NCSI FULFILMENT PERCENTAGE
Version 25 May 2023
GENERAL CYBER SECURITY INDICATORS
-
1. Cyber security policy development 5/7 71%57 71%
-
1.1. Cyber security policy unit 333
Requirements
CriteriaA central government entity (ministry or equivalent) has a specialised official or unit responsible for national cyber security policy development.
Accepted referencesOfficial website or legal act
Evidence
https://www.bk.admin.ch/bk/en/home/digitale-transformation-ikt-lenkung.html
The Digital Transformation and ICT Steering Sector DTI
"The Digital Transformation and ICT Steering Sector DTI took up its work at the Federal Chancellery on 1 January 2021. The DTI assumes the tasks of
- the former Federal IT Steering Unit,
- the Digital Switzerland unit at the Federal Office of Communications, and
- the GEVER Bund unit at the Federal Chancellery."
https://www.fedlex.admin.ch/eli/cc/2020/988/de
Digital Transformation and Computer Science Regulation , VDTI, link above, see Article 17 (1a).
-
1.2. Cyber security policy coordination format 002
Requirements
CriteriaThe central government has a committee, council, working group, etc. for national-level cyber security policy coordination.
Accepted referencesOfficial website or legal act
Evidence
-
1.3. Cyber security strategy 111
Requirements
CriteriaThe central government has established a national-level cyber security strategy or other equivalent document.
Accepted referencesValid official document
Evidence
https://www.ncsc.admin.ch/ncsc/en/home/strategie/cyberstrategie-ncs.html
National Cyberstrategy (NCS) – 2023 (NB! The strategy has to downladed separately as a PDF document).
-
1.4. Cyber security strategy implementation plan 111
Requirements
CriteriaThe central government has established an implementation plan to the national-level cyber security strategy or other equivalent document.
Accepted referencesValid official document or its enforcement act
Evidence
https://www.ncsc.admin.ch/ncsc/en/home/strategie/cyberstrategie-ncs.html
National Cyberstrategy (NCS) – 2023 (NB! The strategy has to downladed separately as a PDF document), see page 34 – Implementation of the strategy.
"Implementation of the strategy will be coordinated by the NCS Steering Committee, which is responsible for drawing up an implementation plan. The plan will be drawn up in direct consultation with the key actors involved in the individual measures. These actors will be the Steering Committee's contact points for implementation of the relevant measures. They will explain to the Steering Committee what contribution they can make and by when. They will also update it on the status of the activities. If they are unable to implement measures assigned to them, this must be indicated. The Steering Committee will then assess the consequences of this for the strategy objectives and, if necessary, inform the Federal Council and the cantons of these consequences via the NCSC, which acts as its office. The implementation work will generally be financed by the key actors themselves. The Confederation actors will use the resources allocated to them for the implementation of the first two cyberstrategies. The cantons and business community and society organisations will indicate to the Steering Committee what contributions to the implementation of the measures they can fund themselves. The NCSC will assist the key actors with the implementation, providing a pool of experts for this purpose. Key actors in the Federal Administration can apply to the NCSC for assistance with the NCS implementation from the pool of experts. If the resources required for a measure exceed the available funds of the actors involved and this requirement cannot be met in any other way, this must also be indicated to the Steering Committee. The Steering Committee is responsible for verifying implementation. As the Steering Committee's operational office, the NCSC will regularly survey and document the implementation status of all measures. The strategy itself and its implementation will be reviewed after five years. Based on the results of this review, the Steering Committee will decide whether to apply to the cantons and the Confederation for a complete revision of the strategy or whether to make individual additions and changes in order to continue with the existing strategy" (p. 34).
-
-
2. Cyber threat analysis and information 5/5 100%55 100%
-
2.1. Cyber threats analysis unit 333
Requirements
CriteriaA central government entity has a national-level unit that is specialised in national strategic cyber threat situation analysis.
Accepted referencesOfficial website or legal act
Evidence
https://www.ncsc.admin.ch/ncsc/en/home/ueber-ncsc/das-ncsc.html
The Reporting and Analysis Centre for Information Assurance (MELANI), together with the national Computer Emergency Response Team (GovCERT) are integrated into the National Cybersecurity Centre.
https://www.fedlex.admin.ch/eli/cc/2020/416/en
Ordinance on Protection against Cyber Risks in the Federal Administration (Cyber Risks Ordinance, CyRV), link above, see Article 12.
https://www.fedlex.admin.ch/eli/cc/2020/416/en
Ordinance on Protection against Cyber Risks in the Federal Administration (Cyber Risks Ordinance, CyRV), link above, Cyber Core Group, Article 8 (4).
-
2.2. Public cyber threat reports are published annually 111
Requirements
CriteriaThe public part of the national cyber threat situation analysis is published at least once a year.
Accepted referencesOfficial public report
Evidence
https://www.ncsc.admin.ch/ncsc/en/home/dokumentation/berichte.html
"The National Cyber Security Centre publishes its semi-annual situational report “Information Assurance: the situation in Switzerland and internationally” and technical reports."
https://www.ncsc.admin.ch/ncsc/en/home/dokumentation/berichte/lageberichte.html
The situation reports can be accessed with the link above.
-
2.3. Cyber safety and security website 111
Requirements
CriteriaPublic authorities provide at least one cyber safety and security website for cyber security and ICT professionals, and regular users.
Accepted referencesWebsite
Evidence
https://www.ncsc.admin.ch/ncsc/en/home.html
National Cybersecurity Centre (NCSC) – Information for Individuals and IT specialists.
GovCERT – provides technical information about cyber attacks (e.g. malware analysis, reverse engineering, statistics etc.).
-
-
3. Education and professional development 9/9 100%99 100%
-
3.1. Cyber safety competencies in primary or secondary education 111
Requirements
CriteriaPrimary or secondary education curricula include cyber safety / computer safety competences.
Accepted referencesOfficial curriculum or official report
Evidence
https://op.europa.eu/en/publication-detail/-/publication/c2fcfd3c-438e-11ed-92ed-01aa75ed71a1
Informatics education at school in Europe, Eurydice report (2022), link above, p. 53, Safety and security, Area 10: Safety and security, Switzerland (country code “CH”) has it for all levels, i.e., primary & secondary education.
The cantons are responsible for compulsory education of eleven years. Harmonisation of the curricula is organized on the level of the linguistic regions.
- French-speaking cantons foresee digital education in the “Plan d’études romand"
- German-speaking and multilingual cantons foresee media and informatics education in the “Lehrplan 21“ (click here to access the general website of "Lehrplan 21")
- The Italian-speaking canton Ticino foresees administration and ICT education in the “Piano di studio“.
-
3.2. Bachelor’s level cyber security programme 222
Requirements
CriteriaThere is at least one cyber security / electronic information security focused programme at Bachelor’s or equivalent level.
Accepted referencesAccredited study programme
Evidence
https://www.hslu.ch/de-ch/informatik/studium/bachelor/information-and-cyber-security/
Lucerne University of Applied Sciences and Arts, Bachelor in Information & Cyber Security
https://www.ffhs.ch/de/bachelor/bsc-cyber-security
Swiss Distance University of Applied Sciences (Fernfachhochschule Schweiz – FFHS), BSc Cyber Security
-
3.3. Master’s level cyber security programme 222
Requirements
CriteriaThere is at least one cyber security / electronic information security focused programme at Master’s or equivalent level.
Accepted referencesAccredited study programme
Evidence
https://www.epfl.ch/schools/ic/education/master/cyber-security/
École polytechnique fédérale de Lausanne (EPFL), Master in Cyber Security
https://ethz.ch/en/studies/master/degree-programmes/engineering-sciences/cyber-security.html
Eidgenössische Technische Hochschule Zürich (ETH Zürich), Master Cyber Security
https://www.bfh.ch/de/weiterbildung/mas/cyber-security/
Berner Fachhochschule (BFH) / Haute école spécialisée bernoise (HESB) / Bern University of Applied Sciences (BUAS), MAS Cyber Security
-
3.4. PhD level cyber security programme 222
Requirements
CriteriaThere is at least one cyber security / electronic information security focused programme at PhD or equivalent level.
Accepted referencesAccredited study programme
-
3.5. Cyber security professional association 222
Requirements
CriteriaThere is a professional association of cyber/electronic information security specialists, managers or auditors.
Accepted referencesWebsite
Evidence
-
-
4. Contribution to global cyber security 5/6 83%56 83%
-
4.1. Convention on Cybercrime 111
Requirements
CriteriaThe country has ratified the Convention on Cybercrime.
Accepted referencesOfficial website of the convention
Evidence
https://www.coe.int/en/web/conventions/full-list?module=signatures-by-treaty&treatynum=185
Entry into force: 01/01/2012
-
4.2. Representation in international cooperation formats 111
Requirements
CriteriaThe government is regularly represented in a cooperation format that is dedicated to international cyber security (e.g. FIRST).
Accepted referencesOfficial website of the cooperation format
Evidence
https://www.first.org/members/teams/#switzerland
http://www.egc-group.org/contact.html
The EGC group forms an informal association of governmental CERTs in Europe. Its members effectively co-operate on matters of incident response by building upon a fundament of mutual trust and understanding due to similarities in constituencies and problem sets.
https://www.trusted-introducer.org/directory/teams/govcertch.html
The Trusted Introducer Service forms the trusted backbone of infrastructure services and serves as clearinghouse for all security and incident response teams.
-
4.3. International cyber security organisation hosted by the country 333
Requirements
CriteriaA regional or international cyber security organisation is hosted by the country.
Accepted referencesOrganisation’s official website
Evidence
https://centres.weforum.org/centre-for-cybersecurity/home
World Economic Forum Global Centre for Cybersecurity is based in Geneva, Switzerland
https://www.gcsp.ch/topics/cyber-security
Cyber Security Cluster of the Geneva Centre for Security Policy
https://cyberpeaceinstitute.org
CyberPeace Institute
-
4.4. Cyber security capacity building for other countries 001
Requirements
CriteriaThe country has (co-)financed or (co-)organised at least one capacity building project for another country in the last 3 years.
Accepted referencesOfficial website or project document
Evidence
-
BASELINE CYBER SECURITY INDICATORS
-
5. Protection of digital services 0/5 0%05 0%
-
5.1. Cyber security responsibility for digital service providers 001
Requirements
CriteriaAccording to legislation, digital service providers (except micro and small enterprises): (1) must manage cyber/ICT risks or (2) must implement established cyber/information security requirements.
Accepted referencesLegal act
Evidence
-
5.2. Cyber security standard for the public sector 001
Requirements
CriteriaPublic sector digital service providers must implement (1) cyber/ICT security requirements (defined by legislation) or (2) a widely recognised security standard.
Accepted referencesLegal act
Evidence
-
5.3. Competent supervisory authority 003
Requirements
CriteriaThe government has a competent authority in the field of cyber/information security that has the power to supervise public and private digital service providers regarding the implementation of cyber/information security requirements.
Accepted referencesOfficial website or legal act
Evidence
-
-
6. Protection of essential services 4/6 67%46 67%
-
6.1. Operators of essential services are identified 111
Requirements
CriteriaThere is a legal act that allows to identify operators of essential services.
Accepted referencesLegal act
Evidence
https://www.fedlex.admin.ch/eli/cc/2020/887/de
Population and Civil Protection Act, BZG, Article 8
https://www.fedlex.admin.ch/eli/fga/2018/112/de
National Critical Infrastructure Protection (CIP) Strategy 2018-2022
Pages 511-512: The spectrum of critical infrastructures includes the following sectors and subsectors: public authorities, energy, waste management, finance, health, information and communication, food, public safety, transport.
-
6.2. Cyber security requirements for operators of essential services 001
Requirements
CriteriaAccording to the legislation, operators of essential services must manage cyber/ICT risks.
Accepted referencesLegal act
Evidence
-
6.3. Competent supervisory authority 333
Requirements
CriteriaThe government has a competent authority in the field of cyber/information security that has the power to supervise operators of essential services, regarding cyber/information security requirements.
Accepted referencesOfficial website or legal act
Evidence
https://www.babs.admin.ch/en/aufgabenbabs/ski.html
Federal Office for Civil Protection
-
6.4. Regular monitoring of security measures 001
Requirements
CriteriaOperators of essential services must regularly (at least once every 3 years) provide evidence of the effective implementation of cyber/information security policies (e.g. audit result, documentation, specific report).
Accepted referencesLegal act
Evidence
-
-
7. E-identification and trust services 7/9 78%79 78%
-
7.1. Unique persistent identifier 111
Requirements
CriteriaThe government provides a unique persistent identifier to all citizens, residents, and legal entities. For example, the identifier remains the same after document expiration and name change.
Accepted referencesLegal act
Evidence
https://www.bsv.admin.ch/bsv/de/home/sozialversicherungen/ahv/grundlagen-gesetze/ahv-nummer.html
AHV-number, Social Security Number ("Sozialversicherungsnummer")
- See also ordinance on old-age and survivors' insurance (Verordnung über die Alters- und Hinterlassenenversicherung, AHVV), Articles 133, 134.
- FAQ page of the Sozialversicherungsnummer.ch
- Additional information concerning the AHVV
https://www.fedlex.admin.ch/eli/cc/2010/705/de
Tax identification number for entities („Unternehmens-Identifikationsnummer“ (UID-number), Swiss Federal Act on the UID, link above.
“The UID-number has been introduced in 2011. It is a unique identification number that is centralized at the federal level and used not only in tax matters, but also for other purposes (i.e. as trade register number, for custom purposes). Its legal basis is the Swiss Federal Act on the UID dated 18 June 2010 (UIDG for its acronym in German [SR 431.03]) as well as the respective Swiss Ordinance on the UID dated 26 January 2011 (UIDV for its acronym in German [SR 431.031]).” Cited source can be accessed here. -
7.2. Requirements for cryptosystems 001
Requirements
CriteriaRequirements for cryptosystems in the field of trust services are regulated.
Accepted referencesLegal act
Evidence
-
7.3. Electronic identification 001
Requirements
CriteriaElectronic identification is regulated.
Accepted referencesLegal act
Evidence
-
7.4. Electronic signature 111
Requirements
CriteriaE-signature is regulated
Accepted referencesLegal act
Evidence
https://www.fedlex.admin.ch/eli/cc/2016/752/de
SCSE Federal Act of 18 March 2016 on certification services in the area of the electronic signature and other digital certificate applications (RS 943.03), link above.
-
7.5. Timestamping 111
Requirements
CriteriaTimestamping is regulated.
Accepted referencesLegal act
Evidence
https://www.fedlex.admin.ch/eli/cc/2016/752/de
SCSE Federal Act of 18 March 2016 on certification services in the area of the electronic signature and other digital certificate applications (RS 943.03), link above, see for example Articles 2 (i-j) and 13.
-
7.6. Electronic registered delivery service 111
Requirements
CriteriaElectronic registered delivery service between state entities, citizens and private sector entities is regulated. The service provides legally binding data exchange and guarantees the confidentiality and integrity of information.
Accepted referencesLegal act
Evidence
https://www.bj.admin.ch/bj/de/home/staat/rechtsinformatik/e-uebermittlung.html
Overview of requirements and regulations for electronic transmission and delivery platforms.
https://www.fedlex.admin.ch/eli/cc/2014/523/de
Ordinance on the recognition of platforms for secure delivery in the context of legal proceedings
https://www.fedlex.admin.ch/eli/cc/2011/101/de
Ordinance on electronic transmission in the area of debt collection
-
7.7. Competent supervisory authority 333
Requirements
CriteriaThere is an authority responsible for the supervision of qualified trust service providers.
Accepted referencesOfficial website or legal act
Evidence
https://www.fedlex.admin.ch/eli/cc/2016/752/de
SCSE Federal Act of 18 March 2016 on certification services in the area of the electronic signature and other digital certificate applications (RS 943.03), link above, Article 15.
-
-
8. Protection of personal data 4/4 100%44 100%
-
8.1. Personal data protection legislation 111
Requirements
CriteriaThere is a legal act for personal data protection.
Accepted referencesLegal act
Evidence
https://www.admin.ch/opc/en/classified-compilation/19920153/
Federal Act on Data Protection
-
8.2. Personal data protection authority 333
Requirements
CriteriaThere is an independent public supervisory authority that is responsible for personal data protection.
Accepted referencesOfficial website or legal act
Evidence
https://www.edoeb.admin.ch/edoeb/en/home.html
Federal Data Protection and Information Commissioner (FDPIC)
-
INCIDENT AND CRISIS MANAGEMENT INDICATORS
-
9. Cyber incidents response 3/6 50%36 50%
-
9.1. Cyber incidents response unit 333
Requirements
CriteriaThe government has a unit (CSIRT, CERT, CIRT, etc.) that is specialised in national-level cyber incident detection and response.
Accepted referencesOfficial website or legal act
Evidence
GovCERT.ch is the Computer Emergency Response Team (GovCERT) of the Swiss government and the official national CERT of Switzerland. GovCERT.ch’s parent organisations is the National Cyber Security Centre (NCSC).
https://www.fedlex.admin.ch/eli/cc/2020/416/en
Ordinance on Protection against Cyber Risks in the Federal Administration (Cyber Risks Ordinance, CyRV), link above, see Article 12 (c).
-
9.2. Reporting responsibility 001
Requirements
CriteriaDigital service providers and operators of essential services have an obligation to notify appointed government authorities of cyber security incidents.
Accepted referencesLegal act
Evidence
-
9.3. Single point of contact for international coordination 002
Requirements
CriteriaThe government has designated a single point of contact for international cyber security coordination.
Accepted referencesOfficial website or legal act
Evidence
-
-
10. Cyber crisis management 1/5 20%15 20%
-
10.1. Cyber crisis management plan 001
Requirements
CriteriaThe government has established a crisis management plan for large-scale cyber incidents.
Accepted referencesLegal act
Evidence
-
10.2. National-level cyber crisis management exercise 002
Requirements
CriteriaThe government has conducted a national-level cyber crisis management exercise or a crisis management exercise with a cyber component in the last 3 years.
Accepted referencesExercise document/website or press release
Evidence
-
10.3. Participation in international cyber crisis exercises 111
Requirements
CriteriaThe country's team has participated in an international cyber crisis management exercise in the last 3 years.
Accepted referencesExercise document/website or press release
Evidence
ENISA Cyber Europe 2022. “In total, 918 participants (planners, players and monitors)1 officially registered for the exercise, representing the 27 EU Member States, 2 EFTA countries (Norway and Switzerland) and several EU institutions (…)” Cited source can be accessed here (Cyber Europe 2022: After Action Report).
KSÖ simulation game (2021), see page 109 of the Austrian Cyber Security Report for 2021 (NB! The document will be automatically downloaded as a PDF document).
https://www.cisa.gov/cyber-storm-securing-cyber-space
Cyber Storm 2020 – Switzerland's participation can be confirmed in the Cyber Storm 2020 After Action Report.
-
10.4. Operational support of volunteers in cyber crises 001
Requirements
CriteriaThe procedures for using volunteers in the field of cyber security are established by legislation.
Accepted referencesLegal act
Evidence
-
-
11. Fight against cybercrime 9/9 100%99 100%
-
11.1. Cybercrimes are criminalised 111
Requirements
CriteriaCybercrimes are defined by legislation.
Accepted referencesLegal act
Evidence
Swiss Criminal Code, see Articles 143bis, 144bis, 147bis, 251, 197.
-
11.2. Cybercrime unit 333
Requirements
CriteriaThere is a government entity with a specific function of combatting cybercrime.
Accepted referencesOfficial website or legal act
Evidence
https://www.coe.int/en/web/octopus/-/switzerland
- "Federal Office of Police fedpol: responsible for combating cybercrime, detecting offences committed on the Internet, prosecuting serious cross-border crimes, coordinating and supporting investigation procedures on both national and international levels.
- Swiss Coordination Centre Against Cybercrime («Koordinationssstelle zur Bekämpfung der Internetkriminalität», KOBIK): an institution operated jointly by the Swiss Government and the Cantons. It serves, among other things, as a national contact centre for people who want to report suspicious internet content. After checking the content, KOBIK forwards the relevant reports to the respective law enforcements in Switzerland or abroad. KOBIK also actively searches for criminally relevant content on the Internet.
- (...)
- Zurich Cantonal Police Cybercrime Division: investigates cybercrime and operates a centre of cybercrime competence. Cantonal Police Berne: a specialised unit coordinates and conducts investigations in the field of cybercrime." Source: CoE, Switzerland (country wiki), link above.
https://www.fedpol.admin.ch/fedpol/de/home/polizei-zusammenarbeit/national/zusammenarbeit_von.html
The Federal Office of Police has coordination offices that coordinate certain cross-border topics for police work in the cantons, such as the fight against cybercrime.
-
11.3. Digital forensics unit 333
Requirements
CriteriaThere is a government entity with a specific function of digital forensics.
Accepted referencesOfficial website or legal act
Evidence
At the regional police level – see list of recognised anti-cybercrime services including digital forensics, link above.
-
11.4. 24/7 contact point for international cybercrime 222
Requirements
CriteriaThe government has designated an international 24/7 contact point for cybercrimes.
Accepted referencesOfficial website or legal act
Evidence
https://rm.coe.int/cyber-list-of-competent-authorities-september-2021/1680a3aaae
Operations Center Fedpol
-
-
12. Military cyber operations 6/6 100%66 100%
-
12.1. Cyber operations unit 333
Requirements
CriteriaMilitary forces have a unit (cyber command, etc.) that is specialised in planning and conducting cyber operations.
Accepted referencesOfficial website or legal act
Evidence
https://www.vtg.admin.ch/de/organisation/fub/kdo-cyber.html
Armed Forces Command Support Organisation (AFCSO). NB! Since May 2021, the Project Commando Cyber is being set up as the successor organisation to the AFCSO.
For more information about the upcoming Commando Cyber see also:
- Federal Department of Defence, Civil Protection and Sport, Commando Cyber (Kdo Cy), (2022)
- Federal Department of Defence, Civil Protection and Sport, Cyber command and electronic service booklet: Various innovations for the army put into effect, (2022)
- Federal Department of Defence, Civil Protection and Sport, Federal Council decides to form a cyber battalion, (2022)
-
12.2. Cyber operations exercise 222
Requirements
CriteriaMilitary forces have conducted a cyber operations exercise or an exercise with a cyber operations component in the country in the last 3 years.
Accepted referencesExercise document/website or press release
Evidence
The military exercise PILUM 22 also had a cyber component, link above, see page 8. (Official press release)
-
12.3. Participation in international cyber exercises 111
Requirements
CriteriaThe country's military team has participated in an international cyber operations exercise in the last 3 years.
Accepted referencesExercise document/website or press release
Evidence
https://www.admin.ch/gov/de/start/dokumentation/medienmitteilungen.msg-id-94100.html
https://act.nato.int/articles/exercise-cyber-coalition-2022-concludes-estonia
NATO Cyber Coalition 2022 cyber defence exercise
Additional exercises:
-
Information Disclaimer
The information provided on the NCSI website is based on publicly available evidence materials. The appearance in the index and subsequent ranking is commensurate to the existence and public availability of such information. The NCSI links to third party websites and information. The NCSI and eGA are not responsible for the accuracy or completeness of third party website information.
What can I do to improve my country's data in NCSI?
Become a data contributor Update a specific indicator with evidence data
CONTRIBUTORS
Reporting and Analysis Centre for Information Assurance Switzerland MELANI
Intern at e-Governance Academy