
9
min reading time
Manufacturers of connected devices face a complex regulatory timeline. While the RED Delegated Act (RED-DA) requirements for cybersecurity are now mandatory, the CRA is rapidly approaching.
Manufacturers who ignore the 2025 deadline risk being locked out of the market immediately. However, those who comply correctly will gain a significant head start on the CRA.
The key is to view the timeline not as two separate hurdles, but as a phased rollout. As discussed in RED Compliance Beyond Europe, treating these requirements as a design baseline rather than a checklist ensures that the compliance work performed today is not an administrative burden to be discarded, but the first step in a long-term security strategy.

The connection between the two regulations is the harmonized standard: EN 18031.
The RED-DA, which introduces Articles 3.3(d) (Network Protection), 3.3(e) (Data & Privacy), and 3.3(f) (Fraud Prevention), is supported by the EN 18031 series. As detailed in Cybersecurity in RED: Adapting to Articles 3.3(d), (e), and (f), aligning with these pillars early transforms the certification journey into a smoother, more predictable process.
This approach is especially critical for high-tech sectors; for instance, see RED Certification in the Age of 5G: Adapting to New Risks to understand how these standards tackle the unique challenges of next-gen connectivity.
This standard is the key to an efficient, long-term strategy:
Therefore, investing in compliance with EN 18031 for the 2025 RED deadline is not a temporary fix. It is the most direct method for building the technical file, testing evidence, and internal processes that will be directly reusable for demonstrating CRA conformity.
This is particularly valuable for self-declaration (Module A), allowing you to transition smoothly without starting your testing from scratch.

Navigating this transition requires more than just testing; it requires a roadmap that connects today's requirements with tomorrow's regulations.
CCLab provides end-to-end testing and guidance to help manufacturers use a single compliance effort to meet both the RED and CRA deadlines. As highlighted in Navigating RED Compliance Strategies, integrating expert guidance into the development cycle dramatically reduces the likelihood of late-stage certification issues.
As an accredited laboratory for testing against the RED-DA (Articles 3.3d, e, f), we support your transition through:
For specific details on how we handle these requirements, you can visit our RED cybersecurity service page.

The RED-DA and CRA timelines are not a conflict, but a phased rollout. The August 2025 RED deadline was the first, non-negotiable step for ensuring the cybersecurity of radio equipment.
By leveraging the EN 18031 standard to meet this deadline, manufacturers can build a durable and efficient compliance foundation that directly translates to CRA conformity.
This approach is also compatible with broader frameworks. As you look toward the future, familiarizing yourself with Official Common Criteria resources can further help in understanding the high-assurance evaluations that may be required for critical components under the CRA.
Partnering with CCLab ensures this work is done right once, securing market access for 2025 and providing a clear, cost-effective path to 2027 CRA compliance.
The takeaway: Don't treat 2025 as the finish line. Use it as the launchpad for your CRA strategy.


The EU Cyber Resilience Act (CRA) introduces a unified cybersecurity framework for products with digital elements that have direct or indirect, logical or physical data connection to a device or network, including everything from software or hardware products to free and open-source software that is monetized or integrated into commercial products.

The August 1, 2025 deadline for the Radio Equipment Directive (RED) Delegated Act has passed. You have likely spent the last year scrambling to test devices, freeze software, and secure approvals. But just as the dust settles, a new challenge looms: the Cyber Resilience Act (CRA) is now getting in force, with full application expected by December 11, 2027. The immediate worry for many manufacturers is simple: Was the investment for RED wasted? Is the work done for the 2025 deadline just a temporary fix destined to be withdrawn when the CRA takes over? The answer is no, if a strategic approach is taken. The two regulations are "in sync," and the work done for RED-DA is the essential foundation for future CRA compliance.
9
min reading time

Your product is days from launch. A last-minute test exposes an OTA configuration path that 5G network slicing can abuse, and now your file is blocked. In the 5G era, small gaps escalate fast. The fix isn’t one more patch; it’s designing RED cybersecurity into the way your device behaves on modern networks, before certification even starts.
6
min reading time

The journey of achieving Common Criteria certification represents just the beginning of a complex, ongoing process that demands continuous attention and strategic management. Organizations worldwide invest significant resources in obtaining these prestigious security certifications, yet many underestimate the critical importance of proper lifecycle management once their products become Common Criteria certified. Effective CC certification lifecycle management ensures continuous security assurance, regulatory compliance, and market credibility throughout a product’s operational lifespan.
9
min reading time