Art. 1 Subject matter
This Ordinance regulates the organisation of the Federal Administration for its protection against cyber risks as well as the tasks and responsibilities of the various offices in the cyber security domain.
120.73
English is not an official language of the Swiss Confederation. This translation is provided for information purposes only, has no legal force and may not be relied on in legal proceedings.
of 27 May 2020 (Status as of 1 April 2021)
The Swiss Federal Council,
on the basis of Article 30 of the Federal Act of 21 March 19971 on Measures to Safeguard Internal Security and on Articles 43 paragraphs 2 and 3, 47 paragraph 2 and 55 of the Government and Administration Organisation Act of 21 March 19972,
ordains:
1 SR 120
This Ordinance regulates the organisation of the Federal Administration for its protection against cyber risks as well as the tasks and responsibilities of the various offices in the cyber security domain.
This Ordinance applies to:
4 Amended by Annex No 1 of the O of 25 Nov. 2020 on the Digital Transformation and ICT, in force since 1 Jan. 2021 (AS 2020 5871).
In this Ordinance:
6 Inserted by No I of the O of 24 Feb. 2021, in force since 1 April 2021 (AS 2021 132).
1 The Federal Administration shall ensure that its organs and systems are suitably resilient to cyber risks.
2 It shall work with the cantons, the communes, the private sector, society, academia and international partners provided this serves to protect its own security interests, and shall encourage the exchange of information.
The Federal Council shall set out in a national strategy for the protection of Switzerland against cyber risks (NCS) the strategic framework for improving the prevention and early detection of and the reaction and resilience to cyber risks.
The measures to protect against cyber risks are divided into the following three domains:
The Federal Council shall carry out the following tasks:
1 The Cyber Core Group (CyCG) shall comprise:
2 The Federal Cyber Security Delegate chairs the Group.
3 The CyCG shall inform representatives of other federal administrative units that are active in connection with cyber risks about its agenda and may invite them to attend individual meetings. Where matters have a foreign policy dimension, it may involve the Federal Department of Foreign Affairs (FDFA). In addition it may involve experts from the private sector and the universities.
4 The CyCG has the following tasks in particular:
5 The three departments represented in the CyCG shall make information available for the joint assessment of a situation.
6 The Federal Intelligence Service is responsible for presenting the overall cyber threat situation to the CyCG.
1 The Federal Council shall appoint a Steering Committee for the National Strategy for the Protection of Switzerland against Cyber Risks (NCS StC).
2 The NCS StC shall comprise the Federal Cyber Security Delegate, representatives from the cantons appointed by the Conference of Cantonal Governments, representatives of business and the universities and representatives of the administrative units that are responsible for implementing any NCS measures in accordance with the NCS implementation plan. Each department and the Federal Chancellery shall appoint at least one representative to the NCS StC.
3 The Federal Cyber Security Delegate chairs the Steering Committee.
4 The NCS StC has the following tasks:
1 The IT Security Committee (ITSC) comprises a representative of the National Cyber Security Centre (NCSC8), the departmental and the Federal Chancellery IT security officers and the IT security officers for standard information and communication technology services (ICT).
2 Additional persons may be included in an advisory capacity on a case-by-case basis.
3 The NCSC representative chairs the committee.
4 The ITSC acts as a consultative body for the NCSC on IT security issues in the Federal Administration.
8 Footnote not relevant to English text
1 The Federal Cyber Security Delegate has the following tasks:
2 He or she shall regularly inform the FDF on behalf of the Federal Council about the status of information technology security in the departments and the Federal Chancellery.
3 He or she may participate in the preparation of Federal Administration IT directives that relate to cyber security and in security-relevant IT projects. In particular he or she may request information, comment thereon and request changes.
4 He or she may, after consulting the Swiss Federal Audit Office, request audits of information technology security.
9 Amended by Annex No 1 of the O of 25 Nov. 2020 on the Digital Transformation and ICT, in force since 1 Jan. 2021 (AS 2020 5871).
1 The NCSC is the centre of excellence of the Confederation for cyber risks and coordinates the work of the Confederation in the cyber security domain. It has the following tasks:
2 It may, provided this directly or indirectly serves to protect the Federal Administration against cyber risks, process data on cyber incidents and associated communication flows. It may disclose such data to government and private security teams, provided:
3 A disclosure of personal data abroad is only permitted if the related requirements of the federal legislation on data protection are complied with.
4 Sensitive personal data may only be processed if there is a statutory basis for processing such data with the means available within the federal IT systems.
5 After consulting with the offices concerned, the NCSC shall assume overall responsibility within the Federal Administration for managing a cyber incident if the incident poses a risk to the proper functioning of the Federal Administration. In doing so, it has the following tasks and powers:
6 If, following a cyber incident, the risk to the confidentiality or the efficiency of the Federal Administration is sufficiently reduced by the measures taken and if the required follow-up work and its funding have been defined, the NCSC shall reassign responsibility for the further processing to the offices concerned.
1 The departments and the Federal Chancellery shall report to the NCSC at the end of the year on the status of information technology security.
2 The internal service providers in accordance with Article 9 DTIO10 shall submit regular reports to the NCSC on weaknesses and cyber incidents that have been detected and on measures planned and taken for their rectification.11
3 The departments and the Federal Chancellery shall each appoint a departmental IT security officer (ITSOD), who shall act on the direct instructions of the head of department.12
4 The ITSODs are in particular responsible for:
5 The departments and the Federal Chancellery shall regulate the relationship between the ITSODs and the IT security officers for the administrative units (ITSOOs), in particular technical leadership on security issues.14
11 Amended by Annex No 1 of the O of 25 Nov. 2020 on the Digital Transformation and ICT, in force since 1 Jan. 2021 (AS 2020 5871).
12 Amended by No I of the O of 24 Feb. 2021, in force since 1 April 2021 (AS 2021 132).
13 Inserted by No I of the O of 24 Feb. 2021, in force since 1 April 2021 (AS 2021 132).
14 Inserted by No I of the O of 24 Feb. 2021, in force since 1 April 2021 (AS 2021 132).
1 The administrative units shall each appoint an IT security officer (ITSOO) who shall act on the direct instructions of the head of the administrative unit. The Digital Transformation and ICT Steering Sector at the Federal Chancellery (DTI Sector of the FCh) shall also appoint an IT security officer for standard services.
2 The ITSOOs and the IT security officer for standard services shall carry out the following tasks:
3 The administrative units are responsible for the security of their protected IT systems. They shall carry out the following tasks:
4 The service providers shall perform the following functions:
5 If it is not possible to manage a cyber incident in accordance with the defined process, the parties concerned shall inform the NCSC so that it can decide on what further action to take.
6 The administrative units shall consult the NCSC in connection with security-relevant IT directives as well as projects.
7 They are responsible for developing, implementing and checking standards and regulations in relation to cyber security in their sectors. The NCSC shall wherever possible provide them with experts from the pool mentioned in Article 12 paragraph 1 letter g.
15 Amended by No I of the O of 24 Feb. 2021, in force since 1 April 2021 (AS 2021 132).
Employees of the Federal Administration who use IT Resources are responsible for using them in accordance with the regulations.
16 Inserted by No I of the O of 24 Feb. 2021, in force since 1 April 2021 (AS 2021 132).
17 Inserted by No I of the O of 24 Feb. 2021, in force since 1 April 2021 (AS 2021 132).
1 The administrative units shall ensure that an up-to-date protection needs analysis is available for all protected IT systems. In the case of IT projects, they must conduct the protection needs analysis before the project release.
2 In the protection needs analysis, they shall assess the aspects of confidentiality, availability, integrity, comprehensibility and vulnerability to espionage.
The administrative units shall implement the directives on basic protection for all protected IT systems and document the implementation.
1 If the protection needs analysis discloses an increased need for protection, the administrative units, in addition to implementing the security directives on basic protection and based on a risk analysis, shall devise further security measures and document and implement the same.
2 The administrative units shall identify risks that cannot be reduced or can only be insufficiently reduced (residual risks), and document the same. The project client or the business process owner and the head of the administrative unit shall take note of the residual risks and confirm the same in writing.
3 The head of the administrative unit concerned shall decide whether known residual risks are accepted.
1 The security procedures must be carried out at least every five years.
2 In the event of security-relevant modifications being made to the protected IT system or to the threat situation, the procedures must be carried out immediately.
18 Inserted by No I of the O of 24 Feb. 2021, in force since 1 April 2021 (AS 2021 132).
Art. 14f
1 The costs of information technology security incurred decentrally are part of the project and the operating costs.
2 Sufficient account must be taken of such costs in the planning.
The amendment of other legislation is regulated in the Annex.
1 Authorities and offices that have undertaken by agreement with the Federal IT Steering Unit (FITSU) to comply with the provisions of the Federal Administration Information Technology Ordinance of 9 December 201119 (FAITO) before this Ordinance comes into force shall be subject until 31 December 2021 to the obligations in accordance with this Ordinance to the extent under the current law.20
2 They shall be subject to this Ordinance from 1 January 2022, unless the agreement is terminated on or before 31 December 2021.
19 ,
, 2016 1783 3445,
,
20 Amended by Annex No 1 of the O of 25 Nov. 2020 on the Digital Transformation and ICT, in force since 1 Jan. 2021 (AS 2020 5871).
1 ICT security directives and permitted exceptions issued by the FITSU before this Ordinance comes into force shall continue to apply.
2 The NCSC shall decide on amendments to the directives and authorised exceptions.
This Ordinance comes into force on 1 July 2020.
(Art. 15)
The ordinances below are amended as follows:
...21
21 The amendments may be consulted under AS 2020 2107.
Die auf dieser Website abrufbaren Gesetze und Dokumente sind keine amtlichen Veröffentlichungen. Massgebend sind allein die Veröffentlichungen durch die Bundeskanzlei. Siehe www.fedlex.admin.ch.
In Bezug auf englische Sprachfassungen sei darauf hingewiesen, dass Englisch keine offizielle Amtssprache ist. Die englischen Übersetzungen der Erlasstexte dienen lediglich der generellen Information.
Bitte beachten Sie, dass sich die Website in Entwicklung befindet und gegenwärtig in einer Beta-Version vorliegt. Es können entsprechend Fehler auftauchen oder die Website ist über gewisse Zeit nicht oder nur eingeschränkt verfügbar.
Eine Übersicht zum Entwicklungsstand und den momentan verfügbaren Funktionen finden Sie hier.
Die Website ist aktuell nicht vollständig für den Zugriff via Mobile-Geräte optimiert. Es wird daher empfohlen, die Website auf einem Laptop oder Desktop-PC aufzurufen.
Es sei im Weiteren auf die Hinweise in den Nutzungsbedingungen verwiesen.
    Tour durch die Funktionen gefällig?