For most of the past two decades, a connected product entering the EU market needed to satisfy two fundamental regulatory questions: does it shock or burn, and does it interfere with other devices? The Cyber Resilience Act changes that frame permanently. Regulation (EU) 2024/2847, which entered into force in December 2024, adds a third mandatory dimension, cybersecurity, to every product with digital elements sold in the EU. This includes hardware with embedded software, IoT devices, industrial sensors, consumer electronics, and networking equipment. If a product can connect to a network or to another device, the CRA almost certainly applies to it.
The obligations are staggered across three dates. Vulnerability reporting and incident notification requirements apply from 11 September 2026, less than five months from now. The full body of technical requirements, conformity assessment obligations, and market surveillance provisions applies from 11 December 2027. Manufacturers who treat December 2027 as their start date are already behind: the technical documentation, quality management processes, and software bill of materials that the CRA requires take months to build correctly, and the September 2026 vulnerability reporting obligation demands infrastructure that cannot be assembled in weeks.
This handbook maps the CRA’s obligations in the order engineers and compliance managers need to encounter them, starting with what the regulation actually requires products to do, moving through the technical implementation, and ending with the reporting and documentation obligations that begin before full application.
