This is an HTML version of an attachment to the Freedom of Information request 'EU response to cyber operations'.


 
  
 
 
 

Council of the 
 
 

 European Union 
   
 
Brussels, 8 June 2023 
(OR. en) 
    10289/23 
 
 
 
 
LIMITE 

 
CYBER 142 

COPS 297 
POLMIL 137 
 
 
RELEX 693 
JAIEX 30 
TELECOM 191 
CFSP/PESC 819 
 
NOTE 
From: 
General Secretariat of the Council 
To: 
Delegations 
Subject: 
Revised Implementing Guidelines of the Cyber Diplomacy Toolbox 
 
 
Delegations will find attached the Revised Implementing Guidelines of the Cyber Diplomacy 
Toolbox. 
 
10289/23  
 
FM/es 

 
JAI.2 
LIMITE 
EN 
 

 
ANNEX 
REV IMPLEMENTING GUIDELINES OF THE CYBER DIPLOMACY TOOLBOX 
1. 
INTRODUCTION 
1. 
In 2017, the EU adopted the Framework for a Joint EU Diplomatic Response to Malicious 
Cyber Activities (‘Cyber Diplomacy Toolbox’)1 to increase the EU's ability to prevent, 
discourage, deter and respond to malicious cyber activities. With the adoption and 
implementation of the Cyber Diplomacy Toolbox, the EU took an important step towards a 
more secure and stable cyber domain, providing an answer to the increased willingness and 
ability of state and non-state actors to pursue their strategic objectives through malicious 
cyber activities. In the last few years, however, and particularly since Russia’s unjustified and 
unprovoked war of aggression against Ukraine, the EU and its Member States have seen a 
significant corrosion of international security, including in cyberspace. Malicious cyber 
activities against critical infrastructure, including through the use of ransomware and wipers, 
as well as targeting of supply chains and cyber-espionage, including intellectual property theft 
activities or similar types of cyber-espionage, are increasingly more sophisticated, with 
disruptive and destructive effects posing a systemic threat to the EU’s security, economy, 
democracy and society at large. Such activities can also be used to conduct or enable foreign 
information manipulation and interference (FIMI). 
                                                 
1 
13007/17 – Implementing guidelines for the Framework on a Joint EU Diplomatic Response 
to Malicious Cyber Activities 
 
10289/23  
 
FM/es 

ANNEX 
JAI.2 
LIMITE 
EN 
 

 
2. 
The increase of malicious cyber activities over recent years has provided lessons for the EU, 
its Member States and their partners on how to enhance cyber resilience, as well as on how to 
design and implement an appropriate response, including through the use of diplomatic 
measures. With the unstable cyber threat landscape, the EU and its Member States need to 
step up their ability to strengthen situational awareness, prevent, discourage, deter and 
respond to malicious cyber activities, ensure solidarity and mutual assistance and enforce the 
United Nations framework for responsible state behaviour in cyberspace endorsed by 
consensus by the United Nations General Assembly, grounded in the application of 
international law in cyberspace. 
3. 
At the same time, cyber diplomacy and cyber issues have gained momentum and importance 
as a component of EU Common Foreign and Security Policy (CFSP). With the pervasiveness 
and fast pace of digitalization and the magnitude of cyber challenges and of the threat 
landscape, cyber diplomacy needs to be strengthened and could be further complemented by 
making use of other policies and activities in order to effectively contribute and promote the 
European vision of a global, open, free, stable and secure cyberspace, grounded in the rule of 
law. Strengthening global partnerships as well as pro-active, preventive and constructive 
diplomatic action is increasingly needed. In this context, a more sustained, tailored, coherent 
and coordinated EU approach is necessary to advance a comprehensive and effective EU 
action against malicious cyber activities, large-scale cybersecurity incidents and an 
accumulation of those activities, as well as to persistent cyber threat actors that conduct, 
support or condone malicious cyber activities targeting the EU, its Member States and their 
partners. 
 
10289/23  
 
FM/es 

ANNEX 
JAI.2 
LIMITE 
EN 
 

 
4. 
Building on the main principles of the framework as set out in the 2017 Council conclusions 
on the Cyber Diplomacy Toolbox2, the Council conclusions on the EU Cyber Posture of 
20223, and the lessons learned from diplomatic responses and cyber exercises undertaken 
since 2017, this document responds to the need to further strengthen the EU Cyber Diplomacy 
Toolbox as expressed in the 2021 Council conclusions on the EU Cybersecurity Strategy4, the 
2022 Strategic Compass5, the 2022 Council conclusions on the EU Cyber Posture and the 
2023 Council Conclusions on the Joint Communication on the EU Policy on Cyber Defence6
The document also relates to the 2022 Council conclusions on EU Digital Diplomacy7
specifically taking into account that the EU external policies on digital and cyber need to be 
coherent and mutually reinforcing. This document outlines the revised implementing 
guidelines to further enhance situational awareness, ensure a strategic approach to persistent 
cyber threat actors, provides additional response measures8, and further enables timely 
decision-making and stronger cooperation with partners. In addition, it includes guidance for 
the attribution of malicious cyber activities, strategic communications, as well as linkages to 
other EU toolboxes and crisis management mechanisms and activities, while preserving 
Member States competences on the matter. 
                                                 
2 
9916/17 – Council Conclusions on a Framework for a Joint EU Diplomatic Response to 
Malicious Cyber Activities ("Cyber Diplomacy Toolbox") 
3 
9364/22 – Council conclusions on the development of the European Union's cyber posture 
4 
JOIN/2020/18 final – Joint Communication to the European Parliament and the Council: 
The EU's Cybersecurity Strategy for the Digital Decade 
5 
7371/22 – A Strategic Compass for Security and Defence - For a European Union that 
protects its citizens, values and interests and contributes to international peace and security 
6 
9618/23 – Council Conclusions on the EU Policy on Cyber Defence 
7 
11406/22 – Council Conclusions on EU Digital Diplomacy 
8 
Listed in a separate annex. 
 
10289/23  
 
FM/es 

ANNEX 
JAI.2 
LIMITE 
EN 
 

 
2. 
FRAMEWORK FOR AN EU DIPLOMATIC RESPONSE AGAINST MALICIOUS 
CYBER ACTIVITIES 
5. 
Core to the EU Cyber Posture are the following five main components: its cyber resilience 
and capacities to prevent and protect against malicious cyber activities; its solidarity and 
comprehensive crisis management capabilities; its vision of a global, open, free, stable and 
secure cyberspace, with international law, the rules-based order and with the UN framework 
for responsible state behaviour in cyberspace at its centre; its strong global partnerships, 
including through capacity building efforts in third countries; and its ability to prevent, 
discourage, deter and respond to threat actors seeking to deny or disrupt our secure and open 
access to cyberspace as well as critical functions, and affect the EU’s strategic interests, 
including the security of its partners. 
6. 
In line with this posture, the Cyber Diplomacy Toolbox is part of the EU’s full spectrum 
approach to resilience, response, conflict prevention, cooperation and stability in cyberspace. 
It should be seen as complementary to existing and continuous cyber diplomacy engagement 
to advance conflict prevention, cooperation and stability in cyberspace, including substantive 
EU capacity building support to third countries. In addition it complements the EU effort to 
enhance cyber resilience, prevent and tackle cybercrime as well as adds value to the 
development of the wider EU cyber cooperation, solidarity and crisis management eco-
system. 
 
10289/23  
 
FM/es 

ANNEX 
JAI.2 
LIMITE 
EN 
 

 
7. 
The joint EU diplomatic response builds on the UN framework for responsible state behaviour 
in cyberspace grounded in the reports of the UN Groups of Governmental Experts (UNGGE) 
on Developments in the Field of Information and Telecommunications in the Context of 
International Security and Open-Ended Working Group (OEWG) on security of and in the use 
of information and communications technologies, which concluded that existing international 
law is applicable to the use of cyber operations, and outlines eleven voluntary, non-binding 
norms of responsible State behaviour in cyberspace. Through the use of diplomatic measures, 
the EU actively supports the global application of the UN framework of responsible state 
behaviour, contributes to its enforcement, and enhances transparency and predictability as 
regards states’ conduct in cyberspace. The use of confidence-building measures (CBMs) at 
regional and international level, notably in those of the Organization for Security and Co-
operation in Europe (OSCE), could further reduce the risk of a potential conflict and 
misunderstanding between States as to their conduct in cyberspace. 
8. 
The measures in the Cyber Diplomacy Toolbox could be used in tandem with other Union 
measures such as those reflected in the Network and Information Security Directive9, the 
Directive on Attacks against Information Systems10, as well as measures by EUIBAs, 
including by the EU Cybersecurity Agency (ENISA) and the Computer Emergency Response 
Team for the EU institutions, bodies and agencies (CERT-EU), and EU networks, in line with 
their legal mandates and institutional autonomy, to prevent, discourage, deter and respond to 
and immediately recover from malicious cyber activities which may originate from a state or 
non-state actor or transit through a States’ territory. The measures could inter alia be used to 
encourage a State to ensure that its territory is not used for malicious cyber activities, or to 
induce a State to refrain from, or cease activities that are undertaken under its direction or its 
control. 
                                                 
9 
L 333/80 – Directive (EU) 2022/2555 of the European parliament and of the Council of 14 
December 2022 on measures for a high common level of cybersecurity across the Union, 
amending Regulation (EU) No 910/2014 and Directive (EU) 2018/1972, and repealing 
Directive (EU) 2016/1148 (NIS 2 Directive) 10 L 218/8 –  Directive 2013/40/EU of the 
European parliament and of the Council of 12 August 2013 on attacks against information 
systems and replacing Council Framework Decision 2005/222/JHA 
 
10289/23  
 
FM/es 

ANNEX 
JAI.2 
LIMITE 
EN 
 

 
9. 
The EU approach will vary in accordance with a situation of peacetime, crisis or armed 
conflict. The Cyber Diplomacy Toolbox could be used as a response to malicious cyber 
activities that do not rise to the level of internationally wrongful acts but are considered as 
unfriendly acts. In addition, the Cyber Diplomacy Toolbox can be used to support further EU 
or Member States’ action in response to internationally wrongful acts directly or indirectly 
affecting EU interests including armed attacks involving a cyber-component. To this end, 
consistent with the relevant international law and without prejudice to the specific character of 
the security and defence policy of Member States, it could also be used in the context of the 
application of Article 42(7) of the Treaty of the European Union (TEU)10, when invoked by a 
Member State or, in case of a Member States being a victim of a man-made disaster, via 
Article 222 of the Treaty on the Functioning of the European Union (TFEU)11. It can also 
support the wider compliance with existing international law, including the UN Charter, and 
specifically its Article 2(4) (prohibition of the use of force), Article 33 (peaceful settlement of 
disputes) and Article 51 (inherent right to act in individual or collective self-defence in 
response to an armed attack). 
10.  The Cyber Diplomacy Toolbox allows diplomatic measures to be used in a single response to 
an immediate cyber threat or activity, or as part of a sustained, tailored, coherent and 
coordinated strategy towards a particular actor. The EU Cyber Diplomacy Toolbox offers 
options for consideration. It does not preclude other actions by EUIBAs, in particular law 
enforcement or judicial action, nor any action of individual Member States or those 
coordinated between Member States and should strive for alignment. 
                                                 
10 
C 326/39 – Consolidated version of the treaty on European Union 
11 
C 326/49 – consolidated version of the treaty on the functioning of the European Union 
 
10289/23  
 
FM/es 

ANNEX 
JAI.2 
LIMITE 
EN 
 

 
11.  Enhanced understanding of the application of international law and the norms of responsible 
state behaviour in cyberspace, and the ongoing conduct of risk assessments and building risk 
scenarios could help foster a common, coherent and consistent understand of the situations in 
which the Cyber Diplomacy Toolbox might apply. Elements that could determine whether a 
cyber-attack or a series of malicious cyber activities have a significant effect as set out in 
Article 3 of the horizontal cyber sanctions regime12 could support the considerations in this 
context. 
12.  States have a due diligence obligation under international law to not knowingly allow their 
territory to be used for acts contrary to the rights of other States and may also call on other 
States to cooperate in managing cyber incidents, in accordance with the UN framework for 
responsible state behaviour in cyberspace. In addition, agreed norms of responsible State 
behaviour affirm, inter alia, that states should not knowingly allow their territory to be used 
for internationally wrongful acts using ICTs, and should respond to appropriate requests for 
assistance by another State. The EU and its Member States can request States to take 
appropriate measures to prevent or address cyber incidents that originate from their territory, 
bearing in mind that the indication that a cyber-attack emanates from the territory or the 
infrastructure of a State does not, of itself, imply responsibility of that State for the incident, 
or that notifying a State that its territory is being used for a wrongful act does not, of itself, 
imply that it is responsible for the act itself. 
                                                 
12 
2019/797 Council Decision (CFSP) concerning restrictive measures against cyber-attacks 
threatening the Union or its Member States 
 
10289/23  
 
FM/es 

ANNEX 
JAI.2 
LIMITE 
EN 
 

 
3. 
EU APPROACH AND MEASURES 
13.  In line with the 2017 Council conclusions on the Framework for a Joint EU Diplomatic 
Response to Malicious Cyber Activities ("Cyber Diplomacy Toolbox"), and its use since then, 
the measures within the framework should continue to be based on the following six 
principles: protect the integrity and security of the EU, its Member States and their citizens; 
take into account the broader context of the EU’s external relations with the State concerned; 
provide for the attainment of the CFSP objectives as set out in the Treaty on the European 
Union and respect the respective procedures for their attainment; be based on a shared 
situational awareness among Member States and correspond to the needs of the concrete 
situation at hand; be proportionate to the scope, scale, duration, intensity, complexity, 
sophistication and impact of the malicious cyber activity; comply with applicable 
international law and respect human rights and fundamental freedoms. 
 
10289/23  
 
FM/es 

ANNEX 
JAI.2 
LIMITE 
EN 
 

 
14.  In line with the above principles, the full spectrum of measures can be used through EU 
diplomatic engagement, with a view to prevent, discourage, deter or respond to cyber threat 
actors and malicious cyber activities. The measures part of the Cyber Diplomacy Toolbox 
presented are forms of diplomatic, political, legal, strategic communication, technical, 
operational or economic actions, focussing on the delivery of a preventive, stabilising, 
cooperative, normative, restrictive, supportive or mitigative effect. To strengthen the joint EU 
diplomatic response to malicious cyber activities, the EU has identified additional measures, 
including building further global partnerships in view of diplomatic responses, raising 
awareness, notably making use of the publication of advisories, coordinated action to counter 
malicious foreign intelligence activities, suspension or cancellation of engagements or 
dialogues, as well as exploring the possibility to use sectoral sanctions and exploring the 
possibility to amend or extend the EU cyber sanctions regime. These additional measures may 
be deployed alongside targeted cyber capacity building in third countries, training and 
exercise activities, rapid response and mutual assistance actions. The decision-making on the 
measures should, where relevant and possible, take into account ongoing law enforcement 
actions against cybercrime, notably those addressing ransomware. Member States and the EU 
can implement measures individually or jointly, in coordination or in parallel, and where 
appropriate in cooperation with international partners. 
 
10289/23  
 
FM/es 
10 
ANNEX 
JAI.2 
LIMITE 
EN 
 

 
15.  Reflecting on the use and exercises of the Cyber Diplomacy Toolbox since 2017, the incident-
based approach is complemented with the development of sustained, tailored, coherent and 
coordinated strategies towards persistent cyber threat actors, to ensure a more strategic, 
gradual and long-term approach. Supported by the High Representative in coordination with 
Commission services and relevant agencies and bodies and relevant EU networks, the Council 
will formulate such strategies and monitor their implementation, in the form of strategic 
response notes, for the main cyber threat actors. The strategic response notes should be based 
on risk assessments and risk scenarios, and anchored in relevant geographic strategies and 
developed in coordination with the corresponding working parties, as appropriate. The 
strategies should capture the short-term effect of a measure, as well as its longer term effect 
related to objectives formulated in such strategies. They would also allow the challenges of 
continued lower level threats and activities stemming from persistent cyber threat actors to be 
addressed. Notably, it should allow the threat actor’s perspective and aims to be better taken 
into account, noting that individual characteristics and interrelations between the EU and the 
cyber threat actor play a role in the effectiveness of measures. Risk assessments should 
support the development of such strategies and support the monitoring of their impact. 
16.  Essential to the design of such strategies is the need for a gradual use of diplomatic measures 
corresponding to the pattern of continuous malicious cyber activities, while promoting 
conflict prevention, cooperation and stability in cyberspace. In this regard, awareness raising, 
dialogue, demarches or CBMs should be considered as a preferred option of engagement with 
a state, in particular in the case of a State’s territory used for malicious cyber activities. 
 
10289/23  
 
FM/es 
11 
ANNEX 
JAI.2 
LIMITE 
EN 
 

 
4. 
SHARED SITUATIONAL AWARENESS 
17.  Before any joint EU response can be considered, timely and continuous sharing of detailed 
information will be of key importance. Through regular briefings and information exchange, a 
baseline understanding and shared awareness of the cyber threat landscape will serve as the 
basis for assessments following a malicious cyber activity or cyber incident. The Horizontal 
Working Party on Cyber Issues (HWPCI) plays a central role in evaluating the situational 
awareness provided in view of a joint EU diplomatic response. However, when relevant, 
threat assessments and briefings can be discussed in other relevant Council formats and EU 
networks in view of other possible and appropriate EU action; in such cases, HWPCI needs to 
be informed. 
18.  Shared situational awareness among Member States has the purpose of enabling the EU and 
Member States to take a collective decision whether or not to use one or several measures as 
part of the Cyber Diplomacy Toolbox, including those in support of partners. Member States 
are not obliged to provide information or analysis. However, Member States are encouraged 
to strengthen information sharing, including cyber forensic and technical information through 
the appropriate channels, as the comprehensive and shared situational awareness is the 
foundation of an effective EU response. Contributions by Member States to the Single 
Intelligence Analysis Capacity (SIAC) as well as other relevant EUIBAs can support the EU’s 
shared situational awareness and swift, informed and effective decision-making. 
19.  Ongoing and regular exchanges on the cyber threat landscape and thematic briefings in the 
HWPCI will enable Member States and the EU to develop and maintain a shared 
understanding on malicious cyber activities and how these affect the Member States and the 
EU. Such assessments and briefings should be provided by the SIAC, the central entity 
providing situational awareness and playing the leading role in analysing all-source 
information and providing intelligence assessments on cyber threats, with the support of other 
relevant EUIBAs with responsibilities for situational awareness and/or crisis response, such as 
the Commission, ENISA, CERT-EU, Europol, and possible future actors. 
 
10289/23  
 
FM/es 
12 
ANNEX 
JAI.2 
LIMITE 
EN 
 

 
20.  Where appropriate, such knowledge can be complemented by the European Cyber Crisis 
Liaison Organisation Network (EU-CyCLONe) providing information on the severity of the 
malicious activities conducted. Such assessments and briefings should always take place in 
respect of each stakeholder’s mandate. Information sharing should be further developed with 
trusted international partners and international organisations. To this end, partners may be 
invited to the relevant Council format or EU network if it would support enhanced situational 
awareness within the EU. 
21.  Additional operational, law enforcement, judicial, diplomatic or defence channels might also 
be used to further exchange information between Member States, or request more information 
from third countries or other relevant bodies such as international partners and international 
organisations. Where appropriate, cooperation with the private sector or other external 
stakeholders could further enhance the EU’s understanding of the threat landscape and in this 
way support EU diplomatic action to respond to malicious cyber activities. In this regard, 
appropriate attention should be given to the classification of information and the interests of 
all parties involved. Furthermore, regular exchanges with thematic and geographical working 
parties should enhance the understanding as regards the broader geopolitical situation and the 
EU’s international relations, further informing the decision-making process under the Cyber 
Diplomacy Toolbox, in particular related to the strategic response notes. 
 
10289/23  
 
FM/es 
13 
ANNEX 
JAI.2 
LIMITE 
EN 
 

 
5. 
IMPLEMENTATION OF THE EU CYBER DIPLOMACY TOOLBOX 
22.  Timely decision-making on a response to malicious cyber activities, taking into account 
appropriate analysis of the situation, is crucial in ensuring a cyber threat actor’s 
accountability, building on the UN framework of responsible state behaviour in cyberspace. It 
can enhance also the credibility of the EU in its diplomatic responses and avoid reputational 
damages. 
23.  In case of a crisis for which the Integrated Political Crisis Response (IPCR) arrangements13 
have been activated, following the appropriate agreed procedures and decision-making 
processes to handle a crisis at EU level, measures within the Cyber Diplomacy Toolbox could 
be part of the EU response at the political level.   
24.  In relevant situations where the IPCR has not been activated, the Council decision-making 
procedures and the EU Cybersecurity Crisis Response Framework as set out in Commission 
Recommendation (EU) 2017/158414 apply, in their respective domain of competence, taking 
into account the respective procedures for the attainment of measures as part of the Cyber 
Diplomacy Toolbox.   
In order to implement the Cyber Diplomacy Toolbox, the following step-by-step process 
applies:  
                                                 
13 
1078/13 – Integrated Political Crisis Response (IPCR) arrangements 
14 
2017/1584 – Commission recommendation (EU) on coordinated response to large-scale 
cybersecurity incidents and crises 
 
10289/23  
 
FM/es 
14 
ANNEX 
JAI.2 
LIMITE 
EN 
 

 
  
1.  Start discussions on the use of measures part of the EU Cyber Diplomacy Toolbox   
When a persistent cyber threat, a malicious cyber activity or a large-scale cybersecurity incident 
has been detected or a partner’s request for support has been made, (the) Member State(s) or 
European External Action Service (EEAS), with inputs from the Commission services when 
relevant, can inform Council on the activity, as well as express an interest in exchanging shared 
situational awareness, and exploring a joint EU diplomatic response.   
2. Exchange of shared situational awareness   
Building on the consistent level of shared situational awareness of the HWPCI on the cyber threat 
landscape, SIAC and other relevant actors could upon request provide further specific assessments 
or briefings, both orally and in writing. Timely contributions to SIAC by Member States are 
essential for strengthening shared situational awareness. Commission services and other relevant 
EUIBAs or partners can support the EU’s shared situational awareness at all levels, and enable a 
swift and effective exchange of information in view of decision-making on a diplomatic response. 
If relevant in the specific situation, the private sector can also be invited to share information.  
Where appropriate, geographical working parties should be invited to the HWPCI to enhance the 
understanding on the EU’s broader international relations, further informing the decision-making 
process under the Cyber Diplomacy Toolbox.  
3. Exploration of a possible joint EU diplomatic response  
Following the exchanges on the situational awareness provided, any Member State or EUIBAs 
may propose or request to consult the Council for a joint EU diplomatic response.  On the basis of 
this proposal or request, relevant information should continue to be exchanged to enhance the 
shared situational awareness and support the ongoing deliberations on whether any action should 
be taken.   
In view of a response to a persistent threat actor or a series of malicious cyber activities, such 
request may include a call for a ‘strategic response note’ that outlines or updates a sustained, 
tailored, coherent and coordinated strategy towards that particular threat actor or malicious activity. 
Such note should include multiple measures that could be implemented in parallel or sequential, 
 
10289/23  
 
FM/es 
15 
ANNEX 
JAI.2 
LIMITE 
EN 
 

 
and should be tailored in view of influencing the particular threat actor’s malicious behaviour. The 
proposed measures should take into account the scope, scale, duration, intensity, complexity, 
sophistication and impact of the malicious cyber activity and their individual implementation as 
part of the overall strategy is subject to agreement in the relevant Council body. The EEAS will 
coordinate with the Commission services and relevant agencies and bodies in the development of 
strategic response notes.   
In case of a swift, single joint EU diplomatic response to a malicious cyber activity, the HWPCI 
could request the EEAS, where relevant with support of the Commission services and relevant 
agencies and bodies, to outline the possible response options, where necessary by providing an 
options note. Such immediate response, without undue delay could be part of an existing sustained, 
tailored, coherent coordinated strategy to a particular persistent threat or threat actor, or could be a 
single response to a malicious cyber activity.   
4. Deliberations on a possible joint EU diplomatic response  
The HWPCI plays, under the guidance of the Political Security Committee (PSC) and COREPER, 
a central role in decision-making as regards a joint EU diplomatic response. Further coordination 
between the HWPCI and other thematic and geographical working parties and EU networks could 
take place in view of coherence with other possible and appropriate EU actions. Further 
coordination between EUIBAs could take place to identify available capabilities, ensure their 
coordinated deployment when necessary, fully linked with the wider crisis management response. 
Such coordination could also take place on strategic communication, whether made public or not.   
Depending on the timeframe and the case, deliberations may take place orally or in writing, 
including through the use of the Correspondance Européenne (COREU)/CORTESY network.  
Member States may deliberate on accompanying the diplomatic response with attribution. 
5. Decision-making on the use of EU Cyber Diplomacy Toolbox  
In situations where the IPCR has not been activated, the Council decision-making procedures 
apply, taking into account the respective procedures for the attainment of measures as part of the 
Cyber Diplomacy Toolbox. Where the use of restrictive measures is concerned, the competent 
preparatory bodies within the Council, in addition to the HWPCI, the Working Party of Foreign 
Relations Counsellors (RELEX) and relevant geographical working parties, should be involved. In 
 
10289/23  
 
FM/es 
16 
ANNEX 
JAI.2 
LIMITE 
EN 
 

 
addition, the HWPCI, within the framework of the CFSP, EEAS, and where relevant the 
appropriate Commission services, agencies and bodies, could discuss the implementation of the 
diplomatic response, including strategic communication efforts. When necessary and appropriate, 
the High Representative could use its discretionary role within the CFSP to ensure a swift response 
to a malicious cyber activity that falls within the area of this policy. Depending on the timeframe 
and case, the use of the COREU/CORTESY network as well as simplified written procedure as set 
out in Article 12.2.d of the Council Rules of Procedure where it is appropriate could support swift 
decision-making by the Council.   
6. Implementation of the Cyber Diplomacy Toolbox  
Depending on the measure(s) chosen, Member States and the EEAS, where relevant in relation to 
the chosen measure with support of the Commission services and relevant agencies and bodies, 
implement the measures following the guidance provided by the Council for their attainment.   
7. Cooperation with international partners  
Where relevant, international like-minded partners, including international organisations, may be 
involved to support the joint EU diplomatic response to malicious cyber activities or conduct 
coordinated, and where desirable joint, responses. The EU may also support, where relevant, 
international like-minded partners in their diplomatic activities. In the context of the Cyber 
Diplomacy Toolbox, the EEAS has a central role in the coordination with international partners, 
both in case of the EU requesting support, or in case a request for a joint EU diplomatic response is 
made to the EU by a partner, provided that the latter directly or indirectly affects EU interests. The 
EEAS will regularly and timely inform the HWPCI on the coordination and cooperation with 
international partners. In cases of an international partner requesting a joint EU diplomatic 
response, the relevant European Commission’s services should also be informed.  
The procedure for alignment of EU candidate and associated countries, as implemented by the 
EEAS, applies.    
8. Evaluation of the impact of the joint EU diplomatic response  
The HWPCI will continue to follow up on the implementation as well as lessons learned. It will 
regularly monitor the situation and the effect of the measures with support of the EEAS, 
Commission services and other relevant EUIBAs, in view of tailoring possible further measures. 
 
10289/23  
 
FM/es 
17 
ANNEX 
JAI.2 
LIMITE 
EN 
 

 
This process should, when relevant, feed into strategic response notes. 
9. Continued discussion to maintain a sustained engagement  
In view of a sustained approach, Member States may request to revisit the relevant steps of the 
process, should additional measures be required to respond to a cyber threat or a persistent activity.   
 
6. 
ATTRIBUTION   
25.  Attribution can be defined as a practice of assigning a malicious cyber activity to a specific 
state or non-state actor. Political attribution is a sovereign political decision of Member States 
taken on a case-by-case basis. Based on shared situational awareness and the sharing of 
detailed information, coordinated political attribution at EU level can be pursued. Technical 
attribution, the investigation and assessment based on intelligence and technical evidence, 
contributes to appropriate decision-making.   
26.  Diplomatic measures may be accompanied by attribution, however, this may not necessarily 
take place. Coordinated political attribution at EU level, or with the EU’s likeminded partners, 
when communicated to others, either privately or publicly, has the potential to strengthen the 
ability to influence the behaviour of malicious actors in cyberspace.  
27.  Not all measures require attribution, for example diplomatic measures may be involved in 
preventing or resolving a cyber-incident, expressing concerns and signalling them in another 
way.  
28.  Political attributions can inter alia be used to expose the specific malicious cyber activity or 
specific actor, enable mitigating initiatives, promote the UN framework for responsible state 
behaviour, demonstrate capability to identify its origin, discourage future malicious cyber 
activities, as well as to enable other response options to be used sequentially or in 
combination with the attribution and raise awareness about the cyber threat landscape.  
 
10289/23  
 
FM/es 
18 
ANNEX 
JAI.2 
LIMITE 
EN 
 

 
29.  When discussing the appropriateness of coordinating political attribution, and while deciding 
whether and how to communicate about coordinated attribution, either privately or publicly, it 
could be useful for the Council to consider the following:  
• 
desired effect of the political attribution  
• 
contribution to the protection of the integrity and security of the EU, its Member States 
and their citizens and businesses;  
• 
importance of showing unity within the EU and between its Member States or solidarity 
with a third party;   
• 
contribution to the advancement of responsible state behaviour, including compliance 
with international law and respect for voluntary norms;  
• 
ability to influence the behaviour of malicious actors in cyberspace;  
• 
impact on the ongoing work of services such as law enforcement or intelligence 
services;  
• 
likelihood and impact of a counter-response by any actor (risk of escalation);  
• 
consequences for existing EU external relations, at the international, regional and 
bilateral levels;  
• 
reputation and credibility of the EU (risk of the bystander effect, risk of manipulation, 
precedence of a malicious cyber activity);  
• 
predictability and coherence of joint EU responses in previous and/or future cases.   
These considerations could also be taken into account when deciding on other measures part of the 
Cyber Diplomatic Toolbox.  
 
10289/23  
 
FM/es 
19 
ANNEX 
JAI.2 
LIMITE 
EN 
 

 
7. 
STRATEGIC COMMUNICATION 
30.  In order to enhance the EU’s ability to prevent, discourage, deter and respond to malicious 
cyber activities and strengthen the EU’s cyber posture in this regard, strategic communication 
of EU action is essential, both at the EU and at Member States level. Coordination on the use 
and consistent implementation of EU instruments, products and channels could support and 
strengthen the EU’s sustained, tailored, coherent and coordinated approach. In particular, 
communication could raise awareness, promote the EU’s vision for cyberspace, or the EU 
cyber policy and legislative cyber standards, and build the EU cyber posture by 
communicating about targeted EU actions to counter malicious cyber activities. It could also 
be used to mitigate potentially destabilizing societal effects of malicious cyber activities. 
While crisis communication plays a particularly important role in mitigating the negative 
effects of cybersecurity incidents and crises, strategic communication may also be used as a 
means to influence the behaviour of partners and/or potential threat actors. Aligning these 
objectives for public communication is essential for a diplomatic response to be effective.   
31.  The inter-institutional coordination of communication efforts among EUIBAs could further 
strengthen the EU cyber posture, ensuring coherent communication across communities. The 
use of visible communication tools and products, such as videos, factsheets, international 
conferences or the use of social media, could also highlight the EU response to partners and to 
the public, enhancing the EU cyber posture as to its cyber resilience and response capacities. 
Member States are encouraged to actively participate in the conceptualisation and 
implementation of communication efforts, including by amplifying the communication by the 
EU, reinforcing the effect of a joint EU diplomatic response to malicious cyber activities.   
 
10289/23  
 
FM/es 
20 
ANNEX 
JAI.2 
LIMITE 
EN 
 

 
32.  The efforts should also focus on reaching out to a wider global audience, supporting the 
adherence to the UN framework of responsible state behaviour in cyberspace and developing 
and promoting a narrative on responsible and cooperative behaviour, as well as on 
accountability in cyberspace and the need to use diplomatic efforts and measures to achieve 
this. In this context, EU coordination on outreach within multilateral and regional fora and 
towards third countries is necessary. Regional and cultural aspects should also be taken into 
account. EU Delegations and Member States’ embassies could be involved to further amplify 
the EU communication, including by translating this into the local context.   
8. 
COHERENCE WITH EU’S DIGITAL DIPLOMACY, OTHER TOOLBOXES AND 
RELEVANT CRISIS MANAGEMENT MECHANISMS 
33.  EU external policies on digital and cyber issues, as well as countering hybrid threats, 
including FIMI, should be coherent and mutually reinforcing. Due to geopolitical dynamics, 
cyber and digital issues are increasingly intertwined at the international level. Activities 
carried out as part of the Cyber Diplomacy Toolbox need to be closely coordinated whenever 
possible with the EU’s digital diplomacy, and vice versa.  
 
10289/23  
 
FM/es 
21 
ANNEX 
JAI.2 
LIMITE 
EN 
 

 
34.  Further, the EU Cyber Diplomacy Toolbox aims to swiftly and resolutely respond to cyber 
threats and attacks and could contribute to the EU’s response to a hybrid campaign, in line 
with its own rules and procedures. While remaining an autonomous mechanism, it could be 
used in parallel or in the context of the framework for a coordinated EU response to hybrid 
campaigns (“EU Hybrid Toolbox”15), or in parallel or coherence with the Foreign Information 
Manipulation and Interference Toolbox (“FIMI Toolbox”16), noting the context, threat 
landscape, potential threat actors as well as potential victims. In a situation that could require 
or allow multiple toolboxes to be used, the EEAS, appropriate Commission services as well as 
relevant Council bodies, notably the HWPCI and the Horizontal Working Party on Enhancing 
Resilience and Countering Hybrid Threats (HWP-ERCHT), as appropriate, should coordinate 
as regards the design and implementation of measures as well as the appropriate decision-
making process. Regular exchanges on the respective strategic, sustained and tailored 
approaches to threat actors, as well as on the wider context of hybrid campaigns, malicious 
cyber activities and foreign information, manipulation and interference, including 
disinformation, threat landscape between the relevant working parties could ensure coherence, 
effective response and avoiding duplication as regards the EU’s external action.  
35.  The measures as part of the framework can be of use both in response to a large-scale cross 
border malicious cyber activity, as well as a situation of an accumulation of malicious cyber 
activities targeting the EU, its Member States or their partners. Being part of the wider EU 
crisis management eco-system, the Cyber Diplomacy Toolbox can be implemented as part of, 
or in parallel and in complementarity of crisis management mechanisms, including the EEAS 
Crisis Management Response Mechanism17, and its use of the EEAS Situation Room and the 
EU Delegations Network, IPCR, as well as the Union Civil Protection Mechanism18.   
                                                 
15 
15546/22 – Implementing guidelines for the Framework for a coordinated EU response to 
Hybrid campaigns 
16 
11429/22 – Council conclusions on Foreign Information Manipulation and Interference 
(FIMI) 
17 
https://www.eeas.europa.eu/eeas/crisis-management-and-response_en  
18  
https://civil-protection-humanitarian-aid.ec.europa.eu/what/civil-protection/eu-civil-
protection-mechanism_en  

 
10289/23  
 
FM/es 
22 
ANNEX 
JAI.2 
LIMITE 
EN 
 

 
36.  To ensure coherence between internal and external EU action, cooperation with Member 
States, notably with CSIRTs Network and EU-CyCLONe, aiming to be the link between the 
technical and political levels, and between the EEAS, including SIAC, the Commission 
services, ENISA, CERT-EU and Europol, is essential.   
37.  In case of the activation of the IPCR mechanism, the 2017 Blueprint on the EU coordinated 
response to large-scale cybersecurity incidents and crises19 addresses the role of all relevant 
actors, outlining the functioning of the EU cyber crisis management eco-system. In such 
situation, the HWPCI and other relevant decision-making bodies could consider using 
measures as part of the EU Cyber Diplomacy Toolbox as part of the Union response. The 
IPCR is also used to coordinate the response to the invocation of the solidarity clause (Article 
222 of the TFEU) to ensure the coherence and complementarity of Union and Member State 
action20.  
                                                 
19  
2017/1584 – Commission Recommendation (EU) on coordinated response to large-scale 
cybersecurity incidents and crises 
20  
OJ L192/53 – Council Decision on the arrangements for the implementation by the Union of 
the solidarity clause 
 
10289/23  
 
FM/es 
23 
ANNEX 
JAI.2 
LIMITE 
EN 
 

 
9. 
COOPERATION WITH PARTNERS, INCLUDING INTERNATIONAL 
ORGANISATIONS, THIRD COUNTRIES AND PRIVATE SECTOR  
38.  Cooperation with international partners can amplify coordinated responses and enhance the 
ability to influence the behaviour of malicious actors in cyberspace. Such cooperation 
provides the opportunity to strengthen the international rules-based order and hold threat 
actors accountable for their behaviour in cyberspace. Building on the lessons learned from 
cooperative efforts to date, shared situational awareness on the overall cyber threat landscape 
between the EU and its partners can help setting a baseline understanding and supports the 
development of a coordinated sustained, coherent and tailored approach to different threat 
actors, or a joint or coordinated single responses in case of a concrete request. Such requests 
should be dealt with on a case by case basis. Information in view of a potential coordinated 
response has to be shared in a timely manner, through the appropriate channels, proportionate 
to the request, allowing for sufficient decision-making time. Appropriate attention should be 
given to the origin and classification of information, intelligence and the overall assessment. 
In addition, continuous exchanges on each other’s objectives, criteria, tools and procedures, 
including as regards attribution, would facilitate the cooperation.   
 
10289/23  
 
FM/es 
24 
ANNEX 
JAI.2 
LIMITE 
EN 
 

 
39.  Coordination on cyber issues is a key area of EU-NATO cooperation that should be further 
strengthened in line with the Joint Declarations on EU-NATO cooperation21. Such 
cooperation and coordination is important notably through the exchange of information at 
technical level and in cases of large-scale cyber-attacks and in the development of sustained, 
tailored, coherent and coordinated responses to persistent cyber threat actors. While ensuring 
coherence and complementarity of efforts, to avoid unnecessary duplications, as well as the 
decision-making autonomy of both organizations, in full respect of the agreed principles of 
inclusiveness, reciprocity, mutual openness and transparency, the EU and NATO could in 
particular further strengthen cooperation on exercises, information sharing and exchanges 
between experts, including on capability development, capacity building for partners, and 
missions and operations, as well as on the applicability of international law and UN norms of 
responsible State behaviour in cyberspace, and possible coordinated responses to malicious 
cyber activities, as well as to seek potential synergies between the respective crisis 
management frameworks in the field of cybersecurity, and the protection of critical 
infrastructure.  
                                                 
21  
Joint Declaration on EU-NATO Cooperation, 10 January 2023 –  
https://www.consilium.europa.eu/en/press/press-releases/2023/01/10/eu-nato-joint-
declaration-10january-2023/ 
 
 
10289/23  
 
FM/es 
25 
ANNEX 
JAI.2 
LIMITE 
EN 
 

 
40.  In addition, while recognising that States bear the responsibility to ensure international peace 
and security, the private sector has a wide range of expertise, knowledge and capabilities to 
maintain cyberspace global, open, free, stable and secure. The industry has an overview of the 
most prominent vulnerabilities, threats and activities, to reinforce situational awareness. In 
addition to the work of ENISA, which is developing channels for exchanging information 
with private sector providers of managed security solutions and vendors, and complementing 
the cooperation with the Commission and other relevant EUIBAs, a regular dialogue by the 
EEAS with the private sector, involving Member States, could support the exchange on 
relevant cyber diplomacy issues, including situation awareness and information about 
persistent cyber threat actors. These exchanges could contribute to a further understanding on 
the cyber threat landscape and effective EU engagement to prevent, discourage, deter and 
respond to malicious cyber activities. Furthermore, cooperation with academia and non-
governmental institutions could also enhance the EU’s understanding of the cyber threat 
landscape, its actors and strategies and policies, which could further inform the development 
of the EU’s approach to diplomatic responses.    
10.  EXERCISES 
41.  In order to continuously test and improve the cooperation between EU, Member States as well 
as partners in view of a swift, informed and effective diplomatic response to malicious cyber 
activities, regular exercises based on the given implementing guidelines will continue to be 
organised. These exercises can test response to scenarios developed on the basis of regular EU 
risk assessments. The annual dedicated Cyber Diplomacy Toolbox exercise can continue to be 
used to test current challenges, and allow for interaction with relevant EUIBAs as well as 
international partners, including NATO. Moreover, regular exercises in the cyber domain, 
such, as EU CyCLEs, will contribute to further increasing solidarity and mutual assistance  As 
part of the wider EU’s crisis management ecosystem, the Cyber Diplomacy Toolbox will also 
continue to be part of broader exercises. 
 
 
10289/23  
 
FM/es 
26 
ANNEX 
JAI.2 
LIMITE 
EN 
 

Document Outline