Academia.eduAcademia.edu

National Cyber Security, a commitment for everybody

Information and Communications Technology (ICT) have contributed to the welfare and progress of societies, in such a way that a large part of public and private relations depend on these technologies. Over time and throughout evolution risks have emerged that have made it necessary to manage the ICT security. Initially cyber security was concerned with protecting information reactively, although subsequently it has evolved towards a proactive position which identifies and manages risks that threaten cyber space. Within the framework of the SCSI (Spanish Cyber Security Institute) and ISMS Forum, a study was carried out which developed an approach to concepts of cyber space and cyber security, to known risks and threats, to the existing management in Spain, and to the need to develop a National Cyber Security System to promote the integration of all players and instruments involved, both public and private, and to make good use of the opportunities presented by new technologies, as well as to address the challenges that they present. The main conclusions obtained from the study are summarized in this document.

National Cyber Security, a commitment for everybody The need to evolve from a reactive culture to one of prevention and resilience National Cyber Security, a commitment for everybody The need to evolve from a reactive culture to one of prevention and resilience Published in June 2012 Authors Enrique Fojón Chamorro Dr. José Ramón Coz Fernández Ramón Miralles López Samuel Linares Fernández Coordinator Miguel Rego Fernández Editors Gianluca D’Antonio Nathaly Rey Arenas Translated and reviewed by Juan Miguel Velasco López-Urda National Cyber Security, a commitment for everybody Index 1. Introduction 4 2. About the SCSI 7 2.1. Mission of the SCSI 8 2.2. Vision of the SCSI 8 2.3. Main activities of the SCSI 8 3. Evolving towards a comprehensive security model 4. Cyber space and its security 9 11 4.1. An approach to the concept of cyber space 12 4.2. Cyber security 13 5. Cyber space: The new dimension of the operating environment 14 6. The risk status of cyber space 16 6.1. Objectives 17 6.2. Threats 17 6.3. Authorship 18 7. Cyber security in Spain: current status 21 8. Diagnosis of the current status of National Cyber Security 25 9. Why does Spain need a National Cyber Security Strategy? 28 9.1. Why is it a concern? (Risks-Threats) 29 9.2. Who cares? (Those responsible) 29 9.3. How to respond to this concern? (Policies) 30 10. Functions of National Cyber Security 31 10.1. General functions 32 10.2. Operational functions 33 11. Enablers of National Cyber Security 34 11.1. Primary enablers 35 11.2. Secondary enablers 37 12. Organisational structure of National Cyber Security 40 13. Objectives of National Cyber Security 2012-2015 44 14. Actions for attaining National Cyber Security objectives 46 15. Conclusions 53 16. Main and auxiliary bibliography and websites consulted 56 National Cyber Security, a commitment for everybody 1. Introduction 1. Introduction 4 National Cyber Security, a commitment for everybody 1. Introduction Information and Communications Technology (ICT) have contributed to the welfare and progress of societies, in such a way that a large part of public and private relations depend on these technologies. Over time and throughout evolution risks have emerged that have made it necessary to manage the ICT security. Initially cyber security was concerned with protecting information reactively, although subsequently it has evolved towards a proactive position which identifies and manages risks that threaten cyber space. Within the framework of the SCSI (Spanish Cyber Security Institute) and ISMS Forum, a study was carried out which developed an approach to concepts of cyber space and cyber security, to known risks and threats, to the existing management in Spain, and to the need to develop a National Cyber Security System to promote the integration of all players and instruments involved, both public and private, and to make good use of the opportunities presented by new technologies, as well as to address the challenges that they present. The main conclusions obtained from the study are summarised in this document. Organisation of the document This document is divided into 15 Sections, including the present introductory Section. Section 2 discusses the SCSI, Spanish Cyber Security Institute, highlighting its mission, values and principle activities. Section 3 presents the study, explaining the need to evolve from a reactive culture to a culture of prevention and resilience, as well as the need to progress towards a comprehensive security model. Section 4 addresses an approach to the concepts of cyber space and cyber security. Section 5 identifies the strategic importance of cyber space as a new dimension of the operating environment. Section 6 analyses the risk status of cyber space, describing the principle objectives of cyber attacks and the main cyber threats, along with the types and authors of these attacks. Section 7 summarises the current status of cyber security at a national level. Section 8 carries out a diagnosis of National Cyber Security, and lists the main causes that have prevented us from reaching a level of cyber security focused on the status of the risk. Section 9 analyses why we need a National Cyber Security Strategy. Section10 lists and defines the main functions that should be attributed to National Cyber Security. 1. Introduction 5 National Cyber Security, a commitment for everybody Section 11 lists and discusses the enablers of cyber security, who will make it possible to operate cyber security on a national level. Section12 proposes an organisational structure which allows National Cyber Security to be run, controlled and managed. Section 13 sets out the main objectives for National Cyber Security for the period between 2012 and 2015. Section 14 lists a set of actions that will allow the objectives described in Section 13 to be achieved. Finally, Section 15 sets out the main conclusions of the study. 1. Introduction 6 National Cyber Security, a commitment for everybody 2. All about the SCSI 2. All about the SCSI 7 National Cyber Security, a commitment for everybody 2. All about the SCSI In November 2011, within the scope of the ISMS Forum Spain, the Spanish Cyber Security Institute was conceived, hereinafter SCSI. INTERNATIONAL SEMINARS DATA PRIVACY INSTITUTE CLOUD SECURITY ALLIANCE PROTEGETUINFORMACIÓN.COM WWW.ISMS FORUM.ES TRAINING SPANISH CYBER SECURITY INSTITUTE 2.1. Mission of the SCSI The mission of SCSI is to conduct and publish studies, as well as to encourage debates and the exchange of ideas and knowledge, regarding the dependence that the socio-economic development of Spain has on Information and Communications Technology (ICT), and thus create a state of awareness of the need for cyber security in order to control and manage the risk status that this dependency generates. 2.2. Vision of the SCSI The SCSI aims to become a meeting point of bodies, both private and public, and for professionals related to the practices and technologies associated with cyber security, as well as becoming the national reference for their publication for the whole of Spanish society. 2.3. Main activities of the SCSI SCSI’s main activities are: 1. Studies and publications on cyber security. 2. Dialogue with national and international authorities and regulators. 3. Cyber programmes - education/cyber awareness. 4. Holding events in relation to cyber security. 2. Sobre el SCSI 8 National Cyber Security, a commitment for everybody 3. Evolving towards a Comprehensive Security Model 3. Evolving towards a Comprehensive Security Model 9 National Cyber Security, a commitment for everybody 3. Evolving towards a Comprehensive Security Model Security, in all its dimensions and spheres, is the first responsibility of any government. Traditionally security has been primarily handled by the defence sector, since the main risks to the survival and integrity of nations have been of a military nature. However the emergence of new players and risks of a heterogeneous nature have caused many states within our geopolitical environment to carry out an extensive review and transformation of their security and defence policies. This review and transformation is due to a change in the guiding framework for security, driven mainly by the following: 1. The security of states is no longer restricted to the defence of their borders and sovereignty; it also extends to ensuring the welfare of their societies against new risks. 2. Globalization benefits trans-border risks and threats such as terrorism, proliferation of weapons of mass destruction and cyber crime, among others. 3. The emergence of players from different locations and who have different motives, as well as the desire to challenge the rule of law and international order, with the capacity to act within any security dimension, makes it more difficult to attribute responsibility for the assault, and therefore reduces the capacity of the State to respond to aggression. Moreover, this new security model requires that the risks be identified beforehand. In other words, it is necessary to evolve from the current reactive culture to one of prevention and resilience. The phenomenon of globalization, mentioned above, brings with it the freedom of movement of people, goods, services and capital, fostering an evolution towards “linear security” where the separation between domestic and overseas security, defence and domestic policy, and between the public and private, is no longer applicable. Therefore, national security is no longer identified as a type of security or defence, it is not the responsibility of one particular ministry, nor is it separated into a domestic or overseas context, or a reactive or preventive approach, rather it fully includes all of the above. The emergence of cyber space and the need to secure it has meant that the evolution in the security model has accelerated. 3. Evolving towards a Comprehensive Security Model 10 National Cyber Security, a commitment for everybody 4. Cyber space and its security 4. Cyber space and its security 11 National Cyber Security, a commitment for everybody 4. Cyber space and its security Cyber space is now an essential part of our societies and economies, and may even become a determining factor in the evolution of cultures and maybe their convergence. 4.1. An approach to the concept of cyber space Cyber space is the set of means and procedures based on Information and Communications Technology (TIC) which is configured for the provision of services. Cyber space consists of hardware, software, the Internet, information services and systems of control that ensure the provision of services that are essential for the socio-economic activity of any nation, especially those that are connected to its critical infrastructure. Cyber space is structured on three overlapping layers: a physical layer, a logical layer and a social layer, which are in turn comprised of 5 components (see diagram): geographic component, physical network component, logical network components, people and cyber identities. Cyber space: Layers and Components Geographic component Physical network component Physical layer Logical network component Interfaces Logical layer Cyber identities Social layer The physical layer encompasses the geographic component and the physical networks component. The geographical component refers to the physical location of the elements of the physical networks component. The physical network component is made up of hardware and infrastructure that support the networks and their physical connectors (cabling, encoders, routers, servers, computers, etc...). The logical layer is formed of the logical networks component, these are logical connections that exist between the nodes of the networks, a node being any device that is connected to the communications and IT systems network. 4. Cyber space and its security 12 National Cyber Security, a commitment for everybody The social layer is made up of components of people and cyber identity. The people component is formed of the people who interact with cyber space. The relationship between people and cyber identities may be from 1 to n or from n to 1, meaning that a person may have one or more cyber identities and a cyber identity may be used by one or more persons. These cyber identities may be real or spoofed, which allows the user to enjoy certain anonymity and makes it difficult to prosecute criminal conduct that takes place in cyber space. cyber identities are formed by, among other things, email accounts, network user accounts and social media profiles. 4.2. Cyber security Previously cyber security followed an information security approach which only protected information against unauthorised access, use, disclosure, disruption, modification and destruction. Currently this approach is evolving towards cyber space risk management (Information assurance) where cyber security consists of the application of an analysis and management process for risks associated with use, processing, storage and transmission of information and data, as well as risks associated with the systems and processes used, based on internationally accepted standards. One of the reasons for the adoption of this new approach is the characterisation of the cyber space of a certain entity as an ICT system which provides services in a way that allows system security to be achieved when it is in a state of known and controlled risk. Actually, both approaches, information security and information assurance, are different but complementary, and are very often wrongly used without distinction. Moreover, the cyber security of a nation requires that at least two dimensions be proposed: 1. The protection of goods, assets, services, rights and freedoms, within state jurisdiction; 2. And the responsibility regarding cyber security which is shared with other states, bilaterally or by means of supranational bodies. The challenge is to ensure that the aggregation of partial solutions implemented by States, even if done in a coordinated manner, solves global problems created by technologies that break down borders. Cyber space is continually growing and rapidly evolving, reaching a capillarity which enables social, economic and cultural relationships and dependencies, which are fundamental to the development and growth of our country, to be sustained. In summary, cyber security should be formulated proactively as an on-going process of analysis and management of risks associated with cyber space. 4. Cyber space and its security 13 National Cyber Security, a commitment for everybody 5. Cyber space: The new dimension of the operating environment 5. Cyber space: The new dimension of the operating environment 14 National Cyber Security, a commitment for everybody 5. Cyber space: The new dimension of the operating environment Some of our key partners have already formally identified cyber space as a new dimension of the operating environment. Therefore they are equipping their Armed Forces with the cyber capabilities necessary for the undertaking of their tasks. The Armed Forces do not only depend on ICT and IT systems for communicating, directing and controlling operations, coordinating conflicts, obtaining and distributing information in relation to intelligence, carrying out surveillance and reconnaissance, among other military activities; rather they are also using these systems for transforming the way that these actions are planned and executed. At the same time adversaries of any kind (nations, criminal groups or terrorists, etc.) have access to and may use the same technologies in a completely singular and innovative way. Given that the Armed Forces are increasingly dependent on electromagnetic resources and IT networks, which are in a continual process of convergence, a cyber battlefield is emerging. Since the technology that allows the communication and processing of information changes so quickly, the Armed Forces must constantly evaluate which aptitudes and capacities are necessary in order to achieve, conserve and take advantage of this emerging battlefield. The way in which the cyber space technologies are integrated and are employed, in accordance with the operating circumstance of each scenario, will significantly affect the development and end result of military operations. While it is important to stay up-to-date with regard to the knowledge and the application of ICT, it is also important to establish a comprehensive approach to all aspects of cyber operations and to be able to gain an advantage by combining and adapting them to the operating conditions of any given moment. As with the other dimensions of the operating environment (land, sea, air, space), achieving mastery in cyber space implies simultaneously progressing in two aspects of operations: obtaining and maintaining superiority. Although employing emerging technologies before one’s adversary does so provides a great advantage, the vulnerabilities and dependencies generated from implementation in its own networks, systems and sensors should also be taken into account and mitigated. It will probably be even more important to disable, interrupt and cancel out the same capabilities when they are in the hands of our adversaries. To this end the Armed Forces must integrate their capacities from one principle, converting them into elements of one same dimension within modern operations. However, if said integration is not achieved, then at best the progress of operations will not be equal, and could also lead to operational failures. The attendance and participation in this operating space by the security bodies and forces, together with civil initiatives by key organisations within a national security context, shall also have a specific weight on the modus operandi, and therefore mechanisms should be articulated that allow, not only the fluid exchange of information among the armed forces, but also in certain situations of close collaboration. 5. Cyber space: The new dimension of the operating environment 15 National Cyber Security, a commitment for everybody 6. The risk status of cyber space 6. The risk status of cyber space 16 National Cyber Security, a commitment for everybody 6. The risk status of cyber space The rapid evolution of Information and Communications Technology (ICT) is increasing the speed, capacity, flexibility, efficiency and usefulness of the current networks and systems, both within the civil and military scope. These technologies are changing the way in which people interact between themselves and with their environment. This continual and accelerated evolution of the ICT has led to attacks becoming more and more sophisticated and numerous, leading to a cyber space that is ever more hostile, forcing those responsible for National Cyber Security to adopt the most up-to-date technical and human means in order to address the threats and their possible impacts. The main objectives of cyber attacks, the main cyber threats, and the authors of cyber attacks are described below. 6.1. Objectives The objectives of cyber attacks are classified into three major groups: • Governments • Private sector. The private sector includes operators of Critical Infrastructures. • Citizens 6.2. Threats The main threats associated with cyber space can be classified into two major groups: • Threats against information • Threats against ICT infrastructures The threats against information are those that cause the loss, miss-handling, disclosure or misuse of information. Among these threats are: • Espionage. Within this category all varieties of espionage are included, from state espionage to industrial espionage. • Theft and publication of classified or sensitive information. • Theft and publication of personal data. • Digital identity theft. • Fraud. • Advanced Persistent Threats (APT). 6. The risk status of cyber space 17 National Cyber Security, a commitment for everybody Threats against ICT infrastructure are those that cause the temporary, partial or total interruption of certain services or systems. Among these threats are: • Attacks against critical infrastructures. • Attacks against networks and systems. • Attacks against internet services. • Attacks against industrial networks and control systems. • Malware infection. • Attacks against networks, systems or services through third parties. 6.3. Authorship Cyber attacks may be classified, according to their authorship and impact, in accordance with the following categories: • State sponsored attacks. Real world or physical conflict has extended to the virtual world of cyber space. In recent years cyber attacks have been detected against the critical infrastructures of countries and against very specific but equally strategic objectives. Some examples that are known to many sections of the public are the cyber attack of Estonia in 2007, which resulted in the temporary disabling of much of the Baltic country’s critical infrastructures, the cyber attack by Russia against Georgia in 2008 as a prelude to the ground invasion, the Stuxnet cases with cyber attacks against SCADA systems, Duqu with cyber attacks against industrial organisations, the cyber attacks suffered by the classified networks of the United States Government at the hands of hackers based on Chinese territory, and the recent discovery of Flame. Likewise, in recent years it has been detected that some states have invested large amounts of economic, technical and human resources in the development of Advanced Persistent Threats (APT) which attack aggressively and choose very specific goals in order to maintain a constant presence within the networks of the victims. The APT attacks are very difficult to detect due to the fact that they use components and techniques that are especially designed to infiltrate their objectives and remain there without being detected. • Attacks sponsored by private organisations. The objective of many private organisations is to obtain industrial secrets from other organisations or governments. This type of attack, on many occasions, is executed with government support making equal use of APTs. 6. The risk status of cyber space 18 National Cyber Security, a commitment for everybody • Terrorism, political and ideological extremism. Terrorists and extremist groups use cyber space to plan and publish their actions and acquire recruits to carry them out. These groups now recognise the strategic and tactical importance of cyber space for their interests. Social media and forums have become the main instrument used by terrorists. • Attacks by groups of organised crime. Organised crime gangs (cyber gangs) have started to carry out their activities in cyber space, exploiting the possibility of anonymity that this sphere offers. The objective of these types of gangs is to obtain sensitive information for the subsequent fraudulent use thereof and for significant economic gains. • Hacktivism. During 2011, hacktivism has become one of the major threats to governments and organisations. The principles of this movement are anonymity and the free distribution of information through cyber space, essentially through the Internet. The hacktivists are grouped in a decentralized manner using the under-ground to communicate and plan their actions. Among these groups are Anonymous and Luzsec, but these are not the only ones. Their mission is to ‘attack’ the cyber space that represents people, companies or organisations that violate any of their principles or interests. This implies that the cyber space of governments of the majority of countries around the world, banks, telecommunications companies, suppliers of critical infrastructure, internet service providers, and ultimately all of cyber space, are susceptible to denial of service attacks (DDoS) or to being hacked with the main objective of stealing sensitive information which will subsequently be distributed on the Internet for free access. • Low profile attacks. These types of attacks are normally executed by people with certain ICT knowledge which allows them to carry out cyber attacks of a highly heterogeneous nature and for fundamentally personal reasons. • Personal privileged access attacks (insiders). This group poses one of the greatest threats to the cyber space security of nations and companies as they are often an integral part of all the attacks outlined above. From a spy infiltrated by a State, or an employee working for gangs of terrorists or cyber criminals, to disgruntled employees; these can all be considered insiders. Below, the following table sets out the players, objectives, authorship and types of cyber attacks. 6. The risk status of cyber space 19 National Cyber Security, a commitment for everybody Cyber space risk status summary OBJECTIVES AUTHORSHIP Government Private sector State sponsored Espionage, attacks against attacks critical infrastructure, APT. Citizens Espionage, attacks against critical infrastructure, APT. Attacks sponsored by Espionage. the private sector Espionage. Attacks against networks and Political and systems, attacks against internet ideological services, malware infection, terrorists, attacks against third-party extremism services, networks and systems. Attacks against networks and systems, attacks against internet services, malware infection, attacks against third-party services, networks and systems. Theft and publication of classified or sensitive information, attacks against networks and systems, attacks Hacktivists against internet services, malware infection, attacks against third-party services, networks and systems. Theft and publication of classified or sensitive information, attacks against networks and systems, attacks against internet services, malware infection, attacks against third-party services, networks and systems. Theft and publication of personal data. Digital identity theft and fraud. Digital identity theft and fraud. Organised crime Espionage. Attacks against networks and systems, attacks against internet Low profile services, malware infection, attacks attacks against third-party services, networks and systems. Attacks against networks and systems, attacks against internet services, malware infection, attacks against third-party services, networks and systems. Espionage, attacks against critical infrastructure, attacks against networks and systems, attacks against internet services, Personal malware infection, attacks privileged access against third-party services, attacks (insiders) networks and systems, theft and publication of classified or sensitive information, malware infection, APT. Espionage, attacks against critical infrastructure, attacks against networks and systems, attacks against internet services, malware infection, attacks against third-party services, networks and systems, theft and publication of classified or sensitive information, APT. High Impact Medium Low 6. The risk status of cyber space 20 National Cyber Security, a commitment for everybody 7. Cyber security in Spain: The current status 7. Cyber security in Spain: The current status 21 National Cyber Security, a commitment for everybody 7. Cyber security in Spain: current status Spain has 31 million Internet users, representing an Internet penetration rate of 65.5% in respect of the national population. This statistic places Spain at number 49 at international level with regard to the penetration rate of information society services (email, social media sites, e-business). It is necessary to identify which assets in Spain are dependent on cyber space, what regulation exists, which are the organisations with functions and responsibilities regarding this matter, and who are the participants. The defence of our cyber space covers all conceivable assets and players, but should focus primarily on the defence of critical infrastructure, business, and individual rights and freedoms. The critical infrastructure in Spain is grouped into the following 12 sectors: Sectors of critical infrastructure PUBLIC ADMINISTRATION FOOD ENERGY ICT OUTER SPACE CRITICAL INFRASTRUCTURE SECTOR TRANSPORT FINANCE AND TAX HEALTH WATER RESEARCH CHEMICAL INDUSTRY NUCLEAR INDUSTRY In any of these sectors, the degree of penetration of cyber space, both for internal management and for service provision, reached its critical level a long time ago. Any contingencies that might affect any of the key assets belonging to any of the 12 strategic sectors could compromise national security. With regard to the Spanish business community, the vast majority of large companies have an internal organisation which is mature enough to enable them to implement the activities and actions that are part of information security practices. In the case of small to medium size enterprises and self-employed entities (more than 99% of the Spanish business community), the lack of awareness and e-education, as well as a lack of financial and human resources, impede the proper implementation of cyber security measures, limiting the focus to ICT activities. 7. Cyber security in Spain: The current status 22 National Cyber Security, a commitment for everybody Government players with responsibility for cyber security Bodies Administra- Ministry / tion Scope INTECO Central Ministry of Industry CCN Central Ministry of Operation, analysis, incident response, the Presidency regulations, international relations. CNPIC Central Ministry of the Interior Operation, analysis, incident response, regulations, international relations. REDIRIS Central Ministry of Industry Operation, analysis, incident response. Police Computer Crime Unit Central Ministry of the Interior Operation, analysis, incident response. Computer Crime Unit of the Guardia Civil Central Ministry of the Interior Operation, analysis, incident response. Spanish Data Protection Agency Central Ministry of Justice Control authority and regulator (involves analysis of incidents and sanctions). Ministry of Defence (various bodies and organisations) Central Ministry of Defence Operation, analysis, incident response, regulation. Regional Department of the Interior (Regional Government of Catalonia) Operation, analysis, incident response. IT Crime Unit of the Police Force of the Basque Country Regional Council of the Interior (Basque Country) Operation, analysis, incident response. CSIRT-CV (Community of Valencia) Regional Regional Operation, analysis, incident response. CESICAT (CERT - Catalonia) Regional Regional Operation, analysis, incident response, advice and training. CERT – Andalusia Regional Regional Operation, analysis, incident response. Community of Madrid Data Protection Agency Regional Regional Control authority and regulator (involves analysis of incidents and sanctions). Catalonian Data Protection Agency Regional Regional Control authority and regulator (involves analysis of incidents and sanctions). Basque Data Protection Agency Regional Regional Control authority and regulator (involves analysis of incidents and sanctions). IT Crime Unit of the Police Force of Catalonia Cyber security competencies Operation, analysis, incident response, international relations. 7. Cyber security in Spain: The current status 23 National Cyber Security, a commitment for everybody The powers in relation to the management of cyber security are distributed among a set of organisations and institutions, which depend on different central government ministries as well as on regional governments. Among the most relevant are the following: • The National institute of Technology and Communication (INTECO), dependent on the Ministry of Industry, Tourism and Commerce, is responsible for the management, via its CERT, of cyber space defence of Spanish SMEs and citizens in their domestic environment. • The National Cryptologic Centre (NCC), under the National Intelligence Centre (CNI), which has among its missions the management of cyber space security, is dependent on any of the three levels of government: national, regional and local. The CCN-CERT (Response Capacity against Security Incidents) is a national alert centre which cooperates with all public authorities to respond quickly to security incidents that occur in their part of cyber space and, moreover, it is ultimately responsible for the national safety of classified information. • The National Centre for Critical Infrastructure Protection (CNPIC), under the Ministry of the Interior, is responsible for promoting, coordinating and supervising all activities related to the protection of Spanish critical infrastructures. Its main objective is to promote and coordinate the necessary mechanisms to ensure the security of infrastructures that provide essential services to society, fostering the participation of each and every one of the agents of the system in their respective areas of power. • Computer Crime Unit of the Guardia Civil and the Unit Responsible for Research into Information Technology Crime of the National Police Force, both of whom are dependent on the Ministry of the Interior, and are responsible for combating crime that occurs in cyber space. • The Spanish Data Protection Agency (AEPD), an independent supervisory authority responsible for ensuring compliance with the regulations on personal data protection. In some autonomous communities (Madrid, Catalonia and the Basque Country) there are also data protection authorities with specific responsibilities regarding personal data files created or managed by the Autonomous Communities and Local Governments of their particular territory. Similarly, within regional administrations there are state-level equivalent centres such as the CERTs of Valencia, Catalonia and Andalusia. Moreover, the Spanish Armed Forces, within the specific scope of both the Army and Navy, and as a whole, led by the Chief of Staff of National Defence, develop different ICT programmes with the objective of providing secure networks and systems that incorporate the technologies required to provide the services and applications that support military commanders in the fulfilment of their missions. 7. Cyber security in Spain: The current status 24 National Cyber Security, a commitment for everybody 8. Diagnosis of the current status of National Cyber Security 8. Diagnosis of the current status of National Cyber Security 25 National Cyber Security, a commitment for everybody 8. Diagnosis of the current status of National Cyber Security Until the adoption, in May 2011, of the current National Security Strategy, cyber space had not been identified formally as a real threat to national security. The belated recognition of the strategic importance of having a secure cyber space has led, among other things, to the Government of Spain not yet having created a complete National Cyber Security System, i.e., all the bodies, agencies, and procedures for the direction, control and management of the security of Spanish cyber space. Set out below are the main reasons why National Cyber Security has not yet reached the required level to correspond to the actual risk from cyber space. These reasons can be divided into 4 groups: Organisational, Operational, Legal and Political. Organisational reasons a) Absence of a cyber security management body. The absence of a cyber security management body prevents the implementation of a common working methodology that would facilitate decision-making and the coordination and integration of all players under common procedures. b) Non-unified Management of the National Cyber Security due to a departmental approach. The National Cyber Security management is shared, in a non-unified manner, by a set of organisations within the scope of multiple ministries (see diagram on Page 22 of this document). c) Insufficient human, technological and economic resources. The existing management agencies lack the human, technical and financial resources to implement and manage the capabilities to achieve a level of cyber security that would match the known and controlled risk status. Operational reasons d) Partial and insufficient knowledge of the national cyber situation. Having a reliable and up-todate cyber situation is essential for making decisions and for crisis management within cyber space. At present, the Government of Spain has a partial and insufficient knowledge of the cyber space of the State administration and, to a lesser extent, so does the private sector. e) Absence of a framework that would facilitate the sharing of information on cyber security. The insufficient level of communication between public bodies in relation to National Cyber Security and between these public bodies and the private sector is due, principally, to the absence of a stable and open procedural framework that would allow the fluid and secure sharing of information. 8. Diagnosis of the current status of National Cyber Security 26 National Cyber Security, a commitment for everybody f) Inadequate metrics regarding the degree of resilience of the ICT infrastructure of government networks and the major critical infrastructure of the country. The lack of metrics leads to significant uncertainty on the degree of resilience of ICT infrastructures on which the government networks and the critical infrastructures of Spain rely. g) The minor role of private players regarding cyber security. At present National Cyber Security is a closed and exclusive system of government players. Currently more than 80% of Spanish critical infrastructure is the property of, and is directed and managed by, the private sector (national and international companies). Therefore, the private sector’s contribution to the process of building National Cyber Security is essential. Legal reasons h) The absence of specific and comprehensive legislation on cyber security. There is legislation that is distributed across different regulatory areas or matters, but this has not been developed from a common political perspective covering the full national scope and establishing the strategic character of cyber security. Political reasons i) Absence of policies encouraging public and private sector collaboration on cyber security. Public and private sector collaboration is a cornerstone for achieving a level of security that would be appropriate for the known and controlled risk status. Spain does not currently have a framework for public and private sector collaboration in the field of cyber security. j) Absence of a state policy on cyber awareness and cyber education. Many countries within our environment are developing ambitious cyber awareness and cyber security policies as a fundamental axis for creating a culture of cyber security. These policies have been developed and supported, initially, by the private sector, and subsequently they have received strong government support. In this case, a dual role should be highlighted, on the one hand, fostering the awareness and education of all citizens regarding the risks of cyber space and, on the other hand, identifying future talent in the field of cyber security within the school and university community. In Spain, INTECO and CCN have cyber awareness and cyber security programmes. In the private sector, organisations such as ISMS Forum Spain also have cyber awareness initiatives under the domain protegetuinformacion.com. So far, these initiatives have had insufficient impact on civil society. k) Absence of specific policies for national R&D+innovation on cyber security. There are no policies, programmes or initiatives for R&D+innovation of a nationwide scope to promote and provide activities on cyber security, which is in sharp contrast with the leading role that the new Horizon 2020 framework (a continuation of the 7th Framework Programme) attaches to cyber security at an European level. 8. Diagnosis of the current status of National Cyber Security 27 National Cyber Security, a commitment for everybody 9. Why does Spain need a National Cyber Security Strategy? 9. Why does Spain need a National Cyber Security Strategy? 28 National Cyber Security, a commitment for everybody 9. Why does Spain need a National Cyber Security Strategy? The National Strategy for Cyber Security should be an instrument to guide those responsible for the direction and management of National Cyber Security and its beneficiaries, but it will also serve as a deterrent to potential offenders. The Government of Spain, through the Spanish strategy for cyber security, should explain the model that provides cyber security to the Spanish society, within the current context of global risk. The National Cyber Security Strategy must define the concept of cyber security based on the following three issues: Concept of cyber security What is the concern? (Risks - Threats) Who is concerned? (Those responsible) How is this concern addressed? (Policies) 9.1. What is the concern? (Risks-Threats) The novelty, diversity and heterogeneity of the risks and threats related to cyber space require reliable and up-to-date knowledge of the cyber situation, providing, to those responsible for National Cyber Security, the know-how necessary for the administration, control and management thereof. Section 6 of the present document analyses the current risk status regarding cyber space. 9.2. Who cares? (Those responsible) The security of cyber space is the responsibility of the government. Presidency of the Government should take the lead in national security. In doing so it should create an integrated National Cyber Security System. Although the responsibility lies with the Government of Spain, participation should be encouraged, not only by traditional governmental players, but also by private players, the university community, associations, experts, and representatives of citizens. 9. Why does Spain need a National Cyber Security Strategy? 29 National Cyber Security, a commitment for everybody 9.3. How to respond to this concern? (Policies) The Government of Spain should show political determination in order to confront cyber risks and threats, and therefore should should establish objectives and priorities. Similarly, the creation of the National Cyber Security System will reduce the risk of each ministry and agency deciding its own course of action and it will also reduce the likelihood of a disproportionate coordination effort being deployed. The main policies should aim to promote: • • • • • Resilience of Spanish cyber space; Public and private sector collaboration; Education and awareness; R&D+innovation, and International collaboration. 9. Why does Spain need a National Cyber Security Strategy? 30 National Cyber Security, a commitment for everybody 10. Functions of National Cyber Security 10. Functions of National Cyber Security 31 National Cyber Security, a commitment for everybody 10. Functions of National Cyber Security National Cyber Security should make appointments for the following set of functions: Functions of National Cyber Security • Establishing the objectives and priorities of National Cyber Security. • Integrating policies and players. • Giving advice on National Security to those responsible for same. • Promoting a culture of cyber security. • Assessing the risk status of cyber space. • Planning policies and managing cyber crises. • Strengthening national capacities for risk prevention, response and recovery, as well as for cyber attacks. • Deterring potential aggressors. 10.1. General functions • Establishing the objectives and priorities of National Cyber Security. National Cyber Security should establish a set of objectives. These objectives must be achievable, measurable, and verifiable, and sustained over time, adapting to the needs that cyber space and its risk status require at any given moment. • Integrating policies and players. It is necessary to avoid the current subdivided model of poor coordination, and to evolve into a model of comprehensive and unified management, with the capacity for planning and analysis in order to formulate joint proposals for adopting strategic decisions, monitoring their implementation and evaluating and monitoring their performance. To this end it will be necessary that all players participate: public sector, private sector, state, regional, municipal and even international. • Giving advice on National Security to those responsible for same. The National Cyber Security System shall advise the President of the Government and all those involved in national security issues, liaising between these and other national and international players, as well as with public or private players. • Promoting a culture of cyber security. The communication function is essential in the creation and promotion of the cyber security culture. This function is to direct the communication strategy on National Cyber Security issues and situations of crisis, promoting social and parliamentary participation in the review and approval of strategies, promoting public and private sector communication between departments, and disseminating warnings and recommendations to the public. The culture of cyber security will be achieved through the right combination and implementation of cyber security enablers described in Section 11 of this document. 10. Functions of National Cyber Security 32 National Cyber Security, a commitment for everybody 10.2. Operational functions • Assessing the risk status of cyber space. The Government of Spain is responsible for ensuring the capacity to manage National Cyber Security. As a first step to fulfilling its responsibility it must know what the status of our cyber security risk is quantifying the likelihood of threats materializing and estimating their potential impact. • Planning policies and managing cyber crises. Planning policies and crisis management requires a change in the cyber security management model, from coordination to integration and unification in order to optimize the contributions of all players involved. Comprehensive management does not consist of copying the same tasks and capabilities, nor does it consist of coordinating independent initiatives, rather it focuses on the contributions of all players and policies involved from the very beginning. • Strengthening national capacities for prevention, response and recovery from cyber risks and attacks. The Government of Spain must have the capability available for prevention, response and recovery from cyber risks and attacks. These capabilities should allow a reliable awareness of the status of the cyber situation. Moreover, the application introduces rationalization mechanisms of resources and capabilities, power economies of scale and multiplies synergies and performance by training initiatives, practical teaching, research, and common evaluation. • Deterring potential aggressors. Having a resilient and safe cyber space available is a better dissuasive mechanism against state and non-state aggressors. 10. Functions of National Cyber Security 33 National Cyber Security, a commitment for everybody 11. Enablers of National Cyber Security 11. Enablers of National Cyber Security 34 National Cyber Security, a commitment for everybody 11. Enablers of National Cyber Security The novelty of cyber space and its continuous evolution and transformation poses a challenge for National Cyber Security. It is therefore necessary to build National Cyber Space Security in a progressive manner, with the ability to evolve and adapt to a constantly changing environment. The National Cyber Security enablers are those that allow the functions of National Cyber Security and are divided into two groups: primary and secondary: • The primary enablers are those that enable the construction of National Cyber Security. • The secondary enablers are those that enable the operation of National Cyber Security. The secondary enablers, independently, can carry out their specific function but would not reach their critical efficacy and efficiency. Enablers of cyber security Primary enablers Leadership Organisation Legal framework Methodology Technology Strategic communication Secondary enablers Cyber situation Information sharing Awareness of education Public and private sector collaboration R&D+innovation International cooperation 11.1. Primary enablers The primary enablers of National Cyber Security are: • State leadership The State has an obligation to legislate and act in order to protect, or to enforce the protection of, the services provided in cyber space and to allow citizens, organizations and businesses to develop in social, cultural and economic spheres, among others. To comply with that obligation implies the exercise of leadership for the definition of policies, strategies and legal frameworks regarding cyber security, as well as creating the organizational tools that allow its application. 11. Enablers of National Cyber Security 35 National Cyber Security, a commitment for everybody The Presidency of the Government must exercise this leadership together with the Government of Spain. Among its functions are approving, reviewing and communicating the strategies and policies of National Cyber Security, but also monitoring their development and implementation, as well as creating the necessary organisations and electing the persons responsible for them. • Organisational structure The State should create an organizational structure that allows the direction and management of National Cyber Security and performs the functions of National Cyber Security described in Section 10, Functions of National Cyber Security, of this document. Similarly, Section 12, Organizational Structure of National Cyber Security, proposes a high-level organizational structure for National Cyber Security. • Legal framework Although the essential legislation to regulate the management and operation of National Cyber Space already exists, it is scattered between different policy areas, and has been developed from a common policy that reflects national and strategic cyber security. It will therefore be necessary to develop a legislative framework to support National Cyber Security that is effective, and at the same, takes into account fundamental rights and public freedoms. The less dispersed the regulations that are part of the legislative framework, the higher the level of legal security. • Working methodology regarding cyber security The novelty and complexity of the security of cyber space make it necessary to develop a methodology that provides a better understanding of the strategic importance of cyber space and its risk status. This methodology should provide the following: o A common language. This common language will range from technology to legal terms. o Homogenized theoretical fundamentals. o Procedures that describe how to act regarding cyber security. • Technology Technology is the basis of cyber space. Understanding and adapting to continuous technological evolution is essential in order to improve the resilience and security of our cyber space. 11. Enablers of National Cyber Security 36 National Cyber Security, a commitment for everybody 11.2. Secondary enablers The secondary enablers of cyber security are: • Knowledge of the cyber situation Knowledge of the cyber situation should provide immediate awareness of one’s own cyber space, that of other nations, that of the enemy and that of any other party of interest, as well as knowledge of the status and availability of operational capabilities that are necessary for planning, directing and managing the operations necessary to secure cyber space. Knowledge of the cyber situation not only occurs as a result of the combination of intelligence and operational activities in cyber space, but also in electromagnetic space and other dimensions of the operating environment (land, sea, air and outer space). The processes, procedures and capabilities of cyber situation awareness should be developed to contribute to the overall situational awareness of those responsible for the management of national security and the achievement of its objectives. Thus, knowledge of the cyber situation must: o Provide those responsible for National Cyber Security with the visibility, in real-time, of networks, systems, their own services and their dependencies. o Provide those responsible for National Cyber Security with the visibility, in real-time, of the enemy’s actions on the networks, their own systems and services, as well as the possible impact on the achievement of operational objectives. o Provide those responsible for National Cyber Security with operational knowledge of the impact of their decisions on cyber operations, within their scope of action, contributing to the decision-making process. o Provide those responsible for national security with as much detail as possible, including intelligence information, essential to support the decision-making process regarding cyber space and cyber operations. o Coordinate and share efforts between different players (auxiliary bodies of the general administration of the State Security Forces and Bodies of the State, military, private sector, industry, social partners and any other public or private entities, whether national or international), obtain knowledge of the cyber situation to as great an extent as possible. o Identify threats in cyber space, including potential adversaries, in order to contribute to the understanding of the situation of those responsible for leading national security and intelligence and operational objectives. 11. Enablers of National Cyber Security 37 National Cyber Security, a commitment for everybody o Study the motivations, objectives and analyse the potential adversaries in their decisions to direct potential cyber attacks on national interests, so that a defence can be planned against them. • Information sharing A set of mechanisms should be articulated to allow different players in National Cyber Security to share information efficiently. Moreover, the sharing of information: o Will help to achieve reliable and up-to-date knowledge of the cyber situation; o Will improve the availability and resilience of National Cyber Security assets; o Will allow cyber crises to be managed efficiently; o In another context, it will optimize economic investment in cyber security, rationalising the use of human and technical resources. • Studies and publications on cyber security Spanish society must become aware of individual risks (privacy and intimacy) and collective risks (national security, economic, social and cultural prosperity) to which it would be exposed in the event of an irresponsible use of cyber space. The Government of Spain must lead an educational model and promote cyber security. The objectives of this model are: 1. Making Spanish society aware of cyber risks. A state of uniform opinion needs to be created on the need for secure cyber space in order to ensure the prosperity of our society and economy. 2. Training Spanish society in the responsible use of cyber space. It is necessary to address an ambitious education plan that allows training on cyber security awareness from an early age (primary education) right through to university. Similarly, it should promote training programmes for other sectors. 3. Identifying and training national “cyber talents.” Early education on cyber security will identify “national cyber talents.” These “cyber talents” should receive specialised guided training for future incorporation into the management and control bodies of National Cyber Security. • Strategic Communication It is necessary to develop a strategic communication policy on matters of National Cyber Security and cyber crises, as well as boosting social and parliamentary debate on the review and approval of strategies, promoting public and private sector communication between administrations, and disseminating warnings and recommendations to the public. 11. Enablers of National Cyber Security 38 National Cyber Security, a commitment for everybody • R&D+innovation The strong technological component of cyber space and cyber security makes it obligatory to promote competitiveness and R&D+innovation in the national public and private sectors. Therefore the Government of Spain should develop a set of policies, the objective of which is for national companies to commercialise their products and services, that the State maintains a technologically advanced status and, most importantly, that it has flexible “partners” in order to face the dynamic evolution of ICT. • Public and private sector Partnerships The heterogeneity and the changing landscape of the risk status of cyber space is a continuous challenge for National Cyber Security. The Government of Spain does not have, on its own, the skills needed to ensure National Cyber Space Security and, therefore, it needs the private sector, among others, in order to reach a level of security appropriate to a known and controlled risk status. It is the responsibility of the Government of Spain to create and promote a framework of public and private sector collaboration. These public and private sector partnerships on cyber security should contribute to: o Improve knowledge of the cyber status. Private organisations are continuously and repeatedly victims of cyber attacks of various kinds. For this reason they have implemented their own capabilities to ensure the safety of their specific cyber space. These capabilities generate information and knowledge to be shared with the public bodies and agencies responsible for the direction and management of cyber security. It is necessary that this sharing be bi-directional. o Optimize the national cyber capabilities and resources by avoiding the duplication of efforts. o Improve the resilience of national cyber space. o Improve the competitiveness of domestic companies in the field of cyber security. o Improve R&D+innovation in cyber security. o Promote awareness and education on cyber security. 11. Enablers of National Cyber Security 39 National Cyber Security, a commitment for everybody 12. Organisational structure of National Cyber Security 12. Organisational structure of National Cyber Security 40 National Cyber Security, a commitment for everybody 12. Organisational structure of National Cyber Security A high level organisational structure is proposed below in order to direct, control and manage National Cyber Security. Organisational structure of National Cyber Security PRESIDENT OF THE GOVERNMENT NATIONAL SECURITY AUTHORITY NATIONAL CYBER SECURITY BODY OPERATIONS EVALUATION AND MONITORING STRATEGIC PROGRAMMES The National Cyber Security Body shall be responsible for directing National Cyber Security. This body will enable the implementation of the tasks entrusted to National Cyber Security. These functions have been described previously in this document. • Operations. The National Cyber Security Body should seek capabilities of detection, prevention, containment and response to any cyber attacks or contingencies. These operational capabilities will be managed from a National Reference CERT and a Defence CERT. • Evaluation and monitoring. The area of evaluation and monitoring will be assigned the following functions: o Knowledge of the cyber situation. Knowledge of the national and global cyber situation is a fundamental aspect for the efficient administration and management of National Cyber Security. A reliable and up-to-date cyber situation is reached by means of integration and transformation of information from multiple sources: National CERT, intelligence services, State Forces and Security Bodies, the remaining State Administrative Bodies, critical infrastructure operators, internet service suppliers, hardware and software companies, citizens, private companies, private organisations and the international community. 12. Organisational structure of National Cyber Security 41 National Cyber Security, a commitment for everybody Cyber situation awareness INTERNATIONAL COMMUNITY NATIONAL CERT INTELLIGENCE SERVICES PRIVATE ORGANISATIONS PRIVATE COMPANIES FCSE REMAINING STATE ADMINISTRATIVE CYBER SITUATION AWARENESS CRITICAL INFRASTRUCTURE OPERATORS CITIZENS HARDWARE AND SOFTWARE COMPANIES ISPs o Risk analysis. Knowledge of the cyber situation will identify the causes of the threats and likely unwanted cyber events, as well as the damage and consequences they may have for national security. The innovative and rapid nature of cyber space requires a continuous risk analysis, in order to help determine the security measures warranted by the cyber space risk status. o Planning. The plan will provide a long-term vision of procedures, activities and resources involved to help support the management of cyber security. o Managing cyber contingencies. The on-going transformation of cyber space leads bodies and agencies that direct and manage National Cyber Security to face unknown events that may compromise the resilience and / or security of our cyber space. o Warnings. It will be necessary to have a mechanism to inform all those involved in National Cyber Security about relevant issues. o Lessons learned. Compiling the successes and failures in the direction and management of National Cyber Security is essential in order to improve weaknesses and enhance the strengths of our cyber space, as well as to make it more resilient and secure. o Doctrine. Based on the knowledge of the cyber situation and all the lessons learned, it will be necessary to create a consistent set of teachings or instructions on cyber security. 12. Organisational structure of National Cyber Security 42 National Cyber Security, a commitment for everybody o Development of policies and procedures. As a result of the above, it will be necessary to develop policies and procedures that facilitate the control and management of National Cyber Security. These policies and procedures must take into account not only technological but also legal, operational and any other dimensions that could affect National Cyber Security. • Strategic Programmes. Self-adaptation of National Cyber Space to a known and controlled risk status is a key aspect for National Cyber Security. Therefore it will be necessary to work continuously and to evolve a set of strategic programmes that facilitate gradual adjustment to a known and controlled cyber space risk status. Some of the strategic programmes are set out below: o Awareness and Training. Training and continuous awareness of all sectors of Spanish society is essential to the national security of cyber space. o Cyber exercises. In order to know the true state of maturity of National Cyber Security, cyber exercises will be required from time to time. These cyber exercises should take place not only in the sphere of national cyber space but also within major international organisations (NATO, EU, etc.) o Standards and best practices. It will be necessary to develop standards and best practices that improve the resilience and security of our cyber space. Many of these standards and best practices already exist, and have international acceptance and consensus. 12. Organisational structure of National Cyber Security 43 National Cyber Security, a commitment for everybody 13. Objectives of National Cyber Security 2012-2015 13. Objectives of National Cyber Security 2012-2015 44 La Ciberseguridad Nacional, un compromiso de todos 13. Objectives of National Cyber Security 2012-2015 The ultimate purpose of the National Cyber Security Strategy should be to achieve a set of goals. Here are the objectives that should be achieved regarding cyber security during the period 2012-2015. Main objective Providing a secure cyber space in order to ensure the social, cultural and economic prosperity of Spain and the freedoms of its citizens through a culture of prevention and resilience involving, in an active and integrated way, all sectors of Spanish society. Objective 1 Objective 2 Objective 3 Having reliable and up-to-date knowledge of the cyber situation. Improving national resilience in respect of cyber threats. Creating and promoting a cyber security culture. The main objective of National Cyber Security is to provide a secure cyber space in order to ensure the social, cultural and economic prosperity of Spain and the freedoms of citizens through a culture of prevention and resilience involving, in an active and integrated way, all sectors of Spanish society. In order to achieve this objective it is first necessary to achieve the following sub-objectives: • Sub-objective 1. Having reliable and up-to-date knowledge of the cyber situation. It is necessary to have immediate awareness of one’s own cyber space, as well as that of other nations, that of the enemy and that of any other parties involved, as well as knowledge of the status and availability of operational capabilities that are necessary for planning, directing and managing the operations necessary to secure cyber space. • Sub-objective 2. Improving national resilience in respect of cyber threats. It is necessary to have the capacity available to allow to resist and recover from negative impacts resulting from activities that are known, unknown, predictable, unpredictable, uncertain and unexpected, and which occur in cyber space. This effort must be directed in particular to improving the resilience of the critical infrastructures of our country. • Sub-objective 3. Creating and promoting a cyber security culture. The enablers of National Cyber Security, described in part 6 of this document, should foster the creation of a National Cyber Security culture. Reciprocally, the ‘essence’ of the National Cyber Security culture thus created should optimise the management of these enablers and, therefore, foster the consolidation of the cyber security culture. 13. Objectives of National Cyber Security 2012-2015 45 National Cyber Security, a commitment for everybody 14. Actions for attaining National Cyber Security objectives 14. Actions for attaining National Cyber Security objectives 46 National Cyber Security, a commitment for everybody 14. Actions for attaining National Cyber Security objectives To achieve the objectives described in Section 13 of this document it will be necessary to perform a set of actions in order to: • Improve knowledge of the cyber situation. • Improve the capacity of detection and analysis of cyber threats. • Improve channels of communication between the different players involved in National Cyber Security. • Improve resilience and national cyber space security. • Strengthen the national and international legal framework regarding cyber crime. • Improve public awareness, education, training and professional development in cyber security. • Promote R&D+innovation programmes in cyber security. • Support the competitiveness of the private sector in the field of cyber security. • Promote international cooperation. The following are the actions that should be implemented during the period 2012-2015, in order to improve the resilience and security of National Cyber Space: Action 1. Approval of the National Cyber Security Strategy. In order to construct the National Cyber Security System allowing the administration, control and management of National Cyber Security, it is necessary to approve the National Cyber Security Strategy. Organisational structure Action 2. Design or create the national reference CERT. The national reference CERT should be created, in addition to those that may already exist. The mission of the national reference CERT shall be to collect operational information in relation to National Cyber Space status which is obtained by its own means and that of other national CERTs, as well as international CERTs with whom collaboration agreements have been signed. Action 3. Create the Ministry of Defence CERT. It should provide the current Security Operations Centres of the Armed Forces with the human, economic and technical resources necessary to achieve the evolution towards becoming a CERT. 14. Actions for attaining National Cyber Security objectives 47 National Cyber Security, a commitment for everybody Action 4: Create the National Centre for Monitoring and Evolution of Cyber Security. This centre should develop the activities described in the Monitoring and Evaluation Centre described in Section 12 of this document. Action 5: Create the National Centre for Strategic Programmes on Cyber Security. The unstoppable evolution and transformation of cyber space makes it necessary to develop strategic programmes in this area in order to allow the adaptation of the national security status to a known and controlled risk. Section 12 of this document defines the main strategic programmes on cyber security identified to date. These programmes should be directed and controlled by the National Strategic Programme on cyber security and management thereof must be distributed between agencies in the field of General Administration. Operational actions Action 6. Appointment of human resources necessary for the Administration, Control and Management of National Cyber Security. It will be necessary to provide all bodies with the professionals that they need. These profiles should cover all areas of knowledge within the scope of cyber security. Action 7. Improve and extend the technological capacities which allow the detection, prevention, containment and response to cyber attacks.PIn order to improve the capacity of detection, prevention, containment and response to cyber attacks, it will be necessary to: • Improve and expand the network of early warning sensors; • Improve monitoring capabilities; • Improve vulnerability scanning capabilities; • Improve cyber incident solving capabilities. Action 8. Create a framework for sharing information among different players of National Cyber Security. The National Cyber Security Body should articulate the mechanisms allowing the coordination and integration with the players involved in National Cyber Security in order to facilitate the fluid and efficient sharing of information. This framework should include legislative measures fostering an environment that respects fundamental rights and public freedoms, without compromising its effectiveness. Action 9. Improvement of warning channels. It will be necessary to improve the channels of communication in order to allow, properly and in good time, the different sectors of Spanish society and players to be aware of cyber contingencies that pose a threat to national security. Action 10. Develop a methodology for improving the resilience and security of the National Cyber Space. 14. Actions for attaining National Cyber Security objectives 48 National Cyber Security, a commitment for everybody Action 11. Encourage and promote the resilience and security of the ICT infrastructure of the private sector. It will be necessary to pursue policies that promote improved resilience and security of the ICT infrastructure. International cooperation Action 12. Bilateral or multilateral agreements with other nations regarding cyber security. The global nature of cyber space makes it necessary to enter into bilateral and multilateral agreements. These agreements should improve information channels, as well as the detection of and/or coordinated responses against cyber incidents. Special relevance should be given to agreements with the purpose of fighting cyber crime in any of its forms. Action 13. Participation in multilateral and international forms on cyber security. Spain should actively participate in all multilateral and international forums in which cyber security is addressed (NATO, EU, UN, Interpol, Europol, OECD,…). Action 14. To work in a coordinated manner with allies in order to implement the Cyber Security Policies of NATO. The NATO Lisbon Summit in 2010 identified cyber space as the new threat to the organisation. Spain must work together with the rest of its allies in the protection of the Cyber Space of the Alliance. Public and private sector collaboration Action 15: Creation of the National Platform for the Coordination of Public and Private Sector Cooperation in respect of cyber security. A national platform for the coordination of public and private sector cooperation on cyber security should be created, where the principal players in Spanish society are represented: the public sector, the private sector (with representation of different types of organizations, large enterprises and SMEs), the academic community, technology and research centres, associations and organizations. Action 16: Creation of sector working groups within the national platform for coordination of public and private sector cooperation in respect of cyber security. Following the creation of the national platform, sector working groups should be created in order to promote efficient and effective communication. Education and awareness Action 17: Develop a national education programme on cyber security. This programme will promote awareness, education, training and professional development in cyber security. This will require carrying out the actions set out below. 14. Actions for attaining National Cyber Security objectives 49 National Cyber Security, a commitment for everybody Action 18: Develop a National Cyber Awareness Campaign. A cyber awareness campaign should be developed in order for Spanish society to become aware of the individual (privacy and intimacy) and collective risks (national security, economic, social and cultural prosperity) posed by the improper use of cyber space. Similarly, specific campaigns should be carried out which are aimed at parents and teachers. www.protegetuinformacion.com of the ISMS Forum is proposed as the embryo campaign of Spain for the national cyber awareness campaign. In this campaign the role of the leading private companies in the country and the mainstream media (TV, radio, newspapers, Internet ...) is critical. Action 19: Incorporation of materials related to the responsible use of new technologies and cyber security in primary, secondary, university and postgraduate curricula. It will be necessary to incorporate materials associated with cyber security. This education should begin at an early age (primary education) and be extended throughout secondary, university and post-graduate education. The purpose of starting this education at a young age is, on the one hand, to homogenize the awareness of the use of new technologies, such as its responsible use, and on the other hand, to identify national “cyber talents.” Action 20: Modify education programmes that are related to Science, Technology and Engineering, emphasising the important role of mathematics and computational thinking, not to mention the legal and regulatory aspects. All initiatives regarding higher education, including the implementation of specific Education Programmes on cyber security, should be coordinated with the National Evaluation Agency for Quality and Accreditation (ANECA), as the state foundation whose object is to contribute to improving the quality of higher education through evaluation, certification and accreditation of teaching, teachers and institutions. Action 21: Incorporation of materials related to new technologies and cyber security curricula at military academies. Officers and NCOs of the Spanish Armed Forces should receive a strong background in IT theory, electronics, radio wave propagation, among other things, as well as their application to tactical military operations and strategies. Action 22: Incorporation of materials related to new technologies and cyber security in the curricula of business schools. Future managers of domestic firms should receive training in new technologies and cyber security. The support of senior management is crucial for organizations in order to implement them with a cyber security culture. Action 23: Creation of a programme of academic centres of excellence in cyber security. The public - private partnership between the State administration, the private sector and the academic community should allow the appointment of a group of national universities and academic centres of excellence where education on cyber security will be provided as part of the Government’s strategic programmes on this subject. These centres will provide specialised training and promote R&D+innovation in cyber security. 14. Actions for attaining National Cyber Security objectives 50 National Cyber Security, a commitment for everybody Action 24: Mandatory training and awareness plans, aimed at employees of public private or independent companies. Action 25: Continual training plans for personnel responsible for the administration and management of Cyber Space and State Administrations, such as public and private organisations, which manage and administrate critical infrastructure in Spain. It will be necessary to develop a plan which includes training courses, degrees, masters and cyber security certification for personnel responsible for the administration and management of the Cyber Space of State Administrations, as well as bodies, public and private, that administrate and manage Spanish critical infrastructures. R&D+innovation and Competitiveness Action 26: Create a National Strategic R&D+innovation Plan concerning cyber security and its corresponding development in annual work programmes. Accompanying the National Cyber Security Strategy, with a similar timeframe as the defined action plan, a strategic plan for development of R&D + innovation on cyber security should be developed which is aligned both with the national needs voiced by the public and private sectors and with the strategic alignment marked by the new European Horizon 2020 framework. This strategic plan should be developed by using Annual Work Programmes that include specific themes and objectives towards positioning, improving and developing the cyber protection capabilities of different sectors, both public and private, as well as the citizens themselves, in addition to the promotion of the market for National Cyber Security products and services. Action 27: Create a Technological Monitoring Observatory for International Cyber Security R&D+innovation. In order to maintain advanced awareness at the forefront of technology and cyber security, it shall be necessary to establish a process of technological monitoring concerning R&D+innovation into cyber security which guarantees awareness, valuation of partnerships and the promotion of joint projects, which ensure full integration, making full use of the opportunities, resources and international advances in national organisations in this area. Action 28: Create a National ICT Product Certification Centre. The implementation of certain ICT products shall require prior approval by a national certification centre. This centre shall keep an up-to-date catalogue of certified products. This catalogue shall contain those products (hardware and software) that meet the security requirements in order to form part of the ICT infrastructure of the public sector and the main critical infrastructure of the country, for which compliance will be mandatory. Likewise, said catalogue shall be used as a guide for the rest of the private sector, providing advice on the use of its products. 14. Actions for attaining National Cyber Security objectives 51 National Cyber Security, a commitment for everybody Other actions Action 29: Designate the first week of the month of November as ‘Cyber Security Awareness Week’. With the purpose of promoting cyber security awareness, and in order to take advantage of the beginning of the school year, it is recommended to have a cyber security awareness week in all places of education in the country (primary, secondary, university and post-graduate levels). Action 30: Hosting the cyber space conference 2014 or 2015. In 2011 the first international cyber space conference took place in London which was attended by the key players on the world stage. This conference will be held in Hungary in 2012 and South Korea in 2013. Action 31: Promote and lead the first Ibero-American cyber exercise in 2013. Spain will promote and lead the first Ibero-American cyber exercise. This exercise will allow the level of maturity of our cyber space to be measured. Furthermore it will consolidate Spain’s leadership in the field of Ibero-American cyber space, reaching agreements on cyber security with many countries. 14. Actions for attaining National Cyber Security objectives 52 National Cyber Security, a commitment for everybody 15. Conclusions 15. Conclusions 53 National Cyber Security, a commitment for everybody 15. Conclusions Spain, despite the great efforts that have been made, still does not have a solid capacity allowing the efficient administration, control and management of its cyber security. Security, in all its dimensions and spheres, is the first responsibility of any government. The Government of Spain should assume leadership regarding cyber security in order to make its citizens aware of the need for protecting our cyber space on which our basic services, critical infrastructure, economy and progress as a society depend. ICT is not a problem, it is part of the solution and its resilience, protection and safe use are not only the responsibility of the Government, but also of independent and local administrations together with the private, business and domestic sectors. All of them share this responsibility; however it is up to the government to exercise leadership in the management of cyber security. These are responsibilities that cannot be delegated and which should result in providing the impetus, ideas and direction that Spain needs. The changes in the guiding framework in recent years, including the emergence of new risks and threats (cross-border threats, globalization and the emergence of non-state players, etc.) make it necessary to move towards a comprehensive security concept and a culture of prevention and resilience. This development is to consider cyber space as a key element in the overall risk management of national security and, therefore, grant the necessary importance to cyber security as a continuous process of analysing and managing the risks associated with it. The risk situation has evolved and is evolving day by day. The increase in the amount and variety of threats against ICT infrastructure and information, the greater quantity and sophistication of cyber attacks and the varying nature of their objectives, even citizens, the private sector and governments, are experiencing certain changes that, together with the diversity of authors and interested parties, such as states, private organisations, terrorist organisations, organised crime or hacktivists, should be born in mind when developing an appropriate cyber security strategy. Another key aspect to bear in mind for the future National Security Strategy is the identification of cyber space as the new dimension of the operating environment alongside more traditional forms (ground, sea, air and outer space). It will therefore be necessary to provide our Armed Forces with the cyber capabilities and human, technical and economic resources necessary for their exercise and functions. In this sense, any contingencies that may affect any of the key assets of the twelve sectors grouped into our critical infrastructures could compromise national security. It is therefore necessary to develop and approve the National Cyber Security Strategy. This strategy should be a tool to guide those responsible for the administration, control and management of National Cyber Security and its beneficiaries, but it will also serve as a deterrent to potential offenders. This strategy should be assigned a set of functions that can be achieved from the following set of primary enablers: 15. Conclusions 54 National Cyber Security, a commitment for everybody • The unquestionable leadership of State through Presidency of the Government; • The creation of a National Cyber Security System integrated into the national security system; • An appropriate method to provide a common language, theoretical homogenized fundamentals and procedures that describe how to proceed in respect of cyber security; • All accompanied by the necessary technological developments to support them. Moreover, these principle enablers should be fed by: • An awareness of the cyber situation; • Appropriate information sharing between different players; • An awareness and education brought about by the momentum of an educational model on cyber security; • A strategic communication policy on the issues of the National Cyber Security and Cyber Crisis Situations; • The development and promotion of R&D+innovation in the national public and private sector; • And a framework for public and private sector partnerships on cyber security. The main objective of National Cyber Security is to provide a secure cyber space in order to ensure the social, cultural and economic prosperity of Spain and the freedoms of citizens through a culture of prevention and resilience involving, in an active and integrated way, all sectors of Spanish society. 15. Conclusions 55 National Cyber Security, a commitment for everybody 16. Main and auxiliary bibliography and websites consulted 16. Main and auxiliary bibliography and websites consulted 56 National Cyber Security, a commitment for everybody 16. Bibliography and websites consulted Main bibliography • ARTEAGA, FÉLIX “Propuesta para la implantación de una Estrategia de Seguridad Nacional en España” DT 19/2011. December 2011. Real Instituto Elcano. • BETZ, DAVID J. & STEVENS, TIM “Cyberspace and the State. Toward a strategy for cyberpower”. June 2011.IISS. • CLARKE, RICHARD & KNAKE, ROBERT “CYBERWAR”. February 2010. Ed HarperCollins. • COZ FERNÁNDEZ, JOSÉ RAMÓN & FOJÓN CHAMORRO, ENRIQUE “La Geoestrategia del Conocimiento en Ciberseguridad”. January 2012. Revista RED SEGURIDAD. • COZ FERNÁNDEZ, JOSÉ RAMÓN & FOJÓN CHAMORRO, ENRIQUE “Un modelo educativo para una Estrategia Nacional de Ciberseguridad”. October 2011. Congreso ENISE (Encuentro Internacional de la Seguridad de la Información). • FOJÓN CHAMORRO, ENRIQUE & SANZ VILLALBA, ÁNGEL FRANCISCO “Ciberseguridad en España: Una propuesta para su gestión” ARI 102/2010. June 2010. Real Instituto Elcano. • FOJÓN CHAMORRO, ENRIQUE & COZ FERNÁNDEZ, JOSÉ RAMÓN “Panorama Internacional en el establecimiento de Estrategias Nacionales de Ciberseguridad. June 2011. Revista SIC”. Seguridad, Informática y Comunicaciones. • FOJÓN CHAMORRO, ENRIQUE & SANZ VILLALBA, ÁNGEL FRANCISCO “El ciberespacio: La nueva dimensión del entorno operativo” perteneciente al documento de seguridad y defensa nº 44 “Adaptación de la fuerza conjunta a la guerra asimétrica”. November 2011. Centro Superior de la Defensa Nacional (CESEDEN). http://www.defensa.gob.es/ceseden/Galerias/destacados/publicaciones/docSegyDef/ficheros/DSEGD_44.pdf • KNAPP, ERIC D. “Industrial Network Security”. September 2011. Ed. SYNGRESS. • LIBICKI, MARTIN “Cyberdeterrence and Cyberwar”. October 2009. RAND project Air Force. • LINARES, SAMUEL “LOS AMIGOS SE ESCOGEN, LA FAMILIA…NO“. June 2012. Revista RED SEGURIDAD. • MULLIGAN, DEIRDRE K. & SCHNEIDER, FRED B. “Doctrine for Cybersecurity“. September 2011. Universidad de Berkley. • SHOSTACK, ADAM & STEWART,ANDREW “The new school of information security”. April 2008. Ed Addison-Wesley. • STIENNON, RICHARD “Surviving Cyberwar”. January 2010. 16. Main and auxiliary bibliography and websites consulted 57 National Cyber Security, a commitment for everybody Auxiliary bibliography • CIBERSEGURIDAD. RETOS Y AMENAZAS A LA SEGURIDAD NACIONAL EN EL CIBERESPACIO, Cuaderno de Estrategia 149. Ministry of Defence http://bibliotecavirtualdefensa.es/BVMDefensa/i18n/catalogo_imagenes/grupo.cmd?path=17029 • CYBER SECURITY STRATEGY OF THE UNITED KINGDOM. June 2009. Cabinet Office, Government of the United Kingdom. http://www.official-documents.gov.uk/document/cm76/7642/7642.pdf • CANADA’S CYBER SECURITY STRATEGY. FOR A STRONGER AND MORE PROSPEROUS CANADA. 2010. Government of Canada. http://www.capb.ca/uploads/files/documents/Cyber_Security_Strategy.pdf • CYBER SECURITY STRATEGY FOR GERMANY. 2011. ENISA. http://www.enisa.europa.eu/media/news-items/german-cyber-security-strategy-2011-1 • CYBER SECURITY STRATEGY OF THE CZECH REPUBLIC FOR THE 2011 – 2015 PERIOD. http://www.enisa.europa.eu/media/news-items/CZ_Cyber_Security_Strategy_20112015.PDF • CYBER SECURITY STRATEGY OF THE UNITED KINGDOM. June 2009. Cabinet Office. Government of the United Kingdom. http://www.official-documents.gov.uk/document/cm76/7642/7642.pdf • DÉFENSE ET SÉCURITÉ DES SYSTÈMES D’INFORMATION STRATÉGIE DE LA FRANCE. February 2011. National Agtency for the Security of Information Systems. Government of France. http://www.enisa.europa.eu/media/news-items/french-cyber-security-strategy-2011 • ENHANCING THE USABILITY AND AVAILABILITY OF INFORMATION INFRASTRUCTURE ESSENTIAL FOR SECURING THE VITAL FUNCTIONS OF SOCIETY”. http://www.lvm.fi/c/document_library/get_file?folderId=1551284&name=DLFE-11788. pdf&title=Julkaisuja%203-2011 • ESTONIA CYBER SECURITY STRATEGY. http://www.mod.gov.ee/files/kmin/img/files/Kuberjulgeoleku_strateegia_2008-2013_ENG.pdf Ministry of Defence Government of Estonia. • ESTRATEGIA ESPAÑOLA DE SEGURIDAD. June 2011. Government of Spain. http://www.lamoncloa.gob.es/NR/rdonlyres/D0D9A8EB-17D0-45A5-ADFF-46A8AF4C2931/0/EstrategiaEspanolaDeSeguridad.pdf • INDIA CYBERSECURITY STRATEGY. http://www.mit.gov.in/content/cyber-security-strategy Government of India. 16. Main and auxiliary bibliography and websites consulted 58 National Cyber Security, a commitment for everybody • JAPAN: THE FIRST NATIONAL STRATEGY ON INFORMATION SECURITY. February 2006. Information Security Policy Council. http://www.nisc.go.jp/eng/pdf/national_strategy_001_eng.pdf • JOHN H. DEXTER. THE CYBER SECURITY MANAGEMENT SYSTEM: A CONCEPTUAL MAPPING. February 2002. The SANS Institute. • KOWTKO, M. SECURING OUR NATION AND PROTECTING PRIVACY. SYSTEMS, APPLICATIONS AND TECHNOLOGY CONFERENCE (LISAT), 2011 IEEE Long Island Issue Date: 6-6 May 2011. On page(s): 1 – 6. ISBN: 978-1-4244-9878-9. May 2011. Network, IEEE. • LARGE OIL COMPANIES FALL VICTIM TO CYBER-ESPIONAGE POSSIBLE CONNECTION WITH OPERATION AURORA. January 2010. Sofpedia. http://news.softpedia.com/news/Large-Oil-Companies-Fall-Victim-to-Cyber-Espionage-133317. shtml • NEW ZEALAND: THE DIGITAL 2.0 STRATEGY”. ISBN 978-0-478-31645-2. August 2008. Government of New Zealand. http://www.med.govt.nz/upload/11162/Digital%20Strategy%202.0%20FINAL.pdf • PROTECCIÓN DE INFRAESTRUCTURAS CRITICAS 2011. S2 GRUPO. http://www.securityartwork.es/wp-content/uploads/2011/12/Informe_PIC2011_S2Grupo.pdf • RAIN OTTIS. ANALYSIS OF THE 2007 CYBER-ATTACKS AGAINST ESTONIA FROM THE INFORMATION WARFARE PERSPECTIVE. PROCEEDINGS OF THE 7TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY. June 2008. University of Plymouth, UK. • SINGAPORE’S STRATEGY IN SECURING CYBERSPACE. October 2009. Government of Singapore. http://www.ida.gov.sg/News%20and%20Events/20050717164621.aspx?getPagetype=21 • STEW MAGNUSON. CYBER EXPERTS HAVE PROOF THAT CHINA HAS HIJACKED U.S.-BASED Internet TRAFFIC: UPDATED. December 2010. NDA’s Business and Technology Magazine. • STOP. THINK. CONNECT. THE ANTI-PHISHING WORKING GROUP (APWG) AND NATIONAL CYBER SECURITY ALLIANCE (NCSA). U.S. Department of Homeland Security. http://stopthinkconnect.org/ • THE US NATIONAL COMPREHENSIVE NATIONAL CYBERSECURITY STRATEGY. March 2010. National Security Council, EEUU. http://www.whitehouse.gov/cybersecurity/comprehensive-national-cybersecurity-initiative • T.M. CHEN. “STUXNET, THE REAL START OF CYBER WARFARE?” November-December 2010. Network, IEEE. • THE NATIONAL CYBER SECURITY STRATEGY (NCSS). June 2011. Ministry of Security and Justice. The Netherlands. 16. Main and auxiliary bibliography and websites consulted 59 National Cyber Security, a commitment for everybody Websites consulted • www.inteco.es • www.ccn-cert.cni.es • www.dhs.gov • www.whitehouse.gov • www.thehackernews.com • www.ciberseguridad.es • www.securityartwork.es • www.rootedcon.es 16. Main and auxiliary bibliography and websites consulted 60 Copyright and rights: SCSI (Spanish Cyber Security Institute) - ISMS Forum Spain. All rights regarding this work are reserved to SCSI (Spanish Cyber Security Institute) and ISMS Forum Spain. The holders recognise the right to use the work within the scope of their own professional activity in accordance with the following conditions: a) The ownership of the work is recognised, expressly indicating the holders of the Copyright. b) It shall not be used for commercial purposes. c) No work shall be created that is derived from the alteration, transformation and/or development of this work. - The holders of the Copyright do not guarantee that the work is free of error. As far as it is possible any errors highlighted shall be corrected in successive editions. - The content of the work does not constitute professional and/or legal advice. - The content of the work is not guaranteed to be complete, precise and/or updated. - Any product names and / or companies and / or brands and / or marks mentioned in the work are the exclusive property of the respective holders. An iniciative of: C/ Castello, 24, 5º Derecha, Escalera 1 28001 Madrid T.: 34 91 186 13 50 Further information: www.ismsforum.es