1. 📋 Product Identification
CRA Annex V § 1 compliance. Each project documented with: product name, version tag, repository URL, security contact (security@hack23.org), purpose statement, market category (non-commercial OSS), CIA classification (Confidentiality, Integrity, Availability levels), RTO/RPO metrics.
Classification drives security investment. CIA framework extends traditional CIA Triad with business continuity metrics.
2. 🏗️ Technical Documentation
CRA Annex V § 2 requirements. Architecture documentation, complete SBOM (SPDX + CycloneDX), cybersecurity controls (Access Control + Cryptography policies), supply chain security (SLSA 3 provenance), secure update mechanisms, security monitoring, data protection (Data Classification Policy), vulnerability disclosure (SECURITY.md).
Documentation linked to ISMS policies. Systematic integration, not ad-hoc paperwork.
3. ⚠️ Risk Assessment
CRA Annex V § 3 documentation. Five risk categories analyzed: supply chain attacks (SBOM + SLSA), unauthorized access (MFA + secret scanning), data breaches (encryption + IAM), component vulnerabilities (SCA scanning + patch management), service disruption (WAF + DDoS protection). Each risk quantified with likelihood, impact (C/I/A), controls, residual risk. Links to Risk Assessment Methodology and Risk Register.
Risk quantification based on measurable business impact, not paranoid guesswork.
4. ✅ Essential Requirements
CRA Annex I self-assessment. Eight essential requirements documented: Secure by Design (minimal attack surface via SECURITY_ARCHITECTURE.md), Secure by Default (hardened configurations), Personal Data Protection (GDPR compliance via Data Classification), Vulnerability Disclosure (public VDP via SECURITY.md), SBOM (automated generation in releases), Secure Updates (signed with attestations), Security Monitoring (comprehensive logging via Incident Response Plan), Security Documentation (USER_SECURITY_GUIDE.md).
Requirements mapped to ISMS policies. Systematic compliance, not checkbox theater.
5. 🎖️ Conformity Evidence
CRA Article 19 documentation. SLSA 3 attestations (supply chain provenance), OpenSSF Scorecard 7.2+ (security best practices), CII Best Practices badges, SonarCloud quality gates (code quality), FOSSA license compliance, test coverage ≥80% line/≥70% branch, zero critical vulnerabilities (SAST + SCA + secret scanning), public GitHub attestations for verification.
Evidence cryptographically verifiable. Trust through transparency, not marketing claims.