The regulation (EU) 2024/2847, known as the Cyber Resilience Act (CRA), contains requirements for the cybersecurity of products with digital elements. In an interview, Matthias Kuczera, expert in “Functional Safety – Standards” at Pilz GmbH & Co. KG, explains exactly what these are and how affected companies can prepare well for the CRA.
Mr Kuczera, why do we need EU legislation on cyber resilience? And who is affected by the requirements?
The aim of the Cyber Resilience Act is to provide better protection from cyber attacks for consumers and businesses. The CRA contains a variety of specifications for manufacturers, importers and distributors of products with digital elements, which are capable of communicating with other products. This includes hardware and software products.

“Without Security, a machine with all its Safety measures is vulnerable and unprotected.“
Matthias Kuczera, expert in “Functional Safety — Standards” at Pilz GmbH & Co. KG.
Consumer products such as smartphones, laptops, smart home devices, smartwatches and connected toys are affected. B2B products such as controllers and sensors also fall under the scope of the CRA. Software products such as operating systems are also affected.
When must the requirements of the Cyber Resilience Act be implemented?
The CRA is an EU Regulation and not a Directive. So, in contrast to the NIS‑2 Directive, it is directly applicable in all EU member states and national implementation is not required. However, there is a transition period. The CRA is to be implemented in various stages, from the end of 2024 until mandatory application from 11 December 2027. Manufacturers’ reporting obligations will apply from 11 September 2026, and requirements to notify conformity assessment bodies will apply from 11 June 2026.
What specifically is required in the legally binding CRA?
The new Regulation is binding on manufacturers, importers and retailers. All products that contain digital elements and bear the CE mark must guarantee an appropriate level of cybersecurity. To summarise, this means there are specific requirements for risk assessment and guarantee, vulnerability management, documentation and reporting obligations.
An overview of the key requirements:
Risk assessment and guarantee
Manufacturers must design and develop products in such a way that an appropriate level of cybersecurity is guaranteed during the whole product lifecycle.
Vulnerability management
Manufacturers must eliminate known vulnerabilities through free security updates, unless otherwise agreed between the manufacturer and commercial user with regard to a customised product.
Documentation
Manufacturers must identify and document vulnerabilities and components in their products. Part of this documentation includes the production of a software bill of materials (SBOM) in a machine-readable format.
The way in which security gaps are handled should also be documented, for example, when a manufacturer provides security updates for its product.
Reporting obligations
Within 24 hours of becoming aware of each actively exploited vulnerability and each serious security incident, the manufacturer must report it via the ENISA reporting platform (European Union Agency for Cybersecurity), in the form of an early warning. The manufacturer has up to 72 hours to add further details. A final report must be submitted within 14 days for each actively exploited vulnerability or within one month for each serious security incident.
Do you have any tips for machine manufacturers?
For decades, Pilz has been supporting machine builders and users with the Safety of their plant and machinery – including with the new requirements for Industrial Security. Because without Security, a machine with all its Safety measures is vulnerable and unprotected. Precautionary measures are a must. We recommend that machine manufacturers address the requirements of the CRA promptly, and work with component manufacturers and operators to develop cooperation concepts. Typical questions that need to be clarified between economic actors include: In which network zone should a machine be operated? How should software updates be handled? When does component support end? For how long can users expect to receive security updates and have vulnerabilities fixed? What constitutes a “substantial modification” to a machine?
Only when questions like these are clarified can each economic operator fulfil its new organisational and technical obligations. It is also helpful to always keep up to date. Subscriptions to newsletters and RSS feeds on eur-lex.europa.eu will keep you informed about legislative changes at EU level. I also recommend the Common Security Advisory Framework (CSAF) for implementation of the CRA requirements. It is a standardised, open source framework for communication and automated distribution of machine-processable vulnerability and mitigation information, known as Security Advisories.