When Importers Become Manufacturers Under CRA: Role Escalation Explained

A practical guide to CRA Article 22 role escalation. Know when rebranding or modifying products triggers full manufacturer obligations.

CRA Evidence Team
Author
February 8, 2026
Updated February 25, 2026, 12:00:00 AM UTC
12 min read
When Importers Become Manufacturers Under CRA: Role Escalation Explained
In this article

You import a router from Asia. You put your company logo on the box. Congratulations: you're now a manufacturer under the CRA, with full conformity assessment obligations.

This article covers exactly when importers cross the line into manufacturer territory, and what that means for your compliance burden.

Summary

  • Importers become manufacturers when: (1) placing products under own name/trademark, or (2) making substantial modifications
  • "Substantial modification" = changes affecting cybersecurity or product purpose
  • Role escalation triggers full Article 13 and 14 obligations (risk assessment, technical file, conformity assessment, vulnerability management)
  • Exemption: Security patches that don't change product function
  • Plan for this: Either maintain importer status or prepare for manufacturer compliance

Important: If you substantially modify a product (rebrand, change firmware, integrate into a larger system), you may be reclassified as the manufacturer under the CRA with all corresponding obligations.

Tip: Document your exact role in the supply chain. Ambiguity about whether you're an importer or manufacturer creates compliance risk.

CRA role escalation decision tree — when importer becomes manufacturer

The Two Triggers for Role Escalation

Article 22 of the CRA establishes when an importer (or distributor) is treated as a manufacturer:

Trigger 1: Own Name or Trademark

Placing a product on the market under your own brand makes you the manufacturer, regardless of who actually designed and built it.

You trigger this when:

  • Your company name appears as "manufacturer" on packaging
  • Your trademark/logo is on the product
  • Marketing materials present you as the product source
  • Customers would reasonably believe you made the product

Examples:

Situation Manufacturer? Why
Import router, sell under "AcmeTech" brand Yes Own trademark
Import camera, add "Distributed by AcmeTech" No Distributor role clear
Import device, replace all manufacturer branding with yours Yes Own name/trademark
Import device, add your sticker alongside original branding Possibly Depends on prominence

Trigger 2: Substantial Modification

Making changes that affect the product's intended purpose or its compliance with CRA requirements.

The test: Would the original conformity assessment still be valid after your changes?

If your modifications mean the original manufacturer's compliance work no longer applies, you've made a substantial modification.

What Counts as "Substantial Modification"?

The CRA doesn't provide an exhaustive list. The principle is: changes affecting security posture or intended use.

Definitely Substantial

Modification Why It's Substantial
Custom firmware installation Changes security architecture
Adding remote management features New attack surface
Hardware changes affecting security Alters risk profile
Integrating third-party security modules Changes trust boundaries
Changing authentication mechanisms Core security function
Adding network connectivity to offline product Fundamental purpose change
Replacing cryptographic implementations Security-critical change

Definitely NOT Substantial

Modification Why It's Not Substantial
Applying security patches (no function change) Explicitly exempted by CRA
Language localization of documentation Cosmetic only
Packaging changes (no product change) Not a product modification
Adding compatible accessories Original product unchanged
Cosmetic changes (color, finish) No security impact
Stocking/warehousing No modification at all

Gray Areas (Assess Carefully)

Modification Considerations
Configuration changes Does it affect security defaults?
Pre-installed additional software Does it change attack surface?
Hardware accessories that integrate Do they affect security functions?
Regional adaptations Do they change security-relevant behavior?
Bundling multiple products Are security boundaries clear?

Decision Tree: Am I Still an Importer?

START: Placing product on EU market

├─ Under original manufacturer's brand?
│   │
│   ├─ YES → Making any modifications?
│   │         │
│   │         ├─ NO → You're an IMPORTER
                   (Standard importer obligations apply)
            
            └─ YES  Does modification affect:
                       Intended purpose or use?
                       Cybersecurity compliance?
                       Security architecture?
                      
                      ├─ YES to any  You're a MANUFACTURER
│   │                   │               (Full manufacturer obligations)
│   │                   │
│   │                   └─ NO to all → You're an IMPORTER
                                     (Document your analysis)
   
   └─ NO (your brand)  You're a MANUFACTURER
                        (Full manufacturer obligations)

What Manufacturer Status Means

If you trigger role escalation, you inherit the full set of CRA manufacturer obligations:

Before Market Placement

Risk Assessment (Article 13):

  • Conduct cybersecurity risk assessment for your modified product
  • Document threats, vulnerabilities, and mitigations
  • Link risks to security controls

Secure Development:

  • Even though you didn't develop the original, you must ensure the product (as modified) meets secure-by-design principles
  • Document your modification process and its security considerations

Technical Documentation (Annex VII):

  • Prepare complete technical file including:
    • Product description
    • Risk assessment results
    • Security architecture (as modified)
    • SBOM (including your modifications)
    • Conformity assessment evidence

Conformity Assessment:

  • Determine product classification
  • Complete appropriate assessment route (Module A, B+C, or H)
  • If original manufacturer used third-party assessment, your modifications likely invalidate it

EU Declaration of Conformity:

  • Issue your own DoC
  • You are the responsible manufacturer
  • Original manufacturer's DoC no longer applies

CE Marking:

  • Affix CE marking under your responsibility
  • You're declaring conformity, not the original manufacturer

Throughout Support Period

Vulnerability Management:

  • Establish vulnerability handling process
  • Monitor for vulnerabilities (including in unmodified components)
  • Provide security updates for minimum 5 years

Incident Reporting:

  • Report actively exploited vulnerabilities to ENISA (24h)
  • Report severe incidents (24h)
  • You're responsible, even for vulnerabilities in original components

Customer Communication:

  • Provide security update notifications
  • Maintain support channels
  • Handle end-of-life responsibly

Ongoing Obligations

Post-Market Surveillance:

  • Monitor your product in the field
  • Track vulnerability reports
  • Implement lessons learned

Documentation Retention:

  • Keep technical file for 10 years after last unit placed on market
  • Maintain audit trail of modifications

Practical Scenarios

Scenario 1: White-Label Electronics

Situation: You import generic tablets from Asia and sell them under "AcmeTab" brand.

Analysis:

  • Own trademark: Yes → Manufacturer trigger
  • Modifications: Even if none, the branding triggers manufacturer status

Result: You're a manufacturer. Full obligations apply.

What you need:

  • Risk assessment for the tablet
  • Technical file (work with supplier to obtain underlying documentation)
  • Your own conformity assessment
  • Your own DoC and CE marking
  • Vulnerability management process
  • 5+ year support commitment

Scenario 2: Pre-Configured Network Equipment

Situation: You import enterprise routers and pre-configure them with custom firewall rules and VPN settings before selling to customers.

Analysis:

  • Own trademark: Assume no (sold under original brand)
  • Modifications: Configuration changes
  • Do changes affect security? Custom firewall rules = security-relevant configuration

Result: Likely substantial modification. You're probably a manufacturer.

Better approach: Work with original manufacturer to offer "configuration profiles" that they validate, keeping you as importer.

Scenario 3: Security Patches Applied

Situation: You import IoT devices. Before sale, you apply the latest security patches from the manufacturer.

Analysis:

  • Own trademark: No
  • Modifications: Security patches only
  • CRA explicitly exempts security patches that don't change intended function

Result: You're still an importer. This is the exempted scenario.

Document: Keep records showing patches were manufacturer-provided and didn't change functionality.

Scenario 4: Firmware Customization for Customers

Situation: You import industrial controllers. For enterprise customers, you install custom firmware with additional features.

Analysis:

  • Own trademark: May or may not
  • Modifications: Custom firmware = definite substantial modification

Result: You're a manufacturer for those customized units.

Options:

  • Maintain two tracks: standard (importer) and customized (manufacturer)
  • Work with manufacturer to have custom firmware officially supported
  • Accept manufacturer status and build compliance infrastructure

Scenario 5: Hardware Bundling

Situation: You import security cameras and bundle them with third-party NVR (network video recorder) as a "complete system."

Analysis:

  • Own trademark: If sold as "AcmeSecurity System," yes
  • Modifications: Bundling creates a new "product" if marketed as integrated
  • Security boundaries: NVR + cameras = different security profile than cameras alone

Result: Likely manufacturer for the bundled system.

Alternative: Sell as separate products, clearly distinct, with original branding.

Strategies for Staying as Importer

If you want to avoid manufacturer obligations:

1. Maintain Original Branding

Keep manufacturer's name and trademark visible. Your company can be identified as importer/distributor.

2. No Product Modifications

Don't touch firmware, hardware, or security-relevant configuration. What you import is what you sell.

3. Document Everything

Keep records showing:

  • Product is unmodified
  • Original manufacturer branding maintained
  • You verified manufacturer's compliance

4. Work with Manufacturers

If you need customization:

  • Have manufacturer make the changes
  • Ensure their DoC covers the customized version
  • Maintain your importer status

Preparing for Manufacturer Status

If role escalation is unavoidable or strategically desired:

Compliance Infrastructure

Build the capabilities manufacturers need:

Capability What It Means
Risk assessment competency People/process to evaluate security risks
Technical documentation Ability to create and maintain technical files
Conformity assessment Module A capability or Notified Body relationship
Vulnerability management Intake, triage, remediation, communication
Update distribution Mechanism to deliver security patches
Customer support Security-focused support for 5+ years

Supplier Relationships

Even as manufacturer, you depend on original suppliers:

  • Technical documentation access: You need underlying details
  • Vulnerability information: They may discover issues first
  • Component support: Their support affects your ability to maintain product
  • Contractual obligations: Ensure they'll support you for your support period

Cost Considerations

Manufacturer status increases costs:

Cost Category Importer Manufacturer
Conformity assessment Verify only Perform (or pay NB)
Documentation Verify existence Create and maintain
Vulnerability management Notify upstream Run entire process
Updates Pass through Develop and distribute
Support period Monitor Deliver
Liability exposure Lower Higher

Model these costs before deciding to trigger manufacturer status.

Common Mistakes

"It's just a sticker"

Wrong. Your brand on the product = manufacturer status, regardless of whether you made any other changes.

A sticker with your logo transforms you from importer to manufacturer.

"We're improving security, not changing it"

Risky. Even "improvements" can be substantial modifications.

If your improvement changes the security architecture, attack surface, or authentication mechanisms, it's substantial.

"The manufacturer said we could"

Doesn't matter. CRA obligations follow from what you do, not what permission you have.

Manufacturer's blessing doesn't transfer their compliance to you. If you trigger escalation, you need your own compliance.

"We'll just keep both roles"

Complicated but possible. You can be importer for unmodified products and manufacturer for modified ones.

This requires clear separation: different SKUs, different documentation, different support tracks.

"Our customers require modifications"

Understand the implications. Customer requirements don't exempt you from CRA.

If customers need customization, either:

  • Have original manufacturer do it
  • Accept manufacturer status and price accordingly
  • Decline the customization

Role Assessment Checklist

ROLE ASSESSMENT CHECKLIST

Product: _______________________________________
Supplier/Manufacturer: _________________________
Date: _________________________________________

BRANDING ANALYSIS:
[ ] Product sold under original manufacturer's brand?
[ ] Our company name/logo NOT presented as manufacturer?
[ ] Customer would identify original manufacturer as source?

If any NO → MANUFACTURER STATUS LIKELY

MODIFICATION ANALYSIS:
[ ] No firmware changes (beyond manufacturer patches)?
[ ] No hardware modifications?
[ ] No security-relevant configuration changes?
[ ] No additional software installed?
[ ] No connectivity changes?
[ ] No authentication/authorization changes?

If any NO → Assess if modification is "substantial"

SUBSTANTIAL MODIFICATION TEST:
For each modification:
- Does it affect intended purpose? [ ] Yes [ ] No
- Does it affect cybersecurity compliance? [ ] Yes [ ] No
- Would original conformity assessment still be valid? [ ] Yes [ ] No

If any "Yes" to first two or "No" to third → SUBSTANTIAL

RESULT:
[ ] IMPORTER - No triggers identified
[ ] MANUFACTURER - Trigger(s) identified:
    [ ] Own name/trademark
    [ ] Substantial modification: _________________

IF MANUFACTURER STATUS:
[ ] Risk assessment process established
[ ] Technical file preparation planned
[ ] Conformity assessment route selected
[ ] Vulnerability management capability
[ ] Support period commitment (minimum 5 years)
[ ] Supplier agreements in place

Assessed by: ___________________________________
Date: _________________________________________

How CRA Evidence Helps

CRA Evidence supports both importers and manufacturers:

For Importers:

  • Manufacturer verification workflows
  • Supplier compliance tracking
  • Documentation storage for importer obligations

For Manufacturers (including post-escalation):

  • Risk assessment templates
  • Technical file management
  • SBOM handling for modified products
  • Vulnerability management workflow
  • Support period tracking

Understand your role with app.craevidence.com.


This article is for informational purposes only and does not constitute legal advice. For specific compliance guidance, consult with qualified legal counsel familiar with EU product regulations.

Share this article

Related Articles

Does the CRA apply to your product?

Answer 6 simple questions to find out if your product falls under the EU Cyber Resilience Act scope. Get your result in under 2 minutes.

Ready to achieve CRA compliance?

Start managing your SBOMs and compliance documentation with CRA Evidence.