{"id":12254,"date":"2025-11-06T16:30:30","date_gmt":"2025-11-06T14:30:30","guid":{"rendered":"https:\/\/www.phoenixcontact-emobility.com\/?p=12254"},"modified":"2025-11-25T09:45:07","modified_gmt":"2025-11-25T07:45:07","slug":"cybersecurity-for-ac-charging-infrastructure-red-and-cra","status":"publish","type":"post","link":"https:\/\/www.phoenixcontact-emobility.com\/en\/news-and-events\/charging-infrastructure\/cybersecurity-for-ac-charging-infrastructure-red-and-cra\/","title":{"rendered":"Cybersecurity for AC charging infrastructure: How CHARX control modular complies with RED and CRA"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"12254\" class=\"elementor elementor-12254 elementor-12253\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-58b9d77 e-flex e-con-boxed e-con e-parent\" data-id=\"58b9d77\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d582df0 e-con-full e-flex e-con e-child\" data-id=\"d582df0\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-b10a184 e-con-full e-flex e-con e-child\" data-id=\"b10a184\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b7cdf1b elementor-widget elementor-widget-text-editor\" data-id=\"b7cdf1b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h3>The new reality for connected charging points.<\/h3>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d41a01a elementor-widget elementor-widget-text-editor\" data-id=\"d41a01a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Today, charging infrastructure is more than just technology for refueling with electricity. It is part of a digital ecosystem with wireless modules, backend communication, user identification, and payment processing. This also drastically increases the requirements for its cybersecurity. And legislation is following suit.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-214c668 elementor-widget elementor-widget-text-editor\" data-id=\"214c668\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Since August 1, 2025, the Delegated Regulation to the RED Directive (EU 2022\/30) has been binding. It obliges manufacturers of radio equipment \u2013 including charging points with RFID, Wi-Fi, or cellular communication \u2013 to comply with strict security requirements. Technical implementation is carried out via the harmonized standards EN 18031-1, -2, and -3, which define requirements for network resilience, data protection, and fraud protection. Only those who fully implement these standards can claim &#8220;presumption of conformity.&#8221; This is a decisive advantage for CE marking.<br \/>But the RED is only the beginning: on December 10, 2024, the Cyber Resilience Act (CRA) came into force. The first reporting requirements for security incidents will apply from September 11, 2026, with full compliance required from December 11, 2027.<\/p><p>The CRA significantly expands the scope of application: it affects all products with digital elements, regardless of whether they contain wireless modules. The aim is to create uniform cybersecurity requirements throughout the entire product lifecycle: from development and maintenance to vulnerability reporting.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-08b73df elementor-widget elementor-widget-heading\" data-id=\"08b73df\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why both laws are important and how they are related<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-841dcf5 elementor-widget elementor-widget-text-editor\" data-id=\"841dcf5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The RED Delegated Regulation and the CRA pursue the same goal: greater cybersecurity for digital products. While the RED focuses on radio equipment, the CRA is much broader in scope. According to ENISA and CENELEC, the EN 18031 standards developed for the RED also serve as the technical basis for CRA compliance.<\/p><p>This means that anyone who develops RED-compliant products today will be prepared for the Cyber Resilience Act tomorrow.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c824d88 elementor-widget elementor-widget-heading\" data-id=\"c824d88\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">CHARX control modular: The answer to regulatory and technical challenges<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f174b97 elementor-widget elementor-widget-text-editor\" data-id=\"f174b97\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>With a specialized development team, Phoenix Contact is constantly working to keep the software for the <a href=\"http:\/\/phoenixcontact.com\/CHARX-control-modular\" target=\"_blank\" rel=\"noopener\">AC charging controller CHARX control modular<\/a> up to date and improve it. This ensures that CHARX control modular always meets the latest security requirements and closes security gaps reliably and promptly. In addition, the charging controller meets the requirements of the RED directive and is prepared for the requirements of the Cyber Resilience Act.<\/p><p>The following features ensure security at all required levels:<\/p><ul><li><strong>Access control:<\/strong> Role-based access control (RBAC), password protection, mandatory password change, brute force protection<\/li><li><strong>Communication:<\/strong> TLS 1.2\/1.3, SSH, OCPP Security Profile 2 \u2013 with replay, integrity, and confidentiality protection<\/li><li><strong>Update security:<\/strong> RSA-PSS signatures with SHA-512, time-controlled updates, protection of ongoing charging processes<\/li><li><strong>Data protection:<\/strong> Protected flash memory, firewall rules, input validation<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8c4b976 elementor-widget elementor-widget-heading\" data-id=\"8c4b976\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Take advantage of our expertise and secure your market position<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9ecdebc elementor-widget elementor-widget-text-editor\" data-id=\"9ecdebc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Full implementation of the EN 18031 standards enables Phoenix Contact to presume conformity with the RED Directive \u2013 a decisive advantage for CE marking and market approval. But this is more than just a regulatory hurdle:<\/p><p>With <a href=\"http:\/\/phoenixcontact.com\/CHARX-control-modular\" target=\"_blank\" rel=\"noopener\">CHARX control modular<\/a>, manufacturers and operators benefit from a solution that is not only technically mature, but also strategically well thought out. It is based on the latest security standards, already meets key CRA requirements, and offers:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0ed8ec5 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"0ed8ec5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Legal certainty for operators and OEMs,<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Trust among customers and authorities,<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-circle\" viewBox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M256 8C119 8 8 119 8 256s111 248 248 248 248-111 248-248S393 8 256 8z\"><\/path><\/svg>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Future-proofing through documented compliance and continuous vulnerability assessment.<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d2226b8 elementor-widget elementor-widget-text-editor\" data-id=\"d2226b8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Take advantage of our expertise to make your charging infrastructure not only secure, but also competitive and future-proof.<\/p><p>With CHARX control modular, you are investing in a solution that strengthens your market position and makes your products fit for future requirements.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d92a4f2 elementor-widget elementor-widget-heading\" data-id=\"d92a4f2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Conclusion: Act today to be secure tomorrow<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d5f559b elementor-widget elementor-widget-text-editor\" data-id=\"d5f559b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The requirements for charging infrastructure are increasing, both technically and regulatory. With <a href=\"http:\/\/AC charging controller\" data-wplink-url-error=\"true\">CHARX control modular<\/a>, Phoenix Contact offers a solution that combines safety, compliance, and future-proofing.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a44f995 elementor-blockquote--skin-quotation elementor-blockquote--align-left elementor-widget elementor-widget-blockquote\" data-id=\"a44f995\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"blockquote.default\">\n\t\t\t\t\t\t\t<blockquote class=\"elementor-blockquote\">\n\t\t\t<p class=\"elementor-blockquote__content\">\n\t\t\t\tSafe today. Resilient for tomorrow.\t\t\t<\/p>\n\t\t\t\t\t\t\t<div class=\"e-q-footer\">\n\t\t\t\t\t\t\t\t\t\t\t<cite class=\"elementor-blockquote__author\">This message is more than a slogan \u2013 it is a promise to charging infrastructure manufacturers, operators, and end customers.<\/cite>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/blockquote>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6210fc2 elementor-widget elementor-widget-spacer\" data-id=\"6210fc2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dbf1443 elementor-widget elementor-widget-text-editor\" data-id=\"dbf1443\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h5>FAQ<\/h5>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f5663c9 elementor-widget elementor-widget-text-editor\" data-id=\"f5663c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<h2>Frequently asked questions<\/h2>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8660c75 elementor-widget elementor-widget-n-accordion\" data-id=\"8660c75\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;all_collapsed&quot;,&quot;max_items_expended&quot;:&quot;multiple&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1400\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1400\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><h3 class=\"e-n-accordion-item-title-text\"> Why is cybersecurity so important for AC charging infrastructure? <\/h3><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1400\" class=\"elementor-element elementor-element-1305f0c e-con-full e-flex e-con e-child\" data-id=\"1305f0c\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-efd3d0f elementor-widget elementor-widget-text-editor\" data-id=\"efd3d0f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>With the increasing digitalization of charging points, including wireless modules, backend communication, and payment processing, cybersecurity requirements are also increasing. Only through consistent security measures can operators and manufacturers protect their systems from attacks and comply with legal requirements.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1401\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1401\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><h3 class=\"e-n-accordion-item-title-text\"> What exactly do the RED Directive and the Cyber Resilience Act (CRA) require? <\/h3><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1401\" class=\"elementor-element elementor-element-cb35e26 e-con-full e-flex e-con e-child\" data-id=\"cb35e26\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ed013b9 elementor-widget elementor-widget-text-editor\" data-id=\"ed013b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>The RED Directive (EU 2022\/30) requires manufacturers of radio equipment to comply with strict security requirements, such as network resilience and data protection, from August 2025. The CRA extends these requirements to all products with digital elements from December 2027 and demands cybersecurity throughout the entire product lifecycle.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1402\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1402\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><h3 class=\"e-n-accordion-item-title-text\"> How does CHARX control modular support compliance with RED and CRA? <\/h3><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-minus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h384c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t\t<span class='e-closed'><svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-plus\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M416 208H272V64c0-17.67-14.33-32-32-32h-32c-17.67 0-32 14.33-32 32v144H32c-17.67 0-32 14.33-32 32v32c0 17.67 14.33 32 32 32h144v144c0 17.67 14.33 32 32 32h32c17.67 0 32-14.33 32-32V304h144c17.67 0 32-14.33 32-32v-32c0-17.67-14.33-32-32-32z\"><\/path><\/svg><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1402\" class=\"elementor-element elementor-element-f574bda e-con-full e-flex e-con e-child\" data-id=\"f574bda\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9821fd0 elementor-widget elementor-widget-text-editor\" data-id=\"9821fd0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>CHARX control modular from Phoenix Contact already meets the requirements of the RED Directive and is prepared for the CRA. The system offers modern safety functions such as role-based access control, encrypted communication, and regular software updates to make charging infrastructure secure, compliant, and future-proof.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<script type=\"application\/ld+json\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@type\":\"FAQPage\",\"mainEntity\":[{\"@type\":\"Question\",\"name\":\"Why is cybersecurity so important for AC charging infrastructure?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"With the increasing digitalization of charging points, including wireless modules, backend communication, and payment processing, cybersecurity requirements are also increasing. Only through consistent security measures can operators and manufacturers protect their systems from attacks and comply with legal requirements.\"}},{\"@type\":\"Question\",\"name\":\"What exactly do the RED Directive and the Cyber Resilience Act (CRA) require?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"The RED Directive (EU 2022\\\/30) requires manufacturers of radio equipment to comply with strict security requirements, such as network resilience and data protection, from August 2025. The CRA extends these requirements to all products with digital elements from December 2027 and demands cybersecurity throughout the entire product lifecycle.\"}},{\"@type\":\"Question\",\"name\":\"How does CHARX control modular support compliance with RED and CRA?\",\"acceptedAnswer\":{\"@type\":\"Answer\",\"text\":\"CHARX control modular from Phoenix Contact already meets the requirements of the RED Directive and is prepared for the CRA. The system offers modern safety functions such as role-based access control, encrypted communication, and regular software updates to make charging infrastructure secure, compliant, and future-proof.\"}}]}<\/script>\n\t\t\t\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-df96436 cnt-space e-con-full e-flex e-con e-child\" data-id=\"df96436\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-ab66b5d cnt-space e-con-full e-flex e-con e-child\" data-id=\"ab66b5d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-02867ce e-con-full e-flex e-con e-child\" data-id=\"02867ce\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-189f7b6 elementor-widget elementor-widget-heading\" data-id=\"189f7b6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Discover suitable products now<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2afc526 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"2afc526\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2b2a8a3 elementor-widget elementor-widget-text-editor\" data-id=\"2b2a8a3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>Here you will find a selection of relevant products \u2013 based on the topics and recommendations from our blog post.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d39a47a e-con-full e-grid e-con e-child\" data-id=\"d39a47a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-a75462b e-con-full txt-box-grid txt-box-grid-dark-green e-flex e-con e-child\" data-id=\"a75462b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6d3f0a3 elementor-widget elementor-widget-image\" data-id=\"6d3f0a3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"http:\/\/phoenixcontact.com\/CHARX-control-modular\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"800\" src=\"https:\/\/www.phoenixcontact-emobility.com\/wp-content\/uploads\/2025\/09\/00035057_1x1_1000-1.png\" class=\"attachment-large size-large wp-image-11547\" alt=\"AC-Ladesteuerung CHARX control modular\" srcset=\"https:\/\/www.phoenixcontact-emobility.com\/wp-content\/uploads\/2025\/09\/00035057_1x1_1000-1.png 1000w, https:\/\/www.phoenixcontact-emobility.com\/wp-content\/uploads\/2025\/09\/00035057_1x1_1000-1-300x300.png 300w, https:\/\/www.phoenixcontact-emobility.com\/wp-content\/uploads\/2025\/09\/00035057_1x1_1000-1-150x150.png 150w, https:\/\/www.phoenixcontact-emobility.com\/wp-content\/uploads\/2025\/09\/00035057_1x1_1000-1-768x768.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f5fd427 elementor-widget elementor-widget-heading\" data-id=\"f5fd427\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><a href=\"http:\/\/phoenixcontact.com\/CHARX-control-modular\" target=\"_blank\" rel=\"noopener\">AC charging controllers<\/a><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fcc7b2c elementor-align-right pc-tertiary-link elementor-widget elementor-widget-button\" data-id=\"fcc7b2c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"http:\/\/phoenixcontact.com\/CHARX-control-modular\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-arrow-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn more<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0035be1 e-con-full txt-box-grid txt-box-grid-dark-green e-flex e-con e-child\" data-id=\"0035be1\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-479e917 elementor-widget elementor-widget-image\" data-id=\"479e917\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"http:\/\/phoenixcontact.com\/CHARX-connect-modular\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"800\" src=\"https:\/\/www.phoenixcontact-emobility.com\/wp-content\/uploads\/2025\/07\/00169826_1x1_5000-1024x1024.png\" class=\"attachment-large size-large wp-image-9964\" alt=\"AC-Infrastruktur-Ladedose\" srcset=\"https:\/\/www.phoenixcontact-emobility.com\/wp-content\/uploads\/2025\/07\/00169826_1x1_5000-1024x1024.png 1024w, https:\/\/www.phoenixcontact-emobility.com\/wp-content\/uploads\/2025\/07\/00169826_1x1_5000-300x300.png 300w, https:\/\/www.phoenixcontact-emobility.com\/wp-content\/uploads\/2025\/07\/00169826_1x1_5000-150x150.png 150w, https:\/\/www.phoenixcontact-emobility.com\/wp-content\/uploads\/2025\/07\/00169826_1x1_5000-768x768.png 768w, https:\/\/www.phoenixcontact-emobility.com\/wp-content\/uploads\/2025\/07\/00169826_1x1_5000-1536x1536.png 1536w, https:\/\/www.phoenixcontact-emobility.com\/wp-content\/uploads\/2025\/07\/00169826_1x1_5000-2048x2048.png 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fd045f7 elementor-widget elementor-widget-heading\" data-id=\"fd045f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\"><a href=\"http:\/\/phoenixcontact.com\/CHARX-connect-modular\" target=\"_blank\" rel=\"noopener\">AC charging sockets<\/a><\/h3>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c4f174f elementor-align-right pc-tertiary-link elementor-widget elementor-widget-button\" data-id=\"c4f174f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"http:\/\/phoenixcontact.com\/CHARX-connect-modular\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<svg aria-hidden=\"true\" class=\"e-font-icon-svg e-fas-arrow-right\" viewBox=\"0 0 448 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M190.5 66.9l22.2-22.2c9.4-9.4 24.6-9.4 33.9 0L441 239c9.4 9.4 9.4 24.6 0 33.9L246.6 467.3c-9.4 9.4-24.6 9.4-33.9 0l-22.2-22.2c-9.5-9.5-9.3-25 .4-34.3L311.4 296H24c-13.3 0-24-10.7-24-24v-32c0-13.3 10.7-24 24-24h287.4L190.9 101.2c-9.8-9.3-10-24.8-.4-34.3z\"><\/path><\/svg>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Learn more<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The new reality for connected charging points. Today, charging infrastructure is more than just technology for refueling with electricity. It is part of a digital ecosystem with wireless modules, backend communication, user identification, and payment processing. This also drastically increases the requirements for its cybersecurity. And legislation is following suit. Since August 1, 2025, the [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":9991,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[42],"tags":[279],"class_list":["post-12254","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-charging-infrastructure","tag-ac-ladeinfrastruktur"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.phoenixcontact-emobility.com\/en\/wp-json\/wp\/v2\/posts\/12254","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.phoenixcontact-emobility.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.phoenixcontact-emobility.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.phoenixcontact-emobility.com\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.phoenixcontact-emobility.com\/en\/wp-json\/wp\/v2\/comments?post=12254"}],"version-history":[{"count":0,"href":"https:\/\/www.phoenixcontact-emobility.com\/en\/wp-json\/wp\/v2\/posts\/12254\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.phoenixcontact-emobility.com\/en\/wp-json\/wp\/v2\/media\/9991"}],"wp:attachment":[{"href":"https:\/\/www.phoenixcontact-emobility.com\/en\/wp-json\/wp\/v2\/media?parent=12254"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.phoenixcontact-emobility.com\/en\/wp-json\/wp\/v2\/categories?post=12254"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.phoenixcontact-emobility.com\/en\/wp-json\/wp\/v2\/tags?post=12254"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}