Previous Article in Journal
Uncertainty-Aware QoS Forecasting with BR-LSTM for Esports Networks
Previous Article in Special Issue
ZeroDay-LLM: A Large Language Model Framework for Zero-Day Threat Detection in Cybersecurity
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Article

Integrating the CRA into the IoT Lifecycle: Challenges, Strategies, and Best Practices

by
Miguel Ángel Ortega Velázquez
1,2,*,
Iris Cuevas Martínez
2 and
Antonio J. Jara
2
1
Department of Information and Communication Technologies, Universidad Politécnica de Cartagena (UPCT), 30202 Cartagena, Spain
2
Libelium Lab, 30562 Murcia, Spain
*
Author to whom correspondence should be addressed.
Information 2025, 16(12), 1017; https://doi.org/10.3390/info16121017 (registering DOI)
Submission received: 9 October 2025 / Revised: 13 November 2025 / Accepted: 17 November 2025 / Published: 22 November 2025
(This article belongs to the Special Issue Cyber Security in IoT)

Abstract

The European Union’s Cyber Resilience Act (CRA) introduces a complex set of binding lifecycle security obligations, presenting a significant compliance challenge for the Internet of Things (IoT) industry. This study addresses this challenge by developing a comprehensive CRA mapping framework specifically tailored to the IoT sector. The core contribution is a detailed lifecycle-based checklist that translates the regulation’s legal mandates into an actionable blueprint for manufacturers. Beyond the checklist itself, this paper’s core contribution is a transparent two-phase methodology. The first phase provides a structured pipeline to translate dense legal text (from CRA Articles 13–14 and its annexes) into atomic testable engineering requirements. The second phase builds a quantitative rating tree using the Analytic Hierarchy Process (AHP) to weigh these requirements, providing a consistent and evidence-based scoring rubric. By synthesizing the complex regulatory landscape and the technical state of the art, this paper operationalizes the CRA’s requirements for governance, secure design, vulnerability management, and conformity assessment. The framework is validated in the TRUEDATA case, yielding a weighted readiness score and a sensitivity analysis that underpin the reliability of the findings.
Keywords: Cyber Resilience Act; IoT security; Software Bill of Materials; vulnerability management; conformity assessment Cyber Resilience Act; IoT security; Software Bill of Materials; vulnerability management; conformity assessment

Share and Cite

MDPI and ACS Style

Velázquez, M.Á.O.; Martínez, I.C.; Jara, A.J. Integrating the CRA into the IoT Lifecycle: Challenges, Strategies, and Best Practices. Information 2025, 16, 1017. https://doi.org/10.3390/info16121017

AMA Style

Velázquez MÁO, Martínez IC, Jara AJ. Integrating the CRA into the IoT Lifecycle: Challenges, Strategies, and Best Practices. Information. 2025; 16(12):1017. https://doi.org/10.3390/info16121017

Chicago/Turabian Style

Velázquez, Miguel Ángel Ortega, Iris Cuevas Martínez, and Antonio J. Jara. 2025. "Integrating the CRA into the IoT Lifecycle: Challenges, Strategies, and Best Practices" Information 16, no. 12: 1017. https://doi.org/10.3390/info16121017

APA Style

Velázquez, M. Á. O., Martínez, I. C., & Jara, A. J. (2025). Integrating the CRA into the IoT Lifecycle: Challenges, Strategies, and Best Practices. Information, 16(12), 1017. https://doi.org/10.3390/info16121017

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Article metric data becomes available approximately 24 hours after publication online.
Back to TopTop