SBOM Requirements Under the EU Cyber Resilience Act: A Practical Guide
Understanding what the CRA requires for Software Bills of Materials and how to implement compliant SBOM practices.
In this article
The Software Bill of Materials (SBOM) has become a cornerstone of modern software supply chain security. Under the EU Cyber Resilience Act (CRA), SBOMs are not just a best practice; they're a regulatory requirement. This guide explains what manufacturers need to know about SBOM compliance under the CRA.
Summary
- SBOMs are mandatory under the CRA — every product with digital elements needs one
- Accepted formats: CycloneDX (security-focused) or SPDX (license-focused)
- Must include all dependencies (direct and transitive), not just top-level components
- BSI TR-03183 sets the quality benchmark — use it as your compliance target
- Automate SBOM generation in CI/CD — manual processes won't scale
- SBOMs must be maintained for the entire support period (minimum 5 years)
Important: SBOMs are mandatory under the CRA, not optional. Every product with digital elements placed on the EU market must have a machine-readable SBOM.
What the CRA Says About SBOMs
The CRA references SBOMs in several key areas:
Annex I: Essential Requirements
"Manufacturers shall identify and document vulnerabilities and components contained in products, including by drawing up a software bill of materials in a commonly used and machine-readable format."
This means:
- SBOMs are mandatory, not optional
- They must be in machine-readable format (not PDFs or spreadsheets)
- They must cover all components, including transitive dependencies
Annex VII: Technical Documentation
The technical file must include SBOM information that enables:
- Component-level vulnerability tracking
- Supplier identification
- License compliance verification
- End-of-life planning
Accepted SBOM Formats
The CRA requires "commonly used and machine-readable" formats. In practice, this means:
| Format | Standard | Best For |
|---|---|---|
| CycloneDX | OWASP | Security-focused, VEX support |
| SPDX | Linux Foundation | License compliance, broader adoption |
Both formats are accepted, but CycloneDX is increasingly preferred for security use cases due to its native support for:
- Vulnerability Exploitability eXchange (VEX)
- Security advisories
- Dependency graphs
BSI TR-03183: The German Standard
Germany's Federal Office for Information Security (BSI) has published TR-03183, which provides detailed SBOM quality requirements that go beyond the CRA minimum. Key requirements include:
Mandatory Fields
- Component name and version
- Supplier/manufacturer information
- Unique identifiers (PURL, CPE)
- Dependency relationships
- License information
Quality Indicators
TR-03183 defines quality levels:
| Level | Description |
|---|---|
| Basic | Minimum fields populated |
| Standard | All recommended fields |
| Comprehensive | Full dependency tree, hash verification |
While TR-03183 is a German standard, it's becoming the de facto quality benchmark for CRA compliance across the EU.
Common SBOM Mistakes to Avoid
Tip: Use CycloneDX for security-focused use cases (native VEX support) or SPDX for license compliance. Both formats are accepted under the CRA.
1. Incomplete Dependency Trees
Many tools only capture direct dependencies. The CRA requires transitive dependencies, meaning components that your dependencies depend on.
Your Product
├── Library A (direct) ✓
│ ├── Library B (transitive) ← Often missing!
│ └── Library C (transitive) ← Often missing!
└── Library D (direct) ✓
2. Missing Version Information
An SBOM without accurate version information is nearly useless for vulnerability matching. Ensure every component has:
- Exact version numbers (not ranges)
- Hash values for binary components
- PURL identifiers where possible
3. Stale SBOMs
An SBOM generated at build time but never updated creates a false sense of security. Implement:
- CI/CD integration for automatic SBOM generation
- Version control for SBOM artifacts
- Regular drift detection between builds
4. Ignoring Firmware and Hardware
For products with embedded components, remember to include:
- Firmware versions and components
- Hardware Bill of Materials (HBOM) where applicable
- Bootloader and kernel components
SBOM Lifecycle Management
Warning: An SBOM generated once at build time is not sufficient. The CRA requires ongoing SBOM maintenance — update your SBOM with every product release.
A compliant SBOM practice requires ongoing management:
Generation
Source Code → Build System → SBOM Generation → Validation
Integrate SBOM generation into your CI/CD pipeline using tools like:
- Syft (CycloneDX/SPDX)
- Trivy (CycloneDX)
- cdxgen (CycloneDX)
Validation
Before publishing, validate your SBOM:
- Schema compliance (valid CycloneDX/SPDX)
- Completeness (all components included)
- Accuracy (versions match reality)
Storage and Access
SBOMs should be:
- Stored securely with access controls
- Retained for the product support period (minimum 5 years under CRA)
- Accessible for conformity assessment
- Available to downstream customers (for B2B products)
Continuous Monitoring
Link your SBOM to vulnerability databases:
- NVD (National Vulnerability Database)
- OSV (Open Source Vulnerabilities)
- GitHub Advisory Database
- CISA KEV (Known Exploited Vulnerabilities)
Practical Steps to Get Started
-
Audit your current state: Do you generate SBOMs today? What format? What coverage?
-
Choose your format: CycloneDX for security focus, SPDX for license compliance (or both)
-
Automate generation: Integrate into CI/CD, not manual processes
-
Validate quality: Check against TR-03183 requirements
-
Implement monitoring: Link SBOMs to vulnerability scanning
-
Plan for updates: Establish processes for SBOM maintenance
How CRA Evidence Helps
CRA Evidence provides comprehensive SBOM management:
- Upload & Validation: Support for CycloneDX and SPDX with TR-03183 quality scoring
- Vulnerability Scanning: Automatic matching against NVD, OSV, and other databases
- Version Tracking: SBOM history and drift detection across product versions
- Export: Include validated SBOMs in your Annex VII technical file
Getting your SBOM practice right is foundational to CRA compliance. Start building these capabilities now to be ready for the 2027 deadline.
Related Guides
Generation: Learn how to automate SBOM creation in our SBOM generation guide.
Quality: Understand SBOM quality requirements in our BSI TR-03183 guide.
VEX: Pair your SBOM with vulnerability data using VEX documents.
Technical File: See how SBOMs fit into the CRA technical file (Annex VII).
This article is for informational purposes only and does not constitute legal advice. For specific compliance guidance, consult with qualified legal counsel.
Related Articles
Are Smart Cameras Important Products Under the EU Cyber...
Smart security cameras are classified as Important Products (Class I) under...
9 minEU Cybersecurity Act 2: Supply Chain Bans, Certification...
On January 20, 2026, the EU proposed replacing the Cybersecurity Act...
10 minCRA Product Classification: Is Your Product Default,...
A practical guide to determining your product's CRA category. Includes...
11 minDoes the CRA apply to your product?
Answer 6 simple questions to find out if your product falls under the EU Cyber Resilience Act scope. Get your result in under 2 minutes.
Ready to achieve CRA compliance?
Start managing your SBOMs and compliance documentation with CRA Evidence.