<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>CRA Documentation - Regulus</title>
	<atom:link href="https://goregulus.com/category/cra-documentation/feed/" rel="self" type="application/rss+xml" />
	<link>https://goregulus.com/category/cra-documentation/</link>
	<description>Regulus provides compliance tools for EU cybersecurity regulations, helping manufacturers, IoT vendors and digital product teams meet Cyber Resilience Act requirements.</description>
	<lastBuildDate>Sun, 21 Dec 2025 11:53:33 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.1</generator>

<image>
	<url>https://goregulus.com/wp-content/uploads/2026/01/cropped-favicon-32x32.png</url>
	<title>CRA Documentation - Regulus</title>
	<link>https://goregulus.com/category/cra-documentation/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>CRA Declaration of Conformity (DoC) Guide: How to Build a Compliant CRA DoC</title>
		<link>https://goregulus.com/cra-documentation/cra-declaration-of-conformity/</link>
		
		<dc:creator><![CDATA[Igor Smith]]></dc:creator>
		<pubDate>Wed, 10 Dec 2025 10:07:36 +0000</pubDate>
				<category><![CDATA[CRA Documentation]]></category>
		<guid isPermaLink="false">https://goregulus.com/?p=1178</guid>

					<description><![CDATA[<p>A practical guide to the CRA Declaration of Conformity. Learn how to structure a Cyber Resilience Act DoC, what it must contain, how it connects to the technical file and common mistakes to avoid.</p>
<p>La entrada <a href="https://goregulus.com/cra-documentation/cra-declaration-of-conformity/">CRA Declaration of Conformity (DoC) Guide: How to Build a Compliant CRA DoC</a> se publicó primero en <a href="https://goregulus.com">Regulus</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The <strong>CRA Declaration of Conformity</strong> is the formal statement in which the manufacturer declares that a product with digital elements complies with the EU Cyber Resilience Act and any other applicable legislation. Together with the technical file and CE marking, the CRA Declaration of Conformity (DoC) is one of the core pillars of your Cyber Resilience Act compliance.</p>



<p>This guide explains what the CRA Declaration of Conformity is, how it fits into the wider EU product compliance framework, which elements it must contain, and how you can structure a practical DoC template for your products with digital elements. It is written for manufacturers, IoT vendors, embedded system teams and software suppliers preparing for CRA compliance.</p>



<p>For broader context on documentation, see our guide <a href="https://goregulus.com/cra-documentation/cyber-resilience-act-technical-documentation/" target="_blank" rel="noreferrer noopener">Cyber Resilience Act Technical Documentation: Complete Guide</a>. For component inventory, you can also review <a href="https://goregulus.com/cra-requirements/cra-sbom-requirements/" target="_blank" rel="noreferrer noopener">CRA SBOM Requirements</a>.</p>



<figure class="wp-block-image size-full"><img fetchpriority="high" decoding="async" width="610" height="390" src="https://goregulus.com/wp-content/uploads/2025/12/cra-declaration-of-conformity-featured.jpg" alt="CRA Declaration of Conformity document for a Cyber Resilience Act product with digital elements" class="wp-image-1181" srcset="https://goregulus.com/wp-content/uploads/2025/12/cra-declaration-of-conformity-featured.jpg 610w, https://goregulus.com/wp-content/uploads/2025/12/cra-declaration-of-conformity-featured-300x192.jpg 300w" sizes="(max-width: 610px) 100vw, 610px" /><figcaption class="wp-element-caption">The CRA Declaration of Conformity is the formal statement that your product with digital elements meets Cyber Resilience Act requirements.</figcaption></figure>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">1. What Is the CRA Declaration of Conformity?</h2>



<p>In EU product regulation, a Declaration of Conformity (DoC) is a legal document signed by the manufacturer stating that a specific product complies with the relevant EU legislation. Under the Cyber Resilience Act, the <strong>CRA Declaration of Conformity</strong> plays the same role for products with digital elements, focusing on cybersecurity and lifecycle security obligations.</p>



<p>By signing the CRA Declaration of Conformity, the manufacturer takes legal responsibility for ensuring that:</p>



<ul class="wp-block-list">
<li>The product meets the essential cybersecurity requirements defined in the CRA</li>



<li>Appropriate conformity assessment procedures have been followed</li>



<li>Technical documentation is available and supports the claim of conformity</li>



<li>Security obligations will be maintained throughout the product’s lifecycle</li>
</ul>



<p>The DoC is not a marketing document. It is a legally binding statement that can be requested by market surveillance authorities and used in enforcement actions if the product is found to be non-compliant.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">2. How the CRA Declaration of Conformity Fits into EU Compliance</h2>



<p>The <strong>CRA Declaration of Conformity</strong> does not exist in isolation. It sits alongside other elements of EU product compliance:</p>



<ul class="wp-block-list">
<li><strong>Cyber Resilience Act</strong> – Establishes cybersecurity obligations for products with digital elements</li>



<li><strong>Other EU product legislation</strong> – For example, RED, EMC, LVD, machinery or medical devices regulations, where applicable</li>



<li><strong>Technical file</strong> – Holds the detailed evidence demonstrating how CRA and other requirements are met</li>



<li><strong>CE marking</strong> – The visible mark on the product or packaging signalling conformity with applicable EU acts</li>
</ul>



<p>In many cases, you will issue a single Declaration of Conformity that lists multiple pieces of EU legislation, including the <strong>Cyber Resilience Act</strong> and any other acts relevant to your product. The CRA Declaration of Conformity section then becomes the cybersecurity-focused part of that broader DoC.</p>



<p>For a high-level overview of CRA obligations and how they interact with other regulations, see our article <a href="https://goregulus.com/cra-compliance/cra-conformity-assessment/" target="_blank" rel="noreferrer noopener">CRA Conformity Assessment: Internal Control vs Third-Party Assessment</a>.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">3. When Do You Need a CRA Declaration of Conformity?</h2>



<p>You need a CRA Declaration of Conformity for any product with digital elements that falls under Cyber Resilience Act scope and that you, as a manufacturer, place on the EU market. Typical cases include:</p>



<ul class="wp-block-list">
<li>IoT devices and smart home products</li>



<li>Industrial sensors, gateways and controllers</li>



<li>Embedded systems and firmware-driven devices</li>



<li>Software products with network connectivity distributed as part of a product</li>
</ul>



<p>Before issuing the <strong>CRA Declaration of Conformity</strong>, the manufacturer must:</p>



<ul class="wp-block-list">
<li>Perform a CRA scope and applicability assessment for the product</li>



<li>Classify the product (default, important or critical)</li>



<li>Complete the relevant conformity assessment procedure</li>



<li>Prepare a CRA technical file supporting the declaration</li>
</ul>



<p>If a product is exclusively covered by another set of EU rules (for example, certain medical devices under MDR or automotive systems under specific type-approval regulations), CRA may not apply. In such cases, its cybersecurity obligations are covered by those sector-specific frameworks instead of a CRA Declaration of Conformity.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">4. Mandatory Elements of a CRA Declaration of Conformity</h2>



<p>While exact layout may vary, a compliant <strong>CRA Declaration of Conformity</strong> should contain at least the following elements. This structure mirrors the logic found in other EU product regulations, adapted to Cyber Resilience Act specifics.</p>



<h3 class="wp-block-heading">4.1 Manufacturer identification</h3>



<ul class="wp-block-list">
<li>Full legal name of the manufacturer</li>



<li>Registered trade name or trademark (if different)</li>



<li>Full postal address (including country)</li>



<li>Contact details such as website or email</li>
</ul>



<p>If an authorised representative is used in the EU, their details will also be relevant, but the manufacturer remains primarily responsible for the CRA Declaration of Conformity.</p>



<h3 class="wp-block-heading">4.2 Product identification</h3>



<ul class="wp-block-list">
<li>Product name and model</li>



<li>Type, batch or serial number, or other identifying elements</li>



<li>Short description of the product with digital elements (PDE)</li>



<li>Version(s) of hardware and/or software covered by this DoC</li>
</ul>



<p>Clarity here is critical. The CRA Declaration of Conformity must unambiguously identify which product and which versions are being declared compliant.</p>



<h3 class="wp-block-heading">4.3 Statement of responsibility</h3>



<p>The heart of the CRA Declaration of Conformity is a clear statement along the lines of:</p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>“We, [manufacturer name], take full responsibility for the compliance of the product [product identification] with the requirements of the legislation listed below.”</p>
</blockquote>



<p>This statement ties the manufacturer’s identity to the claims of conformity under the Cyber Resilience Act and any other referenced legislation.</p>



<h3 class="wp-block-heading">4.4 List of applicable EU legislation</h3>



<p>The DoC must specify which EU acts apply. For a CRA-focused product, this will include the Cyber Resilience Act, usually in combination with other acts depending on the product type (for example, Radio Equipment Directive, EMC Directive, etc.). A typical listing in the <strong>CRA Declaration of Conformity</strong> looks like:</p>



<ul class="wp-block-list">
<li>Regulation (EU) [XXX/XXXX] – Cyber Resilience Act (Cybersecurity requirements for products with digital elements)</li>



<li>Directive [YYYY/YY/EU] – [Other applicable legislation, e.g. Radio Equipment Directive]</li>
</ul>



<p>You should track the exact formal references as they appear in the Official Journal and update your template when new acts or amendments become applicable.</p>



<h3 class="wp-block-heading">4.5 Reference to standards and technical specifications</h3>



<p>To demonstrate compliance, manufacturers normally rely on harmonised standards or other recognised technical specifications. The CRA Declaration of Conformity should list the standards that have been applied, for example:</p>



<ul class="wp-block-list">
<li>EN ISO/IEC 27001 – Information security management systems (for selected scopes)</li>



<li>EN 303 645 – Cyber security for consumer internet of things (if applicable)</li>



<li>Other product or domain-specific cybersecurity standards used</li>
</ul>



<p>Using harmonised standards aligned with the Cyber Resilience Act can provide a presumption of conformity for those aspects covered by the standard.</p>



<h3 class="wp-block-heading">4.6 Reference to the technical file</h3>



<p>The DoC should indicate that a technical file is available and can be provided to competent authorities on request. This links the high-level <strong>CRA Declaration of Conformity</strong> to the detailed evidence contained in your CRA technical file structure.</p>



<h3 class="wp-block-heading">4.7 Place, date, name and signature</h3>



<p>Finally, the DoC must include:</p>



<ul class="wp-block-list">
<li>Place and date of issue</li>



<li>Name and function of the signatory</li>



<li>Signature (and company stamp if you use one)</li>
</ul>



<p>The signatory should be a person with appropriate authority to bind the manufacturer, such as a senior executive or the person with ultimate responsibility for product compliance.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">5. Suggested Structure for a CRA Declaration of Conformity Template</h2>



<p>Although you will adapt your layout to internal standards, the following outline provides a practical structure for a <strong>CRA Declaration of Conformity</strong> template:</p>



<ul class="wp-block-list is-style-checkmark-list">
<li><strong>Title</strong>: EU Declaration of Conformity</li>



<li><strong>1. Product</strong>: Identification of the product with digital elements, including type and model</li>



<li><strong>2. Manufacturer</strong>: Legal name, address and contact details</li>



<li><strong>3. This declaration is issued under the sole responsibility of the manufacturer</strong></li>



<li><strong>4. Object of the declaration</strong>: Short description of the product, purpose and main features</li>



<li><strong>5. The object of the declaration described above is in conformity with the relevant Union legislation</strong>: List CRA and other applicable acts</li>



<li><strong>6. References to the relevant harmonised standards and other technical specifications</strong></li>



<li><strong>7. Where applicable</strong>: reference to the conformity assessment procedure or notified body involvement</li>



<li><strong>8. Additional information</strong>: links to the technical file, security support period or specific CRA-relevant notes</li>



<li><strong>Place and date of issue</strong></li>



<li><strong>Name and function</strong></li>



<li><strong>Signature</strong></li>
</ul>



<p>This template can be reused across product lines, with the CRA section adjusted for each product’s specific situation.</p>



<figure class="wp-block-image size-full"><img decoding="async" width="610" height="390" src="https://goregulus.com/wp-content/uploads/2025/12/cra-doc-template-structure.jpg" alt="Structured layout of a CRA Declaration of Conformity template" class="wp-image-1180" srcset="https://goregulus.com/wp-content/uploads/2025/12/cra-doc-template-structure.jpg 610w, https://goregulus.com/wp-content/uploads/2025/12/cra-doc-template-structure-300x192.jpg 300w" sizes="(max-width: 610px) 100vw, 610px" /><figcaption class="wp-element-caption">A structured CRA Declaration of Conformity template ensures consistency across products and simplifies audits.</figcaption></figure>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">6. Link Between the CRA Declaration of Conformity and the Technical File</h2>



<p>The <strong>CRA Declaration of Conformity</strong> is a summary; the technical file contains the underlying evidence. Authorities or notified bodies may request the technical documentation to verify that the claims in the DoC are justified.</p>



<p>In practice, this means that:</p>



<ul class="wp-block-list">
<li>Every standard or specification listed in the DoC should be traceable to specific sections in the technical file</li>



<li>Every product version mentioned in the DoC should have a corresponding technical file or a clearly identified configuration</li>



<li>Risk assessment, security controls, SBOM and testing evidence must be available and linked to the DoC claims</li>
</ul>



<p>For detailed guidance on building a solid CRA technical file structure, see our article <a href="https://goregulus.com/cra-documentation/cra-technical-file-structure/" target="_blank" rel="noreferrer noopener">CRA Technical File Structure: Complete Guide</a>.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">7. Drafting a CRA Declaration of Conformity: Step-by-Step</h2>



<p>To make the process actionable, you can approach the creation of a <strong>CRA Declaration of Conformity</strong> in these steps:</p>



<h3 class="wp-block-heading">7.1 Confirm CRA scope and classification</h3>



<p>Validate that the product is in CRA scope and confirm its classification (default, important or critical). Use your CRA applicability assessment and classification results.</p>



<h3 class="wp-block-heading">7.2 Verify that the technical file is complete enough</h3>



<p>Ensure that core technical documentation is ready: architecture, risk assessment, SBOM, security controls mapping, testing evidence, vulnerability handling and lifecycle documentation. The DoC should not be issued before these elements exist.</p>



<h3 class="wp-block-heading">7.3 Identify applicable legislation</h3>



<p>List all applicable EU acts beyond the Cyber Resilience Act, such as electromagnetic compatibility or radio equipment requirements, depending on the product. This defines the scope of your combined Declaration of Conformity.</p>



<h3 class="wp-block-heading">7.4 Compile standards and technical specifications</h3>



<p>Gather the list of harmonised standards and other technical references you rely on to demonstrate compliance with CRA security requirements and other relevant legislation.</p>



<h3 class="wp-block-heading">7.5 Populate your CRA Declaration of Conformity template</h3>



<p>Using the template structure, fill in product details, manufacturer information, legal references, standards, and the link to the technical file. Check that product identifiers match labels and documentation.</p>



<h3 class="wp-block-heading">7.6 Review, sign and store</h3>



<p>Have the DoC reviewed by your compliance or legal team, obtain the signature of an authorised person, and store the signed document in your document management system alongside the technical file. Ensure that your retention period meets CRA expectations.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">8. Common Mistakes in CRA Declarations of Conformity</h2>



<p>When organisations start issuing CRA Declarations of Conformity, they often repeat similar mistakes. Being aware of these helps you avoid rework and audit findings.</p>



<h3 class="wp-block-heading">8.1 Incomplete legislation list</h3>



<p>Listing only the Cyber Resilience Act and forgetting other applicable EU acts can create confusion. The DoC should reflect the full regulatory landscape for the product, not just CRA.</p>



<h3 class="wp-block-heading">8.2 Product identification that is too vague</h3>



<p>Using generic names or missing model identifiers makes it hard to know which exact configuration the DoC covers. Your CRA Declaration of Conformity should be precise enough to avoid ambiguity during audits or incidents.</p>



<h3 class="wp-block-heading">8.3 No alignment with technical documentation</h3>



<p>Sometimes the standards, versions or product descriptions listed in the DoC do not match the technical file or marketing materials. This lack of consistency weakens your CRA compliance posture.</p>



<h3 class="wp-block-heading">8.4 Issuing the DoC before the technical file is ready</h3>



<p>Under time pressure, teams sometimes sign the CRA Declaration of Conformity while the technical documentation is incomplete. This exposes the manufacturer to risk if authorities request evidence and find gaps.</p>



<h3 class="wp-block-heading">8.5 Forgetting to update the DoC when the product changes</h3>



<p>Significant changes in architecture, components or security posture may require an update to the technical file, renewed assessment and eventually an updated DoC. Treat the CRA Declaration of Conformity as a living document, not a one-time formality.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">9. How Regulus Helps with CRA Declaration of Conformity and Documentation</h2>



<p>Regulus is building tooling to help manufacturers, IoT vendors and embedded system teams manage Cyber Resilience Act compliance in a structured way. Instead of juggling scattered documents and spreadsheets, our goal is to provide:</p>



<ul class="wp-block-list">
<li>Guided workflows for CRA scope assessment and product classification</li>



<li>A requirements matrix that maps Cyber Resilience Act obligations to product-specific controls</li>



<li>Structured <strong>CRA technical file</strong> templates aligned with your product portfolio</li>



<li>Support for documenting SBOM, vulnerability handling, updates and lifecycle commitments</li>



<li>Assistance in generating consistent CRA Declaration of Conformity content from existing documentation</li>
</ul>



<p>To get started:</p>



<ol class="wp-block-list">
<li>Use our <a href="https://goregulus.com/resources/cra-checklist/" target="_blank" rel="noreferrer noopener">CRA Readiness Checklist</a> to identify gaps in your CRA documentation and DoC process.</li>



<li>Review our CRA documentation resources in the <a href="https://goregulus.com/resources/" target="_blank" rel="noreferrer noopener">Resources</a> section.</li>



<li>Join the <a href="https://goregulus.com/early-access/">Regulus Early Access program</a> to get priority access to CRA documentation workflows as they become available.</li>
</ol>
<p>La entrada <a href="https://goregulus.com/cra-documentation/cra-declaration-of-conformity/">CRA Declaration of Conformity (DoC) Guide: How to Build a Compliant CRA DoC</a> se publicó primero en <a href="https://goregulus.com">Regulus</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CRA Technical File Structure: Complete Guide for Cyber Resilience Act Compliance</title>
		<link>https://goregulus.com/cra-documentation/cra-technical-file-structure/</link>
		
		<dc:creator><![CDATA[Igor Smith]]></dc:creator>
		<pubDate>Wed, 10 Dec 2025 09:44:03 +0000</pubDate>
				<category><![CDATA[CRA Documentation]]></category>
		<guid isPermaLink="false">https://goregulus.com/?p=1167</guid>

					<description><![CDATA[<p>A practical guide to CRA technical file structure. Learn how to organise Cyber Resilience Act technical documentation, from product architecture and risk assessment to SBOM, testing evidence and lifecycle security.</p>
<p>La entrada <a href="https://goregulus.com/cra-documentation/cra-technical-file-structure/">CRA Technical File Structure: Complete Guide for Cyber Resilience Act Compliance</a> se publicó primero en <a href="https://goregulus.com">Regulus</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>A clear and consistent <strong>CRA technical file structure</strong> is essential if you want to demonstrate Cyber Resilience Act compliance to customers, authorities and notified bodies. The technical file is the main evidence that your product with digital elements meets the CRA security requirements and that you have designed, built and maintained it in a secure way.</p>



<p>This guide explains how to design a practical CRA technical file structure that works for manufacturers, IoT vendors, embedded system teams and software suppliers. It shows how to organise your technical documentation, what sections to include and how to connect the technical file with your risk assessment, SBOM, vulnerability handling and conformity assessment workflow.</p>



<p>For a broader view of CRA documentation requirements, you can also refer to our guide <a href="https://goregulus.com/cra-documentation/cyber-resilience-act-technical-documentation/" target="_blank" rel="noreferrer noopener">Cyber Resilience Act Technical Documentation: Complete Guide</a>, and for component transparency, see <a href="https://goregulus.com/cra-requirements/cra-sbom-requirements/" target="_blank" rel="noreferrer noopener">CRA SBOM Requirements</a>.</p>



<figure class="wp-block-image size-full"><img decoding="async" width="610" height="390" src="https://goregulus.com/wp-content/uploads/2025/12/cra-technical-file-structure-overview.jpg" alt="Diagram of CRA technical file structure for Cyber Resilience Act compliance" class="wp-image-1170" srcset="https://goregulus.com/wp-content/uploads/2025/12/cra-technical-file-structure-overview.jpg 610w, https://goregulus.com/wp-content/uploads/2025/12/cra-technical-file-structure-overview-300x192.jpg 300w" sizes="(max-width: 610px) 100vw, 610px" /><figcaption class="wp-element-caption">At the heart of CRA compliance sits a well structured technical file that documents architecture, security controls and lifecycle processes.</figcaption></figure>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">1. What Is the CRA Technical File?</h2>



<p>Under the Cyber Resilience Act, manufacturers must prepare and keep technical documentation that demonstrates conformity of the product with digital elements to the CRA’s essential cybersecurity requirements. This set of documentation is often referred to informally as the <strong>CRA technical file</strong>.</p>



<p>The CRA technical file structure is not just a legal formality. It is the central place where you:</p>



<ul class="wp-block-list">
<li>Describe what the product is and how it is intended to be used</li>



<li>Explain the architecture and components, including third party and open source software</li>



<li>Document your cybersecurity risk assessment and the rationale for your controls</li>



<li>Show how you meet the CRA security requirements in Annex I</li>



<li>Provide evidence of testing, validation and vulnerability handling</li>



<li>Record your lifecycle commitments, such as update support and end of life policy</li>
</ul>



<p>A good CRA technical file is readable, traceable and easy to maintain. It enables a regulator, a notified body or an internal auditor to understand your product and to see how each requirement is covered without searching through fragmented spreadsheets and emails.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">2. Principles for a Good CRA Technical File Structure</h2>



<p>Before defining specific sections, it is useful to align on a few core principles that should guide your CRA technical file structure:</p>



<h3 class="wp-block-heading">2.1 Traceability from risk to controls</h3>



<p>Your technical file should link product risks to the security measures you selected. A reviewer should be able to follow the chain: <em>threat → risk → control → evidence</em>. This traceability is at the heart of Cyber Resilience Act compliance and will matter even more for important and critical products.</p>



<h3 class="wp-block-heading">2.2 Consistency across products</h3>



<p>If you manufacture several products with digital elements, the CRA technical file structure should be consistent across them. Reusing the same template and section layout saves time, reduces errors and makes internal reviews much easier.</p>



<h3 class="wp-block-heading">2.3 Separation of product specific and reusable content</h3>



<p>Some information is product specific (architecture diagrams, test results), while other content is reusable (corporate secure development lifecycle, generic vulnerability handling process). A good CRA technical file structure reuses global policies where possible and adds product specific annexes instead of duplicating everything.</p>



<h3 class="wp-block-heading">2.4 Up to date and lifecycle oriented</h3>



<p>The CRA technical file is not a one time snapshot. It must be maintained as the product evolves: new versions, new features, security patches, changes in components. Your structure should make it easy to track versions and to keep documentation aligned with the actual product.</p>



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="610" height="390" src="https://goregulus.com/wp-content/uploads/2025/12/cra-technical-file-lifecycle.jpg" alt="Diagram of CRA technical file structure for Cyber Resilience Act compliance" class="wp-image-1169" srcset="https://goregulus.com/wp-content/uploads/2025/12/cra-technical-file-lifecycle.jpg 610w, https://goregulus.com/wp-content/uploads/2025/12/cra-technical-file-lifecycle-300x192.jpg 300w" sizes="auto, (max-width: 610px) 100vw, 610px" /><figcaption class="wp-element-caption">The CRA technical file needs to evolve with the product lifecycle, from design to end of life and security support.</figcaption></figure>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">3. Recommended CRA Technical File Structure</h2>



<p>There is no single mandatory format, but most organisations converge on a similar CRA technical file structure. Below is a recommended layout that aligns with the Cyber Resilience Act and can be adapted to your internal tools (DMS, wiki, GRC platform or a specialised CRA documentation tool such as Regulus).</p>



<h3 class="wp-block-heading">3.1 Section 1 – Product overview and identification</h3>



<p>The first part of your CRA technical file structure should introduce the product clearly:</p>



<ul class="wp-block-list">
<li>Product name and model(s)</li>



<li>Version(s) covered by this technical file</li>



<li>Intended purpose and use cases</li>



<li>Target users or environments (consumer, enterprise, industrial, etc.)</li>



<li>Regions and markets (EU, specific Member States)</li>



<li>High level description of main features</li>
</ul>



<p>This section anchors the technical file and provides context for the rest of the documentation. It should also clarify if the product is a complete system, a component, a software module or a combination of hardware and software.</p>



<h3 class="wp-block-heading">3.2 Section 2 – Roles and CRA applicability summary</h3>



<p>In this section, you summarise your CRA applicability and role analysis:</p>



<ul class="wp-block-list">
<li>Whether the product is in scope as a product with digital elements</li>



<li>CRA product category (default, important or critical) and justification</li>



<li>Economic operator role(s) assumed by your organisation (manufacturer, importer, distributor)</li>



<li>Any relevant sector specific frameworks that modify or complement CRA (e.g. MDR, automotive regulations)</li>
</ul>



<p>Here it is useful to reference internal analysis based on our article <a href="https://goregulus.com/applicability-classification/cyber-resilience-act-applicability/" target="_blank" rel="noreferrer noopener">Cyber Resilience Act Applicability: Does the CRA Apply to Your Product?</a> and <a href="https://goregulus.com/cra-basics/cra-scope/" target="_blank" rel="noreferrer noopener">CRA Scope: What Products Are In and Out</a>.</p>



<h3 class="wp-block-heading">3.3 Section 3 – System architecture and data flows</h3>



<p>This part of the CRA technical file structure explains how the product is built and how it interacts with other systems:</p>



<ul class="wp-block-list">
<li>Logical architecture diagrams (components, modules, services)</li>



<li>Network architecture and trust boundaries</li>



<li>Data flow diagrams (what data moves where, and under which protection)</li>



<li>Interfaces exposed (APIs, management ports, protocols)</li>
</ul>



<p>Architecture and data flow diagrams are critical for understanding attack surfaces, responsibilities and where specific CRA security requirements are implemented.</p>



<h3 class="wp-block-heading">3.4 Section 4 – Cybersecurity risk assessment</h3>



<p>The CRA requires manufacturers to carry out a cybersecurity risk assessment as part of the design and development process. This section:</p>



<ul class="wp-block-list">
<li>Describes the methodology used (e.g. threat modelling, STRIDE, attack trees, IEC 62443 inspired)</li>



<li>Lists threats and scenarios relevant to the product</li>



<li>Identifies assets, potential impacts and likelihood</li>



<li>Prioritises risks and links them to the security controls applied</li>
</ul>



<p>If you already follow a structured approach to risk under NIS2 or ISO 27001, you can reuse parts of that framework here, but the analysis must focus on the specific product with digital elements. For a conceptual overview of risk work under CRA, see our <a href="https://goregulus.com/cra-basics/cra-risk-assessment/" target="_blank" rel="noreferrer noopener">CRA Risk Assessment Guide</a>.</p>



<h3 class="wp-block-heading">3.5 Section 5 – Mapping to CRA security requirements</h3>



<p>One of the key elements of a CRA technical file structure is a clear mapping between the product and the CRA essential security requirements. A typical way to present this is a <strong>requirements matrix</strong> that:</p>



<ul class="wp-block-list">
<li>Lists the CRA security requirements (for example, secure by default, access control, logging, update mechanisms)</li>



<li>Describes how each requirement is implemented in the product</li>



<li>References specific design documents, code modules or configuration standards</li>



<li>Links to test cases and evidence showing that the requirement is effectively met</li>
</ul>



<p>In Regulus, this mapping is part of the Requirements Matrix module, which helps you move from abstract CRA text to concrete, product specific obligations.</p>



<h3 class="wp-block-heading">3.6 Section 6 – Software Bill of Materials (SBOM) and components</h3>



<p>Because the CRA expects manufacturers to maintain an inventory of software components, the technical file should include or reference an up to date <strong>SBOM</strong>:</p>



<ul class="wp-block-list">
<li>List of all relevant software components and libraries</li>



<li>Version and supplier for each component</li>



<li>Open source and third party identifiers (e.g. package names, repositories)</li>



<li>Licensing information when relevant to security and support</li>
</ul>



<p>The SBOM section of your CRA technical file structure should also explain how the SBOM is generated, maintained and used for vulnerability correlation. For more depth on expectations, see <a href="https://goregulus.com/cra-requirements/cra-sbom-requirements/" target="_blank" rel="noreferrer noopener">CRA SBOM Requirements</a>.</p>



<h3 class="wp-block-heading">3.7 Section 7 – Secure development lifecycle (SDL)</h3>



<p>This section documents how the product is built securely over time:</p>



<ul class="wp-block-list">
<li>Overview of your secure development lifecycle (SDL) or equivalent framework</li>



<li>Security activities per phase: design reviews, threat modelling, secure coding guidelines, code review, SAST/DAST, dependency scanning</li>



<li>Roles and responsibilities (product security champions, security reviewers)</li>



<li>Integration of security in CI/CD pipelines</li>
</ul>



<p>You can reference a corporate SDL policy and then include product specific details in this technical file. When you later create a dedicated article on <strong>Secure Development Lifecycle under the CRA</strong>, you can link to it from this section.</p>



<h3 class="wp-block-heading">3.8 Section 8 – Security testing and validation evidence</h3>



<p>Regulators and notified bodies will expect to see evidence that security controls have been tested. This section of the CRA technical file structure typically contains:</p>



<ul class="wp-block-list">
<li>Security test strategy and scope</li>



<li>Results of functional security tests</li>



<li>Results of fuzzing, penetration testing or red teaming where applicable</li>



<li>Dependency scanning and vulnerability scanning reports</li>



<li>Fix tracking for critical findings before product release</li>
</ul>



<p>It is good practice to summarise conclusions in a short security validation report and attach detailed reports as annexes.</p>



<h3 class="wp-block-heading">3.9 Section 9 – Vulnerability handling process and CVD</h3>



<p>The CRA explicitly requires a structured <strong>vulnerability handling process</strong>. This part of your technical file should:</p>



<ul class="wp-block-list">
<li>Describe how vulnerabilities are reported, triaged and prioritised</li>



<li>Explain your Coordinated Vulnerability Disclosure (CVD) policy</li>



<li>Identify your public contact channels for vulnerability reporting</li>



<li>Document timelines and SLAs for addressing vulnerabilities</li>



<li>Show how you document and communicate resolved vulnerabilities</li>
</ul>



<p>For a detailed breakdown of what this entails, see <a href="https://goregulus.com/cra-requirements/cra-vulnerability-handling/" target="_blank" rel="noreferrer noopener">CRA Vulnerability Handling Requirements (Annex I – Section 2)</a>.</p>



<h3 class="wp-block-heading">3.10 Section 10 – Update and patch management</h3>



<p>This section of the CRA technical file structure explains how the product receives updates:</p>



<ul class="wp-block-list">
<li>Update architecture (over the air, local updates, staged rollouts)</li>



<li>How update packages are signed, validated and applied securely</li>



<li>Segregation between security updates and feature updates where possible</li>



<li>Notification mechanisms to inform users about security updates</li>



<li>Support period and end of security updates for each version</li>
</ul>



<p>Update and patch management are central to ongoing Cyber Resilience Act compliance. They connect your design assumptions to real world operations and incident exposure.</p>



<h3 class="wp-block-heading">3.11 Section 11 – Post-market monitoring and incident handling</h3>



<p>Post-market monitoring is how you detect problems once the product is in use. This section should cover:</p>



<ul class="wp-block-list">
<li>How you collect signals about security issues (logs, telemetry, customer reports)</li>



<li>How you track and investigate incidents affecting the product</li>



<li>How you coordinate CRA related incident notifications where required</li>



<li>How you feed lessons learned back into risk assessment and product improvement</li>
</ul>



<h3 class="wp-block-heading">3.12 Section 12 – Lifecycle, support and end-of-life</h3>



<p>The CRA is explicit about lifecycle security. In this part of your technical file, document:</p>



<ul class="wp-block-list">
<li>Planned lifetime of the product versions covered</li>



<li>Period during which you commit to provide security updates</li>



<li>End-of-life policy and communication to customers</li>



<li>Migration or replacement recommendations when security support ends</li>
</ul>



<h3 class="wp-block-heading">3.13 Section 13 – EU Declaration of Conformity (DoC) and references</h3>



<p>Finally, your CRA technical file structure should point to your <strong>EU Declaration of Conformity</strong> and any other declarations or certificates (for example, under other EU product regulations or cybersecurity certification schemes). It is common to:</p>



<ul class="wp-block-list">
<li>Include a copy of the DoC as an annex</li>



<li>Reference harmonised standards or specifications you rely on</li>



<li>List relevant certificates and assessment reports from notified bodies</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">4. How the CRA Technical File Fits into Your Compliance Workflow</h2>



<p>The CRA technical file is not an isolated document; it sits at the intersection of product development, security and regulatory compliance. In a mature workflow:</p>



<ul class="wp-block-list">
<li>Product managers use it to understand constraints and obligations</li>



<li>Engineering teams contribute architecture, code level and testing details</li>



<li>Security teams contribute risk assessments, SBOMs and vulnerability handling evidence</li>



<li>Compliance teams coordinate structure, versioning and conformity assessment outputs</li>
</ul>



<p>Ideally, your CRA technical file structure mirrors the way your teams work. If you try to maintain it only as a static PDF, it will quickly become outdated. Many organisations choose to manage the technical file in a documentation system, GRC tool or a specialised CRA platform such as Regulus.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">5. Common Mistakes in CRA Technical File Structure</h2>



<p>When organisations start building CRA technical documentation, they often make similar mistakes. Typical issues include:</p>



<h3 class="wp-block-heading">5.1 Mixing policy and product detail without structure</h3>



<p>Global security policies and product specific implementations are mixed together in an unstructured way, making it difficult for reviewers to understand what applies to which product. A clearer CRA technical file structure separates global policies from product level details and links them instead of merging everything into one document.</p>



<h3 class="wp-block-heading">5.2 No clear mapping to CRA requirements</h3>



<p>Technical documentation often describes many security features but fails to explicitly show how each CRA requirement is covered. A requirements matrix or mapping table is essential to make Cyber Resilience Act compliance visible and auditable.</p>



<h3 class="wp-block-heading">5.3 SBOMs not integrated into the technical file</h3>



<p>Some teams generate SBOMs as standalone artefacts but never integrate them into the CRA technical file. The result is a gap between component inventory and other documentation. In a robust CRA technical file structure, the SBOM is referenced, explained and linked to vulnerability handling and testing processes.</p>



<h3 class="wp-block-heading">5.4 Documentation created too late</h3>



<p>Teams wait until just before release to start the technical file, which leads to guesswork and missing evidence. The CRA technical file should evolve together with the product, starting from architecture and risk assessment through to validation and post-market monitoring.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">6. How Regulus Helps You Build a CRA Technical File Structure</h2>



<p>Regulus is designed to make <strong>Cyber Resilience Act compliance</strong> more manageable for manufacturers of IoT devices, embedded systems, firmware based products and other connected solutions. Instead of maintaining a patchwork of spreadsheets and documents, Regulus provides:</p>



<ul class="wp-block-list">
<li>A structured CRA requirements matrix aligned with your product profile</li>



<li>Guided workflows for CRA scope and applicability</li>



<li>Support for documenting your CRA technical file structure in a consistent way</li>



<li>Templates for risk assessment, SBOM, vulnerability handling and update management documentation</li>



<li>Roadmap views that connect documentation work with 2025–2027 CRA timelines</li>
</ul>



<p>If you are starting to design your CRA technical file structure and want to avoid reinventing everything from scratch, you can:</p>



<ol class="wp-block-list">
<li>Download our <a href="https://goregulus.com/resources/cra-checklist/" target="_blank" rel="noreferrer noopener">CRA Readiness Checklist</a> to identify your main gaps.</li>



<li>Review our documentation focused guides in the <a href="https://goregulus.com/resources/" target="_blank" rel="noreferrer noopener">Resources</a> section.</li>



<li>Join the <a href="https://goregulus.com/early-access/">Regulus Early Access program</a> to get priority access to CRA documentation workflows.</li>
</ol>
<p>La entrada <a href="https://goregulus.com/cra-documentation/cra-technical-file-structure/">CRA Technical File Structure: Complete Guide for Cyber Resilience Act Compliance</a> se publicó primero en <a href="https://goregulus.com">Regulus</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CRA Technical Documentation (Annex II &#038; VII): Complete Guide for Manufacturers, Software Teams and IoT Vendors</title>
		<link>https://goregulus.com/cra-documentation/technical-documentation/</link>
		
		<dc:creator><![CDATA[Igor Smith]]></dc:creator>
		<pubDate>Tue, 25 Nov 2025 18:33:11 +0000</pubDate>
				<category><![CDATA[CRA Documentation]]></category>
		<guid isPermaLink="false">https://goregulus.com/?p=504</guid>

					<description><![CDATA[<p>CRA technical documentation is the evidence package regulators can request at any time. Learn what Annex II and Annex VII require, how to structure the technical file, and how to keep it updated across the lifecycle.</p>
<p>La entrada <a href="https://goregulus.com/cra-documentation/technical-documentation/">CRA Technical Documentation (Annex II &#038; VII): Complete Guide for Manufacturers, Software Teams and IoT Vendors</a> se publicó primero en <a href="https://goregulus.com">Regulus</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>The Cyber Resilience Act (CRA) introduces a unified set of cybersecurity requirements that apply to all <strong>Products with Digital Elements (PDE)</strong> placed on the EU market. One of the most demanding obligations for manufacturers, software teams and IoT vendors is the creation and continuous maintenance of <strong>Technical Documentation</strong>.</p>



<p>This guide explains in detail what the CRA requires under <strong>Annex II</strong> (technical documentation for conformity) and <strong>Annex VII</strong> (post-market documentation and vulnerability handling records). Most companies underestimate the scale and depth of this obligation. This document covers everything you must prepare before 2027 to avoid market disruption, non-compliance penalties and product recalls.</p>



<p>For templates and checklists, see our <a href="https://goregulus.com/resources/cra-readiness-checklist/">CRA Readiness Checklist</a>.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">1. What Is CRA Technical Documentation?</h2>



<p>Under the Cyber Resilience Act, <strong>Technical Documentation</strong> is the complete package of evidence, security controls, lifecycle processes and product information required to demonstrate conformity with the Essential Cybersecurity Requirements in <strong>Annex I</strong>. It must:</p>



<ul class="wp-block-list">
<li>Be created <strong>before</strong> placing the product on the market</li>



<li>Be kept updated throughout the lifecycle of the product</li>



<li>Be available to authorities upon request</li>



<li>Include design, implementation, testing, and vulnerability handling evidence</li>



<li>Be sufficient for authorities or notified bodies to assess conformity</li>
</ul>



<p>Failure to produce this documentation can prevent a product from being sold in the EU, even if it meets all technical requirements.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">2. Why CRA Technical Documentation Matters</h2>



<p>The CRA is designed to eliminate inconsistent and insufficient cybersecurity documentation across the EU. Historically, manufacturers submitted uneven evidence, lacked security lifecycle records, or kept undocumented processes. Under CRA, documentation plays three critical roles:</p>



<ul class="wp-block-list">
<li><strong>Demonstrates compliance</strong> with Annex I requirements</li>



<li><strong>Enables audits and investigations</strong> by market surveillance authorities</li>



<li><strong>Supports vulnerability management</strong> and incident reporting</li>
</ul>



<p>Authorities consider documentation to be the foundation of cybersecurity assurance. Inadequate documentation can itself be a violation.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">3. What Documentation Is Required Under Annex II?</h2>



<p>Annex II defines the core <strong>Technical Documentation for conformity assessment</strong>. Manufacturers must produce a complete set of documents describing how the product meets the Essential Cybersecurity Requirements.</p>



<p>The documentation must include:</p>



<h3 class="wp-block-heading">3.1 Product Description and Intended Use</h3>



<ul class="wp-block-list">
<li>Product type, model, version</li>



<li>Intended use cases and operational environment</li>



<li>Connectivity features (wired, wireless, protocols)</li>



<li>Dependencies on cloud services or external systems</li>
</ul>



<h3 class="wp-block-heading">3.2 Architecture and System Design</h3>



<ul class="wp-block-list">
<li>High-level software architecture</li>



<li>Module breakdown</li>



<li>Firmware architecture</li>



<li>Network architecture diagrams</li>



<li>Data flow diagrams (DFDs)</li>



<li>Third-party components and open-source libraries</li>
</ul>



<h3 class="wp-block-heading">3.3 Security Controls and Annex I Requirements Mapping</h3>



<p>Manufacturers must demonstrate how each cybersecurity requirement in Annex I is fulfilled, including:</p>



<ul class="wp-block-list">
<li>Secure boot and integrity mechanisms</li>



<li>Authentication and authorization controls</li>



<li>Protection against injection, memory corruption and exploitation</li>



<li>Network security measures</li>



<li>Security of update mechanisms</li>



<li>Cryptographic functions</li>



<li>Secure storage of sensitive data</li>
</ul>



<p>A full requirements matrix is recommended: See <a href="https://goregulus.com/applicability-classification/cyber-resilience-act-applicability/">CRA Requirements Mapping</a>.</p>



<h3 class="wp-block-heading">3.4 Update and Patch Management Documentation</h3>



<ul class="wp-block-list">
<li>Software update architecture</li>



<li>Firmware update mechanisms</li>



<li>Secure update validation (signing, authenticity, rollback prevention)</li>



<li>Lifecycle support policy (how long updates are guaranteed)</li>
</ul>



<h3 class="wp-block-heading">3.5 Vulnerability Handling Documentation</h3>



<ul class="wp-block-list">
<li>Internal vulnerability intake process</li>



<li>Assessment and prioritization methods</li>



<li>Remediation workflows and timelines</li>



<li>Incident reporting to authorities (within mandated deadlines)</li>
</ul>



<h3 class="wp-block-heading">3.6 Testing and Validation Evidence</h3>



<p>Manufacturers must provide proof of security testing:</p>



<ul class="wp-block-list">
<li>Penetration testing summaries</li>



<li>Static and dynamic code analysis results</li>



<li>Fuzzing results (if applicable)</li>



<li>Third-party testing (if used)</li>
</ul>



<h3 class="wp-block-heading">3.7 SBOM (Software Bill of Materials)</h3>



<p>The SBOM is mandatory for products containing software. It must include:</p>



<ul class="wp-block-list">
<li>Component name, version, supplier</li>



<li>Known vulnerabilities</li>



<li>Licensing information</li>



<li>Dependency relationships</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">4. What Documentation Is Required Under Annex VII?</h2>



<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" width="1024" height="683" src="https://goregulus.com/wp-content/uploads/2025/11/cyber-resilience-act-technical-documentation-1024x683.png" alt="Image of Documentation Required Under Annex VII" class="wp-image-520"/></figure>



<p>Annex VII focuses on <strong>post-market monitoring and vulnerability handling documentation</strong>.</p>



<p>This covers all evidence a manufacturer accumulates after the product is placed on the market, including security updates and incident reporting records.</p>



<h3 class="wp-block-heading">4.1 Post-Market Monitoring Plan</h3>



<ul class="wp-block-list">
<li>Security monitoring strategy</li>



<li>Sources of threat intelligence</li>



<li>Automated monitoring tools and manual processes</li>



<li>How security alerts are prioritized</li>
</ul>



<h3 class="wp-block-heading">4.2 Vulnerability Database / Register</h3>



<ul class="wp-block-list">
<li>List of vulnerabilities discovered post-release</li>



<li>Discovery date, reporting date, remediation date</li>



<li>Impact assessment</li>



<li>Interaction with ENISA or CSIRTs (if required)</li>
</ul>



<h3 class="wp-block-heading">4.3 Incident Reporting Documentation</h3>



<p>For exploited vulnerabilities or severe cybersecurity incidents, manufacturers must keep:</p>



<ul class="wp-block-list">
<li>Incident timeline</li>



<li>Evidence of exploitation</li>



<li>Mitigation actions performed</li>



<li>Notices sent to authorities</li>



<li>User notifications (if applicable)</li>
</ul>



<h3 class="wp-block-heading">4.4 Update &amp; Patch History</h3>



<ul class="wp-block-list">
<li>Version history of firmware/software</li>



<li>Security patches released</li>



<li>Reason for updates</li>



<li>Validation steps performed</li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">5. CRA Technical Documentation Checklist</h2>



<p>This checklist summarizes the full scope:</p>



<ul class="wp-block-list">
<li>Product description and intended use</li>



<li>Architecture diagrams</li>



<li>Security design documents</li>



<li>Annex I requirements mapping</li>



<li>Threat modelling (recommended)</li>



<li>Update and patch management plan</li>



<li>Secure development lifecycle documentation</li>



<li>Vulnerability handling processes</li>



<li>Security testing evidence</li>



<li>SBOM with full dependency mapping</li>



<li>Risk assessment report</li>



<li>Conformity assessment documentation</li>



<li>Post-market monitoring plan (Annex VII)</li>



<li>Incident report logs</li>



<li>Update history and remediation records</li>
</ul>



<p>Download the full templates here: <a href="https://goregulus.com/resources/">Cyber Resilience Act Resources</a></p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">6. Who Must Produce Technical Documentation?</h2>



<p>Technical documentation is required from all <strong>manufacturers</strong> of CRA-regulated products. However, importers and distributors also have obligations:</p>



<h3 class="wp-block-heading">6.1 Manufacturers</h3>



<p>They must create and maintain the full documentation package.</p>



<h3 class="wp-block-heading">6.2 Importers</h3>



<p>Must verify the existence and completeness of the documentation before placing the product on the EU market.</p>



<h3 class="wp-block-heading">6.3 Distributors</h3>



<p>Must ensure no known non-compliance exists and must cooperate with authorities.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">7. The Difference Between Default Class and Critical Class Documentation</h2>



<p>Both classes require full Annex II documentation, but <strong>Critical Class</strong> products require additional scrutiny:</p>



<ul class="wp-block-list">
<li>Stricter conformity assessment</li>



<li>Possible third-party evaluation</li>



<li>More detailed evidence for security controls</li>



<li>Longer retention of post-market documentation</li>
</ul>



<p>Critical Class includes:</p>



<ul class="wp-block-list">
<li>Security products</li>



<li>Routers, gateways, connectivity infrastructure</li>



<li>Industrial systems supporting essential services</li>
</ul>



<p>For classification rules, see: <a href="https://goregulus.com/applicability-classification/cyber-resilience-act-applicability/">CRA Applicability &amp; Classification Guide</a>.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">8. How to Structure Your CRA Documentation (Recommended Template)</h2>



<p>The following structure is commonly used in conformity assessment under other EU frameworks (e.g., RED, MDR, Machinery Regulation). It adapts perfectly to CRA:</p>



<p class="has-medium-font-size" style="font-style:normal;font-weight:500">Part 1 — Product Overview</p>



<p class="has-medium-font-size" style="font-style:normal;font-weight:500">Part 2 — Engineering Documentation</p>



<p class="has-medium-font-size" style="font-style:normal;font-weight:500">Part 3 — Cybersecurity Requirements Mapping</p>



<p class="has-medium-font-size" style="font-style:normal;font-weight:500">Part 4 — Secure Development Lifecycle</p>



<p class="has-medium-font-size" style="font-style:normal;font-weight:500">Part 5 — Testing &amp; Validation Summary</p>



<p class="has-medium-font-size" style="font-style:normal;font-weight:500">Part 6 — Conformity Assessment Evidence</p>



<p class="has-medium-font-size" style="font-style:normal;font-weight:500">Part 7 — Post-Market Monitoring Plan</p>



<p class="has-medium-font-size" style="font-style:normal;font-weight:500">Part 8 — Annexes (SBOM, test logs, vulnerability registers)</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">9. Common Mistakes Companies Make When Preparing Documentation</h2>



<ul class="wp-block-list">
<li>Starting documentation too late</li>



<li>Not mapping Annex I requirements explicitly</li>



<li>No SBOM or incomplete SBOM</li>



<li>Lack of vulnerability handling procedures</li>



<li>No evidence of secure update validation</li>



<li>Overlooking third-party components and supply-chain security</li>



<li>No post-market monitoring strategy</li>



<li>No logging of security testing results</li>
</ul>



<p>These gaps are among the most common causes of non-compliance findings.</p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">10. Should You Automate CRA Technical Documentation?</h2>



<p>Most manufacturers will struggle to maintain documentation manually. Automated CRA documentation tools — such as Regulus — solve three key problems:</p>



<ul class="wp-block-list">
<li>Mapping Annex I requirements correctly</li>



<li>Keeping documentation updated during the lifecycle</li>



<li>Linking vulnerabilities, updates and evidence in one place</li>
</ul>



<p>Try a starter automation here: <a href="https://goregulus.com/applicability-classification/cyber-resilience-act-applicability/"><strong>CRA Applicability Checker</strong></a></p>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">11. External Resources</h2>



<ul class="wp-block-list">
<li><a href="https://ec.europa.eu/commission/presscorner/detail/en/ip_22_5372" target="_blank" rel="noreferrer noopener">European Commission – CRA Announcement</a></li>



<li><a href="https://www.enisa.europa.eu/" target="_blank" rel="noreferrer noopener">ENISA – EU Cybersecurity Agency</a></li>



<li><a href="https://csrc.nist.gov/publications/detail/white-paper/2020/06/08/ssdf/final" target="_blank" rel="noreferrer noopener">NIST Secure Software Development Framework</a></li>
</ul>



<hr class="wp-block-separator has-alpha-channel-opacity"/>



<h2 class="wp-block-heading">Conclusion</h2>



<p>Technical Documentation is one of the most significant obligations introduced by the CRA. It requires continuous security evidence, lifecycle monitoring, vulnerability management and explicit mapping of cybersecurity requirements.</p>



<p>Companies that begin preparing early will be better positioned for compliance, market access and product reliability in the 2025–2027 window.</p>



<p>Explore templates and checklists here: <a href="https://goregulus.com/resources/">Cyber Resilience Act Resources</a></p>



<p>Technical documentation is a core component of Cyber Resilience Act compliance. To see how it fits with scope, SDL, SBOM and deadlines, review our <a href="https://goregulus.com/cra-compliance/cyber-resilience-act-compliance-roadmap/">CRA compliance roadmap</a>.</p>
<p>La entrada <a href="https://goregulus.com/cra-documentation/technical-documentation/">CRA Technical Documentation (Annex II &#038; VII): Complete Guide for Manufacturers, Software Teams and IoT Vendors</a> se publicó primero en <a href="https://goregulus.com">Regulus</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
