Skip to main content

Approach to Sector-Specific Cybersecurity Schemes: Key Elements and Security Problem Definition

  • Conference paper
  • First Online:
Multimedia Communications, Services and Security (MCSS 2022)

Abstract

This paper documents the approach to define cybersecurity certification schemes as candidate methods for sector cybersecurity product certification as part of the EU Cybersecurity Certification Framework being prepared by ENISA. Indeed, it is a very recent area of research within the EU landscape. Our work was undertaken within H2020 ECHO project (www.echonetwork.eu) and it is reported in detail in its deliverables. This document is completing the research reported in our previous publication, which had complete references to the existing state of the art about the certification topic in EU. Our work started with the identification of the sector-specific needs to be addressed for specific critical sectors. The mandatory Key Elements of a certification scheme, as described in the EU Cybersecurity Act, have been customized and the sector specific analysis allowed to define a Security Problem Definition baseline to be used to quickly draft a Protection Profile of an asset category of the considered sectors. Security needs have been identified using also the sectoral risk assessment guidelines provided by ENISA for certification purposes. It has also been developed an inter sector risk scenario to highlight the most important security needs to mitigate cross-sector security failures. Finally, Cyber Range technologies have been leveraged for the Conformity Assessment activities of two Maritime and a Healthcare product prototypes, for which the substantial assurance level certification has been simulated for the sake of validation of our approach.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Proposal for a Regulation of the European Parliament and of the Council on ENISA (the EU Cybersecurity Agency) and repealing Regulation (EU) 526/2013, and on Information and Communication Technology cybersecurity certification (‘Cybersecurity Act’), the European Parliament and the Council. Accessed 13 Sept 2017

    Google Scholar 

  2. Cybersecurity Certification: EUCC Candidate Scheme. European Union Agency for Cybersecurity (ENISA). Accessed 02 July 2020

    Google Scholar 

  3. Hovhannisyan, K., Bogacki, P., Colabuono, C.A., Lofù, D., Marabello, M.V., Maxwell, B.E.: Towards a healthcare cybersecurity certification scheme. In: Cyber Security (2021)

    Google Scholar 

  4. Methodology for Sectoral Cybersecurity Assessments. European Union Agency for Cybersecurity (ENISA). Accessed 13 Sept 2021

    Google Scholar 

  5. Common Criteria for Information Technology Security Evaluation: Part 1 - Introduction and general model

    Google Scholar 

  6. Common Criteria for Information Technology Security Evaluation: Part 2 - Security functional components

    Google Scholar 

  7. Common Criteria for Information Technology Security Evaluation: Part 3 - Security assurance components

    Google Scholar 

  8. D2.9 ECHO Cybersecurity Certification Scheme. European Network of Cybersecurity Centres and Competence Hub for Innovation and Operations (2021)

    Google Scholar 

  9. D2.14 Update - ECHO Cybersecurity Certification Scheme. European Network of Cybersecurity Centres and Competence Hub for Innovation and Operations (2022)

    Google Scholar 

  10. ISO/IEC 27002 - Information technology—Security techniques—Code of practice for information security controls

    Google Scholar 

  11. Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC

    Google Scholar 

  12. ISA-62443-3-3 Security for Industrial automation and Control systems Part 3–3: System security requirements and security levels

    Google Scholar 

  13. ISO/IEC 27701:2019 Security techniques—Extension to ISO/IEC 27001 and ISO/IEC 27002 for privacy information management—Requirements and guidelines

    Google Scholar 

  14. The Directive on security of network and information systems (NIS Directive), the European Parliament and the Council. Accessed 06 July 2016

    Google Scholar 

  15. https://it.wikipedia.org/wiki/Technology_Readiness_Level

  16. The Guidelines on Cyber Security onboard Ships. IMO

    Google Scholar 

  17. Good practices for the maritime sector. ENISA

    Google Scholar 

  18. Procurement guidelines for Cybersecurity in Hospitals. ENISA

    Google Scholar 

  19. Smart Hospitals - Security and Resilience for Smart Health Service and Infrastructures. ENISA

    Google Scholar 

  20. Regulation (EU) 2020/561 for Medical Devices Requirements (MDR)

    Google Scholar 

  21. ISO 27799:2008 Health informatics, information security management in health using ISO/IEC 27002

    Google Scholar 

  22. Medical Device Directive (MDD)

    Google Scholar 

  23. DICOM (Digital Imaging and COmmunications in Medicine)

    Google Scholar 

  24. ISO/IEC 27019:2013 Information technology—Security techniques—Information security management guidelines based on ISO/IEC 27002 for process control systems specific to the energy utility industry

    Google Scholar 

  25. Port cybersecurity. ENISA

    Google Scholar 

  26. Appropriate security measures for Smart Grids. ENISA

    Google Scholar 

  27. Smart Grid Threat Landscape and Good Practice Guide. ENISA

    Google Scholar 

  28. NIST SP 800–82 Guide to Industrial Control Systems Security

    Google Scholar 

  29. ISO/IEC TR 27019 Information security for process control in the energy industry

    Google Scholar 

  30. IACS Recommendation on cyber resilience (Rec. 166)

    Google Scholar 

  31. SOTA - STATE OF THE ART SYLLABUS Overview of existing Cybersecurity standards and certification schemes

    Google Scholar 

  32. Security Measures for Operators of Essential Services

    Google Scholar 

  33. Mapping of OES Security Requirements to Specific Sectors. NIS Cooperation Group

    Google Scholar 

  34. Guidelines on notification of Operators of Essential Services incidents (formats and procedures). NIS Cooperation Group

    Google Scholar 

  35. Guidelines on notification of Digital Service Providers incidents (formats and procedures). NIS Cooperation Group

    Google Scholar 

  36. Recommendations for the Implementation of the Industrial Automation & Control Systems Components Cybersecurity Certification Scheme (ICCS)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Consuelo Colabuono .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Colabuono, C. et al. (2022). Approach to Sector-Specific Cybersecurity Schemes: Key Elements and Security Problem Definition. In: Dziech, A., Mees, W., Niemiec, M. (eds) Multimedia Communications, Services and Security. MCSS 2022. Communications in Computer and Information Science, vol 1689. Springer, Cham. https://doi.org/10.1007/978-3-031-20215-5_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-20215-5_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-20214-8

  • Online ISBN: 978-3-031-20215-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics