Critical Information Infrastructures Protection approaches in EU
|
|
|
- Darlene Garrett
- 9 years ago
- Views:
Transcription
1 Critical Information Infrastructures Protection approaches in EU Executive Summary An increasing number of countries in the European Union have developed a National Cyber Security Strategy (NCSS) a key policy document, which includes the measure a state should take to tackle cyber risks that could impact the economic and social benefits. Twenty (20) European Union Member States have published a NCSS, some of them in initial implementation stage and some are now into the second or third implementation round. Critical information infrastructure protection (CIIP) is a key priority in most of these strategies (15 out of 20 have an objective to protect the national critical infrastructure 1 ). However the approach each country takes on the topic is diverse and according to their national requirements, i.e. some countries have developed specific CIIP Action Plans drawn by legislation, some others have created working groups per critical sector to focus on tackling the CIIP issues, others include CIIP in the mandate of the body responsible of national cyber security etc. This diversity in the governance model, the bodies involved and the objectives prioritisation constitutes the scope of this short paper. The goal of this short paper is to present the different approaches the MS follow on the governance of Critical Information Infrastructures, as described under the NCSS. This information will be helpful for the Member States that are still working on designing and implementing their national strategy and include, in a brief way, the priorities and governance models followed. This paper would also be of assistance to the private sector to better understand their role in the implementation of the provisions of the national strategy. ENISA has been working on the field of NCSS since 2012, when introduced the notion of the lifecycle of a NCSS. ENISA has taken stock of the cyber security activities in Europe, has analysed trends and resulted into recommendations for the countries to design, implement and evaluate a strategy. Several reports have been published 2 to support the Member States in following the steps of that lifecycle. In 2013, ENISA launched the NCSS working group; representatives from 14 Member States and 1 EFTA country collaborate on topics related to the cyber security status in their country, supporting other MSs that haven t yet implemented a strategy to accelerate the process. This year the WG decided to focus on the specific objectives of a NCSS and provide information on each country s approach; one of the first topics to present is the CIIP perspective as a component of NCSS. 1 Source ENISA Evaluation framework for NCSS:
2 1 Introduction Many European Union Member States have published or are in the process of publishing an NCSS. Of these, several have also updated their strategies since their first edition. National Cyber Security Strategies aim to ensure that Member States are prepared to face serious risks, are aware of their consequences, and are equipped to appropriately respond to breaches in the network and information system. However, it is not always clear if and how the effectiveness of these strategies is evaluated. Evaluation can be interpreted as a tool to assess if and how well the expected objectives have been achieved and whether the costs involved were justified, given the changes which have been achieved. The European Commission understands that there are still gaps across the EU, notably in terms of national capabilities, coordination in cases of incidents spanning across borders, and in terms of private sector involvement and preparedness 4. The 2013 EU Cyber Security Strategy (EUCSS) asks ENISA to encourage good practice in information and network security to assist and support Member States in developing strong national cyber resilience capabilities, notably by building expertise on security and resilience of industrial control systems, transport and energy infrastructure. One of the most important aspects covered in the national strategies is the governance of critical information infrastructures; currently 18 out of 20 Member States strategies include CIIP as an objective (the other two have specific regulation). The scope of this short paper is to present in brief how the MS perceive critical information infrastructure so as to provide advice to countries that are now working on designing their strategy, or are updating into a next version. 2 Country reports in CIIP This section includes the summarized approach each country takes on CIIP. More it explains what is the structure and the governance model in each MS, who are the stakeholders involved and under what capacity, is there the presence and nature of relative legal basis etc. Below you can read the summary report from 15 EU MSs. 2.1 Austria (AT) In 04/11/2014 the Austrian Federal Government decided on a new program for the protection of critical infrastructure (CIP) called the APCIP (Austrian Program for Critical Infrastructure Protection) Masterplan This is based on the 2008 program, which does not include distinct sections for cyber security and CIIP; both are however relevant parts of this program and are included in all of its activities (public and private). The focal point of this Masterplan lies in identifying Strategically Important Organizations (SIOs) that operate CIs and engaging them in a security partnership. The overall process of implementing the Masterplan in Austria is overseen by the Federal Chancellery and the Federal Ministry of Interior. It is supported by a consortium consisting of representatives from the ministries, the Austrian states and various groups of interest. Collaboration is based on a voluntary self-commitment. This security partnership is to be regulated by legally non-binding cooperation agreements. Legal action is to be taken only in case the voluntary measures prove to be ineffective. The responsibilities in the form of tasks and capacities of the public agencies are regulator under the Federal Security Policy Act and include activities such as identification of SIOs, assisting organizations to create a security architecture, ensure physical protection and organization of cyber security exercises. The Cyber Security Platform (CSP) was established on 17/03/2015. Its members are mainly CII operators and other companies and organizations of strategic importance from sectors such as industry, traffic, finance, health and the public sector. Responsibilities of these SIOs are: 02
3 Creation of an extensive security architecture (including risk-, crisis- and security management) to enhance resilience, particularly against cyber threats Nomination of Points of Contact (POCs) Implementation of common security standards (including standards against cyber threats, as mentioned in the Austrian Cyber Security Strategy) Notification about incidents (including cyber incidents, as mentioned in the Austrian Cyber Security Strategy-ACSS) Participation in exercises (including cyber exercises) The ACSS includes the protection of CI by also linking to APCIP and naming resilience a top priority for future planning measures. Some of the measure proposed are cyber crisis management plan, appointment of an information security officer, definition of standards, incident reporting. Both APCIP and ACSS have action plans in order to implement the corresponding measures in a timely, coordinated way. In a nutshell, in Austria the governance model followed is based on a partnership between authorities and CII operators on voluntary self-engagement. Identification of assets is under the public authorities and operators need to support protection of them by following specific security measures. Only in case these measures are inadequate, legal implications may follow. 2.2 Cyprus (CY) Cyprus has recognised that the protection of CIIs is vital and of extreme importance to the functions of the society since they have penetrated in almost every part of citizens' lives. The Cyber Security Strategy of Cyprus () is focused on the protection of CIIs, resulting into a set of 17 specific actions further described in the strategy document. To prevent threats and protect critical infrastructures, Cyprus has a number of priority actions that have been identified. These are: coordination of governmental stakeholders to ensure correct and efficient cooperation, creation of a comprehensive legal framework by the competent authorities of the state, that covers all aspects of network and information security, including cybercrime and the protection of personal data, formulation of technical and organisational measures and procedures to harden the security of relevant hardware, software and physical spaces, development of the necessary skills, training and awareness in security topics, for those that are directly involved and also for the public, productive collaboration between the public and private sector, on both the national and international level, creation or adaptation of the necessary structures and instruments within the competent authorities and the more generally the Cyprus government, to secure the demands and capabilities of immediate incident response. Legislation in the Republic of Cyprus already covers a large number of areas relating to network and information security, as well as cybercrime (and other electronic crimes). However, it is still considered necessary to identify all relevant laws in Cyprus and to update them. There are a number of authorities within the Republic of Cyprus that are active in the security of networks, services, information technology systems and information itself, in addition to having direct or indirect input on critical security matters. The competent/related authorities that are involved at this stage are Office of the Commissioner 03
4 of Electronic Communications and Postal Regulation (OCECPR), the Department of Information Technology Services (DITS), the Cyprus Police, the National Guard General Staff, the National Security Authority, the Central Intelligence Service, the Office of the Commissioner for Personal Data Protection, the Ministry of Communications and Works (MCW), the Department of Electronic Communications (DEC), the Civil Defence Force and the Cyprus Fire Service. 2.3 Czech Republic (CZ) Special attention is given to Critical information infrastructure protection in new NCSS of the Czech Republic for the period from 2015 to NCSS goes hand by hand with the new Czech legislation in the area of cyber security, called Act on Cyber Security which has been recently adopted and became effective on 1st January 2015 and this new law legally obliges all CII entities to take security measures (standardization), to report cyber security incidents and to take countermeasures, it means response to incidents. One of the visions of NCSS represents effectively secured individual elements of a critical information infrastructure and the overall security of networks and cyberspace used by Czech population, which are essential to the latter s Czech economic and social interests. Protection of CII also embodies one of the main aims of the NCSS. Besides the strategy, the Czech Republic intensively works on the update of the Action Plan that will define specific steps for their fulfilment of the goals in NCSS related to CIIP. Czech Republic has set in the new NCSS e.g. to: Pursue a continuous analysis and control of CII security in the Czech Republic based on a clearly defined protocol. Enhance, on a continuous basis, the CII and IIS networks resistance, integrity and trustworthiness. Share information among the state and CII subjects. Perform regular testing of and detect errors and vulnerabilities in information systems and networks used by the state, based on CII penetration testing principles. Czech Republic does not have a lack of direct government control over CII like other countries. In the Czech Republic, the National Security Authority (NSA CZE) is the body responsible for cyber security, the only national authority in this field and it leads coordination across government departments and agencies. For this purpose NSA CZE has recently established a specialized department, the National Cyber Security Centre (NCSC) and this department is responsible for mapping and identifying of services to be part of CII as well as supervising the fulfilment of obligations under the Act on Cyber Security for the entities managing elements of CII. In short, NCSC operates as the centre of the protection for the state and CII as well as a body for critical management in case of a massive attack on a national scope. 2.4 Estonia (EE) The Estonian approach to critical information infrastructure protection builds upon the concept of vital services. These are services that are essential for the maintenance of vital societal functions, healthcare, security and people s 04
5 economic and social well-being. 43 vital services are listed in the Emergency Act (adopted in 2009) 3 and grouped in sectors 4. The Emergency Act imposes duties on authorities to maintain the sustainability of vital services and on service providers to provide vital services. The specific regulatory measures were defined by Government in 2013 in Security Measures for Vital Service Information Systems and Related Information Assets 5. These measures were developed on the basis of the results of a critical information infrastructure mapping project conducted by Information System Authority in 2010, which identified the dependencies of vital services on information systems. While the key objective of the Cyber Security Strategy of was raising awareness and developing requirements for strengthening the security of critical infrastructures, the second version Cyber Security Strategy focuses on managing cross-dependencies between vital services as well as cross-border interdependencies. The goal is to keep up to date the information relating to dependencies on critical services provided from outside Estonia, evaluate the extent of their impact on the functioning of services, and systematically reduce associated risks. According to the Emergency Act, the providers of vital service can be both state or local government authorities and legal persons, depending on their actual supply of any of the 43 vital services listed in the Act. The vital service providers have the following obligations: Preparing a continuous operation risk assessment (at least once in every two years); Preparing a continuous operation plan for the vital service provided (at least once in every two years); Immediately notifying events which significantly disturb the continuous operation of the vital service, or an impending risk of such incident; and Subjecting themselves to the supervision of competent authorities over the continuous operation of the vital service. Guidelines for implementing these obligations are defined in secondary legislation. Nine government ministries and public bodies are assigned by the Emergency Act with responsibilities in managing the continuous operation of the vital services. Ministry of the Interior bears the overall national coordinator role. The obligations of the nine vital service organizing authorities include coordination of vital service operation, advising vital service providers, supervision over ensuring the continuous operation of vital services; and regular reporting to the national coordinator (Ministry of the Interior). The Act authorises these organizing authorities to issue secondary legislation for establishing the description of the vital service and establishing continuous operation requirements for the vital services. The supervisory body over compliance with electronic security requirements of provision of vital service is the Information System Authority (RIA) with the mandate of a law enforcement authority as defined in the Law 3 The Estonian Emergency Act is available at: 4 These sectors are: justice system; utilities, transport, and communications; public security and public order; medical services; environmental services; food safety; financial services; government and public administration 5 ation_assets.pdf
6 Enforcement Act.7 RIA is responsible for developing an emergency risk assessment to address the risk of a vital service-relevant cyber incident, and for preparing the national emergency plan for large scale cyber incidents. In case of a large scale cyber incident, the Information System Authority also leads incident response activities. 2.5 Finland (FI) The Finnish Cyber Security Strategy has been adopted as a government resolution in December 24 th The strategy sets an objective to maintain and improve the abilities of businesses and organizations critical to the vital functions of society as regards detecting and repelling cyber threats and disturbances that jeopardise any vital function, and their recovery capabilities as part of the continuity management of the business community. In their security and contingency plans the businesses and organisations critical to the vital functions of society will comprehensively take into account the cyber threat factors related to the vital functions, and maintain the required capabilities to protect themselves. The goal is to detect and identify any disturbances to the vital functions appearing in risk assessments and to respond to them in a manner which minimises their detrimental effects. The key actors will improve their tolerance, including contingency planning and exercises, so as to be able to operate under cyberattacks. The Finnish National Emergency Supply Agency will support this activity through reports, instructions and training. The Finnish government emphasized in its cyber security strategy that cyber security is not meant to be a legal concept the adoption of which would lead to granting new competences to authorities or other official bodies. Government also stated that cyber security arrangements follow the division of duties between the authorities, businesses and organisations, in accordance with statutes and agreed cooperation. According to the strategy most of the critical infrastructure in society is in private business ownership. This is why cyber know-how and expertise, as well as services and protection measures are for the most part provided by companies. The strategy states that national cyber security legislation must provide a favorable environment for the development of business activities. In many cases the Finnish national legislation aims to protect certain vital services and their security rather than critical information infrastructure itself. It is important to bear in mind, that there is a quantity of such sector specific EU legislation and national legislation in place which obliges different operators to do risk management, take specific security measures and notify security incidents. Such legislation obliges the service providers for example in the fields of energy, transport, finance, healthcare, and communications and so on. These provisions oblige service providers whether they utilize information and communication technology in their businesses or not. In some sectors there is specific regulation on how service providers must tackle the risks related to the use of ICT in their service production. In this respect the competitiveness aspects need to be considered, as well as ensuring that administrative burden is not unreasonably increased. In a nutshell, Finland has made all provisions necessary to protect critical infrastructures before the cyber security strategy was published. The strategy has a vision that citizens, authorities and businesses can effectively utilize a safe cyber domain and the competence arising from cyber security measures, both nationally and internationally
7 2.6 France (FR) In France, identification of critical information infrastructures is derived from the identification of CIP, which follows the doctrine of defence and national security approach focusing on "operators of vital importance": "an operator whose unavailability could strongly threaten the economical or military potential, the security or resilience of the nation". For CIP (Secteurs d Activité d Importance Vitale, SAIV in French), the relevant provisions are included in the Code of Defence, which constitutes the legislative and regulatory framework for the national security system. 12 critical sectors are identified in this framework (the precise list of operators is classified): Civil activities Judicial activities Military activities Food Electronic, audiovisual and information communications Energy Space and research Finance Water management Industry Health Transportation The French White Paper (29 April 2013) 8 on National Security and Defence set as priorities, amongst others, the protection of critical information infrastructures. The Agence Nationale de la Securité des Systèmes d'information (ANSSI), created by the decree (7 July 2009) 9, is a service with national responsibility and jurisdiction which reports to the General Secretariat for Defence and National Security. On 11 February 2011, the decree appointed ANSSI as the French Cyberdefence Authority. Since then ANSSI oversees laws and decrees related to CIIP. In this regard, ANSSI participated to the development of a new law, passed on 19 December 2013 (Loi de Programmation Militaire, LPM ) which amended the aforementioned Code of Defence. In particular, it includes four main provisions of interest to CIIP, which were further detailed in the decree , 27 March : The ability for ANSSI to set minimum cybersecurity requirements at the technical and organisational levels as well as timeframes for their implementation by the operators. These requirements include the implementation of detection systems operated either by public entities (including ANSSI) in the case of a public administration, or service providers in the case of private operators. It is worth noting that detections systems must be qualified by ANSSI (both the products and service providers relied upon by the operator to set up its detection system)
8 As a logical consequence to the enforcement of detection systems, the law introduces mandatory cybersecurity incident notification from critical operators to ANSSI. Mandatory cybersecurity audits, performed either by a public entity (including ANSSI) or a service provider qualified by ANSSI. Operators can undergo maximum 1 audit per year, except if previous audits revealed vulnerabilities, failures to comply with minimum security requirements or ongoing incidents. Audits reports are classified and provided to ANSSI. Crisis management provisions notably the ability for ANSSI to lead cross-ministerial crisis management activities and to take or request necessary actions from the operators. ANSSI is currently working on the categorisation of assets according to their criticality, as well as drafting sector specific security requirements and implementation guidelines. 2.7 Hungary (HU) The National Directorate General for Disaster Management is responsible for the Critical Infrastructure Protection (CIP) in Hungary. The main tasks are to identify the potential critical infrastructure elements and to keep them under authoritative control. The Hungarian Parliament accepted the Critical Infrastructure Protection Act (number: 166/2012) by a qualified majority. The second part of the Hungarian legislation procedure came with the Government Framework Decree which was entered into force in March (number: 65/2013). Through the legislation common terms and procedures for designating national and European critical elements had been created. It is a framework decree (65/2013) including regulation of sectors and sub-sectors, which came into force in three separate periods. In four sectors starting with Energy and followed by Agriculture, Water, and Public Safety the legislation procedure has been finished, in the sector of Transport the legislative process is still ongoing. The identification process for Public Safety and Agriculture has been completed. The designating procedure is still ongoing in all the other sectors. There is no designated European Critical Infrastructure Element in Hungary yet. According to the law, in six sectors (Transport; Financial; Medical; Industry; Information, Communication Technologies; Law and Governmental) further government decrees are necessary for starting the identification process. Hungary has created a CIP Network Safety Center acting as the national security authority of Hungary. The center has been established to provide safety and to help the operator companies (only if they became CI elements) to protect themselves against network and cyber security incidents (for example: hacker activity). The National Directorate General for Disaster Management has monitoring, controlling and coordination role, and includes the CIP CSIRT. National Directorate General for Disaster Management of Hungary eligibilities (CIP): Special authority Registering authority Audit Coordination Network Safety Incident management National contact point 08
9 2.8 Latvia (LV) Critical infrastructure in Latvia in general is designated on the basis on the National Security Law, which defines critical infrastructure as objects, systems or parts of systems located on the territory of Republic of Latvia, which are important for implementation of functions vital to society and for provision of health protection, security, economic and social welfare, and destruction or malfunction of which would significantly affect the functions of the State. While this definition also includes critical information infrastructure, a specific act on cyber security the Law on the Security of Information Technologies further addresses critical infrastructure of information technologies. In addition, once a year the Cabinet of Ministers establishes and reviews the critical infrastructure whose termination can substantially threaten the existence of the state. 13 The Latvian approach to CI does not rely on specified critical sectors; rather, any infrastructure found to meet the criteria of criticality can be designated as critical infrastructure. The decision to designate a particular infrastructure including IT infrastructure as critical is taken by The Commission of Intermediary Institutions for State Security 14 and approved by the government cabinet in accordance with the National Security Law. Direct legal responsibility for the security and functioning of critical information infrastructure lies with the owner or legal possessor of the critical infrastructure. The CI owner is required to define security measures based on identified risks, document these measures, and present the documents of security measures to the Constitution Protection Bureau upon the latter s request. It has a legal obligation to ensure the security of the CI in such a way that the identified risks are managed. The CI owner shall appoint a person responsible for the security of the critical infrastructure, who will be in charge for planning security measures of the critical infrastructure, and, in cooperation with the Constitution Protection Bureau and the national CERT, ensure the assessment and management of the current risks of the critical infrastructure. 15 The role of coordinating security measures is shared between the state security service, Constitution Protection Bureau, 16 and the national CERT (the Information Technology Security Incident Response Institution of the Republic of Latvia CERT.LV), operating under the Ministry of Defence of the Republic of Latvia 17 ). The activities of both agencies in the area of CII are governed by the Law on the Security of Information Technologies and a Cabinet regulation that further specifies the planning and implementation of security measures. The Constitution Protection Bureau cooperates with the CERT.LV and CI owners (incl. legal possessors) in ensuring the assessment and management of the current risks of the critical IT infrastructure. The Bureau informs the owners of the critical infrastructure of the designation of their systems as CI and approves the appointment of the person responsible for the security of the particular CI. It has a right to examine personnel related to ensuring the operation of the CI; request the CERT.LV to conduct inspections on CI to determine the vulnerability and security risks of the 13 Cabinet Regulation No. 496 of 1 April 2010 Planning and Implementation Procedure of Identification and Security Measures for the Critical Infrastructure, including the Critical Infrastructure of Europe 14 It is an advisory collegial institution, chaired by the Ministry of Internal Affairs and consisting of representatives from government ministries; public agencies such as the Police, State Fire and Rescue Service; Armed Forces; security agencies such as Security Police, Military Intelligence and Security Service, Constitution Protection Bureau; CERT.LV; and the National Bank. 15 Cabinet Regulation No. 100, adopted 1 February 2011 Procedures for the Planning and Implementation of Security Measures for the Critical Infrastructure of Information Technologies
10 relevant critical infrastructure; and give recommendations to CI owners for the elimination of the detected deficiencies. It may also issue recommendations to state administrative institutions who supervise the CI owners. Furthermore, the Bureau, together with the CERT.LV, periodically informs the National Information Technologies Security Council 18 regarding current threats to critical infrastructure. The Information Technologies Security Incidents Response Institution (CERT.LV) provides support for and coordinates CII incident prevention, inter alia by cooperating with the Constitution Protection Bureau and CI owners in risk assessment and risk management. In order to determine the vulnerability and security risks of the relevant critical information infrastructure, the primary tool foreseen by the regulation is security inspection (e.g. penetration tests) of the critical infrastructure. Based on such security inspections, CERT.LV may issue recommendations to the CII operator. Cyber Security Strategy of Latvia for marks Critical Infrastructure as one of the key areas of action under the section on Governance and Resources of Cyber Security. It highlights the fact that critical infrastructure of information technology has been established for the performance of basic functions essential for state and society to ensure the integrity, accessibility and confidentiality of the critical infrastructure. Regular trainings organized by CERT.LV for the representatives of critical infrastructure are recognized a significant tool to exchange the knowledge and experience, as well as to improve the procedures. Action plan of the CSS outlines definite actions to be implemented by It defines the institution responsible for the implementation of the specific task, necessary financial resources as well as the desired outcome. However, detailed information on the specific tasks regarding the Critical Infrastructure is not publicly available. 2.9 Lithuania (LT) In Lithuania, the Law on Cyber Security (which entered into force on 1 January 2015) introduces the definition of critical information infrastructure (CII) in national level. In addition to setting of organization, management and control of the national cyber security system, the Law defines the following responsibilities of CII owners: CII owners are responsible for cyber security of their critical information infrastructure and implementation of organizational and technical cyber security requirements; CII owners shall inform the National Cyber Security Centre (NCSC) about cyber incidents and cyber threats. CII owners shall inform State Data Protection Inspectorate about cyber incidents related to personal data. CII owners shall inform police about suspected cyber-crime cases. CII owners shall develop, implement and exercise their cyber incident management plans. CII owners shall designate contact points responsible for cyber security. CII owners when necessary shall create necessary conditions for installation and management of NCSC owned cyber security tools in their CII. The law sets the responsibility of the Ministry of Interior to develop methodology for identification of CII, draft a list of CII and present it to the Government for approval. The Law establishes National Cyber Security Centre (NCSC) as the authority responsible for CIIP. In accordance with the law, the Government by its decree has approved the establishment of Cyber Security Council (CSC), which consists of public, private sectors and academia 18 The Council determines the development of cyber security policy at a national level, as well as coordinates the planning and implementation. 10
11 representatives. The main tasks of CSC are to analyse cyber security situation, tendencies, cyber threats, and provide an advice on improvement of national cyber security, including CIIP. The Law requests the establishment of cyber security information platform, which will be used to exchange information between competent authorities and CII. CIIP is one of three main objectives in the Lithuanian NCSS (Programme for the development of electronic information security (cyber security) for (2011) 19 ). NCSS sets more than 10 assessment criteria which should be achieved for better CIIP The Netherlands (NL) Working with international partners, the Netherlands aims to create a secure and open digital domain, in which the opportunities for our society offered by digitisation are used to the full, threats are countered effectively and fundamental rights and values are protected. The correlation between security, freedom and social and economic benefits proposed in the NCSS2 is a dynamic balance that is intended to be realized in a constantly open and pragmatic dialogue between all stakeholders, both national and international. The objectives serve as a guideline to the action program linked to the NCSS2. This action program comprises 37 actions concerning a broad spectrum of cybersecurity issues, Annual progress reports will be drawn up and the action program will be updated when necessary. However the Dutch government started the CIP project (Bescherming Vitale Infrastructuur) early 2002 with the objective to develop an integrated set of measures to protect the infrastructure of government and industry. The critical sectors considered are: Energy: electricity, natural gas and oil Telecommunication and ICT: land-line and mobile telephony, radio, broadcasting and the internet Drinking water: the water supply Food: the food supply (including in supermarkets) and food safety Health: emergency and hospital care, medicines, vaccines Financial sector: payments and money transfers by public bodies Surface water management: water quality and quantity (control and management) Public order and safety Legal order: the courts and prisons; law enforcement Public administration: diplomacy, public information, the armed forces, decision-making Transport: Amsterdam Schiphol Airport, the port of Rotterdam, highways, waterways, railways The chemical and nuclear industries: the transport, storage, production and processing of materials. Within the framework of the protection of critical infrastructure, the government, working with vital parties, identifies critical ICT-dependent systems, services and processes. These efforts are linked to a program that will establish basic security requirements on the basis of risk analyses. The position of the National Cyber Security Centre (NCSC) is bolstered by means of a stronger structure for confidential information-sharing and analysis. Furthermore, the NCSC assumes the role of expert authority, providing advice to private and public parties involved, both when asked and at its own initiative. Finally, based on 19 Programme for the development of electronic information security (cyber security) for (2011) 11
12 its own detection capability and its triage role in crises, the NCSC develops into Security Operations Centre (SOC) 3 in addition to its role as a Computer Emergency Response Team (CERT) Poland (PL) In Poland the CIP action plan (National Critical Infrastructure Protection Program) is set up since 2013 under the provisions of the Crisis Management Act. It was created by the Government Centre for Security in close collaboration with the ministers and heads of central offices competent in matters of national security, as well as responsible for the sectors or systems considered as critical for the proper functioning of the state. ICT is treated as one of the critical systems. In general the approach of the Program was to create conditions for improving the security of critical infrastructures, and prevent the malfunctioning of critical infrastructure, prepare for crisis situations that could adversely affect critical infrastructure, respond in the event of destruction or disruption of critical infrastructure functioning, reconstruct the critical infrastructure. The Program shall specify: national priorities, objectives, requirements and standards, to ensure the smooth functioning of critical infrastructure; the ministers in charge of government administration units and heads of central offices responsible for the systems mentioned above; detailed criteria which enable to identify objects, installations, facilities and services included in the critical infrastructure systems, taking account of their importance for the functioning of the state and satisfying the needs of the citizens In particular the programme created the PPP forum for private and public owners of CIP. The Polish NCSS ( Cyber Space Protection Policy of the Republic of Poland) is complementary to the efforts aimed at protection of CIP based on National Critical Infrastructure Protection Program. This programme is due to be updated every second year. Governance of legislation initiative and CIP coordination is assigned to Government Centre for Security. However GCP is cooperating with all the ministers and heads of central offices competent in matters of national security as well as responsible for the sectors or systems considered as critical for the proper functioning of the state. Pursuant to Article 3 (2) of the current Act of 26 April 2007 on crisis management, critical infrastructure shall be understood as systems and mutually bound functional objects contained therein, including constructions, facilities, installations and services of key importance for the security of the state and its citizens, as well as serving to ensure efficient functioning of public administration authorities, institutions and enterprises. Critical infrastructure in Poland is listed as: Energy, fuel and energy supply systems, Communication systems, Tele-information network systems, Financial systems, Food supply systems, Water supply systems, Health protection systems, Transportation systems, 12
13 Rescue systems, Systems ensuring the continuity of public administration activities, k)systems of production, storing and use of chemical and radioactive substances, including pipelines for dangerous substances Slovenia (SI) In the field of CIP and especially CIIP the draft of Slovenian National Cyber Security Strategy proposes the establishment of national network of trust between critical infrastructure owners/operators and all the CERTs, the newly established National Cyber Security Authority and also Intelligence agency/agencies. Participants from academia and R&D organisations could also be part of this network. The network itself could be connected to/part of European Critical infrastructure warning information network CIWIN. According to the draft of National Cyber Security Strategy, Slovenia should also strengthen the capacity in the national CERT specially dedicated to critical infrastructures and especially to the two most important of them (Electricity supply and ICT communications). Critical sectors in Slovenia are defined on the basis of the basic and sectoral criteria for determination of critical infrastructure of national importance prepared by the Slovenian Ministry of defence (responsible body for critical infrastructure in Slovenia) and approved by the Slovenian Government 20. Critical infrastructures are categorised based on the type (energy, ICT, water etc) into sub sectors (electric supply, oil supply etc) and prioritised based on the ownership structure (public or private). According to the research project Intersectoral overview of the situation regarding critical infrastructure and its protection in the Republic of Slovenia (2008), the majority of critical infrastructures in Slovenia is in mixed ownership and only a small share is exclusively in public ownership (15 % of sub-sectors). The priority levels of sub-sectors are determined on the basis of interdependence and interaction between sectors of critical infrastructure, as malfunctions of one sector can significantly affect the performance of other sectors. The sectorial criteria in determining the critical infrastructures are developed on the basis of the definition of critical infrastructure and basic criteria for determining critical infrastructure, taking into account the specifics of each sector Spain (ES) The Spanish Law 8/2011 (April 28) that includes measures for protecting critical infrastructure in Spain, covers the baseline requirements by the public and private sectors. Beyond compliance with EU legislation on protection of critical infrastructure, the primary purpose of the Law and the implementing regulations (Royal Decree 704/2011, 20 May), is setting up a pool of measures at national level to protect the critical infrastructures, by providing good support for effective coordination between public administration and managing authorities or operators of infrastructures which provide essential services to the society, in order to achieve a better security in total. Moreover, the National Cyber Security Strategy adopted on December 5, 2013 by the National Security Council, as strategic document, and according to the forecast for the protection of cyberspace contained in the National Security Strategy, envisages the structure and implementation of several actions for prevention, defence, detection and reaction against cyber threats. Regarding the protection of Critical Infrastructure of the Information, the National
14 Cybersecurity Strategy includes, in its Action Line 3, the goal of ensuring the security of Information and Telecommunications Systems which support the Critical Infrastructures. Particularly, this Action Line will be implemented in an Action Plan, to be completed in the next that will include measures to be developed in next years. Last but not least, the Instruction 15/2014 of Secretary of State - Ministry for Home Affairs - must be emphasized. This Instruction provides the creation of the Cyber Coordination Office, as a tool for technical coordination between the different organisations with mandate on cybersecurity within the Secretary of State. The core function of this Coordination Office is to advise the Secretary of State on cybersecurity topics, provide the strategic and technical information needed for decision making and coordinate the CERT for Security and Industry (CERTSI) and the technical units in the different law-enforcement agencies at State Level (National Police and Civil Guard). The Law 8/2011 establishes the following strategic areas: Administration Chemical Industry Energy Financial and Tax System Food Supply Chain Health Information and Communication Technologies (ICT) Nuclear Industry Research Laboratories Space Transport Water Different planning instruments were established by Law 8/2011 and Royal Decree 704/2011 act on these strategic sectors: National Plan for Critical Infrastructure Protection, strategic approach and State responsibility. Sectorial Strategic Plans for each of the defined sectors or subsectors that are approved by the CIP Commission. Applying horizontal criteria of criticality defined by law, the Sectorial Strategic Plans finish with the appointment of operators and critical infrastructure. In addition to those plans mentioned above, critical operators have to develop Operator Security Plans and Operator Specific Protection Plans (both with a more limited scope and responsibility of critical infrastructure owners), and the Plans Operational Support Plans (operational nature and responsibility of law-enforcements, and therefore, the Administration) All this information is stored in the National Catalogue for Strategic Infrastructure that has being classified as Secret (the top Level of classification in Spain). It stores all information on national and European critical infrastructures, including the level of security Switzerland (CH) On 27 June 2012, the Federal Council ratified the national strategy for the protection of Switzerland against cyber risks (the NCS), laying hereby the foundation for a comprehensive, integrated and holistic approach in tackling cyber risks. The NCS is located in MELANI (reporting and analysis centre for information assurance), which in turn is part of the Federal Finance Department. The NCS seeks among other things to make Switzerland s critical infrastructures as a whole more resilient to cyber-attacks (in other words, the ability to resume normal operations as quickly as 14
15 possible) and generally reduce cyber risks (cybercrime, espionage and sabotage). The NCS also reflects some key concepts such as the need for a culture of (cyber) security, shared responsibility of all participants and the need for a risk-based approach. It also advocates a government coordination, economic (Private-Public Partnership Model) and international cooperation. The strategy comprises 16 measures that should be in place and in regular use by In order to guarantee the effective and timely implementation of these measures, the Federal Council has ratified a detailed implementation plan in 2013 and created a steering committee, which is comprised of a representative of each department, who is in charge of one of the measures. The NCS Steering Committee is mandated to secure the coordinate purposeful implementation of this strategy, by means of a strategic controlling tool. It then reports its findings to the Federal Council. In support of the work of the NCS Steering Committee, there is also a NCS Coordination Unit, which coordinates the implementation of the strategy at an operational and technical level. The Steering Committee meets biannually or annually to verify that the implementation of the 16 measures (they range from vulnerability and risk analysis, continuity and crisis management to threat analysis and incident handling) is on track and on time. At the heart of the NCS is the protection of critical infrastructures, as they ensure the availability of essential goods and services and are therefore in the interest of national security. Any cyber-attack on them will not only have cascading effects, but will be detrimental to the state and its population. 21 Regarding the protection of Switzerland's critical infrastructure, the NCS strategy builds upon the national strategy for the protection of critical infrastructures (SKI strategy) from the Federal Office for Civil Protection (FOCP). The protection of critical infrastructures involves all measures that reduce the probability and/or extent of damage of a disruption, failure or destruction of such a critical infrastructure. The SKI strategy has identified 28 critical sub-sectors and categorized them into three levels of criticality ranging from high to low. Criticality means the significance of this sub-sector for the population, the economy and its dependence on other critical infrastructures. Moreover, it has to be evaluated what the probability of occurrence is and what the damage of such an occurrence would mean for Switzerland and its population. The findings are summarized in an inventory. In a nutshell, Switzerland pursues a decentralised approach, whereby the state is mandated to give those critical infrastructure operators subsidiary support. However, implementation of security measures lies within the sole jurisdiction of the process owners. The idea underlying this process is that the process owners are best equipped to identify the cyber risks to their critical processes and decide on implementation of appropriate security measures United Kingdom (UK) The UK's response to CIIP is set out as part of Objective 2 (Making the UK more resilient to cyber-attacks and better able to protect our interests in cyber space) in the National Cyber Security Strategy; the action plan which is included in the objective 3 22 of the strategy is helping to shape an open, vibrant and stable cyberspace which the UK public can use safely and that supports open societies. The approach is based on two pillars: a. Helping to shape the development of cyberspace by promoting both an open and interoperable cyberspace and the fundamental rights of the society 21 Critical infrastructure refers to infrastructure whose disruption, failure or distraction would have serious implications for society, the private sector and the state. It includes, for example, control and switchgear for energy supply or telecommunications. An inventory of critical infrastructure will be compiled by the national strategy for the protection of critical infrastructure (p.39) 15
16 b. Protecting the way of life by ensuring security without compromising values. The specific actions included: 1. Continue the process started by the London Conference on Cyberspace to establish international norms of acceptable behaviour in cyberspace. 2. Undertake a review of policy and regulation of the UK communication sector, with a view to publishing a Green Paper early in 2012 followed by a White Paper and a draft Bill in Support the open internet, working with the Broadband Stakeholder Group to develop industry-wide principles on traffic management and nono-discrimination and reviewing its transparenct code of practice in early Implement bilateral commitment set out in high-level communiques (agreed in 2010 and 2011) with the US, Australia and France. 5. Develop new bilateral relationships on cyber with those emerging powers that are active in cyberspace. 6. Encourage international and regional organisations to support capacity building, for example working with the Commonwealth to promote model legislation on cybercrime, with the International Telecommunications Union (ITU) to support training on technical standards, with the Council of Europe (during the chairmanship starting in November 2011) and with the Organisation for Security and Cooperation in Europe (OSCE) to promote freedom of expression online. 7. Use multilateral and bilateral channels to discuss how to apply the framework of international human rights law in cyberspace and new challenges in guaranteeing such rights. 8. Strengthen international systems to build confidence among states in cyberspace, including through engagement within the OSCE on confidence-building measure. The UK's general approach is based on partnership with industry, academia and international partners to ensure a stable and secure cyber space. As part of the National Cyber Security Strategy UK has the National Cyber Security Programme which funds initiatives to meet the four key cyber security objectives. This is managed by the UK's Cabinet Office who coordinates cross government work on this issue. With respect to critical national infrastructure including CIIP our approach is from an 'all risk perspective'. This enables to consider the scale of cyber risk and the necessary response against other threats and hazards facing the UK's CNI. In the interests of national security the UK does not makes its critical sectors public. However they do include those public and private sectors which ensure the provision of critical services to the UK and whose loss or disruption may carry a significant economic, social or health consequence. 16
17 3 Summary key points The perception of Critical Information Infrastructures varies in the EU Member States according to their priorities and impact. In some cases CIIP was one of the objectives of the national cyber security strategy so as to better coordinate the respective parties (public and private sector); in other cases CIIP has a separate role to play for the country s prosperity thus is not part of the NCSS but a standalone policy area. 3.1 Key points 1. Governance of the CII Action Plans in national level also varies in the Member States: in some cases the National Security Authority has full supervision of specific activities and stakeholders involved, in other cases a decentralised models is followed. This depends on the already setup framework in national level, of the budget and resources and of course on the priorities of the state. 2. Collaboration with the private sector is not achieved through a formal way. Specific settings are introduced like working groups, public-private partnerships and in some cases even through legal procedure to make sure that all relevant stakeholders are involved in the critical information infrastructures protection. 3. Awareness raising and enhancing capabilities is another aspect that governments invest on when talking about critical information infrastructures. Even if the CII operator is a private company the requirement of cyber security trainings to the staff is another requirement included in the strategy or the CII action plan. 4. Legislation is in many cases the way to make sure that a specific framework will be followed. However many countries have established non mandatory, voluntary schemes that work equally well. All depends in the approach of the state. 5. Specific cyber security requirements such as incident reporting, business continuity plans and baseline security measures implementation are often part of the national CIIP action plan and need to be implemented by both public and private CII providers. 6. Critical sectors are not the same for each country, they depend on the national risk assessment results and on the impact any disruption would have in the vital services to the society. The critical sectors identified are summarised in the table below, even though there are cases where there is no specific distinction but ad hoc impact assessment and immediate actions. Sectors Energy Water Food Health Finance Transport Public admin. ICT Civil admin Space & research AT x x x x X x x x x CY x x x X x x x CZ x x x X x x x x EE x x x x X x x x x FI x x x x X x x x FR x x x x X x x x x x HU x x x x X x x x LV Not applicable LT x x x x X x x 17
18 NL x x x X x x x PL x x x x X x x SI x x x x X x x ES x x x x X x x x x x CH x x x x X x x x x UK x x x x X x x 3.2 Next Steps ENISA has compiled this report together with the NCSS working group to offer visibility to the relevant stakeholders of the Member States to understand the different approaches in the implementation of a strategy. Of course each approach is different as they are tailored to the needs of each state. This document presented 15 MS and how they structure critical information infrastructures protection governance models. ENISA will continue offering support to the MS by issuing similar short papers that can be of value for the stakeholders designing and implementing a strategy and its specific components. 18
19 Special thanks to: ENISA Authors: Dimitra Liveri, Anna Sarri, Critical Infrastructures and Services Unit, ENISA. This work has been carried out in collaboration with the National Cyber Securities Strategies Working Group. We would like to thank the WG for the valuable input and feedback and in particular: Anita Tikos, Ministry of Interior, National Electronic Information Security Authority, HU Antonis Antoniades, Electronic Communications and Postal Regulation, CY Daniel Bagge, National Security Authority, CZ Elīna Neimane, Ministry of Defence, LV Emma Dickens, Cyber Crime Office for Cyber Security and Information Assurance, UK Jos Leenheer, Ministry of Security and Finance, NL Krzysztof Silicki, NASK Institute, Poland; ENISA MB & EB, PL Liina Areng, RIA, EE López Gil, María del Mar, National security depoartment- presidency of the government cabninet, ES Marjan Kavcic, Ministry of Education, Science and Sports, SI Peter Knøster, Danish Defense Intelligence Service Centre for Cyber Security, DK Roman Packa, National Security Authority, CZ Stefanie Frey, MELANI, CH Timo Mischitz, Federal Chancellery, AT Timo Kievari, Ministry of transport and communications, FI Tomas Stamulis, Ministry of National Defence, LT Yann Salamon, ANSSI, FR 19
Cyberspace Situational Awarness in National Security System
Cyberspace Situational Awarness in National Security System Rafał Piotrowski, Joanna Sliwa, Military Communication Institute C4I Systems Department Zegrze, Poland, [email protected], [email protected]
Cybersecurity Strategy of the Republic of Cyprus
Policy Document Cybersecurity Strategy of the Republic of Cyprus Network and Information Security and Protection of Critical Information Infrastructures Version 1.0 23 April 2012 TABLE OF CONTENTS EXECUTIVE
National Cyber Security Strategies
May 2012 National Cyber Security Strategies About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is
EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013
EU Priorities in Cybersecurity Steve Purser Head of Core Operations Department June 2013 Agenda About ENISA The EU Cyber Security Strategy Protecting Critical Information Infrastructure National & EU Cyber
On the European experience in critical infrastructure protection
DCAF a centre for security, development and the rule of law On the European experience in critical infrastructure protection Valeri R. RATCHEV [email protected] @ratchevv DCAF/CSDM 1 This presentation
Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015
Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015 European Union Agency for Network and Information Security Summary 1 Presentation
Achieving Global Cyber Security Through Collaboration
Achieving Global Cyber Security Through Collaboration Steve Purser Head of Core Operations Department December 2013 European Union Agency for Network and Information Security www.enisa.europa.eu Agenda
Cyber Security Strategy
2014 2017 Cyber Security Strategy Ministry of Economic Affairs and Communication 2014 TABLE OF CONTENTS Introduction... 2 1. Analysis of current situation... 2 1.1. Sectoral progress... 2 1.2. Trends...
GOVERNMENT OF THE REPUBLIC OF LITHUANIA
GOVERNMENT OF THE REPUBLIC OF LITHUANIA RESOLUTION NO 796 of 29 June 2011 ON THE APPROVAL OF THE PROGRAMME FOR THE DEVELOPMENT OF ELECTRONIC INFORMATION SECURITY (CYBER-SECURITY) FOR 20112019 Vilnius For
Cyber Security Strategy for Germany
Cyber Security Strategy for Germany Contents Introduction 2 IT threat assessment 3 Framework conditions 4 Basic principles of the Cyber Security Strategy 4 Strategic objectives and measures 6 Sustainable
CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES
CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES By Wolfgang Röhrig, Programme Manager Cyber Defence at EDA and Wg Cdr Rob Smeaton, Cyber Defence Staff Officer
Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security
Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security www.enisa.europa.eu European Union Agency for Network and Information
PROJECT: EURO-AUDITS THE EUROPEAN ROAD SAFETY AUDITOR TRAINING SYLLABUS APPENDIX E SURVEY RESULTS. October 2007
PROJECT: EURO-AUDITS THE EUROPEAN ROAD SAFETY AUDITOR TRAINING SYLLABUS APPENDIX E SURVEY RESULTS October 2007 A European Commission co-funded project Appendix E Survey Results Contents: Survey Results
SURVEY ON THE TRAINING OF GENERAL CARE NURSES IN THE EUROPEAN UNION. The current minimum training requirements for general care nurses
SURVEY ON THE TRAINING OF GENERAL CARE NURSES IN THE EUROPEAN UNION This survey serves as a background document for the discussion of the Commission's legislative proposal to modernize the minimum requirements
European judicial training 2014. Justice
European judicial training 2014 Justice Europe Direct is a service to help you find answers to your questions about the European Union. Freephone number (*): 00 800 6 7 8 9 10 11 (*) Certain mobile telephone
ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY AND DEFENCE SECTOR REFORM
Information & Security: An International Journal Valentyn Petrov, vol.31, 2014, 73-77 http://dx.doi.org/10.11610/isij.3104 ESTABLISHING A NATIONAL CYBERSECURITY SYSTEM IN THE CONTEXT OF NATIONAL SECURITY
HOW COMPANIES INFLUENCE OUR SOCIETY: CITIZENS VIEW
Flash Eurobarometer HOW COMPANIES INFLUENCE OUR SOCIETY: CITIZENS VIEW REPORT Fieldwork: October-November 2012 Publication: April 2013 This survey has been requested by the European Commission, Directorate-General
Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary
Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.
COOPERATION AGREEMENT ON A CIVIL GLOBAL NAVIGATION SATELLITE SYSTEM (GNSS) BETWEEN THE EUROPEAN COMMUNITY AND ITS MEMBER STATES AND UKRAINE
85 der Beilagen XXIII. GP - Staatsvertrag - 04 Vertragstext englisch - EN (Normativer Teil) 1 von 21 COOPERATION AGREEMENT ON A CIVIL GLOBAL NAVIGATION SATELLITE SYSTEM (GNSS) BETWEEN THE EUROPEAN COMMUNITY
Multi-Jurisdictional Study: Cloud Computing Legal Requirements. Julien Debussche Associate January 2015
Multi-Jurisdictional Study: Cloud Computing Legal Requirements Julien Debussche Associate January 2015 Content 1. General Legal Framework 2. Data Protection Legal Framework 3. Security Requirements 4.
5581/16 AD/NC/ra DGE 2
Council of the European Union Brussels, 21 April 2016 (OR. en) Interinstitutional File: 2013/0027 (COD) 5581/16 LEGISLATIVE ACTS AND OTHER INSTRUMTS Subject: TELECOM 7 DATAPROTECT 6 CYBER 4 MI 37 CSC 15
CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD
CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 2015 PERIOD The 2011 2015 Cyber Security Strategy of the Czech Republic is linked to the Security Strategy of the Czech Republic and reflects
National Cyber Security Strategies. Practical Guide on Development and Execution
National Cyber Security Strategies December 2012 National Cyber Security Strategies National Cyber Security Strategies I About ENISA The European Network and Information Security Agency (ENISA) is a centre
National Cyber Security Strategy 2015-2017
National Cyber Security Strategy 2015-2017 Table of Contents Table of Contents...i Executive Summary... 1 1. Introduction... 2 2. Context - People, Economy, and State... 4 3. Guiding Principles... 10 4.
Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND ICT SECURITY
Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND ICT SECURITY December 2013 Presidency of the Council of Ministers THE NATIONAL PLAN FOR CYBERSPACE PROTECTION AND
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA
NATIONAL CYBERSECURITY STRATEGIES: AUSTRALIA AND CANADA JOÃO MANUEL ASSIS BARBAS Coronel de Artilharia. Assessor de Estudos do IDN INTRODUCTION Globalization and information and communication technologies
Stocktaking, Analysis and Recommendations on the Protection of CIIs JANUARY 2016. European Union Agency For Network And Information Security
Stocktaking, Analysis and Recommendations on the Protection of CIIs JANUARY 2016 www.enisa.europa.eu European Union Agency For Network And Information Security About ENISA The European Union Agency for
Methodologies for the identification of Critical Information Infrastructure assets and services
Methodologies for the identification of Critical Information Infrastructure assets and services Guidelines for charting electronic data communication networks European Union Agency for Network and Information
How To Write An Article On The European Cyberspace Policy And Security Strategy
EU Cybersecurity Policy & Legislation ENISA s Contribution Steve Purser Head of Core Operations Oslo 26 May 2015 European Union Agency for Network and Information Security Agenda 01 Introduction to ENISA
Response to the European Commission s consultation on the legal framework for the fundamental right to protection of personal data
Stockholm: Göteborg: Malmö: 105 24 Stockholm Box 57 Box 4221 Fax 08 640 94 02 401 20 Göteborg 203 13 Malmö Plusgiro: 12 41-9 Org. Nr: 556134-1248 www.intrum.se Bankgiro: 730-4124 [email protected] Response
CIIP Governance in the European Union Member States (Annex) JANUARY 2016. European Union Agency For Network And Information Security
CIIP Governance in the European Union Member States (Annex) JANUARY 2016 www.enisa.europa.eu European Union Agency For Network And Information Security About ENISA The European Union Agency for Network
REPUBLIC OF POLAND Ministry of Administration and Digitisation, Internal Security Agency CYBERSPACE PROTECTION POLICY OF THE REPUBLIC OF POLAND
REPUBLIC OF POLAND Ministry of Administration and Digitisation, Internal Security Agency CYBERSPACE PROTECTION POLICY OF THE REPUBLIC OF POLAND REPUBLIC OF POLAND Ministry of Administration and Digitisation,
SUMMARY OF THE ESTONIAN INFORMATION SYSTEM S AUTHORITY ON ENSURING CYBER SECURITY IN 2012
SUMMARY OF THE ESTONIAN INFORMATION SYSTEM S AUTHORITY ON ENSURING CYBER SECURITY IN 2012 Cyberspace is both an ecosystem consisting of an infrastructure and services, and an environment where and through
Update on U.S. Critical Infrastructure and Cybersecurity Initiatives
Update on U.S. Critical Infrastructure and Cybersecurity Initiatives Presented to Information Security Now! Seminar Helsinki, Finland May 8, 2013 MARK E. SMITH Assistant Director International Security
THE CRITICAL ROLE OF EDUCATION IN EVERY CYBER DEFENSE STRATEGY
THE CRITICAL ROLE OF EDUCATION IN EVERY CYBER DEFENSE STRATEGY Juan Cayón Peña, PhD. & Luis Armando García Abstract: The implementation, maintenance, and improvement of a national Cyber defense strategy
Andreas MAUSOLF Customs Liaison, Mass Marketing Fraud & Environmental Crime Fraud Unit (O28) Serious Organised Crime Department Europol
Andreas MAUSOLF Customs Liaison, Mass Marketing Fraud & Environmental Crime Fraud Unit (O28) Serious Organised Crime Department Europol Europol Unclassified - Basic Protection Level Aspects of Information
Cooperation in Securing National Critical Infrastructure
Cooperation in Securing National Critical Infrastructure Dr. Steve Purser Head of Core Operations Department European Network and Information Security Agency Agenda About ENISA Protecting Critical Information
ANALYSIS OF THE STAKEHOLDER CONSULTATION ON
ANALYSIS OF THE STAKEHOLDER CONSULTATION ON Science and Technology, the key to Europe s future: guidelines for future European policy to support research COM(353)2004 DG Research, European Commission,
EU Directive on Network and Information Security SWD(2013) 31 & SWD(2013) 32. A call for views and evidence
EU Directive on Network and Information Security SWD(2013) 31 & SWD(2013) 32 A call for views and evidence 22 nd May 2013 Contents Contents... 2 Overview: The EU Directive on Network and Information Security...
EUROPE 2020 TARGET: EARLY LEAVERS FROM EDUCATION AND TRAINING
EUROPE 2020 TARGET: EARLY LEAVERS FROM EDUCATION AND TRAINING By 2020, the share of early leavers from education and training (aged 18-24) should be less than 10% Early school leaving 1 is an obstacle
INVESTING IN INTANGIBLES: ECONOMIC ASSETS AND INNOVATION DRIVERS FOR GROWTH
Flash Eurobarometer INVESTING IN INTANGIBLES: ECONOMIC ASSETS AND INNOVATION DRIVERS FOR GROWTH REPORT Fieldwork: January February 213 Publication: May 213 This survey has been requested by the European
ENISA: Cybersecurity policy in Energy Dr. Andreas Mitrakas, LL.M., M.Sc., Head of Unit Quality & data mgt
ENISA: Cybersecurity policy in Energy Dr. Andreas Mitrakas, LL.M., M.Sc., Head of Unit Quality & data mgt Cyber European Union Security Agency for Network Energia, and Informa8on Rome, Security 24/09/15
Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary
Government Decision No. 1139/2013 (21 March) on the National Cyber Security Strategy of Hungary 1. The Government hereby approves the National Cyber Security Strategy of Hungary laid down in Annex No.
ITU National Cybersecurity/CIIP Self-Assessment Tool
ITU National Cybersecurity/CIIP Self-Assessment Tool ICT Applications and Cybersecurity Division Policies and Strategies Department ITU Telecommunication Development Sector April 2009 Revised Draft For
The Danish Cyber and Information Security Strategy
February 2015 The Danish Cyber and Information Security Strategy 1. Introduction In December 2014 the Government presented a National Cyber and Information Security Strategy containing 27 government initiatives
Family Law. Fieldwork: June 2006 Report: October 2006
The Gallup Organization Flash EB N o 188 Consular Protection and Family Law Flash Eurobarometer European Commission Family Law Summary Fieldwork: June 06 Report: October 06 Flash Eurobarometer 188 The
Freedom, Security, Privacy. European Home Affairs in an open world
Freedom, Security, Privacy European Home Affairs in an open world istockphoto.com/frankydemeyer, sam.7 Report of the Informal High Level Advisory Group on the Future of European Home Affairs Policy ( The
Family Law. Analytical Report
Flash Eurobarometer European Commission Family Law Analytical Report Fieldwork: June 2006 Report: October 2006 Flash Eurobarometer 188 The Gallup Organization This survey was requested by Directorate-General
THE ROLE OF PUBLIC SUPPORT IN THE COMMERCIALISATION OF INNOVATIONS
Flash Eurobarometer THE ROLE OF PUBLIC SUPPORT IN THE COMMERCIALISATION OF INNOVATIONS REPORT Fieldwork: January February 2014 Publication: May 2014 This survey has been requested by the European Commission,
OUTCOME OF PROCEEDINGS
Council of the European Union Brussels, 18 November 2014 15585/14 COPS 303 POLMIL 103 CYBER 61 RELEX 934 JAI 880 TELECOM 210 CSC 249 CIS 13 COSI 114 OUTCOME OF PROCEEDINGS From: Council On: 17 18 November
Icelandic National Cyber Security Strategy 2015 2026 Plan of action 2015 2018
Icelandic National Cyber Security Strategy 2015 2026 Plan of action 2015 2018 Summary in English of the Icelandic National Cyber Security Strategy approved by the Minister of the Interior in April 2015
INNOBAROMETER 2015 - THE INNOVATION TRENDS AT EU ENTERPRISES
Eurobarometer INNOBAROMETER 2015 - THE INNOVATION TRENDS AT EU ENTERPRISES REPORT Fieldwork: February 2015 Publication: September 2015 This survey has been requested by the European Commission, Directorate-General
Cybersecurity and the Romanian business environment in the regional and European context
KPMG Legal Cybersecurity and the Romanian business environment in the regional and European context Developing a cybersecurity culture for the users of digital and communications systems has become a mandatory
2 Gabi Siboni, 1 Senior Research Fellow and Director,
Cyber Security Build-up of India s National Force 2 Gabi Siboni, 1 Senior Research Fellow and Director, Military and Strategic Affairs and Cyber Security Programs, Institute for National Security Studies,
Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28),
Germany: Report on Developments in the Field of Information and Telecommunications in the Context of International Security (RES 69/28), General appreciation of the issues of information security Information
The UK cyber security strategy: Landscape review. Cross-government
REPORT BY THE COMPTROLLER AND AUDITOR GENERAL HC 890 SESSION 2012-13 12 FEBRUARY 2013 Cross-government The UK cyber security strategy: Landscape review 4 Key facts The UK cyber security strategy: Landscape
Official Journal of the European Union
ISSN 1977-091X Official Journal C 76 A of the European Union English edition Information and Notices Volume 55 15 March 2012 Notice No Contents Page V Announcements ADMINISTRATIVE PROCEDURES European Personnel
National Cyber Security Policy -2013
National Cyber Security Policy -2013 Preamble 1. Cyberspace 1 is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information
Public consultation on the contractual public-private partnership on cybersecurity and possible accompanying measures
Public consultation on the contractual public-private partnership on cybersecurity and possible accompanying measures Fields marked with are mandatory. Public consultation on the contractual public-private
Action Plan 2010-2015 for Canada s Cyber Security Strategy
Action Plan -2015 for Canada s Cyber Security Strategy Her Majesty the Queen in Right of Canada, 2013 Cat: PS9-1/2013E-PDF ISBN: 978-1-100-21895-3 ii Introduction Information technology is highly integrated
European Centre for Information Policy and Security (ECIPS) DO NOT COPY! PROPERTY OF ECIPS
European Centre for Information Policy and Security (ECIPS) DO NOT COPY! PROPERTY OF ECIPS Due to the authority vested in the European Centre for Information Policy and Security (ECIPS) Decree / Statute
For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE. Cyber Security
For Discussion Paper No. 9/2011 on 3 November 2011 DIGITAL 21 STRATEGY ADVISORY COMMITTEE Cyber Security Purpose This paper briefs Members on the global cyber security outlook facing governments of some
EXECUTIVE SUMMARY. Measuring money laundering at continental level: The first steps towards a European ambition. January 2011 EUROPEAN COMMISSION
MONEY LAUNDERING IN EUROPE Measuring money laundering at continental level: The first steps towards a European ambition EXECUTIVE SUMMARY January 2011 EUROPEAN COMMISSION DG HOME AFFAIRS FIGHT AGAINST
Section A: Introduction, Definitions and Principles of Infrastructure Resilience
Section A: Introduction, Definitions and Principles of Infrastructure Resilience A1. This section introduces infrastructure resilience, sets out the background and provides definitions. Introduction Purpose
Government Decree No. 29/2008. (II. 19.) on the Powers and Competences of the Minister Heading the Prime Minister s Office
Government Decree No. 29/2008. (II. 19.) on the Powers and Competences of the Minister Heading the Prime Minister s Office Acting pursuant to Paragraph 3 Article 28 of Act LVII of 2006 on the Central Administration
THE STRATEGIC POLICING REQUIREMENT. July 2012
THE STRATEGIC POLICING REQUIREMENT July 2012 Contents Foreward by the Home Secretary...3 1. Introduction...5 2. National Threats...8 3. Capacity and contribution...9 4. Capability...11 5. Consistency...12
Briefing note. Survey of environmental liability insurance developments
Briefing note Survey of environmental liability insurance developments June 2014 Introduction This paper responds to the consideration by the European Commission (EC) of a possible EU-wide compulsory insurance
National Cyber Security Strategy 2
National Cyber Security Strategy 2 From awareness to capability Ministerie van Volksgezondheid, Welzijn en Sport Titel brochure hier invullen 1 2 National Cyber Security Strategy (NCSS) 2 From awareness
Polish Financial Supervision Authority. Guidelines
Polish Financial Supervision Authority Guidelines on the Management of Information Technology and ICT Environment Security for Insurance and Reinsurance Undertakings Warsaw, 16 December 2014 Table of Contents
REPORT FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL
EUROPEAN COMMISSION Brussels, 25.9.2014 COM(2014) 592 final REPORT FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT AND THE COUNCIL on the implementation in the period from 4 December 2011 until 31 December
User language preferences online. Analytical report
Flash Eurobarometer 313 The Gallup Organization Flash Eurobarometer European Commission User language preferences online Analytical report Fieldwork: January 2011 Publication: May 2011 This survey was
National Cyber Security Strategy of Afghanistan (NCSA)
Islamic Republic of Afghanistan Ministry of Communications and IT National Cyber Security Strategy of Afghanistan (NCSA) Prevention Protection Safety Resiliency AUTHOR VERSION CONTROL DATE ZMARIALAI WAFA
Statistics on Requests for data under the Data Retention Directive
Statistics on Requests for data under the Data Retention Directive Introduction 1. Directive 2006/24/EC on data retention ('the DRD') 1 requires Member States to provide the Commission on a yearly basis
Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL
EUROPEAN COMMISSION Brussels, XXX [ ](2012) XXX draft Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL concerning measures to ensure a high common level of network and information
Implementing the cooperation mechanisms of the RES directive current status and open questions
Implementing the cooperation mechanisms of the RES directive current status and open questions Corinna Klessmann, Ecofys Germany RE-SHAPING Workshop, Vilnius, 16.05.2011 Supported by Intelligent Energy
National Security Auditing Criteria (KATAKRI) version II, 2011
FINNISH NATIONAL SECURITY AUTHORITY National Security Auditing Criteria (KATAKRI) version II, 2011 This translation of the Finnish KATAKRI criteria has been slightly modified from the national version
Cyber security initiatives in European Union and Greece The role of the Regulators
Cyber security initiatives in European Union and Greece The role of the Regulators Constantinos Louropoulos President of Hellemic Telecoms and Post Commission Agenda Cyberspace challenges EU security initiatives
ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT
2 OECD RECOMMENDATION OF THE COUNCIL ON THE PROTECTION OF CRITICAL INFORMATION INFRASTRUCTURES ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT The OECD is a unique forum where the governments of
CYBER SECURITY. Marcin Olender Head of Unit Information Society Department
CYBER SECURITY Marcin Olender Head of Unit Information Society Department 1 MINISTRY OF ADMINISTRATION AND DIGITIZATION OF POLAND The areas of our activity: The Ministry was established on 18 November
Final Draft/Pre-Decisional/Do Not Cite. Forging a Common Understanding for Critical Infrastructure. Shared Narrative
Final Draft/Pre-Decisional/Do Not Cite Forging a Common Understanding for Critical Infrastructure Shared Narrative March 2014 1 Forging a Common Understanding for Critical Infrastructure The following
How To Strengthen Nuclear Security
COUCIL OF TH UROPA UIO N The Hague, 25 March 2014 8193/14 (OR. en) PRSS 187 The Hague uclear Security Summit Communiqué We, the leaders, met in The Hague on 24 and 25 March 2014 to strengthen nuclear security,
How To Understand And Understand The European Priorities In Information Security
European priorities in information security Graeme Cooper Head of Public Affairs Unit, ENISA 12th International InfoSec and Data Storage Conference, 26th September 2013, Sheraton Hotel, Sofia, Bulgaria
ROADMAP. Proposal on a European Strategy for Internet Security
TITLE OF THE INITIATIVE ROADMAP Proposal on a European Strategy for Internet Security TYPE OF INITIATIVE xcwp Non-CWP Implementing act/delegated act LEAD DG RESPONSIBLE UNIT INFSO A3 EXPECTED DATE OF ADOPTION
Emergency Management and Business Continuity Policy
www.surreycc.gov.uk Making Surrey a better place Emergency Management and Business Continuity Policy 4 TH EDITION June 2011 Title Emergency Management and Business Continuity Policy Version 4.0 Policy
OPINION OF THE EUROPEAN CENTRAL BANK
EN ECB-PUBLIC OPINION OF THE EUROPEAN CENTRAL BANK of 2 October 2012 on preparations and legal amendments required for the introduction of the euro (CON/2012/73) Introduction and legal basis On 20 July
Securities markets regulators in transition
Securities markets regulators in transition Below is a list of the securities regulators, in the EBRD region with summaries of their objectives and competencies (plus links to the website): [Note: If you
Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation
Commonwealth Approach to Cybergovernance and Cybersecurity By the Commonwealth Telecommunications Organisation Trends in Cyberspace Cyberspace provides access to ICT Bridging the digital divide and influencing
Finland must take a leap towards new innovations
Finland must take a leap towards new innovations Innovation Policy Guidelines up to 2015 Summary Finland must take a leap towards new innovations Innovation Policy Guidelines up to 2015 Summary 3 Foreword
Honourable members of the National Parliaments of the EU member states and candidate countries,
Speech by Mr Rudolf Peter ROY, Head of division for Security Policy and Sanctions of the European External Action Service, at the L COSAC Meeting 29 October 2013, Vilnius Honourable members of the National
CABINET OFFICE THE CIVIL SERVICE NATIONALITY RULES
ANNEX A CABINET OFFICE THE CIVIL SERVICE NATIONALITY RULES Introduction The Civil Service Nationality Rules concern eligibility for employment in the Civil Service on the grounds of nationality and must
PROJECT FICHE 3.2.1.2
PROJECT FICHE 3.2.1.2 TO ACTION PROGRAMME 2005 FOR THE FORMER YUGOSLAV REPUBLIC OF MACEDONIA Title Combating money laundering (phase II) Total cost EC contribution: 1.5 million (approx) Aid Method Project
Cyber Europe 2012. Key Findings and Recommendations
Cyber Europe 2012 December 2012 On National and International Cyber Exercises S I Acknowledgements ENISA wishes to thank all persons and organisations which have contributed to this exercise. In particular,
CENTRAL BANK OF KENYA (CBK) PRUDENTIAL GUIDELINE ON BUSINESS CONTINUITY MANAGEMENT (BCM) FOR INSTITUTIONS LICENSED UNDER THE BANKING ACT
CENTRAL BANK OF KENYA (CBK) PRUDENTIAL GUIDELINE ON BUSINESS CONTINUITY MANAGEMENT (BCM) FOR INSTITUTIONS LICENSED UNDER THE BANKING ACT JANUARY 2008 GUIDELINE ON BUSINESS CONTINUITY GUIDELINE CBK/PG/14
Public Private Partnerships and National Input to International Cyber Security
Public Private Partnerships and National Input to International Cyber Security 10 September 2009 Tallinn, Estonia Maeve Dion Center for Infrastructure Protection George Mason University School of Law Arlington,
Responsible Research and Innovation (RRI), Science and Technology
Special Eurobarometer 401 Responsible Research and Innovation (RRI), Science and Technology REPORT Fieldwork: April - May 2013 Publication: November 2013 This survey has been requested by the European
PROTECTION OF CRITICAL INFRASTRUCTURE AND THE ROLE OF INVESTMENT POLICIES RELATING TO NATIONAL SECURITY. May 2008
PROTECTION OF CRITICAL INFRASTRUCTURE AND THE ROLE OF INVESTMENT POLICIES RELATING TO NATIONAL SECURITY May 2008 This report is published under the OECD Secretariat's responsibility and was prepared by
DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS
DECLARATION STRENGTHENING CYBER-SECURITY IN THE AMERICAS INTER-AMERICAN COMMITTEE AGAINST TERRORISM (CICTE) TWELFTH REGULAR SESSION OEA/Ser.L/X.2.12 7 March, 2012 CICTE/DEC.1/12 rev. 1 Washington, D.C.
