
2026-01-27
In this episode of #KEYMASTER, Sven Rajala, International PKI Man of Mystery, speaks with Guillaume Crinon, Director of IoT Business Strategy, about one of the most important upcoming regulatory shifts for connected products: the EU Cyber Resilience Act (CRA), and why its impact goes far beyond compliance checklists.
The CRA is not just another security regulation. It fundamentally changes how organizations must design, build, operate, and maintain products that are sold in the European market.
The Cyber Resilience Act (CRA) is an EU regulation that applies to any product with digital elements sold in European Union (EU), regardless of where it is manufactured. Whether a product is built inside or outside the EU, if it is placed on the European market, the CRA applies.
One of the most significant obligations introduced by the CRA is that manufacturers and OEMs remain responsible for the cybersecurity of their products for a minimum of five years after they are placed on the market.
This responsibility encompasses both hardware and software, and applies to a wide range of devices, including consumer IoT devices, industrial systems, and embedded software.
The CRA is designed to raise the overall level of cybersecurity across products sold in Europe. But its influence is likely to extend well beyond EU borders.
In practice, many global manufacturers use the same product Stock Keeping Unit (SKU) across regions. As a result, security improvements driven by the CRA are expected to become the global default, not just a Europe-specific requirement. In that sense, the CRA acts as a forcing function for better product security worldwide.
One of the most impactful CRA requirements is how organizations must handle vulnerabilities.
Vulnerabilities are inevitable. The CRA assumes this, and requires manufacturers to be prepared.
Under the CRA, organizations must:
This single requirement triggers a cascade of technical and operational consequences.
Consider a real-world example: smart meters deployed by utilities in the hundreds of thousands, or millions.
When a vulnerability is discovered, it is not practical to manually update each device using physical access. As a result, secure over-the-air (OTA) firmware updates become mandatory.
But enabling remote updates immediately increases the attack surface, something the CRA explicitly warns against. This creates a tension that must be addressed through strong security design.
To safely support OTA updates and meet CRA requirements, manufacturers must implement several foundational security capabilities:
Relying on ad-hoc signing keys stored on developer laptops or default vendor tools may be convenient, but under the CRA, those practices, in most cases, won’t be sufficient.
Once devices can update themselves, they must also securely communicate with backend services.
That means:
Device identity is no longer a “nice to have”, it becomes a core requirement for operating securely and at scale.
What starts as a single regulatory requirement, provide security updates, quickly expands into a full security architecture:
Once these foundations are in place, organizations are not just compliant, they are set up for secure, scalable operations in the long term.
The Cyber Resilience Act may feel demanding, but it ultimately pushes the industry toward better security practices, for manufacturers, customers, and the broader ecosystem.

