ADVISORI Logo
BlogCase StudiesAbout Us
info@advisori.de+49 69 913 113-01
  1. Home/
  2. Services/
  3. CRA Beratung En

Newsletter abonnieren

Bleiben Sie auf dem Laufenden mit den neuesten Trends und Entwicklungen

Durch Abonnieren stimmen Sie unseren Datenschutzbestimmungen zu.

A
ADVISORI FTC GmbH

Transformation. Innovation. Sicherheit.

Firmenadresse

Kaiserstraße 44

60329 Frankfurt am Main

Deutschland

Auf Karte ansehen

Kontakt

info@advisori.de+49 69 913 113-01

Mo-Fr: 9:00 - 18:00 Uhr

Unternehmen

Leistungen

Social Media

Folgen Sie uns und bleiben Sie auf dem neuesten Stand.

  • /
  • /

© 2024 ADVISORI FTC GmbH. Alle Rechte vorbehalten.

Your browser does not support the video tag.
Your partner for CRA compliance: From gap analysis to CE marking

CRA Consulting

The Cyber Resilience Act (CRA) has been in force since November 2024. From September 2026, the first reporting obligations apply; from 2027, full application is required. Manufacturers of products with digital elements must act now: create SBOMs, establish vulnerability management, and carry out conformity assessments. Advisori accompanies you as a specialized partner through the entire CRA compliance process – faster and more personally than the large consulting firms.

  • ✓CRA + NIS2 + DORA from a single source – no duplication of effort, maximum synergies
  • ✓Certified experts (ISO 27001) with security and regulatory expertise
  • ✓AI-assisted compliance monitoring for continuous CRA conformity
  • ✓Proven SSDLC approach for secure product development

Your strategic success starts here

Our clients trust our expertise in digital transformation, compliance, and risk management

30 Minutes • Non-binding • Immediately available

For optimal preparation of your strategy session:

  • Your strategic goals and objectives
  • Desired business outcomes and ROI
  • Steps already taken

Or contact us directly:

info@advisori.de+49 69 913 113-01

Certifications, Partners and more...

ISO 9001 CertifiedISO 27001 CertifiedISO 14001 CertifiedBeyondTrust PartnerBVMW Bundesverband MitgliedMitigant PartnerGoogle PartnerTop 100 InnovatorMicrosoft AzureAmazon Web Services

CRA Consulting

Why ADVISORI?

  • Specialized regulatory expertise: ADVISORI combines deep knowledge in information security with years of experience implementing European regulations – from NIS2 and DORA to the Cyber Resilience Act. Our consultants know the requirements from practice and translate complex regulations into actionable measures.
  • Proven certification excellence: As a company certified under ISO 27001, ISO 9001, and ISO 14001, we live the standards we implement at our clients. This accountability creates credibility and guarantees the highest quality in every consulting engagement.
  • Industry-proven methodology in the financial sector and beyond: Our experience from hundreds of projects in regulated industries – particularly in the financial sector – enables us to efficiently integrate CRA requirements into existing governance and compliance structures and strategically utilize synergies with existing frameworks.
  • Personal service with the capabilities of a mid-sized firm: With around 150 employees, we are large enough to handle complex, enterprise-wide CRA projects – and lean enough to act quickly, flexibly, and with direct access to experienced senior consultants. No handoffs to junior teams after the initial meeting.
  • Proprietary AI platform for more efficient compliance: ADVISORI operates its own multi-agent AI platform that we strategically deploy in CRA consulting – for automated SBOM analysis, vulnerability assessment, and documentation of conformity evidence. This saves time and reduces costs for our clients.
  • Comprehensive approach instead of isolated solutions: We don't view CRA in isolation but in the context of your entire security and compliance landscape. Through consistent integration with NIS2, DORA, and other relevant frameworks, we avoid duplicate work and create sustainable, flexible compliance structures.
⚠

Attention: CRA deadlines are approaching – action is needed now

Starting September 2026, the first mandatory reporting obligations of the Cyber Resilience Act take effect, and from December 2027, the regulation applies in full scope – including market surveillance and substantial fines of up to 15 million euros or 2.5% of global annual turnover. Given the complexity of the requirements – particularly in building a complete SBOM process and a compliant vulnerability management system – the remaining time is insufficient for reactive implementation. Companies that begin now with a structured gap analysis secure decisive competitive advantages and avoid costly last-minute corrections.

ADVISORI in Numbers

11+

Years of Experience

120+

Employees

520+

Projects

In five structured steps, we guide you from initial assessment to full CRA compliance – pragmatic, on schedule, and with measurable results.

Our Approach:

Scoping & Product Classification: Identification of all CRA-relevant products, classification by criticality level, and definition of the assessment procedure.

Gap Analysis & Roadmap: Systematic comparison of your current situation against CRA requirements. Result: a prioritized action plan with clear responsibilities and milestones.

Implementation & Integration: Execution of technical and organizational measures – SBOM tooling, SSDLC integration, vulnerability management processes, and reporting channels.

Testing & Validation: Security testing, penetration tests, and internal audits to verify implemented measures. Documentation of results for the conformity assessment.

Declaration of Conformity & Monitoring: Preparation of technical documentation, EU declaration of conformity, and CE marking. Establishment of continuous compliance monitoring using our AI platform.

"ADVISORI quickly provided us with a clear overview of our CRA compliance gaps and developed a pragmatic implementation plan that smoothly integrated with our existing NIS2 processes. We particularly appreciated the direct communication with experienced senior consultants who truly understand our industry – this saved us considerable time and resources. We are now significantly ahead of schedule for the 2026 CRA deadlines."
IT-Sicherheitsverantwortlicher

IT-Sicherheitsverantwortlicher

Director Information Security, Mittelständisches Finanzinstitut

Our Services

We offer you tailored solutions for your digital transformation

CRA Gap Analysis & Readiness Assessment

Where does your organization stand with regard to CRA requirements? Our gap analysis systematically assesses your products, processes, and documentation against the requirements of the Cyber Resilience Act. You receive a prioritized roadmap with concrete recommendations for action, effort estimates, and a realistic timeline – aligned with the September 2026 and 2027 deadlines.

  • Systematic assessment of all products with digital elements within CRA scope – including classification by risk classes (Standard, Important Class I and II, Critical) and derivation of respective conformity assessment procedures.
  • Detailed analysis of existing security processes, development practices, and documentation structures against Annex I and II CRA requirements – with clear prioritization of identified gaps by criticality and implementation effort.
  • Creation of an individual CRA readiness report with concrete action plan, realistic timeline, and resource estimation – as a reliable foundation for internal decision processes and budget planning.
  • Assessment of existing synergies with NIS2, DORA, ISO 27001, and other relevant frameworks to avoid duplicate work and optimally utilize existing compliance investments.
  • Executive workshop to communicate CRA requirements to leadership and decision-makers – with clear focus on business impact, liability risks, and strategic action options.

SBOM Creation & Management

The Software Bill of Materials is the cornerstone of CRA compliance. We support you in introducing automated SBOM generation into your build pipelines, establish processes for continuous maintenance and updating, and integrate vulnerability feeds for proactive risk management. This way, you always know which components are in your products – and which vulnerabilities are relevant.

  • Introduction of suitable SBOM formats (CycloneDX, SPDX) and tooling recommendations tailored to your development environment – including integration into existing CI/CD pipelines for automated, continuously updated SBOM generation.
  • Building processes for complete capture of all software components, dependencies, and third-party libraries – including open-source components – as well as maintenance and versioning of SBOMs throughout the entire product lifecycle.
  • Implementation of an SBOM management system for structured administration, distribution, and updating of SBOMs to customers, authorities, and other stakeholders according to CRA transparency requirements.
  • Training of development and product teams in handling SBOM tools and processes, as well as establishing clear responsibilities for ongoing SBOM maintenance as part of regular development operations.

Vulnerability Management & Incident Response

The CRA requires systematic vulnerability management throughout the entire product lifecycle. We design and implement processes for the detection, assessment, and remediation of vulnerabilities, establish coordinated disclosure procedures, and prepare you for the reporting obligations to ENISA that apply from September 2026. Including playbooks for security incidents.

  • Building a structured vulnerability management process according to CRA requirements – from continuous monitoring of known vulnerabilities (CVE tracking, NVD, CERT feeds) through risk assessment to coordinated remediation and documentation.
  • Development and implementation of a Coordinated Vulnerability Disclosure (CVD) process including establishment of appropriate reporting channels to meet CRA requirements for disclosure and communication of vulnerabilities to authorities and users.
  • Establishment of an incident response framework for security-relevant incidents in products with digital elements – including reporting process chains to ENISA and national authorities according to CRA timelines (24-hour early warning, 72-hour notification).
  • Introduction of a patch management process that operationalizes and documents the CRA requirement for timely provision of free security updates throughout the entire product support period.
  • Integration of vulnerability management into existing ISMS and SIEM structures, as well as connection to supply chain monitoring to early detect and address vulnerabilities in third-party components.

Secure Software Development Lifecycle (SSDLC)

Security by design is a core requirement of the CRA. Our experts integrate security measures into every phase of your development process: threat modeling in the design phase, secure coding guidelines, automated security tests in the CI/CD pipeline, and penetration testing prior to release. This allows you to demonstrably meet the CRA requirements for secure product development.

  • Analysis and evolution of your existing software development process toward a CRA-compliant Secure Software Development Lifecycle – with integration of security requirements into every phase from conception through development to deployment.
  • Introduction of threat modeling and security requirements engineering as fixed components of the requirements phase – so security risks are identified early and addressed through design decisions before costly corrections become necessary.
  • Implementation of automated security testing measures in the CI/CD pipeline – including Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), and Software Composition Analysis (SCA) to meet CRA security requirements.
  • Building secure coding guidelines and conducting practice-oriented training for development teams – tailored to your company's specific technologies and product categories as well as the concrete CRA requirements.
  • Establishment of a security review process for third-party components and open-source libraries as part of the SSDLC – including criteria for selection, assessment, and continuous monitoring of external software dependencies.

Conformity Assessment & CE Marking

The CRA conformity assessment is a prerequisite for the CE marking of your digital products. We accompany you through the entire assessment process: from the classification of your products through technical documentation to the EU declaration of conformity. For critical products, we coordinate cooperation with notified bodies and prepare the audit documentation.

  • Determination of the applicable conformity assessment procedure for your products – self-assessment, internal control, or involvement of a notified body – based on correct classification of your products according to CRA Annex III and IV.
  • Creation and structuring of complete technical documentation according to CRA requirements – including security concept, SBOM, risk analysis, test reports, and evidence of compliance with essential requirements from Annex I.
  • Support throughout the entire conformity assessment procedure up to issuance of the EU declaration of conformity and affixing of CE marking – including coordination with notified bodies for Important Class I/II and Critical products.
  • Preparation for market surveillance measures by building an audit-proof documentation structure that keeps all relevant evidence accessible and traceable for authorities at all times.

Regulatory Collaboration: CRA + NIS2 + DORA

CRA, NIS2, and DORA overlap in key areas such as supply chain security, risk management, and incident reporting. Advisori is one of the few consultants that covers all three regulations from a single source. We identify synergies, avoid duplication of effort, and create an integrated compliance framework that also takes the EU AI Act into account – efficient, future-proof, and audit-ready.

  • Integrated compliance analysis: We systematically identify all overlaps between CRA, NIS2, and DORA in risk management, supply chain security, incident reporting, and technical security measures – and develop a consolidated implementation strategy that efficiently addresses all three regulatory frameworks.
  • Development of a Unified Control Framework that links CRA requirements with existing NIS2 and DORA measures and reduces redundant documentation and evidence obligations to a minimum.
  • Harmonization of incident response and reporting processes: Since CRA, NIS2, and DORA provide for different reporting deadlines and addressees, we establish an integrated process that simultaneously meets all regulatory requirements and avoids operational confusion in emergencies.
  • Consolidated supply chain security management: We link CRA requirements for software component security with DORA provisions for ICT third-party risk and NIS2 requirements for supply chain security – for unified, efficient third-party risk management.
  • Regulatory monitoring and roadmap maintenance: We continuously support you in monitoring regulatory developments – including delegated acts on CRA, technical standards (ETSI, CEN/CENELEC), and regulatory guidance – and adapt your compliance roadmap accordingly.

Frequently Asked Questions about CRA Consulting

What is the Cyber Resilience Act (CRA) and which companies are affected?

The Cyber Resilience Act (CRA) is an EU regulation that has been in force since November

2024 and establishes, for the first time, binding cybersecurity requirements for products with digital elements. The regulation affects an extremely broad range of companies: manufacturers, importers, and distributors of virtually all products that have digital functions. This includes IoT devices such as smart home systems, industrial controls, and connected sensors, as well as standalone software products, operating systems, firmware, and hardware components with embedded software. Crucially, the CRA does not only affect large technology companies, but also mid-sized manufacturers that integrate digital elements into their products – such as machinery manufacturers with networked controls or medical technology companies with software components. The regulation distinguishes between standard products, important products (Class I and II), and critical products, with conformity assessment requirements increasing with the criticality level. For standard products, a self-assessment is sufficient, while critical products require assessment by a notified body. Exceptions apply to already-regulated sectors such as medical devices, aviation, and motor vehicles, which are subject to their own cybersecurity regulations. Companies should assess at an early stage whether and how their products fall under the CRA, as the transition periods are already running and the first reporting obligations take effect from September 2026.

What are the deadlines for CRA implementation and what happens in the event of non-compliance?

The Cyber Resilience Act provides for staggered transition periods that companies must be fully aware of. The regulation has been in force since

10 November 2024. From September

2026 – less than a year away – reporting obligations apply to manufacturers: actively exploited vulnerabilities and serious security incidents must be reported to ENISA within

24 hours, followed by detailed reports within

72 hours and a final report within one month. From 2027, all CRA requirements must be fully met. This means: products placed on the EU market from that point onwards must have completed the full conformity assessment and bear the CE marking. The penalties for non-compliance are substantial and follow the GDPR model: violations of essential cybersecurity requirements can result in fines of up to €

15 million or 2.5 percent of global annual turnover. Violations of other obligations can be sanctioned with up to €

10 million or

2 percent of turnover. In addition, market surveillance authorities can order product recalls or restrict market access. The economic consequences therefore extend well beyond fines: production downtime, reputational damage, and revenue losses due to market bans can be existentially threatening. Given the complexity of the requirements and the lead times needed for technical and organizational adjustments, we recommend beginning systematic CRA implementation at the latest now. Companies that already operate an information security management system (ISMS) in accordance with ISO 27001 have a head start.

What is a Software Bill of Materials (SBOM) and why is it so important for the CRA?

A Software Bill of Materials (SBOM) is a machine-readable inventory of all software components contained in a product – including open-source libraries, proprietary modules, frameworks, and their dependencies. The CRA makes the creation and maintenance of an SBOM mandatory for all products with digital elements. The importance of the SBOM stems from its central role in vulnerability management: only if a manufacturer has complete knowledge of which components are in its products can it identify affected products when a new vulnerability is discovered in a component. A clear example is the Log4j vulnerability of 2021: companies without an SBOM sometimes needed weeks to determine which of their products contained the vulnerable library. With an up-to-date SBOM, this analysis is possible within minutes. The SBOM must be created in a standardized format – the most common are SPDX (from the Linux Foundation) and CycloneDX (from OWASP). It should be integrated into the build process in an automated manner so that a current SBOM is generated with each release. In addition, the CRA requires that the SBOM be kept up to date throughout the entire product lifecycle – for at least the expected product lifetime or five years, whichever is shorter. The integration of a vulnerability feed (for example based on NVD or OSV) enables proactive monitoring: as soon as a new vulnerability in a used component is published, you receive an automatic notification. Advisori supports you in selecting suitable SBOM tools, integrating them into your CI/CD pipelines, and establishing sustainable processes for SBOM maintenance.

How are CRA, NIS2, and DORA related and what synergies exist?

CRA, NIS2, and DORA are three central EU regulations for cybersecurity that complement each other and overlap in important areas. The CRA regulates product security and is directed at manufacturers of digital products. NIS 2 regulates the cybersecurity of companies and organizations in critical sectors and their supply chains. DORA (Digital Operational Resilience Act) specifically addresses the financial sector and its ICT service providers. The synergies are considerable: all three regulations require systematic risk management, incident response processes, and consideration of supply chain security. A company that, for example, acts as a manufacturer of software for the financial sector may fall under all three regulations. Here it is essential not to build isolated compliance silos for each regulation, but to create an integrated framework. In concrete terms, this means: the vulnerability management that the CRA requires for products can be linked to the risk management framework of NIS2. The reporting obligations of all three regulations can be covered through a unified incident response process – even if the reporting deadlines and recipients vary. The ISMS in accordance with ISO 27001, which many companies have already established for NIS2, provides a solid foundation for the organizational CRA requirements. The EU AI Act is also increasingly relevant: products with AI components must meet both CRA and AI Act requirements. Advisori is one of the few consulting partners that covers all relevant EU regulations from a single source. Instead of engaging separate consultants for CRA, NIS2, DORA, and the AI Act, you receive from us a consistent, collaboration-optimized compliance program with clear responsibilities and without redundant measures.

What does the CRA conformity assessment involve and how does the CE marking process work?

The CRA conformity assessment is the formal proof that a product with digital elements meets all requirements of the Cyber Resilience Act. It is a prerequisite for the CE marking and thus for market access in the EU internal market. The process depends on the classification of the product. For standard products (the large majority), the manufacturer can carry out an internal assessment (Module A). In doing so, the manufacturer documents compliance with all essential requirements and issues an EU declaration of conformity. For important products of Class I (e.g., password managers, network interfaces, operating systems), a self-assessment is also possible, provided that harmonized standards or a European cybersecurity certificate are applied. Otherwise, assessment by a notified body is required. For important products of Class II (e.g., firewalls, hypervisors, CPUs) and critical products, involvement of a notified body is generally required. The technical documentation, which must be prepared for all variants, includes: a general product description, a description of design and development, a risk assessment of cybersecurity risks, information on applied harmonized standards, test results, the SBOM, and a description of the vulnerability management process. The EU declaration of conformity contains the identification of the product and the manufacturer, the declaration of conformity with the essential requirements, and the indication of the standards applied. After a successful assessment, the CE marking is affixed to the product. Advisori accompanies the entire process: from initial product classification through the preparation of technical documentation to the final declaration of conformity. Where required, we coordinate cooperation with notified bodies and prepare you optimally for their audit.

Why should we choose Advisori as our CRA consultant rather than a large consulting firm?

Choosing the right CRA consulting partner is strategically important, as implementation is complex and deadlines are tight. Large consulting firms such as KPMG, Deloitte, or PwC offer broad capacity, but have structural disadvantages when it comes to CRA implementation. With Advisori, you get a partner that combines the advantages of both worlds. First: specialized expertise rather than a generalist approach. While large consulting firms treat CRA as one of hundreds of topics, cybersecurity and regulatory compliance is our core business. Our consultants work with the relevant standards and regulations on a daily basis – not just occasionally. We have in-depth technical expertise in SSDLC, security testing, and penetration testing, which is essential for practical CRA implementation. Second: speed and personal support. With around

150 employees, we are large enough for complex projects, yet lean enough for short decision-making paths. Your points of contact are senior experts who directly manage your project – not junior consultants working from a handbook. The result: faster implementation, more pragmatic solutions, and a better price-performance ratio. Third: the unique combination of CRA, NIS2, and DORA from a single source. Most consulting firms treat each regulation as a separate project with its own teams. At Advisori, you receive an integrated team that actively exploits synergies and avoids duplication of effort. Fourth: technological innovation. Our own AI platform for compliance monitoring enables continuous monitoring of your CRA conformity – not just a snapshot. Fifth: demonstrated quality. Our certifications in accordance with ISO 27001, 9001, and

14001 demonstrate that we practice the standards we implement at our clients. We do not merely advise on information security – we practice it. Arrange a no-obligation initial consultation and see our approach for yourself.

Success Stories

Discover how we support companies in their digital transformation

Generative KI in der Fertigung

Bosch

KI-Prozessoptimierung für bessere Produktionseffizienz

Fallstudie
BOSCH KI-Prozessoptimierung für bessere Produktionseffizienz

Ergebnisse

Reduzierung der Implementierungszeit von AI-Anwendungen auf wenige Wochen
Verbesserung der Produktqualität durch frühzeitige Fehlererkennung
Steigerung der Effizienz in der Fertigung durch reduzierte Downtime

AI Automatisierung in der Produktion

Festo

Intelligente Vernetzung für zukunftsfähige Produktionssysteme

Fallstudie
FESTO AI Case Study

Ergebnisse

Verbesserung der Produktionsgeschwindigkeit und Flexibilität
Reduzierung der Herstellungskosten durch effizientere Ressourcennutzung
Erhöhung der Kundenzufriedenheit durch personalisierte Produkte

KI-gestützte Fertigungsoptimierung

Siemens

Smarte Fertigungslösungen für maximale Wertschöpfung

Fallstudie
Case study image for KI-gestützte Fertigungsoptimierung

Ergebnisse

Erhebliche Steigerung der Produktionsleistung
Reduzierung von Downtime und Produktionskosten
Verbesserung der Nachhaltigkeit durch effizientere Ressourcennutzung

Digitalisierung im Stahlhandel

Klöckner & Co

Digitalisierung im Stahlhandel

Fallstudie
Digitalisierung im Stahlhandel - Klöckner & Co

Ergebnisse

Über 2 Milliarden Euro Umsatz jährlich über digitale Kanäle
Ziel, bis 2022 60% des Umsatzes online zu erzielen
Verbesserung der Kundenzufriedenheit durch automatisierte Prozesse

Let's

Work Together!

Is your organization ready for the next step into the digital future? Contact us for a personal consultation.

Your strategic success starts here

Our clients trust our expertise in digital transformation, compliance, and risk management

Ready for the next step?

Schedule a strategic consultation with our experts now

30 Minutes • Non-binding • Immediately available

For optimal preparation of your strategy session:

Your strategic goals and challenges
Desired business outcomes and ROI expectations
Current compliance and risk situation
Stakeholders and decision-makers in the project

Prefer direct contact?

Direct hotline for decision-makers

Strategic inquiries via email

Detailed Project Inquiry

For complex inquiries or if you want to provide specific information in advance