EU Cyber Resilience Act
Your Roadmap to EU CRA Compliance
This landmark regulation establishes rigorous security standards for IoT manufacturers to protect critical digital infrastructure in the EU and beyond. Take steps to comply today to strengthen the security of your connected devices, ensure continued access to the European market, and get ahead of the evolving regulatory landscape.
Stay Ahead of the Regulations with Finite State
Core Requirements

Secure by Design Principles
Under the CRA, manufacturers must integrate security practices throughout the product lifecycle, including
- Secure boot
- Access controls
- Encryption
- Default security settings
- Lifecycle security management

Vulnerability Handling
IoT manufacturers must proactively manage vulnerabilities and respond swiftly to security incidents with
- Continuous monitoring
- Formal reporting processes
- 24hr disclosure periods
- Secure patch distribution
- End-of-life policy for legacy devices
SBOM & Technical Documentation
The CRA improves software supply chain transparency by imposing specific security requirements on manufacturers, such as
- Including proprietary & open-source components in SBOMs & updating them with each modification
- Include hardware & software configurations, security features, update protocols, & maintenance guidelines in technical documentation

Product Lifecycle Support
The EU CRA demands product lifecycle support to keep devices secure through their operational lifespan, including
- Defined End-of-Life Policies
- Long-term maintenance commitments
- Provision for timely security updates
- Incident response planning
.png?width=1080&height=1080&name=Untitled%20design%20(17).png)
Software Supply Chain Security
Reliance on third-party software increases attack surfaces, which is why the CRA requires
- Comprehensive assessments of third-party suppliers
- Continuous vulnerability scanning
- Robust logging & auditing practices
- Open source risk management practices

Conformity Assessments
The CRA introduces mandatory conformity assessments aligned to product risk categories
- Self-assessments: Default & Important Class I (with exceptions)
- 3rd-party assessments: Important Class II
- European Common Criteria certification: Critical
Go deeper into each requirement
Discover how cyber regulations and compliance are shaping enterprise security for device manufacturers
Join regulations experts Eric Greenwald and Dr Amit Elazari for this insightful webinar to uncover practical strategies to prepar your organization for compliance with global requirements.
.png?width=500&height=425&name=platform%20images%20small%20(2).png)
Meet Finite State, Your Partners in Compliance
Leverage expertise from former U.S. government officials and get the support you need to tackle EU CRA requirements with confidence
- Create audit-ready reports to demonstrate product compliance
- Generate SBOMs with VDR/VEX vulnerability data in industry-standard formats (CycloneDX, SPDX)
- Employ continuous monitoring and alerting to meet regulatory reporting requirements
EU CRA Compliance Timeline
The EU CRA becomes fully applicable
Reporting obligations for manufacturers begin
The EU CRA comes into force
The CRA is officially published in the Official Journal of the European Union
The Council of the European Union formally adopts the CRA
The EU CRA is first proposed by the European Commission
From Our Blog

Countdown to Compliance: Why Connected Device Manufacturers Must Prepare for the EU CRA Now

CRA Compliance Made Simple: Addressing Common Software Supply Chain Security Obstacles

5 Challenges Manufacturers Face with EU CRA Product Lifecycle Support Requirements

Overcoming Challenges in Vulnerability & Incident Management for EU CRA Compliance

The EU CRA was Adopted! What Manufacturers Need to Know About What’s Coming

Navigating the EU Cyber Resilience Act: Essential Insights for Product Security Teams
