Skip to main content
๐ŸŽค Speaking at KubeCon EU 2026 Lessons Learned Orchestrating Multi-Tenant GPUs on OpenShift AI View Session
๐ŸŽค Speaking at Red Hat Summit 2026 GPUs take flight: Safety-first multi-tenant Platform Engineering with NVIDIA and OpenShift AI Learn More
CRA Timeline: Key Deadlines and Enforcement Milestones
DevOps

CRA Timeline: Key Deadlines and Enforcement Milestones

Critical dates for EU Cyber Resilience Act compliance. From reporting obligations in 2026 to full enforcement in 2027, here's what to prepare and when.

LB
Luca Berton
ยท 1 min read

The Clock Is Ticking

The CRA has a staggered enforcement timeline. Understanding these deadlines is critical for planning your compliance roadmap.

Key Dates

September 2026 โ€” Reporting Obligations Begin

  • Must report actively exploited vulnerabilities to ENISA within 24 hours
  • Must report severe incidents within 72 hours
  • Requires established vulnerability handling processes

December 2027 โ€” Full Enforcement

  • All CRA requirements become mandatory
  • Products must meet essential cybersecurity requirements
  • CE marking required for market access
  • SBOM documentation mandatory
  • Security update obligations active

Your Compliance Roadmap

Now โ†’ June 2026 (Preparation Phase)

Month 1-2: Product Classification
  โ””โ”€โ”€ Identify all products with digital elements
  โ””โ”€โ”€ Classify: Default, Important Class I/II, Critical
  โ””โ”€โ”€ Document product boundaries and digital interfaces

Month 3-4: Gap Analysis
  โ””โ”€โ”€ Assess current security practices against CRA requirements
  โ””โ”€โ”€ Identify missing processes (SBOM, vulnerability handling, etc.)
  โ””โ”€โ”€ Estimate remediation effort and budget

Month 5-8: Implementation
  โ””โ”€โ”€ Implement SBOM generation in CI/CD pipelines
  โ””โ”€โ”€ Establish coordinated vulnerability disclosure
  โ””โ”€โ”€ Set up incident reporting procedures
  โ””โ”€โ”€ Security-by-design training for development teams

Month 9-12: Testing & Documentation
  โ””โ”€โ”€ Internal conformity assessment (default products)
  โ””โ”€โ”€ Prepare technical documentation
  โ””โ”€โ”€ Conduct security testing and penetration testing
  โ””โ”€โ”€ Engage third-party assessors if required

June 2026 โ†’ September 2026 (Reporting Readiness)

Focus: Ensure vulnerability reporting infrastructure is operational.

# Incident reporting SLA tracker
class CRAReportingTracker:
    DEADLINES = {
        "actively_exploited_vulnerability": timedelta(hours=24),
        "severe_incident": timedelta(hours=72),
        "vulnerability_assessment": timedelta(days=14),
        "final_report": timedelta(days=30),
    }
    
    async def report_vulnerability(self, vuln):
        # Early warning to ENISA
        await self.submit_to_enisa(
            type="early_warning",
            vulnerability=vuln,
            deadline=self.DEADLINES["actively_exploited_vulnerability"],
        )
        
        # Schedule follow-up reports
        await self.schedule_followup(vuln)

September 2026 โ†’ December 2027 (Progressive Compliance)

Progressively implement remaining requirements:

  • Security testing automation
  • Product lifecycle security management
  • CE marking preparation
  • Third-party assessment (if Class II or Critical)

Cost of Non-Compliance

ViolationMaximum Fine
Essential requirements violationโ‚ฌ15M or 2.5% global turnover
Other CRA obligationsโ‚ฌ10M or 2% global turnover
Incorrect/incomplete informationโ‚ฌ5M or 1% global turnover

Industry Impact

Based on assessments Iโ€™ve conducted:

  • Average compliance cost: โ‚ฌ200K-2M per product line (depending on classification)
  • Timeline to achieve compliance: 12-18 months for most organizations
  • Biggest gap: SBOM generation and vulnerability handling processes

Start now. September 2026 is closer than you think.


Need a CRA compliance roadmap for your organization? I help teams plan and execute cybersecurity regulation compliance. Get in touch.

Luca Berton Ansible Pilot Ansible by Example Open Empower K8s Recipes Terraform Pilot CopyPasteLearn ProteinLens TechMeOut