This document is under active development and has not been finalised.
Skip to content

5.3 ENISA Reporting Process

Pursuant to Art. 14 CRA, manufacturers are required to report certain security events to ENISA or the competent national CSIRT authority. The reporting obligation applies from 11 September 2026.

LEGAL BASIS

Art. 14(1) CRA: "The manufacturer shall notify any actively exploited vulnerability contained in the product with digital elements simultaneously to the designated CSIRT and to ENISA. The manufacturer shall submit an early warning within 24 hours of becoming aware of it."

Art. 14(2) CRA: "The manufacturer shall submit within 72 hours of becoming aware a vulnerability notification containing a general description of the vulnerability, an initial assessment of the severity and impact, as well as information on corrective measures taken."

Art. 14(3) CRA: "The manufacturer shall submit within 14 days of becoming aware a final report containing a detailed description of the vulnerability, information on corrective or mitigating measures taken, and, where applicable, indicators of compromise."

CRITICAL DEADLINES

NotificationDeadlineDeadline Starts
Early warning24 hoursBecoming aware of the actively exploited vulnerability / severe incident
Vulnerability notification72 hoursBecoming aware
Final report14 daysBecoming aware

5.3.2 Reportable Events

Actively Exploited Vulnerability (Art. 14(1))

A vulnerability in a BAUER GROUP product is being actively exploited in the wild. Pursuant to Art. 3(42) CRA, active exploitation exists when reliable evidence shows that the vulnerability has been exploited by a malicious actor in a system without the permission of the owner.

Indicators of active exploitation:

  • Inclusion in the KEV catalog (CISA Known Exploited Vulnerabilities)
  • Threat intelligence feeds report exploitation activity
  • Report by customers or security researchers with evidence of exploitation
  • Own detection in logs, monitoring or incident response processes
  • Public reports (vendor advisories, blogs, forums) about attacks

Severe Security Incident (Art. 14(3))

An incident that significantly affects the security of the product or its users (Art. 3(43) CRA).

Criteria for classification as a severe incident:

CriterionDescriptionExamples
Integrity compromiseThe integrity of the product or its supply chain is compromisedManipulated source code, compromised build pipeline
Unauthorised data accessAccess to user data without authorisationData leak, API abuse, configuration error
Availability lossSecurity-relevant functions are impairedAuth bypass, update mechanism disrupted
Compromised updatesManipulated updates are deliveredSupply chain attack, signing key compromise

5.3.3 Roles and Responsibilities

RoleResponsibility in the Reporting Process
Security LeadAssess reporting obligation, submit ENISA notifications, overall coordination
DevOps LeadTechnical analysis, patch coordination, infrastructure measures
Product OwnerUser notification, impact assessment, release decision
ManagementApproval for SEV-1/SEV-2, resource allocation, escalation
DeveloperRoot cause analysis, patch development, security review

5.3.4 Reporting Platform

ENISA Single Reporting Platform (SRP)

From 11 September 2026, the ENISA Single Reporting Platform is available as the central reporting point:

PropertyDetails
URLTo be provided by ENISA (expected: https://reporting.enisa.europa.eu)
AccessRegistration as manufacturer pursuant to Art. 14(4) CRA required
FormatStructured online form + API access (planned)
LanguageEnglish (EU-wide), possibly national languages
ConfirmationAutomatic acknowledgement of receipt by the platform

National CSIRTs of EU Member States

If the ENISA SRP is temporarily unavailable, the notification shall be submitted to the competent national CSIRT. Below is the complete directory of all 27 EU Member States:

CountryCSIRTWebsiteEmail
AustriaCERT.atwww.cert.atreports@cert.at
BelgiumCERT.be (CCB)ccb.belgium.be/certcert@cert.be
BulgariaCERT Bulgariawww.govcert.bgcert@govcert.bg
CroatiaNational CERT (CERT.hr)www.cert.hrncert@cert.hr
CyprusCSIRT-CY (DMRID)csirt.cyinfo@csirt.cy
CzechiaNÚKIB / GovCERT.CZwww.nukib.czcert@nukib.cz
DenmarkCFCSwww.cfcs.dkcfcs@cfcs.dk
EstoniaCERT-EE (RIA)www.cert.eecert@cert.ee
FinlandNCSC-FI (Traficom)www.kyberturvallisuuskeskus.ficert@traficom.fi
FranceCERT-FR (ANSSI)www.cert.ssi.gouv.frcert-fr@ssi.gouv.fr
GermanyCERT-Bund (BSI)www.bsi.bund.decertbund@bsi.bund.de
GreeceNational CERT-GRwww.cert.grcert@cert.gr
HungaryNCSC Hungary (NBSZ NKI)nki.gov.hucert@nki.gov.hu
IrelandNCSC-IEwww.ncsc.gov.iecertreport@ncsc.gov.ie
ItalyCSIRT Italia (ACN)www.csirt.gov.itcsirt@pec.acn.gov.it
LatviaCERT.LVcert.lvcert@cert.lv
LithuaniaNKSCwww.nksc.ltcert@nksc.lt
LuxembourgCIRCL / GovCERT.luwww.circl.luinfo@circl.lu
MaltaCSIRTMaltawww.mca.org.mtcsirtmalta@gov.mt
NetherlandsNCSC-NLwww.ncsc.nlcert@ncsc.nl
PolandCERT Polska (NASK)cert.plcert@cert.pl
PortugalCERT.PT (CNCS)www.cncs.gov.ptcert@cert.pt
RomaniaCERT-ROwww.cert.rocert@cert.ro
SlovakiaSK-CERT (NASES)www.sk-cert.skincident@sk-cert.sk
SloveniaSI-CERTwww.cert.sicert@cert.si
SpainCCN-CERT / INCIBE-CERTwww.incibe.esincidencias@incibe-cert.es
SwedenCERT-SE (MSB)www.cert.secert@cert.se

Source: ENISA CSIRTs Network / ENISA CSIRT Inventory. As of: 2026-02. Verify current contact details before initial notification.

DUPLICATE NOTIFICATION

When using the national CSIRT as a fallback, the notification must be re-submitted without delay once the ENISA SRP is available again.

5.3.5 Reporting Process

Phase 1: Early Warning (≤ 24 hours)

Responsible: Security Lead

Actively exploited vulnerability / severe incident detected

    ├── 1. Immediate notification
    │   ├── Alert Security Lead (immediately, any time of day)
    │   └── Create incident ticket (GitHub Issue, label: incident + enisa)

    ├── 2. Initial assessment (≤ 2 hours)
    │   ├── Confirm vulnerability / incident
    │   ├── Identify affected products and versions
    │   ├── Verify active exploitation (KEV, threat intel)
    │   ├── Determine severity (CVSS)
    │   └── Confirm ENISA reporting obligation

    ├── 3. Submit ENISA early warning (≤ 24h)
    │   ├── Template: /templates/enisa-early-warning
    │   ├── Platform: ENISA SRP (primary) or CSIRT (fallback)
    │   └── Minimum content per Art. 14(1):
    │       ├── Manufacturer identification
    │       ├── Affected product / affected versions
    │       ├── Nature of the vulnerability / incident
    │       ├── Severity (CVSS score + vector)
    │       ├── Confirmation of active exploitation
    │       ├── Initial assessment of impact
    │       └── Planned immediate measures

    └── 4. Parallel measures
        ├── Activate communication plan (→ 5.4)
        ├── Inform management (for SEV-1/SEV-2)
        └── Initiate immediate measures (workaround, isolation)

Evidence: Screenshot of notification confirmation + timestamp in incident ticket

Phase 2: Vulnerability Notification (≤ 72 hours)

Responsible: Security Lead + DevOps Lead

Detailed assessment in progress / completed

    ├── 1. Deepen technical analysis
    │   ├── Complete version list of affected products
    │   ├── Assign CWE classification
    │   ├── Calculate complete CVSS v3.1 vector
    │   ├── Document attack vector and prerequisites
    │   └── Describe exploitation scenarios

    ├── 2. Document measures
    │   ├── Mitigation measures already taken
    │   ├── Status of patch development
    │   ├── Available workarounds
    │   └── Recommended user measures

    └── 3. Submit ENISA notification (≤ 72h)
        ├── Template: /templates/enisa-notification
        ├── Platform: ENISA SRP
        └── Minimum content per Art. 14(2):
            ├── Reference to early warning
            ├── Detailed vulnerability description
            ├── CVE-ID (if already assigned)
            ├── All affected product versions
            ├── CWE classification + CVSS vector
            ├── Technical details (attack vector, impact)
            ├── Status of mitigation measures taken
            ├── Available patch / workaround
            ├── Recommended user measures
            └── Estimated number of affected users / devices

Evidence: Notification confirmation + complete copy in incident ticket

Phase 3: Final Report (≤ 14 days)

Responsible: Security Lead

Remediation completed or well advanced

    ├── 1. Prepare final documentation
    │   ├── Complete root cause analysis
    │   ├── Create complete incident timeline
    │   ├── List all measures taken
    │   ├── Identify patches / updates provided
    │   ├── Assess residual risks
    │   └── Formulate lessons learned

    └── 2. Submit ENISA final report (≤ 14 days)
        ├── Template: /templates/enisa-final-report
        ├── Platform: ENISA SRP
        └── Minimum content per Art. 14(3):
            ├── Reference to early warning and notification
            ├── Detailed vulnerability description
            ├── Root cause analysis
            ├── Complete event timeline
            ├── All corrective measures taken
            ├── Patches / updates provided (with version numbers)
            ├── Residual risks and their mitigation
            ├── Indicators of compromise (IoC), if available
            ├── Lessons learned
            └── Measures to prevent future incidents

Evidence: Notification confirmation + complete copy in incident ticket + archiving

5.3.6 User Notification (Art. 14(8))

In parallel to the ENISA notification, affected users must be informed without delay about the vulnerability and available corrective measures.

AspectDetails
TriggerAny actively exploited vulnerability or severe incident
DeadlineWithout delay (Art. 14(8))
Primary channelGitHub Security Advisory
Secondary channelEmail to known customers (for SEV-1/SEV-2)
ContentVulnerability description, impact, recommended measures, available patch
TemplateVulnerability Report
ResponsibleSecurity Lead + Product Owner

COORDINATION WITH ENISA

The user notification must not contain details that could facilitate exploitation of the vulnerability as long as no patch is available. A delayed disclosure may be agreed in coordination with ENISA (Art. 14(7)).

5.3.7 Documentation and Record-Keeping

Each ENISA notification is fully documented. This documentation serves as evidence of compliance vis-a-vis market surveillance authorities (Art. 52 CRA).

Mandatory Documentation per Notification

Documentation ComponentStorage LocationRetention Period
Complete copy of each ENISA notificationIncident ticket (GitHub Issue)10 years
Timestamps of all notifications and actionsIncident ticket + Git log10 years
Acknowledgement of receipt by ENISA / CSIRTIncident ticket (attachment)10 years
Communication log (internal + external)Incident ticket10 years
User notifications (advisory + email)GitHub Advisory + email archive10 years
Post-mortem / lessons learnedIncident ticket10 years

Reference Numbering Scheme

All notifications use a uniform reference numbering scheme:

Notification TypeFormatExample
Early warningEW-YYYY-NNNEW-2026-001
Vulnerability notificationVN-YYYY-NNNVN-2026-001
Final reportFR-YYYY-NNNFR-2026-001
Internal incidentINC-YYYY-NNNINC-2026-001

5.3.8 Preparatory Measures (before 11.09.2026)

The following measures must be completed before the reporting obligation enters into force:

No.MeasureResponsibleDeadlineStatus
1Complete ENISA SRP registrationSecurity LeadAs soon as availablePending
2Verify national CSIRT contact detailsSecurity LeadQ2 2026Pending
3Prepare and internally test reporting templatesSecurity LeadQ2 2026Done
4Train incident response team on reporting processSecurity LeadQ2 2026Pending
5Conduct test notification via ENISA SRPSecurity LeadQ3 2026Pending
6Update escalation paths and contact listsSecurity LeadQ2 2026Pending
7Securely store ENISA access credentialsSecurity LeadQ3 2026Pending
8Test reporting process in tabletop exerciseSecurity LeadQ3 2026Pending

5.3.9 Decision Tree: Reporting Obligation

Security event detected

    ├── Is a vulnerability in our product affected?
    │   ├── No → No CRA reporting obligation (check NIS2 if applicable)
    │   └── Yes ↓

    ├── Is the vulnerability being actively exploited?
    │   ├── Yes → REPORTABLE (Art. 14(1))
    │   │         → 24h early warning + 72h notification + 14d final report
    │   └── No ↓

    ├── Is it a severe security incident?
    │   ├── Yes → REPORTABLE (Art. 14(3))
    │   │         → 24h early warning + 72h notification + 14d final report
    │   └── No ↓

    └── Standard vulnerability handling
        → Vulnerability management (→ Chapter 3)
        → Patch management per SLA
        → No ENISA reporting obligation

Documentation licensed under CC BY-NC 4.0 · Code licensed under MIT