CRA vs ISO 27001: The Compliance Gaps Your ISMS Won't Cover
Does ISO 27001 cover the Cyber Resilience Act? Not fully. Maps the exact gaps, what your ISMS transfers, and what you still need before the 2027 deadline.
In this article
- Summary
- What Does ISO 27001 Cover vs What the CRA Requires?
- Where ISO 27001 Helps CRA and Where It Falls Short
- How to Leverage ISO 27001 for CRA
- ISO 27001 Annex A Controls and CRA
- Does ISO 27001 Certification Count Toward CRA Conformity Assessment?
- Three Common ISO 27001 + CRA Scenarios
- How to Integrate CRA Into Your Existing ISMS
- Checklist: ISO 27001 Organization Adding CRA
- Official ISO 27001 and CRA Resources
- Frequently Asked Questions
- Next Steps
If your company is ISO 27001 certified, you might assume you are well-positioned for the Cyber Resilience Act (CRA). You are not. At least not without significant additional work.
ISO 27001 protects your organization's information assets. The Cyber Resilience Act (Regulation (EU) 2024/2847) requires that every product with digital elements you place on the EU market is secure by design, ships with a software bill of materials (SBOM), and is supported with security updates for its expected lifetime. These are product-level obligations, not organizational ones. Non-compliance carries fines up to EUR 15 million or 2.5% of global annual turnover (Art. 64). See the CRA penalties guide.
Article 14 reporting obligations start September 11, 2026. Full compliance is required by December 11, 2027. See the full CRA implementation timeline.
This guide on ISO 27001 vs CRA maps exactly where your ISMS helps, where it falls short, and what you need to add.
Summary
- ISO 27001 = organizational/enterprise security management
- CRA = product cybersecurity requirements (Annex I, Regulation (EU) 2024/2847)
- ISO 27001 does NOT equal CRA compliance
- ISO 27001 provides a foundation for secure development processes
- CRA requires product-specific evidence: SBOM, vulnerability handling, CE marking
- Both together = strong overall security posture
What Does ISO 27001 Cover vs What the CRA Requires?
What ISO 27001 Covers
ISO 27001 is an information security management system (ISMS) standard covering:
Organization-level controls:
- Information security policies
- Asset management
- Access control (to systems and data)
- Cryptography use
- Physical security
- Operations security
- Communications security
- Supplier relationships
- Incident management
- Business continuity
- Compliance management
Focus: Protecting your organization's information assets
What CRA Covers
CRA is a product regulation covering (Annex I):
Product-level requirements:
- Security-by-design in products
- No known exploitable vulnerabilities
- Secure default configuration
- Protection from unauthorized access (in product)
- Data protection (by product)
- Update capability (of product)
- Vulnerability handling and ENISA reporting (for product)
- SBOM for product components (Art. 13(5))
- Coordinated vulnerability disclosure policy (Art. 13(6))
- Public vulnerability contact (Art. 13(7))
- CE marking and conformity assessment
Focus: Ensuring products you sell are secure
The CRA classifies products into categories: default, Important Class I, Important Class II, and Critical (Annex III and IV). Each category carries different conformity assessment requirements. An Important Class II product requires mandatory third-party assessment by a notified body, regardless of your ISO 27001 certification status. See the CRA product classification guide.
The Fundamental Difference
ISO 27001 vs CRA SCOPE
ISO 27001:
"How does your ORGANIZATION manage security?"
+---------------------------------------------+
| Your Company |
| +---------+ +---------+ +---------+ |
| | Systems | | Data | | People | |
| \---------+ \---------+ \---------+ |
| +---------+ +---------+ +---------+ |
| | Process | | Network | | Facilit | |
| \---------+ \---------+ \---------+ |
\---------------------------------------------+
CRA:
"How secure are the PRODUCTS you sell?"
+---------------------------------------------+
| Your Products (sold to customers) |
| +---------+ +---------+ +---------+ |
| |Product A| |Product B| |Product C| |
| \---------+ \---------+ \---------+ |
| |
| Each product must meet CRA requirements |
\---------------------------------------------+
Where ISO 27001 Helps CRA and Where It Falls Short
Where ISO 27001 Helps CRA
| CRA Requirement | ISO 27001 Support | How It Helps |
|---|---|---|
| Secure development | A.8.25-28 (Secure development) | Process foundation |
| Vulnerability handling | A.8.8 (Technical vulnerabilities) | Organizational process |
| Incident response | A.5.24-26 (Incident management) | Response capability |
| Supplier management | A.5.19-22 (Supplier relationships) | Supply chain security |
| Access control | A.5.15-18, A.8.2-5 | Development environment security |
| Cryptography | A.8.24 (Cryptography) | Crypto policy foundation |
| Documentation | A.5.1 (Policies), 7.5 (Documented info) | Documentation culture |
| Risk assessment | 6.1 (Risk assessment) | Risk methodology |
Where ISO 27001 Falls Short
| CRA Requirement | ISO 27001 Gap | What's Missing |
|---|---|---|
| SBOM | Partial: A.8.26/A.8.28 cover component awareness, not machine-readable SBOM format | Standardized SBOM (SPDX/CycloneDX) per Art. 13(5) |
| CE marking | Not covered | Conformity assessment process |
| Product security testing | Limited | Product-specific test evidence for technical file |
| Secure by default | Not product-focused | Product configuration requirements |
| Support period | Not covered | At least 5 years, or expected product lifetime if shorter (Art. 13(8)) |
| ENISA reporting | Not covered | 24h/72h notification + final report to national CSIRT via Single Reporting Platform (Art. 14) |
| CVD policy | Not covered | Documented coordinated vulnerability disclosure policy (Art. 13(6)) |
| Public vulnerability contact | Not covered | Single point of contact for vulnerability reports, e.g., security.txt (Art. 13(7)) |
| User documentation | Limited | Product security instructions |
| Technical file | Not covered | CRA documentation format per Annex VII |
Gap Analysis Summary
Strong Foundation (ISO 27001 helps significantly):
- Security culture and awareness
- Risk management methodology
- Incident response capability
- Supplier security management
- Secure development lifecycle policies
- Access control framework
- Documentation practices
Partial Coverage (ISO 27001 helps but is not sufficient):
- Vulnerability management (organizational scope vs. product scope)
- Cryptography (policy vs. product implementation)
- Security testing (enterprise systems vs. product testing)
- Change management (IT change vs. product modification)
- SBOM (component awareness in A.8.26/A.8.28 vs. machine-readable SBOM format)
Gaps (CRA-specific, not covered by ISO 27001):
- SBOM generation and maintenance in a standardized format
- Product conformity assessment
- CE marking process
- Vulnerability reporting to national CSIRT via Single Reporting Platform (Art. 14)
- Product-specific technical file (Annex VII)
- Support period commitment (Art. 13(8))
- Secure default configuration verification
- Product update mechanism requirements
- Coordinated vulnerability disclosure policy (Art. 13(6))
- Public vulnerability reporting contact (Art. 13(7))
How to Leverage ISO 27001 for CRA
Use Your ISMS as Foundation
If you are ISO 27001 certified, you have strong foundations to build on. The key is extending existing processes toward product obligations rather than starting from scratch.
Extend existing processes:
| ISO 27001 Process | CRA Extension |
|---|---|
| Risk Assessment (6.1) | Product risk assessment |
| Vulnerability Mgmt (A.8.8) | Product vulnerability handling + CSIRT reporting |
| Supplier Mgmt (A.5.19-22) | SBOM collection from suppliers |
| Incident Mgmt (A.5.24-26) | CSIRT reporting per Art. 14 |
| Secure Dev (A.8.25-28) | Product security testing and technical file |
New processes to add:
| New Process | Purpose |
|---|---|
| SBOM generation | Component tracking per Art. 13(5) |
| Conformity assessment | CE marking |
| Product technical file | Regulatory documentation per Annex VII |
| Support period management | Commitment per Art. 13(8) |
| ENISA reporting procedure | Vulnerability notification via national CSIRT |
| CVD policy | Coordinated disclosure per Art. 13(6) |
Practical Integration Steps
Step 1: Scope Extension
- Add product security to your ISMS scope
- Include product development in risk assessment
- Extend asset inventory to include product components
Step 2: Process Updates
- Update vulnerability procedure for product reporting to national CSIRT via the Single Reporting Platform
- Add SBOM to change management
- Include the 24h early warning, 72h initial notification, and final report cadence in your incident response process
Step 3: Documentation Additions
- Product technical files
- SBOM records
- Conformity assessment evidence
- Support period documentation
Step 4: Roles and Responsibilities
- Assign product security ownership
- Define CSIRT reporting responsibility
- Establish SBOM maintenance ownership
- Assign CVD policy ownership
ISO 27001 Annex A Controls and CRA
Most Relevant Controls
A.8.25 Secure development lifecycle
- ISO 27001: Policies for secure development
- CRA use: Foundation for product security requirements (Annex I, Part I)
A.8.26 Application security requirements
- ISO 27001: Security requirements in development
- CRA use: Basis for product essential requirements; partial foundation for SBOM component inventory
A.8.27 Secure system architecture
- ISO 27001: Secure architecture principles
- CRA use: Product security architecture
A.8.28 Secure coding
- ISO 27001: Secure coding practices including dependency tracking
- CRA use: Product code security; partial foundation for SBOM component awareness
A.8.8 Management of technical vulnerabilities
- ISO 27001: Organizational vulnerability handling
- CRA use: Extend to product vulnerabilities + reporting to national CSIRT via Single Reporting Platform (Art. 14)
A.5.19-22 Supplier relationships
- ISO 27001: Supplier security management
- CRA use: SBOM collection from suppliers, supply chain security
Control Implementation for CRA
EXTENDING ISO 27001 CONTROLS FOR CRA
A.8.8 VULNERABILITY MANAGEMENT EXTENSION:
ISO 27001 Requirement:
"Information about technical vulnerabilities of
information systems in use shall be obtained..."
CRA Extension (Art. 14):
- Monitor for vulnerabilities in YOUR PRODUCTS
- Maintain process for customer notification
- Report to national CSIRT via Single Reporting Platform:
24h early warning, 72h initial notification,
14-day final report (active exploit) or
1-month final report (severe incident)
- Track vulnerability status per product
- Generate VEX documents
A.8.25-28 SECURE DEVELOPMENT EXTENSION:
ISO 27001 Requirement:
"Rules for the development of software and systems
shall be established and applied..."
CRA Extension:
- Include SBOM generation in build process (Art. 13(5))
- Verify "secure by default" configuration
- Test product security requirements
- Document for technical file (Annex VII)
- Maintain evidence for conformity assessment
Does ISO 27001 Certification Count Toward CRA Conformity Assessment?
Does ISO 27001 Certification Cover CRA Compliance?
Critical understanding:
- ISO 27001 certification shows organizational security maturity
- CRA compliance is a per-product regulatory requirement
- Having ISO 27001 does not exempt you from CRA
- ISO 27001 auditors do not assess CRA compliance
Article 14 reporting obligations start September 11, 2026. Full compliance is required by December 11, 2027. Non-compliance carries fines up to EUR 15 million or 2.5% of global annual turnover (Art. 64).
Using ISO 27001 in CRA Context
HOW TO REFERENCE ISO 27001 IN CRA DOCUMENTATION
IN TECHNICAL FILE:
"[Company] maintains an ISO/IEC 27001:2022 certified
Information Security Management System (Certificate
No. XXX, issued by [Certification Body]).
The ISMS provides the organizational foundation for
product security, including:
- Secure development lifecycle (A.8.25-28)
- Vulnerability management process (A.8.8)
- Supplier security requirements (A.5.19-22)
Product-specific CRA compliance is documented in
this technical file, building on these ISMS controls."
WHAT THIS SHOWS:
- Security management maturity
- Process foundation exists
- Not a substitute for product evidence
Audit Synergies
ISO 27001 surveillance audit:
- Annual assessment of ISMS
- Can include product security scope
- Evidence reusable for CRA
CRA conformity assessment:
- Product-specific evaluation
- References ISMS for process evidence
- Needs additional product evidence
Synergy opportunities:
- Align audit schedules
- Reuse evidence where applicable
- Integrated management system approach
- Single documentation repository
Three Common ISO 27001 + CRA Scenarios
Scenario 1: ISO 27001 Certified, Starting CRA
Advantages you already have:
- Risk methodology exists
- Security culture established
- Documentation practices in place
- Supplier management exists
- Incident response capability
What you still need to add:
- [ ] Product classification per CRA (Annex III/IV)
- [ ] SBOM generation capability (Art. 13(5))
- [ ] CSIRT reporting process (Art. 14)
- [ ] Product technical files (Annex VII)
- [ ] Conformity assessment process
- [ ] Support period management (Art. 13(8))
- [ ] Product-specific security testing
- [ ] CVD policy (Art. 13(6))
- [ ] Public vulnerability contact (Art. 13(7))
Approach:
- Gap assessment against CRA requirements
- Extend ISMS scope to include products
- Add CRA-specific processes
- Update documentation
- Train relevant teams
Scenario 2: No ISO 27001, Approaching CRA
Option A: CRA only
- Implement CRA requirements directly
- Product-focused approach
- May miss organizational security benefits
- Faster path to CRA compliance
Option B: ISO 27001 + CRA
- Implement both frameworks
- Stronger overall security posture
- More work upfront
- Better long-term position
Recommendation: For product manufacturers, start with CRA requirements (the regulatory deadline is fixed) and build toward ISO 27001 over time. Align approaches from the beginning so work is not duplicated. See the CRA startups guide for a minimal-overhead path.
Scenario 3: Multiple Products, Central ISMS
Centralized (ISMS):
- Risk methodology
- Vulnerability handling process
- Supplier management
- Incident response
- Development standards
Per-product (CRA):
- Technical file
- SBOM
- Conformity assessment
- Product documentation
- Support period
Benefits:
- Efficient process reuse
- Consistent security approach
- Centralized expertise
- Product-specific compliance
How to Integrate CRA Into Your Existing ISMS
Governance Model
INTEGRATED GOVERNANCE MODEL
ORGANIZATIONAL LEVEL (ISO 27001):
+---------------------------------------------+
| Information Security Management System |
| |
| - Security policies |
| - Risk management framework |
| - Security organization |
| - Awareness and training |
\---------------------------------------------+
|
▼
PRODUCT LEVEL (CRA):
+---------------------------------------------+
| Product Security Compliance |
| |
| +---------+ +---------+ +---------+ |
| |Product A| |Product B| |Product C| |
| |- Tech | |- Tech | |- Tech | |
| | file | | file | | file | |
| |- SBOM | |- SBOM | |- SBOM | |
| |- DoC | |- DoC | |- DoC | |
| \---------+ \---------+ \---------+ |
\---------------------------------------------+
Documentation Structure
INTEGRATED DOCUMENTATION
ISMS DOCUMENTATION (ISO 27001):
+-- Information Security Policy
+-- Risk Assessment Procedure
+-- Statement of Applicability
+-- Secure Development Policy
+-- Vulnerability Management Procedure
+-- Incident Response Procedure
\-- Supplier Security Policy
CRA DOCUMENTATION (Per Product):
+-- Product Technical File (Annex VII)
| +-- Product description
| +-- Risk assessment
| +-- Security architecture
| +-- Test reports
| \-- SBOM
+-- EU Declaration of Conformity
+-- User Documentation
\-- Support Period Statement
CROSS-REFERENCES:
- Technical file references ISMS procedures
- ISMS procedures include CRA requirements
- Records retained for 10 years or support period,
whichever is longer (Art. 23(2))
Checklist: ISO 27001 Organization Adding CRA
Assessment:
- [ ] Review current ISMS scope
- [ ] Identify products with digital elements
- [ ] Classify products per CRA categories (Annex III/IV)
- [ ] Gap analysis: ISMS vs. CRA requirements
Scope Extension:
- [ ] Add product security to ISMS scope
- [ ] Update risk assessment to include products
- [ ] Extend Statement of Applicability
Process Additions:
- [ ] SBOM generation process (Art. 13(5))
- [ ] CSIRT reporting procedure (Art. 14)
- [ ] Conformity assessment process
- [ ] Support period management (Art. 13(8))
- [ ] Product technical file procedure (Annex VII)
- [ ] CVD policy (Art. 13(6))
- [ ] Public vulnerability contact setup (Art. 13(7))
Documentation:
- [ ] Technical file templates
- [ ] Product risk assessment template
- [ ] SBOM format and storage
- [ ] Declaration of Conformity template
Control Extensions:
- [ ] A.8.8: add product vulnerabilities and CSIRT reporting
- [ ] A.8.25-28: add product security testing
- [ ] A.5.19-22: add SBOM from suppliers
Roles:
- [ ] Assign product security owner
- [ ] Define CSIRT reporting responsibility
- [ ] Establish conformity assessment role
- [ ] Assign CVD policy owner
Training:
- [ ] CRA awareness for development teams
- [ ] SBOM tools training
- [ ] Conformity assessment training
Official ISO 27001 and CRA Resources
ISO 27001:
- ISO/IEC 27001:2022: Information security management
- ISO/IEC 27002:2022: Information security controls
CRA:
- Regulation (EU) 2024/2847: Cyber Resilience Act
- ENISA CRA requirements standards mapping (November 2024)
Complementary standards:
- ISO/IEC 27034: Application security (bridges ISMS and product security)
- IEC 62443: Industrial security (strong fit for OT/IoT manufacturers; strong candidate for CRA harmonized standard)
- ISO/SAE 21434: Automotive security
Important: ISO 27001 certification does NOT equal CRA compliance. ISO 27001 covers organizational information security; CRA requires product-specific conformity assessment.
Tip: Map your existing Annex A controls to CRA Annex I requirements to identify gaps. Start with A.8.8, A.8.25-28, and A.5.19-22.
Frequently Asked Questions
Does ISO 27001 certification exempt a company from CRA conformity assessment?
No. ISO 27001 certification demonstrates organisational information security maturity but does not constitute CRA conformity assessment. CRA requires per-product evidence: SBOM, technical file, Declaration of Conformity, and where applicable, a Notified Body assessment. A certifier auditing your ISMS is not assessing CRA compliance. See CRA conformity assessment routes.
Which ISO 27001 Annex A controls are most directly relevant to CRA Annex I?
The highest-overlap controls are A.8.25-28 (secure development lifecycle), A.8.8 (technical vulnerability management), and A.5.19-22 (supplier relationships). These map to CRA's secure-by-design requirement, vulnerability handling obligation, and SBOM supply chain provisions. A.8.8 needs extension to cover product vulnerability reporting to the national CSIRT via the ENISA Single Reporting Platform (Article 14).
Can ISO 27001 audit evidence be reused in a CRA technical file?
Yes, selectively. Evidence from your ISMS covering secure development (A.8.25-28), vulnerability management (A.8.8), and supplier controls (A.5.19-22) can be referenced in the CRA technical file. However, the technical file also requires product-specific evidence, including security architecture, test reports, SBOM, and support period documentation, that ISO 27001 audits do not generate.
Is ISO 27001:2022 better aligned with CRA than ISO 27001:2013?
Yes. ISO 27001:2022 added controls more relevant to CRA, particularly A.8.25-28 (secure development lifecycle, application security requirements, secure architecture, secure coding). The 2013 version had weaker coverage of these areas. If you are using 2013, a gap analysis against the 2022 controls is worth running specifically for CRA purposes.
Does ISO 27001 cover the CRA SBOM requirement?
Partially. A.8.26 (application security requirements) and A.8.28 (secure coding) include component awareness and dependency tracking concepts. However, ISO 27001 does not require a machine-readable SBOM in CycloneDX or SPDX format with NTIA minimum elements, which is what CRA Article 13(5) requires. The organisational awareness is a foundation, not a substitute.
Can CRA compliance work be integrated with an ongoing ISO 27001 programme?
Yes, and it is the recommended approach for companies already certified. Extend the ISMS scope to include product security, add product-specific procedures for SBOM and CSIRT reporting, and reference ISMS evidence in your CRA technical files. The key is to add rather than duplicate: CRA evidence lives in technical files, not in the ISMS statement of applicability.
Next Steps
- Run a gap analysis of your ISMS Annex A controls against CRA Annex I. Start with A.8.8, A.8.25-28, and A.5.19-22. These carry most of the weight.
- Classify each product under Annex III and IV. The conformity assessment route depends on this, not on your ISO 27001 certification status.
- Extend your ISMS scope statement to include product security. Update the Statement of Applicability so product obligations are visible to auditors.
- Add SBOM generation (Art. 13(5)) to your change management process. CycloneDX or SPDX, machine-readable, tied to each release.
- Create or update the CSIRT reporting procedure for Article 14: 24h early warning, 72h initial notification, final report within 14 days or 1 month depending on incident type.
- Assign a product security owner and a CVD policy owner (Art. 13(6)/(7)). These cannot be the same ambiguous "security team" slot.
- Schedule a combined internal audit covering both ISO 27001 surveillance and CRA technical file readiness. Reuse evidence where it applies.
Check CRA conformity assessment routes to confirm which module applies to each product. See the CRA implementation timeline for the September 2026 and December 2027 deadlines.
This article is for informational purposes only and does not constitute legal advice. For specific compliance guidance, consult with qualified legal counsel.
Related Articles
ECSMAF v3.0 Explained: How ENISA Maps the EU Cybersecurity Market
Does the CRA apply to your product?
Answer 6 simple questions to find out if your product falls under the EU Cyber Resilience Act scope. Get your result in under 2 minutes.
Ready to achieve CRA compliance?
Start managing your SBOMs and compliance documentation with CRA Evidence.