Cyber Resilience Act (CRA) Compliance
1. Document Overview
Document Title: CRA Compliance Statement
Products Covered:
- vCloud.ai Video Analytics Platform
- Cluebase VMS (Video Management System)
Prepared For: European Union Regulatory Alignment
Version: 1.1.2
Date: March 2026
2. Executive Summary
This document outlines the compliance of vCloud.ai and Cluebase VMS with the requirements of the EU Cyber Resilience Act (CRA). Both systems are designed with a strong focus on cybersecurity, resilience, and secure lifecycle management, ensuring protection against unauthorized access, data breaches, and operational disruptions.
The platforms integrate AI-based analytics, distributed processing, and enterprise-grade video management while maintaining compliance with modern cybersecurity standards applicable within the European Union.
3. Product Description
3.1 vCloud.ai Platform
vCloud.ai is an AI-driven video analytics platform leveraging:
- Large Language Models (LLMs)
- Custom-trained neural networks
- Edge and server-side inference
Key capabilities:
- Object, face, and license plate recognition
- Behavioral analytics
- Real-time alerting and automation
- Integration with third-party systems (access control, intercoms, IoT)
3.2 Cluebase VMS
Cluebase VMS is a scalable video management system providing:
- Centralized and distributed video recording
- Device and camera management
- Secure streaming via RTSP/HTTPS
- API-based integrations (ISAPI, ONVIF, REST)
4. CRA Applicability
Both products fall under “Products with Digital Elements” as defined by the Cyber Resilience Act due to:
- Network connectivity
- Software-based control and processing
- Remote access capabilities
- Integration with external systems
5. Cybersecurity Risk Management
5.1 Risk Assessment
A continuous risk assessment process is implemented:
- Threat modeling (STRIDE-based)
- Vulnerability scanning (automated + manual)
- Penetration testing (internal and third-party)
5.2 Risk Mitigation Measures
- Role-based access control (RBAC)
- Secure authentication (OAuth2, API tokens, optional MFA)
- Network segmentation support
- Encryption (TLS 1.2+ for data in transit)
6. Secure Development Lifecycle (SDLC)
Both platforms follow a secure SDLC aligned with CRA requirements:
- Code reviews and static analysis (SAST)
- Dependency vulnerability scanning (SCA)
- Container security (Docker hardening, minimal images)
- Secure CI/CD pipelines
- Version control with audit trails
7. Vulnerability Handling & Disclosure
7.1 Vulnerability Management Policy
- Continuous monitoring for CVEs
- Patch release cycles (critical, high, medium severity tiers)
- Emergency patching procedures
7.2 Coordinated Vulnerability Disclosure (CVD)
- Public reporting channel for researchers
- Defined SLA for response and remediation
- Transparency in security advisories
8. Security by Design
Security is embedded into architecture:
- Least privilege principles
- Default secure configurations
- Hardened APIs with authentication and rate limiting
- Isolation of analytics pipelines
- Optional air-gapped deployment support
9. Data Protection
9.1 Data Handling
- Video streams processed securely
- Metadata storage minimized
- Configurable retention policies
9.2 Encryption
- TLS encryption for all communications
- Optional encryption at rest (disk-level or application-level)
9.3 GDPR Alignment
- Supports anonymization (face blurring, masking)
- Audit logs for data access
- Data subject access request (DSAR) support via APIs
10. Identity & Access Management
- Role-based access control (Admin, Operator, Viewer, API)
- Integration with LDAP / Active Directory
- API authentication tokens with scope limitation
- Optional multi-factor authentication (MFA)
11. Network Security
- Secure communication protocols (HTTPS, WSS)
- Firewall-friendly architecture
- VPN compatibility
- Support for segmented deployments (edge/cloud hybrid)
12. Software Updates & Patch Management
- Digitally signed software updates
- Secure update delivery channels
- Version tracking and rollback capability
- Long-term support (LTS) versions available
13. Incident Detection & Response
- Real-time monitoring and alerting
- Logging and audit trails (user actions, system events)
- Integration with SIEM systems
- Incident response procedures defined and documented
14. Supply Chain Security
- Verification of third-party libraries
- SBOM (Software Bill of Materials) maintained
- Trusted container registries
- Vendor risk assessment procedures
15. Documentation & Transparency
The following documentation is maintained and available:
- Security guidelines for deployment
- API documentation
- Hardening guidelines
- Incident response procedures
- Release notes and vulnerability disclosures
16. Compliance Mapping to CRA Requirements
| CRA Requirement | Implementation |
|---|---|
| Secure by design | Integrated into architecture and SDLC |
| Vulnerability handling | Defined policy + disclosure program |
| Data protection | Encryption + GDPR alignment |
| Access control | RBAC + MFA |
| Update mechanisms | Secure, signed updates |
| Incident reporting | Logging + SIEM integration |
| Documentation | Full technical and security documentation |
17. Conformity Assessment
vCloud.ai and Cluebase VMS are prepared for:
- Internal conformity assessment (self-assessment)
- Third-party audits (upon request)
- CE marking readiness (where applicable)
18. Maintenance & Lifecycle Support
- Regular security updates
- Long-term support versions
- End-of-life (EOL) policy defined
- Migration support between versions
19. Residual Risks
Despite strong security controls, residual risks may include:
- Misconfiguration by end users
- Compromised third-party integrations
- Network-level attacks outside system control
Mitigation:
- Deployment guidelines
- Security best practices documentation
- Monitoring and alerting tools
20. Conclusion
vCloud.ai and Cluebase VMS are designed to meet the core requirements of the EU Cyber Resilience Act. The platforms implement a comprehensive cybersecurity framework covering secure development, deployment, operation, and maintenance.
The systems demonstrate a proactive approach to cybersecurity, ensuring resilience, transparency, and compliance within the European regulatory environment.
21. Contact Information
For compliance inquiries:
Company: vCloud.ai
Email: support@vcloud.ai
Department: Security & Compliance
