Article 13(5) of the Cyber Resilience Act requires manufacturers to exercise due diligence when integrating components. Your EU buyer is the manufacturer of the final product — but they need documented evidence from you. If you cannot provide structured cybersecurity documentation aligned with Annex VII, procurement teams will source from a competitor who can. CRACheck generates an 8-document dossier in 15–25 minutes from your browser. €149 per product. No data leaves your device.
€149 one-time · 8-document ZIP · 15–25 minutes · Browser-side
You enter your product data. CRACheck structures the documentation per Article 31 + Annex VII.
Article 2(1) of Regulation (EU) 2024/2847 applies to products with digital elements made available on the EU market, including components placed on the market separately. Article 3(6) defines a component as software or hardware intended for integration into an electronic information system. If your component has firmware, processes data, or connects to a network, it falls within scope.
Article 13(5) requires manufacturers to exercise due diligence when integrating components from third parties. Your buyer's compliance team cannot complete their Annex VII technical documentation without structured cybersecurity data from you — vulnerability handling procedures, SBOM, risk assessment. If you do not provide it, they carry the gap as a compliance risk.
Annex III lists specific component categories under Important Class I — including microcontrollers with security-related functionalities (item 14), network interfaces (item 10), and routers and switches (item 12). If your component matches any Annex III category, it requires a stricter conformity assessment under Article 32.
8 PDF documents generated from your data. Each cites the specific article of Regulation (EU) 2024/2847 it complies with.
Determines if your component is Default, Important Class I, or Class II under Annex III. Critical for your EU buyer's conformity assessment path.
Structured dossier per Art. 31 + Annex VII covering design, development, production, and vulnerability handling. Formatted for direct integration into your customer's technical file.
Cybersecurity risk evaluation per Annex I Part I. Maps threats specific to your component's integration context — firmware vulnerabilities, interface attack surfaces, supply chain vectors.
Instructions and security information per Annex II. Adapted for B2B component integration — what the downstream manufacturer needs to know about secure deployment.
EU Declaration per Art. 28 + Annex V. Pre-structured with manufacturer data, component identification, and applicable essential requirements.
Coordinated vulnerability disclosure policy. Documents your reporting channel, response timelines, and coordination procedures with downstream manufacturers and ENISA.
Art. 14 notification structure for ENISA: 24-hour early warning, 72-hour vulnerability notification, 14-day final report. Pre-formatted for your component context. Art. 14(2): early warning within 24h, notification within 72h, final report within 14 days.
Key dates: Art. 14 reporting active 11 September 2026, full enforcement 11 December 2027, your stated support period, patch cycle milestones.
Mira antes de comprar — Descargar dossier de muestra (PDF, empresa ficticia) — Estructura real, artículos reales, formato real. Datos ficticios.
Generated from your data, in your browser. No data leaves your device.