<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>BTL Inc.</title>
<meta name="keywords" content="Inspection、certification" />
<meta name="description" content="BTL electronic product testing and certification, providing electronic product certification services in many regions at home and abroad.  " />
<meta name="viewport" content="width=1100,target-densitydpi=high-dpi,user-scalable=yes"/>
<link rel="stylesheet" type="text/css" href="../css/css.css">
<link rel="stylesheet" type="text/css" href="../css/banner.css">
<link rel="stylesheet" type="text/css" href="../css/animate.min.css">
<script language="JavaScript" type="text/JavaScript" src="../js/jquery-1.7.1.min.js"></script>
<script language="JavaScript" type="text/javascript" src="../js/banner.js"></script>
<script language="JavaScript" type="text/JavaScript" src="../js/images.js"></script>
<script language="JavaScript" type="text/JavaScript" src="../js/clearbox.js"></script>
<script language="JavaScript" type="text/JavaScript" src="../js/wow.min.js"></script> 
<script>
function uaredirect(f){
	try{
		var b=false;
		if(arguments[1]){
			var e=window.location.host;var a=window.location.href;
			if(isSubdomain(arguments[1],e)==1){
				f=f+"/#m/"+a;b=true
			}else{
				if(isSubdomain(arguments[1],e)==2){
					f=f+"/#m/"+a;b=true
				}else{
					f=a;b=false
				}
			}
		}else{
			b=true
		}
		if(b){
			var c=window.location.hash;
			if(!c.match("fromapp")){
				if((navigator.userAgent.match(/(iPhone|iPod|Android|ios|iPad)/i))){
					location.replace(f)
				}
			}
		}
	}catch(d){}
}
uaredirect('../men/industryshow.php?id=713');

wow = new WOW({animateClass: 'animated',offset:100}); 
wow.init();
$(document).ready(function(){
  $(".menu li").hover(function(){
  	$("div",this).fadeIn();
  },function(){
  	$("div",this).fadeOut();
  });
  $(".menu2 ul li").hover(function(){
  	$("div",this).fadeIn();
  },function(){
  	$("div",this).fadeOut();
  });
  $(".menu li div h6").hover(function(){
  	$("dl",this).fadeIn();
  },function(){
  	$("dl",this).fadeOut();
  });
});
</script>
</head>
<body>
<div class="toper">
	<div class="topcen">
    <form name="topform" method="post" action="serach.php">
    	<input type="text" name="topword" value="" class="topinp" />
        <input type="submit" name="topsub" value="" class="topsub" />
    </form>
	<span class="language"><a href="../cn/index.php">简</a> | <a href="../index.php">繁</a> | <a href="index.php" >EN</a></span>
	<div class="fl logoer"><a href="index.php" ><img src="../images/logo.png"></a><p>Stock Code: 6840</p></div>
    <ul class="menu">
		<li><a href="index.php">Home</a></li>
        <li><a href="group.php" class="m">About BTL</a>
    	<div>
        	<a href=group.php?cid=486>Group profile</a><a href=group.php?cid=487>Group news</a><a href=group.php?cid=489>Complaints process</a><a href=group.php?cid=498>Reporting channels for violations of professional ethics</a><a href=group.php?cid=491>Certificate</a><a href=group.php?cid=488>Declaration of impartiality</a>        </div>
    </li>
        <li><a href="industry.php" class="m">Technical platform</a>
    	<div>
        	<a href=industry.php?cid=473>Mobile Communication</a><a href=industry.php?cid=479>BQB</a><a href=industry.php?cid=472>SAR / OTA</a><a href=industry.php?cid=480>IoT</a><a href=industry.php?cid=413>EMC</a><a href=industry.php?cid=424>RF</a><a href=industry.php?cid=474>Telecom</a><a href=industry.php?cid=425>Safety</a><a href=industry.php?cid=494>New Energy</a><a href=industry.php?cid=481>Other</a><a href=industry.php?cid=504>Information security</a>        </div>
    </li>
        <li><a href="Global.php" class="m">Global market access</a>
    	<div>
        	<h6><a href=Global.php?cid=416>East Asia & South Asia</a><dl><dd><a href=news.php?cid=440>China</a></dd><dd><a href=news.php?cid=456>Japan</a></dd><dd><a href=news.php?cid=458>Indian</a></dd><dd><a href=news.php?cid=459>Korea</a></dd><dd><a href=news.php?cid=460>Taiwan</a></dd></dl></h6><h6><a href=Global.php?cid=417>Southeast Asia</a><dl><dd><a href=news.php?cid=433>Indonesia</a></dd><dd><a href=news.php?cid=434>Malaysia</a></dd><dd><a href=news.php?cid=435>Thailand</a></dd><dd><a href=news.php?cid=436>Vietnam</a></dd></dl></h6><h6><a href=Global.php?cid=418>Middle East</a><dl><dd><a href=news.php?cid=461>Saudi Arabia</a></dd></dl></h6><h6><a href=Global.php?cid=419>Africa</a><dl><dd><a href=news.php?cid=463>South Africa</a></dd></dl></h6><h6><a href=Global.php?cid=420>Europe</a><dl><dd><a href=news.php?cid=465>European Union</a></dd><dd><a href=news.php?cid=492>United Kingdom</a></dd><dd><a href=news.php?cid=464>Russia</a></dd></dl></h6><h6><a href=Global.php?cid=421>South America</a><dl><dd><a href=news.php?cid=469>Argentina</a></dd><dd><a href=news.php?cid=470>Brazil</a></dd></dl></h6><h6><a href=Global.php?cid=422>North America</a><dl><dd><a href=news.php?cid=466>USA</a></dd><dd><a href=news.php?cid=467>Canada</a></dd><dd><a href=news.php?cid=468>Mexico</a></dd></dl></h6>        </div>
    </li>
        <li><a href="Investor.php" class="m">Investors zone</a>
    	<div>
        	<a href=Investor.php?cid=484>Croporate Governance</a><a href=Investor.php?cid=485>Stakeholder Zone</a><a href=Investor.php?cid=501></a><a href=Investor.php?cid=426>Financial and Business Information </a><a href=Investor.php?cid=482>Stock Quote and Dividend History</a><a href=Investor.php?cid=427>Shareholders's Service</a><a href=Investor.php?cid=490>Investor conference</a><a href=Investor.php?cid=483>Stock Affairs </a><a href=Investor.php?cid=502>Information Security</a>        </div>
    </li>
        <li><a href="join.php" class="m">HR Section</a>
    	<div>
        	<a href=join.php?cid=428>Talent recruitment</a><a href=join.php?cid=503>Human Rights Policy</a><a href=join.php?cid=499></a><a href=join.php?cid=500></a><a href=contact.php>Contact Us</a>        </div>
    </li>
        
    </ul>
    </div>
</div>
<div class="bgw">

<div class="m2pos">
 <div class="main"><span class="m2posNm">Location：<a href='index.php'>Home</a> - Technical platform - Signs of trust on the Internet in the United States, what's next?</span></div>
 </div>
 <div class="p50">



 
 <div class="m2proBox" style="border-bottom:0;">
<div class="main clear"><div class="lyleft">
    	<ul>
		<li><a href=industry.php?cid=473 class=>Mobile Communication</a></li><li><a href=industry.php?cid=479 class=>BQB</a></li><li><a href=industry.php?cid=472 class=>SAR / OTA</a></li><li><a href=industry.php?cid=480 class=>IoT</a></li><li><a href=industry.php?cid=413 class=>EMC</a></li><li><a href=industry.php?cid=424 class=>RF</a></li><li><a href=industry.php?cid=474 class=>Telecom</a></li><li><a href=industry.php?cid=425 class=>Safety</a></li><li><a href=industry.php?cid=494 class=>New Energy</a></li><li><a href=industry.php?cid=481 class=cur>Other</a></li><li><a href=industry.php?cid=504 class=>Information security</a></li>        </ul>
    </div>
    <div class="lyright">
<div class="pp2">
<div class="tt">Signs of trust on the Internet in the United States, what's next?</div>
<div class="txt2 txtimg"><p><span style="color: rgb(255, 255, 255); background-color: rgb(255, 0, 0);"><strong>Signs of trust on the Internet in the United States, what&#39;s next?&nbsp;</strong></span></p><p><strong>Help create a global cybersecurity baseline. Consider mutual recognition with others (including the European Union and Japan).</strong></p><p><strong><span style="color: rgb(255, 0, 0);">Focus on Cybersecurity Fundamentals:&nbsp;</span></strong></p><ul class=" list-paddingleft-2" style="list-style-type: disc;"><li><p>Security-by-design</p></li><li><p>Transparency for consumers</p></li><li><p>Security updatability</p></li><li><p>International harmonization</p></li></ul><p><span style="color: rgb(255, 0, 0);"><strong>What&#39;s Next:</strong></span></p><ul class=" list-paddingleft-2" style="list-style-type: disc;"><li><p>The FCC issues announcements, gathers comments, and finalizes program rules</p></li><li><p>The FCC defines the scope of certification (ISO 17065 for CLA and ISO 17025 for CyberLAB).</p></li><li><p>CLA and CyberLAB apply and earn the required certifications.</p></li><li><p>Manufacturers prepare for testing and documentation requirements (NISTIR 8425).</p></li><li><p>Manufacturers work with recognized CLAs (and CyberLAB, if certified, to apply and test products).</p></li><li><p>ETSI and CENELEC standardization progress.</p></li></ul><p><strong><span style="color: rgb(255, 0, 0);">Other standardization directions:</span></strong></p><p></p><p><strong>Environmental characteristics:</strong> The standard requires that &quot;the intended use of the device&quot; be specified as the minimum compliance level to support extended performance testing, and the EMC working group is discussing specific options;</p><p><strong>Emergency Call (RED Article 3.3 (g)):</strong> Harmonization standards are not planned yet, and manufacturers are advised to refer to ETSI TS 103 625 V1.3.1.</p><p><span style="color: rgb(255, 0, 0);"><strong>CENELEC (European Committee for Electrotechnical Standardization) Standard Update (Cybersecurity)</strong></span></p><p></p><p><strong>Old standard status:</strong> EN 18031-x series of standards are no longer updated, and the relevant content is transferred to the CRA standard system.</p><p><strong>CRA standard planning: </strong>Participants: About 300 people participated in standard formulation;</p><p><span style="color: rgb(255, 0, 0);"><strong>Time node:</strong></span></p><p></p><p><strong>Horizontal Standard (General Cybersecurity Requirements):</strong> Expected to be completed in August 2026;</p><p><strong>Vertical Standards (Industry-Specific Requirements): </strong>Expected to be completed by October 2027;</p><p><strong>CRA Full Effective Date: </strong>December 11, 2027;</p><p><strong>Challenge: </strong>Strict adherence to the time node to ensure alignment with the RED Cybersecurity Clause Repeal Plan.</p><p><br/></p><hr/><p><span style="color: rgb(255, 255, 255); background-color: rgb(255, 0, 0);"><strong>Key Issues (Security)&nbsp;</strong></span></p><p><strong>What is the timeline for the connection between the EU RED cybersecurity requirements and the CRA (Cybersecurity Act)? How will manufacturers navigate compliance during this transitional phase?</strong></p><p><span style="color: rgb(255, 0, 0);"><strong>Connection timeline:</strong></span></p><p>1. The RED Cybersecurity Requirements went&nbsp; into effect on August 1, 2025, and manufacturers are required to complete device compliance.</p><p>2. The EU plans to abolish the cybersecurity provisions in&nbsp; RED&nbsp; from December&nbsp; &nbsp;11, 2027, and fully transfer relevant compliance responsibilities to the CRA;</p><p>3. CRA standard development is advancing simultaneously: horizontal standards (general requirements) are expected to be completed in August 2026, and vertical standards (industry-specific requirements) are expected to be completed in October&nbsp; 2027, ensuring&nbsp; implementation conditions are in place by&nbsp; December&nbsp; 2027.</p><p><span style="color: rgb(255, 0, 0);"><strong>Manufacturer Response:</strong></span></p><ul class=" list-paddingleft-2" style="list-style-type: square;"><li><p><strong>Short-term (2025.8-2027.12): </strong>Strictly comply with RED&#39;s existing cybersecurity requirements, clarify the correspondence between non-harmonized standards (such as EN 303 645) and RED&nbsp; requirements when submitting compliance documents, and avoid relying on notifying bodies to sort out logic.</p></li><li><p><strong>Medium-term (after August 2026): </strong>Track the release of&nbsp; CRA horizontal standards and evaluate the adaptability of products to general cybersecurity requirements in advance.</p></li><li><p><strong>Long-term (post-October 2027): </strong>Adjust product design based on the CRA&#39;&nbsp; s vertical standards (specific requirements for wireless electrical equipment) to ensure compliance after the full implementation of&nbsp; the CRA&nbsp; after December&nbsp; 2027.</p></li></ul><p><span style="color: rgb(255, 0, 0);"><strong>RED&nbsp;Directive Cybersecurity Requirements: &quot;Compliance Core and Practical Pain Points&quot; in the Transition Phase</strong></span></p><ul class=" list-paddingleft-2" style="list-style-type: square;"><li><p>Article 3.3D/E/F in the RED Directive (Radio Equipment Directive) is the core basis for the current network security of wireless equipment in the EU, and Michael Darby&#39;s interpretation focuses on &quot;clarifying the scope&quot; and &quot;clarifying the boundaries of responsibility&quot;. Solve the most confusing question of &quot;whether to do it, what to do, and who is responsible&quot; for manufacturers</p></li><li><p>Darby replaces &quot;abstract definitions&quot; with &quot;scenario-based cases&quot; and clarifies the applicable boundaries of the three major clauses:</p></li></ul><p><img src="/upload_files/2025-12/1764656823295284.jpg" title="1764656823295284.jpg" alt="1764656823295284.jpg" width="950" height="615"/></p><hr/><p><span style="color: rgb(255, 255, 255); background-color: rgb(255, 0, 0);"><strong>CRA&nbsp;</strong></span></p><p><strong><span style="font-family: ">▶&nbsp;</span>CRA Regulations: &quot;Systemic Change and Compliance Logical Restructuring&quot; after 2027</strong></p><p><strong><span style="font-family: ">▶&nbsp;</span>The CRA (Cybersecurity Act) is the &quot;ultimate framework&quot; for EU cybersecurity compliance and will replace RED&#39;s cybersecurity requirements, with Michael and Steve&#39;s interpretation focusing on &quot;showing CRA and RED.&quot; The core of &quot;advance layout of transition period preparation&quot;, the core is to shift from &quot;one-time testing&quot; to &quot;full life cycle security management&quot;.</strong></p><p><span style="color: rgb(255, 0, 0);"><strong>A) The&nbsp; &quot;essential difference&quot; between CRA and RED: from &quot;product compliance&quot; to &quot;eco-compliance&quot;</strong></span></p><p><img src="/upload_files/2025-12/1764657027103654.jpg" title="1764657027103654.jpg" alt="1764657027103654.jpg" width="900" height="560"/></p><p><span style="color: rgb(255, 0, 0);"><strong>B) CRA &#39;s &quot;tiered compliance system&quot;: accurately identify risks and avoid &quot;one-size-fits-all&quot;</strong></span><br/><strong>The CRA&#39;&nbsp; s core innovation is &quot;grading by risk,&quot; where compliance requirements vary significantly across categories of equipment and manufacturers. It is necessary to clarify the ownership of the product before formulating a compliance strategy:</strong></p><p><strong>1. Default Category (Underlying Risk):</strong></p><p>Senarios: simple devices without sensitive data processing and no networking function (such as ordinary Bluetooth mice).</p><p>Compliance Requirements: Self-assessment to meet basic security standards (such as mandatory modification of default passwords) without the need for notification body intervention.</p><p><br/> <strong>2. Class 1(Medium risk):</strong><br/></p><p>Applicable scenarios: devices that are connected to the Internet but do not have highly sensitive functions (such as ordinary smart light bulbs).</p><p>Compliance requirements: If there are harmonized standards, they will self-declare, and if there are no standards, they will need to be evaluated by the notifying body (such as verifying the encryption strength of data transmission).</p><p><br/> <strong>3. Class 2(High risk):&nbsp;</strong><br/>Applicable scenarios: devices containing sensitive components (tamper-proof chips, firewalls), handling sensitive personal data (such as smart door locks, medical monitoring equipment).</p><p>Compliance Requirements: Mandatory Notifying Bodies to evaluate, provide &quot;security design documents&quot; and &quot;vulnerability response processes&quot;, and submit regular vulnerability reports.</p><p><br/> <strong>4.&nbsp;Key Categories (Very High Risk):</strong><br/></p><p>Senariosic scenarios: equipment involving public safety and critical infrastructure (such as power grid wireless monitoring equipment).</p><p>Compliance Requirements: Comply with EU ANSSIThe special certification program formulated by (network security agency) needs to pass stricter penetration tests and anti-attack tests.</p><p><br/></p><p><span style="color: rgb(255, 0, 0);"><strong>C).&nbsp;&quot;Key Actions&quot; for the Transition Period (2025-2027): </strong></span><strong>Avoiding &quot;reactive response&quot; to CRA compliance requires &quot;laying out ahead of time&quot; rather than waiting for 2027 to take effect, and core preparatory actions include<span style="color:#ff0000"><span style="color: rgb(0, 0, 0);">:</span></span></strong></p><p><strong>1.&nbsp;</strong><strong>2026 Vulnerability Reporting System Construction (Priority):</strong></p><ul class=" list-paddingleft-2" style="list-style-type: disc;"><li><p>The CRA requires manufacturers to report vulnerability information to the EU Harmonized Database from&nbsp; September&nbsp; 2026&nbsp; and to be&nbsp; &quot;machine-readable&quot; using&nbsp; the CSAF (Cybersecurity Assessment Framework) format.</p></li><li><p>Preparation actions: Establish a &quot;vulnerability monitoring team&quot;, connect with open source vulnerability libraries (such as CVEs), and develop a &quot;vulnerability classification response process&quot; (such as high-risk vulnerability 24). repaired within hours).</p></li></ul><p><br/></p><p><strong>2、SBOM (Software Bill of Materials) Management Capacity Building:</strong></p><ul class=" list-paddingleft-2" style="list-style-type: disc;"><li><p>CRA requires manufacturers to know the source, version, and supplier of all software components of their products in order to quickly locate upstream vulnerabilities (for example, if an open source inventory is vulnerable, it can be immediately investigated whether it is used).</p></li><li><p>Preparation Action: Embed SBOM generation tools (such as SPDX&nbsp; format) during the R&amp;D stage and sign&nbsp; &quot;vulnerability notification agreements&quot; with software vendors to ensure timely synchronization of upstream vulnerabilities.</p></li></ul><p><br/></p><p><strong>3、RED and CRA&nbsp; &quot;Compliance Bridge&quot;:</strong></p><ul class=" list-paddingleft-2" style="list-style-type: disc;"><li><p>EN18031 standard tests under RED (e.g., data encryption, identity authentication) can be partially reused to CRA to avoid duplicate tests.</p></li><li><p>Preparation Action: Retain complete documentation of RED testing (e.g., penetration test report, cryptographic algorithm validation records) as &quot;upfront evidence&quot; of&nbsp; CRA compliance.</p></li></ul><p><br/></p><p><span style="color: rgb(255, 0, 0);"></span><span style="color: rgb(255, 0, 0);"><strong>Timeline and Transition: </strong></span>Some of the CRA&#39;&nbsp; s obligations, such as vulnerability reporting, will be effective from&nbsp; September 11,&nbsp; 2026, with full effect in December&nbsp; 2027 On March 11, RED&#39;s cybersecurity requirements will be terminated, and the RED Authorization Act is expected to be repealed at the same time.&nbsp; By&nbsp; December 11, 2027, wireless electrical equipment must comply with RED&#39;s security, EMC, radio, and network security requirements; Then, RED&#39;s security, EMC, radio requirements, and CRA&#39;s cybersecurity requirements need to be met, and the relevant compliance statements need to be integrated in the same DOC.</p><p><br/> <strong><span style="color: rgb(255, 0, 0);"></span></strong><span style="color: rgb(255, 0, 0);"><strong>Scope and Classification:</strong></span> CRA is suitable for products containing digital components, including software, extending far beyond radio equipment, covering wire-only equipment, non-embedded software, non-radio components, and more. Devices are divided into default categories (basic requirements, self-assessment is sufficient), Class 1 (if there are no harmonized standards, they need to be evaluated by the notified body, and if there are, they can be self-declared), Class 2 (including tamper-proof microprocessors, firewalls, etc., which need to be evaluated by the notified body), and critical categories (need to follow specific certification schemes, which may be determined by the EU cybersecurity agency ANSSI). enacted).</p></div>
</div>


</div>

<div style="float:right"><a href="industry.php"><img src=images/back.gif border=0></a><a href=#><img src=images/top_x.gif border=0></a></div>

</div>

</div>

 </div>




</div>
<div class="bommenu">
	<ul>
        <li><a href="group.php">About BTL</a>
    	<div>
        	<a href=group.php?cid=486>Group profile</a><a href=group.php?cid=487>Group news</a><a href=group.php?cid=489>Complaints process</a><a href=group.php?cid=498>Reporting channels for violations of professional ethics</a><a href=group.php?cid=491>Certificate</a><a href=group.php?cid=488>Declaration of impartiality</a>        </div>
    </li>
        <li><a href="industry.php">Technical platform</a>
    	<div>
        	<a href=industry.php?cid=473>Mobile Communication</a><a href=industry.php?cid=479>BQB</a><a href=industry.php?cid=472>SAR / OTA</a><a href=industry.php?cid=480>IoT</a><a href=industry.php?cid=413>EMC</a><a href=industry.php?cid=424>RF</a><a href=industry.php?cid=474>Telecom</a><a href=industry.php?cid=425>Safety</a><a href=industry.php?cid=494>New Energy</a><a href=industry.php?cid=481>Other</a><a href=industry.php?cid=504>Information security</a>        </div>
    </li>
        <li><a href="Global.php">Global market access</a>
    	<div>
        	<a href=Global.php?cid=416>East Asia & South Asia</a><a href=Global.php?cid=417>Southeast Asia</a><a href=Global.php?cid=418>Middle East</a><a href=Global.php?cid=419>Africa</a><a href=Global.php?cid=420>Europe</a><a href=Global.php?cid=421>South America</a><a href=Global.php?cid=422>North America</a>        </div>
    </li>
        <li><a href="Investor.php">Investors zone</a>
    	<div>
        	<a href=Investor.php?cid=484>Croporate Governance</a><a href=Investor.php?cid=485>Stakeholder Zone</a><a href=Investor.php?cid=501></a><a href=Investor.php?cid=426>Financial and Business Information </a><a href=Investor.php?cid=482>Stock Quote and Dividend History</a><a href=Investor.php?cid=427>Shareholders's Service</a><a href=Investor.php?cid=490>Investor conference</a><a href=Investor.php?cid=483>Stock Affairs </a><a href=Investor.php?cid=502>Information Security</a>        </div>
    </li>
        <li><a href="join.php">HR Section</a>
    	<div>
        	<a href=join.php?cid=428>Talent recruitment</a><a href=join.php?cid=503>Human Rights Policy</a><a href=join.php?cid=499></a><a href=join.php?cid=500></a><a href=contact.php>Contact Us</a>        </div>
    </li>
        </ul>
</div>
<div class="end">
	<p><strong>LINK: </strong>
	<a href=https://www.globalcertificationforum.org/ target=_blank>GCF</a><a href=https://www.ptcrb.com/ target=_blank>PTCRB</a></p>
Copyright © 2008-2019 BTL Inc.  All Rights Reserved  ICP NO.18145055<a href="https://beian.miit.gov.cn" target="_blank">粤ICP备18145055号</a>&nbsp;&nbsp;技术支持：<a href="http://www.0769net.com/" target="_blank">东莞网页设计</a>
</div>
</body>
</html>