全球标准分享下载-全场2元
客服微信:1093451816,欢迎大家分享、下载!

预防潜在影响网络安全的噩梦

现在,网络空间安全对于工业生产设备的安全运行来说非常关键,但这些设备中许多装置的用户账户并没有得到妥善管理。中央用户账户管理结合基于角色的访问控制是集中有效地管理用户账户和权限的最佳途径,同时也是最先进的安全解决方案,这就消除了成百上千设备上有非托管用户账户的噩梦。

中央点操作员管理站,使用SDM600系统数据管理器控制台(照片来自于阿西亚布朗勃法瑞公司(ABB))

很多用户账户没有妥善管理

多数情况下,工厂默认工业设施设备中的用户帐户和密码是无人管理的,不会改变。共享和/或弱密码也是一个问题。

从网络空间安全的角度来看,当今世界互联互通,无论是工厂默认账户还是共享账户都存在巨大的风险,所以,二者都是不可接受的。除了考虑到网络安全问题,工厂默认账户和共享账户都会给系统控制人员带来控制系统管理方面的困扰。

修改配置会引发电力故障,但人们却无法确认是哪位员工更改了配置,因为无论是共享账户还是出厂设置账户都能进入系统进行操作。

另一种可能的情况和离开公司的员工有关。因为该员工知道公司的共享密码,这就需要公司重置大量设备和电脑的共享密码,来确保离职的员工无法登入公司系统。最后,同样重要的是,把新密码告诉在职的员工,这样,他们才能继续做自己的工作。

对于安全管理者和系统操作员来说,遗留流程、工具和技术会让他们很难改变系统来适应和抵御新的安全威胁。安全管理者需要通过标准化技术和现代工具提升安全水平。中央用户账户管理结合基于角色的访问控制(RBAC)是集中有效地管理用户帐户和用户权限的最佳途径,同时,它还是最先进的安全解决方案。它还消除了数以百计设备上有非托管用户帐户的噩梦。

技术变革可带来经营效益同时并存网络安全风险

变电站自动化、保护和控制系统在过去的十年里发生了重大变化。系统之间联系更加紧密,为终端用户提供更多信息,这就使依赖性增强,控制水平和生产效率提高。不同厂商产品和不同系统之间的互操作性已经通过利用符合公开标准,如从IEC 61850通信网络和电力系统自动化系列标准,或IEC 60870-5-104遥控设备和系统——第5-104部分 传输协议——IEC 60870-5-101使用标准的传输轮廓和利用现有的以太网技术访问网络。

从操作角度来讲,技术变革给操作带来巨大便利,但也容易给公用事业网络安全造成威胁,这也是传统企业系统多年来一直受到的困扰。网络安全是现代网络的基本要素,但网络设备上分散的访问策略会暴露关键漏洞。

粗心会导致系统易被侵入

自动化网络的异构性质会使任务变得复杂,比如撤销人员凭证或更改默认密码。出厂默认账户从制造商到消费者经常是保持不变的,它甚至可能在设备的整个生命周期都保持不变。这样,不变更出厂默认账户就为攻击者快速访问设备提供了方便,而且他们不需要有任何特殊的技能或知识。

此外,大多数控制和网络设备提供日志功能来记录用户做了什么,但如果所有操作执行都在出厂默认账户的保护下进行,登录信息和审计轨迹便分不清谁做了什么。

准备可能的解决方案

系统控制者和管理者欢迎针对下列问题给予合理答案,以确保系统的安全:

.你想容易地管理用户帐户吗?

.你想从中央点管理公司新员工的访问和权限吗?

.当员工离职后,你想快速从中央位置删除或撤销其用户凭证吗?

.你想把对中央位置的改变立即有效地对公司来自不同供应商的所有产品起作用吗?

.你想消除对于默认用户帐户在非托管的本地设备上活跃的担忧吗?

行业反击战

按照北美电力可靠性协会——关键基础设施保护(NERC CIP)标准的要求,以及许多其他网络安全需求,工业正在走一条共同的未来之路:IEC TS 62351 – 8:电力系统管理和相关信息交换——数据和通信安全——第8部分:基于角色的访问控制。本技术规范规定了供应商应该如何为客户群实施和提供基于角色的访问控制和中央用户帐号管理。

自IEC TS 62351 – 82001年发布以来,用户已经能够用一个特定的用户名和密码在公司所有设备所有网络验证自己身份。此外,添加或删除用户可以集中完成,一键解决。

这种技术不仅能够集中管理用户名和密码,而且可以集中管理用户权限,根据用户在公司的职责将角色分配给他们。(RBAC基于角色的访问控制)

解决噩梦的可能途径

控制系统需要进行管理,以确保基础设施的可持续性。管理系统意味着不断地更新设备。

网络安全策略的管理可能会变得复杂,因此,为了提高效率,安全管理者需要应用软件的支持。基于角色的访问控制系统就是这样一款应用软件。它允许负责人从中央点长期管理用户和他们的角色——甚至从不同位置的多个控制系统。

不是每个人都需要成为系统管理员。网络安全管理最普通的方法是尽可能少地授予每个用户特权。以IEC TS 62351 – 8为基础的基于角色的访问控制系统,能够让公司的安全负责人为整个系统管理用户,并将角色从同一个地方分配给那些用户。

IEC 62351是技术安全的系列国际标准,其目的是确保电力系统专用通信协议如IEC 61850和IEC 60870-5-104的可行性。虽然该系列标准中的大部分已经出台,在符合IEC 62351标准的系统投放市场前仍需做更多的工作。IEC 62351 – 8是于2011年完成并出版,为电力系统定义了基于角色的访问控制。这不是一个新概念,它实际上是许多信息技术系统里最佳实践的一部分。电力系统的基于角色的访问控制,可以减少必须分配给特定用户权限的人数,这些用户只有他们需要履行职责的权限。这就降低了电力系统的风险,因为根据最少特权的原则,只有实际需要时才会分配权限。这套标准还定义了一组预定义的角色(如,浏览器,操作者等)和预定义的权利。

尽可能遵守国际标准

要确保多样的设备网络安全功能的可靠性和高品质,最基本的是尽可能地遵守国际标准。高水平的网络安全仅来自于那些经得起考验的、已经被证实的、标准化的技术和方法,特别是当安装设备来自不同的供应商时。那些不走这条聪明路的公用事业会发现自己沉溺于单一的供货商,听从他们专有解决方案的摆布。

想要优化网络安全,必须要完全了解这个系统。和安全相关的事件,如需要监测不同系统组件的访问和不同系统组件其他用户的活动,来识别潜在的攻击和优化保护。中央用户活动日志从系统设备收集网络安全相关事件,并向负责人员提供信息。一个有效的、用户友好的方式,如自动识别事件模式,就是这种监测程序的重要特征。

基于国际标准(如IEC TS 62351 – 8)的最先进的网络安全产品,使得多厂家的控制系统的基于角色的访问控制的用户账户管理很有效率。这些产品为公用事业提供实时可见的与系统安全相关的用户活动。

专有网络安全的实现应该避免多厂家控制系统的无缝集成。根据IEC TS 62351 – 8,采用互操作的解决方案,会使操作任务更加容易。

 

Preventing a potential cybersecurity nightmare

Unmanaged user accounts in industrial environments present significant cybersecurity risks

Cybersecurity is now central to the safe operation of industrial installations, but user accounts for many devices used in these installations are not properly managed. Central user account management combined with Role Based Access Control is the perfect solution for managing user accounts and permissions efficiently and centrally while still providing a state of the art security solution. This eliminates the nightmare of having unmanaged user accounts on hundreds of devices.

Too many user accounts are not properly managed

In many cases the factory default user accounts and passwords used in devices in industrial installations are unmanaged and remain unchanged. Shared and / or weak passwords are also an issue.

From a cybersecurity perspective, in today’s interconnected world, both factory default accounts and shared accounts represent a huge cybersecurity risk and are unacceptable. Besides cybersecurity concerns, both factory default and shared accounts can make control system management a nightmare for control system owners.

Consider the case in which a power outage occurs as a result of a changed configuration, but it cannot be established which employee actually changed the configuration because a shared account or a factory default account was used to access the system and make the change.

Another possible scenario is connected with a single employee leaving an organization. Since this member of staff knows a password that is shared by several other employees, a huge effort is required to change this shared password in a number of devices and locations, to ensure that the departing employee can no longer access the system. Last but not least, the remaining employees must also be informed of the new password, so that they can continue to carry out their work.

Legacy processes, tools and technologies can make it hard for security managers and system operators to change systems so as to adapt to and defend against new security threats. Security managers need proven standardized technologies and modern tools to move to the next level. Central user account management combined with Role Based Access Control (RBAC) is the perfect solution for managing user accounts and user permissions centrally and efficiently, while still providing a state of the art security solution. It also eliminates the nightmare of having unmanaged user accounts on hundreds of devices.

Technological change has brought both operational benefits and cybersecurity risks

Substation automation, protection and control systems have changed significantly in the past decade. Systems have become more interconnected and provide end users with much more information, resulting in higher reliability, increased levels of control and higher productivity. Interoperability between different vendor products and systems has been achieved by deploying products and solutions based on open standards such as publications from the IEC 61850 series, Communication networks and systems for power utility automation, or IEC 60870-5-104, Telecontrol equipment and systems – Part 5-104: Transmission protocols – Network access for IEC 60870-5-101 using standard transport profiles, and by leveraging proven Ethernet technology.

This change in technology has brought huge benefits from an operational point of view, but it has also exposed utilities to the kind of cybersecurity threats that have been confronting traditional enterprise systems for years. Cybersecurity is an essential component of modern networks, but fragmented access policies across network devices risk exposing critical vulnerabilities.

Careless practices make system access easy

The heterogeneous nature of automation networks has complicated tasks such as revoking staff credentials, or changing default passwords. Factory default accounts often remain unchanged after handover from manufacturer to customer, and may even remain unchanged on devices for their entire lifetime. Such practices and unchanged factory default accounts make it easy for an attacker to access devices rapidly and without needing to possess any special skills or knowledge.

Furthermore, most control and network devices provide logging capabilities to record what users have done, but if all actions are performed under the umbrella of a factory default account, then the logged information and audit trail say nothing about who has really performed which actions.

Setting the stage for a possible solution

Control system owners and managers would probably welcome positive answers to the following questions to ensure the security of their systems:

  • Would you like to manage user accounts easily?
  • Would you to like to administer new employees’ access and permissions in your company from a central point?
  • Would you like to be able to remove or disable user credentials quickly from a single central location when an employee leaves your company?
  • Would you like the changes you made in the central location to be immediately effective on all products from different vendors throughout your organization?
  • Would you like to eliminate worry about default user accounts remaining active on unmanaged local devices?

The industry strikes back

Following demands from the North American Electric Reliability Corporation – Critical Infrastructure Protection (NERC-CIP) Standards, and many other cybersecurity requirements, the industry is adopting a common path to the future: IEC TS 62351-8: Power systems management and associated information exchange – Data and communications security – Part 8: Role-based access control. This Technical Specification sets out how vendors should implement and provide RBAC and central user account management to their customer base.

Since the arrival of IEC TS 62351-8 in 2011, users have been able to authenticate themselves across their organization to all devices in all networks, with a user-specific and unique user-id and password. Moreover, the addition or removal of users is done centrally, in a single step.

This technology offers not only the central management of user-ids and passwords, but also the management of user permissions by assigning roles to users, depending on their job roles in the organization (RBAC).

Possible solution for a nightmare scenario

Control systems need to be managed to ensure sustainable infrastructures. Managing a system means continually keeping its devices up-to-date.

The management of a cybersecurity policy can become complex; therefore to be efficient, security managers need support from software applications. A Role Based Access Control system is such an application. RBAC allows responsible persons to be able to manage users and their roles consistently from a central point – even for multiple control systems in different locations.

Not everybody needs to be a system administrator. A common sense approach in cybersecurity management is to grant the fewest possible privileges to every user. A RBAC system based on IEC TS 62351-8 enables the person responsible for security in a company to manage users for the entire system and assign roles to those users from one place.

IEC 62351 is a series of technical security International Standards that aims to secure power system-specific communication protocols such as IEC 61850 or IEC 60870-5-104. While most parts of the series have been released, more work is needed before systems compliant to IEC 62351 can be put on the market. IEC 62351-8, finalized and published in 2011, defines RBAC for power systems. This is not a new concept; it is in fact part of best practice in many IT systems. The use of RBAC in power systems makes it possible to reduce the number of permissions that have to be assigned to certain users so that these users have only the permissions they need to perform their duties. This reduces the risk to the power system, as permissions are only assigned when they are actually needed, according to the principle of fewest privileges. The standard also defines a list of pre-defined roles (e.g., Viewer, Operator, etc.) and of pre-defined rights.

Adhering to International Standards as closely as possible

To ensure high quality and dependable cybersecurity functionality in heterogeneous installations, it is fundamental to adhere to International Standards as far as possible. A high level of cybersecurity can only be achieved by deploying and using reviewed, approved and standardized technologies and methods, especially when installing devices from different vendors. Utilities not following such a wise path can find themselves locked in to a single supplier offering proprietary solutions.

Cybersecurity cannot be optimized without knowing everything that is going on in the system. Security related events, like access and other user activities in different system components, need to be monitored to identify potential attacks and to optimize protection. Central user activity logs collect cybersecurity related events from the system devices and make the information available to responsible personnel. An efficient and user-friendly approach, such as automatic recognition of event patterns, is a key feature of such monitoring applications.

State of the art cybersecurity products based on International Standards such as IEC TS 62351-8 enable efficient RBAC management of user accounts in multi-vendor control systems. They provide utilities with real-time visibility of the security-relevant user activity within their systems.

Proprietary cybersecurity implementations should be avoided for seamless integration of multi-vendor control systems. The adoption of interoperable solutions that accord to IEC TS 62351-8 makes performing these tasks much easier.

About the authors

Frank Hohlbaum – Security Manager Grid Automation,ABB Switzerland Ltd.

Frank is globally responsible for all aspects of cybersecurity within ABB’s Power System Substations and drives the security activities in this business unit. He is an active member of the Power System Security Council and represents the business unit Power System Substations. Frank Hohlbaum joined ABB in 1996 and has 20 years’ experience in substation automation. Frank is a Member of IEC Technical Committee (TC) 57/Working Group (WG) 3: Telecontrol protocols.

Bart de Wijs – Head of Cybersecurity for ABB's Power Grids Division.

Bart represents this division in the ABB Group Cybersecurity Council, which is a cross-disciplinary team staffed with resources from various corporate functions. Additionally, he is a member of the ABB Cybersecurity Response Team, handling vulnerabilities and incidents. Within the division he leads a team of cybersecurity specialists dealing with the different aspects of all the security-related concerns that could affect ABB customers. He is a member of various cybersecurity expert groups. Between 2007 and 2010 Bart was responsible for cybersecurity in ABB’s Power Generation business unit.

Fernando Alvarez – Cybersecurity Technical Product Manager,ABB Switzerland Ltd.

Fernando is responsible for supporting the development of different cybersecurity technologies in ABB products and for managing and tracking ABB’s cybersecurity intellectual property. He is also an active member of IEC TC57/WG15: Data and communication security, the IEC group working on the IEC 62351 series of International Standards for power systems management and associated information exchange. Previously Fernando worked on securing the internal IT infrastructure of banks and on securing military communications.

 

 

ANSI标准化工作

ANSI通过对标准制定组织(SDOs)认可程序推动美国国家标准(ANS)的制定,这些标准制定组织致力于共同制定国家自愿性协商一致标准。

ANSI认可表明,参与美国国家标准制定的标准制定组织所采用的程序都符合ANSI开放、平衡、协商一致和程序正当的基本要求。

人们经常向ANSI询问美国标准(和标准制定组织)的总数。据估,美国目前有数百个“传统”的标准制定组织 — 90%的标准由20个最大的标准制定组织(SDOs)制定 – 还有数百个“非传统”的标准制定机构,比如财团等。可以看出,美国的标准制定参与程度很高,因为标准制定组织本身所包含的各个委员会中的专家可以用他们的专业技能来满足这些标准的技术要求。

截至2015年,ANSI认可了240多个标准制定机构,制定了11,000多项美国国家标准(ANS)。

根据NIST专有出版物806— 《美国组织的标准活动》(1996年出版,作者罗伯特.B.托特)提供的数据显示,美国制定了93000多个标准,有近700 [1]个组织将制定标准作为自己的活动领域。其中,联邦政府是最大的标准制定者和使用者(制定和使用44000多个标准);而美国私营部门总共拥有约49,000个标准。

然而,随着1995年《国家技术转让与推动法案》(NTTAA)(公法104-113)的批准,美国开始鼓励联邦机构在可行情况下利用自愿协商一致标准,并适当参与自愿协商一致的标准制定工作。被批准为美国国家标准的标准是满足NTTAA的所有要求。

ANS的过程是经得起推敲的,它保护了所有参与者的权益。实质上, ANS加快了市场接受产品的速度,同时阐明了提高这些产品安全性的途径,从而实现对消费者的保护。

ANS的过程特征包括:

由利益相关方代表组成的团体或“协商一致团体”对所建议的标准达成共识;

对标准草案进行广泛的公开评审

考虑有关协商一致的投票成员和公众评论者所提交的意见并给予回应;

将批准的修改意见纳入标准草案中;

任何参与者若认为标准制定过程不符合ANSI的标准制定正当程序原则,有权提起上诉。

综上所述,为了维护ANSI的认可工作,要求标准制定者始终遵循一套管理协商一致的标准制定协程的要求或程序。这些要求在《ANSI基本要求:美国国家标准制定的正当程序要求》(ANSI Essential Requirements: Due process requirements for American National Standards.)这一文件中有所体现,另外还有一系列指导文件对这些程序进行了进一步阐释。这些指导性文件内容翔实,有助于ANSI认证标准的制定者和参与者了解ANS的制定过程及其影响。

正当程序是确保ANS标准得以在公平、可获得和回应各利益相关者要求的环境中制定的关键。ANS标准和制定过程秉承公开、公正的理念,确保所有的利害相关方都有机会参与到标准的制定中。同时,通过认证的标准制定者必须遵循ANSI的基本要求和其他正当程序保障,从而使公共利益也得到了适当的保障。

数据截至1996年,新的统计数据不可用。欲浏览美国的标准制定者名单,请于ANSI网站的国家标准系统网络(NSSN):全球标准化资料库(A National Resource for Global Standards)搜索标准制定者的可用目录。

 

 

ANSI成员用标准支持美国“儿童眼部健康安全月”

每年八月是美国“儿童眼部健康安全月”,每年到了这个时候,人们会密切关注任何有可能威胁儿童眼睛健康的因素。通过利用ANSI成员制定的眼部健康标准, ANSI积极支持儿童眼部健康安全呵护活动,并对自己的积极行为表示自豪。

你知道吗?每100名学龄儿童中,就有近25名儿童有眼部健康问题。而定期进行眼部检查则是保障眼部安全的初步措施,通过眼部检查,可排除各种潜在的眼睛健康问题,如色盲症、眼部感染和视力不佳。而视力不佳或将引起头痛、弱视等健康问题。

国际标准化组织为视力不佳人员推出了一套标准: ISO 14534:2011眼科光学——隐形眼镜和隐形眼镜护理产品——基本要求。 该项标准对隐形眼镜、隐形眼镜护理产品及其他配件的提出了安全和性能要求。之所以会针对隐形眼镜做标准化规定,是因为隐形眼镜现如今非常流行,是镜框眼镜的常见替代品。该项标准由ISO/TC 172/SC7眼科光学及仪器分技术委员会,以及美国电光学标准理事会制定的,该理事会为ANSI认可的作为美国技术顾问组(TAG)管理机构。

眼镜或隐形眼镜虽不是人人所需,但目前离炎热夏日结束尚有一月有余,佩戴保护型太阳镜保护眼部则对每个人都至关重要。ANSI Z80.3,眼镜科学-非处方眼镜和时尚眼镜基本要求,适用于一切非处方眼镜和时尚眼镜的标准。人们通常出于休闲、服饰搭配和娱乐等目的,佩戴非处方眼镜和时尚眼镜。这项全美通用的眼镜产品标准是由ANSI认可的Z80标准委员会制定。美国视力理事会是Z80秘书处管理部门。

尽管暑期护眼利于避免出现长期眼部健康问题,但在相关标准支持下,相关护目产品能够在孩子开学返校后的各种场合下,如高强度体育活动中保护孩子的眼睛。ASTM F803-1特定体育活动下护目镜标准规范是由ANSI成员和认可的组织ASTM International制定的。该项标准规范里涉及各种类型的护目镜,这些护目镜可极大减少外部环境对眼睛的伤害。

另外,美国防盲协会还为广大父母提供了有关婴儿视力发展的相关信息以及儿童在成长学习过程中的视力发展须知。

 

DIN发起创新项目资助计划

DIN and DKE(DIN 和 VDE的德国电气、电子和信息技术协会)共同发起了一项全新的创新理念资助计划。它通过称为“DIN Connect的标准化项目,为创新理念或项目提供资金支持。该项目计划既可加大人们在创新领域的研发力度,同时又可加快创新成果市场化应用进程。任何创新理念或创新活动的成功都离不开民众的信任和市场的欢迎,而民众的信任和市场的欢迎也离不开各类标准的规范作用。凭借自身广泛的国际关系和成熟的基础设施,DIN and DKE为全球范围内潜在客户及合作伙伴们提供了一个参与渠道。创业公司、知名企业、研发组织及各学术机构都受邀提交各自的创新理念或项目。

预计该项目将持续一到两年,每年的项目运营管理成本达35000欧元。而项目目标是,制定一项或多项DIN规范(DIN SPECs)和/或VDE应用指南 (VDE Application Guides)或其他初步的标准化工作成果。

2016年10月31日前是提交创新新理念或项目的截止时间。DIN将根据各创新项目的创新程度、与标准化的相关度以及对德国产业发展效益的提升度等标准,择优选取。待对提交的项目进行内部评估后,DIN拟于2016年11月邀请最优项目的申请人员前往德国进行项目资金申请,并于12月宣布创新项目入围者名单,选定的项目预计于2017年年初启动。

 

DIN launches innovation funding programme

Innovative ideas can be submitted up to 31 October 2016

DIN and DKE (German Association for Electrical, Electronic & Information Technologies in DIN and VDE) have launched a new funding programme for supporting innovative ideas through standardization called "DIN Connect". The programme will promote R&D in innovative areas and will make it easier to bring results to the market. Standards create trust and market acceptance, which innovations need in order to be successful. With their extensive international contacts and mature infrastructures, DIN and DKE can provide access to global networks of potential customers and partners. Start-ups, established companies, research organizations and academic institutions are invited to submit their ideas.

Projects will last one to two years and will be funded with up to € 35,000 per year for the project management. The objective is to draw up one or more DIN SPECs and/or VDE Application Guides, or other preliminary standardization work results.

Ideas should be submitted by 31 October 2016. Projects will be selected based on their degree of innovation, the benefits for German industry and relevance for standardization. After the submitted project has been reviewed internally by DIN, the applicants with the best ideas will be invited in November to make a full application for funding. The winners will be announced in December and the projects can be initiated at the start of 2017.

 

 

信息技术安全-欧洲制造

2016年6月30日,DIN-信息技术安全协调办公室(KITS)在德国柏林举行了第三届信息技术安全协调会议。在会上,欧盟委员会增长总司( DG GROWTH)单一市场政策、法规及实施处主任克斯汀•罗娜(Kerstin Jorna)表示:“互联网安全是实现数字化的基础和前提”。

会议的口号是:“使数字化更加安全”。本届KITS会议有来自工商企业、政界及科研机构的70余人参加,再次取得巨大成功。主题发言和小组讨论涉及信息技术安全的方方面面。与会嘉宾指出,由于该议题相当复杂,若要实现市场透明之目标,我们必须采取特别措施。另外,基于标准和规范的标签和认证也能为此目标提供助力。“信息技术安全—欧洲制造”品牌效应同样也能为信息技术安全定下正确的基调。

不过,大家都有这样一个共识:包括专业用户、消费者等各类市场经济主体的携手共同努力才是实现信息技术安全的唯一途径。要想实现信息技术安全之目标,不仅需要基于协商一致的标准,也需要得到诸如DIN-信息技术安全协调办公室(KITS)这样的跨行业组织的协助。

会上讨论的其它主题包括欧洲安全市场分化现象以及全新的欧洲资金规划等,同时也强调通过具体的保护文件来评估信息技术安全状况。但问题是,目前这种保护文件缺乏相关基础,因此急需信息技术安全这样的标准。而且,为制定出一套缜密并且可供多方使用的信息技术安全标准,必须更加有效地将“信息技术安全设计”理念付诸实施。对此,与会专家一致认为,急需一批专业知识过硬的信息技术安全专家,还讨论了信息技术安全在教育和培训行业面临的多种挑战。感谢美国思科集团、德国itWatch GmbH公司和Siemens的大力支持,本次会议这才顺利召开。

专家们无不热切盼望明年再次召开该会议,预计明年的会议同样将取得巨大成功。关于2017年会议相关信息以及历届会议精彩回顾,敬请访问:www.kits-konferenz.de.

 

IT security "Made in Europe"

2016 KITS Conference

"Cybersecurity is the foundation upon which digitalization is being built" said Kerstin Jorna, Director of the European Commission's Single Market Policy, Regulation and Implementation, DG GROWTH, at the third Conference held by DIN's IT Security Coordination Office (KITS) on 30 June 2016 in Berlin.

The motto of the conference was "Make digitalization more secure!". This year's KITS conference was again a resounding success, with over 70 participants from industry, politics and research. Lectures and panels covered various aspects of IT security. The participants pointed out that because this topic is so complex, special efforts will have to be taken to achieve the necessary transparency on the market. Labels and certificates based on standards and specifications can help, and an "IT Security – Made in Europe" branding can help set the right tone.

But everyone agreed on one thing:  IT security can only be achieved with the help of all economic players, including professional users and consumers. This requires consensus-based standards and the assistance of cross-sectoral organizations such as DIN's IT Security Coordination Office (KITS).

Other topics addressed at the conference include the fragmentation of the European security market and new European funding programmes. It was stressed that it must be possible to measure IT security on the basis of concrete protection profiles. But there is currently no basis for such profiles, and thus standards are desperately needed. Also, the concept of "IT security by design" needs to be implemented more effectively to achieve a thorough, interoperable IT security. Experts agreed that there is a great need for competent specialists, and they discussed the challenges of including IT security in training and education. The conference was made possible by contributions from CISCO, itWatch GmbH and Siemens.

Experts are looking forward to next year's conference, which should be just as successful as this year's.   Information on the 2017 KITS Conference 2017 and impressions of past conferences can be found at www.kits-konferenz.de.

 

 

欧盟委员会与相关企业就网络安全签署协议,积极应对网络安全威胁

今日,欧盟委员会建立了一项新的公私合作伙伴关系,这项公私合作关系有望在2020年之前带来18亿欧元的投资。该合作关系是一系列改善欧洲反网络攻击基础设施和加强欧洲网络安全领域的竞争力的新倡议中的一部分。

一项近期的调查显示,去年至少有超过80%的欧洲公司经历过至少一起网络安全事件,2015年全球各行业所遭遇的网络安全事件上升38%。这对众多大小型欧洲公司造成损害,同时这个威胁也让欧洲电子经济领域的信誉受损。作为欧洲数字化单一市场策略的一部分,委员会想加强跨境合作以及与在网络安全方面积极行动的行业和部门之间的合作,旨在在欧盟范围内帮助开发既具有创新性又有安全性的技术、产品和服务。

数字化一体市场副委员长安德鲁斯.安西普说道:“没有信任和安全,就没有数字化一体市场。欧洲必须准备好应对日益严峻且跨境流动的网络安全威胁。我们正在计划具体措施来加强欧洲应对这类攻击的快速恢复能力,保证建设和扩大电子经济的能力。”

数字经济与社会委员会委员京特•H•厄廷格说:“欧洲需要高质量,经济和彼此协作的网络安全的产品和服务。对于欧洲的网络安全产业来说,现在有一个很好的机遇使我们能在快速发展的全球市场中竞争。我们呼吁成员国和所有网络安全相关市场主体加强合作,凝聚知识、信息专业技能,以此来提高欧洲网络弹性。今日签订的网络安全伙伴关系对于该领域来说也是一大进步,具有里程碑式的意义。

如今的行动计划包括第一个欧洲公私网络安全合作伙伴关系的确立。欧盟将在其研究和创新项目计划“地平线2000”下,对此项合作投资4.5亿欧元。以欧洲网络安全组织 (ECSO)为代表的欧洲网络安全市场主体的投资金额有望达到其三倍。该合作伙伴关系同时也将包括来自各国、各地区以及地方的公共管理机构、研究中心和学术界人士,旨在促进研究和创新早期阶段的合作,为能源、卫生、交通和金融等领域的网络安全问题提供解决方案。厄廷格委员今日与ECSO在斯特拉斯堡签署了这项伙伴关系。(照片和视频将于中欧时间12点公布)

欧盟委员会还制定不同措施来解决欧盟网络安全市场分化的问题。目前一个通信技术公司可能要通过不同的认证程序才能向一些成员国销售它的产品和服务。因此委员会将研究针对信息通信技术安全产品建立一个可行的欧洲认证框架。

大量的欧洲创新型中小企业在利基市场(如密码学)和存在新型商业模式的完善市场(如杀毒软件)涌现,但是他们往往无法扩大业务规模。欧盟委员会希望能够减轻网络安全领域小型企业的融资问题,并将在欧盟投资计划下探索不同的融资途径。

欧洲议会拟批准《网络和信息安全指令》,欧盟依据该指令已经建立了一个计算机安全事件应对小组,以快速回应网络安全威胁和事故。同时各成员国之间还将建立“合作小组”,支持并促进战略合作和信息互换,提升信任和信心。欧盟委员会还呼吁各成员国充分利用这些新的机制,尽可能加强协调配合。欧盟委员会将提出方法加强大型网络安全事件中的跨境合作。鉴于网络安全领域的发展速度,委员会也将对欧盟网络和信息安全局进行评估。此项评估包括欧盟网络和信息安全局的授权范围和能力是否足以完成其职责,即是否可以协助成员国提升其网络应对能力。委员会还将对如何不同经济部门之间的加强和简化网络安全合作进行研究,其中就包括网络安全培训和教育。

背景:

行动计划的根据主要来自2015年《数字化单一市场策略》,2013年《欧盟网络安全策略》,以及即将确定的《网络和信息安全指令》,是基于欧洲安全议程对话以及《打击混合威胁》提出的。

 

European Commission – Press release

Commission signs agreement with industry on cybersecurity and steps up efforts to tackle cyber-threats

Brussels, 5 July 2016

The Commission today launches a new public-private partnership on cybersecurity that is expected to trigger €1.8 billion of investment by 2020. This is part of a series of new initiatives to better equip Europe against cyber-attacks and to strengthen the competitiveness of its cybersecurity sector.

According to a recent survey, at least 80% of European companies have experienced at least one cybersecurity incident over the last year and the number of security incidents across all industries worldwide rose by 38% in 2015. This damages European companies, whether they are big or small, and threats to undermine trust in the digital economy. As part of its Digital Single Market strategy the Commission wants to reinforce cooperation across borders, and between all actors and sectors active in cybersecurity, and to help develop innovative and secure technologies, products and services throughout the EU.

Andrus Ansip, Vice-President for the Digital Single Market, said: "Without trust and security, there can be no Digital Single Market. Europe has to be ready to tackle cyber-threats that are increasingly sophisticated and do not recognise borders. Today, we are proposing concrete measures to strengthen Europe's resilience against such attacks and secure the capacity needed for building and expanding our digital economy."

Günther H. Oettinger, Commissioner for the Digital Economy and Society, said: "Europe needs high quality, affordable and interoperable cybersecurity products and services. There is a major opportunity for our cybersecurity industry to compete in a fast-growing global market. We call on Member States and all cybersecurity bodies to strengthen cooperation and pool their knowledge, information and expertise to increase Europe's cyber resilience. The milestone partnership on cybersecurity signed today with the industry is a major step ."

Today's action plan includes the launch of the first European public private partnership on cybersecurity. The EU will invest €450 millionin this partnership, under its research and innovation programme Horizon 2020. Cybersecurity market players, represented by the European Cyber Security Organisation (ECSO), are expected to invest three times more. This partnership will also include members from national, regional and local public administrations, research centres and academia. The aim of the partnership is to foster cooperation at early stages of the research and innovation process and to build cybersecurity solutions for various sectors, such as energy, health, transport and finance. Commissioner Oettinger today signs the partnership with the ECSO in Strasbourg (photos and videos to be available at around 12.00 CET).

The Commission also sets out different measures to tackle the fragmentation of the EU cybersecurity market. Currently an ICT company might need to undergo different certification processes to sell its products and services in several Member States. The Commission will therefore look into a possible European certification framework for ICT security products.

A myriad of innovative European SMEs have emerged in niche markets (e.g. cryptography) and in well-established markets with new business models (e.g. antivirus software), but they are often unable to scale up their operations. The Commission wants to ease access to finance for smaller businesses working in the field of cybersecurity and will explore different options under the EU investment plan.

The Network and Information Security Directive, which is expected to be adopted by the European Parliament tomorrow, already creates a network of Computer Security Incident Response Teams across the EU in order to rapidly react to cyber threats and incidents. It also establishes a ‘Cooperation Group’ between Member States, to support and facilitate strategic cooperation as well as the exchange of information, and to develop trust and confidence. The Commission today calls on Member States to make the most of these new mechanisms and to strengthen coordination when and where possible. The Commission will propose how to enhance cross-border cooperation in case of a major cyber-incident. Given the speed with which the cybersecurity landscape is evolving, the Commission will also bring forward its evaluation of the European Union Agency for Network and Information Security (ENISA).This evaluation will assess whether ENISA's mandate and capabilities remain adequate to achieve its mission of supporting EU Member States in boosting their own cyber resilience. The Commission also examines how to strengthen and streamline cybersecurity cooperation across different sectors of the economy, including in cybersecurity training and education.

Background

Today's action plan finds its main roots in the 2015 Digital Single Market strategy, the 2013 EU Cybersecurity strategy and the forthcomingNetwork and Information Security (NIS) Directive. It builds on the recent Communications on Delivering the European Agenda on Security andCountering Hybrid Threats.

 

欧盟委员会与相关企业就网络安全签署协议,积极应对网络安全威胁

今日,欧盟委员会建立了一项新的公私合作伙伴关系,这项公私合作关系有望在2020年之前带来18亿欧元的投资。该合作关系是一系列改善欧洲反网络攻击基础设施和加强欧洲网络安全领域的竞争力的新倡议中的一部分。

一项近期的调查显示,去年至少有超过80%的欧洲公司经历过至少一起网络安全事件,2015年全球各行业所遭遇的网络安全事件上升38%。这对众多大小型欧洲公司造成损害,同时这个威胁也让欧洲电子经济领域的信誉受损。作为欧洲数字化单一市场策略的一部分,委员会想加强跨境合作以及与在网络安全方面积极行动的行业和部门之间的合作,旨在在欧盟范围内帮助开发既具有创新性又有安全性的技术、产品和服务。

数字化一体市场副委员长安德鲁斯.安西普说道:“没有信任和安全,就没有数字化一体市场。欧洲必须准备好应对日益严峻且跨境流动的网络安全威胁。我们正在计划具体措施来加强欧洲应对这类攻击的快速恢复能力,保证建设和扩大电子经济的能力。”

数字经济与社会委员会委员京特•H•厄廷格说:“欧洲需要高质量,经济和彼此协作的网络安全的产品和服务。对于欧洲的网络安全产业来说,现在有一个很好的机遇使我们能在快速发展的全球市场中竞争。我们呼吁成员国和所有网络安全相关市场主体加强合作,凝聚知识、信息专业技能,以此来提高欧洲网络弹性。今日签订的网络安全伙伴关系对于该领域来说也是一大进步,具有里程碑式的意义。

如今的行动计划包括第一个欧洲公私网络安全合作伙伴关系的确立。欧盟将在其研究和创新项目计划“地平线2000”下,对此项合作投资4.5亿欧元。以欧洲网络安全组织 (ECSO)为代表的欧洲网络安全市场主体的投资金额有望达到其三倍。该合作伙伴关系同时也将包括来自各国、各地区以及地方的公共管理机构、研究中心和学术界人士,旨在促进研究和创新早期阶段的合作,为能源、卫生、交通和金融等领域的网络安全问题提供解决方案。厄廷格委员今日与ECSO在斯特拉斯堡签署了这项伙伴关系。(照片和视频将于中欧时间12点公布)

欧盟委员会还制定不同措施来解决欧盟网络安全市场分化的问题。目前一个通信技术公司可能要通过不同的认证程序才能向一些成员国销售它的产品和服务。因此委员会将研究针对信息通信技术安全产品建立一个可行的欧洲认证框架。

大量的欧洲创新型中小企业在利基市场(如密码学)和存在新型商业模式的完善市场(如杀毒软件)涌现,但是他们往往无法扩大业务规模。欧盟委员会希望能够减轻网络安全领域小型企业的融资问题,并将在欧盟投资计划下探索不同的融资途径。

欧洲议会拟批准《网络和信息安全指令》,欧盟依据该指令已经建立了一个计算机安全事件应对小组,以快速回应网络安全威胁和事故。同时各成员国之间还将建立“合作小组”,支持并促进战略合作和信息互换,提升信任和信心。欧盟委员会还呼吁各成员国充分利用这些新的机制,尽可能加强协调配合。欧盟委员会将提出方法加强大型网络安全事件中的跨境合作。鉴于网络安全领域的发展速度,委员会也将对欧盟网络和信息安全局进行评估。此项评估包括欧盟网络和信息安全局的授权范围和能力是否足以完成其职责,即是否可以协助成员国提升其网络应对能力。委员会还将对如何不同经济部门之间的加强和简化网络安全合作进行研究,其中就包括网络安全培训和教育。

背景:

行动计划的根据主要来自2015年《数字化单一市场策略》,2013年《欧盟网络安全策略》,以及即将确定的《网络和信息安全指令》,是基于欧洲安全议程对话以及《打击混合威胁》提出的。

 

European Commission – Press release

Commission signs agreement with industry on cybersecurity and steps up efforts to tackle cyber-threats

Brussels, 5 July 2016

The Commission today launches a new public-private partnership on cybersecurity that is expected to trigger €1.8 billion of investment by 2020. This is part of a series of new initiatives to better equip Europe against cyber-attacks and to strengthen the competitiveness of its cybersecurity sector.

According to a recent survey, at least 80% of European companies have experienced at least one cybersecurity incident over the last year and the number of security incidents across all industries worldwide rose by 38% in 2015. This damages European companies, whether they are big or small, and threats to undermine trust in the digital economy. As part of its Digital Single Market strategy the Commission wants to reinforce cooperation across borders, and between all actors and sectors active in cybersecurity, and to help develop innovative and secure technologies, products and services throughout the EU.

Andrus Ansip, Vice-President for the Digital Single Market, said: "Without trust and security, there can be no Digital Single Market. Europe has to be ready to tackle cyber-threats that are increasingly sophisticated and do not recognise borders. Today, we are proposing concrete measures to strengthen Europe's resilience against such attacks and secure the capacity needed for building and expanding our digital economy."

Günther H. Oettinger, Commissioner for the Digital Economy and Society, said: "Europe needs high quality, affordable and interoperable cybersecurity products and services. There is a major opportunity for our cybersecurity industry to compete in a fast-growing global market. We call on Member States and all cybersecurity bodies to strengthen cooperation and pool their knowledge, information and expertise to increase Europe's cyber resilience. The milestone partnership on cybersecurity signed today with the industry is a major step ."

Today's action plan includes the launch of the first European public private partnership on cybersecurity. The EU will invest €450 millionin this partnership, under its research and innovation programme Horizon 2020. Cybersecurity market players, represented by the European Cyber Security Organisation (ECSO), are expected to invest three times more. This partnership will also include members from national, regional and local public administrations, research centres and academia. The aim of the partnership is to foster cooperation at early stages of the research and innovation process and to build cybersecurity solutions for various sectors, such as energy, health, transport and finance. Commissioner Oettinger today signs the partnership with the ECSO in Strasbourg (photos and videos to be available at around 12.00 CET).

The Commission also sets out different measures to tackle the fragmentation of the EU cybersecurity market. Currently an ICT company might need to undergo different certification processes to sell its products and services in several Member States. The Commission will therefore look into a possible European certification framework for ICT security products.

A myriad of innovative European SMEs have emerged in niche markets (e.g. cryptography) and in well-established markets with new business models (e.g. antivirus software), but they are often unable to scale up their operations. The Commission wants to ease access to finance for smaller businesses working in the field of cybersecurity and will explore different options under the EU investment plan.

The Network and Information Security Directive, which is expected to be adopted by the European Parliament tomorrow, already creates a network of Computer Security Incident Response Teams across the EU in order to rapidly react to cyber threats and incidents. It also establishes a ‘Cooperation Group’ between Member States, to support and facilitate strategic cooperation as well as the exchange of information, and to develop trust and confidence. The Commission today calls on Member States to make the most of these new mechanisms and to strengthen coordination when and where possible. The Commission will propose how to enhance cross-border cooperation in case of a major cyber-incident. Given the speed with which the cybersecurity landscape is evolving, the Commission will also bring forward its evaluation of the European Union Agency for Network and Information Security (ENISA).This evaluation will assess whether ENISA's mandate and capabilities remain adequate to achieve its mission of supporting EU Member States in boosting their own cyber resilience. The Commission also examines how to strengthen and streamline cybersecurity cooperation across different sectors of the economy, including in cybersecurity training and education.

Background

Today's action plan finds its main roots in the 2015 Digital Single Market strategy, the 2013 EU Cybersecurity strategy and the forthcomingNetwork and Information Security (NIS) Directive. It builds on the recent Communications on Delivering the European Agenda on Security andCountering Hybrid Threats.

 

CEN和CENELEC对欧盟委员会“单一标准化政策”表示欢迎

 

CEN和CENELEC对欧盟委员会关于欧洲标准化体系的未来的最新提议表示欢迎。CEN和CENELEC对于欧盟委员会致力于建立一个更加协调统一的标准化政策尤为满意。这将有利于加强单一市场以及促进欧盟政策和法律的实施。

CEN和CENELEC主席艾琳娜.圣地亚哥.西德(Elena Santiago Cid就6月1日欧盟委员会发布的《21世纪欧洲标准》(COM(2016) 358 final)回应说,我们很高兴看到欧盟委员会承诺出台一个更加一致和完整的标准化政策。我们相信“单一标准化政策”应该包含所有的经济领域和行业活动,包括目前为止一直被单独对待的电子技术。

“当今世界电子和智能技术日渐盛行,区分电子和非电子领域也变得越来越难,”Elena Santiago Cid女士还说道。“比如在家里,洗衣机和冰箱等家用电器正在变得越来越智能化,家庭供热系统也可以跟网络连接。再说办公场所,数字界面也融入各种设备和机器中。因此,保证各个领域的活动都拥有一套更加协调一致的标准化系统很有必要。这种标准化系统也要在欧盟委员会、CEN、CENELEC以及其他利益相关者的合作中体现。

对于同在6月1日发布的《2017年欧洲标准年度联合工作计划》,Elena Santiago Cid女士表示:“我们期待和欧盟委员会就此项工作计划开展合作,我们尤其欣赏委员会誓将促进关于服务业的标准的发展。基于以往的经验,在欧洲范围内实行统一标准有利于强化一体化市场,推动增长和增加就业机会。然而,现在的情况是虽然服务业占欧洲经济总量的70%,但服务业标准只占欧洲标准的2%。所以标准在未来可以发挥的作用无可限量。”

CEN和CENELEC希望欧盟委员会单一市场策略框架下的《标准化联合倡议》早日实施。《标准化联合倡议》将在6月13日在阿姆斯特丹正式开始实施,届时会由欧盟轮值主席国荷兰举办一场关于市场一体化的大型会议。除了欧盟委员会、欧洲自贸联盟和欧洲标准化组织((CEN, CENELEC and ETSI),),一大批利益相关者都会加入《标准化联合倡议》,其中包括欧洲工业联合会,民间相关组织,小企业标准协会和各国政府。

Elena Santiago Cid女士还说道,“我们很高兴看到此项联合倡议把众多相关主体聚集到一起,我们相信这将会进一步加强欧洲标准化体系的发展。欧洲标准化体系是基于公私合作伙伴关系上的,包括欧洲的公共组织,企业和其他相关主体。CEN和CENELEC发布的所有标准都是由包括中小型企业在内的各行业的专家和民间利益相关者的代表合作讨论得出的,兼顾了消费者、环境以及社会各方面的利益。通过采取包容的态度并考虑不同参与主体的看法,我们可以保证我们制定的标准符合市场需求,同时还有助于实现可及性和可持续性等社会目标。

备注:

2016年6月1日,欧盟委员会颁布了以下文件来定义电子经济的通信技术与能力:

  • 《21世纪欧洲标准通报》((COM(2016) 358 final))
  • 《2017欧洲标准化年度联合工作计划》)(COM(2016) 357 fina)

《开发欧洲服务业标准潜力以帮助欧洲消费者和企业》 (SWD(2016) 186 final)

 

CEN and CENELEC welcome European Commission’s commitment to have a 'single standardization policy'

Brussels, 2 June 2016 – The European Standardization Committees CEN and CENELEC welcome the European Commission’s latest proposals concerning the future of the European Standardization System.  In particular, CEN and CENELEC are satisfied to see that the Commission has committed itself to having a more consistent and unified policy towards standardization, which serves to strengthen the Single Market and also supports the implementation of EU policies and legislation.

Responding to the European Commission’s Communication 'European Standards for the 21st Century' (COM(2016) 358 final), which was published on 1 June, Elena Santiago Cid, Director General of CEN and CENELEC said: "In CEN and CENELEC, we are very pleased to see that the European Commission has promised to have a much more coherent and integrated policy towards standardization. We believe that the 'single standardization policy' should encompass all economic sectors and fields of activity – including digital technologies, which until now have been addressed separately."

 "In today’s world, where digital and smart technologies are becoming ever more prevalent, it is increasingly difficult to draw the line between what is digital and what is not digital," said Ms Santiago Cid. "For example – in the domestic environment, appliances such as washing machines and refrigerators are becoming smarter, while home heating systems can also be connected to the internet. Meanwhile, in the workplace, digital interfaces are being integrated into all kinds of equipment and machinery. Therefore, it is necessary to ensure a more coherent and consistent approach towards standardization across all fields of activity, and this should also be reflected in the cooperation between the European Commission, the European Standardization Organizations and other stakeholders."

Referring to 'The annual Union work programme for European standardisation for 2017', which was also published on 1 June, Ms Santiago Cid stated: "We look forward to cooperating with the European Commission on the implementation of this work programme, and we especially welcome the renewed commitment to promoting the development of standards in relation to services. Based on experience, we know that having common standards at European level can help to strengthen the Single Market, boost growth and create jobs. However, the current situation is that service standards only account for 2% of all European standards, even though services represent 70% of the European economy. So there is enormous potential for standards to play a positive role in the future!"

CEN and CENELEC look forward to the launch of the 'Joint Initiative on Standardization' (JIS), which has been developed in the framework of the European Commission’s 'Single Market Strategy'. The JIS will be officially launched in Amsterdam on 13 June, during a major conference on the Single Market organized by the Dutch Presidency of the Council of the EU. Alongside the European Commission, EFTA and the European Standardization Organizations (CEN, CENELEC and ETSI), a wide range of stakeholders will participate in the JIS –  including European industry federations, societal stakeholder organizations, SBS (Small Business Standards) and national governments, among others.

"We welcome the fact that the Joint Initiative is bringing together such a wide range of stakeholders, and we believe that this will serve to further strengthen the European Standardization System, which is based on a public-private partnership that includes the European institutions, business and other stakeholders," said Ms Santiago Cid. "All of the standards published by CEN and CENELEC are developed by experts from industry – including small and medium-sized enterprises (SMEs), working together with representatives of societal stakeholders – including consumers, environmental and social interests. By following an inclusive approach and taking the views of different stakeholders into account, we can ensure that our standards meet market needs, and that they also contribute to achieving societal objectives such as accessibility and sustainability."

Notes

Defining ICT skills and competences for the digital economy
On 1 June 2016, the European Commission published the following documents:
•Communication 'European standards for the 21st century' (COM(2016) 358 final)
•The annual Union work programme for European standardisation for 2017 (COM(2016) 357 final)
•Tapping the potential of European service standards to help Europe's consumers and businesses (SWD(2016) 186 final)

 

CEN和CENELEC对欧盟委员会“单一标准化政策”表示欢迎

 

CEN和CENELEC对欧盟委员会关于欧洲标准化体系的未来的最新提议表示欢迎。CEN和CENELEC对于欧盟委员会致力于建立一个更加协调统一的标准化政策尤为满意。这将有利于加强单一市场以及促进欧盟政策和法律的实施。

CEN和CENELEC主席艾琳娜.圣地亚哥.西德(Elena Santiago Cid就6月1日欧盟委员会发布的《21世纪欧洲标准》(COM(2016) 358 final)回应说,我们很高兴看到欧盟委员会承诺出台一个更加一致和完整的标准化政策。我们相信“单一标准化政策”应该包含所有的经济领域和行业活动,包括目前为止一直被单独对待的电子技术。

“当今世界电子和智能技术日渐盛行,区分电子和非电子领域也变得越来越难,”Elena Santiago Cid女士还说道。“比如在家里,洗衣机和冰箱等家用电器正在变得越来越智能化,家庭供热系统也可以跟网络连接。再说办公场所,数字界面也融入各种设备和机器中。因此,保证各个领域的活动都拥有一套更加协调一致的标准化系统很有必要。这种标准化系统也要在欧盟委员会、CEN、CENELEC以及其他利益相关者的合作中体现。

对于同在6月1日发布的《2017年欧洲标准年度联合工作计划》,Elena Santiago Cid女士表示:“我们期待和欧盟委员会就此项工作计划开展合作,我们尤其欣赏委员会誓将促进关于服务业的标准的发展。基于以往的经验,在欧洲范围内实行统一标准有利于强化一体化市场,推动增长和增加就业机会。然而,现在的情况是虽然服务业占欧洲经济总量的70%,但服务业标准只占欧洲标准的2%。所以标准在未来可以发挥的作用无可限量。”

CEN和CENELEC希望欧盟委员会单一市场策略框架下的《标准化联合倡议》早日实施。《标准化联合倡议》将在6月13日在阿姆斯特丹正式开始实施,届时会由欧盟轮值主席国荷兰举办一场关于市场一体化的大型会议。除了欧盟委员会、欧洲自贸联盟和欧洲标准化组织((CEN, CENELEC and ETSI),),一大批利益相关者都会加入《标准化联合倡议》,其中包括欧洲工业联合会,民间相关组织,小企业标准协会和各国政府。

Elena Santiago Cid女士还说道,“我们很高兴看到此项联合倡议把众多相关主体聚集到一起,我们相信这将会进一步加强欧洲标准化体系的发展。欧洲标准化体系是基于公私合作伙伴关系上的,包括欧洲的公共组织,企业和其他相关主体。CEN和CENELEC发布的所有标准都是由包括中小型企业在内的各行业的专家和民间利益相关者的代表合作讨论得出的,兼顾了消费者、环境以及社会各方面的利益。通过采取包容的态度并考虑不同参与主体的看法,我们可以保证我们制定的标准符合市场需求,同时还有助于实现可及性和可持续性等社会目标。

备注:

2016年6月1日,欧盟委员会颁布了以下文件来定义电子经济的通信技术与能力:

  • 《21世纪欧洲标准通报》((COM(2016) 358 final))
  • 《2017欧洲标准化年度联合工作计划》)(COM(2016) 357 fina)

《开发欧洲服务业标准潜力以帮助欧洲消费者和企业》 (SWD(2016) 186 final)

 

CEN and CENELEC welcome European Commission’s commitment to have a 'single standardization policy'

Brussels, 2 June 2016 – The European Standardization Committees CEN and CENELEC welcome the European Commission’s latest proposals concerning the future of the European Standardization System.  In particular, CEN and CENELEC are satisfied to see that the Commission has committed itself to having a more consistent and unified policy towards standardization, which serves to strengthen the Single Market and also supports the implementation of EU policies and legislation.

Responding to the European Commission’s Communication 'European Standards for the 21st Century' (COM(2016) 358 final), which was published on 1 June, Elena Santiago Cid, Director General of CEN and CENELEC said: "In CEN and CENELEC, we are very pleased to see that the European Commission has promised to have a much more coherent and integrated policy towards standardization. We believe that the 'single standardization policy' should encompass all economic sectors and fields of activity – including digital technologies, which until now have been addressed separately."

 "In today’s world, where digital and smart technologies are becoming ever more prevalent, it is increasingly difficult to draw the line between what is digital and what is not digital," said Ms Santiago Cid. "For example – in the domestic environment, appliances such as washing machines and refrigerators are becoming smarter, while home heating systems can also be connected to the internet. Meanwhile, in the workplace, digital interfaces are being integrated into all kinds of equipment and machinery. Therefore, it is necessary to ensure a more coherent and consistent approach towards standardization across all fields of activity, and this should also be reflected in the cooperation between the European Commission, the European Standardization Organizations and other stakeholders."

Referring to 'The annual Union work programme for European standardisation for 2017', which was also published on 1 June, Ms Santiago Cid stated: "We look forward to cooperating with the European Commission on the implementation of this work programme, and we especially welcome the renewed commitment to promoting the development of standards in relation to services. Based on experience, we know that having common standards at European level can help to strengthen the Single Market, boost growth and create jobs. However, the current situation is that service standards only account for 2% of all European standards, even though services represent 70% of the European economy. So there is enormous potential for standards to play a positive role in the future!"

CEN and CENELEC look forward to the launch of the 'Joint Initiative on Standardization' (JIS), which has been developed in the framework of the European Commission’s 'Single Market Strategy'. The JIS will be officially launched in Amsterdam on 13 June, during a major conference on the Single Market organized by the Dutch Presidency of the Council of the EU. Alongside the European Commission, EFTA and the European Standardization Organizations (CEN, CENELEC and ETSI), a wide range of stakeholders will participate in the JIS –  including European industry federations, societal stakeholder organizations, SBS (Small Business Standards) and national governments, among others.

"We welcome the fact that the Joint Initiative is bringing together such a wide range of stakeholders, and we believe that this will serve to further strengthen the European Standardization System, which is based on a public-private partnership that includes the European institutions, business and other stakeholders," said Ms Santiago Cid. "All of the standards published by CEN and CENELEC are developed by experts from industry – including small and medium-sized enterprises (SMEs), working together with representatives of societal stakeholders – including consumers, environmental and social interests. By following an inclusive approach and taking the views of different stakeholders into account, we can ensure that our standards meet market needs, and that they also contribute to achieving societal objectives such as accessibility and sustainability."

Notes

Defining ICT skills and competences for the digital economy
On 1 June 2016, the European Commission published the following documents:
•Communication 'European standards for the 21st century' (COM(2016) 358 final)
•The annual Union work programme for European standardisation for 2017 (COM(2016) 357 final)
•Tapping the potential of European service standards to help Europe's consumers and businesses (SWD(2016) 186 final)

 

航运装置监控[非]远程网络威胁

自古以来,从亚洲到地中海,海盗一直对船员构成巨大安全威胁。未来,武装分子可能不再登上轮船挟持船员来要求赎金,转而通过网络空间威胁船员。每天成千上万的机构、组织和个体都是网络攻击的对象,据悉,其中航运业遭受的网络攻击最多。航运业自己也承认,船舶被网络攻击盯上是早晚的事。因此,航运业正在采用国际标准等预防措施来减少网络攻击,降低危害风险。

武装海盗仍是航运的主要威胁

武装抢劫和海盗仍对海运构成巨大威胁,并且主要集中在特定地区,2011年索马里海盗猖獗之后,其他地区情况有所好转。国际商会(ICC)国际海事局(IMB)2015年 “海盗和武装抢劫船舶” 年报显示,2015年全球发生246起海盗和武装抢劫船舶事件(2014年为245起,2011年为439起)。近60%的案件(147起)发生在东南亚地区。报告指出,203艘船舶曾遭海盗袭击,发生了27起未遂袭击和15起绑架事件,有333位船员遭受了绑架挟持等暴力侵害,部分船员受伤,其中一起案件甚至有船员死亡。90%的袭击目标为散装船、各类油船、集装箱船以及货船。海盗给航运业造成数十亿美元的损失。除了传统海盗,如今兴起的网络海盗更为隐蔽,它的出现可能对航运业构成更大威胁,造成更为严重的损失。

船舶的网络事件并不少见

从欺诈到恶意隐瞒,我们常在新闻里看到船舶遭受的各种网络攻击,报道还详细指出巨额经济损失。航运业经常登上新闻头条,但是这并不意味着如今航运业已经脱离危险,不再是袭击目标。联合国贸易和发展会议(UNCTAD)指出,对海运资产的网络攻击尤为猖獗,原因在于全球将近80%的贸易量和超过70%的贸易额通过海运输送到世界的各个港口。

另外,船舶本身就是价值极高的资产。目前投入运营的最大的18000ETU船造价近2亿美元,如果加上货物,该船的价值甚至超过10亿美元。

国际海事组织(IMO)是联合国负责海上航行安全和防止船舶造成海洋污染的专门机构。目前国际海事组织和其他国际相关组织一道,研究船舶的网络安全问题。

国际海事卫星组织(Inmarsat)是国际海事组织建立的全球卫星通讯公司,其高级主管Gert-Jan Panken告诉最近在伦敦举办的海上网络风险管理峰会(Maritime Cyber Risk Management Summit)的与会者,43%的船员受到过网络侵害,包括恶意软件植入、电脑病毒攻击和软件升级问题。海洋电子与通信(Marine Electronics & Communications)称,95%的网络事件由人为引起,而没有受到攻击的船员仅为10%,这些船员都接受了网络安全培训。由此可见,恰当的培训有助于应对网络事件。

除了人员还存在其他最薄弱环节

普利茅斯大学的海洋网络威胁研究小组研究发现,软件未及时更新和船舶老旧不符合现代网络安全要求是目前存在的两个主要问题。发表在《工程技术参考》(Engineering and Technology Reference)的文章指出,针对导航、推进、货运相关功能的海事系统很可能成为网络攻击的对象。文章指出,海事是本国部队专用的永久性设施中最薄弱的一环。

    海洋网络风险管理峰会上的发言人提出,网络事件会影响许多系统和输入点,包括船舶自动识别系统(AIS)和全球定位系统(GPS),以及电子海图显示与信息系统(ECDIS)的输入点。另外,卫星通讯和无线网络等网络服务,承包商的远程监控服务,以及工程师升级船舶软件系统都会让网络攻击有机可乘。国际海事组织(IMO)研发的全球海上遇险与安全系统(GMDSS)也是网络攻击的潜在目标。

国际电工委员会第八十技术委员会( IEC TC 80):海上导航和无线电通信设备及系统,正在按国际标准研发以适应此类系统。

根据国际海事组织决议,IEC 61097系列中的海上导航和无线电通信设备及系统目前已经发行12种版本,涵盖各个部分的全球海上遇险与安全系统(GMDSS)。另外还研制国际标准版本用于船舶自动识别系统(AIS)和电子海图显示与信息系统(ECDIS)。

航运领域的网络安全意识逐渐提高

许多航运业组织机构意识到了网络事件的潜在风险,并且开始着手预防。

2015年9月,联合船舶保险委员会(JHC)携手两大保险业巨头伦敦劳合社(Lloyd’s)和国际保险协会(IUA)共同发布网络风险参考文件,指出“网络攻击造成船舶损失的风险可以预见,但还没变成现实。”

2016年1月,全球最大的航运组织,波罗的海国际航运公会(BIMCO)发布船舶网络安全指南。波罗的海国际航运公会秘书长安格斯.弗鲁(Angus Frew)称指南的目标是“为航运业提供清晰全面的网络安全信息”。他补充道,他们“应该针对公司运营的生意和船舶,帮助公司采取相应的网络安全风险防御措施。”

2016年1月,加拿大和美国向国际海事组织(IMO)提交网络风险管理(CRM)框架文件《保护海上运输系统免受网络威胁的促进指南》。文件提出五个基本因素——鉴别、保护、侦查、反应、恢复,认为“这五个因素是构成有效网络风险管理系统的基础”。

基于国际标准的网络风险管理指南

这些文件有一个共同特征,所有的网络安全建议措施都是基于国际标准,其中许多是由ISO/IEC JTC 1/SC 27:安全技术”制定的。

ISO/IEC JTC 1/SC 27是ISO/IEC JTC 1的分技术委员会,联合技术委员会是由国际电工委员会(IEC)和国际标准化组织(ISO)共同建立,负责信息技术方面的国际标准化工作。

加拿大和美国向国际海事组织(IMO)提交的指南列出了下列网络风险管理的相关标准和由 ISO/IEC JTC 1/SC 27制定的技术要求(TR):

ISO/IEC 27001:2013,信息技术-安全技术-信息安全管理体系-要求

ISO/IEC 27019:2013,信息技术-安全技术-基于ISO/IEC 27002针对能源公益事业行业的过程控制体系信息安全管理指南

ISO/IEC 27031:2011信息技术-安全技术-业务可持续性的信息和通信技术指南》

ISO/IEC 27033-3: 2010 信息技术–安全技术–网络安全–第3部分: 参考网络方案 –威胁、设计技术和控制问题》

ISO/IEC27039:2015信息技术—安全技术—入侵检测系统的选择、部署与操作

波罗的海国际航运公会(BIMCO)指南强调“航运业船上遇到的问题”,同时“包含岸上运营的网络安全问题”,给“信息安全管理体系ISO/IEC 27000 系列标准”提供了一个国际标准和指南的例子。

联合船舶保险委员会(JHC)的《网络风险评估指南》检查了航运公司应该实施“彻底的威胁评定,考虑(……)当前与国际安全标准(ISO/IEC 27001 / ISO/IEC 27002, NERC [北美电力可靠性协会] 1300, ISA/IEC 62443)的符合情况”。工业自动化与安全62443标准(IEC 62443)系列的国际标准(IS),技术规范(TS)和技术报告(TR)关于《工业通信网络/网络和私通安全》是依据“IEC TC 65:工业过程的测量、控制和自动化”发展而来。

长期来看网络事件不仅限于货物盗窃和走私

近年来报道的大量网络事件集中于货物走私而非船舶本身。

2013年6月,比利时和荷兰警察同伙追踪黑客抓获一个毒品走私团伙。这些黑客侵入航运公司电脑来跟踪装有毒品的集装箱动态,帮助贩毒者锁定目标集装箱,然后秘密转移毒品。

威瑞森的一份资料外泄调查报告显示,海盗还通过侵入航运公司电脑来锁定贵重货物。报告指出,“他们会登上船只,通过条形码锁定装有贵重货品的木箱,只偷那个木箱里的货物,然后马上离开船只。”

目前为止,网络攻击还没有造成巨大的航运灾难,然而根据之前的报告来看,航运业认为存在这个可能性。保险公司也担心网络事件会引发航运灾难。安联全球企业及特殊风险有限公司(Allianz Global Corporate & Specialty)发布的《年安全及航运回顾2015》指出,“网络攻击会毁了一家公司,导致大量船只、货物的保险索赔以及保险商的保护和赔偿,甚至还会造成同一家公司的大量船只遇害。”

安联称涉及两艘巨能船的海运灾难可能造成20亿美元的损失。

随着自动化技术提升以及远程操作的无人驾驶船舶的开发,未来航运资产的网络事件可能还会增加。

国际海事组织(IMO)和海运组织的报告和建议十分重视网络威胁。报告显示, IEC自主制定或与ISO/IEC JTC 1共同制定的国际标准主要用于保护航运打击威胁。

 

Shipping sets watch for [not so] distant cyberthreats

Maritime industry bodies consider pre-emptive measures to thwart cyberthreats

Piracy has posed a major security threat to mariners everywhere, from Asia to the Mediterranean, since time immemorial. In the future, threats from armed gangs boarding ships and holding vessels and crews for ransom may be replaced by ones from cyberspace. Every day, many institutions, establishments and individuals are the targets of cyberattacks. While the maritime industry has yet to record a major cyber incident, it recognizes that it is only a matter of time before some of its assets are targeted. As a result, it is taking pre-emptive measures, which include the adoption of International Standards, to mitigate the possibility of cyberattacks and their potential impact.

Armed piracy still a major threat to shipping

Armed robbery and piracy against ships still poses a significant threat to shipping; it is concentrated in certain areas but has dropped 44% since 2011 when Somali pirates were most active. The International Chamber of Commerce (ICC) International Maritime Bureau (IMB) 2015 annual report on "Piracy and armed robbery against ships" recorded 246 incidents worldwide in 2015 (as against 245 in 2014 and 439 in 2011). Nearly 60% of these incidents (147) took place in Southeast Asia. The report indicates that 203 vessels were boarded, that there were also 27 attempted attacks and 15 hijackings and that 333 crew were victims of various acts of violence ranging from kidnapping to being kept hostage, being injured or even killed (one case). Bulk carriers, tankers of various types and container and cargo ships made up some 90% of the targets. The cost to the industry represents billions of dollars. However a new, less spectacular form of piracy, cyberpiracy, looms on the horizon. It may prove far more costly and quite possibly no less dangerous to the shipping industry.

Cyber incidents on ships are not unusual

Cyberattacks on a broad range of sectors for fraudulent or malicious reasons are widely reported on a nearly daily basis. Financial losses, which are often considerable, are also detailed. The maritime industry has yet to make headlines in this domain. However, this doesn't mean that it is not targeted or that it is safe. Cyberattacks against maritime assets would have particularly serious ramifications since around 80% of global trade by volume and over 70% of global trade by value is carried by sea and is handled by ports worldwide, according to UNCTAD, the United Nations Conference on Trade and Development.

Furthermore, ships represent very high value assets. The cost of an 18 000 Twenty Foot Equivalent Unit (TEU) container ship, one of the largest types currently sailing, is around USD 200 million. If its cargo is included, it can be worth one billion dollars or more.   

The International Maritime Organization (IMO), the UN specialized agency with responsibility for the safety and security of shipping and the prevention of marine pollution by ships, is now considering cyber security matters together with other bodies and relevant international organizations.

Gert-Jan Panken, a senior executive from Inmarsat, the global satellite communication company set up by the IMO, told participants to a recent Maritime Cyber Risk Management Summit held in London, that 43% of seafarers reported having worked on vessels that had been compromised by a cyber incident, which could have constituted malware insertion, digital virus attack or software updating issues. Some 95% of cyber incidents were human-related, yet only 10% of crew surveyed had received some form of cyber security training, according to Marine Electronics & Communications. This fact points to a major weakness that should, however, be relatively easily remedied by applying appropriate training measures.

Humans are not alone as the weakest links

Outdated software and ships not designed with modern cyber security in mind are two existing vulnerabilities that have been identified in a study led by Plymouth University’s Maritime Cyberthreats Research Group. The paper, published in Engineering and Technology Reference, notes that maritime-related systems for navigation, propulsion, and cargo-related functions can be the targets of cyber-attacks. It points out that “the [maritime] sector is probably the most vulnerable aspect of critical national infrastructure”.

Cyber incidents could affect a number of systems and points of entry. Some of these were identified by speakers at the Maritime Cyber Risk Management Summit. They include the Automatic Identification System (AIS), Global Positioning System (GPS) and inputs to the Electronic Chart Display and Information System (ECDIS). They could also come from connection to online services over satellite communications, in-port WiFi, or through contractors providing remote monitoring services, or engineers updating shipboard system software. The Global Maritime Distress and Safety System (GMDSS) developed by the IMO is seen as another potential target of cyber attacks.

IEC TC 80: Maritime navigation and radiocommunication equipment and systems, is involved in developing International Standards for many of these systems.

It has published 12 Standards covering various aspects of GMDSS (based on IMO resolutions) in the IEC 61097 series. It has also developed International Standards for AIS and ECDIS.

Growing awareness from the sector

A number of maritime industry organizations and bodies have highlighted the potential risks posed by cyber incidents and are preparing for these.

A September 2015 information paper on cyber risk by the Joint Hull Committee (JHC), which brings together underwriting representatives from both Lloyd’s and the International Underwriting Association of London(IUA) notes that "the risk of a loss to a ship as a result of cyber disruption is foreseeable, but is not yet a reality".

The Baltic and International Maritime Council (BIMCO), the world’s largest international shipping association, published guidelines on cyber security onboard ships in January 2016. BIMCO Secretary General Angus Frewsaid at the time that the aim of these guidelines was “to provide the shipping industry with clear and comprehensive information on cyber security risks to ships”. He added that they “should help companies take a risk-based approach to cyber security that is specific to their business and the ships they operate”.

Canada and the United States submitted a framework document for cyber risk management (CRM) to the IMO Facilitation Committee in January 2016. These “Guidelines on the facilitation aspects of protecting the maritime transport network from cyberthreats”, list five functional elements – identify, protect, detect, respond, recover – “which taken together can form the foundation of an effective CRM system”.

Cyber risk management guidelines rest on International Standards

A common thread to all these documents is that they show clearly that all the measures recommended to be taken to ensure better cyber security rest on a number of International Standards, many of which are developed by ISO/IEC JTC 1/SC 27: Security Techniques.

ISO/IEC JTC 1/SC 27 is a Subcommittee of ISO/IEC JTC 1, the Joint TC formed by the IEC and the International Organization for Standardization (ISO) to prepare International Standards for Information Technology.

The Guidelines submitted by Canada and the US to IMO list the following CRM-related Standards and Technical requirements (TR) developed by ISO/IEC JTC 1/SC 27:

ISO/IEC 27001:2013, Information technology – Security techniques – Information security management systems – Requirements

ISO/IEC TR 27019:2013Information technology – Security techniques – Information security management guidelines based on ISO/IEC 27002 for process control systems specific to the energy utility industry

ISO/IEC 27031:2011Information technology – Security techniques – Guidelines for information and communication technology readiness for business continuity

ISO/IEC 27033-3: 2010Information technology – Security techniques – Network security – Part 3: Reference networking scenarios – Threats, design techniques and control issues

ISO/IEC 27039:2015Information technology – Security techniques – Selection, deployment and operations of intrusion detection systems (IDPS)

The BIMCO Guidelines focus on “issues facing the shipping industry onboard ships” but gives the “ISO/IEC 27000 series of Information Security Management Systems (ISMS) standards” as an example of international standards and guidelines that “cover cyber security issues for shoreside operations.”

As for the JHC, its Cyber Risk Assessment Guidance background checks state that shipping companies should carry out “a thorough threat assessment, contemplating (…) the current level of compliance with international security standards (ISO/IEC 27001 / ISO/IEC 27002, NERC [North American Electric Reliability Corporation] 1300, ISA/IEC 62443). The IEC 62443 series of IS, TS and TR on Industrial communication networks/network and system security, is developed by IEC TC 65:  Industrial-process measurement, control and automation.

Cyber incidents may not stay limited to cargo theft and smuggling for long

In recent years a number of cyber incidents focusing on cargo rather than vessels have been reported.

In June 2013 Belgian and Dutch police broke a drug smuggling ring after tracking down hackers who had penetrated shipping companies computers to follow the movement of containers loaded with drugs to let traffickers locate the right containers and remove them undetected.

Pirates have also been found to have hacked a shipping company’s computers to locate valuable cargo, according to findings published in a data breach investigation report by Verizon. “They’d board a vessel, locate by bar code specific sought-after crates containing valuables, steal the contents of that crate – and that crate only – and then depart the vessel without further incident,” the report notes.

So far no major shipping disaster has resulted from cyber attacks. However, the industry considers this to be a possibility, as previously mentioned reports indicate. Insurers also worry about the possibility of a shipping disaster resulting from a cyber incident. In its 2015 Safety and Shipping Review, Allianz Global Corporate & Specialty notes that “A cyber-attack could result in a total loss, leading to substantial insurance claims for hull, cargo and protection & indemnity underwriters. It could even involve multiple vessels from the same company”.

Allianz says that the cost of a maritime disaster involving two megaships could reach USD 2 billion.

The trend towards increased automation and ongoing work on the introduction of remotely operated unmanned vessels, may see cyber incidents on shipping assets increase in the future.

Reports and recommendations from the IMO and the maritime sector organizations show that the cyberthreats are being taken seriously; these reports also show that International Standards developed by the IEC on its own or within ISO/IEC JTC 1 are seen as central to protecting shipping against these threats.

 

 

 

 

 

 

 

 

最全最新的标准分享平台

客服微信:1093451816返回首页