Cyber Resilience Act

Cyber Resilience Act: From IT Topic to Strategy

The new EU CRA rules at a glance

The Cyber Resilience Act (CRA) - Why Companies Need to Act Now
23.04.2026
Security

For a long time, cybersecurity was an issue for IT departments. With the Cyber Resilience Act (CRA), this is changing fundamentally: security is becoming a mandatory feature of digital products and, as a result, a strategic priority for companies. What the EU is setting in motion here is more than just regulation. It is a paradigm shift that will determine which products will be able to survive on the European market in the future.

Why Product Safety Is Being Rethought

Today, digital products form the backbone of virtually all business modelsfrom traditional software to connected devices in industrial settings. At the same time, the attack surface is growing rapidly.

 

Insecure components, missing updates, or unclear responsibilities in vulnerability management are not exceptions but often the reality. This is precisely where attackers strike: with increasing professionalism and impact.

 

The consequence: cybersecurity must evolve from a reactive protective mechanism into an integral product feature. However, discussions with many companies reveal that this shift in perspective has not yet fully taken hold, neither in development processes nor in strategic product planning.

What Is the Cyber Resilience Act

The Cyber Resilience Act is an EU regulation that, for the first time, establishes binding security requirements for products with digital elements throughout their entire lifecycle.

 

Essentially, the EU is pursuing three objectives:

  1. a uniformly high level of security within the single market
  2. greater transparency regarding risks and vulnerabilities
  3. a clear allocation of responsibility along the supply chain
     

This results in specific requirements:

  • Security by Design and by Default as standard
  • Continuous Vulnerability Management instead of selective measures
  • Mandatory reporting of actively exploited vulnerabilities
  • Traceable security information for customers

Particularly relevant: The transition periods appear generous at first glance, but in practice they are not. Those who have not yet established structured processes will quickly underestimate the effort required to adapt.

Who Is Affected by the Cyber Resilience Act

The CRA deliberately addresses the entire value chain of digital products and thus involves significantly more stakeholders than many might initially expect.
 

These include:

  • Software manufacturersregardless of whether they offer standard solutions or specialized applications
  • Manufacturers of connected devices and industrial systems
  • Providers of cloud-based services and platforms
  • Companies that commercially use or integrate open source software
  • Importers and distributors bringing products to the EU market

What matters is not so much the industry as the question:

Does your product contain digital components and could it pose a security risk?

If so, the CRA applies.

CRA in the Context of Existing Regulations

With NIS2 and the GDPR, established regulatory frameworks already exist. The Cyber Resilience Act continues these with a significantly different focus.

  • NIS2 is geared towards organizations and their security capabilities
  • GDPR protects personal data
  • CRA, on the other hand, starts directly at the product

This shifts the perspective:
Not only companies need to act securely, but also every single product needs to be inherently secure.

 

For many organizations, this represents a new challenge, as product development, security and compliance must be more closely interlinked than before.

Why the CRA Is a Strategic Issue

The Cyber Resilience Act will not only change processes but will also influence business models.

 

Market access

Products without verifiable security concepts will no longer have access to the EU market in the future.

 

Liability

Products without verifiable security concepts will no longer have access to the EU market in the future.

 

Competition

Companies that integrate security into their products early on build trust and thereby create a clear point of differentiation.

 

Especially in complex environments, it becomes clear that it is not just about technical measures, but also about a holistic interplay of development, operations, and governance. Organizations that take a structured approach here and consistently integrate security into their product strategy have a clear advantage.

Conclusion

The Cyber Resilience Act makes it clear where things are headed: cybersecurity is becoming a fundamental requirement for digital products. The key question is no longer whether companies should address this issue, but how quickly they can translate this shift into concrete actions.

Related Information on CRA and Security

Security Services

Cyber security services for businesses: Comprehensive protection with Arvato Systems – from advisory services to zero trust, we are your strong partner.

Vulnerability Management with VAREDY

Identify and fix vulnerabilities in time with vulnerability management and effectively minimize the risk of cyberattacks.

Varedy

Fix vulnerabilities as quickly and effectively as possible with the help of VAREDY

NIS2 Directive Explained Simply

The NIS2 directive and its implementation in Germany have been hotly debated for some time now. But what changes and cybersecurity requirements does NIS2 actually entail and how do companies in Germany need to react in order to meet the new requirements?

NIS2 and Cyber Resilience Act: Obligations for Energy Suppliers

This article shows the operational obligations arising from NIS2 and the Cyber Resilience Act and how energy suppliers need to adapt their procurement, operations and incident response.

Secure by Design: Principles for a Secure Architecture

The article shows why security by design is a central architectural principle and how security is anchored in the design of modern IT systems.

Written by

82428-2 Schäfers-1
Patrick Schäfers
Expert for cyber security & vulnerability management

As Head of Security Projects, Patrick Schäfers is responsible for secure IT processes and strategic vulnerability management. He has been with Arvato Systems for ten years and has many years of experience focusing on IT security, information security, and business processes.

Learn more about this author