The National Information Systems (NIS) Directive: Enhancing Your Information Resilience by Improving Your Cybersecurity
The National Information Systems (NIS) Directive: Enhancing Your Information Resilience by Improving Your Cybersecurity
Information Systems
(NIS) Directive
Enhancing your information
resilience by improving
your cybersecurity
A whitepaper
Introduction
“Continually enhancing your organization’s
state of information resilience protects your
business, people, stakeholders and reputation.
This requires the adoption of security
minded practices enabling information to
be generated, stored and accessed securely,
efficiently and effectively.”
Michael Bailey, EMEA Director of Professional Services,
BSI Cybersecurity and Information Resilience
This whitepaper will explore the tenets of the NIS Directive, the importance
of the mandate, why organizations should adopt these protocols, how to
implement a cyber assessment framework model and moreover, achieve an
enhanced and sustainable state of information resilience.
2 BSI Cybersecurity and Information Resilience 2019 Call: +44 345 222 1711 /+353 1 210 1711 Email: [email protected] Visit: bsigroup.com
Is the NIS Directive on your radar?
Almost every organization today relies on networks and The Network and Information Systems (NIS) Directive is the
information systems. These systems are subject to adverse first piece of EU-wide legislation relating to cybersecurity.
security threats arising from technical failure, unintentional It places legal obligations on all providers of Critical
human error or deliberate malicious attack. Infrastructure to ensure that they are prepared to deal with
the increasing volume of cyberthreats and as mentioned, was
The exploitation of such threats could significantly affect adopted by the European Parliament in 2016, becoming law in
the supply of essential services that we rely on in our daily all member states including the UK in 2018.
lives including electricity, transport, water, energy, health
and digital infrastructure. Any disruption to these services –
collectively known as Critical Infrastructure – would affect
citizens, markets and economic stability.
Call: +44 345 222 1711 /+353 1 210 1711 Email: [email protected] Visit: bsigroup.com BSI Cybersecurity and Information Resilience 2019 3
Who does the NIS Directive apply to?
The NIS Directive applies directly to Operators of Essential Services (OES) and Digital Service Providers (DSP).
4 BSI Cybersecurity and Information Resilience 2019 Call: +44 345 222 1711 /+353 1 210 1711 Email: [email protected] Visit: bsigroup.com
Requirements for OES and DSPs
As incumbent and primary stakeholders of the NIS Directive, These alerts or notifications must contain enough information
OES and DSP have numerous requirements. to enable authorities to determine the cross-border impact of
the incident.
Firstly, at an operational level, they must take appropriate
and proportionate technical and organizational measures to The table below summarizes some key information
manage risks to network and information systems that are for incident reporting focusing on the UK and Ireland.
used to provide essential services. Organizations should understand their obligations in respect
of the directive pointed out above.
Subsequently, they must prevent and minimize the impacts
of any incidents that affect these same networks and It is also worth noting that fines are primarily intended to be
information systems, with a view to ensuring continuity. levied where the incident management process has failed or
where entities fail to engage with component authorities.
Lastly but just as importantly, providers of essential services
must, without undue delay, alert the relevant competent
authority or CSIRT no later than 72 hours after they have
become aware of an incident.
UK Ireland
• Risk based
• Consider notification where a breach leads to impact to the continued good
Incident Classification operation of an essential service. Variables include:
›› nature of the service, number of people and size of region effected, whether the
breach may affect the economy or poses a threat to life.
Incident Notification Without undue delay < 72 hours Without undue delay < 72 hours
Fig 1 - Key information for incident reporting focusing on the UK and Ireland. 1The £17m fine is intended to be applied where a breach may result in a threat to
life or significant threat to the UK economy.
Call: +44 345 222 1711 /+353 1 210 1711 Email: [email protected] Visit: bsigroup.com BSI Cybersecurity and Information Resilience 2019 5
Application of cybersecurity – which framework
to choose?
Each member state has the option to implement appropriate cybersecurity frameworks as they see fit. However, a significant
number of member states have opted to align themselves with suitable frameworks such as:
1. UK National Cyber Security Centre (NCSC) Cyber 2. The National Institute of Standards and Technology (NIST)
Assessment Framework (CAF) (see more details on page Cybersecurity Framework (CSF). This voluntary Framework
8). In support of the UK NIS Directive implementation, consists of standards, guidelines, and best practices to
the NCSC is committed to working with lead government manage cybersecurity-related risk. The Cybersecurity
departments, regulators and industry to develop a Framework’s prioritized, flexible, and cost-effective
systematic method of assessing the extent to which approach helps to promote the protection and resilience
an organization is adequately managing cybersecurity of critical infrastructure and other sectors important to
risks in relation to the delivery of essential services. This the economy and national security.
assessment method, otherwise known as the Cyber (Ref: nist.gov/cyberframework)
Assessment Framework (CAF), is intended to meet both
NIS Directive requirements and wider CNI needs.
er Iden
ov tit
Objective A Objective B c y
Re
Cybersecurity
te c t
Framework 1.1
Objective C Objective D
P ro
nd
Fig 2 - Comparing the NCSC Cyber Assessment Framework and the NIST Cybersecurity Framework
As Fig 2 shows there are clear overlaps between the two frameworks, although the NCSC CAF has structured its framework as
an objective-based assessment. When the NCSC CAF and NIST CSF are compared, the overlap becomes even more pronounced.
Taking the “Identify” section of the NIST CSF (top right) and the Object A of the NSCS (top left), they both cover the following
and cross over where highlighted. This sequence and marriage between the two is evident throughout the vast majority of the
frameworks.
• Governance • Governance
• Risk Management • Risk Assessment
• Asset Management • Risk Management Strategy
• Supply Chain • Supply Chain Risk Management
• Asset Management
• Business Environment
Fig 3 - Comparing NCSC CAF Objective A and NIST CSF Identify segment
6 BSI Cybersecurity and Information Resilience 2019 Call: +44 345 222 1711 /+353 1 210 1711 Email: [email protected] Visit: bsigroup.com
Complying with the NIS Directive
Article 19 of the NIS Directive encourages “the use of European In addition to ISO/IEC 27001 and ISO/IEC 27002, there are
or internationally accepted standards and specifications relevant other standards such as ISO/IEC 27035 (Information Security
to the security of network and information systems”. Incident Management), ISO 22301 (Business Continuity
Standard) and COBIT 5 that can help organizations achieve a
International security standards such as ISO/IEC 27001:2013 cyber resilience framework and protect network / information
(the international standard for an Information Security as per the NIS Directive requirements.
Management System), ISO/IEC 27002:2013 (the ‘code of
practice’) and the NIST (National Institute of Standards and
Technology) Cyber Security Framework serve as a framework
for organizations aiming to comply with the NIS Directive.
Call: +44 345 222 1711 /+353 1 210 1711 Email: [email protected] Visit: bsigroup.com BSI Cybersecurity and Information Resilience 2019 7
Exploring the NCSC Cyber Assessment Framework (CAF)
In 2018, the NCSC published the first version of the CAF as part of the implementation of the EU security of Networks and
Information Systems (NIS) Directive.
The CAF enables NIS regulatory bodies (known as Competent Authorities) to assess the cybersecurity of organizations covered
by the Directive. The CAF below outline the four pillars of the NIS Directive which are underpinned by 14 principles, with a list of
definitions – and how each objective is applied – underneath.2
NIS Objectives
B: Protecting Against D: Minimizing The Impact Of
A: Managing Security Risk C: Detecting Cybersecurity Incidents
Cyber-attack Cybersecurity Incidents
NIS Principles
A1: A2: B1: Service B2: Identity and C1: Security C2: Proactive D1: Response and D2: Lessons Learned
Governance Risk Management Protection and Access Control Monitoring Security Event Recovery Planning
Policies and Discovery
Processes
A3: A4: B3: Data Security B4: System Security
Asset Management Supply Chain
2
Fig 4 - Cyber Assessment framework v2.0 objectives and principles , Ref : https://www.ncsc.gov.uk/blog-post/introducing-cyber-assessment-framework-v20
Objectives Principle
A: Managing Governance: There are appropriate management policies and processes in place to govern the organization’s approach to
Security Risk the security of network and information systems.
Risk Management: The organization takes appropriate steps to identify, assess and understand security risks to the
network and information systems supporting the delivery of essential services. This includes an overall organizational
approach to risk management.
Asset Management: All systems and/or services that are required to maintain or support essential services are determined
and understood. This includes data, people and systems as well as any supporting infrastructure such as power.
Supply Chain: The organization understands and manages security risks to networks and information systems supporting
the delivery of essential services that arise as a result of dependencies on external suppliers. This includes ensuring that
appropriate measures are employed where 3rd party services are used.
B: Protecting Service Protection Policies and Processes: The organization defines and communicates appropriate policies and processes
Against Cyber- that direct the overall organizational approach to securing systems and data that support delivery of essential services.
attack
Identity and Access Control: The organization understands, documents and controls access to systems and functions
supporting the delivery of essential services. Rights or access granted to specific users or functions should be understood
and managed.
Data Security: The organization prevents unauthorized access to data whether through unauthorized access to user
devices, interception of data in transit or accessing data remaining in memory when technology is sent for repair
or disposal.
Other – System Security, Resilient Networks and Staff Awareness & Training: The organization ensures that the network
and information systems are protected from cyber-attacks by managing all security controls and building resilience. The
organization also safeguards staff and provides appropriate support to ensure they can maintain the security and resilience
of the systems and networks.
C: Detecting Security Monitoring: The organization monitors the security status of the networks and systems supporting the delivery of
Cybersecurity essential services in order to detect potential security problems and track the ongoing effectiveness of protective security
Incidents measures.
Anomaly Detection: The organization detects anomalous events in the network and information systems affecting, or with
the potential to affect, the delivery of essential services.
D: Minimizing Response and Recovery Planning: There are well-defined and tested incident management processes in place that aim to
The Impact Of ensure continuity of essential services in the event of system or service failure. Mitigation activities are in place that are
Cybersecurity designed to contain or limit the impact of compromise.
Incidents
Lessons Learned: When an incident occurs, steps must be taken to understand the root cause of that incident and take
appropriate action.
8 BSI Cybersecurity and Information Resilience 2019 Call: +44 345 222 1711 /+353 1 210 1711 Email: [email protected] Visit: bsigroup.com
NIS Directive: A case study
How BSI enhanced and optimized a large utility provider’s readiness for the EU NIS Directive implementation.
Requirements
BSI’s Cybersecurity and Information Resilience team (CSIR) was asked by an OES in the energy sector to conduct an initial gap
analysis against the upcoming EU NIS Directive requirements, based on the guidelines provided by the UK’s NCSC, with the
intention of laying the groundwork for a risk and maturity assessment.
Challenges
While it was clear that the organization had many strong capabilities and fit for purposes response processes to handle
security controls in place, actions for improvements were a security event.
identified in the areas of incident management and web
gateway security. Visibility of web gateway activity was also an issue in the
organization, with decentralized and inconsistently applied
Incident management processes were in place, however they policies across the estate, resulting in unmanaged access to
were not at the level of maturity expected for an operator the internet.
of essential services due to lack of intrusion detection
1. Governance
2
12. Anomaly Detection 1 4. Supply Chain
5. Service Protection
11. Security Monitoring
Policies and Processes
9. Resilient Networks
7. Data Security
and Systems
8. System Security
Fig 6 - Initial gap analysis. It’s an example only, not real data.
Solutions
With a thorough understanding of the client’s requirements, This engagement was carried out using a structured approach
BSI’s security experts provided both consultancy and with standard BSI client engagement methodology. Fig
implementation to achieve the desired results. 6 shows the assessment that enables the creation of the
customer’s road map towards meeting their goals.
Call: +44 345 222 1711 /+353 1 210 1711 Email: [email protected] Visit: bsigroup.com BSI Cybersecurity and Information Resilience 2019 9
Scoping workshop
BSI consultants initiated the engagement in a kick-off workshop, bringing together key stakeholders to determine the scope,
gather information, and plan assessment activities.
Support
BSI supported the OES by leveraging a comprehensive set of products, services and experienced consultants, to develop policies
and work with the technical teams to embed appropriate and proportionate security measures into business as usual. BSI
provided expertise in configuring secure web filtering and driving increased incident response maturity though the simulated
table top and purple team exercises.
In addition to the services outlined in this case study, the table below further describes the services BSI provides aligned with the
NCSC CSF and the sub-domains of Information Resilience:
The color coded rows on top identify the services within the sub-domains of Information Resilience. The 14 principles of the NIS
directive are then shown in the rows below indicating the relevant services by column.
Cybersecurity Services Cloud Security Vulnerability Incident Penetration Virtual CISO TP Security /
Solutions Management Management Testing / Red Risk Assessment
Teaming
Information Management & Privacy eDiscovery Digital Forensics Legal Tech Data Protection Data Subject DPO as a service
eDisclosure Services Requests
Security Awareness & Training End User Phishing Social Certified Info Onsite and Online
Awareness Simulations Engineering Sec Training Bespoke Interactive
Training Solutions
Compliance services PCI DSS NIST ISO 27001 Accredited Cyber Data Protection GDPR
Implementation Lab
NIS Principle
A2 Risk Management
A3 Asset Management
A4 Supply Chain
Service Protection Policies and
B1
Processes
B2 Identity and Access Control
B3 Data Security
B4 System Security
C1 Security Monitoring
Fig 7 - The type of BSI services that address each 14 principles of the NIS Directive.
10 BSI Cybersecurity and Information Resilience 2019 Call: +44 345 222 1711 /+353 1 210 1711 Email: [email protected] Visit: bsigroup.com
Conclusion
As has been evident throughout this whitepaper, compliance with requirements and regulations,
including directives, is paramount to the sustainability and longevity of any organization. This
requires the adoption of security minded practices enabling information to be generated, stored
and accessed securely, efficiently and effectively.
With the ever-increasing growth of cyber-attacks, employing the tenets of the NIS Directive is
imperative. A prevention-only based cybersecurity strategy is not enough, you must plan for
resilience through rapid detection and practiced response.
Governments and countries are now taking note and making changes in how cybersecurity and
risk are being managed, implemented and maintained. The NIS Directive gives organizations
as part of the critical national infrastructure (CNI) the opportunity to deploy best practice
cybersecurity protocols. As outlined, there are many frameworks that can be used, including the
important and mature UK NCSC cyber assessment framework (CAF). This framework nurtures
sustainability, mitigates risk, protects organizations, their information, safeguards their people
and ensures a state of enhanced information resilience. A resilient organization is not one that
merely survives over the long term but flourishes – passing the test of time.
Call: +44 345 222 1711 /+353 1 210 1711 Email: [email protected] Visit: bsigroup.com BSI Cybersecurity and Information Resilience 2019 11
BSI Cybersecurity and Information Resilience
Protecting your information, people and reputation
BSI Cybersecurity and Information Resilience helps you address your information challenges. We enable
Cybersecurity and
organizations to Information
secure Resilience
information, data and –critical
Protecting your information,
infrastructure people
from the changing and reputation
threats that affect
your people, processes and systems; strengthening your information governance and assuring resilience.
Our cyber, information security and data management professionals are experts in:
Secu
s rity
rvice aw
se ar
en
ty Cloud security solutions End user awareness
i
es
ur
sa
ec
nd
Incident management Social engineering
Cyb
tra
Penetration testing/ Certified information
inin
Red teaming security courses
g
Virtual CISO Onsite and bespoke courses
Third party security/risk assessment Online interactive solutions
se
ce
en li an
ta
nd mp
p ri v Co
acy
Our expertise is accredited by: Copyright © 2018 The British Standards Institution. All Rights Reserved.