Security measures under the microscope: What does the New Cybersecurity Act require?

Hand holding magnifying glass with locked shield icon symbol of cybersecurity secure connection

One of the main obligations under the Cybersecurity Act is the implementation of security measures within the scope defined by the implementing decree – either under the regime of higher or lower obligations. Let’s take a closer look at what these measures actually entail and what is the difference between the two obligation regimes.

The relationship between the Cybersecurity Act and the NIS2 Directive

The NIS2 Directive created two categories of regulated service entities: essential entities (essential subject) and important entities (important subject). These categories differ in the requirements that organizations must meet.

In the Czech legal system, NIS2 has been transposed into the new Cybersecurity Act and its implementing decrees. Unlike NIS2, the Czech Cybersecurity Act approaches categorization slightly differently and introduces a single category – a regulated service provider operating under two regimes . It distinguishes between the regime of higher obligations, which corresponds in scope to the essential entity category under NIS2, and the regime of lower obligations, which reflects the important entity category.

If you are a regulated service provider, the scope of measures you must implement depends on which regime applies to you.

Do you fall under the new Act?

Verify whether the new Cybersecurity Act applies to you and under which obligation regime. Be sure to validate the result from our free URCI.SE guide with a qualified expert.

Security measures in the regime of higher obligations

The Cybersecurity Act divides security measures into two groups: Organizational measures (14) and Technical measures (11). The Decree on security measures for regulated service providers in the regime of higher obligations specifies their detailed content.

Organisational measures

(§ 3–16 of the Decree on security measures for regulated service providers in the regime of higher obligations)

Information security management system (§ 3)

Security must not function randomly. The purpose of this measure is to define what you are protecting and why. This includes setting objectives, rules, processes, and regular system evaluation. When something changes (technology, supplier, business model), the system must be able to adapt.

Top management sets direction and priorities and bears responsibility. It approves key cybersecurity decisions and ensures that measures make operational and business sense. It must also undergo regular training to make informed decisions and assign security roles.

In the higher regime, several roles must be appointed to ensure clear accountability in cybersecurity. Each role has defined authorities, responsibilities, and substitution arrangements so that the system does not depend on a single individual.

You should have clear rules proportionate to your size and operational reality. The goal is not to produce extensive documentation, but to create a clear framework that people understand. Keep your documents up to date and aligned with how you actually operate.

What is essential for your operations? Data, systems, employees, services? To protect assets, you must first identify them. Maintain an inventory, assess confidentiality, integrity, and availability, and assign asset owners.

Risks must be consciously identified and managed. This provides insight into threats and potential impacts. Based on that, decisions are made on how to address each risk. Not all risks require technical solutions; sometimes a process change or management decision is sufficient.

The purpose of this measure is to ensure that suppliers do not become blind spots in your cybersecurity framework. Do you know which supplier has access to what, what risks they introduce, and how those risks are addressed both contractually and operationally? For key suppliers, security should be monitored on an ongoing basis – not only at the time of contract signing.

Cybersecurity begins with people. This measure systematically develops security awareness across the organization. Having a clear plan that defines who is trained, when, and to what extent is essential. Employees must understand their obligations, the risks they face, and the applicable rules – including proper password practices and how to respond to incidents.

Any significant change (new system, cloud solution, supplier, process) must also be assessed from a cybersecurity perspective to prevent introducing unnecessary disruption or hidden risks.

Cybersecurity must be considered during selection and design of solutions, not only after deployment. Plan for updates, support, and end-of-life to avoid unsupported technologies becoming vulnerabilities.

The purpose of this measure is to ensure that everyone has access only to what they genuinely need. It also includes the obligation to review access rights regularly, revoke them when roles change or employment ends, and prevent so-called “temporary” privileges from becoming permanent.

Do you know what to do when something happens? The decree addresses this as well and requires obligated entities to have defined procedures, prepared contact points, and the ability to report and handle incidents properly. The objective is not to assign blame, but to limit the impact of the incident and restore normal operations as quickly as possible.

Define what must remain operational during disruption and how long downtime is acceptable. Determine recovery time and data objectives in advance and prepare concrete crisis procedures.

Regularly verify the state of cybersecurity and compliance with the Act, the decree, and internal rules. This is typically done at defined intervals or after significant changes. Audit findings feed back into risk management, training, and corrective actions.

Technical measures

(§ 17–27 of the Decree on security measures for regulated service providers in the regime of higher obligations)

Physical security (§ 17)

In addition to data and your digital environment, you must also protect the physical premises and equipment where critical systems operate or sensitive data is stored. Access controls should reflect the importance of the specific location or technology and ensure that only those who genuinely need access are able to obtain it.

Protect networks against unauthorized access and incident propagation. Monitor traffic and segment critical infrastructure components.

Each user and system must have a unique identity. Your responsibility is to ensure that authentication methods correspond to risk levels.

This measure builds on identity management and aims to ensure that you monitor the permissions assigned to users and systems and review them on a regular basis.

Pay attention to suspicious activity. Do not wait until someone reports a problem. The purpose of this measure is to have effective tools or processes in place that alert you to potential issues in a timely manner.

Store relevant events from your information systems so that you can review them when needed. The goal is not to collect data for its own sake, but to ensure that in the event of an issue, you can determine what happened, when it happened, and where it occurred.

Evaluate recorded events to determine whether they reflect normal operations or indicate a security issue. Why? So that you can respond in a timely and proportionate manner – not only when it is already too late.

The objective of this measure is to protect the applications that support your operations and data. Ensure secure configuration, regular updates, and protection against misuse throughout their entire lifecycle.

This technical measure focuses on protecting sensitive data through encryption where appropriate. Use up-to-date and secure algorithms, and manage cryptographic keys properly to ensure that protection works effectively in practice.

The purpose of this measure is to maintain operations and minimize the impact on the business and its customers. How? By proactively managing capacity, backups, and resilience so that the regulated service continues to function even in the event of disruptions.

This measure focuses on protecting industrial and control systems, taking into account their technical constraints and operational significance. Do not apply standard IT security measures blindly; instead, tailor the protection to the operational reality of these systems.

We have analyzed and explained individual measures in more detail on the Zákony pro lidi portal, directly linked to the decree on security measures in the regime of higher obligations.

Security roles in the higher regime

Let us take a closer look at the measure concerning security roles. Organizations operating under the higher regime are required to appoint a cyber security manager, cyber security architect, and cyber security auditor and to assign an asset guardian to defined assets. The organization’s top management is responsible for designating these individuals. Each of these security roles must meet the requirements set out in the decree. You can read more detailed information about security roles here.

Security measures in the regime of lower obligations

For regulated service providers operating under the regime of lower obligations, the Act combines organizational and technical measures into a single framework. The decree on security measures for regulated service providers in the regime of lower obligations sets out a total of 11 security measures representing a basic level of cybersecurity– an essential minimum that no regulated service provider can operate without. Their content largely overlaps with the measures required under the higher regime; therefore, only a list is provided below without further elaboration.

Bezpečnostní role v nižším režimu

If we compare the scope of security role requirements, the lower regime only requires to designate a single person responsible for cybersecurity. This person is accountable for managing and developing cybersecurity within the organization and also for communicating with top management.

The role may be assigned to a person who completes the professional training specified by the decree or demonstrates the required professional competence. It may also be performed by an existing employee, for example the person responsible for IT operations.

Specific obligations in the digital infrastructure and services sector

The Cybersecurity Act includes special provisions for regulated service providers operating in digital infrastructure and digital services. This refers to a regulated service provider that provides one of the following regulated services:

  • domain name translation system,
  • trust services within the meaning of directly applicable European Union law,
  • top-level domain registry management and operation services,
  • cloud computing services,
  • data centre services,
  • content delivery network services,
  • online marketplace services,
  • internet search engine services within the meaning of directly applicable European Union law,
  • social network services,
  • managed services and
  • managed security services.

Organizations providing these services must implement security measures covering at least: risk management, security policy and documentation management, incident handling, business continuity management, supplier management, secure acquisition and development, application security, human resources security, cryptographic algorithms, access management, and identity management.

Details are set out in the European Commission implementing regulation under NIS2, which takes precedence over Czech law. This represents a tightening of security requirements for all providers of the above-listed regulated services, with the extent of the tightening determined by the specific wording of the regulation. Importantly, the stricter requirements apply only to the particular services covered by the regulation. Other regulated services provided by the organization that are not governed by this regulation continue to be subject to the regime applicable to regulated service providers under the Cybersecurity Act and its implementing decrees.

Get ready

We can help you with practical preparation of your company for the new cybersecurity legislation.

More articles

What does the AI Act bring? A clear guide to the new EU regulation on artificial intelligence. Discover what rules it introduces for companies and what changes in 2026.
Do you manufacture or provide smart devices or cloud services? Read our overview of key obligations and practical guidance on how to comply with the EU Data Act.
What security measures does the Cybersecurity Act require? An overview and explanation of measures in the higher and lower regimes

Newsletter

Do you want to ensure your company is protected from cyber threats while also complying with applicable legislation? Sign up for our newsletter and receive practical advice from our legal consultants.

By clicking subscribe you consent to the processing of your personal data for marketing purposes.