Reg (EU) 2024/2847Generate dossier — €149
LIVE — Enforcement tracker · Deadline dashboard · Transposition status — Updated weekly from EUR-Lex, Safety Gate, OEIL & 12 official sourcesView regulatory intelligence →

You manufacture electronic components in Taiwan and ship them to EU integrators. Your buyer's compliance team has started requesting cybersecurity documentation under Annex VII of Regulation (EU) 2024/2847. CRACheck generates it from your engineering specs.

Article 13(5) of the Cyber Resilience Act requires manufacturers to exercise due diligence when integrating components. Your EU buyer is the manufacturer of the final product — but they need documented evidence from you. If you cannot provide structured cybersecurity documentation aligned with Annex VII, procurement teams will source from a competitor who can. CRACheck generates an 8-document dossier in 15–25 minutes from your browser. €149 per product. No data leaves your device.

Generate CRA dossier — €149Free: check your product classification

€149 one-time · 8-document ZIP · 15–25 minutes · Browser-side

Regulation (EU) 2024/2847 · Art. 31 + Annex VII · 8 documents · 100% browser-side — your data never leaves your device

Key numbers

11 Dec 2027
Full CRA enforcement deadline
Art. 13(5)
Due diligence on component integration
15 min
Complete dossier generation time

How CRACheck works

You enter your product data. CRACheck structures the documentation per Article 31 + Annex VII.

1
Enter your component category
CRACheck determines whether it falls under Default, Important Class I (Annex III), or Class II
2
Input product specifications
Hardware version, firmware details, connectivity interfaces, intended integration context
3
Map your cybersecurity measures
Encryption protocols, authentication mechanisms, update channels, data handling
4
Complete the vulnerability handling section
Disclosure policy, patch cycle, coordinated reporting procedures
5
Define your support commitment
Security update period, end-of-support date, communication channels with integrators
6
Generate your 8-document dossier
PDF output aligned with Art. 31 and Annex VII, ready to attach to your customer's procurement file
7
Review, edit, and download
30-day editing window with 10 regenerations included

Common mistakes

SUPPLY CHAIN MISCONCEPTION

"We only make components, the CRA does not apply to us"

Article 2(1) of Regulation (EU) 2024/2847 applies to products with digital elements made available on the EU market, including components placed on the market separately. Article 3(6) defines a component as software or hardware intended for integration into an electronic information system. If your component has firmware, processes data, or connects to a network, it falls within scope.

DOCUMENTATION GAP

"Our EU buyer handles all the compliance paperwork"

Article 13(5) requires manufacturers to exercise due diligence when integrating components from third parties. Your buyer's compliance team cannot complete their Annex VII technical documentation without structured cybersecurity data from you — vulnerability handling procedures, SBOM, risk assessment. If you do not provide it, they carry the gap as a compliance risk.

CLASSIFICATION BLIND SPOT

"Components are always classified as Default products"

Annex III lists specific component categories under Important Class I — including microcontrollers with security-related functionalities (item 14), network interfaces (item 10), and routers and switches (item 12). If your component matches any Annex III category, it requires a stricter conformity assessment under Article 32.

What the ZIP contains

8 PDF documents generated from your data. Each cites the specific article of Regulation (EU) 2024/2847 it complies with.

1

Product Classifier

Determines if your component is Default, Important Class I, or Class II under Annex III. Critical for your EU buyer's conformity assessment path.

2

Technical Documentation

Structured dossier per Art. 31 + Annex VII covering design, development, production, and vulnerability handling. Formatted for direct integration into your customer's technical file.

3

Risk Assessment

Cybersecurity risk evaluation per Annex I Part I. Maps threats specific to your component's integration context — firmware vulnerabilities, interface attack surfaces, supply chain vectors.

4

User Information

Instructions and security information per Annex II. Adapted for B2B component integration — what the downstream manufacturer needs to know about secure deployment.

5

Declaration of Conformity

EU Declaration per Art. 28 + Annex V. Pre-structured with manufacturer data, component identification, and applicable essential requirements.

6

CVD Policy

Coordinated vulnerability disclosure policy. Documents your reporting channel, response timelines, and coordination procedures with downstream manufacturers and ENISA.

7

Notification Template

Art. 14 notification structure for ENISA: 24-hour early warning, 72-hour vulnerability notification, 14-day final report. Pre-formatted for your component context. Art. 14(2): early warning within 24h, notification within 72h, final report within 14 days.

8

Obligations Calendar

Key dates: Art. 14 reporting active 11 September 2026, full enforcement 11 December 2027, your stated support period, patch cycle milestones.

Mira antes de comprar — Descargar dossier de muestra (PDF, empresa ficticia) — Estructura real, artículos reales, formato real. Datos ficticios.

Generated from your data, in your browser. No data leaves your device.

What you pay

🧾 EU COMPLIANCE CONSULTANT
€8,000–€15,000
4–8 weeks lead time. Requires sharing proprietary specs with external firm. Repeat cost for each new component variant. No structured digital output.
✓ Last regulatory check: 1 May 2026 · No substantive changes detected · View history