Skip to content
Inovasense

Post-market Surveillance (PMS)

Post-market Surveillance is mandatory EU monitoring after product launch — CRA extends this with 5-year vulnerability management and SBOM requirements.

Post-market Surveillance (PMS) is the systematic process by which a manufacturer actively monitors the performance and safety of their products after they have been placed on the EU market. PMS is a legal obligation under virtually all CE marking directives, not an optional quality improvement activity. The EU Cyber Resilience Act (CRA) has raised the bar significantly — transforming PMS from a passive complaint-collection function into an active, continuous cybersecurity monitoring programme.

Post-market surveillance obligations arise from:

  • The General Product Safety Regulation (GPSR, EU 2023/988) — applies to all consumer products; manufacturers must collect and analyse field information, investigate incidents, and take corrective actions
  • Sector-specific directives — EMC, LVD, RED, and Machinery all require manufacturers to monitor field reports and investigate safety-relevant issues
  • Medical Device Regulation (EU 2017/745) — the most prescriptive PMS regime; requires a formal PMS plan, PMS reports (PSUR for Class IIa+), field signal analysis, and periodic safety update reports
  • EU Cyber Resilience Act (EU 2024/2847) — requires continuous vulnerability monitoring for the product’s entire supported lifetime (minimum 5 years), 24-hour ENISA notification of actively exploited vulnerabilities, and monthly updates on remediation status

CRA Post-market Obligations in Detail

The CRA’s post-market requirements are the most operationally demanding in EU hardware law:

ObligationTimelineWho must act
Report actively exploited vulnerabilityWithin 24 hours of becoming awareManufacturer → ENISA (via ENISA’s single reporting platform)
Preliminary notificationWithin 72 hours of discovering the vulnerability was actively exploitedManufacturer → ENISA
Final vulnerability reportWithin 14 days of implementing a fixManufacturer → ENISA
SBOM maintenanceContinuous — must reflect all software components at any point in timeManufacturer
Vulnerability handling policyMust be published and maintainedManufacturer
Security updatesMust be provided free of charge for the supported lifetimeManufacturer → Users
End-of-security-support notificationMust notify users and EU database when support endsManufacturer

PMS Infrastructure for Hardware Products

Effective post-market surveillance for connected hardware requires:

1. Software Bill of Materials (SBOM) Monitoring The SBOM must be cross-referenced continuously against public vulnerability databases (CVE/NVD, OSV.dev, GitHub Advisory Database, vendor security advisories). When a CVE affects a component in the SBOM, the impact on the specific product configuration must be assessed.

2. Vulnerability Assessment and Triage Not every CVE in a dependency is exploitable in a specific product configuration. A proprietary library compiled with specific flags, running in a sandboxed environment, may not be affected by a vulnerability described in the CVE. Triage requires product-specific expertise — generic CVE scanners produce false positives that lack this context.

3. OTA Update Infrastructure Security patches must reach deployed devices reliably. This requires authenticated OTA infrastructure (SUIT manifest-based firmware updates, or equivalent), a staging/rollback mechanism, and telemetry confirming update uptake across the installed base.

4. Incident Response Process A documented process for receiving, triaging, and responding to externally reported vulnerabilities (coordinated vulnerability disclosure) must exist and be publicly referenced in the product documentation.

5. ENISA Reporting Process The 24-hour reporting requirement is operationally demanding. Automated alerting from SBOM monitoring tools feeding into a defined escalation path is required — a manual daily review is insufficient for compliance.

PMS vs. Quality Management

Post-market surveillance is distinct from, but feeds into, quality management:

PMSQuality Management (QMS)
ScopeField performance of specific productsProcesses and systems producing those products
Regulatory basisProduct directivesISO 9001, ISO 13485 (MDR), IEC 62443 (CRA)
TriggerMarket data, field incidents, vulnerability disclosuresNonconformances, audits, management review
OutputCorrective actions, ENISA notifications, safety alertsCAPA, process improvements, supplier evaluations

Official References