Compliance
ENS
certification
public administration

ENS Certification for Businesses: A Complete 2025 Guide

Everything about Spain's National Security Framework (ENS): levels, requirements, certification process, and impact on public contracts.

SecraFebruary 26, 202611 min read

If your company works with Spanish public administration or plans to do so, ENS certification is not optional. It is the gateway to public sector contracts and the definitive proof that your organization manages information with the security guarantees demanded by Spanish law. In this guide, we break down everything you need to know to plan, execute, and maintain ENS certification for your business.

What Is the Esquema Nacional de Seguridad (ENS)?

The Esquema Nacional de Seguridad, or National Security Framework, is the regulatory framework that establishes the core security principles and minimum requirements for information protection within the Spanish public sector. Currently governed by Royal Decree 311/2022, which replaced the earlier RD 3/2010, the ENS aims to create the necessary conditions of trust for the use of electronic means by public administrations and the entities that collaborate with them.

The ENS does not exist in isolation. It is embedded within Spain's Law 40/2015 on Public Sector Legal Regime and Law 39/2015 on Common Administrative Procedure, both of which drive the digital transformation of government services. As more public processes and services move online, ensuring the confidentiality, integrity, availability, authenticity, and traceability of information becomes mission-critical.

The scope of the ENS extends to all public sector entities (central government, autonomous communities, local authorities, and public bodies), but it also reaches private sector companies that provide services or technology solutions to these administrations. In practice, this means that any technology vendor managing, processing, or storing data on behalf of public administration must comply with the applicable ENS requirements corresponding to their level of responsibility.

ENS Security Levels

The ENS defines three security levels based on the potential impact that a security incident would have on the organization, the services it delivers, and the information it handles. Classification is determined by evaluating the security dimensions (confidentiality, integrity, availability, authenticity, and traceability) for each information system.

Low Level

The low level applies when a security incident would have a limited impact on the organization's functions, its assets, or affected individuals. These are systems that handle public or internal information whose loss or alteration would not cause significant harm. Typical examples include informational websites for public bodies, document management systems for unclassified records, or low-criticality internal applications.

Security measures required at this level are foundational: documented security policies, basic access control, backup procedures, and a basic incident management plan.

Medium Level

The medium level applies when an incident could cause serious harm to the organization's operations, damage assets of considerable value, or significantly affect individuals whose data is being processed. This category covers systems handling sensitive personal data (though not GDPR special categories), electronic processing platforms, financial management systems, or solutions supporting public services with a notable level of criticality.

Requirements increase substantially: periodic audits, formal incident management with escalation procedures, encrypted communications, role-based access controls, network segmentation, and continuous security monitoring.

High Level

The high level is reserved for systems where a compromise would have catastrophic consequences: paralysis of essential services, serious harm to individuals, loss of classified information, or severe impact on national security. Tax management systems, electronic health records, digital justice platforms, critical infrastructure, and defense systems fall into this category.

Measures at this level are exhaustive and demand significant investment: security operations centers (SOC), periodic penetration testing, end-to-end encryption, full redundancy, forensic analysis capabilities, advanced identity management, and annual external audits.

Who Needs ENS Certification?

The short answer: any organization that interacts with the Spanish public sector in a technological capacity. But let us detail the specific scenarios.

Public Administrations. All public sector entities must comply with the ENS and declare the category of their information systems. This is mandatory, not optional.

Companies supplying the public sector. If your company develops software, manages infrastructure, provides cloud services, offers cybersecurity solutions, or delivers any other technology service to public administration, you need to demonstrate ENS compliance. An increasing number of public tender specifications include ENS certification as a technical solvency requirement or as an evaluation criterion carrying significant weight.

Companies processing citizen data on behalf of government. If you process personal data of citizens within the context of a public service (payroll management, case processing, citizen service desks), you fall within the scope.

The link to public tenders is the economic engine behind certification for many companies. In sectors such as technology, consulting, telecommunications, and managed services, holding ENS certification can make the difference between winning and losing a public contract worth millions of euros. Many government bodies now require medium or high-level ENS certification as a minimum prerequisite for participation.

Core ENS Requirements

Royal Decree 311/2022 structures the requirements into three major blocks that every organization must address comprehensively.

Organizational Framework

The starting point is security governance. The organization must establish a security policy approved by senior management that defines objectives, scope, responsibilities, and a commitment to continuous improvement. Specific roles must be designated: an information owner, a service owner, and a security officer. These roles can be held by different people or combined depending on the organization's size, but their functions must be clearly defined and documented.

A formal risk analysis is also required, identifying threats, assessing vulnerabilities, and determining treatment measures proportionate to the acceptable risk level.

Operational Framework

This is where the bulk of the technical and procedural controls reside. Key requirements include:

  • Access management: user identification and authentication, privilege management, resource access control following the principle of least privilege.
  • Incident management: procedures for detection, analysis, containment, eradication, and recovery from security incidents, including notification to CCN-CERT when applicable.
  • Service continuity: business continuity plans ensuring service recovery within acceptable timeframes, with periodic plan testing.
  • Monitoring: activity logging, continuous system supervision, and alerting mechanisms for anomalies.
  • Change management: procedures to control modifications to information systems, ensuring they do not introduce new vulnerabilities.

Protection Measures

Protection measures encompass the specific technical controls safeguarding information assets:

  • Encryption: protection of data at rest and in transit using algorithms and key lengths appropriate to the security level.
  • Communication security: secure network configuration, firewalls, segmentation, perimeter protection, and use of secure protocols (TLS, VPN).
  • Physical security: facility access control, data center protection, and safeguards against environmental threats.
  • Stored information protection: information classification, media management, secure deletion, and copy control.

Step-by-Step Certification Process

The path to ENS certification is a project that demands planning, resources, and organizational commitment. Here are the typical phases.

Current Situation Analysis (Gap Analysis)

Everything begins with a thorough assessment of the organization's current security posture against ENS requirements. This gap analysis identifies which controls are already in place, which need improvement, and which are entirely missing. It forms the foundation for the entire remediation plan.

A well-executed gap analysis evaluates existing documentation, interviews key personnel, reviews technical configurations, and produces a detailed report showing the compliance level for each ENS control. If you lack internal expertise, it is advisable to engage a specialized GRC consultancy with deep knowledge of ENS requirements.

Remediation Plan

Using the gap analysis results, a remediation plan is designed that prioritizes actions by their compliance impact and implementation difficulty. The plan must include a realistic timeline, responsibility assignments, required resources (human, technical, and financial), and tracking milestones.

Implementation of Measures

This is the longest and most demanding phase. It involves developing and approving required documentation (policies, procedures, technical instructions), deploying technical controls (monitoring tools, encryption solutions, identity management systems), training staff, and executing the necessary configurations across the infrastructure.

Implementation is not purely technical. It requires a cultural shift within the organization: security must be integrated into business processes, not bolted on as an afterthought.

Internal Audit

Before facing the certification audit, the organization must conduct an internal audit to verify compliance of the implemented controls. This audit identifies residual non-conformities and allows the organization to correct them before the external evaluation.

Certification Audit

The certification audit is performed by a Certification Body accredited by ENAC (National Accreditation Entity) and recognized by the CCN (National Cryptologic Centre). Auditors evaluate whether the information system conforms to the ENS requirements applicable to its category, review documentation, interview personnel, verify technical controls, and issue a report with their findings.

If major non-conformities are identified, the organization has a defined period to remediate them before the certificate is issued. Once approved, the organization is listed in the CCN's registry of certified entities.

Maintenance and Continuous Improvement

ENS certification is not a one-time event but an ongoing process. The certificate is valid for two years, after which a renewal audit is required. Additionally, the organization must maintain a continuous improvement cycle that includes periodic risk analysis reviews, security measure updates, incident tracking, and management system performance evaluation.

Cost and Timelines: What to Expect

One of the most frequently asked questions from companies considering certification is how much it costs and how long it takes. The answer depends on several factors.

Typical timelines. For a mid-sized company starting from a reasonable security baseline, the complete process from gap analysis to certificate issuance typically takes between 6 and 12 months. If the organization is starting essentially from scratch in terms of security, the timeline can extend to 12-18 months. The category level (low, medium, or high) also directly influences the complexity and duration of the project.

Cost factors. The main cost components include external consultancy for gap analysis and ongoing support, necessary technology tools (SIEM, identity management, encryption), internal staff dedication, training, and the certification audit itself. For an SME targeting medium level, the total investment typically ranges from 15,000 to 50,000 euros. For larger organizations or high-level certification, the figure can exceed 100,000 euros.

Return on investment. For companies bidding on public contracts, the ROI is direct and tangible. A single public contract can more than recoup the certification investment. Furthermore, ENS certification improves the organization's overall security posture, reduces incident risk, and generates trust among both public and private sector clients.

If you need a personalized estimate for your company, our ENS consultancy team can provide an initial assessment at no obligation.

ENS and ISO 27001: Are They Compatible?

A recurring question concerns the relationship between ENS and the ISO 27001 standard. The answer is that they are not only compatible but share a very similar conceptual foundation and complement each other naturally.

Both frameworks are grounded in a risk-based approach, require an information security management system (ISMS), demand continuous improvement, and share many controls. In fact, Annex II of RD 311/2022 includes an explicit mapping between ENS controls and those of ISO 27001.

The key differences lie in the fact that ENS is a mandatory legal requirement for the Spanish public sector and its suppliers, while ISO 27001 is a voluntary international standard. ENS has Spain-specific requirements (such as CCN-CERT notification or the use of CCN-certified products), whereas ISO 27001 is more generic and globally applicable.

The optimal strategy for many organizations is to implement an integrated management system that simultaneously covers the requirements of both frameworks. This reduces duplication of effort, optimizes resources, and enables both certifications to be achieved with a smaller incremental investment than if they were pursued independently. At Secra, our GRC consultancy service addresses ENS and ISO 27001 compliance in an integrated manner, maximizing synergies and minimizing the impact on day-to-day operations.

Conclusion

ENS certification has evolved from a bureaucratic formality perceived as distant to a strategic requirement for any company operating or aspiring to operate within Spain's public sector ecosystem. Royal Decree 311/2022 tightened the requirements and broadened the scope, making it clear that information security is non-negotiable when public services are at stake.

The certification process demands investment of time, resources, and commitment, but the benefits extend far beyond regulatory compliance: genuine improvement in security posture, competitive advantage in public tenders, enhanced client trust, and reduced incident risk.

The key to success lies in proper planning, engaging the right expert guidance, and approaching certification as a holistic improvement project rather than a paperwork exercise. If you are considering taking the step, we recommend starting with a situation analysis that allows you to properly scope the required effort and develop a realistic plan.

Need guidance on ENS certification for your business? Contact our team and we will help you chart the most efficient path forward for your specific situation.

About the author

Secra Solutions team

Ethical hackers with OSCP, OSEP, OSWE, CRTO, CRTL and CARTE certifications, 7+ years of experience in offensive cybersecurity, and authors of CVE-2025-40652 and CVE-2023-3512.

Meet the team →

Share article

👋Hi! Have any questions? Write to us, we reply in minutes.

Open WhatsApp →