Regulation

EU Cyber Resilience Act

EU mandatory cybersecurity regulation for all connected products. From September 2027, all connected products sold in the EU must comply with CRA requirements and bear CE marking.

Curated by Winners Consulting Services Co., Ltd.

Questions & Answers

How does the EU CRA categorize products? What are the different requirements for each category?

The EU CRA categorizes products into three types: Default (self-assessment, for most connected consumer products), Class I (requires third-party assessment for items like routers, OS, smart appliances), and Class II (strictest third-party certification for high-risk devices such as industrial firewalls, HSMs, in-vehicle computers). Taiwanese firms must verify classification; Class II certification can take 12-18 months.

What is the EU CRA compliance timeline? When must Taiwanese manufacturers complete preparations?

The EU CRA officially takes effect in Dec 2024. By Sep 2026, manufacturers must establish vulnerability reporting. Full mandatory enforcement begins Sep 2027, requiring all connected products in the EU to comply and bear the CE mark. Taiwanese firms should start gap assessment by end-2025, complete design improvements in 2026, and finish certification by mid-2027 to ensure readiness.

Which international standards correspond to the EU CRA? How can existing certifications reduce compliance costs?

Key harmonized standards for EU CRA include IEC 62443 (for OT/ICS, covering CRA basic requirements 1-13) and ETSI EN 303 645 (for consumer IoT). EN IEC 62443-4-2 addresses component-level requirements. Automotive firms with TISAX or ISO 21434 can reuse existing security processes. Integrated assessments can avoid duplication, potentially saving 30-50% in certification costs.

Which Taiwanese enterprises should prioritize EU CRA compliance?

High-priority Taiwanese enterprises for EU CRA compliance include: (1) Electronics manufacturers (EMS/ODM/OEM) producing connected products, IoT devices, or smart appliances for European brands. (2) Industrial control equipment manufacturers exporting PLCs, SCADA, HMIs, or industrial sensors to the EU. (3) Automotive electronics suppliers in European car supply chains. (4) Network equipment manufacturers of routers, switches, or industrial gateways (Class I products).

What are the EU CRA's vulnerability reporting obligations?

The EU CRA requires manufacturers to establish post-market vulnerability management: (1) Actively exploited vulnerabilities must be reported to ENISA and national authorities within 24 hours. (2) Significant cybersecurity incidents within 72 hours. (3) Security updates must be provided for the product's reasonable lifespan (at least 5 years). (4) Vulnerability reporting channels must be maintained for 10 years post-end-of-life. These obligations begin September 2026.

What is the relationship between personal data protection and the CRA?

The EU CRA is highly relevant to personal data protection. Connected devices handling personal data (e.g., smart home, wearables) are subject to both CRA and GDPR. CRA mandates privacy-by-design principles like data minimization, secure default configurations, and access controls, aligning closely with GDPR. Integrated assessments for CRA, GDPR, and ISO 27701 can help Taiwanese manufacturers meet all three requirements, reducing compliance costs.

Knowledge Graph

◆ KNOWLEDGE MAP

Click nodes to explore related terms

Related Terms

Related Services

Need help with compliance implementation?

Request Free Assessment