CRA and NIS2: Where Cybersecurity Regulations Overlap for Product Companies
Understanding how CRA and NIS2 interact. A practical guide for organizations that manufacture products and operate critical services.
In this article
You manufacture IoT devices for the energy sector. You're subject to both NIS2 (as an operator of essential services) and CRA (as a product manufacturer). Two regulations, overlapping requirements, one compliance budget.
This guide explains how CRA and NIS2 interact and how to manage compliance with both.
Summary
- CRA regulates products; NIS2 regulates organizations/services
- Many companies face both: manufacturers who are also essential/important entities
- Key overlaps: vulnerability management, incident reporting, supply chain security
- Different scopes: CRA = product lifecycle; NIS2 = organizational cybersecurity
- Coordination opportunity: Unified security processes serving both regulations
CRA vs NIS2: Fundamental Difference
CRA: Product Regulation
What it regulates: Products with digital elements placed on the EU market
Who it applies to: Manufacturers, importers, distributors of products with digital elements
Focus: Product security throughout lifecycle
- Secure design and development
- Vulnerability handling for products
- Security updates for products
- Product-level incident reporting
NIS2: Organizational Regulation
What it regulates: Cybersecurity of essential and important entities
Who it applies to: Organizations in specified sectors meeting size thresholds
Focus: Organizational cybersecurity
- Governance and risk management
- Incident handling for services
- Supply chain security
- Business continuity
The Overlap Zone
┌─────────────────────────────────────────────────────────────┐
│ YOUR ORGANIZATION │
│ │
│ ┌──────────────────────┐ ┌──────────────────────┐ │
│ │ NIS2 SCOPE │ │ CRA SCOPE │ │
│ │ │ │ │ │
│ │ - Your IT systems │ │ - Products you │ │
│ │ - Your services │ │ manufacture │ │
│ │ - Your operations │ │ - Products you │ │
│ │ - Your supply chain │ │ import │ │
│ │ (as procurer) │ │ - Products you │ │
│ │ │ │ distribute │ │
│ │ ┌─────────────┴────┴───────────┐ │ │
│ │ │ OVERLAP │ │ │
│ │ │ │ │ │
│ │ │ - Vulnerability management │ │ │
│ │ │ - Incident reporting │ │ │
│ │ │ - Supply chain security │ │ │
│ │ │ - Security governance │ │ │
│ │ └──────────────────────────────┘ │ │
│ └──────────────────────┘ └──────────────────────┘ │
└─────────────────────────────────────────────────────────────┘
Who Faces Both Regulations?
Scenario 1: Essential Entity That Manufactures Products
Example: Energy company that manufactures smart grid components
- NIS2 applies: Energy sector entity above threshold
- CRA applies: Manufacturer of products with digital elements
Both regulations require:
- Cybersecurity risk management
- Vulnerability handling
- Incident reporting (to different bodies, different triggers)
- Supply chain security
Scenario 2: Important Entity That Manufactures IoT
Example: Manufacturing company that makes industrial IoT sensors
- NIS2 applies: Manufacturing sector entity above threshold
- CRA applies: Manufacturer of products with digital elements
Scenario 3: Digital Infrastructure Provider
Example: Cloud provider that also sells hardware appliances
- NIS2 applies: Digital infrastructure provider
- CRA applies: Manufacturer of hardware products
Scenario 4: Healthcare Product Manufacturer
Example: Medical device adjacent company (not MDR-covered devices)
- NIS2 applies: Healthcare sector entity
- CRA applies: Products not covered by MDR exclusion
Overlapping Requirements
Vulnerability Management
| Aspect | CRA Requirement | NIS2 Requirement |
|---|---|---|
| Scope | Product vulnerabilities | Organizational systems |
| Discovery | Monitor product vulnerabilities | Monitor all systems |
| Response | Patch products without delay | Remediate vulnerabilities |
| Reporting | ENISA (if exploited) | National CSIRT (if incident) |
Coordination opportunity: Unified vulnerability management program covering both products and organizational systems.
Incident Reporting
| Aspect | CRA Requirement | NIS2 Requirement |
|---|---|---|
| Trigger | Actively exploited vuln in product | Significant incident affecting services |
| Timeline | 24h → 72h → 14/30d | 24h → 72h → 1 month |
| Recipient | ENISA + national CSIRT | National competent authority/CSIRT |
| Scope | Product security | Service availability/integrity |
Key distinction: A vulnerability in your product might trigger CRA reporting even if your services aren't affected. A service outage might trigger NIS2 reporting even if no product vulnerability exists.
Supply Chain Security
| Aspect | CRA Requirement | NIS2 Requirement |
|---|---|---|
| Focus | Components in your products | Suppliers to your organization |
| Assessment | Technical due diligence | Supplier security assessment |
| Monitoring | SBOM, vulnerability tracking | Ongoing supplier risk management |
Coordination opportunity: Integrated supplier management covering both product components and organizational suppliers.
Reporting Comparison
CRA Reporting Path
PRODUCT VULNERABILITY (actively exploited)
│
▼
24-HOUR EARLY WARNING
To: ENISA Single Reporting Platform
│
▼
72-HOUR DETAILED NOTIFICATION
To: ENISA + relevant CSIRTs
│
▼
14-DAY FINAL REPORT (vulnerability)
30-DAY FINAL REPORT (incident)
NIS2 Reporting Path
SIGNIFICANT INCIDENT (affecting services)
│
▼
24-HOUR EARLY WARNING
To: National competent authority or CSIRT
│
▼
72-HOUR INCIDENT NOTIFICATION
To: National competent authority or CSIRT
│
▼
1-MONTH FINAL REPORT
To: National competent authority or CSIRT
When Both Apply
A single event could trigger both:
Example: Zero-day in your product is actively exploited, affecting customers who are essential entities (like energy companies using your smart grid equipment).
CRA reporting: You report the actively exploited vulnerability (you're the manufacturer)
NIS2 reporting: Your affected customers may report the incident (they're the essential entities)
Your internal reporting: If you're also an essential entity using your own products, you might report under both
Harmonization Opportunities
Unified Security Governance
Instead of separate CRA and NIS2 compliance programs:
UNIFIED CYBERSECURITY GOVERNANCE
Board Level:
- Single cybersecurity risk oversight
- Combined reporting to management
Operational Level:
- One vulnerability management program
├── Product vulnerabilities (CRA focus)
└── System vulnerabilities (NIS2 focus)
- One incident response capability
├── Product incidents (CRA reporting)
└── Service incidents (NIS2 reporting)
- One supply chain security program
├── Product components (SBOM, CRA)
└── Service suppliers (NIS2)
Process Mapping
| Process | CRA Application | NIS2 Application |
|---|---|---|
| Risk assessment | Product risk assessment | Organizational risk management |
| Vulnerability scanning | Product/component scanning | Infrastructure scanning |
| Patch management | Product updates | System patches |
| Incident response | Product incident handling | Service incident handling |
| Security testing | Product security testing | Penetration testing |
| Awareness training | Secure development training | General security awareness |
Documentation Efficiency
Some documentation can serve both:
| Document | CRA Use | NIS2 Use |
|---|---|---|
| Security policy | Product security policy section | Organizational security policy |
| Risk register | Product risks | Organizational risks |
| Incident response plan | Product incident procedures | Service incident procedures |
| Supplier assessment | Component supplier due diligence | Service supplier assessment |
Different Enforcement
CRA Enforcement
- Market surveillance authorities monitor products
- Focus on product compliance
- Penalties up to €15M or 2.5% global turnover
- Product withdrawal/recall possible
NIS2 Enforcement
- National competent authorities supervise entities
- Focus on organizational compliance
- Penalties up to €10M or 2% global turnover
- Personal liability for management possible
Double Jeopardy?
A single failing could theoretically trigger enforcement under both:
Example: Poor vulnerability management leads to unpatched product AND unpatched internal systems.
- CRA: Non-compliance with vulnerability handling requirements
- NIS2: Non-compliance with risk management measures
In practice: Regulators should coordinate. Demonstrating unified compliance helps.
Compliance Timeline Interaction
NIS2 Timeline
- October 2024: NIS2 transposition deadline
- 2024-2025: Member state implementation
- Ongoing: Compliance required
CRA Timeline
- September 2026: Reporting obligations begin
- December 2027: Full compliance required
- Ongoing: Product lifecycle obligations
Coordinated Approach
2024 2025 2026 2027
│ │ │ │
▼ ▼ ▼ ▼
┌───────────────────────────────────────────────────────────────────────┐
│ NIS2: Organizational compliance required throughout │
└───────────────────────────────────────────────────────────────────────┘
│ │
▼ ▼
┌───────────────────────────────┐
│ CRA: Reporting │ CRA: Full │
└───────────────────────────────┘
RECOMMENDATION:
Build unified cybersecurity program now that serves both.
Don't build separate NIS2 and CRA compliance programs.
Practical Coordination Checklist
Governance Integration
DUAL-REGULATION GOVERNANCE CHECKLIST
ORGANIZATIONAL:
[ ] Single cybersecurity governance structure
[ ] Board-level oversight covers both product and service security
[ ] Combined cybersecurity strategy
[ ] Unified budget allocation
RISK MANAGEMENT:
[ ] Integrated risk assessment (products + services)
[ ] Combined risk register
[ ] Unified risk treatment process
[ ] Single risk reporting framework
VULNERABILITY MANAGEMENT:
[ ] One vulnerability intake channel
[ ] Combined triage process
[ ] Integrated remediation workflow
[ ] Unified metrics and reporting
INCIDENT RESPONSE:
[ ] Combined incident response plan
[ ] Clear routing for CRA vs NIS2 reporting
[ ] Integrated communication procedures
[ ] Unified post-incident review
Reporting Integration
DUAL-REGULATION REPORTING MATRIX
Event Type Report Under
─────────────────────────────────────────────────────────────
Product vuln (not exploited) Neither (CVD process only)
Product vuln (exploited) CRA → ENISA
Service incident (no product) NIS2 → National authority
Both (product vuln → service) Both (coordinate)
─────────────────────────────────────────────────────────────
Internal Escalation:
1. Security team assesses event
2. Determine: Product impact? Service impact?
3. Route to appropriate reporting path(s)
4. Coordinate if both apply
Supply Chain Integration
UNIFIED SUPPLY CHAIN SECURITY
For Product Components (CRA focus):
- SBOM maintained
- Component vulnerability monitoring
- Supplier security questionnaire
- Technical due diligence
For Service Suppliers (NIS2 focus):
- Supplier risk assessment
- Security requirements in contracts
- Ongoing monitoring
- Incident notification clauses
INTEGRATED APPROACH:
- Single supplier management system
- Combined risk assessment framework
- Unified contract security requirements
- Coordinated monitoring program
Special Considerations
Industrial Control Systems
IACS (Industrial Automation and Control Systems) face particular complexity:
- CRA: If you manufacture IACS for essential entities (NIS2), it's Important Class II
- NIS2: If you operate IACS as an essential entity, they're in scope
Double requirement: Product must meet CRA; operation must meet NIS2.
Cloud Services + Products
Cloud providers selling hardware appliances:
- NIS2: Cloud service operations
- CRA: Hardware appliances sold
Example: A cloud provider's firewall appliance must comply with CRA; their cloud service operations must comply with NIS2.
Healthcare Adjacent
Medical device manufacturers might have:
- Some products under MDR (excluded from CRA)
- Some products under CRA (not MDR-covered)
- Organization under NIS2 (healthcare sector entity)
Careful scoping required: Map each product to applicable regulation.
Common Questions
Do I report the same incident twice?
Not usually. CRA and NIS2 have different triggers:
- CRA: Actively exploited vulnerability in your product
- NIS2: Significant incident affecting your services
If an exploited product vulnerability causes a service incident, you may need to report under both, but the reports go to different recipients and focus on different aspects.
Can NIS2 compliance cover CRA requirements?
Partially. Strong NIS2 compliance demonstrates:
- Security governance capability
- Vulnerability management maturity
- Incident response capability
But CRA has product-specific requirements (SBOM, conformity assessment, CE marking) that NIS2 doesn't cover.
Can CRA compliance cover NIS2 requirements?
No. CRA is product-focused. NIS2 requires:
- Organizational risk management
- Business continuity
- Supply chain security (broader than product components)
- Governance measures
Which is more demanding?
Different scope, different demands:
| Aspect | CRA | NIS2 |
|---|---|---|
| Documentation | Technical file per product | Organizational policies |
| Assessment | Conformity assessment | Risk management |
| Ongoing | Product support (5+ years) | Continuous compliance |
| Reporting | Product-focused | Service-focused |
Neither is strictly "more demanding." They're demanding different things.
Important: CRA applies to PRODUCTS. NIS2 applies to ORGANIZATIONS operating essential/important services. A company can be subject to BOTH regulations.
Tip: If you're already working on NIS2 compliance, leverage your incident response and supply chain security measures for CRA.
Related guides:
- EU Cyber Resilience Act: Complete Implementation Timeline 2025-2027
- CRA Penalties in Practice: What Market Surveillance Actually Looks Like
How CRA Evidence Helps
CRA Evidence supports organizations facing both regulations:
- Product focus: Full CRA compliance capabilities
- Integration ready: Vulnerability management data exportable
- SBOM management: Serves CRA directly, supports NIS2 supply chain
- Incident tracking: Can route to appropriate reporting paths
- Documentation: Centralized for regulatory requests
Manage your product compliance at app.craevidence.com.
This article is for informational purposes only and does not constitute legal advice. For specific compliance guidance, consult with qualified legal counsel.
Topics covered in this article
Related Articles
Are Smart Cameras Important Products Under the EU Cyber...
Smart security cameras are classified as Important Products (Class I) under...
9 minEU Cybersecurity Act 2: Supply Chain Bans, Certification...
On January 20, 2026, the EU proposed replacing the Cybersecurity Act...
10 minCRA Product Classification: Is Your Product Default,...
A practical guide to determining your product's CRA category. Includes...
11 minDoes the CRA apply to your product?
Answer 6 simple questions to find out if your product falls under the EU Cyber Resilience Act scope. Get your result in under 2 minutes.
Ready to achieve CRA compliance?
Start managing your SBOMs and compliance documentation with CRA Evidence.