Industrial Automation Control Systems Cybersecurity Certification. Chapter II

Javier Tallón
Javier TallónSecurity Expert at jtsec Beyond IT Security
The European Commission’s
science and knowledge service
Joint Research Centre
Industrial Automation Control Systems
Cybersecurity Certification – Chapter II
Georgios Theodoridis
EC DG JRC, Directorate E
Jose Ruiz
CTO at jtsec
2
Who am I?
Georgios Theodoridis
• Scientific/Technical Project Officer at European
Commission DG JRC (Joint Research Centre)
• Directorate on Space, Security and Migration
• Scientific/technological support for EU/MS policy making
• Critical Infrastructure Protection
• Manager of the ERNCIP IACS TG; Editor of the IACS CCS
• Review of the NIS and ECI Directives
• Smart Power Grids resilience and security
• EU Critical Infrastructures resilience against Hybrid Threats
• Internet/cyber Security
• Internet backbone routing security
• Data encryption solutions
3
Who am I?
Jose Ruiz
• CTO and founder at
• Common Criteria & FIPS 140-2 Expert
• EUCA/ICMC/ICCC Program Director
• Editor & Co-leader at ERNCIP TG “IACS Cybersecurity
Certification“
• Editor at JTC13 WG3: “Cybersecurity Evaluation Methodology
for ICT products”
• Appointed Member of SCCG (Stakeholder Cybersecurity
Certification Group)
4
The Joint Research Centre
at a glance
3000 staff
Almost 75% are scientists
and researchers.
Headquarters in Brussels
and research facilities
located in 5 Member States.
5
JRC’s Mission
As the European Commission's science and knowledge
service, the Joint Research Centre (JRC) supports EU
policies with independent scientific evidence throughout
the whole policy cycle.
6
EU Cybersecurity Certification Framework
What?
 Harmonised approach to Cybersecurity Certification
Schemes at EU level
 Common EU Cybersecurity Certification Schemes
 Specific ICT Products, Services and Processes of
common interest
7
EU Cybersecurity Certification Framework
Why?
• Increase the Cybersecurity within the EU
• EU-wide recognised Cybersecurity Certificates
• Improve the conditions for the functioning of the
internal market
• A digital single market for ICT Products, Services and Processes
• Increase the competitiveness and growth of EU ICT
companies
• Quality standards for Cybersecurity
• Minimise the certification cost
8
EU Cybersecurity Certification Framework
How?
• Definition of Common EU CCS for specific ICT Products /
Services / Processes
• Evaluation against the common EU CCS
• Attestation of compliance with specified security requirements
• Protection of the
• availability, authenticity, integrity or confidentiality of
• stored / transmitted / processed data or
• the functions / services offered by, or accessible via, those ICT Products /
Services / Processes
• throughout their life cycle
9
EU Cybersecurity Certification Framework
CyberSecurity Act
Union Rolling Work Programme
• Defined by the EC
• Multiannual overview of strategic priorities for future CCS
• Specific ICT products/services/processes
• Criteria
• Related MS CCS or EU/MS legislation/policy
• Market demand
• Cyber threat landscape
• Request by the ECCG
• Input from ECCG and Stakeholders CG
10
• EC request to ENISA for preparing a Candidate CCS
• Based on the Union Rolling Work Programme priorities
• Ad-hoc requests also possible
• ENISA
• Establishment of an ad-hoc Group of Experts
• Consultations/collaboration with all the Stakeholders
• Submission of the Candidate CCS
• Adoption of the CCS
• The Candidate CCS becomes Effective
EU Cybersecurity Certification Framework
CyberSecurity Act
11
• ERNCIP
• European Reference Network Critical Infrastructure Protection
• Managed and Coordinated by EC DG JRC
• ERNCIP IACS TG
• Industrial Automation & Control Systems Thematic Group
• Highly reputable experts
• All the relevant scientific and technical fields
• All over the EU
• All the ICCS stakeholders
• IACS (Components) manufacturers
• Cybersecurity certification authorities
• Cybersecurity industries, cybersecurity assessment laboratories
• Academia
IACS Components CCS (ICCS)
ERNCIP
12
2014
Phase 1
Feasibility Study
for an EU IACS
Components
Cybersecurity
Scheme
2015-2016
Phase 2
Design of an IACS
Components
Cybersecurity
Framework (ICCF)
2017-2018
Phase 3
ICCF Enhancement;
testing & improvement
JOIN(2017) 450
“Building strong
Cybersecurity for the EU”
COM(2017) 477
Proposal for the
CyberSecurity Act
2019
EU CyberSecurity
Act (CSA)
2019-2020
Phase 4
Recommendations for the
Implementation of the
IACS Components
Cybersecurity Certification
Scheme (ICCS)
In accordance with CSA
ICCSNET
NET
NET
CEN-
CENELEC
IACS Components CCS (ICCS)
Evolution
13
• Prescriptive and unequivocal
• Well structured, concise, clear and precise requirements for all ICCS stakeholders
and entities
• Rigorous and homogeneous evaluation & certification
• Equivalence and mutual recognition of Certificates
• Usable and self-explanatory
• Recommendations, guidelines, information and references for the ICCS
implementation
• Foreseen audience: professionals of products’ cybersecurity engineering,
evaluation and certification
• Agnostic
• Technology agnostic
• Terminology agnostic
IACS Components CCS (ICCS)
Basic Principles
14
• IACS are built as the integration of multiple, disparate
hardware/software Components
• Different technologies/solutions
• Different providers
• Cybersecure IACS by cybersecuring its Components
• Flexibility and adaptability: Different security requirements
and assurance levels per IACS element
• System design
• Intended use
• Operational environment
• System-level security measures
IACS Components CCS (ICCS)
Focus on Components
15
• Three (3) Assurance
Levels
• EU Statement of
Conformity (Basic)
• In accordance with
CSA
• Risk-assessment
approach
IACS Components CCS (ICCS)
Assurance Levels
CB or NCCA.Certification NCCA.CertificationManufacturer
16
IACS Components CCS (ICCS)
Assurance Levels
17
IACS Components CCS (ICCS)
Assurance Levels
18
IACS Components CCS (ICCS)
Consolidated
organisation of the
ICCS certification and
Self-Assessment
19
IACS Components CCS (ICCS)
NCCA.Supervision in
context
20
IACS Components CCS (ICCS)
Security Testing
Laboratory (TestLab) in
the certification
process
21
IACS Components CCS (ICCS)
Accreditation, Peer
Assessment and Peer
Review model
22
IACS Components CCS (ICCS)
Issuing a
Certificate on the
Applicant request
23
 Recommendations for the Implementation of the IACS
Components Cybersecurity Certification Scheme (ICCS)
• A European and Industry need
• Good piece of work to be used by the EU Commission and ENISA
 Work ahead
• Define the evaluation(s) methodology(s) to be used in the scheme
• Analyse and Re-use EUCC applicable work
 Waiting for Union Rolling Work Programme
Conclusions & Next Steps
24
Thank you for your attention – to stay in touch:
Email: JRC-ERNCIP-OFFICE@ec.europa.eu
•ERNCIP IACS TG: https://erncip-
project.jrc.ec.europa.eu/networks/tgs/european-iacs
•EU Science Hub: ec.europa.eu/jrc
•Twitter: @EU_ScienceHub
•Facebook: EU Science Hub - Joint Research Centre
•LinkedIn: Joint Research Centre
•YouTube: EU Science Hub
1 of 24

Recommended

Unified Security Governance by
Unified Security GovernanceUnified Security Governance
Unified Security GovernanceCan Demirel
791 views30 slides
Cloud security and compliance ppt by
Cloud security and compliance pptCloud security and compliance ppt
Cloud security and compliance pptKrupa Rajani
242 views7 slides
DER Integration Testbed at a Glance by
DER Integration Testbed at a GlanceDER Integration Testbed at a Glance
DER Integration Testbed at a GlanceIndustrial Internet Consortium
3.5K views11 slides
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3 by
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3Jim Gilsinn
3.1K views20 slides
2019 04-08 hopu-aj by
2019 04-08 hopu-aj2019 04-08 hopu-aj
2019 04-08 hopu-ajOpen & Agile Smart Cities
51 views12 slides
How to Create Plan-of-Action to Secure Critical Information by
How to Create Plan-of-Action to Secure Critical InformationHow to Create Plan-of-Action to Secure Critical Information
How to Create Plan-of-Action to Secure Critical InformationKoenig Solutions Ltd.
178 views14 slides

More Related Content

What's hot

Innovation Summit 2015 - 5 - AirVantage by
Innovation Summit 2015 - 5 - AirVantageInnovation Summit 2015 - 5 - AirVantage
Innovation Summit 2015 - 5 - AirVantageThibault Cantegrel
861 views15 slides
Cyber Resilient Systems Representative Solutions for Trustworthy Systems by
Cyber Resilient Systems Representative Solutions for Trustworthy SystemsCyber Resilient Systems Representative Solutions for Trustworthy Systems
Cyber Resilient Systems Representative Solutions for Trustworthy SystemsAgence du Numérique (AdN)
101 views9 slides
Nist 800 82 by
Nist 800 82Nist 800 82
Nist 800 82majolic
5.2K views31 slides
How to Comply with NIST 800-171 by
How to Comply with NIST 800-171How to Comply with NIST 800-171
How to Comply with NIST 800-171Corserva
1.3K views23 slides
Cybersecurity Summit 2020 Slide Deck by
Cybersecurity Summit 2020 Slide DeckCybersecurity Summit 2020 Slide Deck
Cybersecurity Summit 2020 Slide DeckCimetrics Inc
191 views73 slides
Innovation Summit 2015 - 6 - Project mangOH by
Innovation Summit 2015 - 6 - Project mangOHInnovation Summit 2015 - 6 - Project mangOH
Innovation Summit 2015 - 6 - Project mangOHThibault Cantegrel
1.4K views26 slides

What's hot(20)

Nist 800 82 by majolic
Nist 800 82Nist 800 82
Nist 800 82
majolic5.2K views
How to Comply with NIST 800-171 by Corserva
How to Comply with NIST 800-171How to Comply with NIST 800-171
How to Comply with NIST 800-171
Corserva1.3K views
Cybersecurity Summit 2020 Slide Deck by Cimetrics Inc
Cybersecurity Summit 2020 Slide DeckCybersecurity Summit 2020 Slide Deck
Cybersecurity Summit 2020 Slide Deck
Cimetrics Inc191 views
Innovation Summit 2015 - 6 - Project mangOH by Thibault Cantegrel
Innovation Summit 2015 - 6 - Project mangOHInnovation Summit 2015 - 6 - Project mangOH
Innovation Summit 2015 - 6 - Project mangOH
Thibault Cantegrel1.4K views
Third Party Security Testing for Advanced Metering Infrastructure Program by EnergySec
Third Party Security Testing for Advanced Metering Infrastructure ProgramThird Party Security Testing for Advanced Metering Infrastructure Program
Third Party Security Testing for Advanced Metering Infrastructure Program
EnergySec1.1K views
Installation Issues for Converged AV/IT Systems by rAVe [PUBS]
Installation Issues for Converged AV/IT Systems Installation Issues for Converged AV/IT Systems
Installation Issues for Converged AV/IT Systems
rAVe [PUBS] 533 views
Medina general presentation by MEDINA
Medina general presentationMedina general presentation
Medina general presentation
MEDINA 83 views
IoTAC - An innovative approach towards security assurance of IoT architecture... by ARennoch
IoTAC - An innovative approach towards security assurance of IoT architecture...IoTAC - An innovative approach towards security assurance of IoT architecture...
IoTAC - An innovative approach towards security assurance of IoT architecture...
ARennoch76 views
Effective security monitoring mp 2014 by Ricardo Resnik
Effective security monitoring mp 2014Effective security monitoring mp 2014
Effective security monitoring mp 2014
Ricardo Resnik709 views
Cisco Paris DevNet Hackathon slideshow - Intro by BeMyApp
Cisco Paris DevNet Hackathon slideshow - IntroCisco Paris DevNet Hackathon slideshow - Intro
Cisco Paris DevNet Hackathon slideshow - Intro
BeMyApp1.4K views
AARC Assurance Profiles for Kantara Initiative by kantarainitiative
AARC Assurance Profiles for Kantara InitiativeAARC Assurance Profiles for Kantara Initiative
AARC Assurance Profiles for Kantara Initiative
kantarainitiative150 views
Rin armenia icin 2020 by Eduard Grasa
Rin armenia  icin 2020Rin armenia  icin 2020
Rin armenia icin 2020
Eduard Grasa637 views

Similar to Industrial Automation Control Systems Cybersecurity Certification. Chapter II

20161012CRITIS_ptheron_ICCF ab by
20161012CRITIS_ptheron_ICCF ab20161012CRITIS_ptheron_ICCF ab
20161012CRITIS_ptheron_ICCF abDr. Paul THERON
84 views12 slides
Experiences evaluating cloud services and products by
Experiences evaluating cloud services and productsExperiences evaluating cloud services and products
Experiences evaluating cloud services and productsJavier Tallón
10 views26 slides
TAICS - Cybersecurity Certification for European Market.pptx by
TAICS - Cybersecurity Certification for European Market.pptxTAICS - Cybersecurity Certification for European Market.pptx
TAICS - Cybersecurity Certification for European Market.pptxJavier Tallón
74 views31 slides
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc... by
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...Dale Butler
919 views6 slides
European smart grid cyber and scada security by
European smart grid cyber and scada securityEuropean smart grid cyber and scada security
European smart grid cyber and scada securityYulia Rotar
2K views6 slides
security_assessment_slides by
security_assessment_slidessecurity_assessment_slides
security_assessment_slidesSteve Arnold
336 views20 slides

Similar to Industrial Automation Control Systems Cybersecurity Certification. Chapter II(20)

Experiences evaluating cloud services and products by Javier Tallón
Experiences evaluating cloud services and productsExperiences evaluating cloud services and products
Experiences evaluating cloud services and products
Javier Tallón10 views
TAICS - Cybersecurity Certification for European Market.pptx by Javier Tallón
TAICS - Cybersecurity Certification for European Market.pptxTAICS - Cybersecurity Certification for European Market.pptx
TAICS - Cybersecurity Certification for European Market.pptx
Javier Tallón74 views
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc... by Dale Butler
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
SMi Group's 4th annual European Smart Grid Cyber and SCADA Security conferenc...
Dale Butler919 views
European smart grid cyber and scada security by Yulia Rotar
European smart grid cyber and scada securityEuropean smart grid cyber and scada security
European smart grid cyber and scada security
Yulia Rotar2K views
security_assessment_slides by Steve Arnold
security_assessment_slidessecurity_assessment_slides
security_assessment_slides
Steve Arnold336 views
IoT Solutions for Smart Energy Smart Grid and Smart Utility Applications by Eurotech
IoT Solutions for Smart Energy Smart Grid and Smart Utility ApplicationsIoT Solutions for Smart Energy Smart Grid and Smart Utility Applications
IoT Solutions for Smart Energy Smart Grid and Smart Utility Applications
Eurotech13.3K views
Eurosmart - The Voice of the Digital Security Industry by Pierre-Jean Verrando
Eurosmart - The Voice of the Digital Security IndustryEurosmart - The Voice of the Digital Security Industry
Eurosmart - The Voice of the Digital Security Industry
EC-Council Certification Roadmap and Course Catalog by NetCom Learning
EC-Council Certification Roadmap and Course CatalogEC-Council Certification Roadmap and Course Catalog
EC-Council Certification Roadmap and Course Catalog
NetCom Learning214 views
Information Security Aspects of the Public Safety Data Interoperability Network by Blaz Ivanc
Information Security Aspects of the Public Safety Data Interoperability NetworkInformation Security Aspects of the Public Safety Data Interoperability Network
Information Security Aspects of the Public Safety Data Interoperability Network
Blaz Ivanc382 views
Decision Matrix for IoT Product Development by Alexey Pyshkin
Decision Matrix for IoT Product DevelopmentDecision Matrix for IoT Product Development
Decision Matrix for IoT Product Development
Alexey Pyshkin167 views
Solving ICS Cybersecurity Challenges in the Electric Industry by Dragos, Inc.
Solving ICS Cybersecurity Challenges in the Electric IndustrySolving ICS Cybersecurity Challenges in the Electric Industry
Solving ICS Cybersecurity Challenges in the Electric Industry
Dragos, Inc.399 views
Towards a certification scheme for IoT security evaluation by Axel Rennoch
Towards a certification scheme for IoT security evaluationTowards a certification scheme for IoT security evaluation
Towards a certification scheme for IoT security evaluation
Axel Rennoch43 views
Critical Infrastructure Protection (CIP) NERC Training by Tonex
Critical Infrastructure Protection (CIP) NERC TrainingCritical Infrastructure Protection (CIP) NERC Training
Critical Infrastructure Protection (CIP) NERC Training
Tonex205 views
Critical Infrastructure Protection (CIP) NERC Training : Tonex Training by Bryan Len
Critical Infrastructure Protection (CIP) NERC Training : Tonex TrainingCritical Infrastructure Protection (CIP) NERC Training : Tonex Training
Critical Infrastructure Protection (CIP) NERC Training : Tonex Training
Bryan Len149 views
IoT Security Assessment - IEEE PAR Proposal by Syam Madanapalli
IoT Security Assessment - IEEE PAR ProposalIoT Security Assessment - IEEE PAR Proposal
IoT Security Assessment - IEEE PAR Proposal
Syam Madanapalli99 views

More from Javier Tallón

ICCC2023 Statistics Report, has Common Criteria reached its peak? by
ICCC2023 Statistics Report, has Common Criteria reached its peak?ICCC2023 Statistics Report, has Common Criteria reached its peak?
ICCC2023 Statistics Report, has Common Criteria reached its peak?Javier Tallón
26 views29 slides
ICCC23 -The new cryptographic evaluation methodology created by CCN by
ICCC23 -The new cryptographic evaluation methodology created by CCNICCC23 -The new cryptographic evaluation methodology created by CCN
ICCC23 -The new cryptographic evaluation methodology created by CCNJavier Tallón
5 views44 slides
La ventaja de implementar una solución de ciberseguridad certificada por el C... by
La ventaja de implementar una solución de ciberseguridad certificada por el C...La ventaja de implementar una solución de ciberseguridad certificada por el C...
La ventaja de implementar una solución de ciberseguridad certificada por el C...Javier Tallón
9 views24 slides
EUCA23 - Evolution of cryptographic evaluation in Europe.pdf by
EUCA23 - Evolution of cryptographic evaluation in Europe.pdfEUCA23 - Evolution of cryptographic evaluation in Europe.pdf
EUCA23 - Evolution of cryptographic evaluation in Europe.pdfJavier Tallón
14 views41 slides
Hacking your jeta.pdf by
Hacking your jeta.pdfHacking your jeta.pdf
Hacking your jeta.pdfJavier Tallón
13 views43 slides
Evolucionado la evaluación Criptográfica by
Evolucionado la evaluación CriptográficaEvolucionado la evaluación Criptográfica
Evolucionado la evaluación CriptográficaJavier Tallón
22 views31 slides

More from Javier Tallón(20)

ICCC2023 Statistics Report, has Common Criteria reached its peak? by Javier Tallón
ICCC2023 Statistics Report, has Common Criteria reached its peak?ICCC2023 Statistics Report, has Common Criteria reached its peak?
ICCC2023 Statistics Report, has Common Criteria reached its peak?
Javier Tallón26 views
ICCC23 -The new cryptographic evaluation methodology created by CCN by Javier Tallón
ICCC23 -The new cryptographic evaluation methodology created by CCNICCC23 -The new cryptographic evaluation methodology created by CCN
ICCC23 -The new cryptographic evaluation methodology created by CCN
Javier Tallón5 views
La ventaja de implementar una solución de ciberseguridad certificada por el C... by Javier Tallón
La ventaja de implementar una solución de ciberseguridad certificada por el C...La ventaja de implementar una solución de ciberseguridad certificada por el C...
La ventaja de implementar una solución de ciberseguridad certificada por el C...
Javier Tallón9 views
EUCA23 - Evolution of cryptographic evaluation in Europe.pdf by Javier Tallón
EUCA23 - Evolution of cryptographic evaluation in Europe.pdfEUCA23 - Evolution of cryptographic evaluation in Europe.pdf
EUCA23 - Evolution of cryptographic evaluation in Europe.pdf
Javier Tallón14 views
Evolucionado la evaluación Criptográfica by Javier Tallón
Evolucionado la evaluación CriptográficaEvolucionado la evaluación Criptográfica
Evolucionado la evaluación Criptográfica
Javier Tallón22 views
España y CCN como referentes en la evaluación de ciberseguridad de soluciones... by Javier Tallón
España y CCN como referentes en la evaluación de ciberseguridad de soluciones...España y CCN como referentes en la evaluación de ciberseguridad de soluciones...
España y CCN como referentes en la evaluación de ciberseguridad de soluciones...
Javier Tallón8 views
EUCA22 Panel Discussion: Differences between lightweight certification schemes by Javier Tallón
EUCA22 Panel Discussion: Differences between lightweight certification schemesEUCA22 Panel Discussion: Differences between lightweight certification schemes
EUCA22 Panel Discussion: Differences between lightweight certification schemes
Javier Tallón16 views
EUCA22 - Patch Management ISO_IEC 15408 & 18045 by Javier Tallón
EUCA22 - Patch Management ISO_IEC 15408 & 18045EUCA22 - Patch Management ISO_IEC 15408 & 18045
EUCA22 - Patch Management ISO_IEC 15408 & 18045
Javier Tallón22 views
Cross standard and scheme composition - A needed cornerstone for the European... by Javier Tallón
Cross standard and scheme composition - A needed cornerstone for the European...Cross standard and scheme composition - A needed cornerstone for the European...
Cross standard and scheme composition - A needed cornerstone for the European...
Javier Tallón16 views
¿Cómo incluir productos y servicios en el catálogo CPSTIC (CCN-STIC 105)? by Javier Tallón
¿Cómo incluir productos y servicios en el catálogo CPSTIC (CCN-STIC 105)?¿Cómo incluir productos y servicios en el catálogo CPSTIC (CCN-STIC 105)?
¿Cómo incluir productos y servicios en el catálogo CPSTIC (CCN-STIC 105)?
Javier Tallón33 views
Is Automation Necessary for the CC Survival? by Javier Tallón
Is Automation Necessary for the CC Survival?Is Automation Necessary for the CC Survival?
Is Automation Necessary for the CC Survival?
Javier Tallón10 views
CCCAB tool - Making CABs life easy - Chapter 2 by Javier Tallón
CCCAB tool - Making CABs life easy - Chapter 2CCCAB tool - Making CABs life easy - Chapter 2
CCCAB tool - Making CABs life easy - Chapter 2
Javier Tallón10 views
2022 CC Statistics report: will this year beat last year's record number of c... by Javier Tallón
2022 CC Statistics report: will this year beat last year's record number of c...2022 CC Statistics report: will this year beat last year's record number of c...
2022 CC Statistics report: will this year beat last year's record number of c...
Javier Tallón58 views
CCCAB, la apuesta europea por la automatización de los Organismos de Certific... by Javier Tallón
CCCAB, la apuesta europea por la automatización de los Organismos de Certific...CCCAB, la apuesta europea por la automatización de los Organismos de Certific...
CCCAB, la apuesta europea por la automatización de los Organismos de Certific...
Javier Tallón59 views
Automating Common Criteria by Javier Tallón
Automating Common Criteria Automating Common Criteria
Automating Common Criteria
Javier Tallón127 views
jtsec Arqus Alliance presentation by Javier Tallón
jtsec Arqus Alliance presentationjtsec Arqus Alliance presentation
jtsec Arqus Alliance presentation
Javier Tallón102 views
III Encuentro del ENS- Usando el CPSTIC/ENECSTI en la administración - Herram... by Javier Tallón
III Encuentro del ENS- Usando el CPSTIC/ENECSTI en la administración - Herram...III Encuentro del ENS- Usando el CPSTIC/ENECSTI en la administración - Herram...
III Encuentro del ENS- Usando el CPSTIC/ENECSTI en la administración - Herram...
Javier Tallón112 views

Recently uploaded

Ransomware is Knocking your Door_Final.pdf by
Ransomware is Knocking your Door_Final.pdfRansomware is Knocking your Door_Final.pdf
Ransomware is Knocking your Door_Final.pdfSecurity Bootcamp
90 views46 slides
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... by
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...James Anderson
156 views32 slides
Qualifying SaaS, IaaS.pptx by
Qualifying SaaS, IaaS.pptxQualifying SaaS, IaaS.pptx
Qualifying SaaS, IaaS.pptxSachin Bhandari
897 views8 slides
State of the Union - Rohit Yadav - Apache CloudStack by
State of the Union - Rohit Yadav - Apache CloudStackState of the Union - Rohit Yadav - Apache CloudStack
State of the Union - Rohit Yadav - Apache CloudStackShapeBlue
253 views53 slides
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... by
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...Bernd Ruecker
50 views69 slides
CryptoBotsAI by
CryptoBotsAICryptoBotsAI
CryptoBotsAIchandureddyvadala199
40 views5 slides

Recently uploaded(20)

GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... by James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson156 views
State of the Union - Rohit Yadav - Apache CloudStack by ShapeBlue
State of the Union - Rohit Yadav - Apache CloudStackState of the Union - Rohit Yadav - Apache CloudStack
State of the Union - Rohit Yadav - Apache CloudStack
ShapeBlue253 views
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... by Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker50 views
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha... by ShapeBlue
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
ShapeBlue138 views
The Role of Patterns in the Era of Large Language Models by Yunyao Li
The Role of Patterns in the Era of Large Language ModelsThe Role of Patterns in the Era of Large Language Models
The Role of Patterns in the Era of Large Language Models
Yunyao Li80 views
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue by ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlueElevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
Elevating Privacy and Security in CloudStack - Boris Stoyanov - ShapeBlue
ShapeBlue179 views
Business Analyst Series 2023 - Week 4 Session 8 by DianaGray10
Business Analyst Series 2023 -  Week 4 Session 8Business Analyst Series 2023 -  Week 4 Session 8
Business Analyst Series 2023 - Week 4 Session 8
DianaGray1086 views
Business Analyst Series 2023 - Week 4 Session 7 by DianaGray10
Business Analyst Series 2023 -  Week 4 Session 7Business Analyst Series 2023 -  Week 4 Session 7
Business Analyst Series 2023 - Week 4 Session 7
DianaGray10126 views
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ... by ShapeBlue
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
Backup and Disaster Recovery with CloudStack and StorPool - Workshop - Venko ...
ShapeBlue144 views
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue by ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlueCloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
ShapeBlue94 views
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates by ShapeBlue
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesKeynote Talk: Open Source is Not Dead - Charles Schulz - Vates
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates
ShapeBlue210 views
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... by TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc160 views
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ by ShapeBlue
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericConfidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
ShapeBlue88 views
Initiating and Advancing Your Strategic GIS Governance Strategy by Safe Software
Initiating and Advancing Your Strategic GIS Governance StrategyInitiating and Advancing Your Strategic GIS Governance Strategy
Initiating and Advancing Your Strategic GIS Governance Strategy
Safe Software140 views
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue by ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlueVNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
VNF Integration and Support in CloudStack - Wei Zhou - ShapeBlue
ShapeBlue163 views
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ... by ShapeBlue
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
How to Re-use Old Hardware with CloudStack. Saving Money and the Environment ...
ShapeBlue123 views
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue by ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlueCloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
CloudStack Object Storage - An Introduction - Vladimir Petrov - ShapeBlue
ShapeBlue93 views

Industrial Automation Control Systems Cybersecurity Certification. Chapter II

  • 1. The European Commission’s science and knowledge service Joint Research Centre Industrial Automation Control Systems Cybersecurity Certification – Chapter II Georgios Theodoridis EC DG JRC, Directorate E Jose Ruiz CTO at jtsec
  • 2. 2 Who am I? Georgios Theodoridis • Scientific/Technical Project Officer at European Commission DG JRC (Joint Research Centre) • Directorate on Space, Security and Migration • Scientific/technological support for EU/MS policy making • Critical Infrastructure Protection • Manager of the ERNCIP IACS TG; Editor of the IACS CCS • Review of the NIS and ECI Directives • Smart Power Grids resilience and security • EU Critical Infrastructures resilience against Hybrid Threats • Internet/cyber Security • Internet backbone routing security • Data encryption solutions
  • 3. 3 Who am I? Jose Ruiz • CTO and founder at • Common Criteria & FIPS 140-2 Expert • EUCA/ICMC/ICCC Program Director • Editor & Co-leader at ERNCIP TG “IACS Cybersecurity Certification“ • Editor at JTC13 WG3: “Cybersecurity Evaluation Methodology for ICT products” • Appointed Member of SCCG (Stakeholder Cybersecurity Certification Group)
  • 4. 4 The Joint Research Centre at a glance 3000 staff Almost 75% are scientists and researchers. Headquarters in Brussels and research facilities located in 5 Member States.
  • 5. 5 JRC’s Mission As the European Commission's science and knowledge service, the Joint Research Centre (JRC) supports EU policies with independent scientific evidence throughout the whole policy cycle.
  • 6. 6 EU Cybersecurity Certification Framework What?  Harmonised approach to Cybersecurity Certification Schemes at EU level  Common EU Cybersecurity Certification Schemes  Specific ICT Products, Services and Processes of common interest
  • 7. 7 EU Cybersecurity Certification Framework Why? • Increase the Cybersecurity within the EU • EU-wide recognised Cybersecurity Certificates • Improve the conditions for the functioning of the internal market • A digital single market for ICT Products, Services and Processes • Increase the competitiveness and growth of EU ICT companies • Quality standards for Cybersecurity • Minimise the certification cost
  • 8. 8 EU Cybersecurity Certification Framework How? • Definition of Common EU CCS for specific ICT Products / Services / Processes • Evaluation against the common EU CCS • Attestation of compliance with specified security requirements • Protection of the • availability, authenticity, integrity or confidentiality of • stored / transmitted / processed data or • the functions / services offered by, or accessible via, those ICT Products / Services / Processes • throughout their life cycle
  • 9. 9 EU Cybersecurity Certification Framework CyberSecurity Act Union Rolling Work Programme • Defined by the EC • Multiannual overview of strategic priorities for future CCS • Specific ICT products/services/processes • Criteria • Related MS CCS or EU/MS legislation/policy • Market demand • Cyber threat landscape • Request by the ECCG • Input from ECCG and Stakeholders CG
  • 10. 10 • EC request to ENISA for preparing a Candidate CCS • Based on the Union Rolling Work Programme priorities • Ad-hoc requests also possible • ENISA • Establishment of an ad-hoc Group of Experts • Consultations/collaboration with all the Stakeholders • Submission of the Candidate CCS • Adoption of the CCS • The Candidate CCS becomes Effective EU Cybersecurity Certification Framework CyberSecurity Act
  • 11. 11 • ERNCIP • European Reference Network Critical Infrastructure Protection • Managed and Coordinated by EC DG JRC • ERNCIP IACS TG • Industrial Automation & Control Systems Thematic Group • Highly reputable experts • All the relevant scientific and technical fields • All over the EU • All the ICCS stakeholders • IACS (Components) manufacturers • Cybersecurity certification authorities • Cybersecurity industries, cybersecurity assessment laboratories • Academia IACS Components CCS (ICCS) ERNCIP
  • 12. 12 2014 Phase 1 Feasibility Study for an EU IACS Components Cybersecurity Scheme 2015-2016 Phase 2 Design of an IACS Components Cybersecurity Framework (ICCF) 2017-2018 Phase 3 ICCF Enhancement; testing & improvement JOIN(2017) 450 “Building strong Cybersecurity for the EU” COM(2017) 477 Proposal for the CyberSecurity Act 2019 EU CyberSecurity Act (CSA) 2019-2020 Phase 4 Recommendations for the Implementation of the IACS Components Cybersecurity Certification Scheme (ICCS) In accordance with CSA ICCSNET NET NET CEN- CENELEC IACS Components CCS (ICCS) Evolution
  • 13. 13 • Prescriptive and unequivocal • Well structured, concise, clear and precise requirements for all ICCS stakeholders and entities • Rigorous and homogeneous evaluation & certification • Equivalence and mutual recognition of Certificates • Usable and self-explanatory • Recommendations, guidelines, information and references for the ICCS implementation • Foreseen audience: professionals of products’ cybersecurity engineering, evaluation and certification • Agnostic • Technology agnostic • Terminology agnostic IACS Components CCS (ICCS) Basic Principles
  • 14. 14 • IACS are built as the integration of multiple, disparate hardware/software Components • Different technologies/solutions • Different providers • Cybersecure IACS by cybersecuring its Components • Flexibility and adaptability: Different security requirements and assurance levels per IACS element • System design • Intended use • Operational environment • System-level security measures IACS Components CCS (ICCS) Focus on Components
  • 15. 15 • Three (3) Assurance Levels • EU Statement of Conformity (Basic) • In accordance with CSA • Risk-assessment approach IACS Components CCS (ICCS) Assurance Levels CB or NCCA.Certification NCCA.CertificationManufacturer
  • 16. 16 IACS Components CCS (ICCS) Assurance Levels
  • 17. 17 IACS Components CCS (ICCS) Assurance Levels
  • 18. 18 IACS Components CCS (ICCS) Consolidated organisation of the ICCS certification and Self-Assessment
  • 19. 19 IACS Components CCS (ICCS) NCCA.Supervision in context
  • 20. 20 IACS Components CCS (ICCS) Security Testing Laboratory (TestLab) in the certification process
  • 21. 21 IACS Components CCS (ICCS) Accreditation, Peer Assessment and Peer Review model
  • 22. 22 IACS Components CCS (ICCS) Issuing a Certificate on the Applicant request
  • 23. 23  Recommendations for the Implementation of the IACS Components Cybersecurity Certification Scheme (ICCS) • A European and Industry need • Good piece of work to be used by the EU Commission and ENISA  Work ahead • Define the evaluation(s) methodology(s) to be used in the scheme • Analyse and Re-use EUCC applicable work  Waiting for Union Rolling Work Programme Conclusions & Next Steps
  • 24. 24 Thank you for your attention – to stay in touch: Email: JRC-ERNCIP-OFFICE@ec.europa.eu •ERNCIP IACS TG: https://erncip- project.jrc.ec.europa.eu/networks/tgs/european-iacs •EU Science Hub: ec.europa.eu/jrc •Twitter: @EU_ScienceHub •Facebook: EU Science Hub - Joint Research Centre •LinkedIn: Joint Research Centre •YouTube: EU Science Hub