
9
min reading time
Manufacturers of connected devices face a complex regulatory timeline. While the RED Delegated Act (RED-DA) requirements for cybersecurity are now mandatory, the CRA is rapidly approaching.
Manufacturers who ignore the 2025 deadline risk being locked out of the market immediately. However, those who comply correctly will gain a significant head start on the CRA.
The key is to view the timeline not as two separate hurdles, but as a phased rollout. As discussed in RED Compliance Beyond Europe, treating these requirements as a design baseline rather than a checklist ensures that the compliance work performed today is not an administrative burden to be discarded, but the first step in a long-term security strategy.

The connection between the two regulations is the harmonized standard: EN 18031.
The RED-DA, which introduces Articles 3.3(d) (Network Protection), 3.3(e) (Data & Privacy), and 3.3(f) (Fraud Prevention), is supported by the EN 18031 series. As detailed in Cybersecurity in RED: Adapting to Articles 3.3(d), (e), and (f), aligning with these pillars early transforms the certification journey into a smoother, more predictable process.
This approach is especially critical for high-tech sectors; for instance, see RED Certification in the Age of 5G: Adapting to New Risks to understand how these standards tackle the unique challenges of next-gen connectivity.
This standard is the key to an efficient, long-term strategy:
Therefore, investing in compliance with EN 18031 for the 2025 RED deadline is not a temporary fix. It is the most direct method for building the technical file, testing evidence, and internal processes that will be directly reusable for demonstrating CRA conformity.
This is particularly valuable for self-declaration (Module A), allowing you to transition smoothly without starting your testing from scratch.

Navigating this transition requires more than just testing; it requires a roadmap that connects today's requirements with tomorrow's regulations.
CCLab provides end-to-end testing and guidance to help manufacturers use a single compliance effort to meet both the RED and CRA deadlines. As highlighted in Navigating RED Compliance Strategies, integrating expert guidance into the development cycle dramatically reduces the likelihood of late-stage certification issues.
As an accredited laboratory for testing against the RED-DA (Articles 3.3d, e, f), we support your transition through:
For specific details on how we handle these requirements, you can visit our RED cybersecurity service page.

The RED-DA and CRA timelines are not a conflict, but a phased rollout. The August 2025 RED deadline was the first, non-negotiable step for ensuring the cybersecurity of radio equipment.
By leveraging the EN 18031 standard to meet this deadline, manufacturers can build a durable and efficient compliance foundation that directly translates to CRA conformity.
This approach is also compatible with broader frameworks. As you look toward the future, familiarizing yourself with Official Common Criteria resources can further help in understanding the high-assurance evaluations that may be required for critical components under the CRA.
Partnering with CCLab ensures this work is done right once, securing market access for 2025 and providing a clear, cost-effective path to 2027 CRA compliance.
The takeaway: Don't treat 2025 as the finish line. Use it as the launchpad for your CRA strategy.


The EU Cyber Resilience Act (CRA) introduces a unified cybersecurity framework for products with digital elements that have direct or indirect, logical or physical data connection to a device or network, including everything from software or hardware products to free and open-source software that is monetized or integrated into commercial products.

This article provides a strategic guide to the new EUCC assurance levels, explaining what "Substantial" and "High" certifications actually mean for your market access. It demystifies the critical shift from simple EAL numbers to risk-based vulnerability analysis (AVA_VAN), detailing exactly which products require advanced penetration testing versus basic surveys. You will learn how to map your device to the correct assurance category, navigate the new mandatory lifecycle and patching requirements, and avoid the costly trap of over-engineering your compliance strategy.
5
min reading time

This is a comprehensive overview of the transition to EUCC (European Common Criteria-based cybersecurity certification scheme). It effectively highlights the shift from the old, fragmented SOG-IS approach to a unified, risk-based framework under the Cybersecurity Act.
8
min reading time

The newly enforced AI Act significantly shifts the regulatory landscape for hardware manufacturers by explicitly listing the Radio Equipment Directive (RED) as critical safety legislation. If a radio device uses AI for mandatory functions like network protection or data privacy, it will likely be classified as a "High-Risk AI System" under these new rules. This classification creates a "Double Lock" on compliance, requiring manufacturers to integrate AI-specific audits into their existing 2025 RED conformity assessments. Failing to plan for this overlap today is a strategic error that could force a total product redesign by 2027 when the regulations fully converge. By adopting an integrated compliance strategy now, manufacturers can ensure long-term market access and avoid the costs of redundant testing.
9
min reading time