2026-05-14·5 min read·sota.io Team

CRA Implementation Timeline 2026-2027 — Month-by-Month Developer Compliance Checklist

Post #17 in the sota.io EU Cyber Compliance Series

CRA Implementation Timeline 2026-2027 Developer Checklist

The Cyber Resilience Act (EU 2024/2847) is not a single deadline — it is a two-phase compliance runway with 18 months of structured preparation required. The first phase lands September 11, 2026, when Articles 14 and 19 activate mandatory vulnerability and incident reporting to ENISA. The second phase arrives December 11, 2027, when the full regulation applies and CE marking becomes mandatory for connected digital products.

Most developer teams and product organizations are focused on the December 2027 date as a distant horizon. The September 2026 date is six months away. It requires reporting infrastructure, documented vulnerability disclosure policies, and tested workflows with ENISA's national single points of contact — none of which can be built in a weekend. This guide maps each calendar month from now to December 2027 with concrete, executable tasks.

The Two Critical Dates — What Each Means

September 11, 2026 — Phase 1: Reporting Obligations Live

Articles 14 and 19 apply from this date. Manufacturers must:

The 24-hour reporting window is the most operationally demanding element. It runs continuously — weekends, public holidays, and outside business hours. Manufacturers without 24/7 incident response capabilities and a tested ENISA submission workflow will fail this deadline not by choice but by practical inability.

December 11, 2027 — Phase 2: Full CRA Applies

Everything else in the CRA becomes mandatory:

Penalties for non-compliance after December 11, 2027: up to €15 million or 2.5% of global annual turnover for essential cybersecurity requirement violations, whichever is higher.

Month-by-Month Checklist: May 2026 → December 2027


May 2026 (Now — 4 Months to Phase 1)

Product Classification

SBOM Baseline

Gap Assessment


June 2026 (3 Months to Phase 1)

Vulnerability Disclosure Policy (VDP)

Reporting Workflow Design

Infrastructure Audit


July 2026 (2 Months to Phase 1)

Reporting Dry Run

Documentation Infrastructure

Security Testing Baseline


August 2026 (1 Month to Phase 1)

Final Pre-Compliance Verification

Art.14 Reporting Template

Prepare ready-to-send notification template containing:

Having this template pre-approved by legal saves hours during a live incident.

User Notification Draft


September 11, 2026 — Phase 1 Live

Go-Live Checklist

On September 11, 2026, your organization must be able to:


October–December 2026 (Phase 1 Operating, Phase 2 Preparation Begins)

Conformity Assessment Planning

Technical Documentation Completion (Art.27)

Essential Security Requirements Gap Close (Art.10)


January–June 2027

Conformity Assessment Execution

Market Surveillance Readiness

Supply Chain Documentation


July–November 2027

Final Verification Sprint

Importer/Distributor Obligations (Art.16/17)

If your organization places products on the EU market without manufacturing them:


December 11, 2027 — Full CRA Applies

Products placed on the EU market from this date must have CE marking and meet all CRA requirements. Products already on the market receive a grace period based on support lifecycle — but "already on market" means shipped to customers before December 11, 2027, not released or announced.


The Jurisdiction Problem That Breaks Your Reporting Timeline

The 24-hour ENISA reporting window is operationally difficult. It becomes legally impossible under one specific circumstance: if your cloud provider is US-headquartered and receives a National Security Letter (NSL) with a gag order during or before the incident window.

An NSL gag order prohibits the cloud provider from disclosing to you — their customer — that:

Under this scenario, you cannot meet Art.14's requirement to report "actively exploited vulnerabilities" to ENISA within 24 hours, because your cloud provider cannot tell you the exploitation occurred. The gag order creates a legal silence between the incident and your obligation to disclose it.

This is not a theoretical risk. The US DOJ issued approximately 23,000 NSLs in 2022 alone. FISA §702 and CLOUD Act provisions have been served to all major US cloud providers. No US-headquartered provider has been able to fully disclose the scope of government access orders.

The EU-native alternative: A cloud provider incorporated and operating under EU jurisdiction (Germany, France, Netherlands, etc.) with no US parent company is not subject to NSL or CLOUD Act jurisdiction. The provider can tell you everything. Your incident timeline remains intact. Your 24-hour ENISA window is actually achievable.

This is why cloud provider jurisdiction has moved from a compliance nice-to-have to a CRA prerequisite for any organization that takes the Art.14 reporting obligation seriously.

Which Products Are In Scope

The CRA defines "products with digital elements" broadly:

In scope:

Out of scope:

The "commercial activity" threshold for open source is not a revenue test — it is a market placement test. If your organization controls the commercial distribution of software built on open source components, you are likely the manufacturer under Art.3(13), not the open source project.

Summary: The 18-Month Sprint

The CRA compliance runway from today (May 2026) to December 2027 is 19 months. The Phase 1 reporting window (Art.14/19) opens in 117 days. Organizations that have not yet:

  1. Classified their products under the CRA risk tiers
  2. Established a VDP and CSIRT relationship
  3. Built 24/7 incident response capacity for Art.14's 24-hour window
  4. Assessed their cloud provider's jurisdiction for the reporting gap

...are not on track for September 11, 2026.

The technical documentation and conformity assessment work for December 2027 is substantial — but it has 19 months. The operational readiness work for September 2026 has four months, and most of it cannot be parallelized.

The month-by-month structure matters: each month's tasks depend on the previous month's completion. The August dry run is meaningless if the June VDP is not published. The July documentation infrastructure is useless if the May SBOM baseline is incomplete.

Start with classification. Everything else flows from knowing which tier your products occupy.


sota.io is EU-native managed PaaS — incorporated and operating in Germany, no US parent company, not subject to CLOUD Act or NSL jurisdiction. For teams building CRA-compliant connected products, this means your incident timeline stays intact regardless of what happens in a US court. Learn more about CRA-compliant infrastructure →

EU-Native Hosting

Ready to move to EU-sovereign infrastructure?

sota.io is a German-hosted PaaS — no CLOUD Act exposure, no US jurisdiction, full GDPR compliance by design. Deploy your first app in minutes.