The Linux Foundation CRA Stewards Playbook
Congratulations! You get to be an open source Steward as outlined within the EU’s Cyber Resilience Act (CRA). You are vitally important in supporting upstream projects, developers, and maintainers as they go about the task of maintaining and creating innovative solutions that solve the world’s problems. The Steward role was recognized early on by EU policymakers as distinct from the software creators and the commercial organizations that sell products using those technologies.
While open source software stewards are not subject to the full obligations imposed on manufacturers under this Regulation (and therefore may not affix the CE marking to supported digital products), they remain responsible for implementing a security strategy, reporting vulnerabilities, and cooperating with market surveillance authorities to ensure the cybersecurity and integrity of open source projects.
- Executive Summary
- CRA Steward Obligations
- Checklist
Executive Summary
The EU’s Cyber Resilience Act (CRA) is one of the most consequential pieces of legislation recently drafted and put into force. It combines cybersecurity hygiene, best practices, vulnerability reporting, and documentation requirements that may be unfamiliar to many that work exclusively upstream. Please first consult the LF CRA Stewards ED/GM One-Pager for more concise instructions. This playbook is designed to provide more in-depth details and instructions on how an Open Source Steward can fulfill their obligations, both under the law, but as well to the projects that are housed beneath them as well as the community of members and other participants within the ecosystem.
The CRA created a new role, the Open Source Steward to help support upstream projects, maintainers and contributors but also the downstream projects and the manufacturers:
| An ‘open-source software steward’ means a legal person, other than a manufacturer, that has the purpose or objective of systematically providing support on a sustained basis for the development of specific products with digital elements (PDEs), qualifying as free and open-source software and intended for commercial activities, and that ensures the viability of those products (Article 3.14) | | :—: |
This category reflects the “importance for cybersecurity of many products with digital elements qualifying as free and open source software that are published, but not made available on the market within the meaning of the [CRA]” (recital 19). A legal person may qualify as a steward only in relation to products with digital elements that constitute FOSS and are published, but not made available on the market within the meaning of the CRA.
A legal person may simultaneously assume different roles under the CRA: it may be a steward for one FOSS project and a manufacturer for another, including different versions of the same software (such as community and monetised versions). For each FOSS it publishes, the legal person must assess whether the software is made available on the market (triggering manufacturer obligations) or, if not, whether it is intended for commercial activities and supported in a manner that meets the definition of steward.
Recital 19 clarifies that sustained support includes activities such as hosting or managing development platforms, hosting source code or software, governing or managing FOSS projects, and steering their development. Foundations or other legal entities that provide such support for specific FOSS intended for commercial activities may therefore qualify as stewards in relation to those projects.
Stewards are formally recognized as entities that can support the compliance efforts of open source software projects and shared digital components. The regulation assigns them a limited but essential set of legal obligations, primarily focused on ensuring that secure development and vulnerability handling processes are in place, and that relevant information can be communicated effectively to market surveillance authorities when required. These obligations aim to establish a clear line of accountability for the security posture of software elements that may be integrated into products placed on the Union market. In fulfilling these duties, stewards act as a bridge between open source or collaborative development environments and the regulatory compliance expectations imposed on commercial manufacturers.
Where a specific FOSS is neither placed on the market within the meaning of the CRA nor meets the criteria for stewardship, the legal person is not subject to obligations under the CRA in relation to that FOSS. Not every project needs a Steward. Some stewards will support multiple projects within their community. The flowchart below is a starting point for clarifying if you are a steward or a manufacturer or both.

Figure 1: Manufacturer vs Steward 1
Further guidance will be provided by the European Commission on their CRA Implementation webpage.
CRA Steward Obligations
The content of the table below is taken from the text of the CRA:
| Area | Citation | Requirement | TL/DR |
|---|---|---|---|
| Cyber Policy | Article 24 | 1. Open source software stewards shall put in place and document in a verifiable manner a cybersecurity policy to foster the development of a secure product with digital elements as well as an effective handling of vulnerabilities by the developers of that product. That policy shall also foster the voluntary reporting of vulnerabilities as laid down in Article 15 by the developers of that product and take into account the specific nature of the open source software steward and the legal and organisational arrangements to which it is subject. That policy shall, in particular, include aspects related to documenting, addressing and remediating vulnerabilities and promote the sharing of information concerning discovered vulnerabilities within the open source community. | security.md +vuln reporting process/link |
| Vuln Reporting and MSA cooperation | Article 24 | 2. Open source software stewards shall cooperate with the market surveillance authorities, at their request, with a view to mitigating the cybersecurity risks posed by a product with digital elements qualifying as free and open source software. | cooperate with M.S.A. to mitigate risks |
| Further to a reasoned request from a market surveillance authority, open source software stewards shall provide that authority, in a language which can be easily understood by that authority, with the documentation referred to in paragraph 1, in paper or electronic form. | policy posted electronically | ||
| Vuln Reporting | Article 24 | 3. The obligations laid down in Article 14(1) shall apply to open source software stewards to the extent that they are involved in the development of the products with digital elements. The obligations laid down in Article 14(3) and (8) shall apply to open source software stewards to the extent that severe incidents having an impact on the security of products with digital elements affect network and information systems provided by the open source software stewards for the development of such products. | Report vulns and known exploits to the Union |
Table 1: List of CRA Stewards obligations
In more plain language, here is what the Steward’s obligations come down to:
- Have a vulnerability reporting process and publicly posted policy.
- Have a single point of contact for reporting and inquiring about vulnerabilities (e.g. https://www.linuxfoundation.org/security)
- If approached by EU officials (Market Surveillance Authority (MSA), ENISA, National CSIRT, etc.) provide requested information.
- If a project is known to be actively exploited or if underlying Foundation infrastructure (e.g. CI/CD systems, websites, etc.) has suffered a cybersecurity incident, report to the ENISA Single Reporting Platform (SRP).
We will cover each of these requirements in more detail below.
Within the CRA, multiple roles are defined. Predominantly, the most requirements fall on the Manufacturer category. A Manufacturer places a Product with Digital Elements (PDE) onto the (EU) Market and sells goods/services to consumers. This document focuses on the Open Source Steward role, but several of the requirements are similar between the two roles.

Figure 2: Manufacturer vs Steward
Not every upstream project needs or wants a Steward. A Steward typically will have access to more resources than an unaffiliated single-maintainer project, which positions them to be able to assist projects within their community.

Figure 3: LF sub-foundations as stewards
Beyond their legally binding duties under the CRA, stewards hold a broader and moral ecosystem responsibility that extends across the digital supply chain. Positioned at the intersection of open source communities, manufacturers, and regulators, they are uniquely capable of translating complex legal requirements into actionable practices. This moral obligation compels stewards to support manufacturers, maintainers, and Micro, Small, and Medium Enterprises (MSMEs) in understanding and operationalising CRA provisions, particularly for those lacking the expertise or resources to navigate cybersecurity compliance independently.
In practice, this expanded role could encompass capacity-building, mechanisms to ease compliance and knowledge transfer:
- providing structured training, guidance, and mentoring;
- developing standardized templates and tools to facilitate the compliance process;
- and simplifying vulnerability reporting and documentation processes.
By creating accessible pathways to compliance, stewards help to ensure a consistent and pragmatic implementation of the CRA across diverse technological domains, mitigating the disproportionate regulatory burden on smaller actors.
Through these voluntary yet essential contributions, stewards evolve from compliance facilitators into enablers of systemic resilience. Their proactive engagement strengthens trust and cooperation among stakeholders, promotes the sustainable adoption of secure development practices, and ensures that the CRA’s ultimate goal - enhancing cybersecurity without negatively-impacting innovation - is effectively achieved throughout the European digital ecosystem.
Referenced obligations that were adapted for stewards:
| Area | Citation | Requirement | TL/DR |
|---|---|---|---|
| Vuln Reporting | Article 15 | Manufacturers as well as other natural or legal persons may notify any vulnerability contained in a product with digital elements as well as cyber threats that could affect the risk profile of a product with digital elements on a voluntary basis to a CSIRT designated as coordinator or ENISA. | notify ENISA + National CSIRT contact about discovered vulns |
| Vuln Reporting | Article 15 | Manufacturers as well as other natural or legal persons may notify any incident having an impact on the security of the product with digital elements as well as near misses that could have resulted in such an incident on a voluntary basis to a CSIRT designated as coordinator or ENISA. | notify ENISA + National CSIRT contact about cyber incidents |
| Vuln Reporting | Article 15 | The CSIRT designated as coordinator or ENISA shall process the notifications referred to in paragraphs 1 and 2 of this Article in accordance with the procedure laid down in Article 16. The CSIRT designated as coordinator may prioritise the processing of mandatory notifications over voluntary notifications. | Select a National CSIRT to notify |
| Vuln Reporting | Article 15 | Where a natural or legal person other than the manufacturer notifies an actively exploited vulnerability or a severe incident having an impact on the security of a product with digital elements in accordance with paragraph 1 or 2, the CSIRT designated as coordinator shall without undue delay inform the manufacturer. | notify ENISA + National CSIRT contact about active exploited vulns |
| Vuln Reporting | Article 15 | The CSIRTs designated as coordinators as well as ENISA shall ensure the confidentiality and appropriate protection of the information provided by a notifying natural or legal person. Without prejudice to the prevention, investigation, detection and prosecution of criminal offences, voluntary reporting shall not result in the imposition of any additional obligations upon a notifying natural or legal person to which it would not have been subject had it not submitted the notification. | CSIRTs may contact Stewards for assistance |
| Vuln Reporting | Article 14 | A manufacturer shall notify any actively exploited vulnerability contained in the product with digital elements that it becomes aware of simultaneously to the CSIRT designated as coordinator, in accordance with paragraph 7 of this Article, and to ENISA. The manufacturer shall notify that actively exploited vulnerability via the single reporting platform established pursuant to Article 16. | establish an EU National CSIRT contact, report known actively exploited vulns to EU National CSIRT contact and ENISA |
| Vuln Reporting | Article 14 | For the purposes of the notification referred to in paragraph 1, the manufacturer shall submit: an early warning notification of an actively exploited vulnerability, without undue delay and in any event within 24 hours of the manufacturer becoming aware of it, indicating, where applicable, the Member States on the territory of which the manufacturer is aware that their product with digital elements has been made available; unless the relevant information has already been provided, a vulnerability notification, without undue delay and in any event within 72 hours of the manufacturer becoming aware of the actively exploited vulnerability, which shall provide general information, as available, about the product with digital elements concerned, the general nature of the exploit and of the vulnerability concerned as well as any corrective or mitigating measures taken, and corrective or mitigating measures that users can take, and which shall also indicate, where applicable, how sensitive the manufacturer considers the notified information to be; © unless the relevant information has already been provided, a final report, no later than 14 days after a corrective or mitigating measure is available, including at least the following: a description of the vulnerability, including its severity and impact; where available, information concerning any malicious actor that has exploited or that is exploiting the vulnerability; details about the security update or other corrective measures that have been made available to remedy the vulnerability. | establish an EU National CSIRT contact, report “severe” vulns to EU National CSIRT contact and ENISA |
| Vuln Reporting | Article 14 | A manufacturer shall notify any severe incident having an impact on the security of the product with digital elements that it becomes aware of simultaneously to the CSIRT designated as coordinator, in accordance with paragraph 7 of this Article, and to ENISA. The manufacturer shall notify that incident via the single reporting platform established pursuant to Article 16. | notify end-consumers of “severe” vulnerabilities |
| Vuln Reporting | Article 14 | After becoming aware of an actively exploited vulnerability or a severe incident having an impact on the security of the product with digital elements, the manufacturer shall inform the impacted users of the product with digital elements, and where appropriate all users, of that vulnerability or incident and, where necessary, of any risk mitigation and corrective measures that the users can deploy to mitigate the impact of that vulnerability or incident, where appropriate in a structured, machine-readable format that is easily automatically processable. Where the manufacturer fails to inform the users of the product with digital elements in a timely manner, the notified CSIRTs designated as coordinators may provide such information to the users when considered to be proportionate and necessary for preventing or mitigating the impact of that vulnerability or incident. | Notification of impacted users |
| Market Surveillance | Article 52 | The market surveillance authorities designated under paragraph 2 of this Article shall also be responsible for carrying out market surveillance activities in relation to the obligations for open-source software stewards laid down in Article 24. Where a market surveillance authority finds that an open-source software steward does not comply with the obligations set out in that Article, it shall require the open-source software steward to ensure that all appropriate corrective actions are taken. Open-source software stewards shall ensure that all appropriate corrective action is taken in respect of their obligations under this Regulation. | Stewards found non-compliant must take corrective actions to respect obligations |
Table 2: List of referenced obligations in the Article 24
The list of obligations can be found at the next link as well: OSS Stewards Obligations Checklist
CRA Glossary of Terms2
Manufacturer means a natural or legal person who develops or manufactures products with digital elements or has products with digital elements designed, developed or manufactured, and markets them under its name or trademark, whether for payment, monetisation or free of charge
Open-source software Steward means a legal person, other than a manufacturer, that has the purpose or objective of systematically providing support on a sustained basis for the development of specific products with digital elements, qualifying as free and open-source software and intended for commercial activities, and that ensures the viability of those products
Product with Digital Elements (PDE) means a software or hardware product and its remote data processing solutions, including software or hardware components being placed on the market separately
Market surveillance authority (MSA) means a market surveillance authority as defined in Article 3, point (4), of Regulation (EU) 2019/1020 - means an authority designated by a Member State under Article 10 as responsible for carrying out market surveillance in the territory of that Member State;3
‘Exploitable vulnerability’ means a vulnerability that has the potential to be effectively used by an adversary under practical operational conditions
All CRA-related definitions can be found in the CRA’s Article 3. Further ones will be provided in the CEN’s Vocabulary deliverable 40000-1-1.
1. Cybersecurity Policy
Article 24.1 states:
“Open-source software stewards shall put in place and document in a verifiable manner a cybersecurity policy to foster the development of a secure product with digital elements as well as an effective handling of vulnerabilities by the developers of that product. That policy shall also foster the voluntary reporting of vulnerabilities as laid down in Article 15 by the developers of that product and take into account the specific nature of the open-source software steward and the legal and organisational arrangements to which it is subject. That policy shall, in particular, include aspects related to documenting, addressing and remediating vulnerabilities and promote the sharing of information concerning discovered vulnerabilities within the open-source community.”
Open source projects, open source Stewards, and Manufacturers are all responsible for managing the intake, triage, and remediation of vulnerabilities reported to them. Depending on the group’s size, maturity, and available resources this could come in many different forms. While the specific processes or response times will vary greatly, there are several common requirements that should be in place as a group is writing their security policy:
- The scope of the policy (what projects, organizations, or artifacts that are covered by the Policy)
- A valid contact to which to report discovered bugs, defects, and security vulnerabilities.
- Having a private vulnerability reporting mechanism is a preferred way by which researchers or other parties can safely share sensitive details prior to public disclosure (PD)
Additionally the Policy could also could state:
- Response time expectations
- Projects’ bug bar/review criteria (what the project considers a vulnerability, and more importantly what they do not)
- Support lifecycle for the project (so that consumers understand what is in scope and what is not for requests and reports)
- Additional project security resources or channels available
This policy typically takes the form of a security.md or security.txt file at the top-level of a project’s source code repository, but it may exist in other locations or files.
OpenSSF Vulnerability Disclosures CVD guide for Open Source Projects and Maintainers
OpenSSF Vulnerability Disclosure CVD Guide Policy Templates
2. Cooperation with Authorities
2.1 Entities that are involved
There are several key entities that are involved in this EU cyber legislation and the enforcement of it across the Union:
- Market Surveillance Authority (MSA)
- European Union Agency for Cybersecurity (ENISA)
- European Commission (EC)
- National CSIRTs
- Administrative Cooperation Group (ADCO)
| Entities | Description and Missions |
|---|---|
| MSA Market Surveillance Authorities | Each EU state will have the obligation to designate an authority (existing or a newly-created one) to fulfill this role. Core Missions of MSAs under the CRA: Guarantee that PDEs meet essential requirements to be placed on the EU markets. Verify that CE marking and EU declarations of conformity are correctly applied. Conduct inspections, tests, and audits of products with digital elements available on the EU market. Monitor the functioning of post-market cybersecurity obligations, like vulnerability handling and reporting. Collaborate closely with national authorities, the European Commission, ENISA and other authorities/agencies in order to ensure a unified cross-border approach and a fruitful sharing of information among them. Assess the risks for non-compliant products, follow-up with the corrective non-compliant products and impose penalties. Offer guidance to manufacturers, distributors and maintain a close-cooperation with the stewards. Investigate cybersecurity incidents and ensure proper follow-up activities. Ensure seamless communication with the consumers providing guidance about reporting any issues and also informing them about serious risks related to actively-exploitable vulnerabilities. The full list of MSAs can be found at the next link: https://webgate.ec.europa.eu/single-market-compliance-space/market-surveillance/ma-authorities |
| ENISA European Union Agency for Cybersecurity | The CRA strengthens ENISA’s role as the EU Agency for Cybersecurity and the permanent agency designed to support the member states in these matters. It will act as the backbone for the CRA, helping to transform the legal obligations into practical, coordinated and actionable efforts across the Union. Among its responsibilities: It will set up and manage the EU SRP (Single Platform for Reporting cybersecurity incidents and vulnerabilities.) It will support the coordinated vulnerability disclosure processes. It will build the European Cybersecurity Certification framework It will prepare a biannual report identifying the trends in cybersecurity for digital products. |
| CSIRT Security Incident Response Centres | Known internationally as “CERTS” (Computer Emergency Response Team), since 2017, the Member States of the European Union have developed a new and distinct level of cooperation at the EU level for handling large-scale and cross-border cybersecurity incidents: the CSIRTs Network, composed of incident response teams appointed by the EU institutions and Member States. Setting up and working closely with a CSIRT is extremely important for maintaining the CRA compliance. The mission of the European Union CSIRTs network includes to exchange information and build trust at EU level discuss and, where possible, implement a coordinated response to an incident provide EU Member States with assistance in addressing cross-border incidents cooperate and exchange best practices in incident response provide assistance to the CSIRTs designated for the coordinated disclosure of vulnerabilities which could have a significant impact on entities in more than one EU Member State.4 |
| ADCO Administrative Cooperation Group | European cooperation on market surveillance takes place through informal groups of market surveillance authorities, called Administrative Cooperation Groups (AdCos). A new AdCo for CRA will be created and will include representatives from the supervisory authorities ensuring a consistent application of rules and efficient answer to cybersecurity risks across EU countries. Its missions span across multiple areas: It ensures a harmonized enforcement across the EU counties, coordinating and aligning how CRA is implemented by the MSAs, minimizing the discrepancies. Facilitate the exchange of information and best practices between MSAs but also with the stewards, EC and ENISA. Coordinate and create unified risk-based methodologies and penalty frameworks. Help create training paths and exchange technical expertise and tools. Deals with specific aspects of market surveillance concerning the obligations placed on open source software stewards. |
Table 3: List of cybersecurity authorities
These authorities will have a crucial role in ensuring that PDEs placed on the EU market comply with the requirements set by the CRA. The cooperation with these organizations and, implicitly, the communication between the authorities and the open source communities are representing the essence of the steward role. In this way, stewards are providing support and guidance for software having commercial intent (which means that it is targeted to be integrated into products and/or services).
2.2 The EU SRP and National CSIRT designation
The CRA establishes a unified framework for incident and vulnerability reporting through a centralized platform operated by ENISA. According to Article 16(1), this single reporting platform (SRP) will be designed to streamline manufacturers’ notification obligations under Articles 14 and 15, which concern actively exploited vulnerabilities and severe incidents affecting products with digital elements. ENISA is responsible for managing and maintaining the platform’s daily operations, while its architecture allows both Member States and ENISA to integrate their own electronic notification endpoints, ensuring interoperability across the Union.
Once a notification is received, Article 16(2) assigns coordination responsibilities to the Computer Security Incident Response Team (CSIRT) designated as the initial coordinator. This CSIRT must promptly disseminate the received notification through the ENISA platform to other national CSIRTs acting as coordinators in the Member States where the manufacturer’s products are available. This mechanism ensures rapid information sharing, consistent situational awareness, and coordinated response efforts across jurisdictions. A full mapping of national CSIRTs can be accessed through ENISA’s map of CSIRTs.
The CRA further clarifies the process for determining where and to whom manufacturers should report incidents. Under Article 14(7), a steward’s main establishment in the Union is defined as the Member State where decisions regarding the cybersecurity of its products are predominantly taken. If such a location cannot be identified, the main establishment defaults to the Member State hosting the steward’s largest workforce within the EU. For stewards without a main establishment in the Union, the CRA outlines a clear order of precedence for selecting the appropriate CSIRT endpoint: first, the Member State where the authorised representative acts on behalf of the steward for the highest number of projects; then the Member State of the principal importer, followed by that of the main distributor, and finally, the Member State where the largest number of ‘users’ are located. Once a steward reports an incident or vulnerability to a given CSIRT under these criteria, subsequent notifications may continue to be submitted to that same coordinator for consistency.

Figure 4: Reporting vulnerabilities via SRP
Pursuant to Article 16(2) of that Regulation, the CSIRT designated by the Member State as coordinator that initially receives the notification may, in exceptional circumstances and on justified cybersecurity-related grounds, delay the dissemination of the notification to the CSIRTs of other Member States where the product with digital elements has been made available. The Delegated Regulation C(2025)8407 mentions the three circumstances in which such a decision to delay may be taken:
- in the light of an evaluation of the nature of the notified information;
- if the CSIRT receiving the notification is unable to ensure the confidentiality of such information;
- if the single reporting platform has been compromised or is temporarily not operational.
Through these provisions, the CRA creates a harmonised reporting and coordination structure that enables swift, secure, and coherent communication between manufacturers, national authorities, and ENISA. This system not only reduces administrative complexity but also strengthens the Union’s collective capacity to detect, assess, and mitigate cybersecurity risks associated with products with digital elements.
2.3 What EU Authorities May Request from a Steward
Under the CRA, OSS Stewards are subject to a distinct and limited compliance regime set out in Article 24. They are not manufacturers and must not be treated as such. Accordingly, EU authorities may request information from an OSS steward only to the extent necessary to verify compliance with the obligations that actually apply to that role. These requests must remain proportionate, role-based, and directly linked to reporting, coordination, or user-notification duties. Any request that mirrors manufacturer-level conformity, product assurance, or supply-chain accountability checks exceeds the CRA framework applicable to OSS stewards.
The scope of lawful requests is further limited by the conditional nature of Article 14 obligations. Reporting and notification duties arise only where the OSS steward is factually involved in the development of a product with digital elements or operates infrastructure used for such development. Authorities may therefore request evidence clarifying whether these factual conditions are met, but may not presume applicability by default. In practice, the primary and most common information provided by an OSS steward will be role clarification, not product-level technical documentation.
MSAs may request information necessary to verify whether the OSS steward has fulfilled its Article 24 obligations. This includes documentation describing the steward’s role and governance, confirmation of non-manufacturer status, evidence of vulnerability or incident notifications where applicable, and proof that users were informed in accordance with Article 14(8). MSAs shall not require CE marking, conformity assessments, Annex VII technical documentation, secure development lifecycle evidence, SBOMs, or product risk assessments, as these obligations apply exclusively to manufacturers and other economic operators placing products on the market.
ENISA may request copies or clarifications of notifications submitted under Article 14, as well as aggregated or anonymized information needed for EU-level threat analysis and situational awareness. ENISA’s mandate does not include enforcement or auditing powers. It may not request internal governance documentation unrelated to reporting, conduct compliance audits, or seek confidential contributor or community data beyond what is strictly necessary for coordination.
National CSIRTs, when acting as designated coordinators, may request technical details required to assess and coordinate the response to a specific vulnerability or severe incident. This may include indicators of compromise, mitigation measures, disclosure timelines, and confirmation of coordinated disclosure status. Their authority is incident-specific and does not extend to general CRA compliance reviews or enforcement measures. Any involvement in user notification under Article 14(8) remains exceptional and must be proportionate.
It is essential to emphasize that the limited scope of requestable information does not diminish the duty to cooperate. OSS stewards must engage with authorities in good faith, respond promptly, and be practically helpful within their remit. Where a request partially exceeds Article 24, the appropriate response is constructive scoping: providing what is relevant, explaining the legal boundary, and, where appropriate, directing authorities to downstream manufacturers or other responsible economic operators. Cooperation under the CRA is mandatory, but we need to keep in mind that we are talking about a cooperation within clearly defined limits.
What cooperation means in practice
- Responding promptly and professionally
- Clearly explaining the steward’s role and level of involvement
- Providing relevant incident or vulnerability information within scope
- Referencing public advisories, SECURITY.md files, or CVE records
- Assisting authorities in understanding technical context and impact
- Redirecting out-of-scope requests to downstream manufacturers where appropriate
What cooperation does not mean
- Accepting manufacturer-level obligations
- Providing CE marking or conformity documentation
- Disclosing Annex VII technical files, SBOMs, or risk assessments
- Sharing contributor personal data or unrelated internal materials
- Expanding incident coordination into general compliance audits
| CRA Article | Applicable to OSS Steward? | Requestable Evidence | Non-Requestable Evidence | Notes / Guidance |
|---|---|---|---|---|
| Art. 14(1) – Reporting actively exploited vulnerabilities | Yes, if actively involved in product development | Notifications submitted to CSIRT and ENISA Timestamped internal logs of vulnerability reports Classification/triage records | Downstream proprietary product assessments SBOMs of products using OSS Risk assessments of unrelated systems | Only applies to vulnerabilities actively exploited in products OSS steward develops. |
| Art. 14(3) – Reporting severe incidents | Yes, if steward operates network/infrastructure used for product development | Incident reports affecting steward-operated systems Logs or evidence showing assessment of severity Notifications to CSIRT and ENISA | Incidents outside steward infrastructure Product technical documentation unrelated to steward systems | Scope is incidents impacting steward-operated infrastructure. |
| Art. 14(7) – CSIRT coordination | Indirect | Records showing CSIRT designated as coordinator was notified | Full CSIRT internal communications | Only relevant to show notification compliance; internal CSIRT workflow not required. |
| Art. 14(8) – User notification | Yes, if a reportable vulnerability or incident occurred | Public advisories, mailing list posts, SECURITY.md or security.txt references Evidence of timing of notification Mitigation instructions provided to users | Proprietary downstream vendor communications Private contributor data | Authorities may check that users were timely informed, not the steward’s private communications. |
| Art. 16 – Single Reporting Platform | Yes, as mandatory under Art. 14(1)/(3) | Proof of submission to the single reporting platform Acknowledgment of receipt by CSIRT/ENISA | Internal technical development files Code reviews unrelated to incident | Provides technical proof of CRA compliance for reporting obligations. |
| Art. 24(1 and 3) – OSS-specific obligations | Yes, always | Evidence of role (steward vs manufacturer) Scope of OSS involvement (active development vs passive hosting) Documented processes for handling vulnerabilities/incidents including its cybersecurity policy | CE marking or conformity assessments Annex VII technical documentation Full product risk analysis | Article 24 limits all requests; authorities cannot impose manufacturer duties on OSS stewards. |
Table 4: Eventual Requested Information by Authorities
3. Specific reporting duties for stewards
3.1 Legal framework for Stewards’ reporting obligations
Under the CRA, OSS stewards are subject to reporting obligations only in specific, clearly defined circumstances. These obligations are not universal and depend on the steward’s factual involvement and operational role.
Article 24.3: The obligations laid down in Article 14(1) shall apply to open source software stewards to the extent that they are involved in the development of the products with digital elements. The obligations laid down in Article 14(3) and (8) shall apply to open source software stewards to the extent that severe incidents having an impact on the security of products with digital elements affect network and information systems provided by the open source software stewards for the development of such products.
Article 14.1: A manufacturer shall notify any actively exploited vulnerability contained in the product with digital elements that it becomes aware of simultaneously to the CSIRT designated as coordinator, in accordance with paragraph 7 of this Article, and to ENISA. The manufacturer shall notify that actively exploited vulnerability via the single reporting platform established pursuant to Article 16.
Article 14.3: A manufacturer shall notify any severe incident having an impact on the security of the product with digital elements that it becomes aware of simultaneously to the CSIRT designated as coordinator, in accordance with paragraph 7 of this Article, and to ENISA. The manufacturer shall notify that incident via the single reporting platform established pursuant to Article 16.
Article 14.8: After becoming aware of an actively exploited vulnerability or a severe incident having an impact on the security of the product with digital elements, the manufacturer shall inform the impacted users of the product with digital elements, and where appropriate all users, of that vulnerability or incident and, where necessary, of any risk mitigation and corrective measures that the users can deploy to mitigate the impact of that vulnerability or incident, where appropriate in a structured, machine-readable format that is easily automatically processable. Where the manufacturer fails to inform the users of the product with digital elements in a timely manner, the notified CSIRTs designated as coordinators may provide such information to the users when considered to be proportionate and necessary for preventing or mitigating the impact of that vulnerability or incident.
Put more simply, depending on their level of involvement, OSS Stewards may have different obligations regarding specific reporting duties:
- If stewards are actively involved in product development, they must also report Actively Exploited Vulnerabilities for that specific product.
- Otherwise, they are only required to report incidents affecting the steward’s own network and information systems used for product development.
| Steward activity | Applicable CRA article | Reporting obligation |
|---|---|---|
| Actively involved in development of a product with digital elements | Art. 24.3 + Art. 14(1) | Report actively exploited vulnerabilities affecting that product |
| Operating infrastructure used to develop OSS (CI, repos, build systems) | Art. 24.3 + Art. 14(3), (8) | Report severe incidents affecting steward-operated infrastructure. |
| Passive hosting or mirroring only | None | No CRA reporting obligation |
| Downstream proprietary product affected by OSS vulnerability | Indirect | Disclosure encouraged, not mandated |
Table 5: List of reporting obligations depending on steward’s activity
OSS stewards should establish internal procedures to ensure timely identification, triage, and escalation of vulnerabilities and incidents that may trigger CRA reporting obligations. As a best practice, OSS stewards should:
- Acknowledge vulnerability reports within a defined timeframe
- Rapidly assess whether a vulnerability is:
- Actively exploited
- Affecting a product with digital elements
- Affecting steward-operated infrastructure
- Escalate potentially reportable issues to a designated CRA response team
Where Article 14(8) becomes applicable for OSS stewards, they must ensure that impacted users are informed in a timely and effective manner through:
- Publication of machine-readable security advisories in project repositories;
- Announcements on mailing lists and public chats.
Proprietary software, characterized by restrictive licensing, often incorporates open source components. As a result, vulnerabilities in open source software can directly impact proprietary systems as well. Therefore, it is recommended that each project documents their vulnerability disclosure and security policy publicly (Annex I, part II). This typically is done using such files as security.md, security.txt, compliance.md, or the like.
One of the obligations quoted above from Art. 24, highlights the stewards’ obligation to effectively handle the vulnerabilities. The OpenSSF’s Vulnerability Disclosure working group has crafted a Guide to Coordinated Disclosure for open source software projects that provides valuable insights and information around how to prepare for and respond to vulnerability reports that projects and your foundation may receive. This includes templates for many common security-related processes and a CVD Playbook, as well as a simplified process if a project our your foundation has a security team and wants to become a Guide to becoming a CNA (CVE Numbering Authority) and control the public communications around discoveries within your software and projects.
CRA compliance will rely heavily on evidence. Consequently, OSS stewards should retain records demonstrating compliance with CRA reporting obligations, including:
- Vulnerability reports received
- Internal assessments and classification decisions
- Notifications submitted to CSIRTs and ENISA
- User advisories and public disclosures
- Mitigation and corrective actions taken
Documentation should be retained in accordance with applicable legal and organizational retention policies and be available for review by competent authorities upon request.
3.2 Coordinated Public Vulnerability Reporting Policy & Process
While Coordinated Vulnerability Disclosure (CVD) is not explicitly mandated by the CRA, it provides a practical and effective mechanism for fulfilling CRA reporting and communication obligations. New vulnerabilities are discovered in the digital landscape on a daily basis, potentially exposing users to attacks that can compromise data or disrupt essential systems. The EU CSIRTs Network and ENISA advise that reported vulnerabilities and incidents be handled cooperatively and in coordination with the affected vendors or manufacturers, following Responsible/Coordinated Vulnerability Disclosure principles. CVD plays a vital role in safeguarding users by ensuring that vulnerabilities are only made public after appropriate fixes, patches, or mitigation measures have been developed and implemented by responsible parties.
CVD often involves collaboration among multiple stakeholders. The goal of this coordinated approach is to minimize the negative consequences that may arise from the exploitation of a vulnerability. To achieve this, all involved parties are expected to adhere to established guidelines and follow a shared process. Participants in the disclosure process may include vulnerability researchers, coordinators, ICT providers, and vendors, each playing a critical role in managing and mitigating cybersecurity risks effectively.
Information on the appropriate contacts for CSIRTs appointed by EU Member States is published in their national Coordinated Vulnerability Disclosure (CVD) frameworks. A consolidated overview of EU CSIRTs Network members’ CVD policies and recognised CVE Numbering Authorities is available at: https://github.com/enisaeu/CNW#vulnerability-disclosure-policies.
In accordance with the ENISA and CSIRTs Network, a vulnerability report should include at least the next information, when available:
- “Asset or control where the vulnerability is found (web page, IP address, product or service name)
- The version of the product on which the vulnerability is present, or the specific configuration of the product that is vulnerable
- Discovered weakness (such as a CWE)
- The severity of the vulnerability (e.g., using CVSS to calculate)
- A detailed description of the vulnerability, including the following information:
- A summary of the vulnerability
- Required steps to reproduce the vulnerability
- Required configuration to reproduce the vulnerability
- Possible mitigation measures for the vulnerability
- Potential impact of the vulnerability
- Whether the vulnerability has already been reported to the product manufacturer
- Whether a request for a CVE number has been made
- Contact information, including secure communication options (PGP fingerprint, etc.)
- Any other important information related to the discovered vulnerability”5
4. How Stewards Can Support Downstream Manufacturers
Although the CRA places the majority of legal obligations on manufacturers, downstream actors frequently rely on upstream open source projects and their stewards for information, evidence, and clarity to support conformity assessments and ongoing compliance activities.
Stewards and upstream projects are not legally required to produce manufacturer-facing compliance documentation. However, where relevant security, governance, and lifecycle artifacts already exist, making them discoverable and well-structured can significantly reduce downstream friction, improve trust, and increase adoption of open source components.
The following section describes artifacts and information that manufacturers are commonly required to produce under the CRA, and which downstream actors may request from stewards or upstream projects.
Stewards are not legally obliged to produce these materials. However, where such artifacts already exist or can be generated at low cost making them discoverable can significantly reduce downstream friction and improve adoption.
From a downstream manufacturer’s perspective, open source stewards play a critical enabling role by acting as trusted aggregation points for security practices, vulnerability information, and development assurances. Rather than shifting regulatory responsibility upstream, effective stewardship helps manufacturers understand how a component is developed, maintained, and secured—information that is essential for risk assessments, technical documentation, and post-market surveillance.
A steward should support downstream manufacturers by:
- Providing clarity on project security posture
Helping projects document and communicate their security practices, development lifecycle assumptions, and vulnerability handling approaches in a consistent and discoverable way. - Reducing information asymmetry
Making it easier for manufacturers to understand what security-relevant artifacts exist, how they are maintained, and how they can be consumed as part of downstream compliance processes. - Encouraging consistency across projects
Promoting common patterns for security processes, disclosure practices, and documentation that reduce the need for manufacturers to interpret bespoke project-by-project approaches. - Acting as a coordination layer
Supporting communication between upstream projects, downstream manufacturers, security researchers, and—where appropriate—regulatory stakeholders, without transferring legal responsibility away from manufacturers.
Manufacturers are required under the CRA to produce and retain extensive technical documentation, perform risk assessments, manage vulnerabilities, and report severe incidents. While these obligations do not apply to open source stewards, downstream manufacturers will often need upstream’s help to complete those assessments.
A steward’s approach should be to enable (and not replace) manufacturer obligations by:
- Encouraging projects to surface existing security and lifecycle information that manufacturers can reference as input to their own documentation.
- Supporting transparency around known vulnerabilities and remediation processes.
- Facilitating access to dependency and composition information that manufacturers can incorporate into their internal risk management and post-market surveillance processes.
- Helping projects understand how their outputs are commonly consumed downstream, without imposing mandatory compliance burdens on volunteer-driven communities.
Another area where steward support can add significant downstream value at relatively low upstream cost is software composition transparency.
While open source projects and stewards are not required to generate or distribute Software Bills of Materials (SBOMs), OpenSSF encourages best practices that help downstream manufacturers understand dependency structures and build processes. When available, such artifacts can:
- Improve downstream due diligence and procurement decisions
- Accelerate vulnerability triage and remediation
- Support conformity assessments and market surveillance activities
A steward should promote the use of widely adopted SBOM formats and tooling, supports automation through CI/CD pipelines, and facilitates discussion across the ecosystem on interoperability, transformation, and evolving SBOM and VEX standards without mandating a single approach for all projects.
There were some suggestions that stewards issue formal security or compliance statements for the projects they support, including signed files, declarations to selected parties, or registry entries. While stewards can play a constructive role by improving transparency, documentation, and tooling, requiring them to issue formal attestations crosses a critical boundary. Attestations imply assurance and risk management, which stewards are neither positioned nor authorized to assume. Encouraging stewards to issue attestations would effectively shift compliance responsibility upstream, treating non-profit entities as liability intermediaries—contrary to the CRA’s allocation of obligations to manufacturers. Stewards should not certify, warrant, or attest compliance on behalf of downstream users under any circumstances.
The CRA introduces time-sensitive obligations for manufacturers related to known exploited vulnerabilities and severe incidents. While manufacturers retain the legal duty to notify authorities and users, stewards can significantly support these efforts by fostering robust vulnerability disclosure ecosystems.
A steward could contribute by:
- Promoting coordinated vulnerability disclosure (CVD) practices across projects
- Supporting shared vulnerability information channels and databases
- Providing guidance and tooling for maintainers and security researchers
- Encouraging timely, accurate, and responsible communication of security issues
By improving transparency, consistency, and coordination across open source projects, a steward should enable manufacturers to integrate open source components into their products with greater confidence and lower compliance friction. This steward role does not shift legal responsibility upstream; rather, it strengthens the overall ecosystem by ensuring that reliable, security-relevant information flows efficiently across the supply chain.
Through guidance, tooling, training, and collaboration, a steward shall align upstream open source practices with downstream regulatory realities, supporting cyber resilience without compromising the open source development model or creating unintended liability.
Checklist
| [] | My Legal Entity Steward is: | |
| [] | The projects within my scope of stewardship are: | |
| [] | My Vulnerability and Incident Reporting Policy can be publicly found here: | |
| [] | If different, my cybersecurity policy can be consulted here: | |
| [] | My CSIRT is | |
| [] | My dedicated security contact for vulnerability and incident reports: | |
| [] | Does the steward provide development infrastructure? If so, is there an incident response plan for these systems? | |
| [] | Is the steward actively involved in the Product Development? If so, is that reflected in the cybersecurity policy or in another document? |