4.1. Horizontal Regulations
One of the first EU documents that comprehensively dealt with the issue of cybersecurity (within the framework of the New Approach) was the aforementioned 2013 Cybersecurity Strategy of the European Union. The Strategy highlighted the need to strengthen EU cybersecurity resilience by engaging not only public authorities, but the private sector as well. However, it bears mentioning that it was not the EU’s first action that tackled network and information security. As early as 2001, the Commission adopted a Communication on “Network and Information Security: Proposal for a European Policy Approach” (COM (2001) 298). Similarly, in 2004, Regulation 460/2004/EC of the European Parliament and of the Council (Official Journal EU of 19 March 2004, L 77/1) established the European Network and Information Security Agency (ENISA) to provide assistance and deliver advice to the Commission and the Member States on issues related to network and information security (including preparatory work for updating and developing EU legislation in the field of network and information security), as well as maintain expertise to stimulate cooperation between actors from the public and private sectors. Later, in 2006, the Commission adopted a “Strategy for a Secure Information Society—Dialogue, partnership and empowerment” (COM(2006) 251 final). Finally, in 2009, the EC published a Communication titled “Protecting Europe from large scale cyber-attacks and disruptions: enhancing preparedness, security and resilience” (COM (2009) 149 final). In line with the European Programme for Critical Infrastructure Protection (EPCIP), the Communication called for strengthening the security and resilience of critical infrastructures, especially ICT infrastructures—thus fully realizing the economic and social opportunities of the information society. The EC strongly stressed the need for actors to coordinate their actions so that cross-border cyber threats be managed more successfully. Crucially, the document delineated strategic priorities for neutralizing cyberspace-originating threats. The most important of these are: achieving cyber resilience; drastically reducing cybercrime; developing cyberdefense policy and capabilities related to the framework of the Common Security and Defense Policy (CSDP); developing industrial and technological resources for cybersecurity; and establishing a coherent international cyberspace policy for the European Union. The EC also noted that despite the progress made based on voluntary commitments, normative regulation of cybersecurity was still needed. Therefore, the strategy was accompanied by a proposal for legislation to:
establish common minimum requirements for network and information security at national level;
establish coordinated prevention, detection, mitigation and response mechanisms, enabling information sharing and mutual assistance amongst the national NIS competent authorities;
improve preparedness and engagement of the private sector, due to the fact that a large majority of network and information systems are privately owned and operated.
As a result of the above, 2016 saw the adoption of a follow-up Directive concerning measures for a high common level of security of network and information systems across the Union (also known as the NIS Directive, from “network and information systems”) [
18]. The ratio legis behind this legislation is to respond effectively to the challenges of the security of network and information systems at Union level, covering common minimum capacity building and planning requirements, exchange of information, cooperation, and common security requirements for operators of essential services and digital service providers. For this purpose, the Union legislator requires Member States to adopt national strategies on:
the security of network and information systems, defining the strategic objectives and appropriate policy and regulatory measures with a view to achieving and maintaining a high level of security of network and information systems;
creating a Cooperation Group in order to support and facilitate strategic cooperation and the exchange of information among Member States, to develop trust and confidence amongst them, to create a Computer Security Incident Response Team (CSIRT) to contribute to the development of trust and confidence between Member States, and to promote swift and effective operational cooperation;
establishing security and notification requirements for operators of essential services and for digital service providers;
laying down obligations for Member States to designate national competent authorities, single points of contact and CSIRTs with tasks related to the security of network and information systems (Article 1 (2) of the NIS Directive).
One of the key features of this act is the definition of “operators of essential services”. The criteria used to define them are similar to those for classifying an entity as essential under the Proposal for a Directive on resilience of critical entities (RCE Proposal). In both cases the entities are those which are considered to provide essential services dependent on a specific infrastructure (in this case—network and information systems), services which would be significantly disrupted if the entity were to fall victim to an incident. Of key importance is the difference between service provision and an actual infrastructure. According to the proposed RCE Directive, this infrastructure consists of assets, a system or part thereof. The NIS Directive instead focuses on network and information systems, including electronic communications networks, any devices or groups of inter-connected or related devices, one or more of which, pursuant to a program, performs automatic processing of digital data, as well as computer data stored, processed, retrieved or transmitted by them for the purposes of their operation, use, protection or maintenance. Consequently, it should be assumed that the “infrastructure” referred to in the proposed RCE Directive is preponderant over the “information networks and systems” mentioned in the NIS Directive. This is because networks and information systems are intended to provide certain services, e.g., electricity or natural gas, using dedicated “infrastructure” (e.g., transmission or distribution grids). What is crucial is that digitization has made it impossible in many cases to provide such services without the above-mentioned assets. In practice, this means that the designated “critical entities” may also qualify as operators of essential services. However, these two categories should not be automatically considered to be equivalent. After all, it must be borne in mind that the proposed RCE Directive covers a wider set of sectors and subsectors than the NIS Directive (10 versus 7 sectors). The energy sector alone, which includes the electricity, gas and oil subsectors, is expanded to include heating, cooling and hydrogen systems.
Consequently, an entity may be designated as critical without necessarily being recognized as an operator of essential services. Moreover, the NIS Directive does not specify that cross-border elements are a required qualifier for a significant disruptive effect (
Table 1). Nevertheless, while this criterion is not required for an entity to be designated as critical, it does determine whether it is classified as a critical entity of particular European significance. The proposed RCE Directive cites the geographic area that could be affected by an incident, including any cross-border impacts, as one of the prerequisites for the significance of an disruptive effect (Article 6 (1) (e) of the proposed RCE Directive). Essential services on the other hand are defined as those which are provided to or in more than one third of Member States (Article 14 (2) of the proposed RCE Directive). This distinction is important due to the different obligations (including supervision) and powers the two statuses bestow. The NIS Directive also seems to focus on the Member States and the cooperation between them within the so-called “Cooperation Group” (which also includes the Commission and ENISA) or the CSIRT network (consisting of representatives of the Member States and the CERT-EU—Computer Emergency Response Team), whereas the proposed RCE Directive is more concerned with entities providing essential services, including their obligations and supervision. These include: giving strategic advice on the operation of the established CSIRT network; exchanging best practice on sharing incident reporting information; discussing the capacity and readiness of Member States; and (on a voluntary basis) evaluating national strategies on the security of network and information systems and the effectiveness of CSIRTs, exchanging information and best practice on awareness-raising and training (Article 11 (3) of Directive 2016/1148/EU). In many cases, the provisions of these acts do overlap to some extent. One example is the requirement placed upon Member States to develop a “Strategy on the resilience of critical entities” and a “National strategy on the security of network and information systems”, along with the other aforementioned provisions (disruptive effect, incident reporting, risk assessments, etc.). This may raise question as to the consistency of both acts and confusion with regard to excessive regulation. However, in this regard, it bears noting that the proposed RCE Directive should be interpreted in conjunction with the proposed amendment to the NIS Directive, tabled by the EC in December 2020 (known as the NIS 2 Directive). Both acts fall into the updated EC cybersecurity strategy aimed at strengthening the Union’s strategic autonomy (to improve its resilience and collective response and to build an open and global Internet) [
19] and increasing interconnection and interdependency between physical and digital infrastructures. At the same time, given the importance of cyber security to resilience of critical entities, these legal acts will complement each other in practice. This is particularly important, since keeping the 2016 NIS Directive in its current form could lead to excessive burden on entities providing essential services and ineffectiveness of the adopted legislation. It should be noted that the strategy is an extension of the Common Position (2017) of the EC and the High Representative of the Union for Foreign Affairs and Security Policy on cybersecurity, which calls for strengthening ENISA by granting the agency a permanent mandate, as well as building a single cybersecurity market, which would include:
- ▪
setting up an EU cybersecurity certification framework, fully implementing the Directive on the Security of Network and Information Systems and the associated changes,
- ▪
improving resilience through rapid emergency response,
- ▪
enhancing EU cybersecurity capabilities by forming cybersecurity competence networks with the European Cybersecurity Research and Competence Centre,
- ▪
building a strong EU cyber skills base, promoting cyber hygiene and awareness,
- ▪
identifying malicious actors,
- ▪
stepping up the law enforcement response,
- ▪
public-private partnership on combating cybercrime,
- ▪
stepping up the political response,
- ▪
building cybersecurity deterrence through the Member States’ defense capability,
- ▪
promoting cybersecurity in external relations, building cybersecurity capacity, and EU-NATO cooperation [
20].
In addition to the considerations described above, another impetus to introduce the new legislation came in the form of a periodic evaluation by the EC, pursuant to Article 23 of the NIS Directive, which identified a number of persisting problems, especially: low level of cyber resilience of businesses operating in the EU, inconsistent resilience across Member States and sectors, the level of joint situational awareness, and lack of a joint crisis response. An amendment of the NIS Directive has become even more pressing since the onset of the COVID-19 crisis, which further amplified the listed problems.
As was the case in the proposed RCE Directive, the list of energy subsectors was expanded to include heating, cooling, and hydrogen systems. Such an approach appears to be justified, given the prominence of these sectors in the new EU energy policy. As a result, the entities indicated in the Annexes to these proposals have been assigned a dual role—that of critical entities and essential entities. This is not universal, however, since the proposed RCE Directive requires not only that an entity belong to one of the sub-sectors listed in the Annex to the proposal—it must also meet the prerequisites indicated in Article 5 (2) of the proposed RCE Directive. In the context of the proposed NIS 2 Directive, the second category is a novel provision absent from existing regulations, which state that “operators of essential services” are identified by Member States via a two-step procedure. This process required additional financial and human resources and thus proved overly complicated, leading to highly varying success in identifying such entities [
19]. As a result, there has been a widening cybersecurity gap between different Member States. The proposed Directive tackles this issue and simplifies the system by introducing a category of “essential and important entities”, which will be legally required to meet the standards of the NIS 2 Directive, assuming that they are included in the sectors listed in Annex 1 to the draft. In general, the risk management and incident reporting requirements are similar to the original ones. On the other hand, to strike a fair balance, changes have been made to the supervision and penalty regime. For example, the electricity sector encompasses: electricity undertakings which carry out the function of “supply”, distribution system operators, transmission system operators, producers, nominated electricity market operators, electricity market participants providing aggregation, demand response or energy storage services. Entities included in this category have been obliged to take appropriate technical and organizational measures to manage the risks posed to the security of network and information systems which those entities use in the provision of their services. (Article 18 (2) of the proposed NIS 2 Directive). The major requirements include:
risk analysis and information system security policies,
incident handling,
business continuity and crisis management,
supply chain security,
security in network and information systems acquisition, development and maintenance,
policies and procedures (testing and auditing) to assess the effectiveness of cybersecurity risk management measures, and
the use of cryptography and encryption (Article 18 (2) of the proposed NIS 2 Directive).
Furthermore, the proposal introduces a higher level of harmonization of security and reporting obligations compared with the regulations correctly in place. This change will lessen the compliance burden, especially for entities providing cross-border services. Notably, the proposal also puts more stringent risk management requirements on companies classified as essential or important (in comparison to digital service providers/operators of essential services under the NIS Directive). It replaces the existing closed list of technical and organizational measures with a minimum list of elements which must be incorporated into risk management processes for network and information system security. The Union legislator has expanded this list of elements to include, among others: risk analysis and information system security policies; crisis management; security in network and information systems acquisition, development and maintenance; policies and procedures to assess the effectiveness of cybersecurity risk management measures; the use of cryptography and encryption; and supply chain security (Article 18 (2) of the proposed NIS 2 Directive). This last element is of particular importance for strengthening cyber security in ICT. The Member States, in cooperation with the Commission and ENISA, are to carry out coordinated security risk assessments of critical supply chains, using the proven approach with regard to the recommendation of the Commission on cybersecurity of 5G networks (Article 19 of the proposed NIS 2 Directive). The proposal also lays down stricter rules for incident reporting and, crucially, imposes a 24 h time limit on essential/important entities for notifying incidents (after having become aware of the incident) to the competent authorities of the Member States or the CSIRTs (Article 20 (4) of the proposed NIS 2 Directive). According to Article 20 (4) of the proposed NIS 2 Directive, Member States must provide that in duly justified cases—and in agreement with the competent authorities or the CSIRTs—the entity concerned can deviate from the 24-h deadline for incident notification. The national authorities or the CSIRTs must provide, within 24 h after receiving the notification, “a response to the notifying entity, including initial feedback on the incident and, upon request of the entity, guidance on the implementation of possible mitigation measures” (Article 20 (5) of the proposed NIS 2 Directive,). The CSIRT provides additional technical support if the concerned entity so requests. Where the incident is suspected to be of criminal nature, the competent national authorities or the CSIRTs also provide guidance on reporting the incident to law enforcement authorities (Article 20 (5) of the proposed NIS 2 Directive). Presumably, this particular regulation is aimed at ensuring a more effective response to threats and reducing potential negative consequences of incidents. An important (new) element introduced to improve the information exchange system (and, consequently, responsiveness to incidents) is the provision obliging essential and important entities to notify the recipients of their services of incidents that are likely to adversely affect the provision of that service (Article 20 (5) of the proposed NIS 2 Directive). This regulation is supplemented by another obligation, stating that essential and important entities must provide any information enabling the competent authorities or the CSIRTs to determine any cross-border impact of the incident. This requirement should be applied in conjunction with the regulation set out in Article 20 (6), which states that if the incident concerns two or more Member States, the competent authority or the CSIRT must inform the other affected Member States and ENISA of the incident. In the energy sector, such a situation may arise if an incident affects an infrastructure used by transmission (or distribution) system operators via interconnectivity. This may prove particularly important for short-term markets (DAM and IDM, where the transaction occurs within the timeframe of two days to one hour prior to the delivery of electricity) because it necessitates an immediate reaction to neutralize the source of the incident in order to ensure continuity of supply. It also appears that the regulation will be important for balancing markets, where the electricity demand is matched to generation in real time. On a cross-border level, an incident that disrupts the operation of nominated electricity market operators (NEMOs) could reasonably affect two or more Member States. After all, these entities by definition perform the function of a market coupling operator by matching and executing orders for purchase/sale of electricity for the DAM and the IDM (under the SDAC and SIDIC/XBID projects), while simultaneously allocating cross-border capacity for different market areas. Thus, for example, an incident disrupting the authenticity of the data processed by a NEMO on the orders transmitted to a TSO could hinder (distort) effective allocation of cross-border capacity at congestion points.
When notifying an incident, essential and important entities should also indicate whether the incident is caused by unlawful or malicious action. However, this obligation is not absolute—the Union legislator made its applicability conditional upon the existence of an unlawful or malicious action to the best knowledge of such essential and important entities (the working used is “presumably”) on the potential causes of the incident. However, in authors’ opinion the discussed provision may prove ineffective, regardless of the nature of the regulation. First of all, it must be recognized that essential and important entities often lack the adequate technical, human or financial resources to identify the source of an incident. The multilateral nature of cyberattacks makes it extremely difficult to determine (even on a “presumed” basis) whether the incident is caused by unlawful or malicious action within 24 h. As a consequence, depending on the practice prevalent in the given country, entities may end up reporting each and every one of such “presumptions”—even if they have no basis in reality, but are notified simply as a precaution to avoid potential liability for non-compliance with applicable law. Perhaps this issue can be resolved when the Directive is implemented in the national legal systems. However, if so, this could again lead to a situation where the burdens imposed on essential and important entities differ from one Member State to another. This, in turn, may delay the process of identifying the real source of an incident by law enforcement—though even such identification does not ensure that the perpetrator will be brought to justice.
Another important element of the new cybersecurity framework is the permanent mandate granted to ENISA (the previous mandate expired in 2020). This provision is intended to achieve a high common level of cybersecurity, including by having ENISA provide active support to Member States, Union institutions, bodies, offices, and agencies in improving cybersecurity. This mandate is granted under Article 3 of Regulation 2019/881/EU (also known as the Cybersecurity Act), which establishes institutional framework on cybersecurity and unified ICT certification. As set out in Article 1 (1) of Regulation 2019/881/EU: “With a view to ensuring the proper functioning of the internal market while aiming to achieve a high level of cybersecurity, cyber resilience and trust within the Union, this Regulation lays down: (a) objectives, tasks and organisational matters relating to ENISA (the European Union Agency for Cybersecurity); and (b) a framework for the establishment of European cybersecurity certification schemes for the purpose of ensuring an adequate level of cybersecurity for ICT products, ICT services, and ICT processes in the Union, as well as for the purpose of avoiding the fragmentation of the internal market with regard to cybersecurity certification schemes in the Union.” One provision, important for cross-border trading, calls for a certification system to verify that ICT products, ICT services, and ICT processes conform to unified requirements regarding the protection of accessibility, authenticity, integrity and confidentially of stored, transmitted or processed data or of the related functions or services offered by, or accessible via those products, services and processes throughout their life cycle (see Articles 48 to 58 of Regulation 2019/881/EU). This system relieves entities from the need to go through several certification processes when trading across borders, thereby limiting administrative and financial costs and improving the resilience of the energy system.
One particularly important provision of the NIS 2 Directive is the creation of a registry for essential/important entities and cross-border service providers (including identification data), to be maintained by ENISA (Article 25 of the proposed NIS 2 Directive). Notably, this regulation will oblige ENISA to send the data of essential and important entities to “single points of contact”. According to Article 8 (3): “Each Member State shall designate a national single point of contact on the security of network and information systems (“single point of contact”). Where a Member State designates only one competent authority, that competent authority shall also be the single point of contact for that Member State.” The significance of these points lies in their function as liaisons to ensure cross–border cooperation of a Member State’s authorities with the relevant authorities in other Member States, as well as to ensure cross-sectorial cooperation with other national competent authorities within the Member State (Article 8 (4) of the proposed NIS 2 Directive). Furthermore, the proposal expands ENISA competences to include: developing and maintaining a European vulnerability registry (Article 6 (2) of the proposed NIS 2 Directive), preparing an annual report on the state of cybersecurity in the Union (Article 15 of the proposed NIS 2 Directive) and collecting aggregated incident data from Member States and issuing technical guidance (Article 20 (9) of the proposed NIS 2 Directive). The cooperation was broadened to include mutual assistance between Member States referred to in Article 34 of the proposed NIS 2 Directive. The registry is to include, in particular: information on the vulnerability, the affected ICT product or ICT services and the severity of the vulnerability in terms of the circumstances under which it may be exploited, the availability of related patches and, in the absence of available patches, guidance addressed to users of vulnerable products and services as to how the risks resulting from disclosed vulnerabilities may be mitigated. The act requires ENISA to cooperate with Member States and other authorities: those already in place under the existing NIS Directive—i.e., Cooperation Groups and CSIRTs—and the newly established—the European cyber crises liaison organization network (EU—CyCLONe). It also provides an interesting and relevant tool in the form of the peer-review of Member States’ cybersecurity policies, performed on the basis on the methodology established by the EC following consultation with the Cooperation Group and ENISA. The reviews are to be conducted by cybersecurity technical experts drawn from Member States different than the one reviewed (Article 16 of the proposed NIS 2 Directive). Such a system would seem to promote the harmonization of cyber security levels across the Member States. From a practical point of view this solution will enable a more objective assessment of the state of cyber security in a particular Member State and identification of areas requiring further improvement. However, the question remains open as to the extent to which the Member States will actually incorporate the assessment into their strategies, since the proposal does not include any provisions that would oblige them to do so. The only requirement in this regard calls for reports on the assessment of cybersecurity policy effectiveness, to be submitted to the Commission, the Cooperation Group, the CSIRTs network and ENISA, and discussed in the Cooperation Group and the CSIRTs network (Article 6 (7) of the proposed NIS 2 Directive).
4.2. Sector-Specific Regulation as a Complement to Cybersecurity Strategies in the Energy Sector
While previous legislature was horizontal in nature, the EU has also recognized the need to introduce individualized, sector-specific regulations on cyber security. This is primarily dictated by the unique nature of individual sectors. In the case of the energy sector, this specificity stems from the combination of old and new information technologies, particularly with the real-time requirements of the power grid.
The need to introduce sector-specific cybersecurity regulations in the energy sector was even more strongly emphasized in the package “Clean energy for all Europeans”. Digital transformation in the energy sector is one part of the EU strategy to achieve the objectives of its new low-carbon policy. The 2019 EC Recommendation on cybersecurity in the energy sector is a key document on this issue [
21,
22]. Though not legally binding, the Recommendation set out a framework for Member States, energy grid operators, and digital providers on issues related to cybersecurity in the energy sector (real-time requirements, cascading effects, and combination of legacy and state-of-the-art technology) and the main actions for implementing relevant cybersecurity preparedness measures in the sector. Since elements of the energy system need to work under “real time” (react to commands within a few milliseconds) and combine new technology with old, the main recommendations of the EC were to:
apply the most recent security standards for new installations (e.g., IEC, ISO, CEN);
implement international standards on cybersecurity and adequate specific technical standards for secure real-time communication;
consider real-time constraints;
split the overall system into logical zones and within each zone, define time and process constraints in order to enable the application of suitable cybersecurity measures;
implement suitable cybersecurity readiness measures with regard to combinations of legacy and state-of-the-art technology in the energy sector;
ensure that new devices, including Internet of Things devices, have and will maintain a level of cybersecurity appropriate to a site’s criticality;
consider cyber-physical effects when establishing and periodically reviewing business continuity plans;
establish design criteria and an architecture for a resilient grid;
analyze the risks of connecting legacy and Internet of Things concepts and be aware of internal and external interfaces and their vulnerabilities;
take suitable measures against malicious attacks originating from large numbers of maliciously controlled consumer devices or applications;
establish an automated monitoring and analysis capability for security-related events.
These recommendations are mostly targeted at operators of essential services. For the energy sector, these operators include transmission and distribution system operators, electricity suppliers, and gas suppliers. When the NIS 2 Directive enters into force, these standards should be extended to essential and important entities, for obvious reasons. Of note for cross-border trade and investment is Commission’s statement that energy operators need to evaluate the interdependencies and criticality of power generation and flexible-demand systems, transmission and distribution substations and lines, and the associated entities impacted by cross-border effects of a successful cyber-attack or cyber incident. This approach is consistent with the existing regulatory framework (the NIS Directive and the ENISA Regulation), as well as proposals for new legislation (RCE and NIS 2 Directives).
The sector-specific regulations are supplemented by Directive 2019/941/EU on risk-preparedness in the electricity sector and repealing [
23]. Although the regulation does not directly regulate the cybersecurity, it does recognize cyberattacks (in addition to other sources, such as extreme weather conditions) as a potential source of power outages (Recital 2 of Regulation 2019/941/EU). Even if markets and systems function well and are interconnected. Consequently, recognizing that the effects of electricity crises often extend beyond national borders, this act’s primary focus is in unifying the rules of prevention and crisis management in the electricity sector. To that end, it provides for common:
methods for the assessment of risks to security of electricity supply (Articles 4 to 9 of Regulation 2019/941/EU),
rules and framework for crisis management, and
assessment and monitoring of electricity supply security (Articles 17 and 18 of Regulation 2019/941/EU).
A similar legal act (in terms of securing uninterrupted supply of energy, in this case of natural gas, throughout the Union) is Regulation 2017/1938/EU concerning measures to safeguard the security of gas supply and repealing Regulation (EU) No 994/2010 [
24]. Similar to Regulation 2019/941/EU, this act provides for mechanisms concerning the coordination of planning for, and response to, emergencies at national, regional, and Union level, in order to prevent disruption to the continuity of natural gas supply to individual Member States and the EU, as well as implement appropriate mitigation measures if a disruption does occur. The Regulation places the joint responsibility for the security of gas supply on natural gas undertakings, Member States, and—where appropriate—the Commission itself. A Gas Coordination Group (GCG) is established under the Regulation to facilitate the coordination of measures concerning the security of gas supply. The GCG is composed of representatives of the Member States, in particular representatives of their competent authorities, as well as the Agency for the Cooperation of Energy Regulators, ENTSOG and representative bodies of the gas industry and those of relevant customers (Article 4 (1) of Regulation 2017/1938/EU). The Union legislator stresses the need for solidarity between Member States, including by providing (on a solidarity basis) natural gas to customers in another Member State in the event of an emergency (Article 13 of Regulation 2017/1938/EU). As far as cybersecurity is concerned, the Regulation cites cyberattacks and ICT failure (hardware or software failure, Internet, SCADA problems, etc.) as a technological risk factor that must be included in a common risk assessment prepared by a given risk group (encompassing selected Member States, depending on the route of gas supply). The scope of this act also seems to be somewhat broader than that of Regulation 2019/941/EU. It sets out unified standards regarding gas infrastructure and supply, which makes it somewhat similar to technical regulations under network codes (Articles 5 and 6 of Regulation 2017/1938/EU). For example, in the event of a disruption of the single largest gas infrastructure, the technical capacity of the remaining infrastructure (determined in accordance with the N—1 formula as set out in point 2 of Annex II) should be able to satisfy total gas demand of the calculated area during a day of exceptionally high gas demand occurring with a statistical probability of once in 20 years (Article 5 (1) of Regulation 2017/1938/EU). Nevertheless, there are no equivalent (technical) provisions in the Regulation which would explicitly refer to cyber security in the gas sector. It would seem prudent to regulate this matter in future network codes or gas guidelines. However, the current legal framework offers no explicit legal basis for the adoption of a network code on cyber security of cross-border natural gas flows by the EC. Presumably, due to the vital importance of the issue, relevant regulations will be adopted in the new cross-border gas regulation. This is supported by the fact that appropriate delegating provisions are included in the new electricity regulation, which authorizes the EC to adopt technical rules for cybersecurity aspects of cross-border electricity flows, on common minimum requirements, planning, monitoring, reporting, and crisis management (Article 59 (2) (e) of Regulation 2019/943/EU).