You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The European Union (EU) Cyber Resilience Act (CRA) is a law that applies to software, hardware, products containing them, and their backend services, *if* they are [made available](https://eur-lex.europa.eu/eli/reg/2024/2847/oj#art_1) on the European market. The law applies *regardless* of where its developer(s) are located. This brief document aims to provide a straightforward guide for those who develop open source software (OSS). Note that *this guide is not legal advice*, it’s just an overview to help you understand the situation.
4
4
@@ -12,27 +12,27 @@ The [European Union (EU) Cyber Resilience Act (CRA)](https://eur-lex.europa.eu/e
12
12
13
13
You may have heard things about the CRA (especially its early drafts) that made you worried. The published law is what matters, and for typical individual OSS contributors, there’s no need to panic:
14
14
15
-
1.*The CRA [does not apply to any contributors to someone else’s OSS project](https://eur-lex.europa.eu/eli/reg/2024/2847/oj#rct_18)*.
16
-
2.*The CRA does not apply to web sites or web services unless they are [part of the remote data processing of a product put on the market](https://eur-lex.europa.eu/eli/reg/2024/2847/oj#art_3).*
15
+
1.*The CRA [does not apply to any contributors to someone else’s OSS project](https://eur-lex.europa.eu/eli/reg/2024/2847/oj#rct_18)*.
16
+
2.*The CRA does not apply to web sites or web services unless they are [part of the remote data processing of a product put on the market](https://eur-lex.europa.eu/eli/reg/2024/2847/oj#art_3).
17
17
3.*The CRA only applies to software if it’s “[supplied for distribution or use in the course of a commercial activity](https://eur-lex.europa.eu/eli/reg/2024/2847/oj#rct_15)”*. If the OSS isn’t part of a commercial activity as defined by the CRA, then the CRA does not apply.
18
18
19
19
Many typical activities of OSS projects [aren’t considered a commercial activity under the CRA](https://eur-lex.europa.eu/eli/reg/2024/2847/oj#rct_18). Examples of such typical activities are: receiving financial support from manufacturers (without a profit), manufacturers contributing to its development, performing regular releases, being hosted on an open repository, accepting donations without the intention of making a profit, and being supported by a not-for-profit organization. We strongly encourage all OSS projects to [develop secure software](https://best.openssf.org/Concise-Guide-for-Developing-More-Secure-Software), and the CRA can be a useful guide even when CRA compliance is not required. Yet complying with the CRA isn’t required by activities like these.
20
20
21
-
### CRA applies when open source is distributed as part of commercial activity
21
+
### CRA applies when open source is distributed as part of commercial activity
22
22
23
23
If software or any other product with digital elements (PDE) is [put on the market in the course of a commercial activity, the CRA *does* apply](https://eur-lex.europa.eu/eli/reg/2024/2847/oj#rct_15). Generally “commercial activity” means some attempt to monetize it. [Commercial activities under the CRA](https://eur-lex.europa.eu/eli/reg/2024/2847/oj#rct_15) include:
24
24
25
-
1. Charging a fee for a PDE,
26
-
2. Charging for technical support services beyond their actual costs,
27
-
3. By an intent to monetize, for example, by providing a software platform through which the manufacturer monetizes other services,
28
-
4. Requiring personal data for reasons other than for very narrow reasons (improving the security, compatibility, or interoperability of the software)
25
+
1. Charging a fee for a PDE,
26
+
2. Charging for technical support services beyond their actual costs,
27
+
3. By an intent to monetize, for example, by providing a software platform through which the manufacturer monetizes other services,
28
+
4. Requiring personal data for reasons other than for very narrow reasons (improving the security, compatibility, or interoperability of the software)
29
29
5. Accepting donations exceeding costs.
30
30
31
31
If you’re putting a PDE on the market in the course of a commercial activity, then you’re considered a [manufacturer](https://eur-lex.europa.eu/eli/reg/2024/2847/oj#art_3) and the CRA applies. This is true even if the PDE is open source software. That’s not a disaster. The CRA has a set of requirements that take work to achieve, but the requirements are intended to be *achievable*.
32
32
33
33
### If your Open Source Software (OSS) is used by a manufacturer
34
34
35
-
Manufacturers may integrate OSS components into their product that is put on the market. The CRA ***does*** apply to manufacturers, because they are putting PDEs on the market with commercial intent. The manufacturer is responsible for all parts of the product, including components from third parties. The manufacturer must [perform “due diligence”](https://eur-lex.europa.eu/eli/reg/2024/2847/oj#art_13) to determine what components to use, and must also [report component vulnerabilities](https://eur-lex.europa.eu/eli/reg/2024/2847/oj#art_13) to the component maintainer and upstream fixes if they have any. Using an OSS component in a product makes the manufacturer responsible for its use. As a result, it’s expected that some OSS will be more thoroughly assessed, and it’s likely that there will be a preference for more secure OSS. Manufacturers may sometimes [change how they interact with non-commercial OSS](https://eviltux.com/2025/04/25/what-open-source-developers-need-to-know-about-the-eu-cyber-resilience-act-cra/) due to the CRA. So even developers not directly subject to the CRA should learn more about the CRA and work to create more secure software. These Manufacturer requirements may generate more interest in your software and your practices, which may spawn requests to the project for documentation, patches, or other artifacts such as a Software Bill of Materials (SBOM).
35
+
Manufacturers may integrate OSS components into their product that is put on the market. The CRA ***does*** apply to manufacturers, because they are putting PDEs on the market with commercial intent. The manufacturer is responsible for all parts of the product, including components from third parties. The manufacturer must [perform “due diligence”](https://eur-lex.europa.eu/eli/reg/2024/2847/oj#art_13) to determine what components to use, and must also [report component vulnerabilities](https://eur-lex.europa.eu/eli/reg/2024/2847/oj#art_13) to the component maintainer and upstream fixes if they have any. Using an OSS component in a product makes the manufacturer responsible for its use. As a result, it’s expected that some OSS will be more thoroughly assessed, and it’s likely that there will be a preference for more secure OSS. Manufacturers may sometimes [change how they interact with non-commercial OSS](https://eviltux.com/2025/04/25/what-open-source-developers-need-to-know-about-the-eu-cyber-resilience-act-cra/) due to the CRA. So even developers not directly subject to the CRA should learn more about the CRA and work to create more secure software. These Manufacturer requirements may generate more interest in your software and your practices, which may spawn requests to the project for documentation, patches, or other artifacts such as a Software Bill of Materials (SBOM).
36
36
37
37
Organizations that [systematically provide sustained support for developing one or more OSS projects intended for commercial activities](https://eur-lex.europa.eu/eli/reg/2024/2847/oj#art_3), but don’t fill another role like “manufacturer”, may be considered “Open Source Software Stewards” under the CRA. Stewards have fewer obligations than manufacturers, but they have a few [obligations](https://eur-lex.europa.eu/eli/reg/2024/2847/oj#art_24) such as providing a coordinated vulnerability disclosure (CVD) policy, cooperating with market surveillance at their request, providing certain kinds of documentation, reporting known actively exploited vulnerabilities, notifying about severe incidents, informing impacted users, and providing mitigation. There is no requirement for an OSS project to have a steward. However, an OSS project may *choose* to be supported by a steward (who must then meet its obligations).
38
38
@@ -44,4 +44,5 @@ The CRA is part of a broader set of product legislation that applies to many kin
44
44
45
45
To learn more, we encourage you to take the free express course [“Understanding the EU Cyber Resilience Act (CRA) (LFEL1001)”](https://training.linuxfoundation.org/express-learning/understanding-the-eu-cyber-resilience-act-cra-lfel1001/); you can earn a digital badge by completing it. Most developers want the software they create to be secure; to learn how, we encourage you to take our free course “[Developing Secure Software (LFD121)](https://training.linuxfoundation.org/training/developing-secure-software-lfd121/)”. The [Open Source Security Foundation (OpenSSF)](http://OpenSSF.org) has multiple working groups where you can discuss issues with peers. You can also gain knowledge, build tools, documentation, and training to assist in making OSS more secure.
46
46
47
-
*This guide was developed by the [OpenSSF](https://openssf.org/)[Global Cyber Policy Working Group (WG)](https://github.com/ossf/wg-globalcyberpolicy) CRA Readiness+Awareness Special Interest Group (SIG) and the OpenSSF [Best Practices WG](https://github.com/ossf/wg-best-practices-os-developers). Contributors include (sorted by last name): Harald Fischer, Christian “fukami” Horchert, Olle E. Johansson, Goetz Martinek, Christopher “CRob” Robinson, David A. Wheeler, and Roman Zhukov. We thank the many contributors\!*
47
+
*This guide was developed by the [OpenSSF](https://openssf.org/)[Global Cyber Policy Working Group (WG)](https://github.com/ossf/wg-globalcyberpolicy) CRA Readiness+Awareness Special Interest Group (SIG) and the OpenSSF [Best Practices WG](https://github.com/ossf/wg-best-practices-os-developers). Contributors include (sorted by last name): Harald Fischer, Christian “fukami” Horchert, Olle E. Johansson, Goetz Martinek, Christopher “CRob” Robinson, David A. Wheeler, and Roman Zhukov. We thank the many contributors\!*
0 commit comments