From 2027, connected products sold in the EU will need to meet new baseline cybersecurity requirements under the Cyber Resilience Act. For IoT and networked devicesFrom 2027, connected products sold in the EU will need to meet new baseline cybersecurity requirements under the Cyber Resilience Act. For IoT and networked devices

EU Cyber Resilience Act: What Changes for IoT and Connected Products in 2027

7 min read

From 2027, connected products sold in the EU will need to meet new baseline cybersecurity requirements under the Cyber Resilience Act. For IoT and networked devices, that means security-by-design, vulnerability management, and evidence of compliance or a real risk of losing access to the EU market.

Cybersecurity moves from a competitive differentiator to a baseline condition for selling. This shift is tied to two specific dates in 2026 and 2027, which define when different obligations under the Cyber Resilience Act begin to apply.

In this article, we examine what the Cyber Resilience Act means in practice for manufacturers of IoT and networked products, with particular attention to the two upcoming milestones. The analysis is informed by practical input from Promwad’s engineering team, who support clients worldwide in addressing cybersecurity requirements in product design.

Why this matters to manufacturers outside Europe

You do not need to be based in the EU to be affected. If your connected product is placed on the EU market — directly, through distributors, or via online sales — CRA expectations apply. For global product teams, that makes the CRA less like a regional policy change and more like a new commercial constraint that must be engineered for.

The key timeline: what happens in 2026 and 2027

The Cyber Resilience Act has already been adopted and came into force in December 2024 as EU Regulation 2024/2847. Two milestones matter for product roadmaps:

11 September 2026: reporting obligations begin

From September 2026, the Cyber Resilience Act introduces its first operational obligations. At this stage, manufacturers of in-scope products are expected to be able to identify, assess, and report actively exploited vulnerabilities and serious security incidents within defined timeframes.

This date does not yet block products from being sold. However, it effectively tests whether a company has real security processes in place — not just technical controls, but also internal workflows for vulnerability handling, escalation, and communication. Organisations that lack visibility into their software components or do not have clear responsibility for security issues may struggle to meet these requirements.

11 December 2027: core CRA requirements become mandatory

From December 2027, the Cyber Resilience Act’s main security requirements apply to new products with digital elements placed on the EU market. From this point onward, cybersecurity is a formal condition for market access.

Manufacturers must be able to demonstrate that their products meet baseline security expectations, including secure design principles, vulnerability management throughout the product lifecycle, and the ability to deliver security updates. Products that fail to meet these legal minimums may not be placed on the EU market, regardless of functionality or commercial demand.

For many product teams, this marks the moment when cybersecurity shifts from an internal quality goal to an external regulatory requirement — one that directly affects whether a product can be legally sold in Europe.

What changes for IoT and networked products under the CRA

The CRA pushes the market towards two outcomes: fewer preventable vulnerabilities at launch, and better maintenance throughout a product’s supported life. In practical terms, that translates into three operational shifts for manufacturers.

Security becomes a design requirement

Many IoT and networking products are built around cost, performance, and time-to-market. Under CRA pressure, security must be treated similarly: something that is designed in, reviewed, and tested as part of standard product engineering.

For connected products, that often means decisions such as:

  • how devices authenticate and manage identity;
  • which services are exposed by default and why;
  • how credentials, keys, and secrets are stored and protected;
  • what happens when a component is compromised and how the blast radius is limited.

Software supply chain visibility becomes unavoidable

Modern devices ship with large dependency trees: operating systems, open-source packages, third-party SDKs, and bundled services. The CRA environment raises the expectation that manufacturers can identify what is inside their products and react when vulnerabilities emerge.

As a result, many teams are accelerating work on:

  • producing and maintaining a software bill of materials (SBOM);
  • identifying known vulnerabilities (CVEs) and prioritising remediation;
  • establishing release processes that can deliver security patches reliably.

Vulnerability handling becomes a process, not an event

One-off security testing before launch is not enough. The CRA ecosystem rewards organisations that can detect, triage, fix, and communicate security issues as a routine capability — including meeting reporting duties that start earlier than the main 2027 obligations.

This is where many companies feel the gap. It is not just “add another test”; it is a cross-functional change touching engineering, QA, product management, customer support, and legal.

What CRA readiness looks like in real engineering work

Regulatory language can make security sound abstract. In practice, CRA-aligned work tends to look like disciplined product security engineering: threat modelling, audits across hardware and firmware, evidence-driven testing, and documented remediation.

Below are a few case studies from Promwad, illustrating the types of security work companies are already undertaking as they prepare for CRA requirements, particularly for IoT and network equipment.

Router security audit (OpenWRT/prplOS, Realtek platform)

In a recent router audit, the work covered the full stack:

  • threat analysis guided by the MITRE ATT&CK threat framework;
  • hardware review including PCB-level checks and platform features that could expand the attack surface;
  • firmware analysis including SBOM generation and identification of known vulnerable components;
  • penetration testing to validate resilience against realistic attack paths.

The value of this approach is not only finding issues. It produces an ordered plan: what must change in design, configuration, firmware composition, and update strategy to reduce the risk profile in a measurable way.

Industrial switch security audit (firmware hardening & protocol exposure)

Industrial networking equipment sits in sensitive environments where availability and segmentation matter. In one industrial switch-focused engagement, the scope included:

  • threat analysis and attack-path mapping;
  • hardware weakness review;
  • firmware hardening work tied to vulnerability clean-up and dependency visibility;
  • protocol review and testing aligned to real-world misuse scenarios;
  • penetration testing to confirm that mitigations work under pressure.

This matters because industrial devices often have long deployment lives. Without robust maintenance and a reliable patch path, even a small weakness can become a persistent entry point.

Wi-Fi access point security scanning (authorised testing)

Wireless edge devices are exposed by design. In an authorised assessment for a wireless solutions vendor, Promwad engineers tested a Wi-Fi access point for weaknesses including password-cracking risk and configuration issues that could enable compromise. Findings were used to improve device security, which supported the customer’s ability to proceed with an enterprise supply contract.

Full technical case study: Access point vulnerability scanning.

The lesson is straightforward: compliance narratives do not stop attackers. Only testing that reflects attacker behaviour will reveal which assumptions fail in the field.

A practical checklist for teams selling into the EU

If you build or ship connected products, the following steps are a pragmatic starting point for CRA-era expectations:

  • Confirm what is in scope: map device variants, software components, and bundled services.
  • Run threat-led analysis: identify credible attack paths and prioritise the highest impact risks.
  • Establish SBOM and vulnerability management: know what you ship, track known issues, and assign ownership for remediation.
  • Harden default configurations: remove unnecessary services, reduce exposed interfaces, and secure credentials and keys.
  • Validate with penetration testing: verify controls under realistic conditions and document results.
  • Prepare operationally: ensure you can ship patches predictably and meet incident/vulnerability handling duties, including reporting where required.

The bottom line

The Cyber Resilience Act raises the floor for cybersecurity in the EU. For IoT and networked products, the commercial implication is hard to ignore: from 2027, security is not just about reputation or customer trust — it is about whether the product can be sold at all.

Organisations that start the CRA transition early, by tightening architectures, documenting dependencies, and treating patching as a routine capability, will find the regulation far less disruptive than those attempting to retrofit security at the end.

Comments
Disclaimer: The articles reposted on this site are sourced from public platforms and are provided for informational purposes only. They do not necessarily reflect the views of MEXC. All rights remain with the original authors. If you believe any content infringes on third-party rights, please contact [email protected] for removal. MEXC makes no guarantees regarding the accuracy, completeness, or timeliness of the content and is not responsible for any actions taken based on the information provided. The content does not constitute financial, legal, or other professional advice, nor should it be considered a recommendation or endorsement by MEXC.

You May Also Like

MoneyGram launches stablecoin-powered app in Colombia

MoneyGram launches stablecoin-powered app in Colombia

The post MoneyGram launches stablecoin-powered app in Colombia appeared on BitcoinEthereumNews.com. MoneyGram has launched a new mobile application in Colombia that uses USD-pegged stablecoins to modernize cross-border remittances. According to an announcement on Wednesday, the app allows customers to receive money instantly into a US dollar balance backed by Circle’s USDC stablecoin, which can be stored, spent, or cashed out through MoneyGram’s global retail network. The rollout is designed to address the volatility of local currencies, particularly the Colombian peso. Built on the Stellar blockchain and supported by wallet infrastructure provider Crossmint, the app marks MoneyGram’s most significant move yet to integrate stablecoins into consumer-facing services. Colombia was selected as the first market due to its heavy reliance on inbound remittances—families in the country receive more than 22 times the amount they send abroad, according to Statista. The announcement said future expansions will target other remittance-heavy markets. MoneyGram, which has nearly 500,000 retail locations globally, has experimented with blockchain rails since partnering with the Stellar Development Foundation in 2021. It has since built cash on and off ramps for stablecoins, developed APIs for crypto integration, and incorporated stablecoins into its internal settlement processes. “This launch is the first step toward a world where every person, everywhere, has access to dollar stablecoins,” CEO Anthony Soohoo stated. The company emphasized compliance, citing decades of regulatory experience, though stablecoin oversight remains fluid. The US Congress passed the GENIUS Act earlier this year, establishing a framework for stablecoin regulation, which MoneyGram has pointed to as providing clearer guardrails. This is a developing story. This article was generated with the assistance of AI and reviewed by editor Jeffrey Albus before publication. Get the news in your inbox. Explore Blockworks newsletters: Source: https://blockworks.co/news/moneygram-stablecoin-app-colombia
Share
BitcoinEthereumNews2025/09/18 07:04
Solana Treasury Firm Holdings Could Double as Forward Industries Unveils $4 Billion Raise

Solana Treasury Firm Holdings Could Double as Forward Industries Unveils $4 Billion Raise

The post Solana Treasury Firm Holdings Could Double as Forward Industries Unveils $4 Billion Raise appeared on BitcoinEthereumNews.com. In brief Forward Industries, the largest publicly traded Solana treasury company, filed to raise $4 billion through an at-the-market equity offering to expand its SOL holdings. The company’s stock (FORD) fell 8.2% following the announcement, while the proceeds could more than double the $3.1 billion currently held in Solana treasuries. DeFi Development Corp. also registered a preferred stock offering with the SEC, following similar funding tactics used by Bitcoin treasury companies like MicroStrategy. Forward Industries, the newest and largest publicly traded Solana treasury company, has filed to raise $4 billion through an at-the-market equity offering. For the sake of comparison, this $4 billion raise is nearly the same size as Bitcoin treasury Strategy’s Stride preferred stock raise in July. And it’s double the size of the Strife preferred stock offering the company did in May. The proceeds would be used for working capital; pursuit of its Solana token strategy, and “the purchase of income-generating assets to grow its business,” the company said in a press release. Forward Industries declined to comment to Decrypt on what other income-generating assets it’s considering adding to its balance sheet.  As markets opened Wednesday morning, Forward saw its stock price take a dive. The shares, which trade under the FORD ticker on the Nasdaq, dipped to $31.29 before rebounding to $34.28 at the time of writing—marking a 8.2% fall for the session. If the company sells all the shares and spends the bulk of the proceeds on buying Solana, it could more than double the amount of SOL being held in treasuries. At the time of writing, there’s already $3.1 billion in Solana treasuries, according to crypto price aggregator CoinGecko. Users on Myriad, a prediction market owned by Decrypt parent company DASTAN, have been growing more confident that SOL will reach $250 sooner than…
Share
BitcoinEthereumNews2025/09/18 12:43
Microsoft plans to invest $4 billion in building a second AI data center in Wisconsin

Microsoft plans to invest $4 billion in building a second AI data center in Wisconsin

Microsoft will invest $4 billion to build a second AI data center in Wisconsin, bringing its total investment in the region to over $7 billion.
Share
Cryptopolitan2025/09/19 03:05