Information about the CSH

The Cyber Security Hub (CSH) is an important information system of the National Cyber Security Centre (NCSC). It is used to share and manage information on cyber threats, cyber incidents and cybersecurity practices.

The most important information at a glance

The CSH is specifically designed to support authorities and critical infrastructure in Switzerland in preventing, detecting and responding to cyber threats. With the CSH, the BACS implements Art. 73 and Art. 78 of the Information Security Act, ISG. In the future, the CSH will be regulated in Art. 74 para. 2 and Art. 74f ISG (not yet in force). 

Key features of the CSH:

  • Sharing information: The CSH enables its users to share up-to-date information on cyber threats, security warnings and best practices in a secure and controlled environment.
  • User-centred design: the platform is designed to be user-friendly, with easy navigation to help users quickly find and share relevant information.
  • Collaboration and networking: the CSH promotes collaboration between various stakeholders in the field of cybersecurity, including authorities, private organizations and experts.
  • Regular updates and improvements: The CSH is continuously developed to meet the changing requirements in the field of cybersecurity and to provide users with up-to-date and effective tools.

The CSH plays a central role in the national strategy for strengthening cyber resilience and is an essential element for a comprehensive and coordinated response to cyber threats in Switzerland.

Who is the Cyber Security Hub (CSH) targeted at?

Operators of critical infrastructure

The Federal Office for Civil Protection (FOCP) defines which organizations are considered critical infrastructure:

Service providers of the operators of critical infrastructure

Service providers of the operators of critical infrastructure that are relevant for cyber security can also be included after consultation with NCSC.

Which specialists within the organizations should have access to the Cyber Security Hub?

The information published on the CSH is targeted at employees of registered organizations in the following roles:

  • IT security specialists, cyber security specialists, etc.
  • Chief Information Security Officer (CISO), Chief Security Officer (CSO), etc.
  • Employees of the organisations' Security Operations Centre (SOC) (or similar units)

The information published on the CSH regarding current cyber threats, security warnings, vulnerabilities and best practices is mostly in English. In-depth IT knowledge is also a key requirement for understanding and appreciating such information.

How do specialists access the Cyber Security Hub?

The CSH is not publicly accessible because it is aimed at a specific target audience. The NCSC manages access to the CSH.

Two (security-related) requirements must be met in order to gain access after registration:

  • The NCSC generates an invitation for the applicant to access the CSH
  • the invited professionals have an eIAM account

How do I get an invitation to the Cyber Security Hub?

Apply for access by completing the following form.

Note:
Please note that for point 4, you should complete the field that applies to your organisation:

  • 4a. To be completed by operators of critical infrastructures: 
    As an operator of critical infrastructure: in which sector according to the Federal Office for Civil Protection (FOCP) is your organization active?

 

  • 4b. To be completed by IT service providers for critical infrastructures:
    As an IT service provider of operators of critical infrastructures: what services do you provide for your customers in which sector according to the Federal Office for Civil Protection FOCP.
    Example: Energy sector – private cloud operation; Financial sector – consulting; etc.
    If your organisation does not provide services for critical infrastructures, please explicitly state ‘none’ for this line.

 

Application form

 
 
 
 
 
 
 
 
Maximum 200 characters
Information on the users who are to receive CSH access:
 
Information: Name, Family name, E-Mail-Adress
 
Information: Name, Family name, E-Mail-Adress
 
Information: Name, Family name, E-Mail-Adress

What do I do after I receive the invitation?

The invitation contains all the information you need to register and create an eIAM account.

To register, use only the business email address to which you received the invitation. Access requests generated with private email addresses (e.g. bluewin, gmail, etc.) will not be processed.

If you experience any problems with your eIAM registration, please contact the helpdesk of the Federal Office of Information Technology, Systems and Telecommunication FOITT at +41 58 465 8888 / servicedesk@bit.admin.ch.

General information about eIAM can be found at:
www.eiam.swiss

Last modification 20.11.2024

Top of page

https://www.ncsc.admin.ch/content/ncsc/en/home/infos-fuer/infos-it-spezialisten/informationen-csh.html