The CRA materials give a non-exhaustive set of examples. Depending on the component and the level of risk, due diligence can include:
- checking whether the component already bears the CE marking
- checking whether the component manufacturer has demonstrated conformity with the CRA
- verifying that the component receives regular security updates, for example by checking its update history
- checking the European vulnerability database or other publicly accessible vulnerability databases for applicable vulnerabilities
- carrying out additional security testing
- performing software composition analysis
- reviewing the component's SBOM when available
- checking the component's support period
- verifying that the component's intended purpose fits the integrating manufacturer's use
- assessing the security posture of the component manufacturer