"Secure by default" is not a marketing phrase under the CRA. Annex I, Part I, point (2)(b) makes it a legal requirement with enforceable consequences under Art. 64(2). The product must ship with secure defaults unless manufacturer and business user have explicitly agreed otherwise for a tailor-made product. The user must have an opt-out mechanism for automatic security updates, not an opt-in. Art. 13(1) makes you responsible for ensuring the product was "designed, developed and produced in accordance with the essential cybersecurity requirements." CRACheck structures your Annex I compliance documentation in 15–25 minutes. €149.
€149 one-time · 8-document ZIP · 15–25 minutes · Browser-side
Annex I, Part I, point (2)(d) requires protection from unauthorised access through "appropriate control mechanisms, including authentication." A shared default password across all units is not appropriate. Unique-per-device credentials or forced setup is the compliant approach.
Annex I, Part I, point (2)(c) requires automatic security updates "enabled as a default setting, with a clear and easy-to-use opt-out mechanism." The default must be ON. The user may turn it off. Shipping with auto-update off and asking the user to enable it inverts the regulatory requirement.
Annex I, Part I, point (2)(b) ties the reset function to the secure default configuration. If your reset restores a pre-hardening firmware or re-enables disabled services, it violates the requirement. The reset target must be the documented secure state.
8 PDF documents generated from your data. Each cites the specific article of Regulation (EU) 2024/2847 it complies with.
Category per Annex III/IV. Smart home products with security functionalities (Class I, item 17) and IoT toys (item 18) face particular scrutiny on default configurations.
Annex VII, point 2(a): design and development description covering how the secure-by-default configuration was implemented. Point 3: risk assessment showing how defaults mitigate identified risks.
Per Art. 13(2)–(3). Maps each Annex I, Part I, point (2) sub-requirement to your product defaults: authentication (d), encryption (e), data minimisation (g), auto-updates (c), reset (b).
Annex II, point 8(a): instructions on "the necessary measures during initial commissioning and throughout the lifetime of the product to ensure its secure use." Point 8(e): how to turn off auto-updates.
Per Art. 28 and Annex V.
Per Annex I, Part II, point (5). Security defaults may be challenged by vulnerability reporters — the CVD policy handles that channel.
Per Art. 14. Vulnerability in default configurations triggers the 24h/72h/14-day reporting pipeline.
Key dates through the support period.
See before you buy — Download sample dossier (PDF, fictional company) — Real structure, real articles, real format. Fictional data.
Generated from your data, in your browser. No data leaves your device.
Hiring a penetration testing firm to audit your default configurations and a compliance consultant to document the findings per Annex VII.