Information about the CSH

The Cyber Security Hub (CSH) is an important information system of the National Cyber Security Centre (NCSC). It is used to share and manage information on cyber threats, cyber incidents and cybersecurity practices.

The most important information at a glance

The CSH is specifically designed to support authorities and critical infrastructure in Switzerland in preventing, detecting and responding to cyber threats. The CSH is regulated in Art. 74 para. 2 and Art. 74f of the Information Security Act (ISA)

Key features of the CSH:

  • Sharing information: The CSH enables its users to share up-to-date information on cyber threats, security warnings and best practices in a secure and controlled environment.
  • User-centred design: the platform is designed to be user-friendly, with easy navigation to help users quickly find and share relevant information.
  • Collaboration and networking: the CSH promotes collaboration between various stakeholders in the field of cybersecurity, including authorities, private organizations and experts.
  • Regular updates and improvements: The CSH is continuously developed to meet the changing requirements in the field of cybersecurity and to provide users with up-to-date and effective tools.

The CSH plays a central role in the national strategy for strengthening cyber resilience and is an essential element for a comprehensive and coordinated response to cyber threats in Switzerland.

Who is the Cyber Security Hub (CSH) targeted at?

Operators of critical infrastructure

The Federal Office for Civil Protection (FOCP) defines which organizations are considered critical infrastructure:

Service providers of the operators of critical infrastructure

Service providers of the operators of critical infrastructure that are relevant for cyber security can also be included after consultation with NCSC.

Which specialists within the organizations should have access to the Cyber Security Hub?

The information published on the CSH is targeted at employees of registered organizations in the following roles:

  • IT security specialists, cyber security specialists, etc.
  • Chief Information Security Officer (CISO), Chief Security Officer (CSO), etc.
  • Employees of the organisations' Security Operations Centre (SOC) (or similar units)

The information published on the CSH regarding current cyber threats, security warnings, vulnerabilities and best practices is mostly in English. In-depth IT knowledge is also a key requirement for understanding and appreciating such information.

How do specialists access the Cyber Security Hub?

The CSH is not publicly accessible because it is aimed at a specific target audience. The NCSC manages access to the CSH.

Two (security-related) requirements must be met in order to gain access after registration:

  • The NCSC generates an invitation for the applicant to access the CSH
  • the invited professionals have an eIAM account

How do I get an invitation to the Cyber Security Hub?

Apply for access by completing the following form.

Note:
Please note that for point 4, you should complete the field that applies to your organisation:

  • 4a. To be completed by operators of critical infrastructures: 
    As an operator of critical infrastructure: in which sector according to the Federal Office for Civil Protection (FOCP) is your organization active?

 

  • 4b. To be completed by IT service providers for critical infrastructures:
    As an IT service provider of operators of critical infrastructures: what services do you provide for your customers in which sector according to the Federal Office for Civil Protection FOCP.
    Example: Energy sector – private cloud operation; Financial sector – consulting; etc.
    If your organisation does not provide services for critical infrastructures, please explicitly state ‘none’ for this line.

 

Application form

 
 
 
 
 
 
 
 
Maximum 200 characters
Information on the users who are to receive CSH access:
 
Information: Name, Family name, E-Mail-Adress
 
Information: Name, Family name, E-Mail-Adress
 
Information: Name, Family name, E-Mail-Adress

What do I do after I receive the invitation?

The invitation contains all the information you need to register and create an eIAM account.

To register, use only the business email address to which you received the invitation. Access requests generated with private email addresses (e.g. bluewin, gmail, etc.) will not be processed.

If you need help creating your eIAM account or CH login, please visit the following page: https://www.eiam.swiss/?c=f!chhelp!pub&l=en

General information about eIAM can be found at:
www.eiam.swiss

How do I request new users for my organisation already registered in CSH?

To request new users for an organisation already registered in CSH, the active CSH users of the organisation should ideally use the CSH integrated contact form and select the corresponding subject ‘Registration of additional users’. The NCSC only needs the first and last names and the e-mail addresses of the persons who are to be added.

How do I report the blocking or deletion of a user account?

When users leave your organisation and no longer need a CSH user account, the organisation's active CSH users should use the CSH integrated contact form and select the corresponding subject ‘Mutation of existing users’. BACS only needs the email address of the person or the user account that is to be blocked.

Last modification 14.04.2025

Top of page

https://www.ncsc.admin.ch/content/ncsc/en/home/meldepflicht/informationen-csh.html