Methodologies For The Identification of Critical Information Infrastructure Assets and Services PDF
Methodologies For The Identification of Critical Information Infrastructure Assets and Services PDF
December 2014
About ENISA
The European Union Agency for Network and Information Security (ENISA) is a centre of network and
information security expertise for the EU, its member states, the private sector and Europe’s citizens.
ENISA works with these groups to develop advice and recommendations on good practice in
information security. It assists EU member states in implementing relevant EU legislation and works
to improve the resilience of Europe’s critical information infrastructure and networks. ENISA seeks to
enhance existing expertise in EU member states by supporting the development of cross-border
communities committed to improving network and information security throughout the EU. More
information about ENISA and its work can be found at www.enisa.europa.eu.
Authors
Rossella Mattioli, Dr. Cédric Levy-Bencheton
Contact
For contacting the authors please use [email protected].
For media enquires about this paper, please use [email protected].
Acknowledgements
This work has been carried out in collaboration with OTEPlus, in particular: Kostas Panayotakis, Maria
Legal and George Papadopoulos.
We have received valuable input and feedback from the experts of the INFRASEC, ENISA Internet
Infrastructure security and resilience reference group, and all participants of the validation workshop
in Koln, Germany the 26th of September 2014.
We also like to thank the experts from the EU Critical Infrastructure point of contacts in each MS,
National Regulatory Authorities, Cyber Security Agencies, Network operators and operators of Critical
Infrastructures across EU and EFTA countries who participated at each part of this study and provided
great input and feedback.
Page ii
Methodologies for the identification of Critical Information Infrastructure assets
and services Guidelines for charting electronic data communication network
December 2014
Legal notice
Notice must be taken that this publication represents the views and interpretations of the authors and
editors, unless stated otherwise. This publication should not be construed to be a legal action of ENISA or the
ENISA bodies unless adopted pursuant to the Regulation (EU) No 526/2013. This publication does not
necessarily represent state-of the-art and ENISA may update it from time to time.
Third-party sources are quoted as appropriate. ENISA is not responsible for the content of the external
sources including external websites referenced in this publication.
This publication is intended for information purposes only. It must be accessible free of charge. Neither ENISA
nor any person acting on its behalf is responsible for the use that might be made of the information contained
in this publication.
Copyright Notice
© European Union Agency for Network and Information Security (ENISA), 2014
Reproduction is authorised provided the source is acknowledged.
ISBN 978-92-9204-106-9, doi 10.2824/38100
Page iii
Methodologies for the identification of Critical Information Infrastructure assets
and services Guidelines for charting electronic data communication network
December 2014
Executive summary
Communication networks are an important component of the life of millions of European citizens.
These networks represent the fabric of the future information society and provide the means for the
single digital market. Some parts of these communication networks are also vital for the operations
of Critical Infrastructures which are fundamental for the function of modern society.
An attack or a large scale outage affecting the communication networks assets supporting Critical
Infrastructure can have cascading effects and affect large part of the population or vital functions of
society. But which are exactly those network assets that can be identified as Critical Information
Infrastructure and how we can make sure they are secure and resilient?
This study aims to tackle the problem of identification of Critical Information Infrastructures in
communication networks. The goal is to provide an overview of the current state of play in Europe
and depict possible improvements in order to be ready for future threat landscapes and challenges.
As it was possible to underline, currently a significant number of Member States present a low level
of maturity and lack a structured approach regarding identification of Critical Information
Infrastructure in communication networks and this can pose severe risks regarding the everyday
increasing dependency of the vital functions of the society on these networks.
Moreover, based on the findings of the survey, the discussion with stakeholders and the analysis of
the different approaches already in place, it was possible to highlight the following challenges in
identifying CIIs assets and services:
detailed list of critical services is not always present and should be tailored per Member State
criticality criteria for the identification of critical assets is a challenging process especially
regarding internal and external interdependencies
effective collaboration between public sector and the private sector is fundamental in
identifying and protecting CII assets and services and should start from asset identification.
Considering this multi-layered and complex environment and raising threat scenarios, the following
recommendations emerged for Member State and operators of critical infrastructures to foster
security and resilience of CIIs over communication networks in Europe:
Member States should clearly identify Critical Information Infrastructures if not already covered in
their Critical Infrastructure activities. Not all MS have clearly defined the asset perimeter of Critical
Information Infrastructures. For this reason, if not already covered by the Critical Infrastructure
definition, Member states should clearly define which specific network assets are covered and should
be secure and resilient.
Member States who are starting to work on the identification of CII assets should cooperate with
stakeholders involved in the operations of Critical Information Infrastructures. Effective
collaboration between public sector (Government & mandated Agencies) and the private sector is
fundamental in protecting CII assets and services. For the identification of Critical Information
Infrastructures in communication networks, the involvement of two categories of stakeholders should
be pursued:
• operators of Critical Infrastructures
• network operators
Page iv
Methodologies for the identification of Critical Information Infrastructure assets
and services Guidelines for charting electronic data communication network
December 2014
Member States who are starting to work on the identification of CIIs should adopt a methodology
for the identification of critical network assets and services, using one or a mix of the proposed
solutions in this study that better fits the need of the MS. It is worth-noting that the purpose here is
to present the Member States with a portfolio of methodological approaches – rather than a one size
‘fits-all’ methodology – so that each Member State may choose the approach or a combination of
approaches that suits better to its own specific characteristics and needs.
Member States who base their identification of CIIs on critical services should develop a list of these
services and assess internal and external interdependencies. While assessing the criticality of
services, infrastructures and supporting network assets, MS should define criticality criteria in order to
identify the critical assets and examine the system in its entirety rather than per constituent. At least
four types of dependencies should be taken into consideration:
• Interdependencies within a critical sector (intra-sector)
• Interdependencies between critical sectors (cross-sector).
• Interdependencies among data network assets.
Moreover dependencies can be found at the national and international level (cross-border), further
complicating the task to have a complete overview.
Member States should foster baseline security guidelines for communication networks used for
critical services. To ensure the resilience of critical networks, the Critical Infrastructure operator or
asset owner should adopt security guidelines to be used also at procurement stage. For this reason a
checklist with baseline security guidelines for communication networks used for critical services should
be made available to align practices across the EU.
Member States should foster the adoption of automated procedures for CIIs tagging in order to be
prepared to face future challenges. To foster the security of critical networks, MS should work
together with CIIs asset owners in developing a common approach to the ‘Tagging’ of CII assets. This
could allow automated-prioritized handling of incidents affecting Critical Information infrastructures.
Page v
Methodologies for the identification of Critical Information Infrastructure assets
and services Guidelines for charting electronic data communication network
December 2014
Table of Contents
Executive summary iv
1 Introduction 1
Step 3: Identification of critical information infrastructure network assets and services supporting critical
services 16
Page vi
Methodologies for the identification of Critical Information Infrastructure assets
and services Guidelines for charting electronic data communication network
December 2014
6 Recommendations 27
References 28
Page vii
Methodologies for the identification of Critical Information Infrastructure assets
and services Guidelines for charting electronic data communication network
December 2014
1 Introduction
Communication networks are an important component of the life of millions of European citizens.
These networks represent the fabric of the future information society and provide the means for the
single digital market. Some parts of these communication networks are also vital for the operations
of Critical Infrastructures (CIs) which are fundamental for the function of modern society.
Every day, the majority of Critical Infrastructures such as water management, heating supply chains
and public transport systems among others, depend on the correct function of communication
networks that support their operations. These supportive systems and networks, commonly referred
to as Critical Information Infrastructures (CIIs), are core pillars for the function of the economy and
society and a cyber-attack or an outage affecting these assets and services could have cascading
effects on large part of the population1.
In order to properly identify and secure these critical network assets, ENISA focuses this year on how
Member States (MS) identify CIIs in communication networks in Europe.
The definition of CII is taken from the Council Directive 2008/114/EC on the identification and
designation of European Critical Infrastructures and the assessment of the need to improve their
protection2.‘’ICT systems that are Critical Infrastructures for themselves or that are essential for the
operation of Critical Infrastructures (telecommunications, computers/software, Internet, satellites,
etc.) “
1
Buldyrev, S. V., Parshani, R., Paul, G., Stanley, H. E., & Havlin, S. (2010). Catastrophic cascade of failures in
interdependent networks. Nature, 464(7291), 1025-1028.
2
European Commission. (2008). Council Directive 2008/114/EC of 8 December 2008 on the identification and
designation of European Critical Infrastructures and the assessment of the need to improve their protection.
Official Journal L, 345(23), 12.
Page 1
Methodologies for the identification of Critical Information Infrastructure assets
and services Guidelines for charting electronic data communication network
December 2014
In this report the centre of interest is communication networks, including the Internet, public data
communication networks and relevant assets in private data communication networks. The perimeter
of public versus private network infrastructure is depicted in the following table. Private networks can
be deployed within the private perimeter (e.g. LAN, Wi-Fi), as well as connecting private networks to
each other and to the external world. The separation between public and private is not necessarily
spatial (e.g. for wireless connectivity). Long distance (WAN) private networks are commonly available
to companies that operate transmission/transportation infrastructures, which can in parallel be used
for private communication network (e.g. fibre optic cable) deployment.
Figure 2: Perimeter of the study - Private and Public IP and data communication networks
Target audience
This document is aimed at Member States that are interested in identifying CIIs assets and services in
the area of communication networks. The target community consists of decision makers in mandated
agencies/functions or National Regulatory Authorities for communication networks (NRAs) in charge
of the definition of methodologies to identify Critical Information Infrastructures.
Goal
The goal of this study is to provide an overview of existing approaches in identification of CIIs across
Europe and understand the dynamics of this complex multi-layered environment which involves not
only operators of critical infrastructures but also network operators and mandated agencies. In doing
so, also gaps and future challenges will be underlined and recommendations will be proposed to foster
security and resilience of these critical communication networks. Specifically, this study investigates
how to
1. define Critical sectors and Critical services supported by electronic communication networks
2. identify CIIs assets and services which support these critical services
3. strengthen & protect the identified CII in concert with the asset owners.
Page 2
Methodologies for the identification of Critical Information Infrastructure assets
and services Guidelines for charting electronic data communication network
December 2014
From the point of view of CI/CII assets owners and operators, the objective is to support them in the
identification of their CIIs assets and ensure the protection of their critical assets in concert with the
mandated agency of the MS. The aim is to identify the network assets that needs to be secure, and in
case of outages, ensure resilient interconnections. In absence or with minimal availability, services
essential to Critical Infrastructures can severely hamper the functioning of society.
Methodology
The methodology for this study is organized in three steps:
1. Information gathering:
o Desktop research of 760 documents regarding MS legislation and initiatives in the
area of infrastructure security and resilience including identification of public and
private stakeholders being responsible for managing these initiatives, frameworks for
categorization of assets in electronic communication networks, with special focus on
CIIs and relevant research
o 35 online surveys answered by NRAs, Cyber Security Agencies, Contingency Agencies,
CERTs, network operators and operators of Critical Infrastructures
o 11 focused interviews performed with NRA, Cyber security Agencies, network
operators and operators of Critical Infrastructures.
2. Analysis: based on the result of the desktop research, an analysis was performed to identify
current maturity levels in identification of critical sectors, assets and services, good practises
and possible challenges.
3. Validation session: to validate the findings and propose a portfolio of solutions that would fit
all needs:
o Validation session workshop http://europa.eu/!qU87Rd with cyber security agencies,
network operators, operators of Critical Infrastructure and academia.
o Extensive online feedback via NRAs, Cyber Security Agencies, Network operators and
operators of Critical Infrastructures who participated at each part of the study, EU
Critical Infrastructure point of contacts in each MS and ENISA Internet Infrastructure
Security and Resilience Reference Group.
Page 3
Methodologies for the identification of Critical Information Infrastructure assets
and services Guidelines for charting electronic data communication network
December 2014
In the Green Paper on a European Programme for Critical Infrastructure Protection5, the European
Commission provides an indicative list of 11 critical sectors:
i. Energy
ii. Information, Communication Technologies (ICT)
iii. Water
iv. Food
v. Health
vi. Financial
3
Council Directive 2008/114/EC on the identification and designation of European Critical Infrastructures and
the assessment of the need to improve their protection :‘’ICT systems that are Critical Infrastructures for
themselves or that are essential for the operation of Critical Infrastructures (telecommunications,
computers/software, Internet, satellites, etc.) “
4
Centre for European Policy Studies (2010), “Protecting Critical Infrastructure in the EU”, CEPS Task Force
Report, 2010
5
Commission of the European Communities (2005), “Green Paper on a European Programme for Critical
Infrastructure Protection”, COM (2005) 576 final
Page 4
Methodologies for the identification of Critical Information Infrastructure assets
and services Guidelines for charting electronic data communication network
December 2014
AU
BE
Emergency
CZ
services
DK
EE Rescue services
FI
FR Industry
EL
HU Industry
IT
MT
NL
PL Rescue systems
SK Industry Postal
6
Information is presented for 17 EU Member States and Switzerland since for the remaining EU MS either no
information was found during the desktop research or the related information is available only in the local
language.
Page 5
Methodologies for the identification of Critical Information Infrastructure assets
and services Guidelines for charting electronic data communication network
December 2014
ES
Emergency
UK
services
CH
Industry
After the analysis of how CI are defined in the Member States that were studied, the following step
was to understand CII efforts and existing approaches to identify critical communication assets and
services.
Firstly, it was understood that the significance of CII Protection has been acknowledged by the
majority of the Member States. This has been dealt with either in the framework of their CI Protection
programmes and initiatives or as part of the development of their cybersecurity strategies. This means
that usually there are no dedicated strategies for the protection of CII but rather refinements and
adjustments are made to existing strategies and concepts on CI protection in order to accommodate
issues related to the protection of information infrastructure.
Secondly, based on the information gathered, it was possible to note that that there are different
maturity levels with regards to CII activities across the MS. On the basis of the collected information,
four different maturity levels could be defined as presented in the following table:
Identification of the ICT sector as one of the critical sectors that should be
addressed. Under this category may fall MS that have acknowledged the
Level 2
Information and Communication Technologies sector as one of the critical sectors
for the maintenance of the vital societal functions.
Development of a definition for CII and establishment of specific criteria for the
identification of CII assets. Under this category fall the Member States that are
Level 4
mostly advanced in the area of CIIP and have taken specific measures for the
identification and protection of CII assets.
Table 2: Maturity levels in identification of CIIs
These maturity levels range from the absence of activities related to the identification of CII to the
establishment of specific measures for the identification and protection of CII assets. Based on the
information gathered, it was possible to place the analysed MS on the following continuum that
represents their indicative state of the art.
Page 6
Methodologies for the identification of Critical Information Infrastructure assets
and services Guidelines for charting electronic data communication network
December 2014
As presented in this section, 17 Member States of the 23 covered in this study have addressed the
issue of identification of critical sectors. In these MS there is a list of critical sectors and in certain
cases also subsectors and related critical services. The lists have been prepared taking into account
national priorities, related EC Directives and specific country characteristics. A structured
methodology is present only in 5 MS while the other MS are either at the early stage of CII
identification or are defining the legislative decrees for the definition of the methodology in this
moment.
When focusing on identification of CIIs in the area of communication networks, from the online survey
and the follow-up interviews it was possible to identify that:
a significant number of Member States present a low level of maturity and lack a structured
approach
challenges are posed by the identification of critical services and the complexity of the
definition of criticality criteria in order to identify the critical assets.
there is the need for effective collaboration between public sector (Government &
mandated Agencies) and the private sector, which often controls numerous critical
infrastructures
The major considerations can be summarized as follows:
The differences observed in the CIIP maturity level across the various MS seem to be aligned with
the variance observed in the overall MS maturity concerning ICT as illustrated by the Network
Readiness Index (see table below). The World Economic Forum's Networked Readiness Index (NRI)7
measures the propensity for countries to exploit the opportunities offered by information and
communications technology (ICT) taking into consideration ten factors. An analysis of the NRI
results shows that while many European countries are leading in the rankings, many others lag
behind.
7
The World Economic Forum's Networked Readiness Index (NRI) http://www.weforum.org/issues/global-
information-technology/the-great-transformation/network-readiness-index
8
World Economic Forum (2014), The Global Information Technology Report 2014, p.19
Page 7
Methodologies for the identification of Critical Information Infrastructure assets
and services Guidelines for charting electronic data communication network
December 2014
A comparison of the implementation level with the NRI of the individual MS suggests that MS with
lower NRI rankings exhibit also a lower regulatory maturity level regarding CIIP. This can be justified
by the lower degree of ICT adoption for the support of critical services. This pushes down in the
scale of priorities the need to focus on the identification and protection of critical information
infrastructures.
Page 8
Methodologies for the identification of Critical Information Infrastructure assets
and services Guidelines for charting electronic data communication network
December 2014
9
The terms ‘Critical Service Provider’ and ‘Critical Infrastructure Operator’ reflect highly complementary roles
Page 9
Methodologies for the identification of Critical Information Infrastructure assets
and services Guidelines for charting electronic data communication network
December 2014
Page 10
Methodologies for the identification of Critical Information Infrastructure assets
and services Guidelines for charting electronic data communication network
December 2014
10
German Internet platform on Critical Infrastructure Protection
http://www.kritis.bund.de/SubSites/Kritis/EN/Home/home_node.html
11
Swedish Civil Contingencies Agency, A first step towards a national risk assessment
https://www.msb.se/en/Products/Publications/Publications-from-the-MSB/
Page 11
Methodologies for the identification of Critical Information Infrastructure assets
and services Guidelines for charting electronic data communication network
December 2014
The pronouncing of a specific infrastructure as critical may depend on the size of the
affected population, the cross-sector dependency and the geographical impact. Moreover,
personal safety and impact on privacy were also mentioned as important parameters in one
case.
Responding National Regulatory Authorities (NRAs) publish guidelines for issues ranging
from CII vulnerabilities and CII procurement to Internet infrastructure resilience. The
majority of them have a formal or informal participation in security related info exchange
platforms.
Audits of operators of CIs and network operators regarding CIIs security/resilience are
performed annually by most of the responding NRAs and are partially based on specific
standard requirements. In case of non-conformities, usually there is a recommendation and
/ or order to rectify the error and if not rectified a fine may be imposed. These are performed
on an ad-hoc basis and ISO-27001 is taken as a basis for specific points of the audit.
Public-private partnerships for resilience are already in place or planned in several countries,
whereas the responding agencies take part in cross-border collaboration activities for the
enhancement of CII resilience in their own country.
As part of the survey the NRAs were also asked which actions would be interesting to meet the needs
of securing CII in the future. While not exhaustive, these should be seen as directions for areas of
research. Some ideas that emerged among others are:
Deploy information systems, which would support automated-prioritized handling of
incidents affecting CII so that incidents that involve CIIs’ networks assets are notified
automatically and the handling is prioritized.
Maintain a database which includes the following information entities:
o CIs and the relevant critical service(s) they provide
o CIs and relevant data (location) and potential dependencies
o CIIs and the communication operator which operate those CII
o Role/person responsible for the CII
Based on this database, agencies mandated on CIIs should consider implementing/deploying an
Information Security Management System (ISMS), related to CIIs incident handling. This ISMS should
support classified/diversified CIIs incident handling.
The above CIIs database could be linked to an incident alert system, in order to auto-identify
CII and handle CII alerts in a diversified mode.
Given an incident outbreak:
o a preliminary damage assessment procedure followed could be
prioritised/diversified for CII
o the rules are stricter for CIIs in the "chain of custody" documented for the evidence
collected
Statistics on security incidents could be kept with distinct reference to CII.
Conduct root cause analysis in case of an incident, in a diversified mode for CIIs (e.g. all cases
involving CIIs are handled, higher priority given, more effort made, analysed in more depth).
Page 12
Methodologies for the identification of Critical Information Infrastructure assets
and services Guidelines for charting electronic data communication network
December 2014
Page 13
Methodologies for the identification of Critical Information Infrastructure assets
and services Guidelines for charting electronic data communication network
December 2014
This approach constitutes the traditional commonly applied approach in mapping, analysing and
protecting the network components. It is based on the fact that the core network and certain
additional components serve the majority of the traffic; therefore they should be designed in a
resilient manner. It is expected that all network operators review, analyse and take actions to assure
& gradually enhance the resilience of the critical network components. Therefore, public private
collaboration should be developed to have a holistic view of the network architecture.
The main drawback of this approach is that it ignores critical services, served by the connectivity
solutions since it looks directly at the network infrastructure as a whole. Furthermore, it does not
identify access network components which architecture-wise may seem insignificant, but may be
critical to a critical service’s connectivity. Moreover, due to the overall infrastructure point of view,
it involves a high degree of complexity, which increases significantly when dealing with the lower
network hierarchy levels (transport and access network) and the relevant components / assets.
Page 14
Methodologies for the identification of Critical Information Infrastructure assets
and services Guidelines for charting electronic data communication network
December 2014
Page 15
Methodologies for the identification of Critical Information Infrastructure assets
and services Guidelines for charting electronic data communication network
December 2014
The ministries identify the “vital operators” or the “vital service providers” within their own area of
responsibility and these operators are then legally bound to perform a risk assessment analysis,
identify a list of individual critical assets and develop CIIP structured plans. In this approach the
identification of the critical services is the responsibility of the operators. A typical example can be
found in France (instruction 6600/2014). This is a pragmatic approach given the current state of the
art of CII identification since operators have a better knowledge of their infrastructures. It also
represents a shift of the effort needed to the operator to which is delegated the accountability.
Page 16
Methodologies for the identification of Critical Information Infrastructure assets
and services Guidelines for charting electronic data communication network
December 2014
Service Consumer (Citizen /Customer) experience with reference to service consumption (e.g.
electric power cuts due to power transmission process malfunction)
Process malfunction leading to service malfunction or outage (e.g. fault handling process
malfunction and degradation lead to significant delay in fault resolution prolonging a service
outage)
Similar analysis approaches based on the ‘supply-chain and value-chain perspective’, have been
proposed 12 in order to assess dependencies and cyber-asset criticality.
An overview of core processes and relevant indicative applications for a utility service (e.g. power,
water, and telecom), is presented in the following table. The picture tries to depict all the processes
involved when providing a critical service and the components that should be taken into consideration
in assessing and protecting critical assets and services. Moreover, the provision of critical services
consists of several business processes, which in their turn are supported by business applications that
need to be served by a communication network. Therefore, communication networks are of
paramount importance for all stages involved in the provision of critical services, i.e. service fulfilment,
service operation and service assurance.
The operation of many critical applications supporting critical service processes may be fully
dependent on communication networks. This is commonly the case when data (e.g.
measurement/status data, transaction data) are captured at various geographic locations and
transferred via the data network to a central point for processing by the critical applications, which is
the case in all ICTs applications.
Figure 10: Indicative core processes and applications supporting a critical service
Since communication networks are sector agnostic and the asset groups are usually the same, 13
independently of the critical service supported, an indicative list of potential CII assets, identified using
the presented methodology and located at the access network, could look like this:
Fiber ring supporting a critical link (e.g. a datacentre physical connection)
12
Multinational Experiment 7 Outcome 3 – Cyber Domain Objective 3.1, Threats and Vulnerability Methodology
, 2.2.1 Analysis of supply chain and value chain
13
ENISA Technical Guideline on Threats and Assets https://resilience.enisa.europa.eu/article-
13/guideline_on_threats_and_assets
Page 17
Methodologies for the identification of Critical Information Infrastructure assets
and services Guidelines for charting electronic data communication network
December 2014
Fiber cable from local exchange to local cabinet as for Fibre-to-the-Cabinet (FTTC) solutions
Customer Premises Equipment(CPE), e.g. Fiber termination equipment, router, DSL
modem/router, switch supporting a carrier ethernet connection at an operator of critical
infrastructure
Microwave equipment supporting a point-to-point access link
Worldwide Interoperability for Microwave Access (WiMAX) equipment
It must be underlined that this is only an example and the actual list depends on the critical service
supported, the different characteristics of the MS and of the operator. The goal here is to give an
example of the actual network assets that should be identified using this methodology.
Regional/area network components supporting the CII could also be critical assets. These may be:
Core and transit network components are critical to CII, since they support a bigger part of the
network. These may be:
Backbone and (Border Gateway Protocol) BGP routers handling a significant percentage of
the internet traffic
Gigabit Ethernet switches used for the Carrier Ethernet (CE) service
Backbone links handling a significant percentage of the traffic
The higher a network component is in the network hierarchy, the higher the probability that it serves
one or more critical services. Moreover vulnerabilities which are affecting CII are not specific but they
are commonly affecting all types of communication networks. Below follows an abstraction of the
typical attack surfaces regarding physical and logical infrastructure that should be considered and it is
valid for CII and also for all types of data and IP networks:
Page 18
Methodologies for the identification of Critical Information Infrastructure assets
and services Guidelines for charting electronic data communication network
December 2014
Czech Republic
In the Czech Republic CIIs are identified through a specific process in accordance with Act no.
240/2000, on Crisis Management. A CII is defined as an element of CI in the cyber security sector.
Every CI element (and every CII element) needs to fulfil two sets of criteria, which are cross-cutting
criteria and sectorial criteria.
Cross-cutting criteria define the gravity of malfunction or disruption of the system, i.e. if it causes
death to more than 250 people, or the economy of the state is damaged of more than 0,5% GDP, or it
has serious impact on providing necessary services to more than 125,000 people, etc. Sectorial criteria
determine five areas within the cyber security sector where CII might be identified. One of the most
important sectorial criteria is that the information or communication system significantly or
completely affects the operations of other already identified element of CI, e.g. a communication
system upon which the operation and security of a power plant is dependent. CII can also be
identified in the area of information systems administrated by public authority containing personal
information about 300,000, and others.
Page 19
Methodologies for the identification of Critical Information Infrastructure assets
and services Guidelines for charting electronic data communication network
December 2014
A CII is identified and determined by legal act. If the CII is administered by a governmental
department, the governmental resolution is issued. If the CII is administered by other (mostly private)
bodies, the NSA CZE issues a specific general measure decision.
Advantages Disadvantages
14
https://www.ria.ee/en/
15
https://www.ria.ee/CIIP/
16
EMERGENCY ACT, passed 15 June 2009
17
ENISA, Guidelines for enhancing the Resilience of eCommunication Networks
Page 20
Methodologies for the identification of Critical Information Infrastructure assets
and services Guidelines for charting electronic data communication network
December 2014
Pragmatic approach given the Need for a strict rule set which has not been
current state of the art of CII identified. Lack of rules (e.g. a uniform
identification since operators have a criticality level applied) may lead to a non-
better knowledge of their homogeneous deployment of protection
infrastructures. measures (which would not assure alignment
to societal needs).
It also represents a shift of the effort
needed to the operator to which is The concept of critical service maybe under-
delegated the accountability. examined (going directly from operator to
critical assets).
Page 21
Methodologies for the identification of Critical Information Infrastructure assets
and services Guidelines for charting electronic data communication network
December 2014
Page 22
Methodologies for the identification of Critical Information Infrastructure assets
and services Guidelines for charting electronic data communication network
December 2014
18
Employment / GDP /supply of goods sustaining activity
Page 23
Methodologies for the identification of Critical Information Infrastructure assets
and services Guidelines for charting electronic data communication network
December 2014
Meteorological monitoring
and early warning
Ground Water (lake/river)
monitoring and early
warning
Marine pollution
monitoring and control
National defense
14. Defense
Table 4: List of critical sectors and related critical services
19
E. Luiijf, H. Burger and M. Klaver, Critical infrastructure protection in the Netherlands: A quick-scan,
Proceedings of the EICAR Conference, 2003.
Page 24
Methodologies for the identification of Critical Information Infrastructure assets
and services Guidelines for charting electronic data communication network
December 2014
International Relations The effect that that a service interruption will have on the
relationships between the MS and 3rd countries.
Public order The effect that a service interruption may cause to the
public order
Public operations hindered The daily operations of the public, such as going to work
via public transportation, are stopped or thwarted
3rd party MS services are affected Inter-dependencies with critical services of other MS
should be accounted for.
Table 5: List of critical sectors and related critical services
Page 25
Methodologies for the identification of Critical Information Infrastructure assets
and services Guidelines for charting electronic data communication network
December 2014
Operators of CIs set the requirements for connectivity solutions that they need to procure from the
network operators. In other words, operators of CIs place the order (which may be characterized by a
high degree of complexity) and network operators fulfil the order. The operators of CIs need to identify
and classify the access & private network infrastructures supporting critical applications, according to
their criticality. They are responsible to determine the core processes, the respective applications and,
as a last step, the network assets and services (connectivity solutions) which are used to operate the
respective applications.
Network operators, on the other hand, are responsible to determine the network assets & services,
enabling the connectivity solutions needed by the operators of CIs.
Cybersecurity agencies/ NRAs with mandate on CIIs may have a leading role in all activities related
to the identification and protection of CIIs and as presented in the stock taking aim in the future to
have:
Information systems which would support automated-prioritized handling of incidents affecting
Critical Information Infrastructure.
Maintain a CI/CIIs assets and services database which should include relevant critical services
details, location, dependencies, role/person responsible and point of contacts.
To foster the security of CII and develop effective cooperation, MS should work together with CIIs
asset owners in developing a common approach to the ‘Tagging’ of CII assets and have a holistic
overview of their status:
Operators of CII should identify the detailed network assets and tag them using a common
taxonomy that can be used to federate the different views.
Mandated agencies could develop the ability to have a centralized view of the CII network
assets and related information in order to react timely in case of incident.
This could allow automated-prioritized handling of incidents affecting CIIs and lead to a prompt and
coordinated response in case of incident or outage.
Page 26
Methodologies for the identification of Critical Information Infrastructure assets
and services Guidelines for charting electronic data communication network
December 2014
6 Recommendations
Recommendation 1: Member States should clearly identify Critical Information Infrastructures if not
already covered in their Critical Infrastructure activities. As underlined during the stock taking, not
all Member States have clearly defined the asset perimeter of Critical Information Infrastructures. For
this reason, if not already covered by the Critical Infrastructure definition, Member States should
clearly define which specific network assets are covered and should be secure and resilient.
Recommendation 2: Member States who are starting to work on the identification of CII assets
should work together with the stakeholders involved in the operations of Critical Information
Infrastructures. Effective collaboration between public sector (Government & mandated Agencies)
and the private sector is fundamental in protecting CII assets and services. For the identification of CIIs
in communication networks, the involvement of two categories of stakeholders should be pursued:
operators of Critical Infrastructures
Network operators
given the complementarity of their perspectives, responsibilities and expertise.
Recommendation 3: Member States who are starting to work on the identification of CII should
adopt a methodology for identification of critical network assets and services, using one or a mix of
the proposed solutions in this study that better fits the need of the MS. It is worth-noting that the
purpose here is to present the Member States with a portfolio of methodological approaches – rather
than a single ‘fits-all’ methodology –that each Member State may choose the approach or a
combination of approaches that suits better to its own specific characteristics and needs.
Recommendation 4: Member States who base their identification of CIIs on critical services should
develop a list of these services and assess internal and external interdependencies. While assessing
the criticality of services, infrastructures and supporting network assets, Member States should define
criticality criteria in order to identify the critical assets and examine the system in its entirety rather
than per constituent. At least four types of dependencies should be taken into consideration:
Interdependencies within a critical sector (intra-sector)
Interdependencies between critical sectors (cross-sector).
Interdependencies among communication network assets.
Moreover dependencies can be found at the national and international level (cross-border), further
complicating the task to have a complete overview.
Recommendation 5: Member States should foster baseline security guidelines for communication
networks used for critical services. To ensure the resilience of critical networks, the Critical
Infrastructure operator or asset owner should adopt security guidelines to be used also at
procurement stage. For this reason a checklist with baseline security guidelines for communication
networks used for critical services should be made available to align practices across the EU.
Recommendation 6: Member States should foster the adoption of automated procedures for CIIs
tagging in order to be prepared to face future challenges. To foster the security of critical networks,
Member States should work together with CIIs asset owners in developing a common approach to the
‘Tagging’ of CII assets. This could allow automated-prioritized handling of incidents affecting Critical
Information infrastructures.
Page 27
Methodologies for the identification of Critical Information Infrastructure assets
and services Guidelines for charting electronic data communication network
December 2014
References
Bilbao-Osorio, B., Dutta, S., & Lanvin, B. (2014). The Global Information Technology Report 2014.
World Economic Forum.
Bush, R., & Austein, R. (2013). The Resource Public Key Infrastructure (RPKI) to Router Protocol. RFC
6810.
Bush, R., Austein, R., Patel, K, Gredler, H., Waehlisch, M. (2014). Resource Public Key Infrastructure
(RPKI) Router Implementation Report. RFC 7128.
Butler, K., Farley, T.R., McDaniel, P., Rexford, J. (2010). A Survey of BGP Security Issues and Solutions,
BGP Peer Session Security Solutions . Proceedings of the IEEE, vol. 98, issue 1, pp 100-122.
Caesar, M. & Rexford, J. (2005). BGP routing policies in ISP networks. IEEE Network, vol. 16, issue 6,
p.p. 5-11.
Chatzis,N., Smaragdakis, G., Feldmann, A. On the importance of Internet eXchange Points for
today’s Internet ecosystem.
Cisco Security Intelligence Operations. Protecting Border Gateway Protocol for the Enterprise.
Clemente, D. (2013) Cyber Security and Global Interdependence: What Is Critical?, Chatham House
Fekete, A. (2011). Common Criteria for the Assessment of Critical Infrastructures. International
Journal of Disaster Risk Science, vol. 2, Issue 1, pp 15-24.
Gill, P., Schapira, M., & Goldberg, S. (2011). Let the market drive deployment: a strategy for
transitioning to BGP security. ACM SIGCOMM Computer Communication Review, vol. 41, issue 4, pp
14-25.
Hammerli, B., & Renda, A. (2010). Protecting Critical Infrastructure in the EU, CEPS Task Force report,
Centre for European Policy Studies, Brussels.
Internet Society. (2012). Report on Routing Resiliency Measurements Workshop. Atlanta, GA, USA.
ISO 27001 (2013). Information technology - Security techniques - Information security management
systems – Requirements. Avalable at http://www.iso.org/iso/home/standards/management-
standards/iso27001.htm.
ISO 27002 (2013). Information technology - Security techniques - Code of practice for information
security controls. Available at http://www.iso.org/iso/home/standards/management-
standards/iso27001.htm.
Page 28
Methodologies for the identification of Critical Information Infrastructure assets
and services Guidelines for charting electronic data communication network
December 2014
ISO 22301 (2012). Societal security - Business continuity management systems - Requirements.
ISO 20000-1. (2011). Information technology - Service management Part 1: Service management
system requirements.
Lepinski, M., & Kent, S. (2012). An Infrastructure to Support Secure Internet Routing. RFC 6480.
Luiijf, H., & Klaver, M. (2005). International Interdependency of C(I)IP in Europe. Proceedings of CIP
Europe.
McPherson, D., Amante, S., & Osterweil, E. (2012). IRR & Routing Policy Considerations. Internet-
Draft.
Rinaldi, S., Peerenboom, J., & Kelly, T. (2001). Identifying, understanding, and analyzing critical
infrastructure interdependencies. IEEE Control Systems, vol. 21, issue 6, pp 11-25.
Stefanescu, A., Overeinder, B., Pierre, G. (2011). Effects of RPKI Deployment on BGP Security.
Theoharidou, M., Kotzanikolaou, P., Gritzalis, D. (2009). Risk-based criticality analysis. IFIP Advances
in Information and Communication Technology, vol. 311, pp 35-49.
Tierney, K. & Bruneau, M. (2007). Conceptualizing and Measuring Resilience: A Key to Disaster Loss
Reduction. TR News 250, pp 14-17.
Touch, J., Mankin, A., & Bonica, R. (2010). The TCP Authentication Option. RFC 5925.
Villamizar, C., Chandra, R., & Govindan, R. (1998). BGP Route Flap Damping: Prevent sustained
routing oscillations, without sacrificing route convergence time. RFC 2439.
Page 29
Methodologies for the identification of Critical Information Infrastructure assets
and services Guidelines for charting electronic data communication network
December 2014
Directive 2009/140/EC of the European Parliament and of the Council of 25 November 2009
amending Directives 2002/21/EC on a common regulatory framework for electronic communications
networks and services, 2002/19/EC on access to, and interconnection of, electronic communications
networks and associated facilities, and 2002/20/EC on the authorisation of electronic
communications networks and services
Communication COM(2011) 163 final from the Commission to the European Parliament, the council,
the European Economic and Social Committee and the Committee of the Regions on Critical
Information Infrastructure Protection ‘Achievements and next steps: towards global cyber-security’
European Parliament resolution of 12 June 2012 on Critical Information Infrastructure Protection –
Achievements and Next steps: towards Global Cyber-security
Commission Regulation (EU) No 611/2013 of 24 June 2013 on the measures applicable to the
notification of personal data breaches under Directive 2002/58/EC of the European Parliament and
of the Council on privacy and electronic communications”
Austria
Telecommunications Act 2003 https://www.rtr.at/en/tk/TKG2003
Finland
Act on the Protection of Privacy in Electronic Communications (516/2004)
http://www.finlex.fi/en/laki/kaannokset/2004/en20040516.pdf
Page 30
Methodologies for the identification of Critical Information Infrastructure assets
and services Guidelines for charting electronic data communication network
December 2014
France
Instruction generale interministerielle relative a la securite des activites d’importance vitale -
n°6600/sgdsn/pse/psn du 7 janvier 2014
Germany
German Federal Data Protection Act in the version promulgated on 14 January 2003 (Federal Law
Gazette I p. 66), as most recently amended by Article 1 of the Act of 14 August 2009
http://www.gesetze-im-Internet.de/englisch_bdsg/englisch_bdsg.html
Referentenentwurf des Bundesministeriums des Innern: Entwurf eines Gesetzes zur Erhöhung der
Sicherheit informationstechnischer Systeme, Stand 18.08.2014,
http://www.bmi.bund.de/SharedDocs/Downloads/DE/Gesetzestexte/Entwuerfe/Entwurf_IT-Sicherh
eitsgesetz.pdf?__blob=publicationFile
Hungary
Act on identification, assignment and protection of Critical Infrastructure and buildings - Act. CLXVI.
of 2012. and its annex 1., 2. and 3. (2012. évi CLXVI. törvény mellékleteire (1,2,3)
http://www.complex.hu/kzldat/t1200166.htm/t1200166.htm
Greece
Law 4070/2012
Italy
"Codice delle comunicazioni elettroniche"pubblicato nella Gazzetta Ufficiale n. 214 del 15 settembre
2003
http://www.parlamento.it/parlam/leggi/deleghe/03259dl.htm
Latvia
Regulations Regarding the Information to be Included in the Action Plan of a Merchant of Electronic
Communications, the Control of the Implementation of Such Plan and the Procedures, by which End
Users shall be Temporarily Disconnected from the Electronic Communications Network
Netherlands
Dutch Telecommunications Act, Translation of 'Telecommunicatiewet - Juni 2012
http://www.government.nl/documents-and-publications/notes/2012/06/07/dutch-
telecommunications-act.html
Poland
Polish Telecommunication law, 2004
http://isap.sejm.gov.pl/DetailsServlet?id=WDU20041711800
Romania
LAW No. 154/2012 regarding the regime of the electronic communications networks infrastructure,
Government emergency ordinance No. 111/2011 on electronic communications
United Kingdom
UK "Regulation of investigatory powers Act” , 2000
http://www.legislation.gov.uk/ukpga/2000/23/contents
Page 31
Methodologies for the identification of Critical Information Infrastructure assets
and services Guidelines for charting electronic data communication network
December 2014
Page 32
Methodologies for the identification of Critical Information Infrastructure assets
and services Guidelines for charting electronic data communication network
December 2014
Page 33
Methodologies for the identification of Critical Information Infrastructure assets
and services Guidelines for charting electronic data communication network
December 2014
Page 34
Methodologies for the identification of Critical Information Infrastructure assets
and services Guidelines for charting electronic data communication network
December 2014
Page 35
Methodologies for the identification of Critical Information Infrastructure assets
and services Guidelines for charting electronic data communication network
December 2014
ENISA TP-06-14-120-EN-N
European Union Agency for Network and Information Security
Science and Technology Park of Crete (ITE) ISBN number: 978-92-
Vassilika Vouton, 700 13, Heraklion, Greece 9204-106-9
doi: 10.2824/38100
Athens Office
1 Vass. Sofias & Meg. Alexandrou
Marousi 151 24, Athens, Greece