Cyber resilience act

Navigating The Cyber Resilience Act Compliance

Act now to meet EU CRA requirements and make your organization more secure and resilient with simple steps.

Our Partners

Keeping industry leaders compliant

Nvidia
Leonardo
DB
Aws
Mediatek
Arm
Kontron
Intel
Supermicro
Hitachi Energy
Logic Technology
Integral System
Daikin
Seco

highlights

What you can find inside the document

What is the CRA?

The Cyber Resilience Act (CRA) is a regulation introduced by the European Union to establish common cybersecurity standards for products with digital elements — including software and hardware connected to the internet. Its purpose is to ensure that every digital product sold in the EU maintains a consistent and reliable level of cybersecurity throughout its lifecycle. The CRA aims to strengthen the EU’s digital ecosystem by increasing the resilience of each connected device, and ultimately protecting consumers when interacting with them.

Who needs to comply to the CRA?

The Cyber Resilience Act applies to three main economic operators: manufacturers, importers, and distributors of products with digital elements sold in the EU, regardless of where the company is based.

CRA Product Categories

The CRA identifies products with digital elements as hardware, software, and remote data processing solutions.

  • Hardware refers to physical devices connected to the internet or other networks, such as smart home appliances, wearable technology, and industrial IoT devices.
  • Software includes standalone applications that can be installed on hardware or operate independently, such as productivity tools or messaging apps.
  • Remote data processing solutions cover digital services essential to a product’s operation but performed remotely, including cloud-based services

Some of these products are classified based on risk evaluation criteria:

What are the requirements of the CRA?

The CRA defines a clear set of cybersecurity requirements that manufacturers and developers must meet before placing a product on the EU market. They fall into three main categories:

  • Essential security: Products must be secure by design and allow vulnerabilities to be addressed through updates and patches.
  • Vulnerability handling: Manufacturers must respond to discovered vulnerabilities proactively, using a structured and transparent approach.
  • Reporting: Manufacturers must report exploited vulnerabilities and cybersecurity incidents to national authorities via ENISA within 24 hours for early warnings and within 72 hours for complete notifications.

What happens if you don’t comply with the CRA?

The penalties are intended to be effective, proportionate, and dissuasive. Violations of essential cybersecurity requirements may result in fines of up to €15 million or 2.5% of global annual turnover, whichever is higher.

Other breaches, such as those related to documentation, CE marking, or reporting, can incur fines of up to €10 million or 2% of global turnover.

Member States retain flexibility in how penalties apply, particularly for public bodies or microenterprises. Corrective or restrictive actions, such as product recalls, may also be enforced.

Featured

Your info

Country

Company info

By providing your information, you confirm that you’ve read and agreed to the Privacy Policy.
You’re in.

Your demo request has been received.
A product specialist will reach out shortly.
What’s next

Expect a call or email from one of our experts

Get a personalized walkthrough of the Exein platform

While you wait
Oops! Something went wrong while submitting the form.

our solutions

Analyzer

Exein Analyzer scans firmware, creating detailed SBOMs to detect vulnerabilities before market release. It ensures devices comply with CRA by identifying CVEs, weak passwords, and insecure settings, preventing exploitable flaws at launch.

Ready to check your device?

Book a demo
Runtime

Exein Runtime offers continuous, real-time monitoring and threat response on deployed devices. It detects attacks, analyzes incidents with AI, and automates CRA-compliant reporting, enabling ongoing vulnerability management and regulatory adherence post-deployment.

Ready to start protecting your device?

Book a demo

Book a demo

See Exein in action

Exein secures devices at the edge — embedded, intelligent, and compliance-ready.
Book your demo today.

15 min

Your info

Country

Company info

By providing your information, you confirm that you’ve read and agreed to the Privacy Policy.
You’re in.

Your demo request has been received.
A product specialist will reach out shortly.
What’s next

Expect a call or email from one of our experts

Get a personalized walkthrough of the Exein platform

While you wait
Oops! Something went wrong while submitting the form.

From the blog

Exein raises €100m in new funding to accelerate its global expansion

We’re glad to announce that Exein has raised €100 million in new funding in 2025. This new investment follows July’s Series C funding, and brings our total collection of the year up to €170 million.This new investment is led by Blue Cloud Ventures, with participation from HV Capital, Intrepid Growth Partners, Geodesic, and J.P. Morgan, and will help accelerating our global expansion and answer the increasing demand for protection against cyber attacks.

Read more
Read more

Exein and Kontron Announce Strategic Partnership to Protect Millions of Devices Worldwide

Exein, the world’s largest embedded runtime security provider, and Kontron, a leading global provider of IoT/Embedded Computing Technology (ECT), today announced a strategic partnership to integrate Exein’s AI-powered cybersecurity technology into Kontron’s advanced solutions. Through this collaboration, Exein’s runtime security technology becomes a standard feature of KontronOS and KontronAIShield, enhancing Kontron’s portfolio with real-time, AI-driven protection against evolving cyber threats.

Read more
Read more

The U.S. Cyber Trust Mark: the Guide To the New IoT Security Standards

Securing the Internet of Things (IoT) has become a global priority. Europe has taken step forward with the Cyber Resilience Act (CRA), and so has the US with the U.S. Cyber Trust Mark.

Read more
Read more