Cyber Resilience Act (CRA)
NIS 2 Directive
Cyber Resilience Act vs. NIS 2 Directive
Two pillars of the EU cybersecurity strategy compared side by side
Governs what a product with digital elements must be capable of before being placed on the EU market
Governs how organizations in critical sectors must manage their cybersecurity
NIS 2 compliance does not replace CRA conformity. Both frameworks address entirely different obligations. Many companies are subject to both simultaneously.
You comply with NIS 2 — what else do you need for CRA?
NIS 2 compliance provides a solid organizational foundation. However, CRA conformity for your products requires additional product-specific requirements. This gap analysis shows what you already have and what's still missing.
Risk management processesPartial
NIS 2 Art. 21 establishes organizational risk management. The CRA requires a product-specific cyber risk assessment per Art. 13(2) — your methodology needs to be extended to the product level.
Incident reporting processesPartial
NIS 2 reporting processes to national CSIRTs exist. The CRA additionally requires reporting actively exploited product vulnerabilities to ENISA — different triggers, different platform, different deadlines.
Supply chain awarenessPartial
NIS 2 Art. 21(2)(d) requires supply chain security. The CRA additionally demands a product-specific SBOM and due diligence for third-party components in the product.
Product-level security requirements (Annex I)Not covered
NIS 2 sets no requirements for product security properties. CRA Annex I defines concrete technical requirements: protection against unauthorized access, data integrity, secure default configuration, and more.
SBOM creation & maintenanceNot covered
NIS 2 contains no SBOM obligation. The CRA requires a machine-readable Software Bill of Materials for every product with digital elements (Annex I Part II in conjunction with Art. 13).
Product vulnerability handling & disclosureNot covered
NIS 2 governs organizational vulnerability management. The CRA requires a documented vulnerability handling policy for each product throughout the entire support period (Art. 13(6)).
Conformity assessment & CE markingNot covered
NIS 2 has no conformity assessment in the CRA sense. Manufacturers must complete the CRA conformity assessment procedure (Annex VIII) and affix the CE marking.
Support period declarationNot covered
The CRA obliges manufacturers to define and communicate a support period during which security updates are provided (minimum 5 years).
Product-specific technical documentationNot covered
The CRA requires comprehensive technical documentation per Annex VII, including security architecture, risk assessment, and test reports — not part of NIS 2.
Product Security vs. Organizational Security
The CRA regulates what a product must be capable of — NIS 2 regulates how an organization must manage cybersecurity. Both apply simultaneously to many companies.
- CRA (Annex I): Product security — protection against unauthorized access, data integrity, availability, update capability
- NIS 2 (Art. 21): 10 organizational minimum measures — risk analysis, incident handling, supply chain security, cryptography
- Perspective: CRA = product market access, NIS 2 = operator resilience
Supply Chain Security from Two Perspectives
Both frameworks address supply chain security — from different angles. Companies subject to both must meet both sets of requirements.
- CRA (Art. 13(5)): Bottom-up — assess risks from third-party components, create SBOM (Annex I Part II)
- NIS 2 (Art. 21(2)(d)): Top-down — ensure security of the entire supply chain including supplier relationships
- Synergy: CRA-compliant products make it easier for NIS 2 operators to fulfill their supply chain obligations
Reporting Obligations Compared
Both frameworks introduce strict reporting obligations but differ in trigger, addressee, and timelines. Art. 14(8) CRA envisions harmonization of reporting channels.
- CRA (Art. 14): Manufacturer reports actively exploited vulnerabilities to ENISA — 24h early warning, 72h full notification, via Single Reporting Platform (from Sept. 2026)
- NIS 2: Operator reports significant incidents to national CSIRT — 24h early warning, 72h full notification, final report after 1 month
- Dual applicability: Different reporting channels and forms require coordinated internal processes
Dual Applicability: When Do Both Frameworks Apply?
Numerous companies will be subject to both frameworks simultaneously. Integrated compliance management is economically essential.
- ICS manufacturers: CRA-obligated as product manufacturers, NIS 2-obligated in the Digital Infrastructure or Manufacturing sector
- Cloud/SaaS providers: SaaS products fall under the CRA, cloud infrastructure under NIS 2
- Shared processes: Risk assessment, vulnerability management, and documentation serve both requirement catalogs
Synergies Between the CRA and NIS 2
Despite different regulatory subjects, there are significant overlaps that companies can leverage strategically.
Shared Risk Assessment
The CRA risk assessment pursuant to Art. 13(2) and the NIS 2 risk analysis pursuant to Art. 21(2)(a) can build on each other methodologically. A product-focused risk analysis can be integrated into organizational risk management.
Vulnerability Management as a Core Competency
The CRA requires vulnerability handling throughout the product lifecycle (Art. 13(6)). NIS 2 demands vulnerability management as an organizational measure (Art. 21(2)(e)). A centralized vulnerability management system serves both requirements.
Convergence of Reporting Channels
The EU is working on a Single Reporting Platform that consolidates CRA and NIS 2 notifications. Companies should already establish unified internal reporting processes.
Supply Chain Resilience
CRA-compliant SBOMs and vulnerability transparency strengthen NIS 2 supply chain security. Conversely, NIS 2-compliant suppliers enhance CRA compliance across the entire value chain.
Your Next Steps
Create product SBOM
Implement SBOM generation in your build process. Use CycloneDX or SPDX and capture all dependencies down to the package level.
Build product vulnerability management
Establish a documented process for detecting, assessing, remediating, and disclosing vulnerabilities in your products — not just in your IT infrastructure.
Prepare technical documentation
Create CRA conformity documentation per Annex VII: product description, security architecture, risk assessment, test reports, and SBOM.
Conduct conformity assessment
Determine the CRA classification of your products (Default, Class I, Class II) and plan the corresponding conformity assessment pathway per Annex VIII.
Frequently Asked Questions
Can a company be subject to both the CRA and NIS 2 simultaneously?
Does CRA compliance help with NIS 2 implementation?
What is the difference in penalties between the CRA and NIS 2?
How do the reporting obligations differ in practice?
What role does supply chain security play in both frameworks?
Has NIS 2 been transposed into national law in Germany?
Which products are exempt from the CRA?
Further Reading
Official Sources
Regulation (EU) 2024/2847 — Cyber Resilience Act in the Official Journal of the European Union
Directive (EU) 2022/2555 on measures for a high common level of cybersecurity across the Union
ENISA resources on the NIS 2 Directive: guidelines, reports, and implementation support
More on Kunnus
Complete legal text with explanations, articles, and annexes of the Cyber Resilience Act
Accessible introduction to the Cyber Resilience Act for decision-makers and product managers
Detailed explanation of the scope and definitions of the Cyber Resilience Act
Free initial assessment: Determine your CRA compliance gaps in 5 minutes
Comparison of CRA and Digital Operational Resilience Act for software vendors in the financial sector
How the voluntary ISO standard and the binding EU regulation complement each other
Master CRA and NIS 2 — with one platform
Kunnus helps you systematically meet CRA requirements while leveraging synergies with NIS 2 compliance. Start with a free initial assessment.