What are the CSDDD requirements?
At a high level, CSDDD requires in-scope companies to embed due diligence into governance and day-to-day workflows. They must demonstrate how they identify and address actual and potential adverse human rights and environmental impacts connected to their own operations, subsidiaries, and relevant business partners in their “chain of activities.”
But “high level” is where many programs get stuck. To execute, it helps to translate legal obligations into a repeatable operating model with clear ownership, workflows, and evidence.
In practice, CSDDD requirements usually become six connected capabilities:

1. Governance and policy integration
The CSDDD isn’t a standalone questionnaire project. It’s an enterprise risk discipline. Companies must integrate due diligence into relevant policies and risk management systems and maintain a due diligence policy that is risk-based.
What this means operationally:
- A single accountable owner for due diligence design (often procurement and compliance in tandem)
- A code of conduct that can be extended contractually through supplier relationships
- A documented decision logic for “what gets assessed first” (risk-based prioritization)
2. Scope mapping across the chain of activities
One of the most important practical distinctions in the CSDDD is the chain of activities concept. It covers upstream business partners tied to the production and provision of services (extraction, sourcing, design, manufacture, transport, storage, supply) and downstream partners linked to the distribution, transport, and storage of products under certain conditions.
That means your “scope” is not just Tier 1 supplier onboarding. You need a structured way to map categories, regions, and business relationships—then focus effort where adverse impacts are most likely.
3. Risk identification and prioritization you can defend
Most companies can produce a heatmap. Fewer can explain—clearly and consistently—why they assessed Supplier A this quarter but not Supplier B, and what evidence drove that decision.
A defensible approach typically combines:
- Inherent risk signals (country, sector, commodity)
- Relationship context (spend, leverage, criticality, substitutability)
- Event signals (credible allegations, complaints, incidents)
- Supplier-provided data (self-assessments, audits, certifications—validated where needed)
The CSDDD’s logic is not “assess everything equally.” It’s prioritize intelligently, then show your prioritization criteria and actions.
4. Prevention, mitigation, and corrective action (not just scoring)
A common mistake is to treat supplier risk as a “rating output.” The CSDDD pushes companies to act: prevention plans, corrective action plans, timelines, and follow-up. Your program needs to produce measurable change, not just documentation.
Practically, that means:
- Clear remediation pathways per risk type (e.g., recruitment fees, excessive overtime, wastewater discharge)
- Supplier engagement that’s structured and scalable (templates, workflows, owner assignment)
- Proof of progress (evidence requests, milestone tracking, re-assessment)
5. Grievance, complaints, and response
Even strong supplier programs struggle with “incoming signals”: worker feedback, NGO allegations, media reports, whistleblower reports, and internal escalations. The CSDDD expects companies to be able to receive concerns and act on them.
To make this real, you need:
- Intake channels (internal and external)
- A triage logic (severity, credibility, proximity)
- Case management (tasks, owners, deadlines, outcomes)
- Documentation designed for audits and regulatory review
6. Monitoring and audit-ready communication
The CSDDD doesn’t reward heroics at year-end. It favors continuous monitoring and clear evidence trails.
Your core deliverables should be:
- A living risk register (not a static spreadsheet)
- Versioned policies and supplier communications
- A record of assessments, findings, and corrective actions
- Management reporting that shows progress and gaps