EU Cyber Resilience Act: Manufacturers Must Immediately Report Security Gaps From September 2026
Brussels, Belgium โ February 12, 2026 โ A seismic shift in cybersecurity responsibility is underway in Europe. The EU Cyber Resilience Act (CRA) is entering a critical phase, placing the onus of security firmly on the shoulders of connected device manufacturers. Starting this fall, companies will be legally obligated to report security vulnerabilities without delay, a move poised to reshape the landscape of digital product safety.
What is the Cyber Resilience Act and Why Now?
The CRA, which entered into force in December 2024, aims to address the growing inadequacy of cybersecurity in many digital products โ from smartwatches and baby monitors to industrial control systems. The increasing frequency and severity of cyberattacks, coupled with the vulnerability of critical infrastructure, have spurred the EU to take decisive action. A recent Bitkom study highlighted the fragility of the German economy, revealing that most companies could only maintain operations for an average of 20 hours in the event of an internet outage. This underscores the urgent need for robust security measures.
Key Deadlines and Requirements
While the full โsecurity by designโ specifications wonโt be enforced until December 11, 2027, the initial deadlines are rapidly approaching. Hereโs what manufacturers need to know:
- September 11, 2026: Mandatory reporting of actively exploited vulnerabilities and serious cyber incidents to the EU Cybersecurity Agency (ENISA) via a newly established central reporting platform.
- June 11, 2026: Independent conformity assessment bodies start operations, verifying product compliance with the new standards and issuing necessary certifications.
Security by Design: A Fundamental Shift
The CRAโs core principle is โsecurity by design,โ meaning cybersecurity can no longer be an afterthought. It must be integrated into the product development process from the very beginning. A crucial element of Here’s the creation of a Software Bill of Materials (SBOM). This comprehensive list of all software components โ including open-source code โ provides a foundation for effective vulnerability management. Manufacturers will need to demonstrate transparent supply chains, robust product security, reliable update management, clear incident response protocols, and safe decommissioning procedures.
What Happens if You Don’t Comply?
The stakes are high. Companies that fail to meet the CRAโs requirements after December 11, 2027, face the prospect of hefty penalties and, critically, exclusion from the entire EU market โ a de facto sales ban. This isnโt simply about avoiding fines; itโs about maintaining access to a massive and vital consumer base.
Preparing for Compliance: A Six-Step Approach
Manufacturers need to act now. Compliance requires a proactive approach focused on six key areas:
- Complete Documentation
- Transparent Supply Chains
- Robust Product Security
- Reliable Update Management
- Clear Incident Response
- Safe Decommissioning
Beyond Compliance: A Competitive Advantage
The CRA isnโt just a regulatory hurdle; itโs an opportunity. Investing in cybersecurity and achieving CRA compliance builds customer trust and opens up new market opportunities. Products demonstrably proven to be secure will stand out in a crowded marketplace. Preparing for conformity assessment body testing should be a top priority for all manufacturers.
The future of digital product safety is here. The EU Cyber Resilience Act is a game-changer, shifting responsibility and raising the bar for cybersecurity across the board. Companies that embrace these changes will not only avoid penalties but will also position themselves for success in the evolving digital landscape.
Stay ahead of the curve with archyde.comโs ongoing coverage of cybersecurity regulations and emerging threats. Explore our cybersecurity section for expert analysis, practical guidance, and the latest news.