Back to Lexoreg

CRA Compliance Checklist for IoT Manufacturers

Use this checklist to assess your readiness for the EU Cyber Resilience Act. Check off each requirement as you address it. Two deadlines: September 2026 (reporting) and December 2027 (full compliance).

7 min read

This checklist covers the key CRA requirements for manufacturers of products with digital elements. It is not exhaustive legal advice — consult a qualified legal professional for your specific situation.

By September 11, 2026 — Reporting Readiness

Generate SBOMs for all products on the market

Sep 2026

Create a Software Bill of Materials for every product you currently sell in the EU. Use CycloneDX or SPDX format. Include all software components: libraries, frameworks, OS packages, and third-party code.

Set up automated vulnerability monitoring

Sep 2026

Implement continuous monitoring against CVE databases (NVD, OSV, CISA KEV). Monitor at least every 24 hours — ideally every 2 hours. Manual CVE tracking will not meet the 24-hour reporting deadline.

Establish ENISA reporting workflow

Sep 2026

Define who is responsible for ENISA reports, what the approval process is, and how the three-stage chain (24h/72h/14d) is managed. Document this process.

Identify your CSIRT contact point

Sep 2026

Determine which national CSIRT is your primary contact based on where your organization is established. For Finland: NCSC-FI. Register with ENISA's Single Reporting Platform when available.

Set up user notification process

Sep 2026

Establish a way to notify affected users about vulnerabilities and corrective measures (email, security advisory page, in-app notice). CRA Article 14(8) requires this.

Test your incident response time

Sep 2026

Run a tabletop exercise: a critical CVE is published at 3 AM on a Saturday. Can your team detect it, assess impact, draft the ENISA report, and submit — all within 24 hours?

By December 11, 2027 — Full Compliance

Implement security by design processes

Dec 2027

Document how cybersecurity is integrated into your product development lifecycle. This includes threat modeling, secure coding practices, and security testing before release.

Establish coordinated vulnerability disclosure (CVD) policy

Dec 2027

Publish a CVD policy on your website with a security contact email. Follow ISO/IEC 29147 guidelines. Make it easy for security researchers to report vulnerabilities to you.

Commit to security update support period

Dec 2027

Determine and document the security support period for each product. CRA requires a minimum of 5 years from market placement. Free security updates must be provided throughout this period.

Prepare technical documentation (Annex VII)

Dec 2027

Create and maintain technical documentation including: general product description, risk assessment, applied standards, design and development documentation, vulnerability handling process, and SBOM.

Conduct conformity assessment

Dec 2027

For Default category products: self-assessment against Annex I requirements. For Important Class I: apply harmonised standards or third-party assessment. For Class II and Critical: mandatory third-party assessment.

Sign Declaration of Conformity

Dec 2027

Prepare and sign the EU Declaration of Conformity (DoC) stating that your product meets all applicable CRA requirements. This document must reference the applied standards and conformity assessment procedures.

Apply CE marking

Dec 2027

Affix the CE mark to your product or its packaging only after all CRA requirements are met and the Declaration of Conformity is signed. CE marking now includes cybersecurity compliance.

Set up supply chain documentation

Dec 2027

Identify all third-party component suppliers. Document their security practices and vulnerability disclosure policies. Maintain records for regulatory audit.

Implement audit trail

Dec 2027

Maintain records of all compliance-relevant activities: vulnerability detections, triage decisions, patches applied, ENISA reports submitted, user notifications sent. Retain for at least 5 years.

Train your team

Dec 2027

Ensure product development, security, and management teams understand CRA obligations. Document training records.

Ongoing Obligations (After December 2027)

Monitor vulnerabilities continuously

Ongoing

Throughout the product support period, monitor for new vulnerabilities in all components. This is not a one-time activity — it runs for the entire supported lifetime of every product.

Provide security updates

Ongoing

Release security patches promptly when vulnerabilities are discovered. Free of charge for the duration of the support period. Document each update and which CVEs it addresses.

Report to ENISA when required

Ongoing

Submit Article 14 reports whenever an actively exploited vulnerability is discovered in your products. Maintain the 24h/72h/14d reporting chain.

Update SBOMs with each release

Ongoing

Re-generate and publish updated SBOMs whenever you release a firmware or software update. Track version history.

Maintain audit trail

Ongoing

Continue logging all compliance activities. The audit trail is your primary evidence in case of a market surveillance authority audit.

Automate This Checklist with Lexoreg

Lexoreg tracks all of these requirements automatically. Upload your SBOM, and we handle vulnerability monitoring, ENISA reporting, compliance scoring, and audit trail — so you can focus on building products instead of compliance paperwork.

Ready to automate CRA compliance?

Lexoreg handles SBOM management, vulnerability monitoring, and ENISA reporting — so your team can focus on building products.