COMMISSION DECISION (EU, Euratom) 2018/559
of 6 April 2018
laying down implementing rules for Article 6 of Decision (EU, Euratom) 2017/46 on the security of communication and information systems in the European Commission
CHAPTER 1
GENERAL PROVISIONS
Article 1
Subject matter and scope
Article 2
Definitions
CHAPTER 2
ORGANISATION AND RESPONSIBILITIES
Article 3
Roles and responsibilities
Article 4
Alignment with the Commission's information security policy
CHAPTER 3
IT SECURITY PROCESSES
Article 5
Encrypting technologies
Article 6
IT security inspections
Article 7
Access from external networks
Article 8
Outsourcing of CISs
CHAPTER 4
MISCELLANEOUS AND FINAL PROVISIONS
Article 9
Transparency
Article 10
Standards
Article 11
Entry into force
ANNEX
ROLES AND RESPONSIBILITIES (RASCI)
| 
                   Role Process  | 
               
                   ISSB  | 
               
                   HR (DS)  | 
               
                   Commission Departments  | 
               
                   System Owner  | 
               
                   Data Owner  | 
               
                   LISO  | 
               
                   DIGIT  | 
               
                   Contractors  | 
            
| 
                   Alignment with the Commission's information security policy  | 
               
                   
  | 
               
                   R/A  | 
               
                   S  | 
               
                   
  | 
               
                   
  | 
               
                   
  | 
               
                   S  | 
               
                   
  | 
            
| 
                   Encrypting technologies  | 
               
                   
  | 
               
                   C  | 
               
                   A  | 
               
                   R  | 
               
                   I  | 
               
                   C  | 
               
                   
  | 
               
                   
  | 
            
| 
                   IT Security Inspections  | 
               
                   I  | 
               
                   A/R  | 
               
                   
  | 
               
                   S  | 
               
                   I  | 
               
                   I  | 
               
                   S  | 
               
                   
  | 
            
| 
                   Access from external networks  | 
               
                   C (1)  | 
               
                   C  | 
               
                   A  | 
               
                   R  | 
               
                   I  | 
               
                   S  | 
               
                   S  | 
               
                   
  | 
            
| 
                   Outsourcing of CISs  | 
               
                   
  | 
               
                   S/C  | 
               
                   A  | 
               
                   R/C (2)  | 
               
                   S  | 
               
                   C  | 
               
                   
  | 
               
                   S  |