Radio Equipment Directive (RED):
EU directive for radio equipment
Login
The iCS - VPN is a remote access service for simple and secure networking of sites, systems or mobile devices via a VPN network.
The iRM enables rollouts of device firmware, configurations, security certificates and applications including logging.
Here you get access to our Partner Portal – become a part of our network now!
From August 2025, the Radio Equipment Directive (RED) will require manufacturers to implement specific IT security requirements in radio equipment. This EU-wide regulation on RED cybersecurity lays the foundation for enhanced security in connected communications. With a high-performance industrial routers and reliable managed services, INSYS icom supports RED compliance and helps ensure long-term future viability.
Page navigation:
Definition RED
Target group
Requirements
Our offer
Expert talk
Security & Compliance
FAQ
The Radio Equipment Directive (2014/53/EU) has been revised in response to increasing cyber threats. From 1 August 2025, it requires internet-enabled radio equipment, such as industrial routers, to meet essential cybersecurity requirements. The aim is to establish a uniform level of protection within the EU internal market, with regard to network security, data protection and the prevention of misuse. Companies, especially operators of critical infrastructures, are under considerable pressure to act – from adapting existing development processes through to conformity assessment.
The Radio Equipment Directive (2014/53/EU), or RED for short, has regulated the placing of radio equipment on the EU internal market since 2014. In 2021, the directive was extended to include specific cybersecurity requirements, which will become mandatory from 1 August 2025.
The aim of the extended Radio Equipment Directive is to strengthen the network security of radio equipment, protect personal data and prevent fraud. The scope covers all devices with radio functionality, such as Wi-Fi or cellular radio modules, that are connected to the internet or enable communication between devices.
The technical requirements include protection against unauthorised access, ensuring data availability and integrity, and safeguarding personal data. Relevant standards for technical implementation include EN 18031-1:2024, EN 18031-2:2024 and EN 18031-3:2024.
The original RED focused on essential requirements for radio equipment, particularly electromagnetic compatibility (EMC) and the efficient use of the radio spectrum. The most recent revision adds specific provisions on cybersecurity to these requirements.
New mandatory requirements now apply, particularly for internet-connected devices:
These adjustments are a response to the growing threat landscape in the field of connected products.
The new Radio Equipment Directive cybersecurity requirements affect a wide range of stakeholders along the value chain of connected radio equipment. In particular, the following groups must prepare for the tightened security provisions:
Relevant industries: energy supply, transport, water supply and wastewater management, healthcare, public administration, industrial automation and other security-critical areas with internet or wireless connectivity
The extended requirements of the RED will apply from 1 August 2025. No transitional period is planned. From that date, the requirements will be binding for all affected devices.
Key challenges:
Publication Delegated Regulation (EU) 2022/30 with the addition of cybersecurity provisions Article 3.3 d/e/f
Formal start of application of RED Article 3.3 d/e/f with transition period
Issue of the harmonised RED cybersecurity requirements
Mandatory start of validity RED Article 3.3 d/e/f
Failure to comply with the Radio Equipment Directive cybersecurity requirements can lead to serious consequences:
Benefit from our cyber-secure and standards-compliant solutions.
Router architecture with BSI-compliant security features.
Automated roll-out of security-relevant updates with audit-proof documentation to fulfil the obligation to provide evidence via icom Router Management.
Long-term provision and maintenance of security-relevant software updates throughout the entire product lifecycle.
Audit-proof logging of all configuration changes and access to the router.
Implementation of IEC 62443-4-1 compliant processes throughout the entire product lifecycle.
Managed VPN service with strong authentication, encrypted connections and central key management.
These measures provide targeted support for companies in implementing the RED by technically securing the required regulatory security standards, fulfilling key evidence and control obligations, and enabling IT-based transparency.
The added value: significant relief in audit preparation, minimised operational risks and demonstrably higher security levels across connected infrastructures.
icom Router Management (iRM) provides a RED-compliant update infrastructure in accordance with EN 18031-1 and ensures a secure update mechanism. Whether automated or approval-based, iRM supports the secure implementation of key requirements for securing radio equipment. By using strong cryptography and tamper-proof distribution, iRM sets standards for secure, scalable and RED-compliant device management throughout the entire lifecycle.
| RED Requirement (EN 18031-1) | Implementation via iRM + icom OS |
|---|---|
| Remote software/firmware updates must be secure and authorized | iRM uses certificate-based signing and encryption for update packets, validated by icom OS routers before installation. |
| Update must prevent unauthorized modifications | Optionally, only packages with a verified digital signature or encrypted content from a trusted certification authority can be accepted. |
| Fallback-safe update strategies | Updates can be scheduled, manually approved, or executed unattended, ensuring flexibility for safe deployment. |
| Integrity and authenticity validation before execution | Routers validate update integrity using hashes and enforce use of verified certificates. |
| Tamper protection | Routers reject unsigned or unverified packets. Customers can configure enforcement policies within the router interface. |
| Human supervision possible but not required | iRM supports fully automated, semi-automated, or manual supervised updates. This satisfies RED’s ‘under human approval OR no-harm assurance’ clause. |
| Traceability of updates and access | All update actions are logged and visible in the iRM dashboard and can be audited. |
Simply fill out the form to gain immediate access to the expert talk.
In this expert talk, INSYS icom demonstrates how RED compliance and cybersecurity
can be successfully implemented in practice.
Here you will find relevant evidence and documents on RED conformity, certified development processes and IT security measures from INSYS icom.
The new requirements must be implemented from 1 August 2025. No transitional period is planned.
All radio equipment that enables communication over the internet or controls internet-based communication processes is affected.
INSYS icom provides support with secure hardware, a BSI-compliant software architecture, encrypted VPN connections and automated security updates, including audit-proof documentation of evidence via icom Router Management.
Changes to configurations and system access are automatically logged and securely archived. The evidence is protected against subsequent changes and can be traced at any time.
icom Router Management enables automated software updates, centralised management of device configurations and audit-proof documentation of security-relevant processes.
Yes, the icom Connectivity Suite – VPN offers encrypted connections with strong authentication and therefore fulfils key requirements of the RED cyber security guidelines.
NIS 2
The NIS 2 Directive (Network and Information Security) sets out binding cybersecurity requirements for critical infrastructures.
Cyber Resilience Act (CRA)
The Cyber Resilience Act (CRA) obliges manufacturers of digital products to ensure cyber security throughout the entire product life cycle.
Centralised management for updates,
configurations and documentation