NCSI FULFILMENT PERCENTAGE
Version 10 Aug 2023
GENERAL CYBER SECURITY INDICATORS
-
1. Cyber security policy development 7/7 100%77 100%
-
1.1. Cyber security policy unit 333
Requirements
CriteriaA central government entity (ministry or equivalent) has a specialised official or unit responsible for national cyber security policy development.
Accepted referencesOfficial website or legal act
Evidence
https://nukib.cz/en/about-nukib/about-the-agency/
The National Cyber and Information Security Agency (NÚKIB)
-
1.2. Cyber security policy coordination format 222
Requirements
CriteriaThe central government has a committee, council, working group, etc. for national-level cyber security policy coordination.
Accepted referencesOfficial website or legal act
Evidence
https://www.govcert.cz/en/csc/cyber-security-council/
Cyber Security Council
Cyber Security Committee, see Statue.
-
1.3. Cyber security strategy 111
Requirements
CriteriaThe central government has established a national-level cyber security strategy or other equivalent document.
Accepted referencesValid official document
Evidence
https://nukib.cz/en/cyber-security/strategy-action-plan/
National Cybersecurity Strategy 2021-2025. NB! The document needs to be separately downloaded as a PDF document.
-
1.4. Cyber security strategy implementation plan 111
Requirements
CriteriaThe central government has established an implementation plan to the national-level cyber security strategy or other equivalent document.
Accepted referencesValid official document or its enforcement act
Evidence
https://nukib.cz/en/cyber-security/strategy-action-plan/
Action Plan for the National Cybersecurity Strategy 2021-2025. NB! The document needs to be separately downloaded as a PDF document.
-
-
2. Cyber threat analysis and information 5/5 100%55 100%
-
2.1. Cyber threats analysis unit 333
Requirements
CriteriaA central government entity has a national-level unit that is specialised in national strategic cyber threat situation analysis.
Accepted referencesOfficial website or legal act
Evidence
https://www.govcert.cz/en/government-cert/provided-services/
GovCERT.CZ of the National Cybersecurity Centre (NCSC) / Národní centrum kybernetické bezpečnosti (NCKB)
-
2.2. Public cyber threat reports are published annually 111
Requirements
CriteriaThe public part of the national cyber threat situation analysis is published at least once a year.
Accepted referencesOfficial public report
Evidence
NÚKIB – 2021 Report on Cyber Security in the Czech Republic
NÚKIB – 2020 Report on Cyber Security in the Czech Republic
-
2.3. Cyber safety and security website 111
Requirements
CriteriaPublic authorities provide at least one cyber safety and security website for cyber security and ICT professionals, and regular users.
Accepted referencesWebsite
Evidence
https://www.csirt.cz/cs/kyberbezpecnost/aktualne-z-bezpecnosti/
CSIRT.CZ is the National CSIRT of the Czech Republic – see information "For Administrators", "For Users" & "Security News".
https://nukib.cz/cs/infoservis/aktuality/
The National Cyber and Information Security Agency (NÚKIB) – see "News", "Threats and vulnerabilities" & "Recommendations".
https://osveta.nukib.cz/dk-22-24
Online course on the basics of cyber security „Dávej kyber!“ of the National Cyber and Information Security Agency’s (NÚKIB).
-
-
3. Education and professional development 9/9 100%99 100%
-
3.1. Cyber safety competencies in primary or secondary education 111
Requirements
CriteriaPrimary or secondary education curricula include cyber safety / computer safety competences.
Accepted referencesOfficial curriculum or official report
Evidence
Structural indicators for monitoring education and training systems in Europe 2022, Eurydice background report, link above:
- See Figure 1: Compulsory starting grade and curriculum approaches to teaching digital competence, 2021/2022 (p.28); Czechia has it for has it for primary education (ISCED level 1), lower secondary education (ISCED level 24).
- See Figure 2: Learning outcomes related to selected digital competences defined in the DigComp framework, 2021/2022 (p.30); Czechia has it for Information and Data Literacy (ISCED level 1 & ISCED level 24), Communication and Collaboration (ISCED level 24), Digital Content Creation (ISCED level 1 & ISCED level 24), Safety (ISCED level 1 & ISCED level 24) and Creatively using digital technologies (ISCED level 1 & ISCED level 24).
https://op.europa.eu/en/publication-detail/-/publication/c2fcfd3c-438e-11ed-92ed-01aa75ed71a1
Informatics education at school in Europe, Eurydice report (2022), link above, see p. 53, Safety and security, Area 10: Safety and security, Czechia (country code “CZ”) has it for all levels, i.e., primary & secondary education.
See also:
-
3.2. Bachelor’s level cyber security programme 222
Requirements
CriteriaThere is at least one cyber security / electronic information security focused programme at Bachelor’s or equivalent level.
Accepted referencesAccredited study programme
Evidence
Bachelor Information Security at Czech Technical University in Prague
https://is.muni.cz/program/26540/kyberbezpecnost?lang=en
Bachelor’s degree in Cybersecurity at the Masaryk University Brno
https://www.vut.cz/en/students/programmes/programme/7911
Bachelor's degree in Information Security at Brno University of Technology
-
3.3. Master’s level cyber security programme 222
Requirements
CriteriaThere is at least one cyber security / electronic information security focused programme at Master’s or equivalent level.
Accepted referencesAccredited study programme
Evidence
https://www.vut.cz/en/students/programmes/branch/15089
Master Information Technology Security at Brno University of Technology
https://www.fi.muni.cz/admission/mgr/computer-systems-communication-and-security-eng.html
Master Computer Systems, Communication and Security at Masaryk University
https://www.vut.cz/en/students/programmes/programme/7505
Master’s Degree in Information Security at Brno University of Technology
-
3.4. PhD level cyber security programme 222
Requirements
CriteriaThere is at least one cyber security / electronic information security focused programme at PhD or equivalent level.
Accepted referencesAccredited study programme
Evidence
Doctoral study programme within Department of Information Security at Czech Technical University in Prague
https://www.vut.cz/en/students/programmes/programme/8021
Doctoral study programme Information Technology at Brno University of Technology. Issued topics of doctoral study 2020-2030 include cybersecurity.
-
3.5. Cyber security professional association 222
Requirements
CriteriaThere is a professional association of cyber/electronic information security specialists, managers or auditors.
Accepted referencesWebsite
Evidence
https://www.cimib.cz/o-cimibu/
ČIMIB – Czech Institute for IT Security Managers
https://engage.isaca.org/czechrepublicchapter/home
ISACA – Czech Republic Chapter
-
-
4. Contribution to global cyber security 3/6 50%36 50%
-
4.1. Convention on Cybercrime 111
Requirements
CriteriaThe country has ratified the Convention on Cybercrime.
Accepted referencesOfficial website of the convention
Evidence
https://www.coe.int/en/web/conventions/full-list?module=signatures-by-treaty&treatynum=185
Entry into force 01/12/2013
-
4.2. Representation in international cooperation formats 111
Requirements
CriteriaThe government is regularly represented in a cooperation format that is dedicated to international cyber security (e.g. FIRST).
Accepted referencesOfficial website of the cooperation format
Evidence
https://www.govcert.cz/en/legislation/agreements-and-memoranda/
Agreements and Memoranda available online (NATO and Czech-Israeli bilateral agreement).
https://www.first.org/members/teams/#czech
FIRST
-
4.3. International cyber security organisation hosted by the country 003
Requirements
CriteriaA regional or international cyber security organisation is hosted by the country.
Accepted referencesOrganisation’s official website
Evidence
-
4.4. Cyber security capacity building for other countries 111
Requirements
CriteriaThe country has (co-)financed or (co-)organised at least one capacity building project for another country in the last 3 years.
Accepted referencesOfficial website or project document
Evidence
https://cybilportal.org/projects/supporting-cyber-capacity-building-in-the-third-world/
Supporting Cyber Capacity Building in the Third World (until 2024). See also the search results from EU CyberNet for the Czech Republic.
National Cyber and Information Security Agency (NÚKIB) and Albanian delegation 2023
-
BASELINE CYBER SECURITY INDICATORS
-
5. Protection of digital services 5/5 100%55 100%
-
5.1. Cyber security responsibility for digital service providers 111
Requirements
CriteriaAccording to legislation, digital service providers (except micro and small enterprises): (1) must manage cyber/ICT risks or (2) must implement established cyber/information security requirements.
Accepted referencesLegal act
Evidence
https://www.govcert.cz/download/kii-vis/preklady/Act_181_2014_EN_v1.0_final.pdf
Act No 181/2014 Coll. On Cyber Security and Change of Related Acts, Chapter II, Section 4 (3).
-
5.2. Cyber security standard for the public sector 111
Requirements
CriteriaPublic sector digital service providers must implement (1) cyber/ICT security requirements (defined by legislation) or (2) a widely recognised security standard.
Accepted referencesLegal act
Evidence
https://www.govcert.cz/download/kii-vis/preklady/Act_181_2014_EN_v1.0_final.pdf
Act No 181/2014 Coll. On Cyber Security and Change of Related Acts, Chapter I, Section 3, 3a, & 4.
-
5.3. Competent supervisory authority 333
Requirements
CriteriaThe government has a competent authority in the field of cyber/information security that has the power to supervise public and private digital service providers regarding the implementation of cyber/information security requirements.
Accepted referencesOfficial website or legal act
Evidence
https://www.govcert.cz/download/kii-vis/preklady/Act_181_2014_EN_v1.0_final.pdf
Act No 181/2014 Coll. On Cyber Security and Change of Related Acts, Chapter IV.
https://www.nukib.cz/en/about-nukib/
National Cyber and Information Security Agency (NÚKIB)
-
-
6. Protection of essential services 6/6 100%66 100%
-
6.1. Operators of essential services are identified 111
Requirements
CriteriaThere is a legal act that allows to identify operators of essential services.
Accepted referencesLegal act
Evidence
https://www.govcert.cz/download/kii-vis/preklady/Decree_437_2017_EN_v1.0_final.pdf
Decree No 437/2017 Coll. on the criteria for the determination of an operator of essential service
https://www.govcert.cz/download/kii-vis/preklady/Act_181_2014_EN_v1.0_final.pdf
Act No 181/2014 Coll. On Cyber Security and Change of Related Acts, Section 2 i-k
For further information, see also: NÚKIB – Summary of the way operators of an essential service and information systems of an essential service are identified, link above.
-
6.2. Cyber security requirements for operators of essential services 111
Requirements
CriteriaAccording to the legislation, operators of essential services must manage cyber/ICT risks.
Accepted referencesLegal act
Evidence
https://www.govcert.cz/download/kii-vis/preklady/Act_181_2014_EN_v1.0_final.pdf
Act No 181/2014 Coll. On Cyber Security and Change of Related Acts, Chapter II Section 4 (2) in conjunction with Section 2 (J).
Decree No 82/2018 Coll. on Security Measures, Cybersecurity Incidents, Reactive Measures, Cybersecurity Reporting Requirements, and Data Disposal (the Cybersecurity Decree).
-
6.3. Competent supervisory authority 333
Requirements
CriteriaThe government has a competent authority in the field of cyber/information security that has the power to supervise operators of essential services, regarding cyber/information security requirements.
Accepted referencesOfficial website or legal act
Evidence
https://www.govcert.cz/download/kii-vis/preklady/Act_181_2014_EN_v1.0_final.pdf
Act No 181/2014 Coll. On Cyber Security and Change of Related Acts, Chapter IV-V.
Decree No 82/2018 Coll. on Security Measures, Cybersecurity Incidents, Reactive Measures, Cybersecurity Reporting Requirements, and Data Disposal (the Cybersecurity Decree), Section 32-34.
https://www.govcert.cz/en/act/regulation-and-audit/
The Audit Unit of the National Cyber Security Center (NCKB), which is an executive section of the National Office for Cyber and Information Security (NÚKIB).
-
6.4. Regular monitoring of security measures 111
Requirements
CriteriaOperators of essential services must regularly (at least once every 3 years) provide evidence of the effective implementation of cyber/information security policies (e.g. audit result, documentation, specific report).
Accepted referencesLegal act
Evidence
https://www.govcert.cz/download/kii-vis/preklady/Act_181_2014_EN_v1.0_final.pdf
Act No 181/2014 Coll. On Cyber Security and Change of Related Acts, Section 5
Decree No 82/2018 Coll. on Security Measures, Cybersecurity Incidents, Reactive Measures, Cybersecurity Reporting Requirements, and Data Disposal (the Cybersecurity Decree), Section 16.
-
-
7. E-identification and trust services 8/9 89%89 89%
-
7.1. Unique persistent identifier 111
Requirements
CriteriaThe government provides a unique persistent identifier to all citizens, residents, and legal entities. For example, the identifier remains the same after document expiration and name change.
Accepted referencesLegal act
Evidence
https://zakonyprolidi.cz/cs/2000-133
Law 133/2000 Coll. on Register of Population and Birth Numbers, and on Amendments of Certain Acts (Register of Population Act)TRANSLATION Act No. 133/2000 Coll. ACT From April 12, 2000 on Register of Population and Birth Numbers, and on Amendments of Certain Acts (Register of Population Act) The Parliament has resolved on the following Act of the Czech Republic: …. HEAD III – BIRTH NUMBERS §13 1. In the information system is the birth number identifier of natural person who qualifies conditions for its assigning under this Act (hereinafter referred to as "natural person"). …. 6. The same birth number cannot be assigned to more then one natural person 7. One natural person is assigned to only one birth number.
-
7.2. Requirements for cryptosystems 001
Requirements
CriteriaRequirements for cryptosystems in the field of trust services are regulated.
Accepted referencesLegal act
Evidence
-
7.3. Electronic identification 111
Requirements
CriteriaElectronic identification is regulated.
Accepted referencesLegal act
Evidence
https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32014R0910&from=EN
Regulation (EU) No 910/2014 on electronic identification and trust services for electronic transactions in the internal market, Chapter II
Act 297/2016 Coll. on trust services for electronic transactions adapting Czech law following Regulation (EU) No 910/2014. Alternatively, the legal act can also be accessed here.
-
7.4. Electronic signature 111
Requirements
CriteriaE-signature is regulated
Accepted referencesLegal act
Evidence
https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32014R0910&from=EN
Regulation (EU) No 910/2014 on electronic identification and trust services for electronic transactions in the internal market, Section 4
https://www.zakonyprolidi.cz/cs/2016-297
Act 297/2016 Coll. on trust services for electronic transactions adapting Czech law following Regulation (EU) No 910/2014, §§ 5-7. Alternatively, the legal act can also be accessed here.
https://www.mvcr.cz/mvcren/docDetail.aspx?docid=45011&docType=&chnum=2
-
7.5. Timestamping 111
Requirements
CriteriaTimestamping is regulated.
Accepted referencesLegal act
Evidence
https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32014R0910&from=EN
Regulation (EU) No 910/2014 on electronic identification and trust services for electronic transactions in the internal market, Section 6.
https://www.zakonyprolidi.cz/cs/2016-297
Act 297/2016 Coll. on trust services for electronic transactions adapting Czech law following Regulation (EU) No 910/2014, § 3. Alternatively, the legal act can also be accessed here.
https://www.mvcr.cz/mvcren/docDetail.aspx?docid=45011&docType=&chnum=2
-
7.6. Electronic registered delivery service 111
Requirements
CriteriaElectronic registered delivery service between state entities, citizens and private sector entities is regulated. The service provides legally binding data exchange and guarantees the confidentiality and integrity of information.
Accepted referencesLegal act
Evidence
https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32014R0910&from=EN
Regulation (EU) No 910/2014 on electronic identification and trust services for electronic transactions in the internal market, Section 7.
https://www.zakonyprolidi.cz/cs/2008-300
Act No. 300/2008 Coll.on Electronic Transactions and Authorised Conversion of Documents. Alternatively, the legal act can also be accessed here.
-
7.7. Competent supervisory authority 333
Requirements
CriteriaThere is an authority responsible for the supervision of qualified trust service providers.
Accepted referencesOfficial website or legal act
Evidence
https://www.zakonyprolidi.cz/cs/2016-297
Act 297/2016 Coll. on trust services for electronic transactions adapting Czech law following Regulation (EU) No 910/2014, § 13 in conjunction with § 1 (c). Alternatively, the legal act can also be accessed here.
Digital and Information Agency
-
-
8. Protection of personal data 4/4 100%44 100%
-
8.1. Personal data protection legislation 111
Requirements
CriteriaThere is a legal act for personal data protection.
Accepted referencesLegal act
Evidence
https://www.uoou.cz/en/vismo/zobraz_dok.asp?id_org=200156&id_ktg=1420&archiv=0&p1=1105
Act No 110/2019 Coll. on personal data processing (ZZOÚ)
-
8.2. Personal data protection authority 333
Requirements
CriteriaThere is an independent public supervisory authority that is responsible for personal data protection.
Accepted referencesOfficial website or legal act
Evidence
https://www.uoou.cz/en/vismo/zobraz_dok.asp?id_org=200156&id_ktg=1001&p1=1001
The office for personal data protection
-
INCIDENT AND CRISIS MANAGEMENT INDICATORS
-
9. Cyber incidents response 6/6 100%66 100%
-
9.1. Cyber incidents response unit 333
Requirements
CriteriaThe government has a unit (CSIRT, CERT, CIRT, etc.) that is specialised in national-level cyber incident detection and response.
Accepted referencesOfficial website or legal act
Evidence
CSIRT.CZ is the National CSIRT of the Czech Republic
https://www.govcert.cz/en/government-cert/provided-services/
GovCERT.CZ of the National Cybersecurity Centre (NCSC) / Národní centrum kybernetické bezpečnosti (NCKB)
-
9.2. Reporting responsibility 111
Requirements
CriteriaDigital service providers and operators of essential services have an obligation to notify appointed government authorities of cyber security incidents.
Accepted referencesLegal act
Evidence
https://www.govcert.cz/download/kii-vis/preklady/Act_181_2014_EN_v1.0_final.pdf
Act No 181/2014 Coll. On Cyber Security and Change of Related Acts, Section 8.
-
9.3. Single point of contact for international coordination 222
Requirements
CriteriaThe government has designated a single point of contact for international cyber security coordination.
Accepted referencesOfficial website or legal act
Evidence
https://www.nic.cz/files/nic/NBU_Memorandum_12-12-AJ.pdf
CSIRT.CZ according to I.3. Memorandum on Computer Emergency Response Team / Computer Security Incident Response Team of the Czech Republic. The docment can also be accessed here (in Czech).
-
-
10. Cyber crisis management 4/5 80%45 80%
-
10.1. Cyber crisis management plan 111
Requirements
CriteriaThe government has established a crisis management plan for large-scale cyber incidents.
Accepted referencesLegal act
Evidence
https://www.govcert.cz/download/kii-vis/preklady/Act_181_2014_EN_v1.0_final.pdf
Act No 181/2014 Coll. On Cyber Security and Change of Related Acts, Chapter III
Section 2 and 26 of Act No. 240/2000 Coll., on Crisis Management and on the Amendment of Certain Acts (the Crisis Act), as amended.
-
10.2. National-level cyber crisis management exercise 222
Requirements
CriteriaThe government has conducted a national-level cyber crisis management exercise or a crisis management exercise with a cyber component in the last 3 years.
Accepted referencesExercise document/website or press release
Evidence
Non-technical table-top exercise 2022 in preparation for the Czech Presidency of the EU Council to practice the Czech Republic's preparedness for the possible course, impact and subsequent response to hostile action in cyberspace. In addition to the Office of the Government of the Czech Republic, the exercise was also attended by representatives of the National Cyber and Information Security Agency (NÚKIB) and other public administration institutions.
-
10.3. Participation in international cyber crisis exercises 111
Requirements
CriteriaThe country's team has participated in an international cyber crisis management exercise in the last 3 years.
Accepted referencesExercise document/website or press release
-
10.4. Operational support of volunteers in cyber crises 001
Requirements
CriteriaThe procedures for using volunteers in the field of cyber security are established by legislation.
Accepted referencesLegal act
Evidence
-
-
11. Fight against cybercrime 9/9 100%99 100%
-
11.1. Cybercrimes are criminalised 111
Requirements
CriteriaCybercrimes are defined by legislation.
Accepted referencesLegal act
Evidence
Act 40/2009 Coll. Criminal Code, see for example §§ 182, 230-232. Alternatively, the legal act can also be accessed here.
-
11.2. Cybercrime unit 333
Requirements
CriteriaThere is a government entity with a specific function of combatting cybercrime.
Accepted referencesOfficial website or legal act
Evidence
National Headquarters against Terrorism, Extremism and Cybercrime of the Criminal Police and Investigation Service (NCTEKK SKPV).
-
11.3. Digital forensics unit 333
Requirements
CriteriaThere is a government entity with a specific function of digital forensics.
Accepted referencesOfficial website or legal act
Evidence
Forensic documentation at Institute of Criminalistics of the Police of the Czech Republic
-
11.4. 24/7 contact point for international cybercrime 222
Requirements
CriteriaThe government has designated an international 24/7 contact point for cybercrimes.
Accepted referencesOfficial website or legal act
Evidence
https://rm.coe.int/cyber-list-of-competent-authorities-september-2021/1680a3aaae
Police of the Czech Republic, National Organized Crime Headquarters, Criminal Police and Investigation Service, Cybercrime Division.
-
-
12. Military cyber operations 4/6 67%46 67%
-
12.1. Cyber operations unit 333
Requirements
CriteriaMilitary forces have a unit (cyber command, etc.) that is specialised in planning and conducting cyber operations.
Accepted referencesOfficial website or legal act
Evidence
https://www.army.cz/en/armed-forces/organisational-structure/cyb/cyber-forces-command-218593/
Cyber Forces Command
https://www.vzcr.cz/kyberneticka-obrana-46
National Center for Cyber Operations (NCKO)
https://nukib.cz/en/cyber-security/strategy-action-plan/
See also p. 8 of the National Cybersecurity Strategy 2021-2025, link above.
-
12.2. Cyber operations exercise 002
Requirements
CriteriaMilitary forces have conducted a cyber operations exercise or an exercise with a cyber operations component in the country in the last 3 years.
Accepted referencesExercise document/website or press release
Evidence
-
12.3. Participation in international cyber exercises 111
Requirements
CriteriaThe country's military team has participated in an international cyber operations exercise in the last 3 years.
Accepted referencesExercise document/website or press release
Evidence
Cyber Coalition 2022
Locked Shields 2022
Locked Shields 2021
-
Information Disclaimer
The information provided on the NCSI website is based on publicly available evidence materials. The appearance in the index and subsequent ranking is commensurate to the existence and public availability of such information. The NCSI links to third party websites and information. The NCSI and eGA are not responsible for the accuracy or completeness of third party website information.
What can I do to improve my country's data in NCSI?
Become a data contributor Update a specific indicator with evidence data
CONTRIBUTORS
European Cyber Security Excellence Center
European Cyber Security Excellence Center