
9
min reading time
Manufacturers of connected devices face a complex regulatory timeline. While the RED Delegated Act (RED-DA) requirements for cybersecurity are now mandatory, the CRA is rapidly approaching.
Manufacturers who ignore the 2025 deadline risk being locked out of the market immediately. However, those who comply correctly will gain a significant head start on the CRA.
The key is to view the timeline not as two separate hurdles, but as a phased rollout. As discussed in RED Compliance Beyond Europe, treating these requirements as a design baseline rather than a checklist ensures that the compliance work performed today is not an administrative burden to be discarded, but the first step in a long-term security strategy.

The connection between the two regulations is the harmonized standard: EN 18031.
The RED-DA, which introduces Articles 3.3(d) (Network Protection), 3.3(e) (Data & Privacy), and 3.3(f) (Fraud Prevention), is supported by the EN 18031 series. As detailed in Cybersecurity in RED: Adapting to Articles 3.3(d), (e), and (f), aligning with these pillars early transforms the certification journey into a smoother, more predictable process.
This approach is especially critical for high-tech sectors; for instance, see RED Certification in the Age of 5G: Adapting to New Risks to understand how these standards tackle the unique challenges of next-gen connectivity.
This standard is the key to an efficient, long-term strategy:
Therefore, investing in compliance with EN 18031 for the 2025 RED deadline is not a temporary fix. It is the most direct method for building the technical file, testing evidence, and internal processes that will be directly reusable for demonstrating CRA conformity.
This is particularly valuable for self-declaration (Module A), allowing you to transition smoothly without starting your testing from scratch.

Navigating this transition requires more than just testing; it requires a roadmap that connects today's requirements with tomorrow's regulations.
CCLab provides end-to-end testing and guidance to help manufacturers use a single compliance effort to meet both the RED and CRA deadlines. As highlighted in Navigating RED Compliance Strategies, integrating expert guidance into the development cycle dramatically reduces the likelihood of late-stage certification issues.
As an accredited laboratory for testing against the RED-DA (Articles 3.3d, e, f), we support your transition through:
For specific details on how we handle these requirements, you can visit our RED cybersecurity service page.

The RED-DA and CRA timelines are not a conflict, but a phased rollout. The August 2025 RED deadline was the first, non-negotiable step for ensuring the cybersecurity of radio equipment.
By leveraging the EN 18031 standard to meet this deadline, manufacturers can build a durable and efficient compliance foundation that directly translates to CRA conformity.
This approach is also compatible with broader frameworks. As you look toward the future, familiarizing yourself with Official Common Criteria resources can further help in understanding the high-assurance evaluations that may be required for critical components under the CRA.
Partnering with CCLab ensures this work is done right once, securing market access for 2025 and providing a clear, cost-effective path to 2027 CRA compliance.
The takeaway: Don't treat 2025 as the finish line. Use it as the launchpad for your CRA strategy.


The EU Cyber Resilience Act (CRA) introduces a unified cybersecurity framework for products with digital elements that have direct or indirect, logical or physical data connection to a device or network, including everything from software or hardware products to free and open-source software that is monetized or integrated into commercial products.

The era of unregulated smart devices has officially come to an end. With the European Union having rolled out stringent regulations like the Cyber Resilience Act (CRA), manufacturers can no longer treat cybersecurity as an afterthought. Whether you are producing smart cameras, wearable health trackers, or connected home appliances, navigating this evolving regulatory landscape is critical. Fortunately, a globally recognized standard has emerged to cut through the complexity: ETSI EN 303 645. This guide breaks down exactly how this foundational standard acts as your security passport, ensuring your devices meet the rigorous compliance demands of today's market.
min reading time

This article provides a comprehensive guide to meeting consumer IoT security standards using the ETSI EN 303 645 framework. It explains why this standard has become the global baseline for compliance, serving as a critical foundation for regulations like the UK PSTI Act and the upcoming EU Cyber Resilience Act (CRA). The post breaks down the 13 essential security provisions, such as banning default passwords and securing software updates, and outlines a structured assessment path from scope definition to accredited testing. Learn how to treat security as a design constraint to avoid market delays, leverage gap analysis for early detection of vulnerabilities, and turn technical compliance into a trusted competitive edge for your smart devices.
min reading time

The Cyber Resilience Act (CRA) is a landmark EU regulation that establishes a horizontal framework for the cybersecurity of products with digital elements (hardware and software). This sweeping EU cybersecurity law represents a massive shift for the industry. Its goal is to ensure that products are placed on the market without known exploitable vulnerabilities and that manufacturers remain responsible for cybersecurity throughout the product's entire lifecycle. With all requirements of the CRA becoming fully applicable on December 11, 2027, the window for preparation is closing. Manufacturers who view this simply as a regulatory hurdle are missing a critical opportunity. By prioritizing CRA readiness now, you can transform a mandatory product compliance strategy into a distinct market differentiator.
min reading time