Este portal utiliza "cookies". Se quiser saber mais sobre cookies, quais as suas finalidades e como geri‑los, consulte a nossa Política de privacidade

Security and Trust

Update 30.11.2025

Promote security and trust as fundamental principles in the development and provision of digital services.

Strategic Line VI

Security and Trust

As interconnected systems and services expand, new security challenges surface. Security and trust are two core principles in the development and provision of Digital Public Services.

Measure 6.1 - Compliance with the National Cybersecurity Reference Framework (QNRCS)

Ensure that operators of essential services and digital service providers adopt the appropriate and proportionate technical and organisational measures to manage risks to the security of networks and information systems.

Medida 6.1.1

Establish the certification ecosystem for the QNRCS under the National Cybersecurity Certification Framework

See 1 Of 1

Measure 6.2 - Secure Digital Identity

Leverage and expand existing digital identity infrastructures, platforms, and solutions, while innovating and making new services available. Support digital transformation processes across different sectors, including connections with the private sector.

6.2.1.

Extend the professional attributes certificate to all civil servants

6.2.2.

Widespread adoption of eIDAS authentication in Public Administration solutions

6.2.3.

Develop action plan to implement robust authentication mechanisms

6.2.4.

Extend the ID.gov application to civil servants

See 4 Of 4

Measure 6.3 - Privacy and Citizen Control of Data

Wherever acceptable, appropriate and feasible, establish information mechanisms and audit capabilities for citizens in order to strengthen their trust in digital processes and public organisations.

6.3.1.

Make available a mechanism enabling citizens to authorise access to public data - My data

See 1 Of 1

Measure 6.4 - Contribution to the National Cybersecurity Situational Awareness

Promote the adoption by public entities of processes and technologies that facilitate the sharing and correlation of real-time information on potentially malicious activity.

6.4.1.

Participation in PANORAMA

See 1 Of 1