The EU Cyber Resilience Act introduces mandatory cybersecurity requirements for software and digital products sold in the EU. This Cyber Resilience Act compliance checklist breaks down what organizations must do to meet CRA obligations and maintain compliance throughout the product lifecycle.

The Cyber Resilience Act (CRA) is an EU regulation that establishes mandatory cybersecurity requirements for products with digital elements placed on the EU market. It requires manufacturers to design, develop, and maintain secure products throughout their expected lifetime. The CRA forms part of a broader shift in EU cybersecurity regulation, alongside frameworks such as the Digital Operational Resilience Act (DORA).
The CRA is a product regulation, not a general services law. It applies to software and connected devices that can directly or indirectly connect to a network, including embedded systems, firmware-driven products, and certain remote data processing solutions that are necessary for a product to function.
In practical terms, the CRA introduces legally enforceable obligations covering secure-by-design development, vulnerability management, incident reporting, technical documentation, conformity assessment, and CE marking.
Note that this article is intended as a handy starting point and reference but is not exhaustive and does not constitute legal advice – always refer to the official CRA documents for binding guidance.
Any manufacturer that places a product with digital elements on the EU market must comply with the CRA, regardless of where that organization is headquartered.
Under the regulation, a “manufacturer” is any legal or natural person that develops or has a product developed and places it on the EU market under its name or trademark, whether sold for payment or provided free of charge as part of commercial activity. This means non-EU organizations selling software or digital products into the EU are also within scope.
Because the CRA is a product law, applicability depends on how a digital offering is structured:
Organizations should evaluate each product individually to determine whether it falls within scope and how it is classified under the CRA’s product tiering framework.
CRA requirements apply after a transition period, giving organizations limited time to adapt development and security practices.
The regulation entered into force on 10 December 2024. Reporting obligations related to actively exploited vulnerabilities and incidents apply from 11 September 2026. The main cybersecurity and conformity assessment obligations apply from 11 December 2027.
In addition, frameworks for notifying conformity assessment bodies apply from mid-2026, and Member States are expected to designate sufficient notified bodies by December 2026 to support assessments of important and critical products.
Failure to comply with essential requirements or reporting obligations may result in administrative fines. Depending on the nature of the infringement, these could be up to €15 million or 2.5% of global annual turnover, whichever is higher.
While the final date may still seem distant, CRA compliance requires long-term structural changes to development workflows, vulnerability handling processes, documentation practices, and product certification planning.
A CRA checklist provides a structured way to translate the EU Cyber Resilience Act’s legal requirements into concrete security, development, documentation, and conformity assessment controls.
Rather than treating compliance as a documentation exercise, a well-designed checklist helps organizations embed cybersecurity throughout the product lifecycle – from design and release to ongoing maintenance and end-of-life – while also preparing for CE marking and potential third-party conformity assessments.
CRA shifts cybersecurity from best practice to legal obligation and requires continuous security processes, not one-time assessments.
The regulation introduces enforceable requirements around:
This lifecycle responsibility is a significant shift. Compliance cannot be achieved through a single audit or penetration test but requires operationalized security practices that generate defensible evidence on demand.
CRA mandates secure development, vulnerability handling, ongoing risk management, and formal conformity assessment.
At a high level, manufacturers must:
Products are categorized into tiers – default, important (Class I and II), and critical – with increasing conformity assessment obligations. Most products fall under a default category and may be self-assessed, while important and critical products require the involvement of a notified body.
The following checklist translates CRA obligations into practical security domains that organizations can evaluate and implement.
Secure-by-design and secure-by-default principles must be embedded early in product planning and architecture decisions:
Reducing attack surface at design time supports both Annex I essential requirements and conformity assessment preparation.
Continuous identification, validation, and remediation of vulnerabilities is central to CRA compliance:
CRA also requires manufacturers to report actively exploited vulnerabilities within strict deadlines: an early warning within 24 hours of becoming aware of an actively exploited vulnerability, followed by a more detailed notification within 72 hours.
Security must be integrated into CI/CD and release processes:
Continuous testing helps prevent regressions that could affect CE-marked product security.
The CRA requires a documented vulnerability handling process:
These processes must be documented and auditable.
Manufacturers must detect and respond to incidents affecting their products, which requires:
Operational readiness is essential given the non-negotiable reporting deadlines.
CRA compliance depends on the ability to produce evidence and technical documentation. Organizations should maintain:
Centralized posture visibility and automated evidence generation can help organizations simplify compliance reporting and reduce manual documentation overhead.
Modern software products rely heavily on third-party components and open-source libraries. To secure the software supply chain, CRA compliance requires:
Supply-chain risk management must integrate with application and API security visibility to maintain lifecycle compliance.
CRA requires ongoing identification and remediation of vulnerabilities throughout a product’s expected lifetime, which makes application security testing a foundational control. A continuous testing process provides:
While CRA applies broadly to hardware, firmware, and embedded systems, organizations developing web applications, APIs, and software-driven products must ensure runtime security visibility across those digital components.
For more background on regulatory alignment in the context of application security testing, see how DAST supports compliance across standards such as PCI DSS, ISO 27001, HIPAA, and SOC 2.
Invicti’s application security platform supports CRA compliance by enabling continuous, validated vulnerability management and posture-level visibility across applications and APIs.
As a unified application security platform, Invicti combines built-in dynamic testing, API security, proof-based validation, component visibility, and posture management with any connected external scanners to create a single, integrated environment. This enables organizations to manage CRA-related security obligations holistically rather than relying on disconnected point tools.
Invicti’s proof-based scanning technology automatically confirms exploitable vulnerabilities wherever possible, helping teams prioritize demonstrably real risk and support defensible reporting decisions. This runtime approach complements other scanners and security signal sources integrated into the Invicti platform and brings their findings into sharper focus.
Invicti delivers automated dynamic testing for web applications and APIs throughout development and production environments.
Invicti centralizes findings across tools and environments, supporting:
Learn more about Invicti’s broader application security compliance support across regulatory frameworks.
The Cyber Resilience Act represents a structural shift in EU product cybersecurity regulation. CRA compliance is an ongoing lifecycle obligation tied to product classification, conformity assessment, CE marking, and enforceable reporting timelines.
Organizations that embed continuous vulnerability management, SBOM visibility, runtime testing, and centralized posture reporting into their development processes will be better prepared for regulatory scrutiny and operational risk.
To see how continuous, validated application security testing and posture management on the Invicti platform can support your CRA readiness, request a demo.
‍
An EU regulation establishing mandatory cybersecurity requirements for products with digital elements placed on the EU market.
Any manufacturer that places a product with digital elements on the EU market must comply, including non-EU organizations. Importers and distributors may also have specific obligations.
Pure SaaS services are generally outside scope. However, remote data processing developed as part of a product’s functionality may fall within scope.
Yes. Manufacturers must implement continuous vulnerability management and draw up and maintain an SBOM in a commonly used, machine-readable format.
Manufacturers must submit an early warning within 24 hours of becoming aware of an actively exploited vulnerability and a more detailed notification within 72 hours.
Invicti provides continuous, proof-based application and API security testing, component visibility, and centralized posture reporting to help organizations maintain lifecycle security and generate audit-ready evidence.