• Cybersecurity Glossary
What is the Cyber Resilience Act (CRA)?
The Cyber Resilience Act (CRA) is EU Regulation 2024/2847 establishing mandatory cybersecurity requirements for all products with digital elements placed on the European market. It applies to hardware, software and IoT devices, requiring manufacturers to implement security by design, vulnerability management and incident reporting throughout the entire product lifecycle. Entered into force on 10 December 2024, with vulnerability reporting obligations from 11 September 2026 and full application from 11 December 2027, the CRA represents the most comprehensive product cybersecurity regulation ever adopted.
Cyber Resilience Act definition
The Cyber Resilience Act (CRA) is an EU regulation that introduces mandatory cybersecurity requirements for all products with digital elements (PDEs) sold or made available on the European market. A product with digital elements is any software or hardware product whose intended use includes a direct or indirect data connection to a device or network. This covers everything from consumer IoT devices and smart home products to enterprise routers, firewalls, network management systems and embedded industrial controllers.
The CRA was proposed by the European Commission on 15 September 2022, formally adopted by the Council on 10 October 2024 and entered into force as Regulation (EU) 2024/2847 on 10 December 2024. It forms part of the EU Cybersecurity Strategy alongside NIS2, the Cybersecurity Act and the EU cybersecurity certification framework. While NIS2 regulates the organizations that operate critical infrastructure, the CRA regulates the products those organizations buy and deploy.
The regulation addresses two systemic problems. First, the majority of connected products on the market lack adequate cybersecurity, and manufacturers have had no legal obligation to provide security updates or manage vulnerabilities after sale. Second, consumers and businesses have no reliable way to evaluate the cybersecurity of the products they purchase. The CRA solves both by mandating security by design, lifecycle vulnerability management, standardized security information for users and CE marking as proof of cybersecurity conformity.
Essential cybersecurity requirements
The CRA establishes two sets of essential requirements in Annex I: product security requirements (Part I) and vulnerability handling requirements (Part II). These apply to every manufacturer regardless of product category.
Product categories and conformity assessment
The CRA classifies products into three tiers based on their cybersecurity risk. Classification is determined by the core functionality of the product, not its marketing description. The tier determines which conformity assessment procedure the manufacturer must follow before affixing the CE marking.
| Category | Examples | Conformity assessment | Approx. share |
|---|---|---|---|
| Default | Smart speakers, mobile apps, computer games, memory chips, connected toys | Self assessment (Module A) | ~90% |
| Important Class I (Annex III) | Routers, modems, switches, VPN software, SIEM systems, password managers, operating systems, network management systems, smart home products with security functions | Self assessment if harmonised standards applied; otherwise third party (Module B+C or H) | |
| Important Class II (Annex III) | Firewalls, intrusion detection/prevention systems, hypervisors, tamper resistant microprocessors, container runtime systems | Mandatory third party assessment (Module B+C or H) | ~10% |
| Critical (Annex IV) | Hardware security modules, smart meter gateways, smartcards, secure elements | Mandatory third party assessment; may require EU cybersecurity certification | combined |
Why this matters for network equipment: routers, switches and modems are classified as Important Class I under Annex III. Firewalls and intrusion detection systems fall under Important Class II. This means network infrastructure manufacturers must either apply harmonised standards or undergo third party conformity assessment. Teldat products are designed to meet these requirements through security by design engineering and CPSTIC/ENS certification.
Implementation timeline
The CRA uses a phased implementation approach. While full application is in December 2027, several obligations apply earlier. Manufacturers that wait until 2027 will already be non compliant for over a year on reporting obligations.
Compliance challenges
The CRA introduces obligations that most manufacturers have not previously faced for connected products. Understanding the practical challenges helps organizations prioritize their readiness efforts.
Compliance framework
A structured approach to CRA compliance covers product classification, risk assessment, documentation and conformity assessment. The steps below follow the CRA annexes and current European Commission guidance.
Teldat CRA aligned solutions
As a European network hardware manufacturer, Teldat designs products under EU jurisdiction with security by design principles that align with CRA essential requirements. The following capabilities address the specific obligations the regulation places on manufacturers of network infrastructure products.
The Teldat CRA advantage: as a European headquartered manufacturer, Teldat controls the entire product lifecycle from hardware design through firmware development to security update delivery. Every stage of the CRA compliance chain, from risk assessment and secure design to vulnerability management and conformity documentation, is handled within European jurisdiction. Organizations deploying Teldat network infrastructure can rely on a single vendor for CRA compliant SD-WAN, SASE, XDR and OT security.
Frequently asked questions about the Cyber Resilience Act – (FAQ’s)
❯ What is the Cyber Resilience Act in simple terms?
The Cyber Resilience Act (CRA) is an EU regulation that requires all products with digital elements sold in the European market to meet mandatory cybersecurity standards. This includes hardware, software and IoT devices. Manufacturers must design products with security built in, provide security updates throughout the product lifecycle, report actively exploited vulnerabilities to ENISA within 24 hours and affix the CE marking to confirm compliance. The regulation entered into force on 10 December 2024 and fully applies from 11 December 2027.
❯ Which products does the CRA cover?
The CRA covers all products with digital elements (PDEs) that have a direct or indirect data connection to a device or network. This includes routers, firewalls, IoT devices, operating systems, VPN software, smart home products, network management systems and embedded software. Products are classified into three tiers: Default (about 90% of products, self assessment), Important (Annex III, Classes I and II, including routers, firewalls and SIEM systems) and Critical (Annex IV, such as smart meter gateways and hardware security modules). Medical devices, vehicles and national security products are excluded.
❯ What are the key CRA deadlines?
The CRA has three main deadlines. From 11 June 2026, the framework for conformity assessment bodies applies. From 11 September 2026, manufacturers must report actively exploited vulnerabilities and severe incidents to ENISA, even for products already on the market. From 11 December 2027, all CRA product requirements apply in full and non compliant products cannot be sold in the EU.
❯ What are the penalties for CRA non compliance?
Penalties under the CRA are substantial. Failure to meet essential cybersecurity requirements in Annex I can result in fines up to 15 million euros or 2.5% of global annual turnover. Other obligation breaches carry fines up to 10 million euros or 2% of turnover. Providing incorrect or misleading information to authorities can result in fines up to 5 million euros or 1% of turnover. Microenterprises and small enterprises are exempt from fines for missing the 24 hour vulnerability reporting deadline.
❯ How does the CRA relate to NIS2 and GDPR?
The CRA complements NIS2 and GDPR as part of the EU cybersecurity framework. NIS2 focuses on the cybersecurity of organizations operating critical infrastructure, while the CRA focuses on the security of the products those organizations use. GDPR protects personal data. Together they create a layered regulatory architecture: CRA secures the product, NIS2 secures the operator and GDPR secures the data. Compliance with one does not satisfy the others, but aligned implementation reduces duplication.
❯ How does Teldat support CRA compliance?
Teldat is a European network hardware manufacturer whose products are designed with security by design principles aligned with CRA requirements. Teldat SD-WAN routers, be.Safe Pro SSE and be.Safe XDR incorporate secure default configurations, automated firmware updates through CNM, vulnerability management processes and SBOM documentation. Teldat holds CPSTIC certification at ENS Alta level, validating conformity with European cybersecurity standards. As a European manufacturer, Teldat products carry CE marking and comply with EU product security legislation.
Build CRA compliant network infrastructure with Teldat
From security by design SD-WAN hardware to centralized update management, SASE and XDR, Teldat delivers European cybersecurity aligned with CRA, NIS2 and EU product security requirements.







