Reg (EU) 2024/2847Generate dossier — €149
LIVE — Enforcement tracker · Deadline dashboard · Transposition status — Updated weekly from EUR-Lex, Safety Gate, OEIL & 12 official sourcesView regulatory intelligence →

You manufacture GPS trackers, fleet telematics units, cold chain sensors or warehouse management hardware deployed across European logistics networks. These devices connect via cellular, LoRaWAN or satellite. Article 3(1) of Regulation (EU) 2024/2847 covers any product with a direct or indirect data connection. If your device transmits location, temperature or status data over a network, it is a product with digital elements. Article 13 applies to you as manufacturer.

Logistics IoT operates in environments where cybersecurity has historically been an afterthought — containers, trucks, cold rooms, loading docks. The CRA changes that. Art. 2(1) does not distinguish between office IT and operational IoT. A GPS tracker with a cellular modem is a product with digital elements. A cold chain sensor with LoRaWAN connectivity is a product with digital elements. A fleet telematics unit with OBD-II integration and 4G uplink is a product with digital elements. Most logistics IoT falls under Default classification — but if your device includes network management functionality (Annex III item 6) or VPN capability (Annex III item 5), it may be Important Class I. Art. 13 imposes the full manufacturer obligation set: risk assessment, technical documentation, vulnerability handling, support period, ENISA reporting. CRACheck generates the 8-document technical file under Art. 31 and Annex VII. €149 per product. 15-25 minutes. Fleet data and device architecture stay in your browser.

Generate CRA dossier — €149Free: check your product classification

€149 one-time · 8-document ZIP · 15–25 minutes · Browser-side

Built on Regulation (EU) 2024/2847 · Art. 31 + Annex VII · 8 PDF documents · 100% browser-side

Key figures

Art. 3(1)
Any product with a data connection — cellular, LoRa, satellite — is in scope
Art. 13(8)
Support period must reflect deployment lifecycle — logistics devices run 5-10 years in the field
€15M
Maximum fine under Art. 64(2) for manufacturer non-compliance

How to proceed

1
Identify every connected device in your portfolio
GPS trackers, telematics units, cold chain sensors, RFID gateways, handheld scanners, warehouse robots with network connectivity. Each connected product is separately within CRA scope.
2
Classify against Annex III
Standard logistics sensors and trackers: Default. Devices with VPN functionality: Important Class I (Annex III item 5). Devices with network management capability: Important Class I (item 6). Devices with embedded routers or modems: Important Class I (item 12).
3
Conduct the cybersecurity risk assessment
Art. 13(2)-(3): logistics-specific risks include GPS spoofing, cellular modem hijacking, cold chain data integrity manipulation, fleet tracking data interception, OBD-II vehicle bus access from compromised telematics, and cloud platform compromise affecting entire fleet visibility.
4
Address operational environment constraints
Annex I Part I point (2)(b) requires secure by default configuration. For logistics IoT deployed in uncontrolled environments (truck cabs, containers, outdoor warehouses), secure defaults must account for physical accessibility, intermittent connectivity, and unsupervised firmware updates.
5
Define a proportionate support period
Art. 13(8): logistics IoT devices are deployed for 5-10 years. Cold chain sensors in pharmaceutical logistics may be in service even longer. The support period must reflect this. Security updates must be free (Art. 13(9)) and deliverable over intermittent connectivity.
6
Prepare ENISA reporting
Art. 14 from September 2026. A vulnerability in fleet telematics affecting thousands of trucks across the EU supply chain is a systemic logistics risk — the 24h early warning is operationally critical.

Common mistakes

ENVIRONMENT EXEMPTION MYTH

Assuming logistics IoT is outside CRA scope because it operates in warehouses and trucks

Art. 2(1) of Regulation (EU) 2024/2847 covers any product with a data connection placed on the EU market. The operational environment — warehouse, truck, container, port — does not affect scope. If the device connects to a network and you market it in the EU, the CRA applies.

UPDATE DELIVERY GAP

No over-the-air update mechanism for devices deployed in the field

Art. 13(8)-(9) of Regulation (EU) 2024/2847 require vulnerability handling and free security updates throughout the support period. For logistics IoT deployed across thousands of trucks or containers, this requires reliable OTA firmware update capability. A product without OTA cannot fulfil Art. 13(9) for field-deployed units.

FLEET-SCALE LIABILITY

Underestimating the aggregate risk of a vulnerability across 50,000 deployed units

Art. 13(2) requires the risk assessment to cover reasonably foreseeable use. For logistics IoT, foreseeable use includes fleet-scale deployment. A vulnerability in a GPS tracker deployed in 50,000 trucks is not a single-device risk — it is a logistics network risk. The risk assessment must account for aggregate impact.

What the ZIP contains

8 PDF documents generated from your data. Each cites the specific article of Regulation (EU) 2024/2847 it complies with.

1

Product Classifier

Identifies Default (standard trackers, sensors) or Important Class I (devices with VPN per Annex III item 5, embedded routers per item 12, network management per item 6).

2

Technical Documentation

Art. 31 and Annex VII documentation for logistics IoT: device architecture, cellular/LoRa/satellite modem specifications, cloud platform integration, OTA update mechanism, data transmission protocols.

3

Risk Assessment

Cybersecurity risk assessment covering logistics vectors: GPS spoofing, cellular interception, cold chain data manipulation, OBD-II bus access, cloud platform compromise, fleet-scale vulnerability impact.

4

User Information

Annex II information for fleet operators and 3PLs: secure deployment, SIM provisioning, firmware update procedures, data handling disclosure, vulnerability reporting contact, support period end date.

5

Declaration of Conformity

EU Declaration per Art. 28 and Annex V.

6

CVD Policy

Coordinated vulnerability disclosure policy for logistics technology research community.

7

Notification Template

ENISA notification template per Art. 14 with fleet-scale context.

8

Obligations Calendar

Key dates mapped to logistics procurement cycles: Art. 14 from September 2026, full enforcement December 2027, fleet hardware refresh windows.

See before you buy — Download sample dossier (PDF, fictional company) — Real structure, real articles, real format. Fictional data.

Generated from your data, in your browser. No data leaves your device.

What you pay

🧾 IoT SECURITY CONSULTANCY
Cybersecurity assessment for logistics device portfolio
€8,000-20,000 per product family
8-16 weeks
Requires sharing device firmware and architecture
One-time report — re-engagement per hardware revision
Does not produce Art. 31 file
✓ CRACHECK — ART. 31 DOCUMENTATION
8-document technical file per logistics IoT device
€149 per device
15-25 minutes
Device architecture stays in your browser
Covers fleet-scale deployment documentation
30-day edit window, 10 regenerations
Permanent PDF

Two layers

● LAYER 1 — DOCUMENTATION · CRACHECK

CRA documentation for logistics IoT

CRACheck generates Art. 31 and Annex VII technical documentation for each connected logistics device. Coverage includes cybersecurity risk assessment scoped to logistics deployment, vulnerability handling procedures, OTA update documentation, SBOM, coordinated disclosure, ENISA template and support period definition aligned with field deployment lifecycles.

∅ LAYER 2 — NOT INCLUDED

What CRACheck does not replace

CRACheck does not perform penetration testing on cellular modems or LoRaWAN stacks. It does not audit cloud platform security. It does not test GPS spoofing resilience. It does not manage your OTA firmware delivery infrastructure. It does not conduct vehicle bus security assessments for OBD-II-connected telematics.

The device connects. The CRA applies. CRACheck documents the cybersecurity layer for every connected device in your logistics portfolio.

Enforcement regime

📅
11 September 2026 — Art. 14 reporting

A vulnerability in fleet-deployed telematics triggers 24h ENISA notification. Fleet-scale impact multiplies urgency.

⚖️
11 December 2027 — Full CRA enforcement

Logistics IoT devices placed on the EU market must carry CE marking and Art. 31 documentation. Fleet operators and 3PLs will require this in procurement.

🔒
Art. 64(2) — €15M or 2.5% of global turnover

For logistics IoT manufacturers non-compliant with Art. 13 or Annex I.

Alternatives

CriterioIoT security consultancyInternal engineering teamNo CRA preparationCRACheck
Price€8K-20K per familyStaff time€0€149 per device
Art. 31 file producedNo — report onlyVariableNone8-document ZIP
Fleet-scale risk documentedPossiblyDependsNoYes — risk assessment
Data stays with youShared with consultantInternalN/A100% browser-side
CRACheck€1498-docFleet-scaleBrowser-side

Logistics device portfolio with 20+ SKUs? Document every tracker, sensor and gateway.

Pack 10: €99 per product. Pack 30: €79 per product. For logistics IoT manufacturers with broad connected product ranges, contact us for enterprise pricing.

Request volume pricing
Commercial enquiries via hello@solidwaretools.com

What CRACheck guarantees and what it does not

CRACheck generates a structured document set according to Art. 31 and Annex VII of Regulation (EU) 2024/2847 based on the information you provide about your logistics IoT device. The accuracy of device architecture, connectivity specifications and deployment context is your responsibility as manufacturer.

We guarantee that the document structure follows Art. 31 and Annex VII and that the legal references cited are correct. We do not guarantee acceptance by a market surveillance authority or fleet operator procurement process.

CRACheck is not legal advice. For product classification of IoT devices with embedded network functionality and the CRA/RED interaction for cellular equipment, consult a qualified IoT regulatory lawyer.

Frequently asked questions

Our tracker only transmits GPS coordinates via NB-IoT. Is that enough for CRA scope?
Yes. Art. 2(1) of Regulation (EU) 2024/2847 covers any product with a direct or indirect data connection. NB-IoT is a data connection. The volume or type of data transmitted does not affect scope — a device that sends one GPS coordinate per hour over NB-IoT is as much within scope as a telematics unit streaming continuous vehicle data over 4G.
We sell the same tracker globally. Does the CRA apply only to EU-sold units?
Art. 2(1) of Regulation (EU) 2024/2847 applies to products placed on the EU market. If the same SKU is sold in the EU and outside it, the CRA obligations apply to the units placed on the EU market. Your Art. 31 documentation, CE marking and vulnerability handling obligations are triggered by EU market placement.
Our cold chain sensors have a 10-year deployment lifecycle. Does the support period need to match?
Art. 13(8) of Regulation (EU) 2024/2847 requires the support period to reflect expected use time, user expectations and product nature. A cold chain sensor deployed for 10 years in pharmaceutical logistics should have a support period proportionate to that lifecycle. If you define a shorter support period, you must disclose it in Annex II user information — and the procurement decision of pharmaceutical logistics operators will factor that limitation.
Does OBD-II integration in telematics create additional CRA obligations?
OBD-II integration means your telematics unit has physical and logical access to the vehicle's CAN bus. Art. 13(2) requires the risk assessment to cover reasonably foreseeable use. Vehicle bus access from a compromised telematics unit is a foreseeable attack vector. Your risk assessment under Art. 13(3) must address this — including the potential for lateral movement from the telematics device to vehicle control systems.
Is this a subscription?
No. One-time payment. The licence includes 30 days of editing and 10 regenerations. The downloaded PDF is yours permanently.
Can I request a refund?
Under Art. 16(m) of Directive (EU) 2011/83, activating the licence constitutes express consent for immediate generation of digital content, waiving the 14-day withdrawal right. Refunds are only processed for reproducible technical failures.
What if the regulation changes?
If Regulation (EU) 2024/2847 is amended during your licence window, you can regenerate the documentation using the updated version of the generator at no additional cost.
⚠️ Important notice: CRACheck is a self-assessment documentation tool, not legal advice and not a third-party audit. The document under Article 31 and Annex VII of Regulation (EU) 2024/2847 is generated from your input data. You are responsible for the accuracy of the data you provide. CRACheck does not replace a qualified professional assessment.

Every tracker, every sensor, every gateway. If it connects, it needs Art. 31 documentation.

GPS trackers, telematics units, cold chain sensors, RFID gateways. Each connected logistics device needs a technical file under Annex VII. Eight documents. €149 per device. Browser-side.

€149 one-time
8-document ZIP · 15-25 min · Art. 31 + Annex VII · 100% browser-side · Permanent PDF
Generate Technical Documentation
✓ Last regulatory check: 1 May 2026 · No substantive changes detected · View history