Bulgaria Adopts Amendments to the Cybersecurity Act in Line with NIS 2

16/04/2026

The National Assembly adopted, at second reading, amendments to the Cybersecurity Act introducing expanded European requirements for risk assessment and incident reporting. With these changes, Bulgaria transposes the provisions of the NIS 2 Directive, aimed at achieving a high level of security of network and information systems across the European Union.

Expanded scope of the law

The new legislation significantly broadens the scope of affected organizations. In addition to previously covered entities, it now includes:

  • public and private organizations
  • providers of qualified trust services
  • domain name registries
  • educational institutions conducting critical scientific research
  • judicial authorities

The number of sectors covered by the law increases from 8 to 18, with new additions including:

  • space sector
  • wastewater management
  • ICT services between enterprises
  • postal and courier services
  • waste management
  • production and distribution of chemicals and food
  • manufacturing industries (including medical devices, electronics, machinery, and automotive)
  • providers of digital services
  • scientific research

New incident reporting requirements

The law introduces stricter rules for notifying cyber incidents. Organizations classified as essential and important must:

  • notify the relevant sectoral CSIRT team within 24 hours of detecting an incident
  • within 72 hours provide updated information and an initial assessment (including severity, impact, and technical details)
  • submit a final report within one month after the update

For providers of trust services, the deadline for updating information is 24 hours.

Control over technologies used

The adopted amendments also introduce mechanisms for controlling the technologies used. Upon proposal by the Cybersecurity Council, the Council of Ministers may require organizations to use:

  • specific ICT products and services
  • technologies certified under European cybersecurity schemes
  • solutions proven effective from both operational and economic perspectives

Additionally, at the EU level, risk assessments may lead to proposals to restrict certain technologies or supply chains, particularly when originating from non-EU countries.

If a technology is restricted by a government decision, organizations must discontinue its use within three years, except in cases of high national security risk, where the deadline may be shorter.

Importance of the changes

According to the acting Minister of e-Government, the adoption of these amendments marks an important step toward strengthening Bulgaria’s national cybersecurity.

The new rules aim to improve risk management, incident response, and control over critical technologies, while aligning national legislation with European standards.

Huawei Introduces AI Solutions to Drive ISP Network Growth and New Business Opportunities
08/05/26

Huawei hosted a dedicated roundtable focused on the opportunities and challenges facing internet service providers (ISPs) in the context of the ...

Dell and NVIDIA Introduce New Solutions for AI Data Centers and Enterprise Infrastructure
05/05/26

Dell Technologies and NVIDIA are expanding their strategy for building AI infrastructure, placing data centers at the core of enterprise AI adop...

Lenovo Completes Acquisition of Infinidat and Expands Its Capabilities in AI-Driven Data
30/04/26

Lenovo has officially completed the acquisition of Infinidat – a global provider of high-end enterprise storage solutions. The deal streng...

SAP Cloud Infrastructure in Germany Receives IT-Grundschutz Certification
27/04/26

SAP announced that its cloud infrastructure in Germany has achieved IT-Grundschutz certification – an information security standard that c...

Huawei Ranks No.1 Globally and in China in Enterprise Wi-Fi 7 by Market Share and Shipments
23/04/26

Huawei ranks first both globally and in China in terms of market share and shipments of enterprise Wi-Fi 7 solutions, according to IDC data (Wor...