{"id":44184,"date":"2023-09-21T12:19:11","date_gmt":"2023-09-21T10:19:11","guid":{"rendered":"https:\/\/vintegris.com\/blog\/national-security-scheme-ens\/"},"modified":"2025-12-10T11:08:46","modified_gmt":"2025-12-10T10:08:46","slug":"national-security-scheme-ens","status":"publish","type":"post","link":"https:\/\/vintegris.com\/en\/blog\/national-security-scheme-ens\/","title":{"rendered":"National Security Scheme, ENS"},"content":{"rendered":"<h1>National Security Scheme, ENS<\/h1>\n<p><span style=\"font-weight: 400;\">Technology has been an integral part of our daily lives for several years now. Our extensive use of it, along with the relentless evolution of disruptive technologies, poses a significant challenge to cybersecurity. This growing societal dependence on technology has increased the risks and threats associated with its use, requiring responses adapted to constantly evolving needs.  <\/span><\/p>\n<h2>Challenges and threats<\/h2>\n<p><span style=\"font-weight: 400;\">The challenges posed by technological dependence are the result of a number of interrelated factors, such as the evolution of cyber threats with the development of new techniques and tools to compromise the security of systems, networks, and data. This includes sophisticated malware, social engineering attacks, and advanced evasion techniques.<\/span> <span style=\"font-weight: 400;\">Furthermore, with the proliferation of internet-connected devices in the Internet of Things (IoT), the cloud, and virtualization, the attack surface has expanded significantly. Every connected device represents a potential entry point for cybercriminals.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The massive accumulation of data caused by the digitization of information is another vulnerability we face as a society. Protecting this data, much of which is sensitive and private, is crucial to guaranteeing people&#8217;s privacy and preventing identity theft or <em>phishing<\/em> . <\/span><\/p>\n<p><span style=\"font-weight: 400;\">In light of the increase in cyber threats, governments, both at the European and national levels, have made an effort to increase cybersecurity levels by evolving regulations and standards that guarantee data security and privacy.  <\/span><\/p>\n<p><span style=\"font-weight: 400;\">This effort has resulted in the updating of two key standards for cybersecurity in our country:<\/span> <a href=\"https:\/\/www.boe.es\/buscar\/act.php?id=BOE-A-2022-7191\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Royal Decree 311\/2022<\/span><\/a> <span style=\"font-weight: 400;\">, of May 3, which regulates the<\/span> <a href=\"https:\/\/ens.ccn.cni.es\/es\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">National Security Scheme (ENS)<\/span><\/a> <span style=\"font-weight: 400;\">and the <a href=\"https:\/\/www.iso.org\/standard\/27001\" target=\"_blank\" rel=\"noopener\">ISO 27001<\/a> standard<\/span> <span style=\"font-weight: 400;\">Information security, cybersecurity and privacy protection &amp; Information security management systems.<\/span><\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"size-full wp-image-34396 aligncenter\" src=\"https:\/\/vintegris.com\/wp-content\/uploads\/2023\/09\/young-attractive-businesswoman-working-on-laptop-i-2021-09-02-10-35-11-utc-scaled-e1695147892481.jpg\" alt=\"\" width=\"500\" height=\"333\"><\/p>\n<h2>What is the National Security Scheme (ENS)?<\/h2>\n<p><span style=\"font-weight: 400;\">The National Security Scheme (ENS) is a regulatory and reference framework,<\/span> <span style=\"font-weight: 400;\">established in Spain, based on Spanish legislation and European regulations related to information security, with the objective of creating the necessary conditions of trust in the use of electronic means, through measures to guarantee the security of systems, data, communications and electronic services, allowing citizens and public administrations to exercise their rights and fulfill their duties through these means.<\/span> <\/p>\n<p><span style=\"font-weight: 400;\">The ENS was created in 2010 with Royal Decree 3\/2010, of January 8, which establishes the principles and requirements necessary to protect the confidentiality, integrity, availability and authenticity of information in public entities and bodies.  <\/span><\/p>\n<h2>Key Changes of the new National Security Scheme (RO 311\/2022)<\/h2>\n<p><span style=\"font-weight: 400;\">In 2022, the previous decree was repealed and Royal Decree 311\/2022, of May 3, came into force. This decree includes new objectives such as: <\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">The designation of an<\/span> <span style=\"font-weight: 400;\">information security<\/span> <b>point of contact or person (POC)<\/b> designated by the service provider<\/li>\n<li><b>Supply chain protection<\/b> <span style=\"font-weight: 400;\">within<\/span> <span style=\"font-weight: 400;\">service continuity, so that the supplier guarantees service provision in case of a contingency, a measure required in the HIGH category<\/span> <\/li>\n<li><span style=\"font-weight: 400;\">The<\/span> <b>new principle of continuous monitoring<\/b> <span style=\"font-weight: 400;\">for the ongoing assessment of the security status of assets<\/span><\/li>\n<li><b>Notification of security incidents<\/b> <span style=\"font-weight: 400;\">to<\/span> <a href=\"https:\/\/www.ccn-cert.cni.es\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">CNN-CERT<\/span><\/a> <span style=\"font-weight: 400;\">and<\/span> <a href=\"https:\/\/www.incibe.es\/incibe-cert\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">INCIBE-CER<\/span><\/a><\/li>\n<li aria-level=\"1\"><b>Professionalism and training<\/b> <span style=\"font-weight: 400;\">are required of those responsible for security within an organization, in addition to existing security training and awareness programs for all users. This should guarantee adequate training for security personnel and foster a security culture within the organization. It is worth noting that both the<\/span> <a href=\"https:\/\/www.ccn.cni.es\/index.php\/es\/menu-ccn-es\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">CCN<\/span><\/a> <span style=\"font-weight: 400;\">and<\/span> <a href=\"https:\/\/www.inap.es\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">INAP<\/span><\/a> <span style=\"font-weight: 400;\">offer awareness and training programs.<\/span><\/li>\n<li aria-level=\"1\"><b>New security measures<\/b> <span style=\"font-weight: 400;\">are established<\/span> <span style=\"font-weight: 400;\">, including mandatory measures and optional or reinforcement measures.<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Cloud services<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Interconnection of systems<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Supply chain protection<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Enhanced security measures at checkpoints<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Grouping of alternative means in the control of service continuity.  <\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Surveillance<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Other devices connected to the network<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><b>The deadline for adapting to the new ENS<\/b> <span style=\"font-weight: 400;\">for public and private entities that provide services or solutions to public administrations is until<\/span> <b>May 5, 2024.<\/b><\/p>\n<h2>Find out how our solutions can improve your organization&#8217;s security<\/h2>\n<p><span style=\"font-weight: 400;\">The National Security Scheme (ENS) must be complied with in all services that the Administration provides to citizens, including services such as:  <\/span><\/p>\n<ul>\n<li><span style=\"font-weight: 400;\">  Electronic offices  <\/span><\/li>\n<li><span style=\"font-weight: 400;\">  Electronic records<\/span><\/li>\n<li><span style=\"font-weight: 400;\">  Information systems accessible electronically to citizens<\/span><\/li>\n<li><span style=\"font-weight: 400;\">  Information Systems for the exercise of rights<\/span><\/li>\n<li><span style=\"font-weight: 400;\">  Information Systems for the fulfillment of duties<\/span><\/li>\n<li><span style=\"font-weight: 400;\">  Information systems for gathering information and status of the administrative procedure<\/span><\/li>\n<\/ul>\n<h2>What benefits does the application and compliance with the ENS bring?<\/h2>\n<p><span style=\"font-weight: 400;\">By establishing a common information security framework for the public sector, as well as for suppliers that collaborate with the Administration, the ENS <b>guarantees consistency and uniformity in security management<\/b> in different entities and bodies, establishing standards.<\/span><\/p>\n<p><img decoding=\"async\" class=\"alignleft wp-image-33486\" src=\"https:\/\/vintegris.com\/wp-content\/uploads\/2023\/04\/network-security-system-perforated-paper-padlock-2022-12-16-00-12-55-utc.jpg\" alt=\"\" width=\"450\" height=\"301\"><\/p>\n<p><span style=\"font-weight: 400;\">One of its main objectives is<\/span> <b>to address the security of all assets that make up an information system with a global approach to security<\/b> <span style=\"font-weight: 400;\">: security of facilities, communications, software, system operation, users, etc.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The National Security Framework (ENS) establishes<\/span> <b>security measures and controls to help protect sensitive information,<\/b> <span style=\"font-weight: 400;\">with the obligation to comply with applicable regulations regarding the protection of personal data, financial information, and other important assets. Furthermore,<\/span> <b>it promotes the identification, assessment, and management of information security risks<\/b> <span style=\"font-weight: 400;\">, enabling public and private organizations to make informed decisions about how to effectively protect their assets.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the face of potential cyberattacks or other problems, the ENS ensures that organizations can maintain the<\/span> <b>provision of essential services even in crisis situations<\/b> <span style=\"font-weight: 400;\">, promoting business continuity.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Compliance with these standards promotes information security awareness and employee training,<\/span> <b>helping to create a security culture<\/b> <span style=\"font-weight: 400;\">. Furthermore, it<\/span> <b>builds trust in the information management practices<\/b> <span style=\"font-weight: 400;\">of public sector entities and organizations. Citizens and businesses can trust that their data will be handled securely.<\/span><\/p>\n<h2>The different levels of security contemplated in the ENS<\/h2>\n<p><span style=\"font-weight: 400;\">The National Security Scheme (ENS) in Spain defines three security categories: Basic, Medium and High. This categorization of the system will be determined by the assessment that has been made of the information and services in their different security dimensions, establishing the system category, the highest value given to a security dimension.  <\/span><\/p>\n<p><span style=\"font-weight: 400;\">The ENS itself defines in its Annex II the security measures that must be met, differentiating, as the previous royal decree already did, between organizational framework measures, operational measures and specific protection measures for each type of asset, in total,<\/span> <b>73 measures<\/b> <span style=\"font-weight: 400;\">whose application will depend on the category of the system, increasing their application from the Basic category to<\/span> <b>the High category, in which the 73 measures<\/b> <span style=\"font-weight: 400;\">established in Annex II of the standard must be applied.<\/span><\/p>\n<h3>Vintegris is certified with the ENS HIGH level by applying the 73 safety controls required by the standard<\/h3>\n<p><span style=\"font-weight: 400;\">The high level of the ENS offers greater protection and security for critical public sector information and ensures a more effective response to advanced threats.  <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Among its advantages we find:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Greater protection of sensitive information<\/b> <span style=\"font-weight: 400;\">: The high level of the ENS applies to high-class information, meaning that more rigorous protection is provided to the most critical and sensitive information in the public sector, with protective measures in place both when stored and in transit, including encryption.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Improved resilience to advanced threats<\/b> <span style=\"font-weight: 400;\">: High-level security measures are designed to deal with more sophisticated and persistent cyber threats, such as targeted or advanced attacks, requiring continuous monitoring<\/span> <\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Enhanced access control<\/b> <span style=\"font-weight: 400;\">: At the highest level, stricter access controls are implemented, limiting who can access critical information. This significantly reduces the risk of unauthorized access.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Robust continuity plan<\/b> <span style=\"font-weight: 400;\">: More detailed business continuity and disaster recovery plans are required at the high level of the ENS, ensuring the availability of critical services in crisis situations.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Greater emphasis on auditing and monitoring<\/b> <span style=\"font-weight: 400;\">: The requirement for continuous monitoring and the performance of internal audits at a high level, which helps to detect and respond quickly to potential security threats or incidents.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Greater public trust<\/b> <span style=\"font-weight: 400;\">: Compliance with the high level of the ENS demonstrates a strong commitment to information security and can increase public trust in government services and information management.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Advanced Incident Preparedness<\/b> <span style=\"font-weight: 400;\">: A more detailed and effective incident response plan is required at the high level, enabling faster and more efficient action in the event of security incidents.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Although implementing these measures involves additional effort and cost in terms of implementation and maintenance, at Vintegris we value the advantages that this level of security brings to our customers.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>National Security Scheme, ENS Technology has been an integral part of our daily lives for several years now. Our extensive use of it, along with the relentless evolution of disruptive technologies, poses a significant challenge to cybersecurity. This growing societal dependence on technology has increased the risks and threats associated with its use, requiring responses [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":45600,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[193,175],"tags":[179,211,213,180],"sectores":[],"soluciones":[],"class_list":["post-44184","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-digital-identity","tag-digital-identity","tag-eidas-2","tag-ens","tag-trust-services"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>National Security Scheme, ENS<\/title>\n<meta name=\"description\" content=\"What is the National Security Scheme (ENS)? What are the latest changes? Discover the ENS in this article.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/vintegris.com\/en\/blog\/national-security-scheme-ens\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"National Security Scheme, ENS\" \/>\n<meta property=\"og:description\" content=\"What is the National Security Scheme (ENS)? What are the latest changes? Discover the ENS in this article.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/vintegris.com\/en\/blog\/national-security-scheme-ens\/\" \/>\n<meta property=\"og:site_name\" content=\"vintegris\" \/>\n<meta property=\"article:published_time\" content=\"2023-09-21T10:19:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-10T10:08:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/vintegris.com\/wp-content\/uploads\/2023\/09\/Esquema-nacional-de-seguridad-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Vintegris\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Vintegris\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/vintegris.com\/en\/blog\/national-security-scheme-ens\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/vintegris.com\/en\/blog\/national-security-scheme-ens\/\"},\"author\":{\"name\":\"Vintegris\",\"@id\":\"https:\/\/vintegris.com\/en\/#\/schema\/person\/82bddb90af82cffd8c7a033446355339\"},\"headline\":\"National Security Scheme, ENS\",\"datePublished\":\"2023-09-21T10:19:11+00:00\",\"dateModified\":\"2025-12-10T10:08:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/vintegris.com\/en\/blog\/national-security-scheme-ens\/\"},\"wordCount\":1317,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/vintegris.com\/en\/blog\/national-security-scheme-ens\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/vintegris.com\/wp-content\/uploads\/2023\/09\/Esquema-nacional-de-seguridad-scaled.jpg\",\"keywords\":[\"Digital Identity\",\"eIDAS\",\"ENS\",\"Trust Services\"],\"articleSection\":[\"Blog\",\"Digital Identity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/vintegris.com\/en\/blog\/national-security-scheme-ens\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/vintegris.com\/en\/blog\/national-security-scheme-ens\/\",\"url\":\"https:\/\/vintegris.com\/en\/blog\/national-security-scheme-ens\/\",\"name\":\"National Security Scheme, ENS\",\"isPartOf\":{\"@id\":\"https:\/\/vintegris.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/vintegris.com\/en\/blog\/national-security-scheme-ens\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/vintegris.com\/en\/blog\/national-security-scheme-ens\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/vintegris.com\/wp-content\/uploads\/2023\/09\/Esquema-nacional-de-seguridad-scaled.jpg\",\"datePublished\":\"2023-09-21T10:19:11+00:00\",\"dateModified\":\"2025-12-10T10:08:46+00:00\",\"author\":{\"@id\":\"https:\/\/vintegris.com\/en\/#\/schema\/person\/82bddb90af82cffd8c7a033446355339\"},\"description\":\"What is the National Security Scheme (ENS)? What are the latest changes? Discover the ENS in this article.\",\"breadcrumb\":{\"@id\":\"https:\/\/vintegris.com\/en\/blog\/national-security-scheme-ens\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/vintegris.com\/en\/blog\/national-security-scheme-ens\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/vintegris.com\/en\/blog\/national-security-scheme-ens\/#primaryimage\",\"url\":\"https:\/\/vintegris.com\/wp-content\/uploads\/2023\/09\/Esquema-nacional-de-seguridad-scaled.jpg\",\"contentUrl\":\"https:\/\/vintegris.com\/wp-content\/uploads\/2023\/09\/Esquema-nacional-de-seguridad-scaled.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"Computer Security, data security protection concept. Closed padlock on modern laptop\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/vintegris.com\/en\/blog\/national-security-scheme-ens\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/vintegris.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"National Security Scheme, ENS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/vintegris.com\/en\/#website\",\"url\":\"https:\/\/vintegris.com\/en\/\",\"name\":\"vintegris\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/vintegris.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/vintegris.com\/en\/#\/schema\/person\/82bddb90af82cffd8c7a033446355339\",\"name\":\"Vintegris\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/a3a920701ec1674ec50fb937f0df475dfffbdc2ba6690734a8d198c1def6d17c?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a3a920701ec1674ec50fb937f0df475dfffbdc2ba6690734a8d198c1def6d17c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a3a920701ec1674ec50fb937f0df475dfffbdc2ba6690734a8d198c1def6d17c?s=96&d=mm&r=g\",\"caption\":\"Vintegris\"},\"url\":\"https:\/\/vintegris.com\/en\/blog\/author\/vintegris\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"National Security Scheme, ENS","description":"What is the National Security Scheme (ENS)? What are the latest changes? Discover the ENS in this article.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/vintegris.com\/en\/blog\/national-security-scheme-ens\/","og_locale":"en_US","og_type":"article","og_title":"National Security Scheme, ENS","og_description":"What is the National Security Scheme (ENS)? What are the latest changes? Discover the ENS in this article.","og_url":"https:\/\/vintegris.com\/en\/blog\/national-security-scheme-ens\/","og_site_name":"vintegris","article_published_time":"2023-09-21T10:19:11+00:00","article_modified_time":"2025-12-10T10:08:46+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/vintegris.com\/wp-content\/uploads\/2023\/09\/Esquema-nacional-de-seguridad-scaled.jpg","type":"image\/jpeg"}],"author":"Vintegris","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Vintegris","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/vintegris.com\/en\/blog\/national-security-scheme-ens\/#article","isPartOf":{"@id":"https:\/\/vintegris.com\/en\/blog\/national-security-scheme-ens\/"},"author":{"name":"Vintegris","@id":"https:\/\/vintegris.com\/en\/#\/schema\/person\/82bddb90af82cffd8c7a033446355339"},"headline":"National Security Scheme, ENS","datePublished":"2023-09-21T10:19:11+00:00","dateModified":"2025-12-10T10:08:46+00:00","mainEntityOfPage":{"@id":"https:\/\/vintegris.com\/en\/blog\/national-security-scheme-ens\/"},"wordCount":1317,"commentCount":0,"image":{"@id":"https:\/\/vintegris.com\/en\/blog\/national-security-scheme-ens\/#primaryimage"},"thumbnailUrl":"https:\/\/vintegris.com\/wp-content\/uploads\/2023\/09\/Esquema-nacional-de-seguridad-scaled.jpg","keywords":["Digital Identity","eIDAS","ENS","Trust Services"],"articleSection":["Blog","Digital Identity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/vintegris.com\/en\/blog\/national-security-scheme-ens\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/vintegris.com\/en\/blog\/national-security-scheme-ens\/","url":"https:\/\/vintegris.com\/en\/blog\/national-security-scheme-ens\/","name":"National Security Scheme, ENS","isPartOf":{"@id":"https:\/\/vintegris.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/vintegris.com\/en\/blog\/national-security-scheme-ens\/#primaryimage"},"image":{"@id":"https:\/\/vintegris.com\/en\/blog\/national-security-scheme-ens\/#primaryimage"},"thumbnailUrl":"https:\/\/vintegris.com\/wp-content\/uploads\/2023\/09\/Esquema-nacional-de-seguridad-scaled.jpg","datePublished":"2023-09-21T10:19:11+00:00","dateModified":"2025-12-10T10:08:46+00:00","author":{"@id":"https:\/\/vintegris.com\/en\/#\/schema\/person\/82bddb90af82cffd8c7a033446355339"},"description":"What is the National Security Scheme (ENS)? What are the latest changes? Discover the ENS in this article.","breadcrumb":{"@id":"https:\/\/vintegris.com\/en\/blog\/national-security-scheme-ens\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/vintegris.com\/en\/blog\/national-security-scheme-ens\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/vintegris.com\/en\/blog\/national-security-scheme-ens\/#primaryimage","url":"https:\/\/vintegris.com\/wp-content\/uploads\/2023\/09\/Esquema-nacional-de-seguridad-scaled.jpg","contentUrl":"https:\/\/vintegris.com\/wp-content\/uploads\/2023\/09\/Esquema-nacional-de-seguridad-scaled.jpg","width":2560,"height":1707,"caption":"Computer Security, data security protection concept. Closed padlock on modern laptop"},{"@type":"BreadcrumbList","@id":"https:\/\/vintegris.com\/en\/blog\/national-security-scheme-ens\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/vintegris.com\/en\/"},{"@type":"ListItem","position":2,"name":"National Security Scheme, ENS"}]},{"@type":"WebSite","@id":"https:\/\/vintegris.com\/en\/#website","url":"https:\/\/vintegris.com\/en\/","name":"vintegris","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/vintegris.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/vintegris.com\/en\/#\/schema\/person\/82bddb90af82cffd8c7a033446355339","name":"Vintegris","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a3a920701ec1674ec50fb937f0df475dfffbdc2ba6690734a8d198c1def6d17c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a3a920701ec1674ec50fb937f0df475dfffbdc2ba6690734a8d198c1def6d17c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a3a920701ec1674ec50fb937f0df475dfffbdc2ba6690734a8d198c1def6d17c?s=96&d=mm&r=g","caption":"Vintegris"},"url":"https:\/\/vintegris.com\/en\/blog\/author\/vintegris\/"}]}},"_links":{"self":[{"href":"https:\/\/vintegris.com\/en\/wp-json\/wp\/v2\/posts\/44184","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/vintegris.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/vintegris.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/vintegris.com\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/vintegris.com\/en\/wp-json\/wp\/v2\/comments?post=44184"}],"version-history":[{"count":1,"href":"https:\/\/vintegris.com\/en\/wp-json\/wp\/v2\/posts\/44184\/revisions"}],"predecessor-version":[{"id":44187,"href":"https:\/\/vintegris.com\/en\/wp-json\/wp\/v2\/posts\/44184\/revisions\/44187"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/vintegris.com\/en\/wp-json\/wp\/v2\/media\/45600"}],"wp:attachment":[{"href":"https:\/\/vintegris.com\/en\/wp-json\/wp\/v2\/media?parent=44184"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/vintegris.com\/en\/wp-json\/wp\/v2\/categories?post=44184"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/vintegris.com\/en\/wp-json\/wp\/v2\/tags?post=44184"},{"taxonomy":"sectores","embeddable":true,"href":"https:\/\/vintegris.com\/en\/wp-json\/wp\/v2\/sectores?post=44184"},{"taxonomy":"soluciones","embeddable":true,"href":"https:\/\/vintegris.com\/en\/wp-json\/wp\/v2\/soluciones?post=44184"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}