Cyber Resilience Act (CRA)
ISO/IEC 27001
Cyber Resilience Act vs. ISO 27001
Legal obligation and international standard working together
Legal obligation: Defines cybersecurity requirements for products — regardless of whether the manufacturer operates an ISMS
Certifiable standard: Defines how an organization systematically manages information security — says nothing about product security
ISO 27001 is not a substitute for the CRA. A certified ISMS demonstrates organizational maturity but does not fulfill a single CRA product requirement from Annex I.
You have ISO 27001 — what else do you need for CRA?
An ISO 27001 certification gives you a strong methodological foundation. But the CRA imposes product-specific requirements that go beyond an ISMS. This gap analysis shows where your existing certification helps — and where you need to do additional work.
Security awareness & trainingPartial
ISO 27001 Section 7.2/7.3 and A.7.2.2 establish training programs. The CRA requires specific knowledge of product security, secure development, and vulnerability handling — not just organizational awareness.
Risk assessment methodologyPartial
ISO 27001 Section 6.1 provides a proven risk methodology. The CRA requires a product-specific cyber risk assessment (Art. 13(2)) — your existing methodology must be extended with product threat scenarios.
Documentation disciplinePartial
ISO 27001 Section 7.5 establishes systematic documentation. The CRA requires extensive technical product documentation (Annex VII) — your documentation culture is an advantage, but the content must be extended to product specifics.
Product security requirements (vs. organizational)Not covered
ISO 27001 secures the organization. CRA Annex I requires concrete technical security properties in the product itself: protection against unauthorized access, data integrity, secure default configuration.
SBOM obligationNot covered
ISO 27001 has no requirement for Software Bills of Materials. The CRA requires a machine-readable SBOM for every product (Annex I Part II in conjunction with Art. 13).
ENISA vulnerability reporting (24h/72h)Not covered
ISO 27001 A.16 governs internal incident management. The CRA requires reporting actively exploited vulnerabilities to ENISA within 24/72 hours — an entirely new external reporting process.
CE marking & EU Declaration of ConformityNot covered
ISO 27001 has no equivalent to CE marking. The CRA requires a formal conformity assessment (Annex VIII) and an EU Declaration of Conformity as a market access prerequisite.
Product support periodNot covered
ISO 27001 has no product support obligation. The CRA obliges manufacturers to define a support period (minimum 5 years) and provide free security updates.
Product-specific vulnerability handlingNot covered
ISO 27001 A.12.6 governs patch management for own systems. The CRA requires vulnerability handling for distributed products throughout their entire lifecycle.
Product Security vs. Management System
The CRA asks: What does the product do? ISO 27001 asks: How does the organization manage information security? An ISMS can look excellent on paper without a single product being secure.
- CRA (Annex I): Technical and measurable — access control, data integrity, availability, secure defaults, attack surface minimization
- ISO 27001: Organizational — policies, roles, risk assessment, PDCA improvement cycle
- CRA closes the gap: Security must be embedded in the product itself, not just in management processes
ISO 27001 as a Basis for Harmonized CRA Standards
CEN, CENELEC, and ETSI are developing harmonized CRA standards expected to build on the ISO 27000 family. ISO 27001-certified companies have a favorable starting position — but existing processes alone are not sufficient.
- Foundation: ISO 27001 (ISMS), ISO 27002 (controls), ISO 27036 (supply chain) as basis for CRA hENs
- Reusable: Risk management, access control, incident management as starting points
- Additionally required: SBOM creation, vulnerability handling across the product lifecycle, security updates
Gap Analysis: What ISO 27001 Does Not Cover
The CRA demands concrete technical product properties that go beyond management processes. Several CRA obligations have no equivalent in ISO 27001.
- SBOM (Annex I Part II): Machine-readable Software Bill of Materials for every product — not part of an ISMS
- Vulnerability handling (Art. 13(6)): Documented policy and security updates throughout the entire support period
- Conformity assessment (Annex VIII): Modules A, B+C, and H — CRA-specific procedures with no ISO 27001 equivalent
- CE marking and Annex II information: Regulatory product marking far beyond ISMS scope
Strategic Positioning: ISO 27001 + CRA
ISO 27001 certification is a valuable building block, but not a substitute for CRA compliance. The optimal strategy: purposefully extend the existing ISMS with CRA-specific processes.
- SBOM management — integrate into the software development lifecycle
- Risk management — extend to product-related cyber risks
- Vulnerability handling — establish CRA-compliant processes (Art. 13(6))
- ENISA reporting — integrate into incident response processes
Synergies Between the CRA and ISO 27001
Companies with existing ISO 27001 certification can reuse numerous processes and structures for CRA compliance.
Risk Management Methodology
The risk-based methodology per ISO 27001 Section 6.1 provides a proven framework for the CRA cyber risk assessment pursuant to Art. 13(2). The assessment merely needs to be extended with product-specific threat scenarios.
Documentation Culture
ISO 27001 establishes a systematic documentation culture (Section 7.5). The CRA requires extensive technical documentation (Art. 31, Annex VII). Existing documentation processes significantly accelerate CRA compliance.
Internal Audits and Management Review
The ISO 27001 audit structures (Sections 9.2/9.3) can be extended to integrate CRA conformity checks. This creates a unified assurance framework.
Supplier Evaluation
ISO 27001 Annex A.15 addresses information security in supplier relationships. This complements the CRA requirement for due diligence regarding third-party components (Art. 13(5)) and can serve as a process foundation.
Your Next Steps
Shift focus from organization to product
Extend your ISMS with product-specific security requirements. Define CRA Annex I requirements for each product and integrate them into your development process.
Implement SBOM processes
Integrate automated SBOM generation into your CI/CD pipeline. Use CycloneDX or SPDX and establish continuous dependency monitoring.
Set up ENISA reporting process
Extend your existing incident response process with the CRA-specific reporting channel to ENISA. Define trigger criteria, responsibilities, and deadlines.
Prepare conformity assessment
Leverage your existing audit experience and documentation culture to prepare the CRA conformity assessment per Annex VIII.
Frequently Asked Questions
Does ISO 27001 certification replace CRA compliance?
Can ISO 27001 facilitate CRA compliance?
Will ISO 27001 be referenced in harmonized CRA standards?
What are the biggest gaps between ISO 27001 and the CRA?
How should ISO 27001-certified companies approach CRA compliance?
Is ISO 27001 the better choice for non-CRA-obligated companies?
What is the current status of harmonized standards for the CRA?
Which products are exempt from the CRA?
Further Reading
Official Sources
More on Kunnus
Complete legal text with explanations, articles, and annexes of the Cyber Resilience Act
Accessible introduction to the Cyber Resilience Act for decision-makers and product managers
SBOM management, vulnerability monitoring, and compliance documentation in one platform
Free initial assessment: Determine your CRA maturity level and identify action items
Comparison of CRA and IEC 62443 for manufacturers of industrial automation systems
Product security vs. organizational security: The two pillars of EU cybersecurity compared
From ISO 27001 to CRA Compliance — systematic and efficient
Kunnus helps you bridge the gap between your existing ISMS and CRA requirements. Start with a free gap analysis.