This document is under active development and has not been finalised.
Skip to content

Annex VII – Technical Documentation Guide

Overview

Annex VII of the CRA defines the complete content of the technical documentation that every manufacturer must create and retain for 10 years. This guide explains each requirement in detail and references the respective documentation location.

LEGAL BASIS

Art. 31 CRA: The technical documentation shall be drawn up before the product is placed on the market and shall be kept up to date on a continuous basis.

Annex VII CRA: Content of the technical documentation.

Requirement 1 – General Product Description

Annex VII No. 1: A general description of the product with digital elements, including:

ElementDescriptionDocumentation Location
Intended UsePurpose, target audience, usage scenariosProduct Description
VersionsAffected software/firmware versionsRelease Notes, SBOM
Hardware RequirementsIf applicable: hardware requirementsProduct Description
Basic CharacteristicsFunctional scope, core functionsProduct Description

Implementation: One document per product following the Product Description Template.


Requirement 2 – Design and Development Description

Annex VII No. 2: Description of the design and development processes, including:

ElementDescriptionDocumentation Location
Security ArchitectureOverview of security measuresSecurity Architecture
Data ProcessingWhat data is processed, data flowsSecurity Architecture
Threat ModelIdentified threats and countermeasuresRisk Assessment
Design DecisionsSecurity-relevant architectural decisionsSecurity Architecture

Requirement 3 – Cybersecurity Risk Assessment

Annex VII No. 3: The cybersecurity risk assessment pursuant to Art. 10(2), including:

ElementDescriptionDocumentation Location
MethodologyApplied risk assessment methodRisk Assessment Template
Identified RisksList of cybersecurity risksRisk Assessment
EvaluationLikelihood x ImpactRisk Assessment
MeasuresRisk mitigation measuresRisk Assessment
Residual RisksAccepted residual risks with justificationRisk Assessment

Requirement 4 – Vulnerability Handling

Annex VII No. 4: Description of vulnerability handling processes:

ElementDescriptionDocumentation Location
MonitoringHow vulnerabilities are identifiedCVE Monitoring
AssessmentHow vulnerabilities are assessedRisk Assessment
RemediationHow vulnerabilities are remediatedPatch Management
DisclosureHow vulnerabilities are disclosedDisclosure Policy
SBOMMachine-readable SBOMSBOM & Signing

Requirement 5 – Applied Standards and Specifications

Annex VII No. 5: List of applied harmonised standards, Common Specifications or cybersecurity certification schemes:

StandardScopeStatus
ISO/IEC 27001Information Security Management SystemReference
ISO/IEC 29147Vulnerability DisclosureApplied
ISO/IEC 30111Vulnerability HandlingApplied
CycloneDX v1.6SBOM FormatApplied
Sigstore/CosignArtifact SigningApplied
OWASP ASVSApplication Security VerificationReference
IEC 62443Industrial CybersecurityIf industrial products

Note: Harmonised standards specific to the CRA are under development. This list will be updated once they are published.

HARMONISED STANDARDS

Once harmonised standards for the CRA are published, these will enable the presumption of conformity. The application of harmonised standards is particularly critical for Class I with Module A.


Requirement 6 – Test Results

Annex VII No. 6: Results of the tests and examinations performed:

Test TypeDescriptionTooling
Static Analysis (SAST)Source code analysis for vulnerabilitiesSonarQube, Semgrep
Dynamic Analysis (DAST)Runtime testing for vulnerabilitiesOWASP ZAP, Burp
Dependency ScanningVerification of dependenciesTrivy, Grype, Snyk
Container ScanningVerification of container imagesTrivy
Secret ScanningSearch for secrets in codeGitleaks, GitGuardian
Penetration TestingManual security testingExternal (for Class I+)
FuzzingRobustness testingAFL, libFuzzer

Retention: Test results are archived as CI/CD artifacts and are accessible via the repository.


Requirement 7 – Conformity Assessment Results

Annex VII No. 7: Results of the conformity assessment:

ProcedureDocumentationDocumentation Location
Module ASelf-assessment reportInternal Control
Module B+CEU type-examination certificateModule B+C
Module HQMS certificateModule H
EUCCCybersecurity certificateEUCC

Requirement 8 – EU Declaration of Conformity

Annex VII No. 8: Copy of the EU Declaration of Conformity:

EU Declaration of ConformityTemplate


Requirement 9 – Support Period

Annex VII No. 9: Determination of the Support Period:

Support & Lifecycle


Completeness Checklist

  • [ ] No. 1: Product description created
  • [ ] No. 2: Design and development processes documented
  • [ ] No. 3: Cybersecurity risk assessment performed
  • [ ] No. 4: Vulnerability handling documented
  • [ ] No. 4: SBOM generated and archived
  • [ ] No. 5: Applied Standards listed
  • [ ] No. 6: Test Results documented and archived
  • [ ] No. 7: Conformity Assessment Results documented
  • [ ] No. 8: EU Declaration of Conformity created
  • [ ] No. 9: Support Period determined
  • [ ] All documents archived (10-year retention)
  • [ ] All documents versioned (Git)

Documentation licensed under CC BY-NC 4.0 · Code licensed under MIT