EU High-level Cyber Threat and Risk Taxonomy Overview
This comprehensive high-level taxonomy explores various risks EU policy makers have considered in their recent legislative work. Each section details associated threats, legislative requirements, and practical measures and standards to address these risks effectively.
Brief Introduction
NIS2 Directive
The NIS2 Directive aims to achieve a high common level of cybersecurity across the European Union by expanding the scope of cybersecurity rules to new sectors and entities. It mandates that essential and important entities implement appropriate technical, operational, and organizational measures to manage risks to the security of network and information systems. Additionally, it requires incident reporting to relevant national authorities and ensures continuous operation and resilience of critical infrastructures.
Digital Operational Resilience Act (DORA)
The Digital Operational Resilience Act aims to strengthen the IT security of financial entities such as banks, insurance companies, and investment firms. It sets uniform requirements for the security of network and information systems, ensuring that financial entities can withstand, respond to, and recover from ICT-related disruptions and threats. DORA mandates regular risk assessments, robust incident response plans, and compliance of third-party ICT service providers with stringent cybersecurity standards.
Critical Entities Resilience Directive (CER)
The Critical Entities Resilience Directive focuses on enhancing the resilience of critical infrastructure sectors against a range of threats, including natural hazards, terrorism, and insider threats. It requires Member States to adopt national strategies for enhancing the resilience of critical entities, conduct regular risk assessments, and implement resilience-enhancing measures. CER also mandates cooperation with national authorities and other critical entities to improve overall sector resilience.
Cyber Resilience Act (CRA)
The Cyber Resilience Act aims to safeguard consumers and businesses by ensuring that products with digital elements meet high cybersecurity standards throughout their lifecycle. It addresses the inadequate level of cybersecurity in many products and the inability of consumers to determine which products are cybersecure. CRA mandates vulnerability assessments, timely updates and patches, and harmonized rules for bringing products with digital components to market, ensuring cybersecurity throughout the product lifecycle.
General Data Protection Regulation 2 (GDPR2)
The General Data Protection Regulation 2 builds upon the original GDPR framework to further enhance the protection of personal data within the European Union. It introduces stricter data protection measures, including more stringent requirements for data processing, reporting obligations, and higher penalties for non-compliance. GDPR2 aims to ensure that personal data is processed transparently, securely, and with respect for individuals' privacy rights.
Network and Information Systems (NIS) Risks
Malware and Ransomware Attacks
Legislative Requirements:
NIS2 and DORA requirements are aimed at managing risks from malware and ransomware by enforcing technical and organizational measures and regular assessments.
Measures and Standards:
Phishing and Social Engineering
Legislative Requirements:
NIS2 and CER focus on resilience and operational continuity, which are critical in mitigating risks from phishing and social engineering.
Measures and Standards:
Denial of Service (DoS) Attacks
Legislative Requirements:
NIS2's incident reporting and DORA's third-party compliance requirements are relevant for managing DoS attacks.
Measures and Standards:
Data Security Risks
Data Breaches
Legislative Requirements:
NIS2, CRA, and GDPR2 focus on data protection and security, aligning with mitigating data breach risks.
Measures and Standards:
Data Loss
Legislative Requirements:
CER, NIS2, and GDPR2's focus on risk assessments and incident reporting are aimed at preventing data loss.
Measures and Standards:
Data Integrity
Legislative Requirements:
CRA, DORA, and GDPR2's requirements for vulnerability assessments and resilience testing address data integrity risks.
Measures and Standards:
Physical Security Risks aka Facility Security
Unauthorized Access
Legislative Requirements:
CER and NIS2's emphasis on physical security measures are appropriate for managing unauthorized access threats.
Measures and Standards:
Theft and Vandalism
Legislative Requirements:
CER's resilience plans and NIS2's governance requirements are relevant for addressing theft and vandalism.
Measures and Standards:
Natural Disasters
Legislative Requirements:
CER and NIS2's risk assessments and resilience measures are aimed at mitigating natural disaster risks.
Measures and Standards:
Personnel Security Risks
Insider Threats
Legislative Requirements:
NIS2 and CER's focus on governance and mitigation measures are relevant for managing insider threats.
Measures and Standards:
Employee Safety
Legislative Requirements:
CER and NIS2's requirements for employee safety measures are appropriate for addressing personnel security risks.
Measures and Standards:
Operational Resilience Risks, aka Business Continuity
Operational Disruptions
Legislative Requirements:
NIS2 and CER's focus on continuity and resilience plans are relevant for managing operational disruptions.
Measures and Standards:
Supply Chain Disruptions
Legislative Requirements:
DORA and CER's requirements for third-party compliance and collaboration are aimed at managing supply chain disruptions.
领英推荐
Measures and Standards:
System Failures
Legislative Requirements:
NIS2 and DORA's focus on risk management and resilience testing are relevant for addressing system failures.
Measures and Standards:
Incident Response Risks
Incident Detection and Response
Legislative Requirements:
NIS2 and DORA's requirements for incident reporting and response plans are appropriate for managing incident detection and response.
Measures and Standards:
Crisis Management
Legislative Requirements:
CER and NIS2's focus on crisis management strategies and preparedness are relevant for addressing crisis management risks.
Measures and Standards:
Regulatory Compliance Risks
Non-Compliance Penalties
Legislative Requirements:
NIS2, CRA, and GDPR2's requirements for compliance and standards are aimed at avoiding non-compliance penalties.
Measures and Standards:
Audit and Reporting Requirements
Legislative Requirements:
NIS2, DORA, and GDPR2's focus on maintaining records and conducting audits are relevant for addressing audit and reporting requirements.
Measures and Standards:
Third-Party Compliance Risks
Vendor and Supplier Risks
Legislative Requirements:
DORA and CER's requirements for third-party compliance and collaboration are aimed at managing vendor and supplier risks.
Measures and Standards:
Contractual Obligations
Legislative Requirements:
NIS2 and DORA's focus on contractual agreements and compliance monitoring are relevant for addressing contractual obligations.
Measures and Standards:
Product and Technology Risks
Vulnerability Exploitation
Legislative Requirements:
CRA and NIS2's requirements for vulnerability assessments and protection measures are aimed at mitigating vulnerability exploitation.
Measures and Standards:
Patch Management
Legislative Requirements:
CRA and DORA's focus on timely updates and patch management are relevant for addressing patch management risks.
Measures and Standards:
Outdated Technology
Legislative Requirements:
NIS2 and CRA's requirements for technological adaptation and maintenance are aimed at mitigating risks from outdated technology.
NIS2: Ensure continuous adaptation to new technological advancements.
CRA: Maintain up-to-date technology to meet cybersecurity standards.
Measures and Standards:
Innovation and Adaptation
Legislative Requirements:
NIS2 and CRA's focus on innovation and adaptation are relevant for addressing risks from technological advancements.
Measures and Standards:
Data Privacy Risks
Unauthorized Data Access
Legislative Requirements:
GDPR2's requirements for data protection measures are appropriate for managing unauthorized data access threats.
Measures and Standards:
Data Misuse
Legislative Requirements:
GDPR2's requirements for data protection principles are relevant for addressing data misuse.
Measures and Standards:
Non-Compliance with Data Subject Rights
Legislative Requirements:
GDPR2's requirements for data subject rights are appropriate for managing non-compliance risks.
Measures and Standards:
Added GDPR2 and short intro to each legislation