Skip to content
Inovasense

ENISA

ENISA — The EU's central cybersecurity authority, responsible for CRA vulnerability reports, certification schemes, and policy guidance.

ENISA — European Union Agency for Cybersecurity

ENISA (European Union Agency for Cybersecurity) is the EU’s central body for cybersecurity expertise and coordination. Under the Cyber Resilience Act, ENISA becomes the mandatory reporting point for vulnerabilities in connected products — manufacturers must notify ENISA within 24 hours of becoming aware of an actively exploited vulnerability.

Key Facts

DetailInformation
Full nameEuropean Union Agency for Cybersecurity
Former nameEuropean Network and Information Security Agency (until 2019)
Established2004
Permanent mandateEU Cybersecurity Act (Regulation 2019/881)
HeadquartersAthens, Greece (operational centre in Heraklion, Crete)
Budget (2024)~€25 million
Staff~100 experts
Key role under CRACentral vulnerability reporting platform (CSIRT coordination)

ENISA’s Role in the CRA Ecosystem

1. Vulnerability Reporting Hub

Under the CRA, ENISA operates the single reporting platform for the EU:

TriggerReporting DeadlineInformation Required
Actively exploited vulnerability discovered24 hours — early warning to ENISAProduct affected, vulnerability nature, severity, exploitation status
Follow-up notification72 hoursDetailed technical assessment, corrective measures planned
Final report14 daysRoot cause, full remediation, affected product versions, patch status

Critical for manufacturers: If your product is deployed across the EU and a CVE is published for one of your SBOM components, you must notify ENISA within 24 hours if there is evidence of exploitation. This requires automated vulnerability monitoring — manual tracking is insufficient at scale.

2. EU Cybersecurity Certification

ENISA develops EU-wide certification schemes under the Cybersecurity Act:

SchemeStatusScope
EUCC (EU Common Criteria)AdoptedICT products evaluated under Common Criteria
EUCS (EU Cloud Services)In developmentCloud service providers
EU5G (5G Security)In development5G network equipment and components
CRA certificationExpectedCritical product categories under CRA

3. Coordination & Advisory

FunctionDescription
CSIRTs NetworkCoordinates national Computer Security Incident Response Teams
EU-CyCLONeCyber crisis management for large-scale incidents
Threat landscapeAnnual “ENISA Threat Landscape” report — the EU’s primary threat intelligence publication
GuidancePublishes implementation guidelines for NIS2, CRA, and cybersecurity standards
TrainingENISA Academy — cybersecurity training for professionals and policymakers

ENISA and the NIS2 Directive

While CRA covers product vulnerability reporting to ENISA, NIS2 covers organizational incident reporting:

AspectCRA → ENISANIS2 → CSIRT
Who reportsProduct manufacturersEssential/important entities
What is reportedProduct vulnerabilitiesCybersecurity incidents affecting the organization
Deadline24 hours (early warning)24 hours (initial notification)
What happens nextENISA coordinates EU-wide responseNational CSIRT coordinates local response
OverlapA product vulnerability that causes an organizational incident triggers both reporting obligations

Impact on Hardware Manufacturers

For companies building connected hardware products for the EU market:

  1. Set up ENISA reporting process — Establish internal procedures for 24/72h/14d vulnerability reporting.
  2. Automate vulnerability monitoring — Use SBOM monitoring to match your components against the CVE database continuously.
  3. Designate a PSIRT — Product Security Incident Response Team is the manufacturer’s interface with ENISA.
  4. Test the process — Conduct tabletop exercises simulating a vulnerability disclosure to validate response time.

This is exactly what our SBOM Monitoring Service automates — continuous CVE matching against your product’s SBOM with pre-formatted ENISA reports ready for submission.

  • CRA — The regulation mandating 24-hour vulnerability reporting to ENISA.
  • NIS2 — The directive mandating organizational incident reporting, coordinated through ENISA’s CSIRT network.
  • CVE — The vulnerability identifiers that trigger ENISA reporting obligations.
  • SBOM — The component inventory used to match products against known vulnerabilities for ENISA reporting.