TAICS - Cybersecurity Certification for European Market.pptx

Javier Tallón
Javier TallónSecurity Expert em jtsec Beyond IT Security
Cybersecurity
certification for
European market
José Ruiz | JTSEC Cybersecurity Certification for European market
2 / 30
José Ruiz Gualda
jtsec Beyond IT Security
• Computer Engineer (University of Granada)
• Expert in Common Criteria, LINCE and FIPS
140-3
• Member of the SCCG (Stakeholder
Cybersecurity Certification Group) at the
European Commission.
• Editor of LINCE as UNE standard
• Editor in JTC13 WG3 of the FITCEM
Methodology
• European Commission editor for the ERNCIP
group "IACS Cybersecurity Certification".
jruiz@jtsec.es
José Ruiz | JTSEC Cybersecurity Certification for European market
jtsec Beyond IT Security
We are now part of Applus Laboratories
Cybersecurity Company providing
evaluation and consultancy services in
different technical domains (Smart Cards,
Hardware and Software)
Members of the SCCG (Stakeholder
Cybersecurity Certification Group)
First LINCE laboratory accredited by
CCN (Spanish Certification Body).
Developers of unique tools for Common
Criteria (CCToolbox) and LINCE
(LINCEToolbox)
Actively involved in standardization
activities (ISO, CEN/CENELEC, ISCI
WGs, ENISA CSA WGs, CCUF, CMUF,
ERNCIP, …)
Speakers at different events in the sector
such as ICCC, ICMC, CCN-CERT, EUCA
or ENISE).
3 / 30
José Ruiz | JTSEC Cybersecurity Certification for European market
4 / 30
José Ruiz Gualda
jtsec Beyond IT Security
• Computer Engineer (University of Granada)
• Expert in Common Criteria, LINCE and FIPS
140-3
• Member of the SCCG (Stakeholder
Cybersecurity Certification Group) at the
European Commission.
• Editor of LINCE as UNE standard
• Editor in JTC13 WG3 of the FITCEM
Methodology
• European Commission editor for the ERNCIP
group "IACS Cybersecurity Certification".
jruiz@jtsec.es
Some of our Asian customers
Our facilities in Asia
2 Labs (Shangai & Seoul)
4 Sales and Technical Services
INDEX
1. Introduction
2. Certification schemes & methodologies –
ICT Products
3. Overview of the main EU policies on
cybersecurity
4. Recommendatios for the European market
INDEX
1. Introduction
2. Certification schemes & methodologies –
ICT Products
3. Overview of the main EU policies on
cybersecurity
4. Recommendations for the European market
Introduction
José Ruiz | JTSEC Cybersecurity Certification for European market
7 / 30
The market is not only Common Criteria. It’s much bigger
Introduction
José Ruiz | JTSEC Cybersecurity Certification for European market
8/ 30
Number of products certified in the last 5 years
INDEX
1. Introduction
2. Certification schemes & methodologies –
ICT Products
3. Overview of the main EU policies on
cybersecurity
4. Recommendations for the European market
Certification schemes & methodologies
ICT Products (Common Criteria)
José Ruiz | JTSEC Cybersecurity Certification for European market
10/ 30
Common Criteria
An international standard (ISO/IEC
15408) published in 1994 and the
most recognized certification used for
assessing security in ICT products.
• Scope: International (more than 30
countries)
• Validity of the certificate: 5 years
Certification schemes & methodologies
ICT Products (Fixed-time)
José Ruiz | JTSEC Cybersecurity Certification for European market
11 / 30
LINCE
Is an evaluation and certification
methodology for ICT security
products developed by the Spanish
Certification Body (CCN).
• Scope: Spain
• Validity of the certificate: 5 years
CSPN
Developed by ANSSI, certifies the
robustness of a technological product,
based on a conformity analysis and
intrusion tests carried out by a CESTI.
• Scope: France
• Validity of the certificate: 5 years
Certification schemes & methodologies
ICT Products (Fixed-time)
José Ruiz | JTSEC Cybersecurity Certification for European market
12 / 30
BSPA
Is requested for Dutch government
agencies as well as product
manufacturers that want to get a
security-specific certificate for their
products.
• Scope: The Netherlands
• Validity of the certificate: 3 years
BSZ
Is based on predictable evaluation
times and ensures a reasonable level
of expenditure for product. The
evaluation follows a risk-driven
approach that establishes a high level
of trust in the security statements.
• Scope: Germany
• Validity of the certificate: 2 years
Certification schemes & methodologies
ICT Products (IOT Platforms)
José Ruiz | JTSEC Cybersecurity Certification for European market
13 / 30
SESIP
Provides a common and optimized
approach for evaluating the security of
connected products that meets the
specific compliance, security, privacy
and scalability challenges of the
evolving IoT ecosystem.
• Scope: International
• Validity of the certificate: 2 years
PSA
Provides standardized resources to
help resolve the growing fragmentation
of IoT requirements and ensure
security is no longer a barrier to
product development.
• Scope: International
• Validity of the certificate: N/E
GP TEE
Defines an open security architecture
for consumer and connected devices
using a TEE to secure devices,
enabling development & deployment of
secure services.
• Scope: International
• Validity of the certificate: User fixes
the period for the re-assessment.
Certification schemes & methodologies
ICT Products (IOT)
José Ruiz | JTSEC Cybersecurity Certification for European market
14 / 30
ioXt
The program measures a product
against each of the eight ioXt
principles with clear guidelines to
quantify the appropriate level of
security required for a specific product
• Scope: International
• Validity of the certificate: N/E
CSA
Ignites creativity and collaboration in
the IoT by developing, evolving and
promoting universal open standards
that enable all objects to securely
connect and interact.
• Scope: International
• Validity of the certificate: Valid for
the useful life of the product.
Certification schemes & methodologies
ICT Products (IOT Labels)
José Ruiz | JTSEC Cybersecurity Certification for European market
15 / 30
Germany
The IT Security Label creates
transparency for consumers, revealing
basic security features of IT products.
• Scope: Germany
• Validity of the certificate: 2 years
Finland
Created by Traficom in 2020, the
requirements of the Label are based on
ETSI EN 303 645 and have been
prioritized using the OWASP IoT TOP
10 Threat List (2018)development.
• Scope: Finland
• Validity of the certificate: N/E
Singapore
Smart devices are rated according to
their levels of cybersecurity provisions.
Enables consumers to identify products
with better cybersecurity provisions and
make informed decisions.
• Scope: Singapore
• Validity of the certificate: 3 years
Certification schemes & methodologies
ICT Products (Crypto)
José Ruiz | JTSEC Cybersecurity Certification for European market
16 / 30
FIPS 140-3
Developed by NIST defines the
requirements to be satisfied by a
crypto module in order to protect
sensitive information.
• Scope: International
• Validity of the certificate: 5 years
Certification schemes & methodologies
ICT Products (Industrial, operational technology in automation & control systems)
José Ruiz | JTSEC Cybersecurity Certification for European market
17 / 30
IECEE - IEC 62443 4-1 & 4-2
These two standards provide detailed
requirements for IACS products.
throughout their lifecycle.
• Scope: International
• Validity of the certificate: Can vary
depending on the certifying body
and the specific program the
organization adheres to.
ISA Secure
Certifies off-the-shelf products, systems
& development practices. Certifications
are developed and maintained by their
membership
• Scope: International
• Validity of the certificate: can vary
depending on the certifying body and
the specific program the organization
adheres to.
Certification schemes & methodologies
ICT Products (Transport)
José Ruiz | JTSEC Cybersecurity Certification for European market
18 / 30
MiFare
Based on various levels of the ISO/IEC
14443 Type A 13.56 MHz contactless
smart card standard. It uses AES and
DES/Triple-DES encryption standards,
as well as an older proprietary
encryption algorithm, Crypto-1.
• Scope: International
• Validity of the certificate: 5 years
FeliCa
Is an IC Card technology that supports
the entire life cycle of IC cards including
application dev, card issuance,
personalization & daily operation.
• Scope: Hong Kong, Singapore,
Japan, Indonesia, Macau, the
Philippines and the United States
• Validity of the certificate: 10 years
Calypso
Ensures multi-sources of compatible
products enabling the interoperability
between some operators offering a
ticketing system including evolutions
toward mobile phones, account-based
ticketing or public key infrastructure
• Scope: International
• Validity of the certificate: 7 years
Certification schemes & methodologies
ICT Products (Identity & digital signature)
José Ruiz | JTSEC Cybersecurity Certification for European market
19 / 30
FIDO
The FIDO protocols use standard
public key crypto techniques to provide
stronger authentication and are
designed from the ground up to protect
user privacy
• Scope: International
• Validity of the certificate: No
expiration
eIDAS
Set the standards and criteria for
simple electronic signature, advanced
electronic signature, qualified
electronic signature, qualified
certificates and online trust services.
• Scope: European Union
• Validity of the certificate: 5 years
Certification schemes & methodologies
ICT Products (Payment Cards)
José Ruiz | JTSEC Cybersecurity Certification for European market
20 / 30
Payment
Certifications from private companies
focused on payment security playing
crucial role due to the sensitive nature
and potential risks.
• Scope: International
• Validity of the certificate: Depends
Certification schemes & methodologies
ICT Products (POI Categories)
José Ruiz | JTSEC Cybersecurity Certification for European market
21 / 30
PCI
Payment Terminals are evaluated
using the PCI standard. Depending on
the technology used we can find PCI-
PTS, PCI-SPOC, PCI-MPOC, PCI-
CPOC
• Scope: International
• Validity of the certificate: Depending
on the version of the norm and the
approval class of the product
Common. SECC
Covers POIs deployed at merchants in
Germany and the UK. Requires that
terminals are evaluated for security
using Common Criteria (CC).
• Scope: Germany & UK
• Validity of the certificate: 6 years.
Certification schemes & methodologies
ICT Products (Mobility)
José Ruiz | JTSEC
22 / 30
MDCert
Is a certification program under
development by GSMA. It's based mainly
on the ETSI TS 103732. It has potential
implications for further developments
under 5G, eIDAS 2 and eventually CRA
• Scope: International
• Validity of the certificate: N/E
APP Defense Alliance
It's primarily based on OWASP
guidance and tools. The program is
working since 2022 and its
formalization in a scheme will follow
later this 2023.
• Scope: International
• Validity of the certificate: N/E.
Cybersecurity Certification for European market
Certification schemes & methodologies
ICT Products (5G)
José Ruiz | JTSEC Cybersecurity Certification for European market
23 / 30
NESAS
The purpose of the scheme is to audit
and test network equipment vendors,
and their products, against a security
baseline. The scheme has been defined
by industry experts through GSMA and
3GPP.
• Scope: International
• Validity of the certificate: 2 years
NESAS CCS-GI
This national certification scheme for
5G mobile network equipment allows
equipment vendors to demonstrate
compliance with required security
features through an IT security
certificate.
• Scope: Germany
• Validity of the certificate: 2,5 years.
INDEX
1. Introduction
2. Certification schemes & methodologies –
ICT Products
3. Overview of the main EU policies on
cybersecurity
4. Recommendations for the European market
Overview of the main EU policies on cybersecurity
CSA (CyberSecurity Act)
Definition
Proposes the creation of a common European
framework for the certification of "cybersecure" ICT
products and services.
One of the main objectives of the Cybersecurity Act is to
increase the competitiveness and growth of European
companies. Key to this is the ability to issue
cybersecurity certificates recognized throughout
Europe for systems, processes and products while
minimizing their cost.
The Cybersecurity Act aims to achieve this objective by
creating a common European framework for the
development of common schemes for cybersecurity
certification.
The Cybersecurity Act or CSA sets out three levels of
assurance (basic, substantial and high)
José Ruiz | JTSEC Cybersecurity Certification for European market
25 / 30
Overview of the main EU policies on cybersecurity
URWP (Union Rolling Work Programme)
Definition
Created by the European Commission defines the
priorities at European level in terms of cybersecurity
certification. It is a document to be taken into account by
manufacturers, Public Bodies and companies related to
the cybersecurity certification sector.
The URWP contains a series of strategic lines of action,
five to be precise, which focus on improving cybersecurity
in the European Union as a whole, covering both the
public and private sectors:
• International cooperation
• Standardization
• Risk management
• Security by design and security by default
• Consistency between schemes
José Ruiz | JTSEC Cybersecurity Certification for European market
26 / 30
Overview of the main EU policies on cybersecurity
CRA (Cyber Resilience Act)
Definition
The CRA is an initiative that aims to ensure that
vendors establish appropriate cybersecurity
safeguards in the digital products they sell. By
establishing cybersecurity requirements before and after
a product is marketed, the CRA will strengthen the
security and resilience of the entire supply chain for the
benefit of businesses and end consumers.
The main mission of the Cybersecurity Resilience Act is
to fill existing gaps in legislation by creating
horizontal legislation defining European
cybersecurity standards for digital products and
services, as currently EU product-specific legislation
mostly covers security aspects and addresses
cybersecurity only partially.
José Ruiz | JTSEC Cybersecurity Certification for European market
27 / 30
Requirements for manufacturers
• Security by design and by default for all products
within the scope of the regulation.
• Cybersecurity requirements throughout the life cycle
(before and after the product is placed on the market).
• Vulnerability management and (whenever possible)
security patching.
• Transparency of the supply chain of hardware or
software components.
• Enumeration of software components.
• End-user information on the cybersecurity level of
the product.
• Security reporting requirements for each product.
• Post-market security support requirements
(probably limited to a period of 5 years after
commercialization).
Overview of the main EU policies on cybersecurity
NIS2
Definition
The NIS2 directive will establish a set of requirements for
the cybersecurity risk management of critical entities,
in particular those related to energy, health, transport
and digital infrastructure.
The directive aims at eliminating divergences between
the member states regarding cybersecurity and
reporting
obligations to the public authority. To this end, it sets
minimum standards and establishes mechanisms for
effective cooperation between the competent
authorities of each EU Member State. Provides for
heavy sanctions to ensure enforcement
José Ruiz | JTSEC Cybersecurity Certification for European market
28 / 30
Sectors affected by NIS 2
Food Manufacturers Postal & Courier Providers of
electronic
communications
Space Public
Administration
Digital Services Waste water and
waste management
INDEX
1. Introduction
2. Certification schemes & methodologies –
ICT Products
3. Overview of the main EU policies on
cybersecurity
4. Recommendatios for the European market
Recommendations for the European Market
José Ruiz | JTSEC Cybersecurity Certification for European market
30 / 30
• Cybersecurity certification requirements already in force (e.g.
EIDAS)
• Other regulations will come in the following years (e.g.
CRA). This implies mandatory requirements for
manufacturers to be able to do business in Europe
• Methodologies and schemes developed in Europe will be
used.
• Prepare in advance for the introduction on the European
market. E.g. Patch management strategy or Cybersecurity by
design takes time.
• Certifications involve both financial and personnel efforts for
manufacturers. These certifications are not simple to
achieve.
• Stay up to date! Follow standardization efforts! Changes are
coming!!
Thank you
1 de 31

Recomendados

EuroPriSe and ISDP 10003 2015 por
EuroPriSe and ISDP 10003 2015EuroPriSe and ISDP 10003 2015
EuroPriSe and ISDP 10003 2015Marco Moreschini
145 visualizações23 slides
EuroPriSe and ISDP10003 2015 - por
EuroPriSe and ISDP10003  2015 - EuroPriSe and ISDP10003  2015 -
EuroPriSe and ISDP10003 2015 - Marco Moreschini
36 visualizações23 slides
Towards a certification scheme for IoT security evaluation por
Towards a certification scheme for IoT security evaluationTowards a certification scheme for IoT security evaluation
Towards a certification scheme for IoT security evaluationAxel Rennoch
43 visualizações27 slides
Eurosmart etsi-e-io t-scs-presentation por
Eurosmart etsi-e-io t-scs-presentationEurosmart etsi-e-io t-scs-presentation
Eurosmart etsi-e-io t-scs-presentationStefane Mouille
92 visualizações41 slides
德國TSI公司簡報-2 por
德國TSI公司簡報-2德國TSI公司簡報-2
德國TSI公司簡報-2俠客科技
830 visualizações20 slides
Experiences evaluating cloud services and products por
Experiences evaluating cloud services and productsExperiences evaluating cloud services and products
Experiences evaluating cloud services and productsJavier Tallón
10 visualizações26 slides

Mais conteúdo relacionado

Similar a TAICS - Cybersecurity Certification for European Market.pptx

Ethical hacking, the way to get product & solution confidence and trust in an... por
Ethical hacking, the way to get product & solution confidence and trust in an...Ethical hacking, the way to get product & solution confidence and trust in an...
Ethical hacking, the way to get product & solution confidence and trust in an...Pierre-Jean Verrando
105 visualizações10 slides
05_Alter Technology_Julián Gallego por
05_Alter Technology_Julián Gallego05_Alter Technology_Julián Gallego
05_Alter Technology_Julián GallegoElena Cortés Ventura
266 visualizações7 slides
05_Alter Technology_Julián Gallego por
05_Alter Technology_Julián Gallego05_Alter Technology_Julián Gallego
05_Alter Technology_Julián GallegoRedit
638 visualizações7 slides
Industrial Automation Control Systems Cybersecurity Certification. Chapter II por
Industrial Automation Control Systems Cybersecurity Certification.  Chapter IIIndustrial Automation Control Systems Cybersecurity Certification.  Chapter II
Industrial Automation Control Systems Cybersecurity Certification. Chapter IIJavier Tallón
230 visualizações24 slides
ECIL: EU Cybersecurity Package and EU Certification Framework por
ECIL: EU Cybersecurity Package and EU Certification FrameworkECIL: EU Cybersecurity Package and EU Certification Framework
ECIL: EU Cybersecurity Package and EU Certification FrameworkDeutsche Telekom AG
499 visualizações29 slides
PLNOG20 - Janusz Pieczerak - European Cyber Security Organisation – lesson le... por
PLNOG20 - Janusz Pieczerak - European Cyber Security Organisation – lesson le...PLNOG20 - Janusz Pieczerak - European Cyber Security Organisation – lesson le...
PLNOG20 - Janusz Pieczerak - European Cyber Security Organisation – lesson le...PROIDEA
37 visualizações25 slides

Similar a TAICS - Cybersecurity Certification for European Market.pptx(20)

Ethical hacking, the way to get product & solution confidence and trust in an... por Pierre-Jean Verrando
Ethical hacking, the way to get product & solution confidence and trust in an...Ethical hacking, the way to get product & solution confidence and trust in an...
Ethical hacking, the way to get product & solution confidence and trust in an...
Pierre-Jean Verrando105 visualizações
05_Alter Technology_Julián Gallego por Elena Cortés Ventura
05_Alter Technology_Julián Gallego05_Alter Technology_Julián Gallego
05_Alter Technology_Julián Gallego
Elena Cortés Ventura266 visualizações
05_Alter Technology_Julián Gallego por Redit
05_Alter Technology_Julián Gallego05_Alter Technology_Julián Gallego
05_Alter Technology_Julián Gallego
Redit638 visualizações
Industrial Automation Control Systems Cybersecurity Certification. Chapter II por Javier Tallón
Industrial Automation Control Systems Cybersecurity Certification.  Chapter IIIndustrial Automation Control Systems Cybersecurity Certification.  Chapter II
Industrial Automation Control Systems Cybersecurity Certification. Chapter II
Javier Tallón230 visualizações
ECIL: EU Cybersecurity Package and EU Certification Framework por Deutsche Telekom AG
ECIL: EU Cybersecurity Package and EU Certification FrameworkECIL: EU Cybersecurity Package and EU Certification Framework
ECIL: EU Cybersecurity Package and EU Certification Framework
Deutsche Telekom AG499 visualizações
PLNOG20 - Janusz Pieczerak - European Cyber Security Organisation – lesson le... por PROIDEA
PLNOG20 - Janusz Pieczerak - European Cyber Security Organisation – lesson le...PLNOG20 - Janusz Pieczerak - European Cyber Security Organisation – lesson le...
PLNOG20 - Janusz Pieczerak - European Cyber Security Organisation – lesson le...
PROIDEA37 visualizações
H2020 project WITDOM overview por Elsa Prieto
H2020 project WITDOM overviewH2020 project WITDOM overview
H2020 project WITDOM overview
Elsa Prieto523 visualizações
Huwei Cyber Security Presentation por Peter921148
Huwei Cyber Security PresentationHuwei Cyber Security Presentation
Huwei Cyber Security Presentation
Peter92114834 visualizações
Cybersecurity Implementation and Certification in Practice for IoT Equipment por Onward Security
Cybersecurity Implementation and Certification in Practice for IoT EquipmentCybersecurity Implementation and Certification in Practice for IoT Equipment
Cybersecurity Implementation and Certification in Practice for IoT Equipment
Onward Security62 visualizações
Trust and security technologies: Lessons from the CRISP project por Trilateral Research
Trust and security technologies: Lessons from the CRISP projectTrust and security technologies: Lessons from the CRISP project
Trust and security technologies: Lessons from the CRISP project
Trilateral Research7.2K visualizações
Can Trust In Security TEchnologies be Enhanced through Certification? por CRISP Project
Can Trust In Security TEchnologies be Enhanced through Certification?Can Trust In Security TEchnologies be Enhanced through Certification?
Can Trust In Security TEchnologies be Enhanced through Certification?
CRISP Project198 visualizações
Activity1 c1 por FORMAEMPLEO
Activity1 c1Activity1 c1
Activity1 c1
FORMAEMPLEO44 visualizações
160405 Catálogos Industriais por Zoltan Patkai
160405  Catálogos Industriais160405  Catálogos Industriais
160405 Catálogos Industriais
Zoltan Patkai169 visualizações
Security5Security5 is an entry level certifi cation fo.docx por bagotjesusa
Security5Security5 is an entry level certifi cation fo.docxSecurity5Security5 is an entry level certifi cation fo.docx
Security5Security5 is an entry level certifi cation fo.docx
bagotjesusa4 visualizações
Plaquette rescoll etv en por José ALCORTA
Plaquette rescoll etv enPlaquette rescoll etv en
Plaquette rescoll etv en
José ALCORTA185 visualizações
The European cyber security cPPP strategic research & innovation agenda por EUBrasilCloudFORUM .
The European cyber security cPPP strategic research & innovation agendaThe European cyber security cPPP strategic research & innovation agenda
The European cyber security cPPP strategic research & innovation agenda
EUBrasilCloudFORUM .234 visualizações
Spanish catalogue of qualified products - a new way of using CC for procurement por Javier Tallón
Spanish catalogue of qualified products - a new way of using CC for procurementSpanish catalogue of qualified products - a new way of using CC for procurement
Spanish catalogue of qualified products - a new way of using CC for procurement
Javier Tallón362 visualizações
EUCA23 - Evolution of cryptographic evaluation in Europe.pdf por Javier Tallón
EUCA23 - Evolution of cryptographic evaluation in Europe.pdfEUCA23 - Evolution of cryptographic evaluation in Europe.pdf
EUCA23 - Evolution of cryptographic evaluation in Europe.pdf
Javier Tallón14 visualizações
Metholodogies and Security Standards por Conferencias FIST
Metholodogies and Security StandardsMetholodogies and Security Standards
Metholodogies and Security Standards
Conferencias FIST436 visualizações

Mais de Javier Tallón

ICCC2023 Statistics Report, has Common Criteria reached its peak? por
ICCC2023 Statistics Report, has Common Criteria reached its peak?ICCC2023 Statistics Report, has Common Criteria reached its peak?
ICCC2023 Statistics Report, has Common Criteria reached its peak?Javier Tallón
27 visualizações29 slides
ICCC23 -The new cryptographic evaluation methodology created by CCN por
ICCC23 -The new cryptographic evaluation methodology created by CCNICCC23 -The new cryptographic evaluation methodology created by CCN
ICCC23 -The new cryptographic evaluation methodology created by CCNJavier Tallón
5 visualizações44 slides
La ventaja de implementar una solución de ciberseguridad certificada por el C... por
La ventaja de implementar una solución de ciberseguridad certificada por el C...La ventaja de implementar una solución de ciberseguridad certificada por el C...
La ventaja de implementar una solución de ciberseguridad certificada por el C...Javier Tallón
9 visualizações24 slides
Hacking your jeta.pdf por
Hacking your jeta.pdfHacking your jeta.pdf
Hacking your jeta.pdfJavier Tallón
13 visualizações43 slides
Evolucionado la evaluación Criptográfica por
Evolucionado la evaluación CriptográficaEvolucionado la evaluación Criptográfica
Evolucionado la evaluación CriptográficaJavier Tallón
22 visualizações31 slides
España y CCN como referentes en la evaluación de ciberseguridad de soluciones... por
España y CCN como referentes en la evaluación de ciberseguridad de soluciones...España y CCN como referentes en la evaluación de ciberseguridad de soluciones...
España y CCN como referentes en la evaluación de ciberseguridad de soluciones...Javier Tallón
8 visualizações26 slides

Mais de Javier Tallón(20)

ICCC2023 Statistics Report, has Common Criteria reached its peak? por Javier Tallón
ICCC2023 Statistics Report, has Common Criteria reached its peak?ICCC2023 Statistics Report, has Common Criteria reached its peak?
ICCC2023 Statistics Report, has Common Criteria reached its peak?
Javier Tallón27 visualizações
ICCC23 -The new cryptographic evaluation methodology created by CCN por Javier Tallón
ICCC23 -The new cryptographic evaluation methodology created by CCNICCC23 -The new cryptographic evaluation methodology created by CCN
ICCC23 -The new cryptographic evaluation methodology created by CCN
Javier Tallón5 visualizações
La ventaja de implementar una solución de ciberseguridad certificada por el C... por Javier Tallón
La ventaja de implementar una solución de ciberseguridad certificada por el C...La ventaja de implementar una solución de ciberseguridad certificada por el C...
La ventaja de implementar una solución de ciberseguridad certificada por el C...
Javier Tallón9 visualizações
Hacking your jeta.pdf por Javier Tallón
Hacking your jeta.pdfHacking your jeta.pdf
Hacking your jeta.pdf
Javier Tallón13 visualizações
Evolucionado la evaluación Criptográfica por Javier Tallón
Evolucionado la evaluación CriptográficaEvolucionado la evaluación Criptográfica
Evolucionado la evaluación Criptográfica
Javier Tallón22 visualizações
España y CCN como referentes en la evaluación de ciberseguridad de soluciones... por Javier Tallón
España y CCN como referentes en la evaluación de ciberseguridad de soluciones...España y CCN como referentes en la evaluación de ciberseguridad de soluciones...
España y CCN como referentes en la evaluación de ciberseguridad de soluciones...
Javier Tallón8 visualizações
EUCA22 Panel Discussion: Differences between lightweight certification schemes por Javier Tallón
EUCA22 Panel Discussion: Differences between lightweight certification schemesEUCA22 Panel Discussion: Differences between lightweight certification schemes
EUCA22 Panel Discussion: Differences between lightweight certification schemes
Javier Tallón16 visualizações
EUCA22 - Patch Management ISO_IEC 15408 & 18045 por Javier Tallón
EUCA22 - Patch Management ISO_IEC 15408 & 18045EUCA22 - Patch Management ISO_IEC 15408 & 18045
EUCA22 - Patch Management ISO_IEC 15408 & 18045
Javier Tallón22 visualizações
Cross standard and scheme composition - A needed cornerstone for the European... por Javier Tallón
Cross standard and scheme composition - A needed cornerstone for the European...Cross standard and scheme composition - A needed cornerstone for the European...
Cross standard and scheme composition - A needed cornerstone for the European...
Javier Tallón16 visualizações
¿Cómo incluir productos y servicios en el catálogo CPSTIC (CCN-STIC 105)? por Javier Tallón
¿Cómo incluir productos y servicios en el catálogo CPSTIC (CCN-STIC 105)?¿Cómo incluir productos y servicios en el catálogo CPSTIC (CCN-STIC 105)?
¿Cómo incluir productos y servicios en el catálogo CPSTIC (CCN-STIC 105)?
Javier Tallón33 visualizações
Is Automation Necessary for the CC Survival? por Javier Tallón
Is Automation Necessary for the CC Survival?Is Automation Necessary for the CC Survival?
Is Automation Necessary for the CC Survival?
Javier Tallón10 visualizações
CCCAB tool - Making CABs life easy - Chapter 2 por Javier Tallón
CCCAB tool - Making CABs life easy - Chapter 2CCCAB tool - Making CABs life easy - Chapter 2
CCCAB tool - Making CABs life easy - Chapter 2
Javier Tallón10 visualizações
2022 CC Statistics report: will this year beat last year's record number of c... por Javier Tallón
2022 CC Statistics report: will this year beat last year's record number of c...2022 CC Statistics report: will this year beat last year's record number of c...
2022 CC Statistics report: will this year beat last year's record number of c...
Javier Tallón58 visualizações
CCCAB, la apuesta europea por la automatización de los Organismos de Certific... por Javier Tallón
CCCAB, la apuesta europea por la automatización de los Organismos de Certific...CCCAB, la apuesta europea por la automatización de los Organismos de Certific...
CCCAB, la apuesta europea por la automatización de los Organismos de Certific...
Javier Tallón59 visualizações
Automating Common Criteria por Javier Tallón
Automating Common Criteria Automating Common Criteria
Automating Common Criteria
Javier Tallón127 visualizações
CCCAB - Making CABs life easy por Javier Tallón
CCCAB -  Making CABs life easyCCCAB -  Making CABs life easy
CCCAB - Making CABs life easy
Javier Tallón86 visualizações
ICCC21 2021 statistics report por Javier Tallón
ICCC21 2021 statistics reportICCC21 2021 statistics report
ICCC21 2021 statistics report
Javier Tallón71 visualizações
III Encuentro del ENS- Usando el CPSTIC/ENECSTI en la administración - Herram... por Javier Tallón
III Encuentro del ENS- Usando el CPSTIC/ENECSTI en la administración - Herram...III Encuentro del ENS- Usando el CPSTIC/ENECSTI en la administración - Herram...
III Encuentro del ENS- Usando el CPSTIC/ENECSTI en la administración - Herram...
Javier Tallón112 visualizações
Demostrando la ciberseguridad de tus productos y sistemas mediante auditoría ... por Javier Tallón
Demostrando la ciberseguridad de tus productos y sistemas mediante auditoría ...Demostrando la ciberseguridad de tus productos y sistemas mediante auditoría ...
Demostrando la ciberseguridad de tus productos y sistemas mediante auditoría ...
Javier Tallón127 visualizações
La certificación de ciberseguridad en Europa, un desafío común. por Javier Tallón
La certificación de ciberseguridad en Europa, un desafío común.La certificación de ciberseguridad en Europa, un desafío común.
La certificación de ciberseguridad en Europa, un desafío común.
Javier Tallón169 visualizações

Último

Amine el bouzalimi por
Amine el bouzalimiAmine el bouzalimi
Amine el bouzalimiAmine EL BOUZALIMI
5 visualizações38 slides
hamro digital logics.pptx por
hamro digital logics.pptxhamro digital logics.pptx
hamro digital logics.pptxtupeshghimire
11 visualizações36 slides
cis5-Project-11a-Harry Lai por
cis5-Project-11a-Harry Laicis5-Project-11a-Harry Lai
cis5-Project-11a-Harry Laiharrylai126
9 visualizações11 slides
ATPMOUSE_융합2조.pptx por
ATPMOUSE_융합2조.pptxATPMOUSE_융합2조.pptx
ATPMOUSE_융합2조.pptxkts120898
35 visualizações70 slides
The Dark Web : Hidden Services por
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden ServicesAnshu Singh
19 visualizações24 slides
Cracking the Code Decoding Leased Line Quotes for Connectivity Excellence.pptx por
Cracking the Code Decoding Leased Line Quotes for Connectivity Excellence.pptxCracking the Code Decoding Leased Line Quotes for Connectivity Excellence.pptx
Cracking the Code Decoding Leased Line Quotes for Connectivity Excellence.pptxLeasedLinesQuote
5 visualizações8 slides

Último(10)

hamro digital logics.pptx por tupeshghimire
hamro digital logics.pptxhamro digital logics.pptx
hamro digital logics.pptx
tupeshghimire11 visualizações
cis5-Project-11a-Harry Lai por harrylai126
cis5-Project-11a-Harry Laicis5-Project-11a-Harry Lai
cis5-Project-11a-Harry Lai
harrylai1269 visualizações
ATPMOUSE_융합2조.pptx por kts120898
ATPMOUSE_융합2조.pptxATPMOUSE_융합2조.pptx
ATPMOUSE_융합2조.pptx
kts12089835 visualizações
The Dark Web : Hidden Services por Anshu Singh
The Dark Web : Hidden ServicesThe Dark Web : Hidden Services
The Dark Web : Hidden Services
Anshu Singh19 visualizações
Cracking the Code Decoding Leased Line Quotes for Connectivity Excellence.pptx por LeasedLinesQuote
Cracking the Code Decoding Leased Line Quotes for Connectivity Excellence.pptxCracking the Code Decoding Leased Line Quotes for Connectivity Excellence.pptx
Cracking the Code Decoding Leased Line Quotes for Connectivity Excellence.pptx
LeasedLinesQuote5 visualizações
Affiliate Marketing por Navin Dhanuka
Affiliate MarketingAffiliate Marketing
Affiliate Marketing
Navin Dhanuka20 visualizações
WITS Deck por W.I.T.S.
WITS DeckWITS Deck
WITS Deck
W.I.T.S.27 visualizações
How to think like a threat actor for Kubernetes.pptx por LibbySchulze1
How to think like a threat actor for Kubernetes.pptxHow to think like a threat actor for Kubernetes.pptx
How to think like a threat actor for Kubernetes.pptx
LibbySchulze17 visualizações

TAICS - Cybersecurity Certification for European Market.pptx

  • 2. José Ruiz | JTSEC Cybersecurity Certification for European market 2 / 30 José Ruiz Gualda jtsec Beyond IT Security • Computer Engineer (University of Granada) • Expert in Common Criteria, LINCE and FIPS 140-3 • Member of the SCCG (Stakeholder Cybersecurity Certification Group) at the European Commission. • Editor of LINCE as UNE standard • Editor in JTC13 WG3 of the FITCEM Methodology • European Commission editor for the ERNCIP group "IACS Cybersecurity Certification". jruiz@jtsec.es
  • 3. José Ruiz | JTSEC Cybersecurity Certification for European market jtsec Beyond IT Security We are now part of Applus Laboratories Cybersecurity Company providing evaluation and consultancy services in different technical domains (Smart Cards, Hardware and Software) Members of the SCCG (Stakeholder Cybersecurity Certification Group) First LINCE laboratory accredited by CCN (Spanish Certification Body). Developers of unique tools for Common Criteria (CCToolbox) and LINCE (LINCEToolbox) Actively involved in standardization activities (ISO, CEN/CENELEC, ISCI WGs, ENISA CSA WGs, CCUF, CMUF, ERNCIP, …) Speakers at different events in the sector such as ICCC, ICMC, CCN-CERT, EUCA or ENISE). 3 / 30
  • 4. José Ruiz | JTSEC Cybersecurity Certification for European market 4 / 30 José Ruiz Gualda jtsec Beyond IT Security • Computer Engineer (University of Granada) • Expert in Common Criteria, LINCE and FIPS 140-3 • Member of the SCCG (Stakeholder Cybersecurity Certification Group) at the European Commission. • Editor of LINCE as UNE standard • Editor in JTC13 WG3 of the FITCEM Methodology • European Commission editor for the ERNCIP group "IACS Cybersecurity Certification". jruiz@jtsec.es Some of our Asian customers Our facilities in Asia 2 Labs (Shangai & Seoul) 4 Sales and Technical Services
  • 5. INDEX 1. Introduction 2. Certification schemes & methodologies – ICT Products 3. Overview of the main EU policies on cybersecurity 4. Recommendatios for the European market
  • 6. INDEX 1. Introduction 2. Certification schemes & methodologies – ICT Products 3. Overview of the main EU policies on cybersecurity 4. Recommendations for the European market
  • 7. Introduction José Ruiz | JTSEC Cybersecurity Certification for European market 7 / 30 The market is not only Common Criteria. It’s much bigger
  • 8. Introduction José Ruiz | JTSEC Cybersecurity Certification for European market 8/ 30 Number of products certified in the last 5 years
  • 9. INDEX 1. Introduction 2. Certification schemes & methodologies – ICT Products 3. Overview of the main EU policies on cybersecurity 4. Recommendations for the European market
  • 10. Certification schemes & methodologies ICT Products (Common Criteria) José Ruiz | JTSEC Cybersecurity Certification for European market 10/ 30 Common Criteria An international standard (ISO/IEC 15408) published in 1994 and the most recognized certification used for assessing security in ICT products. • Scope: International (more than 30 countries) • Validity of the certificate: 5 years
  • 11. Certification schemes & methodologies ICT Products (Fixed-time) José Ruiz | JTSEC Cybersecurity Certification for European market 11 / 30 LINCE Is an evaluation and certification methodology for ICT security products developed by the Spanish Certification Body (CCN). • Scope: Spain • Validity of the certificate: 5 years CSPN Developed by ANSSI, certifies the robustness of a technological product, based on a conformity analysis and intrusion tests carried out by a CESTI. • Scope: France • Validity of the certificate: 5 years
  • 12. Certification schemes & methodologies ICT Products (Fixed-time) José Ruiz | JTSEC Cybersecurity Certification for European market 12 / 30 BSPA Is requested for Dutch government agencies as well as product manufacturers that want to get a security-specific certificate for their products. • Scope: The Netherlands • Validity of the certificate: 3 years BSZ Is based on predictable evaluation times and ensures a reasonable level of expenditure for product. The evaluation follows a risk-driven approach that establishes a high level of trust in the security statements. • Scope: Germany • Validity of the certificate: 2 years
  • 13. Certification schemes & methodologies ICT Products (IOT Platforms) José Ruiz | JTSEC Cybersecurity Certification for European market 13 / 30 SESIP Provides a common and optimized approach for evaluating the security of connected products that meets the specific compliance, security, privacy and scalability challenges of the evolving IoT ecosystem. • Scope: International • Validity of the certificate: 2 years PSA Provides standardized resources to help resolve the growing fragmentation of IoT requirements and ensure security is no longer a barrier to product development. • Scope: International • Validity of the certificate: N/E GP TEE Defines an open security architecture for consumer and connected devices using a TEE to secure devices, enabling development & deployment of secure services. • Scope: International • Validity of the certificate: User fixes the period for the re-assessment.
  • 14. Certification schemes & methodologies ICT Products (IOT) José Ruiz | JTSEC Cybersecurity Certification for European market 14 / 30 ioXt The program measures a product against each of the eight ioXt principles with clear guidelines to quantify the appropriate level of security required for a specific product • Scope: International • Validity of the certificate: N/E CSA Ignites creativity and collaboration in the IoT by developing, evolving and promoting universal open standards that enable all objects to securely connect and interact. • Scope: International • Validity of the certificate: Valid for the useful life of the product.
  • 15. Certification schemes & methodologies ICT Products (IOT Labels) José Ruiz | JTSEC Cybersecurity Certification for European market 15 / 30 Germany The IT Security Label creates transparency for consumers, revealing basic security features of IT products. • Scope: Germany • Validity of the certificate: 2 years Finland Created by Traficom in 2020, the requirements of the Label are based on ETSI EN 303 645 and have been prioritized using the OWASP IoT TOP 10 Threat List (2018)development. • Scope: Finland • Validity of the certificate: N/E Singapore Smart devices are rated according to their levels of cybersecurity provisions. Enables consumers to identify products with better cybersecurity provisions and make informed decisions. • Scope: Singapore • Validity of the certificate: 3 years
  • 16. Certification schemes & methodologies ICT Products (Crypto) José Ruiz | JTSEC Cybersecurity Certification for European market 16 / 30 FIPS 140-3 Developed by NIST defines the requirements to be satisfied by a crypto module in order to protect sensitive information. • Scope: International • Validity of the certificate: 5 years
  • 17. Certification schemes & methodologies ICT Products (Industrial, operational technology in automation & control systems) José Ruiz | JTSEC Cybersecurity Certification for European market 17 / 30 IECEE - IEC 62443 4-1 & 4-2 These two standards provide detailed requirements for IACS products. throughout their lifecycle. • Scope: International • Validity of the certificate: Can vary depending on the certifying body and the specific program the organization adheres to. ISA Secure Certifies off-the-shelf products, systems & development practices. Certifications are developed and maintained by their membership • Scope: International • Validity of the certificate: can vary depending on the certifying body and the specific program the organization adheres to.
  • 18. Certification schemes & methodologies ICT Products (Transport) José Ruiz | JTSEC Cybersecurity Certification for European market 18 / 30 MiFare Based on various levels of the ISO/IEC 14443 Type A 13.56 MHz contactless smart card standard. It uses AES and DES/Triple-DES encryption standards, as well as an older proprietary encryption algorithm, Crypto-1. • Scope: International • Validity of the certificate: 5 years FeliCa Is an IC Card technology that supports the entire life cycle of IC cards including application dev, card issuance, personalization & daily operation. • Scope: Hong Kong, Singapore, Japan, Indonesia, Macau, the Philippines and the United States • Validity of the certificate: 10 years Calypso Ensures multi-sources of compatible products enabling the interoperability between some operators offering a ticketing system including evolutions toward mobile phones, account-based ticketing or public key infrastructure • Scope: International • Validity of the certificate: 7 years
  • 19. Certification schemes & methodologies ICT Products (Identity & digital signature) José Ruiz | JTSEC Cybersecurity Certification for European market 19 / 30 FIDO The FIDO protocols use standard public key crypto techniques to provide stronger authentication and are designed from the ground up to protect user privacy • Scope: International • Validity of the certificate: No expiration eIDAS Set the standards and criteria for simple electronic signature, advanced electronic signature, qualified electronic signature, qualified certificates and online trust services. • Scope: European Union • Validity of the certificate: 5 years
  • 20. Certification schemes & methodologies ICT Products (Payment Cards) José Ruiz | JTSEC Cybersecurity Certification for European market 20 / 30 Payment Certifications from private companies focused on payment security playing crucial role due to the sensitive nature and potential risks. • Scope: International • Validity of the certificate: Depends
  • 21. Certification schemes & methodologies ICT Products (POI Categories) José Ruiz | JTSEC Cybersecurity Certification for European market 21 / 30 PCI Payment Terminals are evaluated using the PCI standard. Depending on the technology used we can find PCI- PTS, PCI-SPOC, PCI-MPOC, PCI- CPOC • Scope: International • Validity of the certificate: Depending on the version of the norm and the approval class of the product Common. SECC Covers POIs deployed at merchants in Germany and the UK. Requires that terminals are evaluated for security using Common Criteria (CC). • Scope: Germany & UK • Validity of the certificate: 6 years.
  • 22. Certification schemes & methodologies ICT Products (Mobility) José Ruiz | JTSEC 22 / 30 MDCert Is a certification program under development by GSMA. It's based mainly on the ETSI TS 103732. It has potential implications for further developments under 5G, eIDAS 2 and eventually CRA • Scope: International • Validity of the certificate: N/E APP Defense Alliance It's primarily based on OWASP guidance and tools. The program is working since 2022 and its formalization in a scheme will follow later this 2023. • Scope: International • Validity of the certificate: N/E. Cybersecurity Certification for European market
  • 23. Certification schemes & methodologies ICT Products (5G) José Ruiz | JTSEC Cybersecurity Certification for European market 23 / 30 NESAS The purpose of the scheme is to audit and test network equipment vendors, and their products, against a security baseline. The scheme has been defined by industry experts through GSMA and 3GPP. • Scope: International • Validity of the certificate: 2 years NESAS CCS-GI This national certification scheme for 5G mobile network equipment allows equipment vendors to demonstrate compliance with required security features through an IT security certificate. • Scope: Germany • Validity of the certificate: 2,5 years.
  • 24. INDEX 1. Introduction 2. Certification schemes & methodologies – ICT Products 3. Overview of the main EU policies on cybersecurity 4. Recommendations for the European market
  • 25. Overview of the main EU policies on cybersecurity CSA (CyberSecurity Act) Definition Proposes the creation of a common European framework for the certification of "cybersecure" ICT products and services. One of the main objectives of the Cybersecurity Act is to increase the competitiveness and growth of European companies. Key to this is the ability to issue cybersecurity certificates recognized throughout Europe for systems, processes and products while minimizing their cost. The Cybersecurity Act aims to achieve this objective by creating a common European framework for the development of common schemes for cybersecurity certification. The Cybersecurity Act or CSA sets out three levels of assurance (basic, substantial and high) José Ruiz | JTSEC Cybersecurity Certification for European market 25 / 30
  • 26. Overview of the main EU policies on cybersecurity URWP (Union Rolling Work Programme) Definition Created by the European Commission defines the priorities at European level in terms of cybersecurity certification. It is a document to be taken into account by manufacturers, Public Bodies and companies related to the cybersecurity certification sector. The URWP contains a series of strategic lines of action, five to be precise, which focus on improving cybersecurity in the European Union as a whole, covering both the public and private sectors: • International cooperation • Standardization • Risk management • Security by design and security by default • Consistency between schemes José Ruiz | JTSEC Cybersecurity Certification for European market 26 / 30
  • 27. Overview of the main EU policies on cybersecurity CRA (Cyber Resilience Act) Definition The CRA is an initiative that aims to ensure that vendors establish appropriate cybersecurity safeguards in the digital products they sell. By establishing cybersecurity requirements before and after a product is marketed, the CRA will strengthen the security and resilience of the entire supply chain for the benefit of businesses and end consumers. The main mission of the Cybersecurity Resilience Act is to fill existing gaps in legislation by creating horizontal legislation defining European cybersecurity standards for digital products and services, as currently EU product-specific legislation mostly covers security aspects and addresses cybersecurity only partially. José Ruiz | JTSEC Cybersecurity Certification for European market 27 / 30 Requirements for manufacturers • Security by design and by default for all products within the scope of the regulation. • Cybersecurity requirements throughout the life cycle (before and after the product is placed on the market). • Vulnerability management and (whenever possible) security patching. • Transparency of the supply chain of hardware or software components. • Enumeration of software components. • End-user information on the cybersecurity level of the product. • Security reporting requirements for each product. • Post-market security support requirements (probably limited to a period of 5 years after commercialization).
  • 28. Overview of the main EU policies on cybersecurity NIS2 Definition The NIS2 directive will establish a set of requirements for the cybersecurity risk management of critical entities, in particular those related to energy, health, transport and digital infrastructure. The directive aims at eliminating divergences between the member states regarding cybersecurity and reporting obligations to the public authority. To this end, it sets minimum standards and establishes mechanisms for effective cooperation between the competent authorities of each EU Member State. Provides for heavy sanctions to ensure enforcement José Ruiz | JTSEC Cybersecurity Certification for European market 28 / 30 Sectors affected by NIS 2 Food Manufacturers Postal & Courier Providers of electronic communications Space Public Administration Digital Services Waste water and waste management
  • 29. INDEX 1. Introduction 2. Certification schemes & methodologies – ICT Products 3. Overview of the main EU policies on cybersecurity 4. Recommendatios for the European market
  • 30. Recommendations for the European Market José Ruiz | JTSEC Cybersecurity Certification for European market 30 / 30 • Cybersecurity certification requirements already in force (e.g. EIDAS) • Other regulations will come in the following years (e.g. CRA). This implies mandatory requirements for manufacturers to be able to do business in Europe • Methodologies and schemes developed in Europe will be used. • Prepare in advance for the introduction on the European market. E.g. Patch management strategy or Cybersecurity by design takes time. • Certifications involve both financial and personnel efforts for manufacturers. These certifications are not simple to achieve. • Stay up to date! Follow standardization efforts! Changes are coming!!