<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="de">
	<id>https://wiki.atlaws.eu/index.php?action=history&amp;feed=atom&amp;title=Cyber_Solidarity_Act%2Fen</id>
	<title>Cyber Solidarity Act/en - Versionsgeschichte</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.atlaws.eu/index.php?action=history&amp;feed=atom&amp;title=Cyber_Solidarity_Act%2Fen"/>
	<link rel="alternate" type="text/html" href="https://wiki.atlaws.eu/index.php?title=Cyber_Solidarity_Act/en&amp;action=history"/>
	<updated>2026-05-01T05:50:49Z</updated>
	<subtitle>Versionsgeschichte dieser Seite in RI Wiki</subtitle>
	<generator>MediaWiki 1.43.6</generator>
	<entry>
		<id>https://wiki.atlaws.eu/index.php?title=Cyber_Solidarity_Act/en&amp;diff=3925&amp;oldid=prev</id>
		<title>Jhospes: Die Seite wurde neu angelegt: „=== CSA ===“</title>
		<link rel="alternate" type="text/html" href="https://wiki.atlaws.eu/index.php?title=Cyber_Solidarity_Act/en&amp;diff=3925&amp;oldid=prev"/>
		<updated>2025-06-03T13:27:02Z</updated>

		<summary type="html">&lt;p&gt;Die Seite wurde neu angelegt: „=== CSA ===“&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Neue Seite&lt;/b&gt;&lt;/p&gt;&lt;div&gt;&amp;lt;languages/&amp;gt;&lt;br /&gt;
{{Infobox Rechtsakt (EU)|Typ=Verordnung|Jahr=2025|Nummer=38|Vertrag=EU|EWR=ja|Titel=Verordnung (EU) 2025/38 des Europäischen Parlaments und des Rates vom 19. Dezember 2024 über Maßnahmen zur Stärkung der Solidarität und der Kapazitäten in der Union für die Erkennung von, Vorsorge für und Bewältigung von Cyberbedrohungen und Sicherheitsvorfällen und zur Änderung der Verordnung (EU) 2021/694|Kurztitel=Cyber Solidarity Act|Bezeichnung=|Rechtsmaterie=Binnenmarkt, Cybersicherheit|Grundlage=AEUV, insbesondere {{Art.|173|AEUV|dejure|}}&lt;br /&gt;
 Para 3 and {{Art.|322|TFEU|dejure|}} Para 1 lit a|Reference=OJ L 2025/38, 1|Applicable=February 4, 2025|Valid=applicable}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;Einführung&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
Regulation (EU) 2025/38 (Cyber Solidarity Act)&amp;lt;ref&amp;gt;https://eur-lex.europa.eu/eli/reg/2025/38/oj&amp;lt;/ref&amp;gt; is an EU initiative to detect, prepare for, and respond to significant and large-scale cybersecurity threats and attacks. The Act includes a European Cybersecurity Warning System, consisting of interconnected Security Operations Centers across the EU, and a comprehensive Cybersecurity Emergency Mechanism to improve the EU&amp;#039;s cyber resilience.&amp;lt;ref&amp;gt;European Commission: The EU Cyber Solidarity Act https://digital-strategy.ec.europa.eu/en/policies/cyber-solidarity 08.08.2024&amp;lt;/ref&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;Anwendungsbereich&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
== Scope of Application ==&lt;br /&gt;
&lt;br /&gt;
The Cyber Solidarity Act refers to Art. 6 Para 38 NIS II Directive (Art. 2 Para 4. CSA) as well as activities of entities in Annex I or II of the NIS2-RL, which are designated as critical or highly critical sectors. (Art. 2 Para 5. CSA)&lt;br /&gt;
&lt;br /&gt;
A general reference to Art 3 NIS II-RL is not present, which means that the size-independent scope of application of the NIS2 II-RL is not covered in the basic concept. However, with regard to the use of support from the EU Cybersecurity Reserve, entities are mentioned again in Art. 14 Para 2 CSA. This systematically creates the legally questionable impression that the entities of Art. 3 NIS-II-RL are only covered by the CSA within this narrow framework and, for example, are not intended to participate in the Cybersecurity Shield.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;Zentrale_Inhalte&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
== Core Content ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;Europäischer_Cybersicherheitsschild&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
=== European Cyber Shield ===&lt;br /&gt;
&lt;br /&gt;
The European Cyber Shield consists of a pan-European infrastructure of National Security Operations Centers (National SOCs) and Cross-border Security Operations Centers (Cross-border SOCs). The SOCs are interconnected and form an EU-wide cybersecurity infrastructure.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;Funktionsweise&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
==== Functionality ====&lt;br /&gt;
&lt;br /&gt;
The European Cyber Shield operates as follows (Art 3 CSA):&lt;br /&gt;
&lt;br /&gt;
Detection of cyber threats and incidents by the networked SOCs&lt;br /&gt;
 Analysis of collected data using AI and data analytics&lt;br /&gt;
 Issuance of cross-border warnings for identified threats&lt;br /&gt;
 Enabling faster and more efficient response to major cyber incidents by authorities and relevant entities&lt;br /&gt;
Obligations for data provision by entities or regulations of the relationship with the provisions of the GDPR are not recognizable. The decision of several institutions to share data on cyber threats is voluntary and trust-based. If Member States wish to benefit from the system, they must make the institutions concerned in this context as attractive as possible.&lt;br /&gt;
&lt;br /&gt;
Obligations for data provision by entities or regulations of the relationship with the provisions of the GDPR are not recognizable. The decision of several institutions to share data on cyber threats is voluntary and trust-based. If Member States wish to benefit from the system, they must make the institutions concerned in this context as attractive as possible.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;Prüfung_kritischer_Einrichtungen_auf_potenzielle_Schwachstellen&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
=== Assessment of Critical Entities for Potential Vulnerabilities ===&lt;br /&gt;
&lt;br /&gt;
The coordinated readiness tests serve to identify potential vulnerabilities in critical infrastructures that could make them susceptible to cyber threats. The tests are conducted in a coordinated manner to assess the cybersecurity readiness of the selected entities. According to Art. 2 Para 9. in conjunction with Art 11 CSA, potential vulnerabilities are identified, responsiveness to cyber threats is tested, and potential for improvement is examined. Since no obligations for entities to cooperate are stipulated, participation in the tests by the tested entities is likely to be voluntary.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;Synergien&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
== Synergies ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;Risikomanagement_in_der_Cybersicherheit&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
===== Cybersecurity Risk Management =====&lt;br /&gt;
&lt;br /&gt;
=== CSA ===&lt;br /&gt;
&lt;br /&gt;
 Strengthens the EU&amp;#039;s ability to respond to major cyberattacks by promoting a network of national and cross-border Security Operations Centers (SOCs) and strengthening cooperation in cyber crises. Through the planned network of SOCs, threat data should be exchanged in real-time.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;NIS2-RL&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
=== NIS2-D ===&lt;br /&gt;
&lt;br /&gt;
 Requires organizations in critical sectors to implement robust cybersecurity measures to increase resilience against cyber threats.&lt;br /&gt;
&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;Synergy&amp;#039;&amp;#039;&amp;#039;&lt;br /&gt;
 The strengthened security infrastructure (e.g., through SOCs) supports companies and public institutions in better complying with the standards required under NIS-II RL, especially through early threat detection and information exchange.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;Konsequenzen/Strafen&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
== Consequences/Penalties ==&lt;br /&gt;
&lt;br /&gt;
The CSA contains no sanction mechanisms.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;Weiterführende_Literatur&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
== Further Reading ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;Einzelnachweise&amp;quot;&amp;gt;&amp;lt;/span&amp;gt;&lt;br /&gt;
== Sources ==&lt;/div&gt;</summary>
		<author><name>Jhospes</name></author>
	</entry>
</feed>