The EU Cyber Resilience Act (Regulation (EU) 2024/2847) imposes binding cybersecurity standards on all manufacturers, importers, and distributors of products with digital elements. From September 2026, reporting obligations apply for actively exploited vulnerabilities (24-hour deadline to ENISA); from December 2027, all products must be fully CRA-compliant — otherwise fines of up to €15 million or 2.5% of global annual turnover and loss of EU market access are at risk. ADVISORI ensures you are compliant in time.
Our clients trust our expertise in digital transformation, compliance, and risk management
30 Minutes • Non-binding • Immediately available
Or contact us directly:










Contact our specialists today for a personalized assessment of your requirements.
Years of Experience
Employees
Projects
We guide you in a structured manner from the current-state analysis to demonstrable conformity — tailored to your product landscape and maturity level.
Scoping & Product Classification: Identification of all products with digital elements in your portfolio and classification into CRA categories (Standard, Important Class I/II, Critical). Identification of the applicable conformity assessment procedures — self-assessment, assessment against harmonised standards, or third-party assessment by a notified body.
Gap Analysis & Maturity Assessment: Systematic comparison of your existing processes (development, vulnerability management, documentation, incident response) against the requirements of CRA Annexes I and II. Result: prioritised gap list with effort estimates and quick wins.
Compliance Roadmap: Development of a binding implementation plan with milestones for September 2026 (reporting obligations) and December 2027 (full conformity). Definition of work packages, responsibilities, and budget framework — aligned with your product development cycle.
Implementation: Execution of identified measures — SBOM toolchain in the CI/CD pipeline, Secure Development Lifecycle, Vulnerability Disclosure Policy, reporting processes to ENISA/CSIRT, secure default configurations. Parallel creation of technical documentation in accordance with Annex VII.
Internal Auditing & Conformity Assessment: Conducting an internal pre-audit against all CRA requirements, remediation of identified findings, and support throughout the formal conformity assessment — as a self-assessment for standard products, and in collaboration with notified bodies for Class II and critical products.
Ongoing Operations & Monitoring: Establishment of continuous vulnerability management throughout the entire support period (standard: 5 years), regular SBOM updates, monitoring of new harmonised standards and CRA implementing acts, training of new staff. This ensures your CRA compliance remains secured even after initial conformity.
"ADVISORI provided exceptional expertise and guidance throughout our project. Their deep understanding of regulatory requirements and practical approach helped us achieve our compliance goals efficiently."

Head of Information Security, Cyber Security
Expertise & Experience:
10+ years of experience, CISA, CISM, Lead Auditor, DORA, NIS2, BCM, Cyber and Information Security
We offer you tailored solutions for your digital transformation
Systematic assessment of your product portfolio against all requirements of CRA Annexes I and II. We classify each product into the correct category (Standard, Important Class I/II, Critical), identify the applicable conformity assessment procedures, and deliver a prioritised measures roadmap with concrete work packages, responsibilities, and a timeline through to December 2027. Deliverable: gap report with product classification matrix and compliance roadmap.
Development of a comprehensive Software Bill of Materials (SBOM) in machine-readable formats such as CycloneDX or SPDX. We integrate SBOM generation into your CI/CD pipeline, establish automated vulnerability matching against CVE databases, and implement the vulnerability handling process required by the CRA throughout the entire support period (typically 5 years). This means that in the next Log4Shell-type situation, you can identify which products are affected within minutes. Deliverable: SBOM toolchain, vulnerability management process, policy for free security updates.
Integration of cybersecurity from the concept phase of your product development — not as a retrospective add-on. We establish threat modelling (STRIDE/PASTA), define security requirements for your architecture, implement secure default configurations (no weak default passwords, automatic security updates, minimal attack surface), and embed security gates into your development process. Deliverable: Secure Development Lifecycle (SDL) framework, threat modelling documentation, security requirements catalogue.
From 11 September 2026, manufacturers must report actively exploited vulnerabilities to the competent CSIRT authority and ENISA within 24 hours — with a follow-up report within 72 hours and a final report within 14 days. We build your reporting process, define escalation paths, create report templates for the ENISA platform, and train your team through tabletop exercises. This ensures you are operationally ready by the deadline. Deliverable: incident response playbook, report templates, escalation matrix, training delivery.
Preparation and support throughout the entire conformity assessment procedure — from self-assessment for standard products, to assessment against harmonised standards (EN 303 645, IEC 62443) for Class I products, through to collaboration with notified bodies for Class II and critical products. We prepare the technical documentation, the EU declaration of conformity, and support the CE marking process. Deliverable: technical documentation in accordance with Annex VII, EU declaration of conformity, CE marking approval.
Tailored workshops for management, product management, development, and procurement. Content: CRA requirements in detail, product classification based on your specific product range, obligations by role (manufacturer, importer, distributor), penalty risks (up to €15 million / 2.5% of turnover), distinction from NIS2 and the EU AI Act, and concrete next steps. For SMEs, we offer compact formats that address the relief measures provided for small companies under the CRA. Deliverable: workshop delivery, management summary, individual action plan.
Looking for a complete overview of all our services?
View Complete Service OverviewOur expertise in managing regulatory compliance and transformation, including DORA.
Stärken Sie Ihre digitale operationelle Widerstandsfähigkeit gemäß DORA.
Wir steuern Ihre regulatorischen Transformationsprojekte erfolgreich – von der Konzeption bis zur nachhaltigen Implementierung.
The CRA covers all products with digital elements placed on the EU market — hardware with network functions (smartphones, laptops, IoT sensors, smartwatches, connected toys, smart home devices, firewalls, smart meter gateways) and pure software products (operating systems, accounting software, mobile apps, computer games). The decisive factor is a direct or indirect network connection. Excluded are products already regulated elsewhere, such as medical devices (Medical Device Regulation), type-approved vehicles (UN ECE R155), defence products, and non-commercial open-source software. The CRA is product-based, not sector-based — traditional industrial companies or automotive suppliers may also be affected if they manufacture connected products or software components.
The CRA distinguishes four categories: Standard products (the large majority) require a self-assessment by the manufacturer. Important products Class I (e.g. password managers, VPN software, network management systems, browsers, SIEM systems) can be assessed via self-assessment against harmonised standards or through third-party review. Important products Class II (e.g. firewalls, IDS/IPS, hypervisors, operating systems, industrial control systems) mandatorily require assessment by a notified conformity assessment body. Critical products (e.g. smart meter gateways, hardware security modules, smart cards) require EU certification. The classification directly determines the effort and cost of the conformity assessment.
The CRA entered into force on
10 December
2024 (
20 days after publication in the EU Official Journal on
20 November 2024). Implementation is phased: From
11 June 2026, conformity assessment bodies must be notified. From
11 September 2026, reporting obligations apply — manufacturers must report actively exploited vulnerabilities and significant security incidents to ENISA within
24 hours. From
11 December 2027, all products newly placed on the market must fully comply with all CRA requirements — including conformity assessment, technical documentation, SBOM, and CE marking. Products already on the market before this date are grandfathered — but only at the level of individual product units, not entire product lines.
Discover how we support companies in their digital transformation
Bosch
KI-Prozessoptimierung für bessere Produktionseffizienz

Festo
Intelligente Vernetzung für zukunftsfähige Produktionssysteme

Siemens
Smarte Fertigungslösungen für maximale Wertschöpfung

Klöckner & Co
Digitalisierung im Stahlhandel

Is your organization ready for the next step into the digital future? Contact us for a personal consultation.
Our clients trust our expertise in digital transformation, compliance, and risk management
Schedule a strategic consultation with our experts now
30 Minutes • Non-binding • Immediately available
Direct hotline for decision-makers
Strategic inquiries via email
For complex inquiries or if you want to provide specific information in advance