This article is brought to you by:
s the use of smart, “connected devices” across our homes, workplaces, and cities increases, the cybersecurity risks tied to these products continue to grow. In response, the UK’s Product Security and Telecommunications Infrastructure (PSTI) regime, updates to the EU’s Radio Equipment Directive (RED), and the upcoming EU Cyber Resilience Act (CRA) have emerged to ensure connected products are secure and remain secure throughout their lifecycle.
This article outlines the key requirements, scope, and timelines of each framework and offers guidance for manufacturers preparing to meet their obligations.
- At the core of new laws are these principles:
- Eliminating known vulnerabilities at launch
- Default secure configurations
- Secure update mechanisms
- Access controls and data protection
- Responsible vulnerability disclosure
- Unique or user-defined passwords for each product
- Clear vulnerability reporting processes
- Published minimum update periods that cannot be shortened later
- A statement of compliance, similar to CE or UKCA documentation
- Article 3(3)(d): Prevent harm to communication networks
- Article 3(3)(e): Protect personal data and privacy
- Article 3(3)(f): Guard against financial fraud
These apply only to internet-connected radio equipment, depending on how the device operates and what data it processes.
If these standards can’t be fully applied, manufacturers must undergo more rigorous third-party assessments, such as EU-Type Examination or Full Quality Assurance, involving a Notified Body.
- Cyber risk assessments at all stages of product development
- Conformity assessment based on risk category (basic, important, critical)
- Ongoing security updates and vulnerability disclosure procedures
- Incident reporting to ENISA, CSIRTs, and affected users within 24 hours (from September 2026)
Assessment pathways will vary depending on whether a product is classified as “important” or “critical,” and whether harmonised standards or “Common Specifications” have been fully applied.
- Documentation Review: Compliance documentation such as Implementation Conformance Statements (ICS), Implementation Extra Information for Testing (IXIT), and decision trees (especially for RED-related assessments).
- Functional Sufficiency Testing: Verifies that claimed protections work in practice (e.g., encryption is applied, PIN locks activate).
- Completeness Check: Ensures no undocumented features or interfaces exist.
- Penetration Testing: While not required under RED or CRA, some manufacturers may choose to conduct penetration tests for additional assurance.
Test labs play an important role in verifying documentation and performing assessments. Though third-party testing isn’t mandatory under all regimes, many manufacturers prefer external expertise—particularly when Notified Bodies are required.
- Advisory Services – Developing tailored test plans, conducting risk assessments, providing training and reviewing compliance documentation.
- Cyber Testing Services – Element performs Cybersecurity assessments to EN 303 645 and EN 18031.
- Certification Body Services – EU type examination certification for cyber security, as well as all other articles of the RED (radio, EMC, safety).
Whether you’re preparing for RED changes in 2025 or the CRA rollout in 2027, engaging with experts early can streamline compliance and reduce costly delays.