The European Union (EU) continues to solidify its cybersecurity landscape through ambitious, horizontal regulations. In addition to the NIS 2 Directive and the Digital Operational Resilience Act (DORA), the Cyber Resilience Act (CRA) establishes a comprehensive framework aimed at securing products with digital elements (PDEs) placed on the internal market.
The CRA, which entered into force on December 10, 2024, addresses two major concerns: the historically low level of cybersecurity in digital products and the lack of accessible information for users to make secure choices. Its primary objective is to ensure that hardware and software products are developed with fewer vulnerabilities and that manufacturers uphold security throughout the product’s lifecycle.
At Sekoia, a leading European cybersecurity technology provider, we recognize the CRA as a fundamental shift toward accountability and resilience, complementing the existing requirements faced by critical entities under NIS 2 and DORA. This blog post serves as a preliminary implementation guide, designed to provide clarity on the CRA’s practical application. We begin by enumerating the known requirements, follow this with an internal assessment by checking these requirements against our current operational processes, and conclude by detailing which aspects of our solution can assist our customers in meeting specific CRA obligations.
At the end of the blogpost, enjoy also a short CRA quiz to test your knowledge!
The CRA directly impacts manufacturers, importers, and distributors of products with digital elements (PDEs). It establishes essential cybersecurity requirements that must be met before a product is placed on the market, and maintained throughout its predetermined support period.

Key obligations for manufacturers include:
Manufacturers must design, develop, and produce PDEs to ensure an appropriate level of cybersecurity based on identified risks. This mandatory cybersecurity risk assessment must be documented and continuously updated throughout the support period. Products must, where applicable, be made available without known exploitable vulnerabilities and include a secure by default configuration.
A robust vulnerability handling process is mandatory. This includes identifying and documenting vulnerabilities and components, notably by producing a Software Bill of Materials (SBOM) in a machine-readable format. Manufacturers must address and remediate vulnerabilities without delay and provide security updates, generally free of charge, for the entire support period.
Manufacturers must determine a support period reflecting the product’s expected use time. This period must be at least five years, unless the product’s expected lifetime is shorter. Security updates must be available throughout this period.
A crucial provision, applicable starting September 11, 2026, mandates manufacturers to simultaneously notify actively exploited vulnerabilities (VAEs) and severe incidents impacting the product’s security:
Notifications must be submitted via national CSIRT and the Single Reporting Platform (SRP) administered by ENISA- currently under development. For certain cases involving for instance national security and defense, delayed notifications are provided under specific conditions.
All products must undergo a conformity assessment and affix the CE marking before being placed on the EU market. Depending on the product’s criticality, this assessment may require third-party verification by a Notified Body or certification.

As a European-based cybersecurity company providing an AI SOC platform, Sekoia is directly concerned by the CRA. According to first analysis and pending further legal analysis, our offering falls under the definition of a PDE.
Based on the categorization criteria set out in Annex III of the CRA, Security Information and Event Management (SIEM) systems are specifically listed as Important Products, Class I. As our AI SOC platform is the fusion of SIEM, XDR, SOAR and CTI, this classification subjects Sekoia to stricter requirements regarding conformity assessment compared to general products, unless compliance is demonstrated through certification.
Among other products in the Important / Class I category are browsers, VPN, anti-malicious software, IAM, but also routers and operating systems… Important products Class II includes firewalls, IDPS and tamper-resistant microcontrollers, while Critical products are Hardware Devices with security boxes, smart meter gateways and smartcards (see Implementing regulation, Dec 2025).
Our first internal assessment indicates that Sekoia already adheres to many of the new obligations introduced by the CRA, due to previous regulatory and compliance works (ISO72001, SOC2, PCI, NIS2, etc). Our existing governance and platform controls, underpinned by strict standards, ensure robustness:
trust.sekoia.io) means we already publish comprehensive documentation and maintain an effective vulnerability management program, aligning with the CRA’s requirements for technical documentation and coordinated vulnerability disclosure (CVD) policies.Note that as of December 2025, we are still waiting for the implementation details for some of the requirements
Sekoia’s unified cybersecurity platform is designed to provide the necessary tools and processes for manufacturers to meet and maintain the stringent obligations of the CRA, particularly in incident response and vulnerability handling.
The requirement for an early warning notification within 24 hours is perhaps the most immediate operational challenge for manufacturers. To meet this, speed and accuracy in detection are paramount.
The CRA mandates continuous risk assessment, particularly concerning components sourced from third parties and known vulnerabilities.
The CRA’s Part II Annex I mandates effective and timely vulnerability management, including regular security tests and sharing information about vulnerabilities.
The Cyber Resilience Act reinforces the principle that cybersecurity is a collective responsibility, starting at the product level. By imposing clear security-by-design and vulnerability handling requirements, the CRA elevates trust in the digital products that underpin the EU economy.
For manufacturers navigating the CRA, particularly those developing complex systems like SIEM/SOC platforms classified as Important Products, Sekoia.io is committed to leading by example in compliance while providing powerful tools that integrate into your security development lifecycle.
Our next-generation AI SOC Platform and CTI capabilities offer immediate, tangible benefits in meeting the CRA’s stringent operational demands—from achieving ultra-fast detection metrics essential for the 24-hour reporting mandate, to informing the robust risk assessments required throughout the minimum five-year product lifecycle.
Partner with Sekoia to ensure not just compliance, but genuine cyber resilience, reinforcing the security of your digital supply chain.

Ready to assess your understanding of the new EU regulations for digital product security? Answer these five questions based on the key mandates of the CRA.
Correct Answer: A. Of course, B refers to DORA and C to the NIS 2 Directive.
Correct answer: C. Important Class II products, due to their cybersecurity-related function, carry a significant risk of adverse effects in terms of disruption or damage. Important Products, Class I include devices such as Security Information and Event Management (SIEM) systems but also VPN or browsers.
Correct answer: C. The manufacturer must submit an early warning notification (alerte précoce) of an actively exploited vulnerability (VAE) or severe incident without undue delay, and in any event within 24 hours of becoming aware of it. This initial alert must be followed by an incident notification within 72 hours.
Correct answer: B. The manufacturer must determine the support period to reflect the time the product is expected to be in use. The support period shall be at least five years, unless the product is expected to be in use for less than five years, in which case the support period must correspond to that expected use time. Manufacturers must handle vulnerabilities effectively and in accordance with the essential requirements throughout this support period.
Correct answer: C. Manufacturers must identify and document vulnerabilities and components contained in products, including by drawing up a Software Bill of Materials (SBOM) in a commonly used and machine-readable format. (While B and D are also required, the SBOM is the document explicitly focused on detailing software components for supply chain transparency.)
Congratulations for completing the quiz! Would you like to discuss on the CRA, and better understand how Sekoia can support your compliance journey? Contact our experts today by clicking here.
Disclaimer: This article provides general insights into the Cyber Resilience Act (CRA) and how Sekoia’s services align with its objectives. Compliance requirements should always be verified against the official text of Regulation (EU) 2024/2847 and guidance from relevant national authorities.