COMMISSION STAFF WORKING DOCUMENT IMPACT ASSESSMENT REPORT Accompanying the document Proposal for a Directive of the European Parliament and of the Council on measures for a high common level of cybersecurity across the Union, repealing Directive (EU) 2016/1148

Tilhører sager:

Aktører:


    1_EN_impact_assessment_part1_v5.pdf

    https://www.ft.dk/samling/20201/kommissionsforslag/kom(2020)0823/forslag/1729193/2307177.pdf

    EN EN
    EUROPEAN
    COMMISSION
    Brussels, 16.12.2020
    SWD(2020) 345 final
    PART 1/3
    COMMISSION STAFF WORKING DOCUMENT
    IMPACT ASSESSMENT REPORT
    Accompanying the document
    Proposal for a Directive of the European Parliament and of the Council
    on measures for a high common level of cybersecurity across the Union, repealing
    Directive (EU) 2016/1148
    {COM(2020) 823 final} - {SEC(2020) 430 final} - {SWD(2020) 344 final}
    Europaudvalget 2020
    KOM (2020) 0823
    Offentligt
    1
    Table of contents
    1. Introduction .................................................................................................................9
    1.1. Political context and legal framework...............................................................9
    1.2. Results of the evaluation of the NIS Directive................................................13
    2. Problem definition.....................................................................................................15
    2.1. What are the problems?...................................................................................15
    2.2. What are the problem drivers? ........................................................................23
    3. How will the problem evolve? ..................................................................................28
    4. Why should the EU act?............................................................................................29
    4.1. Legal basis.......................................................................................................29
    4.2. Subsidiarity: Necessity of EU action...............................................................30
    4.3. Subsidiarity: Added value of EU action..........................................................30
    5. Objectives: What is to be achieved?..........................................................................31
    5.1. General objectives ...........................................................................................31
    5.2. Specific objectives...........................................................................................32
    6. What are the available policy options?......................................................................32
    6.1. Description of the policy options ....................................................................32
    6.2. Options discarded at an early stage .................................................................69
    7. What are the impacts of the policy options? .............................................................70
    7.1. Economic impact and efficiency .....................................................................70
    7.2. Social impacts..................................................................................................88
    7.3. Environmental impacts....................................................................................88
    7.4. Impacts on fundamental rights ........................................................................88
    8. How do the options compare?...................................................................................89
    9. Preferred option.........................................................................................................92
    9.1. Rationale and benefits of the preferred option ................................................92
    9.3. REFIT (simplification and improved efficiency)............................................93
    10. How will actual impact be monitored and evaluated?...............................................95
    2
    Glossary: acronyms
    Term or acronym Meaning
    AI Artificial Intelligence
    CDN Content delivery network
    CSIRTs Computer Security Incident Response Teams
    CyCLONe European Cyber Crises Liaison Organisation Network
    DDoS Distributed Denial of Service
    DEP Digital Europe Programme
    DESI Digital Economy and Society Index
    DNS Domain Name System
    DORA Digital Operational Resilience Act for the financial
    sector
    DSP Digital service provider
    EASA The European Union Aviation Safety Agency
    ECCSA European Centre for Cybersecurity in Aviation
    ECI Directive Directive on the identification and designation of
    European critical infrastructures
    ECJ European Court of Justice
    EECC European Electronic Communications Code
    EMSA European Marine Safety Agency
    eIDAS (Regulation) Regulation on electronic identification and trust services
    for electronic transactions in the internal market
    3
    ENISA The European Union Agency for Cybersecurity
    GDPR General Data Protection Regulation
    IaaS Infrastructure as a service (cloud service model)
    ICS Industrial control system
    IOCTA Internet Organised Crime Threat Assessment
    IoT Internet of Things
    ISAC Information Sharing and Analysis Centre
    ISO International Organisation for Standardisation
    ITU International Telecommunications Union: The United
    Nations specialised agency for information and
    communication technologies
    IXPs Internet Exchange Points
    JRC European Commission’s Joint Research Centre
    LOTL European List of eIDAS Trusted Lists
    OES Operator of essential services
    OPC Open public consultation
    MeliCERTes Cybersecurity Digital Service Infrastructure
    Maintenance and Evolution of Core Service Platform
    Cooperation Mechanism for CSIRTs
    NACE Statistical Classification of Economic Activities in the
    European Community
    NIS Directive Directive concerning measures for a high common level
    of security of network and information systems across
    the Union
    NIST National Institute of Standards and Technology – US
    4
    Department of Commerce
    PaaS Platform as a Service (cloud service model)
    PPP Private Public Partnership
    ROSI Return of Security Investment
    SaaS Software as a Service (cloud service model)
    SME Small and medium-sized enterprises
    SPOC Single Point of Contact
    TFEU Treaty on the Functioning of the European Union
    TLD Top-level domain
    5
    Glossary: terms and definitions
    Term/concept Definition
    ARGUS General rapid alert system linking all the European
    Commission’s specialised systems for emergencies
    Cloud computing service A digital service that enables on-demand administration and
    broad remote access to a scalable and elastic pool of
    shareable computing resources
    Content delivery network A network of geographically distributed servers for the
    purpose of ensuring high availability, accessibility or fast
    delivery of digital content and services to internet users on
    behalf of content and service providers
    Cybersecurity The activities necessary to protect network and information
    systems, the users of such systems, and other persons
    affected by cyber threats
    Cybersecurity certification
    scheme
    A comprehensive set of rules, technical requirements,
    standards and procedures developed and adopted by a public
    authority and that apply to the certification or conformity
    assessment of ICT products, ICT services and ICT processes
    falling under the scope of the specific scheme
    Cyber threat Any potential circumstance, event or action within the
    meaning of point 8 of Article 2 of Regulation (EU) 2019/881
    Data centre service A service that encompasses structures, or groups of
    structures, dedicated to the centralised accommodation,
    interconnection and operation of information technology and
    network telecommunications equipment providing data
    storage, processing and transport services together with all
    the facilities and infrastructures for power distribution and
    environmental control
    Distributed denial-of-
    service (DDoS) attack
    A malicious attempt to disrupt the normal traffic of a
    targeted server, service or network by overwhelming the
    target or its surrounding infrastructure with a flood of
    internet traffic
    Domain name system
    (DNS)
    A hierarchical distributed naming system which allows end-
    users to reach services and resources on the open internet
    DNS service provider An entity that provides recursive or authoritative domain
    name resolution services to internet end-users and other DNS
    6
    service providers based on information contained in the
    hierarchical structure of the DNS
    Edge computing Distributed, open IT architecture that features decentralised
    processing power, enabling mobile computing and Internet
    of Things (IoT) technologies. In edge computing, data is
    processed by the device itself or by a local computer or
    server, rather than being transmitted to a data centre
    Incident Any event compromising the availability, authenticity,
    integrity or confidentiality of stored or transmitted or
    processed data or the related services offered by, or
    accessible via, network and information systems
    Incident handling All procedures supporting the detection, analysis and
    containment of an incident and the response thereto
    Internet exchange point
    (IXP)
    A network facility which enables the interconnection of more
    than two independent autonomous systems, primarily for the
    purpose of facilitating the exchange of internet traffic; an
    IXP provides interconnection only for autonomous systems;
    an IXP does not require the internet traffic passing between
    any pair of participating autonomous systems to pass through
    any third autonomous system, nor does it alter or otherwise
    interfere with such traffic
    ISO 27000-series standards Series of mutually supporting information security standards
    that can be combined to provide a globally recognised
    framework for best-practice information security
    management
    NIST standards Standards aimed at driving innovation and economic
    competitiveness at U.S.-based organizations in the science
    and technology industry developed by the National Institute
    of Standards and Technology (NIST). NIST standards are
    based on best practices from several security documents,
    organizations, and publications, and are designed as a
    framework for federal agencies and programs requiring
    stringent security measures
    Network and information
    system
    An electronic communications network or any device or
    group of inter–connected or related devices, one or more of
    which, pursuant to a program, perform automatic processing
    of digital data, or digital data stored, processed, retrieved or
    transmitted by elements covered under the previous points
    for the purposes of their operation, use, protection and
    maintenance
    7
    Online marketplace Digital service that allows consumers and/or traders to
    conclude online sales or service contracts with traders either
    on the online marketplace's website or on a trader's website
    that uses computing services provided by the online
    marketplace
    Online search engine A digital service that allows users to perform searches of, in
    principle, all websites or websites in a particular language on
    the basis of a query on any subject in the form of a keyword,
    phrase or other input, and returns links in which information
    related to the requested content can be found
    Operators of government-
    owned and privately-owned
    ground-based infrastructure
    that support the provision
    of space-based services
    Ground-based government-owned and privately-owned
    infrastructure that supports the provision of space-based
    services, with the exception of specific ground-based
    infrastructure that directly supports space-based components
    of the EU’s space programme, including Galileo, EGNOS,
    Copernicus, GOVSATCOM and Space Surveillance and
    Tracking
    Provision of an electronic
    communications network
    The establishment, operation, control or making available of
    such a network, as defined by the Directive (EU) 2018/1972
    establishing the European Electronic Communications Code
    Public electronic
    communications networks
    or of publicly available
    electronic communications
    services
    Electronic communications network used wholly or mainly
    for the provision of publicly available electronic
    communications services which support the transfer of
    information between network termination points, as defined
    by the Directive (EU) 2018/1972 establishing the European
    Electronic Communications Code
    Public administration
    entities
    Public entities that: (i) are established for the purpose of
    meeting needs in the general interest and does not have an
    industrial or commercial character; (ii) have legal
    personality; (iii) are financed, for the most part, by the State,
    regional authority, or by other bodies governed by public
    law; or is subject to management supervision by those
    authorities or bodies; or have an administrative, managerial
    or supervisory board, more than half of whose members are
    appointed by the State, regional authorities, or by other
    bodies governed by public law and (iv) have the power to
    address to natural or legal persons administrative or
    regulatory decisions affecting their rights in the cross-border
    movement of persons, goods, services and capital.
    Ransomware Type of malware (e.g. viruses, trojans, etc.) that infects the
    computer systems of users and manipulates the infected
    system in a way, that the victim cannot (partially or fully)
    8
    use it and the data stored on it. The victim usually shortly
    after receives a blackmail note by pop-up, pressing the victim
    to pay a ransom to regain full access to system and files.
    Security of network and
    information systems
    The ability of network and information systems to resist, at a
    given level of confidence, any action, that compromises the
    availability, authenticity, integrity or confidentiality of stored
    or transmitted or processed data or the related services
    offered by, or accessible via, those network and information
    systems
    Social network An online multi-sided platform that enables users to connect,
    share, discover and communicate with each other across
    multiple devices (mobile and desktop) and means (e.g., via
    chats, posts, videos, recommendations)
    Top–level domain name
    registry
    An entity which administers and operates a specific top-level
    domain (TLD) by providing the registration of domain
    names under the TLD and the technical operation of the
    TLD, including the operation of its name servers, the
    maintenance of its databases and the distribution of TLD
    zone files across name servers
    Trust service provider Trust Service Providers, within the meaning of Article 3(19)
    of the eIDAS Regulation, are responsible for assuring the
    digital ID of people through authentication, digital
    certificates and digital signatures
    Vulnerability A weakness, susceptibility or flaw of an asset, system,
    process or control that can be exploited by a threat
    Waste water Water that is of no further immediate value to the purpose for
    which it was used or in the pursuit of which it was produced
    because of its quality, quantity or time of occurrence.
    9
    1. INTRODUCTION
    1.1. Political context and legal framework
    The Directive concerning measures for a high common level of security of network and
    information systems across the Union1
    (hereinafter called the ‘NIS Directive’), which
    entered into force in August 2016, was the first piece of EU-wide legislation on
    cybersecurity. By now, all Member States have transposed the NIS Directive into
    national law.
    Article 23(2) of the NIS Directive requires the Commission to review the functioning of
    the Directive by 9 May 2021. The review is also mentioned in the Adjusted Commission
    Work Programme 2020, which envisages a legislative proposal accompanied by an
    impact assessment in Q4 of 2020.2
    Furthermore, the EU Security Union Strategy for
    2020 to 20253
    , which focuses on priority areas where the EU can bring value to support
    Member States in fostering security, also comprises provisions on cybersecurity,
    mentioning the review of the NIS Directive planned to be completed by the end of 2020.
    Cybersecurity is also one of the Commission’s priorities in its response to the COVID-19
    crisis, and consequently the Recovery Plan for Europe4
    includes additional investments
    in cybersecurity. In its Communication on Shaping Europe’s Digital Future of
    February 2020, the Commission highlighted the need to cooperate with a view to “setting
    consistent rules for companies and stronger mechanisms for proactive information-
    sharing; ensuring operational cooperation between Member States, and between the EU
    and Member States”.5
    At the level of the European Parliament, a resolution from 12 March 2019 called “[…]
    on the Commission to assess the need to further enlarge the scope of the NIS Directive to
    other critical sectors and services that are not covered by sector-specific legislation”.6
    The Council, in its conclusions from 9 June 2020, welcomed “[…] the Commission’s
    plans to ensure consistent rules for market operators and facilitate secure, robust and
    appropriate information-sharing on threats as well as incidents, including through a
    review of the Directive on security of network and information systems (NIS Directive),
    to pursue options for improved cyber resilience and more effective responses to cyber-
    attacks, particularly on essential economic and societal activities, whilst respecting
    Member States’ competences, including the responsibility for their national security.”7
    The NIS Directive provided the overall framework for cybersecurity cooperation at
    national and EU levels. It has also served as a catalyst in many Member States, paving
    the way for a significant change in mind-set, institutional and regulatory approach to
    cybersecurity. In particular, it sets the basis for:
    (i). improved cybersecurity capabilities at national level by requiring Member
    States to draw up national strategies and appoint authorities with responsibility
    for cybersecurity.
    1
    Directive (EU) 2016/1148 of the European Parliament and the Council of 6 July 2016 concerning
    measures for a high common level of security of network and information systems across the Union.
    2
    https://ec.europa.eu/info/publications/2020-commission-work-programme-key-documents_en
    3
    COM(2020) 605 final, 24 July 2020.
    4
    Special meeting of the European Council (17, 18, 19, 20 and 21 July 2020) – Conclusions:
    https://www.consilium.europa.eu/en/press/press-releases/2020/07/21/european-council-conclusions-17-
    21-july-2020/
    5
    https://ec.europa.eu/info/sites/info/files/communication-shaping-europes-digital-future-
    feb2020_en_4.pdf
    6
    https://www.europarl.europa.eu/doceo/document/TA-8-2019-0156_EN.html
    7
    https://data.consilium.europa.eu/doc/document/ST-8711-2020-INIT/en/pdf
    10
    (ii). increased EU-level cooperation through the creation of two new EU fora, both
    strategic and operational8
    , as well as exchange of information among Member
    States, mainly on a voluntary basis.
    (iii). requirements for Member States to define risk management (security
    requirements) and incident reporting obligations, notably for operators of
    essential services (hereinafter called ‘OESs’) in seven specific sectors, i.e.
    healthcare, transport, energy, banking, financial market infrastructure, drinking
    water supply and distribution and digital infrastructure, and digital service
    providers (hereinafter called ‘DSPs’), i.e. online marketplaces, online search
    engines and cloud computing services.
    Through the Cooperation Group9
    , the NIS Directive also brought Member States’
    authorities together and, despite some initial reluctance to engage at EU and cross-
    country level due to perceived national security sensitivities and lack of trust, it made
    everybody more aware of the need for unity and coordinated efforts as a pre-requisite for
    enhanced resilience against cybersecurity risks. The Cooperation Group therefore set up
    a solid basis for EU level cooperation on cybersecurity policy aspects, developing into an
    extensive setting where specific work streams focusing on a wide range of NIS-related
    aspects are constantly being consolidated and expanded. To illustrate this, the NIS
    Directive provided a structure and the Cooperation Group provided the forum for the
    work on 5G network security.10
    The network of national Computer Security Incident
    Response Teams (hereinafter called ‘CSIRTs’) facilitated some more operational
    exchanges among Member States. It is also within the NIS Directive’s cooperation
    framework that the Commission, with support from Member States, issued a blueprint for
    rapid emergency response in case of large-scale cross-border cyber incidents or crisis.11
    Based on this, Cyber Europe incident and crisis management exercises were developed
    and a Cyber Crises Liaison Organisation Network (“CyCLONe”) is being set up.
    The entities subject to the NIS Directive’s requirements are as follows:
     operators of essential services (OESs) in the seven sectors mentioned above, as
    identified by the Member States. The companies active in these sectors must go
    through an identification process at Member State level, to establish whether they
    qualify as OESs within the NIS scope. The Member States also define the
    security requirements that OESs have to put in place and establish the concrete
    thresholds and procedures for incident reporting.
     digital service providers (DSPs) of the types mentioned above. These are not
    subject to an identification process, the maximum harmonisation principle applies
    to their obligations and they are subjected to a so called light-touch approach
    based on reactive ex post supervisory activity justified by the nature of their
    services and operations.12
    DSPs do not have to gather evidence on the
    implementation of security policies and the competent authorities should have no
    general obligation to supervise DSPs.
    8
    via a Cooperation Group and a network of Computer Security Incident Response Teams – CSIRTs.
    9
    The NIS Cooperation Group has been established by Article 11 of the NIS Directive to ensure strategic
    cooperation and the exchange of information among EU Member States in cybersecurity
    10
    Notably for the implementation of the Commission Recommendation and the EU toolbox of risk
    mitigating measures. Cooperation Group publication of January 2020: https://ec.europa.eu/digital-
    single-market/en/news/cybersecurity-5g-networks-eu-toolbox-risk-mitigating-measures .
    11
    Commission Recommendation (EU) 2017/1584 of 13 September 2017 on coordinated response to
    large-scale cybersecurity incidents and crises, C(2017) 6100 final.
    12
    As stipulated by recital (60) of the NIS Directive.
    11
    As regards the supervision and enforcement framework, the NIS Directive contains
    general provisions, which neither specify minimum requirements for supervisory
    measures that can be applied by the competent authorities, nor set a minimum level of
    penalties for non-compliance with the obligations stipulated by the Directive.
    However, in spite of the above-mentioned achievements, the NIS Directive also proved
    its limitations, falling short of ensuring a fully engaging, coherent and pro-active setting
    that could guarantee an effective take of shared responsibilities and trust among all
    relevant authorities and businesses. As shown by the evaluation of its functioning (see
    Annex 5), the NIS Directive revealed inherent weaknesses and gaps that make it
    incapable of addressing contemporaneous and emerging cybersecurity challenges. These
    concern, among others, the lack of clarity on the NIS scope, the insufficient consideration
    of the increasing interconnectivity and interdependencies within EU economies and
    societies, the lack of alignment of security requirements and reporting obligations, the
    lack of effective incentives for information sharing or operational cooperation among
    relevant authorities and the difference in treatment of comparable businesses across
    Member States and sectors. For example, as a result of some of these gaps, there are
    situations where major hospitals in a Member State do not fall within the scope of the
    NIS Directive and hence are not required to have in place the resulting security measures,
    while another Member State with a similar population size included under the NIS scope
    almost every single hospital in the country. Similarly, while a major European railway
    operator is included under the NIS scope in one big Member State, another major railway
    operator in another big Member State is not covered by the NIS security requirements.13
    In addition, the speedy digital transformation of society has expanded the threat
    landscape and is bringing about new challenges, which require adapted and innovative
    responses. More advanced policy responses in the field of cybersecurity have become a
    matter of urgency, as the number of cyber-attacks continues to rise, with increasingly
    sophisticated attacks coming from a wide range of sources inside and outside the EU.
    State or state-backed actors are frequently involved. There were almost 450 cybersecurity
    incidents in 2019 involving critical infrastructures in Europe like health, finance and
    energy.14
    One cyberattack alone can cause substantial damages across organisations,
    sectors, and citizens. For example, the economic impact of the 2017 WannaCry incident
    is estimated in the order of hundreds of million euros or even more. In its latest Global
    Risks Report, the World Economic Forum mentions cyberattacks as one of the top 10
    risks by likelihood and by impact over the next 10 years.15
    The COVID-19 crisis and the resulting sudden increase in demand for internet-based
    solutions has emphasised an even stronger need for a state of the art cybersecurity. The
    pressures of the COVID-19 outbreak have led to cyber-attacks exploiting the situation in
    different ways, from taking advantage of the intense pressure on hospitals16
    , to abusing
    the mass move to home digital working. Ransomware and distributed denial of service
    (DDoS) attacks remain a permanent threat, targeting key digital services like major cloud
    13
    This information is based on the Member States’ notifications of the number of OES identified, in line
    with Article 5(7)(c).
    14
    https://ec.europa.eu/eurostat/documents/2995521/10335060/9-13012020-BP-EN.pdf/f1060f2b-b141-
    b250-7f51-85c9704a5a5f.
    15
    World Economic Forum (2020): The Global Risks Report 2020 (https://www.weforum.org/reports/the-
    global-risks-report-2020)
    16
    For example, a cyber-attack on Brno University Hospital Brno (Czechia) defined by Europol as an
    attack on critical health infrastructure (Europol, Pandemic profiteering: How criminals exploit the
    COVID-19 crisis. March 2020).
    12
    providers.17
    The move to connected devices will bring great benefits for users: but with
    less data stored or processed in data centres, and more processed closer to the user ‘at the
    edge’, cybersecurity will no longer be able to focus on protecting central points.18
    Overall, since the implementation of the NIS Directive, European countries have become
    increasingly dependent on digital and information systems, while their networks have
    become ever-more interconnected. As highlighted by the EU Security Union strategy19
    ,
    security threats are feeding more and more on the ability to work cross-border and on
    inter-connectivity, exploiting the blurring boundaries between the physical and digital
    world. To this end, while reviewing the NIS Directive, the Commission is also preparing
    a proposal, due by the end of 2020, for additional measures to enhance the protection and
    resilience of critical infrastructure, to replace the Directive on the identification and
    designation of European critical infrastructures20
    (hereinafter called ‘the ECI
    Directive’) with an overarching cross-sectoral framework focused on non-cyber
    threats. The current ECI Directive covers infrastructures the disruption of which would
    have an impact on at least two Member States in two sectors: energy and transport. It is
    envisaged to ensure greater coherence between the EU critical infrastructure protection
    and the NIS Directive, especially when it comes to the sectoral scope of both initiatives.
    The initiative considers introducing measures to enhance the resilience of critical
    infrastructures in the face of non-cyber risks.
    Sector-specific initiatives are also addressing cybersecurity aspects, in synchronisation
    with the NIS framework. For example, the Network Code for the cybersecurity of cross-
    border energy flows, the rules for cybersecurity in the aviation security domain21
    and the
    Commission proposal for a Digital Operational Resilience Act for financial services22
    (DORA) provide sector-specific cybersecurity provisions. Finally, there is a number of
    related laws at EU level aiming to achieve complementary objectives, most notably the
    General Data Protection Regulation (GDPR), which contains provisions on the security
    of personal data for data controllers and processors, but also the e-Privacy Directive.23
    See also Annex 7 on related policy and legislative initiatives, including the Regulation on
    electronic identification and trust services for electronic transactions in the internal
    market (hereinafter called the ‘eIDAS Regulation’)24
    and the GDPR.25
    In the run-up to this impact assessment, the Commission has been extensively consulting
    with all relevant stakeholders and in particular with the Member States. Thanks to the
    17
    Major providers had to mitigate massive DDoS attacks: e.g. the attack against Amazon Web services in
    February 2020, with a peak traffic volume of 2.3 terabytes per second.
    18
    COM(2020) 66 final.
    19
    COM(2020) 605 final, 24 July 2020.
    20
    Council Directive 2008/114/EC of 8 December 2008 on the identification and designation of European
    critical infrastructures and the assessment of the need to improve their protection.
    21
    Commission Implementing Regulation (EU) 2019/1583.
    22
    Proposal for a Regulation of the European Parliament and of the Council on digital operational
    resilience for the financial sector and amending Regulations (EC) No 1060/2009, (EU) No 648/2012,
    (EU) No 600/2014 and (EU) No 909/2014, COM(2020) 595 final.
    23
    For a discussion on the overlaps and differences between the NIS Directive and the GDPR, see ENISA
    (2019): Stock taking of security requirements set by different legal frameworks on OES and DSPs
    (https://www.enisa.europa.eu/publications/stock-taking-of-security-requirements-set-by-different-legal-
    frameworks-on-oes-and-dsps)
    24
    Regulation (EU) No 910/2014 of the European Parliament and of the Council of 23 July 2014 on
    electronic identification and trust services for electronic transactions in the internal market and
    repealing Directive 1999/93/EC.
    25
    Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the
    protection of natural persons with regard to the processing of personal data and on the free movement
    of such data, and repealing Directive 95/46/EC.
    13
    Cooperation Group, the Commission has been in constant touch with the competent
    authorities in charge of implementing the NIS Directive. The Cooperation Group has
    extensively covered various cross-cutting and sectoral implementation aspects. In
    addition, during its NIS country visits in 2019 and 2020, the Commission has
    interviewed 154 public and private entities, as well as 117 competent authorities.
    Member States and other stakeholders were also invited to participate in the Open Public
    Consultation and in the surveys and workshops organised by the NIS review study26
    on
    behalf of the Commission. Both the Open Public Consultation and the surveys explicitly
    also covered those entities that are currently not under the scope of the NIS Directive.
    The Commission has also published an inception impact assessment, to which
    stakeholders could submit feedback. See also Annex 2 on stakeholder consultation.
    Being an initiative within the Regulatory Fitness Programme (REFIT), the impact
    assessment will not only look at ways to improve the cyber resilience of the Union but it
    will also examine to what extent the regulatory burden for competent authorities and
    compliance costs for public and private entities can be reduced.
    1.2. Results of the evaluation of the NIS Directive
    An evaluation on the functioning of the NIS Directive (see Annex 5) was conducted as
    part of the review process required by Article 23(2) of the NIS Directive. The
    conclusions of the evaluation can be summarised into six main categories of findings (see
    Figure 1). These findings are further elaborated on in the problem definition described
    below, linked to the problem drivers (see section 2). They are regarded as underlying
    causes for the identified problems.
    Figure 1: Overview of the outcome of the evaluation
    Evaluation finding 1: Increased interconnectedness and interdependencies in
    sectors not covered
    The evaluation suggests that the current scope of the NIS Directive is too limited in terms
    of the sectors covered. This is mainly due to: (i) increased digitisation in recent years and
    a higher degree of interconnectedness, (ii) the scope of the NIS Directive no longer
    reflecting all digitised sectors providing key services to the economy and society as a
    whole.27
    Critical infrastructure (such as airports or hospitals) and other economic
    operators are becoming increasingly interconnected and reliant on network and
    information systems. Attacks on such infrastructure can therefore trigger chain reactions
    26
    Study to support the review of Directive (EU) 2016/1148 concerning measures for a high common level
    of security of network and information systems across the Union (NIS Directive) – N° 2020-665.
    Wavestone, CEPS and ICF. The study kicked off in April 2020 and should be finalized by January
    2021. The final report of the study was not yet submitted at the time of the writing of this report.
    27
    Even though the NIS Directive does allow Member States to respond to such developments by bringing
    additional types of entities under the scope of the national laws transposing the Directive, only 11 out of
    27 Member States made use of this possibility. This concerned a very limited number of very specific
    services (such as data centres, insurance companies or heat producers).
    14
    and send ripples throughout the economy.28
    The availability, integrity and confidentiality
    of a specific essential service cannot be effectively protected through regulatory
    requirements imposed on the provider of that service alone since the functioning of that
    service is affected by the level of protection of other sectors or services.29
    Evaluation finding 2: Scope not clearly determined by the NIS Directive and
    unclear national competence over digital service providers
    Public and private entities that belong to the seven sectors under the NIS scope, as
    described in section 1.1., are not automatically required to put in place security measures
    and report incidents. Member States must first identify them as operators of essential
    services (so-called OES identification process). The evaluation has shown that national
    authorities have developed a wide variety of identification practices leading to
    inconsistencies in the de-facto scope of the NIS Directive in the Member States. While
    this reflects the different approaches of Member States in determining the criticality of
    economic operators, it has led to a situation in which certain types of entities have not
    been identified in all Member States and are therefore not required to put in place
    security measures and report incidents.30
    The evaluation also identified that Member
    States are not fully aware of their potential competence for specific DSPs.
    Evaluation finding 3: Divergent security and reporting requirements
    The NIS Directive allowed wide discretion to the Member States when laying down
    security and incident reporting requirements for OESs. The evaluation shows that in
    some instances Member States have implemented these requirements in significantly
    different ways. For example, Member States have modelled their national security
    requirements along different international standards or have chosen different degrees of
    prescriptiveness.31
    Incident reporting requirements also diverge considerably when it
    comes to which incidents need to be reported and when and how reports are to be made.
    Evaluation finding 4: Ineffective supervision and enforcement
    For the purpose of supervision, competent authorities can request documentation from
    OESs, gather evidence of effective implementation of security policies and issue binding
    instructions to remedy deficiencies (so-called ex-ante supervision of OESs). During the
    country visits conducted in 2019-2020, the Commission observed that many Member
    States only make limited use of these options. In even fewer cases, they are
    systematically checking whether companies are complying with the NIS rules. The
    evaluation has also shown that the ex-post supervision approach32
    was not effective as far
    as the DSPs are concerned. This is notably due to: (i) the lack of a conclusive overview
    by the competent authorities of these services across the Member States, (ii) the lack of
    clarity of the jurisdiction rules and (iii) an insufficiently harmonised supervision and
    ineffective enforcement system. Finally, the evaluation has revealed that penalties are
    28
    David Alexander (2008): A magnitude scale for cascading disasters. International Journal of Disaster
    Risk Reduction, Volume 30, Part B, September 2018, Pages 180-185.
    29
    Tyson Macaulay (2019), The Danger of Critical Infrastructure Interdependency,
    https://www.cigionline.org/articles/danger-critical-infrastructure-interdependency
    30
    For example, five Member States have not identified any or only one OES in the health sector. At least
    eight Member States have not identified any OESs in the road transport subsector. At least four
    Member States have not identified any OESs in the railway subsector.
    31
    These approaches range from very general provisions to very specific measures, such as specifying the
    minimum length of passwords.
    32
    The ex-post supervision approach allows competent authorities to take supervisory measures only when
    provided with evidence that a DSP does not meet the security or notification requirements.
    15
    almost never applied and that there are considerable discrepancies when setting penalties
    across Member States, with the maximum level of penalties varying greatly.
    Evaluation finding 5: Uneven resources for competent authorities
    The NIS Directive requires Member States to designate one or more competent
    authorities to supervise the implementation of the provisions thereof. In addition,
    Member States are required to designate a single point of contact (SPOC) for cross-
    border cooperation and one or more computer security incident response teams (CSIRTs)
    for incident handling. Despite the fact that the NIS Directive lays down detailed tasks for
    each of these authorities, the financial and human resources set aside by Member States
    for fulfilling these tasks, and consequently the different levels of maturity in dealing with
    cybersecurity risks, vary greatly. This makes it challenging for certain competent
    authorities to effectively meet their obligations stemming from the NIS Directive.
    Evaluation finding 6: Limited information sharing between Member States
    Even though the current structures allowed for a substantial improvement in building
    mutual trust, Member States do not share information systematically with one another. In
    addition, there are deficiencies when it comes to the sharing of information between
    authorities within Member States. At EU level, the NIS Directive has created two new
    fora for information exchange between the Member States: the Cooperation Group to
    support and facilitate strategic exchanges and policy coordination, and the CSIRTs
    network, which promotes technical cooperation between national CSIRTs. Nonetheless,
    the exchange of information throughout the cybersecurity lifecycle remains limited and
    mostly unstructured. This is also the case for information sharing among private entities,
    and for the engagement between the EU level cooperation structures and private entities.
    2. PROBLEM DEFINITION
    2.1. What are the problems?
    Figure 2: Outcome of the evaluation, problem drivers, problems and consequences
    16
    2.1.1. Low level of cyber resilience of businesses operating in the European Union
    Cybercrime and cybersecurity can hardly be separated in an interconnected environment.
    Deterring cybercrime is an integral component of cybersecurity policies. Cybercrime
    comes at a high cost for societies and economies. A study of the Commission’s Joint
    Research Centre (JRC)33
    stressed that cybercrime is estimated to cost the world EUR 5.5
    trillion by the end of 2020, up from EUR 2.7 trillion in 2015, due in part to the
    exploitation of the COVID-19 pandemic by cyber criminals. According to the report:
    ‘this figure represents the largest transfer of economic wealth in history, more
    profitable than the global trade in all major illegal drugs combined, putting at risk
    incentives for innovation and investment.’ The same study mentions that ‘the number of
    citizens impacted simultaneously by a single cyber incident can be huge as a
    consequence of the pervasiveness of connected devices: 3 billion accounts in the attack
    on Yahoo in 2013, 77 million users in the attack on Sony PS3 in 2011, 1.3 million and
    250 000 impacted citizens, respectively, in the attacks on Estonia and Ukraine in 2017,
    and 7 major security incidents in December 2019 alone. […] In April 2007, Estonia […]
    suffered a series of coordinated cyber attacks that targeted governmental institutions and
    bodies, financial entities, telecommunication infrastructure and newspapers. […]’34
    The
    2020 Digital Economy and Society Index (DESI)35
    shows that in 2020, 39 % of EU
    citizens who used the internet experienced security-related problems. In 2019, security
    concerns limited or prevented 50 % of EU internet users from performing online
    activities.
    The JRC report stresses that the number of cyber-attacks has grown constantly over the
    years, with a corresponding growth in the resulting financial damage. The number of
    cyber-attacks continues to rise, with increasingly sophisticated attacks coming from a
    wide range of sources inside and outside the EU. Microsoft’s Digital Defence Report36
    confirmed that ‘threat actors rapidly increased in sophistication in the past year, using
    techniques that make them harder to spot that threaten even the savviest targets.’[…].37
    In 2019, one in eight businesses were affected by cyberattacks38
    .
    One cyber-attack alone can cause substantial damages across organisations, sectors, as
    well as citizens. The economic impact of the 2017 WannaCry incident is estimated in the
    order of hundreds of million euros with some cyber risk modelling analysts placing the
    losses in the order of billions. Apart from the economic costs, cyber-attacks can seriously
    affect and potentially lose lives. For example, in September 2020, a ransomware attack
    targeted a hospital in Düsseldorf; a death occurred after a patient who needed urgent care
    was diverted to a nearby hospital. 39
    33
    Cybersecurity – Our Digital Anchor, a European perspective, published in July 2020, page 7.
    34
    Idem, page 9.
    35
    https://ec.europa.eu/digital-single-market/en/news/digital-economy-and-society-index-desi-2020
    36
    https://blogs.microsoft.com/on-the-issues/2020/09/29/microsoft-digital-defense-report-cyber-threats/,
    published in September 2020.
    37
    The report also finds that ‘criminal groups targeting businesses have moved their infrastructure to the
    cloud to hide among legitimate services […].’ IoT threats were found in continuous expansion, pointing
    to an approximate increase of 35 % in total attack volume in the first half of 2020 as compared to the
    second half of 2019.
    38
    According to Eurostat, 1 in 8 enterprises affected by ICT related security incidents (Press release ‘ICT
    security measures taken by vast majority of enterprises in the EU’, 6/2020 - 13 January 2020); as
    framed by the World Economic Forum ‘Cyberattacks on critical infrastructure have become the new
    normal across sectors such as energy, healthcare, and transportation WEF, The Global Risks Report
    2020.
    39
    The case is currently being investigated by German authorities: https://www.zdnet.com/google-
    amp/article/first-death-reported-following-a-ransomware-attack-on-a-german-hospital/
    17
    Cyber incidents do not only represent costs for those organisations directly affected by
    them (such as the entity where a breach has occurred or that has been the direct target of
    an attack) but they can also have an impact on the wider economy and society as a whole,
    including across borders40
    . For example, incidents can also cause costs to companies that
    have a link with the direct victim of an incident (for example, because the companies
    collaborate closely or because one company supplies goods or services to the other
    company41
    ). Moreover, incidents can also have an impact on other parts of society (such
    as consumers or health care patients) and erode the trust in those entities that provide
    essential services.
    A study looking at the cyber readiness of companies shows that most companies still
    have a long way to go. Even though there has been a marked increase in the proportion of
    businesses considered to be well prepared, 64 % are still considered to be novice in the
    field of cybersecurity.42
    Even for those (sub)sectors already covered by the NIS
    Directive, the results of the Open Public Consultation (OPC)43
    have shown that on
    average the level of cybersecurity resilience is assessed by respondents only as
    medium.44
    Regarding DSPs, respondents to the OPC consider them to exhibit a medium
    to high level of cyber resilience, with cloud services being regarded as the most
    resilient.45
    Small and medium sized enterprises (SMEs) in particular exhibit a relatively
    low level of cyber resilience.46
    At the same time, an overwhelming majority of 97 % of
    the OPC respondents indicated that the cyber threat level has increased since 2016.47
    At the level of individual businesses, the 2020 Annual Cost of a Data Breach Report of
    the Ponemon Institute estimated the average cost of a data breach to be EUR 3.5 million
    in 2018, an increase of 6.4 % over the previous year48
    .
    40
    Certain sectors exhibit a stronger cross-border dimension than other sectors. Especially energy,
    transport, banking, financial markets, digital infrastructures and digital services exhibit a particularly
    strong cross-border dimension.
    41
    For example, supply chain company Resilience360 has recorded a total of 290 cyber security incidents
    in 2019 that had an impact on entities along the supply chain. See Resilience360 (2020): Annual Risk
    Report 2020 (https://www.resilience360.dhl.com/resilienceinsights/resilience360-2020-annual-risk-
    report).
    42
    Hiscox Cyber Readiness Report 2020: https://www.hiscox.co.uk/sites/uk/files/documents/2020-
    06/Hiscox_Cyber_Readiness_Report_2020_UK.PDF. The study looks at companies in the United
    States, the United Kingdom and six EU Member States. In its cyber readiness model, the study
    classifies companies into one of three categories of cybersecurity preparedness: novice, intermediate,
    expert.
    43
    Open Public Consultation on the revision of the NIS Directive. The survey was open from 7 July until 2
    October 2020. All stakeholders were asked the same questions. However, some questions were more
    geared to certain stakeholder groups. As a result, stakeholders sometimes chose not to respond to
    certain questions. The OPC results in sections 2.1.1 and 2.1.2 only reflect the percentages of those
    stakeholders that did respond to a specific question.
    44
    Respondents indicated that banking and financial market infrastructures exhibit a high level of
    cybersecurity resilience. They found the level of preparedness of the transport, health and drinking
    water sectors to be the lowest (but still within “medium”).
    45
    The respondents to the OPC rate the level of preparedness of European SMEs with an average of 2.17
    out of 5. Respondents from DSPs gave significantly higher ratings than other respondents regarding the
    preparedness of digital services.
    46
    The highest ratings were given by trade associations and DSPs (2.3 each).
    47
    Across all stakeholder groups there is a strong consensus that the cyber threat level has increased since
    2016, including amongst stakeholders representing entities so far not covered by the scope. OESs and
    DSPs as well as cybersecurity professionals more frequently indicated that the cyber threat level has
    increased significantly.
    48
    Annual Cost of a Data Breach Report, 2020, conducted by the Ponemon Institute, and based on
    quantitative analysis of 524 recent breaches across 17 geographies and 17 industries:
    18
    Member States have made significant progress when it comes to the cyber resilience of
    companies, notably by identifying thousands of entities across the Union and by
    requiring them to take cybersecurity measures and report incidents. Nonetheless, the
    level of cyber resilience in the Union remains relatively low. For example, when it comes
    to the level of cyber resilience in Europe in the global context, a study comparing the
    cyber resilience of companies across five world regions puts European companies behind
    Asia and America in all six areas that the study had focussed on.49
    In a recent
    comparative analysis of the cybersecurity programmes of companies in 18 major
    economies, EU companies scored significantly lower than their counterparts in the
    United States, South Korea and Japan.50
    Overall, this suggests that European businesses
    are not sufficiently prepared for cyber-related risks as compared to a global context.
    At the same time, the cybersecurity landscape has changed considerably since the NIS
    Directive has come into force. The continuous digitisation is leading to an ever increasing
    attack surface. For example, more and more manufacturers are connecting industrial
    control systems (ICS) to the internet, with a year-on-year increase of connected ICS of
    27 % between 2017 and 2018.51
    New technological trends also have an impact on the
    criticality of certain service providers so far not covered by the NIS Directive. For
    instance, content delivery networks (CDNs) have become a major part of the
    infrastructure of the modern internet. Since the NIS Directive has come into force in
    2016, CDN-based internet traffic has overtaken non-CDN-based traffic and is projected
    to make up 72 % of total internet traffic by 2022.52
    The COVID-19 crisis and its impact
    on digitisation is expected to reinforce these trends even more. On the cybercrime side,
    attacks are increasingly becoming a commodity and can now often be achieved at very
    low costs. See Figure 3 from the JRC report with a screenshot taken from the dark web
    where various cyberattack ‘offers’ are advertised at very low prices.
    https://www.capita.com/sites/g/files/nginej146/files/2020-08/Ponemon-Global-Cost-of-Data-Breach-
    Study-2020.pdf
    49
    PwC (2018): The Global State of Information Security 2018.
    50
    ESI Thoughtlab (2018): The Cybersecurity Imperative
    (https://www.protiviti.com/sites/default/files/united_states/insights/cybersecurity_imperative_2018.pdf)
    51
    Positive Technologies (2018): ICS vulnerabilities: 2018 in review (https://www.ptsecurity.com/ww-
    en/analytics/ics-vulnerabilities-2019/)https://www.ptsecurity.com/ww-en/analytics/ics-vulnerabilities-
    2019/)
    52
    Cisco (2019): Cisco Visual Networking Index: Forecast and Trends, 2017–2022
    19
    Figure 3: Price list of a service offering DDoS attacks53
    2.1.2. Inconsistent resilience across Member States and sectors
    The evaluation has shown that the NIS Directive has been a trigger for a significant EU-
    wide cybersecurity risk assessment undertaken by the Member States in those sectors
    covered by the Directive. As a result, competent authorities have identified thousands of
    public and private entities54
    as OESs, requiring them to take cybersecurity measures and
    report incidents. However, the evaluation has also revealed certain discrepancies in how
    Member States have transposed and implemented the rules of the NIS Directive. Entities
    can be subject to different regulatory treatment, depending on the jurisdiction that
    applies. This is especially true when it comes to the identification of OESs (i.e. whether
    entities are inside or outside the de-facto scope of the NIS Directive). For example, as
    shown in Figure 4, certain Member States (e.g. Italy) have identified much more OESs
    than other Member States (e.g. Spain, France).
    Figure 4: Number of identified OESs in the five biggest Member States (per 100,000
    inhabitants)
    First and foremost, these discrepancies result in an uneven level of cyber resilience
    across the Union including among sectors, with entities sometimes not achieving the
    level of cyber resilience that the NIS Directive set out to achieve. Secondly, in the event
    of an incident, companies with a lower level of resilience can negatively impact even
    those companies that already exhibit a high level of resilience, as cyber threats and the
    costs of incidents can spread across supply chains and throughout the economy.55
    A
    recent Commission report (hereinafter called ‘the OES Report’) also highlights that due
    to the many interdependencies between companies in the internal market, discrepancies
    in OES identification can have serious consequences, including uneven degrees of cyber
    resilience that can lead to threats propagating more easily across borders.56
    It is the very
    nature of cybersecurity in the value chain that investments undertaken by one company
    53
    JRC (2020): Cybersecurity – Our Digital Anchor, a European perspective:
    https://ec.europa.eu/jrc/en/publication/eur-scientific-and-technical-research-reports/cybersecurity-our-
    digital-anchor
    54
    Overall, Member States have reported 15,676 identified OESs to the Commission, 10,897 of which
    were identified by Finland.
    55
    Tyson Macaulay has published a Dependency Matrix for 10 Critical Infrastructure Sectors, which
    highlights the importance of a consistently high level of cyber resilience across the economy. See
    Tyson Macaulay (2019): The Danger of Critical Infrastructure Interdependency,
    https://www.cigionline.org/articles/danger-critical-infrastructure-interdependency.
    56
    Report from the Commission to the European Parliament and the Council assessing the consistency of
    the approaches taken by Member States in the identification of operators of essential services in
    accordance with Article 23(1) of Directive 2016/1148/EU on security of network and information
    systems. COM(2019) 546 final.
    0,0
    0,2
    0,4
    0,6
    0,8
    1,0
    DE
    ES
    FR
    IT
    PL
    20
    can have a positive impact on the cybersecurity of other companies (externalities).57
    In
    the OPC, 97 % of respondents agreed that “cyber risks can propagate across borders at
    high speed, which is why cybersecurity rules should be aligned at Union level”.58
    An
    inconsistent resilience across Member States can therefore contribute to the negative
    consequences for the economy and society that section 2.1.1 describes in detail.
    In the OPC, 80 % of stakeholders disagreed with the statement that “there is a sufficient
    degree of alignment of security requirements for OES and DSPs in all Member States”.59
    Similarly, when asked about notification requirements, 60 % of stakeholders disagreed
    with the statement that the “current approach ensures that OES across the Union face
    sufficiently similar incident notification requirements”.60
    There are also notable differences in the level of cyber resilience across different NIS
    sectors: In the OPC, respondents were asked to evaluate the level of cyber resilience of
    the different sectors and digital services covered by the NIS Directive on a scale from
    “very low” to “very high”. Sectors such as banking, financial market infrastructure and
    digital infrastructure are considered as much more resilient than the other sectors with
    health, transport and drinking water supply scoring particularly low. These results are
    very much in line with the conclusions drawn by the Commission after the NIS review
    country visits.61
    According to a recent report of the Ponemon Institute on the cost of data
    breaches62
    , the healthcare sector, for the tenth year in a row, continued to incur the
    highest average breach costs at global level, at about EUR 6.13 million: a 10 % increase
    as compared to the previous year estimates. Similarly, the energy sector saw a 13 %
    increase from 2019, to an average of EUR 5.50 million. Overall, 13 of 17 industries
    experienced an average total cost decline year over year.
    Discrepancies in the way entities are treated by the Member States not only have
    consequences on the level of cyber resilience, but can also have a meaningful impact on
    the internal market: Divergent requirements create an uneven level playing field for
    companies that are active across the internal market, putting providers of essential
    services in certain Member States at a disadvantage compared with similar providers in
    other Member States. 69 % of OPC respondents disagree with the statement that the
    “identification process has contributed to the creation of a level playing field for
    companies from the same sector across the Member States”.63
    Respondents to the
    Commission’s inception impact assessment are also very critical of the OES
    57
    IPACSO: A Coordination Action under the FP7 DG CNECT Trustworthy ICT Program, deliverable
    D4.1
    58
    Most respondents not only agreed but even strongly agreed with this statement. Respondents
    throughout all stakeholder groups tended to agree with the statement, including respondents
    representing entities from sectors so far not covered. The smallest percentage of respondents agreeing
    with the statement was found amongst competent authorities, of which “only” 83 % agreed with the
    statement.
    59
    Respondents throughout all stakeholder groups (including respondents representing entities from
    sectors so far not covered) tended to disagree with the statement with the exception of competent
    authorities of which only 50 % disagreed.
    60
    Only 50 % of competent authorities disagreed with the statement. However, 57 % of the OESs and
    78 % of trade associations disagreed, including a majority of respondents representing entities from
    sectors so far not covered.
    61
    Conducted by the Commission as part of the NIS review process in 2019-2020.
    62
    Annual Cost of a Data Breach Report, 2020, conducted by the Ponemon Institute, and based on
    quantitative analysis of 524 recent breaches across 17 geographies and 17 industries:
    https://www.capita.com/sites/g/files/nginej146/files/2020-08/Ponemon-Global-Cost-of-Data-Breach-
    Study-2020.pdf
    63
    However, only 57 % of competent authorities disagreed with this statement and 53 % of cybersecurity
    professionals actually agreed with it. 60 % of OESs and 90 % of trade associations disagreed.
    21
    identification process, citing the lack of alignment as a major problem. Respondents have
    commented that the current approach can have negative consequences for competition, as
    similar companies might be subject to different requirements depending on the Member
    State where they operate.
    Moreover, having to cope with a multitude of requirements can increase the regulatory
    burden and costs for companies active in several Member States. 94 % of OPC
    respondents agree with the statement that from an internal market perspective the general
    “approach [of the Directive] increases costs for OES operating in more than one
    Member State”.64
    When it comes to security requirements, 93 % of the OPC respondents
    agree with the statement that the “different level of prescriptiveness of requirements
    increases the regulatory burden for companies operating across different national
    markets”.65
    Regarding incident reporting requirements, 87 % of respondents feel that the
    “different reporting thresholds and deadlines across the EU create unnecessary
    compliance burden for OES”.66
    The many different reporting requirements a company is
    facing across the internal market do not only increase its costs but can also consume
    valuable resources that could be used for the handling of an incident. Along similar
    lines, the respondents to the Commission’s inception impact assessment are largely in
    favour of more harmonized security and incident notification requirements.
    When it comes to national enforcement, 75 % of respondents that provided an answer
    disagreed with the statement that “there is a sufficient degree of alignment of penalty
    levels between the Member States”.67
    Finally, 86 % of respondents support the statement
    that the approach of the Directive “leads to significant differences in the application of
    the directive and has a strong negative impact on the level playing field for companies in
    the internal market”.68
    2.1.3. Low level of joint situational awareness and lack of joint crisis response
    The cooperation between Member States in the field of cybersecurity does not lead to
    joint situational awareness from a strategic and operational point of view. Strategically,
    national authorities do not gather or share information to assess the state of cybersecurity
    in the EU nor structured feedback from businesses. Operationally, there is no regular
    information sharing on the impact of cybersecurity incidents and threats at national or EU
    level.
    The sharing of information about incidents within the Cooperation Group is voluntary
    and on ad-hoc basis69
    . As a result of the small number of incidents reported on national
    level (section 2.2.1), the incidents submitted annually by Member States to the
    Cooperation Group70
    only represent a small subset of the incidents taking place within
    64
    The statement is supported by almost all stakeholder categories, including respondents representing
    entities from sectors so far not covered. However, 60 % of competent authorities disagreed.
    65
    The statement is supported by stakeholders throughout all categories.
    66
    However, only 63 % of competent authorities agreed with this statement.
    67
    Stakeholders throughout all categories disagreed with this statement. Cybersecurity professionals
    tended to disagree the least, with “only” 64 % disagreeing with the statement.
    68
    This statement was controversial despite the fact that it is supported by a large majority: Almost all
    stakeholder groups support the statement, with DSPs and trade associations supporting it the most
    strongly with 100 % and 92 % respectively. However, all competent authorities disagreed with it.
    69
    With the exception of the annual summary report to the Cooperation Group on the notifications
    received (Article 10(3) of the Directive).
    70
    See Article 10(3) of the NIS Directive.
    22
    the EU. Member States have rarely made use of the cross-border notification
    provisions71
    , which require them to inform other Member States affected by incidents.
    Despite the efforts of the Cooperation Group, the information exchange between Member
    States on cross-border dependencies remains limited, leading to conclude that Member
    States are not fully integrating potential cybersecurity-related cross-border spillovers into
    their risk assessments.
    As far as the CSIRTs network is concerned, information is shared also on an ad-hoc basis
    and does not contribute to the development of a systematic, comprehensive situational
    picture about incidents identified across the EU.72
    Under the current rules, neither the Commission nor the cooperation fora are able to:
     systematically analyse and detect differences and patterns in attack intensity between
    Member States and sectors, subsectors and types of entities,
     jointly determine in which (sub)sectors and types of entities competent authorities
    should channel resources,
     have a comparative view across Member States on the resilience and preparedness of
    public and private entities and the degree of institutional maturity.
    Finally, there is no mutual assistance in incident response (operational cooperation)73
    on
    European level beyond the sharing of information within the different cooperation fora
    established by the NIS Directive.74
    For example, Member States do not lend operational
    support to each other in the event of a major incident or crisis, including during the recent
    COVID-19 crisis, which gave rise to a number of new cybersecurity related challenges.75
    2.2. What are the problem drivers?
    2.2.1. Lack of cybersecurity measures taken by key companies
    Overall, only a limited number of sectors is covered by the NIS Directive and, within
    these sectors, there are inconsistencies in the OES identification. As a result, a significant
    number of companies providing essential services outside the scope of the NIS Directive
    but also some companies in the sectors listed by the NIS Directive are not required by
    law to put in place adequate cybersecurity measures and report incidents. This includes
    new economic activities which have only relatively recently taken on an essential role
    within the economy, such as social networks. The fact that several Member States chose
    to apply the NIS Directive to additional sectors further highlights that the current scope
    71
    Article 14(5) and 16(6) of the NIS Directive.
    72
    To improve the flow of information and enhance operational cooperation, the CSIRTs network is
    developing joint communication means, notably the MeliCERTes platform connecting national
    CSIRTs.
    73
    Mutual assistance is mentioned among the tasks of the CSIRTs network in Article 12(3)(e) but only for
    cross-border incidents and on a strictly voluntary basis. As a result, it does not take place in practice.
    74
    It is worth noting that with the publication of the Blueprint in 2017, the Commission launched a first
    non-binding initiative to coordinate the response to large scale cybersecurity incidents and crises. As a
    result, Member States have developed at operational level the Cyber Crisis Liaison Organisation
    Network (CyCLONe) Network which is not yet operational. CyCLONe was launched during the Blue
    OLEx 2020 exercise on 29 September 2020 and constitutes the operational layer of the Blueprint. It is a
    forum where Member State representatives meet to discuss aspects of operational cooperation in the
    event of a cybersecurity crisis.
    75
    Such as a marked increase in the use of virtual private networks and video conferencing tools.
    23
    of the Directive does not reflect all the entities considered as essential in a highly
    digitised and interconnected economy.76
    The scope of the NIS Directive covers certain types of entities in seven sectors (OESs)
    and, in addition, three types of DSPs. The Statistical Classification of Economic
    Activities in the European Community (NACE) groups economic activity into 21
    economic areas. Only six of these economic areas are covered by the Directive and
    within each of these areas only a subset of types of entities are included in the scope. The
    scope of the NIS Directive therefore only represents a fraction of the economic activities
    in the Member States.
    Investment in cybersecurity by entities not falling under the scope of the NIS Directive
    remains limited because entities do not have to bear the full costs of a potential incident,
    as some of the costs have to be borne by other parties, such as suppliers or customers.
    These negative externalities77
    create an incentive for businesses not to limit their
    exposure to risk (so-called moral hazard).78
    In addition, since in an interconnected
    economy the security of one institution highly depends on the security of other
    institutions (so-called interdependent security), companies have an incentive to free-ride
    by profiting from the security measures taken by other companies without sufficiently
    investing in cybersecurity themselves.79
    Recent survey data suggests that moral hazard
    does play a role in investment decisions, with companies citing regulatory compliance as
    the leading factor for cybersecurity spending and not cybersecurity-related factors, such
    as reducing incidents and breaches.80
    2.2.2. Inconsistent treatment of entities covered by the Directive across Member States
    Underlying driver 1: Discrepancies in OES identification and DSP coverage
    In the OES report, the Commission has shown that there is a certain degree of
    fragmentation across the Union as regards the identification of OESs. National
    authorities have developed a wide variety of identification practices when it comes to the
    overall approach to OES identification, but also regarding the definition of essential
    services.81
    For example, in the electricity subsector some Member States have identified
    “electricity supply” as an essential service while others have broken that service down
    into very granular categories, such as “distribution”, “transmission” or “production”.
    Moreover, there are inconsistencies between the thresholds used by competent authorities
    to identify OESs. For example, in the drinking water supply and distribution sector, some
    Member States identify waterworks as OESs when they serve more than 10,000
    consumers while other Member States have set an OES identification threshold of
    500,000 consumers. In addition, thresholds do not only vary quantitatively82
    but also
    76
    For example, 5 Member States have identified additional information infrastructures, such as data
    centres. Another 4 Member States have identified government services, such as electronic services for
    citizens. A more detailed list can be found in Annex 4.
    77
    Haislip and Kolev (2019): The economic cost of cybersecurity breaches: A broad-based analysis:
    https://pdfs.semanticscholar.org/6630/44a95466583951c77df23389d25c1fef5db0.pdf
    78
    Vagle (2020): Cybersecurity and Moral Hazard. Stanford Technology Law Review, Vol. 23:1, p. 71.
    79
    Tyler Moore (2010): The Economics of Cybersecurity: Principles and Policy Options, International
    Journal of Critical Infrastructure Protection, Volume 3, Issues 3-4, December 2010, Pages 103-117.
    80
    Barbara Filkins (2020) “Spends and Trends: SANS 2020 IT Cybersecurity Spending Survey”, SANS
    Institute: Information Security Reading Room, 450 respondents.
    81
    The Directive allows Member States to apply sector-specific thresholds in addition to cross-sectoral
    ones. This can give rise to a very complex mix of thresholds and has a negative impact on overall OES
    identification consistency.
    82
    For example, some Member States identify authoritative DNS servers responsible for handling more
    than 50.000 domain names as OESs while others have set the thresholds to 100.000 domain names.
    24
    qualitatively83
    . This diversity is partly due to the design of the NIS Directive (which
    provides Member States with a considerable level of discretion) and partly due to the
    different implementation methodologies used by the Member States. Because of the
    current identification landscape, the scope of the NIS Directive becomes fragmented,
    with some operators subject to additional regulation (because they have been identified
    by their respective Member State) while others providing similar services remaining
    excluded and not having to put in place cybersecurity measures (because they have not
    been identified).
    The identification of critical entities has traditionally been a central element of critical
    infrastructure protection. It has the clear benefit of taking into account regional or
    national specificities. And while identification can be considered a reasonable approach
    for ensuring resilience of critical infrastructure against non-cyber threats, the diversity
    produced by the identification process laid down in the NIS Directive seems
    inappropriate for raising the level of resilience of entities when it comes to cybersecurity,
    especially given their high degree of interconnectedness, the increased digitisation of the
    economy and the many interdependencies between operators and sectors.
    Competent authorities also reported major shortcomings in the design of the NIS
    Directive regarding the extent to which DSPs are covered by national rules. DSPs located
    in the EU fall under the jurisdiction of the Member State where they have their main
    establishment.84
    However, the NIS Directive does not provide enough guidance to
    determine the main establishment. The non-EU based DSPs which offer services within
    the EU are deemed under the jurisdiction of the Member State where they have
    designated a representative. However, the NIS Directive does not require DSPs to inform
    the competent authority of the very Member State in which they have designated their
    representative. Taking into account the specific nature of digital services85
    , the NIS
    Directive does not provide competent authorities with the necessary powers and means to
    determine which entities fulfil the requirements for being subject to their own jurisdiction
    and which fall under the jurisdiction of other Member States. As a result, competent
    authorities cannot exercise effectively their supervision tasks, with the consequence that
    DSPs are often de facto excluded from the application of the directive’s rules.
    Underlying driver 2: Inconsistent security measures and reporting requirements
    The NIS Directive grants Member States considerable discretion to define both the
    cybersecurity measures that OESs have to put in place and the procedures and thresholds
    for reporting incidents. As a result, entities are faced with a wide range of different
    approaches across the Union.
    The evaluation of the functioning of the NIS Directive identified several inconsistencies
    in how security requirements have been put in place. For example, while most Member
    States have modelled their national requirements in line with international standards,
    some have chosen different standards (such as the ISO 27000-series or NIST standards)
    or even more specific national provisions. Member States have also chosen different
    degrees of prescriptiveness for the requirements. While some Member States imitated the
    approach of the NIS Directive by putting forward very general provisions, others are
    requiring companies to take very specific measures, which can go as far as specifying the
    minimum length of passwords.
    83
    For example, some Member States take into account the “number of connected autonomous systems”
    when identifying internet exchange points, while others rely on “market share” as relevant indicator.
    84
    Article 18 of the NIS Directive.
    85
    DSPs provide cross-border services, often without any direct link to the physical infrastructure in the
    Member States.
    25
    Along similar lines, Member States are free to define thresholds on which incidents to
    report. Even though Member States are required to take into account several factors (the
    number of users affected by an incident, its duration and its geographical spread), they
    are at liberty to set their own quantitative thresholds. As a result, the number of incidents
    reported by OESs in each Member State differs significantly and does not reflect the
    scale of incidents affecting companies’ network and information systems: For example,
    during the 2019 annual summary reporting exercise, while one Member State reported to
    have received 266 incident reports, six Member States have received either no or only
    one single incident report. The remaining Member States received between 2 and 31
    reports. Overall, Member States have defined relatively high thresholds for incident
    reporting for OESs86
    , which has led to only few incidents being reported.
    Member States are also free to determine at what time and how an incident shall be
    reported.87
    Companies operating in several Member States are therefore confronted with
    a variety of different reporting requirements.
    Underlying driver 3: Ineffective supervision and enforcement
    While the NIS Directive requires Member States to ensure that competent authorities
    have the powers and means to assess operators’ compliance of essential services with
    their obligations, it does not define any supervisory standards that competent authorities
    should live up to. As a result, the supervisory measures taken by competent authorities
    deviate significantly and put in question their effectiveness. For example, in-depth checks
    of the security measures taken by OESs are limited.
    While the NIS Directive requires competent authorities to supervise OESs in an active
    manner, this is not the case for DSPs: Despite the fact that digital services covered by the
    Directive, such as cloud services, are just as essential for the economy as services
    provided by OESs88
    , DSPs are only to be supervised reactively ex-post (i.e. once the
    authority has been made aware of any shortcomings). This means that a large majority of
    DSPs in the internal market does not face any compliance checks at all. As a matter of
    fact, as most competent authorities are not even aware of the names of the DSPs falling
    under their jurisdiction, most DSPs are essentially never in touch with the authorities that
    are supposed to supervise them.
    As regards enforcement, the NIS Directive neither provides for principles and/or types of
    sanctions Member States should provide for in their national legislation, nor does it guide
    Member States on penalty levels that could ensure effectiveness, proportionality and
    dissuasiveness. The evaluation of the functioning of the NIS Directive has shown that, as
    a result, penalty levels vary considerably between Member States. For example, the level
    of maximum penalties ranges from around EUR 1,400 to EUR 5,000,00089
    , or in the case
    of Member States applying percentages of the global annual turnover of undertakings,
    from 0.5% to 5%. With a median maximum penalty of around EUR 100,000, maximum
    penalties are too low in most Member States and are therefore neither effective nor
    dissuasive, especially when it comes to large companies. In addition, competent
    86
    The same applies for DSP thresholds defined in the Commission Implementing Regulation (EU)
    2018/151.
    87
    This has resulted in a wide range of obligations, some Member States requiring a first incident report
    “as soon as possible” or 2 hours after the incident occurred, while others requiring it after 72 hours.
    88
    The provision of essential services heavily depends on cloud services. Cloud services are therefore
    increasingly regarded as a backbone for the provision of other essential services.
    89
    Some Member States are undergoing a legislative process to amend the cybersecurity framework,
    including in relation to the level of fines. For example, Germany included in a draft security law
    provisions on penalties up to 20.000.000 EUR or 4 % of the global annual turnover.
    26
    authorities have so far been reluctant to actually apply penalties.90
    Not a single case of a
    penalty having been applied to a public or private entity has been brought to the attention
    of the Commission at the time of writing of this report.
    Underlying driver 4: Discrepancies in Member State capabilities
    There are significant differences in capability amongst Member States when it comes to
    dealing with the challenges posed by cyber threats. In the National Cyber Security Index
    from 2018, which provides an overview of the cyber security capacity of 100 countries
    worldwide, EU Member States differ significantly, scoring between 31.17 and 83.12 (out
    of a maximum of 100 points).91
    Along similar lines, the Global Cybersecurity Index 2018
    of the UN specialised agency for ICT (International Telecommunication Union – ITU)
    ranks EU Member States from 0.479 to 0.918 (on a scale from 0 to 1).92
    It is worth
    noting that Member States were still in the process of fully transposing the NIS Directive
    at the time of writing of the two above-mentioned indexes. In fact, the Commission’s
    country visits in 2019 and 2020 have revealed major progress across the Union when it
    comes to national capabilities. Nonetheless, the country visits have also shown that
    competent authorities still exhibit different degrees of maturity when it comes to primary
    NIS-related tasks, such as OES identification, incident handling, supervision and cross-
    border cooperation. The Commission has also observed major differences in the degrees
    of achievement of a well-functioning cybersecurity ecosystem, including the ability to
    offer technical support to operators or set up sectoral or cross-sector cooperation fora.
    The amount of resources dedicated to cybersecurity policies at national levels and the
    degree of maturity in dealing with cybersecurity risks depend to a great extent on the
    level of economic development (different spending capacities), political prioritisation and
    advancement of cybersecurity measures prior to the NIS Directive. The impact of
    economic development is exacerbated by the fact that cybersecurity professionals
    compete on a European (if not global) market. During the NIS country visits, competent
    authorities from some Member States have lamented the fact that they do not have the
    financial capacities to compete with market salaries.
    2.2.3. Voluntary nature of cooperation, limited information sharing and lack of crisis
    management structures
    Underlying driver 1: Voluntary nature of cooperation
    The provisions on cooperation laid down by the NIS Directive are often very general in
    nature. As a result, Member States tend to interpret them as voluntary. For example, the
    NIS Directive requires Member States to consult one another before identifying OESs
    that provide services in more than one Member State.93
    To support Member States in
    carrying out cross-border consultations, the Cooperation Group issued a reference
    document in July 2018.94
    However, only very few Member States have used the cross-
    border consultation procedure to engage with one another. Only two Member States have
    done so in a systematic manner.95
    The main reasons for this lack of engagement are the
    90
    The Commission is aware of instances in which Article 21 of the NIS Directive would have allowed the
    Member States in question to apply penalties.
    91
    National Cyber Security Index 2018, e-Governance Academy: https://ega.ee/wp-
    content/uploads/2018/05/ncsi_digital_smaller.pdf
    92
    ITU Global Cybersecurity Index 2018: https://www.itu.int/dms_pub/itu-d/opb/str/D-STR-GCI.01-2018-
    PDF-E.pdf
    93
    Article 5(4) of the NIS Directive.
    94
    Identification of Operators of Essential Services – Reference document on modalities of the
    consultation process in cases with cross-border impact, Cooperation Group Publication 07/2018.
    95
    As shown by the OES report, COM(2019) 546 final.
    27
    fact that the NIS Directive does not specify how such consultations are supposed to be
    carried out or whether the authorities are required to mutually agree on a certain outcome
    of the consultation procedure. Also, no platform is provided to facilitate the exchange of
    confidential information between Member States (such as on cross-border dependencies).
    Moreover, in the event of an incident affecting another Member State, competent
    authorities are obliged to inform the other affected Member State if the incident
    significantly affects the continuity of essential services in that Member State. However,
    the NIS Directive does neither specify the modalities for information sharing nor does it
    set common objectives incentivising such exchange. As a result, this kind of information
    exchange rarely takes place.
    Finally, it is worth pointing out that the problems described in this section cannot be fully
    addressed by issuing additional guidance in the Cooperation Group alone, as Cooperation
    Group guidance is again voluntary and non-binding in nature, lacking the appropriate
    means to align national approaches to implementation.
    Underlying driver 2: Limited information feeding into the existing groups
    The Cooperation Group receives a summary report of incidents notified under the NIS
    Directive in each Member State, which represents a small subset of the overall incidents
    handled by an authority. The focus on incidents leaves out a wealth of information
    making it difficult to develop a shared understanding of the level of cybersecurity
    capabilities across the Union (e.g. uptake of cybersecurity solutions, human capital, level
    of skills in cybersecurity, maturity levels among sectors). Furthermore, the interaction
    with the private sector is limited and unstructured, making it difficult to reflect the needs
    of European stakeholders.
    Underlying driver 3: Lack of crisis management structures
    Cooperation under the NIS Directive is voluntary and does not cover the entire crisis
    management cycle (from preparedness to coordinated response). The mandates of the
    Cooperation Group and the CSIRTs network, two fora setup by the NIS Directive to
    facilitate information sharing, also do not include crisis management. The Blueprint
    recommendation96
    , adopted in 2017, was the first EU attempt to improve cooperation in
    times of crisis. However, while representing a valuable first building block, the
    recommendation remains non-binding and the task of building comprehensive EU crisis
    management framework remains incomplete.
    3. HOW WILL THE PROBLEM EVOLVE?
    Emerging technologies will continue to drive digitisation within the economy and society
    as a whole. Increased use of artificial intelligence (AI), advancements in quantum
    computing or the roll-out of 5G networks are just some of the examples of how
    companies providing essential services will become even more reliant on technology and
    connectivity, resulting in an ever larger attack surface for malicious actors.
    According to the Internet Security Forum, cybersecurity will remain a major concern in
    the coming years: “By 2022, organisations will be plunged into crisis as ruthless
    attackers exploit weaknesses in immature technologies and take advantage of an
    unprepared workforce. [..] The impact of threats will be felt on an unprecedented scale
    96
    Commission Recommendation of 13.9.2017 on Coordinated Response to Large Scale Cybersecurity
    Incidents and Crises, C(2017) 6100 final.
    28
    as aging and neglected infrastructure is attacked and disrupted due to vulnerabilities in
    the underlying technology.”97
    As a result, the number of cybersecurity incidents within the EU is likely to increase,
    triggering further costs for the companies directly affected by these incidents but also
    for the wider economy and citizens, as threats spread along supply-chains.
    As the general awareness of cyber-related risks is increasing, public and private entities
    in sectors outside the scope of the NIS Directive are likely to step up their investments in
    cybersecurity to some extent even without additional regulation.98
    Estimates based on
    Gartner forecasts suggest that even for the sectors already covered by the NIS Directive,
    the ICT security spending is projected to grow by 12 % in the coming three to four years
    (section 7.1). At the same time, innovation in the field of cybersecurity and the roll-out of
    technologies with the potential of raising the level of cyber resilience99
    will also
    contribute to making the provision of essential services more secure.
    However, in the absence of further regulatory intervention, moral hazard and the
    free-riding behaviour as described in section 2.1.1 will not disappear, as companies
    lack the incentives necessary to take into account the broader societal cost of cyber
    incidents when determining their level of investment in cybersecurity. At the same time,
    digitisation and exposure to cyber risks across sectors will continue to mount. As a result,
    public and private entities are very unlikely to take all the measures necessary to achieve
    a high level of cyber resilience on a voluntary basis. This is especially true for those
    entities currently not covered by the provisions of the NIS Directive, such as
    manufacturing companies or data centres, but also for entities that are under the scope of
    the NIS Directive but whose level of cyber resilience remains low due to problems and
    drivers described in sections 2.1.2 and 2.2.2 respectively.
    As the discrepancies in the OES identification process are mainly caused by the way
    in which the NIS Directive has been designed, they are very unlikely to disappear
    without additional intervention. Nonetheless, the Cooperation Group may continue
    issuing non-binding guidance to further align the identification process. In addition, some
    Member States have notified the Commission that they intend to identify additional
    operators in the near future. As a result, some of the discrepancies observed may be
    reduced as the national implementation of the NIS Directive is becoming more mature,
    but nevertheless such alignment is expected to be rather limited.
    As to the regulatory coverage of DSPs across the internal market, the provisions of the
    NIS Directive will continue to prevent competent authorities from ensuring that all
    companies take adequate cybersecurity measures.
    The Cooperation Group will continue issuing non-binding guidance to further align
    security measures across the Member States. However, as described in the evaluation on
    the functioning of the NIS Directive and in section 2.2.2, Member States have chosen
    very different approaches to imposing security measures. It will therefore be very
    difficult to encourage Member States to align measures to such an extent that the
    negative effects of fragmentation will disappear.
    97
    Internet Security Forum (2020): Threat Horizon 2022: Digital and physical worlds collide,
    https://www.securityforum.org/research/threat-horizon-2022-digital-and-physical-worlds-collide/ .
    98
    For example, according to the Gordon–Loeb model analyzing the optimal investment level in
    information security, companies have an intrinsic incentive to invest into cybersecurity to at least some
    extent based on the risk and potential costs of an incident.
    99
    For example, the uptake of internet protocols, such as DNSSEC, which enhances the integrity of the
    domain name system (DNS) by introducing cryptographic authentication, can have a positive impact on
    the cybersecurity of internet infrastructure.
    29
    As regards supervision, it is likely that the wide differences among supervisory
    approaches taken by competent authorities at national levels will be maintained,
    influenced also by the overall level of cybersecurity maturity and resources available.
    Furthermore, because of the shortcomings of the NIS Directive described in section
    2.2.2, it is unlikely that all entities across the internal market will become subject to
    adequate supervisory measures. As to the supervision of DSPs across the Union, the
    shortcomings of the NIS Directive, notably as regards the overview by the competent
    authorities, the applicable jurisdiction rules and the supervisory regime make it likely for
    these to continue to operate under the radar of competent authorities.
    With the NIS ecosystem expected to become more mature in the coming years and the
    increased awareness of policy makers regarding cyber risks, it is possible that Member
    States will provide more funding to competent authorities. However, as the problem
    drivers described in section 2.2.2 are of a long-term structural nature, the discrepancies
    in Member State capabilities are likely to remain considerable.
    The regular exchange and cooperation within the fora established by the NIS Directive is
    likely to continue to have a positive effect on trust and confidence amongst their
    members and can further boost information sharing in the medium term. Nonetheless, as
    described in section 2.2.2, the lack of information exchange and the deficiencies in the
    existing structures facilitating stakeholder consultation and operational cooperation,
    including crisis management, will continue to prevent a notable increase in
    information sharing and operational cooperation.
    4. WHY SHOULD THE EU ACT?
    4.1. Legal basis
    The current legal basis of the NIS Directive is Article 114 of the Treaty on the
    Functioning of the European Union (TFEU), whose objective is the establishment and
    functioning of the internal market by enhancing measures for the approximation of
    national rules. Any proposed actions would build on the objectives of the current NIS
    Directive. They would also improve the level playing field for companies in the internal
    market, subjecting them to the same requirements across the Union. Any new legislative
    act would therefore have the same legal basis as the current NIS Directive.
    4.2. Subsidiarity: Necessity of EU action
    Cybersecurity resilience across the Union cannot be effective if approached in a severed
    manner through national or regional silos. The NIS Directive came to address this
    shortcoming, by setting a framework for network and information systems security at
    national and Union levels for legal, policy, institutional, technical and operational
    measures, as well as for cross-border cooperation. The transposition and implementation
    of the NIS Directive also brought to light inherent flaws of certain provisions or
    approaches which, in spite of the intended effects, affected the authorities’ and
    industries’ focus on core cybersecurity issues. As described in section 2 above, some of
    these flawed provisions concern the unclear delimitation of the scope of the NIS
    Directive leading to fundamental differences in the extent and depth of de facto EU
    intervention at Member State level. Furthermore, while notable progress was made in
    terms of cooperation across borders, the current voluntary cooperation remains largely at
    policy level, while at operational level it is rather limited to an ad-hoc or regional basis.
    All these inherent flaws have eventually led to considerable disparities across the
    Member States in terms of capabilities, planning and level of protection, which affect at
    the same time the level playing field for similar companies on the internal market.
    30
    Information asymmetry and lack of transparency risk undermining the supply by market
    operators and manufacturers of networks, services and products, as well as the trust of
    the users, which is one of the key drivers of the internal market.
    Last, but not least, well-functioning networks and systems are essential for the EU
    economy. Since the COVID-19 crisis, the European economy has grown more dependent
    on network and information systems than ever before and sectors and services are
    increasingly interconnected. Disruptions resulting from cybersecurity incidents are
    increasing in frequency and magnitude with the potential of undermining the internal
    market, including negative consequences for growth and jobs.
    For all the above-mentioned reasons, the first periodical review of the NIS Directive, as
    requested by Article 23 thereof, created the opportunity for further EU action in relation
    to the NIS framework. Such EU action would also aim at addressing more effectively
    cases with cross-border relevance, where further coordination at the level of planning and
    response, as well as mutual assistance, are needed.
    4.3. Subsidiarity: Added value of EU action
    EU intervention going beyond the current measures of the NIS Directive is justified by
    the subsidiarity principle mainly due to the:
     cross-border nature of the problem. Given the cross-border nature of NIS threats
    and problems, a non-intervention at EU level to improve the current NIS
    framework would lead to a situation where Member States’ joint action would
    remain rather limited, taking insufficient account of the cross-border and cross-
    sector interdependence as regards the network and information systems. An
    appropriate degree of coordination among the Member States, on the other hand,
    would ensure that NIS-related risks can be well managed in the cross-border
    context in which they also arise, and therefore respects the subsidiarity principle.
     potential of EU action to improve and facilitate effective national policies.
     contribution of concerted and collaborative NIS policy actions to effective
    protection of fundamental rights, specifically the right to the protection of
    personal data and privacy. European citizens are increasingly entrusting their
    data to complex information systems, either out of choice or out of necessity,
    without necessarily being able to correctly assess the related data protection risks.
    When incidents occur, they will therefore not necessarily be able to take suitable
    steps, nor is it certain that the Member States would be able to effectively address
    cross-border incidents in the absence of an effective EU-wide NIS coordination.
    As regards the proportionality of the approach, the measures in the policy options
    considered do not go beyond what is needed to achieve the general and specific
    objectives, and do not impose disproportionate costs. As shown in sections 7 and 8, the
    measures proposed in the considered policy options to further streamline the security
    requirements and reporting obligations at Union level take account of the already existing
    practices in the Member States. An enhanced level of protection achieved through such
    streamlined requirements would be proportionate to the risks faced and hence reasonable
    and generally corresponding to the interest of the entities involved in ensuring continuity
    and quality of their services. The costs for ensuring systematic cooperation amongst
    Member States would be small when compared to the economic and societal losses and
    damages which may be caused by NIS incidents. Furthermore, the stakeholder
    consultations held in the context of the NIS review, including the OPC results (Annex 2)
    and the targeted surveys conducted by the NIS review study (Annex 6) show support for
    the revision of the NIS Directive along the above-mentioned lines.
    31
    5. OBJECTIVES: WHAT IS TO BE ACHIEVED?
    This section identifies the general and strategic objectives for a possible EU intervention
    to address the gaps identified in section 1.
    5.1. General objectives
    There are three general policy objectives, which describe the overarching goals of a
    possible EU intervention:
    1) Increase the level of cyber resilience of a comprehensive set of businesses
    operating in the European Union across all relevant sectors, the main general
    objective, by putting in place rules that ensure that all public and private entities
    across the internal market, which fulfil important functions for the economy and
    society as a whole, are required to take adequate cybersecurity measures.
    2) Reduce inconsistencies in the resilience across the internal market in the
    sectors already covered by the NIS Directive, by further aligning (1) the de-
    facto scope of the legal instrument, (2) the security and incident reporting
    requirements that public and private entities are required to put in place, (3) the
    provisions governing national supervision and enforcement and (4) the
    capabilities of competent authorities in the Member States.
    3) Improve the level of joint situational awareness and the collective capability
    to prepare and respond, by taking measures aimed at increasing the level of
    trust between competent authorities, by sharing more information and by putting
    in place rules and procedures in the event of a large-scale incident or crisis.
    These objectives are interrelated:
     Synergies: Reducing internal market fragmentation would contribute to
    increasing the level of cyber resilience in Member States as public and private
    entities subject to less stringent requirements would have to adhere to stricter
    rules. In addition, measures aimed at increasing the level of joint situational
    awareness would also have a positive impact on the level of resilience of public
    and private entities as such entities would benefit from the cooperation between
    competent authorities.
     Trade-offs: enhancing security could entail additional costs and constraints to the
    digital single market. For example, the implementation of increased security
    measures could bring additional costs to businesses, which could have a negative
    impact in their operations, in particular for SMEs.
    5.2. Specific objectives
    The specific objectives are defined for each area for which problems and problem drivers
    were described.
    To address the problem of low level of cyber resilience of businesses operating in the
    European Union
    1. Ensure that entities in all sectors that are dependent on network and information
    systems and that provide key services to the economy and society as a whole are
    required to take cybersecurity measures and report incidents with a view to
    increasing the overall level of cyber resilience throughout the internal market
    To address the problem of inconsistent resilience across Member States and sectors
    2. Ensure that all entities that are active in sectors covered by the NIS legal framework
    and that are similar in size and have a comparable role are subject to the same
    32
    regulatory regime (are either inside or outside the scope) no matter under which
    jurisdiction they fall within the EU
    3. Ensure that all entities that are active in sectors covered by the NIS legal framework
    are required to follow aligned obligations based on the concept of risk management
    when it comes to security measures and must report incidents based on a uniform set
    of criteria
    4. Ensure that competent authorities enforce the rules laid down by the legal instrument
    more effectively through aligned supervisory and enforcement measures
    5. Ensure a comparable level of resources across Member States allocated to competent
    authorities that would allow them to fulfil the core tasks laid out by the NIS
    framework
    To address the problem of joint situational awareness and lack of joint crisis response
    6. Ensure that essential information is exchanged between Member States by
    introducing clear obligations for competent authorities to share information and
    cooperate when it comes to cyber threats and incidents and by developing a Union
    joint operational crisis response capacity
    A review should evaluate in how far these objectives have been achieved within 54
    months after coming into force.
    6. WHAT ARE THE AVAILABLE POLICY OPTIONS?
    6.1. Description of the policy options
    This section presents the policy options, including the baseline scenario, that have been
    considered for addressing the problems identified in Section 2 and meeting the objectives
    set out in Section 5.
    The policy options analysed are designed based on the degree and nature of a potential
    intervention and in a ‘package’ format that groups envisaged actions and measures in the
    main areas that are already included or considered for being included in the NIS
    framework: (1) the sectoral scope and coverage of entities; (2) security requirements and
    reporting obligations (3) supervision and enforcement; (4) cooperation and information
    sharing (including the aspects relating to crisis management).
    The actions and measures envisaged in the areas of intervention, which correspond to the
    specific objectives, are interrelated and linked to the type and degree of intervention. The
    policy options are, therefore, developed as a unified set of actions and measures in the
    above-mentioned areas which function as a whole: the policy choice made in one area
    being dependent on the choices made in the others. Furthermore, the description of each
    policy option includes a reference to the synergies with other related instruments,
    including sector-specific legislation or policies.
    The list of actions and measures in the areas of intervention analysed within the policy
    options was developed with the purpose of putting forward viable alternatives. The
    description of each policy option therefore refers to potential alternatives for the areas of
    intervention that were not considered viable and explains the reasons why.
    The intervention logic and the links between problem drivers, specific objectives and
    policy options is illustrated by Table 1 below. A more detailed table with an overview of
    the policy options and their correspondence with the specific objectives is also included
    in Annex 8.
    33
    Problem drivers Specific policy
    objectives
    Policy options
    PO0 (status quo) PO1 (non-legislative) PO2 (limited changes) PO3 (subst. changes)
    DR1: Lack of
    cybersecurity
    measures taken by
    key companies
    SPO1: Entities in
    NIS-dependent
    sectors to take
    measures and
    report incidents
    Keep scope,
    requirements and
    obligations. Continue
    existing CG and
    CSIRTs network
    work
    Keep scope,
    requirements and
    obligations + guidance
    Extend scope with OES
    and DSP categories
    Extend scope and introduce categories
    essential and important with different
    requirements
    DR2.1:
    Discrepancies in
    OES
    identification and
    DSP coverage
    SPO2: Similar
    entities in covered
    sectors subject to
    the same
    regulatory regime
    Guidelines on OES
    identification and
    coverage of DSPs
    Harmonize essential
    services and
    identification thresholds.
    Replace identification by uniform criteria
    for all entities, excluding micro or small.
    Clearer DSP
    definitions
    Clarify jurisdiction
    rules
    Equal footing for
    OESs and DSPs
    Equal footing for all entities in same
    category
    Registry of cross-border digital service
    providers
    Clear jurisdiction
    DR2.2:
    Inconsistent
    security measures
    and reporting
    requirements
    SPO3: Entities to
    follow aligned
    security and
    reporting
    obligations
    Guidelines on security
    and incident reporting
    requirements
    Harmonize security and
    reporting requirements
    Introduce uniform security and
    reporting requirements
    Explicit incident reporting rules
    Explicit incident
    reporting requirements
    DR2.3:
    Ineffective
    supervision and
    enforcement
    SPO4: Competent
    authorities to
    enforce more
    effectively
    Guidelines on
    supervision and
    enforcement
    Principles for supervisory
    measures and penalties
    Principles + minimum requirements
    General conditions + minimum level
    for fines
    Peer-review system
    Liability rules for natural persons
    Guidelines on DSPs Subject DSPs to the same Subjecting entities under the same
    34
    supervision rules as OES category to the same regulatory regime
    Important entities subject to a light-
    touch regime
    DR2.4:
    Discrepancies in
    Member State
    capabilities
    SPO5:
    Comparable level
    of resources
    allocated to
    authorities
    Incentivise MS to
    adequately fund their
    competent authorities
    and other relevant
    structures
    MS to take measures to
    ensure that the competent
    authorities have the
    necessary resources
    Peer-review mechanism to assess the
    capabilities of MS
    DR3.1: Voluntary
    nature of
    cooperation
    SPO6: Essential
    information to be
    exchanged
    between MS by
    introducing clear
    obligations and by
    developing a joint
    operational crisis
    response capacity
    Continue existing
    work of the
    Cooperation Group
    and the CSIRTs
    network
    Further develop
    SOPs by the
    Cooperation Group
    and the CSIRTs
    network.
    Launch CyCLONe,
    without a set legal
    framework.
    Mandate or incentivize
    information sharing for
    competent authorities and
    companies (ISACs,
    PPPs)
    Mandatory mutual assistance and
    cooperation
    Voluntary info sharing through ISACs
    and PPPs
    MS to develop CVD policies
    ENISA as state of cybersecurity
    observatory
    Regular reports on the state of
    cybersecurity
    DR3.1: Limited
    information
    feeding into the
    existing groups
    DR3.1: No crisis
    management
    structures
    Crisis management framework, for both
    national and EU levels, including
    institutionalising CyCLONe
    Table 1: intervention logic
    35
    Option 0: Baseline scenario – maintaining the status quo
    In this scenario, the NIS Directive would remain unchanged and no other measures of
    non-legislative nature would be taken to target the problems identified by the evaluation
    of the NIS Directive. A more sector-specific shift could be expected in this scenario,
    advancing sectoral legislation that would also include cybersecurity aspects. The
    Cooperation Group and the CSIRTs network would continue the activities in line with
    their mandates, leading to further voluntary information sharing, exchange of practices
    and development of reference documents and guidance. The Cooperation Group would
    continue expanding to sector-specific work streams.100
    However, in the medium and long
    term, the drivers of cybersecurity policies at EU level would mainly stem from other
    related legal acts and policy measures, be them sector-specific or cross-sectoral. This
    would maintain the fragmented approach on cybersecurity across the EU, with more ad
    hoc solutions and less coherent responsibility sharing.
    In particular, in the areas covered by the specific objectives (section 5.2.) the following
    main developments would be expected:
    1. Sectoral scope and coverage of entities
    The sectors and services that fall under the scope of the NIS Directive would remain
    unchanged. In this scenario, it is expected for a subset of Member States to identify OESs
    in certain sectors, while the imbalance in key operators’ preparedness would deepen,
    with potential negative consequences for the internal market. Sectors and services which
    have developed interdependencies with other essential sectors or have proven essential in
    times of COVID-19 crisis, would remain outside the NIS scope. 67% of the competent
    authorities responding to the NIS review study survey considered that the NIS Directive
    does not effectively cover all relevant (sub)sectors essential for the economy and society
    as a whole.
    The OES identification process and the DSP coverage would remain unchanged. Some
    further guidance could be expected as part of the Cooperation Group’s work, as well as
    via the EU Agency for Cybersecurity (ENISA). No change in the identification process
    would perpetuate or potentially amplify existing shortcomings.101
    The sectoral work streams of the Cooperation Group are expected to further expand and
    more sector-specific guidance issued. Some further sector-specific legislation (e.g. in
    relation to energy or transport) may also be expected. Relying on only sector-specific
    initiatives is likely to have very little impact on the overall level of cross-sector and
    cross-border cyber resilience in the EU. Cyberattacks and vulnerabilities are often not
    sector- or country-specific. More information on cross-sector and cross-border
    propagation of incidents is included in Annex 9.
    2. Security requirements and reporting obligations
    The current system for setting the security requirements and the thresholds for incident
    notifications would remain unchanged. Further guidance on these aspects is expected
    through the work of the Cooperation Group and ENISA. However, this would not be
    100
    Currently there are sector-specific work streams on energy, elections and, more recently, health. More
    such work streams (including on subsectors) are potentially considered in the medium term.
    101
    Such as major hospitals in a Member State not being identified as essential service operators, while in
    another Member State almost every health care facility in the country was identified as such. Or
    similarly major railway operator being subject to NIS requirements, while others not.
    36
    likely to effectively address the problems identified in practice and highlighted in section
    2.1.
    76% of the OES responding to the NIS review study survey faced challenges in
    implementing the NIS security requirements, while 71% consider that the misalignment
    of security requirements is among the main shortcomings of the current NIS Directive.
    This matches the views of the competent authorities.102
    Currently there is a very low number of reported incidents.103
    Each year a number of
    Member States report zero incidents, while the majority report very low numbers. Very
    few Member States (on average 5) report incidents concerning DSPs. The last two years
    did not show any notable improvement and it is highly likely that, without a change in the
    common denominator and clarity of reporting obligations, no conclusive picture of
    incidents, underlying causes, typology and effects may be drawn at EU level.
    3. Supervision and enforcement
    The approaches towards supervision and enforcement at Member State level would
    remain unchanged and uneven. The light-touch approach on the DSP supervision
    would be maintained.
    The Cooperation Group could issue guidelines on such approaches, but given the
    differences encountered so far and how little enforcement systems have been used, it
    appears as highly unlikely for such guidance to increase alignment across the EU on these
    matters. 70% of respondents to the NIS review study surveys targeting competent
    authorities considered that their supervisory powers are effective only to some or to a
    moderate extent.104
    By perpetuating the current approach towards the supervision and
    enforcement system, it is unlikely the addressees of the NIS requirements would be
    dissuaded from non-compliant behaviour.
    The differences in the Member States’ capabilities are likely to be largely maintained,
    depending also on the evolution of national economies, as well as the political will at
    national level at any given moment and the priority given to cybersecurity on the political
    agenda. The NIS review country visits revealed insufficient resourcing of competent
    authorities and CSIRTs in a number of Member States, with adverse effects on the build-
    up of cybersecurity capabilities and trust among authorities across borders.105
    The
    cybersecurity competence centre and its related network, as well as the funds made
    available through Digital Europe and Horizon Europe programmes, would have a certain
    impact in this regard, but they cannot compensate for the level of cybersecurity policy
    prioritisation and political will at national levels.
    4. Cooperation and information sharing
    In terms of cooperation and information sharing of public authorities and private
    entities, this would remain largely voluntary. The Cooperation Group and the CSIRTs
    102
    72% considered that the misalignment of the security requirements is a pressing issue.
    103
    78% of the competent authorities responding to the NIS review study survey considered that there is a
    need for streamlining incident notification obligations. 71% of OES and 55% of DSP responding to the
    survey were of the same opinion.
    104
    In some Member States where the supervisory powers and corresponding means were prioritized and
    the resources and capabilities of the competent authorities matched the potential of these powers,
    benefits could have been seen in a pro-active approach of competent authorities and measures such as
    offering of vulnerability scans to companies leading to a good cooperation between businesses and
    competent authorities, trust and additional incentives to comply with security requirements.
    105
    63% of the respondents to the NIS review targeted survey for competent authorities considered that
    there is insufficient staffing and 50% that there are insufficient resources to ensure to a great or at least
    a moderate extent an effective fulfilment of their tasks.
    37
    network would also continue to function within the existing mandate.
    Information sharing, for both national authorities and private entities, appears to take
    place scarcely.106
    At operational level, a survey conducted by ENISA in July 2020 among
    the CSIRTs network revealed that, while the network is overall satisfied with its
    activities, it considers that more needs to be done to improve operational information
    exchange and operational support in addressing cross-border incidents. Currently, there
    are seven sector-specific ISACs identified at EU level107
    and the tendency is to encourage
    the setting up of more such partnerships, both at EU level and at national level. Without a
    clearer framework for information exchange, the impact of these developments is likely
    to be limited and dispersed in time.
    As regards crisis management, currently there is no established European framework for
    cybersecurity crisis management. Building on the Blueprint Recommendation issued
    based on the NIS framework, CyCLONe is being developed at operational level. Member
    States largely support this initiative and have already designated their contact points in
    CyCLONe, even if the structure is only voluntary. While this project is materialising, it
    would still benefit from a legal framework as a basis to ensure coherence, structure and
    certainty. In the NIS review consultations, a third of the Member States raised the need
    for formalizing CyCLONe within the NIS framework, clarifying the links between
    CyCLONe (operational level) and the CSIRTs network (technical level), and considering
    establishing an EU crisis management framework within the NIS context.
    At political level, crisis management is carried out through horizontal instruments, such
    as the Council Integrated Political Crisis Response (IPCR) arrangements (for Member
    States), the Commission ARGUS108
    high-level cross-sectoral crisis coordination process
    (for the Commission) and the EEAS Crisis Response Mechanism. The EU civil
    protection mechanism109
    , which aims to improve prevention, preparedness and response
    to disasters, does not have a cybersecurity focus.
    5. Synergies with other related instruments
    The NIS Directive provides for a lex specialis principle110
    , establishing that where a
    sector-specific Union legal act provides for equivalent cybersecurity requirements or
    incident notification obligations, the latter shall apply. This principle is, for example,
    currently applicable in the case of the security requirements and notification obligations
    for payment service providers as stipulated in the Directive on payment services in the
    internal market (‘PSD2’)111
    .
    The proposal for a Digital Operational Resilience Act (DORA) for the financial sector,
    if adopted, will also represent such lex specialis for all financial services as it provides
    106
    83% of the respondents to the NIS review targeted survey for competent authorities considered that
    there is insufficient clarity and framework for addressing the challenges of cross-border dependencies,
    including outside the EU. 55% of the respondents to the OES-related survey considered the same. 65%
    of the respondents to the survey concerning the competent authorities consider that there is limited
    information sharing between Member States, potentially hampering the effective handling and
    prevention of incidents. 57% of the respondents to the surveys targeting OESs were of the same
    opinion.
    107
    four of which in the transport sector.
    108
    general rapid alert system linking all the European Commission’s specialised systems for emergencies.
    109
    https://ec.europa.eu/echo/what/civil-protection/mechanism_en .
    110
    Article 7(1).
    111
    Directive (EU) 2015/2366 of the European Parliament and of the Council of 25 November 2015 on
    payment services in the internal market, amending Directives 2002/65/EC, 2009/110/EC and
    2013/36/EU and Regulation (EU) No 1093/2010, and repealing Directive 2007/64/EC (Text with EEA
    relevance).
    38
    detailed provisions on security requirements and reporting obligations. The DORA
    framework envisages a one-stop-shop, proposing a system of reporting major ICT-related
    incidents to competent authorities in the financial sector which in their turn would notify
    the NIS single points of contact
    Nevertheless, the lex specialis provisions of the NIS Directive have also triggered certain
    interpretation challenges in practice. Thus, certain Member States included under the NIS
    scope sectors where specific regulations provided also for cybersecurity requirements.
    In addition, security-related obligations are provided in some other EU instruments, such
    as those concerning the public electronic communication providers in the European
    Electronic Communications Code112
    or the Regulation on electronic identification and
    trust services for electronic transactions in the internal market (eIDAS). These services
    are now excluded from the scope of the NIS Directive.
    Another related EU legal instrument is the Directive on the European Critical
    Infrastructure (ECI).113
    The ECI Directive is limited only to infrastructures the
    destruction or disruption of which would have a significant cross-border impact. The ECI
    Directive is therefore limited to physical protective arrangements. While both critical
    (physical) infrastructures and network and information systems are by their nature crucial
    to the provision of essential services, the ECI Directive is focused on the protection of
    specific assets that provide certain essential services; instead, the NIS Directive takes a
    broader approach that aims at ensuring a high and common level of security for the
    essential services as such (some of which are provided by infrastructures designated as
    ECIs). A review of the ECI Directive is envisaged. The envisaged ECI revision aims to
    replace the current ECI Directive with an overarching cross-sectoral framework to
    enhance the resilience of operators of essential services in the sectors covered by the NIS
    Directive, as well as telecommunications and space. The envisaged initiative is
    complementing the NIS Directive, avoiding overlaps. It would entail a different material
    approach and different types of measures and means which complement each other. The
    ECI framework would establish minimum requirements to address non-cyber threats for
    operators defined as critical as it focuses on enhancing the security of physical assets
    against threats such as terrorism and other intentional and unintentional man-made
    threats, as well as natural hazards.114
    Option 1: Non-legislative measures to align the implementation of the NIS Directive
    In this scenario, there would be no changes at legislative level. Instead, the Commission
    would issue recommendations and guidelines, upon consultation of the Cooperation
    Group, ENISA and, as applicable, the CSIRTs network. In particular, aside the
    developments described in the baseline scenario, which are also expected in this option,
    the following additional measures and/or developments are expected:
    1. Sectoral scope and coverage of entities
    In this policy option, the sectoral scope of the NIS Directive, the OES identification
    process and the DSP coverage would remain unchanged, same as in the baseline
    scenario. At the same time, the sectoral work streams of the Cooperation Group
    112
    Directive (EU) 2018/1972 of the European Parliament and of the Council of 11 December 2018
    establishing the European Electronic Communications Code.
    113
    Council Directive 2008/114/EC of 8 December 2008 on the identification and designation of European
    critical infrastructures and the assessment of the need to improve their protection.
    114
    A possible overlap, however, arises from the fact that under the ECI Directive the designated ECIs
    should include measures on security of information systems as part of their Operator Security Plan
    (Annex 2 of the ECI Directive).
    39
    corresponding to the current scope are expected to further expand and more sector-
    specific guidance could be issued in this context, including by the Commission, in
    cooperation with various work streams of the Cooperation Group and ENISA. Further
    sector-specific legislation would also be expected, as in the baseline scenario.
    In addition to the baseline scenario, more guidance and recommendations would be
    issued by the Commission on sector-specific aspects stemming from the differences in
    the OES identification process.
    2. Security requirements and reporting obligations
    In this policy option, in addition to the expected developments in the baseline scenario,
    the Commission would issue recommendations on security requirements or
    thresholds for incident reporting and potentially DSP-related aspects, including
    jurisdiction issues.
    3. Supervision and enforcement
    In this scenario, no changes would be expected as compared to the baseline scenario. The
    Commission is unlikely to issue recommendations to the Member States on these aspects
    since the current NIS Directive provisions are of very general nature in this respect and
    the discretion of the Member State is too wide. The Cooperation Group could potentially
    agree to issue certain guidelines on such approaches, but given the differences
    encountered in practice so far and the little use of the enforcement systems it appears as
    highly unlikely for such guidance to have a potential to raise the level of alignment
    across the EU on these matters. The light-touch approach on the DSP supervision
    would remain in force.
    The differences in the Member States’ capabilities are likely to be largely maintained,
    depending also on the evolution of the potency of national economies, as well as the
    political will at national level at any given moment and the priority given to
    cybersecurity on the political agenda
    4. Cooperation and information sharing
    As in the baseline scenario, the cooperation among public authorities and private entities
    would remain largely of voluntary nature. The Cooperation Group and the CSIRTs
    network would also continue to function within the existing mandate.
    In addition to the baseline scenario, the Commission may issue recommendations to
    encourage Member States to set up information-sharing frameworks or tools, such as
    Information Sharing and Analysis Centres – ISACs (with participation of public
    authorities) or other public private partnerships (PPPs). In this scenario, self-regulatory
    solutions within ISACs or PPPs could be incentivised and supported. However, self-
    regulatory solutions in a global digital environment have proven challenging. Giving
    more prominence to self-regulatory solutions as compared to regulatory intervention
    would raise additional fragmentation risks, with little evidence of effectiveness of
    supervision of security-related requirements in such a context. On a background where,
    as highlighted in section 2.1.2, inconsistent resilience across Member States and sectors
    was identified as a persistent problem, it appears that the alternative of a self-regulatory
    solution alone would not be viable.
    5. Synergies with other related instruments
    The same developments as in the baseline scenario would be expected.
    40
    Option 2: Limited changes to the current NIS Directive for further harmonization
    This scenario would entail targeted amendments to the NIS Directive, including an
    extension of the scope and several other amendments that would aim at guaranteeing
    certain immediate solutions to the problems identified, providing more clarity and further
    harmonization. The amended NIS Directive would however maintain the main building
    blocks, approach and rationale. In particular, the following measures and/or
    developments would be expected:
    1. Sectoral scope and coverage of entities
    Additional sectors, subsectors and types of services would be brought under the scope,
    within the two existing categories covered by the NIS Directive (OES and DSP).
    The sectoral scope of the NIS framework should provide for a comprehensive coverage
    of the sectors and services of vital importance for key societal and economic activities
    within the internal market. The overall NIS review process, starting with the country
    visits, brought the attention to a considerable number of sectors and types of services
    which were not included under the scope of the NIS Directive, but which were
    nevertheless added or considered to be added to the NIS scope by the Member States or
    were frequently referred to in consultations with the relevant stakeholders. It became
    therefore evident in the early stages of the NIS review process that, should an extension
    of the NIS sectoral scope be considered, this would rather be a substantial one.
    A potential alternative to a substantial extension of the NIS scope could have consisted
    of the addition of a number of subsectors to the already existing sectors listed in Annex I
    of the NIS Directive (such as: electricity generation, district heating or electricity market
    operators within the energy sector or social networks as part of digital service providers),
    jointly with the submission of trust services and public electronic communications
    networks and electronic communications services to the NIS scope, while repealing the
    cybersecurity-related requirements concerning these services provided by their respective
    EU legislation. Such an alternative would have however ignored the Member States’
    national policies to go beyond the scope of the current NIS Directive, the problems and
    challenges stemming from the increased interconnectedness and interdependencies
    among sectors, as well as the lessons learnt from the COVID-19 crises. For these reasons,
    a minimal expansion of the scope of the NIS framework was not considered a viable
    alternative for the policy options that would entail an amendment or a more systematic
    revision of the NIS framework (i.e. options 2 and 3).
    Selection of additional sectors and services to be covered by the NIS framework
    The additional sectors, subsectors and services considered for the NIS scope were
    determined based on the following criteria (for detailed information on the methodology
    applied, see Annex 4):
    • existing Member States’ policies covering sectors, subsectors and services beyond the
    scope of the NIS Directive;
    • stakeholders’ views reflected in the results of the OPC and the targeted surveys
    conducted by the NIS review study;
    • sectoral digital intensity;
    • level of importance for society of sectors, subsectors and services as revealed by a
    major crisis such as COVID-19;
    • interdependency among sectors.
    41
    In deciding on which new sectors and types of services to be added to the NIS scope, an
    equal weight was given to each of the above-mentioned criteria. These criteria reflect
    elements ranging from national risk evaluations and stakeholders’ views, up to practical
    implications of the COVID-19 crisis and more technical cyber-related aspects. Technical
    criteria such as digital intensity and interdependency among sectors could not have
    determined alone the importance of certain sectors or services for the societal and
    economic activities. For example, a sector such as healthcare, currently covered by the
    NIS Directive, would not score high on such technical criteria, while nevertheless being
    vital for society and at the same time vulnerable to cyber threats, as has also been proven
    in the context of the COVID-19 crisis. The Member States’ national evaluations, which
    led to the consideration of additional sectors or services for the NIS scope, as well as the
    opinions of well-informed practitioners from both industry and public authorities who
    participated in the NIS review consultations, were therefore considered equally important
    as technical criteria such as interconnectivity or digital intensity. All these criteria also
    indicated cumulatively the level of vulnerability to cyber threats. Furthermore, the
    COVID-19 crisis has revealed, from a very practical perspective, the criticality of certain
    sectors and services for societies and economies, and was therefore added to the criteria
    assessed in view of a potential sectoral extension of the NIS scope.
    The Open Public Consultation asked stakeholders representing the new sectors and
    services if they themselves should also be brought under the NIS scope. In most sectors,
    respondents tended to welcome the addition to the scope of the NIS Directive, including
    in public administration.115
    The table below lists the additional sectors and types of services that scored high on a
    combination of the above-mentioned criteria and a qualitative analysis of criticality and
    exposure to cyber threats. Other (sub)sectors or services, such as insurance or education,
    were discarded for the sectoral scope extension at an early stage, due to their low scores
    on the above-mentioned criteria and the qualitative aspects. See also Annex 4 for the
    analysis of the above-mentioned criteria.
    No. Sector/type of
    service
    Criteria considered in view
    of inclusion in the NIS
    scope (in the order of
    scoring)
    Qualitative aspects
    supporting the inclusion in
    the scope of the NIS
    framework
    1 Wastewater  Member States’ national
    policies;
     Results of consultations;
     COVID-19 crisis.
    Wastewater systems are
    essential for drinking water
    supply and distribution (a
    sector already covered by the
    current NIS Directive).
    Properly treated wastewater is
    vital for preventing disease
    and protecting the
    environment.
    Cyber-attacks on wastewater
    utilities or process control
    systems can cause significant
    115
    Both in food supply and manufacturing the results were more mixed, with only half of the respondents
    supporting the idea of being brought under the NIS scope. Social networks rejected the proposition. No
    responses were received from the heat, waste management and postal services sectors and from content
    delivery networks.
    42
    harm, compromising the
    ability of water and
    wastewater utilities to provide
    clean and safe water to the
    population. If a waste
    treatment facility gets hacked,
    it may lead up to thousands of
    tons of raw sewerage flowing
    down a local river.
    2 Data centre
    services
     Digital intensity;
     Interdependency with
    other sectors;
     Member States’ national
    policies;
     Results of consultations;
     COVID-19 crisis.
    Data centres services are key
    services in a data-centric
    economy. They enable data
    processing and storage (such
    as colocation or dedicated
    hosting) and hold proprietary
    and sensitive information such
    as intellectual property,
    customer data, and financial
    records, which are highly
    exposed to cyber threats. Data
    centres are also the physical
    infrastructure used for the
    provision of cloud-based
    services.
    3 Content delivery
    network services
     Digital intensity;
     Interdependency with
    other sectors;
     Member States’ national
    policies;
     Results of consultations;
     COVID-19 crisis.
    Like data centres, content
    delivery networks are essential
    elements of digital
    infrastructure that play a key
    role in a data-centric economy.
    Today the majority of web
    traffic is served through
    Content Delivery Networks
    (CDNs). A CDN essentially
    replicates content to multiple
    places so that content becomes
    closer to the end users.
    Deployed on the edge of a
    network, a CDN is well-
    situated to act as a virtual
    high-security fence and
    prevent attacks on websites
    and web applications. The on-
    edge position also makes a
    CDN ideal for blocking DDoS
    floods.
    4 Trust services  Digital intensity;
     Interdependency with
    other sectors;
    Trust service providers are
    subject to security and
    reporting obligations under the
    eIDAS Regulation, which are
    43
     Results of consultations. similar to those laid down in
    the NIS Directive. However,
    digital certificates provided by
    those providers are frequently
    used as authentication factors
    in the provision of financial
    services, cloud computing
    services or other essential
    services that fall under the
    current NIS Directive.
    Therefore, any security
    incident affecting the trust
    services used as authentication
    means within the essential
    services might also affect the
    continuity of the essential
    service itself and thereby
    trigger a double reporting.
    The repeal of these obligations
    from the eIDAS Regulation
    and their inclusion under the
    revised NIS would streamline
    the legal obligations for those
    entities.
    5 Public electronic
    communications
    networks and
    electronic
    communications
    services (insofar as
    these are publicly
    available)
     Digital intensity;
     Interdependency with
    other sectors;
     Member States’ national
    policies;
     Results of consultations;
     COVID-19 crisis.
    Electronic communications
    networks or services are
    subject to security and
    incident notification
    obligations laid down in
    Article 40 of the European
    Electronic Communication
    Code. At the same time, these
    providers are subject to almost
    identical type of obligations
    under the NIS Directive as far
    as they also provide services
    included in the NIS scope such
    as Internet Exchange Points,
    Domain Name Servers or
    cloud computing services.
    The repeal of these obligations
    from the European Electronic
    Communication Code and
    their inclusion under the
    revised NIS Directive would
    streamline the legal
    obligations for those entities.
    6 Postal and courier
    services
     COVID-19 crisis
     Member States’ national
    Postal and courier services are
    key services for businesses,
    44
    policies;
     Results of consultations;
     Digital intensity;
     Interdependency with
    other sectors
    citizens and public services,
    including democratic
    processes such as elections.
    The disruption of such
    services, denial of service or
    intrusions leading to data
    breaches as a result of cyber
    attacks may cause
    considerable damage to
    societies and economies. The
    COVID-19 pandemic revealed
    once more the criticality of
    postal and courier services for
    societal and economic
    activities.
    7 Waste management  Results of consultations;
     Member States’ national
    policies;
     COVID-19 crisis;
     Interdependency with
    other sectors
    Industrial companies that deal
    with hazardous materials (e.g.
    power plants, refineries,
    factories, water treatment
    facilities or pipelines) are
    using automated technology to
    maximize their efficiency.
    Damaging or even
    catastrophic environmental
    releases may be triggered
    remotely by cyber attacks.
    8 Manufacture,
    production and
    distribution of
    chemicals
     Member States’ national
    policies;
     Results of consultations;
     Digital intensity
    Cyber attacks against the
    information and process
    control systems of chemical
    facilities can disrupt or shut
    down operations and lead to
    serious consequences, such as
    health and safety risks,
    including loss of life. Such
    attacks could potentially
    manipulate facilities’
    information and control
    systems to release or steal
    hazardous chemicals and
    inflict casualties.116
    There has been a substantial
    increase in cyber threats on
    chemical industry information
    technology and production
    assets amid a wider spike in
    malicious activity as hackers
    116
    https://www.msspalert.com/cybersecurity-markets/verticals/chemical-facilities-threatened-by-cyber-
    attacks/
    45
    seek to exploit new
    vulnerabilities created by
    shifts in work habits since the
    onset of the COVID-19
    pandemic.117
    9 Manufacturing
    (notably
    manufacture of:
    food products;
    beverages; basic
    pharmaceutical
    products and
    pharmaceutical
    preparations;
    research and
    development
    activities of
    medicinal
    products; medical
    devices and in
    vitro diagnostic
    medical devices
    (including medical
    devices considered
    as critical during a
    public health
    emergency);
    computer,
    electronic and
    optical products,
    electrical
    equipment,
    machinery and
    equipment n.e.c.,
    motor vehicles,
    trailers and semi-
    trailers, other
    transport
    equipment)
     Member States’ national
    policies;
     Results of consultations;
     Digital intensity;
     Interdependency with
    other sectors;
     COVID-19 crisis
    Manufacturing covers a very
    wide portion of economy and
    a very large number of areas
    and entities. Manufacturing
    companies are valuable targets
    for cyber attacks, mainly due
    to their sheer size, but also
    because they deliver products
    which other sectors, industries
    or citizens rely upon.
    Furthermore, they also have a
    lot of valuable data that can be
    targeted by cyber criminals.
    Cyber attacks on
    manufacturing companies can
    cause considerable disruptions
    and financial damage along
    the whole supply chain.
    As show by a study conducted
    by Deloitte and MAPI on
    cyber risks in advanced
    manufacturing118
    , the
    manufacturing companies’
    focus on innovation, the pace
    of technological change they
    face and an increasing reliance
    on connected products, makes
    them even more vulnerable to
    cyber risks.
    For the NIS framework, only
    the manufacturing of certain
    products was considered,
    linked to their criticality for
    societies and economies, and
    notably their level of
    interdependency with other
    sectors, as well as the
    importance revealed by the
    COVID-19 crisis and the
    117
    https://www.icis.com/explore/resources/news/2020/06/17/10520231/insight-chemical-industry-faces-
    up-to-cybercrime-spike-amid-cost-cutting-pressures .
    118
    https://www2.deloitte.com/us/en/pages/manufacturing/articles/cyber-risk-in-advanced-
    manufacturing.html .
    46
    national policies of the
    Member States.
    10 Food supply  Member States’ national
    policies;
     Results of consultations;
     COVID-19 crisis;
     Digital intensity.
    Food supply is a fundamental
    pillar of societies. A shortage
    of food supplies would have
    catastrophic effects on
    societies. The COVID-19
    crisis stressed even more the
    criticality of the food supply
    chain.
    In terms of technology, digital
    intensity and vulnerabilities to
    cyber threats, the food supply
    sector is not much different
    from other traditional
    industries, undergoing rapid
    industrial evolution. The
    industry is adopting new and
    not yet battle-tested
    technology with advanced
    sensors, robotics, drones and
    autonomous vehicles.119
    Cyber threats can impact the
    food supply chain in many
    ways. Cyber attacks could:
    impede the movement of
    materials and ingredients from
    suppliers to manufacturers,
    target shipments of food,
    compromise IT and OT
    networks by ransomware, with
    the rapid spoilage of food in
    production being an incentive
    to pay the ransom. Shipments
    from manufacturers to
    customers could be delayed or
    re-routed to the wrong
    locations. Cybersecurity
    measures are therefore key to
    keeping systems and processes
    running, and food safe and the
    supply chain intact.120
    11 Social networks  Results of consultations;
     COVID-19 crisis;
    Social networks have an
    increasing importance for
    societies, ranging from
    connecting people and
    119
    https://www.securityweek.com/cybersecurity-threats-food-supply-chain .
    120
    https://www.qad.com/blog/2020/09/why-cybersecurity-matters-in-the-food-and-beverage-supply-chain
    47
     Digital intensity. businesses, up to social media
    and e-commerce, as well as
    influencing democratic
    processes and distribution of
    news and information.
    In 2020, 3.81 billion people
    worldwide were using social
    media. 49% of the total world
    population are using social
    networks.121
    Digital consumers spend
    nearly 2.5 hours on social
    networks and social messaging
    every day.122
    According to DESI123
    , social
    networks (51 %) were the
    most used form of social
    media platforms in 2019.
    Furthermore, 65% of internet
    users in the EU used social
    networks in 2019.124
    Given the breadth of their
    coverage, reach out to users
    and implicitly big valuable
    data they entail, social
    networks are valuable targets
    for cyber attacks.
    Social media is primarily used
    by cybercriminals as an
    intelligence gathering tool, but
    it is also a threat vector
    itself125
    , notably when
    cybercriminals are spreading
    malware and
    misinformation.126
    For
    example, in May 2016,
    LinkedIn was hacked, and 117
    million credentials were
    exposed. In 2017, Vevo fell
    121
    Kemp, Simon. “Digital 2020: April Global Statshot Report.” We Are Social Inc. April 23, 2020.
    https://wearesocial.com/blog/2020/04/digital-around-the-world-in-april-2020 and
    https://www.cisa.gov/sites/default/files/publications/NCSAM_SocialMediaCybersecurity_2020.pdf
    122
    G., Deyan. “How Much Time Do People Spend on Social Media in 2020?” TechJury. June 18, 2020.
    https://techjury.net/blog/time-spent-on-social-media/ .
    123
    https://ec.europa.eu/eurostat/statistics-explained/index.php/Social_media_-
    _statistics_on_the_use_by_enterprises
    124
    https://ec.europa.eu/digital-single-market/en/use-internet .
    125
    https://www.bridewellconsulting.com/cyber-trends-for-2020-social-media-attacks .
    126
    https://versprite.com/blog/top-motives-hackers-attack-social-media-2020/ .
    48
    victim to a phishing attack,
    and 3.12 terabytes of sensitive
    company data were affected.
    Twitter was hacked in July
    2020, and influential accounts
    were used in a bitcoin theft
    operation.127
    Table 2: selection of additional sectors and services for the NIS scope
    In this policy option, operators of government-owned and privately-owned ground-
    based infrastructure that support the provision of space-based services would also
    be added to the NIS scope. Ground-based infrastructure performs essential functions,
    including control, monitoring, tracking and data collection activities. Space-based
    services are playing an increasingly important role for the economy and society as a
    whole and are important for the daily operations of many other essential and important
    entities. The sector exhibits a very high degree of digital intensity and its operators are
    highly interconnected with other parts of the economy, making them a likely target for
    cyber-attacks. Given the large economies of scale that prevail in the provision of space-
    based services, the sector also exhibits a particularly strong pan-European dimension.
    Furthermore additional subsectors would also be added for the energy sector, and in
    particular: district heating, electricity generation, central oil stockholding entities,
    nominated electricity market operators and electricity market participants providing
    aggregation, demand response or energy storage services, operators of hydrogen
    production storage and transmission128
    , as well as EU reference laboratories and entities
    carrying out research and development activities of medicinal products for the
    healthcare sector.
    Public administration, notably at the level of central government, major socio-
    economic regions and basic regions, would also be added to the NIS scope in this policy
    option, in its function of provider of services to citizens and businesses that are essential
    for the functioning of the internal market. The amended NIS Directive would not apply to
    public administration entities carrying out activities in the areas of the public security,
    law enforcement, defence and national security.
    Mention should be made that, as the cybersecurity threat landscape is constantly
    evolving, it is not possible to exclude sectors from the NIS scope with complete
    certainty. However, those entities that would be excluded from the NIS scope would still
    benefit from the general measures provided by the NIS Directive and the wider
    cybersecurity policy framework. They can receive support and guidance stemming from
    the implementation of the national cybersecurity strategies, the services that national
    CSIRTs provide, guidelines issued by competent authorities, cybersecurity investment
    schemes at national level and the services provided by EU bodies (such as ENISA or the
    European Cybercrime Centre). In addition, market pressure exercised by consumers or
    supply-chain relationships will often force larger operators to put in place measures, even
    if not required by law to do so.
    127
    Idem.
    128
    The strategic vision for a climate-neutral EU envisages hydrogen as an important contributor to the EU
    energy mix by 2050 with a share of 13-14%. This position has been further fostered by the
    Communication “A hydrogen strategy for a climate-neutral Europe” COM(2020) 301). Turning clean
    hydrogen into a viable solution to a decarbonised EU will necessarily demand a dedicated infrastructure
    of key importance for the new EU energy system and economy in general.
    49
    List of all sectors and services to fall within the NIS scope in policy option 2
    In the light of the above, the table below illustrates the sectors and types of services
    that would be covered by the NIS Directive in policy option 2, including both those
    which currently fall within the scope of the NIS Directive and the new ones that would
    be added under this policy option under each category (i.e. OES and DSP).
    Sectors and subsectors for
    the OES currently under the
    scope of the NIS Directive
    which will also remain
    under option 2
    New sectors and
    subsectors for OES
    considered to be added to
    the NIS scope
    Types of
    DSPs
    currently in
    the scope of
    the NIS
    Directive
    New types
    of DSPs
    considered
    to be added
    to the NIS
    scope
    Energy Electricity
    (supply,
    distribution,
    transmission)
    Energy Electricity
    generation
    Online
    marketplaces
    Social
    networks
    Oil (Nominated)
    electricity market
    operators
    Gas Central oil
    stocking
    entities129
    Electricity
    market
    participants
    providing
    aggregation,
    demand response
    or energy storage
    services130
    Operators of
    hydrogen
    production
    storage and
    transmission131
    Transport Air Heat production and
    supply
    Online search
    engines
    Trust
    service
    Rail
    129
    As defined in point (f) of Article 2 Directive 2009/119/EC.
    130
    The inclusion in the NIS scope of electricity market participants as defined by Regulation (EU)
    2019/943 providing aggregation, demand response or energy storage services, as defined by Directive
    (EU) 2019/944 was considered notably due to their importance for the energy sector and the Green
    Deal.
    131
    Communication “A hydrogen strategy for a climate-neutral Europe”.
    50
    Water providers
    Road
    Banking Chemicals (manufacture,
    production and
    distribution)
    Cloud
    computing
    services
    Financial market
    infrastructures
    Food supply132
    Health (healthcare providers) Health EU reference
    laboratories133
    Entities
    conducting
    research and
    development
    activities of
    medicinal
    products134
    Wastewater systems
    Drinking water distribution
    and supply
    Waste management
    Digital
    infrastructure
    Internet
    Exchange
    Points (IXPs)
    Digital
    infrastru
    cture
    Data centres
    Domain
    Name Server
    (DNS)
    service
    providers135
    Content
    Delivery
    Network
    providers
    Top Level
    Domain
    (TLD) name
    registers
    132
    As regards the food sector, food supply is complemented by the sub-subsector of manufacture of food
    products, as explained below in relation to the whole manufacturing sector (footnote 137). Therefore,
    the overall food sector to be covered would concern food production, processing and distribution.
    133
    As defined by Article 15 of the Proposal for a Regulation of the European Parliament and of the Council
    on serious cross-border threats to health, repealing Decision 1082/2013/EU.
    134
    Research and development activities of medicinal products (as defined in Article 1 point 2 of Directive
    2001/83/EC of the European Parliament and of the Council on the Community Code relating to
    medicinal products for human use);
    135
    In this option, the DNS definition would be further clarified and would also specify, among others, that
    root server providers are included in this category.
    51
    Providers of electronic
    communications networks
    or of publicly available
    electronic communications
    services136
    Postal and courier services
    Manufacturing (certain
    subsectors)137
    Public administration138
    Operators of government-
    owned and privately-
    owned ground-based
    infrastructure that support
    the provision of space-
    based services139
    Table 3: sectors, subsectors and services that would fall under the NIS scope under
    policy option 2
    As regards the OES identification process and DSP coverage:
     The OES identification process would remain in place. However, the NIS Directive
    136
    These services would be added to the scope of the NIS Directive and taken out of the scope of the
    cybersecurity-related obligations provided by the European Electronic Communication Code.
    Consequently, the security provisions of the Code (i.e. Articles 40 and 41) would be repealed.
    137
    The subsectors of manufacturing selected were chosen based on the same criteria as those applied to the
    overall selection of new (sub)sectors and services: i.e. existing Member States’ policies covering
    subsectors beyond the scope of the NIS Directive; stakeholders’ views reflected in the results of the
    OPC and the targeted surveys conducted by the NIS review study; sectorial digital intensity; level of
    importance for society of sectors, subsectors and services as revealed by a major crisis such as COVID-
    19; interdependency among sectors. Based on these criteria, the following manufacturing sub-sectors
    would be covered: food products; beverages; basic pharmaceutical products and pharmaceutical
    preparations; medical devices and in vitro diagnostic medical devices (as defined in point 1 of Article 2
    of Regulation 2017/745 of the European Parliament and of the Council on medical devices, and entities
    manufacturing in vitro diagnostic medical devices as defined in point 2 of Article 2 of Regulation
    2017/746 of the European Parliament and of the Council), as well as medical devices considered as
    critical during a public health emergency (according to Article 20 of the Commission Proposal for a
    [Regulation on a reinforced role for the European Medicines Agency in crisis preparedness and
    management for medicinal produces and medical devices (COM92020)725 final); computer, electronic
    and optical products; electrical equipment; machinery and equipment; motor vehicles, trailers and semi-
    trailers; other transport equipment.
    138
    The NIS framework would cover under ‘public administration’ central governments (i.e. all
    administrative departments of the state and other central agencies whose responsibilities cover the
    whole economic territory of a country), as well as the major socio-economic regions (104 in total
    according to the NUTS 2021 classification) and the basic regions for the application of regional policies
    (283 in total according to the NUTS 2021 classification). It can also be considered to include election
    authorities, technology and processes, which are functional for limited periods of time.
    139
    with the exception of specific ground-based infrastructure that directly supports space-based
    components of the EU’s space programme, including Galileo, EGNOS, Copernicus, GOVSATCOM
    and Space Surveillance and Tracking.
    52
    would be amended to harmonise identification thresholds cross-sectors.140
     The DSP coverage rules would remain the same, i.e. there would be no identification
    process for the DSPs.141
    Further clarifications would be introduced in relation to the
    jurisdiction rules142
    .
     Some DSPs (e.g. providing services to OES, such as cloud service providers) would
    be subject to the same regulatory regime as OES: i.e. same security requirements
    and reporting obligations and subject to a fully-fledged supervisory and enforcement
    system. The so-called ‘light-touch’ approach in relation to these DSPs would
    therefore be removed.
    Even with a more inclusive NIS scope under this option, the shortcomings generated by
    the identification process for the entities that need to be covered from a cybersecurity
    perspective would remain. The overall identification system would remain complex,
    engage considerable resources on the part of national competent authorities and would
    not be expected to lead to a notable increase in the number of identified OESs.
    As regards the number and extent of coverage of the entities143
    active in the sectors,
    subsectors and services currently covered by the NIS Directive, in this option it is
    expected for competent authorities to supervise a similar number of operators as the ones
    that are currently identified as OES: i.e.144
    872 OESs in the energy sector, 620 OESs in
    transport (air, water, rail and road), 822 OESs in the drinking water and supply
    distribution sector, 12,469 OESs in the health sector, 411 OESs in the banking sector,
    172 OESs in financial market infrastructures and 173 OESs in digital infrastructure.
    As regards the entities active in the new sectors, subsectors and services considered in
    this option:
     The providers of electronic communications networks or of publicly available
    electronic communications services145
    and trust service providers would be added
    to the amended NIS scope. There are 37,204 telecom providers and 7,775
    programming and broadcaster providers and 190 active qualified trust service
    140
    See also policy option 3 for an assessment of the alternative measure of harmonisation of identification
    thresholds.
    141
    Instead, in this scenario, the definition of certain DSPs (such as IXP providers) would be further
    clarified and adjusted.
    142
    notably on the rules concerning the ‘main establishment’, ‘one legal entity’, as well as the rules
    applicable for DSPs with the main establishment outside the EU.
    143
    The data on the entities active in the (sub)sectors and services covered by or considered for the NIS
    scope are presented in detail in Annex 3. Mention should be made that the data analysed was based
    mainly on Eurostat and DESI data. Similar data was not available across the EU for all (sub)sectors or
    services analysed. Furthermore, the data was often available in aggregate forms which do not always
    entirely match the types of entities defined under the NIS scope, therefore in most cases the overall
    figures represent an overestimate. Whenever systematic data on number of companies and turnover
    were not available, proxies were used to the extent possible, including data or information on market
    structure or market shares. The data and estimates used by this impact assessment provide therefore a
    meaningful, yet not comprehensive overview of the above-mentioned metrics. For the sectors currently
    covered by the NIS scope, a comparison was made with the number of OES notified by the Member
    States by October 2020. For all the data sourced from Eurostat (notably number of companies,
    including medium and large, turnover and average turnover per company), the data used (as the most
    recent available) is from 2018. If specific sources are not mentioned, it should be assumed that the
    source of the data is Eurostat.
    144
    Data based on notifications from the Member States pursuant to Article 5(7) of the NIS Directive.
    145
    Broadcasting services and emergency communication services are also considered under this sector.
    53
    providers operating in 28 of the 31 EU and EEA/EFTA countries.146
     For new sectors considered, the number of entities147
    concerned would be as follows:
    i.e. for manufacture of chemicals and chemical products: 3,845 companies; for
    waste management (waste collection, treatment and disposal activities): 44,189
    companies; for wastewater (sewerage): 10,955 companies; for postal and courier
    services, 89,480 companies; for food supply148
    : 595,233 companies; for
    manufacturing, for 8 selected subsectors (other than chemicals)149
    : 402,851
    companies. Since the OES identification system would still apply, it would be
    expected for the number of OESs eventually identified to be much lower than the
    total number of entities mentioned above. However, the competent authorities would
    still need to process for identification purposes a large number of new entities.
     As regards energy (electricity generation), there are about 3,944 companies
    (representing at least 95% of the national net electricity generation in the EU) and 82
    main electricity generating companies. For heat production and supply, no granular
    data was available on the number of companies. Heating and cooling accounts for
    approx. 46% of Europe’s final energy demand.150
    In EU households, heating and hot
    water alone account for 79% of total final energy use.151
    As regards central oil
    stocktaking, there are 23 entities in Europe. There are 13 nominated electricity
    market operators in Europe.
     Data centres provide different types of services enabling data processing and storage
    (such as colocation or dedicated hosting). Some large companies also operate their
    own data centres. Data centres are also the physical infrastructure used for the
    provision of cloud-based services. This is a highly concentrated market in Europe,
    with Frankfurt, London, Amsterdam and Paris (so-called FLAP) dominating. Market
    players, such as Equinix or Interxion, include global companies, but also medium and
    large firms focusing on the European market. The content delivery networks market
    is also dominated by major providers, non-headquartered in the EU; in 2016, 95 % of
    global CDN traffic for web-based apps was delivered by 10 companies. From the
    perspective of the supervision of entities, in both option 2 and 3, the addition of this
    type of entities is not expected to generate burden, other than the need to further
    clarify the jurisdiction rules for non-EU based players, which would be addressed in
    both options. The same is valid for the social networks, with very few European-
    based providers. Facebook has a market share in social media of over 70% and at
    times over 80% in 2019-2020, followed by Pinterest, Twitter and Instagram with less
    than 12% and other players such as Youtube, Tumblr, Vkontakte with less than 1%152
    2. Security requirements and reporting obligations
    The security requirements and incident reporting obligations for OES would be
    further harmonised via the amendments to the NIS Directive and delegated acts. More
    146
    The European List of Trusted Lists (LOTL), sourced from the Trusted List Browser
    (https://webgate.ec.europa.eu/tl-browser/#/) on 8 September 2020.
    147
    According to Eurostat data corresponding to 2018, as presented in Annex 3.
    148
    The data represent an overestimate, since they also cover wholesale and retail of tobacco, which would
    not be included in the NIS scope in policy options 2 and 3.
    149
    food products; beverages; basic pharmaceutical products and pharmaceutical preparations; computer,
    electronic and optical products; electrical equipment; machinery and equipment; motor vehicles, trailers
    and semi-trailers; other transport equipment.
    150
    https://ec.europa.eu/eurostat/statistics-
    explained/index.php?title=Electricity_and_heat_statistics&oldid=493775#Derived_heat_production
    151
    https://ec.europa.eu/energy/topics/energy-efficiency/heating-and-cooling_en?redir=1
    152
    https://gs.statcounter.com/social-media-stats/all/europe
    54
    clarity would therefore be provided for businesses, competent authorities and CSIRTs,
    creating the premises for an increase in the reporting rates and a better situational
    awareness. More specifically:
     On security requirements, a risk management approach would be applied. The
    amended NIS Directive would provide for a minimum list of basic elements which
    shall be part of the measures that OESs and DSPs must take to prevent and minimise
    the impact of cybersecurity incidents on users and other networks and services. Such
    elements would refer to, among others: risk analysis and information system security
    policies, incident handling, business continuity and crisis management, cybersecurity
    testing, cryptography and encryption, etc. The Commission would be empowered to
    issue delegated acts for further specifying and supplementing these elements.153
    The
    alternative of having more prescriptive security requirements in this policy option
    was discarded at an early stage, since it would have not allowed sufficient flexibility
    to take account of the sector-specific aspects or the fast-pace technological
    advancements.
     On reporting obligations: more precise provisions would be introduced on
    modalities, content and timelines of the reporting process. In particular, the
    amendments to the NIS Directive would clarify the definition of significant incidents
    that must be reported to competent authorities, as well as how these should be
    reported (i.e. timing – within what deadlines – and content of notification – what
    information related to the incident). Furthermore, in this scenario, cyber threats that
    could have likely resulted in a significant cybersecurity incident would also be
    reported. The notification of near misses154
    would be on a voluntary basis. The
    Commission would be empowered to issue delegated acts for specifying and
    supplementing these elements. No other alternatives that would have entailed a
    centralised reporting system at EU level or a mandatory reporting of all events,
    including near missed and vulnerabilities, were considered viable in this policy
    option, since they would have put a disproportionate burden on both businesses and
    competent authorities and would not have been expected to yield more effective
    results in terms of compliance with the notification obligations or cyber resilience.
    3. Supervision and enforcement
    As regards supervision and enforcement:
     On supervision, amendments to the NIS Directive would further clarify the
    principles applicable to the supervisory actions and the typical means through which
    competent authorities would exercise their supervisory powers, without establishing
    minimum requirements in this regard. The amendments to the NIS Directive would
    therefore provide for principle-based requirements for supervisory activities, namely
    the obligation of the Member States to ensure that competent authorities have the
    necessary powers and means to assess compliance with the NIS obligations and that
    they can require the entities under the extended NIS scope to provide any information
    necessary to assess the cybersecurity measures, access to data, documents and/or
    information necessary for the performance of the supervision or evidence of
    implementation of security policies, such as the results of security audits carried out
    by a qualified auditor and the respective underlying evidence.
     On enforcement, the amended NIS Directive would define the main principles and
    elements based on which Member States would establish sanctions (e.g. defining the
    153
    taking account of new cyber threats, technological developments or sectorial specificities.
    154
    events which can potentially cause harm but were successfully prevented from being unfolded fully.
    55
    circumstances to be considered when deciding on types of sanction to apply). In
    particular, the amended NIS Directive would define the circumstances to be
    considered by the competent authorities when establishing sanctions, such as the
    seriousness and duration of the infringement, the intentional or negligent character of
    the infringement, the actual damage caused, the preventive measures put in place to
    mitigate the damage, the level of cooperation with the competent authorities, etc.
    A more prescriptive supervision and/or enforcement system would not have been a viable
    alternative in this policy option, notably since it would have not realistically matched
    the discretion that would still be left to the Member States in determining the entities that
    fall within the NIS scope through a complex identification system.
    In relation to the resources available for the functioning of the competent authorities, the
    NIS Directive would more explicitly require Member States to take the necessary
    measures to ensure that the competent authorities have the technical, financial and human
    resources necessary to fulfil their mandate.
    4. Cooperation and information sharing
    In this option, the amendments to the NIS Directive would:
     encourage Member States to set up information-sharing frameworks or tools, such as
    Information Sharing and Analysis Centres – ISACs (with participation of public
    authorities) or other public private partnerships (PPPs).
     reinforce the Cooperation Group mandate to provide additional tools155
    for the
    support of EU cybersecurity policies and help strengthening capabilities at Member
    State level and across the Union. More specifically, in addition to the activities
    provided in its current mandate, the Cooperation Group would: (i) facilitate the
    exchange of national officials through a capacity building programme, (ii) discuss
    capabilities and preparedness of Member States, (iii) help156
    coordinate the Union
    response to current and emerging policy challenges. An EU cybersecurity
    stakeholders’ forum would be set up to engage regularly with various stakeholders,
    including businesses and associations, and advise on emerging cybersecurity aspects.
     strengthen the CSIRTs network’s mandate to allow, in addition to its current
    mandate, more information sharing, joint actions157
    and assistance among Member
    States to reinforce capabilities. This would include exchange of information on
    vulnerabilities that affect multiple organisations established in more than one
    Member State.
     introduce more specific provisions on the collaboration between the Cooperation
    Group and the CSIRTs network, including on the strategic guidance that the
    Cooperation Group would provide to the network and information flows.
    No other alternative that would have entailed mandatory information sharing systems
    for both businesses and among competent authorities cross-border were considered
    viable in this policy option. This is mainly due to the approach taken in this option
    towards the identification process of OESs, where a large discretion is left to the Member
    States, and the security and reporting obligations (i.e. principle-based rather than overly
    prescriptive), which would not have supported a mandated information sharing.
    Furthermore, in a policy area such as cybersecurity, where trust is a key aspect, it is
    unlikely that mandatory information sharing could force such trust and deliver results.
    155
    including secure information sharing tools.
    156
    trough guidelines, opinions.
    157
    such as: joint investigations, publication of reports, common position on standards’ development.
    56
    As regards crisis management, the CyCLONe network would continue functioning
    strictly on a voluntary basis, as in the baseline scenario, without an established legal basis
    and without established obligations for the Member States in relation to crises
    management frameworks and cooperation at national and EU levels.
    5. Synergies with other related instruments
    In this policy option the application of the lex specialis principle would be clarified. In
    particular, the amended NIS Directive would establish that, in order to contribute to the
    uniform applicability of this provision, the Commission may adopt guidelines.
    More coherence would be achieved between the NIS requirements and the cybersecurity
    requirements concerning providers of electronic communications networks or of
    publicly available electronic communications services. The NIS Directive excludes
    from its security and notification requirements these providers. The cybersecurity aspects
    in relation to these services are regulated, starting December 2020, by the European
    Electronic Communications Code (EECC). Seven Member States added these services to
    the scope of the NIS-related rules. An online survey conducted by ENISA in mid-2020
    addressed the issue of the effectiveness of telecom security legislation.158
    The vast
    majority of respondents found that the EU telecom security legislation is not consistent
    with the NIS Directive, that the national capabilities on telecom security are not
    comparable across the EU and that technically the telecom security requirements are not
    similar across the EU.
    Option 3: Systemic and structural changes to the NIS Directive (new directive)
    This scenario would entail systemic and structural changes to the NIS Directive (through
    a new directive) envisaging a more fundamental shift of approach towards covering a
    wider segment of the economies across the Union, yet with a more focused supervision
    targeting big and key players. It would also streamline the obligations imposed on
    businesses and ensure a higher level of harmonisation thereof, create a more effective
    setting for operational aspects, as well as establish a clear basis for enhanced shared
    responsibilities and accountability of various stakeholders on cybersecurity measures.
    In particular, the following measures are envisaged:
    1. Sectoral scope and coverage of entities
    Additional sectors, subsectors and types of services would be brought under the NIS
    scope, enlarging the fraction of economy covered by the NIS framework, same as
    described above under option 2. The list of sectors and services falling within the NIS
    scope would form part of the revised NIS Directive and can only be supplemented or
    changed by another legislative amendment or review.
    As regards the entities active in the sectors, subsectors and types of services falling
    within the NIS scope, option 3, unlike option 2, would define a clear-cut NIS scope, and
    consequently the requirements stemming from that, focusing on big and key entities, yet
    essential and important for the Member States’ economies and societies. This would
    allow a reallocation of resources for competent authorities to focus on a more pro-active
    approach, monitoring and analysis of new threats, supervisory measures, providing
    support to businesses. This option would also introduce a differentiation among entities
    based on importance and/or criticality, as well as a size cap, to ensure a targeted and
    well-defined NIS scope. More clarity and certainty would have a high potential to ensure
    158
    The respondents to the survey were 27 stakeholders from national telecom security authorities, NIS
    competent authorities or CSIRTs, providers of electronic communications networks or services,
    telecom equipment suppliers or vendors, as well as others.
    57
    a good compliance rate, incentivise cybersecurity investments and foster trust and
    cooperation. These would be achieved as follows:
     The entities falling within the NIS scope would no longer be distinguished on the
    grounds of being operators within an essential sector or a digital service
    provider, as this categorisation has proven obsolete. In practice, OESs are dependent
    on certain digital service providers, such as cloud service providers, which makes the
    latter as important or essential as the former and hence requires a similar regulatory
    regime. Instead, entities would be classified in two categories (i.e. essential and
    important), depending on their importance and/or criticality.
     The revised NIS Directive would provide for a list of sectors and types of services
    where the entities falling within the NIS scope would be ‘essential’, and a respective
    list of sectors and types of services for ‘important’ entities. ‘Important’ entities, as
    opposed to ‘essential’ would be active in sectors, subsectors or provide services
    which are considered of importance for economies and societies, yet not as vital as
    those in the ‘essential’ category. This categorisation takes account of the level of
    criticality of the sector or type of service, and notably the level of dependency of
    other sectors or types of services or interconnectedness between sectors. The entities
    under the NIS scope operating in the sectors which are currently qualified as
    ‘essential’ would by default be considered ‘essential’ in the new NIS framework.
     Both essential and important entities would be subject to the same security
    requirements and reporting obligations. At the same time, this categorisation
    would ensure a fair balance for both competent authorities and entities between
    requirements and obligations on one hand, and the administrative burden stemming
    from the supervision of compliance on the other hand. This balance should be
    guaranteed through a differentiation in the supervisory and penalty regimes
    between these two categories of entities. More specifically: essential entities should
    be subject to a fully-fledged supervision, both ex-ante and ex-post, while the
    important entities would be subject only to ex-post supervision (i.e. reactive and
    without a general obligation to systematically document compliance).
    Table 4 below lists all sectors and services for essential and important entities falling
    within the NIS scope, as it would be provided by the revised NIS Directive in option 3.
    Sectors, subsectors and types of services
    defined by the NIS scope for essential
    entities
    Sectors, subsectors and types of services
    defined by the NIS scope for important
    entities
    Energy Electricity (generation, supply,
    distribution, transmission,
    nominated electricity market
    operators, electricity market
    operators providing
    aggregation, demand response
    or energy storage services)
    Food supply159
    Oil (including central oil
    stocking entities)
    159
    This is complemented by production and processing covered under the manufacturing sector.
    58
    Gas
    Operators of hydrogen
    production, storage and
    transmission
    Heat production and supply Waste management
    Transport Air Postal and courier services
    Rail
    Water
    Road
    Banking Manufacturing (certain subsectors)160
    Financial market infrastructures Chemicals (manufacture, production and
    distribution)
    Health Healthcare providers Digital services Online marketplaces
    EU reference
    laboratories
    Online search
    engines
    Entities conducting
    research and
    development
    activities of
    medicinal products
    Social networks
    Entities
    manufacturing basic
    pharmaceutical
    products and
    pharmaceutical
    preparations161
    Entities
    manufacturing
    medical devices
    considered as critical
    during a public health
    emergency162
    160
    As described under option 2, Table 3, footnote 137.
    161
    Undertakings carrying out the manufacture, production and distribution of substances and articles as
    defined in points (4), (9) and (14) of Article 3 of Regulation (EC) No 1907/2006.
    162
    According to Article 20 of the Commission Proposal for a [Regulation on a reinforced role for the
    European Medicines Agency in crisis preparedness and management for medicinal produces and
    medical devices (COM92020)725 final).
    59
    Wastewater systems
    Drinking water distribution and supply
    Digital
    infrastructure
    IXP providers
    DNS service providers163
    TLD name registers
    Cloud computing services
    Trust service providers
    Data centres
    Content Delivery Network
    providers
    Providers of electronic
    communications networks or
    of publicly available
    electronic communications
    services164
    Public administration165
    Operators of government-owned and
    privately-owned ground-based infrastructure
    that support the provision of space-based
    services
    Table 4: sectors, subsectors and services that would fall within the NIS scope under
    policy option 3
     The identification system for OES would be replaced by uniform criteria for all
    entities (both essential and important): i.e. a size-cap rule166
    would be introduced
    163
    The definition would be further clarified, as mentioned in option 2.
    164
    As in the option 2, the respective provisions of the EECC would be repealed.
    165
    As defined in option 2.
    166
    Medium and large size enterprises as defined by the new NIS legal framework, based on number of
    employees and turnover, according with Commission Recommendation 2003/361/EC of 6 May 2003.
    In particular, the category of medium enterprises is made of enterprises which employ between 50 and
    250 persons and which have the annual turnover and/or annual balance sheet total between EUR 10
    million and 50 million EUR (or, in the case of the balance sheets, up to EUR 43 million). The category
    of large enterprises is made of enterprises which employ over 250 persons and which have an annual
    turnover exceeding 50 million EUR and/or annual balance sheet total exceeding EUR 43 million.
    60
    establishing that all medium and large entities167
    active in the (sub)sectors and
    services covered by the NIS framework would automatically fall within the NIS
    scope. Small and micro enterprises would therefore be excluded from the scope.
    Member States would not be required to establish a list of the entities that meet this
    generally applicable size-related criterion, but they may choose to do so in order to
    facilitate interactions with the entities in scope and supervision.
     While the size-related criterion is not necessarily an ideal stand-alone criterion to
    determine the importance and/or criticality of an entity, it is nevertheless a
    meaningful proxy for determining whether entities play a key role for society and
    economies. Moreover, its aim would be to set a clear-cut directly applicable criterion
    to avoid the complexity that other types of criteria or combination thereof, such as
    number of users relying on a service, dependency on other sectors or maintaining a
    sufficient level of service, generated in the implementation of the NIS Directive. All
    entities fulfilling these criteria would be by default subject to the requirements set out
    by the NIS framework. 67% of the competent authorities responding to the NIS
    review study survey considered that the general obligation for all entities above a
    certain size to implement security requirements and report incidents could improve
    the current identification system.
     In the early stages of the NIS review process, the alternative of setting up of
    harmonised sector-specific thresholds was considered. Such alternative was
    however considered not viable and discarded at an early stage. This is because it
    would be partially perpetuating the status quo, where Member States establish their
    own thresholds for the identification of operators of essential services, many of which
    are sector-based. Such an alternative would not be compatible with the discarding of
    the current complex identification process and would likely lead to lengthy
    negotiations on thresholds where the views may differ considerably among Member
    States.
     In order to ensure that small or micro entities which are nevertheless of critical
    importance for the societal or economic activities are not left out of the NIS scope,
    exceptions to the size-cap rule would be established. These would be as follows: (i)
    absence of alternative service providers in a Member State (i.e. operators that are the
    sole providers of a service in a given Member State), (ii) the impact that a potential
    disruption could have on public safety, security or health168
    , (iii) Member States
    would be allowed to include in the NIS scope micro or small entities active in the
    sectors and services covered by the NIS framework justified on the basis of their
    specific importance at regional or national level for that particular sector or type of
    service or for other interdependent sectors or services, (iv) a potential disruption of
    the service provided by the entity could induce systemic risks, in particular for the
    sectors where such disruption could have a cross-border impact, (v) the entity is
    identified as a critical entity or as an entity equivalent to a critical entity in
    accordance with the Directive on the resilience of critical entities. Member States
    would be responsible for determining which small or micro entities meet these
    criteria and submit to the Commission the lists of such entities every two years. The
    Commission may adopt guidelines, in cooperation with the Cooperation Group, on
    the application of the above-mentioned criteria for exceptions to the size-cap rule.
    Furthermore, operators and providers of electronic communications networks and
    167
    As defined by the Commission Recommendation 2003/361/EC of 6 May 2003.
    168
    Term to be defined in the new NIS directive that would nevertheless imply a certain analysis from the
    national competent authorities on a case by case basis.
    61
    services or the trust service providers would be excluded from the size cap rule, given
    that these entities, including micro and small, are already applying high standard
    cybersecurity measures according to their respective regulations.169
    Top–level domain
    name registries and domain name system (DNS) service providers would also be
    excluded from the size-cap rule.
     In order to ensure a clear overview of all essential and important entities providing
    digital services of cross-border nature, ENISA would hold a registry thereof. The
    entities in question would be under the obligation to notify themselves to ENISA
    following a clear template or, alternatively, ENISA could establish the registry based
    on own research and/or in cooperation with the competent authorities. This option is
    therefore expected to lead to a more conclusive overview of the digital services, also
    because it would allow a more effective supervisory regime, while also better
    considering the interdependencies between OESs and DSPs.
    In this policy option, the number and extent of coverage of the entities active in the
    sectors, subsectors and services currently covered by the NIS Directive would indeed
    increase as compared to the current OES identification-based system. However, the
    application of the size-cap rule would ensure a focus on a number of companies which
    could be subjected to effective supervision and prioritisation by competent authorities.
    This would concern:
     3,099 companies for electricity and gas supply170
    , 380 for water transport, 228
    for air transport, 450 for rail transport, 870 for water collection, treatment
    and supply.
     For banking and financial market infrastructure, the number of entities that
    would be covered by default would be higher in particular for banking (6,088
    banks, of which approx. 3,500 medium and large) and less considerable for
    financial market infrastructures (350 entities, as compared to 172 OES identified).
    However, the banking and financial market infrastructure sectors would be
    covered in the future as lex specialis by the DORA.
     In the health sector, estimates indicate approximately 13,200 hospitals in
    Europe171
    . There are no available data on the number of medium and large
    hospitals. The total number of hospitals cannot however be compared with the
    number of currently identified OESs in the healthcare system (i.e.12,469). This is
    because about 87% of the number of identified OESs comes from the same
    Member State which identified every single healthcare provider172
    in the country,
    no matter the size, thus illustrating once more the deep divergence in the
    identification approaches at Member States level. In option 3, with the application
    of the size cap, this number is expected to considerably decrease. At the same
    time, additional medium and large hospitals in other Member States that currently
    were not identified as OES would be added to the NIS scope. The overall
    resulting number is however expected to be lower than the couple of thousand
    ranges.
    169
    i.e. the European Electronic Communications Code (Articles 40 and 41) and the eIDAS Regulation
    (Article 19).
    170
    To note that these aggregate data also include energy generation companies, which are currently not in
    the NIS scope and are considered under policy options 2 and 3.
    171
    2.6 hospitals for 100,000 inhabitants estimated in Europe in 2015: https://hospitalhealthcare.com/latest-
    issue-2018/hope-2018/hospitals-in-europe-healthcare-data-9/
    172
    hospitals and doctors’ cabinets.
    62
     For digital infrastructure, options 3 does not appear to bring considerable
    changes in terms of coverage of entities. In particular, 173 such entities were
    identified as OES by the Member States, while there are: 28 major country-code
    top-level domain (ccTLD)173
    ; 140 IXPs174
    (with one company usually
    administering several IXPs); for authoritative DNS resolution: two root name
    servers175
    , 28 major ccTLD entities176
    and a large number of domain name
    registrars and web hosting companies177
    , and for recursive DNS resolution: DNS
    resolvers provided by most internet service providers178
    and by third parties,
    mostly large global technology companies located outside the EU.
     As regards digital service providers, the changes brought by policy options 2 and 3
    would not be that significant in terms of scope of entities. This is notably given that
    the size cap rule already applies to these providers in line with the current NIS
    Directive.
     For online search engines, the market in Europe is dominated by one player,
    Google, which has over 90% of the general search market in Europe179
    , followed
    at a big distance (i.e. less than 3% share of general search market) by Bing and
    few European-based companies, such as Seznam in Czechia or Qwant in France.
     For online marketplaces, certain estimates indicate about 7,000 marketplaces in
    Europe180
    , yet the number of medium and large marketplaces that would be
    covered in option 3 was estimated at a much lower level, i.e. about 120.181
     According to the 2020 Digital Economy and Society Index (DESI)182
    , in 2018,
    26% of European enterprises purchased cloud computing services and
    incorporated cloud technologies. Among the enterprises that used cloud
    computing services, 55 % were ‘highly dependent’.183
    Some estimates indicate
    about 1,700184
    cloud service providers in Europe. Overall, there are only few
    large companies on the European market: Amazon185
    , Microsoft, Google and
    173
    one in each Member State plus EURid, which administers .eu
    174
    Referenced for 2020. The 140 IXPs are located in the EU, with some being of global importance.
    175
    providing authoritative DNS resolution for the root zone, located in the Netherlands and Sweden.
    176
    The ccTLDs of the 27 Member States (such as .de, .fr or .pl) and of the European Union (.eu), but not
    counting regional ccTLDs, such as .ax of Åland Islands (Finland). These provide authoritative DNS
    resolution for their respective TLD namespaces.
    177
    offering authoritative DNS resolution as part of their domain registration services.
    178
    As part of the internet access arrangement. See the data on electronic communication networks and
    services.
    179
    Netmarketshare.com.
    180
    Commission estimate of 2019: https://ec.europa.eu/commission/presscorner/detail/en/IP_19_1168
    181
    Conservative estimate based on a sample of marketplaces for a competition-related sector inquiry
    conducted by the Commission in 2015-2017: REPORT FROM THE COMMISSION TO THE
    COUNCIL AND THE EUROPEAN PARLIAMENT Final report on the E-commerce Sector Inquiry,
    COM(2017) 229 final and SWD(2017) 154 final:
    https://ec.europa.eu/competition/antitrust/sector_inquiry_swd_en.pdf
    182
    https://ec.europa.eu/digital-single-market/en/integration-digital-technology
    183
    At the two extremes, the majority of enterprises in the manufacturing sector (51 %) belonged to the
    upper-medium dependence group, while the majority in information and communication (71 %)
    reported using advanced services and hence belonged to the high dependence group.
    184
    There is no precise estimate of the number of European cloud service providers, only estimates such as
    this one by business information platforms: https://www.crunchbase.com/hub/europe-cloud-computing-
    companies
    185
    Biggest player in France, Germany, the UK and the Netherlands.
    63
    IBM.186
    OVH (the largest European Cloud Service Provider) gets less than 1% of
    total revenues generated in this market.
    As regards the entities active in the new sectors, subsectors and services considered in
    this option:
     For providers of electronic communications networks or of publicly available
    electronic communications services187
    , this option would cover all entities,
    irrespective of the size. This represents an exemption from the size cap rule, due to
    the fact that it is a highly regulated sector, now through the European Electronic
    Communication Code, already implementing a high level of security standards.
    Excluding micro and small providers from the NIS scope may negatively impact
    these existing standards. Given that the level of cybersecurity capabilities of these
    entities is expected to be rather high already, including on documentation of
    compliance with security requirements, the supervision is not expected to bring a
    notable burden to the competent authorities. Similarly, trust service providers would
    be exempted from the size cap rule, given that within the eIDAS framework, some
    security standards are already implemented; indeed, excluding micro and small
    providers from the NIS scope may negatively impact these existing standards.
     For new sectors considered, the number of entities (medium and large) concerned by
    this policy option 3 would be as follows: i.e. for manufacture of chemicals and
    chemical products: 3,193 companies; for waste management (waste collection,
    treatment and disposal activities): 2,616 medium and large companies; for
    wastewater (sewerage): 473 medium and large companies; for postal and courier
    services, 869 medium and large companies; for food supply188
    : 5,303 medium and
    large companies; for manufacturing, for 8 selected subsectors (other than
    chemicals)189
    : 30,942 medium and large companies. For these new sectors, even with
    the application of the size cap rule, would determine competent authorities to
    establish supervisory strategies and prioritise supervision activities.
     As regards energy subsectors, data centres, content delivery networks and social
    networks, the data presented and explained under policy option 2 would also be
    applicable here.
    2. Security requirements and reporting obligations
    Uniform security requirements and incident reporting obligations for all essential and
    important entities would be established, same as in option 2. Furthermore, as in option 2,
    the Commission would be empowered to issue delegated acts for specifying and
    supplementing the elements established by the NIS framework. In addition:
     As part of the security requirements, in particular the risk assessment obligations,
    entities would need to demonstrate how they assessed supplier-specific risks and how
    they have mitigated them. This would include security elements concerning supplier
    relationships, including providers of data storage and processing services. Entities
    would therefore be asked to assess and take into account the overall quality of
    186
    Salesforce, Rackspace and Oracle are global providers that are further down in the country rankings,
    with Salesforce ranking fifth overall across Europe. European players such as OVH, Enter, Aruba,
    Outscale and Fabasoft do not grasp any significant market shares globally.
    187
    Broadcasting services and emergency communication services are also considered under this sector.
    188
    The data represent an overestimate, since they also cover wholesale and retail of tobacco, which would
    not be included in the NIS scope in policy options 2 and 3.
    189
    food products; beverages; basic pharmaceutical products and pharmaceutical preparations; computer,
    electronic and optical products; electrical equipment; machinery and equipment; motor vehicles, trailers
    and semi-trailers; other transport equipment.
    64
    products and cybersecurity practices of their suppliers and service providers. This
    could be documented by results of checks and audits. To assist entities to
    appropriately manage supply chain and supplier-related cybersecurity risks, the
    Commission, in cooperation with the Cooperation Group and ENISA, would carry
    out sectoral supply chain risk assessments with the aim of identifying per sector
    which are the critical ICT services, systems or products, relevant threats and
    vulnerabilities. Based on this analysis, the Commission may issue recommendations
    on how these risks could be addressed.
     An obligation would be introduced for SPOCs to provide a monthly summary
    incident report to ENISA, including anonymised and aggregated data on
    cybersecurity incidents, near misses, significant cyber threats and vulnerabilities. The
    monthly reporting of summary of incidents, significant cyber threats and
    vulnerabilities by the SPOCs would not be expected to impose a notable burden on
    the latter since they would pass on readily available data in an anonymised
    aggregated format, while at the same time a monthly input to ENISA would allow a
    timely assessment of taxonomy of incidents and level of threats; this would facilitate
    timely information sharing across Member States. ENISA would also provide
    technical guidance for such reporting.
     A new rule would be introduced to simplify the compliance burden for entities falling
    under the scope of other EU legislation in terms incident reporting. Depending on
    whether personal data is compromised or not and whether a data breach poses a risk
    to the fundamental rights and freedoms of the natural persons, a security incident
    under the NIS Directive might trigger additional reporting obligations for the entities
    under another EU legislation (i.e. under the GDPR or the ePrivacy Directive). This
    multiple reporting is perceived as an unnecessary compliance burden for all entities
    concerned. In order to simplify the process and release the companies from this
    excessive burden, the revised NIS Directive would encourage Member States to
    create a single entry point for notifications concerning security breaches
    stemming from the NIS Directive, the General Data Protection Regulation and the
    ePrivacy Directive. In addition, ENISA, in cooperation with the NIS Cooperation
    Group and the Commission, would develop common templates by means of
    guidelines that would simplify and streamline the reporting information requested by
    the different EU legislations.
    In this policy option, the alternative of imposing a centralised reporting obligation for
    entities at European level was not considered viable. This is mainly because it would
    have put a disproportionate burden on companies, which would have had to report
    incidents at both national and European levels, while the technical aspects of setting up
    such a system and its potential to lead to effective results and ultimately an improvement
    of the cyber resilience levels for companies across the Member States were unclear.
    As regards the Member States’ capabilities, this option would reinforce the active role
    of competent authorities and CSIRTs, which may trigger a prioritisation of resources at
    national level.
    3. Supervision and enforcement
    This option would put supervision at the heart of the tasks of the competent authorities
    and set a coherent framework for all supervisory activities across Member States.
    Moreover, a minimum list of sanctions for breach of the NIS obligations would be
    provided, setting a clear consistent framework for sanctions across the Union. A
    minimum for the maximum level of administrative fines linked to the turnover is
    expected to further ensure dissuasiveness. A rule of liability of natural persons holding
    65
    representation positions/roles would also be introduced to ensure real accountability for
    cybersecurity policies at organisational level. A strengthened supervision and
    enforcement framework, setting up certain minimum requirements, may lead to better
    reporting of incident rates that could also have an impact of detection of data breaches.
     On supervision, the revised NIS Directive would provide for a minimum list of ex
    ante and ex post supervisory actions and means through which competent authorities
    could exercise their supervisory powers (e.g. conduct and/or order regular and
    targeted audits, on-site and off-site checks, type of evidence and information the
    entities are bound to provide upon request). In addition, there would be a
    differentiation of supervisory regime between essential and important entities.
    Thus, essential entities will be subject to a fully-fledged supervisory regime (ex-ante
    and ex-post), while important entities will only be subject to a light supervisory
    regime, ex post only, which would put less burden on both companies and competent
    authorities. For the latter, this would mean that important entities would not have to
    systematically document compliance with the security requirements, while competent
    authorities would implement a reactive ex post approach to supervision190
    and hence
    would not have a general obligation to supervise these entities.
     On enforcement, in addition to what is envisaged by option 2, the new NIS legal act
    would establish a list of administrative sanctions (e.g. binding instructions, order to
    implement the recommendations of a security audit, designation of a monitoring
    officer, administrative fines), that Member States should provide for in national
    law.191
    In terms of type of applicable penalties, the new NIS legal act would set the
    Member States’ obligation to provide for administrative fines192
    among the applicable
    sanctions for essential entities, with a maximum of at least 10,000,000 EUR or 2% of
    the total worldwide annual turnover of the preceding financial year, whichever is
    higher.193
    The revised NIS Directive would also require Member States to take
    account of the particular circumstances of each case when triggering liability and
    applying sanctions for non-compliance (e.g. the seriousness and duration of the
    infringement, the intentional or negligent character of the infringement, the actual
    damage caused, the preventive measures put in place to mitigate the damage, the
    level of cooperation with the competent authorities, etc.)
     In relation to entities which are not established in the Union, but provide services in
    the Union, the revised NIS Directive would clarify that any Member State in which
    the entity provides services may take legal actions against the entity for non-
    compliance with its NIS-related obligations.
     The liability of the natural person(s) responsible for or acting as a representative
    of the legal person for potential violations of the NIS legal framework would be
    introduced.
    190
    As explained in section 1.1., with this approach, DSPs do not have to gather evidence on the
    implementation of security policies and the competent authorities should have no general obligation to
    supervise DSPs, thus discouraging a pro-active approach from the latter.
    191
    e.g. issue binding instructions or an order to remedy the deficiencies, order to implement the
    recommendations of a security audit, designate a monitoring officer, impose or request the imposition
    of administrative fines, etc.
    192
    The harmonised level of minimum administrative fines considered the newest legislative trends in some
    Member States and the provisions of related EU legislation, notably GDPR.
    193
    where the legal system of the Member State does not provide for administrative fines, the respective
    provisions may be applied in such a manner that the fine is initiated by the competent authority and
    imposed by competent national courts, while ensuring that those legal remedies are effective and have
    an equivalent effect to the administrative fines imposed by competent authorities.
    66
    In this option, unlike policy option 2, the more prescriptive approach towards supervision
    and enforcement is matched by the clear-cut scope by sectors and entities established by
    the revised NIS Directive and through a generally applicable rule. However, the
    alternative of establishing a centralised European supervision system was considered
    non-viable for the NIS framework, as it would have been disproportionate and would not
    have allowed Member States to adapt the supervision to their national context and legal
    order.
    A peer review mechanism would be introduced, allowing the assessment by experts
    designated by the Member States of the implementation of cybersecurity policies,
    including the level of Member States’ capabilities and available resources.194
    The peer-
    review findings would not be binding on the Member States. An alternative considering
    mandatory conclusions of the peer-reviews would go counter to the nature of the
    mechanism which aims at gradually building trust and encouraging exchanges of
    practices and well-informed advice among Member States.
    This option has potential to contribute more visibly to improving and levelling the
    Member States’ capabilities, mainly through the peer-review and the mutual assistance
    mechanisms, which could ensure peer pressure for a comparable level of financial,
    technical and human resources across Member States.
    4. Cooperation and information sharing
    In this option, a clear-cut mandatory mutual assistance mechanism would be set up for
    cross-border cases. The observatory role of ENISA for the state of cybersecurity in the
    Union would be enhanced, expected to help bringing together the capabilities of Member
    States and creating the premise for enhanced information sharing among Member States.
    The Cooperation Group would organise regular joint meetings with various stakeholders,
    including businesses, to exchange views and gather relevant input on emerging policy
    challenges in the area of cybersecurity. In option 3, the introduction of a cybersecurity
    crisis management framework would institutionalise the existing efforts for operational
    cooperation in times of crisis. More specifically:
     As regards cross-border cooperation and information sharing for competent
    authorities and private actors, in option 3, the new legal act, in addition to what
    was described in option 2, would:
    o introduce provisions on cross-border cooperation and mutual assistance
    (including on cross-border dependencies) and notably: (i) information sharing
    and consultation on supervisory and enforcement measures; (ii) possibility of a
    Member State requesting supervision in another Member State; (iii) obligation
    of a Member State to provide cross-border assistance to another Member State;
    (iv) voluntary joint supervisory action.
    o require Member States to develop a common policy framework on co-
    ordinated vulnerability disclosure and designate a national CSIRT as a
    coordinator and facilitator at national level. ENISA would maintain a registry
    for all notified newly discovered vulnerabilities with their characteristics.
    194
    The reviews shall be conducted by cybersecurity experts coming from different Member States than the
    one reviewed and shall cover at least the following aspects: (i) the effectiveness of the implementation
    of the security requirements and reporting obligations; (ii) the level of capabilities, including the
    available financial, technical and human resources, and the effectiveness of the exercise of the powers
    pertaining to national competent authorities; (iii) the operational capabilities and effectiveness of
    CSIRTs; (iv) the effectiveness of cross-border cooperation; (v) the effectiveness of the information-
    sharing framework.
    67
    o require Member States to develop a common policy framework addressing the
    cybersecurity in the supply chain for components used by essential entities,
    including the development of an assistance mechanism for the purchase of
    cybersecurity solutions by public buyers.
     A more operational-oriented approach would be introduced to include specific
    provisions on crisis management at both national and EU level. Indeed, a
    cybersecurity crisis management framework would be built in the NIS framework. At
    national level, Member States would be required to designate competent authorities,
    set out specific plans and identify national capabilities, assets and procedures that can
    be deployed in case of cross-border cyber crisis. At EU level: CyCLONe’, stemming
    from the application of the Blueprint Recommendation, would be institutionalised.
    An EU cybersecurity crisis management framework, incorporating CyCLONe for the
    operational exchanges, would be established.
     ENISA, with support from the Commission, would act as an observatory of the state
    of cybersecurity in the Union. This may entail, among others: (i) gathering regularly
    relevant data and information; (ii) publishing, with support from the Commission, a
    regular report (biennial) on the state of cybersecurity in the EU; (iii) establishing and
    holding a cybersecurity index.
    5. Synergies with other related instruments
    This option is expected to ensure further coherence with other legal instruments, notably
    given the additional clarifications of certain principles and legal concepts, in combination
    with the extension of the scope of application and the focus on key entities. As in option
    2, this policy option would also bring clarifications to the application of the lex specialis
    principle and it would bring under the scope of the NIS Directive the trust service
    providers and the providers of electronic communications networks or of publicly
    available electronic communications services, thus ensuring simplification and more
    coherence. The revised NIS framework in all policy options would also observe
    implementing powers that have been conferred to the Commission and which could be
    used to specify sectoral cybersecurity requirements.
    Considering the wide sectoral scope, combined with streamlined security requirements
    and a more effective supervision system, the likelihood of the need to establish other
    potential cybersecurity requirements in sector-specific instruments is expected to be
    slightly reduced as compared to the other policy options.
    As regards the synergies with the review of the ECI framework, as explained under the
    baseline scenario, this would set out minimum requirements to address non-cyber threats
    for operators defined as critical. This approach is also maintained with the introduction of
    ‘essential’ and ‘important’ differentiation among NIS entities. Furthermore, in this policy
    option, Member States would be required to ensure that their cybersecurity strategies
    provide for a policy framework for enhanced coordination between the competent
    authority under the NIS Directive and the Directive on the resilience of critical entities in
    the context of information sharing on incidents and cyber threats and the exercise of
    supervisory tasks. Moreover, in order to promote strategic cooperation and exchange of
    information at a Union level, this policy option would establish that the NIS Cooperation
    Group would meet on a regular basis and at least once a year with the cooperation body
    under the Directive on the resilience of critical entities, the Critical Entities Resilience
    Group.
    68
    6.2. Options discarded at an early stage
    Option 1: Non-legislative measures to align the transposition of the NIS Directive
    This option was discarded at an early stage, on the grounds that it would not substantially
    differ from the status quo. The only notable difference would consist of the use of the
    Commission’s incentivizing and guiding role through the issuing of guidelines and/or
    recommendations on some of the most problematic issues that have met a divergent
    implementation so far and led to fragmented approaches.
    However, the same ‘soft’ outcome would most likely be ensured by further guidance
    issued by the Cooperation Group within its existing mandate. The guidance and reference
    documents that the Cooperation Group issued so far on some of these matters that
    encountered divergent practices (e.g. OES identification, incident notification, security
    requirements for OES) did not prove sufficient to address the most serious discrepancies
    in the implementation of the NIS Directive. Furthermore, the Cooperation Group has
    already issued reference documents on aspects such as the consultation process in cases
    with cross-border impact.195
    However, this did not lead to an increase in the number of
    such cross-border consultations (section 2.1.3). The Commission also formulated
    recommendations in its 2019 Report on the identification of OES. However, these have
    not generated any significant change in the direction of further alignment of approaches
    or a more conclusive coverage of OESs across Member States. (section 2.2.2.)
    Furthermore, ENISA continues to develop guidelines and make good practice known on
    a wide range of technical aspects. In the current setting, the Commission may also
    develop and publish recommendations, reports and guiding principles, following
    consultation with relevant stakeholders.
    Overall, the consultations held as part of the NIS review process, including the results of
    the targeted surveys of the NIS review study, as well as the open public consultation,
    have shown that all relevant categories of stakeholders support a change in the status quo
    on key aspects of the NIS Directive, such as the OES identification process or incident
    notifications, which would require legislative solutions. For example, a significant share
    of the OPC respondents found that the current NIS Directive’s approach does not ensure
    that all relevant OESs are identified across the Union (37.4% disagreed and 6.3%
    strongly disagreed). In relation to incident notifications, 56% of the competent authorities
    and 53% of the OESs responding to the NIS review study survey considered to a great or
    moderate extent that the notification obligations should be better streamlined. See Annex
    6 for a selection of the results of the targeted surveys and Annex 2 for the OPC results.
    In addition, as highlighted in section 6.2., a number of potential alternatives to various
    areas of intervention within the policy options have been discarded at an early stage and
    considered non-viable.
    Complementarity between the NIS review and the review of the framework for the
    European critical infrastructure: The Commission is also preparing, in synergy with the
    review of the NIS Directive, a review of the Directive on the identification and
    designation of European critical infrastructures196
    (hereinafter called ‘the ECI
    Directive’), with a view to adopt a proposal by the end of 2020. The aim of the latter is to
    195
    Identification of Operators of Essential Services - Reference document on modalities of the consultation
    process in cases with cross-border impact, available here: https://ec.europa.eu/digital-single-
    market/en/nis-cooperation-group
    196
    Council Directive 2008/114/EC of 8 December 2008 on the identification and designation of European
    critical infrastructures and the assessment of the need to improve their protection, OJ L 345,
    23.12.2008, p. 75–82.
    69
    enhance the physical protection and resilience of critical infrastructure against threats
    such as terrorism or natural disasters. Even if the two initiatives are complementary, in
    the NIS review context the option of addressing the resilience of critical (physical)
    infrastructures and that of the network and information systems underpinning essential
    services in a single legislative framework, was not considered. This is because the nature,
    material scope and specific objectives of the two initiatives are different. The NIS
    framework focuses on cybersecurity aspects, covering a wide sectoral base, including
    also digital services. The ECI framework aims at ensuring a more targeted cross-sector
    protection mainly focused on responding to non-cyber risks. Furthermore, unlike
    cybersecurity requirements, the security requirements for critical infrastructures in terms
    of non-cyber threats have to remain general in nature. This is because security measures
    are to be defined by the operators themselves –with the support and oversight of relevant
    authorities, to reflect the specificities related to the type of infrastructure, its location or
    the relevant threats.
    7. WHAT ARE THE IMPACTS OF THE POLICY OPTIONS?
    This section analyses the economic, environmental and social impact of the options, as
    well as then effectiveness vis-à-vis the specific objectives set out in section 5.2., in line
    with the Better Regulation Guidelines, together with the coherence with other policies
    and the views of stakeholders.
    7.1. Economic impact and efficiency
    Private sector/industry
    In order to determine the potential impact of the policy options on businesses, the impact
    assessment considered the following steps: (i) determining the coverage of the entities
    active in the current and future sectors, subsectors and types of services that would fall
    within the NIS scope in policy options 2 and 3; (ii) estimating the average costs
    calculated as percentage of ICT security spending out of ICT spending and total revenue
    per sector and the likely evolution thereof; (iii) estimating costs and benefits at the level
    of organisations. The particular economic impact on SMEs is also being analysed.
    There are currently no available data comparable across the EU to measure the return of
    security investment (ROSI) at the level of companies across sectors or per sector. While
    there are some models for the calculation of the returns of investment and in particular
    security metrics or cyber threat metrics, there is an overall absence of consistent data
    based on real cases that could support such metrics.197
    This is acknowledged by further
    research.198
    The ROSI model finds that the optimal level of security is reached when the
    cost of security measures equals the costs of security breaches. 199
    197
    When it comes to cybersecurity metrics, although there appears to be a wealth of such metrics, some
    listing hundreds, ‘challenges still remain in the calculation of proper values of risk metric variables.
    […] At the moment, companies use different techniques to evaluate internal costs arising from security
    incidents. […]’ Furthermore, network externalities and security interdependency renders this task even
    more difficult. In the same vein, the July 2020 JRC Report ‘Cybersecurity – Our Digital Anchor’ states
    that, ‘while organisations invest a lot of money and human capital in enforcing and strengthening their
    cybersecurity, there is still no globally accepted and standardised way of measuring it. According to a
    2019 Court of Auditors’ report, this makes it difficult to decide which investments have resulted in a
    safer organisation. […]’
    198
    Security Metrics and Security Investment Models, Rainer Boehme, International Computer Science
    Institute, Berkeley, California, USA;
    199
    The report of March 2015 on the ‘State-of-the-art of the Economics of Cyber-security and Privacy:
    IPACSO – A Coordination Action under the FP7 DG CNECT Trustworthy ICT Program, deliverable
    D4.1; delivered in the context of the EU-funded Coordination and Support Action (CSA) project aimed
    at supporting Privacy and Cyber-security innovations in Europe..
    70
    As stressed by the IPACSO report, the main objective of cybersecurity investments is to
    reduce the risk of security breaches, while at the same time reducing in variability of
    potential losses from cybercrime. In this context, the limited information available on
    estimated cost-benefits, trade-offs and the budgetary constraints often have negative
    effects on the decision to invest more at the level of an organisation. At the same time,
    literature has shown that cybersecurity investments are primarily of cost-saving nature as
    compared to other measures that improve revenues.200
    Research indicated that companies
    often rely on reactive investment strategies when it comes to cybersecurity rather than
    proactive, as it is often more efficient to rely on proven existing technologies and be able
    to quickly implement patches and beef up security after breaches occurred.201
    The IPACSO report points to the following typical costs and benefits, while stressing that
    the tangible benefits of cybersecurity investment are very difficult to estimate.
     Costs: personnel costs (e.g. set up of new in-house teams), purchase cost
    (hardware, software, consultancy services), administrative costs, opportunity
    costs, in-house R&D.
     Benefits: decrease in security incidents & cybercrime losses; reduction in costs of
    liability for breaches; increase in trust of customers; increase in company
    reputation; protection from unfair competition (industrial espionage); reduction in
    switching of disgruntled customers to competitors; increase in compliance.
    The analysis below would therefore consider these typical costs and benefits. There is no
    available comparable economic data to measure the actual impact of the NIS Directive on
    the costs and benefits of the companies active in the sectors and subsectors or providing
    services under the NIS scope202
    . Given these lacunae, the analyses of economic impact
    and efficiency under all policy options, including the baseline scenario, would refer to
    widely accepted qualitative indicators for assessing the costs and benefits of various
    cybersecurity measures, along the lines described above, quantitative estimates or
    assumptions, and information gathered through the NIS review country visits or the
    consultations held in this process with the relevant stakeholders.203
     Coverage of the entities active in the current and future sectors, subsectors and
    types of services that would fall within the NIS scope
    In option 3, approx. 110,000 entities (i.e. medium and large) would be covered under the
    NIS scope (i.e. summing up the available data provided in Annex 3, tables 1 and 2). Of
    these, based on the available data detailed in Annex 3, approx. 67,000 would be essential
    entities and approx. 43,000 important entities. In option 2, while no size filter would be
    200
    An additional challenge are the direct and indirect costs entailed by cybersecurity expenditure. The
    direct costs and benefits concern the company which makes the cybersecurity investment as such, while
    the indirect costs and benefits concern other market players, for example, in the value chain, the
    investment of a company in a secure system indirectly affects positively the security of other connected
    companies and services (network externalities).
    201
    IPACSO Report, page 12, reference to a study of the Research Triangle Institute in 2006 in the US.
    202
    An ongoing study commissioned by ENISA and implemented by Gartner aims at providing such
    specific costs and benefits estimates corresponding to the impact of the NIS Directive. The first
    preliminary results of this study are expected to be published in December 2020.
    203
    While the overall methodological approach of the EU Standard Cost Model set out by the Better
    Regulation tools was taken into account in the assessment of costs and benefits, it was not possible to
    provide precise estimates per organisation of a level of granularity going up to precise price per action,
    value of additional equipment needed, costs of outsourced services, etc. The analysis below provides
    average cross-sector estimates, notably linked to estimates of average ICT security spending and FTEs.
    More granular estimates are possible due to the considerable cross-sector and cross-sector differences,
    as well as in the level of cybersecurity maturity and resources of organisations.
    71
    applied, the identification process will be maintained, hence the Member States will
    retain the discretion to identify the operators of essential services falling within the NIS
    scope. In options 0 and 1, the number of OESs is not expected to considerably increase
    from today (i.e. 15,519 based on the Member States’ notifications until the beginning of
    October 2020). Updated notifications are currently being submitted by the Member
    States to the Commission204
    , indicating a potential increase of the overall number of
    OESs from 2018 until end 2020 of approximately 3,600 OES.
     Estimated cumulated costs of the policy options translated in the overall level of
    ICT security spending and investment – i.e. impacts triggered by the NIS scope
    The level of investment in ICT security is estimated by Gartner on an annual basis.
    Based on Gartner’s regular forecasts from 2012 up to 2020 of the percentage of global
    ICT security spending out of ICT spending and total revenues, as well as taking account
    of the latest sector-specific Gartner data available to the Commission205
    , an assumption
    was made for the purposes of this impact assessment that the average ICT security
    spending per sector in 2020 is of approx. 9.14% of the ICT spending. Depending on
    the level of cybersecurity maturity and capabilities of the sector, as well as the level of
    digitalisation, an adjustment of +/-3% could be made to this average. Furthermore, the
    average ICT spending per sector is estimated to approximately 5.69% of the total
    turnover and hence the average ICT security spending of the total turnover per sector
    in 2020 is estimated to approx. 0.52%. For more details on the methodology aspects in
    relation to the average estimates above, see Annex 3.
    The above-mentioned estimates used as a basis for this impact assessment are however
    conservative. A study on NIS investments commissioned by ENISA and implemented by
    Gartner (hereinafter called ‘the NIS investments study’)206
    indicates a lower level of ICT
    security spending in Europe, of about 6% of the ICT budget since 2016, with the banking,
    financial services and pharmaceuticals organizations having a ratio higher than 5%, while
    sectors like transport, education and retail would have the lowest such ratios, below 2.5%.
    Indeed, some sectors or services have a more significant or faster growth of ICT security
    investment than others. For example, according to 2020 Gartner estimates and forecast, 8
    of 10 cybersecurity markets are projected to grow faster than the market average,
    with cloud security growing the fastest.207
    In the banking sector, a survey by Deloitte
    and FS-ISAC208
    shows that, on average, banks, insurers, investment management firms
    and other financial services companies spend between 6% and 14% of their ICT budget
    on cybersecurity, with an average of 10%. Another survey by Deutsche Bank on cyber
    security spending by financial institutions 209
    found that, on average, around 10% of
    financial institutions are below the 6%-14% range mentioned above.
    For options 2 and 3, for the new sectors, subsectors and types of services, new
    compliance costs stemming from the NIS obligations would be borne. The NIS review
    204
    Data still incomplete at the time of the writing of this Impact Assessment report.
    205
    i.e. data available in the impact assessment supporting the NIS Directive.
    206
    The first report of the study commissioned by ENISA on NIS investments was published on 11
    December 2020: https://www.enisa.europa.eu/publications/nis-investments/.
    207
    Cloud security is the smallest, fastest-growing cybersecurity market segment with a projected growth of
    33% in 2020 up to approx. EUR 494:
    https://www.forbes.com/sites/louiscolumbus/2020/08/09/cybersecurity-spending-to-reach-123b-in-
    2020/#766ad2a0705f
    208
    Referred to in the Impact Assessment for the Digital Resilience Act for financial services, SWD(2020)
    203 final, p.43: https://www2.deloitte.com/us/en/insights/industry/financial-services/cybersecurity-maturity-
    financial-institutions-cyber-risk.html
    209
    https://www.db.com/newsroom_news/Deutsche_Bank_Investor_Report.pdf
    72
    country visits and the NIS review study surveys revealed that most of operators and
    service providers are following international standards when it comes to security
    requirements.210
    This made it difficult to separate the impacts of the NIS Directive on the
    ICT spending at the level of the organisations from the overall impact of the evolution of
    international security. The new security requirements considered under policy options 2
    and 3 would be risk management based and would largely follow the existing
    international standards and practices of the majority of Member States. Furthermore, the
    incident notification obligations would be streamlined to provide more clarity on content,
    template and time of submission, thus keeping to a minimum the additional
    administrative burden on businesses.
    The overall global ICT security spending211
    increased with approximately 22% from
    2017 (the year after the entry into force of the NIS Directive) until 2020. While this
    increase is not directly linked to the NIS Directive, one can assume nevertheless that it
    also integrates the spending generated by security requirements such as those provided by
    NIS which largely follow international standards. Therefore, the assumption that in the
    medium-term (three to four years), the new sectors to be added to the NIS scope would
    entail about 22% increase in their ICT security spending would be a conservative
    assumption, most likely an overestimate, since it would consider a premise where the
    only trigger for extra ICT security investment would be the NIS framework. This would
    translate into ICT security spending in average per sector reaching about 11% of the ICT
    spending and 0.63% of the total turnover in three to four years from the entry into force
    of the revised NIS Directive. Yet, many other factors would naturally contribute to such
    increase, such as evolution of technologies and threat landscape, GDPR and other
    regulatory obligations, effects of particular incidents that may occur in the meantime or
    major crises, level of awareness, level of digitalisation, etc.
    Based on 2018 Eurostat data, the following examples of estimated average sector-
    specific costs for medium and large companies translating the 0.63% increase in
    spending out of annual turnover in a time-span of 3-4 years for the new sectors
    considered for the NIS scope can be provided (see also the detailed data on turnover and
    number of companies per sector in Annex 3):
     Chemicals (manufacture): a total increase of EUR 2.70 billion per sector and EUR
    0.85 million per company.
     Waste management: an increase of EUR 0.7 billion per sector and EUR 0.26
    million per company.
     Wastewater: an increase of EUR 68 million per sector and EUR 0.14 million per
    company.
     Manufacture of:
     food products: an increase of EUR 3.7 billion per sector and EUR 0.63 million
    per company.
     beverages: an increase of EUR 0.55 billion per sector and EUR 0.53 million
    per company.
     basic pharmaceutical products and pharmaceutical preparations: an increase of
    210
    37% of the respondents to the NIS study surveys targeting OES and 22% of the survey targeting DSPs
    considered that the adoption of the NIS Directive has affected their organisations as far as additional
    security requirements are concerned.
    211
    https://www.statista.com/statistics/790834/spending-global-security-technology-and-services-market-
    by-segment/
    73
    EUR 1.32 billion per sector and EUR 1.41 million per company.
     computer, electronic and optical products: an increase of EUR 1.58 billion per
    sector and EUR 0.65 million per company.
     electrical equipment: an increase of EUR 1.9 billion per sector and EUR 0.55
    million per company.
     machinery and equipment n.e.c.: an increase of EUR 3.95 billion per sector
    and EUR 0.44 million per company.
     motor vehicles, trailers and semi-trailers: an increase of EUR 6.85 billion per
    sector and EUR 2.33 million per company.
     other transport equipment: an increase of EUR 1.4 billion per sector and EUR
    1.32 million per company.
     Postal and courier services: an increase of EUR 0.38 billion per sector and EUR
    0.45 million per company.
     Food supply: an increase of EUR 3.27 billion per sector and EUR 0.62 million per
    company.
    For the sectors currently covered by the NIS Directive, as compared to the new ones
    considered to be brought under the NIS scope in options 2 and 3, a rather limited increase
    of ICT security spending would be expected in the coming three to four years, just
    slightly over (+4-5%) the pace of ICT security spending increase forecasted by Gartner in
    December 2019, prior to the COVID-19 crisis: i.e. about 12% increase in the ICT
    security spending.212
    This would translate into ICT security spending in average per
    sector reaching about 10.2% of the ICT spending and 0.58% of the total turnover in three
    to four years. Measures such as the alignment of reporting obligations are expected to
    even diminish to a certain extent the administrative burden on the entities currently
    covered under the NIS scope.
    Based on 2018 Eurostat data, the following examples of estimated average sector-
    specific costs for medium and large companies translating the 0.58% increase in
    spending out of annual turnover in a time-span of 3-4 years for the sectors currently
    covered by the NIS scope can be provided (see also the detailed data on turnover and
    number of companies per sector in Annex 3):
     Electricity and gas: a total increase of EUR 6 billion per sector and EUR 1.94
    million per company.
     Air transport: an increase of EUR 0.27 billion per sector and EUR 1.18 million
    per company.
     Drinking water supply and distribution: an increase of EUR 0.14 billion per sector
    and EUR 0.16 million per company.
    In option 2, the extension of the NIS scope may lead to a potentially high administrative
    burden raised by the security requirements and reporting obligations for all companies
    concerned, and in particular for SMEs. Equally, given the wider scope of application,
    competent authorities would also have to invest additional considerable resources in the
    identification process and apply supervisory measures for a significantly higher number
    of companies, potentially requiring further refined strategies, including on prioritisation
    212
    https://www.gartner.com/en/newsroom/press-releases/2020-06-17-gartner-forecasts-worldwide-
    security-and-risk-managem .
    74
    policies and supervisory means and methods, as well as additional resources. For option
    3, due to the differentiation in the level of obligations between the essential and important
    entities, for the latter, the compliance costs would be more reduced. Furthermore, in
    option 3, a size cap would be applied to exclude from the NIS scope micro and small
    enterprises. This would reduce furthermore the coverage of companies impacted by the
    NIS framework.
     Estimated costs213
    of the policy options at the level of organisations
    The identification of OESs and overview of DSPs, which have raised particular issues in
    practice, would remain unaddressed in option 2. As a result, the administrative burden
    and compliance costs would remain uneven for similar companies across Member States
    as they would be subject to different identification processes or not systematically
    considered digital service providers in all Member States where they conduct such
    activities. Businesses would therefore continue to bear a burden of uncertainty, with
    potential negative effects on the resources and prioritisation given to cybersecurity
    measures and compliance with the cybersecurity requirements and obligations, since the
    identification process is not being sufficiently clear. In particular, companies operating in
    such sectors in several Member States would continue to be subjected to different
    identification processes or none whatsoever.
    In option 3, a general obligation would be introduced for the entities operating in the
    sectors and providing the services covered by NIS, while also excluding as a rule from
    the NIS scope all micro and small entities. This would by default exclude any
    administrative burden or unequal treatment imposed on companies across Member States
    triggered by divergences in the identification process or by legal uncertainty that could
    have affected the business planning or investments of these companies. Although option
    3 would also allow exceptions, as explained in section 6.1, including the possibility for
    Member States to include in the NIS scope micro or small entities justified by their
    specific importance at regional or national level for that particular sector or other
    interdependent sectors or services, this would concern rather limited situations, decided
    on a case by case basis, and is unlikely to lead to notable administrative burden on
    competent authorities.
    In option 3, digital service providers may have to register with ENISA, so that an EU-
    level overview of DSPs is available at Union level. This would however entail only very
    marginal one-off administrative costs that would not require additional staff or resources
    (i.e. more likely one-off 0.5 FTE214
    task).
    The main costs incurred by companies stemming from the NIS framework are
    compliance costs, in particular related to the implementation of security requirements
    (i.e. risk management obligations), reporting obligations (i.e. incident reporting
    obligations) and application of supervisory measures (i.e. documenting compliance
    through audit reports, results of tests, scanning, etc.). In the survey targeting OESs and
    DSPs conducted by the NIS review study, both categories of respondents considered that
    the most significant compliance costs borne from the NIS obligations are those
    213
    At the level of individual organisations, the cost of cybercrime is typically estimated as the cost of the
    activities by criminals gaining illicit access to victims’ computers or networks. The elements of
    cybercrime cost would typically include,: the loss of business confidential information; financial
    manipulation; opportunity costs, including disruption in production or services; buying cyber insurance,
    paying for recovery from cyberattacks; reputational damage and liability risk (CSIS, McAfee (2018),
    Economic Impact of Cybercrime-No Slowing Down).
    214
    Full Time Equivalent.
    75
    concerning the risk management measures215
    and the prevention and mitigation of impact
    of incidents.216
    Fewer respondents217
    considered compliance costs raised by incident
    notifications (including cross-border) to be significant. Only 37% of the OESs
    respondents and 22% of the DSPs respondents considered that they have been affected by
    the additional security requirements introduced by the NIS Directive.
    The NIS investments study indicates that, from the 251 organisations covered by the
    study in five Member States, 42.7% had a dedicated NIS Directive-related project or
    programme of between EUR 100,000 and EUR 250,000, with an average budget for NIS
    implementation projects of about EUR 175,000. A little under 50% of these
    organizations had to hire up to 4 FTEs . The majority of the affected organisations did
    not require additional staff to implement the NIS Directive. Data from the same study
    indicates that the three main areas of spending are: (i) vulnerability management and
    security analytics, with a share of 20%; (ii) governance, risks and compliance with a
    share of 18%, and network security with a share of 17%. The study found that the
    distribution between the different functional areas has been quite stable over the last four
    years, but it varies greatly between industries. As of 2020, information security staff218
    represents 5.6% of total ICT staff, measured in terms of FTEs.
    In 2019, the majority of EU enterprises (65 %) reported that the ICT security related
    activities were carried out by external suppliers, while, responding to a different question,
    40 % of the enterprises reported that the ICT security related activities were carried out
    by own employees.219
    Options 2 and 3, given the further harmonisation of risk
    management requirements, and even more in case of option 3, the introduction of new
    measures such as those targeting supplier relationship risk management or data storage-
    related risks, are expected to increase the sophistication of security measures
    implemented and hence the need for outsourcing or, alternatively, further specialisation
    of staff on cybersecurity aspects. This would however bring longer term benefits both for
    the cyber resilience of companies, the capacity to recover speedily following potential
    cyberattacks and mitigate damage. It may also bring benefits to the level of maturity and
    development of the European cybersecurity market due to a potential increase in demand
    of more specific technical services. Furthermore, the security requirements imposed in
    options 2 and 3 would be risk management based, therefore any investment in security
    measures would be proportionate to the cyber risks.
    The IPACSO report stressed that the actors involved are rational or at least ‘predictably
    irrational’220
    , therefore they tend to maximize the payoff by minimizing the effort to
    achieve a goal, normally acting under conditions of scarce resources. This usually leads
    to underinvestment in cybersecurity measures. According to the report, an incentive
    structure to convince actors to adopt cybersecurity technology or a framework to improve
    adoption of cybersecurity would be one of the most effective ways that could lead to an
    increased cybersecurity investment. This is also the conclusion of the Ponemon Report,
    which points to automated security measures as one of the main cost saving factors in the
    context of potential data breaches. Option 3, as compared to option 2, would notably
    include measures that require a more thorough risk management approach, as well as
    215
    73% for OESs and 56% for DSPs.
    216
    73% for OESs and 56% for DSPs.
    217
    43-49% for OESs and 33-44% for DSPs.
    218
    Information security personnel includes in-house and contract full-time equivalents supporting the IT
    security domains.
    219
    https://ec.europa.eu/eurostat/statistics-
    explained/index.php/ICT_security_in_enterprises#ICT_security_in_EU_enterprises
    220
    IPACSO Report, page 8, reference to Ariely, 2008.
    76
    policies such as coordinated vulnerability disclosure, allowing the use of additional
    channels of discovering vulnerabilities or the mutual assistance mechanism, which would
    lead to joint operational actions across borders. Such measures are expected to incentivise
    investment in cybersecurity technology and measures.
    In relation to reporting obligations, as shown by the NIS review country visits, many
    OESs notify few significant incidents to competent authorities, some in the range of 1-2
    per year. Typically DSPs would report no significant incidents in the vast majority of the
    Member States. The NIS investments study indicates that 81% of the organisations
    surveyed have established a mechanism to report incidents requiring no more than 4
    FTEs for a large majority of respondents. The envisaged changes brought by options 2
    and 3 would be expected to increase this reporting rate and further incentivise reporting
    beyond incidents to events such as near misses or vulnerabilities. However, while in
    appearance this would bring more cumbersome requirements as compared to the baseline
    scenario, since the incident notification obligations would be more prescriptive on the
    format, timeline and content, they would, at the same time, allow more legal certainty and
    clarity expected to translate in more efficient use of human resources. Furthermore, as
    shown by the NIS review study survey, incident notification is considered less costly by
    the organisations as compared to risk management requirements.
    When it comes to supervision and enforcement, option 2 would only introduce a set of
    principles for supervision and enforcement, while option 3 would introduce a minimum
    level of requirements for competent authorities in relation to supervisory actions that they
    can apply (e.g. frequent or ad hoc audits, inspections, etc), as well as a minimum level of
    penalties. Since the likelihood of application of dissuasive penalties, including
    administrative fines, is expected to increase (notably with option 3), as opposed to the
    baseline scenario, businesses may instead increase ICT security investments and hence
    face higher compliance costs to avoid such penalties. More importantly, since the
    intensity of supervisory actions would most likely increase, businesses would bear
    additional compliance costs for documenting compliance. For example, according to
    DESI, less than half of enterprises reported maintaining log files for analysis after
    security incidents (45 %).221
    In option 3 in particular, such costs would be alleviated for
    entities in sectors and providing services considered important, yet not essential, to which
    only an ex post supervisory regime would apply, and which therefore would not be
    required to systematically create and preserve evidence on compliance. In option 2, the
    compliance costs in this regard would instead increase for the DSPa who would pass
    from an ex ante supervisory regime to a fully-fledged one, which would entail ex-ante
    supervision and evidence-producing.
    As regards cooperation and information sharing, options 2 and 3 would further
    incentivise the setting up and participation in PPPs and ISACs with participation of
    public authorities. While the setting up and participation in these platforms can indeed be
    costly, it would only be on a voluntary basis and the benefits would outweigh such costs,
    since it would lead to a trusted network of secure exchange of valuable information
    which can help reduce cybersecurity costs in an organisation.222
    221
    https://ec.europa.eu/digital-single-market/en/news/digital-economy-and-society-index-desi-2020
    222
    See also ENISA’s report of 2019 on Information Sharing and Analysis Centres (ISACS) – Cooperation
    Models: https://www.enisa.europa.eu/publications/information-sharing-and-analysis-center-isacs-
    cooperative-models
    77
     Estimated benefits of policy options at the level of organisations
    The 2015 Cost of Cyber Crime Study conducted by the Ponemon Institute223
    found that
    the median annualized cost of cyber crime was of approximately EUR 4.63 million.
    For the purposes of weighing costs and benefits notably for options 2 and 3, the NIS
    review study224
    developed a modelling starting from this annualized cyber crime cost,
    used as a proxy for the cost of a cybersecurity incident. This was referenced to an
    Eurostat estimate of about 450 cybersecurity incidents in 2019 involving critical
    infrastructures like health, finance and energy.225
    According to the modelling, the
    difference between options 2 and 3 is given by the difference of the cost of incidents
    compared to the baseline over a 10-years period, leading to the estimation that option 3
    is the most impactful with a reduction in cost of cybersecurity incidents by EUR 11.3
    billion, as compared to EUR 8.3 billion in option 2. See Annex 10.
    Furthermore, as mentioned above, the 2020 Annual Cost of a Data Breach Report of the
    Ponemon Institute, estimated the average cost of a data breach226
    to be EUR 3.5 million
    in 2018, an increase of 6.4 % over the previous year227
    , while at the level of various
    sectors the increase for the same reference period was even higher (10% to 13%). The
    same report found that the average time to identify and contain a data breach is of 280
    days. At the same time, considerable differences were found among sectors: in
    healthcare, the lifecycle of a breach averaged 329 days, while the average lifecycle was
    96 days shorter in the financial sector. Fully deployed security automation (e.g. use of
    advanced technology, AI, automated scanning tools) helped companies reduce the
    lifecycle of a breach by 74 days compared to companies with no security automation
    deployment, from 308 to 234 days. The report found that lost business costs accounted
    for nearly 40% of the average total cost of a data breach, i.e. about 1.30 million EUR.
    Lost business costs included increased customer turnover, lost revenue due to system
    downtime and the increasing cost of acquiring new business due to diminished
    reputation. The lowest cost was for notification of the data breach, 6% of total cost.
    The NIS investments study indicates that 43% of the organisations surveyed in 2020
    experienced cyber incidents with a direct financial impact of up to EUR 500,000.
    Compared to the overall high level of costs, an average increase of ICT security
    spending per sector for the next three to four years ranging from about 12%228
    to
    22%229
    ) would lead to a proportionate benefit of such investments and even
    considerably exceed the costs for some sectors.
    223
    http://www.cnmeonline.com/myresources/hpe/docs/HPE_SIEM_Analyst_Report_-
    _2015_Cost_of_Cyber_Crime_Study_-_Global.pdf
    224
    interim findings of the NIS review study to be included in its final report due by December
    2020/January 2021 [not yet submitted at the time of the writing of this report].
    225
    https://ec.europa.eu/eurostat/documents/2995521/10335060/9-13012020-BP-EN.pdf/f1060f2b-b141-
    b250-7f51-85c9704a5a5f
    226
    Data breaches can be considered a subset of cybersecurity incidents. This is because many security
    incidents mainly affect personal data. A data breach occurs when a cybercriminal infiltrates a data
    source and extracts confidential/private information. Most data breaches are attributed to the most
    common cybersecurity incidents, such as hacking or malware attacks, ransomware, denial of service,
    phishing.
    227
    Annual Cost of a Data Breach Report, 2020, conducted by the Ponemon Institute, and based on
    quantitative analysis of 524 recent breaches across 17 geographies and 17 industries:
    https://www.capita.com/sites/g/files/nginej146/files/2020-08/Ponemon-Global-Cost-of-Data-Breach-
    Study-2020.pdf
    228
    sectors already covered by the NIS framework.
    229
    additional sectors and type of services to be covered by the NIS framework under options 2 and 3.
    78
    As regards the benefits stemming for specific measures, in option 3, the replacing of the
    identification process with a generally applicable obligation will reduce the
    administrative burden and unequal treatment of companies across Member States that led
    to legal uncertainty affecting business planning or investments.
    Options 2 and 3 would indeed provide more harmonised security requirements. This
    would entail, in particular, more clarity and alignment in defining the elements that the
    security measures at the levels of organisations should include (e.g. organisation of
    Information Security, human resources security, asset management, access control,
    encryption, physical and environmental security, supplier relationship assessments, etc).
    These measures would most likely incur compliance costs that, notably for less mature
    organisations, would require additional investments. According to Eurostat230
    , in 2019,
    92% of EU enterprises with 10 or more persons employed used at least one measure in
    order to ensure integrity, authenticity, availability and confidentiality of data and ICT
    systems. One in three enterprises (33 %) reported having documents on measures,
    practices or procedures on ICT security. In one in four enterprises (24 %) these
    documents were defined or reviewed in the last 12 months. Enterprises less frequently
    used encryption techniques for data, documents or e-mails (38 %), ICT security tests
    (35 %), ICT risk assessment (33 %) and user identification and authentication via
    biometric methods (10 %).
    Compliance costs that entail additional investments in automated security can only
    benefit companies in the medium and long term and reduce business loss. It is therefore
    expected that in options 2 and 3 the short and medium term investments required by the
    reinforced risk management requirements would be less costly for companies which
    have deployed security automation. The Ponemon Report231
    concluded that businesses
    that had not deployed security automation saw an average total cost of EUR 5.15 million,
    more than double the average cost of a data breach of EUR 2.09 million for businesses
    that had fully deployed security automation. The report also showed the importance of
    incident response preparedness, as it was found to be the highest cost saver for
    businesses. The average total cost of a data breach for companies with an incident
    response team that also tested an incident response plan using exercises or simulations
    was EUR 2.81 million, compared to EUR 4.52 million for companies with neither such
    team nor tests of such plan. On a medium and long-term perspective, the investments in
    security automation and incident report preparedness would therefore lead to significant
    benefits for businesses. As shown by empirical evidence, while basic cybersecurity
    measures allow for better detection of incidents, more sophisticated measures, that indeed
    would require more investment, would help prevent incidents and on the long-term
    reduce costs for handling incidents and mitigating potential loss.232
    In option 3, Member States would be encouraged to create a single entry point for
    notifications concerning security breaches stemming from the NIS Directive, the
    General Data Protection Regulation and the ePrivacy Directive would help further reduce
    the administrative burden and compliance costs on companies.
    230
    https://ec.europa.eu/eurostat/statistics-
    explained/index.php?title=ICT_security_in_enterprises#ICT_security_in_EU_enterprises
    231
    Annual Cost of a Data Breach Report, 2020, conducted by the Ponemon Institute:
    https://www.capita.com/sites/g/files/nginej146/files/2020-08/Ponemon-Global-Cost-of-Data-Breach-
    Study-2020.pdf
    232
    Cyber incidents, security measures and _financial returns: Empirical evidence from Dutch firms,
    Milena Dinkovay_, Ramy El-Dardiryy and Bastiaan Overvesty – CPB Netherlands Bureau for
    Economic Policy Analysis, 25 May 2020.
    79
    In the financial sector, the Commission’s DORA proposal aims at bringing rules
    addressing ICT risk in finance together into a single legislative act which will be a lex
    specialis to the NIS framework. The requirements for financial entities would revolve
    around specific capabilities and functions in ICT risk management.233
    Financial entities
    would be required to put in place basic security measures.234
    These would not go beyond
    what will be required by the NIS framework under options 2 and 3, and therefore no
    additional compliance costs would be triggered in this regard. On the contrary, the
    Commission proposal envisages more specific requirements on aspects such as digital
    operational resilience testing235
    or monitoring of third-party risk through harmonisation
    of contractual aspects and a Union Oversight Framework. Moreover, the compliance
    costs and administrative burden on the operators of financial services is expected to be
    further reduced due to the introduction of one-stop-shop and the simplification of
    reporting obligations. Furthermore, the DORA proposal provides for the establishment of
    a management process to monitor, classify and report major ICT-related incidents to
    authorities responsible for the supervision of financial entities. These authorities will
    have to provide details of ICT related incidents to other institutions or authorities and in
    particular the NIS single contact points (SPOCSs). Financial entities will therefore
    benefit from harmonised ICT-related reporting content and templates. The proposal
    prepares the ground for a centralisation at EU level of ICT-related incident reporting. The
    European Supervisory Authorities (ESAs), the European Centre Bank (ECB) and ENISA
    are mandated to assess and report on the feasibility of establishing a single EU Hub for
    major ICT-related incident reporting by financial entities.
    The overview of the costs and benefits expected at the level of individual companies,
    notably for option 3 is presented in Annex 3, section 2.
    SMEs
    In line with the vast majority, OPC respondents representing SMEs in the digital sectors
    deemed the cyber threat level to have increased significantly since 2016. They also share
    the view of other respondents that the level of preparedness of SMEs against cyber
    threats is relatively low in the Union (2 on a scale from 1 to 5). Asked about a potential
    expansion of the scope of the legal framework, they support the inclusion of certain
    sectors, such as manufacturing or data centres.
    According to Eurostat, the ICT security measure “keeping the software or operating
    systems up-to-date” was used by almost all large (97 %) and medium sized (94 %)
    enterprises and more than 8 in 10 small enterprises (85 %). Similar figures were reported
    for the second most popular ICT security measure – the strong password authentication,
    which was used by 93 % of the large enterprises, 85 % of the medium size enterprises
    and 74 % of small enterprises. However, when it comes to more complex security
    measures, larger differences related to the enterprise size were observed, for example in
    the share of enterprises using the ICT risk assessment: 70 % of large enterprises, while
    the share of small enterprises using this particular measure was two and a half times
    smaller (28 %). This indicates that the administrative and compliance burden in relation
    to risk management measures is more evident in the case of SMEs.
    233
    such as identification, protection and prevention, detection, response and recovery, learning and
    evolving and communication.
    234
    e.g. set-up and maintain resilient ICT systems and tools that minimise ICT risk, business continuity
    policies and disaster and recovery, etc.
    235
    i.e. periodical tests that would require development of specific tools.
    80
    According to DESI, in 2018, 13 % of enterprises in the EU experienced problems due to
    ICT related security incidents at least once.236
    This percentage was higher among large
    companies. ICT security incidents were reported by 23% of large enterprises, against
    12% of SMEs. This difference might not necessarily indicate that SMEs are less likely to
    be affected by security incidents, but could also be the result of a lower reporting capacity
    of the latter. The most commonly reported problem caused by ICT security incidents was
    unavailability of ICT services, such as hardware or software failures, denial of service
    attacks, ransomware attacks, affecting 10 % of enterprises. Large enterprises were more
    likely to be affected by problems due to ICT related incidents; 25 % of large enterprises
    experienced such problems during 2018, while this was the case for 18 % of medium size
    and 12 % of small enterprises.
    The pattern that ICT security related activities are relying predominantly on external
    suppliers was valid for both small and medium size enterprises. By contrast, the
    significant majority of large enterprises (83 %) reported the ICT security related activities
    being carried out by own employees.
    The above-mentioned data shows that in the current NIS setting (baseline) and option 2,
    SMEs would bear more administrative and compliance costs than options 3, given that
    the latter would discard from the scope of the NIS framework small and micro
    businesses, which, as shown above, may represent a significant percentage of companies
    operating in a certain sector (for some even above 90%). As regards the level of ICT
    security spending, in option 3, medium enterprises could be expected to increase the level
    of spending in the three to four years following the introduction of the new NIS
    framework slightly more (e.g. +3%) than large enterprises, due to an increased need to
    outsource services in view of the new security and reporting requirements. Thus, for the
    new sectors or services, an increase of about 25% of ICT spending could be expected,
    while for the sectors and services already covered by the NIS Directive, an increase of
    ICT security spending of about 15%.
    For the new sectors, this would translate into ICT security spending in average per
    sector reaching about 11.4% of the ICT spending and 0.65% of the total turnover in
    three to four years from the entry into force of the revised NIS Directive. Based on 2018
    Eurostat data, the following examples of estimated average sector-specific costs for
    medium companies can be provided (see also the detailed data on turnover and number
    of companies per sector in Annex 3):
     Chemicals (manufacture): a total increase of EUR 0.7 billion per sector and EUR
    0.28 million per company.
     Waste management: an increase of EUR 0.24 billion per sector and EUR 0.11
    million per company.
     Wastewater: an increase of EUR 32 million per sector and EUR 0.078 million per
    company.
     Manufacture of:
     basic pharmaceutical products and pharmaceutical preparations: an increase of
    EUR 96 million per sector and EUR 0.17 million per company.
    236
    Sample: In 2019, some 153 500 enterprises, with 10 or more persons employed, out of 1.48 million in
    EU-27 were surveyed. Out of these 1.48 million enterprises, approximately 83 % were enterprises with
    10-49 persons employed, 14 % with 50-249 and 3 % with 250 or more.
    https://ec.europa.eu/eurostat/statistics-
    explained/index.php/ICT_security_in_enterprises#ICT_security_in_EU_enterprises
    81
     computer, electronic and optical products: an increase of EUR 0.28 billion per
    sector and EUR 0.15 million per company
     motor vehicles, trailers and semi-trailers: an increase of EUR 0.3 billion per
    sector and EUR 0.15 million per company.
     Postal and courier services: an increase of EUR 21 million per sector and EUR
    0.03 million per company.
     Food supply: an increase of EUR 1.4 billion per sector and EUR 0.3 million per
    company.
    At the same time, in terms of benefits, raising the level of security requirements for these
    entities would also incentivise their cybersecurity capabilities and help improve their ICT
    risk management. This is even more relevant given that SMEs currently exhibit a
    relatively low level of cyber resilience.237
    Public administration (from the perspective of the NIS scope) – policy options
    2 and 3
    For the public sector, all Member States’ institutions at central and regional levels have
    been considered for the NIS scope of the obligations, as they are all contributing to the
    smooth functioning of economy and society as a whole. In the same vein, as stressed by
    the EU Security Union strategy238
    , a framework of common rules on information security
    and on cybersecurity is being developed for all EU institutions, bodies and agencies,
    including mandatory and high common standards for the secure exchange of information
    and the security of digital infrastructures and systems.
    In options 2 and 3, the NIS framework would only cover under ‘public administration’
    central governments (i.e. all administrative departments of the state and other central
    agencies whose responsibilities cover the whole economic territory of a country), as well
    as the major socio-economic regions (104 in total according to the Nomenclature of
    territorial units for statistics–NUTS 2021 classification) and the basic regions for the
    application of regional policies (283 in total according to the NUTS 2021
    classification).239
    No attempt was made for estimating the number of individual public
    institutions since the objective of the cost assessment is to make a global estimate of the
    total cost for the public sector.
    Data for the public administration relate to the operating costs. ICT spending in the public
    sector is typically expressed as a percentage of the operating expenditure instead of
    revenues or turnover.240
    According to Eurostat241
    , in 2019, the total expenditure at
    central government level in the EU-27 was of 22% of GDP, while the total revenue was
    of 21.7% of the GDP. At the local government level, the total expenditure was the same
    as the total revenue: 10.9% of the GDP.
    The NIS investments study indicates an average annual ICT security spending
    expenditure of 4% out of the ICT budget for governments in Europe. In line with the
    above-mentioned estimates of a 22% increase in the ICT security spending in the 3-4
    years to follow the entry into force of the revised NIS Directive in option 3, the ICT
    237
    The respondents to the OPC rate the level of preparedness of European SMEs with an average of 2.17
    out of 5.
    238
    COM(2020) 605 final, 24 July 2020.
    239
    https://ec.europa.eu/eurostat/web/regions/background
    240
    https://ec.europa.eu/eurostat/statistics-
    explained/index.php?title=Glossary:Total_general_government_expenditure
    241
    https://ec.europa.eu/eurostat/statistics-explained/index.php?title=Government_finance_statistics
    82
    security spending for governments would therefore be expected to increase to 4.88% as a
    result of the intervention in this policy option.
    Linked to the public administration category, under policy options 2 and 3, election
    authorities, technology and processes would also be covered under the NIS scope, as
    these are functional structures/frameworks for limited periods of time and are often under
    the responsibility of central, regional or local administrations.
    Competent authorities
    The administrative and compliance costs currently borne by competent authorities
    (including CSIRTs, and SPOCs) are mainly stemming from the following NIS
    obligations: (i) development, monitoring and implementation of national strategies; (ii)
    identification process of OES, depending also on the system chosen at national level
    (self-assessment, registration, etc.); (iii) processing of incident reporting and interactions
    with companies linked to that; (iv) participation in the Cooperation Group and CSIRTs
    network; (v) cross-border operational cooperation or exchanges.
    Due to the low level of harmonisation on the identification process, it appears, as also
    shown by the NIS review country visits, that in some Member States a significant amount
    of resources are dedicated to the identification process, notably when it involves self-
    assessment on the OES side or registration. In this context, the authorities need to
    conduct considerable work to identify, approach, guide and pursue companies to fulfil
    their obligations. The Member States’ approaches to the OES identification process and
    the thresholds used (both quantitative and qualitative) vary considerably among Member
    States. Some operators are identified as OES via primary legislation, some via secondary
    legislation, some other through self-assessment and identification.242
    All these entail a
    certain administrative burden on the competent authorities that spend a considerable part
    of their resources on this process.
    At the same time, there are enforcement costs borne by the competent authorities as a
    result of the supervisory obligations provided by the NIS Directive, notably in relation to
    OES. Since the supervisory activity for DSPs is lighter, being only ex-post, the costs
    incurred in terms of use of financial and human resources are much more reduced than in
    the case of OES. The lack of clarity on the DSP activities and the jurisdiction rule may
    however trigger the use of some resources that could have been spared should such rules
    and EU practices be more settled. As regards enforcement, as mentioned in section 2.2.2.
    above, it appears that Member States rarely pursue enforcement actions and apply almost
    no penalties. It would therefore be assumed that in the current setting this trend would
    continue and therefore few resources would be dedicated to such activities.
    In options 2 and 3, additional compliance and administrative costs would be incurred
    by competent authorities.
    As regards the extension of the NIS scope to additional sectors and services, including
    establishing an equal footing between OESs and DSPs, as well as a reinforced approach
    on supervision, overall the competent authorities are expected to supervise a notably
    higher number of entities, in particular in view of the additional sectors and types of
    services to be included under the NIS scope (see above estimates per sector and type of
    service). At the same time, in option 2 the OES identification process would be
    maintained, hence, at least for the current NIS sectors, it is expected for the number of
    entities supervised not to depart significantly from the current numbers. The new
    242
    Over 50% of the OESs responding to the NIS survey were identified via other means than primary
    legislation.
    83
    provisions on security requirements would also trigger the need for a more pro-active
    approach and support to businesses, in particular in the newly added sectors. At the same
    time, the size cap to be applied in option 3, would filter through a considerable number of
    entities to be supervised by the competent authorities. Moreover, Member States’
    authorities would still need to establish prioritising strategies to supervise a wider range
    of entities. At the same time, for all entities considered ‘important’, only ex-post
    supervision would apply, thus triggering less administrative burden on the authorities.
    From the NIS review country visits information, for some Member States which provided
    sufficiently granular data, it appears that typically about 15-20% of the staff of competent
    authorities (centralised or cumulated resources of decentralised authorities) conducts
    supervision-related tasks and about 30-50% handles incident-related work. Many
    Member States (13) have a heavily decentralised model, involving more resources and
    staff dedicated to specific sectors. The envisaged changes to the NIS scope, combined
    with the strengthening of the supervisory framework, including on DSPs, would lead to
    some increase in compliance costs for staff dedicated to supervisory activities. However,
    these costs would be balanced in option 3 by the benefits of excluding small and micro
    entities and thus allowing the authorities to reallocate resources only for medium and
    large entities covered by a larger number of sectors.
    Option 2 would entail a heavier administrative burden and higher compliance costs for
    competent authorities as compared to option 3, also due to the fact that DSPs would be
    put on an equal footing with OES, with ex post supervision discarded, while at the same
    time the scope of sectors and services would be extended, with no size filter for entities
    and no differentiation of obligations imposed on businesses. Furthermore, the elimination
    of the OES identification process in option 3 may also ease to some extent the
    administrative burden on some competent authorities, as the NIS review study targeted
    survey for OESs showed that about 27% of these were identified through actions of
    competent authorities.
    Balancing all the above-mentioned factors, in option 3 these new tasks are expected to
    require an overall increase of about 20-30% of resources (including staff) of the
    relevant authorities per Member State at central level needed mainly for performing
    supervisory actions on a larger number of entities (i.e. on-site and off-site checks,
    audits, requests for and assessment of compliance evidence, etc) and interactions with
    industry (including sector-specific), while in option 2 of about 30-40%. The same
    additional compliance costs are estimated in relation to the cumulated resources of
    decentralised authorities per Member States243
    .
    According to the in-depth interviews conducted by the NIS review study, competent
    authorities incurred NIS-related costs mainly linked to FTEs working on the NIS
    transposition and building the supporting organisation for OESs and DSPs, such as
    preparation or setting-up of national regulators in charge of the NIS Directive, upskilling
    human resources, expanding their capabilities to reach the right level of security maturity,
    and working and interacting with the whole ecosystem on this topic. Option 3 is expected
    to lower the administrative burden triggered by unclear concepts or requirements which
    distracted competent authorities from core tasks. This is because option 3 would provide
    more clear-cut direct requirements for businesses and authorities, more legal certainty
    and predictability and less room for interpretation of concepts or thresholds. These
    changes are likely to lead in medium- and long-term to less cumbersome formalities and
    would allow authorities to better focus their resources on core cyber security tasks.
    243
    a slight additional administrative burden may be triggered by the need to find sector-specific
    institutional solutions for the new sectors and services.
    84
    On incident reporting, currently the number of significant incidents reported by the
    competent authorities is rather low. For 2019, 15% of the Member States reported no
    significant incidents, while about 37% reported less than 10 significant incidents. Only
    three Member States reported 30 or more significant incidents and with more specific
    information on the type and impact of the incidents. This incident reporting rate is
    expected to increase in options 2 and 3. An assumption could be made that the vast
    majority of Member States would be able to report on average over 30 significant
    incidents per year. At the same time, in option 3, Member States244
    would also report the
    summary of the incident reports and relevant aggregated data to ENISA. Overall, the
    impact on the staff and resources necessary for handling incident notification and other
    similar reporting is expected to be rather limited, reflecting the expected increase in
    reporting from a wider range of sectors and services. In this regard, in both options 2 and
    3 an approximate increase of 10-15% in the staff of the competent authorities tasked
    to handle incident reporting is estimated to be needed.
    In option 3, the compliance costs for competent authorities would be incurred by the
    development of a number of specific cybersecurity-related policies, such as those
    regarding supply chain security or coordinated vulnerability disclosure. This may
    require some limited compliance costs at the level of policy staff, in the range of 2-3
    FTEs per competent authority. The rest of the compliance costs on these aspects would be
    incremental to the additional resources required by the other new tasks mentioned above.
    Furthermore, additional enforcement costs would be expected in option 3 by the setting
    out minimum level of penalties. Considering that currently Member States have taken an
    approach towards enforcement that did not result in applying any notable penalties, this
    change in the NIS framework would trigger the need for additional resources and staff.
    As a rule, it would be expected for the staff conducting supervisory actions to also cover
    the aspects of enforcement of penalties. Nevertheless, in addition to the costs entailed by
    the supervisory tasks mentioned above, the strengthening of the enforcement regime
    would also lead to an increase of FTEs of legal experts, potentially 1-2 legal FTEs on
    average (new or reallocated) per competent authority would be expected.
    In option 3, a peer review mechanism would be set up. This would entail regular on and
    off-site country-specific assessments conducted by cybersecurity experts designated by
    the Member States. The mechanism would therefore trigger certain administrative costs
    borne by competent authorities for the participation of designated cybersecurity experts in
    country visits and assessments. This may entail a number of an average of 4 country
    visits per year (costing about 5,000 EUR) for each competent authority.245
    These costs
    could however be partially supported through the Digital Europe Programme –
    Multiannual Financial Framework.246
    Option 3 would also entail setting up a crisis management framework which will build on
    CyCLONe. This is expected to trigger rather limited administrative and compliance
    costs. Member States would be required to designate competent authorities (either
    existing or new ones), set out regulatory plans and identify national capabilities, assets
    and procedures. However, these new requirements rather aim at connecting already
    existing institutions, frameworks and assignments so that to ensure the functionality of a
    cybersecurity operational angle for crisis management. Rather than requiring new
    departments or teams, the new framework is expected to build on existing ones. At
    244
    Via SPOCs.
    245
    e.g. travel and accommodation costs, daily allowances, expert days spent in one week country visits,
    preparation work, drafting work, etc.
    246
    https://ec.europa.eu/digital-single-market/en/europe-investing-digital-digital-europe-programme .
    85
    institutional level, this may require a one-off start-up expenditure for new teams per
    Member State. This is likely to be covered by existing institutions (either in the ECI
    context or cybersecurity competent authorities) and would therefore require rather limited
    investment for the first two years, including 3-4 FTEs per Member State. The
    institutionalisation of EU-CyCLONe is likely to incur rather marginal costs, considering
    that the contact points at the level of the Member States are already designated and the
    main operational expenses incurred by the network would have already been included in
    national planning.
    Option 3 would also allow a shift in the mandate of the Cooperation Group that would
    reduce some of its administrative burden currently triggered by the lack of clarity and
    precision in the NIS Directive and would allow it to focus on more substantial/core tasks.
    For the CSIRTs, option 3 would lead to some additional compliance costs, notably
    related to the increased role in implementation of policies such as the coordinated
    vulnerability disclosure, the implementation of the mutual assistance mechanism in
    cross-border cases, as well as the increase in the number of entities covered by the NIS
    scope. These costs would be reflected in additional FTEs (2-3), notably for the central
    CSIRTs teams per Member State, as well as potentially additional investment in technical
    equipment (software/hardware).
    Overall, while option 3 appears to impose more administrative burden and compliance
    costs on the Member States authorities, on the medium and long term is also likely to
    bring substantial benefits to increased cooperation among Member States, including at
    operational level, as well as to incentivise an overall increase in and levelling of
    cybersecurity capabilities at national and regional level, through mutual assistance, peer-
    review mechanisms, better overview of and interaction with key businesses.
    Mention should be made that the Member States would also be supported through the
    European Cybersecurity Competence Centre and its related network, as well as the funds
    made available through Digital Europe and Horizon Europe programmes.
    The main costs and benefits relevant for national authorities for policy options 3 are
    summarised in Annex 3, section 2.
    The EU Agency for Cybersecurity, ENISA
    The current NIS Directive, while not imposing specific obligations on ENISA, nor on
    operators or service providers as regards reporting to ENISA, resulted in additional work
    for ENISA in supporting the Member States in the implementation of the directive.
    ENISA is also acting as the secretariat of the CSIRTs network and is participating in the
    Cooperation Group. In option 2, no additional costs would be triggered for ENISA.
    In option 3, the activities envisaged for ENISA are reinforcing existing tasks set within
    the limits of its existing mandate. While these activities would be covered by ENISA’s
    general tasks according to its mandate, they will also result in additional workload for the
    agency. The main envisaged activities that would concern ENISA are those regarding: (i)
    the role of observatory for state of cybersecurity in the Union (including conducting a
    regular survey); (ii) the involvement in the peer-review mechanism, where ENISA would
    support the Commission with the secretariat, as well as with participation of experts in
    peer-review missions (iii) the registration of digital service providers with cross-border
    activities, since in option 3 ENISA would be expected to hold a central registry of digital
    service providers operating cross-borders, which may require some dedicated software
    and/or database to be built up, (iv) the depository and processing of aggregated data on
    notified incidents, as well as vulnerabilities newly discovered as a result of coordinated
    vulnerability disclosure policies, which may require the upgrading or acquisition of
    additional software or database, (v) ensuring the secretariat of CyCLONe.
    86
    A considerable part of these envisaged activities would require a reshuffling of the
    existing resources of ENISA or reconsidering of certain priorities. It is also estimated
    that, in addition to the existing resources (including FTEs), ENISA would need 4-5
    supplementary FTEs posts. At the same time, these envisaged tasks would provide
    additional benefits for ENISA, who would consolidate its role and standing in effectively
    supporting and developing EU cybersecurity policies. The competent authorities and the
    CSIRTs would also benefit from receiving tangible support from ENISA and better
    informing their cybersecurity decisions.
    Effects of the policy options on competitiveness and the level playing field in
    the Single Market
    Option 2 is likely to have a positive, albeit relatively limited impact on ensuring a level
    playing field across Member States of all essential and important operators and DSPs,
    since all would be subjected to the same regulatory regime. For SMEs in particular, there
    are also likely negative impacts insofar as administrative burden is concerned, since they
    would be subject to the same obligations as larger entities, and also subject to same
    supervisory regime. Option 3 is likely to have a positive direct impact on ensuring a level
    playing field across Member States of all essential and important operators and service
    providers. Furthermore, it is also likely to reduce cybersecurity information asymmetries
    among undertakings and incentivise the cybersecurity capabilities of SMEs.
    A JRC report247
    stresses that currently users exert a rather minimal influence on vendors
    to provide solutions to revealed vulnerabilities, resulting in the delayed release of
    solutions or poor-quality solutions.248
    Stock prices of undertakings tend to be negatively
    affected by public knowledge of cybersecurity breaches only in the short term, while in
    the long term investors do not seem to substantially consider reputational damage.
    According to the JRC report, this would affect more the SMEs, making them vulnerable
    to cyber-attacks.249
    The report recommends incentivising cybersecurity information
    sharing to reduce information asymmetries. Option 3 focuses on improving operational
    cooperation and information sharing, through setting up frameworks to ensure that
    capabilities are brought together across the EU, mutual assistance mechanisms and joint
    supervisory action, incentivising information sharing, including on aspects such as
    coordinated vulnerability disclosure.
    More clear-cut and harmonised security requirements for a conclusive pool of operators
    and service providers which are straightforwardly subjected to the NIS scope can also
    have positive effects on the development of the cybersecurity markets in Europe,
    increasing competitiveness thereof and investments in start-ups, new initiatives, etc.
    7.2. Social impacts
    As presented throughout the report, cyber incidents can have far-reaching consequences
    for society. Option 2, by increasing the harmonisation of security requirements and
    expanding the NIS scope to a wider share of the EU economy, would be expected to
    contribute to some extent to achieving an improved level of cyber resilience across
    Europe. This may ultimately positively affect society, through a slightly improved
    protection level against the negative and/or disruptive effects of cybersecurity incidents.
    247
    Cybersecurity – Our Digital Anchor, a European perspective, published in July 2020.
    248
    ‘consumers often face high switching costs – i.e. they are not very likely to switch to a different
    provider in the case of known security weaknesses either concerning the software they use or in the
    software used by the vendors of the products and services they buy […].’
    249
    as ‘such vulnerabilities, which include a lack of formal cybersecurity policies, skills and expertise,
    shortage of financial resources, and incorrect attitudes towards risk management and cybersecurity,
    negatively influence their resilience to security threats.’
    87
    Such impact would however be rather limited, as in this option only targeted
    amendments would be brought to the NIS Directive, without changing the overall
    approach to ensure more sharing of responsibilities or a more hands-on approach to
    further align, upgrade and connect cybersecurity capabilities across Member States.
    Option 3 would generate a more extensive positive (indirect) impact on society than the
    other analysed options. The JRC Report recalls that: ‘Traditional measures to guarantee
    trust are no longer sufficient. […] Cybersecurity should thus be considered as an
    essential societal need reinforcing the idea of a ‘digital society secure by design’. The
    rapid exploitation by cyber attackers on the COVID-19 pandemic to attack systems and
    individuals reinforces this need’. Unlike option 2, option 3 would therefore go beyond
    such ‘traditional’ measures, in particular as regards operational cooperation and
    information sharing, as well as crisis management and supervision of cybersecurity
    compliance of private and public entities. This helps to ensure: (i) a higher level of
    cybersecurity for citizens; (ii) a high level of trust in business and cyber infrastructure
    and (iii) a high level of cyber resilience and ability to cope and prevent cyber incidents.
    Furthermore, with a more operational-oriented approach, this policy option could
    contribute to a greater extent to other social impacts, such as reduced levels of
    cybercrime and increased level of protection against cybersecurity incidents or data
    breaches. Increasing the level of cyber preparedness for businesses and other
    organisations may avoid potential financial losses as a result of cyberattacks, thus
    preventing the need to lay off employees.
    7.3. Environmental impacts
    No particularly significant environmental impact is expected for any of the policy options
    considered. However, increasing the overall level of cybersecurity could lead to the
    prevention of environmental risks/damage in case of an attack on a key service. This
    could be particularly valid for the energy, water supply and distribution or transport
    sectors. By strengthening the cybersecurity capabilities, the initiative could lead to more
    use being made of latest generation ICT infrastructures and services that are also
    environmentally more sustainable and to the replacement of inefficient and less secure
    legacy infrastructures. This is expected to contribute also to reducing the number of
    costly cyber incidents, freeing up resources available for sustainable investments. Option
    2 is expected to achieve such outcomes to a more limited extent, while option 3 to a
    greater extent, as the latter is expected to lead to more robust cybersecurity capabilities.
    7.4. Impacts on fundamental rights
    Since maintaining the status quo (policy 0) would entail maintaining a certain level of
    cybersecurity, it may also have some limited impact on improving personal data
    protection, should it lead to some reduction in the number and severity of incidents
    including data breaches.
    With option 2, increasing the level of cybersecurity and creating a level playing field for
    all operators falling in the scope of the NIS Directive by partially meeting the objectives
    mentioned above would most likely lead to improved personal data protection as a result
    of a reduced number and severity of incidents including data breaches. In option 3, the
    same type of impact would as for policy option 2, with potentially more intensity given
    that this policy option is expected to lead to more robust cybersecurity capabilities and
    consequently would have a more substantial impact on the number and severity of
    incidents, including data breaches.
    8. HOW DO THE OPTIONS COMPARE?
    As regards the effectiveness of the policy options, option 3 is most likely to meet the
    specific objectives to a high extent, while option 2 would have potential to meet these
    88
    objectives in a more limited way. This is because option 2 would introduce targeted
    changes to the current NIS Directive, with a view to clarifying certain provisions and
    improving harmonisation of the current rules. It would also cover additional (sub)sectors
    that are essential for the economies and societies of the Member States. However, this
    option would not change the overall approach and rationale of the legislative framework
    and would not allow a substantial change in relation to key processes, such as
    identification of OESs, operational cooperation and information sharing, crisis
    management or supervision and enforcement. These aspects, in relation to which
    problems were identified, as described in Sections 1 and 2 above, would not improve in a
    meaningful way in the medium and long-term. The overall impact of this policy option
    on the specific objectives defined in Section 5.2. would therefore not depart significantly
    from the status quo. This would perpetuate shortcomings that lead to an insufficient and
    not comparable level of cyber resilience for key players in the Member States and
    shortfalls in relation to joint situational awareness. Instead, option 3 goes beyond
    immediate fixes and entails a substantial change in approach towards the build-up of
    cybersecurity policies and measures across Member States. This would be notably done
    by consistent changes regarding key processes, such as the OES identification, bringing
    about shared responsibilities of various actors, public and private, and moving towards a
    more pragmatic and hands-on framework for operational cooperation, supervision and
    enforcement. The impact of this policy option on the level and effectiveness of
    cybersecurity across Member States is therefore likely to be high in the medium and long
    term, departing significantly from the status quo.
    As regards the economic impacts and efficiency, of the three options, options 2 and 3
    would entail additional compliance costs due to the extension of sectoral scope. While
    the sectoral scope of the NIS framework would be considerably enlarged in both options,
    option 3 balances the burden that may be created by the NIS requirements, notably from
    the supervision perspective, on both the new entities to be covered and the competent
    authorities, by establishing a two layer approach, with a focus on big and key entities and
    a differentiation of supervisory regime that allows only ex post supervision (i.e. reactive
    and without a general obligation to systematically document compliance) for a large
    number thereof, notably those considered ‘important’ yet not ‘essential’.
    For the new sectors, subsectors and services to be added to the NIS scope, an estimate of
    about 22% increase in their ICT security spending for the 3-4 years following the
    entry into force of the new framework was made as a conservative assumption. However,
    many other factors would naturally contribute to such increase, such as evolution of
    technologies and threat landscape, GDPR and other regulatory obligations, effects of
    particular incidents that may occur in the meantime or major crises, level of awareness,
    level of digitalisation, etc. For the sectors, subsectors and services already covered by the
    NIS scope, an estimate was made for an overall increase of about 12% of the ICT
    security spending on a reference period of three to four years. Measures such as the
    streamlining of reporting obligations are expected to diminish the administrative burden
    on the entities currently covered under the NIS scope. Furthermore, the security
    requirements imposed in options 2 and 3 would be risk management based, therefore any
    investment in security measures would be proportionate to the cyber-related risks. For
    option 3, due to the differentiation in the level of obligations between the essential and
    important entities, for the latter, the compliance costs would be more reduced.
    Furthermore, in option 3, a size cap would be applied to exclude as a rule from the NIS
    scope micro and small enterprises.
    As shown in Section 7.1., the median annualized cost of cyber crime was estimated in
    2015 to approximately EUR 4.63 million. Furthermore, the average cost of a single data
    breach was estimated to be EUR 3.5 million in 2018, with an annual increase of about
    89
    6.4% and about 10% to 13% at the level of various sectors. With this in mind, an average
    increase of ICT security spending per sector for three to four years ranging from 12% for
    the current NIS sectors up to a 22% for the new NIS sectors would lead to a proportionate
    benefit of such investments and even considerably exceed them for some sectors. At the
    level of individual companies, the compliance costs that may entail additional
    investments in automated security can only benefit companies in the medium and long
    term and reduce business loss.
    Overall, while option 3 appears to impose more administrative burden and compliance
    costs on the Member States authorities, on the medium and long term is also likely to
    bring substantial benefits through increased cooperation among Member States, including
    at operational level, as well as to incentivise, through mutual assistance and peer-review
    mechanisms and better overview of and interaction with key businesses, an overall
    increase in cybersecurity capabilities at national and regional level.
    As regards the benefits translated in reduction of costs of incidents, according to the
    modelling developed by the NIS review study, option 3 would be most impactful with a
    reduction in cost of cybersecurity incidents by EUR 11.3 billion over a 10-year
    period, as compared to EUR 8.3 billion in option 2. See also Annex 10.
    In relation to social impacts, option 3 is more likely to generate a more extensive
    positive (indirect) impact on society than the other analysed options, mainly because it is
    more likely to increase the level and consistency of cyber resilience of key actors across
    the Union. Increasing the level of cyber preparedness for businesses and other
    organisations may avoid potential financial losses as a result of cyberattacks.
    As far as environmental impacts are concerned, by strengthening the cybersecurity
    capabilities, options 2 and 3 may lead to more use being made of latest generation ICT
    infrastructures and services that are also environmentally more sustainable and to the
    replacement of inefficient and less secure legacy infrastructures. Option 3 would be
    expected to reach such achievements to a greater extent, since it would likely lead to
    more robust cybersecurity capabilities.
    As regards coherence with other legislation, initiatives or policy measures, options 2
    and 3 would further clarify the lex specialis rule (applicable, for example, in the case of
    financial services) and they would also bring providers of electronic communications
    networks or of publicly available electronic communications services under the NIS
    scope, thus allowing for more coherence of security requirements. Option 3 in particular,
    and notably its provisions on handling of supplier relationship security risks, would also
    ensure coherence with the upcoming cybersecurity certification schemes prepared by
    ENISA on the basis of the Cybersecurity Act, as well as with specific instruments such as
    the cybersecurity of 5G networks EU toolbox.
    The extensive consultations held with all relevant categories of stakeholders, including
    the OPC and the consultations conducted in the context of the NIS review study (see
    annexes 2 and 6), have indicated that both competent authorities and businesses would
    largely support a revision of the current NIS legal framework, hence options 2 and 3.
    Both categories of stakeholders pointed to the need to address certain aspects or
    expressed support for certain new concepts or policy-related measures that would be
    promoted only via option 3 (e.g. supply chain security policies, institutionalisation of an
    operational EU crisis management framework).
    As regards the proportionality of the intervention, options 2 and 3 do not go beyond
    what is necessary to meet the specific objectives satisfactorily. The security measures and
    reporting obligations set out in both these options correspond to the Member States and
    businesses’ requests to further clarify and harmonise the requirement level and would
    90
    help ensure a level playing field for similar entities across the EU, while at the same time
    levelling and raising the level of cyber resilience across Member States.
    In option 3, the setting out of minimum requirements for supervisory action, enforcement
    and penalties is triggered by the need to ensure a better overview and level of compliance
    with the NIS framework at national levels. This would also be complemented by the
    mutual assistance mechanism and the joint supervisory actions in cross-border cases, the
    success of which would depend on the effectiveness and consistency of supervisory and
    enforcement measures applied across the Union. Furthermore, the current lack of practice
    at Member States level in the enforcement of dissuasive penalties comes counter to the
    NIS framework requirements on penalties. Given the general level of this principle, it is
    highly unlikely that systematic infringement actions could lead to any effective results.
    The supervisory and enforcement requirements envisaged by policy option 3 are
    nevertheless corresponding to practices already implemented in a number of Member
    States that appear to be considered by an increasing number of countries. Furthermore,
    the effectiveness of the increased harmonisation of security requirements and reporting
    obligations would equally depend on the effectiveness of supervision and enforcement.
    In the GDPR context, the enforcement system and prescriptive provisions on supervision
    and penalties have contributed to an increased level of compliance and, more
    importantly, to an increased level of security spending at corporate level. Some estimates
    indicate that regulatory compliance is being the most significant factor driving
    organizations’ current spending on cybersecurity.250
    As option 3 envisages setting a minimum maximum level of administrative fines, and as
    in many cases security incidents also entail a data breach, the new NIS legal act would
    provide that in such cases GDPR would have prevalence and administrative fines can
    only be applied once in that context. At the same time, this would not entail that more
    incidents would be notified to data protection authorities, rather it would be for the
    cybersecurity competent authorities to determine whether a data breach was concerned
    by the violation for which an administrative fine is being considered for NIS-related
    obligations.
    250
    https://www.sans.org/reading-room/whitepapers/bestprac/spends-trends-2020-cybersecurity-spending-
    survey-39385 and https://www.zdnet.com/article/cybersecurity-this-is-how-firms-are-spending-their-
    budget-this-year/
    91
    Impacts Option 0:
    Baseline – Keep
    Status Quo
    Option 2:
    Limited changes to the
    NIS Directive
    Option 3:
    Systemic and
    structural changes
    and the adoption
    of a new legal act
    Effectiveness 0  
    Economic/
    Efficiency
    0  
    Environmental 0  
    Social 0  
    Coherence
    (synergies with
    other relevant
    legislation)
    0  
    Stakeholders'
    support
    0  
    Proportionality 0  
    Total 0
    
    
    
    
    Table 5: Overall impact of the various policy options. The symbols "" and "" indicate
    respectively positive () and negative () impacts as compared to the status quo. For
    each symbol a maximum a scale 1 to 3 (maximum positive or negative assessment) is
    used.
    9. PREFERRED OPTION
    9.1. Rationale and benefits of the preferred option
    Policy option 3 (systemic and structural changes to the NIS framework) emerges as the
    preferred option based on the assessment of effectiveness against the specific objectives
    and efficiency of costs versus benefits. Policy option 3 focuses on clearly determining the
    scope of NIS application, extended to a more representative fraction of EU economies
    and societies, while streamlining requirements, along with a more defined framework for
    supervision and enforcement that would aim at increasing the level of compliance. It also
    entails measures aimed at improving policy building approaches at Member States level
    and changing the paradigm thereof, promoting new frameworks for supplier relationships
    risk management and coordinated vulnerability disclosure. At the same time, this policy
    option envisages mechanisms aimed at fostering more trust among Member States, both
    authorities and industry, incentivising information sharing and ensuring a more
    operational approach, such as the mutual assistance and the peer-review mechanisms.
    This option would also provide for an EU crisis management framework, building on
    recently launched EU operational network, and would ensure more involvement of
    ENISA, within its current mandate, in holding an accurate overview of the cybersecurity
    state of the Union.
    92
    In terms of efficiency, while the option would entail additional compliance and
    enforcement costs for businesses and Member States, it would also lead to efficient trade-
    offs and synergies, with the best potential out of all policy options analysed to ensure an
    increased and consistent level of cyber resilience of key entities across the Union that
    would eventually lead to cost savings for both businesses and society.
    This policy option would lead to certain additional administrative burden and compliance
    costs for the Member States authorities. However, on balance, on the medium and long
    term would also bring substantial benefits through increased cooperation among Member
    States, including at operational level, as well as incentivising, through mutual assistance,
    peer-review mechanisms and better overview of and interaction with key businesses, an
    overall increase in cybersecurity capabilities at national and regional level. Policy option
    3 would also ensure to a great extent coherence with other legislation, initiatives or
    policy measures, including sector-specific lex specialis.
    As regards the choice of the legal instrument, i.e. directive, mention should be made that
    this would allow more leeway to the Member States in the preparations, compliance costs
    and expenses, hence easing the financial burden of an immediate compliance with new
    obligations. This may also bring benefits in terms of level of investments on the medium-
    and long-term, since a better spread of expenses over time would allow more thorough
    planning and gathering of supporting evidence and impacts analyses that allow more
    room for investment in research and innovative cybersecurity solutions and technologies.
    Furthermore, a number of envisaged provisions would be rather directed at Member
    States and would require further measures to be adopted at national level. From the
    consultations with the Member States, it appears that a significant number thereof are in
    favour of a directive rather than regulation.
    9.3. REFIT (simplification and improved efficiency)
    According to the Commission’s Regulatory Fitness and Performance Programme
    (REFIT), all initiatives changing existing EU legislation should aim to simplify and
    deliver stated policy objectives more efficiently (i.e. by reducing unnecessary regulatory
    costs and burdens).
    The revised NIS Directive under the preferred option foresees a general exclusion of
    micro and small entities from the NIS scope and lighter ex-post supervisory regime
    applied to a large number of the new entities under the revised scope (so-called important
    entities – approximately 43,000 entities, see also Annex 3 for more granular data). These
    measures aim to minimise and balance the burden put on companies and public
    administrations. At the same time, the revised NIS Directive would extend significantly
    the sectors and number of entities covered and thereby increase the overall compliance
    burden for a big portion of the new companies, as well as the burden put on the public
    administrations in the context of supervision and enforcement. For that reason, the
    revised NIS Directive in the preferred option would contain concrete actions aiming at
    reducing the regulatory burden, as follows:
     Replacing the complex identification system for OESs with a generally applicable
    obligation (i.e. the size-cap rule) which is expected to reduce administrative burden
    on the authorities, create legal certainty and level the playing field for companies
    across the Union.
     A higher level of harmonisation of security and reporting obligations, which would
    decrease compliance burden, especially for entities providing cross-border services.
     The establishment of a central registry operated by ENISA for all providers of digital
    services which would help national administrations to clarify fast and without
    93
    spending excessive resources in investigations, where the main establishment of
    concrete entity is and identify the Member State with jurisdiction over that entity.
     The mutual assistance between Member States authorities and the possibility of
    carrying out joint supervisory measures foreseen would not only contribute to more
    effective enforcement, but also streamline administrative resources and ultimately
    alleviate administrative burden through synergies.
     The inclusion of electronic communications networks or services providers251
    and
    trust service providers252
    in the scope of the revised NIS Directive and the repeal of
    their respective security obligations from the eIDAS Regulation and the European
    Electronic Communication Code.
     Encouraging Member States to consider a single entry point for notifications
    concerning security breaches stemming from the NIS Directive, the General Data
    Protection Regulation and the ePrivacy Directive, as explained in the description of
    policy option 3.
    251
    These are subject to security and incident notification obligations laid down in Article 40 of the
    European Electronic Communication Code. At the same time, these providers are subject to almost
    identical type of obligations under the NIS Directive as far as they also provide services included in the
    NIS scope such as IXP (Internet Exchange Points), DNS (Domain Name Servers) or cloud computing
    services.
    252
    These are subject to security and reporting obligations under Article 19 of the eIDAS Regulation, which
    are similar to those laid down in the NIS Directive. However, digital certificates provided by those
    providers are frequently used as authentication factors in the provision of financial services, cloud
    computing services or other essential services that fall under the current NIS Directive. Therefore, any
    security incident affecting the trust services used as authentication means within the essential services
    might also affect the continuity of the essential service itself and thereby trigger a double reporting.
    94
    REFIT Cost Savings – Preferred Option
    Description Amount Comments
    More harmonisation of
    security requirements,
    reporting obligations and
    supervisory and
    enforcement actions and
    more clarity on the scope by
    sectors and entities
    The quantification of the actual effects
    of the harmonisation measures would
    not be possible due to the wide cross-
    sectors and cross-country differences,
    as well as the considerable differences
    in the level of cybersecurity maturity
    and investment for both businesses and
    national authorities. However, it is
    expected for the harmonisation
    measures to provide more certainty and
    a more effective cooperation among
    Member States, consequently easing
    the burden on both businesses and
    administrations which is currently
    generated by insufficient clarity or
    inconsistency of certain requirements
    (e.g. identification of OESs or
    thresholds for incident notifications) or
    jurisdiction rules (notably as regards
    DSPs)
    Concerns businesses and
    national authorities
    Table 6: REFIT Cost Savings – Preferred Option
    10. HOW WILL ACTUAL IMPACT BE MONITORED AND EVALUATED?
    A revised NIS Directive will have to strike the balance between placing additional
    burden on competent authorities and businesses on the one hand, and achieving a higher
    level of cyber resilience on the other hand. Eliminating cyberattacks and incidents
    entirely is not a realistic perspective and investment in cybersecurity, while essential,
    cannot go up to a level which would have a detrimental effect on the core business and
    financial viability of the company. This needs to be taken into account when defining
    how success can be measured.
    A detailed table with monitoring indicators, expected targets and frequency of
    monitoring per indicator can be found in Annex 11 for the general objectives and in
    Annex 12 for specific and corresponding operational objectives. The assessment of
    indicators will be conducted by the Commission, with the support of ENISA and the
    Cooperation Group, starting 54 months following the entry into force of the new NIS
    legal act. Some of the monitoring indicators based on which the success of the NIS
    review would be assessed are as follows:
     Improved handling of incidents: By taking cybersecurity measures, companies
    are not only improving their ability to avoid certain incidents entirely, but also
    their incident response capacity. Measures of success are therefore i) the
    reduction of average time it takes to detect an incident, ii) the time it takes
    organisations on average to recover from an incident and iii) the average cost of a
    damage caused by an incident.
     Increased awareness of cybersecurity risks by the top management of
    companies: By requiring companies to take measures, a revised NIS Directive
    95
    would contribute to raising awareness of cybersecurity related risks amongst the
    top management. This can be measured by studying to which extent companies
    under the NIS scope are prioritising cybersecurity in internal company policies
    and processes as evidenced by internal documentation, relevant training
    programmes and awareness activities for the employees and prioritising security-
    related ICT investment. The management of all essential and important entities
    should also be aware of the rules laid down by the NIS Directive.
     Levelling sector-specific spending: ICT security spending varies considerably
    between sectors in the EU. By requiring companies in more sectors to take
    measures, deviations from the average sector-specific ICT security spending as a
    percentage of overall ICT spending should diminish between sectors and across
    Member States.
     Stronger competent authorities and increased cooperation: A revised NIS
    Directive would confer additional tasks on competent authorities. This would
    have a measurable impact on the financial and human resources dedicated to
    cybersecurity agencies at national level and should also have a positive impact on
    the capacity of competent authorities to proactively cooperate and therefore
    increase the number of cases where competent authorities are engaging with each
    other for the purpose of dealing with cross-border incidents or carrying out joint
    supervisory activities.
     Increased information sharing: The revised NIS would also improve
    information sharing among companies and with competent authorities. One of the
    targets of the review could be to increase the number of entities participating in
    the various forms of information sharing.
    As highlighted throughout the impact assessment, while at global level there is a wealth
    of metrics in cybersecurity research and literature for measuring cyber threats and
    cybersecurity measures, there are still considerable gaps in the availability of systematic
    data to populate these metrics and in particular when it comes to measuring the effect of
    particular policy actions or returns of security investments. On top of this, such
    systematic indicators and data are missing for the EU level in particular.
    For the reasons mentioned above, the preferred policy option analysed in this impact
    assessment also comprises a measure which aims at reinforcing an observatory role for
    ENISA, with the support of the Commission. This would enable, among others, the
    gathering of regular statistics and data on threats, incidents, resolves, capabilities and
    resources available, costs incurred, cross-border operational cooperation, research and
    innovation. A regular report on the state of cybersecurity in the Union will be
    published by ENISA. The findings of this report will also be used as a monitoring tool
    for the impact of the measures implemented through the preferred option.
    At the same time, ENISA, supported by the Commission, will also develop a regular
    business survey, to be launched in 2021-2022, that would systematically monitor the
    impact of the NIS framework and assess regularly (i.e. on an annual basis) the level of
    cyber resilience of businesses across Europe. The survey would cover entities falling
    within the NIS scope and assess aspects such as awareness of cybersecurity policies253
    and implementation of cybersecurity policies within the organisation, measured through
    indicators concerning the strength and sophistication of security measures, control and
    253
    e.g. the importance that the management of the organisation is giving to cybersecurity, how well are
    people being informed and trained, how is cybersecurity presented as a priority, etc.
    96
    capability to identify and manage risks254
    , resources available and fluctuations thereof,
    interaction with public authorities, occurrence, handling and impact of incidents.
    254
    For example: use of tools for vulnerability management and disclosure, frequency and depth of
    vulnerability scans, use of information systems audit coordination, use of tools to handle supplier risks.
    

    1_EN_impact_assessment_part2_v5.pdf

    https://www.ft.dk/samling/20201/kommissionsforslag/kom(2020)0823/forslag/1729193/2307178.pdf

    EN EN
    EUROPEAN
    COMMISSION
    Brussels, 16.12.2020
    SWD(2020) 345 final
    PART 2/3
    COMMISSION STAFF WORKING DOCUMENT
    IMPACT ASSESSMENT REPORT
    Accompanying the document
    Proposal for a Directive of the European Parliament and of the Council
    on measures for a high common level of cybersecurity across the Union, repealing
    Directive (EU) 2016/1148
    {COM(2020) 823 final} - {SEC(2020) 430 final} - {SWD(2020) 344 final}
    Europaudvalget 2020
    KOM (2020) 0823
    Offentligt
    1
    Table of Contents
    Annex 1: Procedural information........................................................................................5
    1. Lead DG, Decide Planning/CWP references.....................................................5
    2. Organisation and timing ....................................................................................5
    3. Consultation of the RSB....................................................................................5
    4. Evidence, sources and quality ...........................................................................5
    Annex 2: Stakeholder consultation......................................................................................7
    1. Introduction .......................................................................................................7
    2. Consultation scope and objectives.....................................................................7
    3. Consultation activities .......................................................................................7
    4. Results of the Open Public Consultation.........................................................10
    Annex 3: Who is affected and how?..................................................................................19
    1. Practical implications of the initiative.............................................................19
    2. Summary of costs and benefits........................................................................60
    Annex 4: Methodology and criteria for determining the additional sectors,
    subsectors and services considered for the NIS scope in policy options
    2 and 3 .......................................................................................................................70
    Annex 5: Evaluation report ...............................................................................................81
    2
    Glossary
    Term or acronym Meaning
    AI Artificial Intelligence
    CDN Content delivery network
    CSIRTs Computer Security Incident Response Teams
    CyCLONe European Cyber Crises Liaison Organisation Network
    DDoS Distributed Denial of Service
    DEP Digital Europe Programme
    DESI Digital Economy and Society Index
    DNS Domain Name System
    DORA Digital Operational Resilience Act for the financial
    sector
    DSP Digital service provider
    EASA The European Union Aviation Safety Agency
    ECCSA European Centre for Cybersecurity in Aviation
    ECI Directive Directive on the identification and designation of
    European critical infrastructures
    ECJ European Court of Justice
    EECC European Electronic Communications Code
    EMSA European Marine Safety Agency
    eIDAS (Regulation) Regulation on electronic identification and trust services
    for electronic transactions in the internal market
    ENISA The European Union Agency for Cybersecurity
    3
    GDPR General Data Protection Regulation
    IaaS Infrastructure as a service (cloud service model)
    ICS Industrial control system
    IOCTA Internet Organised Crime Threat Assessment
    IoT Internet of Things
    ISAC Information Sharing and Analysis Centre
    ISO International Organisation for Standardisation
    ITU International Telecommunications Union: The United
    Nations specialised agency for information and
    communication technologies
    IXPs Internet Exchange Points
    JRC European Commission’s Joint Research Centre
    LOTL European List of eIDAS Trusted Lists
    OES Operator of essential services
    OPC Open public consultation
    MeliCERTes Cybersecurity Digital Service Infrastructure
    Maintenance and Evolution of Core Service Platform
    Cooperation Mechanism for CSIRTs
    NACE Statistical Classification of Economic Activities in the
    European Community
    NIS Directive Directive concerning measures for a high common level
    of security of network and information systems across
    the Union
    NIST National Institute of Standards and Technology – US
    Department of Commerce
    4
    PaaS Platform as a Service (cloud service model)
    PPP Private Public Partnership
    ROSI Return of Security Investment
    SaaS Software as a Service (cloud service model)
    SME Small and medium-sized enterprises
    SPOC Single Point of Contact
    TFEU Treaty on the Functioning of the European Union
    TLD Top-level domain
    5
    ANNEXES
    ANNEX 1: PROCEDURAL INFORMATION
    1. Lead DG, Decide Planning/CWP references
    The lead DG is the Directorate-General for Communications Networks, Content and
    Technology. The Decide reference of this initiative is PLAN/2020/7447.
    The Commission Work Programme for 2020 provides, under the heading A Europe Fit
    for the Digital Age, the policy objective of Increasing cybersecurity, the initiative for the
    Review of the Directive on security of network and information systems (NIS Directive)
    (legislative, incl. impact assessment, Article 114 TFEU, planned for Q4 2020.
    2. Organisation and timing
    The Inter-service Steering Group was set up by the Secretariat-General to assist in the
    preparation of the initiative. The representatives of the following Directorates General
    participated in the ISSG work: Legal Service, HOME, JRC, TAXUD, DIGIT, GROW,
    FISMA, SANTE, MARE, DEFIS, MOVE, ENER, ECHO, EEAS, NEAR, AGRI,
    BUDG, REFORM, ENV, TRADE, ESTAT, HR, JUST, CLIMA.
    The last meeting of the Inter-Service Steering Group took place on 15 October 2020.
    An Inception Impact Assessment was published on 25 June 2020 and was open to
    feedback from all stakeholders for a period of 7 weeks.
    The draft Impact Assessment report and all supporting documents were submitted to the
    Regulatory Scrutiny Board (RSB) on 23 October 2020, in view of a hearing on 18
    November 2020.
    3. Consultation of the RSB
    On 23 October 2020, the Directorate-General for Communications Networks, Content
    and Technology submitted the draft Impact Assessment to the Regulatory Scrutiny
    Board, in view of a hearing that took place on 18 November 2020.
    4. Evidence, sources and quality
    The Commission carried out extensive preparatory work during the previous
    Commission’s mandate. Conformity checks were undertaken with a view to assessing the
    compatibility of the national implementing measures with the NIS Directive's provisions.
    Since June 2019, the Commission has also been organising country visits to gather
    feedback on the implementation and functioning of the Directive from numerous
    stakeholders. The Commission has collected information from a large number of
    stakeholders, including essential services operators, digital service providers and the
    national competent authorities. Moreover, under Article 23 (1) of the NIS Directive,
    based on the information provided by the Member States, the Commission adopted in
    October 2019 a report assessing the consistency of the approaches taken by Member
    States in the identification of operators of essential services (hereinafter called the ‘OES
    Report’). The Commission has collected feedback on the functioning of the NIS
    Directive from all participating Member States’ authorities and the European Union
    Agency for Cybersecurity (ENISA) also in the framework of the NIS Cooperation
    Group.
    6
    The results from the country visits, the conclusions from the OES Report and feedback
    from the NIS Cooperation Group discussions fed into the evaluation of the functioning of
    the current NIS Directive according to Article 23(2) as well as into the impact
    assessment. In addition to above actions, the Commission also collected evidence via an
    open public consultation, desk research, expert interviews, workshops with experts and
    focus groups with representatives of national authorities of Member States and
    businesses in the relevant sectors under scrutiny, as well as other stakeholders.
    As regards the economic impact, the impact assessment used available research on
    cybersecurity costs and cybercrime, as well as statistics mainly from sources such as:
    Eurostat and the Digital Economy and Society Index (DESI). However, as pointed out in
    the impact assessment, there are currently no available data comparable across the EU to
    measure the return of cyber security investment across sectors or per sector. While there
    are some models for the calculation of the returns of investment and in particular security
    metrics or cyber threat metrics, there is an overall absence of consistent data based on
    real cases that could support such metrics.
    The NIS review process was also supported by a support study1
    , which was launched in
    April 2020 and has its final report due by the end of 2020. The study was implemented by
    a consortium made of Wavestone, CEPS and ICF and supported the review by: (i)
    conducting an evaluation of the NIS Directive, (ii) conducting an analysis of a wide range
    of policy measures to be considered for the options developed in the Impact Assessment,
    (iii) conducting targeted consultations consisting of surveys, interviews and workshops,
    (iv) processing the results of the open public consultation.
    1
    Study to support the review of Directive (EU) 2016/1148 concerning measures for a high common level
    of security of network and information systems across the Union (NIS Directive) – N° 2020-665.
    7
    ANNEX 2: STAKEHOLDER CONSULTATION
    1. Introduction
    A periodical review of the overall functioning of the Directive (EU) 2016/1148
    concerning measures for a high common level of security of network and information
    systems across the Union (“NIS Directive” or “the Directive”) is a legal obligation
    foreseen by Article 23 (2) of the Directive, according to which the Commission shall
    report to the European Parliament and to the Council for the first time by 9 May 2021.
    The review together with the impact assessment and a potential legislative proposal have
    been announced in the Commission Work Programme 2020 for Q4 2020.
    Now, more than three years after the transposition deadline of the NIS Directive, all
    Member States have communicated to the Commission full transposition of the Directive
    into their national legislation.
    In order to gather valuable feedback from all stakeholders interested in the review of the
    NIS Directive, the Commission organized several consultation activities addressed to
    different interest groups.
    2. Consultation scope and objectives
    The consultation activities aim at collecting the views of Member States competent
    authorities, Union bodies dealing with cybersecurity, operators of essential services
    (OES), digital services providers (DSPs), as well as economic entities that could
    potentially become OES and DSPs in light of NIS2, trade associations, researchers and
    academia, cybersecurity industry professionals, consumer organisations and citizens. All
    these different stakeholder groups have important information and insights on actions
    taken for the implementation of the NIS Directive, as well as interest in and opinions on
    shaping the debate about the possible options for the future.
    The stakeholder consultation has two objectives:
    (1) To collect views on the implementation of the NIS Directive (to support the
    analysis on the retrospective evaluation of the Directive) ;
    (2) to collect views on the impacts of possible future changes to the legal act (to
    support the forward-looking assessment).
    The Commission has issued the terms of reference for a study to assist in evaluating the
    existing legal and policy framework, identifying policy objectives and proposing and
    assessing expected impact of a limited number of policy interventions. The study is set to
    run for 10 months from April 2020 until January 2021.
    3. Consultation activities
    The consultation activities seek to obtain input on the five main evaluation criteria based
    on the EU Better Regulation Guidelines (effectiveness, efficiency, relevance,
    coherence, EU-added value) as well as the potential impacts of possible options for the
    future. Both the open public consultation and the targeted surveys developed by the
    contractor were structured according to the logic of the five criteria.
    The following consultation activities were organised:
     Targeted interviews conducted by the Commission and in the framework of the
    report based on Article 23(1) of the NIS Directive, assessing the consistency of the
    approaches taken by Member States in the identification of operators of essential
    services required to implement cybersecurity measures (OES report). The Report was
    8
    published by the Commission on 28 October 2019 and was the first step towards the
    review of the NIS Directive. The Commission interviewed representatives from the
    competent authorities from nine Member States: Germany, Estonia, Croatia,
    Hungary. Lithuania, Malta, Poland, Portugal and Sweden.
     The combined evaluation roadmap/Inception Impact Assessment. It aimed to
    inform citizens and stakeholders about the Commission's work in order to allow them
    to provide feedback on the intended initiative and to participate effectively in future
    consultation activities. Citizens and stakeholders were, in particular, invited to
    provide views on the Commission's understanding of the current situation, problem
    and possible solutions and to make available any relevant information that they may
    have, including on possible impacts of the different options. The feedback period
    lasted from 25 June 2020 to 13 August 2020.
     An Open Public Consultation (OPC) with questions targeting citizens, stakeholders
    and cybersecurity experts. It included questions regarding all elements of the NIS
    Directive in order to gather information for the retrospective evaluation. It was also
    focused on policy options for a potential revision of the Directive. The aim was to
    collect diverse opinions and experiences from all stakeholder groups. A smaller set of
    questions was open to all participants. Respondents such as professionals in the field,
    or organisations with specific knowledge and expertise were directed to respond to a
    set of targeted questions within the same online survey. The Public Consultation,
    implemented according to the Commission's Better Regulation Guidelines for
    stakeholder consultations, was carried out for a 12-week period, starting on 7 July
    2020 and closing on 2 October 2020. The questionnaire was made available in all 24
    official EU languages, ensuring that the public consultation is accessible to as many
    stakeholders as possible, especially citizens. 206 replies were collected online, of
    which 182 were replies provided by actors located in EU27. The Commission has
    received replies from a variety of different stakeholders groups, such as
    companies/business organisations, business associations, academic/research
    institutions, consumer organisations, EU citizens, non-governmental organisations
    (NGO), public authorities and trade unions.
     Surveys undertaken by the contractor, ENISA and the Commission targeting
    competent authorities, OES, DSPs and organisations that could potentially be
    included in the scope of the NIS Directive following its revision. While the contractor
    and ENISA carried out the surveys, the selection of questions and the identification
    of the target groups were carried out in close cooperation with the Commission. The
    survey questions supported both the retrospective evaluation and the identification of
    policy options for a potential impact assessment. Targeted online questionnaires were
    sent out in July 2020 with a deadline for replies set on 7 August 2020.
    Three questionnaires were available online for all stakeholder groups: competent
    authorities with 46 respondents; OES with 49 respondents and DSPs with nine
    respondents. With regard to national authorities, 66% were centralised authorities,
    whereas remaining 34% were sectoral authorities. If it comes to centralised
    authorities, there was an equal participation of CSIRTs and Single Points of Contact
    (SPOC) – 37%, bodies representing both CSIRTs and SPOC contributed in 13% of
    replies and remaining 13% of respondents did not specify their functions. Most
    replies of national competent authorities were provided by Danish authorities (17%),
    followed by 13% replies provided by the Italian authorities, 9% replies from the
    Polish authorities, 7% responses of Finnish, the same percentage of questionnaire
    submitted by Dutch authorities and 4% of replies provided by authorities from
    9
    Bulgaria, Latvia, Luxembourg, Slovakia and Sweden. The rest of Member States
    provided replies that equal 2% of the total number of replies each.
    Concerning the online survey aimed for OES, 67% of respondents represented OES
    currently covered within the NIS Directive, 14% described themselves as providers
    of essential services outside of the current scope of the NIS Directive and the
    remaining 18% ticked box ‘Other’ (ex. Financial sector collaborative defence and
    information sharing consortium, ATM/ANS, DSP, Cybersecurity researcher, EU
    Agency, Trade Association; Telecoms, Professional association; German Technical
    and Scientific Association for Gas and Water).
    44% of respondents of the online survey addressed to DSPs are DSPs currently
    covered within the NIS Directive and 56% described themselves as ‘Other’ (ex.
    Providers of secure hardware for OES and DSPs, Information security company,
    Interested party, Cybersecurity company, Provider of security technologies)
     In-depth interviews carried out by the contractor. These interviews were conducted
    in order to gain a deeper understanding of current cybersecurity challenges, the
    evolving threat landscape and to discuss policy options for a potential revision of the
    NIS Directive. The experts were selected by the contractor upon consultation with the
    Commission. 16 interviews were conducted in the second and third quarter of 2020:
    four interviews with the competent authorities, seven with OESs, two with DSPs, two
    with the EU Institutions and Agencies and one with a Think-Tank.
     Workshops organized by the contractor. The workshops foreseen over the course
    of the study (Opening Workshop: June 2020; Intermediate Workshop: July 2020;
    Closing Workshops: 12 October 2020 for national competent authorities and 13
    October 2020 for the private sector) are crucial to present and discuss the findings of
    the study, as well as to gather feedback from different groups of stakeholders active
    in the field of cybersecurity. Due to the COVID-19 crisis, all the workshops were
    held online.
     An Opening Workshop took place as two separate virtual sessions on 8 and 11
    June 2020 with 119 registered participants. It included an introduction to the
    NIS Directive review process by the unit on Cybersecurity & Digital Privacy
    Policy (DG CNECT), followed by an overview of the current approach to the
    review of the NIS Directive and the forward-looking impact assessment
    provided by the Project Team (presentation of the study, methodological
    approach, work plan and stakeholder engagement plan).
     An Intermediate Workshop took place on 16 July 2020 with 144 registered
    participants. It provided participants with an update on the progress of the
    study to support the review of the NIS Directive including an overview of the
    different consultation activities. The preliminary findings coming from the
    evaluation of the functioning of the Directive were presented followed by a
    discussion with the participants on the impact of changes introduced by the
    NIS Directive since 2016 while assessing four main evaluation criteria:
    relevance, coherence, EU added-value, and effectiveness . This was followed
    by a session focusing on the high-level findings for the future policy measures
    and a discussion on those measures that are currently open to discussion
    throughout the review process, including the consultations with stakeholders.
     Two Closing Workshops took place on 12 October 2020 (for competent
    authorities, gathering over 65 participants), and 13 October (for the private
    sector, gathering over 60 participants). The workshops aimed to engage the
    participating stakeholders in a reflection on potential policy options to further
    10
    enhance the level of protection of network and information systems across
    Europe and their respective economic, environmental and social impacts
    accounting for current and future technological developments. The evidence
    collected from the Closing Workshop was thus used to feed into the forward-
    looking element of the evaluation study; ensuring that subsequent EU policy
    action relation network and information systems is relevant, applicable and
    future proof.
     Country visits to gather information about the implementation of the NIS Directive
    and its functioning across the European Union. The Commission has started to visit
    Member States in spring 2019. It has completed this exercise in July 2020, after
    visiting all 27 Member States. Twelve of these visits took place virtually, due to
    travel restrictions linked to the COVID-19 crisis. During the country visits, the
    Commission interviewed 117 national competent authorities, 136 operators of
    essential services and 18 digital service providers. Interlocutors were required to fill
    out a questionnaire covering all aspects of the implementation (such as national rules
    on OES identification, security requirements, incident notification and the
    cooperation with competent authorities). The Commission received and analysed 231
    such questionnaires.
     Meetings of the NIS Cooperation Group and its work streams. The Commission
    has gathered a wide variety of information about the functioning of the NIS Directive
    and its implementation by Member States since the Cooperation Group has been
    created in 2017. The Group gathers representatives from the competent authorities of
    all Member States and meets roughly four times per year. In addition, several sectoral
    and topical work streams have been created to discuss in-depth questions concerning
    the implementation of the NIS Directive in the Member States. The Commission is in
    constant dialogue with the national authorities in charge of the transposition and
    implementation of the NIS Directive. So far, two plenary meetings of the NIS
    Cooperation Group were focused on the review of the NIS Directive: the 15th
    meeting, which took place in June 2020 and the 16th
    meeting from September 2020.
    A special meeting of the Cooperation Group took place at the end October 2020.
    4. Results of the Open Public Consultation
     Profile of respondents
    By country: Respondents from Belgium were most numerous with 47 responses (22.8%),
    followed by 24 responses from Germany (11.7%), 18 responses from Austria (8.7%) and
    17 responses from France (8.3%). Regarding countries outside the EU, 12 responses
    were received from the USA (5.8%).
    By participant type: Trade associations representing both sectors covered by the NIS
    Directive and sectors that do not fall within the scope of the NIS Directive make up a
    third of the sample (68 responses) closely followed by companies covered by the NIS
    Directive, i.e. operators of essential services and digital service providers (57 responses).
    Other stakeholders (36 responses) include economic operators not covered by the NIS
    Directive, consumer organisations and EU bodies. 14 responses received were submitted
    by national competent authorities (CSIRTs included), while 10 responses were received
    from individual citizens.
     Relevance of the NIS Directive
    Respondents were asked to indicate the extent to which the objectives of the NIS
    Directive are still relevant. An overwhelming majority of the respondents indicated that
    the objectives of the Directive are still relevant, and even very relevant. To the
    11
    respondents, the most relevant objective of the three is to promote a culture of security
    across all sectors vital for the EU economy and society (77.2%). Similar response
    patterns were observed across different respondent categories.
     Cyber threat landscape
    Respondents were asked for their views on the evolution of the cyber threat landscape
    since the entry into force of the NIS Directive. An overwhelming majority of respondents
    indicated that the cyber threat level has increased since 2016 (88.4%), with 43.7%
    believing it has significantly increased. Across different respondent categories there is a
    consensus that the cyber threat level has increased since 2016. The respondents on
    average rated SMEs as rather poorly prepared in dealing with the evolving cybersecurity
    threats.
    Responses suggest that an increase in cybersecurity risk can notably be observed in the
    health sector, digital infrastructure, banking, electricity and financial market
    infrastructures. At the same time, respondents indicated that banking and financial
    market infrastructures hold the highest level of cybersecurity resilience. Conversely, the
    level of preparedness of the health sector was found lowest by respondents.
     Added value of EU security rules
    An overwhelming majority of the OPC respondents agreed that common EU rules are
    needed to address cyber threats. Two-thirds of them strongly agreed that cybersecurity
    rules should be aligned at EU level given that cyber risks can propagate across borders at
    high speed.
    Just over half (56.3%) of the OPC respondents strongly agreed with the statement that
    mandatory sharing of cyber-risk related information between national competent
    authorities across the EU would contribute to a high level of joint situational awareness
    on cyber risks.
    OPC respondents were less likely to disagree with the statement that all entities of a
    certain size providing essential services should be subject to similar EU-wide
    cybersecurity requirements (8.8% - 7.3% disagree, 1.5% strongly disagree).
     Sectorial scope of the NIS Directive
    Respondents were asked for their views about the appropriateness of the NIS Directive’s
    sectoral coverage. The overall results revealed that OPC respondents on average show
    significantly more support for the inclusion of public administrations and data
    centres within the scope of the NIS Directive. Just over half of the respondents
    supported the coverage of the chemicals (51.4%) and food supply (50.5%) industries.
    OPC respondents most frequently disagreed to the inclusion of social network providers
    (17.5%) and manufacturing industries (14.6%) in the scope of the Directive
    Half of the OPC respondents believed that the scope of the NIS Directive should include
    telecoms, while 18% of the respondents were of the opposite view. The most frequent
    reasons given for including undertakings providing public communications were as
    follows (in order of importance): (i) OES are highly dependent on telecommunications;
    (ii) telecommunications are equivalent to essential services; they cover information
    transmission networks; (iii) telecommunications and data technologies are consolidating
    and facing similar threats (iv) necessity to harmonise standards horizontally to reduce
    legislative complexity, avoid loopholes and create a common culture of cybersecurity.
    Some variations could be observed among certain stakeholder categories. National
    competent authorities were more likely not to agree to include undertakings providing
    12
    public communications under the NIS scope. 71.4% of cyber professionals and 61.4% of
    OESs and DSPs held the opposite view.
    Cyber professionals were more likely to agree to extend the scope of the NIS Directive to
    include further sectors and types of digital service at risk of cyber threats. On the other
    hand, OESs, DSPs and trade associations were far less likely to agree with 22.8% and
    25% of them respectively disagreeing with the prospect of including further digital
    services within the scope of the NIS Directive.
    Overall, the most frequently mentioned sectors in the respective open field questions
    were (in order of importance):
     Public services – e-government, e-health, and emergency services (police, fire)
     Telecommunications
     Energy and electricity
     Cloud and DNS providers
     Manufacturers of electronic hardware and software
     Traditional media online
     Social media platforms
     Postal and courier services
     Data centres
     Banking, finance, and insurance
     Food production and waste management
    When asked about digital service providers, the most reported types services which
    respondents considered should be included in the NIS Directive were:
     Data centres
     Social media platforms (social networks)
     Manufacturers and suppliers of important hardware and software
     Providers of communication and navigation services
     Service hosting providers
     All digital or internet products and services
     Application service providers (SAAS) and stores
     Online collaboration environments/tools, including video conferencing
     ICT security services
     Outsourced services such as application maintenance, Third Applications
    Formula and testing: externalised management tests, and BPO: Business process
    Outsourcing
     OTT services
     Telecoms
     Managed service providers and Managed Security Services (MSS),
     Payment provider gateways and financial transactions sites
     Regulatory treatment of OESs and DSPs
    The respondents were asked to agree or not as to whether the "light-touch" regulatory
    approach applied towards DSPs is justified and therefore should be maintained. OPC
    respondents more frequently believed that the “light-touch” regulatory approach
    applied to DSPs is no longer justified and should not be maintained (39.8%) while
    almost of third of the respondents could not expressed an opinion on this issue.
    Conversely, only 27.7% of the OPC respondents thought the regulatory “light-touch” for
    DSPs should be maintained. Among the responding Digital Service Providers, however,
    13
    69.2% thought that the “light touch” regulatory approach should be maintained and only
    23.1% that it should be done away with.
     National competent authorities and CSIRTs
    The respondents were asked to assess the extent to which the NIS Directive impacted
    national authorities dealing with the security of networks and information systems.
    Specifically, the question covered the following five components: (i) level of funding;
    (ii) level of staffing; (iii) level of expertise; (iv) cooperation of authorities across Member
    States; (v) cooperation between national competent authorities within Member States.
    Results suggest a strong perceived impact of the NIS Directive with about every second
    respondent indicating a medium to high effect across all five areas. The share of those
    choosing low impact ranges between 7.3% and 9.7%. In the meantime, the portion of
    those finding the NIS Directive had no impact remains marginal (1.0%-1.9%) regarding
    funding, staffing and expertise. No respondent chose this answer option when it comes to
    aspects of cooperation.
    Responses indicate a relatively strong perceived impact of the NIS Directive on national
    CSIRTs across the Member States. Nearly every second respondent considered that the
    Directive had high or medium impact across the six areas covered. In this regard, there
    appears to be no major discrepancies in response patterns. The Directive is found to have
    had the strongest impact regarding cooperation with OES and DSP. The share of those
    stating no impact is marginal, accounting for 0.5-1.5% of all answers.
     Identification of OESs and sector-specific aspects
    The respondents were asked about the effectiveness of the OES identification process. A
    significant share of respondents finds that the current approach does not ensure
    that all relevant OES are identified across the Union (37.4% disagrees and 6.3%
    strongly disagrees). In the same vein, above 40% of respondents disagree or strongly
    disagree with the statement that the identification process has contributed to the creation
    of a level playing field for companies from the same sector across the Member States.
    On the other hand, it appears that there is a more positive view as for the active
    engagement of competent authorities with OES. Similarly, according to the majority of
    the respondents, OES are aware of their obligations under the NIS Directive.
    A total of 115 OPC participants provided free-text answers. The most often discussed
    topic is the lack of harmonised approach resulting in significant inconsistencies in
    the way that Member States draw up lists of OES, divergent applications of the
    thresholds and different applications of the lex specialis principle. Companies of the
    same nature therefore might be imposed different requirements depending on the
    Member State where they operate. Likewise, a same company might be identified as
    OES in one Member State, a DSP in another Member State, or a service provider falling
    out of the NIS Directive in yet a different Member State. Existing convergence tools (i.e.
    Article 5(4) consultation procedure, and the NIS Cooperation Group working document
    on the identification of OES) have not been sufficiently used to achieve consistent
    identification or OES across the Union.
    Analysing OPC responses concerning the scope of the NIS Directive related to essential
    services, the question of lowering identification thresholds appears to be most divisive
    with nearly equal share in favour and against.
    The responses relating to the question of the identification of OESs point out that
    Member States’ approaches often show strong heterogeneity. To that end, it was
    suggested to set a common set of criteria to ensure a harmonised process of identification
    of OES.
    14
    The NIS Directive gives a wide room of discretion to Member States when it comes to
    the identification of operators of essential services, the setting of security requirements
    and the rules governing incident notification. Most respondents agreed that the approach
    leads to significant differences in the application of the Directive and has a strong
    negative impact on the level playing field for companies in the internal market
    (40.3%); the approach increases costs for OES operating in more than one Member State
    (48.1%); and that the approach allows Member States to take into account national
    specificities (52.9%).
    Responses related to the context of OES identification refer to the need to cover public
    sector by the Directive considering the magnitude of data they treat and potential impacts
    of a cyberattack. These answers argue that every sector working with essential data like
    personal data or business data should be compliant with the NIS Directive. In particular,
    the public sector should be included in the scope of the Directive, and more specifically
    all emergency services (e.g. police, fire brigade, technical aid), public administrations
    (e.g. citizens’ offices) as well as government offices at regional, state and federal level.
    A handful of responses set out concrete (sub-)sectors to be covered by the NIS Directive.
    In light of the COVID-19 pandemic, the pharmaceutical sector has been identified.
    Additionally, a small share of OPC answers link to the transport sector. According to
    these, automobile industry should be covered by the NIS Directive. Additionally, one
    response notes that transport (including rail, air, water) should differentiate between
    freight (referring to as critical) and passenger transport (referring to it as not critical).
    Food supply and manufacturing have also been mentioned by a few OPC participants.
     SMEs
    Responses suggest insufficient cyber resilience and risk management practices applied by
    SMEs. Particularly, small companies appear to be most vulnerable in this regard with
    27% of respondents providing lowest-possible evaluation.
    As far as small enterprises are concerned, 95 free-text answers have been received.
    Nearly all replies relate to the obstacles hindering their cybersecurity resilience. These
    argue that small companies often lack the financial and human capacity, staff and
    awareness to provide adequate cybersecurity to their operation. A large share of small
    companies do not perceive cyber threats as a risk to them or find that they do not
    face the same level of risk presented by large or medium sized companies. Answers
    note that the concern with a small company is when they have access into, or are
    connected with, larger targets, and thus become the vectors for cyber-attacks on more
    critical targets.
    98 free-text answer have been received in relation to medium-sized companies. Issues
    discussed are strongly comparable to those mentioned in relation to small companies.
    These entities, although most often have some sort of cybersecurity strategy in place,
    lack sufficient capacity, technical, financial, and human) to develop cybersecurity
    capabilities matching increased threats and risks compared to those in relation to small
    enterprises.
    There is an overall agreement that the level of resilience and risk management practices
    applied by SMEs differ from one sector to another. There appears to be an agreement that
    discrepancy exists related to level of resilience and the risk-management practices both
    by size of the enterprise and the (sub-) section in which it operates. These point out that
    in some sectors (i.e. banking, energy) there is a strong legislative framework and high
    level of cybersecurity maturity.
    15
    Many parties reflected their lack of knowledge or opinion on whether the exclusion of
    micro- and small enterprises from then scope of the NIS framework would be just, given
    their smaller impacts (38.8%). Objection to the statement came notably from
    cybersecurity professionals (of whom 42.9% disagreed or strongly disagreed with the
    sentiment), although this audience group in particular was starkly divided on the issue
    with almost half (47.6%) also taking the opposing stance. Trade associations and other
    stakeholders expressed greater support for the notion that micro-/small enterprise should
    be excluded from conventional treatment, however, with 42.6% and 30.6% of those
    asked agreeing or strongly agreeing, respectively.
    Most of the OPC respondents (60.2%) either agreed or strongly agreed that European
    legislation should require Member States to put in place frameworks to raise awareness
    of cyber threats among SMEs and to support them in facing cyber threats. Only 5.8% of
    the respondents either disagreed or strongly disagreed.
     The NIS Directive’s light-touch approach vis-à-vis DSPs
    Almost half (48.5%) of respondents asked about the effectiveness of the light-touch
    approach towards DSPs agreed that the cross-border nature of the NIS Directive’s
    operations justified the harmonised treatment of DSPs by comparison to OESs.
    Much of the audience however (36.9%), expressed no overall stance on the matter.
    Amongst parties who objected most strongly to the statement that the approach was
    contextually justified were OESs and DSPs themselves (19.3% of whom disagreed or
    strongly disagreed), indicating that groups most affected by the approach may feel more
    negatively towards the NIS Directive’s approach than those that are less impacted.
    Opinions on whether national authorities’ degree of supervision could be justified by the
    nature of services and cyber risk faced, in the case of DSPs, were divided. Over a third of
    respondents representing citizens (40.0%), cybersecurity professionals (42.9%) and
    national competent authorities (42.9%) disagreed or strongly disagreed with the
    statement, although among other groups, opinion was decidedly less negative. Trade
    association representatives, OESs and DSPs and other stakeholders generally perceived
    the justification of the level of national supervision to be more reasonable.
    As regards the level of DSPs cyber resilience, overall, participants rated cloud computing
    services as being the most prepared when it comes to cybersecurity related risks (32.5%
    said high or very high), followed by online search engines (24.8%), and lastly online
    marketplaces (20.9%).
     Security requirements
    Most respondents thought that imposing security requirements on OES by the NIS
    Directive has high and medium impacts in terms of cyber resilience. This opinion was
    shared among all types of stakeholders, but especially among OESs & DSPs (43.9% and
    36.8%) cybersecurity professionals (47.6% and 19%), and citizens (50% and 40%).
    While respondents overall appreciate the security requirements brought by the NIS
    Directive, lack of harmonisation limits its impact. The impact might be lower for large
    organisations as there was already an incentive on companies to protect themselves.
    Impacts are different also across sectors and Member States. It was noted that most of the
    NIS requirements were already in place before NIS Directive, and adaptions had to be
    made on the incident reporting process.
    Concerning the impact of imposing security requirements on DSPs by the NIS
    Directive, most stakeholders were not able to comment on the nature of the impact,
    including OESs & DSPs, Trade associations, NCAs & CSIRTs. However, those that did
    believed it had medium to high impact.
    16
    Overall, OPC respondents thought that DSP addressed in the NIS Directive were already
    aware of cybersecurity and had reasonable cyber security measures in place to protect
    their business models. Given the light-touch regime prescribed by the NIS Directive
    towards DSPs, the imposition of these minimal security requirements currently has a
    minimal impact on DSPs. The impact of imposing security requirements on DSPs also
    depends on the country. In countries where the maturity was initially low, the NIS had
    more impact.
    Most stakeholders could not answer or disagreed with the statement that there is
    sufficient degree of alignment of security requirements for OES and DSPs in all Member
    States.
    Respondents noted that while all Member States have introduced measures in accordance
    with the Directive so that OESs and DSPs have to have security requirements in place,
    improved alignment between the various approaches adopted in different Member States
    would be helpful because the wide discretion that is given to Member States under the
    NIS directive with respect to identifying OESs and establishing security requirements
    leads to incongruity between the different Member States.
    The stakeholders were asked a series of questions on the different approaches of Member
    States towards security requirements. Most respondents agreed that: prescriptive
    requirements leave too little flexibility to companies (49%); prescriptive requirements
    make it difficult to take into account technological progress, new approaches to doing
    cybersecurity and other developments (48.1%); the different level of prescriptiveness of
    requirements increases a regulatory burden for companies operating across different
    national markets (44.7%); the companies should have the possibility to use certification
    to demonstrate compliance with the NIS security requirements (45.6%). Some
    respondents noted that a higher level of prescription that is outcome focused is required
    in order to create sufficient common understanding of what is the regulatory obligation,
    as well as in order to provide the necessary incentives to organizations to pursue that
    compliance.
     Incident notification
    Member States are required to ensure that entities notify the competent authority or the
    CSIRT of incidents having a significant impact on the continuity or provision of services.
    Stakeholders were asked about the implementation of notification requirements under the
    NIS Directive. Most respondents agreed that: different reporting thresholds and deadlines
    across the EU create unnecessary compliance burden for OES (39.8%); Member States
    have imposed notification requirements obliging companies to report all significant
    incidents (43.2%); and that the majority of companies have developed a good
    understanding of what constitutes an incident that has to be reported under the NIS
    Directive (41.3%). On the other hand, more stakeholders did not know (39.8%) or
    disagreed (31.6%) with the statement that the current approach ensures that OES across
    the Union face sufficiently similar incident notification requirements.
    Respondents noted that since there are sometimes large differences in the definition of
    mandatory reporting of security incidents in the Member States, there are also no
    uniform reporting obligations. The lack of harmonisation for reporting of security
    incident under various regulations and programs, e.g. PSD2, GDPR, NIS, has led to a
    fragmented approach and creates an unnecessary compliance burden for OES. The lack
    of harmonization of incident reporting requirements at EU level is suggested an
    important issue. Identifying the right authority to inform and the right information to
    provide appears to be a heavy burden for firms along the critical path of managing the
    17
    incident itself. Fragmented approaches across Member States are suggested to imply
    additional regulatory and compliance burdens on companies.
    The responding OESs and DSPs were overwhelmingly against the broadening of
    reporting obligations under the NIS Directive. This is also the case among the responding
    trade associations representing sectors both covered and not covered by the NISD.
    National competent authorities and cybersecurity professionals remain split on the issue.
    As the OPC respondents were asked to think about ways of improving the information
    available to cybersecurity authorities on national level, they were then asked to describe
    which information gathered by national authorities should be made available at EU to
    improve common situational awareness. The most frequent information types given, in
    order of importance, were as follows:
     Aggregated statistical data describing the current cyber threat landscape.
     Top threats and top incidents in terms of occurrence.
     Emerging cyber threats.
     Incidents with cross-border relevance.
     Indicator of Compromise (IOC) notifications based on level of seriousness.
     Attacks on sectors, attack vectors, critical vulnerabilities.
     Best practices on risk identification, remediation and/or mitigation.
     Information sharing
    The respondents were asked to evaluate the level of incident-related information sharing
    between Member States. Setting aside those not in the position to reply, it appears that
    the level of information-sharing between MS requires substantial improvement as below
    chart presents. A larger proportion OPC respondents were critical than those assessing
    this aspect positively.
    OPC respondents were also asked about ways in which organisations could be
    incentivised to share more information with cybersecurity authorities on a voluntary
    basis. The most frequent suggestions made by the respondents revolved around the
    simplification of reporting processes guaranteeing anonymity, as well as free and
    transparent access to anonymised reporting information.
    The respondents were also asked to rate the level of information exchange on
    cybersecurity between organisations in their respective sectors. Around three-quarters of
    the respondents were unable to provide a rating. The level of information exchange was
    ranked the highest among organisations in the financial and banking sectors and the
    lowest among organisations in the health sector. A third of the respondents indicated a
    low level of information exchange across sectors, while a further 8.7% indicating a very
    low level. Just over a quarter of the respondents (26.7%) indicated a medium level of
    information exchange across sectors. Very few respondents thought the level of
    information exchange across sectors was high (3.4% or 7 out of 206 respondents).
    The OPC respondents were then asked how the level of information exchange between
    companies could be improved within Member States but also across the European Union.
    The most frequent suggestions were made, in order of importance:
     Centralising the information sharing duties either at EU or national level.
     Greater role for CSIRTs: establishing trusted CSIRTs and encourage sectoral-level
    CSIRTs to foster national and international information-exchange.
     National boards of experts meeting regularly to exchange information and best
    practices on mitigation and remediation.
     Through structured and trust-based mechanisms ensuring anonymous information
    18
    sharing by competent authorities.
     Developing European-level ISACs at sectoral level.
     Industry-led initiatives for intra-sector information sharing between OES.
     Making it a legal obligation through an EU-level regulatory activity.
     Promote the use of robust, automated information sharing architectures, capable of
    turning threat indicators into security protections in near-real time.
     Enforcement
    Most respondents did not know or were unable to answer whether: Member States are
    effectively enforcing the compliance of OES (45.1%); Member States are effectively
    enforcing the compliance of DSPs (62.1%); the types and levels of penalties set by
    Member States are effective, proportionate and dissuasive (50.5%); and whether there is
    a sufficient degree of alignment of penalty levels between the different Member States
    (63.6%).
     Efficiency
    Most stakeholders agreed to some extent that the effects of the NIS Directive have been
    achieved at a reasonable cost. In particular, trade associations (42.6%, plus 7.4% to a
    large extent), OESs & DSPs (40.4%, plus 17.5% to a large extent), NCAs & CSIRTs
    (35.7%, plus 14.3% to a large extent), cybersecurity professionals (38.1%, plus 9.5% to a
    large extent), and citizens (50%). The majority of stakeholders thought that the NIS
    Directive had medium to high impact on the overall level of resilience against cyber-
    threats across the EU. This opinion was shared especially among the OES & DSPs
    (33.3% high impact and 38.6% medium impact), Trade associations (27.9% high impact
    and 27.9% medium impact), cybersecurity professionals (14.3% high impact and 38.1%
    medium impact) and citizens (20% high impact and (70% medium impact).
     Coherence with other legal instruments
    The majority of trade associations, OESs & DSPs, and citizens rated the coherence of
    the NIS Directive as being medium and high. On the other hand, most of cybersecurity
    professionals and NCAs & CSIRTs thought the coherence was low and very low.
     Vulnerability discovery and coordinated vulnerability disclosure
    The respondents were asked to evaluate the level of effectiveness of national policies that
    are making vulnerability information available in a timelier manner. Just under a quarter
    of the OPC respondents (24.8%) thought their level of effectiveness were medium, while
    15.5% of the respondents rated the national disclosure policies as low or very low.
    The OPC respondents were asked if their organisation have implemented a coordinated
    vulnerability disclosure policy. A significant proportion of the respondents did not
    respond or indicated this did not apply to them or their organisation (48%, 99 out of 206
    respondents). 57 respondents went on to argue that national authorities such as CSIRTs
    could take proactive measures to discover vulnerabilities in ICT products and services
    provided by private companies.
    19
    ANNEX 3: WHO IS AFFECTED AND HOW?
    1. Practical implications of the initiative
    The initiative would affect the following stakeholders:
     Private sector/industry
     Public administration (from the perspective of being included under the NIS
    scope)
     Competent authorities (including CSIRTs and SPOCs)
    ENISA would also be affected in particular in policy option 3, which considers a number
    of additional measures within the limits of ENISA’s mandate.
    The assessment of impacts, including costs and benefits, for all the above-mentioned
    categories of stakeholders is covered by the main text of the Impact Assessment. This
    annex provides more detailed background information on the way the economic impact
    was analysed as regards the private sector/industry, for all the sectors, subsectors and
    services considered in the policy options, as well as public administration.
     Private sector/industry
    The NIS Directive is covering under its scope 7 sectors (each including subsectors and/or
    services) and types of digital services, as listed in Annexes II and III. In order to
    determine the potential impact of the policy options on businesses, the impact assessment
    considered the following steps:
    i. Determining the breadth of the (sub)sectors and services that would fall within the
    NIS scope, starting with the existing (sub)sectors and services, followed by the
    ones considered to be added in policy options 2 and 3.
    ii. Within these sectors, determining the extent of medium and large companies that
    would be covered under the NIS scope in policy option 3.
    iii. Estimating the average percentage of ICT security spending out of ICT spending
    and total revenue per sector and the likely evolution thereof.
    Further, the impact assessment estimated the costs and benefits at the level of
    organisations, including the particular economic impact on SMEs, as also reflected in
    section 2 of this annex and then respective costs and benefits tables.
    The data on the entities active in the (sub)sectors and services covered by or considered
    for the NIS scope are presented below in tables summarising the cross-sector estimates,
    as well as further below in a more detailed format, explaining the results presented in the
    summary tables. The analysis relied mainly on Eurostat and DESI data. Similar data was
    not available across the EU for all (sub)sectors or services analysed. Furthermore, the
    data was often available in aggregate forms which do not always entirely match the types
    of entities defined under the NIS scope, therefore in most cases the overall figures
    represent an overestimate. Whenever systematic data on number of companies and
    turnover was not available, proxies were used to the extent possible, including data or
    information on market structure or market shares. The data and estimates below provide
    therefore a meaningful, yet not comprehensive overview of the above-mentioned metrics.
    To the extent available, sector-specific data is provided on medium and large entities that
    would be covered as a rule by the NIS scope in policy option 3. Furthermore, for the
    sectors currently covered by the NIS scope, a comparison is being made with the number
    of OES notified by the Member States.
    20
    Mention should be made that in policy option 2, the identification process for OESs
    would be maintained. Even if a certain cross-sector harmonisation of identification of
    thresholds may be achieved, the overall identification system would remain complex and
    would not be expected to lead to a notable increase of identified OESs. Therefore, in this
    option, it is expected for competent authorities to supervise the same or a similar number
    of operators as the ones that are currently identified as OES rather than the total number
    of companies in the respective sectors and subsectors featured in the tables and
    supporting data below.
    For all the data sourced Eurostat (notably number of companies, including medium and
    large, turnover and average turnover per company), the data used (as the most recent
    available) is from 2018. Where no source for the data/information is mentioned in the
    footnotes to the table, it shall be assumed that it is Eurostat data as mentioned above. The
    table cells marked N/A read as either no available data or not of application for that
    particular segment.
    In relation to the following operators and service providers considered for the addition to
    the NIS scope due to their digital intensity, inter-dependencies with other sectors and/or
    importance for society (including in the light of the COVID-19 crisis), insufficient
    granular data was available to allow a data analysis in this Impact Assessment report:
    operators of government-owned and privately-owned ground-based infrastructure that
    support the provision of space-based services; EU reference laboratories (as defined by
    the Proposal for a Regulation of the European Parliament and of the Council on serious
    cross-border threats to health); manufacturers of medical devices and in vitro diagnostic
    medical devices (as defined in Regulation (EU) 2017/745 and Regulation (EU)
    2017/746), manufacturers of medical devices considered as critical during a public health
    emergency (according to Article 20 of the Commission Proposal for a Regulation on a
    reinforced role for the European Medicines Agency in crisis preparedness and
    management for medicinal produces and medical devices); entities conducting research
    and development activities of medicinal products (as defined in Directive 2001/83/EC);
    electricity market participants as defined by Regulation (EU) 2019/943 providing
    aggregation, demand response or energy storage services as defined by Directive (EU)
    2019/944, and operators of hydrogen production storage and transmission.
    21
    Table 1: Cross-sector summary of the estimation of size and relevant turnover of the sectors, subsectors and types of services currently covered by the
    NIS framework – policy options 0, 2 and 3
    Sector or
    type of
    service
    Subsector/s Number of
    companies
    (EU level)
    Number of
    companies of
    medium and
    large size (EU
    level)
    Total turnover
    – million EUR
    (EU level)
    Average
    turnover
    per
    medium
    and large
    company
    – million
    EUR (EU
    level)
    Number of
    OES
    reported
    by
    Member
    States by
    October
    2020 (EU
    level)
    Comments/disclaimers
    Energy Electricity
    and gas
    supply
    154,967 3,099 1,040,979.37 335.9 872 The data cover also energy generation
    companies, which are currently not in the
    NIS scope and are considered under policy
    options 2 and 3.
    Transport2
    Water 16,051 380 776,749.4 38.22 156 For land transport, the NIS Directive covers
    only rail (infrastructure managers and
    railway undertakings) and road (road
    authorities and operators of intelligent
    transport services). For the road transport,
    data was not available to the level of
    granularity of the types of entities covered by
    the NIS framework. However, given that the
    Air 4,172 228 165
    Rail Approx.
    4503
    N/A 73
    Road4
    N/A N/A 126
    2
    Of all transport sector, approx. 1.15% are of medium and large size.
    3
    Assumption made based on Eurostat data from 2014-2018. No data was available on the medium and large rail enterprises.
    4
    The NIS scope (Annex II of the NIS Directive) covers only road authorities and operators of intelligent transport services.
    22
    NIS framework covers entities which are
    dependent on network and information
    system, it is unlikely that the number of such
    road transport entities would be high, rather
    in the ranges of hundreds.
    Banking 6,0885
    Approx. 3,5006
    Assets of EUR
    43,348B7
    / 411 There was no available data on the overall
    revenues of banks in the EU.
    Financial
    market
    infrastructure
    CCPs, stock
    exchanges,
    systemic
    internalisers,
    trade
    repositories
    and MTFs
    3508
    N/A N/A N/A 172 There was no available data on the size of the
    market infrastructures, nor on their revenues.
    Health Hospitals 13,2009
    N/A EUR
    475,061.91
    (expenditure)10
    N/A 12,46911
    Drinking Water 14,116 870 EUR 49,082.8 28 822 These aggregated data are an overestimate,
    5
    European Banking Federation data for 2019. It also includes the UK.
    6
    Assumption made based using the banks which are covered by the system of European banking supervision as a proxy.
    7
    https://www.ebf.eu/facts-and-figures/statistical-annex/.
    8
    Impact assessment accompanying the review of the European Supervisory Authorities SWD(2017) 308
    9
    2.6 hospitals for 100,000 inhabitants estimated in Europe in 2015. Source: https://hospitalhealthcare.com/latest-issue-2018/hope-2018/hospitals-in-europe-healthcare-data-9/
    10
    Healthcare expenditure in EU-27 was of EUR 1,309,016.26 million in 2018, while hospitals were the largest providers in expenditure terms, accounting for more than one third
    (36.3 %) of all expenditure in the EU-27: https://ec.europa.eu/eurostat/statistics-explained/index.php?title=Healthcare_expenditure_statistics#Healthcare_expenditure
    11
    Mention should be made that of this total 12,469, 10,897 entities were identified by a single Member State.
    23
    water supply
    and
    distribution
    collection,
    treatment and
    supply
    since, in addition to water supply, collection
    and treatment are also covered.
    Digital
    infrastructure
    Country-code
    top-level
    domain
    registries
    28 major
    country-code
    top-level
    domain
    (ccTLD)12
    28 N/A N/A 173 Very limited market data is available for this
    sector.
    Individual
    internet
    exchange
    points (IXPs)
    140 IXPs13
    (one
    company
    usually
    administers
    several
    IXPs)
    N/A N/A N/A
    12
    one in each Member State plus EURid, which administers .eu
    13
    Referenced for 2020. The 140 IXPs are located in the EU, with some being of global importance.
    24
    Domain name
    system (DNS)
    providers -
    made up of a
    wide range of
    providers
    fulfilling
    different
    functions
    along the
    name
    resolution
    chain
    Authoritative
    DNS
    Resolution
    Two root name
    servers14
    , 28
    major ccTLD
    entities15
    and a
    large number
    of domain
    name registrars
    and web
    hosting
    companies16
    N/A N/A
    Recursive
    DNS
    Resolution
    DNS resolvers
    provided by
    most internet
    service
    providers17
    and
    by third
    parties, mostly
    large global
    technology
    companies
    N/A N/A N/A
    14
    providing authoritative DNS resolution for the root zone, located in the Netherlands and Sweden.
    15
    The ccTLDs of the 27 Member States (such as .de, .fr or .pl) and of the European Union (.eu), but not counting regional ccTLDs, such as .ax of Åland Islands (Finland). These
    provide authoritative DNS resolution for their respective TLD namespaces.
    16
    offering authoritative DNS resolution as part of their domain registration services.
    17
    As part of the internet access arrangement. See the data on electronic communication networks and services.
    25
    located outside
    the EU.
    Cloud
    computing
    services
    Estimates of
    approx.
    1,70018
    Only few large
    companies19
    :
    Amazon20
    ,
    Microsoft,
    Google and
    IBM.2122
    OVH
    (the largest
    European
    Cloud Service
    Provider) gets
    less than 1% of
    total revenues
    generated in
    this market.
    N/A N/A N/A According to the 2020 Digital Economy and
    Society Index (DESI)23
    , in 2018, 26% of
    European enterprises purchased cloud
    computing services and incorporated cloud
    technologies. Among the enterprises that
    used cloud computing services, 55 % were
    ‘highly dependent’.24
    Telecoms are also often heavily featured in
    their local markets (e.g. Deutsche Telekom,
    Orange, KPN are among the main cloud
    providers).25
    According to DESI26
    , across the EU market,
    total revenues generated by public cloud
    services increased by 21% between 2018 and
    2019 and are expected to continue to grow
    18
    There is no precise estimate of the number of European cloud service providers, only estimates such as this one by business information platforms:
    https://www.crunchbase.com/hub/europe-cloud-computing-companies
    19
    Oligopolistic market.
    20
    France, Germany, the UK and the Netherlands.
    21
    Salesforce, Rackspace and Oracle are global providers that are further down in the country rankings, with Salesforce ranking fifth overall across Europe.
    22
    European players such as OVH, Enter, Aruba, Outscale and Fabasoft do not grasp any significant market shares globally.
    23
    https://ec.europa.eu/digital-single-market/en/integration-digital-technology .
    24
    At the two extremes, the majority of enterprises in the manufacturing sector (51 %) belonged to the upper-medium dependence group, while the majority in information and
    communication (71 %) reported using advanced services and hence belonged to the high dependence group.
    25
    Among European telecoms, Deutsche Telekom is the largest cloud provider thanks to a strong position in Germany and smaller operations in multiple other countries, which help it
    to place sixth overall across all of Europe. Source: https://www.srgresearch.com/articles/amazon-microsoft-lead-cloud-market-all-major-european-countries
    26
    https://ec.europa.eu/digital-single-market/en/integration-digital-technology
    26
    by 50% until 2021.
    Online
    marketplaces
    7,00027
    12028
    357,20329
    N/A N/A By mid-2020, 1 million EU businesses were
    selling goods and services via online
    platforms.30
    In 2018, 40 % of EU enterprises
    with web sales used an e-commerce
    marketplace.31
    The number of users in e-
    commerce is expected to amount to 557.5m
    by 2024. The size of marketplaces varies
    widely, from turnover exceeding EUR 1
    billion to a turnover of less than EUR
    100,000.32
    Online
    search
    engines
    N/A One dominant
    player
    (Google33
    ),
    followed by
    N/A N/A N/A
    27
    Commission estimate of 2019: https://ec.europa.eu/commission/presscorner/detail/en/IP_19_1168
    28
    Conservative estimate based on a sample of marketplaces for a competition-related sector inquiry conducted by the Commission in 2015-2017: REPORT FROM THE
    COMMISSION TO THE COUNCIL AND THE EUROPEAN PARLIAMENT Final report on the E-commerce Sector Inquiry, COM(2017) 229 final and SWD(2017) 154 final:
    https://ec.europa.eu/competition/antitrust/sector_inquiry_swd_en.pdf
    29
    Estimate of the revenue in the e-commerce market in Europe in 2020: https://www.statista.com/outlook/243/102/ecommerce/europe
    30
    For 2017, the European Business-to-Consumer e-commerce turnover was forecasted to reach around EUR 602B, at a growth rate of nearly 14%.
    31
    https://ec.europa.eu/eurostat/statistics-explained/index.php?title=E-commerce_statistics#Web_sales_dominant_in_all_EU_countries
    32
    REPORT FROM THE COMMISSION TO THE COUNCIL AND THE EUROPEAN PARLIAMENT Final report on the E-commerce Sector Inquiry, COM(2017) 229 final and
    SWD(2017) 154 final: https://ec.europa.eu/competition/antitrust/sector_inquiry_swd_en.pdf
    33
    Over 90% of the general search market in Europe.
    27
    few small
    players34
    34
    In the general search market in Europe, Google is the super dominant search engine with an estimated market share of over 90% of web searches (Netmarketshare.com.), followed
    by Bing with less than 3%. Players such as Seznam in Czechia and Qwant in France are among the very few European-based search engines present on this market.
    28
    Table 2: Cross-sector summary of the estimation of size and relevant turnover for the additional sectors, subsectors and types of services considered
    for the extension of the NIS scope in policy options 2 and 3
    Sector or type
    of service
    Subsector/s Number of
    companies
    (EU level)
    Number of
    companies of
    medium and
    large size (EU
    level)
    Total
    turnover –
    million EUR
    (EU level)
    Average
    turnover per
    medium and
    large
    company –
    million
    EUR (EU
    level)
    Comments/disclaimers
    Providers of
    electronic
    communications
    networks or of
    publicly
    available
    electronic
    communications
    services 3536
    Telecom
    providers
    37,204 N/A 322,297 8.66 (for all
    sizes)
    Both options 2 and 3 would cover all
    entities, irrespective of the size. For
    option 3, this represents an exemption
    from the size cap rule, due to the fact
    that this highly regulated sector
    already implements a high level of
    security standards and excluding micro
    and small providers from the NIS
    scope may negatively impact these
    existing standards.
    Programming
    and
    broadcaster
    providers
    7,775 N/A 61,521.9 7.9 (for all
    sizes)
    35
    Broadcasting services are also considered under this sector, as well as emergency communication services
    36
    https://ec.europa.eu/eurostat/statistics-explained/index.php?title=Information_and_communication_service_statistics_-_NACE_Rev._2
    29
    Chemicals and
    chemical
    products
    Manufacturing 23,845 3,193 555,865.8 135.85
    Waste
    management
    Waste
    collection,
    treatment and
    disposal
    activities
    44,189 2,616 161,537.3 41.76
    Waste water Sewerage 10,955 473 22,963.9 23
    Postal and
    courier services
    N/A 89,480 869 102,036.2 69.87
    Food supply Wholesale and
    retail sale of
    foods and
    beverages
    595,233 5,303 1,056,828.1 98 The data represent an overestimate,
    since they also cover wholesale and
    retail of tobacco, which would not be
    included in the NIS scope in policy
    options 2 and 3.
    Energy Electricity
    generation
    3,944
    (representing
    at least 95% of
    the national net
    electricity
    generation in
    the EU)
    82 main
    electricity
    generating
    companies37
    N/A N/A The NIS Directive does not cover
    electricity generation under the
    electricity subsector. Policy options 2
    and 3 would add this subsector to the
    NIS scope. The data on electricity
    generation companies (number and
    turnover) was included in the above
    aggregated data covering the
    37
    https://ec.europa.eu/eurostat/statistics-explained/index.php?title=Electricity_generation_statistics_%E2%80%93_first_results#Production_of_electricity
    30
    electricity and gas subsectors. There
    was no granular data available on
    number of medium and large
    electricity generation companies. By
    October 2020, Member States (EU-27)
    have notified to the Commission that
    they identified 473 OES in the
    electricity subsector, excluding
    electricity generation.
    Central oil
    stocktaking38
    23 N/A N/A N/A Emergency oil stocks can be held by
    the Member State itself or through so-
    called Central Stockholding Entities
    (CSEs); the Member State may also
    impose an obligation on economic
    operators (typically oil companies) to
    hold the stocks for the benefit of the
    State. Several Member States have
    opted for a mixed system where part
    of the stocks is held by economic
    operators while the other part is held
    by a Central Stockholding Entity.
    Four Member States currently have no
    CSE, placing the entire obligation on
    the industry.
    (Nominated)
    electricity
    market
    13 N/A N/A N/A Some Member States have/used to
    have only one NEMO. NEMOs are
    often small companies.
    38
    As defined in point (f) of Article 2 Directive 2009/119/EC
    31
    operators
    (NEMOs)
    Electricity
    market
    participants
    N/A N/A N/A N/A The inclusion in the NIS scope of
    electricity market participants, as
    defined in point (25) of Article 2 of
    Regulation (EU) 2019/943, providing
    aggregation, demand response or
    energy storage services as defined in
    points (18), (20) and (59) of Article 2
    of Directive (EU) 2019/944 providing
    aggregation, demand response or
    energy storage services was
    considered notably due to their
    importance for the energy sector and
    the Green Deal.
    No relevant granular data was
    available.
    Operators of
    hydrogen
    production
    storage and
    transmission
    N/A N/A N/A N/A The strategic vision for a climate-
    neutral EU envisages hydrogen as an
    important contributor to the EU energy
    mix by 2050 with a share of 13-14%.
    This position has been further fostered
    by the Communication “A hydrogen
    strategy for a climate-neutral Europe”
    COM(2020) 301). Turning clean
    hydrogen into a viable solution to a
    decarbonised EU will necessarily
    demand a dedicated infrastructure of
    key importance for the new EU energy
    32
    system and economy in general.
    No relevant granular data was
    available.
    Heat production
    and supply
    District
    heating and
    cooling
    N/A N/A 672,000
    (823,000
    when
    biofuels and
    geothermal
    sectors are
    included)39
    N/A Heating and cooling accounts for
    approx. 46% of Europe’s final energy
    demand.40
    In EU households, heating
    and hot water alone account for 79%
    of total final energy use.41
    Cooling is a
    fairly small share of total final energy
    use. In industry, 70.6% of energy
    consumption is used for space and
    industrial process heating, 26.7% for
    lighting and electrical processes such
    as machine motors, and 2.7% for
    cooling.
    Health EU reference
    laboratories
    N/A N/A N/A N/A EU reference laboratories as defined in
    Article 15 of the Proposal for a
    Regulation of the European Parliament
    and of the Council on serious cross-
    border threats to health and repealing
    Decision No 1082/2013/EU.
    No relevant granular data was
    available.
    39
    considering biomass, biogas, heat pumps and solar-thermal segments.
    40
    https://ec.europa.eu/eurostat/statistics-explained/index.php?title=Electricity_and_heat_statistics&oldid=493775#Derived_heat_production
    41
    https://ec.europa.eu/energy/topics/energy-efficiency/heating-and-cooling_en?redir=1
    33
    Research and
    development
    activities of
    medicinal
    products
    N/A N/A N/A N/A Research and development activities
    of medicinal products as defined in
    Article 1 point 2 of Directive
    2001/83/EC of the European
    Parliament and of the Council on the
    Community Code relating to medicinal
    products for human use.
    No relevant granular data was
    available.
    Manufacturing Food products 192,328 10,215 724,116.3 57.50 Given the breadth of the
    manufacturing sector, policy options 2
    and 3 would consider the addition only
    of a number of manufacturing
    subsectors which would be of greater
    importance for the society and
    economies, taking also account of their
    relevance for the population and for
    the essential services currently covered
    by the NIS scope or considered to be
    added.
    Beverages 27,909 1,047 144,034.1 83.8
    Basic
    pharmaceutical
    products and
    pharmaceutical
    preparations
    3,352 934 240,420.3 224.46 This includes, among others, the
    manufacture of medicinal active
    substances to be used for their
    pharmacological properties in the
    manufacture of medicaments:
    antibiotics, basic vitamins, salicylic
    and O-acetylsalicylic acids, processing
    34
    of blood, etc and manufacture of
    medicaments: antisera and other blood
    fractions, vaccines, etc., manufacture
    of medical diagnostic preparations,
    manufacture of radioactive in-vivo
    diagnostic substances - manufacture of
    biotech pharmaceuticals.
    Medical
    devices, and in
    vitro
    diagnostic
    medical
    devices
    N/A N/A N/A N/A Medical devices as defined in point 1
    of Parliament and of the Council on
    medical devices and in vitro medical
    diagnostic Article 2 of Regulation
    2017/745 of the European devices as
    defined in point 2 of Article 2 of
    Regulation 2017/746 of the European
    Parliament and of the Council.
    No relevant granular data was
    available.
    Medical
    devices
    considered as
    critical during
    a public health
    emergency
    N/A N/A N/A N/A The list of public health emergency
    critical medical devices would be
    adopted by the Medical Devices
    Steering Group in line with Article 20
    of the Commission Proposal for a
    Regulation on a reinforced role for the
    European Medicines Agency in crisis
    preparedness and management for
    medicinal produces and medical
    devices.
    No relevant granular data was
    35
    available.
    Computer,
    electronic and
    optical
    products
    33,063 2,410 279,521.2 104.2
    Electrical
    equipment
    38,919 3,378 292,423.3 88.5
    Machinery and
    equipment
    77,627 8,956 722,795.9 70.1
    Motor
    vehicles,
    trailers and
    semi-trailers42
    16,585 2,944 1,106,882.1 369.85
    Other transport
    equipment
    13,068 1,058 236,726.7 210.65
    Digital
    infrastructure
    Data centres Geographically
    concentrated
    market in
    Europe with
    Market
    players, such
    as Equinix or
    Interxion,
    N/A N/A Data centres provide different types of
    services enabling data processing and
    storage (such as colocation or
    dedicated hosting). Some large
    companies also operate their own data
    42
    Very specific aspects relating to the manufacturing process of cars are also covered by the General Safety Regulation, notably reflecting the UN Regulations on Cybersecurity and
    Software Updates to pave the way for mass roll out of connected vehicles. However, not all cybersecurity risks concerning the manufacturers are covered in that context, nor
    specific NIS-related requirements, such as incident reporting, information sharing, etc.
    36
    Frankfurt,
    London,
    Amsterdam
    and Paris43
    dominating.
    include global
    companies,
    but also
    medium and
    large firms
    focusing on
    the European
    market.
    centres. Data centres are the physical
    infrastructure used for the provision of
    cloud-based services. The market is set
    to reach a size of approx. EUR 36.40
    billion by 2025.
    Content
    delivery
    networks
    (CDN)
    Highly
    concentrated
    global market.
    None of the
    major
    providers are
    headquartered
    in the EU.
    In 2016, 95 %
    of global
    CDN traffic
    for web-based
    apps was
    delivered by
    10 companies.
    N/A N/A N/A
    Social networks Very few
    social
    networks
    providers in
    Europe, the
    most
    significant
    ones being
    non-European
    Facebook had
    a market share
    in social
    media of over
    70% and at
    times over
    80% in 2019-
    2020,
    followed by
    N/A N/A According to DESI45
    , 65% of internet
    users in the EU used social networks
    in 2019.
    43
    So-called FLAP.
    45
    https://ec.europa.eu/eurostat/statistics-explained/index.php/Social_media_-_statistics_on_the_use_by_enterprises
    37
    businesses. Pinterest,
    Twitter and
    Instagram
    with less than
    12% and other
    players such
    as Youtube,
    Tumblr,
    Vkontakte
    with less than
    1%.44
    Trust service
    providers
    190 active
    qualified trust
    service
    providers46
    operating in 28
    of the 31 EU
    and
    EEA/EFTA
    countries47
    N/A N/A N/A For this types of services, both options
    2 and 3 would cover all entities,
    irrespective of the size. For option 3,
    this represents an exemption from the
    size cap rule, due to the fact that within
    the eIDAS framework, some security
    standards are already implemented and
    excluding micro and small providers
    from the NIS scope may negatively
    impact these existing standards.
    Operators of
    government-
    owned and
    N/A N/A N/A N/A
    Specific ground-based infrastructure
    that directly supports space-based
    components of the EU’s space
    44
    https://gs.statcounter.com/social-media-stats/all/europe
    46
    There are further 19 trust service providers currently being taken over and further 59 without active trust services listed on the browser that comprise both the qualified and non-
    qualified status. D.4 – Draft Final Report, 14 September 2020 - Evaluation study of the Regulation no.910/2014 (eIDAS Regulation), SMART 2019/0046, Ecorys, VVA, Deloitte,
    Spark, pages 21-22 and 24.
    47
    The European List of Trusted Lists (LOTL), sourced from the Trusted List Browser (https://webgate.ec.europa.eu/tl-browser/#/) on 8 September 2020.
    38
    privately-owned
    ground-based
    infrastructure
    that support the
    provision of
    space-based
    services
    programme, including Galileo,
    EGNOS, Copernicus, GOVSATCOM
    and Space Surveillance and Tracking
    are excluded.
    No relevant granular data was
    available.
    39
    Table 1 above is based on the following data and analysis.
    Energy
    In the energy sector, the NIS Directive is currently covering:
    o Electricity supply operators
    o Electricity Transmission and Distribution System Operators
    o Operators of oil transmission pipeline
    o Operators of oil production, refining and treatment facilities, storage and
    transmission
    o Gas supply operators
    o Gas Transmission and Distribution System Operators
    o Gas storage system operators
    o LNG system operators
    o Natural gas operators
    o Operators of natural gas refining and treatment facilities
    The data presented below covers the electric power generation, transmission and
    distribution subsector (electricity supply subsector), the manufacture of gas; distribution
    of gaseous fuels through mains subsector (gas supply subsector), as well as steam and air
    conditioning supply.48
    This data is presented in an aggregated form in Eurostat analysis.
    Although it does not fully match the scope of the entities covered by NIS under energy
    sector, it offer a meaningful proxy for the companies operating in the electricity and gas
    subsectors, which are covered by NIS. Of the above-mentioned aggregated data at EU
    level, steam and air conditioning supply represents only 5.15% of the number of
    companies and 2.52% of the overall turnover, which was then deducted from the total
    number of companies affected and corresponding turnover thereof.
    Mention should be made that these aggregate data cover also energy generation
    companies, which are currently not covered by NIS and which are considered for the
    extension of the NIS scope under the policy options 2 and 3. The data is therefore an
    overestimate in this regard for the baseline scenario. Separate data only on electricity
    generation are presented under options 2 and 3 and the difference highlighted
    accordingly. There is no EU-wide Eurostat data available on the operators of oil
    transmission pipelines, oil production, refining and treatment facilities, storage and
    transmission.
    According to the aggregate Eurostat data at EU level, the number of medium and large-
    size companies represent about 2% of the total number of companies in this sector.
    48
    https://ec.europa.eu/eurostat/statistics-
    explained/index.php?title=Electricity,_gas,_steam_and_air_conditioning_supply_statistics_-
    _NACE_Rev._2
    40
    Overview of number of affected businesses in the electricity and gas sector
    Number of companies in
    electricity, gas, steam and air
    conditioning supply (2018)
    Number of medium and
    large-size companies in
    electricity, gas, steam and
    air conditioning supply
    (2018)
    EU-27 163,125 1,492
    EU-27 total
    extrapolating data on
    number of medium
    and large size
    companies to deduct
    missing data from
    some MS49
    / 3,262
    EU-27 total only
    electricity and gas
    (excluding the steam
    and air conditioning
    supply)
    154,967 3,099
    Source: Eurostat50
    By October 2020, Member States (EU-27) have notified to the Commission that they
    identified 872 OES in the energy sector.
    The table below reflects the total turnover at EU level of companies in the electricity and
    gas subsectors in 2018:
    Estimation of average company turnover
    EU-27 TOTAL
    (2018)
    EU-27 TOTAL
    for medium and
    large companies
    (2018)
    EU-27 TOTAL
    only electricity
    and gas for
    medium and
    large size
    enterprises
    (excluding the
    steam and air
    conditioning
    supply) (2018)
    EU-27
    TOTAL only
    electricity
    and gas for
    medium size
    enterprises
    (excluding
    the steam
    and air
    conditioning
    supply)
    (2018)
    49
    Taking account that overall, according to Eurostat data, approximately 2% of the total companies in
    electricity, gas, steam and air conditioning are of medium and large size.
    50
    https://ec.europa.eu/eurostat/statistics-
    explained/index.php?title=Electricity,_gas,_steam_and_air_conditioning_supply_statistics_-
    _NACE_Rev._2 .
    41
    Turnover
    (million EUR)
    1,450,460.3 1,067,890.2 1,040,979.37 137,890
    Number of
    companies
    163,125 3,262 3,099 974
    Average
    turnover per
    company
    (million EUR)
    / / 335.9 141,57
    Source: Eurostat51
    Transport
    In the transport sector, the NIS Directive is currently covering:
    o Air transport (air carriers, airport managing bodies, airports, entities operating
    ancillary installations contained within airports, traffic management control
    operators providing air traffic control).
    o Rail transport (infrastructure managers, railway undertakings).
    o Water transport (inland, sea and costal passenger and freight water transport
    companies, managing bodies of ports, operators of vessel traffic services).
    o Road transport (road authorities, operators of intelligent transport systems).
    Overview of the number of companies, turnover and average turnover per company for
    land (rail, road) and transport via pipelines, water and air transport
    EU-27
    TOTAL
    (2018) –
    land (rail,
    road) and
    transport
    via
    pipelines)
    EU-27
    TOTAL for
    medium and
    large
    companies
    (2018) –
    land (rail,
    road) and
    transport
    via pipelines
    EU-27
    TOTAL
    (2018) –
    water
    EU-27
    TOTAL for
    medium and
    large
    companies
    (2018) -
    water
    EU-27
    TOTAL
    (2018) – air
    transport
    EU-27
    TOTAL for
    medium and
    large
    companies
    (2018) – air
    transport
    EU-27
    TOTAL
    (2018) –
    land,
    transport
    via
    pipelines,
    water and
    air
    EU-27
    TOTAL for
    medium and
    large
    companies
    (2018) –
    land,
    transport
    via pipelines
    water and
    air
    Turnover
    (million
    EUR)
    548,085.4 304,630 122,979.1 45,046.5 105,684.9 46,592.3 (of
    which
    8.089,2 for
    medium
    companies)
    776,749.4 396,268.8
    Number of
    companies
    880,426 9,760 16,051 380 4,172 228 (of
    which 149
    medium
    companies)
    900,649 10,368
    Average
    turnover
    per
    company
    / 31.21 / 118.54 / 204.35 (of
    which 54,28
    for medium
    companies)
    / 38.22
    51
    Idem.
    42
    (million
    EUR)
    Source: Eurostat52
    The land transport category covered by the above table represents however an aggregate
    of a wide range of transport companies, ranging from rail to trucking industry, many of
    which are not actually covered by the NIS Directive, which in relation to land transport
    covers only: rail transport (in particular infrastructure managers and railway
    undertakings) and road (in particular road authorities, not covered by the land transport
    data, and operators of intelligent transport services, in relation to which it is unclear
    whether they are covered by the overall land transport data). The most recent and
    comprehensive data on the number of railway operators available in Eurostat dates from
    2014: 435 operators. For the following years up to 2018, more data is missing per
    Member State, but nevertheless one could estimate, taking account of an average increase
    in the number of companies per Member State between 2014 and 2018, that the overall
    number of railway operators in 2018 in all Member States would be of about 450.53
    The
    number of medium and large operators would therefore be smaller. No data was available
    on the medium and large rail enterprises.
    For the road transport, data by Eurostat or from other source was not available to the level
    of granularity of the types of entities covered by the NIS framework. However, given that
    the NIS framework covers entities which are dependent on network and information
    system, it is unlikely that the number of such road transport entities as defined by NIS
    would be high, rather in the ranges of hundreds, notably as regards medium and large
    entities.
    By October 2020, Member States (EU-27) have notified to the Commission that they
    identified 620 OES in the transport sector, of which 165 in the air transport, 156 in the
    water transport and 199 in land transport (73 rail and 126 road).
    Banking
    European Banking Federation data shows that there were 6,088 banks in the EU
    (including UK) in 2019, with assets amounting to EUR 43,348B.54
    In the system of
    European banking supervision, banks are supervised by the European Central Bank and
    the national supervisors of the countries that participate in the system.55
    The banking
    supervision system covers 21 countries (of which four non-EU), 115 significant banks
    (representing 82% of euro area banking assets), under direct supervision of the European
    Central Bank, and 2,611 less significant banks, under direct national supervision. The
    significant and less significant banks covered by the European banking supervision
    system and amounting to 2,726, could be considered a proxy for medium and large size
    banks. While the European banking supervision system does not cover all EU Member
    States, it nevertheless covers a significant number thereof and information could be
    extrapolated as to assume that approximately 3,500 of credit institutions in the whole of
    the EU would be of medium and large size.
    By October 2020, Member States (EU-27) have notified to the Commission that they
    identified 411 OES in the banking sector.
    52
    https://appsso.eurostat.ec.europa.eu/nui/submitViewTableAction.do
    53
    https://ec.europa.eu/eurostat/databrowser/view/rail_ec_ent/default/table?lang=en
    54
    https://www.ebf.eu/facts-and-figures/statistical-annex/
    55
    https://www.bankingsupervision.europa.eu/about/ssmexplained/html/ssm.en.html
    43
    There was no available data on the overall revenues of banks in the EU.
    Financial market infrastructures
    The NIS Directive currently covers operators of trading venues and Central
    Counterparties.
    The impact assessment accompanying the review of the European Supervisory
    Authorities56
    estimated around 350 market infrastructures (such as CCPs, stock
    exchanges, systemic internalisers, trade repositories and MTFs) in the EU.
    By October 2020, Member States (EU-27) have notified to the Commission that they
    identified 172 OES in the financial market infrastructures.
    There was no available data on the size of the market infrastructures, nor on their
    revenues.
    Health
    The NIS Directive currently covers health care settings, including hospitals and private
    clinics.
    Healthcare expenditure in EU-27 was of EUR 1,309,016.26 million in 2018.57
    Hospitals
    were the largest providers of healthcare in expenditure terms, accounting for more than
    one third (36.3 %) of all expenditure in the EU-27, i.e. EUR 475.061,91 million. Relative
    to population size and in euro terms, in 2017 the healthcare expenditure was highest
    among the EU Member States in Sweden (EUR 5,200 per inhabitant), Denmark and
    Luxembourg (both EUR 5,100 per inhabitant), with the lowest in Bulgaria (EUR 591 per
    inhabitant) and Romania (EUR 494 per inhabitant).58
    There were 2.6 hospitals for 100,000 inhabitants estimated in Europe in 2015, i.e.
    approximately 13,200.59
    By October 2020, Member States (EU-27) have notified to the Commission that they
    identified 12,469 OES in the health sector. The total number of hospitals cannot however
    be compared with the number of currently identified OES in the healthcare system
    (i.e.12,469). This is because about 87% of the number of identified OESs comes from the
    same Member State which identified every single hospital in the country, no matter the
    size, thus illustrating once more the deep divergence in the identification approaches at
    Member State level. In option 3, with the application of the size cap, this number is
    expected to considerably decrease. At the same time, additional medium and large
    hospitals in other Member States that currently were not identified as OES would be
    added in the NIS scope. The overall resulting number is however expected to be lower
    than the couple of thousand ranges.
    Drinking water supply and distribution
    The NIS Directive currently covers suppliers and distributors of water intended for
    human consumption.
    56
    SWD(2017) 308.
    57
    https://ec.europa.eu/eurostat/statistics-
    explained/index.php?title=Healthcare_expenditure_statistics#Healthcare_expenditure
    58
    Providers of ambulatory health care (25.6 %) and retailers and other providers of medical goods
    (17.6 %) were the second and third largest providers of healthcare in expenditure terms.
    59
    https://hospitalhealthcare.com/latest-issue-2018/hope-2018/hospitals-in-europe-healthcare-data-9/
    44
    Overview of the number of companies, turnover and average turnover per company for
    water collection, treatment and supply
    EU-27 TOTAL
    (2018)
    EU-27 TOTAL for
    medium companies
    (2018)
    EU-27 TOTAL for
    medium and large
    companies (2018)
    Turnover
    (million EUR)
    49,082.8 8,861.6 24,374.6
    Number of
    companies
    14,116 680 870
    Average turnover
    per company
    (million EUR)
    / 13 28
    Source: Eurostat60
    The above data is wider than the water supply subsector covered by the NIS Directive,
    therefore the overall number of companies and turnover would is a substantial
    overestimate.
    By October 2020, Member States (EU-27) have notified to the Commission that they
    identified 822 OES in the drinking water supply and distribution sector.
    Digital infrastructure
    As the NACE classification does not include separate categories for the various digital
    infrastructures covered by the NIS Directive and considered in the impact assessment,
    only very limited market data is available for this sector.
     Country-code top-level domain registries
    In 2019 there were 28 major country-code top-level domain (ccTLD) registries with
    headquarters in the EU (one in each Member State plus EURid, which administers .eu).
    In 2019, all 28 entities were of medium or small size.
     Internet exchange points
    In 2020 there were 140 individual internet exchange points (IXP) located in the European
    Union, with some being of global importance. The actual number of companies active in
    the sector is smaller, as companies often administer more than one IXP. While a small
    percentage of IXPs is managed by medium-sized companies, most IXPs in the EU are
    managed by small companies.
     Domain name system providers
    The domain name system (DNS) is made up of a wide range of providers fulfilling
    different functions along the name resolution chain:
    Authoritative DNS resolution:
     There are two root name servers, providing authoritative DNS resolution for
    the root zone, located in the Netherlands and Sweden.
    60
    https://appsso.eurostat.ec.europa.eu/nui/submitViewTableAction.do
    45
     There are 28 major ccTLD entities61
    providing authoritative DNS resolution
    for their respective TLD namespaces.
     There is a large number of domain name registrars and web hosting companies
    offering authoritative DNS resolution as part of their domain registration
    services. These companies range from micro to large in size and many are
    located outside the European Union. For example, EURid lists 706 registrars
    for the .eu domain, of which 116 are located outside the EU.
    Recursive DNS resolution:
     DNS resolvers provided by most internet service providers as part of the
    internet access arrangement (for numbers see section on electronic
    communication networks and services)
     DNS resolvers provided by third parties, mostly large global technology
    companies located outside the European Union.
    By October 2020, Member States (EU-27) have notified to the Commission that they
    identified 173 OES in the digital infrastructure sector.
    Cloud computing services
    In 2018, the global cloud market62
    was estimated to account for USD 288B and is
    forecasted to grow by over 1.7 fold by 2021 to reach USD 475B63
    . While public cloud is
    and will remain the largest segment of the global cloud market with estimated revenues
    of USD 170B in 2018 and USD 277B by 2021, hybrid and private cloud will also grow.
    Total hybrid cloud revenues were estimated64
    to reach USD 52.2 B in 2018. By 2021,
    total revenues are expected to reach USD 79.5B. In 2018, total private cloud revenues
    were estimated65
    to reach USD 66.5B. By 2021, total private cloud revenues are expected
    to reach USD 99.9B. ‘Software as a Service’ (SaaS)66
    captures the two third of public
    cloud revenues while ‘Infrastructure as a service’ (IaaS)67
    and ‘Platform as a Service’
    (PaaS)68
    respectively one fifth and one sixth. By 2021, SaaS will continue to capture
    more than half of the revenues, while IaaS and PaaS will double their respective revenues
    in average.
    The public cloud market structure is oligopolistic composed of only few large companies
    in which the three leaders - AWS, Microsoft and Google - in aggregate account for
    61
    The ccTLDs of the 27 Member States and .eu, but not counting regional ccTLDs, such as .ax of Åland
    Islands (Finland)
    62
    Market growth estimations are based on revenues generated from cloud delivery models – public,
    private and hybrid – for cloud service providers and IT operators.
    63
    Worldwide Whole Cloud Forecast, 2017 – 2021, IDC, 2017.
    64
    ‘ Worldwide Whole Cloud Forecast, 2017 - 2021, IDC, 2017.
    65
    ‘ Worldwide Whole Cloud Forecast, 2017 - 2021, IDC, 2017.
    66
    instant computing infrastructure, provisioned and managed over the internet Examples: Google Apps,
    Dropbox, Salesforce, Cisco WebEx, Concur, GoToMeeting.
    67
    cloud computing model that provides virtualized computing resources over the internet. Examples:
    DigitalOcean, Linode, Rackspace, Amazon Web Services (AWS), Cisco Metapod, Microsoft Azure,
    Google Compute Engine (GCE).
    68
    cloud computing model where a third-party provider delivers hardware and software tools to users over
    the internet. Usually, these tools are needed for application development. A PaaS provider hosts the
    hardware and software on its own infrastructure. Examples: AWS Elastic Beanstalk, Windows Azure,
    Heroku, Force.com, Google App Engine, Apache Stratos, OpenShift.
    46
    almost 65% of the market in 201869
    . AWS is the leader. Alone it accounts for 40% of the
    public cloud market revenues when estimated by public IaaS and PaaS revenues.
    Microsoft and Google respectively rank second and third. Alibaba is the main key new
    entrant with already a strong presence in Asia.
    Amazon remains the top cloud provider in Europe and the leader in all major European
    cloud country markets.70
    Microsoft ranks second, Google third and IBM fourth.71
    European players such as OVH, Enter, Aruba, Outscale and Fabasoft do not grasp any
    significant market shares globally. At European level, OVH (the largest European Cloud
    Service Provider) gets less than 1% of total revenues generated in this market. Telcos are
    often heavily featured in their local markets and Deutsche Telekom, Orange and KPN all
    rank fourth in their home countries. Among European telecoms, Deutsche Telekom is the
    largest cloud provider thanks to a strong position in Germany and smaller operations in
    multiple other countries, which help it to place sixth overall across all of Europe.72
    The
    table below provides an overview of the cloud services market in Europe for Q1 2020.
    While there is no precise estimate of the number of European cloud service providers
    (some business information platforms estimate over 1,700 cloud service providers in
    Europe)73
    , as mention above, only a handful appear to be of medium and large size and
    therefore would be under the NIS scope in policy option 3.
    Overall, there are two expected future developments in the cloud market. First a
    significant raise in cloud demand for SaaS solutions that are tailored-made: (i) to respond
    to sectorial specific companies’ needs, (ii) to enable emerging technology services to
    take-up such as AI and blockchain services and; (iii) to manage energy efficiently and
    secured data flows and workloads optimization across the entire computing continuum
    including at the edge. Second, a raise in the demand for both secured hybrid cloud and
    edge computing solutions associated with increased needs for system integration business
    products and skills and; change management competences along the computing value
    69
    ‘ No Change at the Top as AWS Remains the Leading Public Cloud Providers in all Regions’, Synergy
    Research Group, 2018.
    70
    France, Germany, the UK and the Netherlands.
    71
    Salesforce, Rackspace and Oracle are global providers that are further down in the country rankings,
    with Salesforce ranking fifth overall across Europe.
    72
    https://www.srgresearch.com/articles/amazon-microsoft-lead-cloud-market-all-major-european-
    countries
    73
    https://www.crunchbase.com/hub/europe-cloud-computing-companies
    47
    chain to support companies and public administrations’ to successfully transition to
    hybrid cloud and efficiently utilizing edge computing.
    The European cloud infrastructure service revenues (including IaaS, PaaS and hosted
    private cloud services) were USD 6B in Q1 2020, with trailing twelve-month revenues
    reaching well over USD 21B. They are currently growing at 38% per year. The four
    largest country markets are the UK, Germany, France and the Netherlands, which in
    aggregate account for 63% of the total. Other countries in the top ten are Italy, Spain,
    Ireland and Belgium. While much smaller than the US market, European cloud revenues
    are growing more rapidly.74
    Europe’s public cloud market is however expected to grow
    at 22% until 2022.75
    According to the Digital Economy and Society Index (DESI) thematic report on
    integration of digital technologies76
    , across the EU market, total revenues generated by
    public cloud services increased by 21% between 2018 and 2019. Total revenues are
    expected to continue to grow by 50% between 2019 and 2021. Software security, as a
    SaaS application, contributed €115.5 million to total SaaS revenues on the EU market. Its
    revenue growth rate is expected to increase by 48% between 2019 and 2021, making it
    the fastest growing SaaS application over that period.
    Online marketplaces
    By mid-2020, 1 million EU businesses were selling goods and services via online
    platforms, and more than 50% of SMEs selling through online marketplaces sell cross-
    border. For 2017, the European Business-to-Consumer e-commerce turnover was
    forecasted to reach around EUR 602B, at a growth rate of nearly 14%.
    Web sales can be carried out via own websites or apps or via e-commerce marketplaces
    available on external websites or apps. According to Eurostat data, during 2018, 88 % of
    EU enterprises with web sales used their own websites or apps, while 40 % used an e-
    commerce marketplace.77
    EU enterprises realised 7 % of their total turnover from web
    sales during 2018, where 6 % was realised from web sales via own websites or apps and
    only 1 % from sales via online marketplaces.
    At global level, online marketplaces sold USD 2.03 trillion in 2019. Sales on marketplace
    sites, like those operated by Alibaba, Amazon, eBay and others, accounted for 57% of
    global web sales in 2019.78
    According to Statista79
    the revenue in the e-commerce market in Europe is projected to
    reach USD 421,927m in 2020. The number of users in e-commerce is expected to
    amount to 557.5m by 2024. The average revenue per user is expected to amount to USD
    877.33.
    In 2019, the Commission estimated a number of approximately 7,000 marketplaces in the
    EU.80
    In a sector inquiry into e-commerce launched by the Commission in May 2015 and
    finalised in June 2017, 37 marketplaces were selected for the inquiry, including the most
    important marketplaces and price comparison tools in the EU at the time, both the biggest
    74
    https://www.srgresearch.com/articles/amazon-microsoft-lead-cloud-market-all-major-european-
    countries
    75
    International Data Corporation (IDC).
    76
    https://ec.europa.eu/digital-single-market/en/integration-digital-technology
    77
    https://ec.europa.eu/eurostat/statistics-explained/index.php?title=E-
    commerce_statistics#Web_sales_dominant_in_all_EU_countries
    78
    Digital Commerce 360's analysis:
    79
    https://www.statista.com/outlook/243/102/ecommerce/europe
    80
    https://ec.europa.eu/commission/presscorner/detail/en/IP_19_1168
    48
    international players and the most relevant regional ones, covering the sale and price
    comparison of all products within the scope of the sector inquiry.81
    The size of
    marketplaces varies widely and ranges from marketplaces with turnover exceeding EUR
    1 billion to marketplaces with a turnover of less than EUR 100,000. The selected
    marketplaces targeted altogether customers in 14 Member States. It can therefore be
    considered that a conservative proxy for the number of large and medium online
    marketplaces active across all Member States could be roughly 120 marketplaces.
    Online search engines
    In the general search market in Europe there is one super dominant search engine,
    Google, with an estimated market share of over 90% of web searches82
    , followed by Bing
    with less than 3%. European players such as Seznam in Czechia and Qwant in France are
    among the very few European-based search engines present on this market.
    Table 2 above is based on the following data and analysis.
    Providers of electronic communications networks or of publicly available electronic
    communications services83
    Overview of number of telecommunication operators, turnover and average company
    turnover
    EU-27 TOTAL (2018)
    Turnover (million EUR) 322,297
    Number of companies 37,204
    Average turnover per company (million
    EUR)
    8.66
    Source: Eurostat84
    Overview of number of providers of programming and broadcasting activities, turnover
    and average company turnover
    EU-27 TOTAL (2018)
    Turnover (million EUR) 61,521.9
    Number of companies 7,775
    Average turnover per company (million
    EUR)
    7.9
    Source: Eurostat85
    81
    REPORT FROM THE COMMISSION TO THE COUNCIL AND THE EUROPEAN PARLIAMENT
    Final report on the E-commerce Sector Inquiry, COM(2017) 229 final and SWD(2017) 154 final:
    https://ec.europa.eu/competition/antitrust/sector_inquiry_swd_en.pdf
    82
    Netmarketshare.com
    83
    Broadcasting services and emergency communication services would also be included in this category.
    84
    https://ec.europa.eu/eurostat/statistics-
    explained/index.php?title=Information_and_communication_service_statistics_-_NACE_Rev._2
    49
    Chemicals (manufacture)
    The production of chemicals hazardous to health in the EU was 222.6 million tonnes in
    2018.86
    The aggregated production of chemicals hazardous to environment is of about 84
    million tonnes.
    Overview of number of providers of manufacturing of chemicals, turnover and average
    company turnover
    EU-27 TOTAL
    (2018)
    EU-27 TOTAL for
    medium and large
    companies (2018)
    EU-27 TOTAL for
    medium companies
    (2018)
    Turnover (million
    EUR)
    555,865.8 433,797.5 105.238,9
    Number of
    companies
    23,845 3,193 2.422
    Average turnover
    per company
    (million EUR)
    135.85 43,45
    Source: Eurostat87
    Digital infrastructure – Data centres
    Data centres provide different types of services enabling data processing and storage
    (such as colocation or dedicated hosting). Some large companies also operate their own
    data centres. Data centres are the physical infrastructure used for the provision of cloud-
    based services. The European data centre market is geographically concentrated with
    Frankfurt, London, Amsterdam and Paris (so-called FLAP) dominating. It is set to reach
    a size of USD 43 billion by 2025. Market players, such as Equinix or Interxion, include
    global companies but also firms of medium and large size focusing on the European
    market.
    Digital infrastructure – Content delivery networks
    Content delivery networks (CDN) operate on a highly concentrated global market. None
    of the major providers are headquartered in the European Union. In 2016, 95% of global
    CDN traffic for web-based apps was delivered by only 10 companies. In 2019, the 10
    biggest providers by number of customers were of large size.
    Waste management
    Overview of the number of companies, turnover and average turnover per company for
    waste collection, treatment and disposal activities; materials recovery
    85
    https://ec.europa.eu/eurostat/statistics-
    explained/index.php?title=Information_and_communication_service_statistics_-_NACE_Rev._2
    86
    https://ec.europa.eu/eurostat/statistics-
    explained/index.php/Chemicals_production_and_consumption_statistics#Production_of_chemicals_haz
    ardous_to_the_environment
    87
    https://appsso.eurostat.ec.europa.eu/nui/submitViewTableAction.do
    50
    EU-27 TOTAL
    (2018)
    EU-27 TOTAL for
    medium and large
    companies (2018)
    EU-27 TOTAL for
    medium companies
    (2018)
    Turnover (million
    EUR)
    161,537.3 109,256.4 36.829,5
    Number of
    companies
    44,189 2,616 2.152
    Average turnover
    per company
    (million EUR)
    / 41.76 17.11
    Source: Eurostat88
    Wastewater
    Overview of the number of companies, turnover and average turnover per company for
    the sewerage subsector
    EU-27 TOTAL
    (2018)
    EU-27 TOTAL for
    medium and large
    companies (2018)
    EU-27 TOTAL for
    medium companies
    (2018)
    Turnover (million
    EUR)
    22,963.9 10,880.7 4.929,3
    Number of
    companies
    10,955 473 408
    Average turnover
    per company
    (million EUR)
    / 23 12
    Source: Eurostat89
    Manufacturing
    Other than the manufacturing of chemicals and chemical products, which was also
    covered separately above, the manufacturing subsectors considered in policy options 2
    and 3 and their respective size and turnover are included in the table below.
    88
    https://appsso.eurostat.ec.europa.eu/nui/submitViewTableAction.do
    89
    https://appsso.eurostat.ec.europa.eu/nui/submitViewTableAction.do
    51
    Manufacturing
    subsectors
    Number of
    companies
    (2018)
    Number of
    companies of
    medium and
    large size
    (2018)
    Total
    turnover –
    million EUR
    (2018)
    Total
    turnover
    for
    companies
    of medium
    and large
    size –
    million
    EUR
    (2018)
    Average
    turnover
    per
    company
    of medium
    or large
    size –
    million
    EUR
    (2018)
    Food products 192,328 10,215
    (of which
    8.149
    medium
    companies)
    724,116.3 587,440
    (of which
    189.078,6
    for
    medium
    companies)
    57.50
    (23.2 for
    medium
    companies)
    Beverages 27,909 1,047
    (of which
    813 medium
    companies)
    144,034.1 87,748.1
    (of which
    23,157.2
    for
    medium
    companies)
    83.8
    (28.48 for
    medium
    companies)
    Basic
    pharmaceutical
    products and
    pharmaceutical
    preparations
    3,352 934
    (of which
    538 medium
    companies)
    240,420.3 209,649.6
    (of which
    14,802.3
    for
    medium
    companies)
    224.46
    (27.51 for
    medium
    companies)
    Computer,
    electronic and
    optical
    products
    33,063 2,410
    (of which
    1,786
    medium
    companies)
    279,521.2 251,145.4
    (of which
    43.496,5
    for
    medium
    companies)
    104.2
    (24.35
    for
    medium
    companies)
    Electrical
    equipment
    38,919 3,378
    (of which
    2,425
    medium
    companies)
    292,423.3 298,973.1
    (of which
    49,072.7
    for
    medium
    companies)
    88.5
    (20.23 for
    medium
    companies)
    Machinery and
    equipment
    77,627 8,956
    (of which
    7,053
    medium
    companies)
    722,795.9 627,831.8
    (of which
    145,420.4
    for
    medium
    companies)
    70.1
    (20.61 for
    medium
    companies)
    52
    Motor
    vehicles,
    trailers and
    semi-trailers
    16,585 2,944
    (of which
    1,771
    medium
    companies)
    1,106,882.1 1,088,852
    (of which
    42,646.2
    for
    medium
    companies)
    369.85
    (24.08 for
    medium
    companies)
    Other transport
    equipment
    13,068 1,058
    (of which
    739 medium
    companies)
    236,726.7 222,876.3
    (of which
    15.512,3
    for
    medium
    companies)
    210.65
    (21 for
    medium
    companies)
    Source: Eurostat90
    Postal and courier services
    Overview of the number of companies, turnover and average turnover per company in
    the postal and courier activities subsectors
    EU-27 TOTAL
    (2018)
    EU-27 TOTAL for
    medium and large
    companies (2018)
    EU-27 TOTAL for
    medium companies
    (2018)
    Turnover (million
    EUR)
    102,036.2 60,717.9 3,238
    Number of
    companies
    89,480 869 621
    Average turnover
    per company
    (million EUR)
    / 69.87 5.21
    Eurostat91
    Food supply
    In policy options 2 and 3 food supply would be added to the NIS scope, and in particular
    the subsectors of wholesale and retail sale of foods and beverages.
    Overview of the number of companies, turnover and average turnover per company for
    wholesale and retail of food, beverages and tobacco
    EU-27
    TOTAL
    (2018) –
    wholesale
    EU-27
    TOTAL for
    medium
    and large
    companies
    (2018) -
    wholesale
    EU-27
    TOTAL
    (2018) –
    retail
    EU-27
    TOTAL for
    medium
    and large
    companies
    (2018) -
    retail
    EU-27
    TOTAL
    (2018) –
    wholesale
    and retail
    EU-27
    TOTAL for
    medium
    and large
    companies
    (2018) –
    wholesale
    and retail
    90
    https://appsso.eurostat.ec.europa.eu/nui/submitViewTableAction.do
    91
    https://appsso.eurostat.ec.europa.eu/nui/submitViewTableAction.do
    53
    Turnover
    (million
    EUR)
    924,834.3 501,698.5 131,993.8 18,200.6 1,056,828.1 519,900
    (of which
    217.427,5
    for
    medium
    companies)
    Number of
    companies
    188,146 4,352 407.087 951 595,233 5,303 (of
    which
    4,593
    medium)
    Average
    turnover
    per
    company
    (million
    EUR)
    / 115.27 / 19.14 / 98
    (47.33 for
    medium
    companies)
    Source: Eurostat92
    The above data represent an overestimate since they also cover wholesale and retail of
    tobacco, which would not be included under NIS scope in policy options 2 and 3.
    New energy subsectors and/or operators
     Electricity generation
    The data on electricity generation companies (number and turnover) was included in the
    above aggregated data covering the electricity and gas subsectors.
    In 2018, there were 3,944 generating companies representing at least 95% of the national
    net electricity generation in the EU and 82 main electricity generating companies.93
    By October 2020, Member States (EU-27) have notified to the Commission that they
    identified 473 OES in the electricity subsector, excluding electricity generation. There
    was no granular data available on number of medium and large electricity generation
    companies.
     Central oil stockholding entities
    Under the Oil Stocks Directive (2009/119/EC), Member States must maintain emergency
    stocks of crude oil and/or petroleum products equal to at least 90 days of net imports or
    61 days of consumption, whichever is higher. Member States may meet this stockholding
    obligation in different ways. Emergency stocks can be held by the Member State itself or
    through so-called Central Stockholding Entities (CSEs) set up for this purpose in the
    form of a non-profit making body or service; the Member State may also impose an
    obligation on economic operators (typically oil companies) to hold the stocks for the
    benefit of the State. Several Member States have opted for a mixed system where part of
    the stocks is held by economic operators while the other part is held by a Central
    Stockholding Entity.
    92
    https://appsso.eurostat.ec.europa.eu/nui/submitViewTableAction.do /
    93
    https://ec.europa.eu/eurostat/statistics-
    explained/index.php?title=Electricity_generation_statistics_%E2%80%93_first_results#Production_of_
    electricity
    54
    The most centralised systems are those in which one organisation (the CSE usually
    established by the State), is the sole organisation responsible for holding emergency
    stocks. The most decentralised model is a model in which the entire stockholding
    obligation is put on the economic operators in the oil industry (and consequently no CSE
    exists), while the intermediate model is one in which the stockholding obligation is
    divided between industry and the CSE.
    There are 23 Central Stockholding Entities in the European Union. Four Member States
    currently have no CSE, placing the entire obligation on the industry: Greece, Malta,
    Romania and Sweden. Two Member States, albeit having established a CSE, put the
    obligation almost exclusively on industry: Italy and Luxembourg.
     (Nominated) Electricity market operator
    A nominated electricity market operator’ or ‘NEMO’ means a market operator designated
    by the competent authority to carry out tasks related to single day-ahead or single
    intraday coupling, as defined in point (8) of Article 2 of the Regulation on the internal
    market for electricity (EU) 2019/943. An ‘electricity market operator’ means an entity
    that provides a service whereby the offers to sell electricity are matched with bids to buy
    electricity, as defined in point (7) of Article 2 of the Regulation on the internal market for
    electricity (EU) 2019/943.
    The energy market highly depends on trading platforms and are thus crucial for the
    market. These trading platforms rely on IT systems.
    There are approx. 16 NEMOs in Europe. Some Member States have/used to have only
    one NEMO: AT (EXAA); BG(IBEX); Croatia (CROPEX), CZ (OTE); GR(HENEX); HU
    (HUPX); Ireland (EirGrid); IT (GME); PL (TGE); PT(OMIE); RO(OPCOM);
    SK(OKTE); SI(BSP);. In other Member States the two main players are EPEX and
    Nordpool, with also the new entrant Nasdaq present in some of them.
    NEMOs are often small companies. EPEX is one of the biggest NEMO and has 200
    employees.
     Electricity market participants engaged in aggregation, demand response or
    energy storage services
    Electricity market participant engaged in aggregation, demand response or energy storage
    services means a natural or legal person who is engaged in aggregation or who is an
    operator of demand response or energy storage services, including through the placing of
    orders to trade, in one or more electricity markets, including in balancing energy markets,
    as defined in point (25) of Article 2 of Regulation on the internal market for electricity
    (EU) 2019/943.94
    Aggregation, storage and demand response increase the flexibility in energy markets and
    are highly needed elements, which are evolving very rapidly and will increase in
    numbers.
    These categories of services within the energy sector are developing and are an important
    part of the implementation of the Green Deal. All these categories of services rely
    heavily on IT and OT as there is a need to respond to real time signals.
    94
    this definition refers only to market operators dealing with aggregation, demand response services,
    energy storage.
    55
    Heat production and supply
    There were no granular data available on the number of companies and turnover in the
    heat production and supply sector in the EU. Some estimates indicate a turnover of the
    heating and cooling industry (considering biomass, biogas, heat pumps and solar-thermal
    segments) of EUR 67.2 billion and EUR 82.3 billion when biofuels and geothermal
    sectors are included.
    Social networks
    According to DESI95
    , social networks (51 %) were the most used form of social media
    platforms in 2019. Furthermore, 65% of internet users in the EU used social networks in
    2019.96
    In Europe, the social media platforms players are very few. Facebook had a
    market share in social media of over 70% and at times over 80% in 2019-2020, followed
    by Pinterest, Twitter and Instagram with less than 12% and other players such as
    Youtube, Tumblr, Vkontakte with less than 1%.97
    Trust service providers
    The European List of Trusted Lists (LOTL) comprises all of the trusted lists managed by
    Member States within the scope of the Regulation (e.g. eSignatures, eSeals, WA,
    eTimestamps, ERDs, eSeal creation devices, eSignature creation devices, preservation
    service/archive). The Trusted List Browser developed by the European Commission98
    covers all trust service providers established in the European Union or in Norway,
    Liechtenstein or Iceland.
    According the LOTL99
    , there are currently 190 active qualified trust service providers
    operating in 28 of the 31 EU and EEA/EFTA countries. There are a further 19 trust
    service providers currently being taken over and a further 59 trust service providers
    without active trust services listed on the browser that comprise of both the qualified and
    non-qualified status.100
    The draft final report of the Evaluation study of the eIDAS Regulation101
    notes that
    qualified eSignatures are the services provided most on the market, followed by qualified
    time stamps and qualified eSeals. Out of the core trust services102
    , the qualified electronic
    registered delivery service is the most limited one, with 20 active services in seven
    Member States. The market offering of qualified website authentication certificates is
    additionally relatively lower than the offering for qualified eSignatures, qualified eSeals
    and qualified time stamps, which is likely due to the market being highly concentrated103
    .
    95
    https://ec.europa.eu/eurostat/statistics-explained/index.php/Social_media_-
    _statistics_on_the_use_by_enterprises
    96
    https://ec.europa.eu/digital-single-market/en/use-internet
    97
    https://gs.statcounter.com/social-media-stats/all/europe
    98
    https://webgate.ec.europa.eu/tl-browser/#/
    99
    Sourced from the Trusted List Browser (https://webgate.ec.europa.eu/tl-browser/#/) on 8 September
    2020.
    100
    D.4 – Draft Final Report, 14 September 2020 - Evaluation study of the Regulation no.910/2014 (eIDAS
    Regulation), SMART 2019/0046, Ecorys, VVA, Deloitte, Spark, pages 21-22 and 24.
    101
    Idem.
    102
    Qualified certificate for electronic signature, Qualified certificate for electronic seal, Qualified time
    stamp, Qualified certificate for website authentication, Qualified electronic registered delivery service.
    103
    ENISA, 2015, Qualified Website Authentication Certificates.
    56
    Preliminary data on number of active qualified trust services in Europe104
    Type of
    Qualified Trust
    Service
    Number of
    active Qualified
    Trust Services
    Number of
    countries (EU and
    EEA/EFTA) in
    which the Qualified
    Trust Service is
    active
    EU and EEA/EFTA
    countries in which the
    Qualified Trust Service
    is active
    Qualified
    certificate for
    electronic
    signature
    152 28 AT, BE, BG, HR, CY,
    CZ, EE, FI, FR, DE,
    EL, HU, IS, IE, IT, LI,
    LT, LV, LU, MT, NL,
    NO, PL, PT, RO, SK,
    SI, ES
    Qualified time
    stamp
    109 23 AT, BE, BG, HR, CZ,
    EE, FR, DE, EL, HU,
    IE, IT, LV, LT, LU,
    NL, NO, PL, PT, RO,
    SK, SI, ES
    Qualified
    certificate for
    electronic seal
    102 24 AT, BE, BG, HR, CY,
    CZ, EE, FR, DE, EL,
    HU, IE, IT, LV, LT,
    LU, NL, NO, PL, PT,
    RO, SK, SI, ES
    Qualified
    certificate for
    website
    authentication
    51 20 AT, BE, BG, HR, CZ,
    FI, FR, DE, EL, HU,
    IT, LU, NL, NO, PL,
    PT, RO, SK, SI, ES
    Qualified
    electronic
    registered
    delivery service
    20 7 BE, FR, DE, NL, PL,
    SI, ES
    Qualified
    validation service
    for qualified
    electronic
    signature
    15 10 BE, BG, CZ, FR, LT,
    PL, SI, SK, ES, SE
    Qualified
    validation service
    for qualified
    electronic seal
    15 10 BE, BG, CZ, FR, LT,
    PL, SK, SI, ES, SE
    Qualified
    preservation
    service for
    qualified
    electronic seal
    13 9 BG, CZ, FR, HU, MT,
    PL, RO, SK, ES
    Qualified
    preservation
    service for
    12 7 BG, CZ, FR, HU, MT,
    PL, RO, SK, ES
    104
    Statistics sourced from Trusted List Browser (https://webgate.ec.europa.eu/tl-browser/#/) on 8
    September 2020.
    57
    qualified
    electronic
    signature
    Source: Draft Final Report, 14 September 2020 - Evaluation study of the Regulation
    no.910/2014 (eIDAS Regulation), SMART 2019/0046, Ecorys, VVA, Deloitte, Spark
    Member States may add trust services other than qualified ones to the Trusted List on a
    voluntary basis.
    A study that looked into the uptake of eIDAS services by SMEs found a generally low
    level of awareness of eIDAS solutions among SMEs: only 17% of SMEs had used an
    eIDAS solution already in their business. 105
     Public administration (from the perspective of being included under the NIS
    scope)
    In policy options 2 and 3, the NIS framework would only cover under ‘public
    administration’ central governments (i.e. all administrative departments of the state and
    other central agencies whose responsibilities cover the whole economic territory of a
    country), as well as the major socio-economic regions (104 in total according to the
    Nomenclature of territorial units for statistics–NUTS 2021 classification) and the basic
    regions for the application of regional policies (283 in total according to the NUTS 2021
    classification).106
    No attempt was made however for estimating the number of individual public institutions
    since the objective of the cost assessment is to make a global estimate of the total cost for
    the public sector. Data for the public administration relate to the operating costs. ICT
    spending in the public sector is typically expressed as a percentage of the operating
    expenditure instead of revenues or turnover.107
    According to Eurostat108
    , in 2019, the total expenditure at central government level in
    the EU-27 was of 22% of GDP. The total revenue was of 21.7% of the GDP. At the local
    government level, the total expenditure was the same as the total revenue: 10.9% of the
    GDP. The composition of total government expenditure is reflected in the table below:
    105
    eIDAS Study on pilots for replication of multipliers: supporting the uptake of eIDAS services by
    SMEs, SMART 2016/ 0084. See publication here: https://op.europa.eu/en/publication-detail/-
    /publication/0627f219-5044-11e9-a8ed-01aa75ed71a1/language-en .
    106
    https://ec.europa.eu/eurostat/web/regions/background.
    107
    https://ec.europa.eu/eurostat/statistics-
    explained/index.php?title=Glossary:Total_general_government_expenditure
    108
    https://ec.europa.eu/eurostat/statistics-explained/index.php?title=Government_finance_statistics
    58
    Source: Eurostat (online data code: gov_10a_main), Government finance statistics109
    Estimating the percentage of ICT security spending out of ICT spending and total
    revenue and evolution thereof of the sectors, subsectors and types of services currently
    covered and to be covered by NIS in the preferred option
    There is no available data to measure the actual impact of the NIS Directive on the level
    of ICT security spending for the companies activating in the sectors and subsectors or
    providing services under the NIS scope. Given the above-mentioned lacunae in
    comparable economic data, the analyses of economic impact and efficiency under all
    policy options, including the baseline scenario, would refer to widely accepted qualitative
    indicators for assessing the costs and benefits of various cybersecurity measures, along
    the lines described above, as well as a number of illustrative examples of tools used for
    this purpose and outcome thereof.
    In the Impact Assessment that supported the proposal for the NIS Directive110
    , the level
    of investment in IT security was estimated on the basis of Gartner’s global IT key
    metrics which indicated a percentage of IT security expenditure per sector out of the total
    revenue. The global ICT security spending data were estimated for 2012 and ranged
    between 3.04% to 6.61% of the total ICT spending per sector (with lowest in transport
    and healthcare, and highest in energy and digital infrastructure, including telecoms),
    while the ICT spending ranged between 1.10% and 7.60% of the total turnover per sector
    (with lowest in the energy sector and the highest in the banking and financial sector, as
    well as digital infrastructure sector and telecoms). One could therefore assume that, at
    global level, the ICT security spending at the time was in average about 5% of the ICT
    spending per sector and ICT spending was in average 4.3% of the total turnover,
    therefore leading to an average ICT security spending of about 0.215% of the total
    turnover.
    The corresponding updated granular data were not available to the Commission at the
    time of the writing of this impact assessment report. However, while analysing Gartner
    press releases on their regular forecasts of the percentage of global IT security spending
    out of the total revenues, one could see the overall evolution of ICT security spending
    and ICT spending over the years. Thus, the estimated increases of ICT security spending
    109
    https://ec.europa.eu/eurostat/statistics-
    explained/index.php?title=Government_finance_statistics#Government_revenue_and_expenditure
    110
    SWD(2013) 32 final.
    0 25 50 75 100
    EU-27
    EU-28
    Euro area (EA-19)
    Composition of total expenditure, 2019 (¹)
    (% of total expenditure)
    Social transfers (²)
    Compensation of employees, payable
    Intermediate consumption
    (¹) Data extracted on 22.04.2020.
    (²) Social benefits other than social transfers in kind and social transfers in kind -
    purchased market production.
    Source: Eurostat (online data code: gov_10a_main)
    59
    at global level out of ICT spending were from USD 65.9 billion in 2013111;
    to USD 123.8
    billion in 2020 (i.e. an average growth of 82.83% from 2013 to 2020)112,
    while the
    evolution of ICT spending was estimated from USD 2.69 trillion in 2013113
    to USD 3.56
    trillion in 2020 (taking account a conservative scenario that assumes a post-COVID-19
    recession)114
    , i.e. an increase of 32.34% from 2013 to 2020.
    Some sectors or services would indeed have a more significant or faster growth of ICT
    security investment than others. For example, according to Gartner estimates and
    forecast, 8 of 10 cybersecurity markets are projected to grow faster than the market
    average, with cloud security growing the fastest. Cloud security is the smallest, fastest-
    growing cybersecurity market segment with market size of USD 439 million in 2019,
    with a projected growth of 33% growth in 2020 up to USD 585M, mainly due to its small
    initial market size and organizations’ preference for cloud-based cybersecurity
    solutions.115
    In the banking sector, a survey by Deloitte and FS-ISAC116
    , referred to in the Impact
    Assessment for the Digital Resilience Act for financial services117
    , shows that on average
    banks, insurers, investment management firms and other financial services companies
    spend between 6% and 14% of their IT budget on cybersecurity, with an average of 10%.
    These account to a range of between 0.2% and 0.9% of the total revenues, with an
    average of about 0.3%. The above-mentioned impact assessment stresses that, while it is
    impossible to estimate the recurring costs of a general improvement of qualitative ICT
    risk requirements, it could be estimated that bringing ICT requirements up to a decent
    standard for all financial institutions would mean that institutions which have spending
    below the average would have to bring this up to the average. Another survey by
    Deutsche Bank118
    provides a breakdown on how much of the IT spending is dedicated to
    cyber security by financial institutions. On average, around 10% of financial institutions
    are below the 6%-14% range mentioned above.
    Considering the above-mentioned overall evolution of global ICT spending and ICT
    security spending, one could assume for the purposes of this impact assessment that the
    average ICT security spending per sector would be in 2020 of approx. 9.14% of the ICT
    spending per sector. Depending on the level of cybersecurity maturity and capabilities of
    the sector, an adjustment of +/-3% could be made to this average. As for the overall ICT
    spending per sector, the average would be of approx. 5.69% of the total turnover.
    Depending on the level of digitalisation of the sector, an adjustment of +/-3% could be
    made to this average. This would entail an ICT security spending of approximately 0.52%
    of the total turnover. These extrapolations indeed do not reflect the precise differences in
    ICT and ICT security spending between sectors, which can be considerable, therefore it
    may be an overestimate for some and an underestimate for some others, however, overall,
    it may offer a conservative calculation basis which can help estimate to a certain extent
    111
    https://www.gartner.com/en/newsroom/press-releases/2014-08-22-gartner-says-worldwide-information-
    security-spending-will-grow-almost-8-percent-in-2014-as-organizations-become-more-threat-aware
    112
    https://www.gartner.com/en/newsroom/press-releases/2020-06-17-gartner-forecasts-worldwide-
    security-and-risk-managem
    113
    https://www.gartner.com/en/documents/2601718
    114
    https://www.gartner.com/en/documents/3982876
    115
    https://www.forbes.com/sites/louiscolumbus/2020/08/09/cybersecurity-spending-to-reach-123b-in-
    2020/#766ad2a0705f .
    116
    https://www2.deloitte.com/us/en/insights/industry/financial-services/cybersecurity-maturity-financial-
    institutions-cyber-risk.html.
    117
    SWD(2020) 203 final, p.43.
    118
    https://www.db.com/newsroom_news/Deutsche_Bank_Investor_Report.pdf
    60
    the weight of ICT security spending in the turnover of entities covered or considered to
    be covered in the future by NIS.
    The overall global ICT security spending119
    increased with approximately 22% from
    2017 (the year after the entry into force of the NIS Directive) and 2020. While this
    increase is not directly linked to the NIS Directive, one can assume nevertheless that it
    also integrates the spending generated by security requirements such as those provided by
    NIS which largely follow international standards. Therefore, assuming that in the
    medium-term (three to four years), the new sectors to be added to the NIS scope would
    entail about 22% increase in their ICT security spending would be a conservative
    assumption, most likely an overestimate, since it would consider a premise where the
    only trigger for extra IT security investment in these sectors and services would be the
    NIS framework. Yet, many other factors would naturally contribute to such increase, such
    as evolution of technologies and threat landscape, GDPR and other regulatory
    obligations, effects of particular incidents that may occur in the meantime or major crises,
    level of awareness, level of digitalisation, etc.
    For the sectors currently covered by the NIS Directive, one would rather expect a
    more limited increase of ICT spending in the coming three to four years, slightly over
    (+4-5%) the pace of ICT security spending increase forecasted by Gartner in December
    2019, prior to the COVID-19 crisis: i.e. about 12% increase.120
    2. Summary of costs and benefits
    The tables below present the costs and benefits which have been identified and analysed
    during the impact assessment process.
    (1) Estimates are relative to the baseline for the preferred option as a whole (i.e. the
    impact of individual actions/obligations of the preferred option are aggregated
    together); (2) The comment section indicates which stakeholder group is the main
    recipient of the benefit.
    I. Overview of Benefits (total for all provisions) – Preferred Option
    Description Amount Stakeholder group main recipient of
    the benefits
    Direct benefits
    Reduce administrative burden by
    discarding the identification
    process
    n/a  national authorities
     businesses
    More clarity and further
    harmonisation would allow more
    focus on core cybersecurity tasks
    n/a  national authorities
    Increase in compliance with
    security requirements
    n/a  businesses
    119
    https://www.statista.com/statistics/790834/spending-global-security-technology-and-services-market-
    by-segment/
    120
    https://www.gartner.com/en/newsroom/press-releases/2020-06-17-gartner-forecasts-worldwide-
    security-and-risk-managem
    61
     national authorities
    Single entry point for notifications
    concerning security breaches
    stemming from the NIS Directive,
    the General Data Protection
    Regulation and the ePrivacy
    Directive reducing administrative
    burden stemming from reporting
    obligations
    n/a  businesses
    Decrease in cybercrime losses
    (medium/long term by
    implementing higher level of
    security requirements)
    Use of higher level of
    security requirements and in
    particular fully deployed
    security automation (e.g. use
    of advanced technology, AI,
    automated scanning tools,
    etc) help companies reduce
    the lifecycle of a breach by
    74 days compared to
    companies with no security
    automation deployment, from
    308 to 234 days.
     businesses
     citizens
    Decrease in security incidents and
    cybercrime losses
    Estimated reduction in cost
    of cyber incidents by EUR
    11.3 billion over a 10-year
    period
     businesses
     citizens
    Reduction in cost liability for
    breaches
    n/a  businesses
     citizens
    Increase of trust of customers n/a  businesses
    Protection from unfair competition
    (e.g. by avoiding industrial
    espionage)
    n/a  businesses
    Increased and consistent level of
    resilience at the level of key
    businesses and cross-sector
    n/a  businesses
     national authorities
     citizens
    Improved situational awareness n/a  businesses
     national authorities
     citizens
    62
    Increased operational capabilities n/a  national authorities
    Indirect benefits
    Improved personal data protection n/a  citizens
    63
    II. Overview of costs – Preferred option
    Citizens/Consumers Businesses Administrations
    One-off Recurrent One-off Recurrent One-off Recurrent
    Action (a)
    Extension of the NIS
    scope (including
    adding a size cap)
    Direct costs
    n/a n/a Average 22%
    increase in ICT
    security spending
    for the new
    sectors/services
    added to the NIS
    scope in the next 3-4
    years.
    For the new sectors
    or services, an
    increase of about
    25% of ICT
    spending could be
    expected for medium
    enterprises.
    Note: overall, in
    addition to the
    estimated increase
    in ICT spending
    triggered by the
    extension of the
    sectorial scope, an
    Costs of
    implementation of
    higher security
    requirements and
    documented
    security measures
    Personnel and
    administrative costs
    leading to an overall
    increase of approx. 20-
    30% of resources of the
    relevant authorities per
    Member State at central
    level mainly needed for
    performing supervisory
    actions and interactions
    with industry (including
    sector-specific)
    Regular personnel
    and enforcement
    costs
    64
    average 12%
    increase in ICT
    security spending is
    estimated for the
    sectors/services
    currently under the
    scope of the NIS
    Directive scope in
    the next 3-4 years.
    For medium
    enterprises, this
    estimate is of
    approx. 15%. This
    increase concern the
    cumulative effect of
    all measures
    envisaged by the
    preferred option.
    Indirect costs n/a n/a n/a n/a n/a n/a
    Action (b)
    Discarding the
    identification process
    and putting all
    operators and digital
    service providers
    under an equal
    footing, while
    Direct costs
    n/a n/a Negligible personnel
    costs (notably legal
    departments), no
    additional FTE
    n/a n/a n/a
    Indirect costs n/a n/a n/a n/a n/a n/a
    65
    differentiating on
    importance/criticality
    grounds
    Action (c)
    Further harmonising
    and streamlining risk
    management/security
    requirements
    Direct costs
    n/a n/a  Personnel
    (including
    potentially setting
    up new in-house
    teams): 2 -4 extra
    FTEs
     Administrative
    costs
     Opportunity costs
     Potential increase
    in purchase costs
    on cybersecurity
    of +10-15%.
     Purchase costs
    (consultancy,
    audit,
    penetration
    tests, etc.)
    Approx. 20-30% increase
    in budget/expenses), same
    increase as triggered by
    supervisory and
    enforcement-related
    measures + administrative
    costs for the sector-
    specific decentralised
    models for the new
    sectors/services to be
    added to the NIS scope
    Recurrent personnel
    and technical costs
    (audits, testing, etc).
    Indirect costs
    Potential slight
    increase in
    prices of
    products as a
    result of
    investment in
    cybersecurity
    technologies
    and measures
    n/a n/a n/a n/a n/a
    66
    Action (d)
    Security elements
    concerning supplier
    relationships and
    supplier-specific risk
    assessment
    Direct costs
    n/a n/a  Personnel - in
    average 1 FTE
     Purchase costs
    (consultancy,
    audit)
     Opportunity costs
     Personnel and
    potential
    regular
    outsourcing for
    risk
    assessments
    (notably for
    SMEs):potenti
    al increase of
    2-4% in
    recurrent
    purchase ICT
    security costs
     Part of the overall 20-
    30% increase in
    budget/expenses)
    trigged by the extended
    NIS scope, further
    harmonisation of
    security requirements
    and enhanced
    supervisory activities.
     1-2 FTEs (legal and
    technical background)
    Regular personnel
    costs
    Indirect costs
    Potential slight
    increase in
    prices of
    products as a
    result of
    investment in
    cybersecurity
    technologies
    and measures
    n/a n/a n/a n/a n/a
    Action (e)
    Streamlining incident
    notifications Direct costs
    n/a n/a Personnel costs –
    potentially 1-2
    FTE/organisation
    Regular personnel
    costs
    Personnel costs (1-2
    FTEs)and potential
    purchase of software
    (including for reporting
    summary of incident
    reports to ENISA)
    Regular personnel
    costs)
    67
    Indirect costs n/a n/a n/a n/a n/a n/a
    Action (f)
    Reinforcing and
    further harmonising
    supervision and
    enforcement Direct costs
    Personnel
    (2FTE/organisation)
    and purchase costs
    (in particular for
    DSPs and SMEs)
    Regular personnel
    costs and
    potential increase
    in outsourcing,
    notably for audits
    (in particular for
    SMEs and DSPs)
    – overall
    additional 5% of
    recurrent purchase
    costs
    Part of the overall 20-30%
    increase in
    budget/expenses) +
    administrative costs for
    the sector-specific
    decentralised models for
    the new sectors/services to
    be added to the NIS scope
    + 1-2 additional FTEs per
    competent authority
    Personnel
    Purchase costs
    Administrative
    costs
    Indirect costs
    n/a n/a n/a n/a n/a n/a
    Action (g)
    Incentivising the
    increase in Member
    States resources for
    and prioritising of
    cybersecurity policies
    (e.g. peer review and
    mutual assistance
    Direct costs
    n/a n/a n/a n/a  For the mutual
    assistance mechanism:
    2-3 FTEs per CSIRT
    team)
     For the peer-review:
    Personnel and costs
    triggered by
    operational
    activities – in
    average 5,000 EUR
    per year per
    authority for peer-
    review missions –
    partially supported
    68
    mechanism) by the EU’s Digital
    Europe Programme
    Indirect costs
    n/a n/a n/a n/a n/a n/a
    Action (h)
    Strengthening
    cooperation and
    information sharing
    (including through
    ISACs with public
    authorities
    participation)
    Direct costs Personnel costs – 1
    extra
    FTE/organisation
    More involvement
    in the public-
    private
    partnerships and
    ISACs – recurrent
    personnel costs
    (medium level)
    Personnel costs – 1-2
    FTEs
    Regular personnel
    costs
    Indirect costs
    Action (i)
    Incentivising
    coordinated
    vulnerability
    disclosure
    Direct costs
    Negligible personnel
    costs (could, use
    existing FTEs who
    would monitor an
    additional input
    channel)
    Negligible
    personnel costs
     Part of the overall 20-
    30% increase in
    budget/expenses)
    trigged by the extended
    NIS scope, further
    harmonisation of
    security requirements
    and enhanced
    supervisory activities.
     Personnel (1/2 FTEs)
     Administrative costs
    Regular personnel
    and
    purchase/maintenan
    ce costs
    69
     In-house R&D
    Indirect costs n/a n/a n/a n/a n/a n/a
    Action (j)
    Setting up a crisis
    management
    framework focused
    on operational
    cooperation
    Direct costs n/a n/a n/a n/a Personnel: 3-4
    FTEs/national authority
    and administrative costs
     Personnel
     Administrative
    costs
    (participation in
    exercises,
    operational
    exchange)
    Indirect costs n/a n/a n/a n/a n/a n/a
    (1) Estimates to be provided with respect to the baseline; (2) costs are provided for each identifiable action/obligation of the preferred option otherwise for all retained
    options when no preferred option is specified; (3) If relevant and available, please present information on costs according to the standard typology of costs (compliance
    costs, regulatory charges, hassle costs, administrative costs, enforcement costs, indirect costs; see section 6 of the attached guidance).
    70
    ANNEX 4: METHODOLOGY AND CRITERIA FOR DETERMINING THE ADDITIONAL
    SECTORS, SUBSECTORS AND SERVICES CONSIDERED FOR THE NIS SCOPE IN POLICY
    OPTIONS 2 AND 3
    The additional sectors, subsectors and services were chosen based on:
    (i). the Member States’ policy choices to go beyond the scope of the NIS
    Directive at national level.
    The Commission’s Report on OES identification121
    revealed that, at the time of the
    report, 11 out of 28 Member States have identified essential services in sectors not falling
    under the scope of Annex II of the NIS Directive. Out of these, 7 have identified a total
    of 157 OES providing services not covered by the types of entities in Annex II. This is
    illustrated by the table below.
    In a recent study on the transposition of the NIS Directive, Wavestone (2019)122
    shows
    that more than half of the Members States have added about 15 subsectors that are not
    covered by the scope of the NIS Directive.
    121
    European Commission (2019), REPORT FROM THE COMMISSION TO THE EUROPEAN
    PARLIAMENT AND THE COUNCIL assessing the consistency of the approaches taken by Member
    States in the identification of operators of essential services in accordance with Article 23(1) of
    Directive 2016/1148/EU on security of network and information systems. From now on the “OES
    Report”.
    122
    Study to support the review of Directive (EU) 2016/1148 concerning measures for a high common level
    of security of network and information systems across the Union (NIS Directive) – N° 2020-665 –
    implemented by Wavestone, CEPS and ICF.
    Applicati n f the Directi e t ther sectors th n th se included in Anne II
    Additional sector Examples of entities Number of Member States
    Information infrastructures Data centres, server farms 5
    Financial services (entities not listed in Annex II) Insurance and reinsurance companies 4
    Government services Electronic services for citizens 4
    Heat Heat producers and suppliers 3
    Wastewater Collection and treatment facilities 3
    Logistics Postal services 2
    Food Producers, trading venues 2
    Environment Disposal of hazardous waste 2
    National security/emergency services 112, crisis management 2
    Chemical industry Suppliers and producers of substances 2
    Social services Entities in charge of social benefits 1
    Education Authorities in charge of national exams 1
    Collective catering Distribution management 1
    Water Hydraulic structures 1
    T le : ect rs c sen by Member t tes i iti t the ones listed i A ex II
    71
    Source: Wavestone, The NIS Directive, An Overview of Transposition In Europe For
    Operators Of Essential Services (OESs), June 2020
    (ii).stakeholders’ views reflected in the results of the OPC and NIS review study
    surveys.
    The OPC and the NIS review study surveys inquired about the potential addition of
    sectors in which essential services are being provided.
    As regards the sectors and subsectors concerning OES:
     The results of the OPC were as follows:
    Sectors for operators of essential
    services
    Strongly agree + agree to include the
    sector in scope of the NIS Directive
    [%]
    Public administration 70.8%
    Food supply 50.5%
    Manufacturing 46.1%
    Chemicals 51.5%
    Waste water 51.9%
    Data centres 68.9%
    Furthermore, 50% of the OPC respondents considered that ‘undertakings providing
    public communications networks or publicly available electronic communications
    services currently covered by the security and notification requirements of the EU
    framework on electronic communication networks and services will be included in the
    scope of the NIS Directive’.
     The results of the surveys conducted within the NIS study were as follows:
    o the response from competent authorities is illustrated in the table below
    72
    Sectors for operators of essential
    services
    Agree to some extent, to a moderate
    extent or to a great extent to include
    the sector in scope of the NIS Directive
    [%]
    Insurance and reinsurance 35%
    Chemicals 42%
    Manufacturing 32%
    Trust services 35%
    Food supply 58%
    Public Administration 68%
    Elections (authorities, technology and
    process) 48%
    Electricity generation 77%
    Post and other delivery services 45%
    Data centres and Content Delivery
    Networks (CDN) 65%
    Heat production and supply 55%
    Wastewater 58%
    Waste management 48%
    Emergency services 61%
    Broadcasting services 52%
    o the response from OESs is illustrated in the table below
    Sectors for operators of essential
    services
    Agree to some extent, to a moderate
    extent or to a great extent to include
    the sector in scope of the NIS Directive
    [%]
    Insurance and reinsurance 42%
    Chemicals 50%
    Manufacturing 50%
    Trust services 58%
    Food supply 67%
    Public Administration 67%
    Elections (authorities, technology and
    process) 50%
    73
    Electricity generation 83%
    Post and other delivery services 50%
    Data centres and Content Delivery
    Networks (CDN) 83%
    Heat production and supply 50%
    Wastewater 67%
    Waste management 58%
    Emergency services 58%
    Broadcasting services 50%
    Other sectors and subsectors mentioned by over 10% of the respondents to both OPC and
    NIS review study surveys:
    Other sectors mentioned by the
    respondents to the OPC and the
    targeted surveys of the NIS study
    %
    Wastewater treatment 19% of respondent competent
    authorities
    Energy generation 13% of respondent competent
    authorities
    The results of the surveys conducted within the NIS review study were as follows:
    o the response from competent authorities is illustrated in the table below:
    Potential new DSPs
    Agree to some extent, to a moderate
    extent or to a great extent to include
    the sector in scope of the NIS Directive
    [%]
    Geolocation services 86%
    Social networks 50%
    Data centres and content delivery
    networks 86%
    o the response from DSPs is illustrated in the table below:
    Potential new DSPs
    Agree to some extent, to a moderate
    extent or to a great extent to include
    the sector in scope of the NIS Directive
    [%]
    Geolocation services 100%
    Social networks 100%
    Data centres and content delivery 100%
    74
    networks
    (iii). sectorial digital intensity
    The 2019 data on digital intensity by economic sector of the Digital Economy and
    Society Index (DESI) was assessed to determine the digital-intensity levels of certain
    sectors.123
    Furthermore, the taxonomy of sectors by digital-intensity developed by the OECD in
    2018 was also analysed, with the caveats and limitations mentioned further below.124
    See
    also the following illustrative chart:
    123
    https://digital-agenda-data.eu/charts/analyse-one-indicator-and-compare-
    breakdowns#chart={"indicator-group":"ebusiness","indicator":"e_di_hivhi","breakdown-
    group":"econsector","unit-measure":"pc_ent","time-period":"2019","ref-area":["EU"]}
    124
    OECD, (2018), A taxonomy of digital intensive sectors”, OECD Science, Technology and Industry
    Working Papers, No. 2018/14, OECD Publishing, Paris, https://doi.org/10.1787/f404736a-en. This
    taxonomy was built using data from 2001-2015 for 36 sectors in 12 OECD countries to create ad hoc
    indicators The sectors are classified according to ISIC Rev 4 and the indicators considered were: ICT
    equipment and software investment relative to fixed investment; intensity in purchase of ICT
    intermediate goods and services relative to output; stock of robots per employee; number of ICT
    specialists over total employment and propensity to engage in e-commerce sales.
    75
    However, the above-mentioned index also has its limitations, having been built with data
    dating back to 2015. Therefore, it does not take into account, for instance, the profound
    digital transformation of certain sectors due to the increasing use of IoT and AI.
    (iv). level of importance for society of sectors, subsectors and services revealed
    by major crisis and in particular COVID-19
    To complement the above-mentioned factors, consideration was also given to the role the
    sectors, subsectors and services have played during the COVID-19 crisis. The
    unprecedented nature and scale of this crisis stressed once more the criticality of sectors
    such as healthcare, which faced an increasing level of cyber threats, while at the same
    time revealed the importance for society of other sectors, such as food distribution and
    supply, in spite of these not showing a high degree of connectivity with other sectors. The
    analysis of this criterion was therefore mainly a qualitative one, taking account of the
    national authorities’ decisions to qualify certain sectors or types of services as essential
    for society during the imposition of restrictive measures aimed at reducing the spread of
    the COVID-19 pandemic.
    (v).interdependency among sectors, notably in regard of digital infrastructures
    and DSPs
    For this criterion, ENISA’s assessment of the interdependencies between the OESs and
    DSPs was considered125
    . The figure below illustrates ENISA’s conclusions with regard to
    dependencies among OES and DSPs.
    125
    Good practices on interdependencies between OES and DSPs, ENISA, November 2018:
    https://www.enisa.europa.eu/publications/good-practices-on-interdependencies-between-oes-and-dsps
    76
    Source: ENISA - Dependencies of Operators of Essential Services on Digital Service
    Providers (overview)126
    Based on the above-mentioned criteria, a scoring from 0 to 2 per criterion was attributed
    to each of the potentially new sectors, subsectors and services, as follows:
     on the Member States’ policy choices to go beyond the scope of the NIS Directive
    at national level – a score of 0 if no Member State added the
    sector/subsector/service, 1 if 1 or 2 Member States added that sector, 2 if 3
    Member States or more added it.
     on the stakeholders’ views reflected in the results of the OPC and/or in the
    targeted surveys for competent authorities, OES and DSPs:
    o 0 if less than 35% of the OPC respondents agreed or strongly agreed and/or,
    in the case of the targeted consultations of the NIS review study, if 35% and
    fewer of the median of the two relevant categories (i.e. competent authorities
    and operators of essential services or competent authorities and digital service
    providers) of responding stakeholders agreed to some extent, a moderate
    extent or a great extent;
    o 1 if between 35 and 50% of the OPC respondents agreed or strongly agreed
    and/or, in the case of targeted consultations of the NIS review study, if
    between 35% and 50% of the median of the three categories (or, as applicable,
    two categories) of responding stakeholders agreed to some extent, a moderate
    extent or a great extent;
    126
    Figure 4, page 14 of ENISA’s Good practices on interdependencies between OES and DSPs,
    November 2018.
    77
    o 2 if over 50% of the OPC respondents agreed or strongly agreed and/or, in the
    case of targeted consultations of the NIS review study, if over 50% of the
    median of the three categories (or, as applicable, two categories) of
    responding stakeholders agreed to some extent, a moderate extent or a great
    extent.
     on sectorial digital intensity, DESI and the OECD data were cumulatively
    considered: 0 for low, 1 for medium-low and medium 2 for medium-high and
    high. For sectors where several subsectors were highlighted in the sources
    mentioned above, an average score for the overall sector was considered. For
    sectors and services not covered by the above-mentioned indexes, reasonable
    assumptions were made.
     on the level of importance for society of sectors, subsectors and services revealed
    by major crisis and in particular COVID-19: 0 for very little to no importance; 1
    for relative importance and 2 for high importance;
     on interdependency among sectors, notably in regard of digital infrastructures and
    DSPs and exposure to cybersecurity risks: 0 for low to no level of reliance of
    other sectors/subsectors on the given sector/subsector and impact of potential
    threats; 1 to relative level and 2 for high level.
    The sectors, subsectors and services totalling 5 points or higher out of the total of 10.
    These results are marked in the table below.
    Geolocation services, while they scored sufficiently high to be considered for the NIS
    scope, notably due to the high scores in the consultations and surveys, were eventually
    not considered for any of the policy options. This is because it was not possible to define
    with sufficient precision the type of providers or sectors these would belong to.
    In addition to the sectors, subsectors and services subject to the NIS review consultations
    mentioned above and reflected in the scoring table below, operators of government-
    owned and privately-owned ground-based infrastructure that support the provision
    of space-based services were also considered to be added to the NIS scope, also in
    consideration of the consistency with the review of the Directive on the identification and
    designation of European critical infrastructures.127
    Ground-based infrastructure performs
    essential functions, including control, monitoring, tracking and data collection activities.
    Space-based services are playing an increasingly important role for the economy and
    society as a whole and are important for the daily operations of many other critical and
    important entities. The sector exhibits a very high degree of digital intensity and its
    operators are highly interconnected with other parts of the economy, making them a
    likely target for cyber-attacks. Given the large economies of scale that prevail in the
    provision of space-based services, the sector also exhibits a particularly strong pan-
    European dimension.
    Furthermore additional subsectors would also be added for the energy sector, and in
    particular: district heating, electricity generation, central oil stockholding entities,
    nominated electricity market operators and electricity market participants providing
    aggregation, demand response or energy storage services, operators of hydrogen
    production storage and transmission, as well as EU reference laboratories and entities
    127
    Council Directive 2008/114/EC of 8 December 2008 on the identification and designation of European
    critical infrastructures and the assessment of the need to improve their protection, OJ L 345,
    23.12.2008, p. 75–82.
    78
    conducting research and development activities of medicinal products for the healthcare
    sector.
    As regards manufacturing, the subsectors selected were chosen based on the same
    criteria as those applied to the overall selection of new (sub)sectors and services: i.e.
    existing Member States’ policies covering subsectors beyond the scope of the NIS
    Directive; stakeholders’ views reflected in the results of the OPC and the targeted surveys
    conducted by the NIS review study; sectorial digital intensity; level of importance for
    society of sectors, subsectors and services as revealed by a major crisis such as COVID-
    19; interdependency among sectors. Based on these criteria, the following manufacturing
    sub-sectors would be covered: food products; beverages; basic pharmaceutical products
    and pharmaceutical preparations; medical devices and in vitro diagnostic medical devices
    (as defined in point 1 of Article 2 of Regulation 2017/745 of the European Parliament
    and of the Council on medical devices, and entities manufacturing in vitro diagnostic
    medical devices as defined in point 2 of Article 2 of Regulation 2017/746 of the
    European Parliament and of the Council); medical devices considered as critical during a
    public health emergency (according to Article 20 of the Commission Proposal for a
    [Regulation on a reinforced role for the European Medicines Agency in crisis
    preparedness and management for medicinal produces and medical devices; computer,
    electronic and optical products; electrical equipment; machinery and equipment; motor
    vehicles, trailers and semi-trailers; other transport equipment.
    79
    128
    This also includes broadcasting services.
    129
    This also includes elections (authorities, technology and process), as covered by the consultations, and to the extent they are part of public administration as defined at national
    and/or regional levels.
    Sector/subsector/service Added by
    Member States
    Consultation
    results (OPC
    and/or targeted
    surveys)
    Digital
    intensity
    COVID-19 crisis
    related
    importance
    Level of
    interdependency of
    other
    sectors/subsectors
    TOTAL
    Electronic
    communication
    networks and services 128
    (including emergency
    communication)
    2 2 2 2 2 10
    Insurance and
    reinsurance (as part of
    financial services)
    2 n/a 1 0 0 3
    Chemicals 2 2 1 0 0 5
    Manufacturing 2 1 1 1 1 6
    Food supply 2 2 1 2 0 7
    Public Administration129
    2 2 1 1 1 7
    Electricity generation 1 2 1 2 1 7
    Education (e.g. certain
    authorities such as those
    in charge of national
    exams)
    1 n/a 1 0 0 2
    Post and other delivery
    services
    1 1 1 2 1 6
    80
    Heat production and
    supply
    2 2 1 1 1 7
    Wastewater 2 2 0 1 0 5
    Waste management 1 2 0 1 1 5
    Emergency services 1 2 1 2 0 6
    Online media 0 n/a 2 2 0 4
    Data centres & Content
    Delivery Networks
    2 2 2 2 2 10
    Geolocation services 0 2 2 0 1 5
    Social networks 0 2 2 1 0 5
    Trust service providers 0 1 2 0 2 5
    81
    ANNEX 5: EVALUATION REPORT
    EVALUATION
    OF
    DIRECTIVE (EU) 2016/1148 CONCERNING MEASURES FOR A HIGH COMMON LEVEL OF
    SECURITY OF NETWORK AND INFORMATION SYSTEMS ACROSS THE UNION
    (“NIS DIRECTIVE “)
    Table of contents
    a) Introduction ...............................................................................................................84
    Purpose and scope .....................................................................................................84
    b) Background to the intervention .................................................................................85
    Description of the intervention and its backgrounds.................................................85
    The adoption and implementation context ................................................................86
    Intervention logic of the NIS Directive.....................................................................90
    Baseline and points of comparison............................................................................91
    c) Implementation / state of Play...................................................................................92
    Description of the current situation...........................................................................92
    d) Method.....................................................................................................................105
    Short description of methodology ...........................................................................105
    Deviations from the Roadmap.................................................................................106
    Limitations and robustness of findings ...................................................................107
    e) Analysis and answers to the evaluation questions...................................................107
    Relevance ................................................................................................................107
    Coherence................................................................................................................110
    EU Added Value .....................................................................................................111
    Effectiveness ...........................................................................................................113
    Efficiency ................................................................................................................115
    f) Conclusions .............................................................................................................116
    82
    Glossary
    Term or acronym Meaning or definition
    CDN Content delivery network
    CSIRTs Computer Security Incident Response Teams
    DNS Domain Name System
    DORA Digital Operational Resilience Act for the financial
    sector
    DSP Digital service provider
    The ECI Directive The Directive on the identification and designation of
    European critical infrastructures
    EASA The European Union Aviation Safety Agency
    EECC European Electronic Communications Code
    eIDAS (Regulation) Regulation on electronic identification and trust
    services for electronic transactions in the internal
    market
    ENISA The European Union Agency for Cybersecurity
    GDPR General Data Protection Regulation
    ICT Information Communication Technology
    ISAC Information Sharing and Analysis Centre
    ISO International Organisation for Standardisation
    IXP Internet Exchange Points
    MeliCERTes Cybersecurity Digital Service Infrastructure
    Maintenance and Evolution of Core Service Platform
    Cooperation Mechanism for CSIRTs
    NCA National Competent Authority
    NIS Directive Directive concerning measures for a high common
    level of security of network and information systems
    across the Union
    OES Operator of essential services
    83
    PPP Public Private Partnerships
    PSD2 Payment Services Directive 2
    SME Small and medium-sized enterprises
    SPOC Single Point of Contact
    TFEU Treaty on the Functioning of the European Union
    TLD Top-level domain
    84
    a) INTRODUCTION
    Purpose and scope
    Directive (EU) 2016/1148130
    concerning measures for a high common level of security of
    network and information systems across the Union (“NIS Directive” or “the Directive”)
    is the first horizontal internal market instrument aimed at improving the cybersecurity
    resilience of the European Union. Adopted in July 2016, the NIS Directive has ensured
    the continuity of essential services allowing the European Union's economy and society
    to function properly, building cybersecurity capabilities across the EU and mitigating
    growing threats to network and information systems used to provide essential services in
    key sectors.
    Article 23 of the Directive requires the European Commission to review the functioning
    of the Directive periodically and to report to the European Parliament and the Council for
    the first time by 9 May 2021. Meanwhile, the speedy digital transformation of our society
    has expanded the threat landscape and is bringing about new challenges, which require
    adapted and innovative responses. The COVID 19 crisis and the resulting sudden growth
    in demand for internet-based solutions has emphasised even more the need for a state of
    the art cybersecurity. Therefore, as part of its key policy objective to make “Europe fit
    for the digital age”, the Commission announced in its Work Programme 2020 that it
    would advance the review of the Directive to the end of 2020131
    .
    The evaluation process started already mid 2019 with the Commission’s “NIS country
    visits” across all Member States and with a Report from October 2019 assessing the
    consistency of the approaches in the identification of operators of essential services132
    (“the OES Report”), which was adopted pursuant to Article 23(1) of the Directive. Тhe
    implementation of the NIS Directive has been the subject of the discussions with the
    Member States’ competent authorities and ENISA in the NIS Cooperation Group. The
    present Evaluation Report also takes into account the reports from the Cooperation
    Group and CSIRTs Network on the experience gained at a strategic and operational
    level.133
    The Commission carried out an open public consultation collecting views from all
    stakeholders. A wide range of stakeholders were consulted as part of the evaluation.
    These included competent authorities from the Member States, operators from all sectors
    130
    Directive (EU) 2016/1148 of the European Parliament and of the Council of 6 July 2016 concerning
    measures for a high common level of security of network and information systems across the Union,
    OJL 194/1, 19.7.2016.
    131
    COM (EU) (2020) 37 final, Communication From The Commission To The European Parliament, The
    Council, The European Economic And Social Committee And The Committee Of The Regions,
    Commission Work Programme 2020, Brussels, 29.1.2020.
    132
    COM (EU) 2019/546 final, Report from the Commission to the European Parliament and the Council
    assessing the consistency of the approaches taken by Member States in the identification of operators of
    essential services in accordance with Article 23(1) of Directive 2016/1148/EU on security of network
    and information systems, Brussels, 28.10.2019.
    133
    See Article 23 (2) NIS Directive. According to Articles 11 (4) and 12 (4), the Cooperation Group and
    the CSIRTs Network have to report on the experiences gained respectively with the strategic and
    operational cooperation by 9 August 2018 and every year and a half thereafter. Both the Cooperation
    Group as well as the CSIRTs Network have reported twice on their respective experiences gained (in
    August 2018 and in January 2020).
    85
    under the Directive and Member States, digital service providers, academia and think
    tanks and the general public. The Commission was supported by an external study134
    ,
    which carried out targeted surveys and interviews and organized dedicated workshops
    and finally provided input to the evaluation and drafting of the impact assessment.
    The review evaluates the functioning of the NIS Directive based on the level of security
    of network and information systems in the Member States. In accordance with the Better
    Regulation Guidelines, the evaluation assesses the effectiveness, efficiency, coherence,
    relevance and EU added value of the NIS Directive taking into account the constantly
    evolving technological and threat landscape. It pays attention to the impact of the NIS
    Directive on increasing the levels of cybersecurity across the Union, in particular on the
    level of national cybersecurity capabilities and the capacity to mitigate growing security
    threats to network and information systems used to provide essential services in key
    sectors. The evaluation elaborates on the lessons learned from the implementation of the
    NIS Directive and identifies persisting and emerging issues affecting the functioning of
    the Directive. The evaluation also attempts to identify and quantify the direct and indirect
    regulatory costs and benefits resulting from the implementation of the NIS Directive.
    The evaluation focuses on the period starting from the end of the transposition deadline
    in May 2018 and covers all Member States. Depending on the results from the evaluation
    of the functioning of the NIS Directive and an impact assessment, the Commission might
    propose measures aimed at enhancing the level of cybersecurity within the Union.
    This staff working document describes the evaluation, how it was carried out, and what it
    found.
    b) BACKGROUND TO THE INTERVENTION
    Description of the intervention and its backgrounds
    Based on Article 114 of the Treaty on the Functioning of the European Union (TFEU)135
    ,
    the NIS Directive provides legal measures to boost the overall level of cybersecurity in
    the EU, in order to contribute to the overall functioning of the internal market, by
    ensuring:
    a) a high level of preparedness of Member States by requiring them to adopt a national
    strategy on the security of network and information systems and designate: one or
    more national Computer Security Incident Response Teams (CSIRTs) responsible
    for risk and incident handling, a single point of contact (SPOC) which shall exercise
    a liaison function to ensure cross-border cooperation between the Member State
    authorities and with the relevant authorities in other Member States and with the
    Cooperation Group, and a competent national NIS authority;
    b) cooperation among all the Member States by establishing the Cooperation Group to
    support and facilitate strategic cooperation and the exchange of information among
    134
    An external study carried out by a consortium of Wavestone, ICF and the Centre for European Policy
    Studies (CEPS), supported the Commission during the evaluation and impact assessment process. The
    study kicked off in April 2020 and should be finalised by January 2021. The final report of the study
    was not yet submitted at the time of writing of this report.
    135
    Treaty on the Functioning of the European Union, OJ C 326/47, 26.10.2012.
    86
    Member States, and the CSIRTs Network, which promotes swift and effective
    operational cooperation between national CSIRTs; and
    c) a culture of security across sectors which are vital for our economy and society and
    moreover rely heavily on ICTs, such as energy, transport, banking, financial market
    infrastructures, drinking water, healthcare and digital infrastructure.
    Public and private entities identified by the Member States as operators of essential
    services (OESs) in these sectors are required to undertake a risk assessment and put in
    place appropriate and proportionate security measures as well as to notify serious
    incidents to the relevant authorities. Also providers of key digital services (DSPs) such as
    search engines, cloud computing services and online marketplaces have to comply with
    the security and notification requirements under the Directive; at the same time, the latter
    are subject to a so-called ‘light-touch’ regulatory regime which entails, among others,
    that they are under the jurisdiction of one Member State for the whole EU and are not
    subjected to ex-ante supervisory measures.
    The adoption and implementation context
    Cybersecurity resilience is a key priority for the protection of critical infrastructure in the
    European Union, where network and information systems could be vulnerable due to the
    fragmented nature of national strategies and capabilities. At a time when the private and
    public sectors rely increasingly on digital infrastructure for the delivery of essential
    services, those become major targets of cyberattacks. The companies’ incentives to invest
    in cybersecurity are insufficient and the benefits of the disclosure of incidents and data
    breaches – more efficacy and cost savings in security – usually are slower and benefit all
    firms (including competitors). Ultimately, in an interconnected society, only a collective
    and coordinated effort between private and public organisations, and national and
    European players can lead to sufficient levels of cybersecurity resilience.
    Against this background, the EU started building the foundations of its current
    cybersecurity policy. In 2004, the European Network and Information Security Agency
    (ENISA), was founded. In 2009, the Commission’s Communication was adopted, which
    focuses on awareness and defines an immediate action plan to strengthen the European
    cybersecurity resilience136
    . This Communication was followed in 2013 by the joint
    Communication on a Cybersecurity Strategy to guide the Union’s policy response to
    cyber threats and risks137
    .
    As part of this package, the Commission adopted a Proposal for Directive concerning
    measures to ensure a high common level of network and information security across the
    Union138
    . After almost three years of negotiations, a political agreement was reached at
    the end of 2015, with the understanding that approach to cybersecurity limited to the
    136
    COM (EU) (2009) 149 final, Communication from the Commission to the European Parliament the
    Council the European Economic and Social Committee and the Committee of the Regions on Critical
    Information Infrastructure Protection “Protecting Europe from large-scale cyber-attacks and
    disruptions: enhancing preparedness, security and resilience, Brussels, 30.3.2009.
    137
    JOIN (EU) (2013) 1 final, Joint Communication to the European Parliament, the Council the European
    Economic and Social Committee and the Committee of the regions, Cybersecurity Strategy of the
    European Union: An Open, Safe and Secure Cyberspace, Brussels, 7.2.2013.
    138
    COM (2013) 48 final, SWD (2013) 31 final of 7 February 2013.
    87
    national dimension could have put the Digital Single Market at risk139
    . The finally
    adopted NIS Directive was ground-breaking as it was the first EU legislative act to
    regulative cybersecurity across sectors. It also complemented the protection of personal
    data, privacy, the provision of electronic communications services and electronic
    interactions between businesses, citizens and public authorities offered respectively by
    the General Data Protection Regulation (GDPR)140
    , the E-Privacy Directive141
    , the
    Framework Directive on electronic communications networks and services142
    and the
    eIDAS Regulation143
    .
    The NIS Directive has laid the foundations for a European cybersecurity framework and
    emphasised the need for Member States to secure their own infrastructures in order to
    function consistently across the European Union. At the same time, the Directive has left
    large room for discretion to Member States in the implementation of the Directive’s
    objective by requiring a minimum level of harmonisation of the actions to be put in place
    (Article 3).144
    To reduce the degree of divergence in the implementation between European countries, a
    Cooperation Group made up of national representatives, ENISA145,
    and the European
    Commission, has been tasked to provide strategic direction146
    including guidance on
    transposition of the Directive (Article 11); and a network of CSIRTs have also been
    created to ensure that good practice is communicated and exchanged, as well as to
    support Member States in the implementation of the Directive (Article 12)147
    .
    139
    Sumroy, R., Donovan, N., (2015), “The NIS Directive: Genesis, Status and Key Aspects”, Slaughter &
    May, Briefing June 2015.
    140
    Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the
    protection of natural persons with regard to the processing of personal data and on the free movement
    of such data, and repealing Directive 95/46/EC (General Data Protection Regulation), OJL 119/1,
    4.5.2016.
    141
    Directive (EU) 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning
    the processing of personal data and the protection of privacy in the electronic communications sector
    (Directive on privacy and electronic communications), OJL 201/37, 31.7.2002.
    142
    DIRECTIVE 2002/21/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 7
    March 2002 on a common regulatory framework for electronic communications networks and services
    (Framework Directive), OJL 108, 24.4.2002, p. 33–50.
    143
    Regulation (EU) No 910/2014 of the European Parliament and of the Council of 23 July 2014 on
    electronic identification and trust services for electronic transactions in the internal market and
    repealing Directive 1999/93/EC. https://eur-lex.europa.eu/legal-
    content/EN/TXT/?uri=uriserv:OJ.L_.2014.257.01.0073.01.ENG
    144
    With the exception of security or notification requirements on digital service providers, regarding
    which the Member States shall not impose any further requirements than those prescribed by the NIS
    Directive, see Article 3 and Article 16(10) of the NIS Directive.
    145
    ENISA has become the European Union Agency for Cybersecurity, with a new permanent mandate,
    and it has been able to perform new tasks as defined by the EU Cybersecurity Act, which entered into
    force in June 2019.
    146
    See Article 11 of the NIS Directive; Commission Implementing Decision (EU) 2017/179 of 1 February
    2017 laying down procedural arrangements necessary for the functioning of the Cooperation Group
    pursuant to Article 11(5) of the Directive (EU) 2016/1148 of the European Parliament and of the
    Council concerning measures for a high common level of security of network and information systems
    across the Union.
    147
    Billois, G., (2017), “Cybersecurity and the NIS Directive. A challenge of Consistency for the European
    Union”, Letter from the Wavestone Cybersecurity and Digital Trust Consultant. Risk Insight. at:
    https://uk.wavestone.com/app/uploads/2017/02/cybersecurity-nis-directive-europe-2.pdf (last accessed
    on 21.05.2020).
    88
    By establishing a background for cooperation and helping Member States with lower
    cybersecurity maturity levels to develop their cybersecurity capabilities, the NIS
    Directive has triggered mind-set change in relation to cybersecurity. Even if
    cybersecurity, national security and state-sovereignty are still perceived as closely
    related, the NIS Directive has managed to overcome past concerns regarding sovereign
    control, helping Member States to experience the benefits of acting together at EU level.
    Furthermore, since the adoption of the Cybersecurity Strategy and the last extension of
    ENISA’s mandate in 2013, the overall policy context has changed significantly as the
    global environment has become more uncertain and less secure. In view of the growing
    role of ENISA as a reference point for advice and expertise, as a facilitator of
    cooperation and of capacity-building as well as within the framework of the new Union
    cybersecurity policy, it became necessary to review ENISA’s mandate, to establish its
    role in the changed cybersecurity ecosystem and to ensure that it contributes effectively
    to the Union’s response to cybersecurity challenges emanating from the radically
    transformed cyber threat landscape.148
    As a result, the Cybersecurity Act149
    adopted in
    2019 granted a permanent mandate to ENISA, more resources and new tasks. The
    Cybersecurity Act also introduced for the first time an EU-wide cybersecurity
    certification framework for ICT products, services and processes.
    In July 2020, the Commission adopted the EU Security Union Strategy150
    , which
    acknowledged the increasing interconnection and interdependency between physical and
    digital infrastructures, and underlined the need for a more coherent approach between
    specifically the NIS Directive and the European Critical Infrastructure Directive (ECI
    Directive). The 2019 evaluation of the ECI Directive151
    showed that the landscape related
    to critical infrastructure protection has changed since the adoption in 2008. To this end,
    the Commission Work Programme 2020152
    has also planned a proposal for additional
    measures on critical infrastructure protection until the end of 2020153
    .
    The EU Security Union Strategy also underlines the importance of sector-specific
    initiatives to tackle the specific risks faced by critical infrastructures and to accompany
    the horizontal frameworks. One such initiative is the Proposal for a Regulation on Digital
    148
    See Recital 16 of REGULATION (EU) 2019/881 OF THE EUROPEAN PARLIAMENT AND OF
    THE COUNCIL of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on
    information and communications technology cybersecurity certification and repealing Regulation (EU)
    No 526/2013 (Cybersecurity Act).
    149
    REGULATION (EU) 2019/881 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of
    17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and
    communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013
    (Cybersecurity Act).
    150
    Communication on the EU Security Union Strategy, COM(2020) 605, 24 July 2020 (Strategic priority
    ‘A future-proof security environment).
    151
    Council Directive 2008/114/EC of 8 December 2008 on the identification and designation of European
    critical infrastructures and the assessment of the need to improve their protection. The objective of the
    Directive is to strengthen the protection of critical infrastructures in the energy and transport sectors.
    152
    COM (EU) (2020) 37 final, Communication From The Commission To The European Parliament, The
    Council, The European Economic And Social Committee And The Committee Of The Regions,
    Commission Work Programme 2020, Brussels, 29.1.2020.
    153
    Security Union Strategy of 24 July 2020, https://ec.europa.eu/info/sites/info/files/communication-eu-
    security-union-strategy.pdf; DG HOME, Roadmap regarding new rules regarding the protection of
    critical infrastructure in the EU, https://ec.europa.eu/info/law/better-regulation/have-your-
    say/initiatives/12462-Enhancement-of-European-policy-on-critical-infrastructure-protection
    89
    Operational Resilience for the financial sector (DORA)154
    , which is part of the digital
    finance package155
    , adopted on 24 September 2020. DORA aims at strengthening the
    digital operational resilience of the EU financial sector entities, including their ICT
    security, by streamlining and upgrading existing rules and introducing requirements
    where gaps exist. DORA would constitute a lex specialis to the NIS Directive, at the
    same time ensuring that details of significant incidents would be passed on from the
    competent financial authorities to the SPOCs under the NIS Directive and that there will
    be exchange of information between the financial authorities and the NIS authorities
    within the framework of the NIS Cooperation Group. In addition, as part of the digital
    finance package, the Commission put forward a digital finance strategy and a legislative
    proposal on Crypto Assets aiming to increase the robustness of digital services against
    cyberattacks156
    .
    Other sectorial initiatives are the Network code for the cybersecurity of cross-border
    electricity flows157
    and the initiative on the protection and cybersecurity of critical energy
    infrastructure.
    Furthermore, in the transport sector, the Union adopted detailed rules for cybersecurity in
    the aviation security domain158
    . The EU Aviation Safety Agency (EASA) is preparing an
    opinion to be submitted to the European Commission in order to amend aviation safety
    legislation with cybersecurity provisions requiring the mandatory introduction of an
    Information Security Management System.
    Last but not least, the Framework Directive159
    , which was amended by the European
    Electronic Communication Code160
    , also requires Member States to ensure that operators
    falling under its scope take the necessary risk management measures to secure their
    networks and to report significant incidents. However, the NIS Directive obligations do
    not apply as far as the provision of public electronic communication networks or of
    publicly available electronic communication services are concerned (Article 1 (3) NIS
    Directive).
    154
    Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on
    digital operational resilience for the financial sector and amending Regulations (EC) No 1060/2009,
    (EU) No 648/2012, (EU) No 600/2014 and (EU) No 909/2014 of 24 September 2020. https://eur-
    lex.europa.eu/legal-content/EN/TXT/PDF/?uri=COM:2020:595:FIN&rid=1
    155
    https://ec.europa.eu/info/publications/200924-digital-finance-proposals_en
    156
    Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on
    Markets in Crypto-assets, and amending Directive (EU) 2019/1937.
    https://ec.europa.eu/finance/docs/law/200924-crypto-assets-proposal_en.pdf
    157
    As empowered by Regulation (EU) 2019/943 on the internal market for electricity. Preparatory work
    was finalised in September 2019, an informal drafting process is ongoing.
    158
    Commission Implementing Regulation (EU) 2019/1583 of 25 September 2019 amending Implementing
    Regulation (EU) 2015/1998 laying down detailed measures for the implementation of the common
    basic standards on aviation security, as regards cybersecurity measures. https://eur-lex.europa.eu/legal-
    content/EN/TXT/?uri=uriserv:OJ.L_.2019.246.01.0015.01.ENG
    159
    DIRECTIVE 2002/21/EC OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 7
    March 2002 on a common regulatory framework for electronic communications networks and services
    (Framework Directive) as amended in 2009, OJ L 108, 24.4.2002, p. 33–50.
    160
    See Article 40 of DIRECTIVE (EU) 2018/1972 OF THE EUROPEAN PARLIAMENT AND OF THE
    COUNCIL of 11 December 2018 establishing the European Electronic Communications Code.
    90
    Intervention logic of the NIS Directive
    The intervention logic presented in the below chart aims to depict the chain of expected
    effects associated with the NIS Directive.161
    Figure 1: The NIS Directive intervention logic
    The above chart helps in visualising the problem that the Directive was intended to
    address when it was first adopted, namely the overall insufficient level of protection
    against network and information security incidents, risks and threats across the EU
    undermining the proper functioning of the Internal Market.
    It looks at the drivers behind the problems: the significant disparities in Member States’
    capabilities and level of preparedness, the insufficient sharing of information on
    cybersecurity incidents and threats between Member States and key operators and digital
    service providers and the incomplete view of the frequency and gravity of the security
    incidents.
    Most importantly, it flags the main objectives of the Directive. The general objective of
    guaranteeing a high common level of security on network and information systems in the
    Union could be translated into specific objectives and further operational objectives. The
    specific objectives are (1) to ensure a minimum common level of security of network and
    information systems implementation in the Member States and thus increase the overall
    level of preparedness and response, (2) to improve cooperation at Union and at national
    level with a view to counter cross-border incidents and threats effectively and (3) to
    create a culture of risk management and sharing of information by OES and DSPs. They
    should be achieved via the establishment of national competent authorities, CSIRTs, the
    adoption of national strategies, the creation of links and communication channels
    161
    Based on the interim findings of the NIS review study to be included in its final report due by
    December 2020/January 2021, not yet submitted at the time of the writing of this report.
    91
    between the Member States and with the operators (e.g. via the process of identification),
    establishing risk management and incident reporting requirements on operators.
    These objective should have translated into specific outputs leading to outcomes, such as
    improving Member States preparedness to cyber incidents, increased cooperation and
    information exchange and building a culture of security across Member States and
    among essential operators and digital service providers. The overall impact of the NIS
    Directive is to strengthen the preparedness of EU Member States and companies and
    ensure an effective and timely response to cyber threats, thus contributing to the
    functioning of the Internal Market.
    Baseline and points of comparison
    The increasing importance of the security of network and information systems for our
    economies and societies was recognised for the first time by the Commission in 2001,
    with the Communication ‘Network and Information Security: Proposal for A European
    Policy Approach’162
    that stressed the increasing importance of network and information
    systems’ security for our economies and societies. Furthermore, the EU became an
    observer to the Council of Europe’s Convention on Cybercrime Committee in 2001, and
    since 2002, legislation related to cybersecurity matters has been adopted163
    . Before the
    starting of the process that lead to the adoption of the NIS Directive164
    , the only sector
    where companies were required to take cybersecurity risk management steps under EU
    law was the electronic communications sector, regulated at the time by the Framework
    Directive 2002/21/EC on electronic communications networks and services165
    but there
    was no horizontal instrument aimed at improving the cybersecurity resilience of the
    Union.
    In order to ensure a high and effective level of network and information security in the
    EU, the European Network and Information Security Agency (ENISA)166
    was established
    in 2004. The approach adopted at that stage by the European Union in the area of
    network and information systems has mainly consisted in the adoption of a series of
    action plans and strategies urging the Member States to increase their cybersecurity
    capabilities and to cooperate to counter cross-border cybersecurity problems.167
    162
    COM (EU) 2001/0298 final, Communication from the Commission to the Council, the European
    Parliament, the European Economic and Social Committee and the Committee of the Regions -
    Network and Information Security: Proposal for A European Policy Approach, Brussels, 6.6.2001.
    163
    European Court of Auditors (2019), Challenges to Effective EU Cybersecurity Policy, Briefing Paper,
    No 02/2019. Available at
    https://www.eca.europa.eu/Lists/ECADocuments/BRP_CYBERSECURITY/BRP_CYBERSECURITY
    _EN.pdf (last accessed on 17.06.2020).
    164
    COM (EU) (2009) 149 final, Communication from the Commission to the European Parliament the
    Council the European Economic and Social Committee and the Committee of the Regions on Critical
    Information Infrastructure Protection ‘Protecting Europe from large-scale cyber-attacks and
    disruptions: enhancing preparedness, security and resilience, Brussels, 30.3.2009.
    165
    Directive 2002/21/EC of the European Parliament and of the Council of 7 March 2002 on a common
    regulatory framework for electronic communications networks and services (Framework Directive),
    OJL 108/33, 24.4.2002.
    166
    The Cybersecurity Act changed ENISA’s name to the European Union Agency for Cybersecurity.
    167
    COM (EU) (2013) 48 final, Proposal for a Directive Of The European Parliament And Of The Council
    concerning measures to ensure a high common level of network and information security across the
    Union, Brussels, 7.2.2013.
    92
    In 2015, before the NIS Directive was adopted, almost one third of the Member States
    did not have a cybersecurity national strategy. Only a small group of Member States had
    adopted legislation and policy initiatives to address security of networks and information
    systems.168
    Many Member States did not have an operational CSIRT to deal with
    cybersecurity incidents. In 2015, there were no common security and notification
    requirements on OES and DSPs with the exception of telecommunications companies. In
    2015, the majority of the Members States have not done a risk analysis of their assets to
    determine which national infrastructures were considered to be critical for the
    functioning of the economy and society169
    .
    Without the adoption of the NIS Directive, i.e. under a voluntary approach, the
    Commission, with the support of ENISA, could have made use of soft law measures such
    as for example recommendations or guidelines to encourage the Member States to reach
    a minimum harmonisation of cybersecurity, to set up CSIRTs, and to adopt a national
    cyber security strategy.
    However, doing so, it would have been unlikely that all the Member States would have
    improved their national capabilities and preparedness. Cross-border cooperation efforts
    and coordination across all EU Member States to respond to risks and incidents would
    have taken place only to a very limited extent. It is also less probable that key private
    players would have managed security risks as effectively as they have done after the
    introduction of requirements to implement cybersecurity risk management.
    Given the interdependency of European networks and systems, with a voluntary
    cooperation and a voluntary alignment of cybersecurity requirements, the negative
    impact of cybersecurity incidents and threats on the EU economy and society could have
    been significant, with the risk of undermining trust in the digital agenda and endangering
    the Internal Market. 170
    c) IMPLEMENTATION / STATE OF PLAY
    Description of the current situation
    Implementation process
    The NIS Directive was adopted in July 2016 and entered into force in August 2016.
    Member States had until 9 May 2018 to adopt national measures necessary to comply
    with provisions of the Directive. 17 Member States had not communicated transposition
    by this deadline. The Commission started infringement procedures by sending letters of
    formal notice to these Member States in July 2018. By September 2019, all Member
    States had communicated full transposition.
    168
    BSA, the Software Alliance (2015), EU Cyber security Dashboard: A Path to a Secure European
    Cyberspace. Available at: http://cybersecurity.bsa.org/assets/PDFs/study_eucybersecurity_en.pdf.
    169
    COM (EU) 2019/546 final, Report From The Commission To The European Parliament And The
    Council assessing the consistency of the approaches taken by Member States in the identification of
    operators of essential services in accordance with Article 23(1) of Directive 2016/1148/EU on security
    of network and information systems, Brussels, 28.10.2019.
    170
    SWD (EU) 2013/032 final, Commission Staff Working Document Impact Assessment Accompanying
    the document Proposal for a Directive of the European Parliament and of the Council Concerning
    measures to ensure a high level of network and information security across the Union, Strasbourg,
    7.2.2013.
    93
    In the context of the implementation of the NIS Directive, Member States were required
    to define essential services and identify operators of essential services in their territories
    based on criteria set up in the Directive. Article 5(7) of the Directive requires Member
    States to report to the Commission on the results of this identification. In accordance
    with Article 23(1), the Commission was tasked to draft a report assessing the consistency
    of the approaches taken by Member States in the identification of operators of essential
    services (“the OES Report”) and to submit it to the European Parliament and the Council
    by 9 May 2019. The OES Report was based on an assessment conducted between
    November 2018 and September 2019. In view of these delays in the identification
    process and the lacking information from a number of Member States, the report was
    only published on 28 October 2019.
    In July 2019, the Commission sent letters of formal notice to 6 Member States for failure
    to comply with their obligations under Article 5(7). At the time of drafting of the present
    Evaluation Report, 3 of the started infringement procedures are still ongoing.
    In addition to the OES Report, in view of its obligation under Article 23(2) to report on
    the functioning of the Directive, the Commission has been carrying out “NIS country
    visits” across the Member States from June 2019 to July 2020171
    . During these country
    visits aiming to assess on the spot the level of transposition and implementation of the
    NIS Directive and to receive feedback both from the industry and the relevant authorities
    about the effects and challenges brought by the Directive, the Commission interviewed
    various stakeholders – OES from different sectors, DSPs, national competent authorities,
    SPOCs and CSIRTs.
    Implementing and transposing measures
    National capabilities – national strategies, setting up of national competent authorises,
    SPOC and CSIRT
    The NIS Directive requires Member States to adopt a national cybersecurity strategy
    containing at least172
    the seven elements listed in Article 7(1) and to communicate this to
    the Commission. In 2015, only 19 out of the then 28 Member States had national
    strategies in place, 8 Member States did not have any strategy and one Member State was
    in the process of drafting a national strategy173
    . With the implementation of the Directive,
    all Member States have developed specific national legislation to regulate several aspects
    of cybersecurity and to put in place concrete initiatives in this direction by assigning the
    role to each body. Therefore, the adoption of the national strategies gave impetus to the
    implementation of a series of concrete policy actions such as the definition of a risk-
    assessment plan, a governance framework to achieve the objectives of the national
    strategy and the identification of measure related to cybersecurity capacity building such
    as preparedness, response and recovery174
    . This legal provision helped the Member States
    171
    Due to the COVID-19 crisis, 12 out of the 27 NIS country visits were carried out in a virtual format.
    172
    Communication from the Commission to the European Parliament and the Council, ,”Making the most
    of NIS”, COM (2017) 476 final 2 4 October 2017, p. 6.
    173
    Business Software Alliance (2015), EU Cyber security Dashboard: A Path to a Secure European
    Cyberspace.
    174
    Bird & Bird (2020), Developments on NIS Directive in EU Member States and ENISA- (2020)
    National Cyber Security Strategies- Interactive Map. Available at:
    https://www.enisa.europa.eu/topics/national-cyber-security-strategies/ncss-map/national-cyber-
    security-strategies-interactive-map
    94
    with less capacity to make a substantial step forward in cybersecurity preparedness,
    ensuring a high level of security in their territory.175
    The NIS Directive also requires Member States to designate one or more competent
    authorities to implement the provisions of the Directive for the key sectors and digital
    services under its scope. In addition, Member States have to put in place a single point of
    contact (SPOC) for cross-border cooperation and one or more computer security incident
    response teams (CSIRTs) for incident handling.
    All Member State now have designated NCAs, a SPOC and CSIRT(s)176
    . However, some
    Member States (14) opted for a centralised approach designating a single national
    authority for DSPs, OESs, and as a SPOC, while others (14 Member States) have decided
    to designate several sectoral authorities to coordinate their actions.177
    Before the NIS Directive came into force not all the Member States had a CSIRT in
    place. Nowadays, all Member States have at least one or even more (sectorial) CSIRTs178
    and have to ensure that these CSIRTs have adequate resources to effectively carry out
    their tasks under the Directive. More than 90 percent of all national CSIRTs or
    government teams with national scope reached the basic maturity level, averagely being
    close to reaching the intermediate maturity level179
    .
    Some Member States have fostered the development of fora where companies can
    exchange information about cybersecurity. This includes inter alia public private
    partnerships (PPPs) or sectorial Information Sharing and Analysis Centres (ISACs). In
    2015 only five Member States had established formal PPPs for cybersecurity and in 2020
    these partnerships are still lacking in eleven Member States. The below chart sums up the
    state of play of national capabilities among the 27 Member States and the UK:
    175
    Based on the interim findings of the NIS review study to be included in its final report due by
    December 2020/January 2021, not yet submitted at the time of the writing of this report.
    176
    Bird & Bird (2020), Developments on NIS Directive in EU Member States and ENISA- (2020)
    National Cyber Security Strategies- Interactive Map. Available at:
    https://www.enisa.europa.eu/topics/national-cyber-security-strategies/ncss-map/national-cyber-
    security-strategies-interactive-map
    177
    Based on the interim findings of the NIS review study to be included in its final report due by
    December 2020/January 2021, not yet submitted at the time of the writing of this report.
    178
    ENISA (2019), Study on CSIRT landscape and IR capabilities in Europe 2025. Available at:
    https://www.enisa.europa.eu/publications/study-on-csirt-landscape-and-ir-capabilities-in-europe-2025
    (last accessed on 16.05.2020).
    179
    TI Accreditation was used as baseline for the Basic Maturity Level https://www.trusted-
    introducer.org/processes/accreditation.html
    95
    Figure 2 EU cybersecurity maturity in 2020180
    Overall, during the evaluation, a lack of adequate financial resources and staffing
    emerged as one of the most relevant challenges that national competent authorities
    pointed out in the implementation of the NIS Directive. This is linked to the difficulty for
    national administrations to offer competitive salaries for highly skilled employees. In
    some Member States, no additional staff has been recruited. Instead, the available staff
    members have been tasked with the implementation of the NIS Directive in addition to
    their usual responsibilities.
    OES identification
    The NIS Directive does not determine which companies will be included as OES under
    its scope. Instead, Article 5(2) sets out criteria that Member States will need to apply in
    order to carry out an identification process, which will ultimately determine which
    companies belonging to the type of entities under Annex II will be considered as OES
    and be subject to the NIS Directive. Annex II lists seven core economic sectors and their
    subsectors considered as essential for the effective functioning of the internal market:
    energy (electricity, oil, gas), transport (air, rail, water and road), banking, financial
    market infrastructures, health sector (including hospitals and private clinics), drinking
    water supply and distribution, and digital infrastructure (IXPs, DNS service providers
    and TLD name registers). These sectors have been chosen based on their potential
    vulnerabilities to threats and attacks, due to their high dependence on network and
    information systems and due to their essential role for the functioning of the internal
    market in the Union.
    Member States have been given large room of discretion in selecting the relevant entities
    in order to account for national specificities.181
    In the absence of detailed guidance on
    how to identify OESs, Member States have developed a variety of methodologies,182
    also
    with regard to the definition of essential services and the setting of thresholds.183
    For
    example there are Member States, in which public authorities conduct the identification
    process (top-down identification) and Member States, in which operators were required
    180
    Based on the interim findings of the NIS review study to be included in its final report due by
    December 2020/January 2021, not yet submitted at the time of the writing of this report;based on BSA
    (2015), Bird & Bird (2020), ENISA (2020).
    181
    COM (EU) 2019/546 final, Report From The Commission To The European Parliament And The
    Council assessing the consistency of the approaches taken by Member States in the identification of
    operators of essential services in accordance with Article 23(1) of Directive 2016/1148/EU on security
    of network and information systems (OES Report), 28.10.2019, Section. 1.1.3.
    182
    OES Report, Section. 2.1.
    183
    OES Report, Sections 2.1 and 2.3.
    96
    to verify themselves whether they meet the national criteria (self-identification).184
    One
    of the elements influencing national methodologies was the pre-existence of a framework
    on critical infrastructures or other national provisions on “vital operators”. In such cases,
    Member States used their prior experience as a point of reference and incorporated
    specificities related to the NIS Directive into existing methodologies. Differences in
    national methodologies fall in the following main categories: essential services, use of
    thresholds and their levels, degree of centralisation, authorities in charge of identification
    and assessment of network and information systems dependence.185
    As regards the definition of essential services, Member States apply different levels of
    granularity: some provide a list of detailed services they consider essential, whereas other
    Member States indicate only general types of services leaving room for interpretation.186
    As concluded by the OES Report, this leads to consistency gaps, which renders it
    difficult to compare the lists of essential services and, more importantly may lead to
    fragmentation, if operators in one Member State are exposed to additional regulation
    while others providing similar services in another Member State are excluded.187
    The
    numbers of services identified also varies greatly between Member States. With an
    average of 35 services per Member State, the number of identified services ranges from
    12 to 87, as shown in Figure 3 below.
    Figure 3: Overall number of essential services identified by Member States
    Most Member States apply thresholds to identify OESs, which can be sector-specific or
    cross-sectoral and vary from Member State to Member State.188
    They may rely on a
    single quantitative factor, a larger set of quantitative factors or a combination of
    quantitative and qualitative factors.189
    The various approaches taken by Member States
    have ultimately led to very different result also in the number of identified operators in
    the sectors and subsectors.190
    184
    OES Report, Section 2.1.
    185
    OES Report, Section 2.1.
    186
    OES Report, Section 2.2 taking the example of approaches chosen by Member States in the
    identification of essential services in the electricity subsector, where Estonia takes the least granular
    approach with ‘electricity supply’, whereas Bulgaria with the most granular approach enlist the
    ‘distribution of electricity’, ‘ensuring the functioning and maintenance of a distribution system for
    electrical energy’, transmission of electricity’, ‘operation, maintenance and development of an
    electricity transmission system’, ‘electricity production’ and ‘electricity market’.
    187
    OES Report, Sec. 2.2.
    188
    OES Report, Section 2.3.
    189
    OES Report, Section. 2.3.
    190
    OES Report, Section 2.4.
    -10
    10
    30
    50
    70
    90
    AT BE BG CY CZ DE DK EE EL ES FI FR HR HU IE IT LT LU LV MT NL PL PT RO SE SI SK UK
    97
    The minimum harmonisation approach of the NIS Directive allows Member States to
    consider in the implementation also services that are not provided by entities in the
    sectors included in Annex II. The OES Report reveals that to reinforce cybersecurity in
    other sectors that Member States consider nationally sensitive, 11 out of 28 Member
    States have identified essential services in additional sectors. This highlights that there
    might be other sectors that are critical for society and the economy and also potentially
    vulnerable to cyber-incidents that should be considered by the Directive191
    (See Figure 4
    below).
    Figure 4: Additional sectors and subsectors identified by Member State192
    As regards the organization of competent authorities at a national level, there are
    different degrees of centralisation when it comes to the authorities responsible for
    defining essential services and identifying operators with some Member States
    nominating a single authority in some others more than one. In some cases, operators
    were identified by a competent authority or a CSIRTs while in other cases by primary
    legislation or even through self-assessment and self-identification.193
    Another issue related to the identification of OES is the cross-border procedure under
    Article 5(4) requiring Member States to engage in consultation with each other before
    reaching a final identification decision. The Cooperation Group has issued a reference
    document in July 2018 in order to help Member States conduct proper cross-border
    consultations.194
    However, it appears that only very few national authorities have made
    use of this tool at all or at least in a comprehensive and consistent manner. Among the
    possible explanations could be the time that it took Member States to carry out the
    identification, the lack of secure channel for communication, the lack of common
    191
    OES Report, Section 2.5.
    192
    The NIS Directive, An Overview of Transposition In Europe For Operators Of Essential Services
    (OESs), June 2020, based on the interim findings of the NIS review study to be included in its final
    report due by December 2020/January 2021, not yet submitted at the time of the writing of this report..
    193
    Based on the interim findings of the NIS review study to be included in its final report due by
    December 2020/January 2021, not yet submitted at the time of the writing of this report.
    194
    Identification of Operators of Essential Services – Reference document on modalities of the
    consultation process in cases with cross-border impact, Cooperation Group Publication 07/2018.
    98
    understanding of the cross-border consultation process or the large number of cross-
    border operators active across several Member States195
    .
    Finally, there appears to be a level of inconsistency with regard to the application of the
    lex specialis principle of Article 1(7). While most Member States identified OES in the
    banking and financial markets sector, a few Member States have not done so based on
    the argument that operators are providing services covered by lex specialis.196
    Similarly,
    some Member States appear to have identified OES that should be regulated under the
    European Electronic Communications Code (EECC) and thus falling under the provision
    of Article 1(3).197
    Others have decided to completely exclude providers of electronic
    communications networks or services, which also supply digital infrastructure services
    from the scope of the NIS Directive and only apply the EECC.
    Digital service providers
    The notion of “digital service” is defined as “any service normally provided for
    remuneration, at a distance, by electronic means and at the individual request of a
    recipient of services” which is of the type listed in Annex III of the Directive (Article
    4(5)). Contrary to OES, the list of digital services in Annex III is applied in a
    homogeneous way in the Member States by all providers under the scope of the
    Directive198
    (as opposed to being identified per each Member State as is the case for
    OES). The list is limited to three types of digital services as per Annex III: cloud
    computing services, online marketplace and online search engines, selected due to their
    significant criticality as assessed by the time of adoption in 2016.
    While Member States are allowed to impose stricter security and notification
    requirements for OESs than those enshrined in the Directive, they are prohibited to do so
    for DSPs according to Article 3 and 16(10) of the NIS Directive (the so-called principle
    of “maximum harmonisation”). Moreover, national competent authorities can only
    supervise DSPs "ex-post", when an authority is provided with evidence that a company
    does not fulfil its obligations.
    Because of their cross-border nature, DSPs are also subject to one single jurisdiction
    within the EU based on the Member State of their main establishment. Pursuant to
    Article 18 of the NIS Directive, a DSP shall be deemed to be under the jurisdiction of the
    Member State, in which it has its main establishment. It further specifies that the main
    establishment is where a company’s head office is located. However, the Directive does
    not provide a precise definition of what constitutes a main establishment or a head office.
    Competent authorities usually refer to the commercial register to determine the
    establishment of an entity. However, the information in the national commercial registers
    is often limited to a particular Member State. Especially in the case of DSPs, which
    mostly operate across borders and/or have several establishments in the Union, such
    registers do not contain sufficient information about parent and sister companies
    throughout the Union to determine the location of the company’s main establishment in
    the Union.
    195
    OES Report, Section 2.6.
    196
    OES Report, Section 2.7.
    197
    OES Report, Section 2.7.
    198
    Recital 57 of the NIS Directive.
    99
    When DSPs offering services in the Union have no establishment in any Member State,
    they are required to designate a representative in one of the Member States where the
    services are offered (Article 18 (2) of the NIS Directive). However, the provisions of the
    Directive do not require DSPs to inform the competent authority of the very Member
    State in which they have designated their representative. Therefore, Member States have
    limited knowledge regarding their own competence for specific DSPs.
    Due to the reactive ex-post supervisory approach to DSPs199
    , competent authorities
    should only take action when provided with evidence that a DSP is not complying with
    the requirements of the Directive. Thus, there is no general obligation on the competent
    authority to supervise DSPs. As a result, national competent authorities are cautious in
    being proactive and contacting the DSPs in order to establish the precise country of
    jurisdiction. Moreover, while implementing the Directive, in view of often limited
    resources, national competent authorities tend to prioritize the identification of OES to an
    effort to understand which DSPs fall under their jurisdiction. This limited overview of
    competent authorities of the DSPs under their jurisdiction has been regarded as a major
    obstacle in the enforcement of the obligations towards DSPs.
    All these elements of the so-called “light-touch” regulatory approach applied towards
    DSPs have been motivated primarily by the perception at the time of the adoption of the
    NIS Directive that cybersecurity incidents in DSPs presented a lower degree of risk to
    society and the internal market in comparison to OES. However, it can be observed that
    in the past years, and particularly since the COVID 19 crisis, the digital services are
    becoming vitally important for the society and the economy. Especially cloud services
    providers are providing more often services that may be considered critical for the
    operation of OES services but also serve as infrastructure to many other online services
    that citizens and the market rely on.
    Security measures
    Article 14(1) imposes on Member States to ensure that OES, having regard to the state of
    the art, take appropriate and proportionate technical measures to manage the risk posed to
    the security of the network and information systems, which the organisations use in the
    provision of their services.
    Member States have opted for very different approaches when designing their national
    law on security requirements for OES. For example, some countries such as Estonia,
    France and Romania have decided to include these security measures directly in their
    legislative texts (laws, decrees, orders or equivalent), whereas in Belgium there is a
    presumption that OES fulfil the requirements if they comply with, or even obtain,
    ISO/IEC 27001 certification. This certification specifies the requirements for
    establishing, implementing, maintaining and continually improving an information
    security management system within the context of the organisation. For some other
    Member States, which did not chose to specify the security measures in their laws or use
    a certification framework, national competent authorities published implementation
    guidance materials (e.g. Italy)200
    . The consequence is that security requirements show a
    199
    See Article 17(1) and Recital 60 of the NIS Directive.
    200
    Van Tieghem (2020), ‘The NIS Directive, An Overview of Transposition In Europe For Operators Of
    Essential Services (OESs)’, Risk Insight. Available at: https://lu.wavestone.com/en/insight/nis-
    directive-transposition-operators-essential-services/; Based on the interim findings of the NIS review
    100
    great variation across Members States from granular approaches setting a minimum
    length for passwords in the absence of two-factor authentication to more general
    requirements. Usually, they are set by secondary legislation and in some cases are sector-
    specific while in others follow general rules based on risk analysis and management. This
    variation in approaches and the diversity in types of measures could lead to an uneven
    level of preparedness to cybersecurity incidents across EU Member States. Additionally,
    this makes it complex for multinational companies to comply with the security measures
    across the EU.201
    As regards DSPs, Article 16(1) requires Member States to ensure that DSPs identify and
    take appropriate and proportionate measures to manage the risks posed to the security of
    the network and information systems which the DSPs use for the provision of their
    services taking account of the state of the art and a number of elements prescribed by the
    Directive (the security of systems and facilities; incident handling; business continuity
    management; monitoring, auditing and testing; and compliance with international
    standards). These elements are further elaborated in the Commission Implementing
    Regulation (EU) 2018/151.202
    With regard to security requirements to DSPs, the
    Directive precludes Member States from imposing any further requirements, i.e. it
    provides for maximum harmonisation (Article 3 and Article 1(6) of the NIS Directive).
    Incident reporting
    Articles 14(3) and 16(3) require OES and DSPs respectively to notify without undue
    delay the competent authority or CSIRT of any incidents with a significant impact on the
    continuity of the essential service provided.
    With regard to OES, the parameters for a substantial incident are listed in Article
    14(4)203
    . The parameters concerning incidents with DSPs are mentioned in Article
    16(4)204
    and further specified in the Commission Implementing Regulation EU
    2018/151205
    .
    study to be included in its final report due by December 2020/January 2021, not yet submitted at the
    time of the writing of this report.
    201
    Based on the interim findings of the NIS review study to be included in its final report due by
    December 2020/January 2021, not yet submitted at the time of the writing of this report.
    202
    Article 2 of the Commission Implementing Regulation (EU) 2018/151 of 30 January 2018 laying down
    rules for application of Directive (EU) 2016/1148 of the European Parliament and of the Council as
    regards further specification of the elements to be taken into account by digital service providers for
    managing the risks posed to the security of network and information systems and of the parameters for
    determining whether an incident has a substantial impact.
    203
    These parameters according the Article 14(3) are the number of users affected by the disruption of the
    essential service, the duration of the incident and the geographical spread with regard to the area
    affected by the incident.
    204
    The parameters according to Article 16(3) are the number of users, the duration of the incident, the
    geographical spread, the extent of the disruption of the functioning of the service, the extent of the
    impact on economic and societal activities.
    205
    Commission Implementing Regulation (EU) 2018/151 of 30 January 2018 laying down rules for
    application of Directive (EU) 2016/1148 of the European Parliament and of the Council as regards
    further specification of the elements to be taken into account by digital service providers for managing
    the risks posed to the security of network and information systems and of the parameters for
    determining whether an incident has a substantial impact.
    101
    When it comes to incident notification, the differences across Member States increase
    even more due to the different values and roles played by the two variables characterising
    the incident reporting requirements: thresholds and modalities of reporting.
    As far as thresholds are concerned, in some Member States they do not exist at all and in
    others they are extremely detailed and/or vary by sectors. The multitude of sectoral
    approaches reflect the variety of OES and corresponding business models but could
    provide an obstacle to a common regulatory approach in the EU and to the activity of
    cross-border operators.
    Overall, hardly any incident in the past two years has attained one of the established
    thresholds and therefore very few incidents are being reported to the national competent
    authorities206
    . The NIS Cooperation Group recognises that a simple parameter to define
    the threshold imposed by the Directive, such as ‘number of users’ can mean different
    things to different types of providers, from simple clients of an electricity provider to
    potential patients of a hospital207
    . There is also a broad consensus that the thresholds are
    set too high to trigger the notification under the NIS Directive regime.208
    In few Member
    States voluntary reporting is envisaged and encouraged through, for instance, the
    reporting of near-misses209
    .
    In terms of the modalities of the incident reporting, Member States have opted for
    different approaches such as the use of online platforms and portals, hotlines or email
    notifications. 210
    The delay for reporting varies across the Member States from “without
    undue delay” or “immediately” to 24 hours and for the first written of follow-up report
    from 5 days to 4 weeks. OES and DSPs need to report the incidents to different
    authorities in the various Member States – for example to the central or sectorial CSIRTs,
    or national centralised or sectorial competent authorities. In many cases, companies need
    to report the same incident to several competent authorities within one Member State via
    several different templates on the basis of overlapping legal requirements.211
    This has
    been a serious point of concern for both national authorities and operators.
    Supervision and enforcement
    Article 15 requires Member States to provide competent authorities with the necessary
    powers and means to supervise operators of essential services. It also lays down the main
    elements of the ex-ante supervision process operators of essential services are subject to.
    This process includes the requesting of information and documentation from the entities
    in question, the gathering of evidence of effective implementation of security policies
    and the issuing of binding instructions to operators to remedy deficiencies.
    206
    According to the feedback from the national competent authorities during the NIS country visits.
    207
    NIS Cooperation Group (2018), Reference Document on Incident Notification for Operators of
    Essential Services, CG Publication 02/2018. Available at
    http://ec.europa.eu/newsroom/dae/document.cfm?doc_id=53644, p. 24.
    208
    Based on the interim findings of the NIS review study to be included in its final report due by
    December 2020/January 2021, not yet submitted at the time of the writing of this report.
    209
    Such Member States are e.g. in Austria, Lithuania, Slovakia.
    210
    For a full picture of the incident reporting modalities across all Member States, see final NIS review
    study report due by December 2020/January 2021, not yet submitted at the time of the writing of this
    report
    211
    The NIS incident reporting obligations might come in some cases in addition to similar reporting
    obligations, such as e.g. under GDPR, PSD2, eIDAS.
    102
    During the NIS country visits, the Commission has observed that many Member States
    do not have formal requirements for operators of essential services to submit
    documentation of their security policies. In even fewer cases, competent authorities are
    systematically checking whether companies are complying with the NIS rules. In most
    Member States, national authorities tend to prioritize and promote a collaboration
    approach focused on cybersecurity awareness instead of audits.212
    Among the companies
    that the Commission interviewed during the NIS country visits, most companies that
    have undergone an audit, have launched the procedure by themselves and have done so
    for reasons not directly linked to the Directive.
    When it comes to the supervision of DSPs, Article 17 requires Member States to ensure
    that competent authorities take ex-post supervisory measures once provided with
    evidence that a digital service provider does not meet the security requirements or has not
    notified of a reportable incident213
    . In addition, competent authorities do not have a full
    picture of the digital service providers falling under their jurisdiction (as explained in the
    section on Digital service providers above). Even though some of the Member States
    (such as e.g. Ireland or the Netherlands) are aware of the most relevant digital service
    providers within their jurisdiction, the lack of official ex ante information exchange
    between DSPs and competent authorities significantly impedes any effective supervision
    of these service providers.
    In terms of organisational structures, apart from the constant role that CSIRTs play in all
    Member State to receive incident notifications and provide assistance when needed,
    Member States have opted for many different supervisory approaches. Some Member
    States have a unique national agency to be the competent authority for supervision and
    enforcement (France, Germany) while others have decided to have sectoral authorities
    (Spain, Italy, United-Kingdom) or both (Belgium). According to the national legislative
    transposition, the compliance audits are led by the competent authorities in some
    countries (Italy, Spain, France) which can decide to delegate it to a qualified third party
    (Germany, UK). In some others, the OES has the opportunity to directly select the
    auditor firm, as long as it is qualified by the competent authorities (Belgium, France).214
    While Article 21 requires Member States to lay down penalties that are “effective,
    proportionate and dissuasive”, the Directive does not provide any guidance to Member
    States as to what is considered as effective and dissuasive. As a result, the level of
    maximum penalties varies greatly between the Member States, ranging from around
    1.400 EUR to 5.000.000 EUR or certain percentages of the global annual turnover of
    undertakings, ranging from 0.5% to 5%. Some Member States have only sector-specific
    rules, with no specified levels of maximum penalties. The maximum penalties laid down
    in the national regulations transposing the Directive in most Member States are lower
    than the average penalty of around 100.000 EUR.215
    Finally, competent authorities have
    so far been reluctant to actually apply penalties. As a matter of fact, not a single case of a
    212
    Based on feedback from national competent authorities received during the NIS country visits.
    213
    Article 17, Recital 60 of the NIS Directive.
    214
    Based on the interim findings of the NIS review study to be included in its final report due by
    December 2020/January 2021, not yet submitted at the time of the writing of this report.
    215
    Based on the interim findings of the NIS review study to be included in its final report due by
    December 2020/January 2021, not yet submitted at the time of the writing of this report.
    103
    penalty having been applied to a public or private entity has been brought to the attention
    of the European Commission at the time of writing of this report.
    EU Cooperation – Cooperation Group, CSIRTs Network
    The EU Cooperation under the NIS Directive takes place at a strategic level within the
    NIS Cooperation Group and at an operation level, within the CSIRTs Network.
    The Cooperation Group216
    is the guiding body in the implementation of the NIS
    Directive, which aims to facilitate strategic cooperation between Member States and
    sharing of information, experience and best practice relating to the security of network
    and information systems. The Group is composed of representatives of the Member
    States, ENISA and the Commission that also provides the secretariat.
    According to Article 11, the Cooperation Group has among others, the following specific
    tasks: providing strategic guidance to the CSIRTs Network; exchanging best practice on
    information sharing on incidents, incident notification processes and risks; assisting
    Member States in building cybersecurity capacity, discussing capabilities and
    preparedness of Member States and of national cybersecurity strategies and CSIRTs;
    exchange of information and best practices on awareness-raising, training, research and
    development of network and information systems, exchanging best practices about the
    identification of operators of essential services by the Member States and in relation to
    cross-border dependencies.
    The Cooperation Group, meets on a regular basis and is chaired by the respective
    Member State holding the Presidency of the Council of the EU217
    . The Cooperation
    Group carries out its tasks on the basis of biennial work programmes. The first Work
    Programme laid the ground towards shaping the working methods of the Group, building
    trust between Member States and coming up with the most urgent deliverables. In
    February 2020, the Cooperation Group adopted its Second Biennial Work Programme
    (2020-2022). Meanwhile, the Cooperation Group has established itself as a key forum
    and point of reference for policy discussion on cybersecurity within the EU. Besides the
    plenary sessions of the Cooperation Group, Member States representatives meet in 12
    work streams, where they discuss specific topics such as the identification of OES,
    security requirements, incident reporting, cross-border dependencies, digital service
    providers and capacity building. Moreover, for three of the sectors under Annex II of the
    NIS Directive there are already dedicated work streams – energy, digital infrastructure
    and health. The Cooperation Group has provided the forum for discussing additional
    issues of relevance such as elections security and large-scale cyber incidents and crises
    (Blueprint)218
    . The NIS Cooperation Group provided also the forum for a dedicated
    working group on the cybersecurity of 5G networks, bringing together competent
    authorities in order to support and facilitate cooperation. It produced a joint EU risk
    216
    See NIS Cooperation Group website https://ec.europa.eu/digital-single-market/en/nis-cooperation-
    group
    217
    See Article 2 of COMMISSION IMPLEMENTING DECISION (EU) 2017/179 of 1 February 2017
    laying down procedural arrangements necessary for the functioning of the Cooperation Group pursuant
    to Article 11(5) of the Directive (EU) 2016/1148 of the European Parliament and of the Council
    concerning measures for a high common level of security of network and information systems across
    the Union. https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:32017D0179&from=EN
    218
    COMMISSION RECOMMENDATION of 13.9.2017 on Coordinated Response to Large Scale
    Cybersecurity Incidents and Crises.
    104
    assessment, a toolbox of mitigating measures as well as a progress report on the 5G
    toolbox implementation.
    Among the key outputs of the NIS Cooperation Group are non-binding guidelines to the
    EU Members States to allow effective and coherent implementation of the NIS Directive
    across the EU and to address wider cybersecurity policy issues. Since its establishment,
    the Group has published eight working documents219
    and it is in the process of reviewing
    and updating some of them. The Cooperation Group has had a crucial role in bringing
    national authorities closer and creating trust in matters, some of which have been
    considered close to national security.
    The CSIRTs Network established by Article 12 is another form of EU cooperation. The
    CSIRTs Network’s aim is to contribute to developing confidence and trust between the
    Member States and to promote swift and effective operational cooperation. The CSIRTs
    Network is composed of EU Member States’ appointed CSIRTs and CERT-EU. ENISA
    is tasked to actively support the CSIRTs Network, provide the secretariat and support
    incident coordination upon request. The European Commission participates in the
    network as an observer.
    The main tasks of the CSIRTs Network are to exchange information on services,
    operations and cooperation capabilities, share incident information, identify a
    coordinated response to an incident, provide support to Member States in addressing
    cross-border incidents, discuss other forms of cooperation linked to early warnings,
    discussing preparedness and capabilities of Member States and issuing guidelines. The
    CSIRTs Network has to report to and request guidance from the Cooperation Group.
    The rules for the functioning of the CSIRTs Network are defined in its terms of
    reference. The activity encompasses three meetings per year and the everyday
    operational cooperation happens mostly using online tools. The activity of the CSIRTs
    Network is structured in various working groups (such as CyberWeather, Maturity,
    Standard Operational Procedures and Tools), as well as the participation to cybersecurity
    exercises organised every year. In line with the Blueprint Recommendation, the CSIRTs
    Network set out modalities for cooperation and exchange of information in Standard
    Operating Procedures. These envisage different levels of intensity of cooperation, based
    on the threats level across the EU, and facilitate a coordinated response to incidents.
    The need to get over the different levels of maturity among the national CSIRTs by
    improving the operational cooperation and facilitating the sharing of information
    between the EU Member States' CSIRTs and across the EU, has been the focus of the
    MeliCERTes project developed with the financial support of the EU220
    . Its primary
    purpose was to facilitate cross-border cooperation encompassing data exchange between
    two or more CSIRTs based on the concept of trust circles i.e. ad hoc groups of CSIRTs
    which mutually agree on co-operation based on the concept of trust. MeliCERTes
    became operational in January 2019 and has been refinanced to advance the facility
    219
    Available here: https://ec.europa.eu/digital-single-market/en/nis-cooperation-group
    220
    Public tender on Connecting Europe facilities — cybersecurity digital service infrastructure — SMART
    2015/1089SMART 2015/1089.
    105
    MeliCERTes (to develop MeliCERTes II) in accordance with the evolving needs of the
    CSIRTs in the EU221
    .
    The improvement in the cooperation methods by the CSIRTs Network has been shown in
    times of crisis, such as COVID-19. The CSIRTs Network had two meetings per week at
    the beginning of the crisis and produced nine reports on different issues and coped
    overall very well with the new crisis situation offering advice to Member States and
    improving confidence and trust among its members222
    .
    As regards the cooperation between the CSIRTs Network and the Cooperation Group,
    although Article 11(3)(a) prescribes a role of strategic guidance to the CSIRTs Network
    for the Cooperation Group, the collaboration between these two fora has been limited to
    reports by the CSIRTs Network to the Cooperation Group due every year and a half, and
    to an annual joint session organised back to back with one of the Cooperation Group
    plenary meetings.
    According to ENISA, the creation of the CSIRTs Network, had a very positive impact in
    clarifying actors’ role and responsibilities within the incident response process,
    improving its overall governance. However, the NIS Directive had an unequal effect
    from one country to another due to the different pre-existing maturity of Member States
    with regards to incident response223
    .
    d) METHOD
    Short description of methodology
    The present evaluation aims to analyse the implementation and application of the
    Directive in each Member State according to a number of specific criteria set out in the
    Commission’s Better Regulation Guidelines (relevance, coherence, effectiveness,
    efficiency, EU added value and sustainability). The evaluation covered all 27 Member
    States and the UK224
    and their implementation of the Directive since the deadline for its
    transposition in May 2018.
    The consultation activities aimed at collecting the views of Member States’ competent
    authorities, Union bodies dealing with cybersecurity, operators of essential services,
    digital services providers, companies in other vulnerable sectors outside the scope of the
    current NIS Directive, trade associations, researchers and academia, cybersecurity
    industry professionals, consumer organisations and citizens. During the 27 NIS country
    221
    See MeliCERTSes https://ec.europa.eu/digital-single-market/en/news/call-tender-advance-melicertes-
    facility-used-csirts-eu-cooperate-and-exchange-information. The existing MeliCERTes version is using
    open source tools developed and maintained by CSIRTs. It allows for the use of any key functions
    undertaken by the CSIRTs, such as incident management, threat intelligence (encompassing event
    management, vulnerability management and threat management), secure communications and artefact
    analysis.
    222
    Contractor’s interviews with members of the CSIRTs Network. Reference is made especially to the
    cyber-attacks on hospitals in the beginning of the COVID-19 crisis. Based on the interim findings of
    the NIS review study to be included in its final report due by December 2020/January 2021, not yet
    submitted at the time of the writing of this report.
    223
    ENISA (2019), EU MS Incident Response Development Status Report.
    https://www.enisa.europa.eu/publications/eu-ms-incident-response-development-status-report.
    224
    No country visit to the UK took place. The evaluation of the impact of the NIS Directive on the UK
    was mainly based on desk research.
    106
    visits, the Commission interviewed the 117 SPOCs, CSIRTs and national competent
    authorities, 136 OES and 18 DSPs.
    In addition to the NIS country visits, which were carried out from June 2019 until July
    2020, and the OES Report, the Commission published the NIS Directive review roadmap
    on 25 June 2020, which was open for feedback until 13 August 2020 and received 42
    contributions. From 7 July until 2 October, the Commission held an open public
    consultation on the NIS Directive review with the general public.
    The Commission received 209 stakeholders’ replies via the official EU Survey channel.
    Beside the regular discussion on the implementation of the NIS Directive in the
    framework of the Cooperation Group and its work streams, the NIS review was discussed
    at 3 Cooperation Group plenary meetings at the time of writing of the present Report. In
    addition, the Commission received written contributions from ENISA and from 16
    Member States authorities.
    Assisted by the external contractor (a consortium of ICF, Wavestone and CEPS), the
    Commission also collected evidence via desk research, targeted surveys to the different
    stakeholder groups, 16 expert interviews, 4 workshops with experts and with
    representatives of national authorities of Member States and businesses in the relevant
    sectors under scrutiny, as well as other stakeholders. 46 national competent authorities
    from 24 Member States, 49 OES and 9 DSPs replied to the targeted surveys.
    A more detailed presentation of the consultation process is described in the Summary
    report of the Open Public Consultation (see Annex 2 to the Impact Assessment Report).
    Deviations from the Roadmap
    The inception impact assessment/roadmap for this initiative, which was published in June
    2020 indicated that three regional workshops would be organised gathering Member
    States, representatives of competent authorities, operators and cybersecurity experts in
    the third quarter of 2020. However, due to the persisting measures to attenuate the impact
    of the COVID 19 crisis, these workshops were carried out in a virtual format as webinars.
    This allowed for a broader than regional participation in each of the workshops. The first
    workshop took place in June 2020 and drew the attention to the NIS Directive review
    process and its timing. The attendance was between 80 and over 100 participants
    respectively for the two sessions, the most active of them coming from national
    competent authorities.
    During the second workshop in July 2020 (attended by over 90 participants), the focus
    was largely on the shortcomings of the current NIS Directive and improvement ideas.
    This workshop was well attended also by operators and digital service providers, which
    actively represented the views of the private sector.
    Two Closing Workshops took place on 12 October (for competent authorities, gathering
    over 65 participants), and 13 October 2020 (for the private sector, gathering over 60
    participants). These workshops aimed to engage in a reflection on potential policy
    options to further enhance the level of protection of network and information systems
    across Europe and their respective economic, environmental and social impacts
    accounting for current and future technological developments.
    107
    Limitations and robustness of findings
    Despite the extensive consultation activities with stakeholders and the open public
    consultation, there are a number of issues that have affected the robustness of the
    findings. Such are:
    A lack of available evidence, including historical data, and low quality of information in
    some cases prevented a quantitative analysis of the changes introduced by the NIS
    Directive. For example, only few stakeholders provided quantitative data on costs and
    benefits of implementing the NIS Directive, and this made it difficult to quantify and
    monetise such impact measures (rather than to other aspects of the evaluation). As a
    result, the evaluation has relied mainly on stakeholder consultations.
    The partial contributions to the online surveys by the Member States (responses covered
    22 EU countries) prevented a fully-fledged comparative analysis across the European
    Union;
    Relatively low response rate from DSPs (including micro and small businesses) in all
    consultation activities, which may result from the ‘light touch approach’ and ex-post
    supervision towards DSPs. Besides that, as observed during the in-depth interviews with
    different stakeholders, as DSPs are already complying with several international
    standards and certifications and they remain free to take the measures that they deem
    appropriate, they may see the need to comply with the NIS Directive as less relevant.
    Limited evidence on the actual impacts of the Directive, since the Directive has been
    implemented by the Member States only as of 2018, and some of them have experienced
    delays in its implementation. At the same time, the risk of drawing invalid conclusions
    has been mitigated by the online surveys and in-depth interviews with national competent
    authorities, SPOCs and CSIRTs.
    The above-mentioned issues limited the analysis especially in relation to the ‘EU added-
    value’, ‘effectiveness’ and ‘efficiency’ evaluation criteria. However, conclusions have
    been drawn based on the triangulation and validation of findings from desk research and
    the consultation activities with stakeholders against the different evaluation criteria.225
    e) ANALYSIS AND ANSWERS TO THE EVALUATION QUESTIONS
    By comparing the baseline situation with the implementation state of play, it is possible
    to study to what extent the outputs and outcomes that can be observed (see the
    intervention logic described in Figure 1 above) correspond to the expectations
    concerning what the Directive should achieve, i.e. a high common level of security of
    network and information systems within the European Union. The below analysis is
    based on the five evaluation criteria: relevance, EU added value, coherence, effectiveness
    and efficiency.
    Relevance
    The evaluation criterion of relevance assesses how the objectives of an EU intervention
    correspond to the current needs and problems in society, as well as to the wider EU
    policy priorities. Under this criterion, the analysis should identify if there is any
    225
    Based on the interim findings of the NIS review study to be included in its final report due by
    December 2020/January 2021, not yet submitted at the time of the writing of this report.
    108
    mismatch between the objectives of the intervention and the needs or problems, e.g.
    incorrect assumptions or any change in the circumstances.
    As laid down in Article 1(1), the overall aim of this legislation is to achieve a high
    common level of security of network and information systems within the European
    Union so as to foster trust and cooperation among the Member States and improve the
    functioning of the internal market. This translates into several specific objectives. In
    addition to the objectives of setting out national frameworks and achieving cooperation at
    EU level, the analysis verifies whether all the relevant sectors and sub-sectors of OES as
    well as all types of DSPs that would be considered essential for the smooth functioning
    of the economy and society and covered under the scope of the Directive.
    Evaluation question: To what extent are the original objectives of the NIS Directive still
    pertinent in relation to the evolving needs, technological advances and problems at both
    national and EU levels?
    The results of the Commission consultations show that overall the specific objectives of
    the NIS Directive are relevant. Respondents consider as most relevant the objectives to
    take appropriate measures to prevent and minimise the impact of incidents (Article 14(2)
    and 16(2) and to take appropriate and proportionate measures to manage the
    cybersecurity risks (Article 14(1) and Article 16(1)). Also very relevant are the objectives
    to improve strategic cooperation and the exchange of information among Member States
    (Article 1(2b), Articles 11 and 12) and adopt a NIS strategy and notify significant
    incidents. NCAs find it relevant to contribute to the development of trust and confidence
    between Member States and to set up inter-institutional cooperation at national level to
    fulfil the obligations under the Directive.
    Operators of essential services, DSPs and NCAs believe that the issues, which were
    considered most prominent at the time of adoption of the NIS Directive are still very
    relevant until today. Such are the increasing magnitude, frequency and impact of
    cybersecurity attacks and incidents, which could cause major damage to the economy of
    the Union, the insufficient capabilities in the Member States and different preparedness,
    leading to fragmented approaches across the EU.
    However, the growing interconnectedness and the changing threat landscape also resulted
    in legal gaps and uncertainties stemming, among others, from the implementation of the
    Directive at national level. The inconsistencies in the national implementations of the
    Directive put in question the achievement of a level playing field for some operators
    within the Internal Market.
    For instance, as explained above in Section c) on implementation (OES identification),
    there is a considerable lack of harmonisation across the Union when it comes to the
    identification of OES. Stakeholders agree that the minimum harmonisation approach
    towards OES leaving an important degree of flexibility to Member States in the
    transposition and thus leading to very diverse results, is one of the key shortcomings of
    the NIS Directive. The result is a misalignment of security requirements and incident
    notification requirements for OES across Member States.
    The minimum harmonization approach also led to the inclusion of additional sectors and
    corresponding sub-sectors beyond the scope of the Directive considered nationally
    sensitive and potentially vulnerable to cyber-incidents. The consultation confirmed that
    most NCAs believe that the Annex II of the NIS Directive does not cover all relevant
    109
    sectors and subsectors when it comes to the provision of services essential for the
    economy and society as a whole.226
    For instance, the majority of the competent
    authorities judged (“to a great extent”) that the sectors electricity generation, wastewater,
    emergency services, food supply and public administration could be added.
    Also, due to the significant interdependencies with the other sectors under the NIS
    Directive, the telecoms sector, currently regulated under the European Electronic
    Communications Code (EECC), is considered as meriting to be part of the scope of the
    NIS Directive, to ensure coherence and consistency with the NIS Directive provisions.
    Comparing the NIS Directive objectives and the current needs and problems in the area
    of cybersecurity within the EU, there are new challenges coming from the evolving
    digital transformation of our society. In view of the growing interconnectedness and
    interdependencies between sectors and providers, according to a majority of OES, the
    main criteria to identify emerging essential sectors and/or services that need to fall within
    the scope of the Directive are the reliance on the respective sector or service of other
    essential sectors (or a number of essential services) expressly mentioned within the scope
    of the Directive.227
    This leads to the need for introducing policies related to supply chain
    cybersecurity management. The increasingly connected ICT infrastructures, the rising
    number of connected devices through IoT and industry 4.0, the growth of 5G networks
    raise concerns regarding vulnerabilities in the supply chain could have cascading impacts
    across multiple critical infrastructures and services.
    Regarding DSPs, the open public consultation showed that there was no agreement
    among stakeholders whether Annex III of the NIS Directive covers all relevant types of
    digital services, as around a third of respondents disagreed while 26.7% ‘agreed’ with the
    statement. The agreement varied also considerably between the groups, with agreement
    ranging from only 14.3% (NCAs) to 50% (Citizens). More generally, a third of the
    operators and DSPs believe there is insufficient consideration of critical internet-related
    technologies/entities (e.g. data centres and content delivery network (CDN) or
    geolocation services, social media platforms are not covered), which may render the
    entire digital ecosystem vulnerable. The majority of NCAs consider as a main
    shortcoming the limitations in determining the DSPs falling under the scope of the
    Directive, the light-touch approach when it comes to supervision of security measures
    and incident reporting, as well as the insufficient clarity about the establishment of
    jurisdiction for DSPs. Incident reporting as a result of high thresholds and the
    enforcement measures are also considered as insufficient and are also subject to criticism
    by the NCAs.228
    The limited information sharing between Member States, potentially
    hampering the effective handling and prevention of incidents, a misalignment of security
    requirements for operators of essential services across Member States, insufficient
    voluntary incident reporting schemes are among the other main identified shortcomings.
    226
    Based on the interim findings of the NIS review study to be included in its final report due by
    December 2020/January 2021, not yet submitted at the time of the writing of this report.
    227
    Based on the interim findings of the NIS review study to be included in its final report due by
    December 2020/January 2021, not yet submitted at the time of the writing of this report.
    228
    Based on the interim findings of the NIS review study to be included in its final report due by
    December 2020/January 2021, not yet submitted at the time of the writing of this report.
    110
    Coherence
    This criterion investigates how different actions of the NIS Directive fit together and
    within a wider framework (e.g. other EU initiatives). The analysis of external coherence
    highlights areas where there are synergies or tensions among different EU interventions.
    Meanwhile, the analysis on internal coherence evaluates how the various elements of the
    Directive work together in order to achieve its objectives229
    .
    Evaluation question: To what extent does the NIS Directive fit well within the wider EU
    cybersecurity policy, and, more specifically, is it coherent with other EU interventions in
    the field of cybersecurity (incl. in specific sectors or with regard to security of products)
    and critical infrastructure protection?
    For this analysis, the evaluation looked into the different definitions and concepts
    provided by the NIS Directive and analysed how these are coherent to other EU
    interventions such as Directive (EU) 2018/1972 (EECC)230;
    Directive 2008/114/EC (ECI
    Directive)231
    ; Directive 2015/2366/EU (PSD 2)232
    ; Regulation (EU) 2019/881
    (Cybersecurity Act)233
    ; Regulation (EU) No 910/2014 (eIDAS Regulation)234;
    and
    Regulation 2016/679 (GDPR)235
    . The analysis revealed that there should be a better
    alignment of requirements (e.g. reporting authorities, thresholds, time-frame, and
    penalties), between the NIS Directive and other EU legislation, especially considering
    risks such as double jeopardy (e.g. imposition of administrative fines under different
    regimes in case of non-compliance). For instance, there are overlapping reporting
    obligations with the GDPR since, while many security incidents involve some personal
    data, the relation between the two instruments – NIS Directive and GDPR - is not
    explicitly clarified. Moreover, conflicting reporting obligations with the eIDAS
    Regulation may arise when digital certificates are used for authentication in services that
    fall under the scope of the NIS Directive, while duplicated reporting schemes exist with
    PSD2236
    as payment service providers shall report operational or security incidents to
    229
    Better Regulation Tool#47 on Evaluation Criteria And Questions. Available at:
    https://ec.europa.eu/info/sites/info/files/file_import/better-regulation-toolbox-47_en_0.pdf
    230
    Directive (EU) 2018/1972 of the European Parliament and of the Council of 11 December 2018
    establishing the European Electronic Communications Code, OJ L 321, 17.12.2018, pp. 36-214.
    231
    Council Directive 2008/114/EC of 8 December 2008 on the identification and designation of European
    critical infrastructures and the assessment of the need to improve their protection, OJ L 345,
    23.12.2008, pp. 75-82.
    232
    Directive (EU) of the European Parliament and of the Council of 25 November 2015 on payment
    services in the internal market, amending Directives 2002/65/EC, 2009/110/EC and 2013/36/EU and
    Regulation (EU) No 1093/2010, and repealing Directive 2007/64/EC, OJ L 337, 23.12.2015, pp. 35-
    127.
    233
    Regulation (EU) 2019/881 of the European Parliament and of the Council of 17 April 2019 on ENISA
    (the European Union Agency for Cybersecurity) and on information and communications technology
    cybersecurity certification and repealing Regulation (EU) No 526/2013, OJ L 151, 07.06.2019, pp. 15-
    69.
    234
    Regulation (EU) No. 910/2014 of the European Parliament and of the Council of 23 July 2014 on
    electronic identification and trust services for electronic transactions in the internal market and
    repealing Directive 1999/93/EC, OF L 257, 28.08.2014, pp. 73-114.
    235
    Regulation 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection
    of natural persons with regard to the processing of personal data and on the free movement of such
    data, and repealing Directive 95/46/EC (General Data Protection Regulation), OJ L 119, 04.05.2016,
    pp. 1-88.
    236
    The Commission Proposal for a Regulation on Digital Operational Resilience for the Financial Sector
    or the Digital Operational Resilience Act (DORA) adopted on 24 September 2020 amending PSD2
    111
    their competent authorities and to their respective NIS competent authority as well. The
    different reporting schemes that overlap however usually have different aims, thresholds
    and requirements, and therefore are not substitutable. As such, the findings from the
    coherence analysis suggests that instead of benefitting from synergies by identical
    requirements, different reporting mechanisms may hamper the aims of these
    instruments.237
    Furthermore, the NIS Directive presents a number of legal concepts, which allow for
    interpretation and so provide large room for manoeuvre to Members States to decide how
    to reach a high level of security of network and information systems. For example, the
    definitions of ‘significant’ or ‘substantial’ effect; ‘appropriate and proportionated
    technical and organisational measures to manage the risks’ are not precisely elaborated in
    the Directive. Although the majority of stakeholders replying to the online surveys
    declared that the concepts and definitions provided in the NIS Directive are clear enough,
    respondents flagged that the identification of OES and definition of DSPs are the main
    unclear points of the Directive and could impact the level of awareness of their
    obligations including insufficient clarity of the provisions on how to determine the
    ‘significance of the impact of an incident’. They mentioned that more clarity regarding
    provisions on ‘incident notification’ and ‘reporting requirements’ would be welcome.
    Lastly, while the Directive aims to achieve a high ‘common’ level of security of network
    and information systems’ , it set minimum standards by legal concepts such as ‘state of
    the art’, ‘appropriate technical and organisational measures’, ‘effective, proportionate
    and dissuasive’ penalties, thus leaving room for various national interpretations risking to
    achieve diverging standards.
    Finally, the information gathered indicates that the NIS Directive has made a positive
    contribution to the establishment of a common high level of security of network and
    information systems and thus upscaling capacities, cooperation and risk management
    practices across the EU Member States. Prior to its adoption, there was no regulation for
    cybersecurity in some Member States, yet all of them are now complying with the
    minimum requirements imposed by the NIS Directive. However, evidence suggests that
    there are significant discrepancies in the obligations imposed on OES, as well as in the
    enforcement of the Directive across Member States, and uncertainty about scope and
    jurisdiction for DSPs. This suggests that a sufficient level playing field particularly
    important for cross-border operators, has not yet been achieved.238
    EU Added Value
    This criterion investigates the changes of the EU intervention compared to what could
    reasonably have been expected from national and regional actions239
    .
    Evaluation question: What has been the added value of the NIS Directive compared to
    what could have been achieved by Member States at national or regional level?
    aims at streamlining incident reporting obligations for the financial sector among other things.
    https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=COM%3A2020%3A595%3AFIN
    237
    Based on the interim findings of the NIS review study to be included in its final report due by
    December 2020/January 2021, not yet submitted at the time of the writing of this report.
    238
    Based on the interim findings of the NIS review study to be included in its final report due by
    December 2020/January 2021, not yet submitted at the time of the writing of this report.
    239
    Better Regulation Tool#47 on Evaluation Criteria And Questions. Available at:
    https://ec.europa.eu/info/sites/info/files/file_import/better-regulation-toolbox-47_en_0.pdf
    112
    The evidence suggests240
    that the Directive has played an important role in creating a
    cybersecurity framework and, therefore, in overcoming concerns regarding national
    sovereignty in this domain by strengthening the security of network and information
    systems across the Union without hindering or prejudicing the respect of the subsidiarity
    and proportionality principles.
    There was an increase in the number of national cybersecurity strategies across the EU
    Member States since the implementation of the NIS Directive. The reliability and
    security of network and information systems directly contributes to the overall
    functioning of the Internal Market. This is one of the main priorities of the EU (Article
    114, TFEU), and without a harmonised set of cybersecurity rules at EU level, it is
    unlikely that improvement in cybersecurity capacity and preparedness would be achieved
    in the Member States.
    Nonetheless, the consulted stakeholders confirmed that there is room for improvement in
    the provisions of the NIS Directive in relation to the creation of a more coherent
    cybersecurity framework across the Union. There is the need to harmonise the Member
    States’ methodologies to identify OESs, their definition, and the incident thresholds, as
    asymmetries in relation to OESs dispositions create a risk of fragmentation in the internal
    market. Similarly, it appears that a certain degree of inconsistency exists in the national
    application of the Directive with regard to Article 1(3) leading to the identification of
    OESs where sector-specific rules apply (e.g. in the telecoms sector) and insufficient OES
    identification in some of the sectors listed in Annex II. The role of the NIS Cooperation
    Group could also be strengthened to promote a common understanding on how to
    coherently implement the Directive amongst Member States.241
    Overall, the implementation of the Directive allowed Member States to enjoy a series of
    direct and indirect benefits, such as increased safety for all stakeholders, increased
    information sharing, increased information availability, among others. However, when
    comparing challenges at the time of the NIS Directive adoption and current and future
    issues and threats, further EU action is and will be required. Among the most pressing
    upcoming challenges are (i) the necessary development of cybersecurity skills in the EU;
    (ii) the need of cybersecurity standardisation efforts; (iii) the necessity to pursue EU
    efforts to strengthen incident response capabilities, procedures, processes and tools to
    avoid eventual repetitions or loopholes; (iv) and the consolidation, planning and work
    ahead on EU capabilities to ensure cybersecurity resilience of current and upcoming
    technologies (e.g. 5G networks, artificial intelligence, internet of things, blockchain).
    To sum up, the NIS Directive has contributed to the achievement of results that could not
    have been attained at the national level. In this sense, the continuation of the EU action is
    needed to further ensure a high common level of security of network and information
    systems across the Union for the European society and its citizens. 242
    240
    E.g. 57% of the Competent Authorities agree ‘to a great extent’ on the fact that the NIS Directive
    improved cooperation and the exchange of information among Member States.
    241
    Based on the interim findings of the NIS review study to be included in its final report due by
    December 2020/January 2021, not yet submitted at the time of the writing of this report.
    242
    Based on the interim findings of the NIS review study to be included in its final report due by
    December 2020/January 2021, not yet submitted at the time of the writing of this report.
    113
    Effectiveness
    This criterion intends to (i) assess the extent to which the general and specific objectives
    of the NIS Directive have been achieved; (ii) identify any significant factors that may
    have contributed to, or inhibited progress towards, meeting these objectives; and (iii)
    investigate any negative or positive changes produced beyond the intended effects of the
    NIS Directive243
    .
    Evaluation question: To what extent and why has the NIS Directive been an effective
    instrument for achieving a high common level of security of networks and information
    systems within the EU?
    Evidence indicates that the full transposition of the Directive by Member States has
    generally improved the situation of EU cybersecurity. As observed, stakeholders agree
    that both the adoption of a national strategy and the designation of one or more national
    competent authorities, CSIRTs and of a SPOC were effective in achieving a higher level
    of security of network and information systems. The adoption of the national
    cybersecurity strategies gave impetus to the implementation of a series of concrete policy
    actions such as the definition of a risk-assessment plan, a governance framework to
    achieve the objectives of the national strategy and the identification of measures related
    to cybersecurity capacity building such as preparedness, response and recovery. This
    legal provision helped the countries with less capacity to make a substantial step forward
    in cybersecurity preparedness, ensuring a high level of security in their territory.
    However, shortcomings in the implementation may hinder the full achievement of the
    objectives and expected results of the NIS Directive. For instance, significant differences
    remain concerning the implementation of risk assessment procedures, the availability of
    reporting platforms for incidents and the allocation of resources and staffing to
    designated national competent authorities.
    Differences also exists among Member States with respect to the designation of
    competences at the national level (e.g. centralised vs. decentralised approach). Moreover,
    there are significant divergences in the ability of competent authorities to accomplish
    their tasks due to different levels of allocation of adequate financial and human
    resources. Most stakeholders that took part in the consultation agree that the lack of
    adequate financial resources and staffing emerged as one of the most relevant challenges
    that national competent authorities have faced in the implementation of the NIS
    Directive.
    As far as the effectiveness of the Directive in fostering CSIRTs ability to comply with
    requirements and tasks is concerned, the evaluation shows that although a minimum
    maturity level was met, the level of operational capacity and reliability of national
    CSIRTs also greatly varies. In this respect, resources’ limitation or lack of technical
    capacity may create challenges for CSIRTs to meet all the responsibilities defined in
    Annex I of the NIS Directive while having to deal with incidents of national priority.
    National CSIRTs are not always considered to lead in raising awareness on threats
    among the private sector. Instead, operators often turn to commercial organisations
    providing early warning and incident response capabilities. Finally, because the role and
    243
    Better Regulation Tool#47 on Evaluation Criteria And Questions. Available at:
    https://ec.europa.eu/info/sites/info/files/file_import/better-regulation-toolbox-47_en_0.pdf
    114
    range of national CSIRTs diverges, their cooperation with national law enforcement, the
    SPOC, other competent authorities, OES and DSPs have also been uneven. According to
    the OES’ responding to the online survey, the main challenges faced when cooperating
    with the national competent authorities and national CSIRTs are related to the lack of
    understanding about their field of activity, the focus on national critical infrastructure
    rather than cross-border dependencies, and the lack of support for information sharing,
    such as a mechanism for authorities to share information with established private sector
    initiatives under public-private partnership programmes (see above in Section on
    Implementing and transposing measures).244
    Regarding the effectiveness of SPOCs in fulfilling their tasks as members of the wider
    national institutional cybersecurity framework, most respondents considered that SPOCs
    are effective in coordinating issues related to the security of network and information
    systems and cross-border cooperation at Union level. However, some stakeholders
    believe that SPOCs and CSIRTs tasks are overlapping in some Member States and
    therefore the liaison function of these entities should be clarified. Respondents also
    explained that SPOCs should be given more responsibilities than just transmitting
    information between different stakeholders. They also pointed out that it is common that
    important information is missed or not distributed correctly. A high number of competent
    authorities’ respondents declared that they have limited overview over the level of
    cooperation between NCAs and SPOCs in another Member State.
    With respect to the effectiveness of cooperation at the EU level, while the Cooperation
    Group has facilitated the exchange of information and has offered guidance for Member
    States consultation in cases of OES operating across borders, few members actually use
    the cross-border consultation instrument. The evaluation also shows the need for more
    structured cooperation and improved communication between the Cooperation Group
    and the CSIRTs Network.
    Another important factor which stood in the way of fully achieving the NIS Directive
    objectives is the variation in methodologies to approach the definition of essential
    services, the identification of OES, and the specification of thresholds. These
    discrepancies hinder the management of cyber-dependencies for OES operating across
    different Member States limiting the effectiveness of the NIS Directive and raising
    concerns about the proper enforcement at national level and the consistent
    implementation of cybersecurity measures across the EU.
    The evaluation also analysed the Member States’ ability to establish security
    requirements and to impose incident reporting requirements on OES and DSPs.
    Minimum-security requirements vary across Member States, ranging from setting a
    minimum length for passwords in absence of two-factor authentication to more general
    requirements. In this respect, there is the need to define similar security objectives for
    each sector, especially for OES with cross-border activities, and to consider specific
    measures by market-operators of different size, especially SMEs.
    With regard to incident reporting requirements, the differentiation in schemes is not
    optimal for cross-border providers, which are often subject to different notification
    244
    Based on the interim findings of the NIS review study to be included in its final report due by
    December 2020/January 2021, not yet submitted at the time of the writing of this report.
    115
    regimes. Also, under the current reporting regime, cybersecurity authorities are unable to
    acquire knowledge relative to incidents below a certain threshold. Indeed, only in few
    Member States voluntary reporting is envisaged and encouraged through, for instance,
    reporting near misses. In order to promote incident reporting it is thus necessary to
    streamline the definition of a significant incident and /or to adjust thresholds.
    Thresholds and modalities of reporting vary substantially across Member States. It can be
    observed that in some countries thresholds do not exist at all while in some others they
    are extremely detailed and/or vary by sectors. Such multitude of sectoral approaches
    challenge a common regulatory approach in the EU and hamper the activity of cross-
    border operators.
    In relation to the effectiveness of the NIS Directive regarding DSPs, a majority of the
    limited number of DSP respondents245
    consider that it has been effective in achieving its
    overall objectives. At the same time, the majority of national competent authorities246
    consider as ineffective the approach for determining the DSPs falling under the scope of
    the Directive stemming among others from an insufficient clarity about the establishment
    of jurisdiction for DSPs, as well as the ineffective light-touch approach when it comes to
    supervision of security measures and incident reporting. Another criticism by national
    competent authorities is that, as a result of high incident reporting thresholds, very few
    incidents are being reported, also failing to meet the set objectives.
    Finally, with respect to penalties, there is great variation in magnitude across Members
    States and their application. Penalties vary by sector, by entity, by type of incident,
    among others. The effectiveness and dissuasiveness of some of the maximum penalties
    provided for in some Member States is also questionable. Moreover, Member States to
    date have never applied any type of penalties. This situation clearly calls for a specific
    intervention to align the penalties across Member States. 247
    Efficiency
    This criterion considers the relation between the resources used by the intervention and
    the changes that it generated. Under this criterion, the analysis looks at the costs and
    benefits of the EU intervention as they accrue to different stakeholders to evaluate
    whether the benefits are achieved at a reasonable cost and the costs are proportionate to
    the benefits.248
    Evaluation question: To what extent have the effects of the NIS Directive been achieved
    at a reasonable cost?
    The results of the targeted consultation activities concerning the costs and benefits of the
    NIS Directive have highlighted a lack of quantitative data. The missing estimates of costs
    and benefits is due to four main reasons: (i) data are not available as the Directive has
    only recently been implemented; (ii) the reluctance of stakeholders to share such data,
    (iii) the difficulty in attributing the costs and benefits of new cybersecurity measures
    245
    Overall 9 DSPs (including trade associations) replied to the targeted survey and 16 DSPs (including 3
    trade associations) replied to the Open Public Consultation.
    246
    46 NCAs replied to the targeted survey and 14 NCAs replied to the Open Public Consultation.
    247
    Based on the interim findings of the NIS review study to be included in its final report due by
    December 2020/January 2021, not yet submitted at the time of the writing of this report.
    248
    Better Regulation Tool#47 on Evaluation Criteria And Questions. Available at:
    https://ec.europa.eu/info/sites/info/files/file_import/better-regulation-toolbox-47_en_0.pdf
    116
    directly to the NIS Directive, and (iv) the non-easily quantifiable costs and benefits, such
    as the reduced number of cybersecurity incidents or the increased compliance costs.
    Despite the lack of estimates that equally concerns costs and benefits, it is possible to
    draw some partial conclusions. Analysing the findings of the targeted consultations
    related to the costs coming from the NIS Directive, it is evident that the respondents have
    expressed common views, reporting that they did not incur significant operational,
    administrative, and compliance costs. The costs that the respondents flagged as the most
    relevant are compliance costs and, in particular, the duplication of efforts and the time
    invested to comply with different European legislation, imposing different reporting
    obligations to different authorities, timelines, and criteria. However, the duplication of
    reporting requirements due to the lack of external coherence cannot be reported as a
    direct cost of the NIS Directive.
    In regard to the benefits, the results of the targeted consultation activities show that the
    respondents have experienced additional benefits coming from the NIS Directive, such as
    the improved security for the functioning of economy and society and the increased trust
    and cooperation among the Member States. The perceived benefits vary across
    stakeholders. Competent authorities gave mainly positive replies in relation to the
    benefits coming from the NIS Directive, while OES and DSPs experienced one main
    benefit - a reduced impact of cybersecurity incidents for OES, and increased trust in the
    digital economy and the internal market for DSPs. However OES and DSPs were more
    critical in relation to other types of benefits, i.e. decreased costs of security incidents,
    including malicious attacks and a reduced number of NIS incidents.
    Finally, the respondents’ answers concerning the proportionality of the costs and benefits
    of the NIS Directive are positive, with all stakeholder groups considering the cost
    proportionate to the benefits to a great or to a moderate extent. The stakeholder group
    that is more critical about the proportionality of costs and benefits is the OES in the
    banking and financial market infrastructure sectors. This is partly due to the fact that
    entities in these two sectors considered themselves already compliant with requirements
    similar to those imposed by the Directive before the entry into force of the NIS Directive.
    Overall, the results of the consultation activities tend to show that the costs of the
    Directive are reasonable and proportionate to the benefits achieved. However, no
    conclusive consideration can be done in relation to the costs and benefits, as the lack of
    estimates limits the analysis of the efficiency of the NIS Directive. 249
    f) CONCLUSIONS
    Overall, the NIS Directive can be considered as a major first step in reaching the
    objectives to raise the common level of cybersecurity amongst the Member States. The
    NIS Directive has ensured the completion of national frameworks by defining the
    national cybersecurity strategies, establishing national capabilities and implementing
    regulatory measures covering the critical infrastructures and actors identified by each
    Member State. The Directive has also greatly contributed to developing the cooperation
    at the EU level within the frameworks of the Cooperation Group and CSIRTs Network.
    249
    Based on the interim findings of the NIS review study to be included in its final report due by
    December 2020/January 2021, not yet submitted at the time of the writing of this report.
    117
    However, the growing interconnectedness and dependence on digital technologies as well
    as the expanding threat landscape have intensified the need for a strong EU response.
    Member States capabilities are still unequal and resources are often insufficient leaving
    certain competent authorities in a position, in which they can no longer effectively fulfil
    their obligations under the Directive. In view of the minimum harmonization
    requirements imposed by the Directive, Member States have taken diverging approaches
    when identifying OES and prescribing security requirements and incident reporting
    obligations. This has led to discrepancies and gaps in the implementation of the Directive
    and has failed to achieve a sufficient level playing field for operators and in particular
    cross-border players, within the Union. The sectors identified beyond the scope of the
    Directive also demonstrate the need to expand the scope to further sectors that are
    considered essential and equally vulnerable to cyber threats. In view of DSPs’ increasing
    role in the digital economy, the current light-touch regime, which has demonstrated its
    limitations, merits a re-evaluation and a clarification regarding the type of providers that
    fall in the scope, the process to establish DSP’s jurisdiction within the Union and the
    national competent authorities’ ex-ante supervisory powers. Information sharing has
    remained limited both from operators and DSPs as between national competent
    authorities. The high incident reporting thresholds leading to only few reportable
    incidents stay in the way of developing a comprehensive view of the threat landscape.
    Despite the success of the Cooperation Group, due to the voluntary nature of information
    exchanges between the authorities, no systematic information sharing between Member
    States has been takings place. This is the case also in situations with direct cross-border
    implications. Therefore, to be able to keep in pace with technological and threat
    landscape evolution and to achieve the original objectives of the NIS Directive and make
    it future-proof, the discrepancies between the Member States transposition and legal gaps
    need to be removed.
    

    1_EN_impact_assessment_part3_v5.pdf

    https://www.ft.dk/samling/20201/kommissionsforslag/kom(2020)0823/forslag/1729193/2307179.pdf

    EN EN
    EUROPEAN
    COMMISSION
    Brussels, 16.12.2020
    SWD(2020) 345 final
    PART 3/3
    COMMISSION STAFF WORKING DOCUMENT
    IMPACT ASSESSMENT REPORT
    Accompanying the document
    Proposal for a Directive of the European Parliament and of the Council
    on measures for a high common level of cybersecurity across the Union, repealing
    Directive (EU) 2016/1148
    {COM(2020) 823 final} - {SEC(2020) 430 final} - {SWD(2020) 344 final}
    Europaudvalget 2020
    KOM (2020) 0823
    Offentligt
    1
    Table of Contents
    Annex 6: Overview of selected results of the targeted surveys conducted by the
    NIS review study.........................................................................................................5
    Annex 7: Overview of related cybersecurity legal acts and policy measures ...................45
    Annex 8: Overview of policy options ...............................................................................55
    Annex 9: Cross-sector and cross border propagation of incidents....................................63
    Annex 10: Extract from the interim results of the NIS review study on a
    modelling for costs and benefits................................................................................65
    Annex 11: List of indicators to monitor high-level progress towards general
    objectives...................................................................................................................67
    Annex 12: List of indicators to monitor progress towards specific objectives .................70
    2
    Glossary: acronyms
    Term or acronym Meaning
    AI Artificial Intelligence
    CDN Content delivery network
    CSIRTs Computer Security Incident Response Teams
    CyCLONe European Cyber Crises Liaison Organisation Network
    DDoS Distributed Denial of Service
    DEP Digital Europe Programme
    DESI Digital Economy and Society Index
    DNS Domain Name System
    DORA Digital Operational Resilience Act for the financial
    sector
    DSP Digital service provider
    EASA The European Union Aviation Safety Agency
    ECCSA European Centre for Cybersecurity in Aviation
    ECI Directive Directive on the identification and designation of
    European critical infrastructures
    ECJ European Court of Justice
    EECC European Electronic Communications Code
    EMSA European Marine Safety Agency
    eIDAS (Regulation) Regulation on electronic identification and trust services
    for electronic transactions in the internal market
    ENISA The European Union Agency for Cybersecurity
    3
    GDPR General Data Protection Regulation
    IaaS Infrastructure as a service (cloud service model)
    ICS Industrial control system
    IOCTA Internet Organised Crime Threat Assessment
    IoT Internet of Things
    ISAC Information Sharing and Analysis Centre
    ISO International Organisation for Standardisation
    ITU International Telecommunications Union: The United
    Nations specialised agency for information and
    communication technologies
    IXPs Internet Exchange Points
    JRC European Commission’s Joint Research Centre
    LOTL European List of eIDAS Trusted Lists
    OES Operator of essential services
    OPC Open public consultation
    MeliCERTes Cybersecurity Digital Service Infrastructure
    Maintenance and Evolution of Core Service Platform
    Cooperation Mechanism for CSIRTs
    NACE Statistical Classification of Economic Activities in the
    European Community
    NIS Directive Directive concerning measures for a high common level
    of security of network and information systems across
    the Union
    NIST National Institute of Standards and Technology – US
    Department of Commerce
    4
    PaaS Platform as a Service (cloud service model)
    PPP Private Public Partnership
    ROSI Return of Security Investment
    SaaS Software as a Service (cloud service model)
    SME Small and medium-sized enterprises
    SPOC Single Point of Contact
    TFEU Treaty on the Functioning of the European Union
    TLD Top-level domain
    5
    ANNEXES
    ANNEX 6: OVERVIEW OF SELECTED RESULTS OF THE TARGETED SURVEYS CONDUCTED
    BY THE NIS REVIEW STUDY
    Throughout July-September 2020, the NIS review study conducted targeted surveys for
    three categories of stakeholders: competent authorities, operators of essential services
    and digital service providers. The surveys had: 46 respondents on the side of competent
    authorities, 49 for operators of essential services and 9 for digital service providers.
    This annex provides a summary of the results of the targeted surveys, as well as extracts
    of these results, as they were referred to throughout the impact assessment report. The
    results and charts were prepared by the Study to support the review of Directive (EU)
    2016/1148 concerning measures for a high common level of security of network and
    information systems across the Union (NIS Directive) – N° 2020-665 – implemented by
    Wavestone, CEPS and ICF. The final report of the study, due by December 2020/January
    2021 was not submitted at the time of the writing of this report.
    Overview
    The targeted consultation consisted of online surveys and in-depth interviews.
    As part of the targeted consultation, the Project Team developed three online surveys
    targeting
    ■ National Competent Authorities (CAs, including CSIRTs and SPOCs),
    ■ Operators of Essential Services (OESs)
    ■ Digital Service Providers (DSPs)
    All three online surveys ran between 15 July and 4 September 2020. The questionnaires
    were tailored to each stakeholder group and were structured following the five evaluation
    criteria: relevance, effectiveness, efficiency, coherence EU added value.
    The questions were grouped according to the main provisions of the NIS Directive
    exploring context specific aspects which gave the targeted respondent the possibility to
    provide evidence-based information coming from their experience.
    The surveys prepared for OESs and DSPs were also shared with and disseminated
    through associations or networks of OESs and DSPs, significantly increasing the reach of
    the surveys through the snowballing technique.
    The respondent breakdown was as follows:
    Table 1: Overview of respondents to the targeted surveys
    Respondent group Total number of responses Coverage
    CAs (CSIRTs, SPOCs) 46 22 out of 27 MS + UK
    OESs 49 All sectors in Annex II
    DSPs 9 All services in Annex III
    Source: Wavestone
    In-depth interviews were conducted between 23 July 2020 and 8 September 2020. A
    total of 16 interviews were completed with the following stakeholders:
    ■ 4 CAs
    6
    ■ 7 OESs
    ■ 2 DSPs
    ■ 2 EU Institutions and Agencies
    ■ 1 Think-Tank
    Contextual relevance
    It was noted the increasing interconnectedness and reliance on digital infrastructures,
    technologies, and online systems, as well as resilience and trust in the supply chain made
    the NIS Directive all the more relevant in the current contextual settings. To illustrate
    this, 54% (25 out of 46) of the CAs responding to the targeted survey thought that the
    NIS Directive is relevant to a great extent in the current context.
    The majority of OESs and DSPs respondents agree that all specific objectives of the NIS
    Directive are still relevant in the current contextual settings.
    Across the groups (CAs, OESs, DSPs) the main issues identified with regard to the extent
    to which EU legislation on NIS still has relevance were:
    ■ the increasing magnitude, frequency and impact of security incidents, and harmful
    actions;
    ■ the unequal cybersecurity capabilities and preparedness in the Member States;
    ■ the lack of common requirements for OESs and DSPs; and
    ■ the insufficient structured cooperation among relevant actors.
    Sectoral coverage
    The targeted consultations confirmed that most CAs (31 out of 46, 67% of respondents)
    believe that the Annex II of the NIS Directive does not cover all relevant sectors and
    subsectors when it comes to the provision of services essential for the economy and
    society.
    Unlike the CAs, the OESs shared mixed opinions as to whether to add sectors or sub-
    sectors to the Annex II of the NIS Directive (12 out of 49, 24% of respondents are in
    favour; 14 out of 49, 29% of respondents are not; and 23 out of 49, 47% do not know).
    For those who believe sector or sub-sectors could be added in addition to the ones
    identified by CAs, one additional sector was raised by OESs and is targeted at the
    elections service (authorities, technology and process) (5 out of 12, 42% of respondents
    agree ‘to a great extent’).
    Emerging challenges
    While there was overall agreement that the problems and needs that were considered
    most prominent when the NIS Directive was adopted are still relevant today and most
    likely require action at EU level. These problems led to the identification of a series of
    main needs in the legislation, including:
    ■ implementing security measures to manage cybersecurity risks, and prevent,
    minimise and notify incidents;
    ■ harmonising the identification process of OESs across the Member States; and
    ■ addressing the ineffective approach for determining the DSPs falling under the
    scope of the Directive.
    7
    Coherence
    Of the NIS Directive in the EU cybersecurity policy framework
    The consultation covered the degree of coherence between the NIS Directive and a set of
    other EU legislative texts including: Directive (EU) 2018/1972 (EECC); Directive
    2015/2366/EU (PSD2 Directive); Regulation (EU) No 910/2014 (eIDAS Regulation);
    Regulation 2016/679 (GDPR) ; and Regulation (EU) 2019/881 (Cybersecurity Act).
    Across all three stakeholder groups, a significant share of the respondents could not
    pronounce themselves on the degree of coherence between the NIS Directive and other
    EU legislative texts. The remaining stakeholders consulted across the three groups noted
    a satisfactory degree of consistency of concepts and definitions between the Directive
    and the other EU instruments.
    However, a better alignment among certain legal instruments could still be reached in
    relation to definitions, such as the notion of ‘incident’, as well as reporting requirements,
    which are heterogeneous in terms of reporting authorities, thresholds, timeframe, and
    penalties.
    Of the NIS Directive concepts and provisions
    The majority of CAs responding to the online survey (63%) indicated that the concepts
    and definitions provided in the NIS Directive are clear enough. However, 35% of the CA
    respondents held the opposite view and highlighted the definition and identification of
    OESs and DSPs as the main unclear points.
    OESs and DSPs were also surveyed in order to gather their views on any potential clarity
    issues regarding the concepts and definitions provided within the NIS Directive. The
    majority of both (63% for OESs and 56% for DSPs) seem to consider concepts and
    definitions coming from the NIS Directive clear enough.
    Overall, although the majority of the respondents to the targeted surveys declared that the
    definitions provided in the NIS Directive are clear enough, a number of legal concepts
    featuring in the NIS Directive were judged to entirely clear, e.g. definition of OESs and
    DSPs; ‘significant’ or ‘substantial’ impact and ‘appropriate and proportionated technical
    and organisational measures to manage the risks’.
    EU added value
    Of the NIS Directive compared to Member States acting alone
    According to the consulted CAs, the NIS Directive achieved results that could not have
    been achieved by national policies alone:
    ■ 57% of the CAs responding to the online survey (26 out of 46) agreed ‘to a great
    extent’ on the fact that the NIS Directive improved cooperation and the exchange
    of information among Member States;
    ■ 46% of the CAs (21 out of 46) also agreed ‘to a great extent’ that the Directive
    promoted effective operational cooperation through to the creation of a network of
    national CSIRTs; and
    ■ 35% (16 out of 46) of the CAs agreed ‘to a great extent’ with the fact that the
    Directive guaranteed minimum capabilities and the establishment of a national
    framework.
    8
    Results for OESs and DSPs were more mixed regarding the added value of the NIS
    Directive regarding the above aspects. The most critical stakeholder group appeared to be
    the OESs taking part in the online survey:
    ■ 29% (14 out of 49) of OESs only agreeing ‘to a moderate extent’ with the fact that
    the NIS Directive created a level playing field for OESs and DSPs across the EU,
    which could have not been achieved by national polices alone, in terms of security
    and notification requirements;
    ■ 35% (17 out of 49) of OESs only agreed ‘to some extent’ with the effective
    implementation and enforcement of security requirements and notifications by
    OESs and DSPs.
    ■ 41% of OESs (20 out of 49) indicated not knowing whether the NIS Directive
    improved cooperation and the exchange of information among Member States,
    and a further 35% (17 out of 49) indicated not knowing whether the creation of a
    network of national CSIRTs led to more effective operational cooperation.
    Added value of the continuation of EU level action
    Across the three stakeholder groups, responses showed that EU level action on NIS
    brings added value and should be continued when considering that:
    ■ the general objective of the Directive is yet to be fully achieved;
    ■ harmonisation between Member States, despite considerable efforts, remains
    incomplete, e.g. OESs identification;
    ■ the revision of the NIS Directive is an opportunity to extend its scope to
    harmonise the EU landscape, e.g. supply chain security, new technologies, public-
    private partnerships.
    Effectiveness
    Achieving a high common level of security across the EU
    Most of the CAs consulted in the targeted survey (92%, 44 out of 46) regarded either ‘to
    a moderate’ or ‘to a great’ extent to which the overall provisions of the NIS Directive
    were effective for achieving a high common level of security.
    These results are corroborated by the relative majority of consulted OESs and DSPs,
    although they have shown more mixed opinions on the effectiveness of the Directive in
    achieving a high common level of security across the EU. In this context, it has been
    highlighted that while strategies and frameworks are now in place in all Member States,
    because of the fact that incident handling is different from Member State to Member
    State – especially in terms on methodologies, skills and practices –effective cooperation
    is extremely complex.
    Enabling Member States to develop effective cybersecurity policies
    The majority of CAs, OESs and DSPs positively assessed the effectiveness of the
    Directive in allocating power and tasks to national competent authorities, SPOCs and
    CSIRTs
    While the NIS Directive was deemed across the three groups to contribute to the
    development of effective cybersecurity policies in the Member States, the results reveal
    that the level of at least some Member States’ cyber maturity could still be improved.
    9
    Around two-thirds of the consulted CAs (30 out of 46) still consider at least to ‘some
    extent’ the insufficient capabilities in the Member States to ensure a high level of
    security of network and information systems to be relevant and continue to require action
    at EU level.
    Security requirements/incident notifications for OESs & DSPs
    The Directive was deemed to have contributed to OESs and DSPs effective management
    of risks posed to the security of network and information systems.
    Results however show a need for improvement concerning:
    ■ the misalignment of security requirements and penalties across the Member
    States;
    ■ the high incident notification thresholds; and
    ■ the highly fragmented supervisory framework.
    Cooperation at EU level
    The Cooperation Group was deemed effective across all three stakeholder groups in
    assisting Member States in building capacity and exchanging best practices and
    experiences.
    Similarly, the CSIRTs Network was overall deemed to have a positive impact in
    clarifying actors’ role and responsibilities within the incident response process.
    However, respondents frequently highlighted the need for improvements regarding
    communication and collaboration between the Cooperation Group and the CSIRTs
    Network.
    Efficiency
    Costs
    The findings of the online surveys showed that the administrative and compliance costs
    brought about by the NIS Directive were deemed reasonable by most CAs, OESs and
    DSPs.
    However, stakeholders taking part in the in-depth interviews frequently flagged the
    duplication of efforts in the implementation of the NIS Directive as having negative
    implications on costs, both in terms of human resources and time. Duplication was
    highlighted as a result of efforts undertaken to ensure compliance with multiple
    legislative texts, which often implies the existence of different reporting authorities,
    timelines, and thresholds.
    Benefits
    The NIS Directive was overall viewed as having contributed to the setting up of a
    horizontal framework for the security of networks and information systems at the EU
    level, triggering the implementation of security measures across the Member States and
    fostering collaboration and trust within the Union.
    According to the results of the online surveys and the in-depth interviews, the main
    benefits of the NIS Directive were:
    ■ increased trust in the digital economy,
    ■ improved functioning of the internal market
    ■ reduced impact of NIS incidents
    10
    Conclusions
    Evidence from the targeted consultation activities reveal that the NIS Directive has
    relevance given society’s ever greater dependency on ICT as well as the evolution of the
    cyber threat landscape. However, the results also reveal that Member States’ capabilities
    are deemed uneven and sometimes insufficient to respond to cyber threats
    comprehensively and effectively, including cross-border incidents.
    Stakeholders overall recognise that differnt levels of preparedness within Member States
    persist, leading to fragmented approaches across the EU for ensuring a high level of
    cybersecurity.
    Based on the results of the targeted consultation, the points to consider in the review of
    the NIS Directive are as follows:
    ■ lack of harmonisation across the Union when it comes to the identification of
    OESs
    ■ insufficient consideration of critical internet-related technologies/entities, which
    may turn the entire digital ecosystem vulnerable
    ■ legal concepts not fully defined, resulting in Members States interpreting them in
    their own laws which is potentially detrimental to the level-playing field.
    Illustrative charts on extracts from the results of the survey targeting competent
    authorities
    On the shortcomings of the NIS Directive
    11
    12
    On the positive impact of the NIS Directive
    On challenges faced in the implementation of the NIS Directive
    13
    On available resources
    On the scope of the NIS Directive
    14
    15
    On identification of OES
    16
    On security requirements and incident notifications
    17
    18
    On supervision and enforcement
    19
    On information sharing and cooperation
    20
    On efficiency, compliance costs and benefits
    21
    On EU added value of new policy concepts
    22
    Illustrative charts on extracts from the results of the survey targeting operators of
    essential services
    On the shortcomings of the NIS Directive
    23
    On the positive effects of the NIS Directive
    On identification of OES
    24
    On the scope of the NIS Directive
    25
    On resources
    26
    On security requirements and incident notifications
    27
    28
    29
    On information sharing and cooperation
    30
    On efficiency, compliance costs and benefits
    31
    32
    On new policy concepts
    33
    Illustrative charts on extracts from the results of the survey targeting digital service
    providers
    On shortcomings of the NIS Directive
    34
    35
    On the positive effects of the NIS Directive
    36
    On the scope of the NIS Directive
    37
    On resources
    38
    On security requirements and incident notifications
    39
    40
    On the light-touch approach for supervision
    On information sharing and cooperation
    41
    On efficiency, compliance costs and benefits
    42
    43
    On new policy concepts
    44
    45
    ANNEX 7: OVERVIEW OF RELATED CYBERSECURITY LEGAL ACTS AND POLICY
    MEASURES
    The EU Cybersecurity Act1
    entered into force in June 2019, including provisions that (i)
    equip Europe with a framework of cybersecurity certification of products, services and
    processes, making sure that connected devices are reliable and trustworthy, and (ii)
    reinforce the mandate of the EU Agency for Cybersecurity (ENISA) to better support
    Member States with tackling cybersecurity threats and attacks. One of the main aims of
    the Cybersecurity Act is to develop a culture of cybersecurity by design, with security
    built into products and services from the start. The new cybersecurity certification
    framework under the Cybersecurity Act is now being implemented, with two certification
    schemes already in preparation, and priorities for further schemes to be identified in the
    Union Rolling Work Programme on cybersecurity certification.2
    Further EU legislative and policy measures relevant to cybersecurity are also being taken
    in connected areas. The Commission is currently preparing a proposal, due by the end of
    2020, for additional measures to enhance the protection and resilience of critical
    infrastructure. The Directive on the identification and designation of European critical
    infrastructures3
    (hereinafter called ‘the ECI Directive’) established a process to identify,
    designate and adopt protection measures for infrastructures that are critical from a
    European perspective, i.e. where their disruption would have an impact on at least two
    Member States, limited to the transport and energy sectors.4
    While the NIS Directive
    aims at ensuring that operators in the seven sectors it covers take appropriate and
    proportionate technical and organisational measures to manage the cybersecurity risks
    that their network and information systems are exposed to, irrespective of the extent of
    their operations over national borders, or the cross-border implications in the event of
    disruptions, the ECI Directive aims to enhance the general, largely physical protective
    arrangements surrounding designated infrastructures of cross-border significance in the
    energy and transport sectors alone. In 2019, the Commission conducted an evaluation of
    the ECI Directive, concluding that it is only of partial relevance today, in light of a range
    of factors including considerable changes in the context in which critical infrastructure
    operates in. The stated objectives of the initiative are to ensure greater coherence of the
    EU critical infrastructure protection approach, to include all relevant sectors providing
    essential services, including those defined by the NIS framework, to help Member States
    to achieve resilience of national infrastructures and to improve information exchange and
    cooperation.
    Overall, since the implementation of the NIS Directive, European countries have become
    increasingly dependent on digital and information systems, while their networks have
    become ever-more interconnected. Within the Commission Work Programme 20205,
    cybersecurity is presented as being interlinked with the digitalisation of the European
    1
    Regulation (EU) 2019/881 of the European Parliament and of the Council of 17 April 2019 on ENISA
    (the European Union Agency for Cybersecurity) and on information and communications technology
    cybersecurity certification and repealing Regulation (EU) No 526/2013 (Cybersecurity Act) (Text with
    EEA relevance) PE/86/2018/REV/1.
    2
    https://www.enisa.europa.eu/publications/cybersecurity-certification-eucc-candidate-scheme/
    3
    Directive 2008/114/EC of 8 December 2008
    4
    The 2006 proposal for the ECI Directive (COM(2006) 787) identified a total of 11 critical infrastructure
    sectors, including: energy; nuclear industry; information, communication technologies, ICT; water;
    food; health; financial; transport; chemical industry; space; and research facilities.
    5
    COM (EU) (2020) 37 final, Communication From The Commission To The European Parliament, The
    Council, The European Economic And Social Committee And The Committee Of The Regions,
    Commission Work Programme 2020, 29.1.2020.
    46
    Union. Technologies used in critical sectors such as healthcare, energy, banking, and
    legal systems will have to be reinforced by the development of robust cybersecurity
    measures. Consequently, a number of other sector-specific legal acts or upcoming
    legislative proposals are also addressing cybersecurity-related aspects, as follows:
     as regards the financial sector, the Commission launched an initiative for a
    Digital Operational Resilience Framework for financial services, adopted on 24
    September 20206
    . The initiative is lex specialis in relation with the NIS Directive,
    setting out consolidated, simplified and upgraded ICT risk requirements
    throughout the financial sector to ensure that all participants of the financial
    system are subject to a common set of standards to mitigate ICT risks for their
    operations.
     in the energy sector, the Risk Preparedness Regulation7
    inter alia sets a
    framework to ensure that Member States prevent and manage crisis situations in
    cooperation with each other in a spirit of solidarity. This Regulation complements
    the NIS Directive “by ensuring that cyber-incidents are properly identified as a
    risk, and that the measures taken to address them are properly reflected in the
    risk-preparedness plans”.8
    The same applies to the Regulation9
    concerning
    measures to safeguard the security of gas. Both instruments are accompanied by a
    Commission Recommendation10
    on cybersecurity in the energy sector providing
    sector-specific guidance. Furthermore, as part of the development of network
    codes and guidelines for the period 2020-2023 for electricity and for 2020 for gas,
    a Network Code for the cybersecurity of cross-border energy flows is being
    established11
    . In this context, sector-specific rules for cyber security aspects of
    cross-border electricity flows should allow the electricity networks to address
    potential cyber threats so that clean energy is fit for the digital age
     in the transport sector, additional initiatives are being put forward by the
    Commission and relevant EU bodies, with the aim of increasing the robustness of
    services against cyberattacks. Such initiatives regard, for example, the aviation
    sector, where, the EU adopted detailed rules for cybersecurity in the aviation
    security domain12
    . The EU Aviation Safety Agency (EASA) is preparing an
    opinion to be submitted to the European Commission in order to amend aviation
    safety legislation with cybersecurity provisions requiring the mandatory
    introduction of an Information Security Management System. In maritime
    transport, EU security legislation13
    already contains provisions relating to
    cybersecurity. Cybersecurity is also part of the EU Maritime Security Strategy
    dating from 201414
    , with an action plan revised in 2018. In addition, the
    6
    Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on
    digital operational resilience for the financial sector and amending Regulations (EC) No 1060/2009,
    (EU) No 648/2012, (EU) No 600/2014 and (EU) No 909/2014, COM(2020) 595 final.
    7
    Regulation (EU) 2019/941.
    8
    Recital 7 of Regulation (EU) 2019/941 (Risk Preparedness Regulation).
    9
    Regulation (EU) 2017/1938.
    10
    C(2019)2400 final of 3 April 2019.
    11
    As empowered by Regulation (EU) 2019/943 on the internal market for electricity. Preparatory work
    was finalised in September 2019, an informal drafting process is ongoing,
    12
    Commission Implementing Regulation (EU) 2019/1583
    13
    Regulation (EC) No 725/2004 of the European Parliament and of the Council of 31 March 2004 on
    enhancing ship and port facility security, Directive 2005/65/EC of the European Parliament and of the
    Council of 26 October 2005 on enhancing port security.
    14
    http://register.consilium.europa.eu/doc/srv?l=EN&f=ST%2011205%202014%20INIT
    47
    Commission, the EU Aviation Safety Agency (EASA), the European Maritime
    Safety Agency (EMSA) and ENISA rely on a series of expert groups gathering
    representatives from the different modes of transport to exchange viewpoints and
    ideas on cyber security threats, challenges and solutions. For example,
    cybersecurity is regularly discussed between the Commission, Member States and
    stakeholders at the level of transport security committee meetings for each
    mode15
    . EASA chairs a European Strategic Coordination Platform (ESCP)
    including key industry stakeholders, Member States and EU Institutions. This has
    led to the first common EU strategy for cybersecurity in aviation. It is also
    supporting the creation of a European Centre for Cybersecurity in Aviation
    (ECCSA) and providing the initial operational capabilities currently in
    collaboration with CERT-EU. With the support of ENISA, the Transport
    Resilience and Security Expert Group (TRANSSEC) was also set up, gathering
    experts from the transport sector to exchange viewpoints and ideas on cyber
    security threats, challenges and solutions.
    As regards electronic communication networks and services, the cybersecurity aspects in
    relation to these are now regulated, starting 21 December 2020, by the European
    Electronic Communications Code (EECC). The NIS Directive excludes from its security
    and notification requirements undertakings providing public communications networks
    or publicly available electronic communications services, which are subject to the
    requirements of Articles 13a and 13b of Framework Directive 2002/21/EC, which is
    repealed with effect from 21 December 2020.16
    The Connectivity Package, which
    reshapes telecoms regulation, redefines the term ‘electronic communications network’ in
    the EECC. A so-called ‘Article 13a group’ made of Member States representatives and
    supported by ENISA, distinct from the Cooperation Group, is covering the cybersecurity
    policy aspects related to electronic communication networks and services and would
    continue to do so absent any changes to the NIS Directive. Seven Member States added
    the electronic communication networks and services to the scope of the NIS-related
    rules.
    The table below developed by the NIS review study points to the specific provisions of the
    NIS Directive and other EU legislation that are inter-related, notably as regard the
    security requirements and reporting obligations.
    16
    The Connectivity Package, which reshapes telecoms regulation, redefines the term ‘electronic
    communications network’ in the EECC.
    48
    NIS Directive - External coherence with other EU interventions
    European Electronic Communications Code (EECC)
    Provisions NIS Directive EECC Directive Analysis
    Security
    notification
    requirements
    Article 14(1) NIS
    Directive: requires
    Member States to
    ensure that the OES
    ‘take appropriate
    and proportionate
    technical and
    organisational
    measures to
    manage the risks
    posed to the
    security of network
    and information
    systems which they
    use in their
    operations.’
    Article 40 EECC:
    requires Member
    States to ensure that
    providers of electronic
    communications
    networks or of
    publicly available
    electronic
    communications
    services ‘take
    appropriate and
    proportionate
    technical and
    organisational
    measures to
    appropriately manage
    the risks posed to the
    security of networks
    and systems.’
    Both provisions take a
    risk-based approach
    when implementing
    security measures.
    While the NIS Directive
    refers to ‘security of
    network and information
    systems’, the EECC
    refers to ‘security of
    networks and services’
    with both defining
    security as ‘the ability
    of’ network and
    information
    systems/electronic
    communications
    networks and services
    ‘to resist, at a given
    level of confidence, any
    action that compromises
    the availability,
    authenticity, integrity or
    confidentiality’ of stored
    or transmitted or
    processed data/of those
    networks and services.
    49
    NIS Directive - External coherence with other EU interventions
    Article 14(3) NIS
    Directive require
    Member States to
    ensure that security
    incidents having a
    significant impact
    on the continuity of
    the essential
    services/on the
    operation of
    networks or
    services, are
    reported without
    undue delay.
    Article 40(2) EECC
    require Member States
    as well to ensure that
    security incidents
    having a significant
    impact on the
    continuity of the
    essential services/on
    the operation of
    networks or services,
    are reported without
    undue delay.
    Overall, no divergences
    between the framework
    on security measures in
    the NIS Directive and
    EECC could be
    identified. However, as
    a mere formality, there
    should be alignment as
    regards the notion of
    ‘incident’ in the NIS
    Directive and ‘security
    incidents’ in the EECC,
    although the definitions
    are similar.
    In addition, there could
    be a potential coherence
    issue for reporting
    schemes related to
    Internet Service
    Providers (ISPs)
    between Article 14 NIS
    Directive and Article 40
    EECC if the new
    reporting scheme
    implemented under
    Article 40 EECC was
    not followed: one
    incident could be
    reported under two
    different requirements.
    50
    Electronic identification and trust services for electronic transactions (eIDAS
    Regulation)
    Provision NIS Directive eIDAS Regulation Analysis
    Security
    notification
    requirements
    Article 1(3) of the
    NIS Directive,
    require that the
    security and
    notification
    requirements
    provided for in the
    NIS Directive shall
    not apply to trust
    service providers
    which are subject
    to the requirements
    of Article 19 eIDAS
    Regulation.
    Articles 19(1) and
    19(2) eIDAS
    Regulation require
    inter alia that
    providers of trust
    services take
    appropriate security
    measures to mitigate
    risks posed to the
    security of their trust
    services and notify,
    without undue delay
    but in any event within
    24 hours after
    becoming aware of it,
    the supervisory body
    and, where applicable,
    other relevant bodies,
    such as the competent
    national body for
    information security or
    the data protection
    authority, of any
    breach of security or
    loss of integrity that
    ‘has a significant
    impact on the trust
    service provided or on
    the personal data
    maintained therein’.
    Coherence issues may
    arise when digital
    certificates are used for
    authentication in
    services that fall under
    the scope of the NIS
    Directive. This is likely
    with regard to financial
    services or cloud
    services. In addition,
    under the eIDAS
    Regulation the
    reporting time frame is
    24 hours, whereas NIS
    Directive requires it to
    happen ‘without undue
    delay’.
    51
    General Data Protection Regulation (GDPR)
    Provision NIS Directive GDPR Regulation Analysis
    Security
    notification
    requirements
    Articles 8(6) and
    15(4) NIS Directive
    require the
    competent
    authorities and
    single point of
    contact under the
    NIS Directive to
    consult and
    cooperate with
    national data
    protection
    authorities
    Article 33(1) GDPR
    require data
    controllers to notify a
    personal data breach
    to the supervisory
    authority without
    undue delay, at the
    latest within 72 hours
    after becoming aware
    of it. In addition, if the
    data breach is likely to
    result in a high risk to
    the rights and
    freedoms of natural
    persons and non of the
    conditions described in
    Article 33(3) applies,
    controllers are
    required to
    communicate the
    personal data breach
    to the data subject
    without undue delay.
    The difference to the
    NIS Directive is that the
    GDPR is only
    applicable to incidents
    that concern personal
    data and upon the
    condition that the data
    breach results to a risk
    to the rights and
    freedoms of natural
    persons. Even if one
    may, in theory,
    distinguish between
    incidents falling under
    the GDPR and such
    falling under the NIS
    Directive, in practice,
    most security incidents
    will involve (at least
    potentially) some
    personal data.
    However since the
    legal instruments have
    different objectives
    legal instruments. This
    means that OESs and
    DSPs will have to
    report as subset of
    security incidents to
    both competent
    authorities in order to
    ensure compliance with
    both regulatory
    requirements.
    52
    Payment services in the internal market (PSD2 Directive)
    Provision NIS Directive PSD2 Directive Analysis
    Security
    notification
    requirements
    Article 14(5) NIS
    Directive requires
    the competent
    authority to notify
    the relevant
    authorities in other
    Member States if
    the incident is of
    relevance for them.
    Article 95(1) PSD2
    requires payment
    service providers to
    adopt appropriate
    mitigation measures
    and controls
    mechanisms relating to
    the payment services
    they provide. It also
    requires the
    establishment and
    maintenance of
    effective incident
    management
    procedures including
    for the detection and
    classification of major
    operational and
    security incidents.
    Article 96 PSD2
    establishes an incident
    notification scheme,
    which foresees that
    payment service
    providers ‘shall report
    without undue delay
    any major operational
    or security incident to
    their competent
    authority in the
    Member State’.
    Article 96 PSD2 also
    requires payment
    services providers to
    inform its payment
    service users where the
    incident has or may
    have an impact on the
    financial interests of
    the user.
    Payment service
    providers are
    encompassed within
    Annex II of the NIS
    Directive as part of the
    financial services
    sector. However, as
    Article 1(7) NIS
    Directive foresees that
    where a sector-specific
    Union legal act
    requires an OES either
    to ensure the security of
    his network and
    information systems or
    to notify incidents, that
    act shall apply provided
    that the requirements
    are at least equivalent.
    Considering that the
    security and
    notification
    requirements
    prescribed in Articles
    95 and 96 PSD2 are
    equivalent, these
    provisions are lex
    specialis to the NIS
    Directive. Hence, there
    is no coherence issue.
    In 2018, the Commission put forward a proposal for a regulation of the European
    Parliament and of the Council establishing the European Cybersecurity Industrial,
    Technology and Research Competence Centre and the Network of National
    53
    Coordination Centres17
    . The initiative aims to better target and coordinate available
    funding from the EU budget and Member State contributions for cybersecurity
    cooperation, capacity and infrastructure building as well as research and innovation. The
    competence centre should become the main body that would manage EU financial
    resources dedicated to cybersecurity research under two proposed programmes – Digital
    Europe and Horizon Europe – within the next multiannual financial framework, for
    2021-2027. These programmes are pooling more EU and national funding for
    cybersecurity research, innovation and infrastructure, cyber defence, and the EU’s
    cybersecurity industry. The Commission proposed to invest €2 billion specifically on
    cybersecurity. Trialogue negotiations are currently ongoing as part of the adoption
    procedure of the Regulation establishing the European Cybersecurity Industrial,
    Technology and Research Competence Centre and the Network of National Coordination
    Centres.
    In 2017, the Commission adopted a Joint Communication to the European Parliament
    and the Council on Resilience, Deterrence and Defence: Building strong cybersecurity
    for the EU, setting a common approach to cybersecurity with resilience-building,
    rapid response and effective deterrence.18
    Proposals to support this through building
    essential capacities are pending adoption.19
    Given the ongoing roll-out of the 5G infrastructure across the EU and the potential
    dependence of many critical services on 5G networks, the consequences of systemic and
    widespread disruption would be particularly serious. The process put in place by the
    Commission’s 2019 Recommendation on the Cybersecurity of 5G networks20
    has led
    to Member State action on the measures set out in a 5G toolbox, as reflected in the report
    on the implementation of the Toolbox adopted in July 202021
    . The Recommendation
    foresees its review in the last quarter of 2020.22
    EU institutions, bodies and agencies (EU-I), with CERT-EU and ENISA’s help, are
    considering how to prepare better for future incidents and crises, including through the
    implementation of the Blueprint Recommendation, the development of the Member State
    Cyber Crises Liaison Organisation Network (“CyCLONe”) and Cyber Europe
    incident and crisis management exercises for the public and private sectors. CyCLONe
    is notably intended to: (i) facilitate trust building, preparedness, situational awareness and
    crisis management between national relevant competent authorities; (ii) interact with
    both the technical (i.e., CSIRT Network) and the EU political level on how to manage
    large-scale cybersecurity incidents and crises; (iii) support national and EU political level
    to make an informed decision in large-scale cybersecurity incidents and crises, while
    avoiding unnecessary escalations to EU level political crisis mechanisms when the
    17
    COM (2018) 630 final, of 12.9.2018: https://ec.europa.eu/digital-single-market/en/news/proposal-
    regulation-establishing-european-cybersecurity-industrial-technology-and-research
    18
    JOIN (2017) 450 final. https://eur-lex.europa.eu/legal-
    content/EN/TXT/?uri=JOIN%3A2017%3A450%3AFIN
    19
    Proposal for a Regulation of the European Parliament and of the Council establishing the European
    Cybersecurity Industrial, Technology and Research Competence Centre and the Network of National
    Coordination Centres, COM(2018) 630 final, 2018/0328 (COD
    20
    OJ L 88, of 29.3.2019, p 42 https://eur-lex.europa.eu/legal-
    content/EN/TXT/PDF/?uri=CELEX:32019H0534
    21
    Report on Member States’ Progress in Implementing the EU Toolbox on 5G Cybersecurity;
    https://ec.europa.eu/digital-single-market/en/news/report-member-states-progress-implementing-eu-
    toolbox-5g-cybersecurity
    22
    Commission Recommendation on the Cybersecurity of 5G networks C(2019) 2335 final; Commission.
    Communication on the Secure 5G deployment in the EU: Implementing the EU toolbox COM(2020) 50
    final.
    54
    impacts can be dealt with by the operational layer. The Commission has also identified
    the need for a Joint Cyber Unit to provide structured and coordinated operational
    cooperation. Building on the implementation of the Blueprint recommendation23
    , the
    Joint Cyber Unit could build trust between the different actors in the European
    cybersecurity ecosystem and offer a key service to Member States from technical,
    operational and political level and integration of EUI, MS, CyCLONe SOPs, as well as
    potential synergies with the PESCO projects.
    Cybersecurity is also an important component of the EU framework for countering
    hybrid threats24
    , since the adoption of the first Joint Communication on countering
    hybrid threats a European Union response in 2016, establishing the link with the NIS
    framework and highlighting the importance of the convergence of risk management
    approaches and public-private cooperation25
    . Three sectors were prioritised in this
    context: energy, transport and finance.
    In 2013, Europol set up the European Cybercrime Centre (EC3)26
    to strengthen the
    law enforcement response to cybercrime in the EU and thus to help protect European
    citizens, businesses and governments from online crime. EC3 is involved in high-profile
    operations and on-the-spot operational-support deployments. EC3 publishes the annual
    Internet Organised Crime Threat Assessment (IOCTA), its flagship strategic report on
    key findings and emerging threats and developments in cybercrime.
    By the end of 2020, the Commission will also adopt a new cybersecurity strategy – a
    cybersecurity charter for the EU, setting out a comprehensive vision, including the role
    that the NIS legal framework should play.
    23
    Commission Recommendation (EU) 2017/1584 of 13 September 2017 on coordinated response to
    large-scale cybersecurity incidents and crises, OJ L 239, 19.9.2017.
    24
    Defined as a mixture of coercive and subversive activity, conventional and unconventional methods
    (i.e. diplomatic, military, economic, technological), which can be used in a coordinated manner by state
    or non-state actors to achieve specific objectives while remaining below the threshold of formally
    declared warfare.
    25
    JOINT COMMUNICATION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL Joint
    Framework on countering hybrid threats a European Union response JOIN/2016/018 final.
    26
    https://www.europol.europa.eu/about-europol/european-cybercrime-centre-ec3
    55
    ANNEX 8: OVERVIEW OF POLICY OPTIONS
    Specific policy
    objectives (SPO)
    Policy options
    Policy option 0 –
    maintaining the
    status quo
    Policy option 1 –
    non-legislative
    measures to align
    the transposition of
    the NIS Directive
    Policy option 2 – Limited
    changes to the current
    NIS Directive for further
    harmonization
    Policy option 3 – Systemic
    and structural changes to the
    NIS Directive (new directive)
    SPO1: Ensure that
    entities in all sectors
    that are dependent on
    network and
    information systems
    and that provide key
    services to the
    economy and society
    as a whole are
    required to take
    cybersecurity
    measures and report
    incidents with a view
    to increasing the
    overall level of cyber
    resilience throughout
    the internal market
    Maintaining the scope,
    requirements and
    obligations. Continue
    existing work of the
    Cooperation Group
    and the CSIRTs
    network.
    Maintaining the
    scope, requirements
    and obligation, while
    providing sector-
    specific guidance via
    the Cooperation
    Group or by the
    Commission directly
    Bring additional sectors,
    subsectors and services
    under the scope within the
    existing two categories
    covered by the NIS
    Directive (OES and DSP)
    Bring additional sectors,
    subsectors and services under
    the scope, while further
    refining and simplifying the
    categories of entities covered
    by the NIS framework
    depending on their importance
    and criticality (i.e. essential
    and important), and
    consequently differentiating
    the particular requirements and
    supervisory regime imposed on
    those.
    SPO2: Ensure that all Guidelines on OES Harmonize essential Abandon identification and
    56
    Specific policy
    objectives (SPO)
    Policy options
    Policy option 0 –
    maintaining the
    status quo
    Policy option 1 –
    non-legislative
    measures to align
    the transposition of
    the NIS Directive
    Policy option 2 – Limited
    changes to the current
    NIS Directive for further
    harmonization
    Policy option 3 – Systemic
    and structural changes to the
    NIS Directive (new directive)
    entities that are active
    in sectors covered by
    the NIS legal
    framework and that
    are similar in size and
    have a comparable
    role are subject to the
    same regulatory
    regime (are either
    inside or outside the
    scope) no matter
    under which
    jurisdiction they fall
    within the EU
    identification and
    coverage of DSPs
    services and identification
    thresholds.
    introduce uniform criteria for
    all entities operating in the
    sectors and subsectors or
    providing services covered
    under the NIS scope, excluding
    micro or small size enterprises.
    Entities which are micro or
    small, but provide services as a
    sole provider in a Member
    State or a potential disruption
    of which could have an impact
    on the public safety or health
    would also fall within the NIS
    scope. Member States would
    also be able to include in the
    NIS scope micro and small-
    size entities in the sectors and
    services covered by the NIS
    framework justified on the
    basis of their importance at
    57
    Specific policy
    objectives (SPO)
    Policy options
    Policy option 0 –
    maintaining the
    status quo
    Policy option 1 –
    non-legislative
    measures to align
    the transposition of
    the NIS Directive
    Policy option 2 – Limited
    changes to the current
    NIS Directive for further
    harmonization
    Policy option 3 – Systemic
    and structural changes to the
    NIS Directive (new directive)
    regional or national level for
    that particular sector or service
    or for other interdependent
    sectors.
    Introduce clearer and more
    explicit definitions for
    DSPs.
    Further clarify the
    jurisdiction rules.
    Establishing equal footing
    for OESs and DSPs.
    Establish equal footing for all
    entities of same
    criticality/importance, while
    removing the differences in
    regulatory regime between the
    entities which are currently
    qualified as operators of
    essential services or digital
    service providers.
    Establish a registry of digital
    service providers operating
    cross-borders.
    Further clarify the jurisdiction
    58
    Specific policy
    objectives (SPO)
    Policy options
    Policy option 0 –
    maintaining the
    status quo
    Policy option 1 –
    non-legislative
    measures to align
    the transposition of
    the NIS Directive
    Policy option 2 – Limited
    changes to the current
    NIS Directive for further
    harmonization
    Policy option 3 – Systemic
    and structural changes to the
    NIS Directive (new directive)
    rules.
    SPO3: Ensure that all
    entities that are active
    in sectors covered by
    the NIS legal
    framework must
    follow aligned
    obligations based on
    the concept of risk
    management when it
    comes to security
    measures and must
    report incidents based
    on a uniform set of
    criteria
    Guidelines on
    security and incident
    reporting
    requirements
    Harmonize security and
    incident reporting
    requirements
    Introduce uniform and explicit
    security and incident reporting
    requirements, potentially
    directly applicable to the
    relevant entities.
    Introduce more explicit
    reporting obligations
    concerning incidents, including
    towards ENISA.
    Introduce more explicit
    incident reporting
    requirements
    SPO4: Ensure that
    competent authorities
    enforce the rules laid
    Guidelines on
    supervision and
    Establish principles for
    application of supervisory
    measures and penalties,
    Establish principles, as well as
    a more granular list of
    minimum requirements, for
    59
    Specific policy
    objectives (SPO)
    Policy options
    Policy option 0 –
    maintaining the
    status quo
    Policy option 1 –
    non-legislative
    measures to align
    the transposition of
    the NIS Directive
    Policy option 2 – Limited
    changes to the current
    NIS Directive for further
    harmonization
    Policy option 3 – Systemic
    and structural changes to the
    NIS Directive (new directive)
    down by the legal
    instrument more
    effectively through
    aligned supervisory
    and enforcement
    measures
    enforcement including general
    conditions for the
    application of
    administrative fines.
    supervisory measures and
    enforcement, tailor-made for
    each category of entities,
    depending on the level of
    importance/criticality of the
    services provided.
    Establish general conditions
    for application of
    administrative fines and a
    minim level thereof.
    Establish a peer-review system,
    including on the
    implementation of supervisory
    measures and enforcement.
    Introducing liability rules for
    natural persons responsible for
    or acting as a representative of
    the legal person.
    60
    Specific policy
    objectives (SPO)
    Policy options
    Policy option 0 –
    maintaining the
    status quo
    Policy option 1 –
    non-legislative
    measures to align
    the transposition of
    the NIS Directive
    Policy option 2 – Limited
    changes to the current
    NIS Directive for further
    harmonization
    Policy option 3 – Systemic
    and structural changes to the
    NIS Directive (new directive)
    Guidelines on DSPs
    supervision
    Subject DSPs to the same
    rules as OES (i.e. remove
    the light-touch approach
    and introduce full
    supervision, including ex-
    ante, for DSPs).
    Subjecting entities (both
    operators and digital service
    providers) qualified under the
    same category (i.e. essential or
    important) to the same
    regulatory regime, including
    supervision and enforcement.
    Important entities would be
    subject to a light-touch
    regulatory regime (i.e. only ex-
    post supervision and lighter
    requirements on penalties).
    SPO5: Ensure a
    comparable level of
    resources across
    Member States
    allocated to
    competent authorities
    that would allow
    Incentivise Member
    States, via the
    Cooperation Group,
    and through peer
    pressure to
    adequately fund their
    competent
    Require Member States to
    take the necessary
    measures to ensure that the
    competent authorities have
    the technical, financial and
    human resources to fulfil
    their mandate, and in
    Set up a peer-review
    mechanism to assess, among
    others, the capabilities of the
    Member States.
    61
    Specific policy
    objectives (SPO)
    Policy options
    Policy option 0 –
    maintaining the
    status quo
    Policy option 1 –
    non-legislative
    measures to align
    the transposition of
    the NIS Directive
    Policy option 2 – Limited
    changes to the current
    NIS Directive for further
    harmonization
    Policy option 3 – Systemic
    and structural changes to the
    NIS Directive (new directive)
    them to fulfil the core
    tasks laid out by the
    NIS framework
    authorities and other
    relevant structures,
    such as the CSIRTs
    particular their supervisory
    and guiding roles
    SPO6: Ensure that
    essential information
    is exchanged between
    Member States by
    introducing clear
    obligations for
    competent authorities
    to share information
    and cooperate when it
    comes to cyber
    threats and incidents
    and by developing a
    Union joint
    operational crisis
    response capacity
    Continue existing
    work of the
    Cooperation Group
    and the CSIRTs
    network
    Further develop
    Standard Operational
    Procedures (SOPs)
    by the Cooperation
    Group and the
    CSIRTs network.
    Launching
    CyCLONe, without
    a set legal
    framework.
    Mandate or incentivize
    information sharing for
    competent authorities and
    companies (ISACs, PPPs).
    Set up specific mandatory
    mutual assistance and
    cooperation mechanism when
    cross-border elements are
    involved.
    Incentivise voluntary
    information sharing through
    ISACs and PPPs.
    As part of the national
    cybersecurity strategy,
    Member States will be required
    to develop a policy framework
    on co-ordinated vulnerability
    disclosure and designate a
    national CSIRT as a
    62
    Specific policy
    objectives (SPO)
    Policy options
    Policy option 0 –
    maintaining the
    status quo
    Policy option 1 –
    non-legislative
    measures to align
    the transposition of
    the NIS Directive
    Policy option 2 – Limited
    changes to the current
    NIS Directive for further
    harmonization
    Policy option 3 – Systemic
    and structural changes to the
    NIS Directive (new directive)
    coordinator and facilitator.
    Adding the role of observatory
    of the state of cybersecurity in
    the Union to ENISA.
    Introducing
    annual/biennial/regular reports
    on the state of cybersecurity in
    the EU.
    Introducing a crisis
    management framework, for
    both national and EU levels,
    including institutionalising
    CyCLONe.
    ANNEX 9: CROSS-SECTOR AND CROSS BORDER PROPAGATION OF INCIDENTS
    The 2017 WannaCry ransomware outbreak infected over 230,000 computers in 150
    countries on the first day alone27
    . The economic impact of the WannaCry incident is
    estimated in the order of hundreds of million euros with some cyber risk modelling
    analysts placing the losses in the order of billions. For more additional examples and
    arguments on cross sector and cross border propagation of incidents see annex 10.
    The SamSam ransomware attacks affected different organisations across sectors, the
    ransomware encrypts data and demand a huge ransom payment in Bitcoin in exchange for
    the decryption keys. SamSam has attacked different large organisations across sectors,
    including Transport (e.g. COSCO attack) and Health. As mentioned by the above-
    referenced ENISA good practices report, SamSam has earned its creator(s) more than 5
    million euros since late 2015, a figure that does not take into account revenue losses and
    system restore costs.
    The July 2020 JRC Report28
    also mentions the example of the 2007 coordinated cyber
    attacks on Estonia, which targeted governmental institutions and bodies, financial
    entities, telecommunication infrastructure and newspapers: ‘a surge of DDoS attacks
    lasting several weeks caused disruptions at institutional sites and in national online
    public services and communications, impacting the normal functioning of the national
    government and society (Schmidt, 2013). These attacks were not highly sophisticated
    and, due to their nature, did not create any lasting damage to Estonia’s digital
    infrastructure. However, they demonstrated how cyber attacks taking advantage of the
    digital transformation of governments and society could severely harm an entire country
    (Joubert, 2012)’.
    The chart below was drafted by ENISA in its good practices on the interdependencies
    between the OESs and DSPs to illustrate how cross sector and cross border propagation
    of incidents may occur.29
    ENISA, in its 2018 good practices, has also pointed to a number of increasing
    dependencies in certain sectors, such as in the example below concerning the transport
    sector.30
    27
    Department of health & Social Care (NHS) UK, 2018.
    28
    JRC, July 2020: Cybersecurity – Our Digital Anchor, a European perspective
    29
    Figure 3, page 12, https://www.enisa.europa.eu/publications/good-practices-on-interdependencies-
    between-oes-and-dsps
    64
    The JRC Report31
    highlights that ‘From big data to hyperconnectivity, from edge
    computing to the IoT, to artificial intelligence (AI), quantum computing and blockchain
    technologies, the ‘nitty-gritty’ details of cybersecurity implementation will always remain
    field-specific due to specific sectoral constraints. This brings with it inherent risks of a
    digital society with heterogeneous and inconsistent levels of security. To counteract this,
    we argue for a coherent, cross-sectoral and cross-societal cybersecurity strategy which
    can be implemented across all layers of European society.’
    Furthermore, ENISA’s 2018 good practices on interdependencies between OES and DSP
    looked, among others, into cross-border interdependencies, illustrating the types of
    cyberattacks with cross-border implications in the figure copied below.32
    Cross-border dependencies therefore pose particular challenges, and would require an
    effective cross-border cooperation and information sharing.
    30
    Figure 6, page 17, idem.
    31
    JRC, July 2020: Cybersecurity – Our Digital Anchor, a European perspective.
    32
    Figure 8, page 21.
    65
    ANNEX 10: EXTRACT FROM THE INTERIM RESULTS OF THE NIS REVIEW STUDY ON A
    MODELLING FOR COSTS AND BENEFITS
    Note: This is an estimation of costs and benefits which will be incorporated in the final
    report of the NIS review study33
    due in December 2020/January 2021. The estimation of
    costs and benefits follows Tool#59 of the EU Better Regulation Tool34
    .
    The main benefit for an intervention aiming to achieve a high level of cyber resilience is
    the reduction in cyber incidents compared to the baseline scenario35
    .
    𝐸 𝑖 𝑖 𝑖 𝑖 = 𝑅 𝑖 𝑖 𝑦 𝑖 𝑖
    = 𝑦 𝑖 𝑖 𝑖 𝑖
    − 𝑦 𝑖 𝑖 𝑖 𝑖 𝑖
    The monetary value of cyber incidents relies on different sources based on past incidents.
    A comprehensive dataset with cyber incident and economic impact is not available. As
    noted by the Hague report36
    , determining the overall impact of cyber attacks is
    challenging because there are different reports on cybercrime such as malware, social
    engineering and fraud to name a few, each source with different methodologies. The lack
    of a coherent and consistent methodology with standard indicators makes the task
    challenging. For example, there is abundant anecdotical data of incidents or estimations
    but varies by scope (sectors, countries, regions), and data by sector can varies
    remarkably.
    However, for the purpose of our estimation at societal level, we need evidence from
    Europe as a whole. The 2015 Ponemon Institute study on the costs of cybercrime
    provides the median annualized costs of cybercrime which amounts to USD 5.5 million
    (EUR 4.63 million).37
    Moreover, there were almost 450 cybersecurity incidents in
    2019 involving European critical infrastructures like health, finance and energy
    according to Eurostat38
    .
    Based on the median annualized cost of cyber incidents and the number of incidents per
    year, Figure 1.1 below displays a linear extrapolation of costs of cyber incidents
    followings four assumptions:
    Based on the average cost of cyber crime and the number of incidents per year, Figure
    1.1 below displays a linear extrapolation of costs of cyber incidents followings four
    assumptions:
    1. The annual growth rate of incidents in the baseline scenario follows annual
    rate of growth in the patterns of digitisation (3%);
    2. The annual fall of incidents in option 2 is a conservative 3%;
    33
    Study to support the review of Directive (EU) 2016/1148 concerning measures for a high common level
    of security of network and information systems across the Union (NIS Directive) – N° 2020-665.
    34
    https://ec.europa.eu/info/sites/info/files/file_import/better-regulation-toolbox-59_en_0.pdf
    35
    Note that as the cost in the baseline is higher than otherwise the difference gives a negative magnitude,
    but a negative cost is a benefit
    36
    https://www.thehaguesecuritydelta.com/media/com_hsd/report/191/document/qe-01-18-515-en-n.pdf
    37
    http://www.cnmeonline.com/myresources/hpe/docs/HPE_SIEM_Analyst_Report_-
    _2015_Cost_of_Cyber_Crime_Study_-_Global.pdf
    38
    https://ec.europa.eu/eurostat/documents/2995521/10335060/9-13012020-BP-EN.pdf/f1060f2b-b141-
    b250-7f51-85c9704a5a5f
    66
    3. The annual fall of incidents in option 3 is double compered to option 2,
    namely, 6%
    4. The average cost of a cyber incident stays the same in time;
    5. We set to 450 the number of incidents in 2018 according to Eurostat figures;
    Such assumptions are the most conservative.
    […]
    Figure 1.1 The costs of cyber-incidents across scenarios in EUR million (2018-
    2029)
    Source: own elaboration
    The expected benefit in option 2 and option 3 are given by the difference of the
    cost of cyber incidents compared to the baseline over the 10-years period.
    Figure 1.2 Saving in cyber incident per option compared to the baseline
    Source: own elaboration
    In sum, option 3 is the most impactful with a reduction in cost of cyber incidents by
    EUR 11.3 billion while option 2 by EUR 8.3 billion.
    67
    ANNEX 11: LIST OF INDICATORS TO MONITOR HIGH-LEVEL PROGRESS TOWARDS GENERAL OBJECTIVES
    General objectives Monitoring indicators Expected targets Source of data Frequency of data
    gathering
    Increase the level of cyber
    resilience of a
    comprehensive set of
    businesses operating in the
    European Union across all
    relevant sectors
    1. Comparable ICT security spending
    across sectors and Member States
    2. Results of random assessments at
    EU level of cybersecurity
    capabilities and implementation of
    cybersecurity policies of 2 key
    entities per Member State per NIS
    sector and types of service in at
    least five Member States (part of
    the State of Cybersecurity in the
    Union Report)
    3. Findings of peer-review mechanism
    visits as regards the level of NIS
    compliance and cybersecurity
    capabilities across the EU
    4. Overall set of indicators across the
    EU of the regular business
    resilience survey
    1. Sector-specific ICT
    security spending as
    a percentage of ICT
    spending across
    Member States
    deviating with less
    than 1% from the
    average sectorial
    security spending
    2. Positive findings on
    compliance with
    NIS requirements
    and level of
    capabilities (i.e.
    technical, financial
    and human) random
    sector or service-
    specific assessments
    of cybersecurity
    policies of key
    entities in at least
    five Member States
    3. Regular progress
    found by peer-
    1. ENISA data set
    based on
    outcomes of
    framework
    contract on
    investment on
    cybersecurity
    2. Data gathered
    for the report
    on the State of
    Cybersecurity
    in the Union
    (ENISA)
    3. Peer-review
    reports
    4. Annual cyber
    resilience
    business survey
    1. Annual
    2. Every two years
    3. Annual (different
    sets of Member
    States per year)
    4. Annual
    68
    General objectives Monitoring indicators Expected targets Source of data Frequency of data
    gathering
    reviews in the level
    of cybersecurity
    capabilities across
    the EU and rate of
    follow-up of
    experts’
    recommendations
    4. Cumulative positive
    trend at EU level on
    all indicators
    covered by the
    regular business
    resilience survey
    Reduce inconsistencies in
    the resilience across the
    internal market in the
    sectors already covered by
    the Directive
    1. ICT security spending per sector
    and type of service per Member
    State as a percentage of IT spending
    and revenues
    2. Results of comparative assessments
    per sectors and types of services per
    Member State of cybersecurity
    capabilities and compliance with the
    NIS framework (part of the State of
    Cybersecurity in the Union Report)
    3. Findings of peer-review mechanism
    visits as regards the level of NIS
    compliance and cybersecurity
    1. Even and steady ICT
    security spending
    per sector and type
    of service at
    Member State level
    correlated to the
    evolution of overall
    revenue/turnover in
    that sector/type of
    service per Member
    State
    2. Even and steady
    level of
    1. ENISA data set
    based on
    outcomes of
    framework
    contract on
    investment on
    cybersecurity
    2. Data gathered
    for the Report
    on the State of
    Cybersecurity
    in the Union
    (ENISA)
    1. Annual
    2. Every two years
    3. Annual (different
    sets of Member
    States per year)
    4. Annual
    69
    General objectives Monitoring indicators Expected targets Source of data Frequency of data
    gathering
    capabilities across the EU
    4. Comparative sets of indicators per
    Member State of the regular
    business resilience survey
    cybersecurity
    capabilities and NIS
    compliance in sector
    or service-specific
    assessments per
    Member State
    3. Regular progress at
    the level of each
    Member State found
    by peer-reviews
    3. Peer-review
    reports
    4. Annual cyber
    resilience
    business survey
    Improve the level of joint
    situational awareness and
    the collective capability to
    prepare and respond
    1. Regularity and comprehensiveness
    of threat assessments and state of
    cybersecurity in the union reporting
    2. Completeness of Member States
    notifications of relevant NIS data to
    the Commission and ENISA (e.g.
    incident notifications, discovered
    vulnerabilities, exchanges of
    information, instances when mutual
    assistance mechanism was applied,
    etc.)
    3. Number of time the mutual
    assistance mechanism was triggered
    in cross-border cases
    1. Accurate threat
    assessment and
    comprehensive State
    of Cybersecurity in
    the Union Report
    2. Complete
    Commission and
    ENISA databases on
    NIS relevant data
    3. Frequent use of
    mutual assistance
    mechanism in cross-
    border cases,
    including joint
    supervisory actions.
    ENISA and
    Commission
    reports
    Annual
    70
    ANNEX 12: LIST OF INDICATORS TO MONITOR PROGRESS TOWARDS SPECIFIC OBJECTIVES
    Specific Objectives Operational objectives Monitoring indicators Expected targets Source of data Frequency of data
    gathering
    SPO1: Ensure that
    entities in all sectors
    that are dependent on
    network and
    information systems
    and that provide key
    services to the economy
    and society as a whole
    are required to take
    cybersecurity measures
    and report incidents
    with a view to
    increasing the overall
    level of cyber resilience
    throughout the internal
    market
    Ensure awareness of all
    entities per sector/ service
    per Member State of
    inclusion of the NIS scope
    and corresponding
    requirements.
    Type and number of
    entities per
    sector/service per
    Member State for
    which supervisory
    measures were applied
    by Member States and
    notification obligations
    received.
    Entities from all sectors
    and services covered
    under NIS scope ware of
    their obligations and
    subjected to supervisory
    measures and reporting
    obligations.
    Notifications
    from Member
    States to the
    commission and
    ENISA
    Every two years
    SPO2: Ensure that all
    entities that are active
    in sectors covered by
    the NIS legal
    framework and that are
    similar in size/play
    comparable role in the
    market are subject to
    the same regulatory
    regime (are either
    1. Ensure that all similar
    entities from sectors and
    services under NIS
    scope and of medium
    and large size are
    subject to the same NIS
    requirements, tested by
    random checks/surveys
    2. Exceptions on the basis
    of scarce provision of
    1. Random
    surveys/checks on a
    representative
    sample of entities
    per Member State
    and per sector/type
    of service
    confirming that
    similar entities
    (type and size)
    1. Confirmed awareness
    and compliance
    check for a
    representative sample
    per Member State of
    entities falling under
    the NIS scope.
    2. Minimum 4 cases per
    year where an entity
    operating in more
    1. ENISA and
    Commission
    research and
    data based
    on Member
    States’
    notifications
    and targeted
    surveys
    2. Cyber
    Annual
    71
    Specific Objectives Operational objectives Monitoring indicators Expected targets Source of data Frequency of data
    gathering
    inside or outside the
    scope), no matter under
    which jurisdiction they
    fall within the EU
    service or potential
    impact on public health
    and safety clearly
    determined and checked
    randomly
    under the NIS scope
    are aware of the
    obligations under
    the NIS framework
    and/or subjected to
    supervisory
    measures by the
    competent
    authorities.
    2. Number and type of
    cases where an
    entity operating in
    more than one
    Member State was
    subject to similar
    supervisory
    measures or joint
    supervisory action
    than one Member
    State was subject to
    similar supervisory
    measures on all
    places of
    establishment in the
    EU or to joint
    supervisory action.
    resilience
    business
    survey
    SPO3: Ensure that all
    entities that are active
    in sectors covered by
    the NIS legal
    framework must follow
    aligned obligations
    based on the concept of
    risk management when
    it comes to security
    measures and must
    1. Ensure effective
    compliance with
    security requirements,
    including as regards
    supplier relationship
    assessment, including
    via effective supervisory
    action.
    2. Encourage/support
    stable investment in
    1. Number and
    quality/weight of
    elements provided
    by the NIS
    framework and
    included in the
    security measures at
    the level of entities
    operating in the
    sectors or providing
    1. Over 50% of
    businesses per
    sector/service under
    NIS scope respondent
    to the cyber resilience
    survey confirm an
    implementation of all
    elements provided by
    NIS for security
    measures, including
    1. Cyber
    resilience
    business
    survey
    2. Idem
    3. Member
    States
    notifications
    to the
    Commission.
    1-4 Annual
    5 – one-off, two
    years since the
    entry into force of
    the new NIS legal
    act
    72
    Specific Objectives Operational objectives Monitoring indicators Expected targets Source of data Frequency of data
    gathering
    report incidents based
    on a uniform set of
    criteria
    cybersecurity resources,
    including automated
    security tools at the
    level of organisations.
    3. Establish/reinforce the
    setting at the level of
    competent authorities to
    ensure incident
    notification following
    the NIS requirements on
    content, format and
    frequency, as well as
    voluntary reporting of
    near misses and
    vulnerabilities.
    4. Establish the
    notification channels
    and platforms for the
    submission of
    aggregated data on
    incidents and other
    notified events by the
    single the points of
    contact (SPOCs) to
    ENISA
    5. Establish and implement
    policies at Member
    States level for supply
    the services under
    the NIS scope.
    2. ICT security
    investment per
    sector/type of
    service across
    Member States,
    including
    investment in
    automated security
    tools.
    3. Number and type of
    incidents and other
    events per sector or
    type of service
    under NIS scope
    notified to the
    competent
    authorities and by
    the latter to the
    Commission.
    4. Completeness and
    quality of
    aggregated
    incident-related
    submitted by the
    SPOCs to ENISA
    5. Adopted policies on
    supplier relationship
    assessment.
    2. Over 60% of
    businesses per
    sector/service under
    NIS scope respondent
    to the cyber resilience
    survey confirm
    investments in
    automated security
    tools.
    3. All competent
    authorities report
    significant incidents
    to the Commission
    for over half of the
    essential sectors and
    services under NIS
    scope.
    4. Quality real-time
    aggregated data
    submitted by SPOCs
    of all Member States
    to ENISA.
    5. Supply chain policies
    implemented in each
    Member State
    4. SPOCs
    submissions
    to ENISA
    5. Member
    States’
    notifications
    in the
    Cooperation
    Group and
    peer reviews
    73
    Specific Objectives Operational objectives Monitoring indicators Expected targets Source of data Frequency of data
    gathering
    chain security supply chain
    security developed
    at Member States
    and modalities of
    implementation
    SPO4: Ensure that
    competent authorities
    enforce the rules laid
    down by the legal
    instrument more
    effectively through
    aligned supervisory
    and enforcement
    measures
    1. Ensure alignment of
    minimum requirements
    for supervisory action
    by the competent
    authorities for essential
    entities and effective
    application thereof.
    2. Provide for a minimum
    list of sanctions for non-
    compliance of essential
    entities with the NIS
    requirements and ensure
    effective application
    thereof.
    3. Provide for and apply
    administrative fines for
    non-compliance with
    NIS requirements of
    essential entities with a
    maximum as provided
    by the NIS legal act.
    1. Average number,
    average frequency,
    type and
    prioritisation
    criteria for
    supervisory actions
    conducted by
    competent
    authorities per
    Member State per
    sector/service under
    the NIS scope.
    2. Average number
    and type of
    sanctions, other
    than administrative
    fines, applied
    across sectors by
    competent
    authorities in each
    Member State.
    3. Number and level
    of administrative
    1. Consistent
    application at
    Member State level
    of supervisory action
    covering all
    sectors/services
    under NIS scope
    based on established
    prioritisation and
    randomisation
    criteria.
    2. Consistent
    application across
    Member States of
    sanctions other than
    administrative fines
    for non-compliance
    with NIS
    requirements.
    3. Enforcement of
    significant
    administrative fines
    for the most serious
    Member States
    notifications to
    the Commission
    or ENISA +
    cyber resilience
    business survey
    + results of
    peer-reviews.
    Every two years
    74
    Specific Objectives Operational objectives Monitoring indicators Expected targets Source of data Frequency of data
    gathering
    4. Ensure effective ex post
    supervision for
    important entities.
    fines applied in the
    Member States for
    non-compliance
    and type of
    violation for which
    they were enforced.
    4. Number and type of
    supervisory action
    applied to
    important entities
    from a
    representative
    sample of
    sectors/services
    under the NIS
    scope and their
    follow-up.
    breaches of the NIS
    requirements.
    4. Supervisory action
    applied ex post to a
    representative sample
    of important entities
    across Member
    States.
    SPO5: Ensure a
    comparable level of
    resources across
    Member States
    allocated to competent
    authorities that would
    allow them to fulfil the
    core tasks laid out by
    the NIS framework
    Ensure that cybersecurity
    policies are prioritised at
    political level in each
    Member State and that the
    competent authorities,
    CSIRTs, SPOCs and the
    crisis management
    designated authorities have
    adequate technical, human
    and financial resources to
    effectively fulfil the tasks
    Level of cybersecurity
    capabilities in each
    Member State reflected
    trough:
     capacity to conduct
    supervisory action
    covering all
    sectors/services
    under the NIS
    scope;
     provide support to
    High level of capabilities
    in at least the points
    enumerated under the
    ‘monitoring indicators’
     peer-review
     ENISA and
    Commission
    assessments
    continuous
    75
    Specific Objectives Operational objectives Monitoring indicators Expected targets Source of data Frequency of data
    gathering
    provided by the NIS
    framework
    businesses on
    cybersecurity
    measures and
    policies;
     enforce sanctions in
    case of non-
    compliance;
     develop effective
    and innovative
    policies in areas
    like supply chain
    security and
    coordinated
    vulnerability
    disclosure;
     investment in
    R&D;
     proactive
    participation in
    operational
    cooperation with
    other Member
    States, such as
    mutual assistance
    mechanisms, public
    private
    partnerships,
    participation in the
    76
    Specific Objectives Operational objectives Monitoring indicators Expected targets Source of data Frequency of data
    gathering
    CSIRTs network,
    etc.
    SPO6: Ensure that
    essential information is
    exchanged between
    Member States by
    introducing clear
    obligations for
    competent authorities
    to share information
    and cooperate when it
    comes to cyber threats
    and incidents and by
    developing a Union
    joint operational crisis
    response capacity
    1. Ensure effective
    operational exchanges
    among Member States’
    authorities.
    2. Ensure the setting up of
    coordinated
    vulnerability disclosure
    policies across Member
    States
    3. Incentivise the setting
    up of sector-specific
    and cross-sector ISACs
    with public authorities
    participation and other
    public private
    partnerships
    4. Set up a crisis
    management framework
    at national and EU
    levels and
    institutionalising of EU-
    CyCLONe
    1. Number of
    instances when the
    mutual assistance
    mechanism was
    triggered in cross-
    border cases and
    number of joint
    supervision actions.
    2. Number of
    coordinated
    vulnerability
    disclosure policies
    set up at the level
    of Member States,
    number of national
    CSIRTs designated
    as coordinators/
    facilitators +
    number of
    discovered
    vulnerabilities
    notified to ENISA.
    3. Number of
    operational ISACs
    and their outcomes;
    number of other
    1. Mutual assistance
    mechanism applied
    in a relevant number
    of cases and use of
    joint supervisory
    action.
    2. Coordinated
    vulnerability
    disclosure policies
    set up in all Member
    States, responsible
    CSIRTs designated
    and vulnerabilities
    discovered notified to
    ENISA.
    3. Steady increase
    across all Member
    States in number of
    sector-specific and
    cross-sector ISACs
    and other public-
    private partnerships.
    4. Crisis management
    frameworks in lace at
    national level and
    CyCLONe and
    Submissions of
    Member States
    and peer-review
    ENISA and
    Commission
    assessments
    1. Annual
    2. One-off: two
    years after the
    entry into force
    of new NIS
    framework for
    setting the
    policies and
    designation of
    CSIRT and
    annual
    monitoring of
    notifications of
    vulnerabilities
    discovered.
    3. Every two
    years
    4. One-off for the
    setting up of
    the
    frameworks:
    two years after
    the entry into
    force of the
    new NIS legal
    act and
    77
    Specific Objectives Operational objectives Monitoring indicators Expected targets Source of data Frequency of data
    gathering
    public private
    partnerships.
    4. Number of national
    authorities
    designated and
    procedures in place
    for crisis
    management
    national framework
    + extent of
    participation in
    CyCLONe
    dedicated
    Cooperation Group
    fully functional.
    continuous
    monitoring of
    operationally.