EU CRA Enforcement: 11 Dec 2027 DORA: In Force NIS2: Transposed
info@trustvectorhq.com LinkedIn Dublin, Ireland
EU Cyber Resilience Act Advisory

Your Compliance Gap
Is Already Costing You.

TrustVector HQ helps companies selling connected products in the EU understand, measure and close their CRA compliance gap — before the regulator does it for them. Automated scanning. Trust scoring. Audit-ready documentation.

Time Until CRA Full Enforcement
--Days
--Hours
--Min
--Sec
Full enforcement: 11 December 2027
Vulnerability reporting to ENISA: 11 Sep 2026
Products on EU market after deadline must comply.
€15M
Maximum Fine
2.5%
Global Turnover at Risk
24 hrs
Early Warning to ENISA
72 hrs
Full Incident Report
230+
Controls Automated
Why TrustVector HQ

The EU Is Changing the Rules.
Most Companies Aren't Ready.

The EU Cyber Resilience Act introduces mandatory cybersecurity obligations for any company placing connected hardware or software on the European market. Non-compliance carries criminal liability and market withdrawal.

The Problem
You Don't Know What You Don't Know

Most engineering teams have no visibility into the full dependency tree of their product, have never generated an SBOM, and have no formal vulnerability disclosure process. Each of these is now a legal requirement.

Open Source Exposure
The average product contains 147 open source dependencies. CRA requires you to track CVEs in every one.
Missing SBOM & CBOM
A Software Bill of Materials and Cryptography Bill of Materials are now mandatory for all products in scope.
No Disclosure Policy
You must publish a vulnerability disclosure policy and a contact point before products ship.
Audit Evidence Gaps
Regulators will ask for documented evidence. Spreadsheets and tribal knowledge are not sufficient.
Non-Compliance Penalty — EU CRA Art. 64
€15,000,000
— or —
2.5% of Global Annual Turnover
Whichever is higher. Applies to any organisation placing products with digital elements on the EU market, regardless of where they are headquartered. Market withdrawal and product recall are also available to authorities.
⚠ Early Obligation: September 2026

Vulnerability reporting to ENISA becomes mandatory from 11 September 2026 — 15 months before full enforcement. Companies must have incident response and notification processes operational by then.

How We Help

From Uncertainty to Audit-Ready. In Weeks, Not Months.

01
Scan & Score

Automated codebase scanning mapped to all CRA controls. Every gap gets a trust score and a severity rating.

02
SBOM & CBOM Generation

Machine-readable, audit-ready Software and Cryptography Bills of Materials in CycloneDX or SPDX format.

03
KEV Intelligence

Real-time mapping against the CISA Known Exploited Vulnerability catalogue. No blind spots.

04
Remediation Backlog

Prioritised fix list integrating with Jira, GitHub Issues, or Azure DevOps.

05
ENISA Notification

Templates, workflows and filing support so your 24-hour and 72-hour obligations are never missed.

06
Audit Documentation

Conformity declarations, technical files, risk registers — everything the regulator expects, pre-structured.

Regulation (EU) 2024/2847

The EU Cyber Resilience Act:
What Every Executive Must Know

The CRA entered into force on 10 December 2024. It is the most significant cybersecurity legislation the EU has ever passed, affecting any company whose products connect to the internet, a network, or another device.

Official Source

Full text at the Official Journal of the EU: OJ L 2024/2847. ENISA guidance at enisa.europa.eu.

Who Does It Apply To?

Products with Digital Elements (PDEs)
Any hardware or software that connects directly or indirectly to a network or another device — IoT devices, operating systems, applications, cloud-connected products and industrial equipment.
Manufacturers, Importers & Distributors
Primary obligation falls on the manufacturer. Importers and distributors carry secondary obligations around product documentation and conformity verification.
Non-EU Companies
If you place a product on the EU market — regardless of where your company is incorporated — you are in scope. A US, Indian or Irish company selling into Germany faces identical obligations.
Exemptions
Open source software without commercial intent, products covered by existing sector-specific legislation (medical devices, aviation, automotive) and certain defence applications may be exempt or subject to alternative frameworks.

Product Classification

ClassExamplesConformity Route
DefaultSmart home devices, productivity software, consumer appsSelf-Assessment
Class IIdentity management, browsers, password managers, VPNs, firewalls, routers3rd Party Audit or Standard
Class IIOperating systems, hypervisors, industrial control systems, smartcardsMandatory 3rd Party Audit
CriticalHSMs, smart meter gateways, tamper-resistant hardwareEU Cybersecurity Certificate

Key Milestones

10 December 2024
CRA Enters Into Force
Published in the Official Journal. The 36-month implementation clock begins for most provisions.
Now — Act Immediately
Gap Assessment Window
Companies should be conducting gap analysis, appointing responsible teams and building compliance programmes.
11 September 2026
Vulnerability Reporting Begins
Mandatory 24-hour early warning and 72-hour full notification to ENISA for actively exploited vulnerabilities.
11 December 2027
Full Enforcement
All products placed on the EU market must bear CE marking demonstrating CRA conformity.
Graduated Penalties — Art. 64
Most serious violations€15M / 2.5%
Other non-compliance€10M / 2%
Incorrect or misleading info€5M / 1%
Annex I & Annex II

CRA Controls Explained

The CRA's requirements are structured across Annex I (essential cybersecurity requirements for the product) and Annex II (vulnerability handling obligations). Plain-language interpretation of each major control area.

Where to Find the Official Controls

Annex I and Annex II of Regulation (EU) 2024/2847 at eur-lex.europa.eu. ENISA supporting guidance at enisa.europa.eu/topics/cyber-resilience-act.

Annex I — Part I: Essential Security Requirements

RefControlWhat It MeansWhat You Must DoPriority
A-I.1
No Known Exploitable Vulnerabilities
Products must ship free of known exploitable vulnerabilities. Requires pre-market vulnerability assessment against CVE databases and the CISA KEV catalogue.
SBOM generation, CVE scanning, KEV cross-reference before every releaseCritical
A-I.2
Secure by Default Configuration
Default settings must be the most secure option. No default passwords, no unnecessary open ports, no pre-enabled features the user did not request.
Configuration baseline review, automated hardening checks in CI/CDCritical
A-I.3
Confidentiality of Data
Data at rest and in transit must be protected using appropriate encryption. State-of-the-art cryptographic mechanisms expected — captured in the CBOM.
CBOM generation, encryption algorithm inventory, TLS version auditCritical
A-I.4
Integrity of Data & Software
Mechanisms must verify that software and data have not been tampered with. Code signing, secure boot and update verification are typical implementations.
Code signing pipeline, secure boot verification, update integrity checksHigh
A-I.5
Access Control & Least Privilege
Products must enforce appropriate access controls. Users and components should operate with minimum privileges necessary. Authentication mechanisms must be robust.
IAM review, privilege mapping, authentication strength auditHigh
A-I.6
Attack Surface Minimisation
Products must expose only what is necessary. Unused services, interfaces and ports must be disabled. Every exposed interface must be justified.
Port/service inventory, interface review, network exposure mappingHigh
A-I.7
Resilience Against Denial of Service
Products must remain available under expected attack scenarios including DoS/DDoS. Rate limiting, resource quotas and graceful degradation must be implemented.
Load testing, rate limiting review, availability architecture assessmentMedium
A-I.8
Data Minimisation
Products must collect only the personal data they genuinely need. Intersects significantly with GDPR Article 5. Data flows must be documented and justified.
Data flow mapping, privacy impact assessment, telemetry auditMedium
A-I.9
Secure Update Mechanism
Products must support secure, authenticated software updates for their expected support lifetime. Updates must be free of charge. End of support date must be clearly communicated.
Update pipeline security review, EOL policy documentation, signed update deliveryCritical
A-I.10
Auditability & Security Logging
Security-relevant events must be logged to support incident investigation. Logs must be tamper-protected. Retention periods must be defined and enforced.
Log architecture review, tamper-evidence controls, SIEM integration checkHigh

Annex I — Part II & Annex II: Vulnerability Handling

RefObligationWhat It RequiresTrustVector HQ Support
A-II.1
SBOM Maintenance
Maintain and continuously update a machine-readable Software Bill of Materials covering all components including third-party and open source dependencies, in CycloneDX or SPDX format.
Automated SBOM generation on every build
A-II.2
Vulnerability Disclosure Policy
A publicly accessible coordinated vulnerability disclosure policy must be in place, with a designated contact point for security researchers. Must link from product documentation.
VDP template, contact form setup, security.txt implementation
A-II.3
Remediation Without Delay
Vulnerabilities must be addressed "without undue delay." ENISA guidance and industry norms (30/60/90 days by severity) apply as reference points.
Prioritised remediation backlog, SLA tracking dashboard
A-II.4
ENISA Notification
Actively exploited vulnerabilities and significant incidents must be reported: early warning within 24 hours, full notification within 72 hours, final report within 14 days.
Notification templates, ENISA portal workflow, incident tracking
A-II.5
Security Patches Distribution
Security patches must be distributed promptly and made available free of charge. Patch release processes must be documented. Users must be notified of available patches.
Patch release process documentation, user notification workflow
Article 14 — CRA Notification Obligations

How to Notify ENISA:
A Step-by-Step Guide

From 11 September 2026, manufacturers must notify ENISA of actively exploited vulnerabilities and incidents with significant impact. Missing these windows is itself a CRA violation.

Trigger Conditions

Notification is triggered by: (1) an actively exploited vulnerability being used by attackers in the wild, or (2) a security incident that has or could have a significant impact on your product's users.

The Three-Stage Notification

1
Early Warning — Within 24 Hours
Notify ENISA that a vulnerability is actively exploited or an incident has occurred. Must include: product identification, nature of the vulnerability or incident, and initial impact assessment. Full details not yet required.
→ Via ENISA's Single Reporting Platform
2
Full Notification — Within 72 Hours
Complete report including: full technical description, severity rating (CVSS), affected versions and configurations, estimated number of affected users, mitigation measures taken or planned, and interim fix status.
→ Update the 24-hour report on the ENISA portal
3
Final Report — Within 14 Days
Closure report including: root cause analysis, full remediation details, patch availability and distribution method, user notification approach, and any regulatory coordination. For complex incidents, interim at 14 days with final at 30 days is acceptable.
→ Close the incident on the ENISA portal
4
User Notification — Without Undue Delay
Affected users must be notified directly. Where a patch is available, communicate it. Where not yet available, issue a workaround or risk mitigation guidance in clear, plain language.
→ Via product update channel and security advisory page

Where to Report

ENISA Single Reporting Platform

ENISA is establishing a Single Reporting Platform for CRA notifications. Until operational, the NIS2 reporting channels and national CSIRTs serve as interim route.

→ enisa.europa.eu
National CSIRT — Ireland

For Ireland-based companies, the national CSIRT is operated by the National Cyber Security Centre (NCSC Ireland). They are the primary national contact point and coordinate with ENISA.

→ ncsc.gov.ie  |  incidents@ncsc.gov.ie
Internal Preparation Checklist
A vulnerability is actively exploited when there is credible evidence of real attacks — typically when it appears on the CISA KEV catalogue, is referenced in threat intelligence feeds, or your monitoring detects exploitation attempts. Self-reported exploitation by researchers alone does not qualify.
Under CRA Article 14, manufacturers report to ENISA directly via the Single Reporting Platform. ENISA then shares relevant information with national CSIRTs. Simultaneously notifying your national CSIRT (NCSC Ireland for Irish companies) is considered good practice.
Missing the 24-hour early warning is a reportable non-compliance. However, context matters — authorities will consider whether you had reasonable detection means and whether delays were due to technical complexity. Document your reasons and report as soon as possible.
What We Offer

Services Designed for
Where You Are Right Now

Whether you are just starting to understand your CRA obligations or preparing for a formal audit, TrustVector HQ has a structured service for that stage. We work as an extension of your team — not a report that sits on a shelf.

01 — Assessment
CRA Gap Analysis

A structured assessment of your current posture against all CRA Annex I and Annex II requirements. Delivered as a prioritised findings report with executive summary and technical detail pack.

  • Control-by-control gap mapping
  • Risk-ranked findings with evidence
  • Remediation roadmap with effort estimates
  • Board-ready executive summary
02 — Tooling
Automated Scanning Platform

Our scanner runs across your codebase and dependency graph, mapping findings to CRA controls in real time. Integrates with your existing CI/CD pipeline so compliance is continuous, not periodic.

  • SBOM & CBOM generation (CycloneDX / SPDX)
  • CVE and CISA KEV cross-reference
  • Trust score per control, per product
  • Jira / GitHub / Azure DevOps integration
03 — Documentation
Audit Preparation

We build and maintain the documentation set that regulators expect: technical files, risk registers, conformity declarations, vulnerability disclosure policies and security advisories.

  • EU Declaration of Conformity
  • Technical file assembly
  • Risk register maintenance
  • VDP and security.txt implementation
04 — Incident
ENISA Notification Support

When an incident occurs, the clock starts immediately. We provide templates, workflows and hands-on support to meet your 24-hour and 72-hour ENISA obligations.

  • Incident detection and triage support
  • 24-hour early warning filing
  • 72-hour full notification drafting
  • User advisory preparation
05 — Training
Executive & Engineering Briefings

CRA compliance requires alignment from the board to the engineering team. We run structured briefings tailored to each audience — board risk briefings, developer workshops and CISO strategy sessions.

  • Board-level risk briefing (2 hours)
  • Engineering team workshop (half-day)
  • CISO CRA strategy session
  • Ongoing regulatory update briefings
06 — Retainer
Continuous Compliance Programme

Compliance is not a project — it is an ongoing obligation. Our retainer keeps your posture current as your codebase evolves, new vulnerabilities emerge and the regulatory landscape develops.

  • Monthly scan and trust score update
  • Regulatory change monitoring
  • Quarterly compliance review
  • Priority incident response support
Multi-Framework Coverage

One Scan. Multiple Frameworks.

Our platform maps findings across multiple frameworks simultaneously. A single scan produces findings relevant to CRA, NIS2, ISO 27001 and DORA in one pass — so your compliance investment is never siloed.

EU CRA 2024/2847 NIS2 Directive DORA ISO/IEC 27001:2022 SOC 2 Type II NIST CSF 2.0 IEC 62443 ENISA Guidelines
Get in Touch

Start with a Free Gap Analysis

Tell us about your product and your current compliance position. We will respond within one business day with an initial assessment and proposed engagement approach — at no cost and with no obligation.

We respond within one business day. Your information will not be shared with third parties.

Headquarters
TrustVector HQ
Dublin, Ireland
Serving clients across the EU and internationally
General Enquiries
Response Times
Within 1 business day for enquiries
Within 4 hours for active incident support
What Happens Next
  1. 01We review your submission and any available public information about your products.
  2. 02We schedule a 30-minute discovery call to understand your situation in depth.
  3. 03We deliver a preliminary CRA applicability and gap assessment — free of charge.
  4. 04You decide whether to proceed. No pressure, no obligation.