This proposal is part of the EU Security Union Strategy1 adopted by the Commission on 24 July 2020 and laying down its commitment to bring the European Union's added value to the national efforts in the area of security. Part of this engagement is the initiative to streamline the internal legal frameworks for information security in all Union institutions and bodies.
A key feature of the Strategic Agenda for 2019-2024 adopted by the European Council in June 2019 is to protect our societies from the ever evolving threats targeting the information handled by institutions and bodies. In its conclusions2, the European Council called in particular on ‘the EU institutions, together with the Member States, to work on measures to enhance the resilience and improve the security culture of the European Union against cyber and hybrid threats from outside the EU, and to better protect the EU’s information and communication networks, and its decision-making processes, from malicious activities of all kinds’.
In the same line, the General Affairs Council of December 20193 concluded that the EU institutions and bodies, supported by Member States, should develop and implement a comprehensive set of measures to ensure their security. This echoes a long standing request from the Council Security Committee to investigate a common core of security rules for the Council, the Commission and the European External Action Service4.
Currently, the Union institutions and bodies either have their own information security rules, based on their Rules of procedure or founding act, or they do not have information security rules at all. This is mostly the case of some small entities, which lack any formal information security policies.
Due to the ever-increasing amounts of sensitive non-classified and European Union classified information (‘EUCI’) that the Union institutions and bodies need to share between themselves and considering the dramatic development of the threat landscape, the European administration is exposed to attack in all its areas of activity. The information handled by our institutions and bodies is very attractive for the threat actors and needs to be appropriately protected. This requires swift action aiming at enhancing its protection.
相关报告
图解网络安全标准实践指南敏感个人信息识别指南(征求意见稿)V1.0.0
1285
类型:专题
上传时间:2024-06
标签:网络安全、敏感信息、个人信息)
语言:中文
金额:5积分
美中贸易全国委员会-美国公司如何接近中国的数据、隐私和网络安全制度(英)
1224
类型:专题
上传时间:2022-04
标签:中美、数据隐私、网络安全)
语言:英文
金额:5积分
汽车网络安全:应对挑战
894
类型:专题
上传时间:2021-07
标签:汽车、网络安全)
语言:英文
金额:5积分
网络安全和基础设施安全局(CISA)的国际战略
768
类型:专题
上传时间:2021-02
标签:网络安全、基础设施)
语言:英文
金额:5积分
网络安全报告 2020
663
类型:专题
上传时间:2020-08
标签:网络安全)
语言:英文
金额:5积分
2021年全球汽车网络安全报告(英)
659
类型:行研
上传时间:2021-01
标签:汽车、网络安全)
语言:英文
金额:5积分
2020年网络安全行业薪酬调查报告
632
类型:专题
上传时间:2020-08
标签:网络安全、薪酬)
语言:英文
金额:5积分
世界经济论坛:网络信息共享:建立集体安全(英)-2020.10
595
类型:专题
上传时间:2020-10
标签:网络信息、网络安全、信息共享)
语言:英文
金额:5积分
电子书-密码学与网络安全:原理与实践,全球版(英)
591
类型:电子书
上传时间:2021-10
标签:计算学、网络安全、密码学)
语言:英文
金额:5积分
《网络安全事件和漏洞响应手册》
533
类型:行研
上传时间:2021-11
标签:网络安全)
语言:英文
金额:5积分
积分充值
30积分
6.00元
90积分
18.00元
150+8积分
30.00元
340+20积分
68.00元
640+50积分
128.00元
990+70积分
198.00元
1640+140积分
328.00元
微信支付
余额支付
积分充值
应付金额:
0 元
请登录,再发表你的看法
登录/注册