Reg (EU) 2024/2847Generate dossier — €149
LIVE — Enforcement tracker · Deadline dashboard · Transposition status — Updated weekly from EUR-Lex, Safety Gate, OEIL & 12 official sourcesView regulatory intelligence →

Annex III of Regulation (EU) 2024/2847 lists microcontrollers with security-related functionalities as Important Class I, tamper-resistant microcontrollers as Class II, and smartcards and secure elements as Critical products under Annex IV. Your conformity assessment obligations depend on where your product lands. CRACheck classifies and documents it.

The Cyber Resilience Act creates three tiers of scrutiny for security silicon. A standard microcontroller with a crypto engine is Important Class I (Annex III, item 14) — Module A self-assessment is available if harmonised standards apply. A tamper-resistant microcontroller is Important Class II (Annex III, item 4) — Module A is not available; third-party assessment is mandatory. A secure element or smartcard is Critical (Annex IV, item 3) — European cybersecurity certification may be required under Article 32(5). CRACheck walks you through classification and generates the documentation for whichever tier applies. €149 per product. 15–25 minutes.

Generate CRA dossier — €149Free: check your product classification

€149 one-time · 8-document ZIP · 15–25 minutes · Browser-side

Regulation (EU) 2024/2847 · Art. 31 + Annex VII · Annex III + Annex IV · 8 documents · 100% browser-side

Key numbers

3 tiers
Class I · Class II · Critical — different assessment paths
Art. 32
Conformity assessment procedure for each tier
€149
Per product, one-time documentation

How CRACheck works

You enter your product data. CRACheck structures the documentation per Article 31 + Annex VII.

1
Answer the classification questionnaire
CRACheck asks about security functions, tamper resistance, and intended use to determine Annex III or Annex IV category
2
Confirm your tier
The tool shows exactly which Annex item applies and explains the conformity assessment path (Module A, Module B+C, Module H, or EU certification)
3
Input technical specifications
Architecture, security functions, interfaces, firmware versioning
4
Complete the cybersecurity requirements mapping
How your product meets each applicable Annex I Part I requirement
5
Document vulnerability handling processes
PSIRT, CVE management, patch distribution, coordinated disclosure
6
Generate the 8-document dossier
Tailored to your classification tier, with correct conformity assessment references
7
Download and integrate
Ready for notified body submission (Class II), certification application (Critical), or internal file (Class I with standards)

Common mistakes

TIER CONFUSION

"All microcontrollers have the same CRA obligations"

Regulation (EU) 2024/2847 distinguishes sharply. A microcontroller with security-related functionalities is Important Class I (Annex III, item 14) — self-assessment may suffice with harmonised standards. A tamper-resistant microcontroller is Important Class II (Annex III, item 4) — third-party conformity assessment is mandatory under Art. 32(3). Conflating the two means preparing for the wrong assessment path.

CRITICAL PRODUCT OVERSIGHT

"Secure elements are treated the same as microcontrollers"

Annex IV separately lists "smartcards or similar devices, including secure elements" (item 3) as Critical products. Article 32(5) may require European cybersecurity certification for Critical products. This is a fundamentally different regime from Annex III Important products.

STANDARD ASSUMPTION

"We follow Common Criteria, so CRA compliance is automatic"

Common Criteria certification is not automatically equivalent to CRA conformity. Article 32(2) allows Module A for Important Class I products only if harmonised standards covering all essential requirements are applied, or if an EU cybersecurity certification at assurance level "substantial" exists. A CC evaluation may support but does not replace CRA documentation and conformity assessment.

What the ZIP contains

8 PDF documents generated from your data. Each cites the specific article of Regulation (EU) 2024/2847 it complies with.

1

Product Classifier

Maps your product against Annex III (items 13–14 Class I, items 3–4 Class II) and Annex IV (item 3 Critical). Documents classification rationale and applicable conformity assessment procedure under Art. 32.

2

Technical Documentation

Annex VII dossier structured for your tier. Silicon architecture, security function specs, design and development processes, production controls.

3

Risk Assessment

Annex I Part I analysis. Evaluates physical attacks, side channels, fault injection, supply chain compromise specific to security silicon.

4

User Information

Annex II information for downstream integrators. Secure deployment guidelines, configuration requirements, end-of-life procedures.

5

Declaration of Conformity

Art. 28 + Annex V, pre-structured with your Annex III/IV classification and applicable conformity module.

6

CVD Policy

Vulnerability disclosure framework: PSIRT, coordination with chip integrators, reporting protocols.

7

Notification Template

Art. 14 ENISA notification: 24h, 72h, 14-day timeline.

8

Obligations Calendar

Classification-specific milestones and enforcement dates.

Mira antes de comprar — Descargar dossier de muestra (PDF, empresa ficticia) — Estructura real, artículos reales, formato real. Datos ficticios.

Generated from your data, in your browser. No data leaves your device.

What you pay

🧾 NOTIFIED BODY PRE-ENGAGEMENT CONSULTANT
€15,000–€30,000
8–16 weeks. Required for Class II and Critical anyway — but documentation must exist first. Scope often unclear until classification is confirmed.
✓ Last regulatory check: 1 May 2026 · No substantive changes detected · View history