The RED Cybersecurity Landscape in 2026
The Radio Equipment Directive (RED) 2014/53/EU has governed the placing of radio equipment on the EU market since 2016. However, the cybersecurity provisions under Article 3.3 were only activated by Delegated Regulation (EU) 2022/30, which came into full force on 1 August 2025.
This means that all internet-connected radio equipment placed on the EU market must now demonstrate conformity with cybersecurity essential requirements. This article explains what those requirements are and how to meet them.
The Three Cybersecurity Essential Requirements
Article 3.3(d) — Network Protection
Radio equipment must not harm the network or its functioning, nor misuse network resources, thereby causing an unacceptable degradation of service. In practice, this means:
- Resistance to exploitation as a vector for network attacks
- Protection against being used in botnets or DDoS amplification
- Secure network protocol implementations
- Proper handling of network resources and connections
Article 3.3(e) — Privacy Safeguards
Radio equipment must incorporate safeguards to ensure the protection of personal data and privacy of the user and subscriber. This includes:
- Encryption of personal data in transit and at rest
- Appropriate access controls for personal data
- Data minimisation in default configurations
- User consent mechanisms where applicable
Article 3.3(f) — Fraud Protection
Radio equipment must support features that ensure protection from fraud. This covers:
- Secure authentication to prevent unauthorised access
- Protection of payment and financial transactions
- Resistance to identity spoofing and impersonation
- Audit logging of security-relevant events
Which Products Are Affected?
The cybersecurity requirements apply broadly to internet-connected radio equipment. The Delegated Regulation specifies categories including:
- Equipment that communicates via the internet (Article 3.3(d) and (e))
- Equipment that processes personal data, traffic data, or location data (Article 3.3(e))
- Equipment that is used for financial transactions (Article 3.3(f))
- Child care equipment, toys, and wearables (Article 3.3(e) and (f))
How to Demonstrate Conformity
The most efficient route is to apply the harmonised standard EN 18031-1 (and parts 2 and 3 as applicable), which provides a presumption of conformity. Alternatively, manufacturers can:
- Apply the harmonised standard(s) for a presumption of conformity via self-declaration
- Use other technical specifications and demonstrate equivalence
- Seek a Notified Body EU-type examination
For most manufacturers, applying EN 18031 via self-declaration is the recommended approach. Where the standard doesn't fully cover the essential requirements, or for certain product categories, a Notified Body assessment may be required.
Common Compliance Challenges
Legacy Products
Products designed before the cybersecurity requirements were activated often have significant gaps. Retrofitting security into an existing architecture is more costly than designing it in — but market access requires it.
Supply Chain Dependencies
Many products incorporate third-party software and components. Manufacturers remain responsible for the cybersecurity of the final product, even when vulnerabilities originate in supply-chain components.
Documentation Burden
The technical file must include comprehensive cybersecurity evidence — risk assessments, test reports, and design documentation. Many manufacturers underestimate the documentation effort.
The Relationship with the Cyber Resilience Act
The Cyber Resilience Act will introduce additional cybersecurity obligations for products with digital elements. Products that are already compliant with RED cybersecurity requirements will have a head start on CRA compliance, but there are additional requirements — particularly around vulnerability handling, SBOM management, and ongoing obligations — that go beyond the RED.
Next Steps
If your product is internet-connected radio equipment, compliance with RED cybersecurity requirements is mandatory now. We recommend:
- Determine which Articles (3.3(d), (e), (f)) apply to your product
- Conduct a gap analysis against EN 18031
- Address non-conformities with prioritised remediation
- Complete full compliance testing and documentation
- Plan for ongoing CRA compliance