Securing Your Products under the EU Cyber Resilience Act (CRA) with SBOMs

The EU Cyber Resilience Act (CRA) introduces the first unified cybersecurity regulation for digital products across Europe. For teams building connected devices, it’s no longer just about innovation. Software Bills of Materials (SBOMs) are now a requirement, not a nice-to-have.
Key Takeaways
- The EU Cyber Resilience Act (CRA) introduces unified cybersecurity requirements for all digital products sold in the EU, making SBOMs mandatory for most digital products unless covered by more specific sectoral legislation.
- SBOMs provide full visibility into software components, enabling manufacturers, importers, and distributors to identify vulnerabilities and maintain accurate, audit-ready documentation.
- CRA compliance impacts multiple stakeholders, manufacturers, importers, distributors, PSIRT managers, and compliance teams, each responsible for maintaining security, documentation, and vulnerability handling.
- Key CRA obligations include creating SBOMs in standard formats, implementing a formal vulnerability response process, conducting risk assessments, and documenting incidents across the entire product lifecycle.
- The regulation entered into force in 2024 with obligations phased in through 2027, with strict penalties up to €15 million or 2.5% of annual turnover, making early preparation essential for market access.
- Automating SBOM creation and vulnerability tracking through platforms like ONEKEY OCP helps teams reduce manual workload, stay compliant, and turn cybersecurity transparency into a competitive advantage.
What is the EU Cyber Resilience Act (CRA)?
The CRA sets baseline security requirements for all digital products entering the EU market. It applies to everything from smart devices and embedded systems to pure software tools. If your product connects to a network, you’re likely in scope.
The CRA also introduces a new level of accountability across the digital product supply chain. You are expected to treat cybersecurity as a core product requirement, not a feature add-on. This regulation shifts security left, into the earliest stages of development and procurement.
Purpose and Legislative Background
Before the CRA, cybersecurity rules varied from country to country. This created confusion and left gaps across the product landscape. The CRA replaces that patchwork with one clear framework for all EU member states.
Why It Matters for Product Security Leaders
Your role isn’t just about ticking boxes, it’s about protecting users and supporting business goals. The CRA gives you a clear path to doing both. Early preparation helps your team stay secure, compliant, and competitive.
Why Are SBOMs Key to CRA Compliance?
SBOMs give you insight into every software component used in your product. That visibility is essential for identifying vulnerabilities and responding quickly. The cyber resilience act SBOM requirements are built on the idea that you need full visibility to stay secure and compliant.
Under the CRA, SBOMs aren’t just for internal use, they’re part of your product’s official technical file. If market surveillance authorities request it, you must provide an up-to-date SBOM with traceable software origins. Having this ready shows regulators that you take transparency and security seriously.
The Role of SBOMs in Product Security
An SBOM acts like a digital parts list, showing you what’s inside your code. It includes libraries, packages, and third-party components that may pose security risks. With that knowledge, you can monitor issues and act fast when threats arise.
Benefits for Manufacturers and Developers
SBOMs give your team a practical edge across roles. For example:
- Developers can track dependencies and spot risks earlier
- Security leads can map known vulnerabilities to real components
- Compliance managers have clear, current documentation for audits
The ONEKEY Product Cybersecurity & Compliance Platform (OCP) includes features that make this workflow automatic.
Who Must Comply with the CRA?
The CRA applies to more than just manufacturers. Anyone placing a product with digital elements on the EU market is responsible for ensuring compliance. That includes importers, distributors, and several roles within product and security teams.
Each actor in the supply chain must also understand how CRA compliance overlaps with other EU regulations like NIS2. You may be subject to multiple frameworks depending on your industry or deployment model. Taking a harmonised approach across teams will help avoid duplicated effort and missed obligations.
Manufacturers
You’re expected to embed cybersecurity into the product from the start. That includes creating and maintaining an SBOM, conducting risk assessments, and documenting incident responses. Some products may require third-party conformity assessment based on criticality.
Importers
You need to confirm that the products you bring into the EU meet CRA requirements. This includes checking:
- That the manufacturer has conducted a risk assessment
- That a current SBOM and documentation are available
- That the product carries the proper conformity markings
Failing to verify these can lead to legal or market access issues.
Distributors
You’re required to verify that every product you distribute complies with CRA obligations. That includes making sure SBOMs and conformity records are in place. If not, the product can’t be sold legally within the EU.
PSIRT Manager
Under CRA, vulnerability handling becomes a formal responsibility. You’ll need to monitor risks, report serious vulnerabilities within 24 hours, and coordinate patches across products. ONEKEY’s OCP supports this with features that link SBOM data to real-time vulnerability alerts.
Compliance Manager
You must track compliance across the entire product lifecycle. This includes storing SBOMs, recording incidents, and maintaining documentation for at least five years. Using an SBOM management tool can save hours of manual work and reduce audit stress.
Key CRA Requirements
The CRA covers technical and organisational measures that protect users and systems. Understanding the core requirements helps you know where to start. SBOMs are just one part of the picture.
The CRA also introduces product classification tiers, they are standard, important, and critical. Critical products, like firewalls or intrusion detection systems, require third-party conformity assessments. Knowing your product’s classification helps determine which obligations apply and how rigorous your approach must be.
SBOM Requirements
You must create an SBOM for each digital product, in a format like SPDX or CycloneDX. The EU cyber resilience act SBOM guidance focuses on top-level dependencies, machine readability, and traceability across product versions. While the SBOM doesn’t have to be public, it must be available for EU authorities if requested.
Vulnerability Requirements
You’ll need a documented vulnerability handling process. This includes tracking component risks through the SBOM, responding quickly to known issues, and reporting exploited vulnerabilities via a central platform. Delays or gaps in this process can result in penalties.
Incident Reporting and Risk Documentation
The CRA requires proof that you considered security from day one. That includes documentation of incidents, risks, and SBOM updates tied to each release. Unsure what falls under CRA SBOM requirements? Start by reviewing your dependency visibility and how you track component vulnerabilities.
Preparing for CRA Compliance with SBOMs
You don’t need to wait for the deadlines to start aligning your product development with CRA requirements. Taking action now sets your team up for smoother launches and fewer surprises. SBOMs are the foundation of this effort.
The CRA encourages a proactive, not reactive, approach to compliance. Embedding SBOM tools and processes early helps your team catch risks before they affect release timelines. It also makes audits and documentation far less disruptive later on.
Conducting Product Risk Assessments
Every product must undergo a cybersecurity risk assessment before launch. You should evaluate third-party software use, attack surfaces, and your ability to patch or update. SBOMs help by revealing exactly what’s in your codebase and where risks might hide.
Implementing SBOMs Effectively
Manual SBOM creation isn’t scalable. Instead, use tools that:
- Generate SBOMs during builds or CI/CD stages
- Support recognised formats like SPDX or CycloneDX
- Track changes across versions and trigger alerts for new risks
The ONEKEY OCP offers these features, built to reduce manual work and improve traceability.
Integrating CRA Requirements into Dev Processes
Security should be part of development, not something added later. You can set up pre-release checks, link SBOMs to Jira tickets, and run scans during code pushes. Making this part of your workflow keeps you on track and audit-ready.
Enforcement and Business Impact
The CRA has a clear enforcement timeline and real consequences for missed compliance. But there’s also upside, proactive teams can turn compliance into a trust advantage. The sooner you act, the smoother the transition.
The CRA closes the gap between software security and product accountability. Once enforcement begins, national authorities will carry out checks and require evidence of compliance. Being able to demonstrate this clearly gives you an operational and reputational edge.
Timeline and Penalties
Here’s what you need to know:
- CRA entered into force on December 10, 2024
- Vulnerability reporting becomes mandatory by September 11, 2026
- Full SBOM compliance is required by December 11, 2027
- Maximum penalty: €15 million or 2.5% of annual turnover
You still have time, but some obligations are already in motion, waiting until 2027 is a risky move.
Market and Financial Risks
Non-compliance puts more than legal exposure on the line. You could face:
- Delayed launches or blocked access to the EU market
- Loss of trust with customers or partners
- Higher costs due to rushed fixes or late-stage rework
Early preparation avoids these pitfalls and protects your bottom line.
Compliance as a Competitive Advantage
Meeting CRA standards shows you take security seriously. With full lifecycle support and visibility through your EU CRA SBOM processes, you build trust with regulators and customers alike. ONEKEY helps you do this at scale without slowing your release cycles.
Simplifying CRA and SBOM Management
You don’t have to manage compliance manually or from scratch. The ONEKEY Product Cybersecurity & Compliance Platform (OCP) includes SBOM generation, vulnerability scanning, and incident response features. It integrates with your existing tools so you can meet CRA requirements without disrupting your workflows.
Manual tracking and fragmented tools make CRA compliance harder than it needs to be. By centralising vulnerability data, SBOMs, and documentation in one place, you reduce confusion and increase efficiency. This makes it easier to stay organised and audit-ready as the regulation evolves.
Frequently Asked Questions
Which Products Fall Under CRA Scope?
Any product with digital elements sold in the EU is likely covered. That includes consumer devices, industrial control systems, mobile apps, and firmware. Products in tightly regulated sectors like automotive or defence may fall under different rules.
How Does CRA Affect Device Firmware Security?
Firmware is treated like software under the CRA. You’ll need to track vulnerabilities, maintain an SBOM, and ensure updates are possible throughout the support period. ONEKEY’s OCP includes features that automate firmware analysis and reporting.
How Does SBOM Transparency Help With CRA Vulnerability Management?
SBOMs show you what’s in your software, including third-party and open-source components. That means when a new CVE is announced, you’ll know instantly if you’re affected. This shortens your response time and strengthens incident management.
Why Is SBOM Important for Product Security?
SBOMs make software supply chains visible and manageable. They help you find weak points before attackers do, and they simplify compliance reporting. That’s why SBOMs are central to CRA SBOM requirements and modern cybersecurity strategy.
About Onekey
ONEKEY is the leading European specialist in Product Cybersecurity & Compliance Management and part of the investment portfolio of PricewaterhouseCoopers Germany (PwC). The unique combination of the automated ONEKEY Product Cybersecurity & Compliance Platform (OCP) with expert knowledge and consulting services provides fast and comprehensive analysis, support, and management to improve product cybersecurity and compliance from product purchasing, design, development, production to end-of-life.

CONTACT:
Sara Fortmann
Senior Marketing Manager
sara.fortmann@onekey.com
euromarcom public relations GmbH
team@euromarcom.de
Ready to automate your Product Cybersecurity & Compliance?
Make cybersecurity and compliance efficient and effective with ONEKEY.



