What is the Cyber Resilience Act?

Learn about the EU mandatory cybersecurity requirements

The Cyber Resilience Act (CRA) is an EU regulation that establishes mandatory cybersecurity requirements for all products with digital elements (PDEs) placed on the EU market.

Its purpose is to ensure that:

  • PDEs have minimal cybersecurity vulnerabilities
  • Manufacturers are responsible for the ongoing cybersecurity of PDEs throughout their lifecycle

A PDE is any hardware or software product that connects (directly or indirectly) to a device or network.  This covers everything from smart home devices and children’s connected toys to operating systems, microcontrollers, and security software.

Who Is Affected?

Your organisation’s products are in scope if both of the following apply:

  1. You manufacture, import, or distribute products for commercial sale in the EU, and
  2. Those products connect to a network or other devices.

The CRA applies across a wide range of risk based classifications from default low risk products to ‘Important’ and ‘Critical’ PDEs that require third party assessment or certification.

When Does It Come Into Effect?

Key enforcement milestones include:

  • Ratified: December 2024
  • Mandatory reporting of exploited vulnerabilities and severe incidents related to PDE: September 2026
  • Full enforcement: December 2027

What Are the Consequences of Non-Compliance?

Non compliance can result in fines of up to €15 million or 2.5% of global turnover.

Speak to a Cyber Security Expert

URM can leverage nearly 2 decades of experience assisting organisations to comply with applicable information security, business continuity, data protection and cyber security regulations and standards to help you identify where your organisation is and is not meeting requirements of the Cyber Resilience Act, and how to close any compliance gaps.

Contact Us

What Are the Key Requirements?

The CRA sets out essential cybersecurity requirements that all PDEs must meet.  These include:

  • No known exploitable vulnerabilities
  • Secure by default configuration
  • Processes for deploying security updates
  • Protection against unauthorised access
  • Safeguards for confidentiality and integrity of data
  • Measures to limit attack surfaces and minimise impact on other networks
  • Appropriate event logging
  • Functionality for users to delete or transfer their data

Manufacturers must also implement robust vulnerability handling processes, including:

  • Maintaining an inventory of components and vulnerabilities
  • Remediating vulnerabilities “without delay”
  • Regular security reviews and testing
  • Communicating vulnerabilities to consumers
  • Securely distributing updates

In addition, organisations must produce technical documentation and an EU Declaration of Conformity and apply CE marking to all in scope products.

How URM Can Help

Many organisations find the CRA’s requirements complex and resource intensive,  particularly the technical documentation, vulnerability handling expectations, and conformity assessment obligations. URM is able to provide you with end to end support to ensure you are fulfilling all these requirements.

URM's support includes:

Determining Whether Your Products Are PDEs and in Scope

Many organisations are unsure whether the CRA applies to them, especially given the broad definition of a product with digital elements.  The Act covers everything from smart home devices and connected toys to operating systems, microcontrollers and security software.

URM helps you cut through the ambiguity by reviewing your full product set, mapping each product against the CRA definition, and confirming whether it falls within scope.  This ensures you don’t overlook products that may trigger regulatory obligations.

Determining Your Products’ CRA Classification

The CRA uses a risk based classification model (Default, Important Class 1, Important Class 2, Critical), each with different assessment requirements.  Some products can be self assessed, while others require third party assessment or mandatory certification.

URM works with you to classify each in scope product accurately, using the CRA’s definitions and examples.  This avoids misclassification which could lead to non compliance, delays, or unnecessary cost.

Ensuring Your Products Meet the Essential Cybersecurity Requirements

The CRA sets out a detailed list of essential cybersecurity requirements, including secure by default configuration, vulnerability management, event logging, data protection, and measures to limit attack surfaces.  It also requires manufacturers to have processes for ‘remediating identified vulnerabilities without delay’ and maintaining inventories of components and vulnerabilities.

URM reviews your products and supporting processes to identify gaps against these requirements.  We help you understand what needs to change i.e., whether that’s secure development practices, product update mechanisms, access controls, or data handling measures.  We then support you in implementing the necessary improvements.

Conducting the Conformity Assessment

For many organisations, the conformity assessment is the most daunting part of the Cyber Resilience Act (CRA). Even for products that qualify for self assessment, the CRA requires manufacturers to “ensure and declare on [their] sole responsibility” that all essential cybersecurity requirements have been met.

URM can complete the conformity self assessment on your behalf, providing an independent, expert evaluation of your product’s compliance. We produce a formal assessment report that can be used as evidence for regulators, customers, and internal assurance processes.

If your product requires a formal third party assessment or certification, we can also support you in identifying an appropriate Notified Body and navigating the relevant EU certification requirements.

Creating or Reviewing the Required Technical Documentation

The CRA requires extensive technical documentation, including:

  • Product descriptions and intended purpose
  • System architecture diagrams
  • Vulnerability handling processes
  • SBOMs
  • Coordinated vulnerability disclosure policies
  • Risk assessments
  • Test reports
  • Support period justification.

URM can support the creation of this documentation from scratch or conduct an independent review to ensure it meets CRA expectations and will stand up to regulatory scrutiny.

Creating the EU Declaration of Conformity

Every in scope product must have an EU Declaration of Conformity containing specific mandatory information, including product identification, harmonised standards used, and details of any notified body involvement.

URM helps you draft or review these declarations to ensure they are complete, accurate, and aligned with the CRA’s requirements. While the organisation must ultimately sign the declaration, we ensure the content is correct and defensible.

Register your interest below

Please note, we can only process business email addresses.

Webinars & Events

URM has gained a reputation as the preeminent UK provider of live webinars, aimed at delivering valuable and practical insights to organisations  looking to improve their information security, risk management, data protection etc. The webinars  are delivered by our senior consultants who share hints and tips on topics such as certifying to ISO 27001 and Cyber Essentials, complying with the GDPR.  All of our webinars are completely free to attend, and include an opportunity to ask questions at the end.

WebinarUnderstanding the Defence Cyber Certification (DCC) Scheme

As a licensed DCC certification body URM explains how the scheme works and what it means for defence suppliers.

Read more
Listen to recording
USB stick, Padlock, Keys
WebinarCyber Essentials and Cyber Essentials Plus: Understanding the 2026 Changes to the Scheme

We will explain the Cyber Essentials and Cyber Essentials Plus scheme, its requirements, what the upcoming in April 2026 changes mean in practice.

Read more
Listen to recording
USB stick, Padlock, Keys
WebinarCyber Essentials and CE Plus: Certification Success & Ongoing Compliance

URM as a licensed Cyber Essentials certification body will help you understand the scheme, how best to prepare and maintain certification.

Read more
Listen to recording
USB stick, Padlock, Keys

Speak to a certified advisor

URM is a CREST-accredited organisation. We are able to provide you with practical, cost effective and reliable advice to improve your cyber security.

Speak to one of our experts for more information on how we can help you certify. Simply call 0118 206 5410 or request a call back using the form below.

Cyber Security and the Board: A Sign of What’s to Come

Published on
10/3/2026

URM’s blog explains recent amendments to the Cyber Security and Resilience Bill, how they align with broader regulatory shifts, & practical steps to prepare.

Read more
Thumbnail of the Blog Illustration
Cyber Security
Published on
12/2/2026
NHS Cyber Security Open Letter: What Does it Mean for Suppliers?

URM’s blog explains the recent open letter to suppliers issued by the NHS, what it means, why it matters, and the practical steps you can take to prepare.

Read more
Thumbnail of the Blog Illustration
Cyber Security
Published on
4/2/2026
The Core Functions of NIST CSF: Identify

URM’s blog unpacks the Identify Function of the NIST CSF, providing a detailed breakdown of its requirements and what you need to do to meet them.

Read more
Thumbnail of the Blog Illustration
Cyber Security
Published on
16/1/2026
Minimising the Impact When a Breach Occurs

URM’s blog explores the importance of cyber resilience & the steps organisations can take to prepare for and mitigate the impact of a cyber incident.

Read more
"
It is the calibre of its consultants, be they risk managers, penetration testers, GDPR specialists, Cyber Essentials assessors, ISO 27001 implementers and auditors, combined with its Abriska risk management software, that sets URM apart from its competitors.
The Owners and Distributors of Quality Brands
To arrange your Cyber Essentials gap analysis please fill the form below.
Our team will contact you shortly.

Gap Analysis Request

contact US

Let us help you

Let us help you in your compliance journey by completing the form and letting us know how we can best support you.