Cyber Resilience Act (CRA)
Digital Operational Resilience Act (DORA)
CRA vs. DORA
Product security meets digital financial resilience
Applies to the manufacturer: How securely is the product built and maintained?
Applies to the financial entity: How resilient is the organization against ICT risks?
CRA and DORA are complementary, not interchangeable. Software manufacturers for the financial sector may be subject to both frameworks simultaneously.
You comply with DORA — what else do you need for your products?
DORA strengthens your organization's operational resilience in the financial sector. The CRA addresses the security of your products — a fundamental perspective shift from organization to product.
ICT risk management awarenessPartial
DORA Art. 5-16 establish comprehensive ICT risk management at entity level. The CRA additionally requires a product-specific cyber risk assessment per Art. 13(2).
Incident reporting processesPartial
DORA reporting processes to financial supervisory authorities exist. The CRA requires reporting to ENISA — different triggers (product vulnerabilities vs. operational incidents), different platform.
Third-party risk assessmentPartial
DORA Art. 28-30 govern ICT third-party risks at contract level. The CRA requires product-side due diligence for third-party components and SBOM transparency.
Product-level security requirementsNot covered
DORA is organization-focused. The CRA requires concrete technical security properties in the product itself: security by design, access control, data integrity per Annex I.
Product SBOMNot covered
DORA has no SBOM obligation. The CRA requires a machine-readable Software Bill of Materials for every product with digital elements.
Product vulnerability handlingNot covered
DORA governs organizational ICT risk management. The CRA requires documented vulnerability handling for each product throughout the entire support period.
CE markingNot covered
DORA has no product marking. The CRA requires CE marking as a market access prerequisite after successful conformity assessment.
Product technical documentationNot covered
DORA focuses on ICT governance documentation. The CRA requires comprehensive product-specific technical documentation per Annex VII.
Product support periodNot covered
DORA has no product support obligation. The CRA obliges manufacturers to define a support period and provide free security updates.
Complementary Regulatory Approaches
The CRA regulates the supply side (secure products), DORA the demand side in the financial sector (resilient ICT systems). This complementarity is intentional.
- CRA: Manufacturers must place secure products on the market (security by design, SBOM, vulnerability handling)
- DORA: Financial institutions must operate ICT systems resiliently (Art. 5-16)
- Bridge: CRA-compliant products serve as evidence of supply chain security under DORA Art. 28
Overlap Area: ICT Third-Party Providers
ICT third-party providers serving financial institutions may be subject to both frameworks: as manufacturers under the CRA and as ICT third-party providers under DORA.
- CRA obligations: Annex I requirements, SBOM, ENISA reporting (24h)
- DORA obligations (Art. 28-30): Contractual requirements, audit access rights, incident reporting support, exit strategies
- Efficiency: CRA documentation (SBOMs, risk assessments) directly usable for DORA contractual requirements
Incident Reporting Compared
Both regulations require incident reporting, but with different triggers and addressees. A single incident can trigger both reporting obligations.
- CRA (Art. 14): Manufacturer reports product vulnerabilities to ENISA — 24h early warning, 72h full notification
- DORA (Art. 19): Financial entity reports ICT incidents to supervisory authority — initial notification, intermediate report, final report
- Dual reporting: Manufacturer to ENISA + financial institution to supervisory authority for the same incident
Strategic Recommendations
CRA compliance forms the foundation upon which DORA-relevant evidence can be built. The strategy depends on your role.
- Software manufacturers: CRA compliance as the basis — document SBOM, vulnerability handling, and security by design for DORA due diligence
- Financial institutions: CRA conformity as procurement criterion — CE marking and SBOM simplify DORA third-party risk management
- ICT third-party providers: Assess early whether CRA and DORA Art. 31 (critical designation by ESAs) apply
Synergies Between CRA and DORA
CRA and DORA complement each other as complementary regulations — an integrated implementation offers significant efficiency gains.
Documentation as a Bridge
CRA documentation (SBOMs, risk assessments, vulnerability reports) can be directly used for DORA due diligence reviews.
Supply Chain Security
CRA-compliant products facilitate financial institutions' compliance with DORA ICT third-party risk management requirements.
Coordinated Reporting
In the event of security incidents, CRA reporting to ENISA and DORA reporting to supervisory authorities can be triggered in parallel.
Your Next Steps
Shift perspective from organization to product
Complement your DORA ICT risk management with product-specific security requirements. Define CRA Annex I requirements for each product.
Implement product-level security measures
Implement security by design, access control, and secure default configuration in your software products — not just in your IT infrastructure.
Create SBOM
Integrate automated SBOM generation into your development process. SBOM transparency simultaneously supports your DORA third-party evidence.
Build CRA conformity documentation
Create product-specific technical documentation per CRA Annex VII — security architecture, risk assessment, test reports.
Frequently Asked Questions
Do software vendors serving financial institutions fall under DORA or the CRA?
How does CRA compliance facilitate DORA implementation for financial institutions?
What is a critical ICT third-party provider under DORA and how does it differ from the CRA?
Must DORA resilience tests be conducted for all software products used?
What are the deadlines for incident reporting under CRA and DORA?
Can a unified risk management framework cover both regulations?
Which products are exempt from the CRA?
Further Reading
Official Sources
Official regulation text of the Cyber Resilience Act on EUR-Lex
Official regulation text of the Digital Operational Resilience Act
European Securities and Markets Authority overview of DORA, including Regulatory Technical Standards
More on Kunnus
Full regulation text and commentary on the CRA
Overview of the Cyber Resilience Act for decision-makers
CRA compliance solution for software and SaaS manufacturers in the financial sector
Free initial assessment of your CRA compliance status
Product security vs. organizational security: The two pillars of EU cybersecurity
How the voluntary ISO standard and the binding EU regulation complement each other
Unify CRA and DORA Compliance
Kunnus helps software manufacturers in the financial sector efficiently implement CRA requirements — while simultaneously providing DORA-relevant documentation for their financial customers.