Chapter 9: CRA Compliance Matrix
Complete Mapping: CRA Article → Documentation → Tooling
This matrix maps each relevant CRA requirement to the corresponding documentation and implemented tooling. It serves as the central reference for audits and conformity assessments.
STATUS OVERVIEW
| Category | ✅ Implemented | ⚠️ Product-Specific | ❌ Open | Total |
|---|---|---|---|---|
| Art. 10 – Manufacturer Obligations | 8 | 4 | 0 | 12 |
| Art. 13 – Information Obligations | 3 | 1 | 0 | 4 |
| Art. 14 – Reporting Obligations | 1 | 3 | 0 | 4 |
| Art. 16 – Authorised Representative | 1 | 2 | 0 | 3 |
| Art. 28/29 – Conformity & CE | 0 | 2 | 0 | 2 |
| Annex I Part I – Security | 6 | 1 | 0 | 7 |
| Annex I Part II – Vulnerabilities | 8 | 0 | 0 | 8 |
| Annex II – User Information | 4 | 4 | 0 | 8 |
| Annex VII – Technical Documentation | 3 | 4 | 0 | 7 |
| Total | 34 | 21 | 0 | 55 |
Detailed mapping: 9.1 Tooling Map (Tool → CRA Requirement)
Art. 10 – Obligations of Manufacturers
| CRA Reference | Requirement | Documentation | Tooling | Status |
|---|---|---|---|---|
| Art. 10(1) | Appropriate level of cybersecurity in design, development, production | Security Architecture | Security Scans (Trivy, Grype, Snyk), Code Review | ✅ |
| Art. 10(2) | Conduct cybersecurity risk assessment | Risk Assessment | – (manual process + template) | ⚠️ |
| Art. 10(3) | Include risk assessment in documentation | Technical Documentation | Git-versioned | ⚠️ |
| Art. 10(4) | Due diligence for third-party components | Supply Chain | License Compliance, Dependency Scan | ✅ |
| Art. 10(5) | Conduct conformity assessment | Conformity Assessment | – (manual process + template) | ⚠️ |
| Art. 10(6) | Effectively identify vulnerabilities | Vulnerability Management | CVE-Monitor, Dependabot, Trivy | ✅ |
| Art. 10(7) | Provide security updates free of charge | Patch Management | Dependabot, Auto-Merge, Release Pipeline | ✅ |
| Art. 10(8) | No known exploitable vulnerabilities | CVE-Monitoring | CVE-Monitor (daily), Trivy | ✅ |
| Art. 10(9) | Coordinated vulnerability disclosure | Disclosure Policy | SECURITY.md, GitHub Advisories | ✅ |
| Art. 10(10) | Point of contact for vulnerability reports | Disclosure Policy | SECURITY.md in each repository | ✅ |
| Art. 10(12) | Integrity of security updates | SBOM & Signing | Cosign, SHA256 | ✅ |
| Art. 10(13) | Retain documentation for 10 years | Technical Documentation | Git repository (10-year retention) | ✅ |
| Art. 10(16) | Define and publish support period | Support & Lifecycle | SECURITY.md, product page | ⚠️ |
Art. 13 – Information Obligations
| CRA Reference | Requirement | Documentation | Tooling | Status |
|---|---|---|---|---|
| Art. 13(6) | Publish CVD policy | Disclosure Policy | SECURITY.md | ✅ |
| Art. 13(8) | Contact details for vulnerability reports | SECURITY.md | Repository SECURITY.md | ✅ |
| Art. 13(16) | Communicate support period | Support & Lifecycle | – | ⚠️ |
| Art. 13(23) | Produce SBOM (machine-readable) | SBOM & Signing | Trivy/Syft → CycloneDX JSON | ✅ |
Art. 14 – Reporting Obligations
| CRA Reference | Requirement | Documentation | Tooling | Status |
|---|---|---|---|---|
| Art. 14(1) | Early warning for actively exploited vulnerability (24h) | ENISA Reporting Process | ENISA SRP (from 09/2026) | ⚠️ |
| Art. 14(2) | Vulnerability notification (72h) | ENISA Reporting Process | ENISA SRP | ⚠️ |
| Art. 14(3) | Final report (14 days) | ENISA Reporting Process | ENISA SRP | ⚠️ |
| Art. 14(8) | User notification | Communication Plan | GitHub Advisories, E-Mail | ✅ |
Art. 16 – Authorised Representative (EU Authorized Representative)
| CRA Reference | Requirement | Documentation | Tooling | Status |
|---|---|---|---|---|
| Art. 16(1) | Appoint authorised representative by written mandate (non-EU manufacturers) | Roles & Responsibilities | – (contractual process) | ⚠️ |
| Art. 16(2) | Keep conformity documentation available for 10 years | Roles & Responsibilities | Git repository (10-year retention) | ✅ |
| Art. 16(2) | Cooperation with market surveillance authorities | Roles & Responsibilities | – | ⚠️ |
Art. 28 – Declaration of Conformity & CE
| CRA Reference | Requirement | Documentation | Tooling | Status |
|---|---|---|---|---|
| Art. 28, Annex V | Issue EU declaration of conformity | EU DoC | Template | ⚠️ |
| Art. 29 | Affix CE marking | EU DoC | – | ⚠️ |
Annex I, Part I – Security Requirements
| No. | Requirement | Documentation | Tooling | Status |
|---|---|---|---|---|
| 1 | Appropriate level of cybersecurity | Security Architecture | Multi-Engine Security Scanning | ✅ |
| 2 | No known exploitable vulnerabilities | CVE-Monitoring | CVE-Monitor, Trivy, Dependabot | ✅ |
| 3.1 | Confidentiality protection (data) | Security Architecture | TLS, AES-256 | ✅ |
| 3.2 | Integrity protection (data) | SBOM & Signing | Cosign, SHA256 | ✅ |
| 3.3 | Availability protection | Security Architecture | Product-specific | ⚠️ |
| 4 | Secure default configuration | Security Architecture | Security-by-Default | ✅ |
| 5 | Protection against unauthorised access | Security Architecture | Auth/Authz | ✅ |
| 6 | Minimal attack surface | Security Architecture | Alpine/Distroless, min. services | ✅ |
Annex I, Part II – Vulnerability Handling
| No. | Requirement | Documentation | Tooling | Status |
|---|---|---|---|---|
| 1 | Identify and document vulnerabilities (SBOM) | SBOM & Signing | Trivy/Syft, CycloneDX | ✅ |
| 2 | Remediate vulnerabilities without undue delay | Patch Management | Dependabot, CI/CD | ✅ |
| 3 | Regular testing and reviews | Security Architecture | CI/CD Security Scans | ✅ |
| 4 | Disclosure of remediated vulnerabilities | Disclosure Policy | GitHub Security Advisories | ✅ |
| 5 | Coordinated vulnerability disclosure | Disclosure Policy | SECURITY.md, CVD process | ✅ |
| 6 | Provide security updates | Update Mechanism | Release Pipeline, OTA | ✅ |
| 7 | Provision without undue delay | Patch Management | SLA-based (P0-P4) | ✅ |
| 8 | Designate point of contact | SECURITY.md | SECURITY.md, CVD Policy | ✅ |
Annex II – User Information
| No. | Requirement | Documentation | Status |
|---|---|---|---|
| 1 | Manufacturer name and contact | Product page, SECURITY.md | ✅ |
| 2 | Product identification | Release Notes, Repository | ✅ |
| 3 | Intended use | Product Description | ⚠️ |
| 4 | Security-relevant properties | User Information Template | ⚠️ |
| 5 | Support period | Support & Lifecycle | ⚠️ |
| 6 | Installation instructions | README, product documentation | ⚠️ |
| 7 | Contact for vulnerability reports | SECURITY.md | ✅ |
| 8 | Changelog of significant changes | Changelog, Release Notes | ✅ |
Annex VII – Technical Documentation
| No. | Requirement | Documentation | Status |
|---|---|---|---|
| 1 | General product description | Product Description | ⚠️ |
| 2 | Security risk assessment | Risk Assessment | ⚠️ |
| 3 | Architecture and design | Security Architecture | ✅ |
| 4 | Vulnerability handling procedures | Vulnerability Management | ✅ |
| 5 | Applied standards | Compliance Matrix | ✅ |
| 6 | Conformity assessment | Conformity Assessment | ⚠️ |
| 7 | EU declaration of conformity | EU DoC | ⚠️ |
Legend
| Symbol | Meaning |
|---|---|
| ✅ | Implemented and documented |
| ⚠️ | Documentation available, product-specific implementation required |
| ❌ | Not yet implemented |