Download presentation
Presentation is loading. Please wait.
Published bySilas Gregory Modified over 9 years ago
1
Standardisation and regulation on information security Margus Püüa Head of Department Department of State Information Systems Ministry of Economic Affairs and Communications, Estonia
2
AGENDA Why standardisation and regulation? Legal acts and documentation Secure data exchange
3
INFORMATION SOCIETY In the information society, information is stored, changed and transmitted in a universal digital form In the information society, access to digital information is ensured for all members of society through data exchange network In the information society, routine intellectual work is left for machines In the information society, based on the above- mentioned conditions, the way of life is rational Valdo Praust „Infoühiskond ja selle teetähised” 1998 aastaraamat „Infotehnoloogia haldusjuhtimises”.
4
CONCLUSION: In the INFORMATION SOCIETY ordinary daily life depends, to a great extent, on the security of information systems!
5
OBJECTIVE: Despite the growth of cyber security problems in the world, ICT will continue to be one of the most important growth engines in Estonia
6
WHAT DO WE HAVE?
7
L EGISLATION and DOKUMENTATION Emergency Preparedness Act https://www.riigiteataja.ee/ert/act.jsp?id=965540 https://www.riigiteataja.ee/ert/act.jsp?id=965540 Estonian IT Architecture http://www.riso.ee/et/koosvoime/arhitektuur http://www.riso.ee/et/koosvoime/arhitektuur Estonian IT Interoperability Framework http://www.riso.ee/en/information-policy/interoperability http://www.riso.ee/en/information-policy/interoperability Information Security Interoperability Framework http://www.riso.ee/wiki/Versioon_2007-01-31 http://www.riso.ee/wiki/Versioon_2007-01-31 Government Regulation on establishing a system of security measures for information systems https://www.riigiteataja.ee/ert/act.jsp?id=791875 https://www.riigiteataja.ee/ert/act.jsp?id=791875
9
X-road is software, hardware and organisational methods for standardised usage of national databases Evidentiary Value and Integrity –All outgoing messages are signed. Signing keys are registered with third party –All incoming messages are logged. The message log is cryptographically protected. The intermediate hash values are periodically time-stamped by the X-Road central agency. –Message receiver can later prove with the help of the X-Road central agency when and by whom was the message sent. Availability - X-Road is built as a distributed system, with minimal number of central services –The directory service is built on top of Secure DNS (DNS-SEC). The usage of well-proven DNS protocol and implementation provides very robust, scalable directory service with built ‑ in caching and redundancy. Security extensions of the DNS (signed zones) ensure that the data cannot be tampered. –All X-Road servers have their own local caching DNS server that ensures the availability of directory information even in case of (partial) network outage Confidentiality –SSL protocol is used as a defence mechanism against external attackers. All exchanged data is encrypted. –Two level access rights control mechanism is used as a defence mechanism against internal attackers.
10
Thank you for your attention!
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.