Documents Checklist
This guide explains what documents you need for CRA compliance, which CRA articles require them, and how to upload them to CRA Evidence.
Overview
CRA compliance requires more than an SBOM. You also need documentation covering:
- How you designed for security (risk assessment)
- Your formal compliance declaration (EU DoC)
- How users should operate your product securely (user manual)
- How you handle vulnerability reports (disclosure policy)
Required Documents Summary
| Document | CRA Reference | Required For | Status in CRA Evidence |
|---|---|---|---|
| Risk Assessment | Art. 13(2), Annex VII.3 | All products | Required |
| EU Declaration of Conformity | Art. 28, Annex VII.5 | All products | Required |
| User Manual | Annex II, Annex VII.9 | All products | Required |
| Vulnerability Disclosure Policy | Art. 13(8), Annex VII.4 | All products | Required |
| Technical Documentation | Annex VII.2 | All products | Recommended |
| Test Reports | Annex VII.7 | Self-assessment | Recommended |
| Third-Party Audit | Art. 32-34 | Class II/Critical | If applicable |
Required Documents (All Products)
Risk Assessment
CRA Reference: Article 13(2), Annex VII point 3
What It Is: A document describing the cybersecurity risk assessment you performed during design and development.
What CRA Says:
"Manufacturers shall undertake an assessment of the cybersecurity risks associated with a product with digital elements and take the outcome of that assessment into account during the planning, design, development, production, delivery and maintenance phases."
What to Include:
- Threat model (what attacks are possible?)
- Risk identification (what could go wrong?)
- Risk evaluation (how severe? how likely?)
- Mitigation measures (what did you do about it?)
- Residual risks (what remains acceptable?)
Format: PDF recommended, any document format accepted
Upload in CRA Evidence: Document type: risk_assessment
EU Declaration of Conformity
CRA Reference: Article 28, Annex V, Annex VII point 5
What It Is: A formal declaration that your product meets CRA requirements.
What CRA Says:
"The EU declaration of conformity shall state that compliance with the essential cybersecurity requirements set out in Part I of Annex I has been demonstrated."
What to Include (per Annex V):
- Product name and type, plus any additional information
- Manufacturer name and address
- Statement that the declaration is issued under sole responsibility of the manufacturer
- Object of the declaration (product identification)
- Reference to harmonised standards or other specifications
- Where applicable, notified body details
- Additional information (CE marking date, etc.)
- Signature
Template Structure:
EU DECLARATION OF CONFORMITY
1. Product: [Name], [Model], [Version]
2. Manufacturer: [Legal Name]
Address: [Full Address]
3. This declaration of conformity is issued under the sole
responsibility of the manufacturer.
4. Object of the declaration: [Product description]
5. The object of the declaration described above is in conformity
with the relevant Union harmonisation legislation:
- Regulation (EU) 2024/2847 (Cyber Resilience Act)
6. References to the relevant harmonised standards used:
- [List standards, e.g., EN ISO/IEC 27001:2022]
7. [Notified body info if applicable]
8. Additional information:
- CE marking affixed: [Date]
- Support period: [End date]
Signed for and on behalf of:
[Name, Title]
[Place and Date]
[Signature]
Upload in CRA Evidence: Document type: eu_declaration_of_conformity
User Manual
CRA Reference: Annex II, Annex VII point 9
What It Is: Instructions for users on how to install, configure, and operate your product securely.
What CRA Says (Annex II):
"Products with digital elements shall be accompanied by instructions and information... including as a minimum: (a) name, registered trade name... of the manufacturer; (b) single point of contact; (c) a description of the product... (d) when security support will end; (e) instructions for the secure installation, operation and maintenance..."
What to Include:
- Product identification
- Manufacturer contact information
- Security support end date
- Secure installation instructions
- Secure configuration guidance
- Secure operation guidelines
- Update/patching instructions
- Secure decommissioning guidance
Minimum Security Topics:
- Default passwords (should be none, or forced change)
- Network security configuration
- Data protection settings
- Logging and monitoring setup
- Backup and recovery
Upload in CRA Evidence: Document type: user_manual
Vulnerability Disclosure Policy
CRA Reference: Article 13(8), Annex VII point 4, Annex I Part II
What It Is: Your policy describing how external parties can report vulnerabilities and how you handle them.
What CRA Says:
"Manufacturers shall have in place appropriate policies and procedures, including coordinated vulnerability disclosure policies, for processing and remediating potential vulnerabilities in the product with digital elements reported from internal or external sources."
What to Include:
- How to report (email, web form, etc.)
- What information to provide
- Response timeline commitments
- Coordination process
- Disclosure timeline
- Recognition/credits policy
- Legal safe harbor (recommended)
Template Structure:
VULNERABILITY DISCLOSURE POLICY
1. INTRODUCTION
[Company] welcomes reports of security vulnerabilities in [Product].
2. SCOPE
This policy covers: [list products/versions]
3. HOW TO REPORT
Email: security@company.com
Include: Description, steps to reproduce, impact assessment
4. WHAT WE COMMIT TO
- Acknowledge receipt within [X] business days
- Provide status update within [Y] days
- Work with you on coordinated disclosure
5. SAFE HARBOR
We will not take legal action against researchers who:
- Report vulnerabilities in good faith
- Do not access user data
- Do not disrupt services
6. RECOGNITION
We credit researchers in our security advisories.
7. RESPONSE TIMELINE
- Critical: [X] days to patch
- High: [Y] days to patch
- Medium: [Z] days to patch
Upload in CRA Evidence: Document type: vulnerability_policy
Recommended Documents
Technical Documentation
CRA Reference: Annex VII point 2
What It Is: Description of the design and development of your product.
What to Include:
- Architecture overview
- Security design decisions
- Component interactions
- Data flow diagrams
- Authentication/authorization design
- Cryptographic implementations
Upload in CRA Evidence: Document type: technical_documentation
Test Reports
CRA Reference: Annex VII point 7
What It Is: Summary of testing performed to validate security requirements.
What to Include:
- Test scope and methodology
- Security test results
- Penetration test findings (if performed)
- Compliance test results
- Remediation of findings
Upload in CRA Evidence: Document type: test_report
Category-Specific Requirements
Important Class I Products
If you're applying harmonised standards for self-assessment:
| Additional Document | Description |
|---|---|
| Standards Mapping | How your product meets each standard |
| Conformity Evidence | Test results against standard requirements |
Important Class II and Critical Products
Third-party assessment required:
| Additional Document | CRA Reference | Description |
|---|---|---|
| Third-Party Audit Report | Art. 32-34 | Assessment by notified body |
| Conformity Certificate | Art. 34 | Certificate from notified body |
Upload in CRA Evidence: Document types: third_party_audit, conformity_certificate
How to Upload Documents
Via Web Interface
- Navigate to your Product > Version
- Click the Documents tab
- Click Upload Document
- Select the document type from the dropdown
- Add a description (optional but recommended)
- Choose your file
- Click Upload
Via CLI
Use the upload-document CLI command:
craevidence upload-document \
--product my-product \
--version 1.2.3 \
--type risk_assessment \
--file risk-assessment.pdf
Via API (CI endpoint)
curl -X POST "https://app.craevidence.com/api/v1/ci/upload" \
-H "Authorization: Bearer $API_TOKEN" \
-F "file=@risk-assessment.pdf" \
-F "product=my-product" \
-F "version=1.2.3" \
-F "artifact_type=document" \
-F "document_type=risk_assessment"
Document Requirements by CRA Article
Complete Mapping
| CRA Article | Requirement | Document Type |
|---|---|---|
| Art. 13(1) | Compliance with Annex I | Technical documentation |
| Art. 13(2) | Risk assessment | risk_assessment |
| Art. 13(3) | Component due diligence | SBOM (handled separately) |
| Art. 13(5) | Support period | Included in version metadata |
| Art. 13(6) | Vulnerability identification | Vulnerability tracking (CRA Evidence feature) |
| Art. 13(7) | Effective corrections | Remediation workflow (CRA Evidence feature) |
| Art. 13(8) | Disclosure policy | vulnerability_policy |
| Art. 13(10) | SBOM | SBOM (handled separately) |
| Art. 13(12) | Conformity assessment | eu_declaration_of_conformity |
| Art. 13(14) | Documentation retention | All documents (10-year storage) |
| Art. 28 | EU Declaration | eu_declaration_of_conformity |
| Annex II | User information | user_manual |
| Annex VII.2 | Design documentation | technical_documentation |
| Annex VII.3 | Risk assessment | risk_assessment |
| Annex VII.4 | Vulnerability handling | vulnerability_policy |
| Annex VII.5 | EU Declaration | eu_declaration_of_conformity |
| Annex VII.7 | Test reports | test_report |
| Annex VII.9 | User instructions | user_manual |
Achieving "CRA Ready" Status
CRA Evidence calculates readiness status based on:
For "Ready" Status, You Need:
- [ ] At least one SBOM uploaded
- [ ] Risk Assessment document
- [ ] EU Declaration of Conformity
- [ ] User Manual
- [ ] Vulnerability Disclosure Policy
Status Meanings
| Status | What It Means |
|---|---|
| Incomplete | Missing SBOM or one or more required documents |
| Ready | All required documents present |
Note: "Ready" status means CRA Evidence has the artifacts it needs. Actual compliance also depends on the content of these documents being accurate and complete.
Best Practices
- Review annually: Update risk assessments and policies as threats evolve; outdated documentation is a compliance risk.
- Be specific: Generic templates don't demonstrate compliance — documents must clearly relate to your actual product.
- Use consistent naming:
[Product]-[Type]-[Date].pdfmakes audit retrieval straightforward.
Common Questions
Can I use one risk assessment for multiple versions?
Yes, if the security design hasn't changed significantly. However, you should:
- Review and date-stamp for each release
- Note any version-specific considerations
- Update when there are material changes
What format should documents be?
PDF is recommended for formal documents (EU DoC, policies). CRA Evidence accepts:
- Microsoft Office formats (docx, xlsx)
- Plain text/Markdown
- Images (for diagrams)
How long must I keep documents?
CRA Article 13(14) requires keeping technical documentation for:
- 10 years after the product is placed on market, OR
- The support period, whichever is longer
CRA Evidence is designed for long-term storage.
What if my product doesn't have a user manual?
All products need instructions for secure use. Even if your product is "self-explanatory":
- Document secure configuration
- Explain security features
- Describe update procedures
- Provide contact information
Next Steps
After uploading your documents:
- Vulnerability Workflow - Understand vulnerability handling
- Technical File Export - Generate your compliance bundle
Document Type Reference
| Document Type (API) | Display Name | Required |
|---|---|---|
risk_assessment |
Risk Assessment | Yes |
eu_declaration_of_conformity |
EU Declaration of Conformity | Yes |
user_manual |
User Manual | Yes |
vulnerability_policy |
Vulnerability Disclosure Policy | Yes |
technical_documentation |
Technical Documentation | No |
test_report |
Test Report | No |
third_party_audit |
Third-Party Audit | Class II/Critical |
conformity_certificate |
Conformity Certificate | Class II/Critical |
security_advisory |
Security Advisory | No |
architecture_diagram |
Architecture Diagram | No |
other |
Other | No |
Help us improve. What was missing or unclear?