.jpg)
10
min reading time
The Cyber Resilience Act (CRA) represents one of the most comprehensive regulatory steps the European Union has taken to reinforce cybersecurity across the rapidly expanding digital ecosystem. As society increasingly relies on interconnected devices, embedded systems, and cloud-integrated solutions, the digital threat landscape has grown at an unprecedented pace. Attackers exploit vulnerabilities in consumer IoT products, industrial control systems, software supply chains, and critical infrastructure components. These incidents have highlighted a fundamental truth: cybersecurity can no longer be optional, reactive, or fragmented.
Before the CRA, manufacturers followed a patchwork of voluntary best practices, industry guidelines, and fragmented national requirements. This led to inconsistent security levels, limited accountability, and unequal market conditions. The European Union recognized that digital security must be elevated to a mandatory requirement, not a competitive afterthought. The CRA therefore introduces a unified, enforceable cybersecurity baseline for all “products with digital elements” (PWDE)—ensuring that every device placed on the EU market is secure by design, secure by default, and secure throughout its entire lifecycle.
The regulation embeds the principles of security-by-design, defense-in-depth, and lifecycle security into the legal framework. Manufacturers must now integrate cybersecurity considerations from concept and architecture design through development, production, maintenance, and end-of-life. This shift promotes long-term resilience, reduces systemic risks, and enhances user trust in digital technologies.

The CRA applies to an extremely broad category of products—essentially any product that includes or interacts with digital components. This includes devices and software that:
This scope spans everything from smart appliances, routers, wearables, industrial PLCs, medical software, and connected vehicles to enterprise security platforms, firmware, and cloud-managed systems. The CRA covers both hardware and software, including products distributed via digital channels.
The regulation aims to create a deeply coordinated and transparent security ecosystem. Its four overarching goals are:
The CRA does not operate in isolation: it complements the NIS2 Directive, the EUCC (Common Criteria–based cybersecurity certification), the Radio Equipment Directive (RED), and sector-specific frameworks such as the Medical Device Regulation (MDR). Together, these policies form the backbone of the EU’s integrated approach to cybersecurity.

Conformity assessment under the CRA ensures that products meet the essential cybersecurity requirements listed in Annex I. These include secure development practices, vulnerability handling, secure default settings, protection against unauthorized access, and robustness against known attack methods.
Module A is one of the most commonly applicable conformity assessment routes. It requires manufacturers to:
Module A places full responsibility on the manufacturer to implement a rigorous internal control system supported by accurate technical documentation.
A product gains Presumption of Conformity when it complies with harmonized European standards (hENs) listed in the Official Journal of the European Union (OJEU). These standards are currently under development by CEN, CENELEC, and ETSI through the joint mandate M/606.
Once these standards are finalized and adopted:
However, because the hENs are still in development, their final structure, level of detail, and coverage remain subject to change. In areas where they do not fully cover Annex I requirements, manufacturers must conduct additional risk analysis, testing, or third-party evaluation.

The CRA introduces some of the most detailed and continuous cybersecurity obligations ever required by EU law. Manufacturers must:
Manufacturers must also ensure that their partners—importers, developers, integrators, distributors—meet their own CRA obligations. This creates an ecosystem-wide chain of accountability.
Independent security laboratories and conformity assessment bodies play an essential role in verifying the maturity of manufacturers’ cybersecurity processes, offering structured testing and expert guidance.
The Cyber Resilience Act sets a new cybersecurity baseline for all digital products placed on the EU market. It reshapes how manufacturers design, develop, and support their products, making cybersecurity a legal prerequisite rather than an optional enhancement.
Key upcoming milestones include:
Organizations that begin adapting now—by improving secure development, documentation quality, and lifecycle security processes—will not only achieve compliance but also position themselves as trusted leaders in the evolving European digital landscape.
As an accredited cybersecurity laboratory with extensive experience in the evaluation of digital products and security standards, CCLab provides comprehensive support to manufacturers preparing for CRA compliance.
Our services include:
CCLab acts not only as a testing laboratory but also as a strategic partner, supporting companies from early design stages through final evaluation, enabling them to create secure, compliant, and resilient products.


The EU Cyber Resilience Act (CRA) introduces a unified cybersecurity framework for products with digital elements that have direct or indirect, logical or physical data connection to a device or network, including everything from software or hardware products to free and open-source software that is monetized or integrated into commercial products.

As the 11 September 2026 reporting deadline approaches, understanding the Cyber Resilience Act (CRA) is essential for all manufacturers of digital products. This blog post explores the key differences and overlaps between the CRA and the EUCC certification scheme, providing a clear roadmap for compliance, risk categorization, and long-term market access.
9
min reading time

Smart toys are more than just software; they are radio equipment and thus subject to strict EU regulations. Our analysis explores the interplay between RED, the CRA, and the AI Act, while outlining the essential cybersecurity testing processes for a safe market entry.
7
min reading time

Legacy systems power critical operations across industries worldwide, yet they present unique challenges when organizations pursue Common Criteria certification. The clock is ticking for manufacturers and enterprises who must navigate complex compliance requirements while maintaining operational continuity. Organizations pursuing Common Criteria certification must address unique challenges when dealing with legacy infrastructure, but with the right approach, success is achievable. The urgency cannot be overstated. Regulatory deadlines approach rapidly, and the cost of non-compliance continues to escalate. Legacy systems that once served as reliable workhorses now require strategic transformation to meet modern security standards. This guide provides actionable strategies to prepare your legacy infrastructure for certification success.
10
min reading time