- Albania
- Angola
- Antigua and Barbuda
- Argentina
- Australia
- Austria
- Azerbaijan
- Bahrain
- Belgium
- Benin
- Bolivia
- Botswana
- Brazil
- Burundi
- Cambodia
- Chile
- China
- Congo
- Costa Rica
- Cyprus
- Czechia
- Dominican Republic
- Egypt
- France
- Georgia
- Ghana
- Greece
- Guatemala
- Haiti
- Honduras
- Hungary
- India
- Iraq
- Ireland
- Italy
- Kazakhstan
- Kenya
- Kiribati
- Korea (Republic of)
- Kuwait
- Kyrgyzstan
- Lebanon
- Lithuania
- Malaysia
- Malta
- Mauritania
- Mauritius
- Mexico
- Micronesia (Federated States of)
- Mongolia
- Montenegro
- Morocco
- Myanmar
- Nauru
- Netherlands
- Nicaragua
- Nigeria
- Oman
- Peru
- Philippines
- Poland
- Portugal
- Qatar
- Rwanda
- Saint Kitts and Nevis
- Senegal
- Sierra Leone
- Singapore
- Slovenia
- Solomon Islands
- South Africa
- Switzerland
- Tanzania, United Republic of
- Togo
- Tonga
- Trinidad and Tobago
- Tunisia
- Türkiye
- Turkmenistan
- United Arab Emirates
- United Kingdom
- United States
- Uruguay
- Uzbekistan
RANKING TIMELINE
| Rank | Country | National Cyber Security Index | Digital development | Difference | ||
|---|---|---|---|---|---|---|
| 3. | Estonia | 96.67 | 82.56 | 14.11 | ||
| 2. | Canada | 96.67 | 78.14 | 18.53 | ||
| 4. | Finland | 95.83 | 85.76 | 10.07 | ||
| 7. | Slovakia | 92.50 | 67.55 | 24.95 | ||
| 6. | Romania | 92.50 | 64.57 | 27.93 | ||
| 9. | Germany | 90.83 | 75.73 | 15.10 | ||
| 12. | Spain | 89.17 | 78.61 | 10.56 | ||
| 13. | Denmark | 89.17 | 85.59 | 3.58 | ||
| 14. | Ukraine | 88.33 | 71.87 | 16.46 | ||
| 18. | Latvia | 85.83 | 73.10 | 12.73 | ||
| 19. | Jordan | 85.00 | 57.77 | 27.23 | ||
| 31. | Croatia | 82.50 | 70.07 | 12.43 | ||
| 32. | Moldova (Republic of) | 81.67 | 62.66 | 19.01 | ||
| 35. | Saudi Arabia | 80.83 | 77.39 | 3.44 | ||
| 34. | Bulgaria | 80.83 | 67.30 | 13.53 | ||
| 38. | Norway | 79.17 | 81.43 | -2.26 | ||
| 44. | Sweden | 75.83 | 84.13 | -8.30 | ||
| 48. | Serbia | 72.50 | 70.05 | 2.45 | ||
| 53. | Bangladesh | 66.67 | 54.63 | 12.04 | ||
| 54. | North Macedonia | 66.67 | 58.31 | 8.36 | ||
| 55. | New Zealand | 65.00 | 79.24 | -14.24 | ||
| 67. | Panama | 55.83 | 59.30 | -3.47 | ||
| 72. | Bhutan | 51.67 | 32.56 | 19.11 | ||
| 81. | Jamaica | 45.83 | 54.64 | -8.81 | ||
| 84. | Armenia | 38.33 | 66.88 | -28.55 | ||
| 86. | Vanuatu | 37.50 | 27.14 | 10.36 | ||
| 85. | Comoros | 37.50 | 12.93 | 24.57 | ||
| 91. | Bosnia and Herzegovina | 33.33 | 53.25 | -19.92 | ||
| 92. | Uganda | 30.83 | 38.77 | -7.94 | ||
| 96. | Maldives | 30.00 | 29.43 | 0.57 | ||
| 97. | The Bahamas | 30.00 | 35.72 | -5.72 | ||
| 95. | Mozambique | 30.00 | 27.56 | 2.44 | ||
| 99. | Chad | 25.00 | 20.04 | 4.96 | ||
| 100. | Venezuela | 24.17 | 45.22 | -21.05 | ||
| 103. | Congo (Democratic Republic of the) | 21.67 | 24.32 | -2.65 | ||
| 105. | Suriname | 21.67 | 31.83 | -10.16 | ||
| 104. | Libya | 21.67 | 27.33 | -5.66 | ||
| 113. | Zimbabwe | 18.33 | 37.57 | -19.24 | ||
| 115. | Tajikistan | 15.83 | 28.03 | -12.20 | ||
| 119. | Mali | 11.67 | 30.44 | -18.77 | ||
| 121. | Saint Lucia | 8.33 | 26.28 | -17.95 | ||
STRATEGIC CYBERSECURITY INDICATORS
-
1. CYBERSECURITY POLICY15151515151515151215915121591515151515121512151515121591591531512151215121591512151215615615121591501591512153151215315615615015915615015015015
-
1.1. High-level cybersecurity leadership3333333333333333333333333333333303333333333333333303330303330303333333033333030303Criteria
The country has appointed governmental leadership responsible for cybersecurity at the national level.
Accepted referencesLegal act, national strategy, official statutes or terms of reference, or official website
-
1.2. Cybersecurity policy development3333333333033333333333333333333303333303333333033333330333330333033333033303030303Criteria
There is a competent entity in the central government to whom responsibility is assigned for national cybersecurity strategy and policy development.
Accepted referencesLegal act, official statute or terms of reference, or official website
-
1.3. Cybersecurity policy coordination3333333333333333333333333303330303333333030333030333030303330333030303030333030303Criteria
The country has a regular official format for cybersecurity policy coordination at the national level. (The official format may take various forms, such as permanent committees, councils, or working groups.)
Accepted referencesLegal act, official statute or terms of reference, or official website
-
1.4. National cybersecurity strategy3333333333333303333333333333033333333333333333330333330333333333030303033303030303Criteria
The central government has established a national-level cybersecurity strategy defining strategic cybersecurity objectives and measures to improve cybersecurity across society.
Accepted referencesValid official document
-
1.5. National cybersecurity strategy action plan3333333303030303333303033333030303030333033303030333030333030333030303030303030303Criteria
The central government has established an action plan to implement the national cybersecurity strategy.
Accepted referencesCurrent official document, legal act, or official statement
-
-
2. GLOBAL CYBERSECURITY CONTRIBUTION6666666666666666463666464656366666363646663636363626064606062636360606360606363606
-
2.1. Cyber diplomacy engagements3333333333333333333333333333333333333333333333333303033303030333330303330303333303Criteria
The government contributes to international or regional cooperation formats dedicated to cybersecurity and cyber stability. (The indicator is limited to strategic-level cooperation; operational-level incident response cooperation and cross-border law enforcement cooperation are addressed separately under other indicators.)
Accepted referencesOfficial website of the organisation or cooperation format, official statement or contribution
-
2.2. Commitment to international law in cyberspace1111111111111111110111111101011111010111110101010101011101010101010101010101010101Criteria
The country has an official position on the application of international law, including human rights, in the context of cyber operations.
Accepted referencesOfficial document or statement, international indexes
-
2.3. Contribution to international capacity building in cybersecurity2222222222222222020222020222022222020202220202020222020202022202020202020202020202Criteria
The country has led or supported cybersecurity capacity building for another country in the past three years.
Accepted referencesOfficial website or project document
-
-
3. EDUCATION AND PROFESSIONAL DEVELOPMENT101010101010101081010101010101010108101010101091010101010101010108108109101010610610810610010310710010510610010010010010010310610210010010
-
3.1. Cyber safety competencies in primary education2222222202222222222222222222222222220222220222022202022202022202020202020202020202Criteria
Primary education curricula in the public education system include cyber safety (online safety, computer safety) competencies.
Accepted referencesOfficial curriculum or official report
-
3.2. Cyber safety competencies in secondary education2222222222222222222222222222222222222222220222222202022202022202020202020202020202Criteria
Secondary education curricula in the public education system include cyber safety (online safety, computer safety) competencies.
Accepted referencesOfficial curriculum or official report
-
3.3. Undergraduate cybersecurity education2222222222222222220222222222222222022222222222222202020202222202020202020222220202Criteria
At least one undergraduate education programme is available in the country to train students in cybersecurity.
Accepted referencesAccredited study programme
-
3.4. Graduate cybersecurity education3333333333333333333333333333333333333333333303330303333303330303030303033333030303Criteria
At least one cybersecurity education programme is available in the country at the graduate level.
Accepted referencesAccredited study programme
-
3.5. Association of cybersecurity professionals1111111111111111111111110111111111111101111101110101010101010101010101010111010101Criteria
A professional association of cybersecurity specialists, managers, or auditors exists in the country.
Accepted referencesOfficial website
-
-
4. CYBERSECURITY RESEARCH AND DEVELOPMENT4444442424444444442424244444444444044404440404040404042404040404042404040404240404
-
4.1. Cybersecurity research and development programmes2222220202222222222202222222222222022202220202020202020202020202022202020202020202Criteria
A cybersecurity research and development (R&D) programme or institute exists and is recognised and/or supported by the government.
Accepted referencesOfficial programme or official website
-
4.2. Cybersecurity doctoral studies2222222222222222220222022222222222022202220202020202022202020202020202020202220202Criteria
An officially recognised PhD programme exists accommodating research in cybersecurity.
Accepted referencesOfficial programme or official website
-
PREVENTIVE CYBERSECURITY INDICATORS
-
5. CYBERSECURITY OF CRITICAL INFORMATION INFRASTRUCTURE121212121212121212121212121212121212121212121212612121212129129121212121231231231212120123120121212012312012012012012012312012312012012012012
-
5.1. Identification of critical information infrastructure3333333333333333333333330333333333333303030333030303330303030303030303030303030303Criteria
There is a framework or a mechanism to identify operators of critical information infrastructure.
Accepted referencesLegal or administrative act
-
5.2. Cybersecurity requirements for operators of critical information infrastructure3333333333333333333333330333333333333303030333030303330303030303030303030303030303Criteria
Operators of critical (information) infrastructure are required to assess and manage cyber risks and/or implement cybersecurity measures.
Accepted referencesLegal act, or mandatory cybersecurity framework or standard
-
5.3. Cybersecurity requirements for public sector organisations3333333333333333333333333333330303333333333333033303330303030303030303033303030303Criteria
Public sector organisations are required to assess and manage cyber risks and/or implement cybersecurity measures.
Accepted referencesLegal or administrative act, mandatory cybersecurity framework or standard
-
5.4. Competent supervisory authority3333333333333333333333333333333333333303030333030303330333030303030333030303030303Criteria
A competent authority has been designated and allocated powers to supervise the implementation of cyber/information security measures.
Accepted referencesLegal act or official website
-
-
6. CYBERSECURITY OF DIGITAL ENABLERS1212101212121212121212121212101212128121012101210121212101210128128121012812612412812212012212612212212812212212612612412212212012212412212
-
6.1. Secure electronic identification2202222222222222222222222222222222222222020222020202020202220202020202220202020202Criteria
A national electronic identification solution exists that allows for officially recognised and secure electronic identification of natural and/or legal persons.
Accepted referencesLegal act, nationally recognised identification scheme, or official website
-
6.2. Electronic signature2222222222222222222222222222222222222222222222220222222222222222222202022202222222Criteria
A nationally recognised and publicly available solution exists to issue secure and legally binding electronic signatures.
Accepted referencesLegal act or official website
-
6.3. Trust services2222222222222222222222222222222222222222020222020202220202220202222222020202022202Criteria
Trust services (e.g. digital certificates, timestamps, private key management service) are regulated, at least for use in the public sector.
Accepted referencesLegal act or official website
-
6.4. Supervisory authority for trust services2222222222222222222202222222222222220222020222020202220202220202222222020202020202Criteria
An independent authority has been designated and given the power to supervise trust services and trust service providers.
Accepted referencesLegal act or official website
-
6.5. Cybersecurity requirements for cloud services2222222222222202220222022222022202022202222202020202020202020202020202020202020202Criteria
Requirements are established for the secure use of cloud services in government and/or public sector organisations.
Accepted referencesLegal or administrative act, cybersecurity framework or standard
-
6.6. Supply chain cybersecurity2222222222222222220222220222220202022202220202020202020202020202020202020202020202Criteria
Requirements are established to identify and manage cybersecurity risks through the ICT supply chain.
Accepted referencesLegal act or official website
-
-
7. CYBER THREAT ANALYSIS AND AWARENESS RAISING12121212912121212129129129129121212121291212129129129129126129126129121212012612012312312312612612312612312312012312012012012012012
-
7.1. Cyber threat analysis3333333333333333333333333333333333033333333303330303030303330303033303030303030303Criteria
A government entity has been assigned the responsibility for national-level cybersecurity and/or cyber threat assessments.
Accepted referencesLegal act, statute, or official website
-
7.2. Public cyber threat reports3333333333333333333333333333333333333303333303330303030333030303330303330303030303Criteria
Public cyber threat reports and notifications are issued at least once a year.
Accepted referencesOfficial website, official social media channel, or public report
-
7.3. Public cybersecurity awareness resources3333333333333333333333333333333333333333333303030333333333333333030303030303030303Criteria
Public authorities provide publicly available cybersecurity advisories, tools, and resources for users, organisations, and ICT and cybersecurity professionals.
Accepted referencesOfficial website, public advisories
-
7.4. Cybersecurity awareness raising coordination3333033333030303033333033303030303030303033303030303030303030333030303030303030303Criteria
There is an entity with the clearly assigned responsibility to lead and/or coordinate national cybersecurity awareness activities.
Accepted referencesLegal act, official document, or official website
-
-
8. PROTECTION OF PERSONAL DATA4444444444444444444444444444444444440444444424444444044444044404440444040444244424
-
8.1. Personal data protection legislation2222222222222222222222222222222222220222222222222222022222022202220222020222222222Criteria
There is a legal act for personal data protection that is applicable to the protection of data online or in digital form.
Accepted referencesLegal act
-
8.2. Personal data protection authority2222222222222222222222222222222222220222222202222222022222022202220222020222022202Criteria
An independent public supervisory authority has been designated and allocated powers to supervise personal data protection.
Accepted referencesLegal act or official website
-
RESPONSIVE CYBERSECURITY INDICATORS
-
9. CYBER INCIDENT RESPONSE1414141414141414141414141114141491412141414121411141114141491414141414141411141114614614814814914614014814014314814214614314814614014014014014
-
9.1. National incident response capacity3333333333333333333333333333333333333333333333333333330333033333033303333303030303Criteria
There is a CERT designated with nationwide responsibilities for cyber incident detection and response.
Accepted referencesLegal act or official website
-
9.2. Incident reporting obligations3333333333333333333333330333333333333303330303030303330333030303030333030303030303Criteria
Operators of critical information infrastructure and/or government institutions are obliged to notify the designated competent authorities about cyber incidents.
Accepted referencesLegal act or official website
-
9.3. Cyber incident reporting tool2222222222222222020222022222220222222222220202222202020222020222220202220202020202Criteria
A publicly available official resource is provided for notifying competent authorities about cyber incidents.
Accepted referencesOfficial website
-
9.4. Single point of contact for international cooperation3333333333330333033333333303330333333333030303030333030303030303030303030303030303Criteria
The government has designated a single point of contact for international cybersecurity cooperation.
Accepted referencesLegal act or official website
-
9.5. Participation in international incident response cooperation3333333333333333333333333333333333333333333333333333030303030333033303333303030303Criteria
The national cyber incident response team (CSIRT/CERT/CIRT) participates in international or regional cyber incident response formats.
Accepted referencesOfficial website or official document
-
-
10. CYBER CRISIS MANAGEMENT7979792979995979597959495979295929390959495929390929090909090929090909090909290909
-
10.1. Cyber crisis management plan0222220202220202020202220222020202020202220202020202020202020202020202020202020202Criteria
The government has established a crisis management plan for large-scale cyber incidents.
Accepted referencesLegal act or official website
-
10.2. National cyber crisis management exercises3333330333333333333333033333033303330333033303330303030303030303030303030303030303Criteria
Regular interagency cyber crisis management exercises or crisis management exercises with a cyber component are arranged at the national level at least every other year.
Accepted referencesExercise document, official website, or press release
-
10.3. Participation in international cyber crisis exercises2222222222222222222222222222222222020222222222020222020202020222020202020202220202Criteria
The country participates in an international cyber crisis management exercise at least every other year.
Accepted referencesExercise document/website or press release
-
10.4. Operational crisis reserve2202020222220222022202020202020202020202020202020202020202020202020202020202020202Criteria
A mechanism for engaging reserve support has been established to reinforce government bodies in managing cyber crises.
Accepted referencesLegal act or official website
-
-
11. FIGHT AGAINST CYBERCRIME16161616161616161616161616161616161616161116161616169161616161616161316816161610161016111611161616111661616165165161116316916616616816316616616316616
-
11.1. Cybercrime offences in national law3333333333333333333333333333333333333333333333333333333303033333333333333333333333Criteria
Cybercrime offences are defined in national legislation.
Accepted referencesLegal act
-
11.2. Procedural law provisions3333333333333333333333333333333333033333030303333333333303033303330333030333030333Criteria
Legislation defines the powers and procedures for cybercrime investigations and proceedings and for the collection of electronic evidence.
Accepted referencesLegal act
-
11.3. Ratification of or accession to the Convention on Cybercrime2222222222222222222202222202222222220222222202022222022202020202020202020202020202Criteria
The country has ratified or acceded to the Council of Europe (CoE) Convention on Cybercrime.
Accepted referencesLegal act on Convention ratification or accession, website of the CoE Treaty Office
-
11.4. Cybercrime investigation capacity3333333333333333333333333333333333330333330333333303033333333303333303330303330303Criteria
Law enforcement has a specialised function and capacity to prevent and investigate cybercrime offences.
Accepted referencesLegal act or official website
-
11.5. Digital forensics capacity2222222222222222222222222202222222222222222222222202022222222202020202220202020202Criteria
Law enforcement has a specialised function and capacity for digital forensics.
Accepted referencesLegal act, statute, official document, or official website
-
11.6. 24/7 contact point for international cybercrime3333333333333333333303333303333333330333033333033333033303030303030303030303030303Criteria
The government has designated an international 24/7 point of contact for assistance on cybercrime and electronic evidence.
Accepted referencesOfficial website, legal act or statute
-
-
12. MILITARY CYBER DEFENCE4666666666466666664646462626464666460626262606460606062606062606060606260606060606
-
12.1. Military cyber defence capacity2222222222222222222222220202222222220202020202220202020202020202020202220202020202Criteria
Armed forces have designated units responsible for the cybersecurity of military operations and/or for cyber operations.
Accepted referencesLegal act, statute, other official document or official website
-
12.2. Military cyber doctrine0222222222022222220202020202020222020202020202020202020202020202020202020202020202Criteria
The tasks, principles, and oversight of armed forces for military cyber operations are established by official doctrine or legislation.
Accepted referencesLegal act, official doctrine, or official website
-
12.3. Military cyber defence exercises2222222222222222222222222222222222220222222202220202022202022202020202020202020202Criteria
Armed forces have conducted or participated in a cyber defence exercise or an exercise with a cyber defence component in the past three years.
Accepted referencesOfficial website or official document
-