|GRANTWAY
EN

National SOCs

European Comission

Share
Favorite
Feedback
Summary
04 July 2024
21 January 2025
-
-
-
For profit
Not for profit (incl. NGOs)
Public sector
R&D and Higher Education
Aruba
Austria
Belgium
Bonaire
Bulgaria
Croatia
Curaçao
Cyprus
Czechia
Denmark
Estonia
Finland
France
French Polynesia
French Southern and Antarctic Territories
Germany
Greece
Greenland
Hungary
Iceland
Ireland
Israel
Italy
Latvia
Liechtenstein
Lithuania
Luxembourg
Malta
Moldova
Netherlands
New Caledonia
Norway
Poland
Portugal
Romania
Saba
Saint Barthélemy
Serbia
Sint Maarten
Slovakia
Slovenia
Spain
St. Eustatius
St. Pierre and Miquelon
Sweden
Turkey
Ukraine
Wallis and Futuna
Research, Development and Innovation Engineering and Technology
Research, Development and Innovation Social Sciences
Transport, Infrastructure and ICT
Overview

ExpectedOutcome :

  • World-class National SOCs across the Union, strengthened with state-of-the-art technology, acting as clearinghouses for detecting, gathering and storing data on cybersecurity threats, analysing this data, and sharing and reporting CTI, reviews and analyses.
  • Threat intelligence and situational awareness capabilities and capacity building supporting strengthened collaboration between cybersecurity actors, including private and public actors. Objective :

The objective is to create or strengthen National SOCs, in particular with state-of-the-art tools for monitoring, understanding and proactively managing cyber events, in close collaboration with relevant entities such as CSIRTs. They will also, where possible, benefit from information and feeds from other SOCs in their countries and use the aggregated data and analysis to deliver early warnings to targeted critical infrastructures on a need-to-know basis.

Scope :

The aim is capacity building for new or existing National SOCs, e.g., equipment, tools, data feeds, as well as costs related to data analysis, interconnection with Cross-Border SOC platforms, etc. This can include for example automation, analysis and correlation tools and data feeds covering Cyber Threat Intelligence (CTI) at various levels ranging from field data to Security Information and Event Management (SIEM) data to higher level CTI. National SOCs should also leverage state of the art technology such as artificial intelligence and dynamic learning of the threat landscape and context. This also includes the use of shared cybersecurity information, to the extent possible based on existing taxonomies and/or ontologies, and hardware to ensure the secure exchange and storage of information. The operations should be built upon live network data. Where relevant, consideration should be given to SMEs as the ultimate recipients of cybersecurity operational information.

A key element is the translation of advanced AI/ML, data analytics and other relevant cybersecurity tools from research results to operational tools, and further testing and validating them in real conditions in combination with access to supercomputing facilities (e.g., to boost the correlation and detection features of cross-border platforms).

Another key role for National SOCs is knowledge transfer, such as training of cybersecurity analysts. For example, SOCs dealing with critical infrastructures play a key role and should benefit from the knowledge and experience acquired by or concentrated in National SOCs.

National SOCs must share information with other stakeholders in a mutually beneficial exchange of information and commit to apply to participate in a cross-border SOC platform within the next 2 years, with a view to exchanging information with other National SOCs.

To achieve this aim, a call for expression of interest will be launched to select entities in Member States that provide the necessary facilities to host and operate National SOCs. Applicants to the call for expressions of interest should describe the aims and objectives of the National SOC, describe its role and how such role relates to other cybersecurity actors, and its eventual cooperation with other public or private cybersecurity stakeholders. Applicants should also provide the detailed planning of the activities and tasks of the National SOC, the services it will offer, the way they will operate and be operationalised, and describe the duration of the activity as well as the main milestones and deliverables. They should also specify what equipment, tools and services need to be procured and integrated to build up the National SOC, its services and its infrastructure.

To support the above activities of a National SOC, the following two workstreams of activities are foreseen:

  • [Procurement] A Joint Procurement Action with the Member State where the national SOC is located: this will cover the procurement of the main equipment, tools and services needed to build up the National SOC
  • [Building up and running the National SOC] A grant will also be available to cover, among others, the preparatory activities for setting up the National SOC, its interaction and cooperation with other stakeholders, as well as the running/operating costs involved, enabling the effective operation of the National SOC, e.g., using the equipment, tools and services purchased through the joint procurement. These will also indicate milestones and deliverables to monitor progress.

Applications shall be made to both workstreams. Applications will be object of evaluations procedures. Grants will only be awarded to applicants that have succeeded the evaluation of the joint procurement action.

These actions aim at creating or strengthening national SOCs, which occupy a central role in ensuring the (cyber-)security of national authorities, providers of critical infrastructures and essential services. SOCs are tasked with monitoring, understanding and proactively managing cybersecurity threats. In light of the crucial operative role of SOCs for ensuring cybersecurity in the Union, the nature of the technologies involved as well as the sensitivity of the information handled, SOCs must be protected against possible dependencies and vulnerabilities in cybersecurity to pre-empt foreign influence and control. As previously noted, participation of non-EU entities entails the risk of highly sensitive information about security infrastructure, risks and incidents being subject to legislation or pressure that obliges those non-EU entities to disclose this information to non-EU governments, with an unpredictable security risk. Therefore, based on the outlined security reasons, the actions relating to SOCs are subject to Article 12(5) of Regulation (EU) 2021/694, in consistency with WP 2021/2022.

Eligibility

Conditions

  1. Admissibility conditions: described in section 5 of the call document

Proposal page limits and layout: described in Part B of the Application Form available in the Submission System

  1. Eligible countries: described in section 6 of of the call document

  2. Other eligibility conditions: described in section 6 of the call document

  3. Financial and operational capacity and exclusion: described in section 7 of the call document

  4. Evaluation and award:

  • Award criteria, scoring and thresholds: described in section 9 of the call document
  • Submission and evaluation processes : described section 8 of the call document and the Online Manual
  • Indicative timeline for evaluation and grant agreement: described in section 4 of the call document

6 . Legal and financial set-up of the grants: described in section 10 of the call document

Documents

Call document is accessible here

Standard application form — call-specific application form is available in the Submission System

Detailed budget table - available in the Submission System

DIGITAL EUROPE PROGRAMME General MGA v1.0

Guidance Classification of information in DIGITAL projects

Guidelines on How to Complete your Ethics Self-Assessment

WORK PROGRAMME - Cybersecurity Work Programme 2023-2024

Digital Europe - Regulation 2021/694

EU Financial Regulation 2018/1046

Learn more or apply
All information about this funding has been collected from and belongs to the funding organization
20 July 2024