The new EU Cyber Resilience Act guidance is out. Here’s the business risk for compliance and risk teams

The European Commission published draft EU Cyber Resilience Act guidance on March 3, 2026, and opened feedback until March 31. The draft focuses on the exact implementation knots teams have been struggling with: remote data processing, free and open-source software, support periods, and how the CRA fits with other EU laws. That means this is…

Ava Kernan Avatar
'EU CRA' text over ruffled EU flag

The European Commission published draft EU Cyber Resilience Act guidance on March 3, 2026, and opened feedback until March 31. The draft focuses on the exact implementation knots teams have been struggling with: remote data processing, free and open-source software, support periods, and how the CRA fits with other EU laws.

That means this is no longer just a product-team interpretation exercise. It is now a governance question about how the business defines scope, assigns ownership, keeps evidence, and manages regulatory overlap. Examples of products subject to the Cyber Resilience Act include smartphones, Wi-Fi routers, smart home devices, and software applications, which must meet cybersecurity requirements and carry CE marking before being sold in the EU.

So this is more than another Brussels update. The real story is that the Commission has now highlighted the exact fault lines where risk and compliance programs can break.

4 reasons why risk and compliance teams should care: the Cyber Resilience Act creates business risk, not just product obligations

A. Mis-scoped products become compliance risk


If teams get scope wrong, especially where remote data processing or connected services are involved, they risk applying the wrong controls, building the wrong reporting workflows, or missing obligations entirely. The Commission has signaled that these boundary questions are central enough to merit specific guidance.

For businesses already using compliance management software, compliance automation, or broader governance risk and compliance tools, that should ring alarm bells. Bad scoping upstream creates messy control design downstream.

B. Weak accountability becomes reporting risk


From September 11, 2026, manufacturers will need to notify actively exploited vulnerabilities and severe incidents, with an early warning within 24 hours and a full notification within 72 hours. That means ownership cannot stay fuzzy between product, security, legal, and compliance.

That means ownership cannot stay fuzzy between product, security, legal, and compliance. A reporting clock this short exposes every weak handoff in the operating model.

C. Weak evidence becomes regulator-facing risk


CRA compliance is tied to conformity, documentation, and CE marking. This is where poor evidence retention, unclear support-period logic, or inconsistent decision-making can move from internal mess to external exposure. The CRA summary makes clear that conformity assessment, technical documentation, declared support periods, and CE marking all sit at the center of the compliance model, with market surveillance authorities enforcing the rules.

This matters even more in a complex supply chain. The World Economic Forum found that 54% of large organizations see supply chain challenges as the biggest barrier to achieving cyber resilience.

That is exactly why product visibility, dependency tracking, and strong compliance management tools matter here.

D. Product failures become commercial and reputational risk

Once product cybersecurity is tied to formal market access and enforcement, failures are no longer just security incidents. They can affect customer trust, sales cycles, procurement scrutiny, and audit conversations. That commercial risk is a reasonable inference from the CRA’s structure: this is a product-compliance regime tied to market access, conformity, documentation, and enforcement, not just a background security expectation.

The Cyber Resilience Act does not sit alone: the real crossover with governance, risk and compliance

The real crossover is with governance, risk, and compliance.

NIS2


NIS2 establishes a unified cybersecurity framework across 18 critical sectors. For many organizations, the CRA will not land in a vacuum. It will sit alongside broader cyber governance, incident handling, and resilience obligations already being built under NIS2.

GDPR / data protection

The CRA is expressly without prejudice to the GDPR. That means organizations cannot treat product cybersecurity and personal data compliance as separate universes when products process personal data.

Product compliance / market access


The CRA uses a product-compliance model tied to conformity assessment, CE marking, and market surveillance. That should immediately register with compliance leaders as a different level of exposure than a purely internal policy standard.

Internal controls and assurance

Organizations will need a clearer evidence model: what was in scope, who made the call, what support period was declared, how vulnerabilities were triaged, and what was reported when. That is exactly the kind of control discipline good regulatory compliance management software, risk and compliance tools, and GRC compliance software should be helping teams enforce.

The 4 risk questions the guidance is really forcing companies to answer

The guidance helps, especially for teams already engaging seriously with it. But it also exposes how many businesses still do not have shared answers to basic product-security governance questions.

a) Are we sure which products are in CRA scope?

Does the product actually fall in scope, and where do connected services or remote data processing pull you further in?

The Commission has explicitly said the draft guidance addresses remote data processing solutions. That matters because software and services are often where internal certainty starts to wobble.

b) Can we defend our support-period logic for CRA?

Can you explain, consistently, why a product is supported for a certain length of time?

This matters because the CRA is not just asking for updates. It is pushing manufacturers to justify support windows in a structured way, as part of a broader lifecycle and product-safety-style regulatory model. Academic commentary has described the CRA as built on a product safety approach, while more recent scholarship describes it as introducing lifecycle security obligations and turning product cybersecurity into a matter of public-law compliance.1 2

C) Who owns vulnerability handling when the clock starts?

The issue is not whether your PSIRT exists on paper. It is whether the business can move from awareness to decision to submission inside 24 and 72 hours. The official reporting guidance leaves little room for ambiguity on timing.

D) How does CRA overlap with other regulations?

How does the CRA interact with NIS2, data protection, sector rules, and the rest of your internal control framework?

The Commission itself has flagged the interplay with other EU legislation as one of the central purposes of the new draft guidance.

Data Privacy Management solution download

The bigger pattern: regulators are moving product security from principle to proof

The CRA is part of a wider regulatory pattern. Security can no longer sit comfortably as an engineering aspiration or a trust-marketing claim. The direction of travel is toward lifecycle accountability, evidence, reporting discipline, and traceable ownership. The academic research is strong on this point. Pier Giorgio Chiara describes the CRA as resting on a horizontal, risk-based, product-safety approach. Fabian Teichmann describes it as introducing mandatory secure-by-design requirements and lifecycle security obligations, with duties that run from design and development through documentation, CE marking, reporting, and post-market updates.34

ENISA’s (EU agency for cybersecurity) 2025 Threat Landscape analyzed 4,875 incidents across the period from 1 July 2024 to 30 June 2025. ENISA also says phishing accounted for 60% of observed intrusion cases, while vulnerability exploitation accounted for 21.3%. this is a strong example of why regulators are pushing harder on reporting and vulnerability handling.

“Systems and services that we rely on in our daily lives are intertwined, so a disruption on one end can have a ripple effect across the supply chain. This is connected to a surge in abuse of cyber dependencies by threat actors that can amplify the impact of cyberattacks.“

Juhan Lepassaar, Executive Director, ENISA

What cyber-smart teams are doing before 31 March

1. Recheck scope decisions

Especially where products rely on software, connected services, or remote data processing. The Commission has signaled that these are exactly the areas where businesses need more clarity.

2. Identify your reporting owner now

Who decides whether something is reportable, who signs off, and who submits?
If an actively exploited vulnerability lands tomorrow, who owns the 24-hour warning and 72-hour notification? Security? Product? Legal? Compliance?

The law will not care if the answer is “we thought someone else had it.”

If you’d like support in auditing your current process and ensuring there are no gaps in your program, we offer complimentary workshops for senior leaders and their teams to optimize their workflows.

3. Review your support-period logic

Could you explain, and defend, why a product is supported for a given number of years? If not, that is a governance gap, not just a documentation gap. The Commission has singled out support periods as one of the core areas for guidance, and the academic literature points to the CRA’s lifecycle model as the reason this matters.5

4. Test vulnerability-handling evidence

Could you show how a vulnerability moved from identification to triage to action to reporting? If not, your compliance software or GRC tools may not be giving you the audit trail you think they are.

5. Map CRA to existing obligations

Where does the CRA overlap with NIS2, GDPR, and product compliance processes? Those overlaps are not peripheral. They are one of the central reasons the Commission issued this guidance in the first place.

6. Look hard at open-source governance

You do not need total perfection overnight, but you do need a serious answer on dependency visibility, maintainers, patching expectations, and documentation. The Commission’s draft guidance specifically calls out free and open-source software, and the CRA summary also sets out obligations for open-source software stewards in certain circumstances.

7.  Decide whether to feed back to the Commission

This is one of the few moments businesses can still shape how implementation lands in practice. Feedback is open until March 31, 2026.

What “ready” for the Cyber Resilience Act actually looks like

By summer, a stronger organization should be able to show:

  • a defensible CRA scope position
  • a named reporting owner and escalation path
  • an agreed vulnerability-handling workflow
  • a documented support-period rationale
  • clear evidence and recordkeeping
  • mapped overlap with NIS2, GDPR, and product compliance processes
  • alignment across product, engineering, security, legal, and compliance

That last part matters because regulatory fragmentation is already creating real headaches: more than 76% of CISOs told the World Economic Forum that fragmentation across jurisdictions significantly affects their ability to maintain compliance.

That is exactly why companies are rethinking their compliance management software, regulatory compliance management software, software regulatory compliance approach, and broader governance risk and compliance tools. The issue is no longer just whether systems exist. It is whether they help the business move fast, prove decisions, and keep security and compliance aligned under pressure.

EU CRA update summary

The draft guidance does not answer everything. But it does tell companies where regulators expect maturity first.

For risk and compliance leaders, the issue is not whether the CRA exists. It is whether the business can prove scope, ownership, reporting discipline, and evidence before failures become external problems.

If your team is still relying on disconnected processes, manual workarounds, or unclear ownership, now is the time to fix it. CoreStream GRC helps organizations bring security and compliance together with practical, flexible workflows that make evidence, accountability, and reporting easier to manage.

Book a complimentary workshop to assess your current process, spot the gaps, and see how CoreStream GRC can support Cyber Resilience Act readiness.

FAQs about the EU Cyber Resilience Act

What is the EU Cyber Resilience Act?

The EU Cyber Resilience Act is a regulation that sets cybersecurity requirements for products with digital elements sold in the EU. It covers product design, vulnerability handling, documentation, reporting, and ongoing support obligations.

Why should compliance teams care about the Cyber Resilience Act?

The Cyber Resilience Act creates business risk, not just product obligations. It affects reporting, documentation, scope decisions, evidence retention, and regulatory overlap with frameworks like NIS2 and GDPR. That makes it a live issue for teams using compliance management software, compliance automation, and broader risk and compliance tools.

Who does the Cyber Resilience Act apply to?

The Act mainly applies to manufacturers, importers, and distributors of products with digital elements placed on the EU market. In practice, it matters to product, engineering, security, legal, and compliance teams because all of them may play a role in proving compliance.

What products are in scope under the Cyber Resilience Act?

Products with digital elements can fall within scope, including software and connected products. Scope becomes more complicated where remote data processing, connected services, or open-source components are involved, which is why many businesses are reviewing their product boundaries now.

What are the main Cyber Resilience Act risks for compliance and risk teams?

The biggest risks are getting scope wrong, lacking a clear reporting owner, weak evidence and documentation, poor vulnerability-handling workflows, and failing to map overlap with other regulatory obligations. These gaps can quickly become regulator-facing, commercial, and reputational problems.

How does the Cyber Resilience Act overlap with NIS2 and GDPR?

The Cyber Resilience Act does not operate in isolation. Many businesses will need to align it with NIS2, GDPR, internal controls, and product compliance processes. That means product cybersecurity, data protection, and governance can no longer be managed in separate silos.

What is the reporting timeline under the Cyber Resilience Act?

From September 2026, manufacturers will need to report actively exploited vulnerabilities and severe incidents under strict deadlines. This creates real pressure on escalation paths, internal ownership, and evidence capture.

Sources and further reading


  1. Teichmann, F. (2026). The cyber resilience act as a new paradigm for product security: a compliance roadmap. International Cybersecurity Law Review, 7(1), 1 – 17. https://doi.org/10.1365/s43439-025-00162-4 ↩︎
  2. Chiara, P.G. (2025) ‘Understanding the regulatory approach of the Cyber Resilience Act: protection of fundamental rights in disguise?’, European Journal of Risk Regulation, 16, pp. 469–484. ↩︎
  3. Chiara, P.G. (2025) ‘Understanding the regulatory approach of the Cyber Resilience Act: protection of fundamental rights in disguise?’, European Journal of Risk Regulation, 16, pp. 469–484. ↩︎
  4. Teichmann, F. (2026). The cyber resilience act as a new paradigm for product security: a compliance roadmap. International Cybersecurity Law Review, 7(1), 1 – 17. https://doi.org/10.1365/s43439-025-00162-4 ↩︎
  5. Chiara, P.G. (2025) ‘Understanding the regulatory approach of the Cyber Resilience Act: protection of fundamental rights in disguise?’, European Journal of Risk Regulation, 16, pp. 469–484. ↩︎
  • A value-based GRC guide for unique SMEs

    A value-based GRC guide for unique SMEs

    Value-based Governance, Risk and Compliance (GRC) is not about buying an overly complex  platform, copying what a global enterprise does and it is more than penalties avoided or hours saved. For smaller and mid-sized businesses, it is much more straightforward than that. It is about aligning GRC to what matters most, the organization’s strategic goals…

  • Short snippet of GRC 2020’s Conflict of Interest solution perspective

    Short snippet of GRC 2020’s Conflict of Interest solution perspective

    At CoreStream GRC, we believe Conflict of Interest (COI) Management should go beyond checkbox compliance: “A mature program treats conflict management as continuous, not episodic.” It’s one of our most in‑demand solutions precisely because many organizations are rethinking whether their existing approaches truly stand up to today’s regulatory scrutiny.  To put that belief to the test, we invited trusted GRC industry analyst Michael Rasmussen to…

  • What GRC leaders are really asking for now: key takeaways from our April community event

    What GRC leaders are really asking for now: key takeaways from our April community event

    On 23 April, at CoreStream GRC’ latest community event, we brought together clients, partners and senior GRC leaders in London for our April customer community showcase. Even with tube strikes disrupting the city, people still made the effort to attend, join remotely, and contribute. That mattered. It said a lot about the kind of community…