurity regulations through the Radio Equipment Directive (RED). Since the requirements of RED and CRA are strategically aligned, preparing for the 2025 RED-DA deadline is not merely a transitional task, but a cornerstone of CRA compliance as well.
The CRA does not apply a "one-size-fits-all" approach. Instead, it categorizes products by risk level to ensure that security obligations are proportionate to the potential impact of a vulnerability. The regulation specifically identifies "important" and "critical" products, which are subject to much stricter obligations than standard consumer software. These categories are formally defined in the regulation’s technical annexes:
By referencing Annex III and Annex IV, manufacturers can pinpoint exactly where their product stands and determine whether they must undergo a mandatory third-party assessment.
Pro Tip: As the digital landscape evolves, the European Commission has the power to update the lists in Annex III and Annex IV. Manufacturers should regularly review these annexes and keep track of the upcoming reporting obligations starting 11 September 2026 to ensure their product’s classification remains compliant as new delegated acts are adopted.
The CRA places compliance obligations on all economic operators in the digital product supply chain:

The European Union Cybersecurity Certification, drafted by ENISA (European Union Agency for Cybersecurity), is a monumental leap forward in certifying Information and Communication Technology (ICT) products within the European landscape and at the EU level.
Conceived under the EU Cybersecurity Act, enacted in 2019, this groundbreaking scheme is designed to revolutionize the cybersecurity certification process for a wide spectrum of ICT products, covering hardware, software, and services. The overarching goal is to establish a comprehensive and unified framework that enhances cybersecurity standards, creates a safer digital environment for consumers, and fosters smoother trade across the European Union.
For a more detailed overview of the EUCC framework, refer to our blog post “EUCC: A New Cybersecurity Scheme for Evaluating and Certifying Products in Europe.”
The CRA operates as a horizontal regulation applying to all products with digital elements in the EU market, whereas EUCC functions as a voluntary certification scheme based on Common Criteria. Moreover, CRA categorizes products into "important" and "critical" classifications subject to stricter obligations, yet EUCC applies its own "substantial" and "high" assurance levels for security certification.
Both frameworks address vulnerability management, patch deployment, and security assessments. In essence, many EUCC security functional requirements align naturally with CRA's essential cybersecurity requirements, creating a foundation for compatibility between the two systems.
Despite overlapping goals, the CRA is legally binding with potential penalties, whereas EUCC remains voluntary. The CRA mandates conformity assessment processes that vary based on product criticality, although EUCC certification offers one pathway toward demonstrating this conformity.
EUCC certification establishes a "presumption of conformity" with CRA requirements. As a result, ENISA launched pilot projects to test this interplay, aiming to:

For manufacturers facing CRA implementation, multiple compliance pathways exist to demonstrate product conformity.
Manufacturers of critical products can leverage EUCC certification at the substantial level to demonstrate CRA compliance. The EUCC scheme's security functional requirements (SFRs) and security assurance requirements (SARs) align with many CRA requirements, creating a valuable compliance pathway. Through established equivalence between frameworks, EUCC certification can provide presumption of conformity with essential CRA requirements.
Products complying with harmonized standards automatically benefit from presumption of conformity with CRA essential requirements. The European Commission has adopted standardization request M/606, encompassing 41 standards supporting CRA implementation. This systematic alignment further illustrates why we consider RED as the blueprint for CRA success; the technical groundwork and standardization efforts currently securing wireless devices are directly paving the way for these broader CRA norms. These include both horizontal standards (providing common frameworks) and vertical standards (offering product-specific guidance).
Choosing the right compliance pathway is critical for market access. For a comprehensive overview of the conformity procedures and technical documentation required under the CRA, refer to our EU Cyber Resilience Act Infographics.
Key deadlines include:
As European cybersecurity regulations continue to evolve, organizations now face critical deadlines for CRA compliance. September 2026 marks the start of mandatory vulnerability reporting, followed by full implementation in December 2027. Companies preparing today rather than waiting until the last minute will gain significant competitive advantages while strengthening their overall security posture.
The relationship between CRA and EUCC creates both challenges and opportunities for manufacturers. Although these frameworks differ in scope and enforcement, CRA being mandatory while EUCC remains voluntary, they share fundamental cybersecurity objectives. Therefore, organizations can strategically use EUCC certification as a viable pathway toward demonstrating CRA conformity, particularly for critical products requiring third-party assessment.
Regardless of which compliance pathway organizations choose, certain actions deserve immediate attention. First, manufacturers should categorize their products according to CRA risk classifications. Subsequently, they must develop robust vulnerability management processes to meet the 24-hour notification requirements for actively exploited vulnerabilities. Additionally, examining applicable harmonized standards will provide clearer direction for implementation strategies.
The convergence of these regulatory frameworks ultimately serves a greater purpose, creating a more secure digital ecosystem throughout Europe. By establishing consistent cybersecurity requirements and certification pathways, both CRA and EUCC work together to protect consumers, strengthen market confidence, and raise the security baseline for all products with digital elements. Businesses that embrace these requirements now will undoubtedly find themselves better positioned for success in tomorrow's increasingly regulated digital marketplace.
As an accredited cybersecurity laboratory with extensive experience in the evaluation of digital products and security standards, CCLab provides comprehensive support to manufacturers preparing for CRA compliance.
Our services include:
CCLab acts not only as a testing laboratory but also as a strategic partner, supporting companies from early design stages through final evaluation, enabling them to create secure, compliant, and resilient products.
Ready to start your compliance journey? Explore our full range of CRA Compliance Services or contact our experts today for a personalized consultation.


This downloadable infographics introduces the Common Criteria Evaluation process to you. Explore now for free.


Download EUCC Study 2024 for the most important and up-to-date information about the new European Union Cybersecurity Certification Scheme


The EU Cyber Resilience Act (CRA) introduces a unified cybersecurity framework for products with digital elements that have direct or indirect, logical or physical data connection to a device or network, including everything from software or hardware products to free and open-source software that is monetized or integrated into commercial products.

As the 11 September 2026 reporting deadline approaches, understanding the Cyber Resilience Act (CRA) is essential for all manufacturers of digital products. This blog post explores the key differences and overlaps between the CRA and the EUCC certification scheme, providing a clear roadmap for compliance, risk categorization, and long-term market access.
9
min reading time

Smart toys are more than just software; they are radio equipment and thus subject to strict EU regulations. Our analysis explores the interplay between RED, the CRA, and the AI Act, while outlining the essential cybersecurity testing processes for a safe market entry.
7
min reading time

Legacy systems power critical operations across industries worldwide, yet they present unique challenges when organizations pursue Common Criteria certification. The clock is ticking for manufacturers and enterprises who must navigate complex compliance requirements while maintaining operational continuity. Organizations pursuing Common Criteria certification must address unique challenges when dealing with legacy infrastructure, but with the right approach, success is achievable. The urgency cannot be overstated. Regulatory deadlines approach rapidly, and the cost of non-compliance continues to escalate. Legacy systems that once served as reliable workhorses now require strategic transformation to meet modern security standards. This guide provides actionable strategies to prepare your legacy infrastructure for certification success.
10
min reading time