EU Parliament Monitor โ€” API Documentation - v0.8.4
    Preparing search index...

    Hack23 Logo

    ๐Ÿ›ก๏ธ EU Parliament Monitor โ€” CRA Conformity Assessment

    Evidence-Driven Conformity Through Systematic Assessment
    Demonstrating CRA Compliance for European Parliament Intelligence Platform

    Owner Version Effective Date Review Cycle

    ๐Ÿ“‹ Document Owner: CEO | ๐Ÿ“„ Version: 2.0 | ๐Ÿ“… Last Updated: 2026-03-19 (UTC)
    ๐Ÿ”„ Review Cycle: Quarterly | โฐ Next Review: 2026-06-19
    ๐Ÿ›๏ธ Process Reference: CRA Conformity Assessment Process


    Document Focus Description Documentation Link
    Architecture ๐Ÿ›๏ธ Architecture C4 model showing current system structure View Source
    Future Architecture ๐Ÿ›๏ธ Architecture C4 model showing future system structure View Source
    Mindmaps ๐Ÿง  Concept Current system component relationships View Source
    Future Mindmaps ๐Ÿง  Concept Future capability evolution View Source
    SWOT Analysis ๐Ÿ’ผ Business Current strategic assessment View Source
    Future SWOT Analysis ๐Ÿ’ผ Business Future strategic opportunities View Source
    Data Model ๐Ÿ“Š Data Current data structures and relationships View Source
    Future Data Model ๐Ÿ“Š Data Enhanced European Parliament data architecture View Source
    Flowcharts ๐Ÿ”„ Process Current data processing workflows View Source
    Future Flowcharts ๐Ÿ”„ Process Enhanced AI-driven workflows View Source
    State Diagrams ๐Ÿ”„ Behavior Current system state transitions View Source
    Future State Diagrams ๐Ÿ”„ Behavior Enhanced adaptive state transitions View Source
    Security Architecture ๐Ÿ›ก๏ธ Security Current security implementation View Source
    Future Security Architecture ๐Ÿ›ก๏ธ Security Security enhancement roadmap View Source
    Threat Model ๐ŸŽฏ Security STRIDE threat analysis View Source
    Classification ๐Ÿท๏ธ Governance CIA classification & BCP View Source
    CRA Assessment ๐Ÿ›ก๏ธ Compliance Cyber Resilience Act View Source
    Workflows โš™๏ธ DevOps CI/CD documentation View Source
    Future Workflows ๐Ÿš€ DevOps Planned CI/CD enhancements View Source
    Business Continuity Plan ๐Ÿ”„ Resilience Recovery planning View Source
    Financial Security Plan ๐Ÿ’ฐ Financial Cost & security analysis View Source
    End-of-Life Strategy ๐Ÿ“ฆ Lifecycle Technology EOL planning View Source
    Unit Test Plan ๐Ÿงช Testing Unit testing strategy View Source
    E2E Test Plan ๐Ÿ” Testing End-to-end testing View Source
    Performance Testing โšก Performance Performance benchmarks View Source
    Security Policy ๐Ÿ”’ Security Vulnerability reporting & security policy View Source

    Hack23 AB's CRA conformity assessment process demonstrates how systematic regulatory compliance directly enables transparency and trust in open-source European Parliament monitoring. This assessment covers the EU Parliament Monitor's compliance with the EU Cyber Resilience Act (CRA) requirements.

    As a static site generating multi-language news articles from European Parliament open data, EU Parliament Monitor has a minimal attack surface while maintaining comprehensive security practices aligned with the CRA framework. This assessment follows the Hack23 AB CRA Conformity Assessment Process and the Open Source Policy requirements.

    โ€” James Pether Sรถrling, CEO/Founder


    ๐Ÿ“‹ Attribute ๐Ÿ“Š Value
    Product Name EU Parliament Monitor
    Version 0.5.1
    Repository github.com/Hack23/euparliamentmonitor
    Homepage euparliamentmonitor.com
    Security Contact security@hack23.com
    License Apache-2.0
    Purpose Multi-language European Parliament transparency platform โ€” automated static site generating news articles in 14 languages from EU Parliament open data
    Technology Stack Node.js 25, TypeScript, HTML5/CSS3, GitHub Actions, GitHub Pages
    Deployment Model Static site served via GitHub Pages CDN
    Data Sources European Parliament MCP Server (public open data)
    ๐Ÿ“‚ Evidence Area ๐Ÿ“„ Document ๐Ÿ”— Link
    System Architecture ARCHITECTURE.md View
    Security Architecture SECURITY_ARCHITECTURE.md View
    Future Security Architecture FUTURE_SECURITY_ARCHITECTURE.md View
    Threat Model (STRIDE) THREAT_MODEL.md View
    Security Policy SECURITY.md View
    Classification & BCP CLASSIFICATION.md View
    Data Model DATA_MODEL.md View
    System Mindmap MINDMAP.md View
    Workflow Documentation WORKFLOWS.md View
    Business Continuity BCPPlan.md View
    Financial Security Plan FinancialSecurityPlan.md View
    End-of-Life Strategy End-of-Life-Strategy.md View
    Unit Test Plan UnitTestPlan.md View
    E2E Test Plan E2ETestPlan.md View
    Performance Testing performance-testing.md View
    SBOM & Provenance GitHub Release Artifacts View
    OpenSSF Scorecard Scorecard Results View
    CodeQL Results GitHub Code Scanning View
    Dependency Alerts Dependabot Alerts View

    CRA Applicability Distribution Classification

    ๐Ÿ“‹ Attribute ๐Ÿ“Š Assessment
    Product Name EU Parliament Monitor
    Product Type Open-source static website generator
    CRA Category Standard โ€” Default (non-critical digital product)
    Digital Elements HTML5, CSS3 (static generation via Node.js/TypeScript)
    Network Connectivity Build-time only: read-only access to European Parliament open data APIs
    Runtime Network None โ€” output is pre-rendered static HTML served via CDN
    Data Processing Public EU Parliament data only (no PII, no user data)
    User Interaction Read-only static pages โ€” no forms, no authentication, no cookies
    Commercial Status Non-commercial open-source (Apache-2.0 license)

    EU Parliament Monitor falls under CRA Article 6 โ€” Standard (Default) category as a non-critical digital product. The product is an open-source static site generator that produces pre-rendered HTML pages from publicly available European Parliament data. It has no runtime network connectivity, processes no personal data, requires no user authentication, and poses minimal cybersecurity risk.

    Important CRA Note for Open Source Software: Under CRA Recital 18 and Article 3, open-source software developed and distributed non-commercially (subject to the "in-the-course-of-a-commercial-activity" test) may qualify for full or partial CRA exemption. EU Parliament Monitor is:

    • โœ… Free and open-source (Apache-2.0 license)
    • โœ… Non-commercial civic technology โ€” zero revenue generated
    • โœ… No monetary consideration for distribution
    • โœ… No commercial exploitation by manufacturer (Hack23 AB)

    Assessment: EU Parliament Monitor likely qualifies as non-commercial OSS under CRA Article 3, meaning most manufacturer obligations do NOT apply. However, the platform voluntarily implements CRA best practices as part of Hack23 AB's security commitment and ISMS framework โ€” demonstrating proactive security transparency to citizens, regulators, and the open-source community.

    As a non-commercial open-source project (CRA Recital 18), it benefits from reduced obligations while voluntarily maintaining comprehensive security practices aligned with CRA Annex I essential requirements.


    Understanding CRA's phased enforcement timeline is essential for compliance planning. EU Parliament Monitor monitors these milestones to ensure timely readiness.

    ๐Ÿ—“๏ธ Milestone ๐Ÿ“… Date ๐Ÿ“‹ Requirements ๐Ÿšฆ Status
    CRA Published in Official Journal 2024-11-20 Regulation (EU) 2024/2847 published โœ… Completed
    CRA Entry into Force 2024-12-11 20 days after publication in Official Journal โœ… Completed
    Market Surveillance Provisions 2026-06-11 Chapter VI market surveillance rules applicable (18 months) ๐Ÿ”„ Upcoming
    Vulnerability & Incident Reporting Obligations 2026-09-11 Articles 14 & 15 โ€” Vulnerability and incident reporting to ENISA/national CSIRTs ๐Ÿ”„ Upcoming
    Full CRA Compliance Required 2027-12-11 All CRA requirements for manufacturers, importers, and distributors ๐Ÿ”„ Upcoming
    CE Marking Mandatory 2027-12-11 Products covered by CRA must bear CE marking N/A (non-commercial OSS)

    ๐Ÿ“ Current Position (Feb 2026): CRA is in force. Vulnerability reporting requirements under Articles 14 & 15 apply from September 2026 โ€” approximately 7 months away. EU Parliament Monitor's existing SECURITY.md coordinated disclosure process and GitHub Security Advisories integration already satisfies these upcoming requirements. No additional action required before the September 2026 deadline.

    gantt
    title EU CRA Enforcement Timeline
    dateFormat YYYY-MM-DD
    axisFormat %b %Y

    section Completed
    CRA Published (2024-11-20) :done, pub, 2024-11-20, 1d
    CRA Entry into Force (2024-12-11) :done, eif, 2024-12-11, 1d

    section Upcoming
    Market Surveillance (2026-06-11) :active, ms, 2026-06-11, 30d
    Vulnerability Reporting (2026-09-11):active, vr, 2026-09-11, 30d
    Full CRA Compliance (2027-12-11) :crit, fc, 2027-12-11, 30d

    ๐Ÿ“‹ CRA Technical Area ๐Ÿ“Š Implementation ๐Ÿ”— Evidence
    Product Architecture C4 architecture model (Context, Container, Component levels); static site generator with GitHub Pages deployment; Node.js 25/TypeScript build pipeline ARCHITECTURE.md, SECURITY_ARCHITECTURE.md, MINDMAP.md
    SBOM & Components CycloneDX SBOM generated per release; npm package-lock.json provides full dependency tree; single runtime dependency (european-parliament-mcp-server) GitHub Release Attestations, package.json
    Cybersecurity Controls Static site security model (no server-side code execution); CSP headers via GitHub Pages; Content Security Policy; HTTPS-only delivery; no cookies or tracking SECURITY_ARCHITECTURE.md, THREAT_MODEL.md
    Supply Chain Security SLSA Level 3 provenance via release.yml; Dependabot daily dependency scanning; OpenSSF Scorecard weekly assessment; dependency-review on PRs; npm audit in CI release.yml, scorecards.yml, OpenSSF Scorecard
    Update Mechanism Automated CI/CD via GitHub Actions; daily news generation workflows; automated dependency updates via Dependabot PRs; release workflow with SBOM and provenance attestation WORKFLOWS.md, release.yml
    Security Monitoring CodeQL SAST on every push/PR; Dependabot alerts with severity-based SLAs; SonarCloud code quality analysis; ESLint with security plugin; HTMLHint for output validation codeql.yml, dependency-review.yml
    Data Protection Public data only โ€” all source data from official European Parliament open data portal; no PII collected, processed, or stored; no user tracking or analytics; GDPR compliant by design CLASSIFICATION.md, SECURITY.md
    User Guidance README.md with quick-start instructions; comprehensive architecture documentation suite (20+ documents); Security Policy with vulnerability reporting process; API documentation README.md, SECURITY.md, ARCHITECTURE.md
    Vulnerability Disclosure GitHub Security Advisories enabled; coordinated disclosure process in SECURITY.md; severity-based SLAs (Critical: 7 days, High: 30 days, Medium: 90 days); security@hack23.com contact SECURITY.md, GitHub Security Advisories
    Technology Lifecycle End-of-Life Strategy documenting Node.js 25 Current support timeline (upgrading to Node.js 26 LTS); dependency lifecycle tracking; proactive technology migration planning End-of-Life-Strategy.md
    Testing & Validation Vitest unit tests (82%+ coverage); Playwright E2E tests across 14 languages; axe-core accessibility testing (WCAG 2.1 AA); Lighthouse performance benchmarking; ESLint + HTMLHint linting UnitTestPlan.md, E2ETestPlan.md, performance-testing.md
    Business Continuity GitHub Pages CDN with global distribution; git-based disaster recovery; repository mirroring capability; classification-driven recovery priorities BCPPlan.md, FinancialSecurityPlan.md

    EU Parliament Monitor generates a comprehensive Software Bill of Materials (SBOM) for every release per CRA Annex I, Part I, ยง2(3) requirements โ€” ensuring complete software supply chain transparency.

    ๐Ÿ“‹ SBOM Attribute ๐Ÿ”ง Implementation ๐Ÿ“œ CRA Requirement โœ… Status
    SBOM Format SPDX JSON (via npm list --json) Machine-readable format โœ…
    Component Inventory All npm dependencies โ€” direct and transitive Complete software component listing โœ…
    Version Information Exact semantic versions from package-lock.json Precise version identification โœ…
    License Information REUSE.toml + SPDX headers per file License compliance metadata โœ…
    Vulnerability Status npm audit + Dependabot alerts Known vulnerability tracking โœ…
    Generation Frequency On every release via GitHub Actions release workflow Current at time of distribution โœ…
    Public Availability Released as GitHub Release artifact Freely accessible to downstream users โœ…

    Note: The package-lock.json provides a machine-readable, version-pinned dependency graph that serves as a complementary SBOM artifact for all build-time consumers. Both the CycloneDX SBOM (generated per release) and package-lock.json are publicly accessible, fulfilling CRA Annex I Part II ยง7.


    ๐ŸŽฏ CRA Risk Category ๐Ÿ’Ž Asset ๐Ÿ“Š Likelihood ๐Ÿ’ฅ Impact ๐Ÿ›ก๏ธ CRA Control Implementation ๐Ÿ“‰ Residual ๐Ÿ”— Evidence
    Supply Chain Compromise Build pipeline, npm dependencies ๐ŸŸก Medium ๐ŸŸก Medium SLSA Level 3 provenance; Dependabot daily scanning; dependency-review workflow; npm audit in CI; lock file integrity verification ๐ŸŸข Low release.yml, dependency-review.yml
    Known Vulnerability Exploitation Node.js runtime, npm packages ๐ŸŸก Medium ๐ŸŸก Medium CodeQL SAST on every push; Dependabot with severity-based SLAs; OpenSSF Scorecard assessment; npm audit enforcement; ESLint security plugin ๐ŸŸข Low codeql.yml, SECURITY.md
    Content Integrity Compromise Generated HTML/CSS news articles ๐ŸŸข Low ๐ŸŸก Medium Git-based version control with signed commits; HTMLHint output validation; Playwright E2E verification; immutable deployment artifacts ๐ŸŸข Low ARCHITECTURE.md, E2ETestPlan.md
    CI/CD Pipeline Tampering GitHub Actions workflows ๐ŸŸข Low ๐ŸŸก Medium Branch protection rules; required PR reviews; pinned action versions; workflow permissions with least privilege; CODEOWNERS enforcement ๐ŸŸข Low WORKFLOWS.md, scorecards.yml
    Data Source Manipulation European Parliament MCP Server data ๐ŸŸข Low ๐ŸŸข Low Read-only access to official EU Parliament open data; data consumed at build-time only; output reviewed before deployment; public data with inherent transparency ๐ŸŸข Low DATA_MODEL.md, SECURITY_ARCHITECTURE.md
    Availability Disruption Static site hosted on GitHub Pages ๐ŸŸข Low ๐ŸŸข Low GitHub Pages CDN with 99.9%+ uptime SLA; static files require no server-side processing; git-based disaster recovery; no database dependencies ๐ŸŸข Low BCPPlan.md, CLASSIFICATION.md
    Cross-Site Scripting (XSS) Generated HTML pages in 14 languages ๐ŸŸข Low ๐ŸŸก Medium No user input accepted at runtime; content generated from sanitized templates; HTMLHint validation; CSP headers; static pre-rendered output only ๐ŸŸข Low THREAT_MODEL.md, SECURITY_ARCHITECTURE.md
    License & IP Compliance Open-source dependencies, Apache-2.0 license ๐ŸŸข Low ๐ŸŸข Low REUSE compliance checking via reuse.yml workflow; SBOM generation with license metadata; Apache-2.0 compatible dependency selection ๐ŸŸข Low reuse.yml, REUSE.toml

    # ๐Ÿ“‹ CRA Requirement โœ… Status ๐Ÿ”ง Implementation ๐Ÿ”— Evidence
    1 Delivered without known exploitable vulnerabilities โœ… Met Automated dependency scanning via Dependabot (daily); CodeQL SAST on every push/PR; npm audit enforcement in CI pipeline; zero known critical/high vulnerabilities maintained codeql.yml, SECURITY.md, GitHub Code Scanning
    2 Secure by default configuration โœ… Met Static site requires zero configuration; no server processes, no databases, no authentication configuration needed; CSP headers enforced via GitHub Pages; HTTPS-only delivery; no optional insecure modes SECURITY_ARCHITECTURE.md, ARCHITECTURE.md
    3 Protection against unauthorized access โœ… N/A No authentication or authorization needed โ€” platform serves public information only; no admin interface; no writable API endpoints; GitHub repository access controlled via branch protection and CODEOWNERS SECURITY.md, THREAT_MODEL.md
    4 Protect confidentiality of stored/transmitted/processed data โœ… Met No personal or confidential data processed; all European Parliament data is public and freely available; HTTPS-only delivery ensures transport confidentiality; no cookies, local storage, or session data CLASSIFICATION.md, SECURITY_ARCHITECTURE.md
    5 Protect integrity of stored/transmitted/processed data โœ… Met Git-based version control with immutable commit history; SLSA Level 3 provenance for release artifacts; HTMLHint validation on all generated content; Playwright E2E tests verify output integrity across 14 languages release.yml, E2ETestPlan.md
    6 Process only data adequate, relevant, and necessary โœ… Met Data minimization by design โ€” only public European Parliament data processed; no telemetry, analytics, or user tracking; no personal data collection; build-time data processing with no runtime data flows DATA_MODEL.md, CLASSIFICATION.md
    7 Protect availability of essential functions โœ… Met GitHub Pages CDN provides global distribution with 99.9%+ uptime; static HTML files require no server-side compute; no single points of failure in serving; BCP plan covers disaster recovery BCPPlan.md, ARCHITECTURE.md
    8 Minimize negative impact on availability of services provided by other devices/networks โœ… Met Static site generates zero outbound network traffic at runtime; no WebSockets, no API calls, no tracking pixels; no JavaScript required for content rendering; minimal bandwidth consumption SECURITY_ARCHITECTURE.md, performance-testing.md
    9 Designed and produced to limit attack surfaces โœ… Met Minimal attack surface: pre-rendered static HTML/CSS with no JavaScript execution required; no server-side code; no user input processing at runtime; no database connections; CDN-delivered immutable files THREAT_MODEL.md, ARCHITECTURE.md
    10 Designed to reduce impact of security incidents โœ… Met Static site architecture inherently limits blast radius; no persistent server state to compromise; no user data at risk; content easily regenerated from git; rollback via git revert BCPPlan.md, SECURITY_ARCHITECTURE.md
    11 Provide security-relevant information through recording/monitoring โœ… Met GitHub Actions provides complete CI/CD audit trail; GitHub Pages access logs available; CodeQL findings tracked via GitHub Code Scanning; Dependabot alerts with historical records WORKFLOWS.md, codeql.yml
    12 Provide ability to remove data by users โœ… N/A No user data collected, stored, or processed; no user accounts; no forms; no cookies; no local storage usage; GDPR data subject rights not applicable CLASSIFICATION.md
    13 Security updates shall be made available โœ… Met Automated CI/CD pipeline for rapid deployment; Dependabot auto-generates PRs for vulnerable dependencies; release workflow generates SBOM and provenance attestation; severity-based remediation SLAs documented SECURITY.md, release.yml
    # ๐Ÿ“‹ CRA Requirement โœ… Status ๐Ÿ”ง Implementation ๐Ÿ”— Evidence
    1 Identify and document vulnerabilities and components โœ… Met SECURITY.md documents vulnerability reporting process; THREAT_MODEL.md provides STRIDE analysis; CycloneDX SBOM generated per release cataloging all components; package-lock.json provides complete dependency tree SECURITY.md, THREAT_MODEL.md, GitHub Releases
    2 Address and remediate vulnerabilities without delay โœ… Met Severity-based SLAs: Critical (7 days), High (30 days), Medium (90 days); Dependabot auto-generates update PRs; CodeQL runs on every commit; automated npm audit in CI pipeline SECURITY.md, Dependabot Alerts
    3 Apply effective and regular testing and review โœ… Met Vitest unit tests (82%+ coverage); Playwright E2E tests across all 14 language pages; axe-core accessibility testing (WCAG 2.1 AA); Lighthouse performance benchmarks; ESLint + HTMLHint linting; CodeQL SAST; jscpd code duplication detection UnitTestPlan.md, E2ETestPlan.md, performance-testing.md
    4 Publicly disclose information about fixed vulnerabilities โœ… Met GitHub Security Advisories enabled for coordinated disclosure; fixed vulnerabilities published via GitHub releases; security@hack23.com for private reporting; public SECURITY.md documents full process SECURITY.md, GitHub Security Advisories
    5 Provide mechanism for security updates โœ… Met Automated CI/CD pipeline via GitHub Actions; Dependabot generates PRs for dependency updates; SLSA Level 3 provenance ensures update integrity; static site redeploys automatically on merge to main branch WORKFLOWS.md, release.yml
    6 Share vulnerability information in a timely manner โœ… Met Public SECURITY.md with clear reporting instructions; GitHub Security Advisories with CVE assignment capability; coordinated disclosure timeline (acknowledge 48h, validate 7d, remediate per SLA); public security metrics SECURITY.md
    7 Provide a machine-readable SBOM โœ… Met CycloneDX SBOM generated in release workflow; npm package-lock.json provides exact dependency versions; SLSA provenance attestation links SBOM to build; REUSE compliance for license metadata release.yml, REUSE.toml
    8 Define security support period โœ… Met End-of-Life Strategy documents technology lifecycle and support timeline; Node.js 25 Current tracked (Node.js 26 LTS upgrade planned Apr 2026); dependency EOL monitoring; proactive migration planning documented End-of-Life-Strategy.md, SECURITY.md

    EU Parliament Monitor follows CRA Module A โ€” Internal Production Control (self-assessment), which is the appropriate conformity assessment procedure for Standard (Default) category digital products. This assessment is conducted by Hack23 AB as the manufacturer/maintainer.

    flowchart TD
    A([Start Assessment]) --> B[Review CRA Annex I Requirements]
    B --> C[Map Technical Documentation]
    C --> D[Evaluate Security Controls]
    D --> E[Verify Testing Evidence]
    E --> F[Assess Supply Chain Security]
    F --> G{All Requirements Met?}
    G -->|Yes| H[Document Conformity]
    G -->|No| I[Implement Remediation]
    I --> D
    H --> J[CEO Review & Approval]
    J --> K[Publish Assessment]
    K --> L([Quarterly Review Cycle])
    L --> B

    style A fill:#003399,stroke:#FFCC00,color:#FFFFFF
    style H fill:#009933,stroke:#FFCC00,color:#FFFFFF
    style L fill:#003399,stroke:#FFCC00,color:#FFFFFF
    โœ… ๐Ÿ“‹ Conformity Checkpoint ๐Ÿ“Š Status ๐Ÿ“… Verified
    โœ… CRA Annex I Part I โ€” All security property requirements assessed Complete 2026-02-25
    โœ… CRA Annex I Part II โ€” All vulnerability handling requirements assessed Complete 2026-02-25
    โœ… CRA Annex V โ€” Technical documentation complete and current Complete 2026-02-25
    โœ… SBOM โ€” Machine-readable CycloneDX SBOM generated per release Complete 2026-02-25
    โœ… SLSA โ€” Level 3 provenance attestation for release artifacts Complete 2026-02-25
    โœ… Vulnerability Disclosure โ€” SECURITY.md with coordinated disclosure process Complete 2026-02-25
    โœ… Security Testing โ€” SAST (CodeQL), SCA (Dependabot), unit, E2E, accessibility Complete 2026-02-25
    โœ… Lifecycle Management โ€” End-of-Life Strategy documenting support period Complete 2026-02-25
    โœ… Risk Assessment โ€” STRIDE threat model with residual risk evaluation Complete 2026-02-25
    โœ… ISMS Alignment โ€” Mapped to Hack23 ISMS public policy framework Complete 2026-02-25

    CRA Article Cross-References

    • Article 6: Scope determination โ†’ Section 2 (CRA Scope & Classification)
    • Article 11: Essential cybersecurity requirements โ†’ Section 5 (Essential Requirements Assessment)
    • Article 19: Conformity assessment โ†’ Section 6 (Conformity Assessment Procedure)
    • Article 23: Post-market obligations โ†’ Section 7 (ISMS Policy Alignment for ongoing monitoring)
    • Annex I: Technical requirements โ†’ Section 5 (Essential Requirements self-assessment)
    • Annex V: Technical documentation โ†’ Section 3 (Technical Documentation)

    Supports CRA Article 19 โ€” Conformity Assessment Documentation

    Reference: Secure Development Policy

    ๐Ÿงช Control ๐ŸŽฏ Requirement โœ… Implementation ๐Ÿ“‹ Evidence
    ๐Ÿงช Unit Testing โ‰ฅ80% line coverage, โ‰ฅ70% branch โœ… 82%+ coverage UnitTestPlan.md + Vitest reports
    ๐ŸŒ E2E Testing Critical user journeys validated โœ… 14 language pages E2ETestPlan.md + Playwright reports
    ๐Ÿ” SAST Scanning Zero critical/high vulnerabilities โœ… CodeQL clean CodeQL
    ๐Ÿ“ฆ SCA Scanning Zero critical unresolved dependencies โœ… Dependabot active Security Overview
    ๐Ÿ”’ Secret Scanning Zero exposed secrets/credentials โœ… GitHub Secret Scanning Security Overview
    ๐Ÿ“ฆ SBOM Generation CycloneDX per release โœ… Automated Release Artifacts
    ๐Ÿ›ก๏ธ Provenance SLSA Level 3 attestation โœ… Active Attestations
    ๐Ÿ“Š Quality Gates ESLint + HTMLHint + Prettier โœ… Enforced in CI Validate Workflow
    ๐Ÿ“œ License Compliance REUSE specification โœ… FSFE REUSE compliant REUSE

    OpenSSF Scorecard OpenSSF Best Practices SLSA 3 CodeQL REUSE Compliance License

    Each release includes CRA-aligned evidence:

    release/v0.7.x/
    โ”œโ”€โ”€ euparliamentmonitor-v0.7.x-sbom.json # CycloneDX SBOM (Annex V)
    โ”œโ”€โ”€ euparliamentmonitor-v0.7.x.tar.gz # Source archive
    โ”œโ”€โ”€ SLSA attestation (GitHub) # Level 3 provenance
    โ”œโ”€โ”€ OpenSSF Scorecard (weekly) # Supply chain security
    โ””โ”€โ”€ CodeQL results (per-commit) # SAST findings

    ๐Ÿ›ก๏ธ Control ๐Ÿ”ง Tool ๐Ÿ“Š Frequency โœ… Status
    SAST CodeQL Every push/PR CodeQL
    SCA Dependabot Daily โœ… Active
    Dependency Review GitHub dependency-review-action Every PR โœ… Active
    Linting ESLint (security plugin) + HTMLHint Every push/PR โœ… Active
    SBOM CycloneDX Every release โœ… Active
    Scorecard OpenSSF Scorecard Weekly Scorecard
    SLSA Provenance SLSA Level 3 Every release โœ… Active
    License Compliance REUSE Every push/PR REUSE
    ๐Ÿงช Test Type ๐Ÿ”ง Framework ๐Ÿ“Š Coverage ๐Ÿ“‹ Reference
    Unit Tests Vitest + v8 coverage 82%+ code coverage UnitTestPlan.md
    E2E Tests Playwright 14 language pages verified E2ETestPlan.md
    Accessibility Playwright + axe-core WCAG 2.1 AA compliance E2ETestPlan.md
    Performance Lighthouse Core Web Vitals benchmarks performance-testing.md
    HTML Validation HTMLHint All output HTML files package.json scripts
    Code Quality ESLint + SonarCloud + jscpd TypeScript source analysis eslint.config.js

    ๐Ÿท๏ธ ISMS Policy ๐Ÿ“‹ CRA Mapping ๐Ÿ”ง EU Parliament Monitor Implementation โœ… Status
    ๐Ÿ” Information Security Policy Overall CRA governance Security-by-design static site architecture; public data classification; comprehensive security documentation โœ… Aligned
    ๐Ÿ› ๏ธ Secure Development Policy Annex I Part I (1โ€“13) CodeQL SAST; ESLint security plugin; Vitest/Playwright testing; branch protection; PR reviews; automated CI/CD gates โœ… Aligned
    ๐Ÿ” Vulnerability Management Annex I Part II (1โ€“8) Dependabot daily scanning; severity-based SLAs (Critical 7d, High 30d); GitHub Security Advisories; coordinated disclosure via SECURITY.md โœ… Aligned
    ๐Ÿ“ Change Management Security updates (Annex I Part II ยง5) Git-based change tracking; required PR reviews; automated testing gates; deployment via CI/CD; release workflow with SBOM โœ… Aligned
    ๐Ÿท๏ธ Classification Framework Risk assessment CIA classification (Public/Moderate/Standard); impact analysis; classification-driven security controls โœ… Aligned
    ๐Ÿ”’ Cryptography Policy Data confidentiality (Annex I Part I ยง4) HTTPS-only delivery via GitHub Pages; TLS 1.2+ for all transport; no cryptographic key management needed (static site) โœ… Aligned
    ๐Ÿ”‘ Access Control Policy Unauthorized access (Annex I Part I ยง3) GitHub repository access controls; branch protection; CODEOWNERS enforcement; no end-user authentication (public site) โœ… Aligned
    ๐Ÿค Third Party Management Supply chain security Dependabot for dependency monitoring; SLSA Level 3 provenance; dependency-review on PRs; npm audit enforcement; pinned action versions โœ… Aligned
    ๐Ÿ”“ Open Source Policy OSS governance Apache-2.0 license; REUSE compliance; SBOM generation; public security policy; coordinated disclosure process โœ… Aligned
    ๐Ÿšจ Incident Response Plan Post-market surveillance Security incident handling procedures; communication protocols; forensics capability; GitHub Security Advisories integration โœ… Aligned
    ๐Ÿ”„ Business Continuity Plan Availability (Annex I Part I ยง7) GitHub Pages CDN resilience; git-based disaster recovery; static site regeneration capability; documented BCP โœ… Aligned
    ๐Ÿ’พ Backup Recovery Policy Data integrity (Annex I Part I ยง5) Git repository as immutable backup; GitHub Pages deployment history; full site regeneration from source โœ… Aligned
    ๐Ÿ“Š Security Metrics Monitoring & recording (Annex I Part I ยง11) CodeQL scan results tracking; Dependabot alert metrics; test coverage reporting; OpenSSF Scorecard trending โœ… Aligned
    ๐Ÿ“Š Risk Assessment Methodology CRA risk evaluation STRIDE threat model; risk categorization with likelihood/impact assessment; residual risk evaluation; evidence-linked controls โœ… Aligned
    ๐Ÿท๏ธ Data Classification Policy Data handling (Annex I Part I ยง6) Public data only classification; no PII handling; data minimization by design; EU Parliament open data sourcing โœ… Aligned
    ๐ŸŒ ISMS Transparency Plan Disclosure & transparency Public security documentation; open-source CRA assessment; transparent vulnerability reporting; community engagement โœ… Aligned
    • ๐Ÿ”„ Operational Continuity: CRA self-assessment integrated with existing ISMS security operations and review cycles
    • ๐Ÿ“Š Evidence Reuse: Security metrics, test results, and monitoring data serve dual ISMS/CRA documentation purposes
    • ๐ŸŽฏ Minimal Overhead: Static site architecture naturally satisfies many CRA requirements through design simplicity
    • ๐Ÿค Stakeholder Confidence: Transparent assessment demonstrates professional security practices for open-source civic technology

    The table below maps ISO 27001:2022 controls directly to CRA Annex I references, demonstrating how Hack23 AB's existing ISMS controls satisfy CRA essential requirements โ€” minimising compliance overhead through integrated governance.

    ๐Ÿ›๏ธ ISO 27001:2022 Control ๐Ÿ“œ CRA Annex I Reference ๐Ÿ“‹ Description โœ… Status
    A.5.1 Information security policies Part I ยง1 (Security by default) Security governance framework establishing security-by-design principles โœ… Aligned
    A.8.8 Technical vulnerability management Part I ยง2(2) (Vulnerability handling) CVE tracking, Dependabot scanning, and severity-based remediation SLAs โœ… Aligned
    A.8.25 Secure development lifecycle Part II ยง1 (Secure development) SDLC security integration via CodeQL SAST, PR reviews, and CI/CD gates โœ… Aligned
    A.5.24 Information security incident management Part I ยง2(5) (Incident reporting) Security incident procedures via SECURITY.md and GitHub Security Advisories โœ… Aligned
    A.8.13 Information backup Part I ยง5 (Data integrity) Git-based immutable backup strategy with full site regeneration capability โœ… Aligned
    A.5.36 Compliance with policies and standards Module A self-assessment Ongoing conformity verification through quarterly CRA assessment review cycle โœ… Aligned
    A.8.20 Network security Part I ยง8 (Availability of other services) Static site generates zero runtime outbound traffic; no network attack surface at runtime โœ… Aligned
    A.8.29 Security testing in development Part II ยง3 (Regular testing) Vitest unit tests, Playwright E2E, axe-core accessibility, and Lighthouse performance โœ… Aligned
    A.5.20 Addressing security in supplier agreements Part I supply chain (ยง9) SLSA Level 3 provenance, dependency-review workflow, pinned action versions โœ… Aligned

    9๏ธโƒฃ Post-Market Surveillance

    Supports CRA Article 23 โ€” Obligations of Economic Operators

    ๐Ÿ“ก CRA Monitoring Obligation ๐Ÿ”ง Implementation โฑ๏ธ Frequency ๐ŸŽฏ Action Trigger ๐Ÿ“‹ Evidence
    ๐Ÿ” Vulnerability Monitoring (Art. 23.1) CVE feeds via Dependabot + GitHub Advisory Database Continuous Auto-create Dependabot PRs Security Overview
    ๐Ÿšจ Incident Reporting (Art. 23.2) SECURITY.md coordinated disclosure process Real-time ENISA 24h notification readiness SECURITY.md
    ๐Ÿ“Š Security Posture Tracking (Art. 23.3) OpenSSF Scorecard + CodeQL monitoring Weekly Score decline triggers investigation Scorecard
    ๐Ÿ”„ Update Distribution (Art. 23.4) GitHub Releases with SLSA attestation As needed Critical vulnerability patches Releases

    ๐Ÿ“‹ CRA Reporting Readiness: Documentation and procedures prepared for ENISA incident reporting per Incident Response Plan

    ๐Ÿ”— ISMS Monitoring Integration:


    Supports CRA Article 16 โ€” Quality Management System through Automated Evidence Generation

    Hack23 AB's curated agent ecosystem monitors and validates CRA evidence generated by automated workflows:

    flowchart TD
    BUILD[๐Ÿ”จ Build Process<br/>GitHub Actions Workflow] --> SBOM_GEN[๐Ÿ“ฆ SBOM Generation<br/>CycloneDX + Dependency Graph]
    SBOM_GEN --> AGENT_REVIEW[๐Ÿค– Task Agent<br/>SBOM Validation & Gap Detection]

    AGENT_REVIEW --> VULN_SCAN[๐Ÿ” Vulnerability Scanning<br/>Dependabot + CodeQL]
    VULN_SCAN --> AGENT_TRIAGE[๐Ÿค– Agent Triage<br/>CRA Disclosure Requirements]

    AGENT_TRIAGE --> SLSA[๐ŸŽ–๏ธ SLSA Attestation<br/>Level 3 Provenance]
    SLSA --> EVIDENCE[๐Ÿ“Š GitHub Actions<br/>Evidence Package]

    EVIDENCE --> CE{โœ… CRA Conformity<br/>Ready?}
    CE -->|Yes| APPROVAL[๐Ÿ‘จโ€๐Ÿ’ผ CEO Final Approval]
    CE -->|No| GAP[๐Ÿ“‹ Compliance Gap<br/>Issue Creation]

    GAP --> REMEDIATE[๐Ÿ‘ท Specialist Agent<br/>Gap Remediation]
    REMEDIATE --> SBOM_GEN
    APPROVAL --> PUBLISH[๐ŸŒ Assessment Published]

    style BUILD fill:#1565C0,color:#fff
    style SBOM_GEN fill:#4CAF50,color:#fff
    style AGENT_REVIEW fill:#FF9800,color:#fff
    style VULN_SCAN fill:#4CAF50,color:#fff
    style AGENT_TRIAGE fill:#FF9800,color:#fff
    style SLSA fill:#1565C0,color:#fff
    style EVIDENCE fill:#4CAF50,color:#fff
    style CE fill:#FFD600,color:#000
    style APPROVAL fill:#4CAF50,color:#fff
    style GAP fill:#D32F2F,color:#fff
    style REMEDIATE fill:#FF9800,color:#fff
    style PUBLISH fill:#4CAF50,color:#fff
    ๐Ÿค– Agent ๐Ÿ“‹ CRA Responsibility โฑ๏ธ Frequency ๐Ÿ“Š Output
    Security Architect Vulnerability scanning, SAST/SCA oversight Per-commit CodeQL results, dependency audit
    DevOps Engineer SBOM generation, SLSA attestation, CI/CD gates Per-release Release artifacts, provenance
    Quality Engineer Test coverage, E2E validation, accessibility Per-PR Test reports, coverage metrics
    Product Task Agent CRA gap detection, issue creation, tracking Weekly Compliance issues, gap reports
    Documentation Architect CRA assessment updates, evidence documentation Quarterly Updated CRA-ASSESSMENT.md
    ๐Ÿ“‹ CRA Section ๐Ÿค– Automated By ๐Ÿ“Š Evidence Type โœ… Status
    ยง1 Project Identification Release workflow Version, SBOM, attestation โœ… Automated
    ยง3 Technical Documentation TypeDoc + JSDoc API documentation generation โœ… Automated
    ยง5 Essential Requirements CodeQL + Dependabot SAST/SCA scan results โœ… Automated
    ยง6 Conformity Evidence CI/CD pipeline Badges, test results, attestations โœ… Automated
    ยง7 Security Testing Vitest + Playwright Coverage reports, E2E results โœ… Automated
    ยง9 Post-Market Surveillance Dependabot + Scorecard Vulnerability monitoring โœ… Automated

    Supports CRA Article 28 โ€” EU Declaration of Conformity

    ๐Ÿข Manufacturer: Hack23 AB, Stockholm, Sweden
    ๐Ÿ“ฆ Product: EU Parliament Monitor v0.7.23
    ๐Ÿ“‹ CRA Compliance: Self-assessment documentation supporting CRA essential cybersecurity requirements evaluation
    ๐Ÿ” Assessment: Self-assessment documentation per CRA Article 24 (Module A โ€” Internal Production Control)
    ๐Ÿ“Š Standards: ISO/IEC 27001:2022 โ€ข NIST CSF 2.0 โ€ข CIS Controls v8.1 โ€ข OWASP ASVS

    ๐Ÿ“ Note: As an open-source project distributed under Apache-2.0 license with no commercial monetization, EU Parliament Monitor falls under the CRA open-source software exemption (Article 18). This declaration is maintained voluntarily to demonstrate security excellence and support downstream users' compliance needs.

    ๐Ÿ“… Date & Signature: 2026-03-19 โ€” James Pether Sรถrling, CEO/Founder
    ๐Ÿ“‚ Technical Documentation: This assessment + evidence bundle supports CRA Annex V technical documentation requirements


    Supports CRA Article 16 โ€” Quality Management System Documentation

    Overall CRA Documentation Status: โœ… Self-Assessment Documented

    Key CRA Documentation Areas:

    • โœ… Annex I essential requirements documented and assessed (Section 5)
    • โœ… Annex V technical documentation structured (Section 3)
    • โœ… Article 11 security measures documented (Section 7โ€“8)
    • โœ… Article 23 post-market surveillance procedures documented (Section 9)
    • โœ… Article 28 declaration of conformity prepared (Section 10)

    Outstanding Documentation: None โ€” all CRA sections assessed and documented

    ๐Ÿ‘ค Role ๐Ÿ“ Name ๐Ÿ“… Date โœ๏ธ Assessment Attestation
    ๐Ÿ”’ CRA Security Assessment James Pether Sรถrling 2026-03-19 Essential requirements documented and assessed
    ๐ŸŽฏ Product Responsibility James Pether Sรถrling 2026-03-19 Technical documentation complete and structured
    โš–๏ธ Legal Compliance Review James Pether Sรถrling 2026-03-19 EU regulatory documentation requirements addressed

    ๐Ÿ“Š CRA Assessment Status: Self-Assessment Documented


    Per CRA Article 15 โ€” Substantial Modification

    CRA assessment updated when changes constitute "substantial modification" under CRA:

    1. ๐Ÿ—๏ธ Security Architecture Changes: New authentication methods, trust boundaries, or encryption
    2. ๐Ÿ›ก๏ธ Essential Requirement Impact: Changes affecting Annex I compliance
    3. ๐Ÿ“ฆ Critical Dependencies: New supply chain components with security implications
    4. ๐Ÿ” Risk Profile Changes: New threats or vulnerability classes
    5. โš–๏ธ Regulatory Updates: CRA implementing acts or guidance changes

    ๐ŸŽฏ Maintenance Principle: Assessment stability preferred โ€” avoid routine updates that don't impact CRA compliance

    ๐Ÿท๏ธ Product Version: v0.7.23
    ๐Ÿ“Š Assessment Status: โœ… Self-Assessment Complete
    ๐Ÿ” OpenSSF Scorecard: Scorecard
    ๐ŸŽ–๏ธ SLSA Level: 3 (Build provenance attestation)
    ๐Ÿ“ฆ SBOM: CycloneDX generated per release
    ๐Ÿ”’ Vulnerability Status: Zero known critical/high vulnerabilities
    ๐Ÿ“… Last Full Assessment: 2026-03-19
    โฐ Next Scheduled Review: 2026-06-19


    ๐Ÿ” CRA Article Cross-References

    ๐Ÿ“œ CRA Article ๐Ÿ“‹ Requirement ๐Ÿ“Š Assessment Section โœ… Status
    Article 6 Scope determination Section 2 (CRA Scope & Classification) โœ… Assessed
    Article 11 Essential cybersecurity requirements Section 5 (Essential Requirements) โœ… Assessed
    Article 15 Substantial modification CRA Assessment Maintenance โœ… Documented
    Article 16 Quality management system Section 11 (Assessment Completion) โœ… Documented
    Article 19 Conformity assessment Section 6 (Conformity Assessment) โœ… Assessed
    Article 23 Post-market obligations Section 9 (Post-Market Surveillance) โœ… Documented
    Article 24 Module A self-assessment Section 6 (Self-Assessment Process) โœ… Complete
    Article 28 EU Declaration of Conformity Section 10 (Declaration) โœ… Prepared
    Annex I Essential requirements Section 5 (Annex I Assessment) โœ… Assessed
    Annex V Technical documentation Section 3 (Technical Documentation) โœ… Complete
    • ๐Ÿ”„ Operational Continuity: CRA self-assessment integrated with existing ISMS security operations and review cycles
    • ๐Ÿ“Š Evidence Reuse: Security metrics, test results, and monitoring data serve dual ISMS/CRA documentation purposes
    • ๐ŸŽฏ Minimal Overhead: Static site architecture naturally satisfies many CRA requirements through design simplicity
    • ๐Ÿค Stakeholder Confidence: Transparent assessment demonstrates professional security practices for open-source civic technology
    Policy CRA Relevance Link
    Information Security Policy Overall CRA governance View
    Secure Development Policy Annex I Part I (secure development) View
    Open Source Policy OSS governance & CRA exemption View
    Access Control Policy Annex I Part I ยง3 (unauthorized access) View
    Policy CRA Relevance Link
    Cryptography Policy Annex I Part I ยง4 (data confidentiality) View
    Network Security Policy Annex I Part I ยง8 (availability) View
    Vulnerability Management Annex I Part II (vulnerability handling) View
    Third Party Management Supply chain security View
    Policy CRA Relevance Link
    Change Management Security updates (Annex I Part II ยง5) View
    Incident Response Plan Post-market surveillance (Art. 23) View
    Business Continuity Plan Availability (Annex I Part I ยง7) View
    Backup Recovery Policy Data integrity (Annex I Part I ยง5) View
    Policy CRA Relevance Link
    Security Metrics Monitoring (Annex I Part I ยง11) View
    Compliance Checklist CRA conformity tracking View
    Classification Framework Risk assessment (Annex I Part I ยง6) View
    Risk Assessment Methodology CRA risk evaluation View
    CRA Conformity Assessment Process Process framework View


    ๐Ÿ“‹ Document Control:
    โœ… Approved by: James Pether Sรถrling, CEO
    ๐Ÿ“ค Distribution: Public
    ๐Ÿท๏ธ Classification: Confidentiality: Public Integrity: Moderate Availability: Standard
    ๐Ÿ“… Effective Date: 2026-03-19
    ๐Ÿ”„ CRA Alignment: Self-assessment per CRA Module A โ€” supports CRA Annex V technical documentation and Annex I essential requirements
    ๐Ÿ›๏ธ ISMS Integration: Comprehensive alignment with Hack23 ISMS Public Framework
    ๐Ÿ›๏ธ Process Reference: CRA Conformity Assessment Process
    ๐Ÿ”“ Open Source Policy: Open Source Policy
    ๐ŸŽฏ Framework Compliance: ISO 27001 NIST CSF 2.0 CIS Controls