Oh no! No description found. But not to worry. Read from Tasks below how to advance this topic.
Legal Notice 71 of 2025 is a Maltese law that implements the NIS2 Directive, enhancing cybersecurity resilience across essential and important sectors by setting stringent requirements for risk management, incident reporting, and governance.
Legal Notice 71 of 2025, officially titled "Measures for a High Common Level of Cybersecurity Across the European Union (Malta) Order, 2025," is a Maltese law that transposes the EU's NIS2 Directive into national law. This legal instrument, also known as Subsidiary Legislation 460.41, broadens the scope of cybersecurity obligations across critical sectors, including energy, transport, health, manufacturing, and digital services.
It establishes a framework for the protection of network and information systems, emphasizing risk management, incident reporting, and governance. The law introduces stringent compliance requirements for essential and important entities, including registration, implementation of cybersecurity measures, and timely notification of cyber incidents. It also establishes a national CSIRT within the CIP Department to monitor cyber threats and vulnerabilities.
Below you'll find all of the requirements of this framework. In Cyberday, we map all requirement to global tasks, making multi-compliance management easy. Do it once, and see the progress across all frameworks!
The measures referred to in sub-article (1) shall be based on an all-hazards approach that aims to protect network and information systems and the physical environment of those systems from incidents, and shall include at least the following: the use of multi-factor authentication or continuous authentication solutions, secured voice, video and text communications and secured emergency communication systems within the entity, where appropriate.
































The measures referred to in sub-article (1) shall be based on an all-hazards approach that aims to protect network and information systems and the physical environment of those systems from incidents, and shall include at least the following: the logging and traceability of networks and information systems.
























The CIP Department, or where appointed the competent authority, shall ensure that, when considering which measures referred to in sub-article (2)(d) are appropriate, entities are to take into account the vulnerabilities specific to each direct supplier and service provider and the overall quality of products and cybersecurity practices of their suppliers and service providers, including their secure development procedures. The CIP Department, or where appointed the competent authority, shall also ensure that, when considering which measures referred to in that sub-article are appropriate, entities are required to take into account the results of the coordinated security risk assessments of critical supply chains carried out in accordance with Article 22(1) of the Directive.
















The CIP Department, or where appointed the competent authority, shall ensure that where an essential or important entity finds that it does not comply with the measures provided for in sub-article (2), the entity concerned shall take, without undue delay, all necessary, appropriate and proportionate corrective measures referred to in article 29 for essential entities or in article 30 for important entities.








Essential and important entities shall without delay notify the CSIRT of any incident that has a significant impact on the provision of their services in accordance with sub-article (6):
Provided that the mere act of notification shall not subject the notifying entity to increased liability:
Provided also that the CSIRT shall immediately notify in writing any competent authority or authorities appointed as the case may be, of any incident that has a significant impact on the provision of the services provided by an essential or important entity that such authority regulates.












Where appropriate, essential and important entities shall notify, without undue delay, the recipients of their services of significant incidents that are likely to adversely affect the provision of those services.
Those entities shall report any information that enables the CSIRT to determine any cross-border impact of the incident.




In the event of a significant cross-border or cross-sectoral incident, the CIP Department shall be provided in a timely manner with the relevant information notified in accordance with sub-article (5).




Where applicable, essential and important entities shall communicate, without undue delay, to the recipients of their services potentially affected by a significant cyber threat any measures or remedies that those recipients are able to take in response to that threat.
Where appropriate, the entities shall also inform those recipients of the significant cyber threat itself.




For the purpose of the notification under sub-article (1), the entities concerned shall submit to the CSIRT:
(a) without undue delay and in any event within twenty-four (24) hours of becoming aware of the incident, an early warning, which, where applicable, shall indicate whether the significant incident is suspected of being caused by unlawful or malicious acts or could have a cross-border impact;
(b) without undue delay and in any event within seventy-two (72) hours of becoming aware of the significant incident, an incident notification, which, where applicable, shall update the information referred to in paragraph (a) and indicate an initial assessment of the significant incident, including its severity and impact, as well as, where available, the indicators of compromise;
(c) upon request by a CSIRT, an interim report on relevant status updates;
(d) a final report no later than one (1) month after the submission of the incident notification under sub-article (5)(b) which shall include the following:
(e) in the event of an ongoing incident at the time of the submission of the final report referred to in paragraph (d), the entities concerned shall provide the CSIRT with a progress report at that time and a final report within one (1) month of their having handled the incident.




In implementing article 19, the CIP Department shall without imposing or discriminating in favour of the use of any particular type of technology, encourage the use of ICT products, ICT services and ICT processes, developed by the essential or important entity or procured from third parties, that are certified under European cybersecurity certification schemes adopted pursuant to Article 49 of Regulation (EU) 2019/881 of the European Parliament and of the Council of 17 April 2019 on ENISA (the European Union Agency for Cybersecurity) and on information and communications technology cybersecurity certification and repealing Regulation (EU) No 526/2013 (the Cybersecurity Act):
Provided that the CIP Department, or where appointed the competent authority, shall require, where applicable, that essential and important entities use such ICT products, ICT services and ICT processes:
Provided also that specific categories of essential and important entities listed in the Commission's delegated acts, shall use certain certified ICT products, ICT services and ICT processes or obtain a certificate under a European cybersecurity certification scheme adopted pursuant to Article 49 of Regulation (EU) 2019/881.




The CSIRT shall ensure that entities falling within the scope of this order and, where relevant, other CSIRTs of entities not falling within the scope of this order, are able to exchange among themselves on a voluntary basis relevant cybersecurity information, including information relating to cyber threats, near misses, vulnerabilities, techniques and procedures, indicators of compromise, adversarial tactics, threat-actor-specific information, cybersecurity alerts and recommendations regarding the configuration of cybersecurity tools to detect cyberattacks, where this information sharing:
Provided that the arrangement for sharing cybersecurity information shall be without prejudice to the security plan of the operators of the entities falling within the scope of this order, in accordance with article 19(1)(c)(iii).
















Essential and important entities shall notify the CIP Department of their participation in the cybersecurity information-sharing arrangements provided for in sub-article (2), upon entering into such arrangements, or as applicable, of their withdrawal from such arrangements, once the withdrawal takes effect.




In addition to the notification obligation as provided for in article 20, notifications may be submitted to the CSIRT on a voluntary basis, by:




An essential or important entity shall appoint a qualified auditor who shall verify whether the entity has implemented the cybersecurity risk management measures in accordance with article 19:
Provided that the qualified auditor shall satisfy the requirements listed in sub-article (4) before being appointed:
Provided also that if the qualified auditor satisfies the requirements listed in sub-article (4), the appointment shall be approved by the CIP Department, or where appointed the competent authority.












Explore our comprehensive resources and improve your security with the themes of this framework.
Discover specific ways our platform streamlines your ISO 27001 compliance process, from automated controls to audit preparation.
Explore use caseTake our comprehensive assessment to identify gaps in your current implementation and get personalized recommendations.
Start assessmentDive deeper with our articles, case studies, and expert insights on framework implementation.
Read articleGet a concise overview of all requirements, controls, and implementation steps in our quick guide.
Get the guideSee how the overlap and differences with any other framework to optimize your compliance strategy.
Compare frameworkParticipate in expert-led sessions covering implementation strategies, common pitfalls, and best practices for compliance.
Register for webinarParticipate in expert-led sessions covering implementation strategies, common pitfalls, and best practices for compliance.
Register for webinarUnderstand the basics of cyber security frameworks with our comprehensive guide.
Read the articleWhen building an ISMS, it's important to understand the different levels of information hierarchy. Here's how Cyberday is structured.
Sets the overall compliance standard or regulation your organization needs to follow.
Break down the framework into specific obligations that must be met.
Concrete actions and activities your team carries out to satisfy each requirement.
Documented rules and practices that are created and maintained as a result of completing tasks.
