Network Code on Cybersecurity

Digital symbolic picture

The EU Network Code on Cybersecurity (NCCS), EU 2024/1366, is the European framework for sector-specific cybersecurity requirements in the electricity sector. NCCS complements NIS2 for cross-border electricity operations with specific requirements. Each Member State must designate a national competent authority to identify, supervise, and enforce compliance among high- and critical-impact entities.

  1. Entities and scope
  2. Cybersecurity
  3. Incidents
  4. Supply chain
  5. Compliance

EU NCCS was adopted in the EU in March 2024 through the Commission Delegated Regulation (EU) 2024/1366, supplementing the existing EU regulation 2019/943 by establishing cybersecurity rules for cross-border electricity flows. While NCCS complements NIS2, there are areas where requirements are deeper than NIS2 with a different focus.

Note the NCCS is a complex topic still in flux throughout the EU. This content is a draft for discussion.

NCCS (EU 2024/1366)

Security in the Energy sector

The NCCS entered into force in May 2024 and is directly applicable across the EU. It sets binding cybersecurity rules for the electricity sector.

Although the NCCS is legally in force, its practical application depends on the national transposition of the NIS2 Directive. While Member States were obligated to transpose NIS2 into national law by 17 October 2024, this has not yet occurred in all jurisdictions.The NCCS builds on NIS2 by specifying sector-specific obligations and relies on key elements of NIS2 (e.g. designation of essential and important entities, the establishment of supervisory authorities, and risk management frameworks) that must exist in national law. As a result, full enforcement of the NCCS remains uneven across the EU until NIS2 is fully implemented.

Specifically, NCCS establishes binding sector-specific cybersecurity rules for the EU electricity sector. It mandates risk-based security measures, coordinated threat responses, and regulatory oversight across borders to enhance the resilience of critical energy infrastructure:

NCCS establishes a national and coordinated oversight structure for the EU electricity sector.

Like NIS2, NCCS relies on national competent authorities for enforcement. However, it explicitly mandates closer coordination between sectoral regulators, CSIRTs, and cybersecurity agencies to reflect the systemic and cross-border nature of electricity flows.

up

Obligations in NCCS

EU NCCS imposes a broad set of obligations on designated high-impact and critical-impact entities to strengthen cybersecurity across the electricity sector.

Obligation Article Requirement
Cybersecurity management 27‛29 Establishment of a CSMS (ISMS equivalent), risk-based asset scoping, and implementation of minimum and advanced security controls.
Supply chain security 33–35 Cybersecurity requirements in procurement processes and verification of supplier compliance using security-certified products or internal assurance.
Incident handling 32 Art. 38–41 Early warning obligations, mandatory reporting, and participation in coordinated response procedures.
Auditing and compliance 14 Competent authorities may conduct inspections, audits, documentation reviews, and technical security scans.
Monitoring and benchmarking 12–13 Participation in periodic benchmarking exercises to assess and compare cybersecurity maturity.

up

Scope

Energy entities

The Network Code on Cybersecurity (NCCS) applies only to entities that are formally designated as high-impact or critical-impact. Art. 24 This designation is carried out by national competent authorities, based on criteria such as the entity’s relevance for the security of cross-border electricity flows, the potential impact of a disruption, and other factors related to system stability.

NCCS lists several entity groups that fall under its scope if designated: Art. 2(1)

Art. 2(1), (3) NCCS
Electricity system operators
and market actors
Electricity undertakings (as per Directive (EU) 2019/944)
Transmission System Operators (TSOs)
Distribution System Operators (DSOs)
Nominated Electricity Market Operators (NEMOs)
Organised electricity market platforms (e.g. power exchanges)
Balancing responsible parties
Regional Coordination Centres (RCCs)
Operators of recharging points
Service and governance entities Critical ICT service providers
Managed Security Service Providers (MSSPs)
Delegated or assigned third-party operators
ENTSO-E (European Network of Transmission System Operators for Electricity)
EU DSO Entity (EU-level association of DSOs)
Third-country actors Any non-EU entity whose services affect EU cross-border electricity flows
— subject to designation by competent authorities Art. 3(3), 24(2)

While these entity types are listed in the NCCS, they are not automatically covered. Only those entities explicitly designated by national authorities fall under its binding cybersecurity obligations.

Entities under ECII

The classification of electricity sector entities as "high-" or "critical-impact" under the NCCS is based on their potential to disrupt cross-border electricity flows in the event of a cyber incident. Determination of criticality is made by national authorities using thresholds defined through ECII, Electricity Cybersecurity Impact Index. Art. 24

Classification based on ECII thresholds set by national authorities 24
Impact Level Definition Article
High-impact Disruption causes major impact on cross-border electricity flows 3(24), 19(3)
Critical-impact Disruption leads to critical interruption or destabilisation 3(7), 3(8)

up

NCSS and NIS2

Entities in both regulations

Several entities in the electricity sector are subject to both the NCCS and the NIS2 Directive. While NIS2 sets general cybersecurity obligations for essential and important entities, NCCS introduces sector-specific requirements for high- and critical-impact actors. In cases of overlap, Recital 15 clarifies that compliance with one regulation may serve as evidence of compliance with the other.

NCSS-specific obligations include a classification based on the Electricity Cybersecurity Impact Index (ECII) Art. 24, implementation of minimum and advanced cybersecurity controls, including supply chain measures Art. 29, 33 and the development of a sector-specific Cybersecurity Management System and a mapping matrix aligned with international standards .Art. 32, 34

DSOs, TSOs and ICT

NCCS complements and, in some areas, deepens NIS2 requirements, affecting primarily TSOs, DSOs, and ICT service providers that operate critical systems in the electricity sector. These fall under the scope of both NIS2 and the NCCS due to their essential role in cross-border electricity flows and their designation as high- or critical-impact entities under Art. 2(1) NCCS and Annex I of NIS2.

NCCS
entities
NIS2
entities
NCCS obligations NIS2 scope
Transmission System Operators (TSOs) Energy Sector-specific risk management, ECII classification, minimum and advanced cybersecurity controls “Essential entity” under Annex I (energy sector)
Distribution System Operators (DSOs) Energy Obligations tied to impact level Art. 24 implementation of CSMS and supply chain controls Covered if size and relevance thresholds are met
Electricity market operators, balancing service providers Energy Subject to NCCS if designated as high- or critical-impact Art. 2(1) May qualify as “important entities” under Annex II
Critical ICT service providers
(e.g. SCADA, EMS)
ICT in Energy Specific security controls including supply chain requirements Art. 33 Covered under NIS2 depending on criticality and service scope

up

ECII thresholds

Provisional ECII thresholds have been developed and published by ENTSO-E and the EU DSO Entity, allowing Member States to identify and notify candidate entities. Formal designations will follow once the final ECII is adopted on the basis of a Union-wide risk assessment.

Provisional ECII thresholds by Member State (ENTSO-E/EU DSO, July 2025); Applies to both entity- and process-level classification under Art. 24 NCCS
EU Member State High-impact threshold
for NCCS (through ECII)
Critical-impact threshold
for NCCS (through ECII)
Austria500 MW3,000 MW
Belgium1,500 MW3,000 MW
Bulgaria250 MW3,000 MW
Croatia250 MW3,000 MW
Cyprus250 MW800 MW
Czech Republic500 MW3,000 MW
Denmark1,000 MW3,000 MW
Estonia500 MW900 MW
Finland1,500 MW3,000 MW
France1,500 MW3,000 MW
Germany1,500 MW3,000 MW
Greece500 MW3,000 MW
Hungary500 MW3,000 MW
Ireland500 MW700 MW
Italy1,500 MW3,000 MW
Latvia500 MW900 MW
Lithuania500 MW900 MW
Luxembourg1,500 MW3,000 MW
Malta250 MW250 MW
Netherlands1,500 MW3,000 MW
Poland1,000 MW3,000 MW
Portugal250 MW3,000 MW
Romania1,000 MW3,000 MW
Slovakia500 MW3,000 MW
Slovenia1,000 MW3,000 MW
Spain1,000 MW3,000 MW
Sweden1,500 MW3,000 MW

up

Cybersecurity

Security in NCCS

The binding obligations introudced by the NCCS include risk-based security management, detailed reporting requirements, independent audits, and mandatory controls (many of which go beyond NIS2 in scope and specificity).

Designated entities must submit a comprehensive report to their national authority (e.g. BNetzA in Germany) within 12 months of classification. Art. 27

Critical-impact entities must demonstrate compliance with cybersecurity controls and management systems within 24 months via either national verification schemes or third-party audits. Art. 31 NCCS obligations may be recognised as equivalent to NIS2 compliance where applicable. Recital 15 Art. 17

Own compilation as of July 2025
* Applies indirectly to ICT providers via contractual obligations or participation in benchmarking
Requirement Energy entities ICT providers*
Security management Art. 28–34
Incident reporting Art. 27, 38–39
Supply chain Art. 18, 33 *
Audit and compliance Art. 25, 29, 31
Monitoring and benchmarking Art. 12, 13, 17 *

up

Cybersecurity Management System (CSMS)

All high-impact and critical-impact entities must implement a cybersecurity management system (CSMS) aligned with European and international standards. This system serves as the NCCS equivalent of an ISMS and forms the core of each entity’s risk mitigation obligations. Art. 28

According to Art. 18(1) of the NCCS, TSOs were required to develop harmonised cybersecurity risk assessment frameworks at Union, regional, and Member State level by 13 March 2025. These frameworks must account for risks such as supply chain corruption, legacy systems, cascading effects, and single supplier dependencies, and apply a common EU risk impact matrix to evaluate both impact and likelihood. Art. 18(2) Although many national authorities have not yet designated entities or initiated formal compliance processes, the obligation under Art. 18 remains binding.

This regulatory asymmetry (TSOs are expected to fulfil EU-level planning obligations in the absence of fully operational Member State processes) creates a gap that may require additional coordination between national and EU level. To support compliance with Art. 18, a supporting document was jointly published by ENTSO-E and the EU DSO Entity in 2025, providing background on the rationale, structure, and technical choices underlying the proposed risk assessment frameworks.

The responsibilities for cybersecurity risk assessments under Art. 19–21 and Art. 26 of the NCCS are divided across Union, regional, Member State, and entity level. The table below outlines who is responsible at each level, the legal basis, and how each assessment feeds into the broader regulatory framework.

Cybersecurity Risk Assessment Responsibilities on four levels under the NCCS
Assessment Responsible Article Risk Basis Role in NCCS Framework
Union-wide ENTSO-E
EU DSO Entity
19 Internal mapping of sectoral processes, impact metrics, ECII derivation Define Union-wide impact thresholds, ECII logic, and risk impact matrix; input to cybersecurity controls (Art. 29, 33)
Regional ENTSO-E
EU DSO Entity
21 Aggregated Member State assessments using common risk impact matrix Inform regional mitigation plans, cross-border risk reports, and procurement guidelines
Member State-level National Competent Authority (e.g. BSI) 20 Entity-level assessments; cyber threat and incident data (Art. 38) Contribute to regional aggregation; recommend additional controls; assess national implementation status
Entity-level Designated high-/critical-impact entity 26 Own risk environment using EU matrix and thresholds Feed into Member State report; guide CSMS implementation; report selected controls and risks

up

Security requirements

The NCCS defines detailed compliance obligations for high- and critical-impact entities. These include the implementation of technical controls, the setup of a cybersecurity management system, and structured risk management processes. Obligations follow a regular cycle and are aligned with thresholds and responsibilities. Art. 24–34

Entities must perform a structured risk management process every three years, consisting of context establishment, risk assessment, treatment, and acceptance. These processes must be based on a risk impact matrix developed at EU level and include supply chain and legacy system considerations. Art. 26

The selected risk mitigation controls must be reported to the competent authority within 12 months of designation and every three years thereafter. Compliance with the CSMS and associated controls must be demonstrated through independent audits or national verification schemes. Art. 27, 31

Compliance obligations under the NCCS
Obligation Description Article
Cybersecurity Management System (CSMS) Establish a CSMS as part of the common cybersecurity framework alongside minimum/advanced controls and control mapping 28(1)
Minimum and Advanced Controls Minimum controls apply to high-impact entities; advanced controls apply to critical-impact entities 28(2)(3)
Application of Controls Controls must be implemented within the entity's designated perimeter according to impact level 28(2)
Controls Development ENTSO-E and EU DSO Entity, in cooperation with TSOs, develop and update controls based on risk assessments 29(1)(2)
Integration into Risk Mitigation Plans Controls must be integrated into risk mitigation plans within 12 months of their approval or update 29(6)
Control Verification Options Compliance may be demonstrated via national verification scheme or third-party audit 29(3)
25(2)
Derogations Derogations may be granted under strict conditions due to disproportionate cost or alternative safeguards 30(1)(2)
Periodic Compliance Verification Critical-impact entities must verify and report compliance every three years, covering all critical assets 31(1)–(5)
Supply Chain Controls Minimum and advanced supply chain controls apply across the full ICT lifecycle (e.g. procurement, design) 33(1)(2)
Procurement Verification Critical-impact entities must verify compliance of critical ICT assets through certification or assurance 33(4)
Supply Chain Control Timeline Supply chain controls apply to procurement six months after their approval/update 33(5)
Control-Standards Mapping Controls are mapped against selected EU/international standards and updated via regional risk assessment 34(1)‑(3)
Risk Management Cycle Perform full cycle every three years: context, assessment, treatment, risk acceptance 26
Asset Inventory Maintain full inventory of ICT systems/assets; subject to inspection, not reporting 28(2)
Risk Assessment Report Submit triennial report with selected controls, risk levels, and list of critical ICT providers 27
Initial Compliance Demonstration Prove compliance within 24 months of designation via audit or verification scheme 25(1)‑(2)

up

Assets and impact

High-impact and critical-impact assets

NCCS defines a critical asset as any asset essential to the operation of the electricity system, including ICT systems, data, and services. Art. 3(2) At the entity level these form the foundation of cybersecurity risk management.

Within this category, NCCS distinguishes between high-impact and critical-impact assets based on the severity of potential disruption to cross-border electricity flows. The classifications are determined using electricity cybersecurity impact indices and thresholds. A high-impact asset is required for executing a high-impact process, defined as process exceeding the high-impact threshold. Art. 19(3)(b), 3(25), 3(26) These assets are located within a high-impact perimeter, which defines the area where minimum cybersecurity controls apply. Art. 3(27)

A critical-impact asset is necessary for a critical-impact process, where impact indices exceed the more stringent critical-impact threshold. Art. 2(4), 2(7) These assets are included in a critical-impact perimeter, which is subject to advanced cybersecurity controls. Art. 2(6) Entities identified as high-impact or critical-impact by national competent authorities must conduct full risk management for all assets within these perimeters every three years. This includes context establishment, risk assessment, treatment planning, and residual risk acceptance. Art. 26(2)

Asset classifications are based on the electricity cybersecurity impact indices and thresholds defined in Art. 19 and referenced in Art. 3. These thresholds determine whether a process qualifies as high-impact or critical-impact, guiding the identification of corresponding assets and the application of minimum or advanced cybersecurity controls.

Critical processes

Critical-impact processes are defined as business operations whose ECII scores exceed the critical threshold. Art. 2(7), 19(3), 24(1) They will be identified in the Union-wide cybersecurity risk assessment, which marks the first step of the NCCS risk cycle and functions as an EU-level business impact assessment. Art. 19

The supporting document by ENTSO-E and the EU DSO Entity provides methodological guidance for this step, including impact metrics related to frequency, voltage, generation capacity, and restoration capability (Annex I, Section 2.1). However, it does not establish a formal list of critical processes as this list will be adopted as part of the Union-wide cybersecurity risk assessment report mandated under. Art. 19(3)

According to the NCCS, the list of Union-wide critical-impact processes will serve as the basis for designating critical-impact entities Art. 24(1), defining the scope of entity-level risk assessments Art. 26(3)(a) and reporting estimated risk levels every three years Art. 27(2)). It also plays a role in crisis management planning Art. 41(9), and a provisional version may be issued to guide voluntary early compliance. Art. 48(4)

Implications for upstream suppliers

While the NCCS formally applies only to designated (high-impact and critical-impact) entities, its implications extend to upstream suppliers, including manufacturers of ICT components, software vendors, and service providers due to the aforementioned requirement for operators to implement comprehensive security measures across the full lifecycle of ICT products, services, and processes under Art. 33(2).

Responsibility for compliance with Art. 33 requirements lies with the operator, not the supplier. However, operators must contractually and procedurally translate NCCS obligations into their procurement and supplier management processes. Consequently, upstream suppliers may be required to meet de facto compliance expectations, such as providing technical assurances, undergoing security certifications, or disclosing development procedures even though they are not directly regulated under the NCCS.

This is particularly relevant for ICT components used in critical-impact processes, such as frequency control, restoration capabilities, or market coordination. In practice, the NCCS, much like NIS2, contributes to a systemic shift in cybersecurity accountability toward the supply chain, making regulatory compliance a shared concern across interconnected actors.

up

Incident reporting

EU NCCS aligns with the reporting obligations under Art. 23 EU NIS2 and introduces additional requirements for high-impact and critical-impact entities. Where a significant incident is reported under EU NIS2 (Art. 23) and the notification includes the relevant information required by the NCCS, this satisfies NCCS reporting obligations. Art. 38

Additionally, each high-impact and critical-impact entity must, within twelve months after its identification and then every three years, submit a report to the competent authorities. Art. 24(6) Art. 27

Reporting requirements

Incident notifications submitted under Art. 23 EU NIS2 are considered sufficient for NCCS purposes, provided they include all information required under Art. 27 and 38 of NCSS.

Beyond the incident reporting, each designated high- or critical-impact entity must submit a cybersecurity risk report to the competent authority. This report must contain:

The first risk report must be submitted within 12 months of the entity’s designation (by the national competent authority) and must be updated every three years thereafter. Art. 24(6), 27

up

Supply chain

NCCS requires high-impact and critical-impact entities to address ICT supply chain risks—such as component unavailability, supplier-initiated cyberattacks, or data leakage—within their cybersecurity risk assessments. Art. 18(2) Based on these assessments, binding minimum and advanced cybersecurity controls must be developed and implemented. Art. 33

Security in the supply chain

Minimum and advanced cybersecurity controls must be implemented across the entire lifecycle of ICT products, services, and processes. The supply chain controls are intended to mitigate risks identified in the Union-wide cybersecurity risk assessments and must be developed by the TSOs, with the assistance of ENTSO-E and in cooperation with the EU DSO Entity. Art. 33(1)

Minimum controls apply to both high-impact and critical-impact entities and must guide procurement:

Critical-impact entities are additionally required to verify that critical ICT components meet the defined cybersecurity specifications through either EU certification schemes or internal assurance measures, with sufficient depth to mitigate identified risks. Art. 33(4)

up

Compliance

Authorities

Each Member State is required to designate a National Competent Authority (NCCS‑NCA) responsible for overseeing high‑ and critical‑impact entities bound to the NCCS. The designation must occur no later than six months after the Regulation enters into force, with the authority’s name and contact details notified to the Commission, ACER, and the Electricity Coordination Group. Art. 5

National competent authorities are responsible for designating high-impact and critical-impact entities based on ECII criteria. Art. 24(1) This designation process begins once the EU-wide ECII thresholds are adopted. Member States may provisionally notify candidate entities based on provisional ECII thresholds published by ENTSO-E and the EU DSO Entity. Art. 48(3)

Supervision

NCCS obliges Member States to ensure that national competent authorities have comprehensive supervisory powers over high-impact and critical-impact entities in the electricity sector: on-site inspections and off-site supervision, random checks, regular or risk-based security audits, and targeted assessments. Entities must provide all necessary documentation, including cybersecurity policies, audit reports, and implementation evidence.

National authorities may establish a national verification scheme to verify compliance by critical-impact entities. This scheme may involve inspections, independent audits, or peer reviews, and must be supervised by the competent authority. All audits must follow strict procedural and expertise-related requirements to ensure independence, sectoral knowledge, and confidentiality. Art. 25

National authorities for NCCS may also establish a national verification scheme to assess compliance with minimum and advanced cybersecurity controls. Art. 33

Audits

Compliance with cybersecurity controls must be verified through regular audits, reviews or inspections.

Each high- or critical-impact entity must ensure that the entire verification scope is covered at least once every three years, with partial audits taking place annually. Art. 25(2) Entities can choose to demonstrate compliance either by participating in a national verification scheme or by undergoing an independent third-party audit. Art. 25(1), 25(2), 29(3), 31(2) Where a national verification scheme is used, the authority must report annually to ACER on the frequency of inspections conducted. Art. 25(3)

In addition, critical-impact entities are required to demonstrate compliance with the relevant cybersecurity controls within 24 months of their adoption or update. Art. 31(1)

up

EU Monitoring

EU ACER, the Agency for the Cooperation of Energy Regulators, is responsible for monitoring the implementation of the NCCS in cooperation with ENISA, ENTSO-E, and the EU DSO entity, and must publish a report at least every three years reviewing implementation status, identifying gaps, and recommending improvements. Art. 12(2) Entities must submit relevant data to ACER, which may issue guidance on the process and indicators used for monitoring. Art. 12(3,5,6)

NCCS obligates ACER, in cooperation with ENISA, to publish a non-binding cybersecurity benchmarking guide for NRAs by June 2025. Within 12 months, NRAs must assess whether cybersecurity investments are effective, efficient, and integrated into procurement processes. Art. 13(1, 2) Results are confidential but shared with competent authorities, ACER, ENISA, and the European Commission. Art. 13(5)

up

Further Information

Literature

  1. European System of Financial Supervision, European Central Bank, 2024.
  2. ESAs publish first set of rules under DORA for ICT and third-party risk management and incident classification, European Securities and Markets Authority, 17.01.2024.
  3. Cybersecurity benchmarking guide, EU ACER, 13 June 2025

Sources

  1. REGULATION (EU) 2022/2554 (DORA), on digital operational resilience for the financial sector, 14 December 2022