The Cyber Resilience Act applies to products with digital elements whose intended purpose or reasonably foreseeable use includes a direct or indirect logical or physical data connection to a device or network (Article 2(1) of Regulation (EU) 2024/2847). That definition covers standalone software, firmware, embedded systems, IoT devices, networking equipment, industrial controllers, consumer electronics, and connected hardware components placed on the market separately. The regulation further classifies products as Default, Important Class I (Annex III, 19 categories), Important Class II (Annex III, 4 categories), or Critical (Annex IV) — each with different conformity assessment requirements under Article 32. CRACheck classifies your product and generates the 8-document Art. 31 dossier in 15–25 minutes. €149 per product.
€149 one-time payment per product · 8 PDF documents in ZIP · 15–25 minutes · 100% in your browser
Article 2(1) covers not only internet-connected products but any product with a direct or indirect logical or physical data connection to a device or network. A Bluetooth sensor, a USB-connected module, or a device communicating via LAN is in scope even without internet access.
Annex III of Regulation (EU) 2024/2847 lists 19 Important Class I categories (identity management, browsers, password managers, VPNs, routers, operating systems, smart home devices, etc.) and 4 Class II categories (hypervisors, firewalls, tamper-resistant microprocessors). A router manufacturer cannot claim Default classification.
Article 3(1) explicitly includes "software or hardware components being placed on the market separately". If you sell a firmware module, an SDK, or a security library as a standalone product, it is an independent product with digital elements under the CRA — requiring its own documentation.
CRACheck classifies your product and generates the complete Art. 31 + Annex VII dossier.
Annex III / Annex IV classification. Conformity assessment module.
Art. 31 + Annex VII. Complete dossier.
Art. 13(2)–(3). Cybersecurity risk assessment against Annex I.
Annex II. 9 required information points.
Art. 28 + Annex V. Ready for signature.
Annex I Part II point (5). Coordinated vulnerability disclosure.
Art. 14. ENISA 24h/72h/14d notification.
Key dates and milestones.
See before you buy — Download sample dossier (PDF, fictional company) — Real structure, real articles, real format. Fictional data.
Generated in your browser. No data leaves your device.