EU Cybersecurity Act: New Requirements for IoT Devices in 2025
The EU Cybersecurity Act introduces mandatory security requirements for connected devices. Learn what manufacturers of IoT products must do to comply.
Thibault Helle
The EU Cybersecurity Act and related regulations are transforming security requirements for connected devices. This guide explains what IoT manufacturers need to know about compliance in an increasingly security-focused regulatory landscape.
Understanding the EU Cybersecurity Framework
The EU has implemented comprehensive cybersecurity legislation affecting IoT devices, creating a multi-layered regulatory framework:
1. Cybersecurity Act (Regulation 2019/881)
The foundational EU cybersecurity legislation that:
- Establishes EU cybersecurity certification framework: Creates harmonized approach to product security certification
- Creates common security standards: Provides consistent baseline across member states
- Strengthens ENISA's role: European Union Agency for Cybersecurity gains enhanced mandate for coordination
- Enables voluntary certification schemes: Initially voluntary, becoming mandatory for specific product categories
- Facilitates mutual recognition: Certificates recognized across all EU member states
Key provisions:
- Three assurance levels: Basic, substantial, and high
- Product-specific certification schemes
- Regular review and update mechanisms
- Market surveillance coordination
2. Cyber Resilience Act (CRA) - Proposed
The most significant upcoming change, expected to apply from 2025-2027:
Scope:
- Mandatory cybersecurity requirements for products with digital elements
- Covers hardware and software products
- Applies throughout entire product lifecycle
- Includes post-market obligations
Core requirements:
- Security by design and by default
- Vulnerability handling and disclosure
- Mandatory security updates
- Supply chain security measures
- Conformity assessment procedures
- CE marking for cybersecurity
Product categorization:
- Class I (Default): Most products, lower cybersecurity risk
- Class II (Important): Products with significant security implications
- Critical products: Highest security requirements
Implementation timeline:
- Regulation adoption: Expected 2024-2025
- Transition period: 24-36 months
- Full enforcement: Likely 2026-2028
3. NIS2 Directive
Network and Information Security Directive (revised):
- Network and information security requirements: Essential services must implement security measures
- Applies to critical infrastructure: Energy, transport, healthcare, digital infrastructure
- Supply chain security obligations: Risk management for suppliers and service providers
- Incident reporting: Mandatory breach notification within 24 hours
- Accountability: Management liability for security failures
Impact on IoT manufacturers:
- Products sold to essential entities must meet NIS2 requirements
- Supply chain security documentation required
- Incident response capabilities necessary
- Security testing and certification may be mandated
4. Radio Equipment Directive (RED)
Article 3(3)(d)-(f) requirements for wireless devices:
- Protection of networks from harm
- Protection of personal data and privacy
- Protection against fraud
- Applied to consumer-facing wireless IoT devices
Integration with Existing Frameworks
Cybersecurity requirements integrate with:
- CE marking directives: Cybersecurity as essential requirement
- GDPR: Data protection and privacy
- Product Safety Regulation: Overall product safety framework
- Market Surveillance Regulation: Enforcement coordination
Who is Affected?
The cybersecurity regulations apply broadly across the IoT ecosystem:
Manufacturers
Primary responsibility holders including:
Consumer IoT devices:
- Smart home devices (thermostats, cameras, door locks)
- Wearables (fitness trackers, smart watches)
- Connected entertainment (smart TVs, streaming devices)
- Home networking equipment (routers, extenders)
- Smart appliances (refrigerators, washing machines)
Industrial IoT equipment:
- Manufacturing automation
- Process control systems
- Remote monitoring devices
- Industrial sensors and actuators
- Building management systems
Connected medical devices:
- Remote patient monitoring
- Connected diagnostic equipment
- Implantable devices with connectivity
- Hospital IoT infrastructure
Automotive electronics:
- Telematics systems
- Over-the-air update systems
- Vehicle-to-everything (V2X) communication
- Autonomous driving systems
- In-vehicle infotainment
Network equipment:
- Switches and routers
- Access points
- Network security appliances
- Telecommunications equipment
Software products with security implications:
- Operating systems
- Security software
- Network management software
- Cloud services and platforms
Importers and Distributors
Extended responsibilities:
- Verify manufacturer compliance before placing on market
- Ensure technical documentation available
- Cooperate with market surveillance authorities
- Report known cybersecurity issues
- Maintain traceability records
Economic Operators in Supply Chain
- Component suppliers must provide security information
- Software vendors must disclose vulnerabilities
- Cloud service providers must ensure security
- Open source maintainers face new obligations
Key Requirements for IoT Devices
1. Security by Design
Products must be designed with cybersecurity from the start:
Risk Assessment During Design Phase:
- Threat modeling of system architecture
- Attack surface analysis
- Privacy impact assessment
- Data flow security analysis
- Identification of security-critical components
Secure Development Practices:
- Secure coding guidelines implementation
- Code review processes
- Security testing integration in development
- Version control and change management
- Security training for development teams
Threat Modeling:
- STRIDE methodology application (Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service, Elevation of Privilege)
- Attack tree development
- Vulnerability prioritization
- Mitigation strategy planning
Security Architecture Documentation:
- Component security boundaries
- Trust relationships
- Authentication and authorization flows
- Cryptographic key management
- Secure communication channels
- Security assumptions and dependencies
2. Secure Default Configuration
No security weaknesses in out-of-box configuration:
No Default Passwords:
- Unique credentials per device
- Forced password change on first use
- Strong password requirements
- Account lockout policies
- Password complexity enforcement
Minimal Attack Surface:
- Only necessary services enabled
- Debug features disabled in production
- Unused ports and interfaces disabled
- Minimal software footprint
- Principle of least functionality
Secure Protocols Enabled by Default:
- TLS 1.2 or higher for communications
- Strong cipher suites
- Certificate validation enabled
- Secure boot mechanisms
- Encrypted storage
Unnecessary Services Disabled:
- No Telnet, FTP, or insecure protocols
- Unused network services shut down
- Background services minimized
- Administrative interfaces protected
3. Vulnerability Management
Comprehensive approach to security flaws:
Process for Receiving Vulnerability Reports:
- Public security contact information
- Coordinated vulnerability disclosure (CVD) policy
- Vulnerability reporting form or email
- Acknowledgment within defined timeframe
- Clear escalation procedures
Timely Security Updates:
- Critical vulnerabilities patched within days
- High-severity issues within weeks
- Regular security patch releases
- Emergency update capability
- Backwards compatibility considerations
Vulnerability Disclosure Policy:
- Public disclosure timing (typically 90 days)
- Coordination with affected parties
- CVE number assignment
- Security advisory publication
- Credit to researchers
Incident Response Procedures:
- Incident classification system
- Response team and responsibilities
- Investigation and root cause analysis
- Containment and remediation
- Customer communication plan
4. Software Updates
Mandatory update capabilities:
Ability to Receive Security Updates:
- Over-the-air (OTA) update mechanism
- Secure update channel (signed updates)
- Automatic update checking
- Fallback and recovery mechanisms
- Update notification system
Clear Update Policy and Timeline:
- Defined support period (minimum 3-5 years for consumer products)
- End-of-life (EOL) communication policy
- Update frequency commitment
- Legacy version support policy
- Post-EOL security guidance
Automated Update Mechanisms:
- Background update downloads
- Scheduled installation windows
- Minimal user interaction required
- Automatic rollback on failure
- Update verification before installation
User Notification of Available Updates:
- In-device notifications
- Email alerts
- Web portal information
- Release notes and changelogs
- Critical vs. optional update distinction
5. Data Protection
GDPR-compliant security measures:
Encryption of Sensitive Data:
- Data in transit encryption (TLS 1.2+)
- Data at rest encryption
- End-to-end encryption where appropriate
- Key management systems
- Secure key storage (hardware security modules where needed)
Secure Data Storage:
- Encrypted filesystems
- Secure credential storage
- Tamper-resistant storage for critical data
- Secure deletion capabilities
- Data isolation between users/tenants
Privacy by Design Principles:
- Data minimization
- Purpose limitation
- Storage limitation
- Privacy-enhancing technologies
- User control over personal data
GDPR Compliance:
- Lawful basis for processing
- Consent mechanisms
- Right to access, rectification, erasure
- Data portability
- Data breach notification (72 hours)
Conformity Assessment Requirements
Essential Requirements
Manufacturers must demonstrate compliance with cybersecurity requirements:
- Conduct Cybersecurity Risk Assessment
- Systematic threat identification
- Vulnerability analysis
- Impact assessment
- Risk prioritization
- Mitigation planning
- Implement Appropriate Security Measures
- Technical controls (encryption, authentication, etc.)
- Organizational measures (policies, procedures)
- Physical security where relevant
- Supply chain security measures
- Create Technical Documentation
- Security risk assessment report
- Security architecture documentation
- Test results and certifications
- Vulnerability management procedures
- Update policy documentation
- Maintain Documentation for 10 Years
- Version control
- Secure storage
- Accessibility for authorities
- Update documentation for changes
- Affix CE Marking (with Cybersecurity Compliance)
- CE mark indicates cybersecurity compliance
- EU Declaration of Conformity includes cybersecurity
- Reference to cybersecurity standards
- Notified Body involvement if required
Conformity Assessment Routes
Product cybersecurity risk determines the assessment route:
Route 1: Self-Assessment (Module A)
For lower-risk products (Class I under CRA):
- Internal security testing: Manufacturer conducts own security evaluation
- Declaration of Conformity: Self-declaration of compliance
- Technical documentation: Maintained by manufacturer
- No third-party required: Unless voluntary certification desired
Suitable for:
- Basic consumer IoT devices
- Products with limited connectivity
- Low-risk data processing
- Non-critical applications
Route 2: Third-Party Assessment (Various Modules)
For higher-risk products (Class II and Critical under CRA):
- Notified body involvement: EU-designated cybersecurity certification body
- Cybersecurity certification: Formal certificate of compliance
- Regular surveillance audits: Periodic reassessment
- Ongoing monitoring: Continued oversight during market lifetime
Required for:
- Products with significant security implications
- Critical infrastructure components
- High-risk data processing
- Security-sensitive applications
Notified Body Activities:
- Security assessment against standards
- Penetration testing oversight
- Documentation review
- Factory audits if applicable
- Certificate issuance and maintenance
Documentation Requirements
Cybersecurity Technical File Must Include:
Comprehensive documentation proving cybersecurity compliance:
1. Security Risk Assessment
Threat Identification:
- External threats (hackers, malware, nation-states)
- Internal threats (insider threats, misconfiguration)
- Physical threats (tampering, theft)
- Supply chain threats (compromised components)
Vulnerability Analysis:
- Software vulnerabilities
- Hardware vulnerabilities
- Configuration weaknesses
- Protocol and interface vulnerabilities
- Cryptographic weaknesses
Security Controls Implemented:
- Preventive controls
- Detective controls
- Corrective controls
- Compensating controls
Residual Risks:
- Risks accepting after mitigation
- Justification for acceptance
- User warnings about residual risks
2. Security Architecture
System Design Documentation:
- High-level architecture diagrams
- Component interactions
- Trust boundaries
- Security zones
Component Security Analysis:
- Security properties of each component
- Trusted vs. untrusted components
- Security dependencies
- Third-party component security
Secure Communication Protocols:
- Protocols used
- Encryption methods
- Key exchange mechanisms
- Certificate management
Authentication Mechanisms:
- User authentication methods
- Device authentication
- Multi-factor authentication
- Session management
3. Security Testing Reports
Penetration Testing Results:
- Internal and external testing
- Web application security testing
- Network penetration testing
- Wireless security assessment
- Findings and remediation
Vulnerability Scanning:
- Automated vulnerability scans
- Scan results and analysis
- False positive elimination
- Remediation tracking
Compliance Testing:
- Standard compliance verification
- Test procedures followed
- Pass/fail results
- Deviations and justifications
Third-Party Audit Reports:
- Independent security assessments
- Certification body reports
- Accredited lab test results
4. Vulnerability Handling Process
Disclosure Policy:
- Coordinated disclosure timeline
- Responsible disclosure guidelines
- Researcher acknowledgment policy
- Embargo periods
Response Procedures:
- Triage and prioritization
- Investigation process
- Patch development workflow
- Testing before release
Update Deployment Process:
- Update packaging and signing
- Distribution channels
- Staged rollout strategy
- Monitoring and validation
User Communication Plan:
- Security advisory templates
- Customer notification methods
- Severity classification
- Recommended actions
5. Supply Chain Security
Component Security Verification:
- Vendor security questionnaires
- Component vulnerability tracking
- Secure supply chain requirements
- Counterfeit prevention
Supplier Assessments:
- Security criteria for supplier selection
- Periodic security audits
- Incident reporting requirements
- Contractual security obligations
Software Bill of Materials (SBOM):
- Complete inventory of software components
- Open source component tracking
- Version information
- Known vulnerability cross-reference
Third-Party Library Management:
- Library approval process
- Vulnerability monitoring
- Update and patching procedures
- Alternatives evaluation
Key Standards for IoT Security
Relevant international and European standards:
ETSI EN 303 645
Consumer IoT security baseline:
- 13 provisions for consumer IoT security
- No default passwords
- Vulnerability disclosure policy
- Secure updates
- Secure data storage and transmission
- Resilience to outages
- Security testing documentation
Application: Consumer smart home devices, wearables, connected appliances
IEC 62443
Industrial automation security:
- Comprehensive security framework
- Security levels SL1-SL4
- Network segmentation
- Access control
- System integrity
- Data confidentiality
Application: Industrial IoT, manufacturing automation, SCADA systems
ISO/IEC 27001
Information security management:
- ISMS framework
- Risk management approach
- Security controls catalog
- Continuous improvement
- Certification available
Application: Organizational security management, larger IoT deployments
NIST Cybersecurity Framework
Security best practices:
- Identify, Protect, Detect, Respond, Recover
- Risk-based approach
- Widely adopted globally
- Implementation tiers
- Profile customization
Application: Comprehensive security program development
Additional Relevant Standards
- ISO/IEC 27034: Application security
- ISO/IEC 30141: IoT reference architecture
- IEC 62351: Power systems cybersecurity
- ISO 21434: Automotive cybersecurity
- IEC 81001-5-1: Health software security
Support Periods and Updates
Mandatory security support obligations:
Minimum Support Period
Based on Product Lifetime:
- Consumer devices: 3-5 years minimum (CRA proposal)
- Industrial equipment: 10+ years typical
- Critical infrastructure: Product operational lifetime
- Automotive: Vehicle lifetime (10-15 years)
Factors determining support period:
- Expected product lifespan
- Industry practices
- Product price point
- Safety criticality
- Regulatory requirements
Support Period Communication
Clearly Communicated End-of-Support Date:
- Specified at time of sale
- Prominent display on packaging and documentation
- Available on manufacturer website
- Advance notice before EOL
During Support Period
Security Updates Throughout Support Period:
- Regular security patches
- Critical vulnerability fixes within days
- Compatibility maintenance
- No degradation of security features
Vulnerability Disclosure Even After EOL:
- Continue to disclose discovered vulnerabilities
- Provide mitigation guidance if patches not available
- Recommend product replacement if necessary
Extended Support Options
- Paid extended support programs
- Enterprise extended support agreements
- Open source community takeover possibilities
- Responsible EOL guidance
Penalties for Non-Compliance
Significant enforcement provisions ensure compliance:
Financial Penalties
Under proposed Cyber Resilience Act:
- Fines up to €15 million or 2.5% of global annual turnover (whichever is higher)
- Proportionate to infringement severity
- Repeated violations face increased penalties
- Intentional non-compliance more severely penalized
Administrative Measures
Product Recalls:
- Mandatory recall of non-compliant products
- Manufacturer bears all costs
- Logistics and customer communication
- Disposal of recalled products
Market Withdrawal Orders:
- Ban on placing products on market
- Removal of products from distribution channels
- Stop sale and distribution immediately
- May affect entire product lines
Prohibition of Market Placement:
- Temporary or permanent market bans
- Affects future products if systematic non-compliance
- Applies across entire EU market
Reputational Damage
Beyond formal penalties:
- Public disclosure of non-compliance
- Loss of customer trust
- Competitive disadvantage
- Brand value erosion
- Reduced market share
Criminal Liability
In severe cases:
- Personal liability for management
- Criminal prosecution possible
- Imprisonment for egregious violations
- Applies when safety endangered
Common Cybersecurity Compliance Challenges
Manufacturers face several obstacles:
1. Legacy Products
Challenge: Updating older products to meet new requirements
Solutions:
- Assess retrofit feasibility vs. replacement
- Phased security improvement programs
- Limited update capability for very old products
- Clear EOL communication to customers
2. Resource Constraints
Challenge: Small manufacturers lacking security expertise
Solutions:
- Outsource security assessments
- Use security-focused development frameworks
- Leverage AI-powered compliance tools
- Join industry consortiums for shared resources
3. Supply Chain Complexity
Challenge: Ensuring component and software security across complex supply chains
Solutions:
- Implement vendor security requirements
- Use SBOM tools
- Continuous vulnerability monitoring
- Contractual security obligations
4. Update Infrastructure
Challenge: Building secure, reliable update mechanisms
Solutions:
- Use proven update frameworks
- Cloud-based update services
- Cryptographic signing of updates
- Staged rollout capabilities
- Automated testing before deployment
5. Documentation Burden
Challenge: Creating and maintaining comprehensive security documentation
Solutions:
- Document security from day one
- Use templates and automation tools
- Integrate documentation with development
- AI-powered documentation assistance
How to Achieve Cybersecurity Compliance
Systematic approach to meeting requirements:
Step 1: Security Assessment
Comprehensive Security Risk Assessment:
- Engage security experts
- Use recognized methodologies (STRIDE, PASTA)
- Document all threats and vulnerabilities
- Prioritize risks
- Create risk treatment plan
Step 2: Implement Security Controls
Apply Appropriate Technical and Organizational Measures:
- Follow security by design principles
- Implement defense in depth
- Use proven security technologies
- Establish security policies and procedures
- Train development and operations teams
Step 3: Security Testing
Perform Penetration Testing and Vulnerability Assessments:
- Engage ethical hackers
- Use automated security testing tools
- Conduct code reviews
- Test all interfaces and protocols
- Verify security controls effectiveness
Step 4: Documentation
Create Detailed Cybersecurity Technical Documentation:
- Comprehensive security architecture
- Risk assessment reports
- Test results and certificates
- Vulnerability management procedures
- Update policies
Step 5: Conformity Assessment
Complete Self-Assessment or Engage Notified Body:
- Determine appropriate route
- Select accredited certification body if needed
- Prepare technical file
- Undergo assessment
- Obtain certification
Step 6: Ongoing Monitoring
Establish Vulnerability Management and Update Processes:
- Continuous vulnerability scanning
- Security monitoring
- Patch management system
- Incident response capability
- Regular security assessments
How AI Can Streamline Cybersecurity Compliance
AI-powered compliance platforms offer significant advantages:
Automated Capabilities
- Automatically identify applicable security requirements: Based on product type and characteristics
- Generate security documentation templates: Pre-filled with product information
- Track vulnerability disclosure obligations: Monitor deadlines and requirements
- Monitor for security standard updates: Alert to new versions and changes
- Manage update deployment schedules: Coordinate patches across product portfolio
- Maintain security assessment records: Organize and version control documentation
Benefits
- 60-70% reduction in compliance documentation time
- Improved consistency and completeness
- Automated regulatory change tracking
- Integration with development tools
- Centralized compliance management
Preparing for the Cyber Resilience Act
Though not yet fully in force, proactive preparation is essential:
Immediate Actions
- Review Proposed CRA Requirements
- Understand product classification (Class I, II, or Critical)
- Identify applicable essential requirements
- Compare with current security measures
- Assess Current Product Security Posture
- Conduct security audit
- Identify vulnerabilities
- Evaluate update mechanisms
- Review vulnerability handling process
- Identify Compliance Gaps
- Compare current state to CRA requirements
- Prioritize gaps by risk and effort
- Create gap closure roadmap
- Plan Security Improvements
- Design secure update system if lacking
- Implement vulnerability management process
- Enhance security testing
- Improve security documentation
- Budget for Certification Costs
- Estimate testing and certification expenses
- Plan for ongoing surveillance costs
- Include consultant and tool costs
- Account for product redesign if needed
- Train Development Teams on Security
- Secure coding practices
- Threat modeling
- Security testing methods
- Compliance requirements
Ongoing Preparedness
- Monitor CRA legislative progress
- Engage with industry associations
- Participate in standard development
- Build security culture within organization
Resources for IoT Cybersecurity
Valuable resources for compliance:
Official Sources
- ENISA IoT Security Guidelines: Comprehensive baseline for IoT security
- ETSI EN 303 645 Standard: Consumer IoT security specification
- NIST IoT Security Recommendations: Framework and best practices
- IEC 62443 Industrial Security Standards: Industrial automation security
- EU Cybersecurity Certification Schemes: Official certification frameworks
Industry Organizations
- IoT Security Foundation
- Cloud Security Alliance (IoT Working Group)
- Industrial Internet Consortium
- OWASP Internet of Things Project
Tools and Platforms
- Vulnerability scanning tools
- SBOM generation tools
- Security testing frameworks
- Compliance management platforms
- AI-powered security assistants
Conclusion
Cybersecurity compliance for IoT devices is becoming mandatory in the EU. The combination of the Cybersecurity Act, proposed Cyber Resilience Act, and other regulations creates comprehensive security requirements that manufacturers must meet.
Stay ahead of evolving cybersecurity requirements with proactive compliance strategies, robust security practices, and AI-powered assistance. Early preparation, systematic implementation, and ongoing vigilance are keys to successful cybersecurity compliance in the connected device era.
The regulatory landscape is shifting toward mandatory, enforceable cybersecurity requirements. Manufacturers who embrace security by design, establish strong vulnerability management, and maintain comprehensive documentation will be best positioned for success in the evolving regulatory environment.