Filters

Appendix V — Proportionality considerations related to indicators of complexity

ED Decision 2025/014/R

The following is a non-exhaustive, non-binding, list of activities related to the implementation of the ISMS under this Regulation. These activities are proposed in association with a set of indicators, with activities suggested at the lower and upper ends of the scale. Organisations are encouraged to assess their own level for each indicator, selecting or adapting the proposed activities based on their specific information security risks and organisational context. This approach helps to keep the activities proportionate to the overall safety relevance and complexity of the organisation.

Indicator of the degree of safety relevance: the organisation’s role in the functional chain, and the number and criticality of interfacing organisations

The organisation’s role in the functional chain and its overall contribution to the safety of related functional processes are key indicators of safety relevance. This should impact the depth of risk assessment required and the level of assurance needed to ensure the effectiveness of measures implemented to mitigate unacceptable risks.

Low safety relevance: organisations whose role in the functional chain and their interfaces do not pose a risk of unsafe conditions

The following approach may be adopted:

Risk assessment and treatment

Simplified risk assessment: A streamlined risk assessment process that prioritises risks based on their potential impact on safety is used. The assessment focuses on high-impact areas; more detailed assessments are performed only where and if necessary.

Risk treatment prioritisation: A risk treatment plan that prioritises high-impact risks with costeffective measures is adopted. In such cases, cost-effective controls that reduce risks to acceptable levels may be used. These controls can often leverage existing processes, physical controls or technology.

High safety relevance: organisations whose role in the functional chain and their interfaces may pose a risk of unsafe conditions

The following approach may be adopted:

Risk assessment and treatment

Detailed risk assessments: Detailed and often more frequent risk assessments are carried out for those elements that have been identified as having a relevant safety impact, i.e. an unsafe condition.

Indicator of complexity 1: complexity of the organisational structure and hierarchies

The complexity of an organisation’s structure — typically determined by the number of staff, departments and hierarchical layers — directly influences the level of internal coordination required and the extent to which information exchange needs to be formalised and proceduralised.

Low complexity: organisations characterised by a combination of limited number of staff members, few hierarchical layers and departments

The following approaches may be adopted:

(a)Policy and procedure simplification

Streamlined documentation: Policies and procedures are concise, clear and easy to read. Documents are kept short and simple to make them easily understandable. Templates can be used in order to expedite the creation of the necessary documentation.

Focus on key policies: During the development, the key policies have been prioritised in order to address the most critical aspects of information security, such as management commitment, access control and incident response.

(b)Employee training and awareness

Targeted training programmes: Focused training programmes that target the specific roles and responsibilities of employees are provided. The training is relevant to the organisation’s specific risks and operational context.

Security culture: A culture of information security awareness is encouraged throughout the organisation. Short training sessions and awareness campaigns are conducted on a regular basis.

(c)Outsourcing and partnerships

Outsourcing: For areas where the organisation lacks expertise, outsourcing to providers of managed-security services is adopted.

Collaboration with peers: Information-sharing with similar organisations (e.g. through the European Centre for Cyber Security in Aviation (ECCSA)) or industry groups is carried out. Collaboration provides insights to evaluate the evolution of the security environment with limited effort.

(d)Engagement with management

Simplified management reporting: Reports to management are concise and focused on key metrics that demonstrate the effectiveness of the ISMS. Continued support and resource allocation from top management is ensured.

(e)Compliance monitoring and continuous improvement

Regular but scaled audits: Internal audits are regularly conducted, but the effort is scaled to the organisation’s size and complexity. The focus is on the most critical areas, and the audit results are provided to the accountable manager or the head of the design organisation and utilised to guide continuous improvement.

Agile review process: The ISMS is regularly reviewed and, if necessary, adapted to ensure that it remains aligned with the organisation’s evolving needs and threats.

High complexity: organisations characterised by a combination of large number of staff members, hierarchical layers and departments and interfaces

The following approaches may be adopted:

(a)Robust governance structure

Information security governance: Governance implementation to oversee the ISMS is present. This is to ensure alignment with the organisation’s safety and security objectives. This governance should operate through formal committees or working groups that include representatives from senior management, safety, information technology, legal and key business units.

Metrics and reporting: Comprehensive metrics and reporting structures to track the effectiveness of the ISMS are implemented. Report on key performance indicators (KPIs) to senior management and the management board are provided to ensure ongoing support and resource allocation.

(b)Extensive policy and procedure framework

Detailed policies and procedures: Although streamlined documentation is still the overall objective, more complex organisations may require a broader range of policies and procedures to cover different business units and departments, compliance requirements and operational processes.

Policy harmonisation: Policies are harmonised across the organisation to avoid conflicting practices between different departments or regions. This requires a centralised governance model to oversee policy development and enforcement.

(c)Risk assessment and treatment

Cross-risk assessments: Cross-risk assessments include assessing risks across various departments, geographic locations and technological platforms.

Risk aggregation and correlation: With a larger volume of information, risks assessments are aggregated and correlated to identify systemic issues and ensure that risks are managed and escalated at an organisational level, not just within individual silos.

(d)Comprehensive training and awareness programmes

Role-based training: Extensive role-based training programmes tailored to different functions within the organisation are implemented. For example, IT staff, executives and end-users all have different levels of training specific to their roles.

Continuous security awareness campaigns: Security awareness campaigns using various methods (e.g. phishing simulations, workshops and e-learning modules) are continuously deployed to keep security top-of-mind for all employees across the organisation.

(e)Enhanced contracted activities management

Supply chain risk management: Thorough information security assessments of contracted organisations and ongoing monitoring of third-party risks are carried out. Information security requirements are integrated into contracts.

(f)Comprehensive incident management

Security monitoring and incident response capability: In order to monitor security events around the clock, manage incidents and coordinate response efforts across the organisation, structured security operations are established. Depending on the organisation’s resources, this can be achieved through a dedicated security operations centre (SOC), a virtual SOC, managed security services or other appropriate solutions that ensure effective coverage.

Complex incident response plans: Detailed incident response plans that cover a variety of scenarios, including cross-departmental coordination, communication strategies and operational continuity planning are developed and maintained.

Crisis simulation exercises: Crisis simulation exercises that involve key stakeholders across the organisation are regularly conducted to test the effectiveness of incident response and operational continuity plans.

(g)Continuous improvement and compliance monitoring programmes

Internal audits: Comprehensive internal audits are regularly conducted to assess compliance with the ISMS and identify areas for improvement.

Audits of contracted organisations: To ensure compliance with the organisation’s security and safety objectives, audits of contracted organisations are conducted at a frequency proportionate to the relevance of the contracted activities to security and safety. Using the results of existing relevant audits is also encouraged to reduce the burden.

Continuous improvement programmes: A continuous improvement process to update and refine the ISMS based on audit findings, incident post-mortems and changes in the threat landscape is implemented.

Indicator of complexity 2: complexity of the ICT systems and data used by the organisation

The complexity of the information and communication technology systems and data used by the organisation, and their connection to external parties, directly influences the level of customisation and tailoring required for risk management and incident detection, response and recovery.

Low complexity: organisations characterised by a combination of usage of a few ICT tools and utilisation of standard ICT products

The following approaches may be adopted:

(a)Use of standards and tools

Leverage ISO/IEC 27001:2022 controls as a baseline: ISO/IEC 27001:2022 Annex A provides a catalogue of controls that are selected based on the results of the risk assessment. Similarly, NIST SP 800-53 offers a comprehensive set of controls that can be adapted to specific threats and operational requirements. Aligning control selection with risk assessment outcomes ensures that the controls are suitable for the specific threats and vulnerabilities identified, while reducing the effort involved in designing controls from scratch. Additionally, using the controls as a checklist helps to ensure that critical areas are addressed. To ensure full alignment with aviation-specific information security requirements under Part-IS, it is also recommended to consult the Part-IS versus ISO/IEC 27001:2022 comparison guide.

Simplified incident management: A basic incident management process that allows for quick identification, reporting and response to security incidents is adopted. Lessons learned from incidents are in any case integrated into the ISMS for continuous improvement.

Automated tools: Automated tools for monitoring, logging and managing security incidents are used in order to reduce manual effort while maintaining continuous compliance.

(b)Documentation and record-keeping

Essential records: Only records that are essential to demonstrate compliance and the effectiveness of the ISMS are kept. Excessive documentation that does not add value or is burdensome to maintain is avoided.

Use of digital solutions: Digital tools are used for document management to simplify access and version control, and to ensure the security of records.

High complexity: organisations characterised by a combination of usage of several and diverse ICT tools, amongst which bespoke ICT solutions

The following approaches may be adopted:

(a)Advanced security technologies

Integration of advanced security tools: Security technologies like security information and event management (SIEM), data loss prevention (DLP), and endpoint detection and response (EDR) systems are utilised to help manage the scale and complexity of monitoring, detecting and responding to security incidents across the organisation.

Automated threat intelligence: Automated threat intelligence platforms are used to enable real-time threat detection and response across the broad threat surface.

(b)Documentation and record-keeping

Detailed documentation: Extensive documentation of all ISMS processes, risk assessments, incident reports and compliance activities is carried out.

Record retention: Records and data are widely collected, retained and securely stored, and are accessible over extended periods.

Appendix VI — Adaptation of the EU Cybersecurity Skills Framework (ECSF)

ED Decision 2025/014/R

A close-up of a computer application

AI-generated content may be incorrect.

A close-up of a document

AI-generated content may be incorrect.

A document with text on it

AI-generated content may be incorrect.

A close-up of a document

AI-generated content may be incorrect.

A diagram of a diagram

AI-generated content may be incorrect.

A diagram of a diagram

AI-generated content may be incorrect.

A document with text and images

AI-generated content may be incorrect.

A close-up of a document

AI-generated content may be incorrect.

A close-up of a document

AI-generated content may be incorrect.

A screenshot of a computer

AI-generated content may be incorrect.A document with text on it

AI-generated content may be incorrect.

A close-up of a document

AI-generated content may be incorrect.

A close-up of a document

AI-generated content may be incorrect.

A document with text on it

AI-generated content may be incorrect.

A screenshot of a computer

AI-generated content may be incorrect.

A document with text on it

AI-generated content may be incorrect.

A document with text and a black text

AI-generated content may be incorrect.

ANNEX III — INFORMATION SECURITY — ANNEXES VI (Part-ARA) and VII (Part-ORA) to Regulation (EU) No 1178/2011

For the consolidated version of Part-ARA and Part-ORA, please refer to the Easy Access Rules for Aircrew (Regulation (EU) No 1178/2011).

ANNEX IV — INFORMATION SECURITY — Annex I (Part 21) to Regulation (EU) No 748/2012

For the consolidated version of Annex I (Part 21) to Regulation (EU) No 748/2012, please refer to the Easy Access Rules for Airworthiness and Environmental Certification (Regulation (EU) No 748/2012).

ANNEX V — INFORMATION SECURITY — Annexes II (Part-ARO) and III (Part-ORO) to Regulation (EU) No 965/2012

For the consolidated version of Part-ARO and Part-ORO, please refer to the Easy Access Rules for Air Operations (Regulation (EU) No 965/2012).

ANNEX VI — INFORMATION SECURITY — Annex II (Part-ADR.AR) to Regulation (EU) No 139/2014

For the consolidated version of Part-ADR.AR, please refer to the Easy Access Rules for Aerodromes (Regulation (EU) No 139/2014).

ANNEX VII — INFORMATION SECURITY — Annexes II (Part-145), III (Part-66) and Vc (Part-CAMO) to Regulation (EU) No 1321/2014

For the consolidated version of Part-145, Part-66, and Part-CAMO, please refer to the Easy Access Rules for Continuing Airworthiness.

ANNEX VIII — INFORMATION SECURITY — Annexes II (Part ATCO.AR) and III (Part ATCO.OR) to Regulation (EU) 2015/340

For the consolidated version of Part ATCO.AR and Part ATCO.OR, please refer to Easy Access Rules for Air Traffic Controllers’ Licensing and Certification (Regulation (EU) 2015/340).

ANNEX IX — INFORMATION SECURITY — Annexes II (Part-ATM/ANS.AR) and III (Part-ATM/ANS.OR) to Implementing Regulation (EU) 2017/373

For the consolidated version of Part-ATM/ANS.AR and Part-ATM/ANS.OR, please refer to Easy Access Rules for Air Traffic Management/Air Navigation Services (Regulation (EU) 2017/373).