The Cyber Resilience Act treats security updates as a product property, not as an aftermarket service. Annex I, Part I, point (2)(c) requires that vulnerabilities can be addressed through security updates, including, where applicable, automatic updates installed within an appropriate timeframe — enabled as a default setting, with a clear and easy-to-use opt-out mechanism, with user notification, and the option to temporarily postpone. Annex I, Part II, points (7) and (8) require the secure-distribution mechanism itself and that the updates be disseminated without delay and free of charge (unless tailor-made business agreement). Recital 56 carves out products primarily integrated as components, professional ICT networks, and industrial environments. This page maps every OTA requirement to its source. CRACheck documents the update mechanism in the Annex VII technical file.
€149 one-time · 8-document ZIP · 15–25 minutes · Browser-side
Each rule below is taken from Annex I or from a recital. The article reference is the operative one for the technical documentation under Annex VII.
Annex I, Part I, point (2)(c) is explicit: ‘with a clear and easy-to-use opt-out mechanism’. Removing the opt-out makes the product non-compliant. Recital 56 reinforces: ‘Users should retain the ability to deactivate automatic updates, with a clear and easy-to-use mechanism, supported by clear instructions on how users can opt out.’ Mandatory automatic updates are a Tier 1 (Article 64(2)) fine exposure.
Annex I, Part II, point (8) requires security updates to be free of charge, with one narrow exception — a tailor-made product for a specific business user under a bilateral agreement. Outside that narrow case, charging for security updates is a Tier 1 fine under Article 64(2).
Annex I, Part II, point (2) + Recital 57 require separation where technically feasible. The burden is on the manufacturer to demonstrate that separation is technically infeasible. If feasible and the manufacturer still bundles — with the effect that users must install a feature update to get a security fix — the practice violates point (2) and may also trigger substantial-modification analysis under Art. 3(30).
Four-question self-check. If you answer YES to all four, your product is in scope of Regulation (EU) 2024/2847.
One-time payment. No subscription. The downloaded dossier is yours forever.
8 PDF documents generated from your data. Each cites the specific article of Regulation (EU) 2024/2847 it complies with.
Determines whether your product is Default, Important Class I, Important Class II (Annex III) or Critical (Annex IV). Documents the rationale and the applicable conformity assessment procedure under Article 32.
Article 31 + Annex VII dossier. Product description, design and development, vulnerability handling processes, risk assessment, list of harmonised standards applied, conformity solutions.
Annex I, Part I analysis. Intended purpose, reasonably foreseeable use, operational environment, applicability of each essential requirement, mitigation measures.
Annex II. Manufacturer details, single point of contact, intended purpose, support period end date, secure decommissioning, automatic-update opt-out instructions.
Article 28 + Annex V. Pre-structured with your classification, applicable conformity module, harmonised standards or certificates relied on, notified body number when applicable.
Annex I, Part II, point (5). Single point of contact, intake workflow, triage and remediation timeline, public disclosure rules.
Article 14 reporting. Pre-filled 24h early warning, 72h vulnerability/incident notification, 14-day final report templates.
Personalised milestones: Article 14 reporting starts 11 September 2026, full application 11 December 2027, document retention 10 years, support period (Art. 13(8)) end date.
See before you buy — Download sample dossier (PDF, fictional company). Real structure, real articles, real format. Fictional data.
Generated from your data, in your browser. No data leaves your device.
Every article and recital cited on this page comes from the official text of Regulation (EU) 2024/2847 (Cyber Resilience Act), published in the Official Journal of the European Union on 20 November 2024 (ELI: data.europa.eu/eli/reg/2024/2847/oj).
Related: Regulation (EU) 2019/881 (Cybersecurity Act, EUCC) · Directive (EU) 2022/2555 (NIS2) · Regulation (EU) 2019/1020 (market surveillance) · Regulation (EU) 2024/1689 (AI Act).
This is not legal advice. CRACheck is structured self-assessment software based on Regulation (EU) 2024/2847. The dossier you download is structured documentation, not a third-party audit or certification.
Class II and Critical products still need a notified body. CRACheck prepares the dossier that the notified body will examine — it does not replace the third-party conformity assessment required by Article 32(3) and Article 32(4).
Maximum liability: the amount you paid for the licence. Always verify your specific situation with your legal counsel.
CRACheck records your OTA architecture in the Annex VII technical-documentation file, the user-facing opt-out instructions in Annex II, and the secure-update commitment in the CVD policy and EU declaration of conformity.
Generate dossier — €149