Finite StateFinite State
Finite StateFinite State
Compliance & Regulations

Conformity Assessments: Understanding the EU Cyber Resilience Act Requirements

Learn about the EU Cyber Resilience Act's conformity assessments. Discover how IoT manufacturers can ensure compliance based on product risk categories.

Hannah Beazley

Hannah Beazley

December 12, 2024

The EU Cyber Resilience Act (CRA) will revolutionize how IoT manufacturers approach cybersecurity. It introduces mandatory conformity assessments to verify that IoT products comply with its rigorous standards. 

The process of complying with the CRA begins with understanding how the CRA categorizes different digital products and the requirements it imposes in each category. The specific compliance measures required under the CRA are designed to align with the specific risk level associated with each product category. The CRA defines those categories as follows:

  1. Default (lowest risk category) — 90% of products fall into this category
  2. Important Class I 
  3. Important Class II 
  4. Critical 

This tiered framework ensures that regulatory efforts are appropriately scaled, prioritizing the security of critical and high-risk products without overburdening low-risk categories. Let’s look at the assessment criteria for each of these categories in more detail. 

This is the final installment in our six-part mini-series guiding IoT manufacturers through the intricacies of the EU CRA requirements. Read part five here.

EU CRA Conformity Assessment Requirements

Default Category

Products falling under the default category should use the self-assessment method to demonstrate compliance with the EU CRA. 

To conduct a self-assessment, manufacturers must prepare comprehensive technical documentation that includes: 

  • A general description of the product detailing its intended purpose and functionalities 
  • An analysis of potential cybersecurity risks associated with the product
  • A description of the measures implemented to address identified risks and ensure compliance with the CRA’s essential requirements. 

The self-assessment protocol is explained in CRA Annex VIII.

Low-risk products include 

  • Smart home devices 
  • Printers 
  • Bluetooth speakers
  • Media player software applications

Important Class I

Products that fall under the Important Class I category can use the same self-assessment process as the Default category as long as they can apply either 

  • Harmonized Standard: A European standard established by a recognized European Standards Organisation at the request of the European Commission. These standards enable manufacturers to demonstrate that their products comply with EU legislation. Specific harmonised standards are currently under development for the Cyber Resilience Act (CRA).
  • Common Specification: A practical, detailed set of guidelines issued by the European Commission to outline how a product should meet specific requirements when harmonized standards are unavailable.
  • European Cybersecurity Certification: A framework being developed by ENISA, under the guidance of the European Commission, to certify that products with digital elements fulfill the essential requirements of the CRA.

If none of these schemes apply, manufacturers must undergo assessment by a third-party conformity assessment body.

Important Class I products include 

  • Password managers 
  • Identity management systems
  • Operating systems 
  • Routers and modems intended to connect to the internet and switches

Important Class II 

Products in this category must have their product assessed by a third-party conformity assessment body even if they comply with the Harmonized Standard, Common Specifications, or the European Cybersecurity Certification scheme. 

Important Class II products include 

  • Firewalls
  • Tamper-resistant microprocessors and microcontrollers 
  • Intrusion detection and prevention systems 

Critical 

Products deemed “critical” have the highest risk and, therefore, the strictest compliance process. Any product in this category must complete a European Common Criteria (EUCC) cybersecurity certification assessment conducted by an authorized conformity assessment body. 

Critical products include 

  • Hardware devices with security boxes
  • Smart cards 
  • Smart meter gateways 

Conclusion 

The EU CRA's conformity assessments are a pivotal step in raising cybersecurity standards for IoT devices. By aligning assessment requirements with product risk levels, the CRA strikes a balance between regulatory rigor and practicality. Manufacturers must adapt to these new processes to ensure compliance and maintain market access.

Explore how Finite State’s tools and services can simplify your certification journey, from preparation to audit-ready reporting. Contact us today to learn more or schedule a consultation!

Tags

#regulation
Hannah Beazley

Hannah Beazley

Hannah is Content Marketing Manager at Finite State, where she brings her SaaS startup experience to drive SEO-focused content across blogs, web, email, and social. With a background in copywriting and design, she blends creativity with strategy to grow organic reach and brand engagement.

Related Articles

Road to Compliance: First Steps OEMs and Suppliers Should Take Today

The Road to Compliance: First Steps OEMs and Suppliers Should Take Today

Learn how to achieve Connected Vehicle Rule compliance with six actionable steps — from SBOM & HBOM generation to supplier engagement and risk evaluat...

Oct 20, 2025
Legacy Software & CVR Compliance Carveouts Explained

Legacy Software & CVR Compliance Carveouts Explained

Learn how legacy carveouts and specific authorizations can help you comply with CVR—while time-limited, they demand proactive planning now.

Oct 16, 2025
Regulations Driving IoT Security Forward

Regulations Driving IoT Security Forward

From EU CRA to FDA 524B, IoT regulations are reshaping the market. Learn what manufacturers need for compliance—SBOMs, testing, and supply chain visib...

Sep 24, 2025

Ready to Level Up Your Security Knowledge?

Join thousands of security professionals learning from the best in the industry

Start Learning TodayStart Learning Today
Finite StateFinite State

Finite State is the Product Security Automation Platform that functions as an autonomous Product Security OS: design → verify → prove, grounded in what you ship.

Platform

Platform Overview
Ground Truth Inventory
Exploitability-Based Prioritization
Design-Time Architecture Security
Automated Evidence-Backed Compliance

Solutions

Device Manufacturers
Automotive
Medical Devices
Energy & Utilities
Government
Industrial

Resources

Blog
Resource Library
Webinars & Videos
Events
Documentation

Company

About Us
CareersHIRING
Press & Media
Contact Sales
X

Privacy PolicyTerms of UseCustomer Terms and Conditions