IoT Strategies

How Cellular IoT Supports Regulatory Compliance for Connected Devices

May 21, 2026
|

Device innovators weighing Wi-Fi against cellular often base the decision on ease of implementation and cost. But compliance is fast becoming a factor that can tip the balance, with cellular IoT offering the stronger security and the architectural control that’s demanded by current regulatory frameworks.

More and more pressure around compliance

The regulatory environment is rapidly tightening around connected devices. Think about NIS2, the EU Cyber Resilience Act, and SOC 2… all of which substantially progress compliance from a box-ticking exercise to something that’s now at the core of product requirements.

So, manufacturers of consumer devices are increasingly at risk being scrutinised by compliance authorities for factors like adequate end to end encryption. In parallel, enterprise buyers increasingly scrutinise IoT security and compliance before signing a purchase order. 

The question being does the way a device connects to the internet support obligations under these frameworks? Many products currently built around Wi-Fi lack the security framework to clearly cross the compliance hurdle.

Cellular IoT offers a fundamentally different connectivity model that makes compliance easier – and that may well be the better choice for connected devices in highly regulated markets.

The Wi-Fi Challenge: Shared Networks, Shared Risk

When a connected device joins a customer's WiFi network, it doesn't just borrow bandwidth but also inherits the entire risk posture of that network. 

Unlike cellular, where the connectivity channel is largely defined and managed by the device maker alongside the network provider, Wi-Fi puts critical security variables in the hands of whoever owns the router. For device innovators, that's a significant and often overlooked exposure.

  • A device may share a network with laptops, phones, and printers, making lateral movement attacks a realistic threat vector.

  • Encryption is not guaranteed: cellular encrypts traffic by default at the radio layer; Wi-Fi encryption depends entirely on how the customer has configured their network.

  • Rogue access points are a persistent risk that the device manufacturer has no control over, and devices that auto-connect to known SSIDs can be silently redirected to a malicious network.

  • Liability attribution becomes contested, because when a breach involves a shared Wi-Fi network, establishing whether the fault lies with the device, the network, or a third party connected to it is rarely straightforward

As a device innovator you could argue that some of these risks are manageable. But add it all up and it represents a connectivity model that is structurally difficult to align with the security and audit requirements that modern compliance frameworks demand.

What do the compliance requirements look like?

The risks outlined above map directly onto obligations that NIS2, the EU Cyber Resilience Act (CRA), and SOC 2 place on connected device makers. 

  • Network segmentation and access control: NIS2 Article 21 and SOC 2 CC6 require controlled boundaries around systems handling sensitive data. Cellular IoT supports this whereas Wi-Fi can complicate compliance.

  • Encryption in transit: NIS2, the CRA, and SOC 2 CC6.7 all mandate encryption of data in motion. Cellular delivers this by default at the radio layer, with no dependency on customer configuration.

  • Third-party and supply chain risk: NIS2 Article 21(2)(d) explicitly addresses supply chain security; routing device traffic through a customer's unmanaged WiFi network introduces an unvetted third party into the data path, which a managed carrier relationship does not

  • CRA technical file documentation: The CRA requires manufacturers to document their security architecture; cellular connectivity with a defined, controlled data path is significantly easier to describe and defend than a Wi-Fi model that varies with every deployment

Each of these is a compliance requirement your connectivity choice either supports or undermines. Cellular IoT doesn't make compliance automatic, but it provides the architectural foundation that Wi-Fi, by its shared nature, cannot reliably offer.

Building Compliance into Your Connectivity Choice

So, on balance, cellular connectivity for IoT can help you achieve your compliance objectives in ways that connecting a device fleet to Wi-Fi doesn’t – and this may well weigh in on your choice of architecture.

A cellular IoT eSIM supports a documented, auditable, and defensible foundation that maps cleanly onto legislation such as NIS2, the CRA, and SOC 2. 

It’s worth factoring in the compliance dimension early, as security is one of the more common pitfalls for IoT rollouts

Retrofitting a connectivity model to meet regulatory requirements after launch is expensive and disruptive, so in many instances it’s worth designing around cellular from the start with secure IoT SIM cards for businesses.

Partners With

Get Connected Now

Thanks for reaching out! A member of our team will get back to you shortly.
Oops! Something went wrong while submitting the form.