Cyber Security
Cyber Security
Cyber Security
Cyber security: future challenges and opportunities Authors: Prof. Udo Helmbrecht Dr. Steve Purser Maj Ritter Klejnstrup Contact details For contacting ENISA or for general enquiries about this publication, please use the following details: E-mail: [email protected] Internet: http://www.enisa.europa.eu Legal notice Notice must be taken that this publication represents the views and interpretations of the authors and editors, unless stated otherwise. This publication should not be construed to be a legal action of ENISA or the ENISA bodies unless adopted pursuant to the ENISA Regulation (EC) No 460/2004 as lastly amended by Regulation (EU) No 580/2011. This publication does not necessarily represent state-of the-art and ENISA may update it from time to time. Third-party sources are quoted as appropriate. ENISA is not responsible for the content of the external sources including external websites referenced in this publication. This publication is intended for information purposes only. It must be accessible free of charge. Neither ENISA nor any person acting on its behalf is responsible for the use that might be made of the information contained in this publication. Reproduction is authorised provided the source is acknowledged.
2
Contents
Executive Summary Introduction The Evolving Threat Landscape Mitigating the Threats A Fragmented Approach Ensuring a Coherent Pan-European Approach ENISAs Role Identification and analysis of emerging trends and threats Awareness of NIS risks and challenges Early warning and response Early warning CERTs in Europe CERT for EU institutions Critical Information Infrastructure Protection Cyber exercises Adequate and consistent policy implementation Supporting the community in the fight against cybercrime Cybercrime centre International cooperation Information exchange Building communities The future Conclusion 4 6 8 12 14 16 17 18 18 18 19 19 20 20 21 22 22 23 24 24 25 26
3
Executive Summary
Our society has become irreversibly dependent on Information and Communication Technologies (ICTs). Unfortunately, whilst these technologies have brought many benefits, the increased adoption of them has also been accompanied by the development of a new set of cyber threats which are developing in ever more rapid, sophisticated and sinister ways. This means that the protection of critical infrastructure, and the applications that run on top of it, is not just about technology and security, it is closely connected to the European Unions competitiveness and prosperity. Any future approach to securing Europes ICT systems must be coherent across geographical borders and pursued with consistency over time. This is not the case at the present time, where different approaches to securing information and systems are developed independently in different Member States and in different communities. However, without a coordinated global approach to major incidents on the internet, Member States could find themselves in a situation where local systems cannot
4
EXECUTIVE SUMMARY
function correctly due to issues that are outside their control. ENISA believes international coordination is essential to achieve a holistic approach to network and information security. This includes cooperation throughout Europe as well as worldwide in both the public and private sectors. In many ways, it is this global dimension that distinguishes cyber security from what we have referred to in the past as information security. The EU institutions and bodies should provide the support and the framework for Member States to achieve a coordinated global approach. One of ENISAs tasks is to bridge the gap between policy and operational requirements; it does so by being an impartial European platform for information sharing amongst EU Member States, and also globally.
The main contributions of ENISA to enhancing cyber security are in the following areas:
Identification and analysis of emerging trends and threats Awareness of network and information security risks and challenges Early warning and response Critical information infrastructure protection Adequate and consistent policy implementation Actions against cybercrime International cooperation Information exchange Building communities
between communities in the area of network and information security. A proactive approach to building these new cross-border communities will bring great benefits both in terms of the effectiveness of its approach and efficiency in use of its resources. It is important that our efforts to protect and facilitate the development and prosperity of the European Information Society do not lose momentum. These efforts are addressed on many fronts with multiple stakeholders all are increasing in numbers and scope along with the pervasiveness and economic importance of ICTs. It is important that ENISA is modernised and further developed to allow the Agency to respond to these changes and provide support and expertise for stakeholders across Europe.
There are a number of areas where the current approach to improving cyber security in the EU could sensibly be extended. For example, there is a clear need to collect and analyse data relating to information security in a crossborder context which could reveal trends that are not visible at present. Also, the coming into force of the Lisbon Treaty is an opportunity to improve the level of dialogue
EXECUTIVE SUMMARY
Introduction
Information and Communication Technologies (ICTs) have become the backbone of our economy and society. In todays world, geographically separated societies are interconnected by information technology and are irreversibly dependent on it. Unfortunately, whilst it has brought many benefits, the increased adoption of information technology has also been accompanied by the development of a new set of threats. These threats reflect the global nature of the systems they target and their mitigation often requires international collaboration. In many ways, it is this global dimension that distinguishes cyber security from what we have referred to in the past as information security. The propagation and implications of threats such as malware (and botnets in particular) mean they are no longer just an issue for people to deal with individually, but are increasingly a social and civic responsibility. European Commission Vice President Neelie Kroes has put forward the Digital Agenda for Europe, with the objective of improving the quality of life through, for example, better health care, safer and more efficient transport solutions, a cleaner environment, new media opportunities and easier access to public services and cultural content.1 This is a major step towards the creation of the Digital Society. However, cyber-attacks complicate the deployment of ICT solutions used by citizens in their day-to-day lives, such as online payment and e-government services. ICT is increasingly used in crime and politically motivated attacks. For example Germany saw an increase of 8.1% in criminal acts associated with the internet during 2010, as noted by the German Minister of the Interior.2 To fully achieve the potential for improvements through ICTs, it is necessary to better protect citizens, businesses, governments and critical infrastructure from criminals who take advantage of modern technologies. This is also recognised in both the Digital Agenda and the Internal Security Strategy.3 The protection of critical infrastructure, and the applications that run on top of it,4 is not just about cyber security it is closely connected to the European Unions competitiveness and prosperity.
1 COM(2010) 245 final/2 2 http://www.dw-world.de/dw/article/0,,15093336,00.html 3 COM(2010) 673 final 4 An insecure application running on secure infrastructure is still insecure. A secure application running on insecure infrastructure can still be secure as long as we can ensure availability and performance.
INTRODUCTION
INTRODUCTION
Stuxnet: malware which targets industrial software at, for example, nuclear facilities. It was specially created to attack the SCADA systems that these facilities use. Developing Stuxnet required special knowledge of the control systems as well as substantial resources to develop. Thus we have highly capable and resourceful attackers that go after critical infrastructure. The major concern about Stuxnet however is not the technical mechanisms that the software implements, but the fact that the target has changed the ability to interrupt or modify the operations of industrial control systems could result in the loss of life.
T H E E V O LV I N G T H R E AT L A N D S C A P E
T H E E V O LV I N G T H R E AT L A N D S C A P E
Since 2008 the EU Emission Trading Scheme has been the subject of several attacks. At the beginning of January 2011 close to 30 million euro-worth of emissions allowances were stolen from the national registries.10 This was a cross-border attack with serious financial impact. In March 2011, the security firm RSA11 issued a statement that there had been an attack against their infrastructure which they categorised as an Advanced Persistent Threat (APT). This means that for some time they had been under a sophisticated attack which seems to have had the purpose of extracting specific information on their SecurID two-factor authentication products, probably as preparation for future attacks.
In April 2011, Sonys online gaming platform, the PlayStation Network, was taken offline after it was attacked and information about more than 100 million users was stolen.12 It is still not known how much the attack will cost Sony, but it is likely to be considerable and one estimate is as high as $2 billion.13 This shows how an attack on one company can seriously affect and undermine the trust of users across the globe. More generally, it illustrates how attacks can affect entire businesses.
(footnote: http://www.rijksoverheid.nl/documenten-enpublicaties/rapporten/2011/09/05/diginotar-publicreport-version-1.html) Of course, it is not only threats that are evolving. The countermeasures to tackle them have also changed. These developments include improvements to networking best practices; more focused policies, regulations and directives; increased insight into multi-sector implications of security issues; and the recognition of the importance of having a global perspective on NIS. It is important to maintain and adapt these efforts to improve NIS to keep pace with the continuous evolution and increasing pervasiveness of ICTs.
Diginotar, an SSL certificate authority, recently suffered a cyber-attack which has led to its subsequent bankruptcy. Fox IT reports that the first traces of the cyber-attack date from the 17th of June 2011. The attacker was able to create fraudulent SSL certificates for hundreds of sites, including Google and Skype. Fake SSL certificates can be used to intercept encrypted web browsing, machine-tomachine communications (web services) and to fake electronic signatures. DNSSEC also relies on SSL certificates to validate the link between IP addresses and domain names.
10 T H E E V O L V I N G T H R E A T L A N D S C A P E
T H E E V O LV I N G T H R E AT L A N D S C A P E
11
the bank. On the internet the time and place of the crime are not dependent on each other. If I am phishing, I can take money illegally from a persons bank account at any place in the world and at any time. This also means that I may find myself in different legal systems. It may be impossible for the prosecution authorities in country A to arrest a criminal in country B. Cybercrime often also allows organised crime to scale up its illegal operations. Cyber espionage: Espionage has been around for a long time and will continue to be present as long as there are national state interests and intelligence services. However, whereas in the past the spy had to run the risk of having his cover blown at the crime scene, today he can spy unseen from afar using technology (for example Trojan horses14).
Cyber security: This refers to the protection of information, information systems, infrastructure and the applications that run on top of it from those threats that are associated with a globally connected environment. Cyber warfare: In the past, troops from opposing countries confronted each other on a battlefield, and rules for warfare were written if not always followed. The Geneva Convention,15 for example, describes rules for the protection of people who do not take part in the fighting. Outside these rules, terrorist organisations seek to achieve mainly political aims by operations which, under state legislation, are assessed as criminal acts. With internet technology it is possible for an individual, group or state to carry out remotely controlled, often covert, cyber attacks on critical infrastructures16 of a state. Therefore the line between soldier, terrorist and criminal becomes blurred.
These terms are not mutually independent and there are many overlaps of scope when discussions take place, especially at a more detailed level, where similar issues and problems are discussed by many communities in both the public and private sectors. Unfortunately, information and experiences are often not shared across communities. This represents a significant challenge for Europe over the next decade and can also be seen as an opportunity. A truly effective approach to dealing with the issues underlying all these related areas will require close collaboration between different communities and a corresponding alignment of approaches. Finally, our efforts to protect the European information society must not be restricted by definitions of words and artificial barriers to communications, which our adversaries are not subject to - and which they may actually benefit from if our responses are not coordinated across sectors and national borders.
14 http://en.wikipedia.org/wiki/Trojan_horse_%28computing%29 15 http://en.wikipedia.org/wiki/Geneva_convention 16 http://en.wikipedia.org/wiki/Critical_infrastructure
M I T I G AT I N G T H E T H R E AT S A F R A G M E N T E D A P P R O A C H
13
14 E N S U R I N G A C O H E R E N T P A N - E U R O P E A N A P P R O A C H
E N S U R I N G A C O H E R E N T PA N - E U R O P E A N A P P R O A C H
15
ENISAs Role
ENISA is working together with the Member States to secure Europes information society. A significant part of this effort is concerned with protecting our infrastructure and applications, and ensuring that we are prepared for incidents when they do happen by reinforcing incident response capabilities across Europe. The focus of ENISA is on cross-border issues, helping Member States to identify dependencies and to decide on the most appropriate way to deal with them. The Agency achieves this in a number of different ways. By acting as a neutral European platform for information sharing - and for establishing and maintaining networks and communities - we promote dialogue and help Member States to align their approaches to specific issues. This role is also important in a more general context where ENISA facilitates dialogue between European actors and their international counterparts. The Agency also provides expertise and advice to a variety of stakeholders, particularly in the area of development and implementation of standards and good
16 E N I S A S R O L E
These are explored in more detail below. On the one hand we are increasingly aware of how sensitive and how vulnerable to attack our IT infrastructures are and on the other hand we lack adequate information by which to be able to recognise and react to dangers in due time. An example of this is botnets.20 This is a very complex problem to solve because there are so many parties involved the owners of infected PCs, ISPs, the victims of extortion or click fraud21, law enforcement, software vendors etc. To make the most of the limited funds available for fighting botnets it is essential to have accurate assessments of the relative size and impact of different botnets. However, the current estimates of the extent of infected machines and botnet activities vary wildly by up to a factor of seven.22 More generally, we need to move from a situation in which we are making decisions based on information about attacks to a situation in which we are able to refer to discrete data.
Identification and analysis of emerging trends and threats Awareness of NIS risks and challenges Early warning and response Critical information infrastructure protection Supporting the international CERT community Adequate and consistent policy implementation Actions against cybercrime International cooperation Information exchange Building communities
ENISA can support the European Commission and Member States by providing them with information on trends, emerging threats and by providing guidance on risk management and appropriate preventative and response measures. For example, ENISA has produced a report on Botnets entitled Botnets: Measurement, Detection, Disinfection and Defence which is a comprehensive report on how to assess botnet threats and how to neutralise them.23 At the moment ENISA does not collect and analyse data on cyber-attacks. However, this could be useful as it would enable ENISA to identify pan-European trends and to report these back to the Member States. ENISA can also facilitate dialogue on NIS across communities and with different international counterparts. We believe that this dialogue is a critical precursor to any long-term action plan for protecting information services that benefit EU citizens.
E N I S A S R O L E
17
E N I S A S R O L E
19
of this exercise was that procedures to handle cyber incidents do not yet exist on a pan-European level and that there is a need to improve response collaboration across Europe.30 Following on from this work, ENISA has recently been asked to facilitate the planning of the first EU-US cyber security exercise, which will happen before the end of 2011. This exercise represents an important development in international cooperation and ENISA appreciates that the Agencys expertise is being called upon to support this effort. Despite the fact that such a project is a great challenge for the Agency, we are confident that we can work together with the Member States and the USA to enhance transatlantic cyber security and cooperation.31
need to be designed to be capable of delivering results in a cross-border environment. ENISA is supporting the Member States in the implementation of article 13a of the telecommunications directive.32 This is important because it is the first attempt to collect data on security breach notifications at the panEuropean level. In addition to supporting the Member States with implementation, we are also working on the broader concept. In particular, we are looking into how this data could sensibly be used to provide Member States with a more complete understanding of security breach trends at the pan-European level. By necessity, we consider this as a long-term goal, as it is critical that Member States fully support any model for exploiting the data that has been provided and that they agree on an overall concept for the use of such data.
28 IP/11/694 29 COM(2011) 163 final 30 http://www.enisa.europa.eu/act/res/cyber-europe-2010/cyber-europe-2010report/view?searchterm=cyber+europe+report 31 MEMO/11/246 32 http://www.enisa.europa.eu/media/news-items/agency-initiative-toimplement-art.-13-of-telecom-package?searchterm=article+13a
E N I S A S R O L E
21
ENISA. ENISA can help the centre set up a dialogue with the CERT community and provide the centre with access to its other stakeholder communities as needed. Furthermore, ENISA can act as a centre of expertise on tools, methods and trends. The cooperation between the cybercrime centre and ENISA will initially focus on improving awareness about trends and emerging threats, as well as concerns and possible barriers to collaboration and information exchange across sectors and national borders. With the different knowledge, focus and expertise of the centre and the Agency, the exchange of methods and information will help in improving skill sets and achieving a more holistic approach to preventing and tackling cybercrime.
At the EU-US summit37 in November 2010, held in Lisbon, it was agreed to set up a working group on cyber security and cybercrime to evaluate and coordinate opportunities for enhanced collaboration. ENISA will contribute to three Expert Sub-Groups (ESGs). These are looking at Public Private Partnerships, Cyber Incident Management and Awareness Raising. ENISA expects that international coordination in the area of information security will grow in importance throughout the next decade as countries become increasingly dependent on ICT functions that are offered and maintained in locations outside national boundaries. The recent phenomenon of cloud computing is highly illustrative of this trend.
International cooperation
The cross-border nature of threats and the associated mitigation mechanisms make it essential to focus on strong international cooperation. This requires major efforts at national level, at pan-European level and globally. There should be close cooperation with international partners to prevent and to respond to cyber incidents.
33 http://www.europol.europa.eu/publications/ European_Organised_Crime_Threat_Assessment_(OCTA)/OCTA_2011.pdf 34 COM(2010) 673 final 35 And for Computer Security Incident Response Teams (CSIRTs). 36 http://ec.europa.eu/commission_20102014/malmstrom/archive/internal_security_strategy_in_action_en.pdf 37 MEMO/10/597
E N I S A S R O L E
23
Information exchange
Information exchange is a fundamental component of any global initiative to improve security. Without effective information exchange mechanisms, European Member States will not be in a position to correctly assess global threats and may therefore put in place procedures and mechanisms that do not address the most important risks. Similarly, poor information exchange mechanisms are likely to result in a duplication of effort and a slower implementation of approaches, processes and technology for mitigating the key risks once they are understood. ENISA has significant experience in promoting the exchange of information related to information security between Member States. In the area of CIIP for instance, the approach has been to work together with Member States in order to identify lessons learned from national approaches and to enable Member States to learn from each other. As a concrete example, one of the preparation activities in the cyber security exercise was the exchange of experience at the national level on preparedness exercises.
Building communities
Given the global nature of ICT, and the growing and ever more sophisticated forms of cyber security threats, international coordination and appropriate networks are indispensable. This includes cooperation throughout Europe as well as globally in both the public and private sectors. Much of our critical information infrastructure is owned and operated by the private sector. As such, addressing threats and strengthening security in the digital society is a shared responsibility of individuals as much as of private and public bodies. A good example of an initiative to build bridges between the public and private sector is the EP3R (European Public-Private Partnership for Resilience) initiative. Since 2009 ENISA has facilitated and supported the activities of the working groups in the EP3R on security and resilience objectives, baseline requirements, as well as good policy practices and measures. With the Lisbon Treaty in force the EU is better placed to take a more holistic approach to cyber security and to exploit synergies in our efforts to improve it. ENISAs mission is to support the Member States and the EU institutions in improving dialogue between communities in the area of NIS. The Agency could sensibly be considered as an interface between different operational communities in general. The objective would be to ensure that the overall approach to improving information security throughout Europe is both coherent and efficient, by identifying synergies and eliminating duplication of work.
The Future
ENISA was established in 2004 with the purpose of contributing to a high level of network and information security for the benefit of citizens, consumers, business and public sector organisations in the European Union, thus contributing to the smooth functioning of the internal market, as set out in the founding regulation of the Agency.38 Since then, the challenges related to NIS have evolved alongside technology and market developments. Therefore, the decision has been taken to modernise and further develop ENISA as an efficient body which serves as the EUs centre of expertise in NIS. The intention is to agree on a new mandate for the Agency, which reflects the constantly evolving NIS environment and will give the Agency more flexibility to interact with and respond to the needs of stakeholders across Europe.
24 E N I S A S R O L E
E N I S A S R O L E
25
Conclusion
ICT developments bring with them considerable benefits for modern society they are a key economic driver and contribute to the competitiveness of the European economy. Such developments however are accompanied by associated risks, and controlling such risks is essential if we are to realise the true benefits. The success of the EU Internal Security Strategy is dependent on the combined efforts of all EU actors, but also on cooperation with the outside world. Only by joining forces and working together to implement this strategy can Member States, EU institutions, bodies and agencies provide a truly coordinated European response to the security threats of our time.40 ENISAs role is to support the Commission and Member States in facilitating dialogue on Network and Information Security across communities and with different international counterparts. As the European Agency for Network and Information Security, ENISA already plays an important role in supporting the EU institutions and the Member States in securing the ICT infrastructure of the future. In particular, by acting as a neutral European platform for information sharing and for establishing and maintaining networks and communities, the Agency promotes dialogue and helps Member States to align their approaches to specific issues. The Agency also provides advice to stakeholders, bridging the gap between policy and operational requirements. There are a number of areas where the current approach to improving cyber security in the EU could sensibly be extended. For example, there is a clear need to collect and analyse data relating to information security in a crossborder context which could reveal trends that are not visible at present. Also, the coming into force of the Lisbon Treaty is an opportunity to improve the level of dialogue between communities in the area of network and information security. A proactive approach to building these new cross-border communities will bring great benefits both in terms of the effectiveness of its approach and efficiency in use of its resources. It is important that our efforts to protect and facilitate the development and prosperity of the European Information Society do not lose momentum. These efforts are addressed on many fronts with multiple stakeholders all are increasing in numbers and scope along with the pervasiveness and economic importance of ICTs. It is important that ENISA is modernised and further developed to allow the Agency to respond to these changes and provide support and expertise for stakeholders across Europe.
26 C O N C L U S I O N
CONCLUSION
27
PO Box 1309 71001 Heraklion Greece Tel: +30 2810 391 280 Fax: +30 2810 391 410 Email: [email protected] www.enisa.europa.eu