Eu Cybersecurity Index
Eu Cybersecurity Index
CYBERSECURITY
INDEX
Framework and methodological note
MARCH 2024
0
EU CYBERSECURITY INDEX
1.0 | TLP: WHITE | March 2024
ABOUT ENISA
The European Union Agency for Cybersecurity, ENISA, is the Union’s agency dedicated to achieving a high common
level of cybersecurity across Europe. Established in 2004 and strengthened by the EU Cybersecurity Act, the
European Union Agency for Cybersecurity contributes to EU cyber policy, enhances the trustworthiness of ICT
products, services and processes with cybersecurity certification schemes, cooperates with Member States and EU
bodies, and helps Europe prepare for the cyber challenges of tomorrow. Through knowledge sharing, capacity
building and awareness raising, the Agency works together with its key stakeholders to strengthen trust in the
connected economy, to boost resilience of the Union’s infrastructure, and, ultimately, to keep Europe’s society and
citizens digitally secure. More information about ENISA and its work can be found here: www.enisa.europa.eu.
CONTACT
For contacting the authors, please use [email protected]
For media enquiries about this paper, please use [email protected].
AUTHORS
ENISA
LEGAL NOTICE
This publication represents the views and interpretations of ENISA, unless stated otherwise. It does not endorse a
regulatory obligation of ENISA or of ENISA bodies pursuant to the Regulation (EU) No 2019/881.
ENISA has the right to alter, update or remove the publication or any of its contents. It is intended for information
purposes only and it must be accessible free of charge. All references to it or its use as a whole or partially must
contain ENISA as its source.
Third-party sources are quoted as appropriate. ENISA is not responsible or liable for the content of the external
sources including external websites referenced in this publication.
Neither ENISA nor any person acting on its behalf is responsible for the use that might be made of the information
contained in this publication.
COPYRIGHT NOTICE
© European Union Agency for Cybersecurity (ENISA), 2024
This publication is licenced under CC-BY 4.0 “Unless otherwise noted, the reuse of this document is authorised under
the Creative Commons Attribution 4.0 International (CC BY 4.0) licence
https://creativecommons.org/licenses/by/4.0/). This means that reuse is allowed, provided that appropriate credit is
given and any changes are indicated”.
For any use or reproduction of photos or other material that is not under the ENISA copyright, permission must be
sought directly from the copyright holders.
1
EU CYBERSECURITY INDEX
1.0 | TLP: WHITE | March 2024
TABLE OF CONTENTS
1. EU CYBERSECURITY INDEX 3
1.1 OVERVIEW 3
1.2 SCOPE 4
2. EU CSI STRUCTURE 5
3. METHODOLOGY 16
3.5 WEIGHTS 17
2
EU CYBERSECURITY INDEX
1.0 | TLP: WHITE | March 2024
1. EU CYBERSECURITY INDEX
1.1 OVERVIEW
Cybersecurity Act (Article 1(1), Article 3(1), Article 4(5), Recitals 6 and 15) notes that ENISA’s mandate and
objectives are towards achieving a “high common level of cybersecurity across the Union” and supporting the
European Union (EU) and Member States (MS) to “increase their cybersecurity capabilities”. An understanding of the
current state of cybersecurity maturity across MS is essential for ENISA to reach these objectives. Continuous and
consistent monitoring of the cybersecurity levels across the EU and its MS over time would encourage the
reinforcement of their respective cybersecurity capabilities and improvement of the resilience of the overall EU cyber
ecosystem.
The EU Cybersecurity Index (EU CSI) is a tool to describe the cybersecurity posture of MS and the EU, which:
• Gives insights on the cybersecurity maturity and capabilities on individual countries and the EU.
• Helps identifying opportunities for peer-learning and improvement.
• Making the most of available data, information and knowledge on cybersecurity across the EU.
• Enables to evaluate their progress towards higher levels of cybersecurity vis-à-vis index indicators.
The index is comprised by 84 qualitative and quantitative indicators structured into 4 areas (policy, operations,
capacity and market/industry) and 16 sub-areas/sub-domains. In addition, each sub-area is assigned a weight. Out of
the 84 indicators, 60 are collected at MS level and aggregated at EU level, while 24 are EU-wide indicators. Key
indicators may be statistical data, an assessment result, or an index (recursive) and may contribute to measure
multiple subareas eventually after weighting.
The framework is applied to each EU Member State by calculating aggregated values (from 0 to 100) corresponding
to a MS’s cybersecurity posture for each area, sub-area, as well as an overall value. More specifically, each subarea
value is a weighted arithmetic mean of all indicators affecting it. Each area value is also a weighted arithmetic mean
of all subareas affecting it. The overall index is an arithmetic mean sum of all areas.
3
EU CYBERSECURITY INDEX
1.0 | TLP: WHITE | March 2024
1.2 SCOPE
This document serves as the methodological note describing the purpose, structure and properties of the EU CSI and
aims to provide a relevant overview for public consultation and feedback. The EU CSI was developed according to
the guidelines and recommendations in the OECD/JRC’s ‘Handbook on constructing composite indicators:
methodology and user guide’1. The data included in the EU CSI were mostly collected from the relevant authorities of
the Member States by ENISA and from ad hoc studies launched by the ENISA and European Commission.
1
Nardo M, Saisana M, Saltelli A, Tarantola S, Hoffmann A, Giovannini E. Handbook on Constructing Composite Indicators: Methodology and User
Guide. Paris (France): OECD publishing; 2008. JRC47008
http://www.oecd.org/els/soc/handbookonconstructingcompositeindicatorsmethodologyanduserguide.htm
4
EU CYBERSECURITY INDEX
1.0 | TLP: WHITE | March 2024
2. EU CSI STRUCTURE
Eurostat Data collected and verified by the national statistical offices or by Eurostat.
https://ec.europa.eu/eurostat/data/database
Data collected by Eurobarometer, the polling instrument used by the European Commission,
the European Parliament and other EU institutions and agencies to monitor regularly the
Eurobarometer state of public opinion in Europe on issues related to the European Union as well as
attitudes on subjects of political or social nature.
https://europa.eu/eurobarometer/screen/home
Council of Data collected by the Council of Europe in regards to Treaty No. 185
Europe
https://www.coe.int/en/web/conventions/full-list?module=treaty-detail&treatynum=185
ISO Data collected and verified by ISO via the Survey of Management System Certifications.
(International The providers of the data are the certification bodies accredited by the IAF (International
Organisation for Accreditation Forum) MLA (Multilateral Recognition Arrangement) members.
Standardization)
https://isotc.iso.org/livelink/livelink?func=ll&objId=21897526&objAction=browse&viewType=1
https://www.enisa.europa.eu/
Shodan Data collected via dedicated queries on the Shodan search engine.
https://www.shodan.io/
European Data collected by European Commission Directorate-General for Research and Innovation
Commission – via the Horizon Dashboard.
Horizon
Dashboard https://ec.europa.eu/info/funding-tenders/opportunities/portal/screen/opportunities/horizon-
dashboard
5
EU CYBERSECURITY INDEX
1.0 | TLP: WHITE | March 2024
Capacity 13
Cyber hygiene 4
Citizens: privacy and protection of personal data 1
Citizens: secure internet use 1
Large enterprises: ICT security measures 1
SMEs: ICT security measures 1
Cybersecurity awareness 4
Citizens: Knowledge of cybersecurity matters 1
Large enterprises: Staff Awareness 1
SMEs: Cybersecurity training 1
SMEs: Staff Awareness 1
Cybersecurity skills and education 5
Cybersecurity graduates in higher education 1
Cybersecurity exercises at national and international level 1
EU R&D funding 1
National level cybersecurity trainings 1
Tools and training to fight cybercrime 1
Market/Industry 14
Cybersecurity governance within organisations 4
Enterprises: ICT security policy 1
Enterprises: risk assessment 1
Organisations certified with relevant ISO standards 1
Supply chain management by essential/ important entities 1
Cybersecurity investments and innovation 4
Cybersecurity investments by essential/important entities 1
Enterprises buying security software applications as a cloud computing
service 1
Enterprises using AI technologies for ICT security 1
SMEs: EU R&D funding 1
Large enterprises: Impact of cybersecurity incidents 3
Large enterprises: Security Incidents - Destruction or corruption of data 1
Large enterprises: Security Incidents - Disclosure of confidential data 1
Large enterprises: Security Incidents - Unavailability of ICT Services 1
SMEs: Impact of cybersecurity incidents 3
SMEs: Security Incidents - Destruction or corruption of data 1
SMEs: Security Incidents - Disclosure of confidential data 1
SMEs: Security Incidents - Unavailability of ICT Services 1
Operations 18
National-level response preparedness 4
CSIRT(s) certification 1
Dedicated cybercrime establishment within law enforcement and
prosecution offices 1
6
EU CYBERSECURITY INDEX
1.0 | TLP: WHITE | March 2024
7
EU CYBERSECURITY INDEX
1.0 | TLP: WHITE | March 2024
Citizens: secure internet % of Internet users who changed the way they use Eurobarometer
use the internet due to security concerns
Large enterprises: ICT % of large enterprises using at least one of the Eurostat
security measures following ICT security measures:
8
EU CYBERSECURITY INDEX
1.0 | TLP: WHITE | March 2024
SMEs: Staff Awareness % of SMEs that make persons employed aware of Eurostat
their obligations in ICT security related issues
2
https://www.enisa.europa.eu/publications/national-capabilities-assessment-framework
9
EU CYBERSECURITY INDEX
1.0 | TLP: WHITE | March 2024
EU R&D funding Share of EU R&D funding awarded per country for EC Horizon Dashboard
cybersecurity topics
Tools and training to fight Scoring based on adapted NCAF maturity levels, MS Survey
cybercrime objective 12 "Address cybercrime"
SMEs: EU R&D funding Share of EU R&D funding awarded to private EC Horizon Dashboard
SMEs for Horizon Europe calls related to
cybersecurity
10
EU CYBERSECURITY INDEX
1.0 | TLP: WHITE | March 2024
Large enterprises: Security % of Large enterprises that did not experience ICT Eurostat
Incidents - Destruction or security related incidents leading to: destruction or
corruption of data corruption of data (e.g. due to infection of
malicious software or unauthorised intrusion,
hardware or software failures)
Large enterprises: Security % of Large enterprises that did not experience ICT Eurostat
Incidents - Disclosure of security related incidents leading to: disclosure of
confidential data confidential data (e.g. due to intrusion, pharming,
phishing attack, actions by own employees
(intentionally or unintentionally)
Large enterprises: Security % of Large enterprises that did not experience ICT Eurostat
Incidents - Unavailability security related incidents leading to: unavailability
of ICT Services of ICT services (e.g. Denial of Service attacks,
ransomware attacks, hardware or software
failures)
SMEs: Security Incidents - % of SMEs that did not experience ICT security Eurostat
Destruction or corruption related incidents leading to: destruction or
of data corruption of data (e.g. due to infection of
malicious software or unauthorised intrusion,
hardware or software failures)
SMEs: Security Incidents - % of SMEs that did not experience ICT security Eurostat
Disclosure of confidential related incidents leading to: disclosure of
data confidential data (e.g. due to intrusion, pharming,
phishing attack, actions by own employees
(intentionally or unintentionally)
SMEs: Security Incidents - % of SMEs that did not experience ICT security Eurostat
Unavailability of ICT related incidents leading to: unavailability of ICT
Services services (e.g. Denial of Service attacks,
ransomware attacks, hardware or software
failures)
11
EU CYBERSECURITY INDEX
1.0 | TLP: WHITE | March 2024
E-trust services resilience Number of cases reported as per eIDAS Art. 19 ENISA
(e-IDAS) - cases
E-trust services resilience Duration of total cases reported as per eIDAS Art. ENISA
(e-IDAS) - duration 19
12
EU CYBERSECURITY INDEX
1.0 | TLP: WHITE | March 2024
13
EU CYBERSECURITY INDEX
1.0 | TLP: WHITE | March 2024
Alignment with the Alignment with the Convention on Cybercrime Council of Europe
Council of Europe (ETS No. 185); the first protocol on xenophobia
Convention on Cybercrime and racism (ETS No. 189) and the second
additional protocol on enhanced co-operation and
disclosure of electronic evidence (CETS No. 224)
14
EU CYBERSECURITY INDEX
1.0 | TLP: WHITE | March 2024
National and international Scoring based on adapted NCAF maturity levels, MS Survey
cooperation for objective 8 "Foster R&D"
cybersecurity R&D
15
EU CYBERSECURITY INDEX
1.0 | TLP: WHITE | March 2024
3. METHODOLOGY
The index design follows the design methodology for dealing with composite indicators which was developed by the
Organisation for Economic Co-operation and Development (OECD) in cooperation with the EU Joint Research
Centre’s Competence Centre on Composite Indicators and Scoreboards. Their methodology on Composite Indicators
(“COIN”) is described in a 10-step pocket guide3 and a handbook4.
This methodological note follows the example of the DESI (Digital Economy and Society Index) methodological note5
made publicly available.
• Must be collected on a regular basis. In order to fulfil the monitoring function, the indicators used in the index
must be collected ideally on a yearly basis (or at least with a pre-defined regularity).
• Must be relevant for a policy area of interest. All indicators in the index must be accepted as relevant metrics
in their specific policy areas.
• Must not be redundant. The index should not contain redundant indicators, either statistically or in terms of
interpretation.
• Valid: accurate measure of a behaviour, practice or task that is the expected output or outcome.
• Reliable: consistently measurable over time in the same way [e.g., by different observers].
• Precise: operationally defined in clear terms.
• Measurable: quantifiable [quantitative, qualitative or mix] using available tools and methods
• Timely: provides a measurement at time intervals relevant and appropriate in terms of the index objective.
• Objective: outcome achievement oriented.
• Transparent: the data collection process shall be transparent.
• Statistically valid: indicators should be statistically valid.
• Cost effective: balance the cost of collecting information with its usefulness.
• Attributable: ‘owners’ should be able to influence the performance measured by the indicator.
• Responsive: an indicator should be responsive to a change in the observed environment.
• Neutral: an indicator description and explanation should be unbiased in respect to MS specificities when
used in a multi-national index.
• Validated and unassailable.
• Intelligible and easily interpreted (sufficiently simple to be interpreted in practice and intuitive).
• The highest value of an indicator should be approachable in a reasonable way.
• Indicators should be replicable: results should be the same when an indicator value is produced by different
people using the same method. The unit of measure should be easy to interpret.
• Information to derive an Indicator should not be too difficult or too expensive to collect. Therefore, indicators
should ideally be based on data that is readily available, or on data that can be collected with a reasonable
amount of effort.
• Indicator data shall be verifiable through correlation with secondary data.
3
EC JRC, Your 10-Step Pocket Guide to Composite Indicators & Scoreboards, (2019) 12. https://knowledge4policy.ec.europa.eu/sites/default/files/10-
step-pocket-guide-to-composite-indicators-and-scoreboards.pdf
4
OECD, Handbook on Constructing Composite Indicators: Methodology and User Guide, Paris, 2008. https://www.oecd.org/sdd/42495745.pdf
5
DESI Methodological Note, https://ec.europa.eu/newsroom/dae/redirection/document/88557
16
EU CYBERSECURITY INDEX
1.0 | TLP: WHITE | March 2024
Take for example indicator X whose minimum value is equal to 0 and its maximum value is equal to 15. If a country
has a raw value of 2.71 in this indicator, its normalized value will be:
2.71 − 0 2.71
= = 0.1806
15 − 0 15
We also scale this value to the interval [0,100] by multiplying by 100, resulting in the final normalised value 18.06.
• Unconditional mean imputation method (the missing value for a country was replaced by the mean of the
rest of the countries). The rationale behind this choice is that indicators are considered uncorrelated.
• Regression Imputation method: regression was performed using the indicators of the same subarea
(Business continuity) per country.
• Mean imputation was used only when there were not too few with data for a particular indicator.
During the 2022 test run, the percentage of imputed values in the EU CSI was 10.72%.
3.5 WEIGHTS
For the EU CSI the following weights were used:
• At the indicator level: selection of weight is done by MS based on a series of principles, such as its impact
and significance.
• At the sub-area level: same weights for all indicators. The rationale for this choice is that indicators are
uncorrelated and there is no way of deciding which is more important in a subarea.
• At the area level: The weights selected from the previous phase (i.e. preparatory work in 2021/2022/2023)
are used.
• At the Index level: same weight for all 4 areas to ensure balanced representation.
As an example, the top-level score for country X was calculated using the formula:
where Policy(X) for example is the score obtained by country X in the Policy area.
17
ABOUT ENISA
The European Union Agency for Cybersecurity, ENISA, is the Union’s agency dedicated to
achieving a high common level of cybersecurity across Europe. Established in 2004 and
strengthened by the EU Cybersecurity Act, the European Union Agency for Cybersecurity
contributes to EU cyber policy, enhances the trustworthiness of ICT products, services and
processes with cybersecurity certification schemes, cooperates with Member States and EU
bodies, and helps Europe prepare for the cyber challenges of tomorrow. Through
knowledge sharing, capacity building and awareness raising, the Agency works together
with its key stakeholders to strengthen trust in the connected economy, to boost resilience
of the Union’s infrastructure, and, ultimately, to keep Europe’s society and citizens digitally
secure. More information about ENISA and its work can be found here:
www.enisa.europa.eu.