🚨 EN 18031 Emergency Compliance Triage
Quick assessment of your product's compliance risk for EU market launch
1
What type of product are you launching?
Select the category that best describes your product:
IoT sensors or monitoring devices
Smart home devices (lighting, heating, security)
Wearables or fitness trackers
Childcare devices or toys
Industrial automation equipment
Medical or healthcare devices
Payment or financial transaction devices
Other internet-connected device
2
What data does your product process?
Select all that apply to your product:
No personal or sensitive data
Only device operational data
Usage patterns or analytics
Personal information (names, contacts, location)
Traffic or location data
Health or biometric data
Financial or payment data
Virtual currencies or monetary value
Data from children under 16
3
Current security implementation
Select all security features that are already implemented:
No specific security measures
Basic passwords only
Access control mechanisms
Multi-factor authentication (2FA)
Secure storage (encryption at rest)
Secure communication (encryption in transit)
Secure firmware updates
Secure boot process
Cryptographic protection
Logging mechanisms
Data deletion mechanism
User notification mechanisms
Parental controls
Comprehensive security architecture
4
Launch timeline and resources
When is your planned EU market launch?
Tomorrow ()
This week
This month
Flexible timing
Do you have access to cybersecurity expertise?
No internal or external expertise
Limited internal knowledge
Access to external experts
Experienced internal team
🚨
CRITICAL RISK: Launch Not Recommended
Your product has critical EN 18031 compliance gaps that must be addressed before launch.
Immediate action is required to implement required security measures.
Immediate Actions:
• Notify stakeholders of launch delay immediately
• Contact cybersecurity experts today
• Estimate 3-6 months for proper compliance
• Consider alternative markets while achieving compliance
• Notify stakeholders of launch delay immediately
• Contact cybersecurity experts today
• Estimate 3-6 months for proper compliance
• Consider alternative markets while achieving compliance
⚠️
HIGH RISK: Emergency Sprint Needed
Your product might achieve EN 18031 compliance with an emergency development sprint,
but success is not guaranteed. Key security mechanisms need implementation.
EN 18031 Requirements to Address:
• Implement required authentication mechanisms
• Add secure storage and communication measures
• Ensure proper access controls
• Complete security testing and documentation
• Implement required authentication mechanisms
• Add secure storage and communication measures
• Ensure proper access controls
• Complete security testing and documentation
Emergency Sprint Requirements:
• Expert cybersecurity consultation within 24 hours
• Dedicated development team for 2-4 weeks
• Comprehensive security testing and documentation
• Fallback plan if sprint fails
• Expert cybersecurity consultation within 24 hours
• Dedicated development team for 2-4 weeks
• Comprehensive security testing and documentation
• Fallback plan if sprint fails
⚡
MODERATE RISK: Rapid Assessment Needed
Your product appears to have some security foundations but needs immediate
expert assessment to confirm EN 18031 compliance. Some requirements may need verification.
EN 18031 Verification Needed:
• Confirm authentication mechanisms meet requirements
• Verify secure storage and communication implementations
• Check access control mechanisms
• Validate compliance documentation
• Confirm authentication mechanisms meet requirements
• Verify secure storage and communication implementations
• Check access control mechanisms
• Validate compliance documentation
Recommended Actions:
• Professional compliance audit within 48 hours
• Complete gap analysis and documentation review
• Consider 1-2 week delay for verification
• Prepare compliance evidence package
• Professional compliance audit within 48 hours
• Complete gap analysis and documentation review
• Consider 1-2 week delay for verification
• Prepare compliance evidence package
✅
LOW RISK: Likely Compliant
Based on your responses, your product appears to meet EN 18031 requirements.
You have appropriate security measures for your data types and product category.
EN 18031 Compliance Check:
• Authentication mechanisms appear adequate
• Security measures appropriate for data types
• Implementation timeline allows for verification
• Expert resources available for final validation
• Authentication mechanisms appear adequate
• Security measures appropriate for data types
• Implementation timeline allows for verification
• Expert resources available for final validation
Final Verification Steps:
• Confirm all compliance documentation is complete
• Verify security testing results
• Prepare for potential market surveillance inquiries
• Use security as competitive advantage in marketing
• Confirm all compliance documentation is complete
• Verify security testing results
• Prepare for potential market surveillance inquiries
• Use security as competitive advantage in marketing
Disclaimer: This assessment is based on the information provided and current understanding of EN 18031 requirements.
It is not a substitute for professional compliance assessment. Always consult with qualified cybersecurity experts for final compliance determination.
Simplified IoT Device Requirements Mapper
Configure your IoT device characteristics to determine which cybersecurity requirements apply
How to Use This Tool
- Configure Device Characteristics: Select the characteristics that apply to your IoT device from the left panel.
- Review Applicable Requirements: The right panel will show which cybersecurity requirements are applicable to your device.
- Filter Requirements: Use the filter buttons to view specific types of requirements (All, Applicable, Not Applicable, Exempt).
- View Exceptions: Click on individual requirements to see available exceptions and exemptions.
- Understand Complexity: Review the complexity scores to understand the implementation effort required.
Legal Disclaimer
This tool is for informational purposes only. Always consult experienced technical professionals before starting any product development. The information provided does not constitute legal advice and should not be relied upon as the sole basis for compliance decisions.
Device Configuration
Relevant clause legend
Control which cybersecurity requirement Clauses are shown in the Device Configuration panel. When a Clause appears under a device characteristic, it indicates that the Clause is relevant to that characteristic and might be applicable to the device.
Standard Legend:
EN 18031-1
Network Protection
EN 18031-2
Data Protection
EN 18031-3
Fraud Prevention
Applicability Legend:
ABC-1
applicable (bright colour)
ABC-1
not applicable (dimmed colour)
Standards & Visibility Controls:
Select which standards to be shown in the Device Configuration panel and display the relevant clauses that are applicable (and not applicable) to the device.
All EN 18031 Series
All cybersecurity standards combined
0
0
EN 18031-1: Network Protection
Access control and network security requirements
0
0
EN 18031-2: Data Protection
Data protection and privacy requirements
0
0
EN 18031-3: Fraud Prevention
Fraud prevention and detection requirements
0
0
Applicable Cybersecurity Requirements
All Clauses
0
Applicable
0
Not Applicable
0
Exempt
0
Complexity Score
0
Loading requirements...
Loading mapper tool...
⚠️
Unable to Load Mapper Tool
There was an error loading the mapper tool. Please try refreshing the page or contact support.