How the Cyber Resilience Act Changes Development

For years, cybersecurity regulation in the EU focused on how organizations operate, such as how they manage risk and protect their infrastructure. The EU Cyber Resilience Act, however, takes a different approach. 

Rather than focusing primarily on organizations, it targets the products they bring to market, which has a big impact on development teams. The way code is written, tested, and maintained is now directly within regulatory scope.

Feature image of CRA letters on SecureFlag background

Regulatory Expectations

The CRA came into effect in December 2024 and will fully apply by December 2027. That might sound far away, but the changes required take time to embed into development processes. They’re not something teams can leave until the final stages of delivery.

These mandatory cybersecurity requirements relate to products with digital elements, broadly defined as any software or hardware that connects directly or indirectly to another device or network.

Organizations placing products on the EU market are expected to:

  • Design and develop products with security in mind from the start.

  • Find and assess security risks during development.

  • Implement appropriate testing and review processes.

  • Monitor vulnerabilities and provide security updates after release.

  • Maintain technical documentation to demonstrate compliance. 

To sell a product in the EU, manufacturers must now pass a formal compliance check, called a conformity assessment, and earn CE marking (the certification indicating that a product meets EU standards).

Where Development Teams Feel the Impact

Although the CRA is written at the manufacturer level, its requirements impact development team responsibilities. A few areas stand out.

Secure by Design and Default

Products are expected to follow secure-by-design principles, reduce known exploitable vulnerabilities, ship with least-privilege defaults, and have security features enabled out of the box. Relying on pre-release penetration testing alone won’t be enough.

Demonstrating Secure Development Practices

Organizations are expected to maintain technical documentation and evidence showing how security requirements are met. In practice, this means being able to show that secure development practices, including secure coding, are applied across teams.

Risk Assessment and Threat Modeling

Manufacturers have to conduct cybersecurity risk assessments and maintain documentation demonstrating that their products meet CRA requirements. For development teams, practices such as threat modeling help document risk assessment activities as part of the development process.

Security Testing Throughout the SDLC

The CRA requires “effective testing and review mechanisms” throughout the software development lifecycle (SDLC). Static analysis, dynamic testing, and penetration testing need to be integrated across development rather than at the end of the pipeline. 

SBOMs and Dependency Management

Manufacturers need to produce and maintain a Software Bill of Materials (SBOM), which is basically a list of components, libraries, and dependencies. Seeing that a large part of today’s applications relies on open-source components, this creates more operational overhead across development and release processes.

Vulnerability Disclosure and Incident Reporting

From September 2026, actively exploited vulnerabilities need to be reported to the European Union Agency for Cybersecurity (ENISA), with an initial notification within 24 hours. Organizations should have vulnerability handling and reporting processes in place well before the deadline.

Ongoing Patch Obligations

Security updates must be provided free of charge and remain available throughout the product’s support lifetime, which in many cases is at least five years. 

Responsibility Doesn’t End at Release

It’s important to keep in mind that, under the CRA, these security obligations should continue after a product goes to market, so they’re an ongoing responsibility rather than something completed at release. Organizations need to:

  • Keep track of vulnerabilities throughout a product’s supported lifecycle.

  • Report actively exploited vulnerabilities within the set timelines.

  • Release security updates without unnecessary delays.

  • Maintain awareness of software components and dependencies.

Where The Challenges Come In 

None of the CRA’s requirements should come as a surprise to development teams with established security practices. The challenge is that most organizations have strong security in some places, but not in others. These challenges include:

  • Secure coding knowledge varies across development teams.

  • Security testing is often introduced late or applied inconsistently.

  • Structured risk assessment practices are not always consistently done.

  • Limited visibility into third-party and open source components.

  • Training does not always transfer into day-to-day development work. 

Building CRA-Ready Development Practices

Preparing for the CRA means moving away from reactive compliance and towards proactive, secure development practices, such as:

  • Embedding security throughout the SDLC.

  • Providing developers with hands-on experience in identifying and fixing vulnerabilities.

  • Incorporating risk assessment into design and architecture decisions.

  • Establishing measurable ways to track and improve security practices.

How SecureFlag Supports CRA Readiness

The CRA requires organizations to demonstrate they’re secure, which needs more than policy documentation. SecureFlag helps teams implement some of the CRA’s most challenging requirements. 

In SecureFlag’s hands-on training labs, developers work in real development environments where they learn to identify and fix vulnerabilities. It helps teams apply secure coding practices in their daily development work, and the platform’s metrics give security leads documented evidence of training coverage across teams.

For risk assessment and threat modeling, ThreatCanvas generates threat models directly from your code repositories, making it practical to document risk assessment as part of the build process rather than as a separate compliance exercise. 

Book a demo to see how SecureFlag can help.

Continue reading