eu-mdrcybersecuritymedical-devicescompliance

Cyber Resilience Act: what medical device manufacturers need to know

RegAid Team5 min read
Cyber Resilience Act: what medical device manufacturers need to know

The EU Cyber Resilience Act (CRA) 2024/2847 introduces mandatory cybersecurity requirements for products with digital elements sold in the EU. Vulnerability reporting obligations take effect September 11, 2026, and full product conformity becomes mandatory December 11, 2027. While medical devices under MDR are exempt from the CRA's product requirements, many digital components in the healthcare ecosystem are not.

The medical device exemption and its limits

CRA Article 2(2) exempts products already covered by sector-specific EU harmonisation legislation that imposes equivalent cybersecurity requirements. Medical devices regulated under MDR 2017/745 and IVDs under IVDR 2017/746 fall within this exemption.

However, the exemption applies only to the medical device itself. Digital products that interact with, support, or connect to a medical device but are not themselves classified as medical devices are fully subject to the CRA:

ProductCRA applies?Rationale
SaMD classified under MDRNoCovered by MDR cybersecurity requirements
Hospital information system interfacing with devicesYesNot a medical device under MDR
Mobile app classified as Class I accessoryNoCovered by MDR
Cloud platform hosting device data (not classified as SaMD)YesNot a medical device
Firmware update tool for a medical device (not part of the device itself)YesStandalone digital product
General-purpose operating system running on a medical deviceYesNot covered by MDR as a standalone product

If you manufacture both MDR-regulated devices and non-device digital products in the same ecosystem, you may need to comply with both MDR (for the device) and CRA (for the supporting software).

Vulnerability reporting: September 11, 2026

The CRA's vulnerability reporting obligations under Article 14 apply from September 11, 2026. Manufacturers of in-scope products must report actively exploited vulnerabilities and significant security incidents to their national Computer Security Incident Response Team (CSIRT) and to ENISA via a single reporting platform.

The reporting timeline is strict:

StageDeadlineContent required
Early warningWithin 24 hours of awarenessNotification that a vulnerability is being actively exploited, or that a significant incident has occurred
Vulnerability notificationWithin 72 hoursDetailed information on the vulnerability, exploitation activity, and any corrective measures taken or planned
Final reportWithin 14 days of mitigationComplete description of the vulnerability, root cause analysis, and corrective actions applied

These reporting timelines apply even if a full fix is not yet available. The purpose is to enable coordinated response across the EU.

Product conformity requirements: December 11, 2027

Full CRA product conformity obligations take effect December 11, 2027. For in-scope products, this means:

Security by design (CRA Annex I, Part I): Products must be designed, developed, and produced to ensure an appropriate level of cybersecurity. This includes secure default configurations, protection against unauthorized access, and data confidentiality and integrity.

Vulnerability handling (CRA Annex I, Part II): Manufacturers must identify and document vulnerabilities, provide security updates for the expected product lifetime (minimum 5 years), and operate a coordinated vulnerability disclosure policy.

Software Bill of Materials (SBOM): Manufacturers must produce and maintain an SBOM listing all components, including open-source libraries and third-party dependencies. The SBOM is part of the technical documentation and must be made available to market surveillance authorities on request.

Conformity assessment: Most products follow a self-assessment route based on internal control (CRA Annex VI). Important and critical products (as defined in CRA Annexes III and IV) require third-party assessment.

Interaction with MDR cybersecurity requirements

MDR already requires manufacturers to address cybersecurity in their technical documentation. MDR Annex I, Section 17.4 requires that devices incorporating software or that are programmable electronic systems be designed to ensure repeatability, reliability, and performance. MDCG 2019-16 provides guidance on cybersecurity for medical devices.

For manufacturers with products straddling both regulations, the practical approach is:

  1. Apply MDR cybersecurity requirements to the medical device itself
  2. Apply CRA requirements to any non-device digital products in the ecosystem
  3. Use a common cybersecurity risk management framework (such as IEC 81001-5-1) across both

Key deadlines

DateRequirement
September 11, 2026Vulnerability reporting obligations begin for CRA-scope products
December 11, 2027Full product conformity required for CRA-scope products
OngoingSecurity updates must be provided for the product's expected lifetime (minimum 5 years)

Looking for the right regulatory intelligence tool? Read our guide to evaluating regulatory intelligence platforms.

Key takeaways

  • Medical devices under MDR are exempt from CRA product requirements, but many associated digital products are not
  • Vulnerability reporting starts September 11, 2026: 24-hour initial notification, 72-hour detailed report, 14-day final report
  • Full product conformity (security by design, SBOM, vulnerability handling) is required by December 11, 2027
  • Manufacturers with mixed product portfolios need to determine which products fall under MDR and which under CRA
  • CRA requires an SBOM for all in-scope products, maintained throughout the product lifecycle
  • Coordinated vulnerability disclosure and security update processes are mandatory

How RegAid helps

RegAid covers MDR cybersecurity requirements including Annex I Section 17.4 and all MDCG guidance on cybersecurity for medical devices. Ask "What cybersecurity documentation do I need for my connected medical device?" and get cited answers linking MDR requirements to MDCG 2019-16 and the applicable harmonised standards.