If you’re building embedded Linux devices with Yocto and plan to sell in the EU, the Cyber Resilience Act (CRA) will soon become part of your daily reality.
Starting in 2026, vulnerability reporting becomes mandatory. By 2027, full CRA compliance is required for all connected hardware and software products sold commercially in Europe.
This blog is based on a talk Witekio gave at the Yocto Project Mini Dev Day, part of the Embedded Open Source Summit (EOSS). It distills key insights from the presentation into actionable takeaways for product teams working with Yocto.
The good news? Yocto gives you a head start. But CRA compliance doesn’t happen automatically. Here’s what Yocto users need to understand—and do—before enforcement kicks in.
CRA in a Nutshell (For Yocto Users)
The CRA is focused on product security and vulnerability management. That means:
• Your software must be designed securely.
• You must know what’s in your software.
• You must monitor, fix, and report vulnerabilities—over time.
For Yocto-based projects, this raises practical questions:
How do I generate a Software Bill of Materials (SBOM)? How do I identify CVEs? How do I track and report fixes?
Yocto has answers—but only if you use its tools intentionally.
1. SBOMs Are Not Optional—Use SPDX
The CRA requires you to document your software composition. In Yocto, this means SPDX.
Yocto supports SPDX 2.2 out of the box:
INHERIT += “spdx”
This generates an SBOM listing:
• Packages and dependencies
• Versions and patches
• Licenses and hashes
Future SPDX versions (2.3 and 3.0) offer more metadata, like build environment and reproducibility—but 2.2 is a solid starting point.
🟢 CRA Tip: Store and version-control your SBOMs. They’re the foundation for vulnerability tracking and are required for audits.
2. Activate CVE Checking
3. Annotate CVE Status in Recipes
📝 CRA Tip: Your CVE tracking must be documented and transparent. This metadata will help satisfy that requirement.
4. Build a Secure, Reusable Yocto Platform
5. Embrace Documentation (Yes, Really)
Bonus: Secure Design Starts with Yocto Configuration
The Bottom Line: Yocto Can Help—But You Have to Use It Right