Evidence-Driven Conformity Through Systematic Assessment
EU Cyber Resilience Act Compliance for Corporate Website
π Document Owner: CEO | π Version: 1.1 | π
Last Updated: 2026-04-21 (UTC)
π Review Cycle: Quarterly | β° Next Review: 2026-07-21
π·οΈ Classification:
This CRA conformity assessment documents how the Hack23 Homepage (hack23.com) addresses EU Cyber Resilience Act requirements through systematic self-assessment. As a static HTML/CSS website with no server-side code, backend database, or user data processing, the homepage has a minimal attack surface and low CRA risk profile.
As a cybersecurity consulting company, Hack23 AB applies the same rigorous assessment methodology to its own corporate website, demonstrating the security-first approach that clients can expect from our consulting services.
β James Pether SΓΆrling, CEO/Founder
| Document | Focus | Description |
|---|---|---|
| ποΈ Architecture | C4 Model | System structure and deployment |
| π‘οΈ Security Architecture | Security | Defense-in-depth security controls |
| π― Threat Model | Threats | STRIDE/MITRE ATT&CK threat analysis |
| π Data Model | Data | Content model and data structures |
| π Flowchart | Processes | CI/CD and content workflows |
| π State Diagram | States | Deployment and content lifecycle |
| π§ Mindmap | Concepts | System conceptual relationships |
| πΌ SWOT | Strategy | Strategic analysis |
| π Workflows | CI/CD | GitHub Actions workflow documentation (10 workflows) |
| π BCP Plan | Resilience | Business continuity & recovery |
| π° Financial & Security Plan | Cost | TCO & security investment |
| π End-of-Life Strategy | Lifecycle | Technology lifecycle management |
| π·οΈ Classification | Data | Security classification framework |
The following Hack23 AB projects demonstrate completed CRA assessments:
| π Project | π¦ Product Type | π·οΈ CRA Classification | π Assessment Status | π Reference Link |
|---|---|---|---|---|
| π΅οΈ CIA (Citizen Intelligence Agency) | Political transparency platform | Standard (Non-commercial OSS) | β Complete | π CRA Assessment |
| β« Black Trigram | Korean martial arts game | Standard (Non-commercial OSS) | β Complete | π CRA Assessment |
| π‘οΈ CIA Compliance Manager | Compliance automation tool | Standard (Non-commercial OSS) | β Complete | π CRA Assessment |
| π Hack23 Homepage | Corporate website | Standard (Non-commercial OSS) | β Complete | This document |
Supports CRA Annex V Β§ 1 - Product Description Requirements
| Field | Value |
|---|---|
| π¦ Product | Hack23 Homepage (hack23.com) |
| π·οΈ Version | Continuous deployment from main branch |
| π Repository | https://github.com/Hack23/homepage |
| π§ Security Contact | [email protected] |
| π― Purpose | Corporate website (1,353 HTML files = 105 English source pages localised across 14 languages) showcasing Hack23 AB's cybersecurity consulting services, 7 open-source projects, and the public ISMS portfolio (transparency-by-design) |
π Evidence Links:
- ποΈ System Architecture: ARCHITECTURE.md β Complete C4 model architecture
- π Security Architecture: SECURITY_ARCHITECTURE.md β Defense-in-depth security implementation
- π‘οΈ Future Security Vision: FUTURE_SECURITY_ARCHITECTURE.md β Security enhancement roadmap
- π― Threat Model: THREAT_MODEL.md β STRIDE/MITRE ATT&CK threat analysis
- π Data Architecture: DATA_MODEL.md β Content model and data structures
- π Process Workflows: FLOWCHART.md β CI/CD and content workflows
- π§ CI/CD Workflows: WORKFLOWS.md β GitHub Actions pipeline documentation
- π§ System Overview: MINDMAP.md β Conceptual system relationships
- π― Strategic Analysis: SWOT.md β Strategic assessment
π Project Status & Quality Badges:
Supports CRA Article 6 - Scope and Article 7 - Product Classification Assessment
π CRA Scope Justification: The Hack23 Homepage is a static HTML/CSS website with no server-side code execution, no database, no user authentication, and no personal data processing. It serves purely informational content via AWS S3 + CloudFront CDN. As non-commercial open-source software distributed via GitHub under Apache 2.0 license, it falls under non-commercial OSS with Standard CRA classification enabling self-assessment approach.
π Classification Evidence:
- π Open Source License: Apache 2.0 License
- ποΈ Classification Framework: ISMS Classification Policy
- π Public Repository: GitHub Repository
π Minimal Attack Surface:
- No server-side code execution (static HTML/CSS only)
- No user input processing (no forms, no JavaScript input handling)
- No authentication or session management
- No database or data persistence
- No API endpoints
- Content served read-only via CDN
Supports CRA Annex V Β§ 2 - Technical Documentation Requirements
| ποΈ CRA Technical Area | π Implementation Summary | π Evidence Location |
|---|---|---|
| π¨ Product Architecture (Annex V Β§ 2.1) | Static HTML5/CSS3 website deployed on AWS S3 + CloudFront CDN with C4 architecture documentation | ARCHITECTURE.md + SECURITY_ARCHITECTURE.md + MINDMAP.md |
| π¦ SBOM & Components (Annex I Β§ 1.1) | Minimal dependencies (static HTML/CSS, Node.js build tools for minification). SLSA Level 3 build attestations for releases | GitHub Attestations + Latest Release |
| π Cybersecurity Controls (Annex I Β§ 1.2) | No server-side code; security via AWS CloudFront (TLS 1.3, security headers, DDoS protection), GitHub Actions hardening (StepSecurity), supply chain security (OpenSSF Scorecard) | SECURITY_ARCHITECTURE.md + THREAT_MODEL.md |
| π‘οΈ Supply Chain Security (Annex I Β§ 1.3) | SLSA Level 3 attestations, Dependabot automation, OpenSSF Scorecard monitoring, SHA-pinned GitHub Actions | WORKFLOWS.md + OpenSSF Scorecard |
| π Update Mechanism (Annex I Β§ 1.4) | Continuous deployment via GitHub Actions with automated security scanning (CodeQL, dependency review), OWASP ZAP full scan post-deployment | WORKFLOWS.md + FLOWCHART.md |
| π Security Monitoring (Annex I Β§ 1.5) | OpenSSF Scorecard supply chain monitoring, GitHub Security Advisories, Dependabot alerts, OWASP ZAP scheduled scans, CloudFront access logging | SECURITY_ARCHITECTURE.md |
| π·οΈ Data Protection (Annex I Β§ 2.1) | No personal data processed. Static content only. AWS S3 AES-256 encryption at rest, TLS 1.3 in transit. Data classification per ISMS framework | DATA_MODEL.md + CLASSIFICATION.md |
| π User Guidance (Annex I Β§ 2.2) | Comprehensive README, architecture documentation, security architecture, threat model, and ISMS policy references | README.md + SECURITY_ARCHITECTURE.md |
| π Vulnerability Disclosure (Annex I Β§ 2.3) | Public vulnerability disclosure policy via GitHub Security Advisories with coordinated disclosure process | SECURITY.md + Vulnerability Management Policy |
π ISMS Integration:
- ποΈ Architecture & Design: ARCHITECTURE.md + SECURITY_ARCHITECTURE.md + FUTURE_ARCHITECTURE.md + FUTURE_SECURITY_ARCHITECTURE.md
- π Security Controls: Information Security Policy + Network Security Policy
- π§ Development Process: Secure Development Policy + WORKFLOWS.md
Supports CRA Annex V Β§ 3 - Risk Assessment Documentation
Reference: π Risk Assessment Methodology and
| π¨ CRA Risk Category | π― Asset | π Likelihood | π₯ Impact (C/I/A) | π‘οΈ CRA Control Implementation | βοΈ Residual | π Evidence |
|---|---|---|---|---|---|---|
| Supply Chain Attack (Art. 11) | Build pipeline & npm dependencies | L | M/M/L | SLSA Level 3, Dependabot, OpenSSF Scorecard, SHA-pinned actions, StepSecurity harden-runner | VL | WORKFLOWS.md + Scorecard |
| Content Tampering (Art. 11) | HTML/CSS website content | L | L/M/L | S3 versioning, CloudFront origin access, branch protection, PR reviews, CI validation | VL | SECURITY_ARCHITECTURE.md |
| CDN/Infrastructure Attack (Art. 11) | AWS CloudFront/S3 | VL | L/L/M | AWS managed security, TLS 1.3, DDoS protection (Shield Standard), security headers | VL | SECURITY_ARCHITECTURE.md |
| CI/CD Pipeline Compromise (Art. 11) | GitHub Actions workflows | L | L/M/L | Least-privilege OIDC, hardened runners, pinned actions, branch protection rules | VL | WORKFLOWS.md |
| Website Defacement (Art. 11) | Public website content | L | L/M/L | S3 bucket policy (no public write), CloudFront OAI, Git-based content control, automated backups | VL | SECURITY_ARCHITECTURE.md |
π Risk Assessment Summary:
- Overall Risk Level:
- Primary Justification: Static website with no server-side code, no user data processing, no authentication, served via managed AWS infrastructure with comprehensive supply chain security controls
Supports CRA Annex I - Essential Cybersecurity Requirements Assessment
| # | Requirement | Implementation | Status |
|---|---|---|---|
| 2.1 | Identify and document vulnerabilities | CodeQL SAST, OWASP ZAP DAST, Dependabot SCA, OpenSSF Scorecard supply chain analysis | |
| 2.2 | Address vulnerabilities without delay | Dependabot auto-PRs for dependency updates; vulnerability SLAs per Vulnerability Management Policy | |
| 2.3 | Apply effective testing | CI pipeline with HTMLHint, HTML5 validator, Linkinator, Lighthouse audits; OWASP ZAP full scan post-deployment | |
| 2.4 | Disclose vulnerabilities | SECURITY.md with GitHub Security Advisories; coordinated disclosure via [email protected] | |
| 2.5 | Provide security updates | Continuous deployment via GitHub Actions; automated dependency updates; SLSA Level 3 attestation for releases |
Supports CRA Annex V Β§ 4 - Testing and Verification Documentation
| Test Type | Tool | Schedule | Scope | Evidence |
|---|---|---|---|---|
| SAST | CodeQL | PR + Push | HTML, JavaScript analysis | Code Scanning |
| DAST | OWASP ZAP Full Scan | Post-deployment | Live website https://hack23.com | ZAP Workflow |
| SCA | Dependabot | Continuous | npm dependencies | Dependabot Alerts |
| Supply Chain | OpenSSF Scorecard | Weekly | Repository security posture | Scorecard Results |
| Quality | HTMLHint + HTML5 Validator | PR + Push | All HTML files | PR Workflow |
| Links | Linkinator | PR + Push | All internal and external links | Quality Checks |
| Performance | Lighthouse CI | Post-deployment | Performance, Accessibility, SEO | Deploy Workflow |
| Accessibility | Lighthouse (WCAG 2.1 AA) | Post-deployment | All pages audited | Target: Score 100 |
| Attestation Type | Tool | Level | Verification |
|---|---|---|---|
| Build Provenance | GitHub Attestations | SLSA Level 3 | gh attestation verify |
| Release Attestation | actions/attest-build-provenance | SLSA Level 3 | Signed build provenance |
Verification Command:
gh attestation verify <release-asset> --owner Hack23| Dimension | Assessment | Rationale |
|---|---|---|
| Product Type | Static HTML/CSS website | No server-side execution, no user data processing |
| CRA Classification | Standard (Non-commercial OSS) | Self-assessment approach sufficient |
| Overall Risk | Very Low | Minimal attack surface, read-only content delivery |
| Compliance Status | β Conformant | All applicable CRA requirements addressed |
- Minimal Attack Surface: Static website with no server-side code eliminates entire categories of vulnerabilities (injection, authentication bypass, session hijacking)
- Defense in Depth: Despite minimal risk, comprehensive security controls are applied (AWS CloudFront, TLS 1.3, security headers, supply chain security)
- Transparency: Full security architecture, threat model, and CRA assessment published as open-source documentation
- Automated Security: Continuous security scanning (CodeQL, ZAP, Scorecard, Dependabot) with automated remediation
- ISMS Integration: Aligned with ISO 27001, NIST CSF 2.0, CIS Controls v8.1 through Hack23 ISMS
This self-assessment confirms that the Hack23 Homepage meets applicable EU Cyber Resilience Act requirements for a Standard-classified non-commercial open-source software product. The static nature of the website, combined with comprehensive security controls and continuous monitoring, ensures a robust security posture with very low residual risk.
| ISMS Policy | Relevance | Implementation |
|---|---|---|
| Secure Development Policy | CI/CD security, code review | Branch protection, automated scanning, PR reviews |
| Vulnerability Management | Vulnerability handling | Dependabot, CodeQL, ZAP, defined SLAs |
| Network Security Policy | CDN and TLS configuration | CloudFront TLS 1.3, security headers |
| Cryptography Policy | Encryption standards | AES-256 at rest, TLS 1.3 in transit |
| Access Control Policy | Deployment access | AWS OIDC, GitHub branch protection |
| Incident Response Plan | Security incident handling | Defined procedures, contact channels |
| Backup & Recovery Policy | DR strategy | S3 versioning, GitHub Pages fallback |
| Risk Register | Risk tracking | Integrated with threat model |
| Compliance Checklist | Multi-framework compliance | ISO 27001, NIST CSF, CIS Controls |