EU Cyber Resilience Act (Regulation 2024/2847)
EU regulation establishing horizontal cybersecurity requirements for products with digital elements. Applies to manufacturers, importers, and distributors of hardware and software sold in the EU. 22 essential cybersecurity requirements in Annex I covering secure-by-design, vulnerability handling, SBOM, coordinated disclosure, and secure update mechanisms. Penalties up to EUR 15M or 2.5% turnover. Reporting obligations from September 2026, full applicability December 2027. Complements NIS2 (which targets operators) with product-level security.
AC (7) AT (1) AU (12) CA (3) CM (7) CP (5) IA (9) IR (6) MA (2) MP (3) PL (3) PM (7) PT (3) RA (3) SA (13) SC (18) SI (14) SR (5)
AC Access Control
AT Awareness and Training
| Control | Name | EU CRA References |
|---|---|---|
| AT-01 | Security Awareness And Training Policy And Procedures | CRA.Info.8a |
AU Audit and Accountability
| Control | Name | EU CRA References |
|---|---|---|
| AU-01 | Audit And Accountability Policy And Procedures | CRA.I.2l |
| AU-02 | Auditable Events | CRA.I.2dCRA.I.2l |
| AU-03 | Content Of Audit Records | CRA.I.2dCRA.I.2l |
| AU-04 | Audit Storage Capacity | CRA.I.2l |
| AU-05 | Response To Audit Processing Failures | CRA.I.2l |
| AU-06 | Audit Monitoring, Analysis, And Reporting | CRA.I.2dCRA.I.2l |
| AU-08 | Time Stamps | CRA.I.2l |
| AU-09 | Protection Of Audit Information | CRA.I.2fCRA.I.2l |
| AU-10 | Non-Repudiation | CRA.I.2f |
| AU-11 | Audit Record Retention | CRA.I.2l |
| AU-12 | Audit Record Generation | CRA.I.2l |
| AU-14 | Session Audit | CRA.I.2l |
CA Security Assessment and Authorization
CM Configuration Management
| Control | Name | EU CRA References |
|---|---|---|
| CM-02 | Baseline Configuration | CRA.I.2bCRA.Info.3 |
| CM-03 | Configuration Change Control | CRA.I.2cCRA.II.2CRA.II.7CRA.Info.8b |
| CM-04 | Monitoring Configuration Changes | CRA.II.2CRA.Info.8b |
| CM-06 | Configuration Settings | CRA.I.2bCRA.Info.8a |
| CM-07 | Least Functionality | CRA.I.2bCRA.I.2jCRA.Info.8e |
| CM-08 | Information System Component Inventory | CRA.II.1CRA.Info.3 |
| CM-12 | Information Location | CRA.II.1 |
CP Contingency Planning
IA Identification and Authentication
| Control | Name | EU CRA References |
|---|---|---|
| IA-01 | Identification And Authentication Policy And Procedures | CRA.I.2d |
| IA-02 | User Identification And Authentication | CRA.I.2d |
| IA-03 | Device Identification And Authentication | CRA.I.2d |
| IA-04 | Identifier Management | CRA.I.2d |
| IA-05 | Authenticator Management | CRA.I.2d |
| IA-06 | Authenticator Feedback | CRA.I.2d |
| IA-08 | Identification and Authentication (Non-Organizational Users) | CRA.I.2d |
| IA-11 | Re-authentication | CRA.I.2d |
| IA-12 | Identity Proofing | CRA.I.2d |
IR Incident Response
| Control | Name | EU CRA References |
|---|---|---|
| IR-01 | Incident Response Policy And Procedures | CRA.Art14CRA.II.6CRA.Info.2 |
| IR-04 | Incident Handling | CRA.I.2k |
| IR-05 | Incident Monitoring | CRA.Art14 |
| IR-06 | Incident Reporting | CRA.Art14CRA.II.4CRA.II.5 |
| IR-07 | Incident Response Assistance | CRA.II.6 |
| IR-08 | Incident Response Plan | CRA.Art14 |
MA Maintenance
MP Media Protection
PL Planning
PM Program Management
| Control | Name | EU CRA References |
|---|---|---|
| PM-05 | System Inventory | CRA.II.1CRA.Info.7 |
| PM-07 | Enterprise Architecture | CRA.I.1 |
| PM-09 | Risk Management Strategy | CRA.Info.5 |
| PM-15 | Security and Privacy Groups and Associations | CRA.Art14CRA.II.4CRA.II.5CRA.II.6CRA.Info.2 |
| PM-16 | Threat Awareness Program | CRA.II.5 |
| PM-25 | Minimization of Personally Identifiable Information Used in Testing, Training, and Research | CRA.I.2g |
| PM-30 | Supply Chain Risk Management Strategy | CRA.I.1 |
PT Personally Identifiable Information Processing and Transparency
RA Risk Assessment
SA System and Services Acquisition
| Control | Name | EU CRA References |
|---|---|---|
| SA-01 | System And Services Acquisition Policy And Procedures | CRA.I.1 |
| SA-02 | Allocation Of Resources | CRA.I.1 |
| SA-03 | Life Cycle Support | CRA.I.1 |
| SA-04 | Acquisitions | CRA.I.1CRA.I.2bCRA.I.2eCRA.I.2jCRA.II.1CRA.Info.8f |
| SA-05 | Information System Documentation | CRA.Info.4CRA.Info.5CRA.Info.8aCRA.Info.8bCRA.Info.8cCRA.Info.8dCRA.Info.8eCRA.Info.8f |
| SA-08 | Security Engineering Principles | CRA.I.1CRA.I.2bCRA.I.2gCRA.I.2j |
| SA-09 | External Information System Services | CRA.I.2iCRA.Info.8f |
| SA-10 | Developer Configuration Management | CRA.I.1CRA.I.2f |
| SA-11 | Developer Security Testing | CRA.I.1CRA.I.2aCRA.II.2CRA.II.3 |
| SA-15 | Development Process, Standards, and Tools | CRA.I.1CRA.I.2a |
| SA-17 | Developer Security and Privacy Architecture and Design | CRA.I.1 |
| SA-20 | Customized Development of Critical Components | CRA.I.2k |
| SA-22 | Unsupported System Components | CRA.I.2cCRA.II.2CRA.Info.7 |
SC System and Communications Protection
| Control | Name | EU CRA References |
|---|---|---|
| SC-03 | Security Function Isolation | CRA.I.2k |
| SC-05 | Denial Of Service Protection | CRA.I.2h |
| SC-06 | Resource Priority | CRA.I.2h |
| SC-07 | Boundary Protection | CRA.I.2iCRA.I.2j |
| SC-08 | Transmission Integrity | CRA.I.2eCRA.I.2fCRA.II.7 |
| SC-12 | Cryptographic Key Establishment And Management | CRA.I.2e |
| SC-13 | Use Of Cryptography | CRA.I.2e |
| SC-16 | Transmission Of Security Parameters | CRA.I.2f |
| SC-24 | Fail in Known State | CRA.I.2k |
| SC-28 | Protection of Information at Rest | CRA.I.2bCRA.I.2e |
| SC-29 | Heterogeneity | CRA.I.2k |
| SC-30 | Concealment and Misdirection | CRA.I.2k |
| SC-34 | Non-modifiable Executable Programs | CRA.I.2k |
| SC-35 | External Malicious Code Identification | CRA.I.2k |
| SC-39 | Process Isolation | CRA.I.2k |
| SC-41 | Port and I/O Device Access | CRA.I.2j |
| SC-44 | Detonation Chambers | CRA.I.2i |
| SC-47 | Alternate Communications Paths | CRA.I.2i |
SI System and Information Integrity
| Control | Name | EU CRA References |
|---|---|---|
| SI-02 | Flaw Remediation | CRA.I.2aCRA.I.2cCRA.II.2CRA.II.7CRA.II.8CRA.Info.8c |
| SI-03 | Malicious Code Protection | CRA.I.2i |
| SI-04 | Information System Monitoring Tools And Techniques | CRA.I.2dCRA.I.2iCRA.I.2l |
| SI-05 | Security Alerts And Advisories | CRA.Art14CRA.II.4CRA.II.5CRA.II.8 |
| SI-06 | Security Functionality Verification | CRA.II.3 |
| SI-07 | Software And Information Integrity | CRA.I.2bCRA.I.2cCRA.I.2fCRA.II.7 |
| SI-10 | Information Accuracy, Completeness, Validity, And Authenticity | CRA.I.2f |
| SI-11 | Error Handling | CRA.I.2l |
| SI-12 | Information Output Handling And Retention | CRA.I.2gCRA.I.2m |
| SI-13 | Predictable Failure Prevention | CRA.I.2h |
| SI-16 | Memory Protection | CRA.I.2k |
| SI-17 | Fail-safe Procedures | CRA.I.2h |
| SI-18 | Personally Identifiable Information Quality Operations | CRA.I.2m |
| SI-19 | De-identification | CRA.I.2gCRA.I.2m |