Documents considered by the Committee on 6 May 2009 - European Scrutiny Committee Contents


2   Protecting information networks from cyber attacks

(30528)

8375/09

+ADDs 1-4

COM(09) 149

Commission Communication: Protecting Europe from large scale cyber-attacks and disruptions: enhancing preparedness, security and resilience

Legal base
Document originated30 March 2009
Deposited in Parliament7 April 2009
DepartmentBusiness, Enterprise and Regulatory Reform
Basis of considerationEM of 28 April 2009
Previous Committee ReportNone; but see (27570) 10248/06: HC 34-xxxv (2005-06), chapter 8 (12 July 2006). Also see (29300)

16840/07: HC 16-xxiii (2007-08), chapter 12 (4 June 2008); and (27466) 8841/06: HC 41-xxi (2006-07), chapter 15 (9 May 2007)

To be discussed in CouncilTo be determined
Committee's assessmentPolitically important
Committee's decisionNot cleared; further information requested

Background

2.1  As the Commission notes, Information and Communication Technologies (ICTs) are increasingly intertwined in our daily activities, with some of these ICT systems, services, networks and infrastructures (in short, ICT infrastructures) forming a vital part of European economy and society, either providing essential goods and services or constituting the underpinning platform of other critical infrastructures, and being "typically regarded as critical information infrastructures (CIIs) as their disruption or destruction would have a serious impact on vital societal functions." The Commission gives as recent examples the large-scale cyber-attacks targeting Estonia in 2007 and the breaks of transcontinental cables in 2008.

2.2  The Commission recalls its "strategy for a secure information society", which was adopted in 2006,[4] where it says "ownership and implementation by stakeholders appears insufficient".

2.3  The Commission refers to the place in this strategy of the European Network and Information Security Agency (ENISA), established in 2004 to "contribute to the goals of ensuring a high and effective level of NIS within the Community and developing a culture of NIS for the benefit of EU citizens, consumers, enterprises and administrations" — a mandate extended "à l'identique" until March 2012, but subject to "further discussion on the future of ENISA and on the general direction of the European efforts towards an increased network and information security", as a result of which the Commission launched last November an online public consultation,[5] the analysis of which will be made available shortly.

2.4  Other elements in the Policy Context to which the Commission refers are:

1.  the European Programme for Critical Infrastructure Protection (EPCIP)[6] and the Directive[7] on the identification and designation of European Critical Infrastructures,[8] which identifies the ICT sector as a future priority sector, and the Critical Infrastructure Warning Information Network (CIWIN);[9]

2.  the Commission proposal to reform the Regulatory Framework for electronic communications networks and services,[10] and particularly the provisions to strengthen operators' obligations to ensure that appropriate measures are taken to meet identified risks, guarantee the continuity of supply of services and notify security breaches,[11] which the Commission says is "conducive to the general objective of enhancing the security and resilience of CIIs", and which the European Parliament and the Council "broadly support";

3.  complementarity with existing and prospective measures in the area of police and judicial cooperation to prevent, fight and prosecute criminal and terrorist activities targeting ICT infrastructures, as envisaged inter alia by the Council Framework Decision on attacks against information systems[12] and its planned update;[13]

4.  NATO activities on common policy on cyber defence, i.e. the Cyber Defence Management Authority and the Cooperative Cyber Defence Centre of Excellence;

5.   the G8 principles on CIIP15;[14]

6.  the UN General Assembly Resolution 58/199 Creation of a global culture of cybersecurity; and

7.  the protection of critical information infrastructures and the recent OECD Recommendation on the Protection of Critical Information Infrastructures.

The Commission Communication

2.5  The Commission says that, within this policy context, the Communication "focuses on prevention, preparedness and awareness and defines a plan of immediate actions to strengthen the security and resilience of CIIs."

WHAT IS AT STAKE?

2.6  The ICT sector is vital for both business and the public sector; cyber-attacks have risen to an unprecedented level of sophistication; the high dependence on CIIs, their cross-border interconnectedness and interdependencies with other infrastructures, as well as the vulnerabilities and threats they face "raise the need to address their security and resilience in a systemic perspective as the frontline of defence against failures and attacks." To ensure that ICT infrastructures are used to their maximum extent, all stakeholders must have a high level of confidence and trust in them; this depends on ensuring their high level of security and resilience, which the Commission says is "a shared responsibility: no single stakeholder has the means to ensure the security and resilience of all ICT infrastructures and to carry all the related responsibilities", which in turn "calls for a risk management approach and culture, able to respond to known threats and anticipate unknown future ones, without over-reacting and stifling the emergence of innovative services and applications."

2.7  A "purely national approach" runs the risk of "fragmentation and inefficiency", which in turn means that "a low level of security and resilience of CIIs in a country has the potential to increase vulnerabilities and risks in other ones". So, "a European effort is needed". But this poses "peculiar governance challenges", due to the fact while "Member States remain ultimately responsible for defining CII-related policies", their implementation depends on the involvement of the private sector, which owns or controls a large number of CIIs. But, says the Commission (though without explaining why private entities would have any less of an interest than public ones), "the markets do not always provide sufficient incentives for the private sector to invest in the protection of CIIs at the level that governments normally demand". At national level, public-private partnerships (PPPs) have emerged. But:

"despite the consensus that PPPs would also be desirable on a European level, European PPPs have not materialised so far. A Europe-wide multi-stakeholder governance framework, which may include an enhanced role of ENISA, could foster the involvement of the private sector in the definition of strategic public policy objectives as well as operational priorities and measures. This framework would bridge the gap between national policy-making and operational reality on the ground."

2.8  There is also limited European early warning and incident response capability. Governments "have the ultimate responsibility to ensure the security and well-being of citizens". But the processes for monitoring and reporting network security incidents differ significantly across Member States, with under-developed cooperation and information-sharing between them and EU-wide "cyber-security exercises … still in an embryonic state". Mutual aid is essential to a proper response to large-scale threats and attacks on CIIs. A strong European early warning and incident response capability has to rely on well-functioning National/Governmental Computer Emergency Response Teams (CERTs), with a common baseline in terms of capabilities and them acting "as national catalysers of stakeholders' interests and capacity for public policy activities" and engaging "in effective cross-border cooperation and information exchange, possibly leveraging existing organisations such as the European Governmental CERTs Group (EGC)[15]".

2.9  At the international level, the Internet generates a "divergence of views on the criticality of the elements making up the Internet [which] partly explains the diversity of governmental positions expressed in international fora and the often contradicting perceptions of the importance of this matter". Nonetheless, as "a global and highly distributed network of networks, with control centres not necessarily following national boundaries", it calls for:

"a specific, targeted approach in order to ensure its resilience and stability, based on two converging measures. First, achieving a common consensus on the European priorities for the resilience and stability of the Internet, in terms of public policy and of operational deployment. Secondly, engaging the global community to develop a set of principles, reflecting European core values, for Internet resilience and stability, in the framework of our strategic dialogue and cooperation with third countries and international organisations."

THE WAY FORWARD: TOWARDS MORE EU COORDINATION AND COOPERATION

2.10  The Commission says "a multi-stakeholder, multi-level approach is essential, taking place at the European level while fully respecting and complementing national responsibilities." This would require strengthening the existing instruments for cooperation, including ENISA, and, if necessary, creating new tools.

2.11  A thorough understanding of the environment and constraints is also necessary, e.g, the distributed nature of the Internet, "where edge nodes can be used as vectors of attack, e.g. botnets,[16]" is a both concern but also a key component of stability and resilience that can help a faster recovery than would normally be the case with overformalised, top-down procedures — "this calls for a cautious, case-by-case analysis of public policies and operational procedures to put in place."

2.12   The time horizon is also important — "there is a clear need to act now and put rapidly in place the necessary elements to build a framework that will enable us to respond to current challenges and that will feed into the future strategy for network and information security."

2.13   Five pillars are proposed to tackle these challenges:

1.  Preparedness and prevention: to ensure preparedness at all levels;

2.  Detection and response: to provide adequate early warning mechanisms;

3.  Mitigation and recovery: to reinforce EU defence mechanisms for CII;

4.  International cooperation: to promote EU priorities internationally;

5.  Criteria for the ICT sector: to support the implementation of the Directive on the Identification and Designation of European Critical Infrastructures.[17]

THE ACTION PLAN

2.14  The Commission then proposes, under these headings, ten actions, each with a target date for completion.

(i)  Baseline of capabilities and services for pan-European cooperation. Target: end of 2010 for agreeing on minimum standards; end of 2011 for establishing well functioning National/Governmental Computer Emergency Response Teams (CERTS) in all Member States

(ii)  European Public Private Partnership for Resilience (EP3R). Target: end of 2009 for a roadmap and plan for EP3R; mid of 2010 for establishing EP3R; end of 2010 for EP3R to produce its first results.

(iii)  European Forum for information sharing between Member States. Target: end of 2009 for launching the Forum; end of 2010 for delivering the first results.

(iv)  European Information Sharing and Alert System (EISAS). Target: end of 2010 for completing the prototyping projects; end of 2010 for the roadmap towards a European- system.

(v)  National contingency planning and exercises, with ENISA "to support the exchange of good practices among Member States". Target: end of 2010 for running at least one national exercise in every Member State.

(vi)  Pan-European exercises on large-scale network security incidents, with Commission financial support: Target: end of 2010 for the design and run of the first pan-European exercise; end of 2010 for pan-European participation in international exercises.

(vii)  Reinforced cooperation between National/Governmental CERTs: Member States invited to strengthen the cooperation between National/Governmental CERTs, with an active stimulus and support role for ENISA. Target: end of 2010 for doubling the number of national bodies participating in ECG; end of 2010 for ENISA to develop reference materials to support pan-European cooperation.

(viii)  Internet resilience and stability. The Commission will "drive a Europe-wide debate, involving all relevant public and private stakeholders, to define EU priorities for the long term resilience and stability of the Internet". Target: end of 2010 for EU priorities on critical Internet components and issues.

(ix)  Principles and guidelines for Internet resilience and stability (European level). The Commission will work with Member States to define guidelines for the resilience and stability of the Internet, focusing inter alia on regional remedial actions, mutual assistance agreements, coordinated recovery and continuity strategies, geographical distribution of critical Internet resources, technological safeguards in the architecture and protocols of the Internet, replication and diversity of services and data. Target: end of 2009 for a European roadmap towards principles and guidelines for Internet resilience and stability; end of 2010 for agreeing on the first draft of such principles and guidelines.

(x)  Principles and guidelines for Internet resilience and stability (global level). The Commission will work with Member States on a roadmap to promote principles and guidelines at the global level. Strategic cooperation with third countries will be developed, notably in Information Society dialogues, as a vehicle to build global consensus. Target: beginning of 2010 for a roadmap for international cooperation on principles and guidelines for security and resilience; end of 2010 for the first draft of internationally recognised principles and guidelines to be discussed with third countries and in relevant fora, including the Internet Governance Forum.

(xi)  Global exercises on recovery and mitigation of large scale Internet incidents. The Commission invites European stakeholders to reflect on a practical way to extend at the global level the exercises being conducted under the mitigation and recovery pillar, building upon regional contingency plans and capabilities. Target: end of 2010 for the Commission to propose a framework and a roadmap to support the European involvement and participation in global exercises on recovery and mitigation of large-scale Internet incidents.

(xii)  ICT sector specific criteria. Continue to develop, in cooperation with Member States and all relevant stakeholders, the criteria for identifying European critical infrastructures for the ICT sector. Target: first half of 2010 for the Commission to define the criteria for the European critical infrastructures for the ICT sector.

2.15  The Commission says that the success of these actions depends on building upon and benefiting public and private activities and on the commitment and full participation of Member States, European Institutions and stakeholders. To this end, a Ministerial Conference will take place on 27-28 April 2009 to discuss the proposed initiatives with Member States and to mark their commitment to the debate on a modernised and reinforced NIS policy in Europe; and the Commission will initiate a stock-taking exercise toward the end of 2010, in order to evaluate the first phase of actions and to identify and propose further measures, as appropriate.

The Government's view

2.16  In his Explanatory Memorandum of 28 April, the Minister for Communications, Technology and Broadcasting at the Department for Business, Enterprise and Regulatory Reform (Lord Carter of Barnes) notes that the elements of this Action Plan are "aspirational and not binding". He says that the UK has been involved in helping develop critical information infrastructure protection policy at a European level for some time, and supports the drive from the Commission to achieve higher levels of resilient information infrastructure. He also approves of the indications of the importance that the Commission attaches to working with industry and taking a risk-based approach to work in this area — "an approach which HMG strongly supports and promotes as the most effective way to enhance resilience and increase CII".

2.17  The UK, the Minister says, "is generally ahead of the game in addressing critical information infrastructure protection and resilience to ensure availability of communications, and the overarching objectives of this Communication are part of core infrastructure resilience policy." He says that this has been achieved through — amongst other things — "continued close working with industry and across Government, through the Electronic Communications Resilience and Response Group (EC-RRG), security advice given by the Centre for the Protection of National Infrastructure (CPNI), as well as resilience requirements on key telecoms providers under the Civil Contingencies Act 2003". In addition, "BERR and OGDs continue to work with industry to ensure that security and preparedness measures such as emergency response and protective security plans are in place; these are tested on a regular basis [and] the Cabinet Office has been leading work on a Cyber Security Strategy since September 2008."

2.18  All this said, the Minister does have "some concerns" about the Communication:

"in some cases the evidence base provided is relatively weak, and on occasion supports analysis which could be considered alarmist. Nevertheless, this should not detract from the fact that further work needs to be done at individual Member State level to enhance CII as well as further useful coordinating work at EU level;

"HMG believes the current timetable to be highly aspirational, and unlikely to be achievable across the EU — especially where emergency response exercises are concerned (these can take up to a year to organise). Experience has demonstrated that this is an area of work where preparedness needs to be built up in individual Member States before becoming effective at an EU level;

"The Communication seems to have adopted a relatively narrow view with regard to the resilience and stability solely of internet components — by apparently aiming to identify these globally. We are waiting to see how the Commission is aiming to achieve this without any kind of EU-wide consensus in the arena of Internet security. There is also no indication of where such a debate would take place."

2.19  Finally, the Minister says that he believes that the Commission's long-term strategy is "to develop these areas of work into legal minimum levels and standards of resilience, preparedness and security", but "there is no timetable or detail set out for this yet."

Conclusion

2.20  We find it odd that the Minister makes no mention of the April 2009 Ministerial conference or of the 2010 stock-take, at which point the Commission makes it clear that it expects to propose further measures. In the first instance, we should like the Minister to write to us with his assessment of the conference and its outcomes.

2.21  We should also like the Minister to elaborate more fully on those aspects of the Communication (which he sums up very briefly in his Explanatory Memorandum) that he regards as based on relatively weak evidence or alarmist analysis. As he says, preparedness undoubtedly needs to be built up in individual Member States before becoming effective at an EU level. But the case for developing a capacity for Member States to work together effectively seems to be self-evident. No doubt the Commission's timetable is unrealistic; time will tell. But, in saying that he "supports the drive from the Commission to achieve higher levels of resilient information infrastructure", the Minister does not make clear whether his concern is over only the level of ambition of the Commission's timetable, or over the Commission's proposals for a greater role for the Commission in general and the European Network and Information Security Agency (ENISA). Nor, in saying what he thinks the Commission's long-term strategy is, does he say what he thinks about it. We should like him to explain his views more fully about the best way ahead.

2.22  We also find it odd that the Minister makes no mention of ENISA at all, given that it was the subject of prolonged discussion with his department in 2007-08.[18] That discussion was about the proposal to which the Commission itself refers, i.e., the extension of its mandate until 2012. This was contentious because the independent evaluation in 2006 required by its statutes had revealed an unhappy state of affairs, at the heart of which was the Commission's rejection of the review's most important finding — that the decision, left to the Greek government during its then-Presidency, to locate ENISA on Crete, should be revisited. The Government of Greece maintained that the case against Crete was not soundly based and, at that time, was said to be "working hard to address the most obvious problems". A year on, the Commission is now proposing an expanded role for it in developing a pan-European framework without, so far as we are aware, any indication that the agency is any more effective at doing its present job than it was when the critical review was produced. We should like the Minister to bring us up to date on what has been done and to let us know if he considers that ENISA is up to the task that the Commission has in mind for it.

2.23  The Minister also suggests that he is unhappy with the Commission's thoughts on this aspect of Internet governance (c.f. paragraph 0.09 above), which he says are "without any kind of EU-wide consensus in the arena of Internet security". In 2006-2007, we considered an earlier Commission Communication on Internet governance, which sought to assess the results of the second World Summit on the Information Society (which was held in Tunis in November 2005). [19] It was designed to reach conclusions on the two unresolved issues —financial mechanisms and Internet governance. The latter was resolved via the creation of an Internet Governance Forum (IGF) as a new forum for multi-stakeholder policy dialogue. Last November, the Minister's colleague, Baroness Vadera, told us that the UK, the EU and the US were all of one mind on "ensuring this multi-stakeholder process is a success", and that security was likely to be one of the main issues to be addressed at the third IGF Forum, to be held in Hyderabad on 1-5 December 2008 — which she described as "global dialogue on Internet governance and the future direction of the IGF at this crucial mid-way point in its 5-year life span". There is, however, no mention of the IGF by either the Commission or the Minister. We should therefore be grateful if the Minister would explain more fully what he finds wrong with the Commission approach, and why there is no mention of what would otherwise seem to be a key component in developing an effective international response to the threat in question.

2.24  In the meantime, we shall retain the document under scrutiny.





4   Which the Committee reported to the House on 18 July 2006: see (27570) 10248/06: HC34-xxxv (2005-06), chapter 8 (12 July 2006). Back

5   http://ec.europa.eu/information_society/newsroom/cf/itemlongdetail.cfm?item_id=4464  Back

6   COM(2006) 786  Back

7   2008/114/EC Back

8   http://www.consilium.europa.eu/ueDocs/cms_Data/docs/pressData/en/gena/104617.pdf  Back

9   COM(O8) 676 Back

10   COM(07) 697, COM(07) 698, COM(07) 699 Back

11   Art. 13 Framework Directive Back

12   2005/222/JHA Back

13   COM(08) 712 Back

14   http://www.usdoj.gov/criminal/cybercrime/g82004/G8_CIIP_Principles.pdf Back

15   http://ec.europa.eu/information_society/policy/nis/strategy/activities/ciip/large_scale/ Back

16   a jargon term for a collection of software robots, or bots, that run autonomously and automatically. The term is often associated with malicious software but it can also refer to the network of computers using distributed computing software. See http://en.wikipedia.org/wiki/Botnet for additional information.  Back

17   Council Directive 2008/114/EC Back

18   See headnote; HC 16-xxiii (2007-08), chapter 12 (4 June 2008). Back

19   See headnote; (27466) 8841/06: HC 41-xxi (2006-07), chapter 15 (9 May 2007). Back


 
previous page contents next page

House of Commons home page Parliament home page House of Lords home page search page enquiries index

© Parliamentary copyright 2009
Prepared 13 May 2009