CRA - Relevante Artikel

Regulation (EU) 2024/2847 of the European Parliament and of the Council of 23 October 2024 on horizontal cybersecurity requirements for products with digital elements and amending Regulations (EU) No 168/2013 and (EU) 2019/1020 and Directive (EU) 2020/1828 (Cyber Resilience Act). Directly applicable in every Member State. Contains the definition of the "open-source software steward". Only relevant articles.

The following excerpts show which CRA provisions have a direct impact on the handling of open-source software in the supply chain. Each section is organised thematically and accompanied by a brief contextual note so that the connection between legal obligation and practical implementation is clear. The text reproduced here is the official English wording of the Regulation.

Erwägungsgründe (EWG) #

The recitals (EWG) of the CRA are not directly legally binding but serve as interpretive guidance for the articles of the law. The following recitals are particularly relevant for open-source software and the steward role: Recital 18 defines the FOSS concept and delineates commercial activity, Recital 19 introduces the open-source software stewards and excludes them from CE marking, Recital 20 clarifies the status of package management services, Recital 34 specifies the due diligence obligation when integrating third-party components, and Recital 120 establishes the exemption of stewards from administrative fines.

EWG 18 — Freie und quelloffene Software im Anwendungsbereich #

EWG 19 — Verwalter quelloffener Software #

EWG 20 — Offene Archive und Paketverwaltung #

EWG 34 — Sorgfaltspflicht bei Drittkomponenten #

EWG 120 — Ausnahme der Stewards von Geldbußen #

Anwendungsbereich (Art. 2) #

The scope determines which products fall under the CRA. The decisive factor is network connectivity: any product that includes a direct or indirect data or network connection is affected. This also covers pure software products and their separately supplied components.

Art. 2 Abs. 1 #

Definitionen (Art. 3) #

The following definitions are central to understanding the steward role and the SBOM requirements. In particular, the definition of the "open-source software steward" (No. 14) creates a new legal category that did not exist before the CRA.

Art. 3 Nr. 1 #

Art. 3 Nr. 14 #

Art. 3 Nr. 39 #

Art. 3 Nr. 48 #

Herstellerpflichten (Art. 13, 14) #

The manufacturer obligations form the core of the CRA. For companies integrating open-source components, the due diligence obligation when integrating components (para. 5), the reporting obligation for vulnerabilities in third-party components (para. 6), and the obligation for long-term vulnerability management (para. 8) are particularly relevant. The reporting obligations under Art. 14 already apply from 11 September 2026.

Art. 13 Abs. 2 #

Art. 13 Abs. 5 #

Art. 13 Abs. 6 #

Art. 13 Abs. 8 #

Art. 13 Abs. 21 #

Art. 13 Abs. 24 #

Art. 13 Abs. 25 #

Art. 14 Abs. 1 #

Art. 14 Abs. 2 #

Art. 14 Abs. 3 #

Art. 14 Abs. 4 #

Art. 14 Abs. 8 #

Freiwillige Meldungen (Art. 15) #

Art. 15 opens a voluntary reporting channel for manufacturers and third parties. It is referenced by Art. 24: open-source software stewards shall foster the voluntary reporting of vulnerabilities pursuant to Art. 15.

Art. 15 Abs. 1 #

Art. 15 Abs. 2 #

Bevollmächtigte (Art. 18) #

Art. 18 governs the written appointment of an authorised representative by the manufacturer. For the open-source supply chain, the article is relevant because it establishes which manufacturer obligations are NOT delegable -- the technical conformity and reporting obligations remain with the manufacturer. The authorised representative primarily takes on documentation duties towards the market surveillance authorities.

Art. 18 — Bevollmächtigte #

Verwalter quelloffener Software (Art. 24, 25) #

Articles 24 and 25 define the obligations and options of the open source steward. The obligations are deliberately lighter than those of a manufacturer but require a systematic cybersecurity policy, active vulnerability management, and cooperation with authorities. Art. 25 provides for the possibility of voluntary security attestations that facilitate manufacturers' integration of open-source components.

Art. 24 — Pflichten der Verwalter quelloffener Software #

Art. 25 — Sicherheitsbescheinigung für freie und quelloffene Software #

Konformität und CE-Kennzeichnung (Art. 28, 29, 30, 32) #

The CE marking is applied to software for the first time. The EU declaration of conformity under Art. 28 is the manufacturer's formal assurance that the essential requirements in Annex I are met. For open-source products, Art. 32(5) provides a simplified conformity assessment procedure, provided that the technical documentation is made publicly available. The CE marking is a manufacturer obligation; stewards are expressly excluded.

Art. 28 — EU-Konformitätserklärung #

Art. 29 — Allgemeine Grundsätze der CE-Kennzeichnung #

Art. 30 — Vorschriften und Bedingungen für die Anbringung der CE-Kennzeichnung #

Art. 32 Abs. 5 #

Marktüberwachung und Schutzmaßnahmen (Art. 52, 54, 56) #

Art. 52(3) governs market surveillance specifically for stewards. Authorities may require corrective measures, but the examination is limited to compliance with the Art. 24 obligations. Art. 54 regulates the national procedures for products presenting a significant cybersecurity risk -- including withdrawal from the market and recall. Art. 56 furthermore permits Union-wide corrective or recall orders by the European Commission.

Art. 52 Abs. 3 #

Art. 54 — Nationale Verfahren bei erheblichem Cybersicherheitsrisiko #

Art. 56 — Verfahren auf Unionsebene bei erheblichem Cybersicherheitsrisiko #

Sanktionen (Art. 64, 65) #

The sanctions provisions illustrate the CRA's graduated approach: manufacturers can face fines of up to EUR 15 million or 2.5% of global annual turnover. For stewards, an express exemption from administrative fines applies (Art. 64(10)(b)). The representative actions mechanism under Art. 65, however, covers all economic operators.

Art. 64 Abs. 2 #

Art. 64 Abs. 3 #

Art. 64 Abs. 4 #

Art. 64 Abs. 5 #

Art. 64 Abs. 10 #

Art. 65 — Verbandsklagen #

Übergangsbestimmungen (Art. 69, 71) #

The transitional periods are decisive for practice: the reporting obligations under Art. 14 already apply from 11 September 2026, including retroactively for existing products. Full application of all provisions begins on 11 December 2027.

Art. 69 Abs. 2 #

Art. 69 Abs. 3 #

Art. 71 — Inkrafttreten und Geltungsbeginn #

Grundlegende Anforderungen (Anhang I) #

Annex I defines the concrete technical requirements that every product with digital elements must fulfil. Part I concerns product properties (no known exploitable vulnerabilities), Part II the processes for vulnerability handling, including the SBOM obligation and coordinated disclosure.

Anhang I Teil I Nr. 2a — Cybersicherheitsanforderungen in Bezug auf die Eigenschaften von Produkten mit digitalen Elementen #

Anhang I Teil II Nr. 1–8 — Anforderungen an die Behandlung von Schwachstellen #

Vollständiger Gesetzestext #

Official Journal of the European Union - Regulation (EU) 2024/2847

Download CRA factsheet