Isometric illustration of a secure software pipeline with SBOM generation, vulnerability scanning, and compliance gates
DevSecOps & CRA Compliance

DevSecOps & CRA Compliance

CRA compliance as technical reality — not a paper tiger

The EU Cyber Resilience Act takes effect in September 2026. Reporting obligations, SBOMs, vulnerability management — most manufacturing companies lack the DevSecOps expertise to implement this technically. Krafteq implements the technical controls and processes directly in your existing CI/CD infrastructure. No compliance theater, but engineering: SBOM generation, vulnerability management, and secure development lifecycle as code.

Sept. 2026 CRA Reporting Obligations
24 Hours Vulnerability Reporting Deadline
14 Days Time to Start

CRA self-assessment conducted internally. SBOM generation (CycloneDX 1.6) and gap analysis against Annex I/II documented — hands-on experience.

Why the CRA poses an engineering problem for manufacturers

The EU Cyber Resilience Act affects every manufacturer of products with digital elements on the EU market. The requirements are technical — SBOMs, vulnerability handling, incident reporting — yet most companies lack DevSecOps expertise internally.

Reporting obligations from September 2026

Actively exploited vulnerabilities must be reported to ENISA within 24 hours. Without a defined incident reporting workflow and escalation chains, this is practically impossible.

No SBOM processes in place

48% of security leaders are behind on SBOM standards. Machine-readable SBOMs are a CRA obligation, yet few CI/CD pipelines generate them automatically per release.

Vulnerability management is missing

Without automated scanning and risk-based prioritization, vulnerabilities go undetected. The CRA requires vulnerability handling throughout the entire support period.

No secure development lifecycle

Security gates in the pipeline — SAST, DAST, secrets detection — are not implemented at many companies. The CRA requires demonstrable cybersecurity risk assessment before market launch.

Missing CRA documentation

Technical documentation per Annex II and post-market monitoring per Annex VII require structured processes. Manual approaches don't scale.

Supply chain pressure from all sides

Suppliers must also demonstrate CRA compliance. Procurement departments increasingly demand SBOMs and security evidence — those who can't deliver get dropped from supply chains.

Three paths to CRA compliance — you decide

Krafteq is a technical implementation partner, not a compliance consultant. We build the technical controls and processes. The delivery model adapts to your needs and timeline pressure.

CRA Sprint — project-based entry

2–4 weeks of intensive assessment and implementation of the most critical gaps. Ideal as a starting point: you receive a gap analysis against CRA Annex I, a prioritized roadmap, and the first technical controls in your pipeline.

Managed Service — ongoing compliance

Continuous vulnerability monitoring, SBOM updates with every release, and incident response support as a subscription. Krafteq ensures your compliance processes stay current — even as requirements evolve.

Team Enablement — build internal expertise

Krafteq engineers work alongside your team, transfer DevSecOps knowledge, and build internal capabilities. The goal: your team is empowered, not made dependent.

SBOM integration into the pipeline

CycloneDX or SPDX generation as an automatic pipeline step. Versioned SBOMs per release. Dependency tracking and vulnerability monitoring — all integrated into your existing CI/CD infrastructure.

Incident reporting workflow

Implementation of the 24h/72h/14d reporting workflow for the ENISA Single Reporting Platform. Escalation chains, templates, approval gates — so your organization can act decisively when incidents occur.

Coordinated Vulnerability Disclosure

security.txt, public disclosure policy, intake forms, triage workflow, and advisory publishing. CRA-compliant and practical.

How we make your delivery pipeline CRA-ready

Our approach follows a clear structure. Each step delivers standalone results and brings you closer to CRA compliance.

  1. CRA Technical Assessment (Day 1–3)

    Gap analysis of existing SDLC, CI/CD, and dependency management processes against CRA Annex I requirements. Scope determination (Default / Important Class I / II / Critical). You receive a prioritized roadmap with concrete actions.

    Clarity about your CRA scope and the most critical gaps

  2. SBOM and Vulnerability Management (Week 1–2)

    Implement CycloneDX/SPDX generation as a pipeline step. Set up automated vulnerability scanning in CI/CD. Risk-based prioritization with defined remediation SLAs: Critical 24h, High 7d, Medium 30d, Low 90d.

    Automatic SBOM generation and vulnerability tracking per release

  3. Incident Reporting and Secure SDLC (Week 2–4)

    Implement the 24h/72h/14d reporting workflow. Security gates in the pipeline: SAST, DAST, secrets detection. Set up coordinated vulnerability disclosure. Technical documentation per Annex II/VII — auto-assembled where possible.

    Reporting-obligation-ready and demonstrably secure development process

  4. Handover and Ongoing Operations (Week 3–4)

    With managed service, Krafteq handles ongoing monitoring and SBOM updates. For projects and enablement, we hand over to your team — with documented processes, runbooks, and handover workshops.

    Sustainable CRA compliance — internally or through Krafteq

What DevSecOps & CRA Compliance covers

We implement the technical controls and processes that the CRA requires — directly in your existing infrastructure. Engineering, not paper.

SBOM Generation

CycloneDX and SPDX generation as an automatic CI/CD pipeline step. Versioned SBOMs per release. Dependency tracking and vulnerability monitoring across the entire product lifecycle.

Vulnerability Management

Automated scanning in CI/CD: containers, dependencies, code. Risk-based prioritization with CVSS, EPSS, and reachability analysis. Defined remediation SLAs for each severity level.

Incident Reporting Workflow

Implementation of the CRA-compliant 24h/72h/14d reporting workflow for the ENISA Single Reporting Platform. Escalation chains, templates, and approval gates.

Secure Development Lifecycle

Security gates in the pipeline: SAST, DAST, secrets detection. Secure-by-default configurations. Documented processes for CRA Annex II.

Coordinated Vulnerability Disclosure

security.txt, public disclosure policy, intake forms, triage workflow, and advisory publishing. Everything the CRA requires for handling reported vulnerabilities.

CRA Documentation

Technical documentation per Annex II/VII — auto-assembled from pipeline artifacts, service catalog, and git history where possible. No manual document management.

Results that speak for themselves

CRA-ready

Internal self-assessment completed

Krafteq conducted and documented the CRA self-assessment process internally. SBOM generation (CycloneDX 1.6), vulnerability scanning, and gap analysis against Annex I/II — hands-on experience, not theory.

< 15 Min.

Cycle time after pipeline hardening

Security gates integrated into CI/CD pipelines without sacrificing deployment speed. SBOM generation and vulnerability scanning as automatic pipeline steps.

70%

Cloud cost reduction

DevSecOps and cost optimization go hand in hand. Infrastructure hardening and rightsizing at an enterprise client — security and efficiency are not contradictory.

10+ Years

Experience per engineer

Only senior engineers with 10+ years of experience. DevSecOps expertise from practice — CI/CD pipelines, Kubernetes security, compliance automation.

DevSecOps & CRA Compliance — let's talk about it

Let us discuss how we can support your team.

Book an appointment

We use Calendly for appointment booking. Loading it transmits data to Calendly (USA). Please accept the use of external services to display the calendar.

Or contact us directly: contact@krafteq.de

“CRA compliance is not a paper problem — it's an engineering problem. SBOMs, secure pipelines, vulnerability management, incident reporting automation: this is craft that happens in the CI/CD pipeline, not in PowerPoint decks. That's exactly what we build.”

Ivan Bianko, Geschäftsführer krafteq

Frequently Asked Questions