Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site.... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

Loading...

News Flash

Cyber revolution in public procurement: Italy’s new DPCM changes the rules

From May 21, 2025, new cyber security and ICT procurement rules will reshape how public administrations and tech providers operate

The new cyber DPCM:

Table of contents

  • The new cyber DPCM: legal context and scope
  • Cyber security requirements: high standards, lower risks
  • Vulnerability management: continuous monitoring and transparency
  • Digital supply chain: traceability and security
  • Which ICT goods and services are affected?
  • Safe countries and strategic technologies
  • A new era for Italy’s digital security

The new cyber DPCM: legal context and scope

The DPCM of April 30, 2025, published in the Official Gazette on May 5, will enter into force on May 21, 2025. It marks a turning point in how public administrations acquire ICT goods and services.

This is a major step in Italy’s national cyber security strategy, aiming to protect strategic interests and strengthen digital sovereignty.

In compliance with Article 14 of Law No. 90 of June 28, 2024, the decree introduces uniform cyber security requirements for all ICT procurement processes in sensitive sectors, with preference for technologies from EU or safe countries.

Cyber security requirements: high standards, lower risks

The DPCM defines a clear set of mandatory cyber security requirements. Every ICT component — from VPNs to software — must be secure by design and by default, protect sensitive data, and prevent unauthorized access.

Security updates, vulnerability management, and resilience against cyberattacks become essential. Critical systems must remain functional even under denial-of-service (DoS) attacks. Only products that meet these standards will be considered for public tenders.

Vulnerability management: continuous monitoring and transparency

Vulnerability management becomes a strategic obligation. Public bodies must continuously monitor their systems, while providers are required to offer prompt, well-documented updates.

Each patch must include clear explanations: what’s fixed, why it matters, and what users must do.

Suppliers must also set up vulnerability disclosure channels and guarantee free, accessible updates — even for third-party components.

Digital supply chain: traceability and security

The DPCM introduces strict evaluation of the ICT supply chain. Public administrations must map all suppliers and assess their cyber risk exposure.

Reliability and transparency will be decisive.

This aims to prevent backdoors or malware introduced through insecure components and promotes collaboration only with trusted tech partners.

Which ICT goods and services are affected?

Annex 2 of the decree lists all covered technologies, including:

  • Identity management systems
  • Anti-malware software
  • VPNs, firewalls, SIEM, PKI
  • Encryption, monitoring, and secure logging solutions

Only solutions meeting updated standards will be eligible for public contracts.

Safe countries and strategic technologies

Annex 3 defines a list of “safe countries”, including Australia, South Korea, Japan, Israel, Switzerland, and New Zealand — all bound to Italy through cyber security cooperation agreements.

ICT solutions from these countries will be awarded bonus points in public tenders, encouraging partnerships with internationally trusted tech providers.

A new era for Italy’s digital security

This decree marks a major shift in Italy’s approach to digital defense. Not only does it raise the bar for public sector procurement, but it also challenges ICT providers to upgrade their products and practices.

Those who adapt will not only access public contracts, but position themselves as strategic cyber security allies for the Italian State.

The message is clear: cyber security is no longer a constraint, but a strategic growth opportunity for innovation and digital trust.

To top