Skip to content
Mae'r dudalen hon ar gael yn Saesneg ar hyn o bryd.
Back to all updates
SecurityEULow impact

ENISA updates Cybersecurity Threat Landscape methodology

ENISA
ENISANIS2Risk management

ENISA refreshed its Threat Landscape methodology, a useful reference for risk registers and runtime monitoring planning in AI deployments subject to the EU AI Act and the NIS2 Directive.

Why this matters

The updated methodology provides a structured approach to threat identification and risk assessment that aligns with EU cybersecurity requirements. It supports deployers' operational risk management and incident preparedness.

Impact on obligations

Deployer

Use the ENISA Threat Landscape to update risk registers, monitoring procedures, and incident drills. Link risk assessments to transparency logs.

What to evidence

  • Updated risk registers
  • Monitoring procedures
  • Incident drills linked to transparency logs

Key artefacts explained:

  • DSSE: Dead Simple Signing Envelope — portable signature format
  • STH: Signed Tree Head — tamper-evident checkpoint in transparency log
  • TSA: Time-Stamp Authority — independent timestamp receipt
  • WORM: Write Once Read Many — immutable storage for audit trails

Primary source

ENISA(enisa.europa.eu)

Related resources