This document is under active development and has not been finalised.
Skip to content

6.3 Third-Party Assessment

Assessment of Third-Party Components

Pursuant to Art. 10(4) CRA, the manufacturer must exercise due diligence when integrating third-party components. This page describes the assessment process.

Assessment Framework

Automated Checks (for every dependency)

These checks are performed automatically in the CI/CD pipeline:

CheckToolBlocks Build
Known CVEs (CRITICAL)Trivy / Grype
Known CVEs (HIGH)Trivy / Grype
Prohibited LicensesLicense Compliance
Exposed SecretsGitleaks / GitGuardian

Manual Review (for new critical dependencies)

When introducing new dependencies in security-critical areas, an additional manual assessment is conducted:

CriterionAssessmentWeight
Maintainer ReputationVerified account, known organisationHigh
Project ActivityRegular commits, active issue resolutionHigh
Security ResponseResponse time to reported vulnerabilitiesHigh
Code QualityTests, CI/CD, code reviewsMedium
Dependency DepthTransitive dependencies (fewer = better)Medium
AlternativesAre there more secure alternatives?Medium
AdoptionDownload numbers, user baseLow

Rating Scale

RatingMeaningAction
A – TrustworthyAll criteria met, actively maintainedApproved for use
B – AcceptableMinor limitations, overall trustworthyUse with monitoring
C – At RiskSignificant limitationsUse only with justification + review
D – Not AcceptableCritical limitationsUse prohibited

Special Case: Vendor SDKs (Embedded)

For firmware projects, vendor SDKs (ESP-IDF, STM32 HAL, Zephyr) are assessed separately:

SDKRatingRationale
ESP-IDF (Espressif)AOfficial SDK, actively maintained, SBOM available
STM32 HAL (STMicroelectronics)AOfficial SDK, industry-grade
Zephyr RTOSALinux Foundation project, Security WG active
PlatformIOBCommunity project, widely adopted

Continuous Monitoring

All integrated third-party components are continuously monitored after integration:

  1. Dependabot – Weekly checks for new versions and CVEs
  2. CVE Monitor – Daily SBOM scan against current CVE databases
  3. License Compliance – On every build
  4. Base Image Monitor – Weekly checks for new base image versions

Documentation

For the technical documentation (Annex VII CRA), a list of all third-party components is maintained:

  • The SBOM serves as the machine-readable inventory
  • Manual assessments are stored in the product documentation folder
  • License compliance reports are archived as build artefacts

Documentation licensed under CC BY-NC 4.0 · Code licensed under MIT