Blog

Understanding the EU Cyber Resilience Act for IoT

POST by
Paweł Horbanowicz Paweł Horbanowicz

Published Feb 19, 2026
Category Security, IoT, Hardware
Read time 8 minutes

Introduction


The Cyber Resilience Act (CRA) is the most significant shift in European product regulation since the GDPR. It moves away from voluntary guidelines and establishes a mandatory legal framework for the cybersecurity of hardware and software products. 

In this article, we examine what the CRA is, why it was introduced, and how it affects the IoT hardware market in practice. We'll cover what businesses need to do to prepare, and explain how Grinn supports customers in navigating CRA requirements.


What Is the EU Cyber Resilience Act?


The Cyber Resilience Act is a regulation introduced by the European Union to address the growing number of cybersecurity incidents linked to insecure hardware and software products. IoT devices, industrial controllers, consumer electronics, and connected infrastructure have become widespread, and vulnerabilities in these products pose major risks, including to critical infrastructure. 

Before the CRA, cybersecurity requirements in the EU were fragmented. Some sectors were regulated, but others relied on voluntary standards, and many products reached the market with minimal security features. The CRA introduces a single legal framework that applies across industries.

The Main Goals of the CRA

The regulation is built around several core objectives:

  • Raising the level of cybersecurity across all products with digital elements sold in the EU

  • Embedding security throughout the product lifecycle, from initial design to end-of-life

  • Reducing the number and severity of vulnerabilities in connected products

  • Clarifying responsibility and making manufacturers accountable for the cybersecurity of their products

  • Improving transparency for users and business customers regarding security features and update policies

The CRA integrates cybersecurity into the EU product safety framework, aligning it with other essential product requirements such as electrical safety or electromagnetic compatibility (EMC).


The Timeline of the Cyber Resilience Act


While the Cyber Resilience Act has already entered into force, its obligations are introduced gradually to give manufacturers time to adapt their processes and product portfolios.

Here is the detailed rollout schedule:

  • 20 November 2024: The CRA was formally adopted by the European Union.

  • 11 December 2024: The CRA entered into force.

  • 11 September 2026: Reporting obligations apply.

    From this date, manufacturers are legally required to report any "actively exploited vulnerability" to the Computer Security Incident Response Team (CSIRT) and the European Union Agency for Cybersecurity (ENISA). They must submit an early warning within 24 hours, a detailed notification within 72 hours, and a final report within 14 days (vulnerabilities) or one month (incidents).

  • 11 December 2027: Full compliance required.

    All products placed on the EU market must meet the technical requirements, possess full technical documentation, and bear the CE marking, demonstrating conformity with the Cyber Resilience Act and any other applicable EU product legislation.

    Products already placed on the market before this date may continue to be made available, but any new products or new production batches introduced after this deadline must comply fully with the CRA.


CRA Obligations on Businesses


The Cyber Resilience Act fundamentally shifts responsibility for cybersecurity from end users to manufacturers. It requires product manufacturers to align with a number of technical, as well as procedural obligations.

Technical Obligations

Technical obligations define how the product itself must behave from a cybersecurity standpoint. These requirements must be fulfilled at the time the product is placed on the EU market and verified through design, implementation, and testing.

Key requirements relevant to IoT and embedded devices include:

RequirementExplanation
Eliminate Known Vulnerabilities


You cannot launch a product with security issues that are already known and patchable.
CRA Annex I, Part I, (2)(a)

Secure Default Settings

Products must be secure out of the box. Users shouldn't have to be experts to stay safe, and they must be able to reset the device easily.
CRA Annex I, Part I, (2)(b)

Enable Automatic Updates

You must provide security updates. These should ideally be automatic and on by default, though users can opt-out.
CRA Annex I, Part I, (2)(c)

Control Product AccessUse strong authentication (passwords, keys, etc.) and identity management to prevent unauthorized people from getting in.
CRA Annex I, Part I, (2)(d)

Protect Stored DataAny data the device handles must be kept private, usually through encryption, whether it’s stored on the device or being transmitted.
CRA Annex I, Part I, (2)(e - f)

Practice Data MinimizationThe product must only process data that is strictly necessary for its intended functions.
CRA Annex I, Part I, (2)(g)

Reduce Attack SurfaceDesign the product to have as few "entry points" (like open ports or external interfaces) as possible to limit where hackers can strike.
CRA Annex I, Part I, (2)(j)

Maintain SBOM RecordsCreate a Software Bill of Materials (SBOM) - a list of every software component and third-party library used in your product.
CRA Annex I, Part II, (1)

Secure Data WipeCreate a Software Bill of Materials (SBOM) - a list of every software component and third-party library used in your product.
CRA Annex I, Part I, (2)(m)


Business and Procedural Obligations

In addition to product‑level requirements, the CRA imposes organisational obligations on manufacturers.


RequirementExplanation
Continuous Risk Assessment


You must analyze security risks during planning, design, and production, and update this assessment throughout the product's life.
CRA Article 13(2 - 3), 13(11)

Third-Party Due Diligence

If you use code or parts from others (including open-source), you are responsible for ensuring they don’t break your security.
CRA Article 13(4)

Five-Year Support Minimum

You must provide security support for at least 5 years (or the product's expected life) and state the end date clearly.
CRA Article 13(8)

Conformity & CE Marking
You must prove the product is safe through a formal assessment, sign a Declaration of Conformity, and put the CE mark on the device.
CRA Article 13(12), Article 28, Article 30

Product & Brand ID
The device, packaging, or manual must clearly show the serial/batch number and your company’s contact info (name, address, email).
CRA Article 13(15 - 17)

Clear User Instructions
Provide a manual (digital or paper) that explains how to set up and use the device securely. This must be easy to read and in a language users understand.
CRA Article 13(18), Annex II

Rapid Incident Reporting
If a vulnerability is being exploited by hackers, you must notify authorities (ENISA/CSIRT) within 24 hours for an early warning and 72 hours for details.
CRA Article 14(1 - 4), 14(7)

User Notifications
If your product has a major security flaw or incident, you must tell your users what happened and how they can fix it.
CRA Article 14(8)

10-Year Record Keeping
Keep all technical documentation and your Declaration of Conformity for 10 years after the product is sold, even if you stop making it.
CRA Article 13(18)

Cooperate With Authorities
If a market regulator asks for proof of security or needs help fixing a risk, you are legally required to provide the data and cooperate.
CRA Article 13(22)

Voluntary Reporting
You are encouraged to report "near misses" or potential threats that haven't caused an incident yet.
CRA Article 15


Together, these business and procedural obligations mean that cybersecurity under the CRA is a continuous responsibility that spans development, production, deployment, maintenance, and end-of-life of the product.


Impact on IoT Product Design and Manufacturing


The Cyber Resilience Act makes cybersecurity a hard engineering constraint. Security requirements now influence fundamental design decisions. Platforms that lack secure boot, hardware root of trust, or long-term software support may no longer be suitable for products placed on the EU market.

Beyond design, the CRA extends cybersecurity responsibility into manufacturing and lifecycle planning. Devices must leave the factory in a secure-by-default state, with appropriate mechanisms to support updates and vulnerability remediation. Manufacturers must also plan for long‑term maintenance and organisational readiness to meet their ongoing obligations.

In practice, the CRA drives several concrete changes across IoT development:

  • Earlier integration of security into hardware and software architecture.

  • Greater need for pre-validated secure platforms and modules.

  • Secure production and provisioning processes becoming mandatory.


How Grinn Can Help


Meeting the requirements of the Cyber Resilience Act requires a security-by-design approach and and extensive technical expertise. This is where we at Grinn are ready to support our customers. As a company focused on IoT and embedded solutions, we help you address both technical requirements and procedural obligations. Here’s how:

Turnkey Approach

When designing electronic products for our clients, we take a turnkey approach. We oversee the entire process from concept to production management, including full responsibility for CRA compliance. By the time the finished product lands on your desk, it carries all the necessary certifications and is ready to go to market.

Advanced Security Integration (OPTIGA™ Trust M)

To ensure unique device identity and secure key storage, we integrate the Infineon OPTIGA™ Trust M security controller into our custom designs and single-board computers like the GenioBoard. This certified security chip provides a protected vault for storing credentials, helping your device meet CRA requirements for preventing unauthorized access.

In-House Testing Lab

CRA requires a formal conformity assessment and the application of the CE marking. Sending a product for official certification only to have it fail can cost months of delays and thousands of euros. At Grinn, we maintain an in-house laboratory for pre-compliance testing. We perform rigorous EMC testing, signal integrity analysis, and environmental stress tests. Thanks to this approach, the final certification process becomes a formality.


Conclusions


The Cyber Resilience Act fundamentally changes how IoT products are designed and maintained for the EU market, making cybersecurity a mandatory product requirement. Manufacturers that embed security early and plan for long-term support will be best positioned to meet compliance obligations and guarantee themselves market access. If you are a late adopter, you risk costly redesigns or delays.


Paweł Horbanowicz Marketing Specialist
blog

More posts

BrakTooth crashes devices. Are you at risk?

BrakTooth crashes devices. Are you at risk?

Cybersecurity experts at the Singapore University of Technology and Design have published a report on 16 identified vulnerabilities in Bluetooth software which pose a threat to billions of devices running on various platforms. The list is called BrakTooth - from the Norwegian word brak (crash).

2 min

Security, IoT, Electronics Design, Embedded Software

Understanding the EU Cyber Resilience Act for IoT

Understanding the EU Cyber Resilience Act for IoT

Find out what the EU Cyber Resilience Act means for the IoT industry - and what you need to do to prepare.

8 minutes

Security, IoT, Hardware

Testimony

What did our clients say?

  • Can-do approach

    Clients value our can-do approach and practical way to solve a problem.

    Confirmed by
    • Optics 11 logo
    • Watts.dk logo
    • Medthings logo
  • Great Communication

    Clients say Grinn is like a direct part of their company.

    Confirmed by
    • Sani Nudge logo
    • Hempel logo
    • Sowa logo
    • Medthings logo
  • Expert knowledge

    Clients highlight that we are professionals and working with us guarantees quality.

    Confirmed by
    • Eagle Eye Networks logo
    • Sani Nudge logo
    • Medthings logo
  • Full stack IoT development

    We offer a complete package of everything needed to create world-class hardware products, from design to production.

    Confirmed by
    • Konekt ApS. logo
    • Lolle & Nielsen Inventions logo
  • Always on time

    Always on time and always ready to listen to new input and pivot if required.

    Confirmed by
    • Hempel logo
  • Proactivity

    Clients say we don't only make the hardware, but trully put in the effort to understand the problem you are trying to solve and proactively think along side with you.

    Confirmed by
    • Versa logo
AWARDS AND CERTIFICATIONS

REVIEWED ON
4.8 / 5.0

Your message
was sent!

Thank you for contacting us.
We will get in touch as soon as possible!

Your message
was sent!

Thank you for contacting us.
We will get in touch as soon as possible!

Your message
was sent!

Thank you for contacting us.
We will get in touch as soon as possible!