EU R&D in cybersecurity's certification

Slides:



Advertisements
Similar presentations
Trusted Internet Connections. Background Pervasive and sustained cyber attacks against the United States continue to pose a potentially devastating impact.
Advertisements

Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Secure System Administration & Certification DITSCAP Manual (Chapter 6) Phase 4 Post Accreditation Stephen I. Khan Ted Chapman University of Tulsa Department.
Geneva, Switzerland, September 2014 ENISA role in ICT standardization Sławomir Górniak, ENISA ITU Workshop on “ICT.
National Information Assurance Partnership NIAP 2000 Building More Secure Systems for the New Millenium sm.
European Union Agency for Network and Information Security Follow ENISA: ENISA and standards Sławomir Górniak European Union Agency.
RETHINKING THE ELECTRICITY GRID RETHINKING THE ELECTRICITY GRID 14 May 2012 Presented by: PATRICIA DE SUZZONI ADVISOR TO THE CHAIR OF CRE (French Energy.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
EOSC Generic Application Security Framework
Don Von Dollen Senior Program Manager, Data Integration & Communications Grid Interop December 4, 2012 A Utility Standards and Technology Adoption Framework.
Test Organization and Management
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
The Value of Common Criteria Evaluations Stuart Katzke, Ph.D. Senior Research Scientist National Institute of Standards & Technology 100 Bureau Drive;
TM8104 IT Security EvaluationAutumn CC – Common Criteria (for IT Security Evaluation) The CC permits comparability between the results of independent.
ISPE Cyber Security S99 Update December 08, 2009.
Nairobi, Kenya, 30 – 31 July 2010 Measuring Interoparability: From Theory to Practice Dr. Ulrich Sandl, Head of Division Federal Ministry of Economics.
1. Contents Context for Strategy Development What We Did Progress and Next Steps 2.
SAM-101 Standards and Evaluation. SAM-102 On security evaluations Users of secure systems need assurance that products they use are secure Users can:
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
Privacy Audit and Privacy Seal Barbara Körffer & Dr. Thomas Probst Independent Centre for Privacy Protection Independent Centre for Privacy ProtectionSchleswig-Holstein.
Information Security tools for records managers Frank Rankin.
HHS Security and Improvement Recommendations Insert Name CSIA 412 Final Project Final Project.
The Future Digital Identity Landscape in Europe Timothée Mangenot, chairman 14th of December, 2015 ACSIEL partners day.
HORIZON 2020 Launch Conference 16 January 2014, Kyiv, Ukraine.
Serving society Stimulating innovation Supporting legislation Overview of Benchmarking Exercises 1 and 2 Zsuzsanna Gyenes, PhD European.
Protecting Data, Sharing Information Graham Wakerley: Director
Security and resilience for Smart Hospitals Key findings
Information ITIL Technology Infrastructure Library ITIL.
Opportunities and Challenges for the DSM
The Common Criteria for Information Technology Security Evaluation
BruinTech Vendor Meet & Greet December 3, 2015
Chapter 8 Environments, Alternatives, and Decisions.
Legacy and future of the World Data System (WDS) certification of data services and networks Dr Mustapha Mokrane, Executive Director, WDS International.
Cybersecurity - What’s Next? June 2017
Security Methods and Practice CET4884
IFATSEA General Assembly Keynote address Berlin, Germany November 2015
Qualifications and Curriculum Authority, London
PCD MEM Medical Device IT Management
Medical Device Cybersecurity Legislative Activities - Overview
NIST Cybersecurity Framework
HOSTED BY IN PARTNERSHIP WITH SUPPORTED BY Barcelona iCapital 2015.
I have many checklists: how do I get started with cyber security?
Forum for Air quality Modelling FAIRMODE ew. eea
Dan Tofan | Expert in NIS 21st Art. 13a WG| LISBON |
EOSCpilot Skills Landscape & Framework
David Sayago EU Research Funding Team Valorisation Centre.
General Services Department
Adaptation process of UN Regulation No. 132
An Urgent National Imperative
9th International Common Criteria Conference Report to IEEE P2600 WG
Indicative budget allocation: 29 MEuro
An Introduction to e-Assessment
CVE.
Cyber security Policy development and implementation
Cybersecurity ATD technical
The EU pilot programme on Environmental Technology Verification (ETV)
OIML Certification System (OIML-CS)
Commission position on Japan’s proposal on class 0
S3P Agri-Food Working Committee Meeting
Group Meeting Ming Hong Tsai Date :
Security for Safety: Enabling Digitalization of Railway Systems
IS4680 Security Auditing for Compliance
The SAFERtec project on V2I security assurance: concept and vision
Community of Users.
Commission report on Art. 8 WFD Monitoring programmes
ETSI Standardization Activities on Smart Grids
IT SECURITY EVALUATION ACCORDING TO HARMONIZED AND APPROVED CRITERIA
Access to data requirementS
CHARIOT-VESSEDIA Workshop 9 May 2019, Dublin, Ireland
General Services Department State Purchasing Division
Presentation transcript:

EU R&D in cybersecurity's certification EESC public hearing of 09.01.2018 Jean-Pierre Nordvik (HoU) and Gianmarco Baldini Space, Security and Migration Directorate Head of the Cyber and Digital Citizens’ Security Unit

Security Certification - Definition Certification: “A comprehensive assessment of the management, operational, and technical security controls in an information system, made in support of security accreditation, to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system” from NIST SP 800-37 12 November 2018

Certification Process (simplified, abstracted) Specific domain (e.g. IoT, IACS, C-ITS, Smart Grid …) Security Requirement Analysis Security Evaluation Certification Security Profile / Target Documentary compliance verification Testing activities (e.g. penetration tests) Evaluation of the product development Process … for a given environment Risk Analysis and Assurance level definition Compliance vs. existing standards Definition of Protection Profiles Product or Service Label 12 November 2018

State of play on security evaluation/certification standards (not exhaustive list) Body Domain Common Criteria CCRA/SOG-IS members Generic IT products CSPN French ANSSI BSI-Standard 100-2 IT Grundschutz German BSI UL Cyber security Assurance Program USA ISA/IEC 62433 International ICS GSMA Network Equipment Security GSMA/3GPP Telecom/Media FIPS 140-2 Cryptographic Modules 12 November 2018

Challenges/Issues on Security Evaluation Certification Point in time security certification. The security certification evaluates a particular version of the product in a certain configuration. Significant changes may invalidate the certification. Comparison and transparency to the user. Security certification documents are quite technical and sometimes not comparable among categories of products. Lack of well defined metrics makes difficult the assessment of the cost–benefit ratio for performing a security evaluation. Fragmentation across domains. CCRA and SOG-IS are good examples of efforts to mitigate fragmentation but there are still divergent activities. In many cases, security evaluation may be a costly and time consuming effort, which may not be appropriate for some categories of products. 12 November 2018

Main R&D areas Definition of adequate security metrics and benchmarks to support a quantitative evaluation of products Cost and time effective testing tools and processes based on formal or semi formal models (e.g., Model Based Testing) Improved re-evaluation and re-certification processes to address software updates (e.g., patching) Formal relationships between risks, vulnerabilities and security properties. 12 November 2018

Main R&D areas: model based testing Functional tests Manual execution & scripts for automation Test Repository (TTCN-3, Java…) Security needs & requirements Security Modeling for test generation Automatic test generation Risk Analysis Test Patterns Security Test Objectives MBT Tool 12 November 2018

European Cybersecurity certification schemes From (COM(2017) 477 Final, Proposal… on Information and Communication Technology cyber security certification (“Cybersecurity Act”): “The proposal does not introduce directly operational certification schemes for specific ICT products/services, but rather create a system (framework) for the establishment of specific certification schemes for specific ICT products and services (the “European cyber security certification schemes”)…” Meta framework (organizations, roles and processes) IACS Security evaluation and certification scheme IoT Security evaluation and certification scheme Road Transportation Security evaluation and certification scheme New Scheme Proposal for a new scheme

IACS Case Study (ICCF) 12 November 2018

A proposal for Labelling the products IACS Case Study (ICCF) A proposal for Labelling the products ICCF / ICCS-C1 Self Declaration of compliance The vendor hereby declares that they positively assessed this product against the IACS Common Cybersecurity Assessment Requirements selected in a Security Profile that can be consulted online on the IACS C&C EU Register. ICCS-C2 Independent Compliance Assessment Label ICCS-B Product Cyber Resilience Certificate ICCS-A Full Cyber Resilience Certificate 12 November 2018

IoT Case Study From Horizon 2020 ARMOUR project 12 November 2018

IoT Case Study Dealing with the IoT device lifecycle From Horizon 2020 ARMOUR project 12 November 2018

Other issues Security vs. Privacy. How to combine security and privacy requirements in the same certification process Liability. Does the new framework support distribution of liability in a fair way ? SME/Innovation. The new framework wishes to foster innovation in cyber security and support SME as well. How to deal with certification costs for SME ? Re-use of existing expertise and efforts done at national level. 12 November 2018

Stay in touch jean.pierre.nordvik@ec.europa.eu and gianmarco.Baldini@ec.europa.eu JRC Science Hub: ec.europa.eu/jrc Twitter: @EU_ScienceHub Facebook: EU Science Hub - Joint Research Centre LinkedIn: Joint Research Centre YouTube: EU Science Hub

Thank you for your attention. Joint Research Centre (JRC) Web: www.jrc.ec.europa.eu