REGULATORY SCRUTINY BOARD OPINION Proposal for a Directive of the European Parliament and of the Council on measures for a high common level of cybersecurity across the Union, repealing Directive (EU) 2016/1148

Tilhører sager:

Aktører:


    1_EN_avis_impact_assessment_part1_v3.pdf

    https://www.ft.dk/samling/20201/kommissionsforslag/kom(2020)0823/forslag/1729191/2307171.pdf

    EUROPEAN COMMISSION
    Brussels, 20.11.2020
    SEC(2020) 430 final
    REGULATORY SCRUTINY BOARD OPINION
    Proposal for a Directive of the European Parliament and of the Council
    on measures for a high common level of cybersecurity across the Union,
    repealing Directive (EU) 2016/1148
    {COM(2020) 823 final}
    {SWD(2020) 344 final}
    {SWD(2020) 345 final}
    Europaudvalget 2020
    KOM (2020) 0823
    Offentligt
    ________________________________
    This opinion concerns a draft impact assessment which may differ from the final version.
    Commission européenne, B-1049 Bruxelles - Belgium. Office: BERL 08/010. E-mail: regulatory-scrutiny-board@ec.europa.eu
    EUROPEAN COMMISSION
    Regulatory Scrutiny Board
    Brussels,
    RSB
    Opinion
    Title: Impact assessment / Revision of the Network and Information Security Directive
    Overall opinion: POSITIVE WITH RESERVATIONS
    (A) Policy context
    The network and information security (NIS) Directive was the first internal market
    instrument on cybersecurity in the European Union. It aims to ensure continuity of
    essential services in key sectors. It focuses on threats to networks and information systems.
    New challenges have emerged since the adoption of the Directive in 2016. This concerns
    the rapid global digital transformation, in particular. The COVID-19 crisis also
    demonstrates the need for efficient digital solutions.
    The Directive requires the European Commission to review its functioning. This impact
    assessment includes an evaluation (back-to-back). The analysis investigates how to ensure
    cyber resilience in the internal market. It focuses in particular on entities that are vital to
    the economy and society.
    (B) Summary of findings
    The Board notes the useful additional information provided in advance of the
    meeting and commitments to make necessary changes to the report.
    However, the report still contains significant shortcomings. The Board gives a
    positive opinion with reservations because it expects the DG to rectify the following
    aspects:
    (1) The problem analysis does not sufficiently discuss how the enforcement has
    integrated cross-border spillovers in risk assessments of entities in key sectors.
    (2) The report does not explain what success would look like for the initiative.
    (3) The list of options and its justification is not exhaustive, especially regarding the
    sectoral coverage.
    (4) The impact analysis lacks depth, in particular regarding the costs assessment.
    Ref. Ares(2020)6968408 - 20/11/2020
    2
    (C) What to improve
    (1) The report should reinforce the problem analysis to better focus on the problems the
    Directive aims to solve. It should clarify the degree of success of the initiative to date, and
    to which extent progress is due to international standards. The report should discuss, in
    particular, what cross-border problems the initiative aims to reduce and to what extent the
    current arrangements contribute to this objective. It should analyse whether supervisors
    have been able to enforce the integration of spillovers of security threats in risk
    assessments of key sectors.
    (2) The report should explain what level of cybersecurity the revised Directive aims for. It
    should specify how the initiative will ensure that the right balance is struck between
    achieving a higher level of cyber security on the one hand and placing additional burdens
    on authorities and businesses on the other hand.
    (3) The report should better analyse and justify the sectoral coverage. It should review the
    robustness of the methodology for the selection of the additional sectors for important
    entities, and elaborate on the weight given to different criteria and components. In
    particular, it should justify why the substantive sector analysis in terms of digital intensity,
    level of interdependency and COVID-19 importance receive only little weight when
    compared to stakeholders’ views. This should be reflected in the explanation of the options
    design, including discarded options. The report should clarify the difference between the
    ‘essential’ and ‘important’ sectors, what criteria were used to establish those categories,
    and whether alternative approaches were possible. It should expand on whether the
    definition of sectoral coverage risks shifting the danger of exposure to other sectors. It
    should analyse how the choice of sectors can be made future proof.
    (4) The report should include a more complete set of options on reporting, supervision and
    crisis response. It should include ways to interact with the linked European critical
    infrastructure Directive, which is also under revision. It should identify possible alternative
    solutions and discuss the reasons for discarding some.
    (5) The report should strengthen the analysis of compliance costs, especially for medium-
    sized enterprises. It should provide quantitative estimates of total compliance costs under
    the preferred option for typical enterprises in the different sectors. It should analyse
    possible costs of the interaction with sectoral legislation under lex specialis, including from
    unclear provisions, multiple supervision levels or from divergences in national
    interpretation. The report should analyse the REFIT aspect, explaining how the initiative
    would endeavour to minimise regulatory burdens.
    (6) The report should clarify to what extent the consultation included stakeholders from all
    sectors that would be added to the scope of the Directive. It should systematically present
    possible diverging views from stakeholder groups.
    The Board notes the estimated costs and benefits of the preferred option in this initiative,
    as summarised in the attached quantification tables.
    Some more technical comments have been sent directly to the author DG.
    3
    (D) Conclusion
    The DG may proceed with the initiative.
    The DG must revise the report in accordance with the Board’s findings before
    launching the interservice consultation.
    If there are any changes in the choice or design of the preferred option in the final
    version of the report, the DG may need to further adjust the attached quantification
    tables to reflect this.
    Full title Review of the Directive (EU) 2016/1148 of 6 July 2016
    concerning measures for high level of security of network and
    information systems across the Union (‘the NIS Directive’)
    Reference number PLAN/2020/7447
    Submitted to RSB on 23 October 2020
    Date of RSB meeting 18 November 2020
    4
    ANNEX: Quantification tables extracted from the draft impact assessment report
    The following tables contain information on the costs and benefits of the initiative on which
    the Board has given its opinion, as presented above.
    If the draft report has been revised in line with the Board’s recommendations, the content of
    these tables may be different from those in the final version of the impact assessment report,
    as published by the Commission.
    I. Overview of Benefits (total for all provisions) – Preferred Option
    Description Amount Stakeholder group main recipient of
    the benefits
    Direct benefits
    Reduce administrative burden by
    discarding the identification
    process
     national authorities
     businesses
    More clarity and further
    harmonisation would allow more
    focus on core cybersecurity tasks
     national authorities
    Increase in compliance with
    security requirements
    n/a  businesses
     national authorities
    Decrease in cybercrime losses
    (medium/long term by
    implementing higher level of
    security requirements)
    Use of higher level of
    security requirements and in
    particular fully deployed
    security automation (e.g. use
    of advanced technology, AI,
    automated scanning tools,
    etc) help companies reduce
    the lifecycle of a breach by
    74 days compared to
    companies with no security
    automation deployment, from
    308 to 234 days.
     businesses
     citizens
    Decrease in security incidents and
    cybercrime losses
    Estimated reduction in cost
    of cyber incidents by EUR
    8.6 billion over a 10-year
    period
     businesses
     citizens
    Reduction in cost liability for
    breaches
    n/a  businesses
     citizens
    5
    Increase of trust of customers n/a  businesses
    Protection from unfair competition
    (e.g. by avoiding industrial
    espionage)
    n/a  businesses
    Increased and consistent level of
    resilience at the level of key
    businesses and cross-sector
    n/a  businesses
     national authorities
     citizens
    Improved situational awareness n/a  businesses
     national authorities
     citizens
    Increase in cybersecurity
    investments
    An average increase of ICT
    security spending per sector
    for the next three to four
    years ranging from about
    12% to 22% would lead to a
    proportionate benefit of such
    investments and even
    considerably exceed them for
    some sectors, notably
    considering that the average
    cost of a single data breach at
    the level of a sector was
    estimated at EUR 3.5 million
    in 2018, with an annual
    increase of about 6.4% to
    13% and lost business costs
    account for nearly 40% of the
    average total cost of a data
    breach, i.e. about 1.30
    million EUR.
     businesses
     national authorities
     citizens
    Increased operational capabilities n/a  national authorities
    Indirect benefits
    Improved personal data protection n/a  citizens
    ________________________________
    This opinion concerns a draft impact assessment which may differ from the final version.
    Commission européenne, B-1049 Bruxelles - Belgium. Office: BERL 08/010. E-mail: regulatory-scrutiny-board@ec.europa.eu
    II. Overview of costs – Preferred option
    Citizens/Consumers Businesses Administrations
    One-off Recurrent One-off Recurrent One-off Recurrent
    Action (a)
    Extension of the NIS
    scope (including adding a
    size cap)
    Direct costs
    n/a n/a Average 22% increase
    in ICT security spending
    for the new
    sectors/services added to
    the NIS scope in the next
    3-4 years.
    For the new sectors or
    services, an increase of
    about 25% of ICT
    spending could be
    expected for medium
    enterprises.
    Note: overall, in
    addition to the estimated
    increase in ICT
    spending triggered by
    the extension of the
    sectorial scope, an
    average 12% increase in
    ICT security spending is
    estimated for the
    sectors/services
    currently under the
    scope of the NIS
    Directive scope in the
    next 3-4 years. For
    Costs of
    implementation of
    higher security
    requirements and
    documented security
    measures
    Personnel and administrative
    costs leading to an overall
    increase of approx. 20-30% of
    resources of the relevant
    authorities per Member State at
    central level mainly needed for
    performing supervisory actions
    and interactions with industry
    (including sector-specific)
    Regular personnel and
    enforcement costs
    7
    medium enterprises, this
    estimate is of approx.
    15%. This increase
    concern the cumulative
    effect of all measures
    envisaged by the
    preferred option.
    Indirect costs n/a n/a n/a n/a n/a n/a
    Action (b)
    Discarding the
    identification process and
    putting all operators and
    digital service providers
    under an equal footing,
    while differentiating on
    importance/criticality
    grounds
    Direct costs
    n/a n/a Negligible personnel
    costs (notably legal
    departments), no
    additional FTE
    n/a n/a n/a
    Indirect costs n/a n/a n/a n/a n/a n/a
    Action (c)
    Further harmonising and
    streamlining risk
    management/security
    requirements
    Direct costs
    n/a n/a  Personnel (including
    potentially setting up
    new in-house teams):
    2 -4 extra FTEs
     Administrative costs
     Opportunity costs
     Potential increase in
    purchase costs on
    cybersecurity of +10-
    15%.
     Purchase costs
    (consultancy,
    audit, penetration
    tests, etc.)
    Approx. 20-30% increase in
    budget/expenses), same
    increase as triggered by
    supervisory and enforcement-
    related measures +
    administrative costs for the
    sector-specific decentralised
    models for the new
    sectors/services to be added to
    the NIS scope
    Recurrent personnel and
    technical costs (audits,
    testing, etc).
    8
    Indirect costs
    Potential slight
    increase in prices
    of products as a
    result of
    investment in
    cybersecurity
    technologies and
    measures
    n/a n/a n/a n/a n/a
    Action (d)
    Security elements
    concerning supplier
    relationships and
    supplier-specific risk
    assessment Direct costs
    n/a n/a  Personnel - in
    average 1 FTE
     Purchase costs
    (consultancy, audit)
     Opportunity costs
     Personnel and
    potential regular
    outsourcing for
    risk assessments
    (notably for
    SMEs):potential
    increase of 2-4%
    in recurrent
    purchase ICT
    security costs
     Part of the overall 20-30%
    increase in
    budget/expenses) trigged by
    the extended NIS scope,
    further harmonisation of
    security requirements and
    enhanced supervisory
    activities.
     1-2 FTEs (legal and
    technical background)
    Regular personnel costs
    Indirect costs
    Potential slight
    increase in prices
    of products as a
    result of
    investment in
    cybersecurity
    technologies and
    measures
    n/a n/a n/a n/a n/a
    Action (e)
    Streamlining incident
    Direct costs
    n/a n/a Personnel costs –
    potentially 1-2
    FTE/organisation
    Regular personnel
    costs
    Personnel costs (1-2 FTEs)and
    potential purchase of software
    (including for reporting
    Regular personnel
    costs)
    9
    notifications summary of incident reports to
    ENISA)
    Indirect costs n/a n/a n/a n/a n/a n/a
    Action (f)
    Reinforcing and further
    harmonising supervision
    and enforcement
    Direct costs
    Personnel
    (2FTE/organisation) and
    purchase costs (in
    particular for DSPs and
    SMEs)
    Regular personnel
    costs and potential
    increase in
    outsourcing, notably
    for audits (in
    particular for SMEs
    and DSPs) – overall
    additional 5% of
    recurrent purchase
    costs
    Part of the overall 20-30%
    increase in budget/expenses) +
    administrative costs for the
    sector-specific decentralised
    models for the new
    sectors/services to be added to
    the NIS scope + 1-2 additional
    FTEs per competent authority
    Personnel
    Purchase costs
    Administrative costs
    Indirect costs
    n/a n/a n/a n/a n/a n/a
    Action (g)
    Incentivising the increase
    in Member States
    resources for and
    prioritising of
    cybersecurity policies
    (e.g. peer review and
    mutual assistance
    Direct costs
    n/a n/a n/a n/a  For the mutual assistance
    mechanism: 2-3 FTEs per
    CSIRT team)
     For the peer-review:
    Personnel and costs
    triggered by operational
    activities – in average
    5,000 EUR per year per
    authority for peer-
    review missions –
    partially supported by
    the EU’s Digital Europe
    Programme
    10
    mechanism)
    Indirect costs
    n/a n/a n/a n/a n/a n/a
    Action (h)
    Strengthening
    cooperation and
    information sharing
    (including through
    ISACs with public
    authorities participation)
    Direct costs Personnel costs – 1 extra
    FTE/organisation
    More involvement in
    the public-private
    partnerships and
    ISACs – recurrent
    personnel costs
    (medium level)
    Personnel costs – 1-2 FTEs Regular personnel costs
    Indirect costs
    Action (i)
    Incentivising coordinated
    vulnerability disclosure
    Direct costs
    Negligible personnel
    costs (could, use existing
    FTEs who would
    monitor an additional
    input channel)
    Negligible personnel
    costs
     Part of the overall 20-30%
    increase in
    budget/expenses) trigged by
    the extended NIS scope,
    further harmonisation of
    security requirements and
    enhanced supervisory
    activities.
     Personnel (1/2 FTEs)
     Administrative costs
     In-house R&D
    Regular personnel and
    purchase/maintenance
    costs
    Indirect costs n/a n/a n/a n/a n/a n/a
    Action (j)
    Setting up a crisis
    management framework
    Direct costs n/a n/a n/a n/a Personnel: 3-4 FTEs/national
    authority and administrative
    costs
     Personnel
     Administrative costs
    (participation in
    11
    focused on operational
    cooperation
    exercises,
    operational
    exchange)
    Indirect costs n/a n/a n/a n/a n/a n/a
    (1) Estimates to be provided with respect to the baseline; (2) costs are provided for each identifiable action/obligation of the preferred option otherwise for all retained
    options when no preferred option is specified; (3) If relevant and available, please present information on costs according to the standard typology of costs (compliance
    costs, regulatory charges, hassle costs, administrative costs, enforcement costs, indirect costs; see section 6 of the attached guidance).
    Electronically signed on 20/11/2020 12:42 (UTC+01) in accordance with article 11 of Commission Decision C(2020) 4482