CRA Compliance
Vulnerability management for connected products
The EU Cyber Resilience Act mandates that manufacturers of products with digital elements identify, track, and remediate vulnerabilities throughout their product lifecycle. Centraleyezer supports the evidence trail, disclosure workflows, and risk-based prioritisation the CRA requires โ your team owns the CRA notifications themselves.
How Centraleyezer covers CRA Compliance
Centraleyezer maps directly to the technical requirements โ with built-in evidence collection so audits are fast.
Vulnerability identification and management
Centraleyezer continuously ingests vulnerability data from your scanners and maps findings to affected product components, giving you an auditable record of every identified vulnerability.
Coordinated vulnerability disclosure policy
Remediation workflows and audit trails document when vulnerabilities were identified, assessed, and addressed โ the structured record needed for responsible disclosure to ENISA and national authorities.
Reporting obligations to ENISA
Automated evidence collection captures contextual risk score, asset scope, exposure, and remediation timelines โ the data points your team needs when preparing 24-hour and 72-hour CRA notifications. Centraleyezer does not file the notifications themselves.
Secure by default โ no known exploitable vulnerabilities
Risk scoring combines DREAD, asset criticality, network exposure, exploitability, and CTI signals. Any known exploitable finding blocking a release is flagged automatically with a SLA breach alert.
Security update handling throughout support period
Findings lifecycle tracks open โ in remediation โ verified status. Every state change is timestamped and attributed, creating the support-period audit trail the CRA requires.
Software bill of materials (SBOM) and component tracking
Software inventory and supply chain tracking modules catalogue software components and their versions, supporting SBOM generation and third-party component vulnerability management.
Read more
- CVSS scores aren't enough โ contextual RBVM
Contextual risk scoring as the basis for CRA 'actively exploited' determinations.
- RBVM vs Traditional Vulnerability Management
Why CVE-only tracking fails the lifecycle requirements of CRA Annex I.