Skip to main content
Energy

Critical infrastructure and cybersecurity

Cybersecurity and challenges related to it are evolving at a rapid pace and the Commission is taking a series of measures to protect critical energy infrastructure, in particular against cyberattacks.

Traditional energy technologies are becoming progressively more connected to modern, digital technologies and networks. This increasing digitalisation of the energy system makes it smarter and enables consumers to better benefit from innovative energy services.

At the same time, digitalisation creates significant risks as an increased exposure to cyberattacks and cybersecurity incidents potentially jeopardises the security of energy supply and the privacy of consumer data.

Key among the Commission actions is the establishment of a comprehensive legislative framework that builds on

Cybersecurity in the energy sector

The far-reaching EU Security Union Strategy, presented in July 2020, aims to ensure European security in both the physical and the digital world in all parts of society. Acknowledging the need for sector specific initiatives, particularly in the energy sector, the strategy outlines an upcoming initiative to make critical energy infrastructure more resilient against physical, cyber and hybrid threats. This will ensure a level playing field for energy operators across borders.

Although there is a comprehensive overall legal framework for cybersecurity, the energy sector presents certain particularities that require particular attention:

Real-time requirements

Some energy systems need to react so fast that standard security measures, such as authentication of a command, or verification of a digital signature, can simply not be introduced due to the delay these measures impose.

Cascading effects

Electricity grids and gas pipelines are strongly interconnected across Europe and well beyond the EU. An outage in one country might trigger blackouts or shortages of supply in other areas and countries.

Combined legacy systems with new technologies

Many elements of the energy system were designed and built well before cybersecurity considerations came into play. This legacy now needs to interact with the most recent state-of-the-art equipment for automation and control, such as smart meters or connected appliances, and devices from the 'Internet of Things' without being exposed to cyber-threats.

Tackling cybersecurity challenges

To increase awareness and preparedness in the energy sector, the Commission adopted sector-specific guidance in April 2019. This guidance, presented in a Recommendation and a staff working document, helps implement horizontal cybersecurity rules.

Moreover, the Clean energy for all Europeans package, adopted in 2019, will help transform Europe’s energy systems, while also maintaining a high level of security, not least in terms of reinforcing cybersecurity of the digital transformation in the energy sector.

Outside the scope of the package, the Regulation on gas security of supply (EU/2017/1938) also includes provisions to consider cybersecurity, as part of EU countries’ national risk assessments.

The Commission also works with the European Energy–Information Sharing Analysis Centre (EE-ISAC), which helps utilities improve the cybersecurity and resilience of their grid by enabling trust-based data and information for sharing.

Network code on cybersecurity

While the horizontal cybersecurity framework provides a solid basis, specific characteristics of the energy sector such as the need for fast reaction, risks of cascading effects and the need to combine new digital technology with older technologies necessitate specific legislation.

The network code aims to establish a recurrent process of cybersecurity risk assessments in the electricity sector. The assessments will aim to systematically identify the entities that perform digitalised processes with a critical or high impact on cross-border electricity flows, their cybersecurity risks and the necessary mitigating measures that need to be implemented.

It establishes a governance model to develop, follow and regularly review the methodologies used by stakeholders to promote a harmonised approach in the rapidly evolving knowledge field.

The network code follows an extensive development period with contributions from ENTSO-EEU DSO Entity and ACER and in-depth consultations with the relevant stakeholders including the NIS Cooperation Group, which exchanges best practices between EU countries on identification, mitigation and management of cyber risks.

The European Parliament and Council have 2 months to object to the Commission’s delegated act, which can only be published in the Official Journal following this period.