Table of contents
- What is the National Cyber Security Perimeter?
- How the National Cyber Security Perimeter works
- The legislation: Decree Law No. 105 and implementing Decrees
- Entities included in the National Cyber Security Perimeter
Cyber security has become a global priority due to the growing threat of cyberattacks. In Italy, the National Cyber Security Perimeter, introduced by Decree Law No. 105 of 2019, represents a strategic response to protect critical networks, systems, and services from potential risks.
This article explores what the National Cyber Security Perimeter is, how it works, which entities are involved, and what measures must be adopted to ensure the security of essential networks and services.
What is the National Cyber Security Perimeter?
The National Cyber Security Perimeter is a set of measures and regulations aimed at protecting networks, information systems, and ICT services used in activities crucial to the country’s security.
This legislative framework was introduced by Decree Law No. 105 of 2019, later converted into Law 133/2019, in response to the growing need to safeguard Italy’s critical infrastructure from incidents impacting national cyber security.
The primary goal of the perimeter is to ensure the protection of essential assets, systems, and services, such as those used by public administrations, strategic operators, and private companies involved in providing essential services.
These entities, referred to as “subjects included in the perimeter,” must comply with strict security protocols to mitigate any cyber risks.
How the National Cyber Security Perimeter works
The operation of the National Cyber Security Perimeter is based on a structured regulatory framework and specific implementing decrees. The entities within the perimeter must ensure the security of their infrastructures by:
Identifying entities and critical infrastructures
Through specific decrees, the Prime Minister’s Office and the Council of Ministers identify which entities must adopt security measures. These entities are selected based on criteria such as the essential function they perform or the provision of an essential service.
Adopting specific security measures
Identified entities must implement a series of security measures to protect the ICT services used within the perimeter. These measures include:
- Protecting infrastructures from unauthorized access;
- Continuous monitoring systems to detect vulnerabilities and incidents with an impact;
- Mandatory notification of incidents to the National Computer Security Incident Response Team (CSIRT).
Technical evaluations and verifications
The ICT assets, systems, and services used within the perimeter must undergo evaluations by the National Evaluation and Certification Center (CVCN), initially overseen by the Ministry of Economic Development and now under the National Cyber Security Agency (ACN).

The legislation: Decree Law No. 105 and implementing Decrees
Decree Law No. 105 of 2019 laid the foundation for the National Cyber Security Perimeter, establishing criteria for identifying critical entities and infrastructures. However, subsequent implementing decrees made the perimeter operational:
- DPCM of July 30, 2020, No. 131
Identifies the entities included in the perimeter and the assets, systems, and services to be protected.
- DPCM of April 14, 2021, No. 81
Defines the procedures for reporting impactful incidents and the mandatory security measures.
- DPR of February 5, 2021, No. 54
Introduces technical criteria for assessing the security of ICT assets.
- DPCM of June 15, 2021
Lists the categories of ICT assets subject to controls.
These decrees are critical to ensuring national cyber security and creating a resilient ecosystem to cyber threats.
Entities included in the National Cyber Security Perimeter
The entities included in the perimeter are public and private organizations that perform activities deemed essential for the country’s security. These entities are selected based on criteria such as:
- Essential function
Performing activities crucial to the state.
- Essential service
Providing ICT services necessary for maintaining fundamental civil and social activities.
- Graduality
Considering the severity of the impact of a potential incident.
The infrastructures of these entities are particularly sensitive and must therefore be continuously monitored and protected from any impactful incidents.
Conclusion
The National Cyber Security Perimeter represents a concrete and necessary response to protect critical infrastructures and essential services.
By adopting specific security measures and implementing a centralized governance system, the perimeter ensures a high level of security for national networks and information systems.
Questions and answers
- What is the National Cyber Security Perimeter?
It is a set of regulatory and technical measures to protect Italy’s critical infrastructures from cyber risks.
- Which entities are included in the perimeter?
Public and private organizations that perform essential functions or provide essential services.
- What is the role of the CSIRT?
The Computer Security Incident Response Team manages and monitors reports of cyber incidents.
- What are the mandatory security measures?
Protecting ICT assets, continuous monitoring, and mandatory incident reporting.
- What is Decree Law No. 105?
It is the decree that established the National Cyber Security Perimeter.
- What is the role of the CVCN?
The CVCN evaluates and certifies the security of ICT assets, systems, and services used within the perimeter.
- Why is the cyber security perimeter important?
It ensures the protection of critical infrastructures vital to national security.
- What are essential services?
ICT services required for fundamental social, economic, and civil activities.
- What happens in the event of an incident?
Incidents must be promptly reported to the CSIRT according to existing regulations.
- What is the role of the Ministry of Economic Development?
Together with the ACN, it oversees security evaluations of ICT assets within the perimeter.