Skip to main content

This guide provides the most up-to-date information on the Cyber Resilience Act (CRA), a European Union law that establishes mandatory cybersecurity requirements for products with digital elements.

If you manufacture, maintain, or steward open source software, you may be wondering how the CRA applies to you. CRA reporting requirements will become applicable on 11 September 2026, with all requirements taking effect on 11 December 2027 — so it’s important to begin preparing now.

Counting down to CRA compliance

Starting 11 September 2026, manufacturers must comply with vulnerability reporting requirements. Other CRA deadlines also apply.

About the Cyber Resilience Act

The Cyber Resilience Act (CRA) entered into force on 11 December 2024. CRA is a European law created to ensure that software products are designed and maintained with security in mind throughout their lifecycle.

Hardware and software products are increasingly subject to cyberattacks. The inherent security risks of software are not well understood by consumers, yet estimates predict that cybercrime will cost the global economy more than 20 trillion USD by 2026 (Source: Statista). 

Manufacturers: a software vendor or a vendor of a physical product with software components. Manufacturers include anyone who is placing a product on the European market, i.e. this is not limited to European companies.

Open Source Maintainers: The EU is in the process of developing guidance on how the law will impact maintainers who monetize an open source project. If you just contribute to open source or do not monetize open source, you will not be impacted directly by the CRA. However, you may experience indirect impact in terms of higher expectations around security.

Open Source Stewards: Code hosting foundations or for-profit organizations that are not monetizing the particular pieces of software they are stewarding. 

Not sure where your organisation fits? Check out the CRA FAQ

Full supply chain compliance has never been required before the CRA. In any kind of software application, about 24% is built in-house or procured and 76% is open source dependencies. The CRA impacts the entire supply chain, including the ~76% of OSS, in every product. This changes everything. 

Compliance used to be internal policies and legal agreements with vendors. Now, the whole open source supply chain compliance will have to be brokered. 

The fines are severe. Manufacturers will be fined if caught not in compliance. In addition to monetary fines, products will be removed from retail shelves until compliance is met.

Bar chart titled 'CRA innovation: fully supply chain compliance'. TODO
11 December 2024 - CRA Entry into force (EIF); 30 August 2026 - Harmonized Standards: Horizontal (type A); 11 September 2026 - Vulnerability reporting; 30 October 2026 - Harmonized Standards: Vertical (type C), Horizontal (type B); 11 December 2027 - All other obligations.

The Cyber Resilience Act (CRA) entered into force on 11 December 2024. Manufacturers must comply with vulnerability reporting requirements by 11 September 2026. Several compliance deadlines follow based on product classification: horizontal (type A) must comply by 30 August 2026, while vertical (type C) and horizontal (type B) have a compliance deadline of 30 October 2026. All other CRA obligations become fully applicable by 11 December 2027.

CRA Resources

Connect, Learn & Stay Up to Date on the CRA

Community Resources

In response to the evolving regulatory landscape introduced by the Cyber Resilience Act (CRA), the Open Regulatory Compliance (ORC) Working Group has mobilised a dedicated community effort to support open source stakeholders. Recognising the unique challenges faced by developers, maintainers, and organisations, we are collaboratively developing a comprehensive suite of resources designed to demystify the CRA and provide actionable guidance. Our key initiatives, each crafted through community input, empower stakeholders to achieve informed and effective compliance.

Collaborate with us

The Open Regulatory Compliance (ORC) Working Group is a neutral forum for the open source community - including foundations, maintainers, vendors, users, package managers, among others - and the broader software industry to facilitate CRA compliance. 

DeliverableCategoryStatus
CRA FAQDocumentation✍️ Work in Progress
InventoryDocumentation✍️ Work in Progress
Input to draft implementing act on product categoriesInputs & contributions🚀 Shipped
Contribution to Vulnerability Handling Standard Clause 4.4Inputs & contributions🚀 Shipped
Contribution to open source EU Guidance on open source hardwareInputs & contributions🚀 Shipped
Comments on CEN/CENELEC PT 1 StandardInputs & contributions🚀 Shipped
Feedback on Cybersecurity Act (CSA) RevisionInputs & contributions🚀 Shipped
Comments to EU Guidance on open sourceInputs & contributions🚀 Shipped
Response to the Call for evidence on the revision of the Standardisation Regulation 1025Inputs & contributions🚀 Shipped
Comments on CEN/CENELEC PT3 Vulnerability Handling StandardInputs & contributions🚀 Shipped
White paper on SBOMsWhite papers🗺️ Planned
White paper on due diligence obligation of manufacturersWhite papers✍️ Work in Progress
White paper on security attestationsWhite papers🗺️ Planned
White paper on types of open source projectsWhite papers🗺️ Planned
White paper on open source software stewards and CRAWhite papers🚀 Shipped
Vulnerability management specificationSpecifications✍️ Work in Progress
Specification on principles for cyber resilience for open source developmentSpecifications🗺️ Planned
Specification on generic security requirements for open source componentsSpecifications🗺️ Planned
Security policy for open source software stewardsSpecifications🗺️ Planned

Status Legend

StatusMeaning
🗺️ PlannedWork has not yet started
✍️ Work in ProgressCurrently being developed
🚀 ShippedComplete and available
❌ CancelledWill not be completed

Back to the top