This document is under active development and has not been finalized.
Skip to content

CRA & AI Act Synergies (Detail)

Detailed Requirement Mapping

§30 No. 2 -- Incident Management vs. CRA Art. 14

AspectNIS2 (§32 BSIG)CRA (Art. 14)Synergy
TriggerSignificant operational incidentProduct vulnerability / incidentShared initial assessment process
Early warning24h to BSI24h to ENISAParallel notification using shared template
Detailed report72h72hData reusable
Final report1 month14 daysSeparate reports, shared root cause analysis
TemplatesNIS2 Reporting ObligationsCRA ENISA ReportingDesigned for compatibility

§30 No. 4 -- Supply Chain vs. CRA Annex I Part II No. 1

AspectNIS2CRASynergy
Software dependencies-- (NIS2 references CRA)SBOM + Dependency PolicyCRA leading
IT service providersVendor Assessment--NIS2 leading
Contractual requirementsSecurity ClausesAnnex I Part II No. 1Shared contractual standards

§30 No. 5 -- Vulnerabilities vs. CRA Art. 10/11

AspectNIS2CRASynergy
CVE monitoring (products)-- (NIS2 references CRA)CRA Vulnerability ManagementCRA leading
CVE monitoring (infrastructure)Scanning--NIS2 leading
Patch managementPatch ManagementCRA: Product updatesShared timelines
Secure developmentSecure DevelopmentCRA: Security by designShared development standards

AI Act Synergies

NIS2 MeasureAI Act ArticleDescription
No. 1 -- Risk managementArt. 9 (Risk management system)NIS2 ISMS provides the methodological foundation for AI risk management
No. 7 -- TrainingArt. 4 (AI Literacy)AI Act Training Program as extension
No. 8 -- CryptographyArt. 15 (Cybersecurity)Cryptography standards also apply to AI systems
No. 9 -- Access controlArt. 14 (Human oversight)Access control concepts as foundation for AI oversight

Overall Architecture

NIS2 (Organization & Operations)
  +-- Risk Management <---- AI Act (AI Risk Management, Art. 9)
  +-- Incident Management <---- CRA (Product Incidents, Art. 14)
  +-- Supply Chain <---- CRA (Software SBOM, Annex I)
  +-- Vulnerabilities <---- CRA (Product CVEs, Art. 10/11)
  +-- Training <---- AI Act (AI Literacy, Art. 4)
  +-- Cryptography <---- AI Act (Cybersecurity, Art. 15)
                    <---- CRA (Product Encryption, Annex I)

Documentation licensed under CC BY-NC 4.0 · Code licensed under MIT