TESTA NG. Testa new generation Pieter.wellens@ec.europa.eu



Similar documents
How To Be A Successful Member Of The European Agency For Security And Safety

The IDA Catalogue. of GENERIC SERVICES. Interchange of Data between Administrations

The STAGEnet Security Model

How To Choose A Network Firewall

Developing the Corporate Security Architecture. Alex Woda July 22, 2009

How to ensure control and security when moving to SaaS/cloud applications

Securing the Service Desk in the Cloud

BMC s Security Strategy for ITSM in the SaaS Environment

Cloud-Security: Show-Stopper or Enabling Technology?

Next Generation Network Firewall

Accessing and sending data securely across security domains

The Cloud Backup Opportunity

Recommendations for companies planning to use Cloud computing services

How To - Setup Cyberoam VPN Client to connect to a Cyberoam for the remote access using preshared key

Enterprise Architecture Review Checklist

Training courses 2015/2016

Agenda. Cyber Security: Potential Threats Impacting Organizations 1/6/2015. January 10, 2015 Scott Petree

RESPONSE TO RFP COMMITTEE MANAGEMENT SOFTWARE SOLUTION. Prepared for Brigham Young University. April 21, 2015

Network Services Internet VPN

Cloud Cube Model: Selecting Cloud Formations for Secure Collaboration

Private vs. Public Cloud Solutions

Acano solution. Security Considerations. August E

Intelligent Solutions for the Highest IT Security Requirements

How To Setup Cyberoam VPN Client to connect a Cyberoam for remote access using preshared key

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

HEC Security & Compliance

Cloud Services Overview

Time to Value: Successful Cloud Software Implementation

Agenda , Palo Alto Networks. Confidential and Proprietary.

For extra services running behind your router. What to do after IP change

Mobile Application Development Platform Comparison

Solving the Desktop Dilemma

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer

MOC 20413C: Designing and Implementing a Server Infrastructure

Recommended IP Telephony Architecture

Security Yokogawa Users Group Conference & Exhibition Copyright Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX - 1 -

Customer Service Description Next Generation Network Firewall

全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

Secondary DMZ: DMZ (2)

Internet Privacy Options

Securing Smart City Platforms IoT, M2M, Cloud and Big Data

Security Best Practices for Microsoft Azure Applications

Third party Web hosting services security Policy

Wireless Infusion Pumps: Securing Hospitals Most Ubiquitous Medical Device

Training Name Installing and Configuring Windows Server 2012

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

Information security controls. Briefing for clients on Experian information security controls

Cloud Service SLA Declaration

locuz.com Professional Services Security Audit Services

Brainloop Cloud Security

R3: Windows Server 2008 Administration. Course Overview. Course Outline. Course Length: 4 Day

Becloud. IaaS in the channel. Mar ch 13

What Cloud computing means in real life

Setting up Microsoft Office 365

Federal Aviation Administration. efast. Cloud Computing Services. 25 October Federal Aviation Administration

Enterprise Governance and Planning

Security Tool Kit System Checklist Departmental Servers and Enterprise Systems

Fortinet Solutions for Compliance Requirements

Intelligent Solutions for the Highest IT Security Demands

Security Design.

The Cloud in Regulatory Affairs - Validation, Risk Management and Chances -

Compliance and Unified Communication

MS Skype for Business and Lync. Integration Guide

Secure your cloud applications by building solid foundations with enterprise (security ) architecture

Network Configuration Settings

TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM

Course 20533: Implementing Microsoft Azure Infrastructure Solutions

Boosting Productivity and Innovation Through. Public Sector Compliant Cloud Services

Thales Service Definition for PSN Secure Gateway Service for Cloud Services

Evaluate the Usability of Security Audits in Electronic Commerce

FINRMFS9 Facilitate Business Continuity Planning and disaster recovery for a financial services organisation

Small Business Server Part 2

Security Considerations

Security Policy Revision Date: 23 April 2009

IT Audit in the Cloud

TONAQUINT DATA CENTER, INC. CLOUD SECURITY POLICY & PROCEDURES. Tonaquint Data Center, Inc Cloud Security Policy & Procedures 1

Managing and Maintaining Windows Server 2008 Servers

Designing and Implementing a Server Infrastructure

Microsoft SharePoint Architectural Models

VMware vcloud Air. Enterprise IT Hybrid Data Center TECHNICAL MARKETING DOCUMENTATION

Cisco Router and Security Device Manager (SDM)

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz , ICSG 2014

Preparing for GO!Enterprise MDM On-Demand Service

Cloud IaaS Migration Roadmap

The Role of Identity Enabled Web Services in Cloud Computing

CLOUD COMPUTING SERVICES CATALOG

VODACOM HANA CLOUD PLATFORM ERMANO QUARTERO HEAD OF PRODUCT VODACOM BUSINESS

arvato systems Globalized Data Center Service Solution the spirit of solutions

Setting Up an AS4 System

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Designing and Implementing a Server Infrastructure

FTP-Stream Data Sheet

Transcription:

TESTA NG Testa new generation Pieter.wellens@ec.europa.eu 2 nd International Conference on Cyber Crisis Cooperation and Exercises, 23-24 Sept 2013, Athens, Greece

Agenda Mission Challenges Experiences and concerns Collaborative process TESTA NG

Mission Facilitate cooperation between public administrations in various policy areas Consolidate existing networks by providing a secure, reliable and flexible communication service layer

Mission TESTA was born (Trans European Services for Telematics between Administrations)is a communication platform to exchange electronic data between European and Member States administrations in a secure, reliable and efficient way

Value-added Services Value-added Services Moving up the value chain TESTA TESTA-II stesta TESTA-NG 4th 4th Generation 3rd 3rd Generation Multiple Cloud Secure internet Additional services PKI, Video bridge, time stamping,... 2nd 2nd Generation Security EU Restricted Dedicated Support Central Services 1st 1st Generation IP VPN Ay2Any National Networks FR -Hub/Spokes Sectoral apps 1996 1996 2000 2000 2006 2006 2013 2013 2020 2020

Challenges EU is a mix of different cultures and a different country specific handling of information makes a common agreement on classification of information difficult Different security approaches in EU counties push at EU level to apply the most strict security measures Technical security implementations are often driven by political sensitivity and not by risk assessment and risk management

Experiences and concerns Security = End to end TRUST By implementing measures and policies By auditing By having agreements Bilateral Legal agreements Concern of legal requirements with regard to the handling of EU Classified Information (EUCI) with Member States, Third countries and International organizations

Experiences and concerns: Security accreditation Step 1. Initial Demand TSO (Technical System Owner) sends a formal request to Commission SAA (Security Accreditation Authority) Creation of SAP (Security Accreditation Panel) Step 2. Pre-Certification TSO provides SSRS, SecOPs, Crypto documents (procedures) to SAP Accreditation Panel approves SSRS Step 3. Evaluation - Certification SAP assesses the conformity between deployed system and documents ( SSRS, SecOPs, ) SAP produces statement of conformity (+ residual risks) Step 4. Accreditation SAP takes decision on accreditation and informs Commission SAA Commission SAA notifies the CSPAG (Commission security policy advisory Group) Step 5. LDCP accreditation (statement of compliance by NSA)

Experiences and concerns: Security accreditation (dixit HR/DS)

Experiences and concerns Dedicated and/or public network? Availability Today a public network like the Internet cannot give the contractual availability guarantee. Some applications like Schengen Information system require high availability. This results in commercial agreements and redundant infrastructure.

Experiences and concerns Dedicated and/or public network? Security Although theoretically confidentiality and integrity can be achieved via the appropriate mechanisms over a public network, in practice application owners impose the implantation of private networks.

TESTA NG: Collaborative process TESTA is by concept based on a collaborative approach Consequences: Agreements like MoU, Statement of compliance etc Setup of different working groups to prepare these documents (TESTA expert groups; Security Accreditation Panel) Difficulties: Achieve common agreement on the content of the agreements Signature at the same organisational level Lessons learned To have clear policies and measures understood and accepted by everybody before proceeding

TESTA NG: Requirements survey Information is requested to be protected from source to destination (End to End) From a security standpoint, the use of internet as an alternative transport network would be acceptable for a majority of the stakeholders. Data is often misclassified to be able to use stesta Additional security levels and services are highly desired. (security requirements in the future will be more stringent for some users). These additional security services should be on top of the current network security architecture. The usage of stesta is sometimes limited by the lack of common security policies and standards among countries.

TESTA NG: Requirements survey

TESTA NG: EuroDomain Security Operation centre EU Institutions EFTA countries EuroDomain EU Member States Central Services EU Agencies Ministries Ministries National Ministries or agency directly connected Restricted access Internet VPN

TESTA NG: EuroDomain Security based on risk assessment and management MPLS-based network Dedicated IP addressing IPSEC encryption Firewalling at all entry points IDS/IPS at all access points Dedicated security operations centre + Backup Dedicated central services domain + Backup DNS, mail relay, PKI, collaboration tool, web server, ftp Tested BCP

91 applications on EuroDomain Criminal Records System Prüm CECIS FIUnet ECB EESSI EURODAC SIGL Tachonet EURAMIS

TESTA NG: multiple clouds 97 sites 58 sites TESTA NG/ EuroDomain TESTA NG/ VIS TESTA NG/ SIS II TESTA NG SOC TESTA NG/ EUROPOL 47 (44+3) sites 50 sites (40+10) TESTA NG/ Council 30 sites

Questions