This ECSO publication provides a policy analysis of the proposed revision of the Cybersecurity Act and amendments to the NIS2 Directive. It highlights key priorities for strengthening the EU cybersecurity framework, including the need for harmonised baseline security requirements, proportionate implementation based on organisational size and risk, and improved coordination among Member States. Drawing on stakeholder consultations, the report offers recommendations to enhance legal clarity, reduce fragmentation, and support effective governance across the European cybersecurity landscape.
Compliance Standards
Access a wealth of resources including articles, whitepapers, tools, and guides to support your learning.
- Compliance Standards
Actions Beyond Words: Automating Audits for Streamlined Cybersecurity Compliance in Europe
- Published date:
- Author: ECSO (European Cyber Security Organisation)
This ECSO publication explores how the Open Security Controls Assessment Language (OSCAL) could support the automation and standardisation of cybersecurity compliance processes across Europe. Set against the growing complexity of EU cybersecurity legislation, it examines how machine-readable control frameworks and OSCAL-based governance, risk, and compliance tools can enable faster assessments, continuous monitoring, and more efficient audits. The document also outlines the conditions needed for broader adoption, including pilot testing, institutional support, and alignment across national authorities and supply chains.
- Compliance Standards
NIS2 Implementation – Challenges, Fragmentation and Readiness Across the EU
- Published date:
- Author: European Cyber Security Organisation
This white paper provides a comprehensive analysis of the current state of NIS2 implementation across EU Member States and affected organisations. Drawing on a Europe-wide survey of cybersecurity practitioners and sectoral case studies, it highlights fragmentation in national transpositions, inconsistencies in incident reporting timelines and classification approaches, and significant gaps in budget allocation and management engagement. The report offers actionable recommendations to support harmonised implementation and strengthen organisational readiness under the NIS2 Directive.
- Compliance Standards
European Cybersecurity Skills Framework (ECSF): Defining Roles, Skills, and Competencies Across the EU
- Published date:
- Author: European Union Agency for Cybersecurity (ENISA)
The European Cybersecurity Skills Framework (ECSF), developed by ENISA, is the EU’s official reference model for identifying and articulating cybersecurity professional roles and the skills, knowledge, and competencies they require. Featuring 12 role profiles, practical mappings to ESCO, NIS2, and AI domains, and a comprehensive user manual, the ECSF supports workforce planning, training design, skills attestation, and policy alignment. Widely adopted by public and private stakeholders, it underpins the Cybersecurity Skills Academy and contributes to closing the cybersecurity talent gap across the EU.
- Compliance Standards
Streamlining Regulatory Obligations: ECSO Action Plan for EU Cybersecurity Alignment (2025)
- Published date:
- Author: European Cyber Security Organisation (ECSO)
Published by the European Cyber Security Organisation (ECSO) in July 2025, this Action Plan offers a roadmap to harmonise cybersecurity regulatory requirements across the EU. Focusing on incident reporting, risk management, supply chain security, and audit practices, it presents actionable recommendations to improve cross-border coordination and reduce administrative burden—particularly for SMEs. Developed through stakeholder consultations, the plan supports a more resilient, efficient, and strategically autonomous cybersecurity environment in Europe.
- Compliance Standards
ENISA Technical Implementation Guidance for NIS2 Directive
- Published date:
- Author: European Union Agency for Cybersecurity (ENISA)
This ENISA report offers technical guidance to help entities in digital infrastructures, ICT service management, and digital provider sectors comply with the NIS2 Directive. It maps out the security requirements set by the EU Regulation (EU) 2024/2690, and provides practical advice, suggested evidence, and examples to assist organizations in implementing those requirements. It is specifically aimed at private sector entities and covers topics such as risk management, incident management, certification and standards, and skills & competences.
- Compliance Standards
Acceptable Use Policy (AUP) – Framework, Templates, Best Practices, and Common Pitfalls
- Published date:
- Author: ISO-Docs
This resource explores the development and implementation of an Acceptable Use Policy (AUP) aligned with the ISO/IEC 27001:2022 standard. It outlines the purpose, scope, acceptable and prohibited uses, user responsibilities, enforcement measures, and review procedures essential for integrating the AUP into an organization’s Information Security Management System (ISMS). The document highlights the benefits of a strong AUP, such as risk reduction, improved user accountability, regulatory compliance, and enhanced operational efficiency. It also identifies common drafting and implementation pitfalls to avoid and offers practical guidance on stakeholder involvement, training, communication, and policy maintenance. Importantly, the resource includes customizable templates to help organizations develop ISO-compliant AUPs efficiently and effectively. Ideal for IT managers, CISOs, compliance teams, and security professionals.
- Compliance Standards
Digital Operational Resilience Act (DORA) for the Financial Sector
- Published date:
- Author: European Parliament and Council of the EU
This EU Regulation, formally known as Regulation (EU) 2022/2554, enacts the Digital Operational Resilience Act (DORA)—a comprehensive legal framework designed to enhance the digital operational resilience of financial entities across the European Union. Published in the Official Journal on 27 December 2022 (OJ L 333), DORA introduces unified requirements for managing ICT-related risks, testing resilience, reporting major ICT disruptions, and overseeing third-party service providers within the financial sector. The regulation entered into effect on 17 January 2025 and applies directly across all EU Member States, harmonizing previously fragmented ICT risk regulations and strengthening the EU’s financial system against cyber threats and operational disruptions.
- Compliance Standards
State of Cybersecurity in the European Union: Comprehensive Assessment and Policy Recommendations
- Published date:
- Author: European Union Agency for Cybersecurity
This report presents an evidence-based overview of the current cybersecurity landscape and capabilities across the European Union. It serves as a foundational resource for EU policymakers by identifying key strengths and shortcomings in Member States’ cybersecurity readiness. In addition to assessing the state of play, the report offers strategic policy recommendations aimed at enhancing the EU’s overall cybersecurity posture and ensuring greater resilience across the Union.
- Compliance Standards
Enhancing Cybersecurity for SMEs: Challenges, Recommendations, and Actions
- Published date:
- Author: European Union Agency for Cybersecurity (ENISA)
This comprehensive report addresses the unique cybersecurity challenges faced by Small and Medium Enterprises (SMEs) in the European Union, particularly exacerbated by the COVID-19 pandemic. It offers an in-depth analysis of the current state of SMEs’ digital security and their preparedness for crises, based on extensive research including a two-month survey and targeted interviews. The findings reveal that SMEs are critically dependent on their ICT infrastructure yet often underestimate the cybersecurity risks involved. The report provides a tri-fold set of recommendations focused on people, processes, and technology to help SMEs enhance their cybersecurity posture. These include updates to software, strict access control, effective use of cloud services, and comprehensive cyber-incident planning. Additionally, the report offers guidance for national and European authorities on supporting SMEs in this vital area. A supplementary guide provides SMEs with 12 high-level steps to secure their systems and business effectively.