Cyber Resilience Act Articles 13 and 14: Why an ISMS Is Not Enough
2026-01-28
By Anna Bley

Cyber Resilience Act Articles 13 and 14: Why an ISMS Is Not Enough

The CRA requires Security by Design, vulnerability reporting within 24 hours, SBOMs, and CE marking. An ISMS supports governance, but not product-level compliance.

CRA
Cyber Resilience Act
Security
Compliance

Cyber Resilience Act Articles 13 and 14: Why an ISMS Is Not Enough for Products with Digital Elements

The Cyber Resilience Act obligates manufacturers of hardware and software to implement Security by Design, continuous vulnerability management, and reporting obligations for actively exploited vulnerabilities. What many organizations underestimate: These obligations extend throughout the entire product lifecycle — and require evidence that an ISMS alone cannot provide.

An ISMS structures internal governance. The CRA additionally requires product-specific cybersecurity requirements from the design phase, reporting of actively exploited vulnerabilities within 24 hours (Article 14), Software Bills of Materials (SBOM), CE marking, and ongoing security updates throughout the entire support period (Article 13).

Jump to:

Why an ISMS Is No Longer Sufficient Under the Cyber Resilience Act

Regulation (EU) 2024/2847 — the Cyber Resilience Act (CRA) — entered into force on December 10, 2024, and will become fully applicable from December 11, 2027. The reporting obligations under Article 14 already apply from September 11, 2026.

The CRA is the first EU-wide regulation establishing mandatory minimum cybersecurity requirements for products with digital elements — regardless of whether they are low-cost consumer products or high-value B2B software.

The crucial difference from NIS2, DORA, or GDPR: The CRA is product-centric, not organization-centric. While an ISMS structures an organization's security, the CRA demands security at the product level — from design through development to the entire product lifetime.

Where an ISMS Contributes to CRA Compliance — Organizational Foundation

A good ISMS provides the structural basis for many CRA requirements:

  • Risk management processes for assessing cybersecurity risks
  • Documented processes for vulnerability management
  • Incident response procedures as a foundation for reporting obligations
  • Configuration management and change control processes

Annex I of the CRA requires that products be "designed, developed and produced in such a way that they ensure an appropriate level of cybersecurity based on the risks." This sounds like ISMS territory — and an ISMS can indeed serve as a foundation here.

However, the CRA goes further at critical points: It requires product-specific evidence, reporting obligations with very short deadlines, and CE marking confirming conformity with cybersecurity requirements.

Where the CRA Goes Beyond an ISMS

Article 14: Reporting Obligations for Manufacturers

The CRA introduces a three-tier reporting regime for actively exploited vulnerabilities and severe security incidents.

Early Warning (24 Hours)

The manufacturer must report any actively exploited vulnerability it becomes aware of to the relevant CSIRT and ENISA without undue delay and in any event within 24 hours.

Reporting is done via the Single Reporting Platform (SRP) operated by ENISA to the CSIRT of the Member State where the manufacturer has its main establishment.

Content of the early warning under Article 14(2)(a):

ElementDescription
TimingWithout undue delay, in any event within 24 hours of becoming aware
Affected Member StatesIndication of Member States where the product has been made available
Nature of the vulnerabilityInitial classification of the security flaw

Full Notification (72 Hours)

Within 72 hours of becoming aware, a complete vulnerability notification must be submitted, unless the information was already included in the early warning.

Content of the full notification under Article 14(2)(b):

ElementDescription
General informationNature of the vulnerability and affected products
Technical detailsDescription of the vulnerability and its impact
SeverityAssessment of criticality
Measures takenCountermeasures already implemented
User recommendationsPossible risk mitigation measures

Final Report

SituationDeadline
Actively exploited vulnerabilityNo later than 14 days after a corrective measure becomes available
Severe security incidentNo later than 1 month after the 72-hour notification

The final report must include a root cause analysis, corrective measures taken, and preventive measures.

User Notification

Under Article 14(8), after becoming aware of an actively exploited vulnerability or severe incident, the manufacturer must inform affected users — about the vulnerability, the incident, and where applicable, risk mitigation measures.

If the manufacturer fails to inform users in a timely manner, the relevant CSIRT may publish this information itself.

Article 13: Obligations of Manufacturers

The CRA establishes comprehensive obligations for manufacturers throughout the entire product lifecycle.

Security by Design and Default (Article 13(1))

Manufacturers must ensure that products with digital elements are designed, developed, and produced in accordance with the essential cybersecurity requirements in Annex I Part I:

RequirementDescription
Appropriate level of protectionProducts must ensure a level of cybersecurity appropriate to the risks
No known vulnerabilitiesProducts must not be placed on the market with known exploitable vulnerabilities
Secure default configurationProducts must be delivered with secure default settings
Protection against unauthorized accessAuthentication, identity, and access control mechanisms
Protection of confidentialityEncryption of data at rest and in transit
Protection of integrityProtection against unauthorized manipulation of data and functions
Protection of availabilityResilience against denial-of-service attacks
Minimization of attack surfaceReduction of external interfaces to what is necessary

Software Bill of Materials (SBOM)

Annex I Part II requires manufacturers to identify and document vulnerabilities and components of their products — including a Software Bill of Materials (SBOM) in a commonly used and machine-readable format covering at least the top-level dependencies.

The SBOM does not need to be published but must be made available to market surveillance authorities upon request.

Why SBOM obligations effectively apply from September 2026:

The SBOM requirement formally becomes enforceable only on December 11, 2027. However, the reporting obligations already apply from September 11, 2026. Without an SBOM and vulnerability monitoring, a manufacturer cannot know whether a newly disclosed vulnerability affects their product — and the 24-hour deadline passes.

Support Period and Security Updates (Article 13(8))

Manufacturers must determine a support period during which they provide security updates. This period must:

  • Be at least 5 years (or shorter if the expected product lifetime is shorter)
  • Be communicated to users before purchase
  • Include free security updates

Technical Documentation (Article 13 and Annex VII)

Manufacturers must prepare technical documentation and retain it for 10 years after placing on the market or during the support period (whichever is longer):

DocumentDescription
Product descriptionConception, design, and development
Cybersecurity risk assessmentAssessment of risks under Article 13(2)
SBOMSoftware Bill of Materials of components
Conformity assessmentEvidence of compliance with requirements
EU Declaration of ConformityManufacturer's declaration

Why Due Diligence Is Not a One-Off Exercise

Due Diligence for Third-Party Components (Article 13(5))

When integrating third-party components — including open-source software — manufacturers must exercise due diligence to ensure that these components do not compromise the cybersecurity of the product.

Reporting Vulnerabilities in Components (Article 13(6))

If a manufacturer identifies a vulnerability in a component, they must report it to the manufacturer or maintainer of that component and remediate the vulnerability in accordance with the requirements.

Substantial Modifications (Article 3(31))

A substantial modification is any change to a product after placing on the market that:

  • May affect compliance with cybersecurity requirements, or
  • Constitutes a change in the intended purpose

Upon a substantial modification, the modifier becomes the manufacturer for the affected product or part — with all obligations under Articles 13 and 14.

Supply Chain: Obligations for Importers and Distributors

The CRA establishes a chain of responsibility throughout the entire supply chain.

Obligations of Importers (Article 19)

Importers may only place products on the market that comply with cybersecurity requirements. Before placing on the market, they must ensure:

Verification dutyDescription
Conformity assessmentThe manufacturer has carried out the required procedures
Technical documentationThe manufacturer has prepared the documentation
CE markingThe product bears the CE marking
EU Declaration of ConformityThe declaration accompanies the product
User informationInstructions and information are provided in an understandable language

Importers must retain the EU Declaration of Conformity and technical documentation for 10 years and make them available to market surveillance authorities upon request.

Obligations of Distributors (Article 20)

Before making a product available on the market, distributors must verify:

  • The product bears the CE marking
  • The manufacturer and importer have fulfilled their obligations
  • All required documents are provided

If an importer or distributor becomes a manufacturer themselves (by marketing under their own name or making a substantial modification), all obligations under Articles 13 and 14 apply to them.

Vulnerability Reporting by Importers and Distributors

Importers and distributors who become aware of a vulnerability must inform the manufacturer without delay. If there are indications of non-compliance, they may not (continue to) make the product available on the market.

Penalties (Article 64)

The CRA provides for a three-tier penalty system:

ViolationFineLegal basis
Essential cybersecurity requirements (Annex I) and manufacturer obligations (Art. 13, 14)Up to EUR 15 million or 2.5% annual turnoverArt. 64(2)
Other obligations (Art. 18–23, 28, 30–33, 39, 41, 47, 49, 53)Up to EUR 10 million or 2% annual turnoverArt. 64(3)
False or incomplete information to authoritiesUp to EUR 5 million or 1% annual turnoverArt. 64(4)

The higher amount applies in each case.

Exceptions:

  • Micro-enterprises and small enterprises are exempt from fines for non-compliance with the 24-hour deadline under Article 14
  • Open-source software stewards are exempt from all fines under the CRA

Additional measures by market surveillance authorities:

In addition to fines, authorities can withdraw products from the market, order recalls, or prohibit placing on the market — EU-wide.

ISMS and Trust Center: Two Perspectives on Compliance

The CRA creates a new dimension of product liability for cybersecurity. An ISMS remains indispensable for organizational governance — but the product-related requirements of the CRA require additional structures.

The Two Directions of a Trust Center

As a Manufacturer / Seller (Outbound):

Organizations selling products with digital elements in the EU must provide customers and authorities with extensive evidence. A Trust Center consolidates this documentation in one professional location:

DocumentPurposeCRA Reference
EU Declaration of ConformityEvidence of complianceArt. 13(20)
CE markingConformity markingArt. 30
SBOM (upon request)Transparency about componentsAnnex I Part II
Technical documentationEvidence of conformityAnnex VII
Support period and update policyInformation for usersArt. 13(8)
Vulnerability Disclosure PolicyProcess for vulnerability reportsAnnex I Part II
Certifications (ISO 27001, IEC 62443)Supporting evidenceArt. 27
Penetration test reportsIndependent assessmentAnnex I Part II

As a Buyer / Integrator (Inbound):

Organizations integrating products with digital elements into their own products are obligated to exercise due diligence under Article 13(5). A Trust Center supports:

  • Collection and maintenance of manufacturer evidence and SBOMs
  • Monitoring of security updates and known vulnerabilities
  • Documentation of due diligence in component selection
  • Evidence of supply chain compliance for own customers

The Dual Perspective

Many B2B organizations are simultaneously buyers (integrating third-party components) and manufacturers (selling their own products). A Trust Center addresses both roles:

  • Inbound: Evidence of due diligence when integrating third-party components
  • Outbound: Provision of all required evidence to customers and authorities

Without a Trust Center, this documentation runs through email, individual requests, and manual processes — incompatible with the short CRA deadlines and the complexity of modern software supply chains. With a Trust Center, reactive document searches become a functioning system.

The Critical Timeline

DateObligation
December 10, 2024CRA entered into force
June 11, 2026Notified Bodies authorized for conformity assessment
September 11, 2026Reporting obligations under Article 14 apply — including for products already on the market
December 11, 2027Full application of all CRA requirements

The reporting obligations from September 2026 are the critical milestone: Organizations that have not implemented SBOM-based vulnerability monitoring and incident response processes by then cannot meet the 24-hour deadline.

Organizations that connect governance and communication are well-positioned: An ISMS for internal governance, a Trust Center for external communication — in both directions of the supply chain. This transforms compliance effort into a functioning system and documentation into true cyber resilience.


Sources

  1. Regulation (EU) 2024/2847 (Cyber Resilience Act) – Full Text – Official Journal of the European Union. The complete text of the Cyber Resilience Act.
  2. European Commission – Cyber Resilience Act Summary – Summary of key provisions.
  3. European Commission – CRA Reporting Obligations – Details on reporting obligations and the Single Reporting Platform.
  4. BSI – Cyber Resilience Act – Information and guidance from BSI.
  5. european-cyber-resilience-act.com – Article 13 – Obligations of manufacturers.
  6. european-cyber-resilience-act.com – Article 14 – Reporting obligations.
  7. european-cyber-resilience-act.com – Article 64 – Penalties.
  8. ENISA – CRA Requirements Standards Mapping – Mapping of CRA requirements to existing standards.