BETA


Events

2023/12/18
   Final act published in Official Journal
2023/12/13
   CSL - Draft final act
Documents
2023/12/13
   CSL - Final act signed
2023/12/08
   EP/CSL - Act adopted by Council after Parliament's 1st reading
2023/11/21
   EP - Decision by Parliament, 1st reading
Details

The European Parliament adopted by 557 votes to 0, with 27 abstentions, a legislative resolution on the proposal for a regulation of the European Parliament and of the Council laying down measures for a high common level of cybersecurity at the institutions, bodies, offices and agencies of the Union.

The European Parliament adopted its position at first reading under the ordinary legislative procedure.

Subject matter

This Regulation lays down measures that aim to achieve a high common level of cybersecurity within Union entities with regard to:

- the establishment by each Union entity of an internal cybersecurity risk-management, governance and control framework;

- cybersecurity risk management, reporting and information sharing;

- the organisation, functioning and operation of the Interinstitutional Cybersecurity Board as well as the organisation, functioning and operation of the Cybersecurity Service for the Union institutions, bodies, offices and agencies (CERT-EU);

- the monitoring of the implementation of this Regulation.

Cybersecurity risk-management, governance and control framework

Each Union entity should, after carrying out an initial cybersecurity review, such as an audit, establish an internal cybersecurity risk-management, governance and control framework. The establishment of the Framework should be overseen by and under the responsibility of the Union entity’s highest level of management . The Framework should be based on an all-hazards approach. It should ensure a high level of cybersecurity and be reviewed on a regular basis, in light of the changing cybersecurity risks, and at least every four years.

Each Union entity should appoint a local cybersecurity officer or an equivalent function who should act as its single point of contact regarding all aspects of cybersecurity. The local cybersecurity officer should facilitate the implementation of this Regulation and report directly to the highest level of management on a regular basis on the state of the implementation.

Cybersecurity risk-management measures

Without undue delay and in any event by 20 months from the date of entry into force of this Regulation, each Union entity should, under the oversight of its highest level of management, take appropriate and proportionate technical, operational and organisational measures to manage the cybersecurity risks identified under the Framework, and to prevent or minimise the impact of incidents. Those measures should ensure a level of security of network and information systems across the entirety of the ICT environment commensurate to the cybersecurity risks posed. When assessing the proportionality of those measures, due account should be taken of the degree of the Union entity’s exposure to cybersecurity risks, its size and the likelihood of occurrence of incidents and their severity, including their societal, economic and interinstitutional impact.

Cybersecurity plans

Following the conclusion of the cybersecurity maturity assessment carried out pursuant to the Regulation and taking into account the assets and cybersecurity risks identified in the Framework, as well as the cybersecurity risk-management measures, the highest level of management of each Union entity should approve a cybersecurity plan without undue delay and in any event by 24 months from the date of entry into force of this Regulation.

Interinstitutional Cyber Security Board

The Regulation establishes the Interinstitutional Cyber Security Board (IICB), with a view to facilitating the establishment of a common high level of cyber security among EU entities. The IICB will play an exclusive role in monitoring and supporting the implementation of the Regulation by EU entities, overseeing the implementation of the overall priorities and objectives of the EU-CERT and providing strategic direction to the EU-CERT.

In order to support Union entities, the IICB should provide guidance to the Head of CERT-EU, adopt a multiannual strategy on raising the level of cybersecurity in the Union entities, establish the methodology for and other aspects of voluntary peer reviews, and facilitate the establishment of an informal group of local cybersecurity officers, supported by the European Union Agency for Cybersecurity (ENISA), with the aim of exchanging best practices and information in relation to the implementation of this Regulation.

CERT-EU should collect, manage, analyse and share information with the Union entities on cyber threats, vulnerabilities and incidents in unclassified ICT infrastructure. It should coordinate responses to incidents at interinstitutional and Union entity level, including by providing or coordinating the provision of specialised operational assistance.

Reporting obligations

This Regulation lays down a multiple-stage approach to the reporting of significant incidents. All EU entities will have to inform CERT-EU of any incident with a significant impact. An incident should be considered to be significant if: (a) it has caused or is capable of causing severe operational disruption to the functioning of, or financial loss to, the Union entity concerned; (b) it has affected or is capable of affecting other natural or legal persons by causing considerable material or non-material damage.

Union entities should submit to CERT-EU:

- without undue delay and in any event within 24 hours of becoming aware of the significant incident, an early warning, which, where applicable, shall indicate that the significant incident is suspected of being caused by unlawful or malicious acts or could have a cross-entity or a cross-border impact;

- without undue delay and in any event within 72 hours of becoming aware of the significant incident, an incident notification, which, where applicable, shall update the information referred to in point (a) and indicate an initial assessment of the significant incident, including its severity and impact, as well as, where available, the indicators of compromise;

- a final report not later than one month after the submission of the incident notification, including the following: (i) a detailed description of the incident, including its severity and impact; (ii) the type of threat or root cause that is likely to have triggered the incident; (iii) applied and ongoing mitigation measures; (iv) where applicable, the cross-border or cross-entity impact of the incident.

A Union entity should, without undue delay and in any event within 24 hours of becoming aware of a significant incident, inform any relevant Member State counterparts in the Member State where it is located that a significant incident has occurred.

The amended text specifies that the processing, by CERT-EU, the Interinstitutional Cyber Security Council and Union entities, of personal data under the Regulation must be carried out in accordance with Regulation (EU) 2018/1725 on the protection of individuals with regard to the processing of personal data by the Union institutions, bodies, offices and agencies and on the free movement of such data.

Documents
2023/09/19
   EP - Approval in committee of the text agreed at 1st reading interinstitutional negotiations
2023/09/15
   CSL - Coreper letter confirming interinstitutional agreement
2023/09/15
   EP - Text agreed during interinstitutional negotiations
Documents
2023/03/15
   EP - Committee decision to enter into interinstitutional negotiations confirmed by plenary (Rule 71)
2023/03/13
   EP - Committee decision to enter into interinstitutional negotiations announced in plenary (Rule 71)
2023/03/10
   EP - Committee report tabled for plenary, 1st reading
Details

The Committee on Industry, Research and Energy adopted the report by Henna VIRKUNEN (EPP, FI) on the proposal for a regulation of the European Parliament and of the Council laying down measures for a high common level of cybersecurity at the institutions, bodies, offices and agencies of the Union.

The committee responsible recommended that the European Parliament's position adopted at first reading under the ordinary legislative procedure should amend the proposal as follows:

Subject-matter

This Regulation lays down measures that aim to achieve a high common level of cybersecurity in Union entities. To that end, this Regulation lays down:

- obligations that require Union entities to establish a cybersecurity risk management, handling of incidents, governance and control framework;

- cybersecurity risk management and reporting obligations for Union entities;

- rules underpinning information sharing obligations and the facilitation of voluntary information sharing arrangements with regard to Union entities;

- rules on the organisation, tasks and operation of the Cybersecurity Centre for the Union entities (CERT-EU) and on the functioning, organisation and operation of the Interinstitutional Cybersecurity Board (IICB).

Risk management, handling of incidents, governance and control framework

On the basis of a full cybersecurity audit, each Union entity should establish its own cybersecurity risk management, handling of incidents, governance and control framework. The establishment of the framework should be overseen by the Union entity’s highest level of management .

The risk management framework should (i) define the strategic objectives to ensure a high level of cybersecurity in the Union entities; (ii) lay down cybersecurity policies for the security of network and information systems encompassing the entirety of the ICT environment, and define the roles and responsibilities of staff of the Union entities tasked with ensuring the effective implementation of this Regulation; (iii) include the key performance indicators (KPIs).

The framework should be reviewed regularly and at least every three years.

Cybersecurity risk management measures

Risk management measures should ensure a level of security for networks and information systems across the ICT environment that is appropriate to the risks identified in the risk management framework, taking into account the state of the art and, where appropriate, applicable European and international standards or available European cybersecurity certificates.

When assessing the proportionality of those measures, due account should be taken of the degree of the Union entity’s exposure to risks, its size, the likelihood of occurrence of incidents and their severity, including their societal, economic and interinstitutional impact.

The Interinstitutional Cybersecurity Board

The IICB aims to support entities in elevating their respective cybersecurity postures by implementing this Regulation. In order to support Union entities, the IICB should: (i) adopt guidance and recommendations required for Union entities’ cybersecurity maturity assessments and cybersecurity plans, (ii) review possible interconnections between Union entities’ ICT environments and (iii) support the establishment of a Cybersecurity Officers Group under ENISA, comprising the Local Cybersecurity Officers of all Union entities with an aim to facilitate the sharing of best practices and experiences gained from the implementation of this Regulation.

Where the IICB finds that a Union entity has not effectively applied or implemented this Regulation, it could, without prejudice to the internal procedures of the Union entity concerned: (i) request relevant and available documentation relating to the effective implementation of the provisions of this Regulation, (ii) communicate a reasoned opinion with observed gaps in the implementation of this Regulation, (iii) invite the Union entity concerned to provide a self-assessment on its reasoned opinion and (iv) issue, in cooperation with CERT-EU, guidance to bring its respective risk management, governance and control framework, cybersecurity risk-management measures, cybersecurity plans and reporting obligations.

CERT-EU mission and tasks

The mission of CERT-EU, the autonomous interinstitutional Cybersecurity Centre for all Union entities, should be to contribute to the security of the unclassified environment of all Union entities and providing for them services that are analogous to CSIRTs established by the Member Sates, in particular by advising them on cybersecurity, by helping them to prevent, detect, handle, mitigate, respond to and recover from incidents. CERT-EU is an autonomous interinstitutional service provider for all Union entities, integrated into the administrative structure of a Commission Directorate-General in order to benefit from the Commission's administrative, financial, management and accounting support structures.

Reporting obligations

This Regulation lays down a multiple-stage approach to the reporting of significant incidents . All Union entities should report to CERT-EU any incident that has a significant impact. An incident should be considered to be significant if: (a) it has caused or is capable of causing severe operational disruption of the service or financial losses for the entity concerned; (b) it has affected or is capable of affecting other natural or legal persons by causing considerable material or non-material damage.

The Union entities should notify, inter alia, any information enabling the CERT-EU to determine any cross-entities impact, impact on the hosting Member State or cross border impact following a significant incident. All Union entities should submit to CERT-EU:

- without undue delay and in any event within 24 hours of becoming aware of the significant incident, an early warning, which, where applicable, should indicate whether the significant incident is suspected of being caused by unlawful or malicious acts or could have a cross-entity or a cross-border impact;

- without undue delay and in any event within 72 hours of becoming aware of the significant incident, an incident report.

CERT-EU should coordinate among the Union entities the handling of major incidents .

Documents
2023/03/09
   EP - Vote in committee, 1st reading
2023/03/09
   EP - Committee decision to open interinstitutional negotiations with report adopted in committee
2023/03/01
   EP - Committee opinion
Documents
2023/02/01
   EP - Committee opinion
Documents
2022/12/12
   EP - TOBÉ Tomas (EPP) appointed as rapporteur in LIBE
2022/10/27
   EP - Amendments tabled in committee
Documents
2022/10/07
   EP - Committee draft report
Documents
2022/09/15
   EP - Referral to associated committees announced in Parliament
2022/07/13
   EP - Committee opinion
Documents
2022/06/20
   EP - GREGOROVÁ Markéta (Verts/ALE) appointed as rapporteur in AFCO
2022/05/18
   EP - VIRKKUNEN Henna (EPP) appointed as rapporteur in ITRE
2022/05/17
   EDPS - Document attached to the procedure
2022/04/22
   EP - UŠAKOVS Nils (S&D) appointed as rapporteur in BUDG
2022/04/04
   EP - Committee referral announced in Parliament, 1st reading
2022/03/22
   EC - Document attached to the procedure
2022/03/22
   EC - Document attached to the procedure
2022/03/22
   EC - Legislative proposal published
Details

PURPOSE: to establish measures to ensure a high common level of cybersecurity in the Union institutions, bodies and agencies.

PROPOSED ACT: Regulation of the European Parliament and of the Council.

ROLE OF THE EUROPEAN PARLIAMENT: the European Parliament decides in accordance with the ordinary legislative procedure and on an equal footing with the Council.

BACKGROUND: evolving technology and increased complexity and interconnectedness of digital systems amplify cybersecurity risks making the Union administration more vulnerable to cyber threats and incidents .

From 2019 to 2021, the number of significant incidents affecting Union institutions, bodies and agencies, authored by advanced persistent threat actors, has surged dramatically. The first half of 2021 saw the equivalent in significant incidents as in the whole of 2020.

The Centre for Cybersecurity of the EU Institutions, Bodies and Agencies (CERT-EU) has assessed the main cyber threats to which the EU institutions, bodies and agencies are currently exposed or are likely to be exposed in the foreseeable future. The analysis examined the influence of major ongoing shifts affecting the ways in which the EU institutions manage and use their IT infrastructures and services. These shifts include the increase in teleworking, the migration of systems to the cloud and the increased outsourcing of IT services.

The analysis of the 20 Union institutions, bodies and agencies shows that their governance, cyber-hygiene, overall capability and maturity vary over a broad spectrum. Therefore, requiring all Union institutions, bodies and agencies to implement a baseline of cybersecurity measures is instrumental to address this disparity in maturity and to bring all Union institutions, bodies and agencies to a high common level of cybersecurity.

This proposal builds on the EU Strategy for the Security Union and the EU’s Cybersecurity Strategy for the Digital Decade.

CONTENT: this proposal establishes a framework to ensure common rules and measures on cybersecurity within the Union institutions, bodies, offices and agencies to enable them to perform their respective tasks in an open, efficient and independent manner. It aims to improve all entities’ resilience and incident response capacities.

The proposed Regulation:

- obliges the Union institutions, bodies, offices and agencies to (i) establish an internal framework for the management, governance and control of cybersecurity risks, ensuring effective and prudent management of all such risks, (ii) adopt a cybersecurity baseline to address the risks identified through this framework, (iii) carry out a cybersecurity maturity assessment covering all elements of its IT environment at least every three years, and (iv) adopt a cyber security plan ;

- establishes an inter-institutional cybersecurity board to monitor the implementation of this Regulation by the Union institutions, bodies, offices and agencies, as well to supervise the implementation of general priorities and objectives by CERT-EU and providing strategic direction to CERT-EU;

- defines the task and missions of CERT-EU as an autonomous inter-institutional cybersecurity centre at the service of all EU institutions, bodies, offices and agencies. CERT-EU will contribute to the security of the unclassified IT environment of all Union institutions, bodies and agencies by advising them on cybersecurity, by helping them to prevent, detect, mitigate and respond to incidents and by acting as their cybersecurity information exchange and incident response coordination hub;

- ensures cooperation and the exchange of information among CERT-EU, and the Union institutions , bodies and agencies to develop trust and confidence. To this end CERT-EU may request Union institutions, bodies and agencies to provide it with relevant information and CERT-EU may exchange incident-specific information with Union institutions, bodies and agencies to facilitate detection of similar cyber threats or incidents without the consent of the affected constituent. CERT-EU may only exchange incident-specific information which reveals the identity of the target of the cybersecurity incident with the consent of the affected constituent;

- obliges all EU institutions, bodies, offices and agencies to notify CERT-EU of significant cyber threats, significant vulnerabilities and significant incidents without undue delay and in any event no later than 24 hours after becoming aware of them.

Budgetary implications

According to studies, direct cybersecurity spending has tended to vary between 4 and 7% of the aggregated IT expenditures of organisations. However, the threat analysis undertaken by CERT-EU in support of this legislative proposal indicates that international bodies and political organisations face increased risks and therefore a level of 10% of IT spending on cybersecurity would seem a more adequate target.

The exact cost of such efforts cannot be determined due to the lack of detailed information on IT expenditure of the Union institutions, bodies and agencies and the relevant share of cybersecurity spending.

CERT-EU will require additional resources to fulfil its expanded role and these resources should be reallocated from the Union institutions, bodies and agencies benefitting from CERT-EU’s services.

Documents

Votes

High common level of cybersecurity at the institutions, bodies, offices and agencies of the Union – A9-0064/2023 – Henna Virkkunen – Provisional agreement – Am 2 #

2023/11/21 Outcome: +: 557, -: 27
IT FR DE ES PL RO NL CZ HU PT BE BG FI IE SE DK LT EL HR SK SI AT LV CY EE MT LU
Total
66
64
77
47
43
29
27
19
16
18
19
15
12
11
17
13
10
14
10
12
8
13
5
5
7
4
3
icon: PPE PPE
151

Denmark PPE

For (1)

1

Austria PPE

3

Latvia PPE

For (1)

1

Cyprus PPE

2

Estonia PPE

For (1)

1

Malta PPE

For (1)

1

Luxembourg PPE

For (1)

1
icon: S&D S&D
117

Czechia S&D

For (1)

1

Belgium S&D

2

Finland S&D

1

Sweden S&D

2

Lithuania S&D

1

Slovenia S&D

2

Latvia S&D

2

Cyprus S&D

2

Estonia S&D

2
icon: Renew Renew
87

Poland Renew

1

Hungary Renew

For (1)

1

Finland Renew

3

Ireland Renew

2
3

Lithuania Renew

1

Greece Renew

1

Croatia Renew

For (1)

1

Slovenia Renew

2

Latvia Renew

For (1)

1

Estonia Renew

3

Luxembourg Renew

For (1)

1
icon: Verts/ALE Verts/ALE
66

Italy Verts/ALE

3

Spain Verts/ALE

3

Poland Verts/ALE

For (1)

1

Romania Verts/ALE

1

Netherlands Verts/ALE

3

Czechia Verts/ALE

3

Portugal Verts/ALE

1

Belgium Verts/ALE

3

Finland Verts/ALE

2

Ireland Verts/ALE

2

Sweden Verts/ALE

3

Denmark Verts/ALE

For (1)

1

Lithuania Verts/ALE

2

Austria Verts/ALE

3

Luxembourg Verts/ALE

For (1)

1
icon: ECR ECR
57

Romania ECR

1

Bulgaria ECR

2

Sweden ECR

3

Lithuania ECR

1

Greece ECR

1

Croatia ECR

1

Slovakia ECR

Against (1)

1
icon: NI NI
34

France NI

For (1)

1

Germany NI

2

Spain NI

1

Belgium NI

For (1)

1

Lithuania NI

1

Croatia NI

Against (1)

2

Slovakia NI

Against (1)

3

Latvia NI

1
icon: The Left The Left
26

Spain The Left

2

Netherlands The Left

For (1)

1

Czechia The Left

1

Portugal The Left

Against (1)

3

Belgium The Left

For (1)

1

Finland The Left

For (1)

1

Ireland The Left

3

Denmark The Left

1

Greece The Left

2

Cyprus The Left

1
icon: ID ID
46

Czechia ID

For (1)

1

Belgium ID

2

Denmark ID

Against (1)

1

Austria ID

3

Estonia ID

Against (1)

1
AmendmentsDossier
469 2022/0085(COD)
2022/06/24 BUDG 18 amendments...
source: 734.223
2022/10/28 ITRE 309 amendments...
source: 738.403
2022/11/15 AFCO 96 amendments...
source: 731.765
2023/01/23 LIBE 46 amendments...
source: 740.795

History

(these mark the time of scraping, not the official date of the change)

events/10
date
2023-12-08T00:00:00
type
Act adopted by Council after Parliament's 1st reading
body
EP/CSL
events/12
date
2023-12-18T00:00:00
type
Final act published in Official Journal
docs
procedure/final
title
Regulation 2023/2841
url
https://eur-lex.europa.eu/smartapi/cgi/sga_doc?smartapi!celexplus!prod!CELEXnumdoc&lg=EN&numdoc=32023R2841
procedure/stage_reached
Old
Awaiting Council's 1st reading position
New
Procedure completed
events/10
date
2023-12-13T00:00:00
type
Final act signed
body
CSL
docs/10
date
2023-12-13T00:00:00
docs
title: 00057/2023/LEX
type
Draft final act
body
CSL
docs/10
date
2023-11-21T00:00:00
docs
url: https://www.europarl.europa.eu/doceo/document/TA-9-2023-0398_EN.html title: T9-0398/2023
type
Text adopted by Parliament, 1st reading/single reading
body
EP
events/9/summary
  • The European Parliament adopted by 557 votes to 0, with 27 abstentions, a legislative resolution on the proposal for a regulation of the European Parliament and of the Council laying down measures for a high common level of cybersecurity at the institutions, bodies, offices and agencies of the Union.
  • The European Parliament adopted its position at first reading under the ordinary legislative procedure.
  • Subject matter
  • This Regulation lays down measures that aim to achieve a high common level of cybersecurity within Union entities with regard to:
  • - the establishment by each Union entity of an internal cybersecurity risk-management, governance and control framework;
  • - cybersecurity risk management, reporting and information sharing;
  • - the organisation, functioning and operation of the Interinstitutional Cybersecurity Board as well as the organisation, functioning and operation of the Cybersecurity Service for the Union institutions, bodies, offices and agencies (CERT-EU);
  • - the monitoring of the implementation of this Regulation.
  • Cybersecurity risk-management, governance and control framework
  • Each Union entity should, after carrying out an initial cybersecurity review, such as an audit, establish an internal cybersecurity risk-management, governance and control framework. The establishment of the Framework should be overseen by and under the responsibility of the Union entity’s highest level of management . The Framework should be based on an all-hazards approach. It should ensure a high level of cybersecurity and be reviewed on a regular basis, in light of the changing cybersecurity risks, and at least every four years.
  • Each Union entity should appoint a local cybersecurity officer or an equivalent function who should act as its single point of contact regarding all aspects of cybersecurity. The local cybersecurity officer should facilitate the implementation of this Regulation and report directly to the highest level of management on a regular basis on the state of the implementation.
  • Cybersecurity risk-management measures
  • Without undue delay and in any event by 20 months from the date of entry into force of this Regulation, each Union entity should, under the oversight of its highest level of management, take appropriate and proportionate technical, operational and organisational measures to manage the cybersecurity risks identified under the Framework, and to prevent or minimise the impact of incidents. Those measures should ensure a level of security of network and information systems across the entirety of the ICT environment commensurate to the cybersecurity risks posed. When assessing the proportionality of those measures, due account should be taken of the degree of the Union entity’s exposure to cybersecurity risks, its size and the likelihood of occurrence of incidents and their severity, including their societal, economic and interinstitutional impact.
  • Cybersecurity plans
  • Following the conclusion of the cybersecurity maturity assessment carried out pursuant to the Regulation and taking into account the assets and cybersecurity risks identified in the Framework, as well as the cybersecurity risk-management measures, the highest level of management of each Union entity should approve a cybersecurity plan without undue delay and in any event by 24 months from the date of entry into force of this Regulation.
  • Interinstitutional Cyber Security Board
  • The Regulation establishes the Interinstitutional Cyber Security Board (IICB), with a view to facilitating the establishment of a common high level of cyber security among EU entities. The IICB will play an exclusive role in monitoring and supporting the implementation of the Regulation by EU entities, overseeing the implementation of the overall priorities and objectives of the EU-CERT and providing strategic direction to the EU-CERT.
  • In order to support Union entities, the IICB should provide guidance to the Head of CERT-EU, adopt a multiannual strategy on raising the level of cybersecurity in the Union entities, establish the methodology for and other aspects of voluntary peer reviews, and facilitate the establishment of an informal group of local cybersecurity officers, supported by the European Union Agency for Cybersecurity (ENISA), with the aim of exchanging best practices and information in relation to the implementation of this Regulation.
  • CERT-EU should collect, manage, analyse and share information with the Union entities on cyber threats, vulnerabilities and incidents in unclassified ICT infrastructure. It should coordinate responses to incidents at interinstitutional and Union entity level, including by providing or coordinating the provision of specialised operational assistance.
  • Reporting obligations
  • This Regulation lays down a multiple-stage approach to the reporting of significant incidents. All EU entities will have to inform CERT-EU of any incident with a significant impact. An incident should be considered to be significant if: (a) it has caused or is capable of causing severe operational disruption to the functioning of, or financial loss to, the Union entity concerned; (b) it has affected or is capable of affecting other natural or legal persons by causing considerable material or non-material damage.
  • Union entities should submit to CERT-EU:
  • - without undue delay and in any event within 24 hours of becoming aware of the significant incident, an early warning, which, where applicable, shall indicate that the significant incident is suspected of being caused by unlawful or malicious acts or could have a cross-entity or a cross-border impact;
  • - without undue delay and in any event within 72 hours of becoming aware of the significant incident, an incident notification, which, where applicable, shall update the information referred to in point (a) and indicate an initial assessment of the significant incident, including its severity and impact, as well as, where available, the indicators of compromise;
  • - a final report not later than one month after the submission of the incident notification, including the following: (i) a detailed description of the incident, including its severity and impact; (ii) the type of threat or root cause that is likely to have triggered the incident; (iii) applied and ongoing mitigation measures; (iv) where applicable, the cross-border or cross-entity impact of the incident.
  • A Union entity should, without undue delay and in any event within 24 hours of becoming aware of a significant incident, inform any relevant Member State counterparts in the Member State where it is located that a significant incident has occurred.
  • The amended text specifies that the processing, by CERT-EU, the Interinstitutional Cyber Security Council and Union entities, of personal data under the Regulation must be carried out in accordance with Regulation (EU) 2018/1725 on the protection of individuals with regard to the processing of personal data by the Union institutions, bodies, offices and agencies and on the free movement of such data.
docs/10
date
2023-11-21T00:00:00
docs
url: https://www.europarl.europa.eu/doceo/document/TA-9-2023-0398_EN.html title: T9-0398/2023
type
Text adopted by Parliament, 1st reading/single reading
body
EP
events/9
date
2023-11-21T00:00:00
type
Decision by Parliament, 1st reading
body
EP
docs
url: https://www.europarl.europa.eu/doceo/document/TA-9-2023-0398_EN.html title: T9-0398/2023
forecasts
  • date: 2023-11-21T00:00:00 title: Vote scheduled
procedure/stage_reached
Old
Awaiting Parliament's position in 1st reading
New
Awaiting Council's 1st reading position
forecasts/0/title
Old
Vote in plenary scheduled
New
Vote scheduled
forecasts/0
date
2023-11-21T00:00:00
title
Vote in plenary scheduled
forecasts/0
date
2023-11-20T00:00:00
title
Indicative plenary sitting date
docs/2/docs/0/url
Old
https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=OJ:C:2022:258:TOC
New
https://eur-lex.europa.eu/oj/daily-view/L-series/EN/TXT/?uri=OJ:C:2022:258:TOC
events/8/date
Old
2023-09-18T00:00:00
New
2023-09-19T00:00:00
events/8
date
2023-09-18T00:00:00
type
Approval in committee of the text agreed at 1st reading interinstitutional negotiations
body
EP
docs
docs/8
date
2023-09-15T00:00:00
docs
url: https://www.europarl.europa.eu/RegData/commissions/itre/lcag/2023/09-15/ITRE_LA(2023)005465_EN.pdf title: GEDA/A/(2023)005465
type
Coreper letter confirming interinstitutional agreement
body
CSL
docs/9
date
2023-09-15T00:00:00
docs
url: https://www.europarl.europa.eu/RegData/commissions/itre/inag/2023/09-15/ITRE_AG(2023)753446_EN.pdf title: PE753.446
type
Text agreed during interinstitutional negotiations
body
EP
forecasts/0/date
Old
2023-11-08T00:00:00
New
2023-11-20T00:00:00
forecasts/0/date
Old
2023-10-16T00:00:00
New
2023-11-08T00:00:00
forecasts
  • date: 2023-10-16T00:00:00 title: Indicative plenary sitting date
docs/8
date
2023-03-10T00:00:00
docs
url: https://www.europarl.europa.eu/doceo/document/A-9-2023-0064_EN.html title: A9-0064/2023
type
Committee report tabled for plenary, 1st reading/single reading
body
EP
events/5/summary
  • The Committee on Industry, Research and Energy adopted the report by Henna VIRKUNEN (EPP, FI) on the proposal for a regulation of the European Parliament and of the Council laying down measures for a high common level of cybersecurity at the institutions, bodies, offices and agencies of the Union.
  • The committee responsible recommended that the European Parliament's position adopted at first reading under the ordinary legislative procedure should amend the proposal as follows:
  • Subject-matter
  • This Regulation lays down measures that aim to achieve a high common level of cybersecurity in Union entities. To that end, this Regulation lays down:
  • - obligations that require Union entities to establish a cybersecurity risk management, handling of incidents, governance and control framework;
  • - cybersecurity risk management and reporting obligations for Union entities;
  • - rules underpinning information sharing obligations and the facilitation of voluntary information sharing arrangements with regard to Union entities;
  • - rules on the organisation, tasks and operation of the Cybersecurity Centre for the Union entities (CERT-EU) and on the functioning, organisation and operation of the Interinstitutional Cybersecurity Board (IICB).
  • Risk management, handling of incidents, governance and control framework
  • On the basis of a full cybersecurity audit, each Union entity should establish its own cybersecurity risk management, handling of incidents, governance and control framework. The establishment of the framework should be overseen by the Union entity’s highest level of management .
  • The risk management framework should (i) define the strategic objectives to ensure a high level of cybersecurity in the Union entities; (ii) lay down cybersecurity policies for the security of network and information systems encompassing the entirety of the ICT environment, and define the roles and responsibilities of staff of the Union entities tasked with ensuring the effective implementation of this Regulation; (iii) include the key performance indicators (KPIs).
  • The framework should be reviewed regularly and at least every three years.
  • Cybersecurity risk management measures
  • Risk management measures should ensure a level of security for networks and information systems across the ICT environment that is appropriate to the risks identified in the risk management framework, taking into account the state of the art and, where appropriate, applicable European and international standards or available European cybersecurity certificates.
  • When assessing the proportionality of those measures, due account should be taken of the degree of the Union entity’s exposure to risks, its size, the likelihood of occurrence of incidents and their severity, including their societal, economic and interinstitutional impact.
  • The Interinstitutional Cybersecurity Board
  • The IICB aims to support entities in elevating their respective cybersecurity postures by implementing this Regulation. In order to support Union entities, the IICB should: (i) adopt guidance and recommendations required for Union entities’ cybersecurity maturity assessments and cybersecurity plans, (ii) review possible interconnections between Union entities’ ICT environments and (iii) support the establishment of a Cybersecurity Officers Group under ENISA, comprising the Local Cybersecurity Officers of all Union entities with an aim to facilitate the sharing of best practices and experiences gained from the implementation of this Regulation.
  • Where the IICB finds that a Union entity has not effectively applied or implemented this Regulation, it could, without prejudice to the internal procedures of the Union entity concerned: (i) request relevant and available documentation relating to the effective implementation of the provisions of this Regulation, (ii) communicate a reasoned opinion with observed gaps in the implementation of this Regulation, (iii) invite the Union entity concerned to provide a self-assessment on its reasoned opinion and (iv) issue, in cooperation with CERT-EU, guidance to bring its respective risk management, governance and control framework, cybersecurity risk-management measures, cybersecurity plans and reporting obligations.
  • CERT-EU mission and tasks
  • The mission of CERT-EU, the autonomous interinstitutional Cybersecurity Centre for all Union entities, should be to contribute to the security of the unclassified environment of all Union entities and providing for them services that are analogous to CSIRTs established by the Member Sates, in particular by advising them on cybersecurity, by helping them to prevent, detect, handle, mitigate, respond to and recover from incidents. CERT-EU is an autonomous interinstitutional service provider for all Union entities, integrated into the administrative structure of a Commission Directorate-General in order to benefit from the Commission's administrative, financial, management and accounting support structures.
  • Reporting obligations
  • This Regulation lays down a multiple-stage approach to the reporting of significant incidents . All Union entities should report to CERT-EU any incident that has a significant impact. An incident should be considered to be significant if: (a) it has caused or is capable of causing severe operational disruption of the service or financial losses for the entity concerned; (b) it has affected or is capable of affecting other natural or legal persons by causing considerable material or non-material damage.
  • The Union entities should notify, inter alia, any information enabling the CERT-EU to determine any cross-entities impact, impact on the hosting Member State or cross border impact following a significant incident. All Union entities should submit to CERT-EU:
  • - without undue delay and in any event within 24 hours of becoming aware of the significant incident, an early warning, which, where applicable, should indicate whether the significant incident is suspected of being caused by unlawful or malicious acts or could have a cross-entity or a cross-border impact;
  • - without undue delay and in any event within 72 hours of becoming aware of the significant incident, an incident report.
  • CERT-EU should coordinate among the Union entities the handling of major incidents .
events/7
date
2023-03-15T00:00:00
type
Committee decision to enter into interinstitutional negotiations confirmed by plenary (Rule 71)
body
EP
events/6
date
2023-03-13T00:00:00
type
Committee decision to enter into interinstitutional negotiations announced in plenary (Rule 71)
body
EP
docs/8/docs/0/url
https://www.europarl.europa.eu/doceo/document/A-9-2023-0064_EN.html
events/5/docs/0/url
https://www.europarl.europa.eu/doceo/document/A-9-2023-0064_EN.html
docs/7/docs/0/url
https://www.europarl.europa.eu/doceo/document/LIBE-AD-739801_EN.html
docs/8
date
2023-03-10T00:00:00
docs
title: A9-0064/2023
type
Committee report tabled for plenary, 1st reading/single reading
body
EP
events/3
date
2023-03-09T00:00:00
type
Vote in committee, 1st reading
body
EP
events/4
date
2023-03-09T00:00:00
type
Committee decision to open interinstitutional negotiations with report adopted in committee
body
EP
events/5
date
2023-03-10T00:00:00
type
Committee report tabled for plenary, 1st reading
body
EP
docs
title: A9-0064/2023
procedure/Other legal basis
Rules of Procedure EP 159
procedure/stage_reached
Old
Awaiting committee decision
New
Awaiting Parliament's position in 1st reading
docs/7
date
2023-03-01T00:00:00
docs
title: PE739.801
committee
LIBE
type
Committee opinion
body
EP
docs/6/date
Old
2023-01-31T00:00:00
New
2023-02-01T00:00:00
docs/6/docs/0/url
https://www.europarl.europa.eu/doceo/document/AFCO-AD-730184_EN.html
docs/6
date
2023-01-31T00:00:00
docs
title: PE730.184
committee
AFCO
type
Committee opinion
body
EP
docs/0
date
2022-03-22T00:00:00
docs
summary
type
Legislative proposal
body
EC
events/0
date
2022-03-22T00:00:00
type
Legislative proposal published
body
EC
docs
summary
docs/0
date
2022-03-22T00:00:00
docs
summary
type
Legislative proposal
body
EC
events/0
date
2022-03-22T00:00:00
type
Legislative proposal published
body
EC
docs
summary
committees/0
type
Responsible Committee
body
EP
committee_full
Industry, Research and Energy
committee
ITRE
associated
False
rapporteur
name: VIRKKUNEN Henna date: 2022-05-18T00:00:00 group: Group of European People's Party abbr: EPP
shadows
committees/0
type
Responsible Committee
body
EP
committee_full
Industry, Research and Energy
committee
ITRE
associated
False
rapporteur
name: VIRKKUNEN Henna date: 2022-05-18T00:00:00 group: Group of European People's Party abbr: EPP
shadows
committees/1
Old
type
Committee Opinion
body
EP
committee_full
Constitutional Affairs
committee
AFCO
associated
False
rapporteur
name: GREGOROVÁ Markéta date: 2022-06-20T00:00:00 group: Group of the Greens/European Free Alliance abbr: Verts/ALE
New
type
Committee Opinion
body
EP
committee_full
Budgets
committee
BUDG
associated
False
rapporteur
name: UŠAKOVS Nils date: 2022-04-22T00:00:00 group: Group of Progressive Alliance of Socialists and Democrats abbr: S&D
committees/2
Old
type
Committee Opinion
body
EP
committee_full
Civil Liberties, Justice and Home Affairs
committee
LIBE
associated
False
rapporteur
name: TOBÉ Tomas date: 2022-12-12T00:00:00 group: Group of European People's Party abbr: EPP
New
type
Committee Opinion
body
EP
committee_full
Constitutional Affairs
committee
AFCO
associated
False
rapporteur
name: GREGOROVÁ Markéta date: 2022-06-20T00:00:00 group: Group of the Greens/European Free Alliance abbr: Verts/ALE
committees/3
Old
type
Committee Opinion
body
EP
committee_full
Budgets
committee
BUDG
associated
False
rapporteur
name: UŠAKOVS Nils date: 2022-04-22T00:00:00 group: Group of Progressive Alliance of Socialists and Democrats abbr: S&D
New
type
Committee Opinion
body
EP
committee_full
Civil Liberties, Justice and Home Affairs
committee
LIBE
associated
False
rapporteur
name: TOBÉ Tomas date: 2022-12-12T00:00:00 group: Group of European People's Party abbr: EPP
committees/2/rapporteur
  • name: TOBÉ Tomas date: 2022-12-12T00:00:00 group: Group of European People's Party abbr: EPP
docs/0
date
2022-03-22T00:00:00
docs
summary
type
Legislative proposal
body
EC
events/0
date
2022-03-22T00:00:00
type
Legislative proposal published
body
EC
docs
summary
docs/0
date
2022-03-22T00:00:00
docs
summary
type
Legislative proposal
body
EC
events/0
date
2022-03-22T00:00:00
type
Legislative proposal published
body
EC
docs
summary
docs/5/docs/0/url
https://www.europarl.europa.eu/doceo/document/ITRE-AM-738403_EN.html
docs/5
date
2022-10-27T00:00:00
docs
title: PE738.403
type
Amendments tabled in committee
body
EP
docs/4/docs/0/url
https://www.europarl.europa.eu/doceo/document/ITRE-PR-737231_EN.html
docs/4
date
2022-10-07T00:00:00
docs
title: PE737.231
type
Committee draft report
body
EP
docs/0
date
2022-03-22T00:00:00
docs
summary
type
Legislative proposal
body
EC
events/0
date
2022-03-22T00:00:00
type
Legislative proposal published
body
EC
docs
summary
docs/0
date
2022-03-22T00:00:00
docs
summary
type
Legislative proposal
body
EC
events/0
date
2022-03-22T00:00:00
type
Legislative proposal published
body
EC
docs
summary
docs/0
date
2022-03-22T00:00:00
docs
summary
type
Legislative proposal
body
EC
events/0
date
2022-03-22T00:00:00
type
Legislative proposal published
body
EC
docs
summary
docs/0
date
2022-03-22T00:00:00
docs
summary
type
Legislative proposal
body
EC
events/0
date
2022-03-22T00:00:00
type
Legislative proposal published
body
EC
docs
summary
events/1
date
2022-09-15T00:00:00
type
Referral to associated committees announced in Parliament
body
EP
procedure/legal_basis/1
Rules of Procedure EP 57
links
Research document
docs/2
date
2022-05-17T00:00:00
docs
type
Document attached to the procedure
body
EDPS
docs/0
date
2022-03-22T00:00:00
docs
summary
type
Legislative proposal
body
EC
events/0
date
2022-03-22T00:00:00
type
Legislative proposal published
body
EC
docs
summary
docs/0
date
2022-03-22T00:00:00
docs
summary
type
Legislative proposal
body
EC
docs/2
date
2022-07-13T00:00:00
docs
title: PE732.682
committee
BUDG
type
Committee opinion
body
EP
docs/3
date
2022-07-13T00:00:00
docs
title: PE732.682
committee
BUDG
type
Committee opinion
body
EP
docs/3/docs/0/url
https://www.europarl.europa.eu/doceo/document/BUDG-AD-732682_EN.html
events/0
date
2022-03-22T00:00:00
type
Legislative proposal published
body
EC
docs
summary
docs/2/date
Old
2022-07-12T00:00:00
New
2022-07-13T00:00:00
docs/2
date
2022-07-12T00:00:00
docs
title: PE732.682
committee
BUDG
type
Committee opinion
body
EP
docs/0
date
2022-03-22T00:00:00
docs
summary
type
Legislative proposal
body
EC
events/0
date
2022-03-22T00:00:00
type
Legislative proposal published
body
EC
docs
summary
committees/1
type
Committee Opinion
body
EP
committee_full
Constitutional Affairs
committee
AFCO
associated
False
committees/1
Old
type
Committee Opinion
body
EP
committee_full
Civil Liberties, Justice and Home Affairs
committee
LIBE
associated
False
New
type
Committee Opinion
body
EP
committee_full
Budgets
committee
BUDG
associated
False
rapporteur
name: UŠAKOVS Nils date: 2022-04-22T00:00:00 group: Group of Progressive Alliance of Socialists and Democrats abbr: S&D
committees/2
Old
type
Committee Opinion
body
EP
committee_full
Budgets
committee
BUDG
associated
False
rapporteur
name: UŠAKOVS Nils date: 2022-04-22T00:00:00 group: Group of Progressive Alliance of Socialists and Democrats abbr: S&D
New
type
Committee Opinion
body
EP
committee_full
Civil Liberties, Justice and Home Affairs
committee
LIBE
associated
False
committees/3
type
Committee Opinion
body
EP
committee_full
Constitutional Affairs
committee
AFCO
associated
False
committees/3/rapporteur
  • name: GREGOROVÁ Markéta date: 2022-06-20T00:00:00 group: Group of the Greens/European Free Alliance abbr: Verts/ALE
docs/0
date
2022-03-22T00:00:00
docs
title: SWD(2022)0067
type
Document attached to the procedure
body
EC
docs/0
date
2022-03-22T00:00:00
docs
summary
type
Legislative proposal
body
EC
docs/1
date
2022-03-22T00:00:00
docs
title: SWD(2022)0067
type
Document attached to the procedure
body
EC
docs/1
date
2022-03-22T00:00:00
docs
title: SWD(2022)0068
type
Document attached to the procedure
body
EC
docs/1/docs/0
url
https://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=SWD:2022:0067:FIN:EN:PDF
title
EUR-Lex
docs/2
date
2022-03-22T00:00:00
docs
title: SWD(2022)0068
type
Document attached to the procedure
body
EC
docs/2/docs/0
url
https://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=SWD:2022:0068:FIN:EN:PDF
title
EUR-Lex
events/0
date
2022-03-22T00:00:00
type
Legislative proposal published
body
EC
docs
url: http://www.europarl.europa.eu/RegData/docs_autres_institutions/commission_europeenne/com/2022/0122/COM_COM(2022)0122_EN.pdf title: COM(2022)0122
summary
committees/0/shadows
  • name: KAILI Eva group: Group of Progressive Alliance of Socialists and Democrats abbr: S&D
  • name: BILBAO BARANDICA Izaskun group: Renew Europe group abbr: Renew
  • name: PEKSA Mikuláš group: Group of the Greens/European Free Alliance abbr: Verts/ALE
  • name: BUCHHEIT Markus group: Identity and Democracy abbr: ID
  • name: TOŠENOVSKÝ Evžen group: European Conservatives and Reformists Group abbr: ECR
  • name: BOTENGA Marc group: The Left group in the European Parliament - GUE/NGL abbr: GUE/NGL
committees/1
Old
type
Committee Opinion
body
EP
committee_full
Budgets
committee
BUDG
associated
False
rapporteur
name: UŠAKOVS Nils date: 2022-04-22T00:00:00 group: Group of Progressive Alliance of Socialists and Democrats abbr: S&D
New
type
Committee Opinion
body
EP
committee_full
Constitutional Affairs
committee
AFCO
associated
False
committees/3
Old
type
Committee Opinion
body
EP
committee_full
Constitutional Affairs
committee
AFCO
associated
False
New
type
Committee Opinion
body
EP
committee_full
Budgets
committee
BUDG
associated
False
rapporteur
name: UŠAKOVS Nils date: 2022-04-22T00:00:00 group: Group of Progressive Alliance of Socialists and Democrats abbr: S&D
docs/0
date
2022-03-22T00:00:00
docs
url: http://www.europarl.europa.eu/RegData/docs_autres_institutions/commission_europeenne/com/2022/0122/COM_COM(2022)0122_EN.pdf title: COM(2022)0122
summary
type
Legislative proposal
body
EC
events/0
date
2022-03-22T00:00:00
type
Legislative proposal published
body
EC
docs
url: http://www.europarl.europa.eu/RegData/docs_autres_institutions/commission_europeenne/com/2022/0122/COM_COM(2022)0122_EN.pdf title: COM(2022)0122
summary
commission
  • body: EC dg: Informatics commissioner: HAHN Johannes
committees/0/rapporteur
  • name: VIRKKUNEN Henna date: 2022-05-18T00:00:00 group: Group of European People's Party abbr: EPP
committees/1/rapporteur
  • name: UŠAKOVS Nils date: 2022-04-22T00:00:00 group: Group of Progressive Alliance of Socialists and Democrats abbr: S&D
docs/0/docs/0/url
http://www.europarl.europa.eu/RegData/docs_autres_institutions/commission_europeenne/com/2022/0122/COM_COM(2022)0122_EN.pdf
docs/0/summary
  • PURPOSE: to establish measures to ensure a high common level of cybersecurity in the Union institutions, bodies and agencies.
  • PROPOSED ACT: Regulation of the European Parliament and of the Council.
  • ROLE OF THE EUROPEAN PARLIAMENT: the European Parliament decides in accordance with the ordinary legislative procedure and on an equal footing with the Council.
  • BACKGROUND: evolving technology and increased complexity and interconnectedness of digital systems amplify cybersecurity risks making the Union administration more vulnerable to cyber threats and incidents .
  • From 2019 to 2021, the number of significant incidents affecting Union institutions, bodies and agencies, authored by advanced persistent threat actors, has surged dramatically. The first half of 2021 saw the equivalent in significant incidents as in the whole of 2020.
  • The Centre for Cybersecurity of the EU Institutions, Bodies and Agencies (CERT-EU) has assessed the main cyber threats to which the EU institutions, bodies and agencies are currently exposed or are likely to be exposed in the foreseeable future. The analysis examined the influence of major ongoing shifts affecting the ways in which the EU institutions manage and use their IT infrastructures and services. These shifts include the increase in teleworking, the migration of systems to the cloud and the increased outsourcing of IT services.
  • The analysis of the 20 Union institutions, bodies and agencies shows that their governance, cyber-hygiene, overall capability and maturity vary over a broad spectrum. Therefore, requiring all Union institutions, bodies and agencies to implement a baseline of cybersecurity measures is instrumental to address this disparity in maturity and to bring all Union institutions, bodies and agencies to a high common level of cybersecurity.
  • This proposal builds on the EU Strategy for the Security Union and the EU’s Cybersecurity Strategy for the Digital Decade.
  • CONTENT: this proposal establishes a framework to ensure common rules and measures on cybersecurity within the Union institutions, bodies, offices and agencies to enable them to perform their respective tasks in an open, efficient and independent manner. It aims to improve all entities’ resilience and incident response capacities.
  • The proposed Regulation:
  • - obliges the Union institutions, bodies, offices and agencies to (i) establish an internal framework for the management, governance and control of cybersecurity risks, ensuring effective and prudent management of all such risks, (ii) adopt a cybersecurity baseline to address the risks identified through this framework, (iii) carry out a cybersecurity maturity assessment covering all elements of its IT environment at least every three years, and (iv) adopt a cyber security plan ;
  • - establishes an inter-institutional cybersecurity board to monitor the implementation of this Regulation by the Union institutions, bodies, offices and agencies, as well to supervise the implementation of general priorities and objectives by CERT-EU and providing strategic direction to CERT-EU;
  • - defines the task and missions of CERT-EU as an autonomous inter-institutional cybersecurity centre at the service of all EU institutions, bodies, offices and agencies. CERT-EU will contribute to the security of the unclassified IT environment of all Union institutions, bodies and agencies by advising them on cybersecurity, by helping them to prevent, detect, mitigate and respond to incidents and by acting as their cybersecurity information exchange and incident response coordination hub;
  • - ensures cooperation and the exchange of information among CERT-EU, and the Union institutions , bodies and agencies to develop trust and confidence. To this end CERT-EU may request Union institutions, bodies and agencies to provide it with relevant information and CERT-EU may exchange incident-specific information with Union institutions, bodies and agencies to facilitate detection of similar cyber threats or incidents without the consent of the affected constituent. CERT-EU may only exchange incident-specific information which reveals the identity of the target of the cybersecurity incident with the consent of the affected constituent;
  • - obliges all EU institutions, bodies, offices and agencies to notify CERT-EU of significant cyber threats, significant vulnerabilities and significant incidents without undue delay and in any event no later than 24 hours after becoming aware of them.
  • Budgetary implications
  • According to studies, direct cybersecurity spending has tended to vary between 4 and 7% of the aggregated IT expenditures of organisations. However, the threat analysis undertaken by CERT-EU in support of this legislative proposal indicates that international bodies and political organisations face increased risks and therefore a level of 10% of IT spending on cybersecurity would seem a more adequate target.
  • The exact cost of such efforts cannot be determined due to the lack of detailed information on IT expenditure of the Union institutions, bodies and agencies and the relevant share of cybersecurity spending.
  • CERT-EU will require additional resources to fulfil its expanded role and these resources should be reallocated from the Union institutions, bodies and agencies benefitting from CERT-EU’s services.
events
  • date: 2022-04-04T00:00:00 type: Committee referral announced in Parliament, 1st reading body: EP
procedure/dossier_of_the_committee
  • ITRE/9/08708
procedure/stage_reached
Old
Preparatory phase in Parliament
New
Awaiting committee decision