Cyber resilience act
Navigating The Cyber Resilience Act Compliance
Act now to meet EU CRA requirements and make your organization more secure and resilient with simple steps.

Our Partners
Keeping industry leaders compliant
highlights
What you can find inside the document

What is the CRA?
The Cyber Resilience Act (CRA) is a regulation introduced by the European Union to establish common cybersecurity standards for products with digital elements — including software and hardware connected to the internet. Its purpose is to ensure that every digital product sold in the EU maintains a consistent and reliable level of cybersecurity throughout its lifecycle. The CRA aims to strengthen the EU’s digital ecosystem by increasing the resilience of each connected device, and ultimately protecting consumers when interacting with them.
Who needs to comply to the CRA?
The Cyber Resilience Act applies to three main economic operators: manufacturers, importers, and distributors of products with digital elements sold in the EU, regardless of where the company is based.
CRA Product Categories
The CRA identifies products with digital elements as hardware, software, and remote data processing solutions.
- Hardware refers to physical devices connected to the internet or other networks, such as smart home appliances, wearable technology, and industrial IoT devices.
- Software includes standalone applications that can be installed on hardware or operate independently, such as productivity tools or messaging apps.
- Remote data processing solutions cover digital services essential to a product’s operation but performed remotely, including cloud-based services
Some of these products are classified based on risk evaluation criteria:
What are the requirements of the CRA?
The CRA defines a clear set of cybersecurity requirements that manufacturers and developers must meet before placing a product on the EU market. They fall into three main categories:
- Essential security: Products must be secure by design and allow vulnerabilities to be addressed through updates and patches.
- Vulnerability handling: Manufacturers must respond to discovered vulnerabilities proactively, using a structured and transparent approach.
- Reporting: Manufacturers must report exploited vulnerabilities and cybersecurity incidents to national authorities via ENISA within 24 hours for early warnings and within 72 hours for complete notifications.
What happens if you don’t comply with the CRA?
The penalties are intended to be effective, proportionate, and dissuasive. Violations of essential cybersecurity requirements may result in fines of up to €15 million or 2.5% of global annual turnover, whichever is higher.
Other breaches, such as those related to documentation, CE marking, or reporting, can incur fines of up to €10 million or 2% of global turnover.
Member States retain flexibility in how penalties apply, particularly for public bodies or microenterprises. Corrective or restrictive actions, such as product recalls, may also be enforced.
Featured

Your demo request has been received.
Expect a call or email from one of our experts
Get a personalized walkthrough of the Exein platform
Watch a video of our CEO at
Embedded World 2025 →
Download our product brief →
our solutions
Book a demo
See Exein in action
Exein secures devices at the edge — embedded, intelligent, and compliance-ready.
Book your demo today.
15 min
Your demo request has been received.
Expect a call or email from one of our experts
Get a personalized walkthrough of the Exein platform
Watch a video of our CEO at
Embedded World 2025 →
Download our product brief →
From the blog

Exein raises €100m in new funding to accelerate its global expansion
We’re glad to announce that Exein has raised €100 million in new funding in 2025. This new investment follows July’s Series C funding, and brings our total collection of the year up to €170 million.This new investment is led by Blue Cloud Ventures, with participation from HV Capital, Intrepid Growth Partners, Geodesic, and J.P. Morgan, and will help accelerating our global expansion and answer the increasing demand for protection against cyber attacks.

Exein and Kontron Announce Strategic Partnership to Protect Millions of Devices Worldwide
Exein, the world’s largest embedded runtime security provider, and Kontron, a leading global provider of IoT/Embedded Computing Technology (ECT), today announced a strategic partnership to integrate Exein’s AI-powered cybersecurity technology into Kontron’s advanced solutions. Through this collaboration, Exein’s runtime security technology becomes a standard feature of KontronOS and KontronAIShield, enhancing Kontron’s portfolio with real-time, AI-driven protection against evolving cyber threats.