Search Legislation

Commission Implementing Regulation (EU) 2018/151Show full title

Commission Implementing Regulation (EU) 2018/151 of 30 January 2018 laying down rules for application of Directive (EU) 2016/1148 of the European Parliament and of the Council as regards further specification of the elements to be taken into account by RDSPs for managing the risks posed to the security of network and information systems and of the parameters for determining whether an incident has a substantial impact

 Help about what version

What Version

 Help about advanced features

Advanced Features

 Help about opening options

Opening Options

 Help about UK-EU Regulation

Legislation originating from the EU

When the UK left the EU, legislation.gov.uk published EU legislation that had been published by the EU up to IP completion day (31 December 2020 11.00 p.m.). On legislation.gov.uk, these items of legislation are kept up-to-date with any amendments made by the UK since then.

Close

This item of legislation originated from the EU

Legislation.gov.uk publishes the UK version. EUR-Lex publishes the EU version. The EU Exit Web Archive holds a snapshot of EUR-Lex’s version from IP completion day (31 December 2020 11.00 p.m.).

Changes to legislation:

There are currently no known outstanding effects for the Commission Implementing Regulation (EU) 2018/151. Help about Changes to Legislation

Close

Changes to Legislation

Revised legislation carried on this site may not be fully up to date. At the current time any known changes or effects made by subsequent legislation have been applied to the text of the legislation you are viewing by the editorial team. Please see ‘Frequently Asked Questions’ for details regarding the timescales for which new effects are identified and recorded on this site.

Commission Implementing Regulation (EU) 2018/151

of 30 January 2018

laying down rules for application of Directive (EU) 2016/1148 of the European Parliament and of the Council as regards further specification of the elements to be taken into account by [F1RDSPs] for managing the risks posed to the security of network and information systems and of the parameters for determining whether an incident has a substantial impact

THE EUROPEAN COMMISSION,

Having regard to the Treaty on the Functioning of the European Union,

Having regard to Directive (EU) 2016/1148 of the European Parliament and of the Council of 6 July 2016 concerning measures for a high common level of security of network and information systems across the Union(1), and in particular Article 16(8) thereof,

Whereas:

(1)In accordance with Directive (EU) 2016/1148, [F1RDSPs] remain free to take technical and organisational measures they consider appropriate and proportionate to manage the risk posed to the security of their network and information systems, as long as those measures ensure an appropriate level of security and take into account the elements provided for in that Directive.

(2)When identifying the appropriate and proportionate technical and organisational measures, the [F2RDSP] should approach information security in a systematic way, using a risk-based approach.

(3)In order to ensure the security of systems and facilities, [F1RDSPs] should perform assessment and analysis procedures. These activities should concern the systematic management of network and information systems, the physical and environmental security, the security of supplies and the access controls.

(4)When carrying out a risk analysis within the systematic management of network and information systems, [F1RDSPs] should be encouraged to identify specific risks and quantify their significance, for example by identifying threats to critical assets and how they may affect the operations, and determining how best to mitigate those threats based on current capabilities and resource requirements.

(5)Policies on human resources could refer to the management of skills, including aspects related to the development of security related skills and awareness-raising. When deciding on an appropriate set of policies on security of operation, the [F1RDSPs] should be encouraged to take into account aspects of change management, vulnerability management, formalisation of operating and administrative practices and system mapping.

(6)Policies on security architecture could comprise in particular the segregation of networks and systems as well as specific security measures for critical operations such as administration operations. The segregation of networks and systems could enable a [F2RDSP] to distinguish between elements such as data flows and computing resources that belong to a client, group of clients, the [F2RDSP] or third parties.

(7)The measures taken with regard to the physical and environmental security should ensure the security of an organisation's network and information systems from damage caused by incidents such as theft, fire, flood or other weather effects, telecommunications or power failures.

(8)The security of supplies such as electrical power, fuel or cooling could encompass the security of the supply chain that includes in particular the security of third party contractors and subcontractors and their management. The traceability of critical supplies refers to the ability of the [F2RDSP] to identify and record sources of those supplies.

(9)The users of digital services should encompass natural and legal persons who are customers of or are subscribers to an online marketplace or a cloud computing service, or who are visitors to an online search engine website in order to undertake keyword searches.

(10)When defining the substantiality of the impact of an incident, the cases laid down in this regulation should be considered as a non-exhaustive list of substantial incidents. Lessons should be drawn from the implementation of this Regulation and from the work of the Cooperation Group as regards the collection of best practice information on risks and incidents and the discussions on modalities for reporting notifications of incidents as referred to in points (i) and (m) of Article 11(3) of Directive (EU) 2016/1148. The result could be comprehensive guidelines on quantitative thresholds of notification parameters that may trigger the notification obligation for [F1RDSPs] under Article 16(3) of Directive (EU) 2016/1148. Where appropriate, the Commission could also consider reviewing the thresholds currently laid down in this Regulation.

(11)In order to enable competent authorities to be informed about potential new risks, the [F1RDSPs] should be encouraged to voluntarily report any incident whose characteristics have been previously unknown to them such as new exploits, attack-vectors or threat actor, vulnerabilities and hazards.

(12)This Regulation should apply on the day following the expiry of the deadline for transposition of Directive (EU) 2016/1148.

(13)The measures provided for in this Regulation are in accordance with the opinion of the Network and Information Systems Security Committee referred to Article 22 of Directive (EU) 2016/1148,

HAS ADOPTED THIS REGULATION:

Article 1U.K.Subject matter

This Regulation specifies further the elements to be taken into account by [F1RDSPs] when identifying and taking measures to ensure a level of security of network and information systems which they use in the context of offering services referred to in Annex III to Directive (EU) 2016/1148 and specifies further the parameters to be taken into account to determine whether an incident has a substantial impact on the provision of those services.

[F3Article 1AU.K.Interpretation

In this Regulation—

  • NIS Regulations” means the Network and Information Systems Regulations 2018;

  • RDSP” has the same meaning as in the NIS Regulations.]

Article 2U.K.Security elements

1.Security of systems and facilities referred to in [F4regulation 12(2)(c)(i) of the NIS Regulations] means the security of network and information systems and of their physical environment and shall include the following elements:

(a)the systematic management of network and information systems, which means a mapping of information systems and the establishment of a set of appropriate policies on managing information security, including risk analysis, human resources, security of operations, security architecture, secure data and system life cycle management and where applicable, encryption and its management;

(b)physical and environmental security, which means the availability of a set of measures to protect the security of [F1RDSPs]' network and information systems from damage using an all-hazards risk-based approach, addressing for instance system failure, human error, malicious action or natural phenomena;

(c)the security of supplies, which means the establishment and maintenance of appropriate policies in order to ensure the accessibility and where applicable the traceability of critical supplies used in the provision of the services;

(d)the access controls to network and information systems, which means the availability of a set of measures to ensure that the physical and logical access to network and information systems, including administrative security of network and information systems, is authorised and restricted based on business and security requirements.

2.With regard to incident handling referred to in [F5regulation 12(2)(c)(ii) of the NIS Regulations], the measures taken by the [F2RDSP] shall include:

(a)detection processes and procedures maintained and tested to ensure timely and adequate awareness of anomalous events;

(b)processes and policies on reporting incidents and identifying weaknesses and vulnerabilities in their information systems;

(c)a response in accordance with established procedures and reporting the results of the measure taken;

(d)an assessment of the incident's severity, documenting knowledge from incident analysis and collection of relevant information which may serve as evidence and support a continuous improvement process.

3.Business continuity management referred to in [F6regulation 12(2)(c)(iii) of the NIS Regulations] means the capability of an organisation to maintain or as appropriate restore the delivery of services at acceptable predefined levels following a disruptive incident and shall include:

(a)the establishment and the use of contingency plans based on a business impact analysis for ensuring the continuity of the services provided by [F1RDSPs] which shall be assessed and tested on a regular basis for example, through exercises;

(b)disaster recovery capabilities which shall be assessed and tested on a regular basis for example, through exercises.

4.The monitoring, auditing and testing referred to in [F7regulation 12(2)(c)(iv) of the NIS Regulations] shall include the establishment and maintenance of policies on:

(a)the conducting of a planned sequence of observations or measurements to assess whether network and information systems are operating as intended;

(b)inspection and verification to check whether a standard or set of guidelines is being followed, records are accurate, and efficiency and effectiveness targets are being met;

(c)a process intended to reveal flaws in the security mechanisms of a network and information system that protect data and maintain functionality as intended. Such process shall include technical processes and personnel involved in the operation flow.

5.International standards referred to in [F8regulation 12(2)(c)(v) of the NIS Regulations] mean standards that are adopted by an international standardisation body as referred to in point (a) of Article 2(1) of Regulation (EU) No 1025/2012 of the European Parliament and of the Council(2). [F9United Kingdom, European and internationally accepted standards and specifications relevant to the security of network and information systems may also be used.]

6.[F1RDSPs] shall ensure that they have adequate documentation available to enable the competent authority to verify compliance with the security elements set out in paragraphs 1, 2, 3, 4 and 5.

Textual Amendments

Article 3U.K.Parameters to be taken into account to determine whether the impact of an incident is substantial

1.With regard to the number of users affected by an incident, in particular users relying on the service for the provision of their own services referred to in [F10regulation 12(7)(a)(i) of the NIS Regulations], the [F2RDSP] shall be in a position to estimate either of the following:

(a)the number of affected natural and legal persons with whom a contract for the provision of the service has been concluded; or

(b)the number of affected users having used the service based in particular on previous traffic data.

2.The duration of an incident referred to in [F11regulation 12(7)(a)(ii) of the NIS Regulations] means the time period from the disruption of the proper provision of the service in terms of availability, authenticity, integrity or confidentiality until the time of recovery.

3.As far as the geographical spread with regard to the area affected by the incident referred to in [F12regulation 12(7)(a)(iii) of the NIS Regulations] is concerned, the [F2RDSP] shall be in a position to identify whether the incident affects the provision of its services in specific [F13areas of the United Kingdom].

4.The extent of disruption of the functioning of the service referred to in [F14regulation 12(7)(a)(iv) of the NIS Regulations] shall be measured as regards one or more of the following characteristics impaired by an incident: the availability, authenticity, integrity or confidentiality of data or related services.

5.With regard to the extent of the impact on economic and societal activities referred to in [F15regulation 12(7)(a)(v) of the NIS Regulations], the [F2RDSP] shall be able to conclude, based on indications such as the nature of his contractual relations with the customer or, where appropriate, the potential number of affected users, whether the incident has caused significant material or non-material losses for the users such as in relation to health, safety or damage to property.

6.For the purpose of paragraph 1, 2, 3, 4 and 5, the [F1RDSPs] shall not be required to collect additional information to which they do not have access.

Textual Amendments

F16Article 4U.K.Substantial impact of an incident

. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Article 5U.K.Entry into force

1.This Regulation shall enter into force on the twentieth day following that of its publication in the Official Journal of the European Union.

2.It shall apply from 10 May 2018.

F17...

Done at Brussels, 30 January 2018.

For the Commission

The President

Jean-Claude Juncker

(2)

Regulation (EU) No 1025/2012 of the European Parliament and of the Council of 25 October 2012 on European standardisation, amending Council Directives 89/686/EEC and 93/15/EEC and Directives 94/9/EC, 94/25/EC, 95/16/EC, 97/23/EC, 98/34/EC, 2004/22/EC, 2007/23/EC, 2009/23/EC and 2009/105/EC of the European Parliament and of the Council and repealing Council Decision 87/95/EEC and Decision No 1673/2006/EC of the European Parliament and of the Council (OJ L 316, 14.11.2012, p. 12).

Back to top

Options/Help

Print Options

Close

Legislation is available in different versions:

Latest Available (revised):The latest available updated version of the legislation incorporating changes made by subsequent legislation and applied by our editorial team. Changes we have not yet applied to the text, can be found in the ‘Changes to Legislation’ area.

Original (As adopted by EU): The original version of the legislation as it stood when it was first adopted in the EU. No changes have been applied to the text.

Close

See additional information alongside the content

Geographical Extent: Indicates the geographical area that this provision applies to. For further information see ‘Frequently Asked Questions’.

Show Timeline of Changes: See how this legislation has or could change over time. Turning this feature on will show extra navigation options to go to these specific points in time. Return to the latest available version by using the controls above in the What Version box.

Close

Opening Options

Different options to open legislation in order to view more content on screen at once

Close

More Resources

Access essential accompanying documents and information for this legislation item from this tab. Dependent on the legislation item being viewed this may include:

  • the original print PDF of the as adopted version that was used for the EU Official Journal
  • lists of changes made by and/or affecting this legislation item
  • all formats of all associated documents
  • correction slips
  • links to related legislation and further information resources
Close

Timeline of Changes

This timeline shows the different versions taken from EUR-Lex before exit day and during the implementation period as well as any subsequent versions created after the implementation period as a result of changes made by UK legislation.

The dates for the EU versions are taken from the document dates on EUR-Lex and may not always coincide with when the changes came into force for the document.

For any versions created after the implementation period as a result of changes made by UK legislation the date will coincide with the earliest date on which the change (e.g an insertion, a repeal or a substitution) that was applied came into force. For further information see our guide to revised legislation on Understanding Legislation.

Close

More Resources

Use this menu to access essential accompanying documents and information for this legislation item. Dependent on the legislation item being viewed this may include:

  • the original print PDF of the as adopted version that was used for the print copy
  • correction slips

Click 'View More' or select 'More Resources' tab for additional information including:

  • lists of changes made by and/or affecting this legislation item
  • confers power and blanket amendment details
  • all formats of all associated documents
  • links to related legislation and further information resources