Article 29

Cybersecurity information-sharing arrangements

1.   Member States shall ensure that entities falling within the scope of this Directive and, where relevant, other entities not falling within the scope of this Directive are able to exchange on a voluntary basis relevant cybersecurity information among themselves, including information relating to cyber threats, near misses, vulnerabilities, techniques and procedures, indicators of compromise, adversarial tactics, threat-actor-specific information, cybersecurity alerts and recommendations regarding configuration of cybersecurity tools to detect cyberattacks, where such information sharing:

(a)

aims to prevent, detect, respond to or recover from incidents or to mitigate their impact;

(b)

enhances the level of cybersecurity, in particular through raising awareness in relation to cyber threats, limiting or impeding the ability of such threats to spread, supporting a range of defensive capabilities, vulnerability remediation and disclosure, threat detection, containment and prevention techniques, mitigation strategies, or response and recovery stages or promoting collaborative cyber threat research between public and private entities.

2.   Member States shall ensure that the exchange of information takes place within communities of essential and important entities, and where relevant, their suppliers or service providers. Such exchange shall be implemented through cybersecurity information-sharing arrangements in respect of the potentially sensitive nature of the information shared.

3.   Member States shall facilitate the establishment of cybersecurity information-sharing arrangements referred to in paragraph 2 of this Article. Such arrangements may specify operational elements, including the use of dedicated ICT platforms and automation tools, content and conditions of the information-sharing arrangements. In laying down the details of the involvement of public authorities in such arrangements, Member States may impose conditions on the information made available by the competent authorities or the CSIRTs. Member States shall offer assistance for the application of such arrangements in accordance with their policies referred to in Article 7(2), point (h).

4.   Member States shall ensure that essential and important entities notify the competent authorities of their participation in the cybersecurity information-sharing arrangements referred to in paragraph 2, upon entering into such arrangements, or, as applicable, of their withdrawal from such arrangements, once the withdrawal takes effect.

5.   ENISA shall provide assistance for the establishment of cybersecurity information-sharing arrangements referred to in paragraph 2 by exchanging best practices and providing guidance.

Frequently Asked Questions

NIS2 promotes sharing cybersecurity information between organizations like vulnerabilities, threats, and best practices to help quickly identify risks, limit damage from attacks, and improve overall security; participating organizations benefit from learning about new threats earlier and getting specific advice to effectively prevent, detect, and recover quickly from cyber incidents.
Under NIS2 arrangements, organizations voluntarily share vital cybersecurity details such as detected cyber threats, attempted attacks (near misses), security vulnerabilities, hacker tactics, recommended security tool configurations, real-time security alerts, potential attackers’ behavior, advice on stopping cyberattacks, and information to prevent future security incidents and reduce their effects.
Member States support cybersecurity information sharing by helping establish safe, structured ways for companies and authorities to exchange sensitive security information; governments may also specify how sharing occurs, provide secure communication platforms, outline clear guidelines, encourage public-private cybersecurity collaborations, and ensure that participants are supported throughout the entire sharing process.
Yes, under NIS2, essential and important organizations must inform their local competent authorities when they enter into cybersecurity information-sharing arrangements and also notify these authorities of their withdrawal once it becomes effective; this ensures transparency, proper oversight, and clear awareness among government bodies about current cybersecurity collaboration status and participants.

NIS2 Training

Get Started within 24 hours.

Once you have submitted your details, you’ll be our top priority!