Cybersecurity 2026

Last Updated March 17, 2026

Spain

Law and Practice

Authors



Deloitte Legal has a digital law department that integrates a first-class legal team, experienced in sophisticated privacy matters, with strategy, process, technology, and risk consultants. This synergy provides a broad, practical perspective to address clients’ challenges in an increasingly complex regulatory and business landscape, supporting both informed decision-making and seamless multidisciplinary implementation. Focused on digital transformation across diverse sectors and maturity levels, the firm’s cross-market view enables it to anticipate emerging needs and adapt proven solutions to new contexts. A core differentiator is its profound specialisation in digital regulation and comprehensive cybersecurity advisory. The firm expertly navigates the complex interplay of critical frameworks – including NIS 2, CER, CSA, CRA, and DORA. By bridging business, technology, and legal disciplines, it fosters a common language to deliver forward-looking, resilient, and highly practical solutions.

Spain’s cybersecurity strategy operates on two complementary levels: the EU framework, which provides the overarching regulatory direction, and national strategic instruments, which implement that framework domestically. At the EU level, the Cybersecurity Strategy of December 2020 positions cyber resilience as a foundation for digital sovereignty, the functioning of the internal market, and the protection of fundamental rights. This strategic orientation has since been translated into a comprehensive legislative programme that includes NIS2, DORA, the Cyber Resilience Act (CRA), the EU Cybersecurity Act (CSA), the Critical Entities Resilience Directive (CER), the Cyber Solidarity Act and the AI Act.

At the national level, Spain’s primary instruments are the Estrategia Nacional de Ciberseguridad (2019, currently under revision) and the Plan Nacional de Ciberseguridad. These documents structure public action around five core objectives:

  • strengthening the security and resilience of networks and systems;
  • developing national cybersecurity capabilities;
  • reinforcing cybersecurity within the public sector;
  • enhancing international co-operation; and
  • promoting a cybersecurity culture.

Legislatively, Spain emphasises harmonised cross-sector baseline requirements, the protection of critical infrastructure, and co-ordinated incident response, while preserving sector-specific regimes for areas such as financial services, energy and healthcare.

Overall, the legislature presents EU and national instruments as mutually reinforcing layers within a unified cyber-risk governance architecture. This model places particular emphasis on proportionality of obligations, legal certainty for operators, and effective enforcement delivered through a co-ordinated network of competent authorities.

Spain’s Cybersecurity Framework: A Stacked Regulatory Architecture

Spain’s cybersecurity regime is largely shaped by EU legislation and is best understood as a layered regulatory stack rather than a collection of discrete rules. Directly applicable EU regulations – most notably DORA and the Cyber Resilience Act – coexist with directives that require national transposition, such as NIS2 and CER. These sit atop a domestic layer still influenced by earlier implementation choices and national standards, most prominently the Esquema Nacional de Seguridad (ENS) and the national framework developed under NIS1.

For organisations operating in Spain – especially those with EU wide operations – the complexity stems from the fact that compliance obligations increasingly depend on where the requirement sits in the stack (entity, sector, or product level), and on the reality that transposition timelines and national implementation choices differ across member states.

NIS2: The Entity Level Baseline (and Spain’s Current Transposition Gap)

NIS2 establishes the EU’s horizontal baseline for the security of network and information systems across essential and important entities. Its scope is defined through a general size threshold, with targeted inclusions for certain digital services regardless of size. Its significance lies less in the sector list and more in the governance model it enforces: risk-based technical and organisational measures, supply chain controls, and structured incident reporting.

Spain has not yet transposed NIS2. In the meantime, the earlier NIS1-based domestic framework continues to apply, creating a structural gap between the EU’s intended perimeter and Spain’s current national obligations. This gap does not eliminate compliance risk. For organisations with operations in member states that have completed transposition, NIS2 aligned obligations already apply in those jurisdictions.

The operational consequence: a “Spain only” compliance assessment is no longer sufficient. For many groups, the effective NIS2 compliance perimeter is determined by where they operate in the EU, not solely by the status of Spain’s transposition.

DORA: Sector-Specific Resilience With “Reach Through” to ICT Providers

DORA is directly applicable and binding on in scope financial entities. It establishes an integrated framework covering ICT risk management, incident reporting, digital operational resilience testing, and ICT third party risk management.

A decisive feature of DORA is that it extends beyond regulated financial entities to reshape how the financial system governs its technology dependencies. All ICT suppliers must meet strengthened governance and contractual expectations. For providers designated as critical ICT third party providers (CTPPs), DORA goes further by imposing direct EU level oversight under a designated Lead Overseer. This creates a significant extraterritorial effect, potentially requiring non-EU ICT providers serving EU financial institutions to establish an EU subsidiary and submit to oversight.

In Spain, DORA’s implementation carries an additional operational nuance: supervisory responsibility is distributed across multiple authorities (Banco de España, CNMV, and DGSFP). Regulated entities therefore require one internal operational resilience model capable of being demonstrated consistently to each supervisory interface.

CRA: Product-Level Cyber Resilience and Market Access

The Cyber Resilience Act introduces mandatory cybersecurity requirements for products with digital elements, covering them across their entire life cycle. The CRA shifts responsibility upstream: many cybersecurity outcomes depend on product design choices (secure defaults, update mechanisms, vulnerability handling) that cannot be compensated for solely through organisational controls.

Its scope is wide, covering most hardware and software with a direct or indirect connection to networks or devices. Because it applies to products placed on the EU market regardless of manufacturer location, the CRA has broad extraterritorial reach.

Two scope aspects are especially relevant for Spanish businesses.

  • 1. Procurement and product governance become compliance critical, given the wide coverage of connected products.
  • 2. The SaaS boundary matters:
    1. purely remote SaaS with no local installed component is outside the CRA’s direct scope; and
    2. SaaS elements integrated into an in-scope product (eg, IoT backends) are covered as part of that product.

CRA, Article 6 also signals intended co-ordination with NIS2 incident reporting, reflecting that many incidents arise from the interplay between product vulnerabilities and organisational impact.

CSA, Certification, and the “Voluntary in Law, Mandatory in Practice” Dynamic

The EU Cybersecurity Act (CSA) creates the EU wide certification framework for ICT products, services, and processes. While formally voluntary, certification often becomes effectively mandatory where embedded into procurement requirements or used as a presumption of regulatory conformity – particularly for sensitive or high trust deployments.

Spain adds a distinctive national mechanism through the ENS, a binding cybersecurity standard for public sector information systems that also extends contractually to private suppliers. ENS accreditation therefore functions as a market access condition for many technology providers and is likely to remain a practical compliance reference for the public sector under NIS2 once transposition is complete.

CER and the Cyber Solidarity Act: Resilience as an Interdependent System

The CER Directive complements NIS2 by addressing the resilience of critical entities across sectors and promoting integrated cyber physical resilience. Spain is transposing CER through reforms to its critical infrastructure framework, with the expectation that cybersecurity requirements will be embedded into existing planning tools.

The Cyber Solidarity Act adds an EU level crisis response layer – comprising an EU SOC network, emergency mechanisms, and a cyber reserve. These measures focus less on day-to-day organisational controls and more on large scale incident response capacity.

Practical Close: Managing the Spanish “Stack” Without Duplicating Effort

1. Map obligations by layer, not by statute.

Distinguish between entity level duties (NIS2/CER), sector-specific duties (DORA), and product-level duties (CRA). This prevents parallel programmes that inadvertently solve the same problem twice.

2. Create a unified incident classification and notification matrix.

Make a single, central decision framework for determining whether an incident triggers NIS2, GDPR, DORA, or other obligations – and harmonise timelines and reporting channels.

3. Use procurement and supplier contracts as compliance tools.

Leverage ENS (where relevant) and certification schemes to standardise assurance expectations, and ensure critical ICT contracts embed robust audit, notification, and exit rights.

4. Demonstrate governance, not just controls.

Throughout this regulatory stack, enforcement risk concentrates on whether organisations can evidence risk-based decision-making, clear accountability, and tested operational readiness – not just the existence of technical measures.

Spanish National Intelligence Centre/CCN CERT

The National Intelligence Centre’s cybersecurity division (CCN) is responsible for securing public sector systems, including classified environments and strategic entities operating under public administration oversight. CCN CERT serves as the designated CSIRT for public administration and acts as Spain’s national CSIRT for NIS2 purposes in relation to public entities. CCN holds broad investigative powers and may conduct technical audits, vulnerability assessments, and incident response co-ordination.

INCIBE/INCIBE CERT

The Instituto Nacional de Ciberseguridad operates INCIBE CERT, the CSIRT designated for private sector entities and citizens. INCIBE CERT is the primary notification point for NIS2 incident reporting from private sector essential and important entities (excluding defence and public administration domains). INCIBE is also responsible for cybersecurity awareness, capacity building, and co-ordination with sector specific competent authorities.

CNPIC

The Centro Nacional para la Protección de Infraestructuras Críticas acts as the competent authority under Act 8/2011 for designating critical operators and overseeing their security obligations. CNPIC collaborates with sectoral ministries and regulatory bodies throughout the designation and oversight process.

Sectoral Regulators

Sector specific competent authorities play a central role under both NIS2 and DORA. For financial sector DORA supervision, the competent authorities are the Banco de España (BdE), the Comisión Nacional del Mercado de Valores (CNMV), and the Dirección General de Seguros y Fondos de Pensiones (DGSFP). The Comisión Nacional de los Mercados y la Competencia (CNMC) is responsible for electronic communications and digital infrastructure oversight. The Agencia Española de Protección de Datos (AEPD) supervises GDPR compliance and exercises concurrent jurisdiction where cybersecurity incidents involve personal data breaches.

DSN

The Departamento de Seguridad Nacional co-ordinates Spain’s national cybersecurity strategy and high-level crisis management, including activation of the national cybersecurity crisis framework under the Marco Nacional de Ciberseguridad.

The regulatory framework governing cybersecurity for critical infrastructure in Spain is undergoing a structural transition driven by EU law: a shift from an infrastructure centric model to an entity centric resilience model. This transition is not merely conceptual; it changes how scope is defined, how obligations are allocated, and how compliance must be organised internally by operators pending completion of domestic transposition.

The Legacy Framework: Infrastructure-Centric Designation

The framework currently in force is rooted in Act 8/2011 on Critical Infrastructure Protection and its implementing regulation. Under this model, regulation focuses on specific physical infrastructures – installations, systems or networks whose disruption would have serious consequences for essential social functions or public safety. Designation flows from the asset to the operator, and obligations are organised around security planning instruments designed to protect identified critical services. Historically, this model prioritised physical security and continuity of supply, with cybersecurity treated as a supporting component rather than a primary regulatory focus.

The EU Driven Shift: Designation of Entities, Not Assets

The Critical Entities Resilience Directive replaces this asset-based logic with an entity designation model. Under CER, the regulated subject is the legal entity that provides an essential service, and obligations are structured around the entity’s ability to prevent, withstand, adapt to and recover from incidents – whether physical, cyber or hybrid. CER requires member states to identify critical entities through national risk assessments and designate them across eleven sectors, including energy, transport, banking, financial market infrastructure, health, digital infrastructure and public administration. The regulatory focus therefore shifts from protecting isolated assets to ensuring continuity of essential services delivered through complex combinations of physical infrastructure, digital systems, organisational processes and supply chain dependencies.

Spain is Transposing CER Through Reform of Act 8/2011

The reform is expected to replace infrastructure designation with entity designation and to modernise planning obligations accordingly. Designated critical entities will need to maintain integrated resilience plans that combine physical security, cybersecurity, business continuity and crisis management within a single governance framework, under the oversight of the competent authority.

NIS2 as the Cybersecurity Dimension of the Resilience Model

Within this entity centric architecture, NIS2 functions not as a parallel regime but as the instrument that provides technical and organisational substance to the cybersecurity aspects of resilience. NIS2 distinguishes between essential and important entities across critical and important sectors, deploying a general size cap rule with targeted inclusions for certain digital service providers regardless of size. Its scope therefore extends beyond entities designated as critical under CER to a broader population of digital operators whose network and information systems underpin economic activity.

For entities designated as critical under CER, the overlap with NIS2 is substantial. In practice, most critical entities will also qualify as essential entities under NIS2. The two instruments are complementary: CER establishes the duty to ensure resilience of essential services, while NIS2 specifies the cybersecurity measures required to support that resilience, including ICT risk management, incident handling, backup and recovery, supply chain security and authentication.

Scope Uncertainties and Practical Implications

The principal uncertainty for operators in Spain arises from timing. While CER and NIS2 define the EU level scope, domestic transposition remains underway. This creates a transitional period in which entities may fall within the EU intended scope but are not yet subject to fully articulated national obligations. This uncertainty does not eliminate compliance risk. Groups operating across borders may already be subject to NIS2 aligned requirements in other member states, and supervisory expectations increasingly reflect the EU framework rather than legacy domestic boundaries.

Practical Takeaway

For operators, the key is not to treat CER and NIS2 as separate scoping exercises. The effective perimeter should be mapped once, at the entity level, assessing whether the organisation (i) provides an essential service likely to trigger CER designation, (ii) qualifies as an essential or important entity under NIS2, or (iii) both. Designing resilience governance around the entity centric model now reduces the risk of compressed and disruptive implementation once domestic transposition is finalised.

The cybersecurity obligations applicable to critical entities in Spain cannot be understood as a checklist of technical controls extracted from individual regulatory instruments. What the Critical Entities Resilience Directive introduces – and what structurally distinguishes it from earlier frameworks – is a model of resilience as an integrated governance responsibility borne by the entity itself, rather than a set of safeguards applied to isolated assets. The regulatory focus has shifted: it is no longer the pipeline, power plant, or data centre that holds the obligation, but the organisation delivering the essential service, in all its operational, human, digital, and supply chain dimensions.

Governance and accountability at entity level. Under CER, ultimate responsibility for resilience lies with the governing body of the critical entity and cannot be delegated. This represents a significant shift in the Spanish landscape, where physical security and cybersecurity have traditionally been treated as operational matters managed below board level. CER requires governing bodies not only to approve policies, but to understand the organisation’s exposure, oversee the adequacy of resilience measures, and ensure resources are sufficient to maintain and test them. For listed companies, this obligation increasingly aligns with corporate disclosure expectations and with the recognition of operational resilience as a material governance issue.

Risk assessment as the foundation of resilience. CER grounds all substantive obligations in a comprehensive, entity level risk assessment. Its importance lies not in methodology but in breadth: critical entities must evaluate not only cyber threats, but natural hazards, public health emergencies, insider risks, and hybrid threats that combine physical and digital vectors. This integrated approach departs from legacy models in which physical and cyber risks were examined separately by distinct teams. The quality of this assessment is decisive. It is not a mere compliance exercise; it dictates how subsequent controls are calibrated, and weaknesses at this stage will systematically undermine downstream resilience measures.

Asset and dependency mapping beyond ICT inventories. To support a meaningful risk assessment, CER requires entities to identify the full operational footprint that underpins the provision of essential services, including physical assets, ICT systems, personnel, processes, and third party dependencies. This goes beyond traditional ICT asset inventories. Critical entities must understand how non-digital assets can trigger digital failures and vice versa, and where interdependencies create single points of failure. For many Spanish operators, this mapping process reveals vulnerabilities that have never been formally documented but are central to determining proportionate resilience investments.

Supply chain security as a first order obligation. CER treats supply chain security not as a contractual due diligence task but as an integral component of the entity’s own resilience. An essential service provider whose critical supplier fails cannot deliver that service regardless of the strength of its internal controls. CER therefore obliges entities to identify critical suppliers, assess their resilience, impose minimum standards where feasible, and plan for disruption scenarios. In practice, this requires more visibility and contractual leverage than many operators currently possess, especially where dependencies are concentrated among a small number of global technology providers.

Business continuity as an integrated cyber physical discipline. Critical entities must maintain continuity plans capable of sustaining essential services following incidents of any type, including cyber-attacks, physical disruptions, supply chain failures, and cascading events. CER’s innovation lies in mandating that these plans be integrated rather than siloed. Cyber recovery, physical fallback procedures, alternative facilities, and manual operations must be designed and tested together. For Spanish operators whose IT disaster recovery and physical emergency plans are separate, CER transposition will likely require consolidation into a unified resilience governance framework.

Personnel security and insider risk. CER explicitly recognises the human factor as a systemic vulnerability. Entities must address the reliability of personnel with access to sensitive functions, systems, or facilities. In Spain, implementation must be carefully balanced against labour law and data protection requirements. The regulation does not mandate specific screening techniques; instead, it requires that insider risk be assessed and managed as part of the broader resilience framework.

The role of NIS2 within the CER architecture. For most designated critical entities, CER and NIS2 apply concurrently. Their relationship is complementary, not parallel. CER establishes the obligation to ensure the resilience of essential services; NIS2 provides the cybersecurity content of that obligation, specifying measures related to ICT risk management, incident handling, backup and recovery, supply chain security, and authentication. Treating NIS2 as a standalone compliance programme running alongside CER risks duplication and misalignment. A more effective approach is to design the CER resilience framework first and then populate its cybersecurity components with NIS2 requirements.

Incident notification in the Spanish critical infrastructure context cannot be treated as a purely administrative exercise governed by checklists and deadlines. Under the combined CER and NIS2 framework, notification operates as a governance act: a formal representation by the entity to public authorities regarding the nature, impact and management of a disruption affecting an essential service. The quality of that notification – its timeliness, internal consistency and analytical credibility – serves as evidence of the maturity of the entity’s resilience framework and is assessed by competent authorities accordingly.

Triggering Thresholds: Significance as a Contextual Assessment

Under the CER framework, notification is required for incidents that have a significant disruptive effect on the provision of essential services. Significance is assessed holistically, taking into account the number of users affected, duration, geographic scope, interdependencies with other essential services, and the economic or social impact of the disruption. This is intentionally not a rigid numerical threshold. The regulatory logic recognises that the same technical incident may be trivial in one context and critical in another. In practice, this means entities must translate high-level significance criteria into operational classification rules that can be applied rapidly and defensibly during live incidents – when information is incomplete and incentives to under classify are highest.

For entities that are both critical under CER and essential under NIS2, classification is inherently dual. NIS2 applies its own significance criteria focused on disruption of network and information systems, financial loss and data compromise. A single incident – such as a cyber-attack degrading industrial control systems – may therefore trigger parallel notification duties under both regimes. Treating these as separate exercises risks delay and inconsistency; effective compliance depends on integrated internal classification protocols that assess CER and NIS2 triggers together at the point of initial assessment.

Notification Architecture and Timelines

CER establishes a tiered notification model that balances speed with analytical depth. An early notification is required without undue delay and, in any event, within 24 hours of becoming aware of the incident. Its purpose is situational awareness rather than completeness: it should provide a preliminary description of the incident, an initial impact assessment and an indication of suspected malicious intent. Authorities use this initial stage to determine whether co-ordination, support or escalation mechanisms should be activated.

A more detailed notification must follow within 72 hours, providing information on likely causes, affected systems and services, mitigation measures taken or planned, and any potential cross border effects. A final report, due within one month, becomes the formal supervisory record, documenting the incident timeline, root cause analysis, response effectiveness and corrective measures. In supervisory practice, this final report is central to evaluating whether the entity’s resilience framework functioned as intended.

Notification Channels and Parallel Regimes

In Spain, notification pathways depend on the nature of the entity and the incident. Private sector critical entities notify CNPIC as the competent authority for critical infrastructure, with parallel notification to INCIBE CERT for the cybersecurity dimension. Public sector entities notify CCN CERT. Where the incident affects a regulated financial entity, DORA notification obligations apply in parallel, with significantly shorter timelines (initial notification within four hours of classification as a major ICT incident). If personal data is affected, GDPR breach notification to the AEPD within 72 hours is also required.

The compliance risk is therefore not simply missing a deadline, but creating incoherent narratives across authorities. Supervisory bodies do compare notifications. Entities that operate fragmented notification processes – where legal, security and regulatory teams act in isolation – are exposed to enforcement risk even when timelines are met.

Operational Takeaway

Effective incident response under the Spanish framework requires a single, integrated incident governance model: one classification decision point, one internally agreed factual narrative, and co-ordinated outward reporting tailored to the requirements of each authority. Organisations that invest in this integration – through predefined decision trees, rehearsed escalation processes and multidisciplinary incident exercises – are consistently better positioned both operationally and in subsequent supervisory scrutiny.

The obligations that CER and NIS2 impose on the Spanish state are an essential – though often under‑examined – component of the EU resilience framework. Private‑sector compliance is intended to function within a public architecture of risk assessment, co-ordination, and threat‑intelligence sharing. It is this state‑led structure that ultimately determines whether individual organisational efforts translate into systemic resilience.

Under CER, Spain must conduct and regularly update national risk assessments that identify threats to the provision of essential services, using those assessments to designate critical entities and prioritise resilience measures. At the strategic level, this work is co-ordinated by the Departamento de Seguridad Nacional, while CNPIC maintains sector‑specific intelligence relevant to critical‑infrastructure designation. The quality and rigour of this assessment function directly shape the effectiveness of the overall framework.

Threat‑intelligence sharing constitutes another core public obligation. CCN‑CERT and INCIBE‑CERT operate as the primary national channels for public‑ and private‑sector entities respectively, supported by additional sector‑specific information‑sharing mechanisms. The Cyber Solidarity Act introduces an EU‑level layer through the European SOC network and the emergency reserve, strengthening cross‑border situational awareness and response capacity. The effectiveness of these mechanisms depends not only on their formal structure but on the timeliness, accuracy, and operational relevance of the intelligence they provide.

DORA is structurally unusual within EU financial regulation because it does not simply impose requirements on supervised financial entities; it also reshapes how the financial system governs the technology providers on which it depends. The regulatory logic is explicit: ICT disruption is no longer merely a firm‑level operational risk but a systemic exposure that can propagate through shared dependencies such as cloud services, core banking systems, managed services, and critical data platforms. Understanding DORA’s scope therefore requires understanding its ambition to regulate resilience across the financial value chain rather than limiting its reach to the legal perimeter of the regulated institution.

The regulated population is deliberately broad. DORA applies across the financial ecosystem, including credit institutions, payment institutions, and electronic money institutions, as well as investment firms, trading venues, central counterparties, insurance and reinsurance undertakings, insurance intermediaries, and IORPs. Its scope extends further to entities whose operational continuity is essential to market integrity, such as central securities depositories, data reporting service providers, credit rating agencies, and statutory auditors. It also captures crypto‑asset service providers authorised under MiCA. This breadth is intentional: DORA is designed around interconnectedness and the understanding that resilience failures in “supporting” functions can still generate market‑wide disruption or consumer harm.

Spain’s implementation is multi‑authority by design. In practice, this means DORA is supervised by different competent authorities depending on the entity type: the Banco de España for credit and payment institutions, the CNMV for investment firms and market infrastructure, and the DGSFP for insurance undertakings. This matters operationally because DORA is a horizontal framework, yet supervisory traditions and expectations differ. For institutions operating across subsectors, DORA becomes an exercise in aligning a single ICT risk framework with multiple supervisory interfaces, each with its own culture and reporting cadence.

The extension to ICT third‑party service providers is the key innovation in scope. DORA’s most structurally significant feature is its two‑layer model for ICT providers. First, all financial entities must manage ICT third‑party relationships under strengthened governance, contractual, and register obligations. Second, for ICT providers designated as critical third‑party providers (CTPPs) by the Joint Supervisory Committee of the ESAs, DORA establishes direct EU‑level oversight by a Lead Overseer (EBA, ESMA, or EIOPA, depending on the predominant sector served). This “reach‑through” model reflects a policy view that certain providers have become part of the EU financial system’s operational infrastructure and therefore cannot remain outside supervision.

Extraterritoriality follows from dependency rather than establishment. DORA has a material extraterritorial effect where non‑EU ICT providers supply services to EU financial entities and are designated as CTPPs: they may be required to establish an EU subsidiary within a defined period and submit to EU supervisory oversight. The practical implication is that global cloud, data, and technology providers face a compliance perimeter defined by their systemic relevance to the EU financial sector rather than their place of incorporation.

Proportionality is real but limited. DORA provides simplifications for microenterprises and smaller entities, mainly reducing documentation and governance burdens. However, this is not a substantive exemption: core obligations relating to ICT risk management, incident reporting, and baseline third‑party controls still apply. The underlying assumption is that smaller entities can still generate consumer harm and operational contagion, and that resilience expectations must remain credible across the entire market.

DORA’s contractual requirements are among its most operationally demanding elements because they transform what many institutions previously viewed as simple procurement constraints into formal governance obligations. The core risk DORA seeks to address is the gap between nominal compliance and actual resilience: updating templates and maintaining a register is easy; securing genuinely enforceable oversight rights over critical suppliers is not. DORA’s contractual framework therefore operates as a mechanism to restore supervisory and operational leverage in areas where market power and standardised vendor terms have historically left financial entities vulnerable.

The definition of an “ICT service” is intentionally broad. DORA captures digital and data services delivered on a continuous basis through ICT systems – such as cloud computing, software, data analytics, data centres, electronic communications, and other ongoing digital dependencies. This breadth prevents institutions from artificially narrowing scope in an effort to reduce compliance workload. In practice, the real test is whether the service supports the continuous operation of business processes, not whether it is labelled an “IT” service in the traditional organisational sense. As a result, compliance mapping becomes an enterprise‑wide dependency review rather than a technology‑department inventory.

Criticality is a governance judgement with supervisory implications. DORA requires institutions to distinguish between ICT services that support critical or important functions and those that do not, with enhanced contractual and oversight expectations for the former. Importantly, regulators do not pre‑classify criticality; the responsibility lies with the institution, which is fully accountable for its decision. This shifts incentives: under‑classifying a core banking platform, a hyperscaler, or a key managed security provider may reduce short‑term renegotiation effort, but it increases supervisory risk and signals weak ICT‑risk governance. DORA’s design effectively forces institutions to internalise the true resilience cost of choosing “commercial convenience.”

Under DORA, contractual content becomes a resilience tool. For critical arrangements, contracts must include provisions that make oversight meaningful rather than symbolic. This includes sufficiently detailed service specifications and service levels to enable supervisory assessment; rights of access, inspection, and audit (including by regulators); incident‑reporting obligations aligned with the institution’s own timelines; business continuity and transition‑assistance commitments; and location transparency for data and service delivery to enable assessments against outsourcing and data‑protection requirements. The deeper point is not the clause list itself, but what it necessitates: institutions must renegotiate legacy agreements that were never designed to meet regulated resilience outcomes.

Subcontracting (chain outsourcing) is treated as an operational exposure. DORA recognises that resilience risks can arise several layers down the supply chain. Where a primary provider subcontracts material components, institutions must ensure equivalent standards flow through – either directly or contractually via the main provider. This creates particular challenges for cloud arrangements that rely on extensive, often international, sub‑processor networks. The practical governance expectations are visibility (mapping), enforceability (rights and obligations flowing through the chain), and a managed position for situations where full control is unattainable (risk acceptance, escalation, and disclosure where required).

Concentration risk is treated as a systemic issue. DORA requires institutions to identify and manage ICT concentration risk, reflecting the reality that EU financial services increasingly depend on a small set of global technology providers and legacy core‑system vendors. DORA does not prohibit concentration, but it elevates it to a primary risk factor – something measurable, governable, and reportable – rather than an unintended consequence of digital‑transformation economics.

DORA’s core contribution is not any single obligation but the integrated discipline it imposes across governance, ICT risk management, incident management and resilience testing. The regulation aims to address a common weakness in financial regulation: sophisticated documentation that does not translate into real capability to absorb and recover from disruption. To prevent this, DORA connects operational resilience directly to board accountability, continuous risk governance, rapid incident classification and reporting, and testing regimes designed to produce practical learning rather than compliance artefacts.

Governance: Accountability That Cannot Be Delegated

DORA places ICT risk management firmly under the responsibility of the management body. The board (or equivalent) must approve ICT strategy, set ICT risk appetite, allocate adequate resources and receive regular reporting on incidents and testing outcomes. This is not satisfied through occasional “cyber updates”; it requires active, continuous oversight of resilience as a strategic priority. In Spain – where many institutions historically treated technology governance as a management‑level concern – DORA represents a structural shift: resilience becomes a board‑owned obligation with direct consequences for supervisory assessments of governance maturity.

ICT Risk Management: A Living Framework

DORA requires a comprehensive documented ICT risk management framework, but its defining feature is the emphasis on continuous updating. The framework must reflect the institution’s actual ICT environment as it evolves: new services, architectural changes, shifting supply chains and emerging threats. The regulatory assumption is clear: in a transformation‑heavy sector, a static framework quickly becomes misleading and therefore cannot be relied upon as evidence of genuine control.

Incident Classification and Reporting: Speed Over Certainty

DORA’s incident regime turns classification into a high‑stakes operational decision. Major incidents are defined using criteria such as client impact, duration, geographic spread, data loss, service criticality and economic impact. The challenge is not the criteria themselves but applying them during an active incident, when information is incomplete and incentives to delay classification are strongest. DORA deliberately imposes strict timelines: an initial notification must be made within four hours of classifying an incident as major, followed by an intermediate report within 72 hours and a final report within one month. This structure forces institutions to establish predefined decision protocols and ensure that responsible roles are always available, rather than relying on “after action” reporting when facts are clearer.

Resilience Testing as Capability Building

DORA requires annual basic testing for all in‑scope entities and more demanding threat‑led penetration testing (at least every three years) for significant entities. The regulatory logic is that testing exposes operational realities that policies and audits may overlook. Its value lies in identifying genuine detection gaps, response delays and recovery weaknesses under realistic conditions – not in producing a “pass” certificate. For supervisors, testing outcomes become evidence of governance seriousness: whether institutions treat resilience as a measurable performance area rather than an abstract policy concept.

DORA’s enforcement framework is designed to balance credible deterrence with the recognition that resilience gaps are often structural rather than wilful. In Spain, the Banco de España, CNMV and DGSFP hold broad investigative and corrective powers over supervised entities. These include information requests, on‑site inspections, binding remediation orders and administrative sanctions.

For critical ICT third‑party providers, the EU Lead Overseer can exercise comparable powers, including the ability to impose periodic penalty payments for ongoing non‑compliance. The supervisory architecture is deliberately graduated: deficiencies are expected to prompt supervisory engagement and the development of remediation plans before any punitive action is taken. However, the sanctioning framework itself remains meaningful.

Maximum penalties can reach EUR10 million or 2% of worldwide turnover for legal persons, and EUR5 million for natural persons, with public disclosure adding an additional reputational impact. Given DORA’s relatively recent applicability, formal Spain‑specific enforcement precedents were limited at the time of writing.

DORA does not impose data localisation requirements. Instead, it obliges financial entities to specify in their ICT contracts where data will be processed and stored. This approach provides transparency and enables supervisors to assess risks, without restricting the geographical location of data.

Where outsourcing involves personal data, GDPR international transfer rules apply in parallel. Lawful transfer mechanisms – such as adequacy decisions, Standard Contractual Clauses (SCCs), and Binding Corporate Rules (BCRs) – establish a legal basis for transfers but do not remove the need to evaluate practical risks, including the possibility of access by third‑country authorities under local laws. As a result, the EDPB’s transfer impact assessment methodology becomes operationally relevant within DORA’s outsourcing governance framework.

A key upcoming development is the EUCS high‑assurance level under the Cybersecurity Act (CSA). This certification scheme is designed to assess cloud services against criteria that include protection from third‑country legal access to EU data, offering a standardised mechanism for managing sovereignty risk in cloud outsourcing.

Spanish supervisory authorities, including the Banco de España, have also signalled that documented third‑country risk assessments should be treated as substantive elements of compliance rather than mere formalities.

Threat-led penetration testing under DORA is designed to assess whether an institution can withstand sophisticated, realistic adversaries targeting its critical functions, rather than simply verify whether known vulnerabilities have been remediated. In Spain, the framework follows the ECB’s TIBER-EU methodology, implemented domestically as TIBER-ES under the joint administration of the Banco de España and the CNMV.

TIBER-ES comprises a sector-level Generic Threat Intelligence report, an institution-specific Targeted Threat Intelligence report, and a red-team exercise against live production systems conducted by an approved External Test Provider, guided by the gathered intelligence.

Targeting production environments is operationally significant: it evaluates an institution’s detection and response capabilities under real conditions. This requires strict governance, robust risk controls, and well‑defined crisis communication protocols to ensure that the exercise remains safe while still delivering credible, high‑fidelity testing conditions.

Spain’s cyber‑resilience framework is evolving along two intersecting lines: a rights‑based domestic tradition, rooted in constitutional and fundamental rights instruments, and the EU’s emerging product‑security agenda, which is reshaping market access by imposing security‑by‑design duties on manufacturers. The interaction between these approaches is not merely conceptual. It redistributes responsibility – historically placed on operators through duties of care – upstream to manufacturers through life cycle obligations embedded in product regulation.

Spain’s Charter of Digital Rights (2021), although non‑binding, is normatively significant in this landscape. It frames cybersecurity as a digital right: a citizen’s reasonable expectation that digital systems and services can be used with adequate security guarantees. From this perspective, cyber resilience becomes a precondition for exercising rights in the digital environment. Insecure digital products are therefore not simply defective market offerings; they undermine both public trust and rights‑based expectations of safety in digital life.

This rights‑based framing aligns closely with the EU’s product‑layer regulatory strategy. When EU legislation requires manufacturers to ship products without known exploitable vulnerabilities, implement secure defaults, and provide security updates throughout a defined life cycle, it gives enforceable content – through market‑access mechanisms – to the normative expectations Spain already articulates as rights‑based guarantees. The EU’s product security agenda can thus be understood not as an external imposition but as a mechanism that operationalises domestic constitutional values through binding obligations on manufacturers.

The Cyber Resilience Act is the central structural instrument driving this shift. It is the first EU regulation to impose horizontal, mandatory cybersecurity requirements on products with digital elements across their entire life cycle – from design to end‑of‑support. Cyber resilience is no longer left to market incentives or downstream organisational controls; it becomes a baseline condition for placing products on the EU internal market, enforced through market surveillance and meaningful penalties.

The CRA directly targets a persistent market failure. For years, insecure‑by‑design products were economically rational because the costs of insecurity – breaches, ransomware propagation, botnet recruitment – were borne by users and society rather than by producers. By making security a legal obligation enforced through market access, the CRA changes the economics of product development: non‑compliance becomes a manufacturer risk rather than a user externality. This shift is particularly relevant in Spain, where connected devices and software products are widely deployed across consumer, industrial, and public‑sector environments, and where product life cycles often exceed traditional security‑support practices.

In terms of scope, the CRA applies broadly to products with digital elements that connect – directly or indirectly – to devices or networks. This includes consumer devices, industrial systems, network equipment, operating systems, and standalone software. A key operational boundary concerns software‑as‑a‑service: purely remote SaaS without a locally installed component falls outside the CRA’s direct scope, but SaaS components that are functionally integrated into in‑scope products – such as IoT backends or remote‑management layers – are regulated as part of the product. For Spanish businesses, this distinction is critical for procurement, supply‑chain assessments, and compliance mapping.

The CRA also establishes a risk‑based conformity‑assessment model. Most products may rely on self‑assessment where harmonised standards exist, whereas higher‑risk categories require more structured third‑party evaluation. In practice, the availability and timing of these harmonised standards will be a key implementation variable during the initial application phase.

The CRA introduces demanding obligations for manufacturers, importers and distributors – not simply because it adds new requirements, but because it requires a fundamental shift in how products are developed and supported. Security must be treated as a primary design objective throughout the entire life cycle. The CRA is therefore best understood as a life cycle governance framework, not a compliance checklist: it requires security to be built in, maintained, and demonstrably upheld over time.

Security by Design and Secure Defaults (Annex I)

The CRA establishes essential security requirements that must be met before products can be placed on the EU market. Products must be designed and developed to be free of known exploitable vulnerabilities at launch and to minimise their attack surface through architectural choices and default configurations. This addresses a common failure mode: products that can be secured in theory but are shipped with insecure default settings to reduce friction, simplify onboarding, or lower costs. Under the CRA, secure defaults become a legal baseline rather than a best practice. Security functions must be enabled by default unless manufacturers can demonstrate that doing so would impose disproportionate cost or performance impacts.

Beyond default configurations, Annex I requires protection for the confidentiality, integrity, and availability of data processed, stored, or transmitted. It also mandates secure update mechanisms that cannot themselves be exploited, and operational resilience to ensure products remain safe even in degraded conditions. This approach ties security requirements to how products behave over time – how updates, vulnerabilities and incidents are handled – rather than to static feature claims.

Vulnerability Handling as a Continuous Obligation

The CRA requires manufacturers to maintain an operational co-ordinated vulnerability disclosure process. This must include a publicly available channel through which researchers and users can report vulnerabilities and receive confirmation that their report is being handled. The aim is to institutionalise vulnerability management as a routine life cycle function rather than an ad hoc reaction to reputational crises. Once aware of a vulnerability, manufacturers must investigate and remediate it without undue delay, where technically feasible. While the CRA recognises that remediation timelines vary by severity and does not mandate a single deadline, it enforces a standard of prompt action that can be evaluated through reporting duties and market surveillance.

Security Updates and Minimum Support Periods

A central provision of the CRA is the obligation to provide security updates for the expected lifetime of the product. Where a product’s expected lifetime is undefined or shorter than five years, manufacturers must provide at least five years of security support. This addresses long standing problems caused by products losing support while still in active use, leaving significant residual security risk. The CRA also requires that security updates be offered free of charge and clearly distinguished from feature updates, ensuring users can apply patches without being forced into functional changes. This requires manufacturers to maintain sustainable update delivery models across multiple generations of products – an economic challenge as much as a regulatory one.

Incident and Vulnerability Reporting

The CRA links manufacturers to the EU’s incident response infrastructure through mandatory reporting. When a manufacturer becomes aware of actively exploited vulnerabilities or significant security incidents, they must notify ENISA and the relevant national CSIRT quickly. Reporting follows a staged timeline: an early warning within 24 hours, a more detailed notification within 72 hours, and a final report within 14 days. The structure prioritises situational awareness early – when partial information can still help mitigate systemic risk – while allowing more complete analysis to follow.

Conformity Assessment and CE Marking

Before entering the EU market, products must undergo conformity assessment to demonstrate compliance with CRA essential requirements. For most products, manufacturers may self-assess where harmonised standards exist; higher risk product classes require third party involvement, and the highest-risk categories require assessment by a notified body. This introduces a cybersecurity dimension to the CE mark: it becomes a signal of baseline security compliance in addition to safety and electromagnetic compatibility. Early implementation challenges may arise from the timing and scope of harmonised standards, leaving manufacturers uncertain about how to demonstrate conformity against high level requirements.

Post-Market Surveillance, Corrective Action, and Withdrawal/Recall

The CRA establishes a post-market surveillance framework allowing authorities to monitor products already on the market and intervene when non-compliance emerges. If a product presents significant cybersecurity risk, authorities may require corrective measures, restrict availability, or mandate withdrawal or recall. The recall power is particularly significant: it transforms cybersecurity from a reputational issue into a market-access liability that can lead to forced product removal. The effectiveness of this mechanism will depend heavily on national technical capacity and enforcement resources.

Penalties and Deterrence

The CRA’s penalty structure aims to create strong deterrence. Serious breaches of essential requirements can result in fines tied to a company’s worldwide turnover, ensuring that penalties are meaningful for both large global manufacturers and smaller producers. Additional sanctions apply for failures in vulnerability handling, reporting, or co-operation with authorities. Beyond monetary penalties, reputational consequences and potential prohibitions on market access may in practice be equally impactful.

Cybersecurity certification in Spain and the EU is best understood as a regulatory lever for market access rather than merely a voluntary assurance mechanism. Although many certification schemes are formally optional, their interaction with sector specific regulations and public procurement requirements means they often become mandatory in practice – particularly for providers operating in sensitive or regulated sectors.

Product, Service and Entity Certification: Different Tools for Different Purposes

A key distinction in the EU framework is between product certification, service certification, and entity-level certification.

  • Product certification assesses whether a specific hardware or software artefact meets defined security requirements at a specific point in time.
  • Service certification evaluates the security governance and operational controls of an ongoing service, such as cloud computing.
  • Entity-level certification examines an organisation’s overall cybersecurity posture, including governance, technical controls, incident response capabilities, and supply chain management.

These instruments are not interchangeable; each addresses different regulatory risks and assurance needs.

The EU Cybersecurity Act and EU Level Schemes

The EU Cybersecurity Act establishes the EU wide certification framework and defines ENISA’s role. Under the CSA, certification is generally voluntary unless required by EU or national law. In practice, however, certification is frequently embedded into regulatory expectations or procurement criteria, especially for critical or high assurance environments.

The EUCC scheme provides structured, Common Criteria-based evaluation for products and is increasingly relevant for use in high assurance contexts. Meanwhile, the upcoming EUCS scheme focuses on cloud services and assesses governance, infrastructure, processes, personnel, and subcontractor management. At higher assurance levels, EUCS introduces requirements related to third country access risks, making it particularly significant for regulated outsourcing and financial sector resilience assessments.

Interaction With Sectoral Regulation

Certification directly supports compliance with a range of cybersecurity obligations. Under NIS2, member states may require essential entities to use certified products or services. In the financial sector, DORA drives institutions to treat certification as a practical signal of ICT outsourcing risk management. The Cyber Resilience Act further reinforces this dynamic by linking CE marking and conformity assessment for products with digital elements to security requirements – creating renewed demand for credible evaluation mechanisms that certification schemes can fulfil.

The Spanish Dimension: ENS as a Market Gatekeeper

Spain applies an additional national layer through the Esquema Nacional de Seguridad. ENS is a binding cybersecurity standard for public sector information systems and, by contractual extension, for private sector suppliers providing ICT services to the public administration. ENS certification at the applicable level is therefore a de facto requirement for market access for many technology providers.

Unlike product focused schemes, ENS assesses governance, technical measures, incident response, and supply chain security in an integrated manner. ENS now serves as a practical benchmark for cybersecurity maturity in Spain, especially in public sector and regulated environments. Although alignment with EU schemes (EUCC for products and EUCS for cloud services) is progressing, providers must still navigate parallel assurance expectations in the short term.

Certification and Procurement as Regulatory Drivers

Procurement is often the decisive factor. Spanish procurement rules allow public bodies to require certification as part of technical specifications or award criteria. Sectoral regulators likewise increasingly view certification as credible evidence of compliance. As a result, certification operates less as a voluntary assurance badge and more as a commercial prerequisite for participating in public sector or regulated markets.

Practical Takeaway

Organisations should adopt a strategic approach to certification. The key question is not whether a certification is formally mandatory, but where it functions as a gatekeeper – for public sector access, regulated outsourcing, or cross border service deployment. Aligning procurement strategy, compliance planning, and assurance activities around the relevant certification pathways helps reduce duplication, friction, and regulatory risk.

The relationship between cybersecurity and data protection in Spain is best understood as one of structural interdependence rather than simple regulatory overlap. The GDPR is not a cybersecurity framework, and NIS2 is not a data protection regime. In practice, however, the most serious cyber incidents affecting Spanish organisations activate both frameworks simultaneously, and many compliance failures arise because organisations lack an integrated response model.

Under the GDPR, security is framed as a risk‑management obligation that focuses on protecting individuals’ rights and freedoms. Article 32 intentionally avoids mandating particular technologies, instead requiring measures proportionate to the risks presented by the processing. Spanish supervisory practice consistently treats security as a contextual assessment, where technical controls are relevant only insofar as they reflect a defensible risk analysis. What the GDPR adds – beyond traditional cybersecurity frameworks – is accountability: controllers must be able to demonstrate why their chosen measures are appropriate, and shortcomings in documentation are treated as standalone infringements.

Incident notification is where this interaction becomes operationally critical. The GDPR’s 72‑hour breach‑notification period runs from the moment of awareness, not from the point of forensic certainty, and regulators expect transparency even when information is incomplete. For organisations that also qualify as essential or important entities under NIS2, a serious cyber incident may trigger parallel notification duties: an early warning under NIS2 within 24 hours, and a breach notification to the AEPD within 72 hours. These regimes differ in triggers, timelines, and required content – and authorities do compare notifications.

The Cyber Resilience Act adds another layer by imposing security‑by‑design obligations on products with digital elements. From a data‑protection perspective, the CRA operates as a baseline for product‑level security: controllers that rely on products lacking secure defaults, vulnerability‑handling processes, or defined update life cycles are structurally unable to meet their Article 32 obligations, regardless of the organisational measures in place.

Spain’s Organic Law 3/2018 reinforces this integrated approach through an expanded DPO regime. The independence and authority of the DPO during incidents are essential; when the role is nominal or under‑resourced, Spanish authorities have treated that failure as an infringement in its own right.

The AI Act is not a cybersecurity regulation in the traditional sense, but it embeds cybersecurity as a fundamental element of the EU’s concept of trustworthy AI. The Act addresses risks arising not only from system compromise, but also from manipulation of AI behaviour, data poisoning, and adversarial inputs – threats that may occur even when the underlying infrastructure remains technically secure.

High‑risk AI systems must demonstrate appropriate levels of robustness and cybersecurity across their entire life cycle. This introduces obligations that extend beyond conventional information security frameworks, requiring controls over training‑data pipelines, model integrity, inference processes, and continuous monitoring of system behaviour in production. For many organisations in Spain, these requirements fall outside established cybersecurity practices and necessitate much closer co-ordination between legal, security, and data‑science teams.

Additional complexity arises when AI systems also qualify as products with digital elements under the Cyber Resilience Act. In such cases, manufacturers and deployers must comply simultaneously with the CRA’s security‑by‑design obligations and the AI Act’s requirements related to robustness and cybersecurity. While the two frameworks partially overlap, they address different forms of risk: the CRA focuses on horizontal product security, whereas the AI Act targets risks linked to algorithmic behaviour and outcomes.

Incident reporting demonstrates the operational challenge clearly. A cybersecurity incident affecting a high‑risk AI system may trigger parallel obligations under multiple frameworks: AI Act serious‑incident reporting, NIS2 notification where the deployer is an essential or important entity, GDPR breach notification if personal data is involved, and DORA reporting in the financial sector. These regimes operate on different timelines and require different types of information, making integrated incident‑response governance essential.

From a data‑protection perspective, AI systems processing personal data must also comply with GDPR’s requirements for data protection by design and by default. Spanish supervisory practice emphasises that technical measures addressing AI‑specific risks – such as inference of sensitive attributes or re‑identification through model outputs – are central to compliance. Overall, the AI Act, CRA, and GDPR together create a layered compliance architecture that requires co-ordinated governance rather than siloed implementation.

Healthcare occupies a distinctive position within the cybersecurity regulatory landscape – not because it is governed by fundamentally different legal instruments, but because the consequences of cybersecurity failures are uniquely severe. In this sector, cyber incidents directly affect patient safety, clinical continuity and the delivery of essential public services. Disruptions that might be primarily economic in other industries can, in healthcare, lead to delayed treatment, compromised clinical decision‑making and risks to life. This reality increasingly shapes both EU‑level and Spanish regulatory approaches.

At EU level, the European Commission’s Action Plan on the Cybersecurity of Hospitals and Healthcare Providers (January 2025) reflects a clear recognition that horizontal frameworks such as NIS2, CER and the GDPR require sector‑specific operational support to be effective in healthcare environments. The Action Plan prioritises prevention, detection, response and deterrence, and aligns closely with Cyber Solidarity mechanisms, which designate healthcare as a priority sector for EU‑level incident response support.

Healthcare as a Critical Entity

Hospitals and healthcare networks designated as critical entities under CER and Spain’s reformed critical infrastructure framework must follow an integrated resilience model that combines physical security, cybersecurity, organisational measures and supply‑chain resilience. Designation brings a governance shift: responsibility for resilience moves to the governing body, with accountability that cannot be delegated. This marks a departure from traditional approaches in which cybersecurity was treated as an IT function rather than a core governance and patient‑safety obligation.

NIS2 Implementation Challenges in Healthcare

Healthcare providers qualifying as essential entities under NIS2 face sector‑specific constraints. Many clinical systems operate on legacy platforms that cannot easily support modern security controls such as multi‑factor authentication or automated patch management. While these constraints do not reduce regulatory obligations, they significantly influence how compliance must be achieved. Compensating controls – such as network segmentation, enhanced monitoring, and accelerated replacement planning – therefore become central. Incident classification under NIS2 also has a distinct clinical dimension: any incident affecting the availability of clinical systems or the integrity of patient records is presumptively significant because of the potential for patient harm.

Connected Medical Devices and the CRA Interface

A particularly complex issue for healthcare organisations is the interaction between the Cyber Resilience Act and connected medical devices. As a general rule, devices governed by the Medical Devices Regulation (MDR) or the In Vitro Diagnostic Medical Devices Regulation (IVDR) may fall outside the CRA where equivalent cybersecurity requirements already apply. However, equivalence is not automatic. While MDR and IVDR incorporate cybersecurity into clinical safety, the CRA introduces additional, standalone life cycle obligations – including co-ordinated vulnerability disclosure, defined security‑update support periods and active incident reporting. Until further clarification through delegated acts, manufacturers and healthcare procurers must navigate a grey area in which MDR/IVDR compliance does not necessarily satisfy all CRA‑relevant requirements.

Procurement and Life Cycle Risk

Regardless of formal applicability, the CRA is already shaping healthcare procurement practices. Hospitals increasingly expect clear commitments regarding security‑update support, vulnerability‑management processes and product‑roadmap alignment with CRA expectations. Devices lacking defined support periods pose medium‑term operational and clinical risks, particularly in healthcare environments where equipment life cycles extend far beyond those of typical consumer technology.

Health‑Data Protection Overlay

Health data constitutes special‑category personal data under the GDPR, triggering the highest level of security and accountability obligations. In Spain, these are further reinforced by the ENS for public healthcare systems and by mandatory data‑protection impact assessments (DPIAs) for significant clinical and AI‑enabled systems. Supervisory practice confirms that DPIAs must be substantive and risk‑focused; generic or superficial assessments are treated as compliance failures in their own right.

Parallel Notification Complexity

Healthcare entities face one of the most demanding regulatory notification landscapes across any sector. A single cyber incident may trigger NIS2 notification within 24 hours, CER notification for designated critical entities and GDPR personal‑data breach notification within 72 hours. Managing these simultaneous obligations during an active clinical incident – when systems may be degraded and staff may be operating manually – requires integrated incident‑response planning that includes clinical leadership alongside legal and cybersecurity teams. Under the current regulatory framework, such integration is not merely best practice; it is essential for both compliance and patient safety.

Deloitte Legal (Deloitte Abogados y Asesores Tributarios, S.L.U.)

Plaza Pablo Ruiz Picasso 1
28020 Madrid
Spain

+34 915 145 000

rgonzalezruiz@deloitte.es www2.deloitte.com/es
Author Business Card

Trends and Developments


Authors



Deloitte Legal has a digital law department that integrates a first-class legal team, experienced in sophisticated privacy matters, with strategy, process, technology, and risk consultants. This synergy provides a broad, practical perspective to address clients’ challenges in an increasingly complex regulatory and business landscape, supporting both informed decision-making and seamless multidisciplinary implementation. Focused on digital transformation across diverse sectors and maturity levels, the firm’s cross-market view enables it to anticipate emerging needs and adapt proven solutions to new contexts. A core differentiator is its profound specialisation in digital regulation and comprehensive cybersecurity advisory. The firm expertly navigates the complex interplay of critical frameworks – including NIS 2, CER, CSA, CRA, and DORA. By bridging business, technology, and legal disciplines, it fosters a common language to deliver forward-looking, resilient, and highly practical solutions.

Spain in the Eye of the Regulatory Storm: Navigating the EU Cybersecurity Framework in 2026

Introduction: a defining moment for cybersecurity law

Spain enters 2026 at a critical inflection point in its cybersecurity regulatory journey. After years of building digital infrastructure and enacting sector-specific rules, the country now faces the full force of a sweeping European regulatory framework – simultaneously and, in several respects, before its own national implementation is complete. The NIS 2 Directive, the Digital Operational Resilience Act (DORA), the Cyber Resilience Act (CRA), and the Critical Entities Resilience (CER) Directive are reshaping the legal obligations of thousands of organisations across virtually every sector of the Spanish economy.

This article analyses the principal trends and developments defining cybersecurity law in Spain as of early 2026. It examines the state of Spain’s transposition of NIS 2 and the political and institutional dynamics involved; the live application of DORA to the financial sector and its practical consequences; the coming obligations under the CRA as its first deadlines approach; the interaction between the new EU cybersecurity framework and the National Security Framework (Esquema Nacional de Seguridad, or ENS); the emerging liability of corporate boards for cybersecurity governance; and the potential impact of the European Commission’s Digital Omnibus package. Together, these developments constitute a structural shift that goes well beyond compliance – they represent a new legal and strategic paradigm for digital risk management in Spain.

Spain and NIS 2: still transposing, already binding

The NIS 2 Directive required EU member states to transpose its provisions into national law by 17 October 2024. Spain did not meet that deadline. As of the time of writing, the Draft Law on Cybersecurity Coordination and Governance (Preliminary Draft Bill on the Coordination and Governance of Cybersecurity), approved by the Council of Ministers in January 2025, has completed its public consultation phase but remains pending formal parliamentary adoption. Following infringement proceedings initiated by the European Commission in November 2024, the Spanish government has accorded urgent status to the draft, but an entry into force date in 2026 remains uncertain.

This situation creates a distinctive legal tension. While Spain lacks a fully transposed national NIS 2 law, the Directive itself is binding on EU member states from the date of expiry of the transposition deadline. National courts and regulators are expected to interpret existing Spanish law in conformity with the Directive where possible. Organisations in scope cannot use Spain’s legislative delay as a shield against compliance expectations; the substantive obligations of NIS 2 – risk management measures, incident reporting, supply-chain security, and management accountability – already frame the standard against which cybersecurity governance will be assessed.

When finally adopted, the Spanish law will introduce several features that go beyond the Directive’s minimum requirements. Most notably, it establishes the Centro Nacional de Ciberseguridad (CNCS) as a new, centralised supervisory authority attached to the Presidency of the government, exercising co-ordination powers over sector-specific authorities and over existing national bodies such as CCN-CERT (for the public sector) and INCIBE-CERT (for the private sector). This architectural choice – inspired by models like France’s ANSSI – signals an ambition for Spain to develop a genuinely integrated national cybersecurity governance structure.

The draft law also expands the scope of covered entities relative to the Directive’s baseline. In addition to the medium and large enterprises in the 18 sectors defined by NIS 2, Spain’s draft includes universities and research centres, large municipalities, private security companies, entities with a bearing on national defence, and foreign companies with a permanent establishment in Spain meeting certain operational criteria. This expansion is significant: whereas under the original NIS Directive Spain regulated fewer than 1,000 entities, the new regime is expected to bring approximately 12,000 organisations into scope.

Practical implications for organisations in Spain

For organisations that are, or are likely to be, classified as essential or important entities, the legislative delay offers a limited window of opportunity – not complacency. The substantive compliance programme required under NIS 2 is substantial: a documented risk management framework, multi-factor authentication, encryption of data in transit and at rest, business continuity planning, supply-chain security assessments, and a tested incident response capability. Management bodies – not just IT departments – are personally liable for approving and overseeing these measures under the Directive, and the Spanish draft preserves and reinforces this accountability.

The sanctions regime deserves particular attention. Essential entities face fines of up to EUR10 million or 2% of global annual turnover (whichever is higher). Important entities face fines of up to EUR7 million or 1.4% of turnover. Unlike the original NIS Directive, these figures are not theoretical: the new supervisory powers include on-site inspections, audits, and the ability to impose provisional measures including the suspension of relevant certifications or authorisations. The reputational dimension – publicly available supervisory decisions – adds an additional layer of incentive to treat compliance as a strategic priority rather than a technical exercise.

DORA in force: operational resilience becomes a legal standard

While Spain’s NIS 2 transposition is still in progress, the Digital Operational Resilience Act became fully applicable on 17 January 2025, without any national implementation required. As an EU Regulation rather than a Directive, DORA applies directly and uniformly across all member states, removing any ambiguity about its binding force in Spain.

DORA establishes a comprehensive framework for ICT risk management, incident classification and reporting, digital operational resilience testing, and – most distinctively – the management of ICT third-party risk, including for critical ICT third-party service providers (CTPPs). The scope covers banks, investment firms, payment institutions, insurance companies, crypto-asset service providers, and a broad range of other financial entities, many of which are headquartered or have significant operations in Spain.

The first year of DORA’s application has revealed several pressure points in the Spanish financial sector. The Register of Information – a detailed inventory of all ICT third-party contractual arrangements – proved particularly demanding, with many entities struggling to gather complete and accurate data from across complex corporate groups and supply chains. The April 2025 deadline for submission of the initial register to competent authorities – the Banco de España, the Comisión Nacional del Mercado de Valores, and the Dirección General de Seguros y Fondos de Pensiones, depending on the entity type – required a concentrated effort that exposed gaps in vendor management governance.

Supervisory focus in 2026 is shifting from implementation to verification. Spanish financial supervisors are conducting their first review cycles, examining whether the policies and procedures adopted in 2024 and 2025 reflect genuine operational practice or merely documentary compliance. Particular attention is being paid to the management of concentration risk in ICT third-party relationships – the risk that critical services are excessively dependent on a small number of providers – and to the adequacy of contractual clauses with ICT vendors, which DORA specifies in considerable detail.

The overlap between DORA and NIS 2

One source of practical complexity for Spanish organisations is the interaction between DORA and NIS 2. The European Commission published guidelines in September 2023 clarifying the relationship between the two frameworks: DORA applies as lex specialis to financial entities, effectively displacing many NIS 2 obligations for entities in the financial sector. However, this lex specialis relationship is not absolute. Financial entities that also operate digital infrastructure – for example, large banks running data centre or cloud services – may find themselves subject to both frameworks for different aspects of their operations.

The Digital Omnibus package proposed by the Commission in November 2025 seeks to address this complexity by introducing a single-entry point for incident reporting across NIS 2, DORA, GDPR, eIDAS, and the CER Directive. This “report once, share many” architecture would represent a significant simplification for organisations currently managing multiple, overlapping notification obligations with different timelines, formats, and recipients. However, the Omnibus remains in the early stages of the legislative procedure; its final form – and the timeline for its adoption – will depend on negotiations between the European Parliament and the Council of the EU.

The Cyber Resilience Act: product security comes of age

The Cyber Resilience Act entered into force on 10 December 2024 and introduces a product-focused dimension to EU cybersecurity regulation that was absent from the earlier NIS and GDPR frameworks. The CRA imposes mandatory cybersecurity requirements – including security-by-design, vulnerability management, and the maintenance of security updates – on manufacturers, importers, and distributors of products with digital elements.

The CRA’s main obligations will not become fully applicable until 11 December 2027, but two earlier deadlines matter now. Reporting obligations for actively exploited vulnerabilities and severe incidents apply from 11 September 2026 – a date that is already within the operational planning horizon of manufacturers who are bringing products to the EU market. From mid-December 2025, the European Commission adopted detailed technical descriptions for product categories under Classes I and II and Annex IV, giving manufacturers the information they need to determine whether their products require self-assessment or third-party conformity assessment by a Notified Body.

For Spanish companies – including the significant number that manufacture connected devices for industrial, health, and consumer applications – the CRA represents a paradigm shift. Cybersecurity is no longer a post-market consideration but a legal condition of market access. Supply-chain accountability extends throughout the product life cycle, from design through to end-of-life. Manufacturers who discover that a product they have placed on the market contains an unpatched vulnerability that poses a significant risk must notify ENISA and the relevant national authority, and must take corrective action – including, where necessary, product recalls.

Key considerations for Spanish manufacturers and importers

Organisations in Spain preparing for the CRA should focus on three immediate priorities. First, scope determination: the CRA applies to virtually all products with digital elements, with limited exceptions for products regulated by sector-specific rules such as medical devices or civil aviation equipment. Companies need to assess their product portfolio systematically against the regulatory categories and identify whether any products qualify as Class I or Class II important products (requiring either standard or enhanced conformity assessment) or as critical products under Annex IV (requiring third-party assessment by a Notified Body).

Second, governance and process integration: compliance with the CRA is not a one-time certification exercise. It requires the integration of cybersecurity into product development life cycles, the establishment of vulnerability disclosure and co-ordinated vulnerability management processes, and the contractual mapping of obligations across supply chains. Third, the interplay with existing legal frameworks – GDPR where the product processes personal data, NIS 2 where the manufacturer is itself a covered entity, and the AI Act where artificial intelligence is embedded in the product – requires an integrated legal strategy rather than a framework-by-framework approach.

The National Security Framework: a cornerstone of Spanish cybersecurity

While European regulation captures most of the headlines, the Esquema Nacional de Seguridad (ENS) remains an indispensable reference point for cybersecurity in Spain, particularly for public sector entities and private companies that provide services to public administrations. The ENS – updated by Royal Decree 311/2022 – establishes a comprehensive set of security requirements and certification categories applicable to information systems used by the public sector, with alignment to international standards including ISO/IEC 27001.

The relationship between the ENS and the incoming NIS 2 transposition law is an area of active regulatory development. Spain’s draft law explicitly recognises the ENS as a key compliance mechanism for public sector entities falling within NIS 2’s scope, effectively leveraging the existing national framework to meet European obligations. For private sector entities that are already ENS-certified as part of their public sector supply relationships, this creates a valuable compliance bridge – though one that does not eliminate the need for gap analysis against the specific risk management and incident reporting requirements of NIS 2.

In practice, many Spanish companies providing cloud computing, software, cybersecurity services, and managed services to public authorities are simultaneously managing ENS certification requirements, NIS 2 obligations (or preparations for them), and – if they serve financial sector clients – DORA-derived contractual requirements. This convergence of frameworks, while complex, also creates an opportunity for organisations that invest in integrated compliance architecture to compete more effectively for public and regulated-sector contracts.

Board liability and cybersecurity governance: the accountability revolution

One of the most consequential – and least discussed – aspects of the new EU cybersecurity framework is the explicit imposition of personal accountability on the management bodies of covered organisations. NIS 2 requires that management bodies not only approve cybersecurity risk management measures but actively oversee their implementation and bear personal liability for infringements attributable to their failure to do so. Spain’s draft transposition law preserves and, in some respects, reinforces this approach.

This is a structural change in how cybersecurity governance is conceived in Spanish corporate law. Previously, cybersecurity was predominantly a matter delegated to IT or information security functions, with board oversight limited to annual reporting or occasional briefings. The new framework treats cyber risk as a category of strategic business risk that demands the same level of board attention as financial risk or regulatory compliance in other domains. Management bodies must receive adequate training to understand and assess cybersecurity risks, must formally approve the organisation’s risk management measures, and must ensure that dedicated internal resources and processes exist to implement and maintain them.

The implications extend beyond regulatory compliance. In the event of a significant cyber incident, the quality of board-level governance – the existence and content of documented risk assessments, the records of board decisions and oversight activities, and the adequacy of investment in cybersecurity controls – will be scrutinised not only by supervisory authorities but potentially by shareholders, counterparties, and courts. Directors and senior managers who cannot demonstrate that they exercised their oversight responsibilities diligently face the risk of personal administrative sanctions, and, in the most serious cases, exposure to civil liability claims.

Spanish organisations are advised to review their corporate governance structures with specific reference to these obligations. Audit and risk committees should incorporate cybersecurity as a standing agenda item. Board members should receive structured briefings – documented to create an evidentiary record – on the organisation’s cyber risk profile, the controls in place, and the results of any required resilience testing. The Chief Information Security Officer (CISO), or equivalent function, should have a clear reporting line to the board or a designated board committee, not merely to the Chief Technology Officer or Chief Operating Officer.

The Digital Omnibus: simplification on the horizon

On 19 November 2025, the European Commission proposed the Digital Omnibus package, a legislative initiative designed to reduce the regulatory burden of the EU’s digital rulebook on businesses while preserving the substance of existing rights and obligations. For cybersecurity, the most significant element is a proposal to create a unified incident reporting entry point covering NIS 2, DORA, GDPR, eIDAS, and the CER Directive – a “report once, share many” system that would eliminate the need for organisations to file separate notifications to different authorities under different timelines and formats.

The Omnibus also introduces targeted amendments to NIS 2, including simplifications to jurisdictional rules for cross-border entities and a reinforced co-ordination role for ENISA. On data protection, it proposes adjustments to the GDPR and, significantly, proposes migrating the rules on terminal equipment access from the ePrivacy Directive to the GDPR – a long-awaited reform that would harmonise the legal basis for cookie consent and device access across EU member states. For AI, the Omnibus proposes to defer the application of high-risk AI obligations by up to 16 months, linking compliance timelines to the availability of supporting harmonised standards.

The Omnibus remains in the early stages of the ordinary legislative procedure. It must pass through the European Parliament and the Council, where it is likely to face significant scrutiny and amendment, particularly on GDPR provisions where the European Data Protection Board and the European Data Protection Supervisor have expressed concerns. Spanish organisations should monitor its progress, but they should not treat the prospect of simplification as a reason to pause their compliance programmes. The core obligations of NIS 2, DORA, and the CRA are not subject to negotiation within the Omnibus; what may change is the administrative architecture around reporting and supervisory co-ordination.

Convergence with artificial intelligence regulation

The intersection of cybersecurity and artificial intelligence regulation is emerging as one of the most technically demanding areas of practice in Spanish digital law. The EU AI Act, which entered into force in August 2024 and is progressively rolling out its obligations, directly interacts with the cybersecurity framework in several respects. High-risk AI systems – covering areas such as critical infrastructure management, employment decisions, and law enforcement tools – must meet cybersecurity robustness requirements as part of their conformity assessment. AI systems embedded in products with digital elements are also subject to CRA obligations.

For operators of AI systems used in sectors covered by NIS 2 – energy, health, transport, and digital infrastructure – there is a dual compliance obligation: meeting the AI Act’s requirements for the AI system itself while ensuring that the broader ICT environment in which it operates meets NIS 2 risk management standards. The interaction is particularly complex where AI systems are used for cybersecurity purposes – such as anomaly detection, threat intelligence, or automated incident response – since these systems are both tools of compliance and potential objects of cybersecurity risk in their own right.

Spain’s National Cybersecurity Forum (Foro Nacional de Ciberseguridad) – in which Deloitte Legal has actively participated – has identified AI governance as a priority theme for 2026, reflecting the growing recognition that organisations need integrated frameworks for managing AI-related cyber risk that are coherent with their NIS 2 and DORA compliance programmes. Regulatory sandboxes provided for under the AI Act offer an opportunity for Spanish companies to test AI-based security tools in a supervised environment, potentially accelerating innovation while managing regulatory risk.

Supply-chain security: the hidden compliance frontier

Supply-chain security has become one of the most operationally complex aspects of the new cybersecurity framework. NIS 2 explicitly requires essential and important entities to address cybersecurity risks in their supply chains and vendor relationships, including by assessing the security practices of their direct suppliers and service providers. DORA goes further, imposing detailed contractual requirements on ICT third-party arrangements for financial entities and establishing a supervisory framework for critical ICT third-party providers at EU level.

In practice, this means that cybersecurity compliance is no longer confined to the internal perimeter of an organisation. It extends upstream to technology vendors, cloud providers, software developers, and managed service providers – and, in many cases, requires these suppliers to demonstrate their own compliance with relevant frameworks as a condition of maintaining commercial relationships. Spanish organisations in the financial sector have experienced this most acutely under DORA, where the Register of Information exercise revealed the extent and complexity of ICT supply chains that had not previously been mapped with legal rigour.

The CRA adds a product-focused dimension to supply-chain security by imposing obligations on manufacturers to document and assess the cybersecurity of components incorporated into their products with digital elements, including open-source software components. This is generating significant discussion in the software industry, where the widespread use of open-source components – including commercially embedded and OEM offerings – creates complex questions about responsibility for vulnerability disclosure and patching across distributed development communities.

Organisations navigating supply-chain security obligations in Spain should invest in three capabilities: comprehensive supplier mapping (including sub-processors and sub-contractors where relevant), contractual frameworks that embed cybersecurity requirements and audit rights, and ongoing monitoring processes that can identify and respond to emerging risks in the supply chain on a continuous basis rather than at annual review points.

Conclusion: from compliance to resilience strategy

The cybersecurity regulatory landscape facing Spanish organisations in 2026 is more demanding, more interconnected, and more strategically consequential than at any previous point. NIS 2, DORA, the CRA, and the ENS are not parallel tracks to be managed separately by different functions within an organisation. They are components of a single, integrated European regulatory architecture designed to shift the culture of cybersecurity – from a technical discipline managed in the background to a strategic governance priority managed at the highest organisational levels.

Spain’s delayed NIS 2 transposition creates short-term legal uncertainty but does not reduce the compliance obligations of organisations in scope. If anything, it increases the risk of a compressed implementation timeline once the law is adopted, with regulatory expectations and enforcement activity arriving in close succession. The organisations that will be best positioned – legally, operationally, and reputationally – are those that have used the transposition period to build genuine cybersecurity capabilities rather than waiting for the final text to initiate their programmes.

The convergence of cybersecurity, data protection, and AI regulation also demands a different kind of legal advisory model – one that combines deep regulatory expertise with operational insight and technological literacy. The questions that organisations face in 2026 are not, in the main, questions of legal interpretation. They are questions of implementation: how to govern AI systems securely, how to manage vendor risk at scale, how to demonstrate board accountability in a credible and documented way, and how to build incident response capabilities that work under pressure and satisfy regulatory reporting timelines simultaneously. Addressing these questions effectively is the defining professional challenge of this generation of cybersecurity lawyers in Spain.

Deloitte Legal (Deloitte Abogados y Asesores Tributarios, S.L.U.)

Plaza Pablo Ruiz Picasso 1
28020 Madrid
Spain

+34 915 145 000

rgonzalezruiz@deloitte.es www2.deloitte.com/es
Author Business Card

Law and Practice

Authors



Deloitte Legal has a digital law department that integrates a first-class legal team, experienced in sophisticated privacy matters, with strategy, process, technology, and risk consultants. This synergy provides a broad, practical perspective to address clients’ challenges in an increasingly complex regulatory and business landscape, supporting both informed decision-making and seamless multidisciplinary implementation. Focused on digital transformation across diverse sectors and maturity levels, the firm’s cross-market view enables it to anticipate emerging needs and adapt proven solutions to new contexts. A core differentiator is its profound specialisation in digital regulation and comprehensive cybersecurity advisory. The firm expertly navigates the complex interplay of critical frameworks – including NIS 2, CER, CSA, CRA, and DORA. By bridging business, technology, and legal disciplines, it fosters a common language to deliver forward-looking, resilient, and highly practical solutions.

Trends and Developments

Authors



Deloitte Legal has a digital law department that integrates a first-class legal team, experienced in sophisticated privacy matters, with strategy, process, technology, and risk consultants. This synergy provides a broad, practical perspective to address clients’ challenges in an increasingly complex regulatory and business landscape, supporting both informed decision-making and seamless multidisciplinary implementation. Focused on digital transformation across diverse sectors and maturity levels, the firm’s cross-market view enables it to anticipate emerging needs and adapt proven solutions to new contexts. A core differentiator is its profound specialisation in digital regulation and comprehensive cybersecurity advisory. The firm expertly navigates the complex interplay of critical frameworks – including NIS 2, CER, CSA, CRA, and DORA. By bridging business, technology, and legal disciplines, it fosters a common language to deliver forward-looking, resilient, and highly practical solutions.

Compare law and practice by selecting locations and topic(s)

{{searchBoxHeader}}

Select Topic(s)

loading ...
{{topic.title}}

Please select at least one chapter and one topic to use the compare functionality.