Reg (EU) 2024/2847Generate dossier — €149
LIVE — Enforcement tracker · Deadline dashboard · Transposition status — Updated weekly from EUR-Lex, Safety Gate, OEIL & 12 official sourcesView regulatory intelligence →

Annex I, Part I, point (2)(b) of Regulation (EU) 2024/2847 requires your product to be made available on the market with a secure by default configuration, including the possibility to reset the product to its original state. If your router ships with a default password of "admin," your camera streams over HTTP, or your sensor accepts unsigned firmware, you have a compliance problem. CRACheck documents how your defaults meet the requirement.

"Secure by default" is not a marketing phrase under the CRA. Annex I, Part I, point (2)(b) makes it a legal requirement with enforceable consequences under Art. 64(2). The product must ship with secure defaults unless manufacturer and business user have explicitly agreed otherwise for a tailor-made product. The user must have an opt-out mechanism for automatic security updates, not an opt-in. Art. 13(1) makes you responsible for ensuring the product was "designed, developed and produced in accordance with the essential cybersecurity requirements." CRACheck structures your Annex I compliance documentation in 15–25 minutes. €149.

Generate CRA dossier — €149Free: check your product classification

€149 one-time · 8-document ZIP · 15–25 minutes · Browser-side

Regulation (EU) 2024/2847 · Art. 31 + Annex VII · 8 documents · 100% browser-side

Secure-by-default requirements at a glance

Part I(2)(b)
Legal basis for secure-by-default
Reset
Factory reset to secure state required
Opt-out
Auto-updates enabled by default, user can opt out

How to implement and document secure defaults

1
Audit current defaults
Review every factory setting: credentials, protocols, ports, encryption, logging, update mechanisms. Map each against Annex I, Part I, point (2).
2
Identify non-secure defaults
Flag open ports, default credentials, unencrypted channels, disabled auto-updates, verbose error messages, unnecessary services.
3
Implement secure defaults
Replace non-secure settings with hardened configurations. Enable automatic security updates with an opt-out mechanism per Annex I, Part I, point (2)(c).
4
Implement factory reset
Annex I, Part I, point (2)(b) requires the possibility to reset to original (secure) state. Ensure reset returns the product to the documented secure configuration, not to a weaker factory state.
5
Document in the technical file
Annex VII, point 2(a) requires a description of design and development including how security requirements are implemented.
6
Run CRACheck
Input your product data and default configuration details. CRACheck generates the Risk Assessment, Technical Documentation, and User Information covering your secure-by-default implementation.

Three mistakes manufacturers make with secure defaults

DEFAULT CREDENTIALS

Shipping a product with shared default passwords or no authentication

Annex I, Part I, point (2)(d) requires protection from unauthorised access through "appropriate control mechanisms, including authentication." A shared default password across all units is not appropriate. Unique-per-device credentials or forced setup is the compliant approach.

OPT-IN UPDATES

Shipping with automatic security updates disabled by default

Annex I, Part I, point (2)(c) requires automatic security updates "enabled as a default setting, with a clear and easy-to-use opt-out mechanism." The default must be ON. The user may turn it off. Shipping with auto-update off and asking the user to enable it inverts the regulatory requirement.

INSECURE RESET

Factory reset returns the product to a state weaker than the documented secure default

Annex I, Part I, point (2)(b) ties the reset function to the secure default configuration. If your reset restores a pre-hardening firmware or re-enables disabled services, it violates the requirement. The reset target must be the documented secure state.

What the ZIP contains

8 PDF documents generated from your data. Each cites the specific article of Regulation (EU) 2024/2847 it complies with.

1

Product Classifier

Category per Annex III/IV. Smart home products with security functionalities (Class I, item 17) and IoT toys (item 18) face particular scrutiny on default configurations.

2

Technical Documentation

Annex VII, point 2(a): design and development description covering how the secure-by-default configuration was implemented. Point 3: risk assessment showing how defaults mitigate identified risks.

3

Risk Assessment

Per Art. 13(2)–(3). Maps each Annex I, Part I, point (2) sub-requirement to your product defaults: authentication (d), encryption (e), data minimisation (g), auto-updates (c), reset (b).

4

User Information

Annex II, point 8(a): instructions on "the necessary measures during initial commissioning and throughout the lifetime of the product to ensure its secure use." Point 8(e): how to turn off auto-updates.

5

Declaration of Conformity

Per Art. 28 and Annex V.

6

CVD Policy

Per Annex I, Part II, point (5). Security defaults may be challenged by vulnerability reporters — the CVD policy handles that channel.

7

Notification Template

Per Art. 14. Vulnerability in default configurations triggers the 24h/72h/14-day reporting pipeline.

8

Obligations Calendar

Key dates through the support period.

See before you buy — Download sample dossier (PDF, fictional company) — Real structure, real articles, real format. Fictional data.

Generated from your data, in your browser. No data leaves your device.

What you pay

🧾 THE ALTERNATIVE

Hiring a penetration testing firm to audit your default configurations and a compliance consultant to document the findings per Annex VII.

€8,000–€18,000
4–8 weeks. Covers one product revision. New revision, new engagement.
✓ CRACHECK
€149
15–25 minutes. 8 structured PDFs documenting your secure-by-default configuration per Annex I, Part I, point (2)(b) within the Annex VII technical file. 10 regenerations as configurations evolve. Browser-side.

Two layers: documentation and implementation

● LAYER 1 — DOCUMENTATION

Annex I compliance mapping

CRACheck generates the documentation that maps your product defaults against Annex I, Part I, point (2) requirements — secure configuration (b), auto-updates with opt-out (c), authentication (d), encryption (e), data minimisation (g), factory reset (b). It structures this mapping within the Annex VII technical file and the Risk Assessment.

∅ LAYER 2 — WHAT CRACHECK DOES NOT DO

Product audit and testing

CRACheck does not audit your product. It does not scan your firmware for insecure defaults. It does not perform penetration testing. It does not configure your product. You must implement the secure defaults in your product. CRACheck documents what you implemented and maps it to the regulatory requirements.

Implement first. Document with CRACheck. The regulation requires both — the secure product and the documentation proving it.

Enforcement regime

🇪🇺
Non-compliance with Annex I essential cybersecurity requirements including secure-by-default
€15,000,000 / 2.5%

Art. 64(2).

🇪🇺
Failure to document secure-by-default implementation in technical documentation per Art. 31
€10,000,000 / 2%

Art. 64(3).

🇪🇺
Misleading information about product configuration to market surveillance authorities
€5,000,000 / 1%

Art. 64(4).

Alternatives comparison

CriterionShip as-isPentest firmInternal security auditCRACheck
Annex I mappingNon-compliantFindings only, no Annex VIIDepends on CRA knowledgeYes — structured
Annex VII integrationNoneSeparate reportManualAutomatic
Time to documentation4–8 weeks3–6 weeks15–25 minutes
Cost€0 (+ fine risk)€8K–€18KInternal headcount€149 one-time

Product family with shared firmware?

Even products sharing a firmware base require separate technical documentation per Art. 31 if they carry different model numbers or product identifiers per Art. 13(15). Volume pricing: €99/product (10-pack) or €79/product (30-pack).

Request volume pricing
Each licence includes 30-day editing and 10 regenerations.

What CRACheck guarantees and what it does not

CRACheck generates a structured document according to Article 31 and Annex VII of Regulation (EU) 2024/2847, documenting your secure-by-default configuration per Annex I, Part I, point (2)(b), based on the information you provide. The accuracy of your configuration descriptions is your responsibility as manufacturer.

We guarantee that the document structure follows Article 31 and Annex VII of Regulation (EU) 2024/2847 and that all legal references cited are correct. We do not guarantee that a specific product configuration will be deemed compliant by a market surveillance authority in a specific case.

CRACheck is not legal advice. For specific questions about acceptable default configurations in your product category, consult with a qualified cybersecurity or regulatory professional.

Frequently asked questions — Secure-by-default configuration

What counts as "secure by default" under the CRA?
Annex I, Part I, point (2)(b) of Regulation (EU) 2024/2847 does not enumerate specific settings. It requires the product to "be made available on the market with a secure by default configuration." Reading this alongside the other sub-points of Part I(2), secure defaults include: no known exploitable vulnerabilities (a), automatic security updates enabled with opt-out (c), appropriate authentication (d), encryption of data at rest and in transit (e), data minimisation (g), and reduced attack surfaces (j).
Can I agree with a business buyer to ship without secure defaults?
Yes, but only for tailor-made products. Annex I, Part I, point (2)(b) includes the phrase "unless otherwise agreed between manufacturer and business user in relation to a tailor-made product with digital elements." Consumer products and off-the-shelf business products must ship with secure defaults.
Must the factory reset return to the secure default state?
Yes. Annex I, Part I, point (2)(b) explicitly requires "the possibility to reset the product to its original state." That original state must be the documented secure-by-default configuration. If your reset restores a pre-hardening state, it contradicts the requirement.
Do auto-updates have to be on by default?
Yes. Annex I, Part I, point (2)(c) of Regulation (EU) 2024/2847 requires automatic security updates "enabled as a default setting, with a clear and easy-to-use opt-out mechanism." The user can disable them, but the default must be enabled.
Is this a subscription?
No. One-time payment. The licence includes a 30-day editing window and 10 regenerations. The downloaded PDF is yours permanently.
Can I request a refund?
Article 16(m) of Directive (EU) 2011/83 applies. Upon licence activation, you give express consent for immediate generation of the digital content, waiving the 14-day withdrawal right. Refunds are accepted only for a reproducible technical defect.
What if the regulation changes?
If the regulation is amended during your licence validity period, you can regenerate the documentation using the updated version of the generator at no additional cost.
⚠️ Important notice: CRACheck is a self-assessment documentation tool, not legal advice and not a third-party audit. The document under Article 31 and Annex VII of Regulation (EU) 2024/2847 is generated from your input data. You are responsible for the accuracy of the data you provide. CRACheck does not replace a qualified professional assessment.

Document your secure defaults. Generate the Annex VII technical file.

€149 per product · one-time payment
8-document ZIP · 15–25 min · Art. 31 + Annex VII · 100% browser-side · Permanent PDF
Generate your CRA documentation — €149
✓ Last regulatory check: 1 May 2026 · No substantive changes detected · View history