This document is under active development and has not been finalised.
Skip to content

Chapter 1: CRA Overview

Document Control

FieldValue
Document TitleCRA Compliance Handbook
Document IdentifierBG-CRA-HB-001
Version1.0
ClassificationPublic
ScopeAll products with digital elements of BAUER GROUP
PublisherBAUER GROUP – Information Security
Created2026-02-08
ApprovalInformation Security Officer (ISO)
Next Revision2027-02-08

Note: This is the public version of this document. Personal data (names, contact details) are not included in this edition and are only available in the internal version.

Change History

VersionDateAuthorChange
1.02026-02-08BAUER GROUPInitial version

Binding Nature

This handbook is binding for all employees of BAUER GROUP who are involved in the development, operation, distribution, or support of products with digital elements. Deviations from the processes described herein require written approval from the Security Lead and Management.


1.1 Regulation (EU) 2024/2847 – Cyber Resilience Act

The Cyber Resilience Act (CRA) is the EU regulation on horizontal cybersecurity requirements for products with digital elements. It was published in the Official Journal of the European Union on 20 November 2024 (OJ L, 2024/2847) and entered into force on 10 December 2024.

The CRA applies directly in all EU Member States and establishes binding obligations for manufacturers, importers, and distributors of products with digital elements.

CharacteristicDetail
Legal FormEU Regulation (directly applicable)
PublicationOJ L, 2024/2847, 20.11.2024
Entry into Force10.12.2024
Reporting obligations from11.09.2026 (Art. 14)
Full applicability from11.12.2027 (all requirements)
PenaltiesUp to EUR 15 million or 2.5% of global annual turnover (Art. 64)

1.2 Purpose and Objectives

The CRA pursues two core objectives:

  1. Security requirements for products (Annex I Part I) – Products with digital elements may only be made available on the EU market if they fulfil the essential cybersecurity requirements. This includes security-by-design, confidentiality, integrity, availability, and minimisation of the attack surface.

  2. Vulnerability handling (Annex I Part II) – Manufacturers must systematically identify, document, assess, remediate, and report vulnerabilities to users and authorities throughout the entire support period (at least 5 years, Art. 13(8)).

Interplay with NIS2

The CRA complements the NIS2 Directive (Directive (EU) 2022/2555). While NIS2 governs the cybersecurity of operators of essential and important entities, the CRA addresses the security of the products used by those entities. The reporting obligations under the CRA (Art. 14) are modelled on the NIS2 reporting obligations (Art. 23 NIS2) and utilise the same ENISA reporting platform.

1.3 Scope

Pursuant to Art. 2 CRA, this regulation applies to products with digital elements whose intended or reasonably foreseeable use includes a direct or indirect logical or physical data connection to a device or network.

For BAUER GROUP, this concerns:

  • Software – Standalone applications, microservices, APIs, container images
  • Firmware – Embedded systems (ESP32, STM32, Zephyr RTOS)
  • Libraries – Publicly published NPM and NuGet packages
  • Hardware with Software – IoT devices, industrial controllers
  • Remote Data Processing – Cloud components that are an integral part of a product

Detailed product categories and exemptions: see 1.1 Scope & Products.

Subpages of this Chapter

SectionTopic
1.1Scope & Products
1.2Roles & Responsibilities
1.3Deadlines & Timelines
1.4Importer Obligations (Art. 15)
1.5Authorised Representative (Art. 16)
1.6Distributor Obligations (Art. 17)
1.7Open-Source Steward (Art. 18–19)
1.8Substantial Modifications (Art. 20)
1.9Non-Conformity (Art. 22–23)
1.10Market Surveillance (Art. 52–58)
1.11Penalties (Art. 64)
1.12Harmonised Standards (Art. 5–6)
1.13General Product Safety (Art. 9)
1.14NIS2 Integration

1.4 Structure of this Handbook

This handbook is structured according to the core processes of the CRA. Each chapter addresses a distinct compliance area with legal basis, process description, and operational implementation:

ChapterTopicCRA Reference
Ch. 1Overview, Scope, Roles, DeadlinesArt. 2, 3, 10, 13, 14, 16
Ch. 2SBOM & SigningArt. 13(23), Art. 10(12), Annex I Part I No. 3, Part II No. 1
Ch. 3Vulnerability ManagementArt. 10(6), Annex I Part II No. 2-8
Ch. 4Incident Response & DisclosureArt. 13(6), Art. 14
Ch. 5Supply Chain SecurityArt. 10(4), Annex I Part II No. 1
Ch. 6Technical DocumentationArt. 31, Annex VII
Ch. 7Conformity AssessmentArt. 24-28, Annex V, VIII
Ch. 8Compliance MatrixComplete requirements mapping
AppendixTemplatesENISA notifications, EU DoC, Reports

1.5 Toolchain

BAUER GROUP relies on a fully automated toolchain to ensure CRA conformity without additional manual effort:

AreaToolFunctionStatus
SBOM GenerationTrivy / SyftSoftware Bill of Materials (CycloneDX JSON)Active
Vulnerability ScanningTrivy, GrypeCVE detection against NVD + GitHub Advisory DBActive
Secret ScanningGitleaks, GitGuardianDetection of exposed secretsActive
Dependency MonitoringDependabot, RenovateAutomated dependency updatesActive
License ComplianceFOSSA / SyftLicense evaluation against whitelist/blacklistActive
Artefact SigningCosign (Sigstore)Integrity assurance for container imagesActive
SBOM SigningCosign (Blob-Signing)Integrity assurance for SBOMsActive
Base Image MonitoringCustom WorkflowDocker base image vulnerability monitoringActive
CVE Monitorcra-scan.ymlScheduled vulnerability scan with issue creationActive
CRA Releasecra-release.ymlSBOM + signature + scan as release assetsActive
Software Security Hub Reportcra-report.ymlCompliance data to CRA Compliance HubActive
CI/CDGitHub ActionsAutomation of all compliance processesActive
DocumentationVitePress + GitHub PagesThis compliance handbookActive

1.6 Regulatory References

RegulationReferenceRelevance
Cyber Resilience ActRegulation (EU) 2024/2847Primary legal basis of this handbook
NIS2 DirectiveDirective (EU) 2022/2555Supplementary reporting obligations for operators
Delegated ActsArt. 7, 8, 14(9) CRATechnical specifications (expected 2026/2027)
ENISA Single Reporting PlatformArt. 14 CRACentral reporting platform for vulnerabilities
ISO/IEC 29147:2018Vulnerability DisclosureReference standard for Coordinated Vulnerability Disclosure
ISO/IEC 30111:2019Vulnerability HandlingReference standard for vulnerability handling
CycloneDX v1.5+OWASP StandardSBOM format
NIST SP 800-161r1C-SCRMSupply chain risk management best practice
IEC 62443Industrial CybersecurityReference for industrial control systems

1.7 Terms and Definitions

TermDefinitionCRA Reference
Product with digital elementsSoftware or hardware product and its remote data processing solutions, including software or hardware components placed on the market separatelyArt. 3(1)
ManufacturerNatural or legal person who develops or has developed a product and markets it under their own name or trademarkArt. 3(13)
Software Bill of Materials (SBOM)Formal, machine-readable record of the components contained in a product and their dependenciesArt. 3(39)
Actively exploited vulnerabilityVulnerability for which there is reliable evidence that it has been exploited by a malicious actor in a system without the permission of the ownerArt. 3(42)
Severe incidentIncident that has a significant impact on the security of a product, including compromise of supply chain integrityArt. 3(43)
Support periodPeriod during which the manufacturer is obligated to ensure vulnerability handling, at least 5 yearsArt. 13(8)
Conformity assessmentProcedure for verifying whether the essential requirements have been metArt. 3(30)
CE markingMarking by which the manufacturer declares that the product complies with the applicable EU requirementsArt. 29
Authorised representativeNatural or legal person established in the EU who has been authorised in writing by the manufacturer to act on their behalf for certain tasksArt. 3(15), Art. 16

Documentation licensed under CC BY-NC 4.0 · Code licensed under MIT