Does the EU Cyber Resilience Act (CRA) Apply to Your Product?
- No email required
- Instant results
- Export your report
The CRA Deadline is Approaching. Are You Ready?
Know Your Timeline
Understand when compliance requirements take effect for your product category
Understand Req.
Get clear guidance on security by design, vulnerability handling, and documentation
Avoid Penalties
Get clear guidance on security by design, vulnerability handling, and documentation
Find Out in 3 Simple Steps
Answer Questions
See Your Results
–right on screen
Built for Teams Navigating CRA Compliance
Product Managers
Make Informed Decisions
- Do we need CE marking?
- Will this delay our launch?
- What documentation is required?
Compliance Officers
Get Clarity Fast
- What are our obligations?
- Which standards apply?
- Who is the responsible party?
IoT Developers
Built by Practitioners
- Will my architecture comply?
- “What security features are needed?
- How does this affect our tech stack?
The Independent CRA Assessment Tool
No Registration
Built by Experts
Research-Backed
Instant Results
Here's What You'll Learn
Your ScopeCheck Results
Class I Important Product
Your product is classified as a Class I "important product" under the CRA. This category covers 19 types of products including identity management systems, web browsers, password managers, VPN products, routers, operating systems, smart home devices, and more.
You have heightened obligations and can choose between self-assessment with harmonized standards or third-party assessment.
Key Deadlines
Vulnerability Reporting
Manufacturers must report actively exploited vulnerabilities and severe incidents to ENISA
Full Compliance
All CRA requirements become mandatory for products placed on the market
Your Obligations as Manufacturer
- Conduct comprehensive cybersecurity risk assessment
- Design products with security by default and by design
- Implement vulnerability handling process
- Provide security updates for at least 5 years (or product lifetime)
- Report actively exploited vulnerabilities to ENISA within 24 hours
- Create and maintain detailed technical documentation
- Conformity assessment: Self-assessment IF applying harmonized standards, otherwise third-party assessment required
- Affix CE marking
- Provide Software Bill of Materials (SBOM)
- Coordinate disclosure with vulnerability reporters
Plus detailed guidance on:
- Applicable harmonized standards
- Documentation requirements
- Conformity assessment procedures
- Market surveillance rules
Need Help Achieving Compliance?
Get Your CRA GAP Analysis
Automate CRA Security Testing
Frequently Asked Questions (FAQ)
Is this really free? What's the catch?
How accurate is this assessment?
Do you collect or store my product information?
What if my product is borderline--could go either way?
Does this cover the EU AI Act or other regulations?
Can I use this for multiple products?
What happens after I complete the assessment?
Ready to Understand Your CRA Obligations?
Co-funded by the European Union
The project funded under Grant Agreement No. 101158539 is supported by the European Cybersecurity Competence Centre.
The views and opinions expressed are, however, those of the author(s) only and do not necessarily reflect those of the European Union or the European Cybersecurity Competence Centre. Neither the European Union nor the granting authority can be held responsible for them.
SevenShift develops Bunkai and ScopeCheck as part of the CRACoWi project