This document is under active development and has not been finalised.
Skip to content

Chapter 6: Supply Chain Security

6.1 Overview

Securing the software supply chain is a core CRA requirement. Manufacturers must exercise due diligence when integrating third-party components and ensure the integrity of the entire supply chain.

LEGAL BASIS

Art. 10(4) CRA: "The manufacturer shall exercise due diligence when integrating components sourced from third parties, to ensure that those components do not compromise the security of the product."

Annex I, Part II, No. 1: "The manufacturer shall identify and document the vulnerabilities and components contained in the product, including by drawing up a software bill of materials."

6.2 Security Measures

Implemented Measures

MeasureToolWorkflowStatus
Dependency Vulnerability ScanningTrivy, Grype, Snykmodules-security-scan.yml
Automated Dependency UpdatesDependabotdocker-maintenance-dependabot.yml
License ComplianceFOSSA / Custommodules-license-compliance.yml
Secret ScanningGitleaks, GitGuardianmodules-security-scan.yml
Docker Base Image MonitoringCustom Workflowmodules-docker-base-image-monitor.yml
Container Image SigningCosigndocker-build.yml
SBOM GenerationTrivy / Syftmodules-license-compliance.yml

6.3 Chapter Structure

SectionTopicDescription
6.1Dependency PolicyPolicies for dependencies
6.2Base Image PolicyDocker base image management
6.3Third-Party AssessmentAssessment of third-party components
6.4Economic Operator Identification (Art. 21)Supply chain traceability

Documentation licensed under CC BY-NC 4.0 · Code licensed under MIT