
9
min reading time
Manufacturers of connected devices face a complex regulatory timeline. While the RED Delegated Act (RED-DA) requirements for cybersecurity are now mandatory, the CRA is rapidly approaching.
Manufacturers who ignore the 2025 deadline risk being locked out of the market immediately. However, those who comply correctly will gain a significant head start on the CRA.
The key is to view the timeline not as two separate hurdles, but as a phased rollout. As discussed in RED Compliance Beyond Europe, treating these requirements as a design baseline rather than a checklist ensures that the compliance work performed today is not an administrative burden to be discarded, but the first step in a long-term security strategy.

The connection between the two regulations is the harmonized standard: EN 18031.
The RED-DA, which introduces Articles 3.3(d) (Network Protection), 3.3(e) (Data & Privacy), and 3.3(f) (Fraud Prevention), is supported by the EN 18031 series. As detailed in Cybersecurity in RED: Adapting to Articles 3.3(d), (e), and (f), aligning with these pillars early transforms the certification journey into a smoother, more predictable process.
This approach is especially critical for high-tech sectors; for instance, see RED Certification in the Age of 5G: Adapting to New Risks to understand how these standards tackle the unique challenges of next-gen connectivity.
This standard is the key to an efficient, long-term strategy:
Therefore, investing in compliance with EN 18031 for the 2025 RED deadline is not a temporary fix. It is the most direct method for building the technical file, testing evidence, and internal processes that will be directly reusable for demonstrating CRA conformity.
This is particularly valuable for self-declaration (Module A), allowing you to transition smoothly without starting your testing from scratch.

Navigating this transition requires more than just testing; it requires a roadmap that connects today's requirements with tomorrow's regulations.
CCLab provides end-to-end testing and guidance to help manufacturers use a single compliance effort to meet both the RED and CRA deadlines. As highlighted in Navigating RED Compliance Strategies, integrating expert guidance into the development cycle dramatically reduces the likelihood of late-stage certification issues.
As an accredited laboratory for testing against the RED-DA (Articles 3.3d, e, f), we support your transition through:
For specific details on how we handle these requirements, you can visit our RED cybersecurity service page.

The RED-DA and CRA timelines are not a conflict, but a phased rollout. The August 2025 RED deadline was the first, non-negotiable step for ensuring the cybersecurity of radio equipment.
By leveraging the EN 18031 standard to meet this deadline, manufacturers can build a durable and efficient compliance foundation that directly translates to CRA conformity.
This approach is also compatible with broader frameworks. As you look toward the future, familiarizing yourself with Official Common Criteria resources can further help in understanding the high-assurance evaluations that may be required for critical components under the CRA.
Partnering with CCLab ensures this work is done right once, securing market access for 2025 and providing a clear, cost-effective path to 2027 CRA compliance.
The takeaway: Don't treat 2025 as the finish line. Use it as the launchpad for your CRA strategy.


The EU Cyber Resilience Act (CRA) introduces a unified cybersecurity framework for products with digital elements that have direct or indirect, logical or physical data connection to a device or network, including everything from software or hardware products to free and open-source software that is monetized or integrated into commercial products.

Legacy systems power critical operations across industries worldwide, yet they present unique challenges when organizations pursue Common Criteria certification. The clock is ticking for manufacturers and enterprises who must navigate complex compliance requirements while maintaining operational continuity. Organizations pursuing Common Criteria certification must address unique challenges when dealing with legacy infrastructure, but with the right approach, success is achievable. The urgency cannot be overstated. Regulatory deadlines approach rapidly, and the cost of non-compliance continues to escalate. Legacy systems that once served as reliable workhorses now require strategic transformation to meet modern security standards. This guide provides actionable strategies to prepare your legacy infrastructure for certification success.
10
min reading time
.jpg)
This article provides an in-depth overview of the EU Cyber Resilience Act (CRA), explaining why the regulation was introduced, its key security requirements, conformity assessment routes such as Module A, the role of harmonized standards, and the lifecycle obligations manufacturers must meet.
10
min reading time

The August 1, 2025 deadline for the Radio Equipment Directive (RED) Delegated Act has passed. You have likely spent the last year scrambling to test devices, freeze software, and secure approvals. But just as the dust settles, a new challenge looms: the Cyber Resilience Act (CRA) is now getting in force, with full application expected by December 11, 2027. The immediate worry for many manufacturers is simple: Was the investment for RED wasted? Is the work done for the 2025 deadline just a temporary fix destined to be withdrawn when the CRA takes over? The answer is no, if a strategic approach is taken. The two regulations are "in sync," and the work done for RED-DA is the essential foundation for future CRA compliance.
9
min reading time