=Paper=
{{Paper
|id=Vol-3731/paper12
|storemode=property
|title=Private law perspectives of cybersecurity
|pdfUrl=https://ceur-ws.org/Vol-3731/paper12.pdf
|volume=Vol-3731
|authors=Federica Casarosa,Giovanni Comandé
|dblpUrl=https://dblp.org/rec/conf/itasec/CasarosaC24
}}
==Private law perspectives of cybersecurity==
Private Law Perspectives of Cybersecurity Federica Casarosa1, 2, ∗ †, Giovanni Comandé 2, † 1 Sant’Anna School of Advanced Studies, Piazza dei Martiri 33, 56127 Pisa, Italy 2 European University Institute, Via Boccaccio 121, 50133 Firenze, Italy Abstract Cybersecurity is very rarely related to private law. However, the normative evolution and the growing intertwining of economic and organisational dependencies between entities, economic operators, and public administrations make increasingly evident the mutual influences between the legal area of cyber security with more and more of the substantial structures of private law. The overlaps and the cases of tension between the normative plexuses will be highlighted, as well as the need for linkage and translation of what are legal requirements into technical needs. The conclusions will provide suggestions for regulatory policy and interpretive practices. In the background, the contribution highlights the emergence of an increasingly intricate relationship between the cyber security requirements of value chains and the different levels of standardisation that must be implemented. Keywords Cybersecurity, public procurement, supply chain control 1 1. Introduction Cybersecurity is very rarely related to private law. However, the normative evolution and the growing intertwining of economic and organisational dependencies between entities, economic operators, and public administrations make increasingly evident the mutual influences between the legal area of cyber security with more and more of the substantial structures of private law. This contribution highlights these critical interferences, also considering the historical reconstruction of European legislation in its national unfolding until the implementation of the so-called NIS2 directive. The overlaps and the cases of tension between the normative plexuses will be highlighted, as well as the need for linkage and translation of what are legal requirements into technical needs. Then, the conclusions will provide suggestions for regulatory policy and interpretive practices. In the background, the contribution highlights the emergence of an increasingly intricate relationship between the cyber security requirements of value chains and the different levels of standardisation that must be implemented. ITASEC24: Italian Conference on Cybersecurity, April 08–12, 2024, Salerno, Italy ∗ Corresponding author. † These authors contributed equally. Federica.casarosa@santannapisa.it (F. Casarosa); Giovanni.comande@santannnapisa.it (G. Comandé) 0000-0002-5256-3505 (F. Casarosa); 0000-0003-2012-7415 (G. Comandé) © 2023 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). CEUR ceur-ws.org Workshop ISSN 1613-0073 Proceedings 2. Cybersecurity in the Italian legal framework Cybersecurity encompasses the strategies and regulations operating at the national and supranational levels to mitigate and respond to any attacks that could undermine the stability and development of businesses and public administrations [4, 10]. While from a practical point of view, we can talk about cybersecurity from the moment computers became connected through the Internet. However, it is only since the late 2000s that legislators' attention and public awareness regarding this issue have emerged. The turning point can easily be attributed to the attack suffered by Estonia's IT infrastructure in 2007, when a series of Distributed Denial of Service (DDoS) attacks succeeded in crippling the infrastructure nationwide [7, 11]. From this moment on, many states have begun to consider the desirability, indeed the necessity, of adopting cybersecurity strategy policies.2 While awareness of security risks has increased, cyber-attacks have multiplied, including supply chain attacks, cyber espionage, ransomware, or complete disruption of services [3]. Exposure to cybersecurity incidents and their potential impact is linked to the pervasiveness of the use of ICT in all economic sectors, as governments, businesses, and citizens are more interconnected and interdependent. Moreover, Russia's recent military aggression against Ukraine has shown how cyber operations are increasingly integrated into hybrid warfare strategies, with significant effects on the target [13]. The threat of possible large-scale incidents causing disruption and significant damage to critical infrastructure requires increased preparedness at all levels of the cybersecurity ecosystem. Italy has recognised cybersecurity risks since the mid-2000s and several legislative interventions have introduced regulations to prevent and mitigate these risks. Observing the evolution of legislative interventions over the past two decades is interesting. Legislative Decree No. 82 of 2005, the so-called Digital Administration Code, marks the moment of acceleration of the PA's digitalisation process. Article 51 shows an initial intervention on data security, stating that “The security standards defined in the technical rules ... guarantee the accuracy, accessibility, integrity and confidentiality of data” and that “Computer documents of public administrations must be kept and controlled in such a way as to minimise the risks of destruction, loss, or unauthorised access or access not following the purposes of collection”. In the same year, Law No. 155/2005 on urgent measures to combat international terrorism was adopted, including Article 7a on cyber security, where the cyber protection services of critical digital infrastructures of national interest were allocated to the Ministry of the Interior, with the enforcement role of the Postal Police in case of cyber-attacks. Critical ICT infrastructures are defined through the criteria and procedures identified in the Decree of January 9, 2008, which includes all systems and 2 See the interventions adopted in the United Kingdom, The UK Cyber security Strategy: Protecting and Promoting the UK in a Digitalised World (2011); in Austria, the National ICT Security Strategy (2012); in Estonia, the Cybersecurity strategy (2008); in France, the Défense et sécurité des systèmes d'information: Stratégie de la France (2011); and in the Netherlands, the Defence Cyber Strategy (2012). For a comparison of the issues in the respective national legislations and policies [8]. For Italy [1]. services supporting ministries, agencies and entities supervised by them, operating in the areas of international relations, security, justice, defence, finance, communications, transportation, energy, environment, and health.3 They are joined by the Bank of Italy and independent authorities and companies owned by the state, regions and municipalities in the communications, transport, energy, health and water sectors. Since the 2010s, interventions related to cybersecurity have intensified, paying greater attention to the specificities that may emerge both from the protection of public administrations and from national defence. In 2012, the so-called Italian Digital Agenda was defined, creating an Agency for Digital Italy (Agenzia per l’Italia Digitale - AgID). The agency, established by Decree-Law No. 83/2012 (converted into Law No. 134/2012), had the task of coordinating “actions in the field of innovation to promote ICT technologies to support public administrations, guaranteeing the realisation of the objectives of the Italian Digital Agenda, in coherence with the European Digital Agenda”. The importance of cybersecurity issues ranks among AgID's first strategic actions with the 2013 Digital Agenda Implementation Strategy [12]. The Prime Minister's Decree of January 24, 2013, addressing cyber protection and national cybersecurity, was the first piece of legislation to coordinate cybersecurity-related activities involving public administrations and the intelligence community.4 Subsequent national strategic documents, the National Strategic Framework for Cyberspace Security and the National Plan for Cyberspace and Cybersecurity defined the internal organisation to enable timely and coordinated responses to cyber threats targeting national assets. What emerges is the need to keep defence strategies continuously updated given the constantly evolving technologies, and on the other hand, the need for a wide-ranging involvement of the actors involved in this process, not only public and private entities but also citizens who can alert on potential cyber threats [2]. In 2016, changes were adopted to comply with Directive 2016/1148 on the security of networks and information systems (NIS Directive), representing the first horizontal legislative intervention undertaken at the European level to protect networks and information systems throughout the Union. As evident from the preceding analysis, the legislator had to intervene to adapt the pre- existing system to the European standards; however, unlike in other European countries, the impact of the changes was limited since both competencies and organisational structures had already been identified during the previous decade. A significant impetus for improving the existing regulatory framework has been the need to define the requirements for the prevention and resilience of so-called essential services operators. To understand 3 It is important to note that this decree anticipates by almost a year the Directive 2008/114/EC on the identification and designation of European critical infrastructures and assessing the need to improve their protection. The sectors this directive covers are energy and transport, and there was no agreement at the European level to extend them further. 4 The new organisation provides an apex role to the President of the Council of Ministers and the ministers who comprise the Committee for the Security of the Republic (CISR) with political-strategic tasks. Operational support is then provided by the Inter-Ministerial Committee, chaired by the Director General of the Department of Information for Security (DIS), which carries out both the preparatory activity of the work of the Inter- Ministerial Committee and the coordination between relevant administrations and offices, as well as between them and the public and private entities called upon to implement it. this framework, it is necessary to briefly analyse the NIS Directive and understand how the Italian legislature has implemented the national cybersecurity strategy. 3. The Network and Information Systems Security Directive The Network and Information Systems Security Directive 2016/1148 (NIS Directive) has three main pillars: 1. Strengthen strategic cooperation and information exchange at the European level through the creation of a cooperation group and a network of cybersecurity incident response teams (CSIRT network) 2. Require the adoption of national cybersecurity strategic plans at the national level, including the establishment of national competent authorities and CSIRTs for essential services 3. Identify prevention and resilience mechanisms for essential service operators (OESs) and digital service providers (DSPs). Without going into detail on the specific aspects of each pillar, it is important to stress a set of innovations. According to Article 7 NIS, each member state must adopt a national framework that includes the national network and information systems security strategy and the designation of authorities responsible for monitoring the implementation of the NIS Directive. The strategy must include several predefined aspects listed in the abovementioned article but free the member states to design their national strategy. This was an important step, as not all member states had already adopted any measure regarding cybersecurity. Articles 8, 9, 11 and 12 of the NIS Directive then identify the authorities and other bodies responsible for monitoring its implementation at national and EU level [6]. The NIS Directive identified two categories of target actors that should be subject to specific obligations: essential service operators (OES) and digital service providers (DSPs). OES are public or private entities operating in sectors relevant to the national economic system (Art. 4 NIS). Within Annex II of the NIS Directive, the sectors identified as essential are listed in detail: energy, transportation, banking, financial market infrastructure, health sector, drinking water supply and distribution, and digital infrastructure. Additional elements are also included in Article 5 NIS. As a result, not all OES operating in the areas identified in the directive fall within the scope of the directive. It is up to the member states to identify the list of OSEs at the national level. This determination is not made public and remains a state secret to protect the operators themselves from cyber-attacks. The application of uniform criteria in identifying OSEs is essential to consider not only the possible presence of cross-border dependencies but also to ensure a level playing field for operators operating within the internal market and reduce the risk of divergent interpretations. OES are subject to several reporting obligations and security requirements (Article 14 NIS): OES must take appropriate and proportionate technical and organisational measures to manage risks and prevent and minimise the impact of network and information system security incidents to ensure service continuity. Security requirements are defined by member states and based on a risk-based approach: technical and organisational controls must be appropriate and proportionate based on the risks associated with the type of service performed. However, the Directive does not indicate the methodology for the relevant risk assessments or the technology to use. This is justifiable because identifying a specific approach would risk being quickly obsolete given the rapid developments in the field and because the risk assessment would have to be adapted to different sectors. According to Art. 14 NIS, OES are required to report, without undue delay, incidents that significantly impact service continuity and service provision, respectively, to the national CSIRT. OES are required to report significant incidents, i.e., incidents that seriously impact the service provided. To identify significant incidents, the directive provides a set of criteria: • Number of users affected by the interruption of an essential service • Time interval during which the essential service was not operational • Geographical extent of the area affected by the incident. Once the significant incident has been notified, the national competent authority or CSIRT will support the notifying entity in managing the incident. It should be noted that incidents not qualifying as significant are not subject to the notification requirement. The same applies to legal entities not identified as OES. However, in both cases, companies may submit voluntary notifications to the CSIRT of incidents that have a material impact on the continuity of their services. It should also be noted that these notification requirements are more limited in scope than those for personal data breaches, regulated by the General Data Protection Regulation (GDPR), which must always be notified “unless the personal data breach is unlikely to present a risk to the rights and freedoms of natural persons” (art. 33 GDPR). The different regimes and differences in evaluation criteria in the case of, for example, a data breach that is also relevant as an incident under NIS involving personal data entails different and contradictory organisational and compliance complexities regarding protection requirements and their economic relevance. This highlights the coordination problem between the notification requirement for cybersecurity incidents and the notification requirement under the GDPR in case of data breaches. Given that, in many cases, a data breach can be at the same time a security incident, the same essential operator acting as a data controller is required to send two different notifications, one to the national CSIRT about the security incident and the other to the Data Protection Authority about the data breach. While in the first case, the obligation must be done "without undue delay," in the second case, the GDPR imposes a specific time constraint of 72 hours after the event is known, with consequent rules for updating information and the need to justify any delay. 4. The Italian implementation The NIS Directive was transposed into Italian law by Legislative Decree No. 65 of May 18, 2018, which defines the regulatory framework for network and information security measures to be adopted and identifies the entities responsible for implementing the obligations under the European legal framework. However, the Italian state decided to strengthen standards and procedures to ensure a higher level of security of networks, information systems and IT services of public administrations, as well as national public and private entities and operators, through the establishment of the so-called National Cybersecurity Perimeter with the Decree-Law of September 21, 2019 (Perimeter Decree). In this context, Article 1 (8) Perimeter Decree requires OES and DSP providers to comply with the cybersecurity requirements outlined in Decr. Leg. no. 65/2018, if they are at least equivalent to those established by the Perimeter Implementation Decree. The same article gives the National Cybersecurity Agency the power to define additional measures to meet the security standards established by the Perimeter. The Decree also stipulates that implementing rules to specify further the obligations of those involved will be defined through subsequent legislative interventions, which took the form of four Prime Ministerial Decrees, a Presidential Decree, and a series of acts and communications from various committees. The Italian government adopted the first D.P.C.M. No. 131 of July 30, 2020, which identifies the public and private entities that fall within the Perimeter and the criteria for creating lists of relevant networks, information systems and IT services of those entities. The second D.P.C.M., No. 81 of April 14, 2021, defines the procedure for reporting incidents and mandatory technical security measures. The third intervention, Presidential Decree No. 54 of February 5, 2021, establishes a procedural framework for the procurement of ICT assets for use on networks, information systems and IT services by entities within the Perimeter; the categories of these assets are further identified by the Prime Ministerial Decree of June 15, 2021. This discipline of public control over public and private procurement procedures represents another node of interference/interaction between cybersecurity and private law rules. In fact, “prior to the initiation of procurement procedures or, where not provided for, prior to the conclusion of contracts for the supply of ICT goods, systems and services referred to in Article 1, paragraph 6(a)” of DPCM 54/2021, notification must be made to the CVCN or CVs called to perform the tests, referred to in Article 6 and Article 7 but, more importantly, to dictate any “possible conditions and tests of hardware and software to be included in the clauses of the tender or contract, referred to in Article 5, as well as any usage requirements to the entity included in the scope” (Art. 4 paragraph 3). Indeed, some interesting features emerge. First, it devolves to an administrative authority (technically, the CVCN is an internal articulation of an Agency and not an independent Authority), with the possibility of defining the limits to the private autonomy of the parties. However, such limits are entirely demanded by the administrative authority as no general and abstract definition can be found in the underlying legislation. Parties that do not follow the indications or do not report the procedures/contracts may incur sanctions. In any case, the business transaction, even possibly entirely private, can be wholly prohibited if the procedure leads to a negative outcome or can be subject to conditions more or less invasive towards contractual and entrepreneurial autonomy (e.g. limitations on use, duration, insertion of contractual clauses). Given that the inclusion in the National Cybersecurity Perimeter should be a state secret, which should also be maintained in case of contractual transactions that led to a negative or conditional assessment by the CVCN, the economic operator involved in such transaction lies in a complex situation. On the one hand, it should negotiate (and bear the related costs) the content of the clauses, taking into account the limits imposed by the CVCN, and in case of a breakoff of the negotiations (with consequent legal and economic responsibilities), without being able even to explain the reasons. Moreover, should the proposed contract clauses by the CVCN be structured in such a way as not to adequately disguise their founding reasons, the same economic operator would directly or indirectly ‘reveal’ the inclusion within the Perimeter of the entity involved, with even more significant harm to both state security and to the entity involved. Such framework shows that the procedures and the solutions adopted require skills and practices that have not been developed yet and that lead, on the one hand, to the involvement of private entities in the creation of the general framework of national cyber-physical security and, on the other hand, to the need for an update (perhaps not only) interpretation of several private law rules. As we shall see below, the reference to cyber-physical security is not accidental, given the interrelationship of the two types of security, similar to the repercussions of what has just been emphasised in contractual dynamics. DPCM No. 131/2020 establishes the procedural criteria by which the relevant public administration shall identify the entities included in the Perimeter. As anticipated, the list of entities in the Perimeter will be included in an administrative act adopted by the Prime Minister, which is not subject to publication. The rationale for secrecy lies in the underlying purpose of protecting national security; however, the secrecy is more formal than real, as most of the entities within the scope of the Perimeter are easily identifiable, as these entities represent the most critical players in the sectors identified by the legislation. Interestingly, Art. 1(5) Perimeter Law and Art. 3(1) Prime Minister's Decree No. 131/2020 provide an element of "flexibility" in terms of adjustments to the national legal framework for cybersecurity: the former establishes a legal basis for updating the implementing decrees, while the latter explicitly provides for the possibility of extending the scope to other sectors when the decree is updated. Entities within the Perimeter are obliged to prepare a list, updated annually, of the networks, information systems and IT services that constitute the ICT assets under their control. The list must be compiled using a scalable, risk-based approach so that the ICT assets that would cause complete disruption of the essential function or service in the event of an incident are evident. Operators included in the perimeter are then required to describe the architecture and parts of the previously identified ICT assets based on a template provided by the National Information Security Agency. This obligation could prove particularly challenging, especially given the high rate of digitisation of many operators. These lists must be submitted to the Agency within six months of receiving notification of registration in the Perimeter. The reporting procedure and risk management measures are defined by DPCM No. 81/2021. Information security incidents are classified according to their impact on ICT assets. The provided taxonomy distinguishes two types of incidents based on their severity.5 This classification is functional to the different time frames required for an effective response: incidents identified in Annex A, Table 2, are to be reported within one hour, while the ones falling in Table 1 should be reported within six hours. These deadlines run from the moment the entity becomes aware of the incident, such as through the monitoring, testing and control activities based on the cybersecurity measures provided for in the same decree. Regarding IT security measures, Annex B DPCM No. 81/2021 contains a complex and very detailed taxonomy of IT security measures. These measures, which fall under the category of technical controls, are grouped according to their functions: identify, protect, detect, respond and recover. Entities must notify the Information Security Agency without undue delay of adopting such measures; notification is also required for related updates. Interestingly, DPCM No. 81/2021 provides explicitly for aspects related to data security, incorporating the requirements of the General Data Protection Regulation, No. 679/2016. The structure adopted by the legislature to identify cybersecurity measures echoes the Cybersecurity Framework model developed by the National Institute of Standards and Technology (NIST) in 2014 and adopted at the U.S. level to reduce cybersecurity risks. The Italian model is divided, as well as the NIST standard, into five classes. Each function is then divided into categories and subcategories representing the individual controls to be addressed in the risk analysis and assessment. Compared to the U.S. model, the framework of requirements provided at the Italian level is broader because it includes, as mentioned, the subcategories related to implementing regulations related to the protection of personal data. As highlighted in the research carried out as part of the ERACLITO project [5], the legal and technical requirements outlined in the regulations are multiple and detailed, requiring numerous interventions and investments of both technical and organisational nature to the companies that fall under the perimeter to demonstrate compliance. DL No. 82/2021 established the National Cybersecurity Agency to assume the role of the National Cybersecurity Authority as the single point of contact for the NIS Directive and the National Cybersecurity Certification Authority for the Cybersecurity Act. In this regard, Chapter IV of Presidential Decree No. 54/2021 establishes the supervisory powers and procedures for inspections and audits concerning fulfilling the various obligations imposed by the DPCMs. In addition to periodic monitoring, Chapter IV also provides for ad hoc inspections if deemed necessary in exceptional cases (e.g. as a result of incident notifications, non-compliance with any of the obligations arising from the implementation of the relevant regulations, and notifications from other public authorities). Audit activities are carried out through document analysis and verification. The Perimeter Decree moreover introduces different administrative penalties for failure to comply with the obligations imposed by the Perimeter Decree and its implementing decrees. For example, failure to comply with the obligation to prepare, update and submit 5 Table 1 in Annex A contains the less severe incidents (e.g. infection, failure, installation, lateral movement, actions on targets) and Table 2 the more severe ones (e.g. actions on targets and disruption). lists of networks, information systems and IT services is subject to an administrative penalty ranging from 200,000 to 1.2 million. In contrast, failure to report cybersecurity incidents or implement cybersecurity measures is subject to fines ranging from 250,000 to 1.5 million. Interestingly, harsher penalties are imposed for non-compliance with procurement requirements: an entity that fails to notify the CVCN of its contract for the supply of ICT goods and does not comply with the conditions set by the CVCN can be fined up to 1.8 million. In addition, Article 1(11) Perimeter Decree also provides for the criminal penalty of imprisonment of one to three years for providing false information, data or facts or the failure to report such data in order to hinder or influence the completion of procedures related to incident reporting, cybersecurity management measures, procurement or inspections, and supervisory activities. 5. The evolution of the regulatory framework As member states worked to implement the NIS Directive, the Commission presented in December 2020 the new legislative instrument aimed at replacing the NIS Directive, overcoming some of the shortcomings of the latter, eventually adopted as Directive 2555/2022 on measures for a high common level of cybersecurity in the Union (NIS 2). NIS 2 still aims to improve security to safeguard the digital internal market by establishing harmonised standards in cybersecurity risk management and incident reporting. This approach is also confirmed by extending the number of areas covered by NIS 2, which will consequently increase the number of entities to which the obligations and requirements will bind. The increased number of entities involved will amplify the interference with contractual autonomy highlighted earlier. However, this is not enough. It is essential to point out that the current structure of NIS 2 is based on evaluation and reporting on the impact of the NIS directive. One of the first challenges that emerged from the structure of NIS 1 was identifying the actors included in the scope. NIS 2 distinguishes between essential entities (EEs) and important entities (IEs) without substantial differences regarding reporting requirements and obligations. The identification criteria have changed: the first criterion is enterprise size, excluding small and micro enterprises from its scope (Art. 2(1) NIS 2). Although the Commission admits that this criterion “is not necessarily an ideal stand- alone criterion for determining the importance and criticality” of an entity, it is a significant proxy for determining whether certain entities play vital roles in society and the economy. While the need to limit the impact of legislation that is challenging for private entities involved is understandable, it remains problematic to prioritise the selection of a quantitative criterion that, despite exceptions, does not present sufficient, objective and flexible criteria capable of weighing the quality of the entity to be involved. Indeed, the text provides an extensive list of exceptions, which apply regardless of company size. For example, size is irrelevant in the case of services provided by providers of public electronic communications networks or publicly accessible electronic communications services, by providers of trust services, or even by top-level domain name registries and domain name system service providers; in the case of entities that are the sole provider in a member state of service essential to the maintenance of critical social or economic activities; where the interruption of the service provided by the entity could have a significant impact on public safety, public security or public health; or for public administration entities. The second criterion is activity in one of the sectors identified in Annexes I and II of NIS 2. Interestingly, NIS 2 significantly extends the scope of the NIS Directive, adding new sectors such as telecommunications, social media platforms, and public administration. It is essential to underline that the size criterion combined with the list of exceptions cannot intercept increasingly topical situations, such as those links included in the production chains whose role does not directly fall within the listed exceptions. Even though such links cannot be qualified as the sole provider of an essential service to the maintenance of critical social or economic activities in a member state, they still represent a bottleneck for the production chain that might bring the link back within the perimeter or even allow the qualification as an essential entity. This observation leads us to anticipate a further regulatory and operational short circuit that can be generated. In fact, in the absence of suitable tools and quality verification criteria to identify bottlenecks in production chains and, perhaps, suitable technical and economic capacity on the part of EEs/IEs, these have net responsibilities in propagating security requirements and obligations along their production and supply chains. Article 21 (2) requires that security measures include “(d) supply chain security, including security aspects of the relationship between each institution and its direct suppliers or service providers”. Paradoxically, EE and IE entities, in addition to being able to identify and implement ‘appropriate and proportionate’ measures internally to their organisation, are still called upon to address supply chain security. The result is again the imposition of obligations and capabilities to analyse risks and design economic and legal models to govern them on private entities that, despite the regulatory imposition, may not have the capabilities or even awareness. We are unaware of any financial or other modes of assistance to address these actual compliance costs with a high impact on contractual and entrepreneurial autonomy. The practical result, therefore, could lead to both high compliance costs and unsatisfactory levels of compliance effectiveness. Concerning reporting requirements, NIS 2 provides a two-step approach to incident reporting that overcomes problems arising in implementing NIS. During the first phase, the affected entity must inform, with an initial report, the national authority or CSIRT within 24 hours of becoming aware of an incident. After that, the same entity will provide a full report within 72 hours of becoming aware of the incident. The second stage involves the full recovery of the problem, with a final report to be submitted one month after the initial report. In terms of enforcement, the directive establishes a minimum list of administrative fines for cases where entities violate the cybersecurity risk management rules or notification requirements under NIS 2. These are then complemented by the powers provided for national authorities, which include warnings, adoption of binding instructions, and implementation of recommendations (Art. 32(4) NIS 2). 6. Open issues and the need for further research The rapid evolution of the regulatory framework at the European level regarding information security with the adoption of the NIS 2 directive leads to considerations regarding how it should be implemented at the national level. First, in light of the different levels of detail provided in Art. 21 NIS 2 regarding the measures to be taken by EEs and IEs on information security compared to the laconic indications provided in Art. 14 NIS, it will be necessary for the Italian legislature to assess whether the current requirements in Table B of DPCM No. 81/2021 are sufficient and in line with the provisions of the new legislative framework. Moreover, updating the NIST standard itself is also worth mentioning. In August 2023, the draft of the so-called NIST 2.0 was presented. Again, numerous changes could be relevant, where the Italian legislature wants to maintain an affinity (rectius conformity) with the U.S. standard. A related aspect is the need to harmonise the requirements set by member states for cybersecurity at the European level. While ENISA's supportive and advisory role has made it possible to steer the choices of national governments in the same direction, the presence of even partially different requirements could result in companies offering essential services in more than one member state. In this sense, the role of the Cooperation Group can be an essential framework in which not only to exchange best practices and information regarding the implementation of the directive but also to identify common choices and approaches regarding the security standards to be adopted(Article 14(3)(c) NIS 2). One of the problematic aspects of NIS 2 is the choice to exclude small and micro enterprises from the scope of application. These entities, considering the size criterion in the directive, are not subject to any obligation to adopt cybersecurity safeguards. Although numerous exceptions relate to the importance and criticality of the services performed by enterprises in the European territory, many remain uncovered. This leads to increased risk, as most micro and small enterprises have fewer economic and organisational resources invested in cybersecurity, but they also become prime targets for cyberattacks. Thus, in this case, it seems essential to use an indirect form of implementing cybersecurity measures through supply chain control. As per Article 21(2)(d), the security measures to be taken by EEs and IEs also include verification of the level of security taken by direct suppliers or service providers. The directive's definition, in this case, does not place any constraints: every type of supplier and provider, regardless of size, industry, and type of products and services offered, is included. This is crucial to ensure that cyber threats and attacks cannot be perpetrated through flaws or vulnerabilities that can be traced back to components used by the EE or IE in their business [9]. From a practical standpoint, therefore, the EE or IE will need to provide for mapping of its suppliers and service providers and apply security measures equivalent to those already taken at the enterprise level. Moreover, such mapping is also critical information for the regulator at the national level: providing for a sharing with the National Cybersecurity Agency of the supply chain would allow the same agency to check for possible overlaps, for example, in the case of suppliers and providers operating with multiple EEs or IEs. Where a cyber threat is focused on a specific component developed by a supplier, it would be possible to anticipate possible controls on other EEs and IEs using the same supplier. In addition, in the case of suppliers or providers not established in the same European country or outside the European territory, it would be possible to anticipate forms of coordinated control at the European level through the aforementioned Cooperation Group provided for in Article 14 NIS 2. Suppose these conclusions are valid regarding the policy of law and the implementation of NIS2. In that case, the conclusion that the analysis has allowed us to reach in terms of critical regulatory issues remains, in our opinion, fundamental. This first exercise emphasises the importance of the combined mapping of obligations under cybersecurity regulations and the digitisation framework. This is an essential contribution not only to enable compliance but, more importantly, to enable it in a way that takes advantage of synergies between obligations that can be met with the same resources, avoiding duplication that, in addition to representing a cost, also presents a definite risk of confusion in those called upon to implement them. However, the reasoned mapping of obligations and their recipients and identifying corresponding controls is only a first step in highlighting the new lines of convergence and tension between different and increasingly mutually related regulatory plexuses. What seems to us to be beginning to emerge is a general regulatory framework for cybersecurity that no longer needs to relate only to allied disciplines related to digitisation and the data society (e.g., the discipline of personal data protection or its governance) but also to general institutes of private law, such as general contract law. Further study will be needed to explore the meanings, limits, and effects of these relationships to identify both interdependencies with general disciplines and institutes (e.g., the pre-contractual liability of the private contracting party who, because of clauses "imposed" by the CVCN does not sign the final) and the new interrelationships that are opening up between specific sectors downstream of the expansions that NIS 2 is making in the regulatory landscape and the system of business-to-business and business-to-national security relationships. Acknowledgements The research was carried out in the framework of the PNRR project “SoBigData.it: Strengthening the Italian RI for Social Mining and Big Data Analytics” (CUP B53C22001760006) (F. Casarosa); The research was carried out in the framework of the PNRR project “Partenariato Esteso” SERICS (PE00000014) – Eraclito, Spoke 7, funded by Next Generation EU (G. Comandé). References [1] R. Baldoni and L. Montanari (eds), Italian Cyber Security Report, Un Framework Nazionale per la Cyber Security. Research Center of Cyber intelligence and information security - Università di Roma Sapienza, 2015. URL: http://www.cybersecurityframework.it [2] C. Cencetti, Cybersecurity: Unione europea e Italia. Prospettive a confronto, Editore Nuova Cultura, Roma, 2014. [3] CLUSIT, Rapporto 2023 sulla sicurezza ICT in Italia, 2023. URL: https://clusit.it/rapporto-clusit/ [4] European Union Agency for Cybersecurity, Definition of Cybersecurity - Gaps and overlaps in standardization, 2015. [5] ERACLITO project, Deliverable 1.1 Project Requirements, URL: https://www.lider- lab.it/en/eraclito-2/. [6] A. Lauro, Sicurezza Cibernetica e Organizzazione Dei Poteri: Spunti Di Comparazione, Rivista Gruppo di Pisa, 2021, 529. [7] M. Lesk, The New Front Line: Estonia under Cyberassault IEEE Security & Privacy, 2007, vol. 5, no. 4, pp. 76-79. [8] S. Mele, I principi strategici delle politiche di cybersecurity, 2013. URL: https://www.sicurezzanazionale.gov.it/sisr.nsf/approfondimenti/principi-strategici- delle-politiche-di-cyber-security.html. [9] G.D. Mosco, La collaborazione tra imprese per la sicurezza informatica, Labour Law Review, n. 2, 2017, 157 [10] V. Papakonstantinou, Cybersecurity as praxis and as a state: The EU law path towards acknowledgement of a new right to cybersecurity? Computer Law & Security Review, 2022, 44, 105653. https://doi.org/10.1016/j.clsr.2022.105653 [11] S.J. Shackelford, Estonia Two-and-A-Half Years Later: A Progress Report on Combating Cyber Attacks Journal of Internet Law, 2010. URL: https://ssrn.com/abstract=1499849 [12] M. Zilianti, Verso un’architettura digitale unica e sicura per la P.A.: il ruolo di AgID e Consip, in LLR, 2017, n. 2, 2017, 81. [13] L. Zorloni, L’invisibile Cyber guerra della Russia per piegare l’Ucraina, 21 Febbraio 2023. URL: https://www.wired.it/article/ucraina-russia-guerra-attacchi-informatici- malware-ddos-energia/