string(1) "6" string(6) "603721"
Starting April 15, 2026, the European Union will enforce mandatory compliance with EN 303 645:2024 for all Internet of Things (IoT) devices placed on the EU market—including smart home appliances, industrial IoT terminals, and connected medical devices. This standard, developed as a key technical specification under the Cyber Resilience Act (CRA), directly affects manufacturers, exporters, and supply chain actors involved in IoT hardware production and distribution—particularly those based in China and other export-oriented economies.
The European Telecommunications Standards Institute (ETSI) standard EN 303 645:2024 becomes legally binding across the EU on April 15, 2026, as the designated harmonized standard supporting the Cyber Resilience Act (CRA). It applies to all ‘products with digital elements’ that connect to networks or other devices, including but not limited to consumer IoT, industrial sensors, and networked medical equipment. Devices failing to demonstrate conformity with this standard will be prohibited from customs clearance and retail placement in the EU.
These entities are directly responsible for design, firmware implementation, and security lifecycle management of end products. The standard mandates secure boot, cryptographically signed firmware updates, and default password elimination—requirements that affect firmware architecture, testing protocols, and certification documentation. Non-compliance risks rejection at EU borders and contract termination by EU-based brand owners.
As economic operators under CRA, they bear legal liability for conformity assessment and declaration of performance. They must verify supplier-provided evidence of EN 303 645:2024 compliance—including vulnerability disclosure policies, update mechanisms, and secure development practices—before affixing the CE marking. This increases due diligence obligations across procurement and technical validation workflows.
Under CRA, distributors must verify that products bear valid conformity markings and are accompanied by required documentation (e.g., EU Declaration of Conformity, security documentation). Online platforms hosting IoT devices may face increased monitoring responsibilities post-2026, particularly for listings lacking verifiable compliance evidence.
EN 303 645:2024 introduces new test criteria related to update resilience, insecure default configurations, and vulnerability handling transparency. Accredited labs must align their test plans and reporting templates with the 2024 edition—not the prior 2019 or 2021 versions—to support valid conformity assessments ahead of the April 2026 deadline.
Verify that internal compliance checklists, firmware release procedures, and vulnerability response playbooks explicitly reference the 2024 edition—not earlier versions. National standards bodies (e.g., DIN, AFNOR) may publish national adoptions; confirm which version is cited in EU Commission’s Official Journal references.
For devices currently in design or pre-production, assess whether over-the-air (OTA) update mechanisms meet the 2024 requirements: authenticity verification, integrity protection, rollback prevention, and user notification. Also audit all factory-default credentials—including hidden service accounts—and ensure removal or forced reset on first boot.
Compile technical documentation demonstrating compliance with Clauses 5–7 of EN 303 645:2024, including threat modeling reports, vulnerability disclosure policy statements, and evidence of secure development lifecycle integration. Documentation must be available in English or an official EU language upon request.
Due to expected demand surges ahead of April 2026, schedule preliminary technical reviews with ETSI-accredited labs well in advance. Confirm lab capacity for firmware binary analysis, update simulation testing, and policy documentation review—not just checklist-based audits.
From industry perspective, EN 303 645:2024’s April 2026 enforcement marks a shift from voluntary guidance to enforceable baseline security—especially for mid-tier and white-label IoT vendors previously operating without formal cybersecurity validation. Analysis suggests this is less a ‘one-time certification event’ and more the first operational checkpoint in an evolving CRA compliance regime, where future amendments may extend scope to AI-enabled functions or cloud service dependencies. Observation shows that while the standard itself remains stable, its interpretation—and enforcement rigor—may vary across EU member states during initial implementation. Current focus should therefore remain on demonstrable, auditable implementation—not just paper compliance.

Conclusion
This mandate signals the EU’s institutionalization of cybersecurity as a non-negotiable product requirement—not a differentiating feature—for connected hardware. For global suppliers, it represents a structural change in market access conditions, requiring embedded security capabilities rather than retrofitted documentation. It is best understood not as a temporary regulatory hurdle, but as the formal onset of a new, persistent compliance expectation for IoT device lifecycles in Europe.
Information Sources
Main source: Official Journal of the European Union (OJEU) references to EN 303 645:2024 as a harmonized standard under Regulation (EU) 2022/2555 (Cyber Resilience Act); ETSI publication document EN 303 645 V3.1.1 (2024-02).
Note: Enforcement timelines for certain CRA provisions (e.g., incident reporting obligations) remain subject to further Commission guidance and are under ongoing observation.
Get weekly intelligence in your inbox.
No noise. No sponsored content. Pure intelligence.