Skip to main content

STM32 Hardware Selection for EU CRA-Compliant Connected Products

The EU Cyber-Resilience Act (CRA) raises the bar for connected products. For microcontroller-based designs, that means choosing hardware that can support a trustworthy boot chain, strong cryptography, secure storage for keys, and a maintainable update path over the product's support lifetime.

STMicroelectronics' STM32 portfolio provides security features that can support those goals. But no STM32 part, SDK, or reference design makes a product compliant by itself. The manufacturer still owns the product-level risk assessment, secure integration, vulnerability handling process, support commitments, and technical documentation required by the CRA.

ST's newer CRA pages are useful because they show how the company now packages its security story for product teams, not just firmware engineers. Use them as supplier inputs, not as a substitute for your own engineering and compliance work. See ST's CRA resource hub and the announcement that introduced it in March 2026 st-announcement.

1. What STM32 can and cannot help you with

STM32 can help with

  • Provide a hardware root of trust for secure boot and key protection.
  • Provide hardware accelerators for AES, hashing, public-key cryptography, and random-number generation on many families.
  • Provide device identity primitives, such as the STM32 unique device identifier and, on some series, stronger isolation and tamper features.
  • Provide reference implementations such as STM32Trust and SBSFU to shorten secure boot and secure update work.
  • Provide supplier documentation and assurance material that may support your technical file and supplier due diligence.

STM32 cannot do for you

  • Perform your CRA risk assessment or threat model.
  • Prove that your final product is free of known exploitable vulnerabilities.
  • Operate your vulnerability disclosure, triage, and patch process.
  • Guarantee that your cloud backend, mobile app, radio configuration, or manufacturing flow is secure.
  • Replace your obligation to assemble a defensible technical file and Declaration of Conformity.

For the product-level obligations, start with the CRA Overview, Threat Modeling, Secure Boot, SBOM & VEX Workflows, and Audit Evidence Pack.

2. STM32 family cheat sheet

The STM32 family is large. For CRA-relevant controls, the series with the strongest isolation, key-management, and secure boot building blocks are the most interesting.

  • STM32U5 / STM32L5: Cortex-M33 devices with TrustZone and a richer security feature set. These are strong starting points for new low-power, security-focused products.
  • STM32H5 / STM32H7: Higher-performance parts suited to more demanding gateways, rich HMIs, and complex industrial designs. The H5 is the more security-forward of the two because it also uses Cortex-M33 and TrustZone.
  • STM32WL: Long-range wireless parts designed for sub-GHz applications, useful where radio integration and secure device identity matter.
  • STM32G4 / STM32G0: Cost-sensitive mainstream parts with a more modest security baseline. These can still fit lower-risk products, but they leave more of the security architecture to the integrator.

Table 1 - STM32 series vs. security and fit

SeriesCPU CoreKey hardware security featuresStand-out capabilityTypical fit
STM32U5Cortex-M33 @ 160 MHzTrustZone, HUK, AES, PKA, OTFDEC, tamper, secure boot, RDP, unique IDBroadest security feature set in the low-power rangeHigh-security, power-constrained IoT endpoints
STM32L5Cortex-M33 @ 110 MHzTrustZone, AES, PKA, OTFDEC, tamper, secure boot, RDP, unique IDEarlier entry point for TrustZone-based STM32 designsSecure low-power general-purpose products
STM32H5Cortex-M33TrustZone, secure boot, crypto acceleration, isolation featuresHigher performance with a more modern security architectureIndustrial controllers, gateways, rich embedded applications
STM32H7Cortex-M7 @ up to 550 MHzCrypto/hash on some parts, secure boot support, unique ID, optional on-the-fly decryptionHighest MCU performance in the familyRich HMI, industrial gateways, complex processing
STM32WLCortex-M4 + M0+AES, PKA, true RNG, sector protection, secure key management, unique IDIntegrated sub-GHz radioLong-range wireless sensors and field devices
STM32G4 / G0Cortex-M4 / Cortex-M0+AES or baseline crypto on some parts, true RNG on some parts, unique ID, MPULower BOM costCost-sensitive industrial and control designs

3. Quick-pick decision matrix

If your product needs...ChooseWhy
State-of-the-art security and ultra-low powerSTM32U5Best low-power choice when you want isolation, crypto acceleration, and a richer security baseline.
A lower-power TrustZone design without the premium U5 profileSTM32L5A practical way to adopt hardware isolation in secure embedded designs.
Higher performance plus stronger security architectureSTM32H5Better fit than older high-performance lines when security is a primary requirement.
Maximum compute for gateway, HMI, or edge processingSTM32H7Strong performance, but check exact part-level security features carefully.
Integrated sub-GHz connectivitySTM32WLHelps simplify long-range wireless designs where secure identity and radio integration matter.
Lower-cost baseline securitySTM32G4 / G0Suitable for simpler or lower-risk designs, provided your architecture closes the remaining gaps.

4. Mapping STM32 capabilities to CRA-relevant controls

CRA expectationSTM32 capabilities that can helpWhat you still own as the manufacturerHandbook guide
Secure boot and authenticated firmwareSBSFU, secure boot building blocks, immutable boot ROM, RDP, key storage features on selected familiesBoot-chain design, signing-key governance, secure manufacturing, fail-secure recoverySecure Boot
Cryptographic resilienceAES, PKA, RNG, OTFDEC, TrustZone, and other hardware features on selected partsAlgorithm choice, protocol design, key lifecycle, crypto agility, cloud-to-device trust modelKey Provisioning & Storage and Cryptography under CRA
Secure updates and patchingSTM32Cube ecosystem, secure update examples, signed-firmware reference flowsOTA backend, rollback strategy, release signing process, patch SLAs, field support over the declared support periodOTA Updates & Patching and Patch Cadence
Unique device identityFactory-programmed UID and, on some devices, stronger isolation and key-derivation optionsCertificate issuance, manufacturing provisioning, enrollment, rotation, revocation, device inventoryUnique Device Identity
Technical documentation and evidenceST datasheets, application notes, security collateral, STM32Trust assurance materialsRisk assessment, architecture rationale, test evidence, supplier records, Declaration of Conformity, technical fileAudit Evidence Pack

5. Supplier due-diligence checklist for STM32-based designs

When you evaluate STM32 for a CRA-scoped product, collect evidence from ST the same way you would from any strategic component supplier.

  • Exact part identification: Which precise STM32 family and part number are you using, and which security features exist on that exact variant?
  • Security lifecycle: Does ST publish a clear security policy, vulnerability channel, and security advisories for the relevant product line? st-cra-page
  • Reference design maturity: Are you depending on SBSFU, STM32Cube examples, or other collateral? If so, who owns maintenance and validation in your final product?
  • Assurance claims: Are there certifications or assurance schemes attached to this line, and what exactly do they cover: silicon, reference software, or the full system? st-trust-assurance
  • Documentation for the technical file: Which ST artifacts can you cite: datasheets, application notes, security manuals, lifecycle statements, or public policies?
  • Support horizon: Does the component lifecycle align with your declared support period under the CRA?
  • Radio obligations: If you are using wireless STM32 devices, what extra evidence is needed for RED as well as the CRA?

If you are using ST hardware in a CRA-scoped product, this is a sensible sequence:

  1. Read the CRA Overview to map the legal obligations.
  2. Use Threat Modeling to identify the product-level risks your MCU must support.
  3. Design your trust architecture using Unique Device Identity and Secure Boot.
  4. Plan the operational path with OTA Updates & Patching and Vulnerability Disclosure.
  5. Capture supplier artifacts and your own evidence in an Audit Evidence Pack.

7. Takeaways

  • For new security-focused STM32 designs, STM32U5, STM32L5, and often STM32H5 deserve the closest look.
  • STM32Trust and SBSFU can accelerate engineering work, but they do not replace product-level CRA responsibilities.
  • Treat ST's CRA pages as useful supplier inputs for due diligence and technical documentation, not as proof of compliance on their own.
  • The right MCU choice is only one layer in the CRA story; your threat model, update process, vulnerability handling, and technical file still do the heavy lifting.