
he European Union’s (EU’s) 2024 Cyber Resilience Act makes complying with the cybersecurity standards in the Radio Equipment Directive (RED) mandatory. If your product has Bluetooth, Wi-Fi, or other wireless connectivity in it, and you intend to sell in Europe, it is likely that you will need to comply with Chapter 1, Article 3, Item 3(d), 3(e), and 3(f) of the RED before August 1, 2025. Your firmware developers may need a significant amount of time to implement the provisions, so if you have not already started securing your product to the new regulation, you need to do so now.
Since the new regulation is extremely vague, the European Telecommunications Standards Institute (ETSI) came up with a set of related standards to clarify the requirements that include:
- ETSI EN 303 645 for the manufacturers to follow; and
- ETSI TS 103 701 for test labs to follow.
- Devices capable of communicating over the Internet (either directly themselves or through another device, like a smartphone);
- Toys and childcare equipment; and
- Wearables (smartwatches, etc.).
- (d) radio equipment does not harm the network or its functioning nor misuse network resources, thereby causing an unacceptable degradation of service;
- (e) radio equipment incorporates safeguards to ensure that the personal data and privacy of the user and of the subscriber are protected; and
- (f) radio equipment supports certain features ensuring protection from fraud.
- Article 3(1)(a) health and safety;
- Article 3(1)(b) electromagnetic compatibility;
- Article 3(2) the effective and efficient use of radio spectrum; and
- Article 3(3) those categories or classes of radio equipment specified in related Commission delegated acts.
- 3(3)(d) to ensure network protection;
- 3(3)(e) to ensure safeguards for the protection of personal data and privacy; and
- 3(3)(f) to ensure protection from fraud.
- Devices capable of communicating over the Internet;
- Toys and childcare equipment; and
- Wearables (smartwatches, etc.).
On August 5, 2022, the EU Commission issued a standardization request to CEN and CENELEC to develop harmonized standards in support of Delegated Regulation 2022/30. In response, ETSI came up with:
- The “baseline” standards with which manufacturers need to comply (ETSI EN 303 645);
- The procedures the test lab uses to assess a manufacturer’s compliance (ETSI TS 103 701);
- “Vertical standards” – ETSI EN 303 645 interpreted for specific devices like smart locks, etc.; and
- If a product does not have a “vertical standard,” then the baseline standards apply.
- Cybersecurity is considered throughout the product’s lifecycle (i.e. in the planning, design, development, production, delivery, and maintenance phases).
- All cybersecurity risks must be documented.
- Manufacturers will have to report actively exploited vulnerabilities and incidents.
- Once sold, manufacturers are responsible for ensuring that, for the expected product lifetime or for a period of five years (whichever is shorter), vulnerabilities are handled effectively.
- Clear and understandable instructions for the use of products with digital elements are available.
- Security updates are made available for at least five years.
Most manufacturers of IoT devices have ignored cybersecurity issues while making products that are extremely vulnerable. You may remember when, on October 21, 2016, roughly ten percent of the websites on the internet became unreachable, including amazon.com, cnn.com, github.com, and many other popular sites, which broke additional sites that required those services to be functioning. Dyn, then the third largest DNS service provider, was taken down by a distributed denial of service attack (DDoS). At the time, Dyn was thought to be too large a DNS provider for a DDoS to work against them.
What had changed was that botnets, which were usually limited by the number of computers people had, started compromising vulnerable IoT devices which had far outnumbered the computers. With so many more devices under its control, the botnet was able to easily take down Dyn.
Key points include:
- Focus on payment-related devices;
- User authentication controls;
- Secure communication protocols; and
- Compliance with industry standards.
Key points include:
- Data protection;
- Secure storage mechanisms;
- Lifecycle security; and
- RED compliance.
- A smart home device storing user login credentials must encrypt the data using a strong encryption algorithm.
- A wearable fitness tracker collecting health data should use secure protocols to transmit that data to the cloud.
- Manufacturers need to implement regular software updates to address vulnerabilities that could compromise sensitive data storage.
- Communicate over either TLS (formerly called SSL) or SSH; and
- Use a key size that is large enough so that the keys will still be considered secure when you end support for that product.
- Mandatory provision (marked with an “M” in the status column)
- You intend to implement this provision;
- Your product does not meet the condition marked on the provision, i.e. not applicable; or
- Your product does not have the feature marked on the provision, i.e. not applicable.
- Recommended provision
- You intend to implement this provision; or
- You do not intend to implement this provision. You are required to mark the reason why you are not implementing it.
You then have the option of sending your product, along with your ICS form and an IXIT form, to a third-party test lab for guidance, direction, and reassurance that no aspect of the new requirements has been missed. They will answer your questions and validate that the information in the form describes a complying product and that the product is consistent with what was filled out in the form.
- What kind of authentication your network connection uses (e.g., TLS connections with public/private ECDSA keys);
- Your company’s policies for how quickly they will respond to vulnerabilities found in the device;
- Where the user can find your statement on what personal data is used and how it is used;
- How the device will get updates to get security patches whenever they come out; and
Jack Black is the business development manager for D.L.S. and has over 30 years of experience in the field of compliance testing and standards development. Black can be reached at jblack@dlsemc.com.
Marilyn Sweeney is CEO and one of the founding members of D.L.S. Sweeney can be reached at msweeney@dlsemc.com.