NCSI FULFILMENT PERCENTAGE
Version 21 Dec 2020
GENERAL CYBER SECURITY INDICATORS
-
1. Cyber security policy development 7/7 100%77 100%
-
1.1. Cyber security policy unit 333
Requirements
CriteriaA central government entity (ministry or equivalent) has a specialised official or unit responsible for national cyber security policy development.
Accepted referencesOfficial website or legal act
Evidence
http://www.dziennikustaw.gov.pl/D2019000094501.pdf
In accordance with the art. 12a and art. 19 item 1a of the Act of 4 September 1997 on division of government administration (ammended by the Act of 5 July 2018 on national cybersecurity system) cybersecurity in Poland is divaded into civilian and military spheres. For a mililtary sphere responsible is Minister of National Defence (art. 19 item 1a) and for a civilian sphere, minister competent for digitalization (currently Minister of Digital Affairs) - art. 12a.
Moreover, a Government Plenipotentiary for Cybersecurity was appointed by the Prime Minister. https://cyberpolicy.nask.pl/aktualnosci/pelnomocnik-rzadu-ds-cyberbezpieczenstwa-i-pelnomocnik-mon-ds-bezpieczenstwa-cyberprzestrzeni/
The new Plenipotentiary is also, at the same time, the Minister of Digital Affairs. The Plenipotentiary is responsible for coordination of cybersecurity policy of the Council of Ministers of Poland.
http://www.dziennikustaw.gov.pl/M2020000008701.pdf
Cybersecurity Department at the Ministry of Digital Affairs is in place. Department provides merit, organizational and legal input for the Minister of Digital Affairs in the field of cybersecurity.
http://www.dz.urz.mon.gov.pl/zasoby/dziennik/pozycje/tresc-aktow/pdf/2019/03/Poz._39_zarz._6-sig.pdf
Decision of the Minister of National Defence on establishing National Cybersecurity Center - for conducting cybersecurity activities within the military sphere - within NCSC operates CSIRT MON, one of the CSIRTs at national level.
Moreover, a Plenipotentiary of the Minister of National Defence for Cybersecurity was appointed: http://www.dz.urz.mon.gov.pl/zasoby/dziennik/pozycje/tresc-aktow/pdf/2020/04/Poz._74_dec._Nr_58-sig.pdf
-
1.2. Cyber security policy coordination format 222
Requirements
CriteriaThe central government has a committee, council, working group, etc. for national-level cyber security policy coordination.
Accepted referencesOfficial website or legal act
Evidence
http://prawo.sejm.gov.pl/isap.nsf/DocDetails.xsp?id=WDU20180001560
Art 64-66
National cybersecurity policy coordination is achieved through the role of Government Plenipotentiary for Cybersecurity and the Advisory Committee for Cyber Security.
Plenipotentiary is ensuring, inter alia, a coherent and comprehensive risk management system at the national level, carrying out tasks to counteract cyber security threats of a cross-sectoral and cross-border nature and is ensuring the coordination of handling reported incidents.
The Advisory Committee for Cyber Security operates at the Council of Ministers, in the capacity of a consultative and advisory body in matters of cyber security and relevant activities of CSIRT MON, CSIRT NASK, CSIRT GOV, sectoral cyber security teams and the competent authorities for cyber security e.g taking opinions on policy, draft legal acts, recommendations of the Plenipotentiary. -
1.3. Cyber security strategy 111
Requirements
CriteriaThe central government has established a national-level cyber security strategy or other equivalent document.
Accepted referencesValid official document
Evidence
The Cybersecurity Strategy of the Republic of Poland for 2019-2024 (Strategia Cyberbezpieczeństwa RP) was adopted 30th of October 2019. The Strategy sets out specific objective, which is development of the National Cybersecurity System (KSC).
The Strategy replaced the National Framework of Cybersecurity Policy of Republic of Poland for 2017-2022 - the previous strategic document and fully meets the requirements of the NIS Directive.
https://www.bbn.gov.pl/ftp/dokumenty/Strategia_Bezpieczenstwa_Narodowego_RP_2020.pdf
The National Security Strategy of the Republic of Poland (Strategia Bezpieczeństwa Narodowego - SBN), was adopted on 12th of May 2020, where one of the important elements of the Strategy is cybersecurity.
The National Security Strategy is the most important national security strategy document. Acts and detailed sector strategies may be developed on the basis of the areas of action indicated in it. One such sector strategy is the Cyber Security Strategy for 2019-2024 (Web link 1) adopted by the government last year.
-
1.4. Cyber security strategy implementation plan 111
Requirements
CriteriaThe central government has established an implementation plan to the national-level cyber security strategy or other equivalent document.
Accepted referencesValid official document or its enforcement act
Evidence
According to point 9 of National Framework of Cybersecurity Policy within six months of the adoption of the National Framework of Cybersecurity Policy, in cooperation with members of the Council of Ministers, heads of central offices and the Director of the Government Centre for Security, the coordinator will develop an Action Plan for the implementation of the National Framework of Cybersecurity Policy. When developing the Plan, the above-mentioned bodies shall take into account in their activities the issues of cybersecurity in accordance with the statutory competence. The action plan has been adopted.
-
-
2. Cyber threat analysis and information 5/5 100%55 100%
-
2.1. Cyber threats analysis unit 333
Requirements
CriteriaA central government entity has a national-level unit that is specialised in national strategic cyber threat situation analysis.
Accepted referencesOfficial website or legal act
Evidence
According to the adopted Act of 5 July 2018 on the National Cyber Security System, the national strategic cyber threat situations analysis is done by the Plenipotentiary and 3 CSIRTs.
CSIRTs are involved in risk assessment, they monitor threats and incidents and conducts advanced analyses and develops tools to perform and prevent the cyber threats.
The Act on National Cybersecurity System creates a coherent incident response system based on the leading role of three Computer Security Incident Response Teams at national level (MON; NASK; GOV) conducted by:
- the Minister of National Defence - CSIRT MON;
- the Minister of Digital Affairs (through the NASK - The Research and Academic Computer Network – a National Research Institute subordinated to the Minister of Digital Affairs) - CSIRT NASK;
- Head of the Internal Security Agency, one of the Intelligence services – CSIRT GOV.
The scope of their responsibilities is varied: CSIRT MON is responsible for specific entities subordinated to or supervised by the Ministry of National Defence; CSIRT NASK is responsible for, inter alia, local governments units, research institutions, businesses, citizens etc. and CSIRT GOV is mainly responsible for government administration and critical infrastructure and for incidents related to terrorist events.
The Government Plenipotentiary for Cybersecurity is competent for ensuring a coherent and comprehensive risk management system at the national level, carrying out tasks to counteract cyber security threats of a cross-sectoral and cross-border nature, and by ensuring the coordination of reported incidents.
https://csirt.gov.pl/cer/publikacje
-
2.2. Public cyber threat reports are published annually 111
Requirements
CriteriaThe public part of the national cyber threat situation analysis is published at least once a year.
Accepted referencesOfficial public report
Evidence
https://csirt.gov.pl/cer/publikacje
Reports are published by CSIRT GOV and CSIRT NASK anually
https://www.nask.pl/pl/raporty/raporty/3813,Raport-Cyberbezpieczenstwo-AD-2019.html
Reports are published by CSIRT GOV and CSIRT NASK anually
-
2.3. Cyber safety and security website 111
Requirements
CriteriaPublic authorities provide at least one cyber safety and security website for cyber security and ICT professionals, and regular users.
Accepted referencesWebsite
Evidence
https://www.gov.pl/web/baza-wiedzy/cyberbezpieczenstwo
Official portal of the government of Poland - dedicated cybersecurity database - main aim: enhancing public cyber awarness (best practices, recommendations etc.) - https://www.gov.pl/web/baza-wiedzy/cyberbezpieczenstwo
Ministry of Digital Affairs – cybersecurity: https://www.gov.pl/web/cyfryzacja/cyberbezpieczenstwo
CSIRT GOV:
https://csirt.gov.pl/
https://csirt.gov.pl/cer/publikacje
National Cyber security Centre (Narodowe Centrum Bezpieczeństwa Cyberprzestrzeni): https://ncbc.wp.mil.pl/pl/
CSIRT NASK:
https://www.nask.pl/
https://cyberpolicy.nask.pl/
https://www.cert.pl/
-
-
3. Education and professional development 7/9 78%79 78%
-
3.1. Cyber safety competencies in primary or secondary education 111
Requirements
CriteriaPrimary or secondary education curricula include cyber safety / computer safety competences.
Accepted referencesOfficial curriculum or official report
Evidence
http://prawo.sejm.gov.pl/isap.nsf/download.xsp/WDU20170000059/U/D20170059Lj.pdf
In 2017, issues within the field of cybersecurity education were introduced to the Polish education system.
1. There are new changes introduced to the Act of 14 December 2016 on Educational Law (Journal of Laws of 11 January 2017). New provision were introduced in Art. 1 (items 21 and 22) about dissemination of knowledge about threats, including in cyberspace and development of ICT skills. These records are as follows:
Art. 1. The education system ensures in particular:
21) dissemination of knowledge about safety among children and adolescents and shaping appropriate attitudes towards threats, including those related to the use of information and communication technologies, and emergency situations;
22) developing students' skills in efficient use of information and communication technologies;
These records must be taken into account in the planning and implementation of activities by all entities operating under the education system in Poland.
2. In addition, issues related to education in the area of the use of new technologies, critical understanding and security in cyberspace have been formulated in the new core curriculum of general education for both primary and secondary schools.
The new core curriculum of IT education and IT extends safety and compliance provisions. They refer to respecting the privacy of information, data protection, intellectual property rights and safe movement in cyberspace.
The implementation of the core curriculum is the responsibility of every teacher.
The new core curriculum for primary schools is in force from the training year 2017/2018. However, for secondary schools it will apply from the school year 2018/2019.
The Minister of National Education, defining the directions of the implementation of the state's education policy in the 2017/2018 school year, identified security on the internet and responsible use of social media as one of the priorities. It is also planned to prepare tutorials for teachers on the implementation of the content of the new core curriculum of IT classes and computer science, including in the field of information security. Materials will be developed by the Center for Education Development in 2018.
At the request of the Ministry of National Education, recommendations were also prepared. "Safe school, threats and recommended preventive actions in the field of physical and digital security". The material was donated to educational institutions and published on the website https://bezpiecznaszkola.men.gov.pl/bezpieczna-szkola-zagrozenia-i-zalecane-dzialania-profilaktyczne-w-zakresie-bezpieczenstwa-fizycznego-i-cyfrowego-uczniow/ (Link 2) in September 2017.
-
3.2. Bachelor’s level cyber security programme 222
Requirements
CriteriaThere is at least one cyber security / electronic information security focused programme at Bachelor’s or equivalent level.
Accepted referencesAccredited study programme
Evidence
MoDA in a close cooperation with NASK Institute, Warsaw University of Technology and Cybersecurity Foundation set out very first accredited study programme for bachelor's level university programme. The programme is a refference point for other universities when decided to introduce new cybersecurity study.
-
3.3. Master’s level cyber security programme 222
Requirements
CriteriaThere is at least one cyber security / electronic information security focused programme at Master’s or equivalent level.
Accepted referencesAccredited study programme
Evidence
There are few MA programmes offering cybersecurity studies. The programmes are available at the public and private universities.
https://www.nask.pl/pl/aktualnosci/2276,Cyberbezpieczenstwo-nowe-studia-podyplomowe-NASK-i-Politechniki-Bialostockiej.html
http://www.wat.edu.pl/?portfolio=kryptologia-i-cyber-bezpieczenstwo
http://www.elka.pw.edu.pl/Studia/Informacje-dla-kandydatow/Opis-kierunkow-studiow/Cyberbezpieczenstwo
http://weka.pwr.edu.pl/kandydaci/cyberbezpieczenstwo
https://eti.pg.edu.pl/katedra-teleinformatyki
https://www.wsb.pl/gdansk/studia-i-szkolenia/studia-ii-stopnia
-
3.4. PhD level cyber security programme 002
Requirements
CriteriaThere is at least one cyber security / electronic information security focused programme at PhD or equivalent level.
Accepted referencesAccredited study programme
Evidence
-
3.5. Cyber security professional association 222
Requirements
CriteriaThere is a professional association of cyber/electronic information security specialists, managers or auditors.
Accepted referencesWebsite
Evidence
ISACA
-
-
4. Contribution to global cyber security 2/6 33%26 33%
-
4.1. Convention on Cybercrime 111
Requirements
CriteriaThe country has ratified the Convention on Cybercrime.
Accepted referencesOfficial website of the convention
-
4.2. Representation in international cooperation formats 111
Requirements
CriteriaThe government is regularly represented in a cooperation format that is dedicated to international cyber security (e.g. FIRST).
Accepted referencesOfficial website of the cooperation format
Evidence
https://www.enisa.europa.eu/topics/csirts-in-europe/csirts-network
Poland is part of CSIRTs network at EU level, which was created as a result of the entry into force of NIS Directive.
Polish Minister of Digital Affairs is responsible for supervision of NASK as the research institute and operator of data transmission network, under which CSIRT NASK functions.
CSIRT NASK is the first Computer Emergency Response Team established in Poland. Thanks to its dynamic activity since 1996 in the environment of responsive teams, it has become a recognizable and experienced entity in the field of computer security. From the beginning of the team's existence, the core business is the handling of security incidents and cooperation with similar units around the world, both in operational and research and implementation activities.
Since 1998, CSIRT NASK has been a member of the international forum of responding teams - FIRST, and since 2000 belongs to the working group of European responsive teams - TERENA TF-CSIRT and the Trusted Introducer operating on it.
In 2005, at the initiative of CSIRT NASK, the forum of Polish abuse teams - Abuse FORUM - was established, while in 2010 CSIRT NASK joined the Anti-Phishing Working Group, an association gathering companies and institutions actively fighting cybercrime.
https://www.first.org/members/teams/#poland
FIRST
https://www.trusted-introducer.org/index.html
TF-CSIRT Trusted Introducer
-
4.3. International cyber security organisation hosted by the country 003
Requirements
CriteriaA regional or international cyber security organisation is hosted by the country.
Accepted referencesOrganisation’s official website
Evidence
-
4.4. Cyber security capacity building for other countries 001
Requirements
CriteriaThe country has (co-)financed or (co-)organised at least one capacity building project for another country in the last 3 years.
Accepted referencesOfficial website or project document
Evidence
-
BASELINE CYBER SECURITY INDICATORS
-
5. Protection of digital services 5/5 100%55 100%
-
5.1. Cyber security responsibility for digital service providers 111
Requirements
CriteriaAccording to legislation, digital service providers (except micro and small enterprises): (1) must manage cyber/ICT risks or (2) must implement established cyber/information security requirements.
Accepted referencesLegal act
Evidence
http://prawo.sejm.gov.pl/isap.nsf/DocDetails.xsp?id=WDU20180001560
Cybersecurity responsibilities for digital service providers are defined in the Act on the National Cybersecurity System adopted on the 5th of July 2018.
Chapter 4 outlines responsibilities of digital service providers.
Digital service providers are required to apply security measures proportionate to the risk, taking into account in particular:
- security of information systems and facilities - information systems include ICT systems together with data processed in electronic form.
- the procedure in the case of incident handling, i.e. activities enabling the detection, recording, analysis, classification, prioritization, taking corrective actions and limiting the effects of the incident.
- managing the continuity of the provider's activity in order to provide digital service. Pursuant to Article 17(3) of the Act on the National Cyber Security System, the digital service provider shall take measures to prevent and minimize the impact of incidents on the digital service in order to ensure continuity of the service provision.
- compliance with international standards as referred to in the EU Regulation 2018/151 of 30 January 2018. This Regulation clarifies further specification of the elements to be taken into account by digital service providers for managing the risks posed to the security of network and information systems and of the parameters for determining whether an incident has a substantial impact. When incident occurs, the digital service provider should ensure that threat detection processes are maintained, that the incident reporting system is in place, that it reacts in accordance with procedures, and that the severity of the incident is assessed, with full documentation. The regulation also defines incident assessment and qualification as significant.
- monitoring, audit and testing.
In addition to the appropriate risk management of the information systems used to provide the digital service, DSPs shall be required to perform activities to detect, record, analyse and classify incidents.
DSPs are supervised by the competent authorities, which have the power to conduct inspections and impose fines.
-
5.2. Cyber security standard for the public sector 111
Requirements
CriteriaPublic sector digital service providers must implement (1) cyber/ICT security requirements (defined by legislation) or (2) a widely recognised security standard.
Accepted referencesLegal act
Evidence
http://prawo.sejm.gov.pl/isap.nsf/download.xsp/WDU20120000526/O/D20120526.pdf
Regulation of the Council of Ministers of 12 April 2012 on the National Interoperability Framework, sets minimum requirements for public registers and electronic information exchange and minimum requirements for information and communication systems.
§20
http://prawo.sejm.gov.pl/isap.nsf/DocDetails.xsp?id=WDU20180001560
The Act on the National Cybersecurity System adopted on the 5th of July 2018 defines in Chapter 5 obligations of public entities.
Article 21
-
5.3. Competent supervisory authority 333
Requirements
CriteriaThe government has a competent authority in the field of cyber/information security that has the power to supervise public and private digital service providers regarding the implementation of cyber/information security requirements.
Accepted referencesOfficial website or legal act
Evidence
http://prawo.sejm.gov.pl/isap.nsf/download.xsp/WDU20180001560/T/D20181560L.pdf
Art. 53.1 2) b)
Ministry of Digital Affair
-
-
6. Protection of essential services 3/6 50%36 50%
-
6.1. Operators of essential services are identified 111
Requirements
CriteriaThere is a legal act that allows to identify operators of essential services.
Accepted referencesLegal act
Evidence
http://prawo.sejm.gov.pl/isap.nsf/download.xsp/WDU20180001560/T/D20181560L.pdf
The Act on National Cybersecurity System defines operator of essential services as companies and institutions providing services of vital importance for maintaining critical social or economic activity. There are 6 essential sectors of the economy in Poland: energy, transport, banking and financial market infrastructure, health care, drinking water supply (including distribution) and digital infrastructure.
The Act on National Cybersecurity System is an entity which has an organisational unit on the territory of the Republic of Poland, in relation to which a competent authority (the Ministry regulating a given sector of the economy) has issued a decision on recognition as an operator of essential services. Sectors, sub-sectors and types of entities are specified in the Annex No. 1 to the Act.
The Council of Ministers defined by the Ordinance of 11 September 2018 on the list of essential services and the thresholds of significance of the disruptive effect of an incident on the provision of essential services (Journal of Laws, item 1806):
- the list of essential services, based on the assignment of a essential service to a given sector, subsector and type of entity listed in the aforementioned Annex No. 1 to the Act and the significance of the service for maintaining critical social or economic activity;
- thresholds of significance of the disruptive effect of an incident on the provision of essential services included in the list of essential services
-
6.2. Cyber security requirements for operators of essential services 111
Requirements
CriteriaAccording to the legislation, operators of essential services must manage cyber/ICT risks.
Accepted referencesLegal act
Evidence
http://prawo.sejm.gov.pl/isap.nsf/download.xsp/WDU20180001560/T/D20181560L.pdf
Cybersecurity requirements for operator of essential services are identified in the Act on National Cybersecurity System adopted on the 5th of July 2018. The most important responsibilities of operator of essential services according to the Act on National Cybersecurity System include:
- risk management (including risk evaluation);
- implementation of appropriate and proportionate technical and organisational measures (including maintenance and safe operation of the information system; physical and environmental security; security and continuity of supply; implementation, documentation and maintenance of action plans);
- collecting information on cyber threats and vulnerabilities;
- reporting a serious incident to the relevant CSIRT team;
- Incident handling and cooperation with the relevant CSIRT;
- appointing a contact person for the national cyber security system.
The operator of essential services should provide information on a significant incident that causes or is likely to cause a significant deterioration or interruption in the performance of the essential service provided.
The operator should report the incident immediately, no later than within 24 hours of detection, to the relevant CSIRT MON, CSIRT NASK or CSIRT GOV.
The operator shall cooperate during the handling of a significant incident and a critical incident with the relevant CSIRT MON, CSIRT NASK or CSIRT GOV, providing the necessary data.
The operator shall remove the indicated vulnerabilities and inform the competent authority of their removal.
The Act sets out in detail the classification of incidents and the scope of competence of CSIRT MON, CSIRT NASK, CSIRT GOV.
When an incident occurs, operator of essential services upon notification of the incident, starts handling it according to the following scheme of action: detection, registration, analysis, classification, prioritization and taking corrective action and limiting the effects of the incident.
http://prawo.sejm.gov.pl/isap.nsf/DocDetails.xsp?id=WDU20190002479
Ordinance of the Minister of Digitization of 4 December 2019 on organisational and technical conditions for entities providing services in the field of cybersecurity and internal organisational structures of operator of essential services responsible for cybersecurity
-
6.3. Competent supervisory authority 003
Requirements
CriteriaThe government has a competent authority in the field of cyber/information security that has the power to supervise operators of essential services, regarding cyber/information security requirements.
Accepted referencesOfficial website or legal act
Evidence
-
6.4. Regular monitoring of security measures 111
Requirements
CriteriaOperators of essential services must regularly (at least once every 3 years) provide evidence of the effective implementation of cyber/information security policies (e.g. audit result, documentation, specific report).
Accepted referencesLegal act
-
-
7. E-identification and trust services 8/9 89%89 89%
-
7.1. Unique persistent identifier 111
Requirements
CriteriaThe government provides a unique persistent identifier to all citizens, residents, and legal entities. For example, the identifier remains the same after document expiration and name change.
Accepted referencesLegal act
Evidence
http://orka.sejm.gov.pl/proc6.nsf/ustawy/1371_u.htm
PESEL number
http://www.sejm.gov.pl/sejm8.nsf/PrzebiegProc.xsp?nr=2502
On July 5, 2018, the Sejm passed an act amending the act on trust services, electronic identification and some other acts. Thus, the law creates of the National Identifier. This is a technical solution that will enable the identification of citizens using public online services. The law will provide citizens with convenient access to public portals and e-services provided by the administration. All with the help of one - and not as before - many logins and passwords. Access to service portals in accordance with the adopted provisions is to be as simple and fast as possible, but above all safe. The National Identifier will also be the point of contact with the Cross-Border Identifier, which will allow Citizens of the European Union to cross-border the confirmation of their identity in online services.
Additional legislation:
Act on trusted services and electronic identification (05.09.2016)
-
7.2. Requirements for cryptosystems 001
Requirements
CriteriaRequirements for cryptosystems in the field of trust services are regulated.
Accepted referencesLegal act
Evidence
-
7.3. Electronic identification 111
Requirements
CriteriaElectronic identification is regulated.
Accepted referencesLegal act
Evidence
http://www.sejm.gov.pl/sejm8.nsf/PrzebiegProc.xsp?nr=2502
On July 5, 2018, The Parliament passed an Act amending an Act of Trusted Services and Electronic identification and other regulations. The Act created the national identifier, which is a technical solution that enabled the identification of citizens using public online services. This regulation provides citizens with convenient access to public portals and e-services provided by the administration. The national identifier will be a point of contact with the cross-border identifier, which will allow citizens of the European Union to confirm their identify in online services.
Additional legislation:
Ordinance of the Minister of Digital Affairs of 6 September 2019 on the amounts of liability of the entity responsible for the electronic identification system.Ordinance of the Council of Ministers of 6 November 2018 on the scope of data and documents necessary to conduct the proceedings in order to make a corporate assessment of the entity responsible for the electronic identification system or the entity issuing electronic identification means in this system.
Ordinance of the Minister of Finance of 15 October 2018 on the minimum guarantee sum of the civil liability insurance of the entity responsible for the electronic identification system.
Ordinance of the Minister of Digital Affairs of 10 September 2018 on the trusted profile and trusted signature.
-
7.4. Electronic signature 111
Requirements
CriteriaE-signature is regulated
Accepted referencesLegal act
Evidence
http://prawo.sejm.gov.pl/isap.nsf/download.xsp/WDU20160001579/U/D20161579Lj.pdf
Act of 5 September 2016 on trust services and electronic identification
Additional legislation:
Ordinance of the Minister of Development and Finances of 19 December 2016 on the compulsory insurance of civil liability of the quailed trust supplierOrdinance of the Minister of Digital Affairs of 5 October 2016 on the national trust infrastructure
Article 25 of eIDAS Regulation apply principle of free assessment of evidence by the courts.
-
7.5. Timestamping 111
Requirements
CriteriaTimestamping is regulated.
Accepted referencesLegal act
Evidence
https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32014R0910&from=EN
Timestamping is regulated by EU law.
-
7.6. Electronic registered delivery service 111
Requirements
CriteriaElectronic registered delivery service between state entities, citizens and private sector entities is regulated. The service provides legally binding data exchange and guarantees the confidentiality and integrity of information.
Accepted referencesLegal act
-
7.7. Competent supervisory authority 333
Requirements
CriteriaThere is an authority responsible for the supervision of qualified trust service providers.
Accepted referencesOfficial website or legal act
Evidence
https://isap.sejm.gov.pl/isap.nsf/DocDetails.xsp?id=WDU20160001579
Article 27 of the Act of 5 September 2016 on trust services and electronic identification. The competent supervisory authority is the
Ministry of Digital Affairs:eID supervision – State Systems Department
eTS supervision – Cybersecurity Department
-
-
8. Protection of personal data 4/4 100%44 100%
-
8.1. Personal data protection legislation 111
Requirements
CriteriaThere is a legal act for personal data protection.
Accepted referencesLegal act
Evidence
The GDPR was adopted on 27 April 2016 and replaced Directive 95/46/EC of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. The Regulation has significantly increased individuals' control over data concerning them.
http://prawo.sejm.gov.pl/isap.nsf/DocDetails.xsp?id=WDU20180001000
The entry into force of the RODO/GDPR and the need to ensure the effective application of its provisions was a major legislative challenge. The Act of 10 May 2018 on personal data protection (Journal of Laws of 2018, item 1000) does not duplicate or implement the solutions of the RODO, but supplements the new regulations on personal data protection so that they correspond to the regulations and standards adopted at the EU level.
-
8.2. Personal data protection authority 333
Requirements
CriteriaThere is an independent public supervisory authority that is responsible for personal data protection.
Accepted referencesOfficial website or legal act
Evidence
-
INCIDENT AND CRISIS MANAGEMENT INDICATORS
-
9. Cyber incidents response 6/6 100%66 100%
-
9.1. Cyber incidents response unit 333
Requirements
CriteriaThe government has a unit (CSIRT, CERT, CIRT, etc.) that is specialised in national-level cyber incident detection and response.
Accepted referencesOfficial website or legal act
Evidence
https://www.cert.pl/en/about-us/
Poland has 3 CSIRTs at national level: CSIRT NASK, CSIRT GOV and CSIRT MON that cooperate with its counterparts.
CSIRT GOV is mainly responsible for government administration and critical infrastructure,
Tasks and responsibilities of CSIRT MON, CSIRT NASK i CSIRT GOV are defined in Article 26 of the Act of 5 July 2018 on the national cyber security system.
http://www.cert.gov.pl/cee/main-site-about-us/77,dok.html
CSIRT NASK is responsible for, inter alia, local governments units, research institutions, businesses, citizens etc.
https://csirt-mon.wp.mil.pl/pl/2.html
CSIRT MON is responsible for specific subordinated to or supervised by the Ministry of National Defence.
-
9.2. Reporting responsibility 111
Requirements
CriteriaDigital service providers and operators of essential services have an obligation to notify appointed government authorities of cyber security incidents.
Accepted referencesLegal act
Evidence
http://prawo.sejm.gov.pl/isap.nsf/download.xsp/WDU20180001560/T/D20181560L.pdf
Article 11 of the Act of 5 July 2018 on the national cyber security system
-
9.3. Single point of contact for international coordination 222
Requirements
CriteriaThe government has designated a single point of contact for international cyber security coordination.
Accepted referencesOfficial website or legal act
Evidence
http://prawo.sejm.gov.pl/isap.nsf/DocDetails.xsp?id=WDU20180001560
The Minister of Digital Affairs in Poland also runs the Single Point of Contact. More information can be found in the Act of 5 July 2018 on the National Cybersecurity System - Articles 48 - 50
-
-
10. Cyber crisis management 5/5 100%55 100%
-
10.1. Cyber crisis management plan 111
Requirements
CriteriaThe government has established a crisis management plan for large-scale cyber incidents.
Accepted referencesLegal act
Evidence
https://rcb.gov.pl/krajowy-plan-zarzadzania-kryzysowego/
In National Crisis Management Plan, threats to ICT networks are identified, as well as indicating contractors in various stages of crisis management (prevention, preparation, response, reconstruction) with reference to legal acts such as the Act on the national cybersecurity system and the Cybersecurity Strategy of the Republic of Poland. In addition, the operation procedure for convening the Critical Incident Team is mentioned in the National Crisis Management Plan referring also to the Act on national cybersecurity system.
-
10.2. National-level cyber crisis management exercise 222
Requirements
CriteriaThe government has conducted a national-level cyber crisis management exercise or a crisis management exercise with a cyber component in the last 3 years.
Accepted referencesExercise document/website or press release
Evidence
https://rcb.gov.pl/libero-2019-cwiczenie-sprawdzajace-procedury-systemu-zarzadzania-kryzysowego/
LIBERO 2019
- LIBERO 2019 exercise checking the procedures of the crisis management system:
https://rcb.gov.pl/libero-2019-cwiczenie-sprawdzajace-procedury-systemu-zarzadzania-kryzysowego/
- LIBERO 2017 - Exercise checking the activities of entities in the event of disruptions in the supply of liquid fuels:
- Preparation for the cross-sectoral cybersecurity exercises is taking place: Cyber-EXE Poland-National Cybersecurity System (KSC_EXE).
The excise is planned for the turn of the first and second quarter of 2020. Exercises are joint with NASK-PIB and Cybersecurity Foundation, which have extensive experience in organizing and conducting this type of exercise.
-
10.3. Participation in international cyber crisis exercises 111
Requirements
CriteriaThe country's team has participated in an international cyber crisis management exercise in the last 3 years.
Accepted referencesExercise document/website or press release
Evidence
-
10.4. Operational support of volunteers in cyber crises 111
Requirements
CriteriaThe procedures for using volunteers in the field of cyber security are established by legislation.
Accepted referencesLegal act
Evidence
Resolution of the Council of Ministers Mr 137/2018 of 2 October 2018 on the adoption of a programme to support the development of civil society under thethe name "Solidarity Corps - Volunteer Support and Development Programme Long-term for 2018-2030"
The Cyberspace Action Team (Zespoł Działan Cyberprzestrzennych - ZDC) is a part of the Cyber Defence Forces (Wojsk Obrony Cyberstrzestrzeni - WOC).
90% of the Cyberspace Action Team are volunteers. This is not a final structure, as the Territorial Defence Forces plan to further develop their capabilities in the area of cyber security. The target Cyber Component of the WOT will have autonomous elements in its structure, capable of performing the task independently.
The Cyberspace Action Team is a team of specialists who are expanding their knowledge and competences in three main areas: cyberspace defence and reconnaissance, attacks analysis curing systems
The offer is addressed to people who want to continue their professional career in the civil market and at the same time are ready to take up service for security in cyberspace.
-
-
11. Fight against cybercrime 9/9 100%99 100%
-
11.1. Cybercrimes are criminalised 111
Requirements
CriteriaCybercrimes are defined by legislation.
Accepted referencesLegal act
Evidence
https://www.imolin.org/doc/amlid/Poland_Penal_Code1.pdf
http://prawo.sejm.gov.pl/isap.nsf/download.xsp/WDU19970880553/O/D19970553.pdf
Art. 190a § 2 - impersonation of another person, false profiles,
Art. 267 § 1 of the Penal Code - unauthorized obtaining of information (hacking),
Art. 267 § 2 of the Penal Code - eavesdropping of computers (sniffing),
Art. 268 § 2 of the Penal Code - thwarting obtaining information,
Art. 268a of the Penal Code - thwarting access to IT data,
Article 269 § 1 and 2 of the Penal Code - computer sabotage,
Art. 269a of the Penal Code - dissemination of malicious programs and cracking,
Art. 269b of the Penal Code - so-called "Hacker tools",
Art. 286 of the Penal Code - fraud committed via the Internet,
Art. 287 of the Penal Code - computer fraud. -
11.2. Cybercrime unit 333
Requirements
CriteriaThere is a government entity with a specific function of combatting cybercrime.
Accepted referencesOfficial website or legal act
Evidence
http://www.policja.pl/pol/kgp/bwc/33358,Biuro-do-Walki-z-Cyberprzestepczoscia.html
Cybercrime: Police Unit for Fighting Cybercrime
http://prawo.sejm.gov.pl/isap.nsf/DocDetails.xsp?id=wdu20160000904
Cyber-terrorism: When it comes to the cyber terrorism, the Internal Security Agency (ABW) deals with that topic on the basis of the Act of 10 June 2016 on counter-terrorist activities.
-
11.3. Digital forensics unit 333
Requirements
CriteriaThere is a government entity with a specific function of digital forensics.
Accepted referencesOfficial website or legal act
Evidence
Central Forensic Laboratory of the Polish Police: Document Examination and Audiovisual Techniques Department
-
11.4. 24/7 contact point for international cybercrime 222
Requirements
CriteriaThe government has designated an international 24/7 contact point for cybercrimes.
Accepted referencesOfficial website or legal act
Evidence
Cybercrime Division Criminal Service Bureau National Police Headquarters
-
-
12. Military cyber operations 6/6 100%66 100%
-
12.1. Cyber operations unit 333
Requirements
CriteriaMilitary forces have a unit (cyber command, etc.) that is specialised in planning and conducting cyber operations.
Accepted referencesOfficial website or legal act
Evidence
https://www.cyber.mil.pl/articles/o-nas-f/2018-10-23c-centrum-operacji-cybernetycznych/
Cyber Operations Centre (Centrum Operacji Cybernetycznych)
The Cyber Operations Centre is a specialised military unit which, as the only one in the Ministry of National Defence, is dedicated to conduct military activities and operations in cyberspace in the full spectrum, under conditions and situations where the use of conventional forces is not possible or advisable for political-military, operational or technical reasons.
Cyberspace Defence Forces (Siły Obrony Cyberprzestrzeni)
National Centre for Cyber Security (Narodowe Centrum Bezpieczeństwa Cyberprzestrzeni)
The National Centre for Cyber Security is a specialised, elite unit subordinate to the Minister of National Defence, responsible for key areas related to the consolidation of the Ministry's cryptology and cyber security competences and resources. The Centre was established on 1 June 2013.
-
12.2. Cyber operations exercise 222
Requirements
CriteriaMilitary forces have conducted a cyber operations exercise or an exercise with a cyber operations component in the country in the last 3 years.
Accepted referencesExercise document/website or press release
-
12.3. Participation in international cyber exercises 111
Requirements
CriteriaThe country's military team has participated in an international cyber operations exercise in the last 3 years.
Accepted referencesExercise document/website or press release
Evidence
https://ccdcoe.org/exercises/locked-shields/
Locked Shields 2019. Additional information available here.
https://ccdcoe.org/exercises/crossed-swords/
Crossed Swords 2019. Additional information available here.
https://www.gov.pl/web/obrona-narodowa/polacy-brali-udzial-w-cwiczeniach-cyber-coalition-2018
Cyber Coalition 2018: Poland was represented at the exercises by representatives from institutions and units subordinate to the Ministry of National Defence, as well as institutions and agencies cooperating with the Ministry of Defence.
-
Information Disclaimer
The information provided on the NCSI website is based on publicly available evidence materials. The appearance in the index and subsequent ranking is commensurate to the existence and public availability of such information. The NCSI links to third party websites and information. The NCSI and eGA are not responsible for the accuracy or completeness of third party website information.
What can I do to improve my country's data in NCSI?
Become a data contributor Update a specific indicator with evidence data
CONTRIBUTORS
The Kosciuszko Institute
Ministry of Digital Affairs