What Decree 26-07 Actually Changed
Algeria’s cybersecurity governance framework took a decisive step forward on January 7, 2026, when Presidential Decree No. 26-07 was signed and subsequently published in the Official Gazette on January 21, 2026. The decree does not introduce cybersecurity as a new concept — it operationalizes it. Every public institution, from ministries to public enterprises, must now establish a dedicated cybersecurity unit that reports directly to the institution’s head, operates independently of the technical IT management function, and carries full responsibility for risk mapping, incident response, and audit coordination.
This is a structural change, not a policy memo. The separation from IT management is intentional: it prevents cybersecurity from being subordinated to operational priorities, a configuration that has historically allowed risk accumulation to go unnoticed. The unit must maintain continuous monitoring, conduct regular system audits, and immediately report incidents to national authorities — specifically to ANSSI (National Agency for Information Systems Security) and DZ-CERT (Algeria’s Computer Emergency Response Team).
For private-sector SMEs, particularly those that supply services, cloud infrastructure, or software solutions to public institutions, the decree creates a compliance ripple effect. Decree 26-07 explicitly requires that public cybersecurity units ensure “security clauses are included in outsourcing contracts.” Any Algerian SME with a government client will now face contractual cybersecurity requirements tied to standards that the decree empowers ANSSI to specify and enforce.
The broader legal ecosystem surrounding the decree matters too. Presidential Decree No. 20-05 (January 2020), amended by Decree No. 25-298 (November 2025), already established the national information systems security framework. Law No. 09-04 (August 2009) criminalized unauthorized access, with prison terms ranging from two months to ten years and fines from DZD 5,000 to DZD 10,000,000. Decree 26-07 is the enforcement layer sitting on top of these foundations, giving ANSSI a concrete mandate to audit compliance rather than merely advise on best practices.
Algeria’s Threat Landscape in Numbers
The decree was not issued in a vacuum. Algeria ranked 17th globally among targeted nations in 2024, absorbing over 70 million attempted cyberattacks during the year. More than 13 million phishing attempts were blocked by national systems, alongside nearly 750,000 malicious email attachments. These are not numbers from a country on the periphery of the cybercrime economy — they reflect an active, sustained targeting campaign against Algerian digital infrastructure.
The national cybersecurity strategy for 2025-2029, enacted by Presidential Decree No. 25-321 on December 30, 2025, frames the threat in economic terms. Digital transformation is accelerating across Algeria — in finance, energy, public services, and manufacturing — and each newly digitized process represents an expanded attack surface. SMEs are a preferred entry point for sophisticated actors precisely because they often have weaker controls than the public institutions they serve.
Globally, the numbers reinforce urgency. The FBI’s Internet Crime Complaint Center reported BEC and related business fraud generated $2.77 billion in losses across 21,442 incidents in 2024 alone. Supply chain and vendor-access attacks have become the dominant model: attackers compromise a smaller supplier to reach a better-defended prime target. Algerian public institutions that implement rigorous cybersecurity units will demand the same standard from every SME in their supply chain.
Advertisement
What Algerian SME Compliance Officers Should Do Now
1. Map Your Contractual Exposure to Public Institutions Before the Audit Cycle Begins
The first step is not technical — it is contractual. Every active contract with a public institution should be reviewed for existing security clauses and compared against what Decree 26-07 now requires. ANSSI has the authority to specify security standards that outsourcing contracts must meet, and the next generation of public procurement cycles will embed these requirements by default. If your current contracts lack incident notification procedures, access-control commitments, or audit-cooperation clauses, you are already behind the standard that your public clients will soon be contractually obligated to enforce. Build an internal registry of all public-sector contracts, flag those without security annexes, and initiate renegotiation discussions proactively — clients respond better to a supplier that leads the conversation than one that scrambles when an audit letter arrives.
2. Establish a Minimum Viable Cybersecurity Function Even Without a Full Unit
Decree 26-07 applies directly to public institutions, not to SMEs. But the doctrine of security-clause propagation means SMEs must demonstrate an equivalent capability when public clients ask. For an SME with 10-50 employees, a full dedicated cybersecurity unit is disproportionate — but a minimum viable function is not. Assign a named security officer with a documented mandate: responsible for risk assessments, incident escalation, and coordination with DZ-CERT. This person can hold the role alongside other responsibilities, but the assignment must be formal, documented in writing, and reviewed annually. According to the CMS expert guide on Algerian data protection, private operators already bear legal obligations under Law No. 18-04 to maintain confidentiality, integrity, and availability of systems — this role formalizes accountability for those pre-existing duties.
3. Implement Incident Notification Procedures That Mirror Public-Sector Standards
One of the decree’s most actionable requirements for public institutions is the obligation to immediately report incidents to ANSSI and DZ-CERT. SMEs operating in the public supply chain will inherit this expectation via their contracts. Now is the time to build a simple incident notification procedure: a defined escalation path from detection to internal review to client notification to DZ-CERT reporting. The procedure does not need to be complex — it needs to be documented, tested at least once per year, and known to every employee who handles public-sector systems. DZ-CERT operates a reporting portal and coordinates directly with ANSSI on systemic incidents. Early self-reporting is treated more favorably than incident discovery by external audit.
4. Align Security Clauses in Your Subcontracts Downstream
If your SME uses subcontractors — software developers, cloud hosting providers, IT support firms — you must push the same security requirements downstream that your public clients will push to you. This is how supply chain compliance works in practice. A weak subcontractor is your legal and reputational liability if their access to your systems becomes the entry point for a breach affecting a public institution. Review all subcontractor agreements for: access control standards, data handling procedures, incident notification obligations, and audit-cooperation commitments. ANSSI’s security standards for outsourcing contracts, once finalized under Decree 26-07 implementation guidance, will become the baseline you should require from every vendor with access to your systems.
5. Register with DZ-CERT and Engage ANSSI’s Awareness Programs
ANSSI and DZ-CERT do not operate exclusively as enforcement bodies — they also provide guidance, training resources, and threat intelligence to private-sector organizations. SMEs that proactively register with DZ-CERT receive threat alerts relevant to their sector and can access technical assistance during incidents. ANSSI’s awareness programs, which have expanded significantly under the 2025-2029 national strategy, include workshops for SME compliance officers that cover risk assessment methodology, security policy templates, and incident response planning. Participation is voluntary but strategically valuable: it signals good faith to public clients during procurement evaluations and puts your team in direct contact with the authority that will eventually audit your clients’ compliance with your contracts.
Where This Fits in Algeria’s 2026 Compliance Ecosystem
Decree 26-07 is one pillar of a larger regulatory architecture that Algeria has assembled in roughly fourteen months. Presidential Decree No. 25-320 (December 30, 2025) introduced the national data governance framework; Decree No. 25-321 enacted the five-year cybersecurity strategy on the same date; Decree No. 25-298 (November 2025) strengthened the information systems security framework that has governed public institutions since 2020. The January 2026 decree operationalizes all three by mandating the institutional structures needed to implement them.
For Algerian SMEs, this convergence creates a compliance window — not an immediate crisis. Public institutions are still building their units, and ANSSI will take time to formalize sector-specific enforcement guidance. But the audit cycle will arrive, and the SMEs that will perform best in it are those that started building documentation, procedures, and contractual clarity in 2026 rather than waiting for the first audit letter to trigger emergency action.
The practical analogy is procurement: companies that meet ISO 9001 or ISO 27001 standards before a public tender is released win contracts that their less-prepared competitors do not even qualify for. Decree 26-07 compliance is becoming the cybersecurity equivalent — a threshold standard for continued participation in Algeria’s public-sector digital economy.
Frequently Asked Questions
Does Decree 26-07 directly require Algerian SMEs to create cybersecurity units?
No — the decree directly applies to public institutions only. However, it requires those institutions to include security clauses in all outsourcing contracts with private suppliers. SMEs serving the public sector will face contractual cybersecurity requirements as a result, making voluntary compliance alignment strategically essential.
What authority enforces cybersecurity compliance for private companies in Algeria?
ANSSI (National Agency for Information Systems Security) and ARPCE (Regulatory Authority for Post and Electronic Communications) are the primary enforcement bodies. DZ-CERT handles incident response coordination. Under Law No. 09-04 and Law No. 18-04, private operators face administrative sanctions including license suspension and criminal fines up to DZD 10,000,000 for serious non-compliance.
What is the minimum viable cybersecurity setup for an Algerian SME with 10-50 employees?
A named security officer with a documented mandate, a written risk assessment covering the systems used for public-sector work, an incident escalation and notification procedure, and formal security clauses in all subcontracts. ISO 27001 is aspirational — but ANSSI’s published technical guidelines for Decree 26-07 implementation will likely define the minimum acceptable standard for public procurement qualification.
Sources & Further Reading
- Algeria Orders Cybersecurity Units in Public Sector Amid Surge in Cyberattacks — Ecofin Agency
- Algeria Strengthens Cybersecurity Framework to Protect National Infrastructure — TechAfrica News
- Data Protection and Cybersecurity Laws in Algeria — CMS Expert Guide
- Algeria’s National Cybersecurity Strategy 2025-2029: Full Analysis — AlgeriaTech
- An Overview of Cybersecurity Regulations in Algeria — Generis Online
- SAMENA Council Daily News: Algeria Cybersecurity Update














