{"id":9203,"date":"2025-04-10T12:39:15","date_gmt":"2025-04-10T10:39:15","guid":{"rendered":"https:\/\/eulawenforcement.com\/?p=9203"},"modified":"2025-06-26T12:04:21","modified_gmt":"2025-06-26T10:04:21","slug":"following-in-amlas-footsteps-is-direct-enforcement-the-way-to-go-for-wandering-enisa","status":"publish","type":"post","link":"https:\/\/eulawenforcement.com\/?p=9203","title":{"rendered":"Following in AMLA\u2019s footsteps: is direct enforcement the way to go for wandering ENISA?"},"content":{"rendered":"\n<p>By Arailym, Patrick and Sondra<\/p>\n<p>The road to what might be called regulatory maturity is often a long one. In EU cybersecurity regulation, a culture of vertical and horizontal collaboration is optimistic but seemingly ineffective. It likely leaves the European Union Agency for Cybersecurity (ENISA) feeling somewhat envious of the centralised enforcement powers recently vested in the Anti-Money Laundering Authority (AMLA). How feasible would it be for ENISA to follow in AMLA\u2019s footsteps? This blog post examines whether there is regulatory space, or even a solid legal basis for such an evolution. Due to the differing contexts of financial crime prevention and cybersecurity, the limits of an analogy between the trajectories of the two agencies will become clear.<\/p>\n<p><strong>What is ENISA?<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-9204 alignright\" src=\"https:\/\/eulawenforcement.com\/wp-content\/uploads\/2025\/04\/Picture1.png\" alt=\"\" width=\"262\" height=\"206\" srcset=\"https:\/\/eulawenforcement.com\/wp-content\/uploads\/2025\/04\/Picture1.png 584w, https:\/\/eulawenforcement.com\/wp-content\/uploads\/2025\/04\/Picture1-300x236.png 300w\" sizes=\"auto, (max-width: 262px) 85vw, 262px\" \/>ENISA &#8211; <a href=\"https:\/\/www.enisa.europa.eu\/\">the European Union Agency for Cybersecurity<\/a>, previously known as the European Network and Information Security Agency, was established in 2004 <a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/NL\/TXT\/?uri=CELEX%3A32004R0460&amp;qid=1652180477522\">by Regulation No 460\/2004<\/a>. It was reformed by <a href=\"https:\/\/eur-lex.europa.eu\/eli\/reg\/2013\/526\/oj\/eng\">Regulation No 526\/2013<\/a>, which was later repealed by <a href=\"https:\/\/eur-lex.europa.eu\/eli\/reg\/2019\/881\/oj\">the Cybersecurity Act.<\/a><\/p>\n<p>The Cybersecurity Act granted ENISA a permanent mandate along with increased responsibilities, transforming it from a <a href=\"https:\/\/www.politico.eu\/article\/reding-calls-time-on-cinderella-agency\/\">\u201cCinderella\u201d agency<\/a> into a key cybersecurity entity in the EU. ENISA aims to achieve a high common level of cybersecurity across the Union. Its main tasks include:<\/p>\n<ul>\n<li>Supporting EU legislation implementation and the development of EU-wide cybersecurity standards<\/li>\n<li>Enhancing operational cooperation and coordination among Member States, Union institutions and private sector actors<\/li>\n<li>Managing cybersecurity certification schemes to increase trust in information and communication technology (ICT)<\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-9205 aligncenter\" src=\"https:\/\/eulawenforcement.com\/wp-content\/uploads\/2025\/04\/Picture2.png\" alt=\"\" width=\"363\" height=\"335\" srcset=\"https:\/\/eulawenforcement.com\/wp-content\/uploads\/2025\/04\/Picture2.png 363w, https:\/\/eulawenforcement.com\/wp-content\/uploads\/2025\/04\/Picture2-300x277.png 300w\" sizes=\"auto, (max-width: 363px) 85vw, 363px\" \/><\/p>\n<p><strong>\u00a0<\/strong>\u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 \u00a0 Photo credits: ENISA website<\/p>\n<p><strong>The Emergence of AMLA <\/strong><\/p>\n<p>The evolution of the EU&#8217;s anti-money laundering framework has seen <a href=\"https:\/\/www.linkedin.com\/pulse\/evolution-impact-eus-sixth-anti-money-laundering-amld6-calleja-i6h8f\/\">notable advancements<\/a>, starting from the initial anti-money laundering Directive (<a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/HTML\/?uri=CELEX:31991L0308\">AMLD1<\/a>) in 1990 to the latest updates with <a href=\"http:\/\/data.europa.eu\/eli\/dir\/2024\/1640\/oj\">AMLD6<\/a>, Anti-Money Laundering Regulation (<a href=\"http:\/\/data.europa.eu\/eli\/reg\/2024\/1624\/oj\">AMLR<\/a>), and Anti-Money Laundering Authority Regulation (<a href=\"http:\/\/data.europa.eu\/eli\/reg\/2024\/1620\/oj\">AMLAR<\/a>). This development signifies an expanding regulatory focus that originally targeted drug trafficking in the 1990s, <a href=\"https:\/\/amlwatcher.com\/blog\/3-decade-journey-of-anti-money-laundering-aml-directives-1991-to-2024\/\">evolving<\/a> into a robust framework that addresses <a href=\"https:\/\/finance.ec.europa.eu\/document\/download\/7d2bd4bf-5e66-46f0-9622-7d6b193af5e5_en?filename=240424-anti-money-laundering-countering-financing-terrorism-factsheet_en.pdf\">intricate financial crimes<\/a> like cyber-enabled money laundering. A significant shift occurred with <a href=\"http:\/\/data.europa.eu\/eli\/dir\/2005\/60\/oj\">AMLD3<\/a>, which embraced <a href=\"https:\/\/core.ac.uk\/download\/pdf\/77041265.pdf\">risk-based approaches for customer due diligence<\/a> (CDD). The enactment of <a href=\"http:\/\/data.europa.eu\/eli\/dir\/2015\/849\/oj\">AMLD4<\/a> improved transparency by creating mandatory central registers for beneficial ownership information, a refinement further augmented by <a href=\"http:\/\/data.europa.eu\/eli\/dir\/2018\/843\/oj\">AMLD5<\/a> (2018), which required <a href=\"https:\/\/www.ecri.eu\/sites\/default\/files\/tfr_anti-money_laundering_in_the_eu.pdf\">public accessibility<\/a>. The recent introductions of AMLR, AMLAR, and AMLD6 establish centralised oversight while adapting to technological advancements by creating <a href=\"https:\/\/finance.ec.europa.eu\/financial-crime\/anti-money-laundering-and-countering-financing-terrorism-overview_en\">a unified supervisory body across the EU<\/a>, effectively standardising anti-money laundering initiatives among member states and <a href=\"https:\/\/finance.ec.europa.eu\/financial-crime\/anti-money-laundering-and-countering-financing-terrorism-eu-level_en\">confronting new technological hurdles<\/a>. This evolution exemplifies direct enforcement and is a new form of <a href=\"https:\/\/www.tandfonline.com\/doi\/epdf\/10.1080\/13501763.2017.1314538?needAccess=true\">functional spillover<\/a> that arises from internal pressure and functional necessity, rather than from external crises. This indicates that achieving the established policy goals necessitates the expansion and uniform application of EU law. Below, we delve into why and how direct enforcement is essential for ENISA to attain a high common level of cybersecurity throughout the EU.<\/p>\n<p><strong>Why should ENISA follow the same trajectory as AMLA? <\/strong><\/p>\n<p>The <a href=\"https:\/\/www.csis.org\/programs\/strategic-technologies-program\/significant-cyber-incidents\">increasing frequency<\/a> and sophistication of <a href=\"https:\/\/www.consilium.europa.eu\/en\/policies\/top-cyber-threats\/\">cyber threats<\/a> pose significant risks to economic activities, public services, and citizens&#8217; privacy. In recent years, the EU has implemented several legislation addressing cybersecurity, such as <a href=\"https:\/\/eur-lex.europa.eu\/eli\/reg\/2019\/881\/oj\">the Cybersecurity Act<\/a>, <a href=\"https:\/\/eur-lex.europa.eu\/eli\/dir\/2022\/2555\">NIS 2 Directive<\/a>, <a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX%3A32024R2847\">Cyber Resilience Act<\/a>, and <a href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/policies\/cyber-solidarity\">Cyber Solidarity Act<\/a>.<\/p>\n<p>These legislations have <a href=\"https:\/\/www.digitaleurope.org\/resources\/adapting-enisas-mandate-and-collaboration-in-a-changing-cyber-landscape\/\">expanded ENISA\u2019s capacities<\/a>, but they are insufficient for the EU\u2019s ambition to enhance cybersecurity across the Union, as the success of EU cybersecurity policies relies on implementation by Member States. For example, <a href=\"https:\/\/digital-strategy.ec.europa.eu\/en\/news\/commission-calls-23-member-states-fully-transpose-nis2-directive\">the NIS 2 Directive has so far been transposed by only four Member States, prompting the European Commission to open infringement proceedings against 23 Member States<\/a>. This presents a real risk of fragmentation across the EU, which hinders effective cybersecurity. From a <a href=\"https:\/\/onlinelibrary.wiley.com\/doi\/10.1111\/jcms.12508\">functional spillover<\/a> perspective, the increasing cybersecurity threats and divergent approaches among Member States suggest that ENISA\u2019s role may need to evolve beyond its original advisory and coordinative function towards enforcement powers.<\/p>\n<p>The situation facing ENISA mirrors AMLA\u2019s earlier context &#8211; both agencies emerged in response to fragmented national practices and cross-border threats that require unified, robust responses. However, while <a href=\"https:\/\/link-springer-com.utrechtuniversity.idm.oclc.org\/article\/10.1007\/s12027-024-00805-9\">AMLA was granted limited enforcement powers due to the ineffectiveness of the previous decentralised approach and the lack of cooperation among national AML\/CFT supervisors<\/a>, ENISA remains confined to coordination and advisory functions. To some extent, one could argue that ENISA\u2019s case resembles AMLA, and granting ENISA enforcement powers would ensure compliance with EU cybersecurity standards and achieve a high common level of cybersecurity across the Union.<\/p>\n<p>However, this might be an impossible mission or one that lies in the fairly distant future\u2026 Direct enforcement for the wandering ENISA faces a steep climb, blocked by the EU\u2019s limited competences in security matters, an area still fiercely guarded by the Member States.<\/p>\n<p><strong>How this trajectory can be beneficial<\/strong><\/p>\n<p>As referred to above, the sole competence of Member States in matters of public and national security (recognised under Article 4(2) TEU) currently limits ENISA\u2019s ability to gain direct enforcement powers; there is, however, precedent for derogation from the national security exemption, as can be observed in the <a href=\"https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/PDF\/?uri=CELEX:62017CJ0623\">Privacy International case (paragraph 44)<\/a> in relation to the e-privacy Directive.<\/p>\n<p>For now though, we must not jump ahead but instead envisage some preliminary steps that may take ENISA some distance down AMLA\u2019s beaten path. A prerequisite of any centralisation is an unequivocal delineation of the agency\u2019s role in a crowded regulatory environment. The elaboration of the EU cybersecurity landscape in recent years has led to a <a href=\"https:\/\/www.interface-eu.org\/publications\/enisa-fit-for-purpose\">blurring of the lines between the competences of the entities involved<\/a>, particularly with the emergence of <a href=\"https:\/\/ec.europa.eu\/commission\/presscorner\/detail\/%20en\/qanda_22_6643\">several networks and centres at the EU level aiming to prepare for, respond to, or analyse cybersecurity threats and incidents<\/a>. Although the notion of collaboration seems to be favoured in EU cybersecurity policy, the lack of exclusive specialisation on ENISA\u2019s part would undermine any future enforcement remit for the agency. Thus, policymakers should pinpoint the tasks and responsibilities the execution of which would allow ENISA to contribute most optimally to the improvement of EU cybersecurity. This prioritisation of tasks would enable ENISA to enhance its operational efficiency, and ultimately its reputation, potentially paving the way for a transition to a more substantively empowered role.<\/p>\n<p>\u00a0<\/p>\n<table width=\"635\">\n<tbody>\n<tr>\n<td width=\"141\">\n<p>\u00a0<\/p>\n<\/td>\n<td width=\"246\">\n<p><strong>ENISA<\/strong><\/p>\n<\/td>\n<td width=\"248\">\n<p><strong>AMLA<\/strong><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"141\">\n<p><strong>Legal basis<\/strong><\/p>\n<\/td>\n<td width=\"246\">\n<p>Cybersecurity Act (2019) &amp; NIS2 Directive<\/p>\n<\/td>\n<td width=\"248\">\n<p>AML\/CFT Regulation (2024) &amp; AMLD6<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"141\">\n<p><strong>Enforcement powers <\/strong><\/p>\n<\/td>\n<td width=\"246\">\n<p>No direct enforcement (supports national authorities)<\/p>\n<\/td>\n<td width=\"248\">\n<p>Direct enforcement<\/p>\n<p>(40+ high-risk financial entities (crypto, cross-border institutions))<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"141\">\n<p><strong>Sector focus<\/strong><\/p>\n<\/td>\n<td width=\"246\">\n<p>All critical sectors (energy, health, transport, digital infra)<\/p>\n<\/td>\n<td width=\"248\">\n<p>Financial sector priority, limited non-financial oversight<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"141\">\n<p><strong>Enforcement tools<\/strong><\/p>\n<\/td>\n<td width=\"246\">\n<p>Technical enforcement i.e., cybersecurity certification, Vulnerability reporting; Operational Tools i.e., Cyber Exercise Platform for crisis simulations, CSIRT Network coordination; Compliance Leverage i.e., National strategy evaluation toolkit Biennial risk trend reports to EU institutions<\/p>\n<\/td>\n<td width=\"248\">\n<p>Corrective measures i.e., operations restrictions, government structures; Financial sanction i.e., fines; Investigative powers.<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"141\">\n<p><strong>Dispute resolution <\/strong><\/p>\n<\/td>\n<td width=\"246\">\n<p>Non-binding recommendations through Cooperation Group<\/p>\n<\/td>\n<td width=\"248\">\n<p>Binding arbitration in cross-border supervisory conflicts<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u00a0<\/p>\n\n\n<!-- AddThis Advanced Settings generic via filter on the_content --><!-- AddThis Share Buttons generic via filter on the_content -->","protected":false},"excerpt":{"rendered":"<p>By Arailym, Patrick and Sondra The road to what might be called regulatory maturity is often a long one. In EU cybersecurity regulation, a culture of vertical and horizontal collaboration is optimistic but seemingly ineffective. It likely leaves the European Union Agency for Cybersecurity (ENISA) feeling somewhat envious of the centralised enforcement powers recently vested &hellip; <a href=\"https:\/\/eulawenforcement.com\/?p=9203\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Following in AMLA\u2019s footsteps: is direct enforcement the way to go for wandering ENISA?&#8221;<\/span><\/a><!-- AddThis Advanced Settings generic via filter on get_the_excerpt --><!-- AddThis Share Buttons generic via filter on get_the_excerpt --><\/p>\n","protected":false},"author":94,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-9203","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/eulawenforcement.com\/index.php?rest_route=\/wp\/v2\/posts\/9203","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eulawenforcement.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eulawenforcement.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eulawenforcement.com\/index.php?rest_route=\/wp\/v2\/users\/94"}],"replies":[{"embeddable":true,"href":"https:\/\/eulawenforcement.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=9203"}],"version-history":[{"count":3,"href":"https:\/\/eulawenforcement.com\/index.php?rest_route=\/wp\/v2\/posts\/9203\/revisions"}],"predecessor-version":[{"id":9345,"href":"https:\/\/eulawenforcement.com\/index.php?rest_route=\/wp\/v2\/posts\/9203\/revisions\/9345"}],"wp:attachment":[{"href":"https:\/\/eulawenforcement.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=9203"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eulawenforcement.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=9203"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eulawenforcement.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=9203"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}