CRA Compliance Checklist for IoT Manufacturers
Use this checklist to assess your readiness for the EU Cyber Resilience Act. Check off each requirement as you address it. Two deadlines: September 2026 (reporting) and December 2027 (full compliance).
This checklist covers the key CRA requirements for manufacturers of products with digital elements. It is not exhaustive legal advice — consult a qualified legal professional for your specific situation.
By September 11, 2026 — Reporting Readiness
Generate SBOMs for all products on the market
Sep 2026Create a Software Bill of Materials for every product you currently sell in the EU. Use CycloneDX or SPDX format. Include all software components: libraries, frameworks, OS packages, and third-party code.
Set up automated vulnerability monitoring
Sep 2026Implement continuous monitoring against CVE databases (NVD, OSV, CISA KEV). Monitor at least every 24 hours — ideally every 2 hours. Manual CVE tracking will not meet the 24-hour reporting deadline.
Establish ENISA reporting workflow
Sep 2026Define who is responsible for ENISA reports, what the approval process is, and how the three-stage chain (24h/72h/14d) is managed. Document this process.
Identify your CSIRT contact point
Sep 2026Determine which national CSIRT is your primary contact based on where your organization is established. For Finland: NCSC-FI. Register with ENISA's Single Reporting Platform when available.
Set up user notification process
Sep 2026Establish a way to notify affected users about vulnerabilities and corrective measures (email, security advisory page, in-app notice). CRA Article 14(8) requires this.
Test your incident response time
Sep 2026Run a tabletop exercise: a critical CVE is published at 3 AM on a Saturday. Can your team detect it, assess impact, draft the ENISA report, and submit — all within 24 hours?
By December 11, 2027 — Full Compliance
Implement security by design processes
Dec 2027Document how cybersecurity is integrated into your product development lifecycle. This includes threat modeling, secure coding practices, and security testing before release.
Establish coordinated vulnerability disclosure (CVD) policy
Dec 2027Publish a CVD policy on your website with a security contact email. Follow ISO/IEC 29147 guidelines. Make it easy for security researchers to report vulnerabilities to you.
Commit to security update support period
Dec 2027Determine and document the security support period for each product. CRA requires a minimum of 5 years from market placement. Free security updates must be provided throughout this period.
Prepare technical documentation (Annex VII)
Dec 2027Create and maintain technical documentation including: general product description, risk assessment, applied standards, design and development documentation, vulnerability handling process, and SBOM.
Conduct conformity assessment
Dec 2027For Default category products: self-assessment against Annex I requirements. For Important Class I: apply harmonised standards or third-party assessment. For Class II and Critical: mandatory third-party assessment.
Sign Declaration of Conformity
Dec 2027Prepare and sign the EU Declaration of Conformity (DoC) stating that your product meets all applicable CRA requirements. This document must reference the applied standards and conformity assessment procedures.
Apply CE marking
Dec 2027Affix the CE mark to your product or its packaging only after all CRA requirements are met and the Declaration of Conformity is signed. CE marking now includes cybersecurity compliance.
Set up supply chain documentation
Dec 2027Identify all third-party component suppliers. Document their security practices and vulnerability disclosure policies. Maintain records for regulatory audit.
Implement audit trail
Dec 2027Maintain records of all compliance-relevant activities: vulnerability detections, triage decisions, patches applied, ENISA reports submitted, user notifications sent. Retain for at least 5 years.
Train your team
Dec 2027Ensure product development, security, and management teams understand CRA obligations. Document training records.
Ongoing Obligations (After December 2027)
Monitor vulnerabilities continuously
OngoingThroughout the product support period, monitor for new vulnerabilities in all components. This is not a one-time activity — it runs for the entire supported lifetime of every product.
Provide security updates
OngoingRelease security patches promptly when vulnerabilities are discovered. Free of charge for the duration of the support period. Document each update and which CVEs it addresses.
Report to ENISA when required
OngoingSubmit Article 14 reports whenever an actively exploited vulnerability is discovered in your products. Maintain the 24h/72h/14d reporting chain.
Update SBOMs with each release
OngoingRe-generate and publish updated SBOMs whenever you release a firmware or software update. Track version history.
Maintain audit trail
OngoingContinue logging all compliance activities. The audit trail is your primary evidence in case of a market surveillance authority audit.
Automate This Checklist with Lexoreg
Lexoreg tracks all of these requirements automatically. Upload your SBOM, and we handle vulnerability monitoring, ENISA reporting, compliance scoring, and audit trail — so you can focus on building products instead of compliance paperwork.
