Connect with us

Hi, what are you looking for?

Editor’s Pick

CE-Cyber Delegated Act: What IoT Manufacturers Need to Do Before Enforcement

By Manuel Nau, Editorial Director at IoT Business News.

The European Commission’s CE-Cyber Delegated Act, adopted under the Radio Equipment Directive (RED), represents the most significant regulatory shift for connected devices sold in the EU since the original CE framework. By activating RED Articles 3.3 (d), (e) and (f), the Act introduces mandatory cybersecurity requirements for a broad range of wireless and IoT products. These requirements become legally enforceable for products placed on the EU market from 1 August 2025.

For manufacturers, importers and integrators, the implications go well beyond software patches or documentation updates. The Act forces structural changes in device design, firmware development, supply-chain transparency and post-market monitoring. This article clarifies what the regulation covers, why it matters, and what IoT companies must do to remain compliant before the enforcement deadline.

A turning point for IoT compliance in Europe

For years, the EU has signalled that “security-by-design” would become a legal requirement for connected devices. The CE-Cyber Delegated Act is the first concrete and binding step under RED, applying to radio equipment that can communicate over the internet or process sensitive data, including a wide range of IoT devices.

Typical product categories in scope include:

IoT sensors and hubs
Consumer electronics with wireless connectivity
Smart home devices
Industrial wireless systems
Asset trackers, wearables, and M2M modules
Gateways, routers, and networking equipment

The regulation targets systemic IoT weaknesses: insecure firmware, weak default credentials, unprotected data flows, opaque update policies, and insufficient vulnerability handling.

What the CE-Cyber Act requires manufacturers to implement

The obligations fall into three pillars: secure networking, secure handling of data, and robust software lifecycle controls. These translate into concrete engineering and organisational requirements aligned with RED Articles 3.3 (d), (e) and (f).

1. Secure network and data protection

Manufacturers must ensure devices:

authenticate connections and prevent unauthorized access
encrypt personal data, credentials, and sensitive traffic
protect against common attack vectors (replay, downgrade, MiTM)
avoid hard-coded passwords and insecure pairing methods

In practice, this means modern cryptography, secure key provisioning and storage, and validated protocol configurations in real environments.

2. Enhanced software security and updateability

Devices must be able to:

receive secure OTA updates
verify firmware integrity before execution (e.g., secure boot)
maintain a documented update strategy over the intended product lifetime

This affects embedded architecture and supply-chain planning: vendors must guarantee that chipsets, modules, and RTOS stacks support long-term patchability.

3. Mandatory vulnerability reporting and incident handling

Manufacturers must establish processes to:

receive vulnerability reports (from researchers, customers, partners)
investigate and respond within defined timelines
deliver corrective updates or mitigations
communicate risks clearly when necessary

Companies without a Product Security Incident Response Team (PSIRT) will need to formalise one.

Impact on IoT Product design and lifecycle

Compliance is more than ticking boxes. It requires changes across the entire device lifecycle.

Security-by-Design engineering

Developers must integrate security practices from architecture stages, including threat modelling, secure coding guidelines, and component provenance verification. “Late-stage security” will not withstand conformity assessment.

Component and module selection

Many IoT devices still rely on chipsets or stacks that lack secure boot, hardware crypto, or robust update mechanisms. Under the Act, this becomes a market-access risk. Manufacturers may need to select chipsets with hardware cryptographic acceleration and secure elements, and demand long-term software support from silicon vendors.

Documentation and technical files

To obtain CE marking, manufacturers must be able to provide technical documentation such as security architecture descriptions, cryptographic mechanisms used, update policies, and vulnerability management procedures. Missing or weak documentation can delay or block CE conformity.

Who is responsible? Manufacturers, importers and distributors

Responsibility extends beyond OEMs. Under RED, obligations apply to:

Manufacturers: secure design, documentation, updateability, vulnerability handling
Importers: verification that non-EU products meet requirements before placement
Distributors: ensuring CE compliance for products they make available

Resellers of white-label IoT devices cannot assume compliance from upstream suppliers; they must audit it.

Timeline: Why action is urgent

The cybersecurity essential requirements activated via Delegated Regulation (EU) 2022/30 apply from 1 August 2025. Any new radio-enabled products placed on the EU market from that date must comply.

Given typical embedded development cycles, achieving compliance often requires 6–18 months of technical and process work. Key steps include:

Gap analysis against Articles 3.3 (d)/(e)/(f)
Architecture review for secure boot, OTA, and crypto
Vendor audits for modules, SDKs, RTOS and libraries
Creation or upgrade of PSIRT processes
Security technical file completion
Conformity assessment (Notified Body where applicable)

Major challenges for IoT manufacturers

1. Legacy devices

Older designs may lack hardware crypto support, secure OTA, or enough flash/RAM for modern security stacks. This may require hardware redesign, module swaps, or even withdrawal from the EU market.

2. Incomplete supply-chain transparency

Vulnerabilities often originate in third-party drivers, middlewares or libraries. Manufacturers are increasingly expected to maintain SBOMs (Software Bill of Materials) and track patch histories to demonstrate control of their software supply chain.

3. Lack of internal security expertise

Many IoT organisations still lack dedicated security engineering. RED cybersecurity compliance makes this gap a direct commercial risk, especially for SMEs shipping wireless products.

Opportunities: A more trustworthy IoT market

Despite the workload, the Act creates strategic upside:

higher customer trust in connected products
fewer post-deployment incidents and recalls
clearer security differentiation in competitive tenders
simplified access to all EU markets through a unified bar

Early adopters are likely to benefit first in smart home, industrial automation, energy management and critical infrastructure.

Practical steps IoT manufacturers should take now

To meet the enforcement deadline, companies should start immediately:

Launch a formal CE-Cyber compliance assessment
Map impacted products and prioritise by risk and revenue
Review chipsets/modules/firmware stacks for crypto and updateability
Implement secure boot, encrypted storage, authenticated OTA
Establish or strengthen PSIRT and vulnerability workflows
Produce or update technical documentation and security files
Engage a Notified Body early if conformity assessment is required

Proactive planning avoids rushed engineering and market disruption as August 2025 approaches.

Conclusion: A mandatory step toward secure and competitive IoT croducts

The CE-Cyber Delegated Act marks a profound change in how connected products are designed, built and maintained in Europe. While compliance introduces new constraints, it also sets a clearer and more predictable bar for security across the IoT ecosystem.

Manufacturers that act early—redesigning architectures, updating processes, and ensuring supply-chain transparency—will be prepared not only for compliance, but for a more secure, resilient and competitive European IoT market.

The post CE-Cyber Delegated Act: What IoT Manufacturers Need to Do Before Enforcement appeared first on IoT Business News.

    Join our mailing list to get access to special deals, promotions, and insider information. Your exclusive benefits await! Enjoy personalized recommendations, first dibs on sales, and members-only content that makes you feel like a true VIP. Sign up now and start saving!


    By opting in you agree to receive emails from us and our affiliates. Your information is secure and your privacy is protected.

    You May Also Like

    Economy

    A woman sweeps the sidewalk in front of a closed small family business in Cairo, Illinois. 2020. I don’t quite buy the facile explanation...

    Editor’s Pick

    The Internet of Things (IoT for short) is the collective reference for a network of interconnected devices that work to communicate and exchange data...

    Editor’s Pick

    NLT is chosen for its global quality standards, wide presence in the Brazilian market and recognized expertise of its teams. Eseye, a global pioneer...

    Stock

    nCino Inc. (NASDAQ: NCNO) received a significant boost today when Goldman Sachs upgraded its rating from Neutral to Buy, with a new price target...