The German IT Security Act Is Now a Reality

Transcription

The German IT Security Act Is Now a Reality
The
Customer Magazine
The German IT Security
Act Is Now a Reality
So how should
CRITIS operators
prepare?
Issue 1/2015
An Interview with
Dr Walter Schlebusch,
CEO of Giesecke &
Devrient
“The protection of
critical infrastructures
has only just begun”
Flexible and Mobile
SINA Workstations
at the German Federal
Ministry of Finance
Neither Bulky
nor Boring
Designing optimised
security concepts based
on IT Baseline Protection
Content
4
An Interview with Dr Walter Schlebusch,
CEO of Giesecke & Devrient
“The protection of critical infrastructures has only just begun”
24
National
04 An Interview with
Dr Walter Schlebusch
06 A Strong Partnership:
AREVA and secunet
08 Flexible and Mobile –
Security by Design
For OEMs and suppliers, IT security in connected
vehicles is a major challenge. What solutions are
there? And, most importantly, when does what
solution make sense?
SINA Workstations
10 The IT Security Act –
a Pipe Dream No More
13 Separated, Together, Then
Separated Again
Technologies & Solutions
20 SINA Receives the Highest International
Approvals
22 SINA Makes Life Easier
Science
24 Security by Design:
14 An Interview with
26 Where App Dangers Lurk
Protecting Connected Vehicles
Dr Gabi Dreo Rodosek
International
News in Brief
19 Dr Rainer Baumgart Appointed to the
16 EasyPASS Among the Top 3
ENISA Advisory Board Again
16 And Twelve Points Go to...
23 Points for German IT Security
17 German Expertise for a
National PKD Solution
18 Neither Bulky nor Boring:
2 secuview 1/2015
IT Baseline Protection
Dates
27 Upcoming Events
Editorial
I
T security affects us all. Whether private users
November, we’ll reveal different ways to effectively
on their smartphones, manufacturers facing the
overcome these challenges and devise solutions
increased networking of control and production
together.
networks, or entire countries – in all areas, the
internet doesn‘t just offer great opportunities and
We’ve specialised in the effective protection and
convenience; it also harbours threats.
defence of IT systems for years now. In his interview, Walter Schlebusch says: “For us, security
Effective protection and defence can only be
requires more than just a colourful band of Swiss
achieved thanks to careful observation, research
Guards to extract a problem. Ideally, you should
and detailed analysis, both of the attacker and
work with the customer to devise an IT security
existing and future innovations in technology. The
strategy that will then be implemented consistently.”
CODE research centre in Munich is working on
This not only describes the approach of our parent
precisely that, as Dr Gabi Dreo Rodosek explains in
company G&D, but also precisely defines our own
her interview. CODE has made the tailored protec-
position. As you know, our five divisions therefore
tion of critical infrastructures a research field in its
aim to work in close concert with our customers.
own right, and even politicians are now turning their
We outline a few of our latest projects for you in this
attention to these companies. The new IT Security
issue.
Act is intended to “significantly improve the security of IT systems (IT security) in Germany”. Under
Happy reading!
the law, critical infrastructures will not only have to
adapt their IT infrastructure, but also their organisational processes. Uncertainty reigns here at the
moment. At our Information Security Symposium in
Dr Rainer Baumgart
secuview 1/2015 3
National
“The Protection of Critical
Infrastructures Has Only
Just Begun”
An interview with Dr Walter Schlebusch,
CEO of Giesecke & Devrient
With Giesecke & Devrient (G&D) and secunet, two
German providers are positioning themselves in a
highly specialised market...
Dr Schlebusch: And that is our strength! G&D earns
the vast majority of its profits abroad and has access
to numerous national administrations, financial institutes, telecommunications providers and techno-
In interview:
Dr Walter Schlebusch has
been the CEO of G&D since
2013. He had previously been
a member of the Board since
1 January 2000 and was
responsible for the company‘s
Banknote division.
logy firms worldwide. secunet has a strong national
footprint, with years of experience in the government
sector and an excellent range of SINA products and
border control solutions.
What do you think are G&D’s strengths in IT security?
Dr Schlebusch: My first thought is, of course, our
years of international experience in the security
technology sector and our wide range of secure
products. These have made us a credible, reliable
and legitimate trust anchor for many customers. So,
just like you wouldn’t give your house key to just
Dr Schlebusch, after the recent hacker attack on the
anyone, our customers are – quite rightly – entitled to
German parliament, do we still need to promote IT
have their data handled professionally and securely.
security?
Dr Schlebusch: No matter where the attack origina-
What does that mean in practice?
ted, incidents like this illustrate just how vulnerable
Dr Schlebusch: In order to work in highly secure
our systems are. Discussions surrounding the pro-
environments, you need to completely understand
tection of critical infrastructures haven’t ended with
your customers’ processes. Unlike security compa-
the passing of the IT Security Act; they’ve only just
nies that cast a wide net, we’ve chosen to specialise
begun.
in IT security. For us, security requires more than just
4 secuview 1/2015
National
a colourful band of Swiss Guards to extract a problem. In the same way, subsequent, ad hoc access to
a customer system is simply not enough. Ideally, you
should work with the customer to devise an IT security strategy that will then be implemented consistently.
To help with this, we offer hardware and software
solutions and support customers with highly skilled
“For us, security requires
more than just a colourful
band of Swiss Guards to
extract a problem.”
consultancy.
On the one hand, users know the colourful world of
attack scenarios on IT and production systems.
apps. On the other, there’s the serious topic of secu-
Until now, the typical medium-sized business has
rity. How do they go together?
been able to do little to combat these. We can help
Dr Schlebusch: In an abstract sense, security is
them to implement appropriate and scalable security
difficult to communicate. It’s much easier to grasp
solutions.
using concrete examples; the on-board communications of German premium vehicles and industrial
On the national level, we’re obviously excited about
plants are both already secured by G&D, for instance.
the implementation of the IT Security Act. This is a
Mobile wallets around the world are based on security
big opportunity for industries to independently agree
made by G&D, and banking apps run securely thanks
on the security measures that legislators will require
to our technology. The scope of application for IT
them to implement.
security is therefore greater than you might think just
looking at your smartphone!
Finally, the broad field of identity assurance and
identity management offers huge potential, since the
What future trends do you predict?
Internet of Things is based on the secure assignment
Dr Schlebusch: These days, everyone is talking
of identities to objects and processes. Our years of
about Industry 4.0, or the complete networking of
experience in secure connectivity and secure soft-
industrial automation. We believe security is pivotal
ware development based on specialist hardware will
to this. Take the growing number of asymmetric
allow us to contribute a lot here.
secuview 1/2015 5
A Strong Partnership:
AREVA and secunet
The new IT Security Act is intended to provide greater
security for critical infrastructures. However, operators will
remain responsible for implementing any new measures
T
he attack on the French television broad-
and for a while it even lost control of its website and
caster TV5Monde at the beginning of April
most social media accounts. It took days for things
is just one example of a crime that threatens
to get back to normal.
to impact more of our lives nowadays. The cyber
attack caused tremendous damage; the station’s
The consequences would have been far more
broadcasting operations were disrupted for hours,
serious if a successful attack had been launched
6 secuview 1/2015
National
against essential providers like energy or water
from best practices with the highest classes of
suppliers. As shown on page 10, the IT Security Act
protection worldwide:
is now intended to provide more comprehensive
- Developing ISMS, from risk assessment to
security for critical infrastructures (CRITIS). However,
auditing, e.g. in accordance with ISO/IEC 27000
operators will remain responsible for implementing
- Industrial security with security zones and security
any new measures.
grading, e.g. in accordance with IEC 62443
- Security modelling and simulation
Security for digital control systems
AREVA isn’t just a supplier for nuclear power
stations and wind farms; it also draws on years of
experience in critical infrastructures to provide a
wide range of security products and services for
digital control systems. In close cooperation with
partners like secunet, AREVA considers security
long before plant operation, starting from the early
product development phase. That way, it can offer
fully formed solutions, whether laying the founda-
- Process control systems and network control
technology
- SIEM (security information and event
management)
- Automation security, e.g. PCS7, WINCC,
SIPROTEC
- Intrusion detection and intrusion prevention,
whitelisting and security tests, etc.
- Ongoing threat detection, assessment, analysis
and defence
tions for an ISMS (information security management
system), putting together a complete concept, or
implementing special hardware and software
More information:
solutions.
Holger Hoppe
[email protected]
All of its industrial security services are combined in
an integrated approach, meaning that nuclear and
Christoph Schambach
non-nuclear customers can benefit in equal measure
[email protected]
Reliable integrity monitoring
With the OPANASecTM solution, AREVA has developed a range of easy-to-use software modules
for diverse control systems that can be used to monitor system integrity. The solution means
programs can only be modified by turning a key switch, while attacks that manipulate user software and configuration data are reliably detected and instantly reported. The solution has been
certified by TÜV SÜD and patents are pending.
secuview 1/2015 7
National
Flexible and Mobile
SINA Workstations at the German Federal Ministry of Finance
I
t’s generally not so easy to reconcile our personal
Mobility isn’t the only consideration here; IT security
and professional lives. Despite this, the German
is also a major factor. Staff need more than the abi-
Ministry of Finance (BMF) is introducing flexible
lity to process data and use specialist applications
working hours for secure work when teleworking
outside of the office – they need to be able to do so
or on the go, thus proving itself to be an incredibly
securely. A lot of the data processed by the BMF
Employees
modern, family-friendly government department.
is of significant political and economic interest, and
of the BMF
BMF applications can now even be accessed on
therefore has to be kept confidential at all times.
undergo
business trips.
intensive
SINA Workstation offers precisely this level of
training in
The duties and responsibilities of the BMF are
security to the three key groups of mobile BMF
Bonn and
complex and varied – not just at the national
users:
Berlin on
level, but at the European and international levels,
how to use
too. This requires specialist knowledge, flexibility
Business travellers
the SINA
and commitment from its employees – even when
The BMF represents Germany in various financial
Workstation.
they’re not in the office. For employees to meet
committees and organisations – especially at the
these requirements even while away on business,
European and international levels. While away on
and to ensure top performance without compro-
business, BMF employees have to be able to work
mising personal projects, the BMF has invested in
securely with every mobile connection, no matter
around 1,000 SINA Workstations as a secure
where it is – whether an open Wi-Fi connection at a
platform for mobile work.
conference, UMTS at the airport or a hotspot at their
8 secuview 1/2015
National
hotel. It’s especially important that data and specia-
are always available and larger data volumes can be
list applications be accessed using SINA Worksta-
processed without difficulty.
tion, which allows users to work in a secure, virtual
environment.
No matter the user, the SINA Workstation delivers
maximum flexibility and mobility – earning it the
Mobile employees
“audit berufundfamilie” certificate and making it the
Those who have to interrupt their work throug-
perfect answer to high-level job requirements at the
hout the day – or who need one or more days to
national and international levels.
care for children or a sick relative – can now work
from home or elsewhere. In the office, mobile
All data and applications can be accessed secu-
employees connect to the ministry’s LAN via their
rely and without restriction, no matter the location
SINA Workstation. Elsewhere, they use whatever
and type of (unsecure) internet connection used.
mobile connections are available – and very often
This and the German Federal Office for Information
their own home’s Wi-Fi.
Security‘s approval (in this case for classification
level RESTRICTED) was the main reason that the
Teleworkers
BMF chose the SINA Workstation.
Teleworkers have two main places of work: their
home and the office. Using the SINA Workstation,
these employees can benefit from a secure, high-
More information:
performance LAN connection to the BMF both at
Thomas Peine
home and at work, meaning data and applications
[email protected]
The project at a glance
-1,000 SINA Workstations were installed by a single secunet employee in just two weeks.
The install server was used to conveniently implement tailored adjustments.
-Efficient logistics for the delivery, installation and roll-out of 1,000 devices.
-Comprehensive project management – the project manager was on hand to support the customer
from first contact to operation.
-Project management methods: stakeholder management, risk management, earned-value analysis
and scheduling.
-The project team consisted of fifteen people from secunet, ten from ZIVIT and five from the BMF;
the core team consisted of seven employees.
-Measures to help train users: newsletters, instructional videos, information stands outside the
canteen, three one-hour training sessions and quick-start guides.
secuview 1/2015 9
The German IT Security Act –
a Pipe Dream No More
It’s really happened: the German government’s act on
“heightening the security of IT systems” has been approved
by the Bundestag and Bundesrat
S
leeping Beauty had no chance. She didn’t
According to the explanatory note, the act on
see the prince coming. Otherwise she
heightening IT system security (the IT Security Act)
might have put on some lipstick and fixed
– which was introduced by the German Federal
her hair... but let’s get back to reality for a moment.
Cabinet on 17 December 2014 and approved by
10 secuview 1/2015
National
the Bundestag and Bundesrat on 12 June and 10
any plant or facility that‘s vital to the functioning of
July 2015, respectively – is intended to “significantly
the community. The IT Security Act doesn’t include
improve the security of IT systems in Germany”.
any further criteria. Instead, as already mentioned,
it provides for more detailed conditions by decree.
It‘s debatable whether or not this omnibus law,
According to the bill’s explanatory note, an estima-
which includes amendments to a variety of German
ted 2,000 operators of critical infrastructures will
legislation, is sufficient to wake Sleeping Beauty
soon be subject to registration.
from her slumber, in which businesses and public
bodies are regularly chided in reports on information
security incidents.
How should (potential) CRITIS operators
prepare?
The present uncertainty regarding who will soon be
After the German Federal President formally signs
subject to the act as a CRITIS operator should not
the law, a decree must be issued that clearly
tempt those in question to be awoken only with a
defines who is an operator of critical infrastructures.
kiss.
The prince is on his way... but unlike Sleeping
Beauty, we can see him coming. And we can there-
Instead, we recommend that (potential) CRITIS
fore prepare for his arrival.
operators prepare as follows:
- Determine which parts of the organisation
Who will be primarily affected by the
IT Security Act?
(processes, organisational units, products and
The operators of critical infrastructures across all
- Investigate their current security levels;
industries will need to:
- Develop a strategy for information security
- comply with a minimum level of IT security,
management to consistently maintain a minimum
- provide proof of compliance through security
level of IT security going forward;
audits,
- Select competent, qualified employees to act as
- introduce and uphold procedures for reporting
contact persons and develop a system for
significant IT security incidents to the Federal
reporting significant IT security incidents;
Office for Information Security (BSI), and
- Select a suitable service provider for independent
- operate a contact point.
security audits;
services) constitute critical infrastructures;
- Initiate pre-emptive certification according to
The act also sets out different, industry-specific
ISO/IEC 27001 in compliance with the relevant
security standards.
security requirements.
Who is a CRITIS operator?
It’s an essential prerequisite to structure and secure
According to the act, critical infrastructures (CRITIS)
organisations and processes, but that alone is not
include all plants and facilities that belong to the
enough to consistently meet the proposed heigh-
energy, IT and telecommunications, transport,
tened level of IT security for critical infrastructures.
health, water, food, finance and insurance sectors,
Appropriate measures should also be taken on the
as well as to the media and cultural centres, plus
technical level.
>>>
secuview 1/2015 11
National
Securing energy and water supplies
authorities to process confidential documents. The
Take the example of energy and water suppliers, for
BSI evaluates devices and systems for these very
whom IT plays a central role not just in the office,
application scenarios – and then approves them for
but in the control of plants using process control
processing data over the internet. The SINA Work-
engineering, too. Here, the effective technical sepa-
station and SINA Tablet were approved accordingly
ration of internal IT networks from public networks
and fulfil all of the requirements for CRITIS opera-
guarantees the integrity of process control data and
tors:
the availability of the operating IT systems for plant
- Strict separation of the production network from
control. Systems and networks are only connected
if they need to be; the control room should be strictly
the internet
- Trusted end devices under constant control of the
separated from internet services, for instance (see
control room
page 13).
•
Use of remote control functions – even by mobile
However, at the same time, it must be possible to
•
Remote maintenance by internal or external
workers
access public networks in remote control scenarios.
specialists
Operators can meet these challenges by establishing
security zones and relationships that can be cont-
From the control room, a central online manage-
rolled using a central management system. Among
ment system can be used to incorporate individual
other things, this will let them allow or block a secure
SINA devices into the production network as requi-
connection with systems in the field at any time from
red, without risking the network connecting through
the control room.
the devices to other networks or the internet.
Sealing off production networks from
the internet
Together with BSI-evaluated encoders on layer 2
When introducing security zones, all connected end
inter-network architecture SINA offers an approved
devices should naturally be taken into account, e.g.
all-in-one solution for production networks – leaving
those of internal or external maintenance technicians
you to sit back and calmly await your prince.
and layer 3 for remote control technology, the secure
when servicing the system or on stand-by. The problem is, even with a VPN connection as secure as this,
all of the vulnerabilities on the end device are linked
More information:
to the production network. Furthermore, if the end
Alexander Schlensog
device connects or has connected to the internet,
[email protected]
the separation of the production network from the
internet (the so-called air gap) is worthless.
Such requirements for (mobile) end devices are
nothing new; they’ve long been used by the
12 secuview 1/2015
National
Separated, Together,
Then Separated Again
How IT security can be effectively established
in the age of digitalisation and open networks
I
n the past, we would run a
access points are being estab-
strictly separated, autonomous
lished and integrated with smart
network to guarantee the con-
functions.
tinued availability of production
networks. This allowed us to use
At first glance, the requirements
network control systems or su-
for digitalisation and IT security
per computer systems to reliably
differ greatly; from a purely tech-
protect (waste)water, transport,
nical standpoint, purely reactive
energy and other autonomous
measures like virus scanners and
networks from dangerous inter-
web filters are no longer enough
faces with the outside world.
to
guarantee
adequate
and
reliable security. Many security
However, digitalisation has given
exports are promoting a so-called
highly secure network separation
rise to increasingly complex re-
“de-networking” for greater secu-
thanks to SINA. This strict se-
quirements for these networks.
rity. However, is this development
paration creates proactive and
For example, the management
really in step with the present
sustainable security.
of energy networks has become
requirements of digitalisation?
more complicated due to the
Is strict separation despite net-
Consequently, the aforementioned
energy revolution and subse-
working the ultimate goal and
challenges only seem contradic-
quent decentralisation of energy
solution?
tory at first glance. When effecti-
producers, micro-generators and
vely designed and implemented,
central plant operators (energy
What might seem irreconcilable
and when combined with organi-
supply companies) in the context
at first glance is certainly a techni-
sational measures, modern-day
of the smart grid. The manage-
cal challenge, but it is possible
security technologies can achieve
ment of numerous decentralised
– and even common practice in
this “de-networking” within a
and centralised plants and facili-
certain other fields. For example,
network, thereby guaranteeing
ties takes place over IP networks,
secure networks can be created
adequate security.
which leads to the merging of IT
within networks using isolation
and process networks. Informat-
techniques (the principle behind
More information:
ion is therefore exchanged across
secunet safe surfer) derived from
Torsten Redlich
networks, while new devices and
terminal server technology or
[email protected]
secuview 1/2015 13
Science
An Interview with
Dr Gabi Dreo Rodosek
The tailored protection of networks in
Industry 4.0 and critical infrastructures
is a research field in its own right
defence against advanced persistent threats (APT)
and smart attacks, as well as visualising the state of
security and identifying attackers (geolocation).
In interview:
Dr Gabi Dreo Rodosek is
Professor of Communication
Systems and Network
Security at the University of
the Armed Forces’ Institute
for Computer Engineering
in Munich and is also the
spokesperson for the cyber
defence research centre
CODE (Cyber Operations
Defence).
However, technology alone can’t guarantee security.
That’s why we also systematically research legal
frameworks, management processes, and their
effects, not forgetting users and their own security
awareness.
Alongside research, networking is one of the research centre’s key activities. In our globalised world,
cyber criminals can easily operate across borders
thanks to increased diversification and networking.
This threat can only be combatted with a network
of experts, which requires a high degree of mutual
trust. Cyber security experts from different universities, research institutes, agencies and companies all
cooperate, share information and exchange data in
Dr Dreo Rodosek, you’re the spokesperson for the
the trusted environment provided by CODE.
CODE research centre. What are the centre’s goals?
Dr Dreo Rodosek: Our aim is to conduct compre-
Cyber attacks don’t recognise national borders.
hensive research into all aspects of cyber security.
Does CODE also cooperate with international
organisations?
Our main focus is the exploration of new security
Dr Dreo Rodosek: The challenge is actually one of
technologies and approaches. At the moment,
a global nature. The research centre has therefo-
some of our research includes the detection of and
re secured a partnership with NATO’s Cooperative
14 secuview 1/2015
Science
Cyber Defence Center Of Excellence (CCDCOE). In
In light of the increased networking of economically
this context, we’ve signed a mutual agreement to
and socially important systems like industrial pro-
support each other in research. We also work clo-
duction chains (Industry 4.0) and components of
sely with ENISA, largely through Dr Helmbrecht, an
critical infrastructures, these have especially high
honorary professor at our IT Faculty*. Meanwhile, on
protection requirements. Tailored protection at a rea-
the national level, we have a number of cooperation
sonable cost – and which results in an acceptable
agreements with security agencies and commercial
businesses that work in the global cyber security
industry. I’m afraid I can’t go into any more detail
about our current projects.
How does research and teaching at the University
of the Armed Forces differ from other IT security
departments in Germany?
Dr Dreo Rodosek: Compared to cyber security
research at other universities and research centres,
we concentrate heavily on cooperation with the armed forces and related agencies and services, as
well as with companies with special security requirements. In some cases, our research is “for German
eyes only”, and doesn’t involve visiting scholars,
PhD students or undergrads from other countries.
The fact that our cooperation is so trusted and
“In our globalised world,
cyber criminals can easily
operate across borders
thanks to increased
diversification and networking. This threat can
only be combatted with a
network of experts, which
requires a high degree of
mutual trust.”
successful is evident in the partnerships we’ve been
able to establish so far.
residual risk – actually constitutes its own research
field, in which legal frameworks, management mo-
The intensity of cyber attacks is increasing exponen-
dels, technical components and user awareness
tially. What do you expect to be the biggest threat
have to be coherently and consistently linked. These
over the next few years and what measures is CODE
systems are under threat from APTs and smart
developing as a result?
attacks, for which we need to develop unique taxo-
Dr Dreo Rodosek: From a technological point of
nomies and metrics for detection and defence.
view, I’d say the growth of vulnerable mobile devices
and their heterogeneity, plus new technologies like
software-defined networking and interclouds (clouds
of clouds). With this in mind, at CODE we’re rese-
* Editor’s note: at the University of the Armed Forces in
Munich
arching anomaly-based detection methods at the
communication level, as well as associated filters
and analytics tools. In addition, traffic volumes and
bandwidth are increasing. Data analysis in these
networks presents a big data problem. In response,
we’re investigating how to use new approaches (e.g.
security analytics) to combat attacks early on in the
provider network, which will help ease the burden on
customers and users.
secuview 1/2015 15
International
EasyPASS Among the Top 3
S
imply and conveniently
in Germany to 140*, enabling
which new technologies are being
across the border: Fol-
even more travellers to cross the
used to establish a more modern
lowing the lead of the
Schengen Area’s external borders
and efficient border management
Munich,
without assistance. A similarly
system. Automated border control
Düsseldorf, Hamburg and Berlin-
high number of automated border
has a major role to play here.
Tegel airports, the Cologne-Bonn
control systems internationally
airport completed installing the
only exists in the Netherlands and
EasyPASS
the United Kingdom.
Frankfurt
control
am
Main,
automated
system,
border
implemented
* In the German installation, the
secunet easygate is supplemented
with components from the Bundesdruckerei (BDR).
by a consortium of secunet and
This development ties in perfectly
Bundesdruckerei, by the middle
with the European Commission’s
More information:
of 2015. This will bring the total
Smart Borders programme for
Frank Steffens
number of secunet easygates
higher mobility and security, under
[email protected]
And Twelve Points Go to...
T
he secunet Golden Reader
all ICAO-compliant eMRTDs like
Tool Platinum Edition (GRT)
electronic passports. The soft-
has been awarded maxi-
ware is constantly being improved
mum points from as many as 27
and adapted to meet customers’
countries! Nations including Azer-
requirements. Today, the GRT
baijan, Estonia, India and Canada
already supports all internatio-
voted for the German software,
nal security protocols, including
which is designed to read different
BAC, EAC 1.0 and 2.0 and SAC.
electronic identity documents –
Alongside domestic and foreign
thus definitively proving the global
passports, the tool can also read
popularity of secunet’s GRT.
and
verify
German
residence
permits and the new German
The secunet Golden Reader Tool
identity card, as well as foreign
Platinum Edition is the latest
electronic driving licences and
version of the extensively tested
registration certificates.
Golden Reader Tool developed
jointly by secunet and the German
16 secuview 1/2015
Federal Office for Information Se-
More information:
curity (BSI). As a result, secunet
Norbert Richartz
has successfully developed a
[email protected]
software application for reading
www.secunet.com/grtplatinum
German Expertise for a
National PKD Solution
Tamper-proof and efficient ePassport verification:
EGSP delivers a solution with HJP, Bundesdruckerei,
secunet and G&D
A
bu Dhabi-based Emirates
forms the basis of secunet’s eID
now introduced the National PKD
German Security Printing
PKI Suite.
system to examine the data ob-
LLC (EGSP) has delivered
tained from the ICAO PKD and
other sources, and to forward
the establishment of a National
Proof of authenticity and
tamper-proofing
Public Key Directory (NPKD) solu-
Electronic passports are equip-
certificate revocation lists (CRLs)
tion. The system is used at border
ped with a chip that prevents the
to
control points in the United Arab
undetected manipulation of the
systems
Emirates (UAE) to ensure the tam-
passport holder’s personal data.
systems”) at border control posts
per-proof and efficient verification
Using the Public Key Directory
throughout the country. In Sep-
of domestic and foreign electronic
of the International Civil Aviation
tember 2011, the United Arab
passports. For the implementat-
Organisation (ICAO), border cont-
Emirates became the first country
ion of the security solution “made
rol staff can verify the authenticity
in the Middle East to join the
in Germany”, EGSP – the NPKD
of passport data. To do this, they
ICAO PKD. Now, it is the first
project’s general contractor –
rely on having access to prequali-
country in the Middle East to have
was supported by its partners
fied certificates (Document Signer
implemented
HJP Consulting GmbH, Bundes-
Certificates) and other public key
solution.
druckerei GmbH, secunet Security
infrastructure (PKI) from active
Networks AG and Giesecke &
ICAO member states.
the complete infrastructure for
all
document
verification
(so-called
“inspection
a
National
PKD
More information:
Oliver Jahnke
Devrient GmbH. In particular, G&D
provided the NPKD software that
the appropriate certificates and
The UAE‘s Ministry of Interior has
[email protected]
secuview 1/2015 17
International
Neither Bulky nor Boring:
IT Baseline Protection
secunet’s three-pillar procedure makes it possible to quickly
implement a tailored IT security concept for public authorities
and companies based on IT baseline protection (IT-Grundschutz, a BSI guideline for an IT security methodology). The
methodology takes both specialised processes and standard
IT applications into account
F
or 15 years, secunet has worked according
Using their collective knowledge, secunet’s experts
to the methods of IT baseline protection. It
have developed a tailored procedure to implement
has already completed over 1,000 projects in
baseline protection that overcomes these difficulties
the field of government administration at the federal
while taking advantage of the benefits of the appro-
state level and in companies across diverse indus-
ach. The methodology stands on three pillars, which
tries. Through it all, one thing has become clear:
should be implemented in parallel and will help to
the implementation of information security based
develop a certifiable ISMS in accordance with IT
on IT baseline protection is well-suited to standard
baseline protection.
IT components, but faces the following challenges
nonetheless:
-Pillar One: secure core IT
An institution’s IT consists of core systems. These
- Combination with specialised processes
are viewed in a bottom-up approach. This concerns
- Minimal employee knowledge in IT departments
both visualised infrastructures and physical
regarding the specialised processes they monitor
clients, servers and network components, as well
and their protection requirements
as general applications like web servers or the
- No integrated operation of management systems
active directory.
and information security management systems
- The joint handling of compliance requirements and
-Pillar Two: specialised security
concepts
IT security only in exceptional cases
The institution’s specialised tasks, applications
- Later successes and high complexity through
and business processes that use secure core IT
traditional processes in the baseline protection
systems are viewed in the form of specialist
waterfall model
security concepts (top-down approach).
(ISMS)
18 secuview 1/2015
International
News in Brief
Dr Rainer Baumgart
Appointed to the
ENISA Advisory
Board Again
T
he European Union Agency for
Network and Information Security (ENISA) has announced
the members of its Permanent Stakeholders’ Group (PSG). With a newly
reduced membership of 23, the PSG
is composed of representatives from
industry, business, consumer organisa-
- Pillar Three: ISMS
tions and national regulatory authorities.
An often underestimated part of information
The board advises the Executive Direc-
security is the very core of most standards, and
tor of ENISA on developing ENISA’s ac-
thus of IT baseline protection itself: the ISMS.
tivities, communicating with the relevant
stakeholders, and identifying all issues
Fast results, eliminating the
disadvantages of IT baseline protection
and integrating specialised processes
related to IT security.
The standard 100-2 of the Federal Office for Infor-
member of the PSG from 2010 to 2012,
mation Security doesn’t state that the individual
after which Volker Schneider represented
steps for creating a security concept should be taken
secunet at ENISA. In March, secunet’s
one after the other. secunet’s methodology involves
CEO was once again appointed to the
simultaneously starting multiple steps and pursuing
PSG. His current membership will expire
the three pillars in parallel. This makes it possible
on 1 September 2017.
Dr Rainer Baumgart was previously a
to quickly and efficiently achieve results and
integrate the ISMS into other, existing management
systems.
More information:
René Seydel
[email protected]
secuview 1/2015 19
Technologies & Solutions
SINA Receives the Highest
International Approvals
secunet is the only German manufacturer of IPsec solutions
for the NATO SECRET security classification
A
t the beginning of the year, NATO approved
2014. Previously, the Council of the European Union
the SINA L3 Box H, SINA Workstation H
approved a variety of other encryption devices in
and SINA Terminal H cryptographic compo-
the SINA range for the secure transfer of information
nents for the NATO SECRET security classification.
on public networks in the EU.
This means that all NATO member states, as well as
the entire NATO organisation and its units worldwide,
This makes secunet the only manufacturer that
are permitted to use these SINA products for NATO
offers IP-based cryptographic solutions for all EU
SECRET-classified communications.
security classifications. In addition, secunet is the
only German manufacturer to meet NATO’s requi-
At the European level, the SINA L3 Box S (software
rements for IPsec solutions for the NATO SECRET
versions 2.2 and 3.7), the SINA L2 Box S (software
high security classification.
versions 3.2 and 3.3), and the SINA Workstation S
(version 3.1.2) were approved for the RESTREINT
UE (EU RESTRICTED) classification in June of this
More information:
year. The SINA L3 Box H was approved for the
Merlin Gräwer
SECRET UE (EU SECRET) classification in August
[email protected]
20 secuview 1/2015
AREVA PRoVidEs
solutions.
sAfE And sEcuRE.
For AREVA as leading nuclear supplier, safety and security
are top priorities – also for IT. Customers of various industries
are relying on our know-how today.
www.areva.de
Technologies & Solutions
SINA Makes Life Easier
SINA Workflow now creates a legally compliant, digital audit
trail without media discontinuity
Workflow
... was jointly developed by the BSI and secunet. For the
while being simultaneously connected to the central
first time, the advantages of legally compliant, IT-based
registry via another session. This means that content
work have been applied to digital classified documents.
and classified administrative data (access rights for a
SINA Workflow guarantees the secure, continuous and
document, metadata, CI classifications, etc.) can be
legally compliant implementation of individual business
recorded and collected directly at the workstation. SINA
processes involving classified information (CI) and
Workflow also allows users to cooperate on classified
other sensitive documents.
documents and collaborative administrative processes
like preliminary work and co-signature processes.
Users work with classified documents in an integrated
network in a special SINA Workstation workflow session,
22 secuview 1/2015
Technologies & Solutions
SINA Workflow makes work
processes...
... more convenient
While Mr Smith sets off to the central registry to
receive a hard copy of a SECRET-classified document, Ms Green can accept, read and process a
News in Brief
Points for
German
IT Security
classified document at her SINA Workflow workstation. All of her amendments and other activities
will be automatically recorded in the background
and can therefore be traced. With Mr Smith’s paper
document, a CI administrator has to record all of his
amendments by hand.
... more direct
CeBIT 2015
D
ata security was a key topic at
this year’s CeBIT in March. In
the first few days of the event,
secunet’s stand once again attrac-
Let’s assume that Ms Green works at a national
ted a number of visitors. North-Rhine
government agency and has to distribute classi-
Westphalia’s prime minister, Hannelore
fied documents to the associated state authorities.
Kraft, congratulated the company on a
She can do this using SINA Workflow without CI
successful end to 2014 and expres-
couriers, provided that the state authorities each
sed her pride that NRW’s highly secure
have a workstation from Ms Green’s SINA Workflow
cryptographic solutions are competitive
domain. Classified documents can then also be
both in Germany and abroad.
approved by a recipient via SINA Workflow. Users
can receive the document, export it securely to a
German Minister of the Interior Thomas
data storage device and edit it further on their own
de Maizière talked to secunet CEO Dr
system, as necessary.
Rainer Baumgart about the new hardware versions of the highly secure SINA
... faster
Tablet S – which has been approved by
It’s possible to access the central registry and
the German Federal Office for Informati-
classified information 24/7, anywhere in the world. In
on Security (BSI). The tablet was added
practice, secure document distribution on a “need-
to the company’s SINA product portfolio
to-know” basis, a transparent audit trail, and features
last year and is the only BSI-approved
for the fast and flexible management of user access
tablet workstation that guarantees
rights mean SINA Workflow is a major time-saver at
ultra-mobile information security.
a considerably lower cost.
State Secretary Brigitte Zypries (German Federal Ministry of Economics and
More information:
Technology) is committed to promoting
Stefan Reuter
Germany as a global technology hub
[email protected]
and visited secunet’s stand to get up
to speed with the latest developments
in IT security, such as protecting critical
infrastructures.
secuview 1/2015 23
Technologies & Solutions
Security by Design:
Protecting Connected
Vehicles
For OEMs and suppliers, IT security in connected vehicles
is a major challenge. What solutions are there? And, most
importantly, when does what solution make sense?
Y
ou’re sitting in the car and want to quickly
phicfunction or security module adequately protect
dictate a text message via voice control.
against external attack? The answer is obvious: no!
And so you don’t have to search for one
A secure system cannot be assured using individu-
at your destination, you use the internet to find an
al security functions, technologies or cryptographic
empty parking space before you arrive. Convenient,
processes, and even existing security specifications
huh? But what about security for all the IT-based
can – if implemented by those lacking a sound un-
interfaces needed? What if, for instance, an attack
derstanding – be misinterpreted and miss their mark.
is launched over the Wi-Fi connection, leading to an
In addition, vulnerabilities often arise from inadver-
error message in the car?
tent errors when implementing IT security measures.
The automotive industry is grappling with these
questions more and more every day – because it’s
Three core elements to protecting IT
infrastructures in vehicles
no small task to develop and operate robust IT infra-
Only a methodical approach can effectively protect
structure that can protect modern luxury vehicles
vehicles against attacks on their IT infrastructure.
from external attacks. Indeed, even specialists like
Essentially, three methods have been shown to be
Microsoft, Apple and Co. face huge challenges when
effective, especially when used together:
it comes to the various possible threat scenarios.
- An open analysis of the system’s requirements,
Cryptography provides the mathematical solutions
with particular emphasis on data protection and
used by these companies, but can a single cryptogra-
data security. Data protection is predominantly
24 secuview 1/2015
regulated by the German Data Protection Act
testing. Instead, attacks are simulated outside the
(Bundesdatenschutzgesetz, BDSG), which ens-
specifications for normal operation.
hrines data economy (who will have access to what
data and why) in law. In addition, data security
Each of these methods offers specific advantages.
relates to all relevant data in the control unit,
However, while they can be applied individually,
including the operating system and any encryption
only a combination of all three provides maximum
keys or processes used, for instance.
security and dramatically reduces error. That’s why
secunet offers OEMs and suppliers competent and
- The implementation of a secure software
reliable support in these three areas – and has done
development life cycle (SecSDLC).
for nearly 20 years.
At the very least, these kinds of secure software
development processes should be established for
More information:
critical systems. This requires more than a set of
Harry Knechtel
guidelines for developers; secure software develop-
[email protected]
ment is associated with organisational, technical
and administrative measures.
- The verification and protection of systems using
penetration tests. This isn’t about functional
secuview 1/2015 25
Technologies & Solutions
Where App Dangers Lurk
Critical data can be lost quicker than you’d think. Even serious
app developers shouldn’t be trusted blindly. This is the only
way to stop hackers in their tracks
D
ata has to be protected – and that natu-
And with that, your data is gone. The hacker is
rally also applies to the data collected by
happy, the app provider is innocent and you’re left
apps. But is a news app worth protecting
with egg on your face.
when you’re not providing any critical information?
A well-known provider doesn’t think so and has left
The problem is, websites are often displayed in apps
the data stream unencrypted between the app and
without the address bar, which you could otherwise
its servers… but what happens when an attacker
use to check the site URL and SSL encryption. It’s
manipulates the data?!
therefore very easy for hackers to use unencrypted
apps to display a perfect copy of your login page
Fake news, which can’t be distinguished from real
and read any and all data you enter. We trust apps
news by appearance alone, is mixed in with legitimate
blindly. Or have you genuinely questioned whether or
news reports. If you want to display the full text, you
not your data is encrypted during transfer?
can access the relevant content by simply clicking
through the app. For example, when an article re-
The solution? With a bit of technical know-how, you
ports that there has been an attack on your email
can see for yourself whether or not data traffic is
provider, an embedded link could – very conveniently
encrypted. Simply open the relevant login page in a
– lead you straight to the login page for your email
‘real’ browser outside the app, where you can then
provider so you can change your password.
see the address bar. Alternatively, you could write to
the providers of every app you use and find out their
answers. Not very convenient, we know – but you
must be aware of the dangers of apps. It’s is the only
way to ensure your data doesn’t inadvertently make
it into the wrong hands.
More information:
Markus Linnemann
[email protected]
26 secuview 1/2015
Dates
September to December
15 – 17 Sept 2015
»
NIAS – Cyber Security Symposium / Mons, Belgium
6 Oct 2015
»
Zukunft. Automation. (theme: energy/water/waste disposal) / Potsdam
6 – 8 Oct 2015
»
it-sa / Nuremburg
14 – 16 Oct 2015
»
KiT 2015 – 8th International Scientific Conference / Vysoké Tatry, Slovakia
20 – 22 Oct 2015
»
AFCEA TechNet Europe / Berlin
4 Nov 2015
»
Critical Infrastructures Information Security Symposium / Düsseldorf
10 – 11 Nov 2015
»
ISSE 2015 / Berlin
13 Nov 2015
»
IT Security on Board workshop / Munich
17 – 18 Nov 2015
»
Berlin Security Conference / Berlin
1 – 2 Dec 2015
»
4th VKU IT Conference / Nuremburg
7 Dec 2015
»
Police Days 2015 / Hamburg
Would you like to arrange
an appointment with us?
Just send an e-mail to
[email protected]
Critical Infrastructures Information Security Symposium
The IT Security Act has been approved by the Bundestag and Bundesrat. As an operator of critical infrastructures, the
government now needs your input. But what minimum security requirements do you need? How can you implement them
effectively and successfully? And how do others do it? We’ll be answering these questions and more at the Critical
Infrastructures Information Security Symposium in Düsseldorf on 4 November 2015.
We invite you to share your experiences with other participants in similar situations and benefit from topical and informative
presentations by the BSI, RWE and Emscher Lippe Energie.
You can reserve a spot at the event free of charge by emailing [email protected].
Subscribe
to secuview
Would you like to receive secuview on a regular basis, free of charge?
Please choose between the print and electronic versions and subscribe at
https://www.secunet.com/en/secuview.
There you can also change your preference or unsubscribe.
Imprint
Editor:
secunet Security Networks AG
Kronprinzenstraße 30
45128 Essen, Germany
www.secunet.com
Print
compensated
Id-No. 1547962
www.bvdm-online.de
Press Law Representative: Christine Skropke, [email protected]
Chief Editor, Head of Design and Content:
Claudia Roers, [email protected]
Design: Agentur für dynamisches Marketing, www.knoerrich-marketing.de
Copyright: © secunet Security Networks AG. Alle Rechte vorbehalten. All rights reserved. All
content herein is protected under copyright law. No part of this magazine may be reproduced
or otherwise used without the prior written consent of secunet Security Networks AG.
Illustrations: S. 2, 6, 13, 17, 25: fotolia.com; S. 2, 4, 5: G&D; S. 16, 26: shutterstock.com;
Others: secunet.
secuview 1/2015 27
Check eIDs
in the blink of an eye.
Not everyone crossing your border are who they pretend to be.
That’s why secunet developed the eID PKI Suite: It checks the
integrity of eID documents and the traveller’s identities in the blink
of an eye. Choose between individual software modules for easy
integration into your existing setup, and the complete turn-key
solution. Just as you need it.
IT security made in Germany.
www.secunet.com/en/eidpki
IT security partner of the Federal Republic of Germany