Cloud Security Standardisation & Certification. Arjan de Jong Policy Advisor Information Security



Similar documents
ENISA and Cloud Security

ENISA and Cloud Security

Cloud and Critical Information Infrastructures

European Privacy Reporter

Role of contracts in Cloud Computing an Overview. Kevin McGillivray Doctoral Candidate (NRCCL)

Information Security Risks when going cloud. How to deal with data security: an EU perspective.

Implementation of eidas through Member States Supervisory Bodies

Standards for Cyber Security

Towards defining priorities for cybersecurity research in Horizon 2020's work programme Contributions from the Working Group on Secure ICT

COMMISSION STAFF WORKING DOCUMENT. Report on the Implementation of the Communication 'Unleashing the Potential of Cloud Computing in Europe'

EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013

Expert Group on Cloud Computing Services and Standards ( EGCCSS ) Formation of Working Groups

Data Breach Notification Duty. Dr. Elisabeth Thole 31 October 2015 UIA Valencia

EU Cybersecurity Strategy and Proposal for Directive on network and information security (NIS) {JOIN(2013) 1 final} {COM(2013) 48 final}

Taking on the Cloud Challenge in Europe

Unleashing the Potential of Cloud Computing in Europe - What is it and what does it mean for me?

Cooperation in Securing National Critical Infrastructure

Prof. Udo Helmbrecht

How To Write An Article On The European Cyberspace Policy And Security Strategy

Multi-Jurisdictional Study: Cloud Computing Legal Requirements. Julien Debussche Associate January 2015

Council of the European Union Brussels, 4 July 2014 (OR. en) Mr Uwe CORSEPIUS, Secretary-General of the Council of the European Union

European Commission initiatives on e- and mhealth

Overview. Data protection in a swirl of change Cloud computing. Software as a service. Infrastructure as a service. Platform as a service

European Cloud. Computing Strategy. State of play: Ken Ducatel DG CONNECT

Cloud Computing. and the European Strategy. State of play: Dan-Mihai CHIRILĂ DG CONNECT

COMMISSION REGULATION (EU) No /.. of XXX

European Cloud Computing. Strategy. Cloud standards. Ken Ducatel DG CONNECT

Building International Cooperation for Trustworthy ICT (BIC) Presented by: Michel Riguidel, Telecom Paris-Tech

Standards in the Digital Single Market: setting priorities and ensuring delivery

Article 29 Working Party Issues Opinion on Cloud Computing

The potential legal consequences of a personal data breach

How To Understand And Understand The European Priorities In Information Security

NIS Direktive und Europäische sicherheitsrelevante Projekte Udo Helmbrecht Executive Director, ENISA

ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012

EU Regulatory Trends in Data Protection & Cybersecurity What should be on the industry s agenda?

Incentives and barriers for the cyber insurance market in Europe

Working Group on. First Working Group Meeting

Cloud Security Introduction and Overview

WHITE PAPER Meeting European Data Protection and Security Requirements with CipherCloud Solutions

Cloud Standardization, Compliance and Certification. Class 2012 event 25.rd of October 2012 Dalibor Baskovc, CEO Zavod e-oblak

Personal data and cloud computing, the cloud now has a standard. by Luca Bolognini

Security incidents affecting personal data: an exploratory travel from technology to law (*under Chatham House Rule)

Purpose. Service Model SaaS (Applications) PaaS (APIs) IaaS (Virtualization) Use Case 1: Public Use Case 2: Use Case 3: Public.

The Education Fellowship Finance Centralisation IT Security Strategy

Achieving Global Cyber Security Through Collaboration

Legal Aspects of the MonIKA-Project - Privacy meets Cybersecurity

ENISA and Cloud Security

Summary of responses to the public consultation on Cloud computing run by CNIL from October to December 2011 and analysis by CNIL

The impact of the personal data security breach notification law

Written Contribution of the National Association of Statutory Health Insurance Funds of

Security breaches: A regulatory overview. Jonathan Bamford Head of Strategic Liaison

Cybersecurity. Cloud. and the. 4TH Annual NICE Workshop Navigating the National Cybersecurity Education InterState Highway September 2013

Cloud Security under Forthcoming Laws

Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) 2014: 245 incidents reported

Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL

Cloud computing and personal data protection. Gwendal LE GRAND Director of technology and innovation CNIL

Having regard to the Treaty on the Functioning of the European Union, and in particular Article 114 thereof,

An overview of Health Informatics Standards

Some Public Sector Cloud Views

Cloud for Europe trusted Cloud Services for the European market for public administrations

Mandate M-403: ehealth Interoperability. Karl Øyri Intervensjonseteret, Rikshospitalet HF

European Organization for Security (EOS) - Description and Envisaged Activities for 2012

Follow the trainer s instructions and explanations to complete the planned tasks.

How to ensure control and security when moving to SaaS/cloud applications

EU policy on Network and Information Security and Critical Information Infrastructure Protection

Proposal for a DIRECTIVE OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL

The Growth of the European Cybersecurity Market and of a EU Cybersecurity Industry

Response of the German Medical Association

Mitigating and managing cyber risk: ten issues to consider

How To Prevent Cyber Crime

The Keys to the Cloud: The Essentials of Cloud Contracting

Big Data, Big Risk, Big Rewards. Hussein Syed

Enhancing Cyber Security in Europe Dr. Cédric LÉVY-BENCHETON NIS Expert Cyber Security Summit 2015 Milan 16 April 2015

European Distribution System Operators for Smart Grids

Securing the Cloud Infrastructure

European perspectives in addressing sustainability in data centres (in context, in particular, of urban environments)

A7-0365/133

Cyber security in an organization-transcending way

WORK PROGRAMME NOVEMBER 2012

Global Efforts to Secure Cloud Computing

Briefly summarised, SURFmarket has submitted the following questions to the Dutch DPA:

ICT 6: Cloud computing

Security framework. Guidelines for trust services providers Part 1. Version 1.0 December 2013

Sofware Engineering, Services and Cloud Computing

Public consultation on the contractual public-private partnership on cybersecurity and possible accompanying measures

Summary of the Dutch Data Protection Authority s guidelines for the Data Breach Notification Act

Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security

European Union Agency for Network and Information Security ENISA ANNUAL REPORT

Cloud computing security in the Dutch Government

THE CLOUD: OPPORTUNITIES AND ISSUES

Council of the European Union Brussels, 5 March 2015 (OR. en)

Cloud for Europe lessons learned

Cyber Security Consultancy Standard. Version 0.2 Crown Copyright 2015 All Rights Reserved. Page 1 of 13

E-PRIVACY DIRECTIVE: Personal Data Breach Notification

National Cyber Security Policy -2013

DS : Trust eservices. The policy context: eidas Regulation

Hacks, apps and espionage - how protected are you against cyber crime? Top 10 Legal Need-to-Knows

COMMISSION RECOMMENDATION. of

Why & How Cloud computing is enabling the digital transformation of financial services institutions

ITL BULLETIN FOR MARCH 2012 GUIDELINES FOR IMPROVING SECURITY AND PRIVACY IN PUBLIC CLOUD COMPUTING

Transcription:

Cloud Security Standardisation & Certification Arjan de Jong Policy Advisor Information Security

Overview Economics of standardization and certification (EU) Legal requirements for (cloud) security International cloud context Dutch cloud context Conclusion

Economics of information security Nature of information security: the act of providing goods or services in the field of information security and not so much the outcome. After a security breach, it does not mean the information security service or product has not been delivered. (Thaw 2011) Market mechanisms (and failures) concerning information security Kox & Straathof (CBP; 2013)

Economics of (cloud) security standardization and certification Information asymmetry Adverse selection Moral hazard First-mover disadvantage Transaction costs Based on Kox & Straathof 2013

Possible solutions to counter: Information asymmetry Certification Minimum norms of security Security breach notification requirements First-mover disadvantage Coordination (with timetable) Transaction costs Standardized SLAs Based on Kox & Straathof 2013

Information Security Regulation Main categories of legal requirements Technical measures Organizational measures Notification requirements (conditional) Based on Thaw 2011

Information Security Regulation Information Security Production Lifecycle Planning stage Security / privacy by design Implementation and Maintenance stage Procedures, implemented measures Output stage Information security itself is the output, which can be present at all stages of the lifecycle Regulation targeted at the outcome stage can influence other stages in the lifecycle. E.g. Notification is only required when personal data is not encrypted. Result: controllers are given the incentive to encrypt their data, influencing the implementation and maintenance stage. Based on Thaw 2011

(EU) Legal requirements for (cloud) security Personally Identifiable Information (PII) Directive 95/46/EC Article 17 (1) Controller must implement appropriate technical and organizational measures With regard to the state of the art and the costs of implementation, it will have to ensure a level of security appropriate to the risks represented by the processing and nature of the personal data. Risk based Article 17 (2) Controller has to ensure that processor also complies and takes sufficient technical and organizational measures

Dutch Data Protection Authority Guidance on securing PII (2013) ISO 27001/27002 Web application guidelines National Cyber Security Centre Sectoral guidelines (NEN 7510; Healthcare)

Proposed General Data Protection Regulation Article 23 (privacy by design and default) (1) Having regard to the state of the art and cost of implementation At the time of the determination of the means of processing and at the time of processing itself Implement appropriate technical and organisational measures To meet the requirements of the regulation (2) Restrict processing to personal data necessary to achieve the specific purpose Do not collect or retain more personal data beyond the minimum necessary to achieve the specific purpose

Proposed General Data Protection Regulation (4) The Commission may lay down technical standards

Proposed General Data Protection Regulation Article 30 Comparable to article 17 Directive 95/46/EC (1) The controller and the processor shall implement appropriate technical and organisational measures to ensure a level of security appropriate to the risks represented by the processing and the nature of the personal data to be protected, having regard to the state of the art and the costs of their implementation. (2) Measures have to be taken based on a risk evaluation Demonstration of compliance? Role for certification or codes of conduct?

Article 31 Data breach notification to supervisory authority (1) In case of a data breach the controller has to inform the supervisory authority without undue delay (2) Processor has to alert and inform the controller immediately after establishment of a data breach (4) Documentation of breach (6) Standard forms for notification

Article 32 Data breach notification to the datasubject (1) Controller has to inform the datasubject without undue delay when the personal data breach is likely to [adversely/severly] affect the protection of the personal data or privacy of the data subject Give details on data protection officer and possible measures to mitigate negative consequences to the data subject Notification not required when appropriate technical measures have been taken. (e.g. adequately implemented encryption)

Non-PII specific Proposed Network and Information Security Directive (NIS) Requirements for market operators and public administrations Article 14 (Security & notification requirements) Public administrations and market operators have to take appropriate technical and organisational measures to manage the risks posed to the security of the networks and information systems which they control and use in their operations. Risk based Notification required to competent authority of incidents that have a significant impact on the security of their core services Article 16 (Standardisation of network and information security) Member States shall encourage the use of standards and/or specifications relevant to network and information security

European Cloud Strategy Cutting through the jungle of technical standards EU-wide certification schemes for trustworthy cloud providers Development of 'safe and fair' contact terms/slas European Cloud Partnership / Cloud for Europe

International developments European Cloud Partnership Steering board meeting Tallinn Estonia, 4 July 2013 Cloud for Europe Cloud for Europe Conference Berlin, 14-15 November 2013 ENISA Cloud Security WG Top 10 recommendations for deploying Governmental clouds ETSI Cloud Standards Coordination (Draft) Final Report, November 2013 Opinion European Parliament Committee on Legal Affairs on EU Cloud Strategy Calling for voluntary cloud certification (23 september 2013)

Dutch context Dutch Government reform program Dutch Governmental Cloud Strategy Dutch Standardization Policy

Dutch Government Reform Program Compact Government The Netherlands istrategy Efficiency Flexibility Modern IT landscape Central Government Reform Programme

Dutch Governmental Cloud Strategy 1 First phase is building a Closed Government Cloud (CGC) 2 Next phases growth in use and cloud offerings 3 Cloud First Strategy

Dutch Governmental Cloud Strategy Closed Governmental Cloud (CGC) Challenges Security Interoperability Data portability Reversibility Governance Functional goal architecture Approved June 27 2013 by the Board of CIOs from Central Government

Functional goal architecture Topics addressed: Datacenters; new Government network; Government Application Store; Government Workplace as a Service (DAAS) Selfservice Finance; pay per use Identity Management Data protection Cloud resources Connectivity Cloud Governance Cloud Standards

Dutch Standardization Policy Netherlands Openly Connected (-2011) Forum Standardisation List of open standards (public procurement) Apply or explain list e.g. DKIM, DNSSEC, ISO 27001/27002, SAML) Recommended open standards e.g. OAUTH, XML

Questions? Contact: Arjan de Jong, LLM Policy Advisor Information Security Arjan.Jong2@minbzk.nl Ministry of the Interior and Kingdom Relations, The Netherlands www.government.nl