Cavli Wireless

With IoT security taking center stage in global technology discussions, the Cyber Resilience Act (CRA) has emerged as a critical regulatory framework that cannot be overlooked. Why is there a sudden spotlight on CRA now? Are other certifications now becoming obsolete?

"The EU Cyber Resilience Act (EU CRA) entered into force on December 10, 2024. EU CRA implementation strengthens the cybersecurity of products with digital elements (PDEs) placed in the EU market by introducing mandatory cybersecurity requirements for manufacturers."

Here is a detailed deep dive into the latest trends in the IoT security domain and the growing traction of CRA in the IoT industry, especially in the European market.

What is the EU Cyber Resilience Act?

The EU Cyber Resilience Act (EU CRA) entered into force on December 10, 2024. EU CRA implementation strengthens the cybersecurity of products with digital elements (PDEs) placed in the EU market by introducing mandatory cybersecurity requirements for manufacturers. Under the EU CRA regulation, all software and hardware products with digital elements that connect to a network should meet the mandatory cybersecurity requirements from the design and development stage, and handle vulnerability patches during the entire lifecycle of the product.
 


Several IoT security regulations have already been introduced globally to improve device security and compliance. Frameworks such as the EU CE RED certification, the US Cyber Trust Mark, and the Network and Information Security Directive (NIS) have been in place for some time and continue to guide manufacturers in building secure connected devices.

The latest framework gaining significant traction on this list is the EU Cyber Resilience Act, or CRA.

CRA is the rulebook that guides manufacturers on how software and hardware devices should be designed, updated, and maintained to protect end customers. Under the CRA, some product categories may need third-party conformity assessment by notified bodies, while others may be assessed through self-assessment, depending on the product category and the standards applied.

Why is the Cyber Resilience Act crucial for IoT security?

In today's digital landscape, the threat landscape for connected devices is evolving rapidly. The CRA provides a much-needed framework that ensures these devices meet stringent security standards throughout their lifecycle, from design to deployment to patching. The focus on cybersecurity is essential to reduce vulnerabilities and safeguard data and privacy.

IoT devices, which are deeply integrated into our daily lives, need to be protected against a growing number of cyber threats. Whether it is a sensor, gateway, or cloud service, each component of the IoT ecosystem is a potential target for cyber-attacks. The CRA's proactive approach to IoT security establishes a consistent standard for manufacturers to follow, which helps reduce the overall risks in the IoT supply chain.

Given that many of the IoT devices are connected to sensitive environments, such as healthcare, finance, or critical infrastructure, the CRA ensures that they remain resilient in the face of increasing cyber threats.

Why are Cybersecurity Certifications in IoT Security a Non-Negotiable?
 

Cybersecurity certifications for IoT devices are evolving from a best practice to a legal mandate. In this scenario, what is the importance of cybersecurity certifications in IoT devices?

The advantages of IoT certifications for manufacturers include:

  • Marketing differentiation: Certified products or those undergoing certification tend to receive more attention than uncertified products.
  • Ahead of the curve: Planning for certification in advance avoids rushed work when deadlines approach and mitigates potential delays in time-to-market.
  • Customer Trust: Achieving IoT certifications throughout the product development lifecycle builds customer trust and improves market penetration.

The Importance of IoT Cybersecurity Certifications

IoT cybersecurity certifications go beyond testing a product. They represent an integrated approach, starting right from consulting to understand the product’s intended ecosystem, followed by testing, reporting, certification assistance, and more.

What Manufacturers Need to Know About the EU Cyber Resilience Act (EU CRA)?
 


The Cyber Resilience Act (CRA) is a new EU regulation, with over 130 articles and 4 annexes, to ensure that hardware and software products with digital elements are designed, developed, and maintained in line with mandatory cybersecurity requirements.

Earlier, vulnerability-handling obligations were often defined by company policy or sector-specific requirements and were commonly limited to a fixed support period (typically 5 years).

The CRA puts forward a secure-by-design approach for all software and hardware products, making it compulsory by law.

Manufacturers are now required to address vulnerabilities and support product security for the declared support period, the expected lifetime of the product, or a minimum of five years, whichever is longer. Non-compliance with this will result in monetary penalties for manufacturers.

 

 

The first mandatory reporting date for manufacturers to comply with CRA is 11 September 2026, when actively exploited vulnerabilities and severe incidents must be reported to the relevant CSIRT via the CRA Single Reporting Platform. Complete CRA compliance is required by 11 December 2027, and the realistic roadmap advises beginning preparation for this transition at least 18 months in advance.

EU Cyber Resilience Act (EU CRA) Requirements and Their Impact on Cybersecurity

The Cyber Resilience Act (CRA) requirements outline several key components to enhance cybersecurity for digital products. These components include:

CategoryKey Items in EU CRA
Risk AssessmentsConduct mandatory cybersecurity risk assessments and ongoing vulnerability testing.
Security RequirementsImplement secure-by-design practices (e.g., encryption, MFA, threat modeling).
Vulnerability ReportingPromptly report and address vulnerabilities with clear documentation.
Security UpdatesProvide free security updates for at least five years, or the product's expected usage period if shorter.
PenaltiesFines up to €15 million or 2.5% of global turnover for non-compliance.
SBOM TransparencyMaintain a detailed inventory of software components to identify and mitigate risks.
Continuous Risk MitigationRegular penetration testing and real-time threat monitoring throughout the product lifecycle.
Supply Chain TransparencyEnsure third-party suppliers follow secure cybersecurity practices.

 

Secure by design

At the design stage, manufacturers implement secure-by-design practices to reduce cybersecurity threats. This includes threat modeling, access controls (e.g., MFA), data encryption, secure communication protocols (TLS, VPN), and continuous penetration testing. Additionally, minimizing third-party dependencies and enabling OTA updates ensures ongoing security throughout the product lifecycle.

Comprehensive documentation

Comprehensive documentation is critical in the Cyber Resilience Act (CRA) because it ensures full transparency and accountability throughout the product lifecycle. It involves documenting threat models, vulnerability logs, risk assessments, and mitigation strategies in detail. It enables manufacturers to demonstrate compliance with regulatory requirements and provides a clear audit trail for cybersecurity decisions made during design, development, and post-release.

Software Bill of Materials (SBOM) transparency

Software Bill of Materials (SBOM) Transparency plays a crucial role in Cyber Resilience Act (CRA) compliance by providing an in-depth, detailed inventory of all software components, libraries, and dependencies used within a product. With a full SBOM, manufacturers can identify software dependencies (e.g., libraries or packages) that could introduce security risks. SBOM transparency accelerates the response time when new threats or vulnerabilities emerge and allows for the application of fixes without delay.

Continuous risk assessment and mitigation

Continuous Vulnerability Assessment and Mitigation requires manufacturers to integrate ongoing security testing throughout the product lifecycle. This includes regular penetration testing, static/dynamic analysis, and real-time threat monitoring. Identified vulnerabilities are logged, prioritized, and mitigated with patches or updates, ensuring products remain secure against emerging threats and minimizing risks from newly discovered vulnerabilities over time.

Supply chain transparency

Supply Chain Transparency requires manufacturers to gain full visibility into the cybersecurity practices of all third-party suppliers involved in the product’s development, including hardware, software, and service providers. The goal is to minimize risks that could arise from vulnerabilities introduced by external partners, whether through components, code, or outsourced services.

The Intersection of EU CRA, NIS2, and RED: A Unified Approach to EU Cybersecurity Compliance

EU Radio Equipment Directive (RED)

The EU Radio Equipment Directive (RED), adopted in 2014, regulates the placement of radio and telecommunications equipment on the European market to ensure it meets essential health, safety, and electromagnetic compatibility (EMC) requirements. It applies to a wide range of products, including smartphones, IoT devices, and wireless communication equipment. The directive ensures that these products do not cause harmful interference with other electronic devices and meet standards for radio frequency (RF) performance.

RED requires manufacturers to conduct conformity assessments and affix the CE mark to demonstrate compliance. It also mandates that devices include clear instructions and information on safe usage. Additionally, the directive ensures that end users are protected from the potential risks posed by electromagnetic radiation and guarantees that devices are compatible with EU-wide radio spectrum policies.

Network and Information Security Directive (NIS)

The NIS Directive (Network and Information Systems Directive), introduced in 2016, was the first EU-wide regulation aimed at improving cybersecurity for essential services and digital infrastructure. It focused on sectors critical to public health, safety, and the economy, such as energy, transport, banking, healthcare, and water supply. Under NIS, companies in these sectors must adhere to specific security requirements and report cyber incidents within a set timeframe.

The NIS2 Directive, adopted in 2020, builds on and strengthens the original NIS framework. It broadens the scope to include medium and large organizations in both essential services and digital services, like cloud providers and online marketplaces. NIS2 introduces stricter incident reporting timelines, more robust risk management practices, and penalties for non-compliance, including monetary fines of up to €10 million or 2% of global annual turnover. Non-monetary penalties may include corrective actions and public disclosures of security failures, aiming to enhance cybersecurity resilience across the EU.

EU RED vs NIS vs CRA Regulation

AspectRadio Equipment Directive (RED)Network and Information Security Directive (NIS)CRA (Cyber Resilience Act)
Enforced onJune 2016January 2023December 2027 (partial enforcement by 11 June 2026)
Primary FocusSafety and electromagnetic compatibility of radio and telecommunications equipmentCybersecurity for critical infrastructure and digital servicesCyber resilience of connected devices and software, and protection from cyber risks
ScopeApplies to radio and telecommunications equipment (e.g., IoT devices) sold in the EUApplies to operators of essential services (OES) and digital service providers (DSPs)Applies to all connected devices and services in the EU market, focusing on security
Main Requirements- Product safety
- Electromagnetic compatibility
- Radio spectrum compliance
- Risk management
- Incident reporting
- Security of networks and information systems
- Cybersecurity risk management
- Requirements for vulnerability reporting
- Product security for connected devices
Targeted EntitiesManufacturers of radio equipment and telecom devicesCritical infrastructure and digital service providers (e.g., energy, transport, health sectors)Manufacturers and distributors of connected products and software
Cybersecurity RequirementsLimited to safety and electromagnetic complianceYes, addresses cyber risk management and incident reportingYes, focuses heavily on cyber resilience and protection against cyber threats
Key Compliance AspectsConformity assessments, CE marking, and product testing for safety and complianceRisk assessment, security controls for services, incident handlingVulnerability management, security updates, cyber resilience testing for products
PenaltiesPenalties for non-compliance (restrictions on market entry)Penalties for non-compliance (fines and sanctions)Penalties for non-compliance (fines, bans on sale of non-compliant products)
Cybersecurity FrameworkNot focused on cybersecurity, but safety and complianceAddresses cyber resilience through risk managementDirectly targets cybersecurity for IoT devices and software
Cyber Incident ResponseNo specific focus on incident response or cybersecurity incidentsRequires incident reporting within a certain timeframeRequires cybersecurity incident reporting and vulnerability management

Key Requirements for Achieving CRA Compliance: A Step-by-Step Guide

Product Categorization in the EU CRA

 

 

  • Non-Critical Products
    • These are products with lower cybersecurity risk profiles associated with their digital elements. Examples include:
      • Hard drives
      • Toys
      • Photo editors
      • Word processors
  • Important Products
    • Class I Products: Products that manage sensitive operations or data, such as:
      • Identity management systems
      • Biometric readers
      • Password managers
      • Virtual private networks (VPNs)
      • Network management systems
    • Class II Products: Products for more critical security tasks, including:
      • Hypervisors
      • Industrial firewalls
      • Tamper-resistant microcontrollers
  • Critical Products
    • These include products with high-security requirements, and the examples are:
      • Hardware Security Modules (HSM)
      • Smart meter gateways
      • Devices for advanced cryptographic functions

This classification helps manufacturers and regulators apply different security requirements depending on the product’s level of risk, ensuring stronger protection for higher-risk products.

Cybersecurity Risk Assessment

The Cyber Resilience Act (CRA) requirements mandate that manufacturers conduct a cybersecurity risk assessment before launching their products. This process is designed to identify potential cybersecurity threats and vulnerabilities. Manufacturers are required to document these risks, assess potential impacts, and implement appropriate security measures to mitigate identified vulnerabilities.

The risk assessment must cover:

  • Product security from design through the entire lifecycle.
  • Vulnerability management to ensure that vulnerabilities are discovered, reported, and addressed promptly.
  • Compliance with technical documentation requirements, providing end users with security information, and safety guidelines.

This approach ensures that products placed on the market are secure, reducing the risk of cyberattacks and improving overall cyber resilience within the EU's digital ecosystem.

Product Documentation

According to the EU Cyber Resilience Act (EU CRA), manufacturers of IoT products must enhance their product documentation to include comprehensive security and compliance information throughout the product's lifecycle. The documentation requirements include:

Technical Documentation

This must cover relevant cybersecurity details, such as identified vulnerabilities, third-party information, and updates to the risk assessment.

Conformity Declaration

This document demonstrates the product's compliance with essential cybersecurity requirements.

User Instructions

These guides must provide clear, understandable instructions for safe installation, operation, and usage, ensuring users and authorities can easily follow security protocols.

All documentation must be retained for at least 10 years or the duration of the product's support period, whichever is longer, ensuring transparency, accountability, and continued security compliance throughout the product's lifecycle.

Vulnerability Reporting and Handling

The EU Cyber Resilience Act (EU CRA) mandates that manufacturers implement structured procedures for vulnerability reporting and handling, which is a crucial aspect of maintaining cybersecurity in IoT products. The key elements of this process include:

Vulnerability Identification & Monitoring

Continuous monitoring for potential vulnerabilities, including regular assessments and security scans, is required. This includes both internal systems and third-party components.

Log Maintenance

Manufacturers must maintain detailed logs of identified vulnerabilities, actions taken, and communications in line with the CRA’s retention requirements.

Escalation Metrics

Vulnerabilities must be categorized and escalated according to their risk severity.

Vulnerability Disclosure to ENISA

When a vulnerability is detected, manufacturers should notify through the CRA Single Reporting Platform to the relevant CSIRT, with the information made available to ENISA, within specified timeframes.

 

 

First Vulnerability Warning

An early warning must be submitted within 24 hours of becoming aware of an actively exploited vulnerability or severe incident.

Follow-up

A full notification must be submitted within 72 hours with detailed information on affected devices, versions, and their mitigation status.

Final Report

The detailed report should be presented within 14 days after a corrective measure is available for actively exploited vulnerabilities, and within one month for severe incidents.

Coordinated Vulnerability Disclosure Policy (CVD Policy)

The EU Cyber Resilience Act (EU CRA) mandates implementing a Coordinated Vulnerability Disclosure (CVD) policy to enhance cybersecurity within the European Union, particularly for products such as IoT devices. CVD refers to the process of responsibly disclosing security vulnerabilities to ensure they are properly addressed before malicious actors can exploit them. Key Points on CVD under the CRA regulation are:

Vulnerability Disclosure Requirement

The EU CRA regulation requires manufacturers to have a clear Coordinated Vulnerability Disclosure policy in place. Here, the vulnerabilities discovered in products are reported in a controlled manner to allow for timely fixes and patches, protecting end-users and preventing exploitation.

Role of Manufacturers

Manufacturers must provide mechanisms for securely receiving vulnerability reports from researchers, security experts, or the public.

Disclosure to Authorities (ENISA)

Critical vulnerabilities and active incidents must be disclosed through the CRA Single Reporting Platform to the relevant CSIRT, with the information made available to ENISA, within 24 hours for an early warning and followed by a full notification within 72 hours.

Collaboration Between Stakeholders

CVD facilitates collaboration between manufacturers, security researchers, and government bodies. This coordinated approach ensures that vulnerabilities are addressed transparently and efficiently, minimizing the risk to end users.

Public Transparency

Once a vulnerability is fixed, manufacturers must make the relevant information public, ensuring transparency. This process is important for building trust and allowing users and organizations to take proactive measures.

CSIRT

Under the EU CRA regulation, manufacturers are required to report security vulnerabilities and actively exploited vulnerabilities through the CRA Single Reporting Platform to the relevant CSIRT, with ENISA also involved in the reporting architecture.

CSIRTs are integral to this process. A Computer Security Incident Response Team (CSIRT) is a team of cybersecurity experts that handles and responds to cybersecurity incidents, including potential and active threats. It is responsible for detecting, managing, mitigating, and recovering from cyber incidents. They often coordinate with other cybersecurity bodies and agencies, such as ENISA, to ensure that cyber incidents are appropriately managed and reported.

 

 

Conformity Assessment

Determine whether the product falls under the default, important, or critical category under the CRA, as this affects whether self-assessment or notified-body involvement is required.

Conformity Assessment Pathways

  • Default Category: For non-critical products, manufacturers can self-assess and issue an EU Declaration of Conformity.
  • Important Products:
    • Class I (no standards applied): Must undergo mandatory external assessment by a Notified Body.
    • Class I (standards applied): Self-assessment allowed if using harmonized standards.
    • Class II: Requires mandatory external assessment.
  • Critical Products: All critical products must undergo mandatory external assessment by a Notified Body.

Transparency & User Trust

  • Ensure transparency about the product's security features by providing clear and accessible documentation that highlights the security measures taken, product risks, and maintenance obligations.

Post-Market Support

  • Provide post-market security updates through the declared support period, which should generally be at least five years unless the product is expected to be used for less than five years. Thus, ensuring these updates are separate from functional upgrades to avoid confusion.
  • Enable secure over-the-air updates to ensure devices can be updated without exposing them to additional risks.

CRA Implications for End Users

The EU Cyber Resilience Act (CRA) improves security for end users of connected products by ensuring manufacturers meet strict cybersecurity standards. It mandates that devices are built securely, with clear usage instructions and regular security updates. The CRA also requires manufacturers to disclose vulnerabilities, keeping users informed about potential risks. This strengthens trust in digital products, reducing the likelihood of cyberattacks and ensuring long-term protection.

How Cavli Wireless is working toward CRA compliance

At Cavli Wireless, we are fully committed to achieving CRA compliance. We are actively aligning our cellular IoT modules, categorized as critical products under the Cyber Resilience Act (CRA), with the required cybersecurity standards. Depending on the final product categorization and conformity pathway, we are undergoing comprehensive assessments and implementing proactive measures to mitigate potential threats, while ensuring that any vulnerabilities are swiftly reported, tracked, and addressed. To enhance transparency, we are streamlining our product documentation, making it easily accessible to both customers and regulatory bodies. In addition, we are dedicated to providing ongoing security updates for our IoT module. As we work towards full compliance by December 2027, we are also ensuring our hardware and software solutions consistently meet the highest cybersecurity standards for high-risk products, in alignment with the EU CRA regulation.

Conclusion

The EU Cyber Resilience Act marks a fundamental shift in how IoT devices are designed, deployed, and maintained. Cybersecurity is no longer an afterthought or a value-add—it is now a regulatory requirement embedded into the product lifecycle.

For IoT manufacturers, this means moving beyond reactive security measures toward a secure-by-design approach, where risk assessment, vulnerability management, and continuous updates are built into every stage of development. From firmware integrity to long-term software support, compliance with EU CRA regulation is as much about process maturity as it is about technology.

The challenge is not just meeting compliance deadlines, but adapting to a new operating model where devices must remain secure throughout their lifecycle, across geographies, networks, and evolving threat landscapes.

Those who act early will not only avoid regulatory risks but also gain a competitive advantage by building trust, reliability, and long-term resilience into their IoT solutions. In the IoT market, where security is becoming a differentiator, CRA compliance is no longer just about regulation; it’s about future-proofing your IoT business.

Go Beyond and Explore

1.

What is the EU Cyber Resilience Act (EU CRA)?

The Cyber Resilience Act is a proposed European Union regulation to enhance cybersecurity standards for digital products and services. It aims to ensure that hardware and software placed on the EU market are secure throughout their lifecycle. This act introduces mandatory requirements for manufacturers, such as secure design, vulnerability management, and timely updates. The Cyber Resilience Act seeks to reduce cybersecurity risks and protect consumers and businesses from increasing cyber threats.
2.

What does CRA compliance involve for businesses?

CRA compliance requires organizations to meet specific cybersecurity standards outlined by the regulation before placing products on the EU market. This includes conducting risk assessments, implementing secure development practices, and maintaining ongoing vulnerability monitoring. Businesses must also provide clear documentation, ensure timely security updates, and report incidents when necessary. Compliance is not a one-time effort but an ongoing responsibility throughout the product lifecycle. Companies that fail to comply may face penalties or restrictions.
3.

How does the EU CRA impact IoT manufacturers?

The EU CRA significantly impacts IoT manufacturers developing products that have digital elements. IoT manufacturers must ensure their products are secure by design, along with protection against unauthorized access and vulnerabilities. They are also required to provide continuous updates and support throughout the product’s lifecycle. Additionally, manufacturers must maintain technical documentation and demonstrate conformity with the regulation. The EU CRA helps manufacturers deliver safer products, reduce risk exposure, and align with evolving cybersecurity expectations in the European Union.
4.

. What are the key Cyber Resilience Act requirements?

The Cyber Resilience Act requirements include secure-by-design product development, vulnerability handling processes, and lifecycle security management. Manufacturers must ensure products are delivered without known exploitable vulnerabilities and include mechanisms for updates and patches. They must also conduct risk assessments and provide transparency through proper documentation. Another key requirement is incident reporting within defined timelines. These measures aim to create a consistent cybersecurity baseline across all digital products in the EU market.
5.

What are CRA regulations, and why are they important?

The Cyber Resilience Act defines cybersecurity obligations for manufacturers, importers, and distributors of digital products with associated software services in the EU market. It establishes clear accountability and ensures that cybersecurity is integrated into every stage of product development and maintenance. CRA regulations also promote transparency and rapid response to vulnerabilities. By enforcing these standards, the EU aims to create a safer digital environment, reduce cyber incidents, and strengthen overall trust in connected technologies.
6.

What does the CRA regulation change in the IoT device market?

CRA regulation introduces significant changes to the IoT device market by enforcing stricter cybersecurity standards across connected devices. Manufacturers must now adopt secure-by-design principles, ensuring devices are protected against vulnerabilities from the outset. It also requires continuous security updates, vulnerability disclosure processes, and clear accountability throughout the product lifecycle. As a result, this drives higher quality and trust in IoT products. CRA regulation reshapes the market by prioritizing security, transparency, and long-term device reliability.

Author

Author

Drishya Manohar

Sr. Associate - Content Marketing

Share

Related Blogs

image

Communication Protocols in IoT

View Blog
IoT Architecture

IoT Architecture Layers Components Importance

View Blog

Meet Our Solution Consulting Team

Still, trying to understand? Book a meeting with our solution consulting team to get you to start your IoT journey in most seamless way.

Featured Videos

Introducing CQM211 | Multi-Gigabit 5G NR for High-Bandwidth IoT Deployments

5G NR

Introducing CQM211 | Multi-Gigabit 5G NR for High-Bandwidth IoT Deployments

Cavli Unplugged: Insider Insights on the Future of IoT!

leadershipinsights

Cavli Unplugged: Insider Insights on the Future of IoT!

Advanced Battery Intelligence with Cavli CQ10

LTE Cat 1 Use Case

Advanced Battery Intelligence with Cavli CQ10 LTE Cat 1 IoT Module

View All