The Cyber Resilience Act (CRA) was published in the Official Journal on 20 November 2024 as Regulation (EU) 2024/2847. It applies from 11 December 2027 to any hardware or software product with a direct or indirect data connection to a device or network, regardless of where the manufacturer is established (Article 2(1)). Non-compliance triggers administrative fines up to €15 million or 2.5% of worldwide annual turnover under Article 64(2). CRACheck generates the 8-document technical dossier required by Article 31 and Annex VII in 15–25 minutes, at €149 per product, entirely in your browser.
€149 one-time payment per product · 8 PDF documents in ZIP · 15–25 minutes · 100% in your browser
Article 2(1) of Regulation (EU) 2024/2847 covers any product with digital elements whose intended purpose or reasonably foreseeable use includes a direct or indirect logical or physical data connection to a device or network. This includes standalone software, firmware, embedded systems, and connected hardware across all sectors — not only IoT.
Existing CE marking under sector-specific directives (LVD 2014/35/EU, EMC 2014/30/EU, RED 2014/53/EU) does not address the cybersecurity requirements of Annex I of Regulation (EU) 2024/2847. The CRA introduces a separate, horizontal cybersecurity layer. Article 31 technical documentation is an additional obligation.
Article 14 reporting obligations apply from 11 September 2026 — 15 months before full enforcement. Manufacturers must have vulnerability notification processes operational by that date. The 24-hour early warning requirement (Art. 14(2)(a)) cannot be implemented overnight.
Each CRACheck licence generates a ZIP with 8 PDF documents for one product.
Determines whether your product falls under Default, Important Class I (Annex III), Class II, or Critical (Annex IV). Defines the applicable conformity assessment module under Article 32.
The complete dossier required by Article 31 and Annex VII: product description, system architecture, design and development information, vulnerability handling processes, standards applied, and test reports.
Cybersecurity risk assessment pursuant to Article 13(2)–(3), covering the essential requirements of Annex I Part I and the vulnerability handling requirements of Part II.
The information and instructions to the user required by Annex II: manufacturer contact, vulnerability reporting point, support period end-date, commissioning instructions, secure decommissioning.
EU declaration of conformity as specified in Article 28 and Annex V, ready to sign. Includes manufacturer identification, product traceability data, and legal basis references.
Coordinated vulnerability disclosure policy as required by Annex I Part II point (5). Includes contact address, acknowledgement timeline, and disclosure process.
Pre-structured template for the notifications to ENISA under Article 14: early warning (24h), vulnerability notification (72h), and final report (14 days).
Timeline of key dates: Art. 14 reporting (11 Sept 2026), full enforcement (11 Dec 2027), support period milestones, documentation retention (10 years per Art. 13(18)).
See before you buy — Download sample dossier (PDF, fictional company) — Real structure, real articles, real format. Fictional data.
Generated in your browser. No data leaves your device.