Accurate cybersecurity compliance begins with the right preparation. The EN 18031 series of standards is the harmonized way to demonstrate conformity with the European Union’s Radio Equipment Directive (RED) cybersecurity requirements.

Properly configuring your product and preparing your documentation ensures compliance with:

  • Article 3(3)(d): Protection against network harm.
  • Article 3(3)(e): Safeguards for personal data and user privacy.
  • Article 3(3)(f): Measures to prevent fraud (for devices handling monetary value).

Adhering to a robust certification workflow, centered on the secure-by-design approach, is essential to avoid regulatory delays and potential market bans after the mandatory compliance date of August 1, 2025.


1. EN 18031 Certification Routes

The certification path for compliance with the EN 18031 standards depends on whether the product can fully meet the requirements without triggering certain mandatory third-party assessment conditions.

Certification RouteConditionRequirement
Self-Assessment /Declaration of Conformity (DoC)The manufacturer fully applies the EN 18031 standards, and no restricted clauses apply to the product.The manufacturer signs their own DoC and maintains a comprehensive technical file.
Notified Body (NB) AssessmentThe product triggers a restricted clause (e.g., allowing a user to operate the device without setting a password).A Notified Body reviews the technical documentation, verifies compliance, and issues an EU-type Certificate.

2. Preparing the Product for Testing

A key step is to implement a secure development life cycle where cybersecurity is prioritized from the initial design phase.

Preparation FocusDescription / Example
Asset IdentificationDetermine all critical assets (personal data, financial value, network functions) that must be protected according to the relevant parts of EN 18031.
Secure Update MechanismImplement a system to install new software and firmware with integrity and authenticity, ensuring the update process itself is secure and verified.
Access & AuthenticationThe device must have appropriate access controls, requiring entities to be authenticated before accessing security or network assets. Note: The standard restricts allowing users to operate the device without setting a password.
Secure CommunicationEnsure all communication of security and network assets uses secure communication protocols (e.g., robust cryptographic algorithms).

3. The Testing Process

Testing serves to validate that the implemented security controls are effective and demonstrably meet the EN 18031 requirements.

Gap AnalysisAn initial assessment to evaluate existing security measures against the EN 18031 requirements, identifying areas of non-compliance (gaps) before formal testing begins.  
Conformity Testing (Evaluation against the standard) : A rigorous process where the product is assessed against the specific clauses of the EN 18031 series. This evaluation is often guided by comprehensive decision trees to determine the applicability and pass/fail criteria for each requirement often done by the manufacturer.   Part 1 (EN 18031-1) focuses on network protection (e.g., resilience against DDoS (Distributed Denial of Service), traffic control).Part 2 (EN 18031-2) focuses on data protection (e.g., deletion, logging, user notification).Part 3 (EN 18031-3) focuses on fraud prevention (e.g., for devices processing monetary value).
Penetration Testing (Pen Test)A proactive, real-world assessment to expose vulnerabilities (software flaws, insecure communications) and confirm the product’s resilience, providing tangible proof of security to regulators.

4. Required Compliance Documentation

Clear, complete documentation ensures the certification process starts smoothly. This documentation forms the technical file required for your CE marking.

Cybersecurity Risk Assessment:A mandatory document listing identified risks, potential threats, and the mitigation plans associated with the product’s assets.  
Technical Specifications:Details on the product design, features, and the implemented security measures (e.g., cryptographic elements, secure boot process).  
Test Reports:Documentation of all conformity and penetration testing, providing evidence that the product meets the applicable EN 18031 requirements.  
Declaration of Conformity (DoC):The official, final statement signed by the manufacturer (or the Notified Body in certain cases) certifying that the product complies with the standard.  

5. Common Mistakes to Avoid

Avoiding these pitfalls reduces schedule delays and potential regulatory action:

Failing to Consult a Notified Body (NB)Assuming a product can be self-declared when a restricted clause (like an easy-to-skip password setup) is present in the final product.
Ignoring the Compliance DeadlineThe requirements become mandatory for new products placed on the market from August 1, 2025.
Incomplete Technical DocumentationMissing a current, updated Risk Assessment or failing to document how every applicable EN 18031 requirement is met.
Not Testing the Complete DeviceEven if a certified module is used, the complete end-product must be evaluated as a whole for compliance.

6. Partner with MiCOM Labs for Reliable Wireless Testing

MiCOM Labs combines deep technical expertise with advanced testing capabilities to help you achieve global RF safety and regulatory compliance with confidence. Whether your device supports Wi-Fi, Bluetooth, Zigbee, LTE, or 5G, our team ensures your design meets performance and certification requirements across international markets.

Why Choose MiCOM Labs

  • Global Compliance Expertise – Accredited testing and certification for FCC, ISED, RED, MIC Japan, and UKCA requirements.
  • Streamlined Workflow – Integrated testing and documentation processes designed to reduce turnaround time and simplify project management.
  • Advanced Technical Guidance – Expert support for complex wireless designs, including MIMO, antenna diversity, co-located radios, and environmental performance considerations.
  • Comprehensive Documentation – Detailed reporting, regulatory summaries, and traceable records for faster product approvals.
  • Remote Verification Support – Secure remote access for test observation, data review, and issue resolution without on-site delays.

Accelerate your path to global compliance.