Contributed By Deloitte Legal
Spain’s cybersecurity strategy operates on two complementary levels: the EU framework, which provides the overarching regulatory direction, and national strategic instruments, which implement that framework domestically. At the EU level, the Cybersecurity Strategy of December 2020 positions cyber resilience as a foundation for digital sovereignty, the functioning of the internal market, and the protection of fundamental rights. This strategic orientation has since been translated into a comprehensive legislative programme that includes NIS2, DORA, the Cyber Resilience Act (CRA), the EU Cybersecurity Act (CSA), the Critical Entities Resilience Directive (CER), the Cyber Solidarity Act and the AI Act.
At the national level, Spain’s primary instruments are the Estrategia Nacional de Ciberseguridad (2019, currently under revision) and the Plan Nacional de Ciberseguridad. These documents structure public action around five core objectives:
Legislatively, Spain emphasises harmonised cross-sector baseline requirements, the protection of critical infrastructure, and co-ordinated incident response, while preserving sector-specific regimes for areas such as financial services, energy and healthcare.
Overall, the legislature presents EU and national instruments as mutually reinforcing layers within a unified cyber-risk governance architecture. This model places particular emphasis on proportionality of obligations, legal certainty for operators, and effective enforcement delivered through a co-ordinated network of competent authorities.
Spain’s Cybersecurity Framework: A Stacked Regulatory Architecture
Spain’s cybersecurity regime is largely shaped by EU legislation and is best understood as a layered regulatory stack rather than a collection of discrete rules. Directly applicable EU regulations – most notably DORA and the Cyber Resilience Act – coexist with directives that require national transposition, such as NIS2 and CER. These sit atop a domestic layer still influenced by earlier implementation choices and national standards, most prominently the Esquema Nacional de Seguridad (ENS) and the national framework developed under NIS1.
For organisations operating in Spain – especially those with EU wide operations – the complexity stems from the fact that compliance obligations increasingly depend on where the requirement sits in the stack (entity, sector, or product level), and on the reality that transposition timelines and national implementation choices differ across member states.
NIS2: The Entity Level Baseline (and Spain’s Current Transposition Gap)
NIS2 establishes the EU’s horizontal baseline for the security of network and information systems across essential and important entities. Its scope is defined through a general size threshold, with targeted inclusions for certain digital services regardless of size. Its significance lies less in the sector list and more in the governance model it enforces: risk-based technical and organisational measures, supply chain controls, and structured incident reporting.
Spain has not yet transposed NIS2. In the meantime, the earlier NIS1-based domestic framework continues to apply, creating a structural gap between the EU’s intended perimeter and Spain’s current national obligations. This gap does not eliminate compliance risk. For organisations with operations in member states that have completed transposition, NIS2 aligned obligations already apply in those jurisdictions.
The operational consequence: a “Spain only” compliance assessment is no longer sufficient. For many groups, the effective NIS2 compliance perimeter is determined by where they operate in the EU, not solely by the status of Spain’s transposition.
DORA: Sector-Specific Resilience With “Reach Through” to ICT Providers
DORA is directly applicable and binding on in scope financial entities. It establishes an integrated framework covering ICT risk management, incident reporting, digital operational resilience testing, and ICT third party risk management.
A decisive feature of DORA is that it extends beyond regulated financial entities to reshape how the financial system governs its technology dependencies. All ICT suppliers must meet strengthened governance and contractual expectations. For providers designated as critical ICT third party providers (CTPPs), DORA goes further by imposing direct EU level oversight under a designated Lead Overseer. This creates a significant extraterritorial effect, potentially requiring non-EU ICT providers serving EU financial institutions to establish an EU subsidiary and submit to oversight.
In Spain, DORA’s implementation carries an additional operational nuance: supervisory responsibility is distributed across multiple authorities (Banco de España, CNMV, and DGSFP). Regulated entities therefore require one internal operational resilience model capable of being demonstrated consistently to each supervisory interface.
CRA: Product-Level Cyber Resilience and Market Access
The Cyber Resilience Act introduces mandatory cybersecurity requirements for products with digital elements, covering them across their entire life cycle. The CRA shifts responsibility upstream: many cybersecurity outcomes depend on product design choices (secure defaults, update mechanisms, vulnerability handling) that cannot be compensated for solely through organisational controls.
Its scope is wide, covering most hardware and software with a direct or indirect connection to networks or devices. Because it applies to products placed on the EU market regardless of manufacturer location, the CRA has broad extraterritorial reach.
Two scope aspects are especially relevant for Spanish businesses.
CRA, Article 6 also signals intended co-ordination with NIS2 incident reporting, reflecting that many incidents arise from the interplay between product vulnerabilities and organisational impact.
CSA, Certification, and the “Voluntary in Law, Mandatory in Practice” Dynamic
The EU Cybersecurity Act (CSA) creates the EU wide certification framework for ICT products, services, and processes. While formally voluntary, certification often becomes effectively mandatory where embedded into procurement requirements or used as a presumption of regulatory conformity – particularly for sensitive or high trust deployments.
Spain adds a distinctive national mechanism through the ENS, a binding cybersecurity standard for public sector information systems that also extends contractually to private suppliers. ENS accreditation therefore functions as a market access condition for many technology providers and is likely to remain a practical compliance reference for the public sector under NIS2 once transposition is complete.
CER and the Cyber Solidarity Act: Resilience as an Interdependent System
The CER Directive complements NIS2 by addressing the resilience of critical entities across sectors and promoting integrated cyber physical resilience. Spain is transposing CER through reforms to its critical infrastructure framework, with the expectation that cybersecurity requirements will be embedded into existing planning tools.
The Cyber Solidarity Act adds an EU level crisis response layer – comprising an EU SOC network, emergency mechanisms, and a cyber reserve. These measures focus less on day-to-day organisational controls and more on large scale incident response capacity.
Practical Close: Managing the Spanish “Stack” Without Duplicating Effort
1. Map obligations by layer, not by statute.
Distinguish between entity level duties (NIS2/CER), sector-specific duties (DORA), and product-level duties (CRA). This prevents parallel programmes that inadvertently solve the same problem twice.
2. Create a unified incident classification and notification matrix.
Make a single, central decision framework for determining whether an incident triggers NIS2, GDPR, DORA, or other obligations – and harmonise timelines and reporting channels.
3. Use procurement and supplier contracts as compliance tools.
Leverage ENS (where relevant) and certification schemes to standardise assurance expectations, and ensure critical ICT contracts embed robust audit, notification, and exit rights.
4. Demonstrate governance, not just controls.
Throughout this regulatory stack, enforcement risk concentrates on whether organisations can evidence risk-based decision-making, clear accountability, and tested operational readiness – not just the existence of technical measures.
Spanish National Intelligence Centre/CCN CERT
The National Intelligence Centre’s cybersecurity division (CCN) is responsible for securing public sector systems, including classified environments and strategic entities operating under public administration oversight. CCN CERT serves as the designated CSIRT for public administration and acts as Spain’s national CSIRT for NIS2 purposes in relation to public entities. CCN holds broad investigative powers and may conduct technical audits, vulnerability assessments, and incident response co-ordination.
INCIBE/INCIBE CERT
The Instituto Nacional de Ciberseguridad operates INCIBE CERT, the CSIRT designated for private sector entities and citizens. INCIBE CERT is the primary notification point for NIS2 incident reporting from private sector essential and important entities (excluding defence and public administration domains). INCIBE is also responsible for cybersecurity awareness, capacity building, and co-ordination with sector specific competent authorities.
CNPIC
The Centro Nacional para la Protección de Infraestructuras Críticas acts as the competent authority under Act 8/2011 for designating critical operators and overseeing their security obligations. CNPIC collaborates with sectoral ministries and regulatory bodies throughout the designation and oversight process.
Sectoral Regulators
Sector specific competent authorities play a central role under both NIS2 and DORA. For financial sector DORA supervision, the competent authorities are the Banco de España (BdE), the Comisión Nacional del Mercado de Valores (CNMV), and the Dirección General de Seguros y Fondos de Pensiones (DGSFP). The Comisión Nacional de los Mercados y la Competencia (CNMC) is responsible for electronic communications and digital infrastructure oversight. The Agencia Española de Protección de Datos (AEPD) supervises GDPR compliance and exercises concurrent jurisdiction where cybersecurity incidents involve personal data breaches.
DSN
The Departamento de Seguridad Nacional co-ordinates Spain’s national cybersecurity strategy and high-level crisis management, including activation of the national cybersecurity crisis framework under the Marco Nacional de Ciberseguridad.
The regulatory framework governing cybersecurity for critical infrastructure in Spain is undergoing a structural transition driven by EU law: a shift from an infrastructure centric model to an entity centric resilience model. This transition is not merely conceptual; it changes how scope is defined, how obligations are allocated, and how compliance must be organised internally by operators pending completion of domestic transposition.
The Legacy Framework: Infrastructure-Centric Designation
The framework currently in force is rooted in Act 8/2011 on Critical Infrastructure Protection and its implementing regulation. Under this model, regulation focuses on specific physical infrastructures – installations, systems or networks whose disruption would have serious consequences for essential social functions or public safety. Designation flows from the asset to the operator, and obligations are organised around security planning instruments designed to protect identified critical services. Historically, this model prioritised physical security and continuity of supply, with cybersecurity treated as a supporting component rather than a primary regulatory focus.
The EU Driven Shift: Designation of Entities, Not Assets
The Critical Entities Resilience Directive replaces this asset-based logic with an entity designation model. Under CER, the regulated subject is the legal entity that provides an essential service, and obligations are structured around the entity’s ability to prevent, withstand, adapt to and recover from incidents – whether physical, cyber or hybrid. CER requires member states to identify critical entities through national risk assessments and designate them across eleven sectors, including energy, transport, banking, financial market infrastructure, health, digital infrastructure and public administration. The regulatory focus therefore shifts from protecting isolated assets to ensuring continuity of essential services delivered through complex combinations of physical infrastructure, digital systems, organisational processes and supply chain dependencies.
Spain is Transposing CER Through Reform of Act 8/2011
The reform is expected to replace infrastructure designation with entity designation and to modernise planning obligations accordingly. Designated critical entities will need to maintain integrated resilience plans that combine physical security, cybersecurity, business continuity and crisis management within a single governance framework, under the oversight of the competent authority.
NIS2 as the Cybersecurity Dimension of the Resilience Model
Within this entity centric architecture, NIS2 functions not as a parallel regime but as the instrument that provides technical and organisational substance to the cybersecurity aspects of resilience. NIS2 distinguishes between essential and important entities across critical and important sectors, deploying a general size cap rule with targeted inclusions for certain digital service providers regardless of size. Its scope therefore extends beyond entities designated as critical under CER to a broader population of digital operators whose network and information systems underpin economic activity.
For entities designated as critical under CER, the overlap with NIS2 is substantial. In practice, most critical entities will also qualify as essential entities under NIS2. The two instruments are complementary: CER establishes the duty to ensure resilience of essential services, while NIS2 specifies the cybersecurity measures required to support that resilience, including ICT risk management, incident handling, backup and recovery, supply chain security and authentication.
Scope Uncertainties and Practical Implications
The principal uncertainty for operators in Spain arises from timing. While CER and NIS2 define the EU level scope, domestic transposition remains underway. This creates a transitional period in which entities may fall within the EU intended scope but are not yet subject to fully articulated national obligations. This uncertainty does not eliminate compliance risk. Groups operating across borders may already be subject to NIS2 aligned requirements in other member states, and supervisory expectations increasingly reflect the EU framework rather than legacy domestic boundaries.
Practical Takeaway
For operators, the key is not to treat CER and NIS2 as separate scoping exercises. The effective perimeter should be mapped once, at the entity level, assessing whether the organisation (i) provides an essential service likely to trigger CER designation, (ii) qualifies as an essential or important entity under NIS2, or (iii) both. Designing resilience governance around the entity centric model now reduces the risk of compressed and disruptive implementation once domestic transposition is finalised.
The cybersecurity obligations applicable to critical entities in Spain cannot be understood as a checklist of technical controls extracted from individual regulatory instruments. What the Critical Entities Resilience Directive introduces – and what structurally distinguishes it from earlier frameworks – is a model of resilience as an integrated governance responsibility borne by the entity itself, rather than a set of safeguards applied to isolated assets. The regulatory focus has shifted: it is no longer the pipeline, power plant, or data centre that holds the obligation, but the organisation delivering the essential service, in all its operational, human, digital, and supply chain dimensions.
Governance and accountability at entity level. Under CER, ultimate responsibility for resilience lies with the governing body of the critical entity and cannot be delegated. This represents a significant shift in the Spanish landscape, where physical security and cybersecurity have traditionally been treated as operational matters managed below board level. CER requires governing bodies not only to approve policies, but to understand the organisation’s exposure, oversee the adequacy of resilience measures, and ensure resources are sufficient to maintain and test them. For listed companies, this obligation increasingly aligns with corporate disclosure expectations and with the recognition of operational resilience as a material governance issue.
Risk assessment as the foundation of resilience. CER grounds all substantive obligations in a comprehensive, entity level risk assessment. Its importance lies not in methodology but in breadth: critical entities must evaluate not only cyber threats, but natural hazards, public health emergencies, insider risks, and hybrid threats that combine physical and digital vectors. This integrated approach departs from legacy models in which physical and cyber risks were examined separately by distinct teams. The quality of this assessment is decisive. It is not a mere compliance exercise; it dictates how subsequent controls are calibrated, and weaknesses at this stage will systematically undermine downstream resilience measures.
Asset and dependency mapping beyond ICT inventories. To support a meaningful risk assessment, CER requires entities to identify the full operational footprint that underpins the provision of essential services, including physical assets, ICT systems, personnel, processes, and third party dependencies. This goes beyond traditional ICT asset inventories. Critical entities must understand how non-digital assets can trigger digital failures and vice versa, and where interdependencies create single points of failure. For many Spanish operators, this mapping process reveals vulnerabilities that have never been formally documented but are central to determining proportionate resilience investments.
Supply chain security as a first order obligation. CER treats supply chain security not as a contractual due diligence task but as an integral component of the entity’s own resilience. An essential service provider whose critical supplier fails cannot deliver that service regardless of the strength of its internal controls. CER therefore obliges entities to identify critical suppliers, assess their resilience, impose minimum standards where feasible, and plan for disruption scenarios. In practice, this requires more visibility and contractual leverage than many operators currently possess, especially where dependencies are concentrated among a small number of global technology providers.
Business continuity as an integrated cyber physical discipline. Critical entities must maintain continuity plans capable of sustaining essential services following incidents of any type, including cyber-attacks, physical disruptions, supply chain failures, and cascading events. CER’s innovation lies in mandating that these plans be integrated rather than siloed. Cyber recovery, physical fallback procedures, alternative facilities, and manual operations must be designed and tested together. For Spanish operators whose IT disaster recovery and physical emergency plans are separate, CER transposition will likely require consolidation into a unified resilience governance framework.
Personnel security and insider risk. CER explicitly recognises the human factor as a systemic vulnerability. Entities must address the reliability of personnel with access to sensitive functions, systems, or facilities. In Spain, implementation must be carefully balanced against labour law and data protection requirements. The regulation does not mandate specific screening techniques; instead, it requires that insider risk be assessed and managed as part of the broader resilience framework.
The role of NIS2 within the CER architecture. For most designated critical entities, CER and NIS2 apply concurrently. Their relationship is complementary, not parallel. CER establishes the obligation to ensure the resilience of essential services; NIS2 provides the cybersecurity content of that obligation, specifying measures related to ICT risk management, incident handling, backup and recovery, supply chain security, and authentication. Treating NIS2 as a standalone compliance programme running alongside CER risks duplication and misalignment. A more effective approach is to design the CER resilience framework first and then populate its cybersecurity components with NIS2 requirements.
Incident notification in the Spanish critical infrastructure context cannot be treated as a purely administrative exercise governed by checklists and deadlines. Under the combined CER and NIS2 framework, notification operates as a governance act: a formal representation by the entity to public authorities regarding the nature, impact and management of a disruption affecting an essential service. The quality of that notification – its timeliness, internal consistency and analytical credibility – serves as evidence of the maturity of the entity’s resilience framework and is assessed by competent authorities accordingly.
Triggering Thresholds: Significance as a Contextual Assessment
Under the CER framework, notification is required for incidents that have a significant disruptive effect on the provision of essential services. Significance is assessed holistically, taking into account the number of users affected, duration, geographic scope, interdependencies with other essential services, and the economic or social impact of the disruption. This is intentionally not a rigid numerical threshold. The regulatory logic recognises that the same technical incident may be trivial in one context and critical in another. In practice, this means entities must translate high-level significance criteria into operational classification rules that can be applied rapidly and defensibly during live incidents – when information is incomplete and incentives to under classify are highest.
For entities that are both critical under CER and essential under NIS2, classification is inherently dual. NIS2 applies its own significance criteria focused on disruption of network and information systems, financial loss and data compromise. A single incident – such as a cyber-attack degrading industrial control systems – may therefore trigger parallel notification duties under both regimes. Treating these as separate exercises risks delay and inconsistency; effective compliance depends on integrated internal classification protocols that assess CER and NIS2 triggers together at the point of initial assessment.
Notification Architecture and Timelines
CER establishes a tiered notification model that balances speed with analytical depth. An early notification is required without undue delay and, in any event, within 24 hours of becoming aware of the incident. Its purpose is situational awareness rather than completeness: it should provide a preliminary description of the incident, an initial impact assessment and an indication of suspected malicious intent. Authorities use this initial stage to determine whether co-ordination, support or escalation mechanisms should be activated.
A more detailed notification must follow within 72 hours, providing information on likely causes, affected systems and services, mitigation measures taken or planned, and any potential cross border effects. A final report, due within one month, becomes the formal supervisory record, documenting the incident timeline, root cause analysis, response effectiveness and corrective measures. In supervisory practice, this final report is central to evaluating whether the entity’s resilience framework functioned as intended.
Notification Channels and Parallel Regimes
In Spain, notification pathways depend on the nature of the entity and the incident. Private sector critical entities notify CNPIC as the competent authority for critical infrastructure, with parallel notification to INCIBE CERT for the cybersecurity dimension. Public sector entities notify CCN CERT. Where the incident affects a regulated financial entity, DORA notification obligations apply in parallel, with significantly shorter timelines (initial notification within four hours of classification as a major ICT incident). If personal data is affected, GDPR breach notification to the AEPD within 72 hours is also required.
The compliance risk is therefore not simply missing a deadline, but creating incoherent narratives across authorities. Supervisory bodies do compare notifications. Entities that operate fragmented notification processes – where legal, security and regulatory teams act in isolation – are exposed to enforcement risk even when timelines are met.
Operational Takeaway
Effective incident response under the Spanish framework requires a single, integrated incident governance model: one classification decision point, one internally agreed factual narrative, and co-ordinated outward reporting tailored to the requirements of each authority. Organisations that invest in this integration – through predefined decision trees, rehearsed escalation processes and multidisciplinary incident exercises – are consistently better positioned both operationally and in subsequent supervisory scrutiny.
The obligations that CER and NIS2 impose on the Spanish state are an essential – though often under‑examined – component of the EU resilience framework. Private‑sector compliance is intended to function within a public architecture of risk assessment, co-ordination, and threat‑intelligence sharing. It is this state‑led structure that ultimately determines whether individual organisational efforts translate into systemic resilience.
Under CER, Spain must conduct and regularly update national risk assessments that identify threats to the provision of essential services, using those assessments to designate critical entities and prioritise resilience measures. At the strategic level, this work is co-ordinated by the Departamento de Seguridad Nacional, while CNPIC maintains sector‑specific intelligence relevant to critical‑infrastructure designation. The quality and rigour of this assessment function directly shape the effectiveness of the overall framework.
Threat‑intelligence sharing constitutes another core public obligation. CCN‑CERT and INCIBE‑CERT operate as the primary national channels for public‑ and private‑sector entities respectively, supported by additional sector‑specific information‑sharing mechanisms. The Cyber Solidarity Act introduces an EU‑level layer through the European SOC network and the emergency reserve, strengthening cross‑border situational awareness and response capacity. The effectiveness of these mechanisms depends not only on their formal structure but on the timeliness, accuracy, and operational relevance of the intelligence they provide.
DORA is structurally unusual within EU financial regulation because it does not simply impose requirements on supervised financial entities; it also reshapes how the financial system governs the technology providers on which it depends. The regulatory logic is explicit: ICT disruption is no longer merely a firm‑level operational risk but a systemic exposure that can propagate through shared dependencies such as cloud services, core banking systems, managed services, and critical data platforms. Understanding DORA’s scope therefore requires understanding its ambition to regulate resilience across the financial value chain rather than limiting its reach to the legal perimeter of the regulated institution.
The regulated population is deliberately broad. DORA applies across the financial ecosystem, including credit institutions, payment institutions, and electronic money institutions, as well as investment firms, trading venues, central counterparties, insurance and reinsurance undertakings, insurance intermediaries, and IORPs. Its scope extends further to entities whose operational continuity is essential to market integrity, such as central securities depositories, data reporting service providers, credit rating agencies, and statutory auditors. It also captures crypto‑asset service providers authorised under MiCA. This breadth is intentional: DORA is designed around interconnectedness and the understanding that resilience failures in “supporting” functions can still generate market‑wide disruption or consumer harm.
Spain’s implementation is multi‑authority by design. In practice, this means DORA is supervised by different competent authorities depending on the entity type: the Banco de España for credit and payment institutions, the CNMV for investment firms and market infrastructure, and the DGSFP for insurance undertakings. This matters operationally because DORA is a horizontal framework, yet supervisory traditions and expectations differ. For institutions operating across subsectors, DORA becomes an exercise in aligning a single ICT risk framework with multiple supervisory interfaces, each with its own culture and reporting cadence.
The extension to ICT third‑party service providers is the key innovation in scope. DORA’s most structurally significant feature is its two‑layer model for ICT providers. First, all financial entities must manage ICT third‑party relationships under strengthened governance, contractual, and register obligations. Second, for ICT providers designated as critical third‑party providers (CTPPs) by the Joint Supervisory Committee of the ESAs, DORA establishes direct EU‑level oversight by a Lead Overseer (EBA, ESMA, or EIOPA, depending on the predominant sector served). This “reach‑through” model reflects a policy view that certain providers have become part of the EU financial system’s operational infrastructure and therefore cannot remain outside supervision.
Extraterritoriality follows from dependency rather than establishment. DORA has a material extraterritorial effect where non‑EU ICT providers supply services to EU financial entities and are designated as CTPPs: they may be required to establish an EU subsidiary within a defined period and submit to EU supervisory oversight. The practical implication is that global cloud, data, and technology providers face a compliance perimeter defined by their systemic relevance to the EU financial sector rather than their place of incorporation.
Proportionality is real but limited. DORA provides simplifications for microenterprises and smaller entities, mainly reducing documentation and governance burdens. However, this is not a substantive exemption: core obligations relating to ICT risk management, incident reporting, and baseline third‑party controls still apply. The underlying assumption is that smaller entities can still generate consumer harm and operational contagion, and that resilience expectations must remain credible across the entire market.
DORA’s contractual requirements are among its most operationally demanding elements because they transform what many institutions previously viewed as simple procurement constraints into formal governance obligations. The core risk DORA seeks to address is the gap between nominal compliance and actual resilience: updating templates and maintaining a register is easy; securing genuinely enforceable oversight rights over critical suppliers is not. DORA’s contractual framework therefore operates as a mechanism to restore supervisory and operational leverage in areas where market power and standardised vendor terms have historically left financial entities vulnerable.
The definition of an “ICT service” is intentionally broad. DORA captures digital and data services delivered on a continuous basis through ICT systems – such as cloud computing, software, data analytics, data centres, electronic communications, and other ongoing digital dependencies. This breadth prevents institutions from artificially narrowing scope in an effort to reduce compliance workload. In practice, the real test is whether the service supports the continuous operation of business processes, not whether it is labelled an “IT” service in the traditional organisational sense. As a result, compliance mapping becomes an enterprise‑wide dependency review rather than a technology‑department inventory.
Criticality is a governance judgement with supervisory implications. DORA requires institutions to distinguish between ICT services that support critical or important functions and those that do not, with enhanced contractual and oversight expectations for the former. Importantly, regulators do not pre‑classify criticality; the responsibility lies with the institution, which is fully accountable for its decision. This shifts incentives: under‑classifying a core banking platform, a hyperscaler, or a key managed security provider may reduce short‑term renegotiation effort, but it increases supervisory risk and signals weak ICT‑risk governance. DORA’s design effectively forces institutions to internalise the true resilience cost of choosing “commercial convenience.”
Under DORA, contractual content becomes a resilience tool. For critical arrangements, contracts must include provisions that make oversight meaningful rather than symbolic. This includes sufficiently detailed service specifications and service levels to enable supervisory assessment; rights of access, inspection, and audit (including by regulators); incident‑reporting obligations aligned with the institution’s own timelines; business continuity and transition‑assistance commitments; and location transparency for data and service delivery to enable assessments against outsourcing and data‑protection requirements. The deeper point is not the clause list itself, but what it necessitates: institutions must renegotiate legacy agreements that were never designed to meet regulated resilience outcomes.
Subcontracting (chain outsourcing) is treated as an operational exposure. DORA recognises that resilience risks can arise several layers down the supply chain. Where a primary provider subcontracts material components, institutions must ensure equivalent standards flow through – either directly or contractually via the main provider. This creates particular challenges for cloud arrangements that rely on extensive, often international, sub‑processor networks. The practical governance expectations are visibility (mapping), enforceability (rights and obligations flowing through the chain), and a managed position for situations where full control is unattainable (risk acceptance, escalation, and disclosure where required).
Concentration risk is treated as a systemic issue. DORA requires institutions to identify and manage ICT concentration risk, reflecting the reality that EU financial services increasingly depend on a small set of global technology providers and legacy core‑system vendors. DORA does not prohibit concentration, but it elevates it to a primary risk factor – something measurable, governable, and reportable – rather than an unintended consequence of digital‑transformation economics.
DORA’s core contribution is not any single obligation but the integrated discipline it imposes across governance, ICT risk management, incident management and resilience testing. The regulation aims to address a common weakness in financial regulation: sophisticated documentation that does not translate into real capability to absorb and recover from disruption. To prevent this, DORA connects operational resilience directly to board accountability, continuous risk governance, rapid incident classification and reporting, and testing regimes designed to produce practical learning rather than compliance artefacts.
Governance: Accountability That Cannot Be Delegated
DORA places ICT risk management firmly under the responsibility of the management body. The board (or equivalent) must approve ICT strategy, set ICT risk appetite, allocate adequate resources and receive regular reporting on incidents and testing outcomes. This is not satisfied through occasional “cyber updates”; it requires active, continuous oversight of resilience as a strategic priority. In Spain – where many institutions historically treated technology governance as a management‑level concern – DORA represents a structural shift: resilience becomes a board‑owned obligation with direct consequences for supervisory assessments of governance maturity.
ICT Risk Management: A Living Framework
DORA requires a comprehensive documented ICT risk management framework, but its defining feature is the emphasis on continuous updating. The framework must reflect the institution’s actual ICT environment as it evolves: new services, architectural changes, shifting supply chains and emerging threats. The regulatory assumption is clear: in a transformation‑heavy sector, a static framework quickly becomes misleading and therefore cannot be relied upon as evidence of genuine control.
Incident Classification and Reporting: Speed Over Certainty
DORA’s incident regime turns classification into a high‑stakes operational decision. Major incidents are defined using criteria such as client impact, duration, geographic spread, data loss, service criticality and economic impact. The challenge is not the criteria themselves but applying them during an active incident, when information is incomplete and incentives to delay classification are strongest. DORA deliberately imposes strict timelines: an initial notification must be made within four hours of classifying an incident as major, followed by an intermediate report within 72 hours and a final report within one month. This structure forces institutions to establish predefined decision protocols and ensure that responsible roles are always available, rather than relying on “after action” reporting when facts are clearer.
Resilience Testing as Capability Building
DORA requires annual basic testing for all in‑scope entities and more demanding threat‑led penetration testing (at least every three years) for significant entities. The regulatory logic is that testing exposes operational realities that policies and audits may overlook. Its value lies in identifying genuine detection gaps, response delays and recovery weaknesses under realistic conditions – not in producing a “pass” certificate. For supervisors, testing outcomes become evidence of governance seriousness: whether institutions treat resilience as a measurable performance area rather than an abstract policy concept.
DORA’s enforcement framework is designed to balance credible deterrence with the recognition that resilience gaps are often structural rather than wilful. In Spain, the Banco de España, CNMV and DGSFP hold broad investigative and corrective powers over supervised entities. These include information requests, on‑site inspections, binding remediation orders and administrative sanctions.
For critical ICT third‑party providers, the EU Lead Overseer can exercise comparable powers, including the ability to impose periodic penalty payments for ongoing non‑compliance. The supervisory architecture is deliberately graduated: deficiencies are expected to prompt supervisory engagement and the development of remediation plans before any punitive action is taken. However, the sanctioning framework itself remains meaningful.
Maximum penalties can reach EUR10 million or 2% of worldwide turnover for legal persons, and EUR5 million for natural persons, with public disclosure adding an additional reputational impact. Given DORA’s relatively recent applicability, formal Spain‑specific enforcement precedents were limited at the time of writing.
DORA does not impose data localisation requirements. Instead, it obliges financial entities to specify in their ICT contracts where data will be processed and stored. This approach provides transparency and enables supervisors to assess risks, without restricting the geographical location of data.
Where outsourcing involves personal data, GDPR international transfer rules apply in parallel. Lawful transfer mechanisms – such as adequacy decisions, Standard Contractual Clauses (SCCs), and Binding Corporate Rules (BCRs) – establish a legal basis for transfers but do not remove the need to evaluate practical risks, including the possibility of access by third‑country authorities under local laws. As a result, the EDPB’s transfer impact assessment methodology becomes operationally relevant within DORA’s outsourcing governance framework.
A key upcoming development is the EUCS high‑assurance level under the Cybersecurity Act (CSA). This certification scheme is designed to assess cloud services against criteria that include protection from third‑country legal access to EU data, offering a standardised mechanism for managing sovereignty risk in cloud outsourcing.
Spanish supervisory authorities, including the Banco de España, have also signalled that documented third‑country risk assessments should be treated as substantive elements of compliance rather than mere formalities.
Threat-led penetration testing under DORA is designed to assess whether an institution can withstand sophisticated, realistic adversaries targeting its critical functions, rather than simply verify whether known vulnerabilities have been remediated. In Spain, the framework follows the ECB’s TIBER-EU methodology, implemented domestically as TIBER-ES under the joint administration of the Banco de España and the CNMV.
TIBER-ES comprises a sector-level Generic Threat Intelligence report, an institution-specific Targeted Threat Intelligence report, and a red-team exercise against live production systems conducted by an approved External Test Provider, guided by the gathered intelligence.
Targeting production environments is operationally significant: it evaluates an institution’s detection and response capabilities under real conditions. This requires strict governance, robust risk controls, and well‑defined crisis communication protocols to ensure that the exercise remains safe while still delivering credible, high‑fidelity testing conditions.
Spain’s cyber‑resilience framework is evolving along two intersecting lines: a rights‑based domestic tradition, rooted in constitutional and fundamental rights instruments, and the EU’s emerging product‑security agenda, which is reshaping market access by imposing security‑by‑design duties on manufacturers. The interaction between these approaches is not merely conceptual. It redistributes responsibility – historically placed on operators through duties of care – upstream to manufacturers through life cycle obligations embedded in product regulation.
Spain’s Charter of Digital Rights (2021), although non‑binding, is normatively significant in this landscape. It frames cybersecurity as a digital right: a citizen’s reasonable expectation that digital systems and services can be used with adequate security guarantees. From this perspective, cyber resilience becomes a precondition for exercising rights in the digital environment. Insecure digital products are therefore not simply defective market offerings; they undermine both public trust and rights‑based expectations of safety in digital life.
This rights‑based framing aligns closely with the EU’s product‑layer regulatory strategy. When EU legislation requires manufacturers to ship products without known exploitable vulnerabilities, implement secure defaults, and provide security updates throughout a defined life cycle, it gives enforceable content – through market‑access mechanisms – to the normative expectations Spain already articulates as rights‑based guarantees. The EU’s product security agenda can thus be understood not as an external imposition but as a mechanism that operationalises domestic constitutional values through binding obligations on manufacturers.
The Cyber Resilience Act is the central structural instrument driving this shift. It is the first EU regulation to impose horizontal, mandatory cybersecurity requirements on products with digital elements across their entire life cycle – from design to end‑of‑support. Cyber resilience is no longer left to market incentives or downstream organisational controls; it becomes a baseline condition for placing products on the EU internal market, enforced through market surveillance and meaningful penalties.
The CRA directly targets a persistent market failure. For years, insecure‑by‑design products were economically rational because the costs of insecurity – breaches, ransomware propagation, botnet recruitment – were borne by users and society rather than by producers. By making security a legal obligation enforced through market access, the CRA changes the economics of product development: non‑compliance becomes a manufacturer risk rather than a user externality. This shift is particularly relevant in Spain, where connected devices and software products are widely deployed across consumer, industrial, and public‑sector environments, and where product life cycles often exceed traditional security‑support practices.
In terms of scope, the CRA applies broadly to products with digital elements that connect – directly or indirectly – to devices or networks. This includes consumer devices, industrial systems, network equipment, operating systems, and standalone software. A key operational boundary concerns software‑as‑a‑service: purely remote SaaS without a locally installed component falls outside the CRA’s direct scope, but SaaS components that are functionally integrated into in‑scope products – such as IoT backends or remote‑management layers – are regulated as part of the product. For Spanish businesses, this distinction is critical for procurement, supply‑chain assessments, and compliance mapping.
The CRA also establishes a risk‑based conformity‑assessment model. Most products may rely on self‑assessment where harmonised standards exist, whereas higher‑risk categories require more structured third‑party evaluation. In practice, the availability and timing of these harmonised standards will be a key implementation variable during the initial application phase.
The CRA introduces demanding obligations for manufacturers, importers and distributors – not simply because it adds new requirements, but because it requires a fundamental shift in how products are developed and supported. Security must be treated as a primary design objective throughout the entire life cycle. The CRA is therefore best understood as a life cycle governance framework, not a compliance checklist: it requires security to be built in, maintained, and demonstrably upheld over time.
Security by Design and Secure Defaults (Annex I)
The CRA establishes essential security requirements that must be met before products can be placed on the EU market. Products must be designed and developed to be free of known exploitable vulnerabilities at launch and to minimise their attack surface through architectural choices and default configurations. This addresses a common failure mode: products that can be secured in theory but are shipped with insecure default settings to reduce friction, simplify onboarding, or lower costs. Under the CRA, secure defaults become a legal baseline rather than a best practice. Security functions must be enabled by default unless manufacturers can demonstrate that doing so would impose disproportionate cost or performance impacts.
Beyond default configurations, Annex I requires protection for the confidentiality, integrity, and availability of data processed, stored, or transmitted. It also mandates secure update mechanisms that cannot themselves be exploited, and operational resilience to ensure products remain safe even in degraded conditions. This approach ties security requirements to how products behave over time – how updates, vulnerabilities and incidents are handled – rather than to static feature claims.
Vulnerability Handling as a Continuous Obligation
The CRA requires manufacturers to maintain an operational co-ordinated vulnerability disclosure process. This must include a publicly available channel through which researchers and users can report vulnerabilities and receive confirmation that their report is being handled. The aim is to institutionalise vulnerability management as a routine life cycle function rather than an ad hoc reaction to reputational crises. Once aware of a vulnerability, manufacturers must investigate and remediate it without undue delay, where technically feasible. While the CRA recognises that remediation timelines vary by severity and does not mandate a single deadline, it enforces a standard of prompt action that can be evaluated through reporting duties and market surveillance.
Security Updates and Minimum Support Periods
A central provision of the CRA is the obligation to provide security updates for the expected lifetime of the product. Where a product’s expected lifetime is undefined or shorter than five years, manufacturers must provide at least five years of security support. This addresses long standing problems caused by products losing support while still in active use, leaving significant residual security risk. The CRA also requires that security updates be offered free of charge and clearly distinguished from feature updates, ensuring users can apply patches without being forced into functional changes. This requires manufacturers to maintain sustainable update delivery models across multiple generations of products – an economic challenge as much as a regulatory one.
Incident and Vulnerability Reporting
The CRA links manufacturers to the EU’s incident response infrastructure through mandatory reporting. When a manufacturer becomes aware of actively exploited vulnerabilities or significant security incidents, they must notify ENISA and the relevant national CSIRT quickly. Reporting follows a staged timeline: an early warning within 24 hours, a more detailed notification within 72 hours, and a final report within 14 days. The structure prioritises situational awareness early – when partial information can still help mitigate systemic risk – while allowing more complete analysis to follow.
Conformity Assessment and CE Marking
Before entering the EU market, products must undergo conformity assessment to demonstrate compliance with CRA essential requirements. For most products, manufacturers may self-assess where harmonised standards exist; higher risk product classes require third party involvement, and the highest-risk categories require assessment by a notified body. This introduces a cybersecurity dimension to the CE mark: it becomes a signal of baseline security compliance in addition to safety and electromagnetic compatibility. Early implementation challenges may arise from the timing and scope of harmonised standards, leaving manufacturers uncertain about how to demonstrate conformity against high level requirements.
Post-Market Surveillance, Corrective Action, and Withdrawal/Recall
The CRA establishes a post-market surveillance framework allowing authorities to monitor products already on the market and intervene when non-compliance emerges. If a product presents significant cybersecurity risk, authorities may require corrective measures, restrict availability, or mandate withdrawal or recall. The recall power is particularly significant: it transforms cybersecurity from a reputational issue into a market-access liability that can lead to forced product removal. The effectiveness of this mechanism will depend heavily on national technical capacity and enforcement resources.
Penalties and Deterrence
The CRA’s penalty structure aims to create strong deterrence. Serious breaches of essential requirements can result in fines tied to a company’s worldwide turnover, ensuring that penalties are meaningful for both large global manufacturers and smaller producers. Additional sanctions apply for failures in vulnerability handling, reporting, or co-operation with authorities. Beyond monetary penalties, reputational consequences and potential prohibitions on market access may in practice be equally impactful.
Cybersecurity certification in Spain and the EU is best understood as a regulatory lever for market access rather than merely a voluntary assurance mechanism. Although many certification schemes are formally optional, their interaction with sector specific regulations and public procurement requirements means they often become mandatory in practice – particularly for providers operating in sensitive or regulated sectors.
Product, Service and Entity Certification: Different Tools for Different Purposes
A key distinction in the EU framework is between product certification, service certification, and entity-level certification.
These instruments are not interchangeable; each addresses different regulatory risks and assurance needs.
The EU Cybersecurity Act and EU Level Schemes
The EU Cybersecurity Act establishes the EU wide certification framework and defines ENISA’s role. Under the CSA, certification is generally voluntary unless required by EU or national law. In practice, however, certification is frequently embedded into regulatory expectations or procurement criteria, especially for critical or high assurance environments.
The EUCC scheme provides structured, Common Criteria-based evaluation for products and is increasingly relevant for use in high assurance contexts. Meanwhile, the upcoming EUCS scheme focuses on cloud services and assesses governance, infrastructure, processes, personnel, and subcontractor management. At higher assurance levels, EUCS introduces requirements related to third country access risks, making it particularly significant for regulated outsourcing and financial sector resilience assessments.
Interaction With Sectoral Regulation
Certification directly supports compliance with a range of cybersecurity obligations. Under NIS2, member states may require essential entities to use certified products or services. In the financial sector, DORA drives institutions to treat certification as a practical signal of ICT outsourcing risk management. The Cyber Resilience Act further reinforces this dynamic by linking CE marking and conformity assessment for products with digital elements to security requirements – creating renewed demand for credible evaluation mechanisms that certification schemes can fulfil.
The Spanish Dimension: ENS as a Market Gatekeeper
Spain applies an additional national layer through the Esquema Nacional de Seguridad. ENS is a binding cybersecurity standard for public sector information systems and, by contractual extension, for private sector suppliers providing ICT services to the public administration. ENS certification at the applicable level is therefore a de facto requirement for market access for many technology providers.
Unlike product focused schemes, ENS assesses governance, technical measures, incident response, and supply chain security in an integrated manner. ENS now serves as a practical benchmark for cybersecurity maturity in Spain, especially in public sector and regulated environments. Although alignment with EU schemes (EUCC for products and EUCS for cloud services) is progressing, providers must still navigate parallel assurance expectations in the short term.
Certification and Procurement as Regulatory Drivers
Procurement is often the decisive factor. Spanish procurement rules allow public bodies to require certification as part of technical specifications or award criteria. Sectoral regulators likewise increasingly view certification as credible evidence of compliance. As a result, certification operates less as a voluntary assurance badge and more as a commercial prerequisite for participating in public sector or regulated markets.
Practical Takeaway
Organisations should adopt a strategic approach to certification. The key question is not whether a certification is formally mandatory, but where it functions as a gatekeeper – for public sector access, regulated outsourcing, or cross border service deployment. Aligning procurement strategy, compliance planning, and assurance activities around the relevant certification pathways helps reduce duplication, friction, and regulatory risk.
The relationship between cybersecurity and data protection in Spain is best understood as one of structural interdependence rather than simple regulatory overlap. The GDPR is not a cybersecurity framework, and NIS2 is not a data protection regime. In practice, however, the most serious cyber incidents affecting Spanish organisations activate both frameworks simultaneously, and many compliance failures arise because organisations lack an integrated response model.
Under the GDPR, security is framed as a risk‑management obligation that focuses on protecting individuals’ rights and freedoms. Article 32 intentionally avoids mandating particular technologies, instead requiring measures proportionate to the risks presented by the processing. Spanish supervisory practice consistently treats security as a contextual assessment, where technical controls are relevant only insofar as they reflect a defensible risk analysis. What the GDPR adds – beyond traditional cybersecurity frameworks – is accountability: controllers must be able to demonstrate why their chosen measures are appropriate, and shortcomings in documentation are treated as standalone infringements.
Incident notification is where this interaction becomes operationally critical. The GDPR’s 72‑hour breach‑notification period runs from the moment of awareness, not from the point of forensic certainty, and regulators expect transparency even when information is incomplete. For organisations that also qualify as essential or important entities under NIS2, a serious cyber incident may trigger parallel notification duties: an early warning under NIS2 within 24 hours, and a breach notification to the AEPD within 72 hours. These regimes differ in triggers, timelines, and required content – and authorities do compare notifications.
The Cyber Resilience Act adds another layer by imposing security‑by‑design obligations on products with digital elements. From a data‑protection perspective, the CRA operates as a baseline for product‑level security: controllers that rely on products lacking secure defaults, vulnerability‑handling processes, or defined update life cycles are structurally unable to meet their Article 32 obligations, regardless of the organisational measures in place.
Spain’s Organic Law 3/2018 reinforces this integrated approach through an expanded DPO regime. The independence and authority of the DPO during incidents are essential; when the role is nominal or under‑resourced, Spanish authorities have treated that failure as an infringement in its own right.
The AI Act is not a cybersecurity regulation in the traditional sense, but it embeds cybersecurity as a fundamental element of the EU’s concept of trustworthy AI. The Act addresses risks arising not only from system compromise, but also from manipulation of AI behaviour, data poisoning, and adversarial inputs – threats that may occur even when the underlying infrastructure remains technically secure.
High‑risk AI systems must demonstrate appropriate levels of robustness and cybersecurity across their entire life cycle. This introduces obligations that extend beyond conventional information security frameworks, requiring controls over training‑data pipelines, model integrity, inference processes, and continuous monitoring of system behaviour in production. For many organisations in Spain, these requirements fall outside established cybersecurity practices and necessitate much closer co-ordination between legal, security, and data‑science teams.
Additional complexity arises when AI systems also qualify as products with digital elements under the Cyber Resilience Act. In such cases, manufacturers and deployers must comply simultaneously with the CRA’s security‑by‑design obligations and the AI Act’s requirements related to robustness and cybersecurity. While the two frameworks partially overlap, they address different forms of risk: the CRA focuses on horizontal product security, whereas the AI Act targets risks linked to algorithmic behaviour and outcomes.
Incident reporting demonstrates the operational challenge clearly. A cybersecurity incident affecting a high‑risk AI system may trigger parallel obligations under multiple frameworks: AI Act serious‑incident reporting, NIS2 notification where the deployer is an essential or important entity, GDPR breach notification if personal data is involved, and DORA reporting in the financial sector. These regimes operate on different timelines and require different types of information, making integrated incident‑response governance essential.
From a data‑protection perspective, AI systems processing personal data must also comply with GDPR’s requirements for data protection by design and by default. Spanish supervisory practice emphasises that technical measures addressing AI‑specific risks – such as inference of sensitive attributes or re‑identification through model outputs – are central to compliance. Overall, the AI Act, CRA, and GDPR together create a layered compliance architecture that requires co-ordinated governance rather than siloed implementation.
Healthcare occupies a distinctive position within the cybersecurity regulatory landscape – not because it is governed by fundamentally different legal instruments, but because the consequences of cybersecurity failures are uniquely severe. In this sector, cyber incidents directly affect patient safety, clinical continuity and the delivery of essential public services. Disruptions that might be primarily economic in other industries can, in healthcare, lead to delayed treatment, compromised clinical decision‑making and risks to life. This reality increasingly shapes both EU‑level and Spanish regulatory approaches.
At EU level, the European Commission’s Action Plan on the Cybersecurity of Hospitals and Healthcare Providers (January 2025) reflects a clear recognition that horizontal frameworks such as NIS2, CER and the GDPR require sector‑specific operational support to be effective in healthcare environments. The Action Plan prioritises prevention, detection, response and deterrence, and aligns closely with Cyber Solidarity mechanisms, which designate healthcare as a priority sector for EU‑level incident response support.
Healthcare as a Critical Entity
Hospitals and healthcare networks designated as critical entities under CER and Spain’s reformed critical infrastructure framework must follow an integrated resilience model that combines physical security, cybersecurity, organisational measures and supply‑chain resilience. Designation brings a governance shift: responsibility for resilience moves to the governing body, with accountability that cannot be delegated. This marks a departure from traditional approaches in which cybersecurity was treated as an IT function rather than a core governance and patient‑safety obligation.
NIS2 Implementation Challenges in Healthcare
Healthcare providers qualifying as essential entities under NIS2 face sector‑specific constraints. Many clinical systems operate on legacy platforms that cannot easily support modern security controls such as multi‑factor authentication or automated patch management. While these constraints do not reduce regulatory obligations, they significantly influence how compliance must be achieved. Compensating controls – such as network segmentation, enhanced monitoring, and accelerated replacement planning – therefore become central. Incident classification under NIS2 also has a distinct clinical dimension: any incident affecting the availability of clinical systems or the integrity of patient records is presumptively significant because of the potential for patient harm.
Connected Medical Devices and the CRA Interface
A particularly complex issue for healthcare organisations is the interaction between the Cyber Resilience Act and connected medical devices. As a general rule, devices governed by the Medical Devices Regulation (MDR) or the In Vitro Diagnostic Medical Devices Regulation (IVDR) may fall outside the CRA where equivalent cybersecurity requirements already apply. However, equivalence is not automatic. While MDR and IVDR incorporate cybersecurity into clinical safety, the CRA introduces additional, standalone life cycle obligations – including co-ordinated vulnerability disclosure, defined security‑update support periods and active incident reporting. Until further clarification through delegated acts, manufacturers and healthcare procurers must navigate a grey area in which MDR/IVDR compliance does not necessarily satisfy all CRA‑relevant requirements.
Procurement and Life Cycle Risk
Regardless of formal applicability, the CRA is already shaping healthcare procurement practices. Hospitals increasingly expect clear commitments regarding security‑update support, vulnerability‑management processes and product‑roadmap alignment with CRA expectations. Devices lacking defined support periods pose medium‑term operational and clinical risks, particularly in healthcare environments where equipment life cycles extend far beyond those of typical consumer technology.
Health‑Data Protection Overlay
Health data constitutes special‑category personal data under the GDPR, triggering the highest level of security and accountability obligations. In Spain, these are further reinforced by the ENS for public healthcare systems and by mandatory data‑protection impact assessments (DPIAs) for significant clinical and AI‑enabled systems. Supervisory practice confirms that DPIAs must be substantive and risk‑focused; generic or superficial assessments are treated as compliance failures in their own right.
Parallel Notification Complexity
Healthcare entities face one of the most demanding regulatory notification landscapes across any sector. A single cyber incident may trigger NIS2 notification within 24 hours, CER notification for designated critical entities and GDPR personal‑data breach notification within 72 hours. Managing these simultaneous obligations during an active clinical incident – when systems may be degraded and staff may be operating manually – requires integrated incident‑response planning that includes clinical leadership alongside legal and cybersecurity teams. Under the current regulatory framework, such integration is not merely best practice; it is essential for both compliance and patient safety.
Plaza Pablo Ruiz Picasso 1
28020 Madrid
Spain
+34 915 145 000
rgonzalezruiz@deloitte.es www2.deloitte.com/es