Skip to content
Cybersecurity: Threats and Defences
17APR

EU CRA guidance; German NIS2 missed

3 min read
13:56UTC

European Commission draft CRA guidance opened 3 March. Only a third of German entities registered by the NIS2 deadline. Infringement proceedings are running.

TechnologyAssessed
Key takeaway

The EU cyber fine regime is in force; whether it is applied in 2026 is the year's test.

The European Commission published draft implementation guidance for the Cyber Resilience Act (CRA) on 3 March 2026, with a feedback window to 31 March 1. The CRA entered force in December 2024 and sets mandatory cybersecurity requirements for products with digital elements sold into the EU single market, from routers to industrial sensors. Manufacturer reporting obligations start 11 September 2026; the main substantive obligations apply from 11 December 2027.

Behind the CRA, the Network and Information Systems Directive 2 (NIS2) transposition picture remains uneven. NIS2 is the EU's core cybersecurity compliance framework, requiring member states to designate essential and important entities across critical sectors and enforce minimum security and incident-reporting standards. Only fourteen EU member states had fully transposed NIS2 by June 2025. Germany published its national implementation law on 5 December 2025 and required covered entities to register by 6 March 2026; only around one-third had actually registered by the deadline. The Commission's infringement proceedings against non-compliant member states are running in parallel.

The NIS2 fine ceiling is €15 million or 2.5 per cent of worldwide annual turnover, a number designed to reach boardroom attention. The test for 2026 is whether member-state regulators actually apply it, or whether the enforcement pattern continues the lag visible in the German registration data. For multinational vendors selling into the single market, the divergence between fully transposed and partially transposed jurisdictions creates an uneven market-access picture that product compliance teams have to map country by country.

Deep Analysis

In plain English

The European Union has two major cybersecurity laws that are currently in various stages of coming into force. NIS2 (Network and Information Systems Directive 2) requires important organisations like utilities, hospitals, and digital service providers to meet security standards and report cyber incidents. It has been in force since December 2024, but many EU countries had not yet turned it into national law when it was due. Germany only recently published its version, and even there, only about one-third of the companies that should have registered had done so by the deadline. The Cyber Resilience Act (CRA) requires that all connected products sold in the EU, from smart home devices to industrial equipment, meet minimum cybersecurity standards. The main rules apply from December 2027, but manufacturers have to start reporting security problems from September 2026. Draft guidance on how to comply was published in March 2026.

Deep Analysis
Root Causes

CRA applies to all manufacturers of products with digital elements sold in the EU market. The scope is broad, covering everything from connected consumer devices to industrial control systems. Most manufacturers of connected products are not historically cybersecurity organisations and lack the internal processes to implement vulnerability disclosure, incident notification, and secure-by-design requirements within the CRA timelines.

NIS2's registration failures in Germany and other member states reflect a supply problem: the competent national authorities responsible for receiving registrations and enforcing the law were not fully operational when the registration deadline arrived, creating a situation where some entities that tried to register could not complete the process.

What could happen next?
  • Risk

    Connected product manufacturers selling into the EU who have not begun CRA compliance work face a 17-month window (to September 2026 mandatory reporting) that is shorter than most product security programme build timelines.

  • Consequence

    Low NIS2 registration rates across EU member states, combined with Commission infringement proceedings, are likely to produce a wave of enforcement actions and compliance investment once national competent authorities are fully operational, creating a demand spike for NIS2-focused advisory and tooling providers.

First Reported In

Update #1 · Stryker MDM wipe exposes identity perimeter

Breachsense / CM-Alliance· 17 Apr 2026
Read original
Different Perspectives
CISA and FBI (US government)
CISA and FBI (US government)
CISA added nine KEV CVEs, confirmed Volt Typhoon in US CNI, and lost its counter-ransomware initiative under prior cuts; the FY27 budget proposes a further $707m cut and 860 jobs. An FBI official confirmed Salt Typhoon at 200+ companies across 80 countries is 'still very, very much ongoing'.
NCSC (UK)
NCSC (UK)
NCSC published attribution-backed advisories naming GRU Unit 26165 for SOHO router DNS hijacking and co-issued warnings with Dutch AIVD on FSB, APT31, and IRGC messaging-app targeting, in the same month the UK Cyber Security and Resilience Bill cleared its Public Bill Committee. The ICO's £14m Capita fine now treats NCSC guidance as the enforceable GDPR technical baseline.
European Commission
European Commission
The Commission published draft Cyber Resilience Act implementation guidance on 3 March with manufacturer reporting obligations beginning 11 September 2026, while running infringement proceedings against EU member states that have not transposed NIS2. Only 14 of 27 states had fully transposed by mid-2025; Germany's post-transposition registration compliance sat at roughly one-third.
Russian foreign ministry (GRU posture)
Russian foreign ministry (GRU posture)
The Russian foreign ministry has issued no formal response to the NCSC advisory attributing the SOHO router DNS-hijacking campaign to GRU Unit 26165; its standard position is that Western attribution claims are politically motivated fabrications. Russia denies state sponsorship of any offensive cyber operations against NATO infrastructure.
People's Republic of China
People's Republic of China
Tsinghua University's Center for International Security and Strategy characterised US Volt Typhoon 'sabotage pre-positioning' assessments as misrepresenting standard state signals intelligence, framing the attribution narrative as a US strategic communication exercise rather than a conclusion grounded in confirmed adversary intent. Beijing formally denies state involvement in Salt Typhoon and Volt Typhoon.
Handala
Handala
Handala publicly claimed the Stryker MDM wipe as retaliation for a February 2026 Iranian school missile strike, asserting 200,000 devices wiped and 50 terabytes exfiltrated. The public framing positions the operation as proportionate non-lethal retaliation, a characterisation no Western agency has formally attributed to IRGC command-and-control.