How to Ensure Ongoing RED Compliance for Software Updates

    Software updates are essential for connected devices, but each release can impact your EN 18031 compliance status. This guide explains what the standard requires for update mechanisms, when re-assessment is needed, and how to build a sustainable compliance workflow that keeps pace with your development cycle.

    April 7, 2026

    Key Takeaways
    Ensuring ongoing RED compliance for software updates on connected IoT devices

    Ongoing RED compliance for software updates means ensuring that every firmware or software release on your connected device continues to meet the cybersecurity requirements of the Radio Equipment Directive (RED) under EN 18031. Software updates can introduce new security functions, modify existing ones, or change how your device interacts with networks and user data. Each of these changes has compliance implications.

    • EN 18031 defines specific requirements for software update mechanisms: Secure delivery, integrity verification, authentication, and rollback capabilities are all addressed in the standard.

    • Not all updates trigger re-assessment: Minor bug fixes that do not affect security-relevant functions may not require a full compliance review, but changes to cryptographic libraries, access control, or network protocols typically do.

    • Documentation must be maintained continuously: Compliance tables, decision tree outcomes, and test plan verdicts need to reflect the current state of your device software, not just the initial release.

    • Automated workflows reduce compliance drift: Manual tracking of update impacts across dozens of EN 18031 sections is error-prone. Structured compliance platforms keep documentation synchronized with your development cycle.

    • The update mechanism itself is a compliance requirement: EN 18031 does not just care about what you update, but how you deliver, verify, and install updates securely.

    What EN 18031 Requires for Software Update Mechanisms
    EN 18031 software update mechanism requirements for secure firmware delivery and verification

    EN 18031 dedicates specific sections to software update mechanisms across all three parts of the standard. These requirements apply to any device that supports firmware or software updates, which in practice means nearly every internet-connected radio equipment product.

    The standard addresses software updates from multiple angles, depending on which EN 18031 parts your project requires:

    EN 18031 PartRED ArticleUpdate-Related Focus

    EN 18031-1

    3.3(d) - Network Protection

    Updates must not introduce vulnerabilities that compromise network resources. Secure delivery channels and integrity verification prevent malicious firmware from reaching the device.

    EN 18031-2

    3.3(e) - Privacy Protection

    Software updates must not expose personal data during the update process. Update mechanisms should maintain privacy safeguards and not bypass data protection controls.

    EN 18031-3

    3.3(f) - Fraud Prevention

    Devices handling monetary transactions must ensure updates do not weaken financial security controls. Clause 6.3.2.4 specifically addresses secure update mechanisms for financial assets.

    Core Security Requirements for Update Mechanisms

    Regardless of which EN 18031 parts apply, the standard expects update mechanisms to satisfy several fundamental security properties:

    • Integrity verification: The device must verify that software updates have not been tampered with during delivery. This typically involves cryptographic signatures or hash verification.

    • Authentication of update source: The device must confirm that updates originate from an authorized source. Unsigned or unauthenticated updates represent a compliance failure.

    • Secure delivery channel: Updates should be transmitted over encrypted channels to prevent interception and modification in transit.

    • Rollback protection: The standard considers whether devices can revert to a previous, potentially vulnerable software version. Rollback mechanisms must be controlled and documented.

    • User notification: Where applicable, devices should inform users about available updates and the security implications of not installing them.

    • Update availability period: Manufacturers should define and communicate how long security updates will be provided for a given product.

    How Does This Differ from General Firmware Security?

    EN 18031 goes beyond generic firmware security best practices by requiring that update mechanisms are documented within the compliance framework. This means every aspect of your update process must be recorded in compliance tables, evaluated through decision trees, and validated in test plans. The update mechanism is not just a technical implementation - it is a compliance deliverable.

    Software updates are one of several cybersecurity domains covered by EN 18031. For the full list of required measures, see our guide to essential RED cybersecurity measures.

    When Do Software Updates Trigger Compliance Re-Assessment?
    Decision flowchart showing when software updates trigger EN 18031 compliance re-assessment

    One of the most common questions from product security managers is: does every software update require a full compliance re-assessment? The short answer is no - but the criteria for when re-assessment is needed must be clearly understood and documented.

    Updates That Typically Require Re-Assessment

    A compliance re-assessment is generally needed when a software update affects any security-relevant function documented in your EN 18031 compliance tables. This includes:

    • Changes to cryptographic implementations: Updating encryption libraries, changing key lengths, or modifying certificate handling directly impacts sections on cryptography and secure communications.

    • Modifications to access control logic: Adding, removing, or changing authentication mechanisms (passwords, biometrics, tokens) affects access control sections and their associated decision trees.

    • Network protocol changes: Switching communication protocols, adding new network interfaces, or modifying firewall rules impacts network protection requirements under EN 18031-1.

    • Data handling changes: Modifications to how personal data is collected, stored, or transmitted require re-evaluation of privacy protection sections under EN 18031-2.

    • Payment or transaction logic changes: Any update affecting financial transaction processing requires re-assessment under EN 18031-3.

    • Changes to the update mechanism itself: If you modify how your device receives, verifies, or installs updates, the update mechanism compliance documentation must be revised.

    Updates That May Not Require Full Re-Assessment

    • UI-only changes: Cosmetic updates to the user interface that do not affect security functions or data flows.

    • Performance optimizations: Code refactoring that improves speed or memory usage without changing security-relevant behavior.

    • Bug fixes in non-security code: Fixing defects in features that have no interaction with security functions, network access, or personal data.

    • Content updates: Changes to static content, localization files, or documentation that do not alter device behavior.

    The Grey Area: How to Decide

    In practice, many updates fall into a grey area. A performance optimization might inadvertently change how a security function behaves under load. A UI change might alter how users interact with authentication flows. The safest approach is to map every planned update against your EN 18031 asset inventory. If the update touches any identified security asset, network asset, or privacy asset, a targeted re-assessment of the affected sections is warranted.

    This is where structured compliance platforms provide significant value. Rather than manually reviewing dozens of compliance sections to determine impact, a platform like RedComply allows you to trace which sections and tables reference the affected assets and focus your re-assessment precisely where it is needed.

    When updates address discovered vulnerabilities, proper documentation is essential. Our vulnerability management guide covers the audit-ready documentation process.

    Building a Sustainable Update Compliance Workflow
    Automated software update compliance workflow with SaaS dashboard and pipeline visualization

    Maintaining ongoing RED compliance across software updates requires a repeatable, structured workflow - not a one-time effort that becomes outdated with the next release. Here is a practical framework that product security teams can implement.

    1. Classify every update before release: Before any software update enters testing, classify it as security-relevant or non-security-relevant based on which EN 18031 assets it affects. This classification determines the compliance review scope.

    2. Maintain a living compliance baseline: Your EN 18031 compliance documentation should be treated as a living document set. When an update is classified as security-relevant, update the affected compliance tables, decision tree responses, and test plan entries before the release ships.

    3. Run targeted re-assessments: For security-relevant updates, re-run the affected decision trees and update test plan verdicts. You do not need to re-assess the entire device - only the sections impacted by the change.

    4. Version your compliance documentation: Link each compliance documentation state to a specific software version. This creates an audit trail showing what was assessed for each release.

    5. Automate where possible: Use compliance platforms that can auto-populate tables from asset inventories, auto-calculate test plan verdicts, and flag when changes affect documented security functions.

    6. Review the update mechanism periodically: Even if the update mechanism itself does not change, periodically verify that it still meets EN 18031 requirements as threat landscapes evolve.

    Manual vs. Automated Update Compliance Tracking

    Compliance TaskManual ApproachAutomated Approach

    Update impact classification

    Engineer reviews EN 18031 sections one by one

    Platform maps update scope to affected compliance sections automatically

    Compliance table updates

    Copy changes across dozens of tables manually

    Tables auto-update from asset inventory when linked assets change

    Decision tree re-evaluation

    Re-run paper-based or spreadsheet trees

    Interactive decision trees retain previous state and highlight what needs review

    Test plan verdict recalculation

    Manually recompute pass/fail criteria

    Auto-calculated verdicts update in real time as inputs change

    Documentation versioning

    Manually save dated copies of spreadsheets

    Platform maintains version history linked to software releases

    DoC regeneration

    Rebuild PDF from scattered updated sources

    One-click PDF generation from current compliance data

    The difference between these approaches becomes dramatic as your product matures. A device with quarterly updates will need 4+ compliance review cycles per year. Over a 5-year product lifecycle, that is 20+ reviews. Without automation, compliance drift is almost inevitable.

    Software Update Compliance Checklist

    Use this checklist to verify your software update compliance posture against EN 18031 requirements. Each item corresponds to a specific area of the standard.

    Update Mechanism Security

    • Updates are delivered over encrypted channels (TLS 1.2+, HTTPS, or equivalent)

    • Update packages are cryptographically signed by the manufacturer

    • The device verifies the signature before installing any update

    • The device authenticates the update server or source

    • Rollback to known-vulnerable versions is prevented or controlled

    • Failed updates do not leave the device in an insecure state

    Ongoing Compliance Management

    • Every software release is classified as security-relevant or non-security-relevant

    • Security-relevant updates trigger targeted re-assessment of affected EN 18031 sections

    • Compliance tables are updated to reflect the current software version

    • Decision tree outcomes are re-evaluated when security functions change

    • Test plan verdicts are recalculated after compliance table updates

    • Declaration of Conformity is regenerated for significant security-relevant changes

    • A compliance audit trail links each software version to its assessment documentation

    Communication and Transparency

    • Users are notified when security updates are available

    • The manufacturer communicates the expected support period for security updates

    • Release notes describe security-relevant changes in sufficient detail for compliance review

    • The compliance team receives advance notice of security-relevant updates before release

    Frequently Asked Questions

    Does every software update require RED re-certification?

    No. Only updates that affect security-relevant functions documented in your EN 18031 compliance assessment require re-evaluation. Minor bug fixes, UI changes, and performance optimizations that do not impact security assets, network behavior, or data handling can typically proceed without a full compliance review. However, you should always classify each update against your asset inventory to make this determination systematically.

    What are EN 18031 requirements for secure software updates?

    EN 18031 requires that software update mechanisms include integrity verification (cryptographic signatures or hashes), authentication of the update source, secure delivery channels, and controlled rollback protection. These requirements apply across all three parts of the standard, with each part adding focus areas: EN 18031-1 covers network protection during updates, EN 18031-2 addresses privacy preservation, and EN 18031-3 focuses on financial transaction security.

    How do I maintain compliance documentation across multiple software versions?

    The most effective approach is to version your compliance documentation alongside your software releases. Each software version should have a corresponding set of compliance tables, decision tree outcomes, and test plan verdicts. Compliance platforms like RedComply allow you to maintain this linkage automatically, so you can always demonstrate what was assessed for any given release.

    What happens if a software update introduces a compliance gap?

    If a software update creates a new compliance gap, such as weakening an access control mechanism or introducing an unencrypted communication channel, you must address the gap before placing the updated product on the EU market. This may require modifying the update, adding compensating controls, or updating your technical documentation to reflect the new risk assessment. The key is to detect gaps early through structured re-assessment rather than discovering them during an audit.

    Can OTA (over-the-air) updates affect my device's RED compliance status?

    Yes. OTA updates are subject to the same EN 18031 requirements as any other software update mechanism. In fact, OTA updates often receive additional scrutiny because they involve wireless transmission, which creates additional attack surfaces. Your OTA update mechanism must demonstrate secure delivery, integrity verification, and authentication, and any security-relevant changes delivered via OTA require the same re-assessment process as wired updates.

    Conclusion: Compliance Is a Continuous Process

    Ensuring ongoing RED compliance for software updates is not a one-time checkbox exercise. It is a continuous process that must be embedded into your product development lifecycle. The key principles are clear:

    • EN 18031 requires secure, authenticated, and integrity-verified update mechanisms as a baseline.

    • Security-relevant software updates require targeted re-assessment of affected compliance sections.

    • Compliance documentation must be versioned and maintained as a living document set.

    • Automated compliance workflows dramatically reduce the risk of compliance drift across multiple update cycles.

    • The update mechanism itself is a compliance requirement that must be documented and assessed.

    Manufacturers who treat compliance as an ongoing workflow rather than a one-time project will find it easier to maintain market access, respond to audits, and keep their products secure as threats evolve. The investment in structured compliance processes pays for itself many times over across the product lifecycle.

    Getting Started with RedComply

    RedComply is purpose-built for EN 18031 and RED cybersecurity compliance. The platform provides structured workflows for documenting software update mechanisms, tracking compliance across software versions, and automating re-assessment when security-relevant changes occur.

    Here is how RedComply helps with software update compliance specifically:

    • Structured compliance tables for documenting update mechanisms, including secure delivery, integrity verification, and authentication controls

    • Decision trees that guide you through EN 18031 update-related requirements and record PASS/FAIL outcomes for each assessment

    • Auto-calculated test plan verdicts that update in real time as you modify compliance data after a software release

    • AI assistant trained on EN 18031 that can answer questions about update-specific requirements, search related sections, and help populate compliance tables

    • One-click Declaration of Conformity generation that compiles your current compliance state into a structured PDF ready for regulatory review

    Stop managing software update compliance in spreadsheets. Visit redcomply.com and see how structured EN 18031 workflows keep your compliance documentation synchronized with your development cycle.