How the CRA now affects open source software

Under the Cyber Resilience Act (CRA), structured open source management is mandatory

Frau im Datencenter
  • Article
  • 5 minute read
  • 26 Feb 2026

Modern products consist to a significant extent of Open Source Software (OSS). While this promotes development speed and innovation, it also creates complex dependencies: a single vulnerability in an Open Source library can jeopardise entire product portfolios – but many manufacturers lack the transparency to determine whether they are affected. Without clear structures and defined processes, a technical vulnerability can quickly turn into an uncontrollable business risk.

This is where the Cyber Resilience Act (CRA) addresses precisely this issue. From 2026/2027, structured security processes and professional OSS management will be a prerequisite for market access in the EU. Open Source remains a central element of modern technologies – but at the same time it is becoming an essential compliance factor. Companies need clear guidelines, roles, supply chain transparency, and a Software Bill of Materials (SBOM) to reliably meet the requirements. Those who do not act now are jeopardising their market access in the EU.

CRA requirements and the role of Open Source software management

For the first time, the CRA establishes uniform, mandatory security requirements for products with digital elements – including the Open Source components used. Companies must ensure that products are placed on the market without known, exploitable vulnerabilities. Cybersecurity is thus becoming a mandatory task for companies. This requires continuous vulnerability assessments, timely remediation, and where applicable, contributing security fixes back to the community. In addition, the CRA requires defined support periods and clear reporting obligations for serious security incidents.

This results in concrete changes for companies:

  • Product owners need transparency regarding the Open Source Software components used and their risk impact.
  • Development and operations must establish processes for regular vulnerability scans, patch management, and secure upstream interaction.
  • Governance and procurement need clear, CRA-compliant compliance guidelines for OSS use, approval processes, and supplier requirements.

The Software Bill of Materials (SBOM) as a necessary transparency tool

The Software Bill of Materials is a core element of the CRA. It documents all software components and dependencies in a standardised format such as SPDX or CycloneDX. Beyond its regulatory obligation, it offers practical added value: SBOMs enable a rapid assessment of whether new vulnerabilities affect a product, facilitate audits, and create a common information base for customers and authorities. In practice, the fully tool-based generation of SBOMs has established itself as an efficient approach.

Open Source Software stewards hold a special position

This includes, for example, foundations such as the Eclipse Foundation or the Apache Software Foundation, which coordinate large OSS projects. They do not apply CE markings themselves, but must maintain a cybersecurity strategy, provide relevant documentation, and cooperate with authorities. This strengthens the security of central OSS ecosystems while preserving the community's ability to innovate.

“The Cyber Resilience Act marks the transition from best practices to meeting regulatory requirements. For companies, this means that Open Source Software must above all be managed in a secure, controllable, and transparent manner.”

Marcel Scholze,Director at PwC for Open Source Software Management

The CRA specifies how cybersecurity must be embedded in corporate processes. Companies should document traceable processes, make risks from software dependencies – especially OSS – transparent, and define clear responsibilities. Cybersecurity thus becomes a management responsibility and requires robust OSS management. Established standards such as ISO/IEC 18974 or BSI-TR-03183 provide orientation.

The first step towards CRA-compliant OSS management is transparency: companies must know which components they use and generate SBOMs automatically. This is followed by structured vulnerability and patch management as well as clearly defined roles, processes, and supplier requirements. PwC supports the establishment of a practical OSS operating model, an integrated SBOM toolchain, and efficient licence compliance and security processes.

PwC supports companies in building CRA readiness and embedding OSS management practices in an efficient and effective way.

The author

Marcel Scholze
Marcel Scholze

Director Open Source, Digital Sovereignty, IT Sourcing, PwC Germany

Marcel Scholze holds a diploma in computer science and has more than 25 years of experience in the IT sector. Since joining PwC in 2007, he has advised companies and public sector clients on strategic and operational issues relating to IT sourcing, Open Source Software and Digital Sovereignty.
Follow us