Awareness Isn’t Readiness: The Real RED DA (EN 18031) Deadline Problem
RED DA (EN 18031) isn’t news — chipset vendors have been tracking the EU’s regulatory tightening for years. But there’s a big difference between knowing what’s coming and being ready for it. With enforcement tied to CE certification, and a realistic compliance deadline of February 2026 (the formal date is August 2025; there is a 6-month grace period), any device that can’t prove EN 18031 compliance will be blocked from being sold in the European market.
And this isn’t just a firmware issue. While some requirements can be addressed through software updates, key compliance areas demand hardware foundations that must be built into the SoC from the start. You must have hardware-based secure boot capabilities to ensure trusted device startup. You need dedicated secure storage for encryption keys and sensitive data. You need hardware support for signed OTA updates to maintain security throughout the device lifecycle.
For device makers using chipsets that lack these hardware foundations, compliance isn’t a matter of a software patch — it requires a fundamental platform change. With chip development timelines running 18-24 months, the window to make that shift is closing fast.
Designed for Security, Not Scrambling to Add It
At Sony Semiconductor Israel, the importance of security was clear from the very beginning. Long before any specific regulations were in place, the team recognized the need for strong foundational security mechanisms in any secure SoC. These core protections were built into the chip architecture more than seven years ago, laying the groundwork for future compliance and resilience.
Indeed, Sony’s Altair ALT1250 and ALT1350 were built around a security-oriented design philosophy: embed the complex security foundations directly into the silicon, so device makers can focus their engineering resources on the features that differentiate their products.
Sony’s early commitment to hardware-based security puts the Altair IOT modems in a strong position for EN 18031 compliance. These SoCs already deliver the state-of-the-art security mechanisms that the regulation demands — not as an afterthought, but as core functionality that’s been validated in production deployments.
Security by Design: How Built-In Foundations Simplify Compliance
Sony’s Altair ALT1250 and ALT1350 include the foundational security mechanisms that EN 18031 requires — built into the hardware rather than bolted on afterward. This approach minimizes the compliance work required at the device level, allowing OEMs to focus on integration rather than rebuilding security from scratch.
Foundation required to support EN 18031 | Sony’s Altair SoC Support | OEM required work |
---|---|---|
Secure Boot |
Hardware Root of Trust (RoT) and immutable ROM code that initiates the boot process |
Add required software components to the boot chain using Sony- provided tools |
Secure FOTA |
Secure FOTA agent and RoT integrated in SoC |
Sign and deliver secure FOTA images to the SoCs |
Secure KEY Storage and Processing |
Integrated Secure Element (iSE2) with Hardware RoT |
Create credentials in production using Sony tools. Integrate application with ISE2 APIs |
Secure Communication |
TLS/DTLS stack supported utilizing Credentials in ISE2 |
Standard implementation |
Access Control |
Configurable device API/functionality management |
Configure during production using Sony tools |
Secure Storage |
iSE2 credential management for data protection |
Update software to secure data before storage |
Unclonable device Identity |
Provisioned in Sony secure production |
Standard use |
TRNG |
Included in the SoC, used to create cryptographic material |
Standard use |
Hardware Isolation |
Built in isolation in all sub-systems to ensure access control |
No additional work required |
Secure OTP |
OTP to maintain critical platform configuration and credentials with tight access management and security |
No additional work required |
You Can’t Build This in 2025
Hardware security isn’t something you can add in a sprint. Security mechanisms need to be part of the initial SoC architecture — adding them in after the fact is expensive and can negatively impact other chip performance indicators. Even tacking on a discrete secure element can disrupt form factor and introduce supply chain complexity. Most importantly, after-the-fact fixes simply don’t address all the requirements. Security foundations must be an integral part of the SoC itself.
If your current SoC can’t support the regulatory requirements, you’re facing a fundamental platform decision. Device redesigns typically run 18-24 months, and that timeline assumes that you have access to a compliant chipset.
With Sony’s Altair ALT1250 and ALT1350 you have a foundation that enables compliance. The security mechanisms are built into the SoC, validated in production deployments, and backed by a team with deep expertise in both cellular connectivity and security implementation.
Security, Delivered — So You Can Focus on What Comes Next
Compliance is just one part of what device makers need. Sony’s Altair ALT-series SoCs are designed to support global deployment, ultra-low power use, and high-efficiency connectivity — all while providing the secure foundation required by modern regulations.
We don’t just sell chips. We help device makers bring secure, scalable, regulation-ready products to market faster — without reinventing the wheel.