Every requirement an EU manufacturer must satisfy for third-party open-source components — mapped to the regulation text, with the specific evidence auditors will expect.
Based on Regulation (EU) 2024/2847 — Articles 13, 31, Recital 34, Annex I, and Annex VII.
Who is this for? Any manufacturer placing a product with digital elements on the EU market that integrates third-party components — including open-source software. The CRA applies regardless of where the manufacturer is located.
CRA Recital 34 doesn't leave "due diligence" as an abstract concept. It enumerates four specific actions manufacturers must take for every third-party component they integrate. Articles 13(7) and Annex VII add documentation and retention requirements.
Below is the complete checklist. For each obligation we show: what the regulation says, what evidence satisfies it, and what a typical scanner does not cover.
Progress is saved in your browser. This checklist is for self-assessment only.
Recital 34 specifies four actions that constitute due diligence when integrating third-party components. Each must be performed per component.
Recital 34: "Verifying, as applicable, that the manufacturer of a component has demonstrated conformity with this Regulation"
Scanner gap: Scanners may identify the license type but do not assess conformity status, license compatibility risks, or produce a documented finding an auditor can review.
Recital 34: "Verifying that a component receives regular security updates"
Scanner gap: Standard vulnerability scanners check for known CVEs at a point in time. They do not assess longitudinal maintenance health, bus factor, release cadence, or responsiveness — all of which Recital 34 explicitly requires.
Recital 34: "Verifying that a component is free from vulnerabilities registered in the European vulnerability database"
Scanner gap: Scanners identify known CVEs but typically do not perform reachability analysis or historical trend assessment. An auditor will ask "is this vulnerability actually exploitable in your product?" — a scanner cannot answer that.
Recital 34: "Carrying out additional security tests"
The depth of additional testing should be proportionate to the component's role. Components in security-critical paths (crypto, networking, authentication) warrant deeper analysis.
Scanner gap: Standard scanners perform CVE matching only. They do not run credential scanning, verify binary hardening, run SAST on third-party source, analyze for supply chain compromise, audit CI workflows, or assess transitive dependency risk. This is the area where the gap between "scanning" and "due diligence" is widest.
Due diligence must not only be performed — it must be documented in a format suitable for regulatory review.
Article 13(7): "Manufacturers shall systematically document, in a manner that is proportionate to the nature and the cybersecurity risks, relevant cybersecurity aspects"
Annex I Part II(1), Annex VII, Article 13(13)
Due diligence is not a one-time event. Manufacturers must maintain vulnerability handling throughout the product support period.
| CRA Requirement | Vulnerability Scanner | Expert Due Diligence Report |
|---|---|---|
| Component identity & conformity status | Partial | Full |
| Maintenance health & update cadence | No | Full |
| Known vulnerability identification | Yes | Yes |
| Vulnerability reachability analysis | No | Yes |
| Binary hardening verification | No | Yes |
| Supply chain compromise detection | No | Yes |
| CRA Annex I regulatory mapping | No | Yes |
| Expert-signed assertion | No | Yes |
| Audit-ready documentation with traceability | No | Yes |
We perform every item on this checklist for each component in your stack — and deliver audit-ready reports with expert-signed assertions mapped to CRA Annex I.