What exactly is the Cyber Resilience Act? This article covers the regulation that establishes cybersecurity requirements for products sold in the European market. We'll discuss everything: from what these requirements entail to penalties for non‑compliance.

The Cyber Resilience Act (CRA) is an EU regulation that sets requirements for software companies that release their products in the European Union. These requirements address cybersecurity of the product under development.
The European Commission initiated this regulation. It took effect on December 10, 2024, and companies must meet its core requirements within 36 months of that date—by December 11, 2027. However, some obligations come with earlier deadlines:
The CONFIDENTIALITY AND PENALTIES section, Article 64 (paragraph 2), states that non-compliance with the CRA requirements shall be subject to administrative fines of up €15,000,000 or, if the offender is an undertaking, up to 2.5% of its worldwide total annual turnover for the previous financial year, whichever is higher.
Based on the wording, the reasons for introducing this regulation are as follows:
What kinds of software be developed under CRA guidelines?
As noted earlier, the CRA is a European Union regulation, and its requirements apply to those who ship their software products to the EU market, even if the products are developed outside the EU.
Which software does it apply to? The standard establishes requirements for "products with digital elements" and provides the following definition:
'product with digital elements' means a software or hardware product and its remote data processing solutions, including software or hardware components being placed on the market separately;
This may give the impression that any software is a product with a digital element, making it seem that all software must comply with the CRA. However, the Scope section provides the following clarification:
This Regulation applies to products with digital elements made available on the market, the intended purpose or reasonably foreseeable use of which includes a direct or indirect logical or physical data connection to a device or network.
That section also adds an important clarification: several industries, such as medicine, automotive, defense, and a few others already operate under their own regulatory frameworks that govern software development in those fields. The CRA doesn't apply to those sector-specific rules because they take priority.
To sum it up, the CRA applies to companies that develop products with digital elements meeting all of the following criteria:
We've discussed who might be affected by this standard, but we haven't yet explored its requirements. Let's fix this.
The requirements appear in CHAPTER III. CONFORMITY OF THE PRODUCT WITH DIGITAL ELEMENTS, which refers to Annex I.
The core requirements for a product with digital elements fall into two groups:
Let's go through each group.
Broadly speaking, this group ensures that a product provides an adequate level of cybersecurity by considering potential risks that may arise during its use.
I simplified and grouped the requirements in this article to make the information easier to follow. You can find the original version in the CRA here.
Requirements for default security and resilience of a product:
Requirements for protecting the data a product handles and for maintaining proper access control:
Maintaining resilience and mitigating attack impact:
Monitoring and control:
As with the previous set of requirements, I've summarized these here in a simplified and grouped format. You can find the original version here.
Managing vulnerabilities in a product:
Informing users and disclosing information:
User communication and updates:
At first glance, each requirement appears to demand complicated processes. However, it's often unclear what those processes should actually look like. To make the standard easier to work with, ENISA published an article that maps CRA requirements to existing standards.
One requirement worth highlighting is regular and thorough product testing. Systematic and comprehensive testing supports the shift-left approach, enabling developers to identify issues, bugs, and vulnerabilities as early as possible in the development cycle. This early detection significantly reduces the cost of fixing problems for the software manufacturer.
The risk of bugs slipping into the final release grows if tests don't cover the product sufficiently. Since every testing method detects issues in its own domain, developers need a broad, well-balanced testing toolkit to avoid blind spots where issues can hide.
When it comes to the shift-left approach, static analysis deserves special attention. It helps developers catch errors during the development process—long before testing or, even worse, after release. Static analysis also lays the groundwork for SAST, an approach that enables detection of security issues in source code. SAST plays an essential role within the Software Development Lifecycle (SDLC). We have an article dedicated to this topic, which I recommend reading.
In addition to everything mentioned above, SAST tools can help meet the specific requirements we discussed earlier. PVS-Studio is an example of a SAST solution capable of detecting:
When searching for such errors, the following standards and classifications are typically applied:
Given the requirements discussed earlier, SCA is also worth mentioning. This automated process detects vulnerable libraries or components within a product during the development process. SCA can also help meet the requirement for releasing vulnerability-free products.
Secure software development continues to attract a global attention. In this article, we provided a brief overview of the European Cyber Resilience Act and its key requirements for software products.
Still, effective software development requires comprehensive testing. SAST tools are just one part of the puzzle. Developers also need unit tests, functional tests, dynamic analysis, and other practices that make a product more resilient and secure.
Let's wrap things up here. Subscribe to our blog and see you soon!
0