City Europe
City Europe
Ares(2020)4049865 - 31/07/2020
D9.8
1
Policy Recommendation Report I1
Document Identification
Due date 31 July 2020
Submission date 31 July 2020
Revision 1.0
Dissemination
Related WP WP9 Public
Level
Lead
FORTH Lead Author Evangelos Markatos
Participant
D2.1, D3.1, D3.3, D3.4,
Contributing TDL, ARCH, UCY, Related
D3.5, D3.7, D3.9, D4.2,
Beneficiaries NTNU, UMU Deliverables D4.3, D5.1, D6.2, D10.1
1 This is the first deliverable of a series of three “Policy Recommendations” deliverables. The next two are
envisioned to be delivered in M36 and M42 respectively.
CyberSec4Europe D9.8 Policy Recommendation Report I
Abstract:
This deliverable (Policy Recommendation Report I) is the first in a sequence of three deliverables that
select policy recommendations of the CyberSec4Europe project and present them in a way that can be
easily understood and used by interested parties, and
especially by policymakers. The policy
recommendations cover a wide variety of areas ranging
from education to research and target a wide variety of
stakeholders including the European Commission,
European agencies, European organisations, and even
EUROPE NEEDS TO TAKE THE
policy makers in Member States. LEADERSHIP IN THE KEY
AREA OF PRIVACY
Deliverable D10.1
This document is issued within the CyberSec4Europe project. This project has received
funding from the European Union’s Horizon 2020 Programme under grant agreement no.
830929. This document and its content are the property of the CyberSec4Europe Consortium.
All rights relevant to this document are determined by the applicable laws. Access to this
document does not grant any right or license on the document or its contents. This document
or its contents are not to be used or treated in any manner inconsistent with the rights or
interests of the CyberSec4Europe Consortium and are not to be disclosed externally without
prior written consent from the CyberSec4Europe Partners. Each CyberSec4Europe Partner
may use this document in conformity with the CyberSec4Europe Consortium Grant
Agreement provisions and the Consortium Agreement.
The information in this document is provided as is, and no warranty is given or implied that
the information is fit for any particular purpose. Any use thereof is at the user’s sole risk and
liability.
ii
CyberSec4Europe D9.8 Policy Recommendation Report I
Executive Summary
CyberSec4Europe plays a very active role in helping policymakers formulate the policies that will shape
the future of the EU and the Member States. To provide effective policy recommendations,
CyberSec4Europe follows a two-pronged approach. In the first reactive approach, Cyber4Europe
partners receive and accept invitations to provide recommendations in several fora, including
workshops, concertation meetings, EU-level organisations, etc. Such organisations include ECSO (the
European Cyber Security Organisation), ENISA (the EU Agency for Cybersecurity), the European Data
Protection Supervisor, etc. In the second proactive approach, the partners acknowledge that much of the
work already performed in the project may essentially create contributions that are practically policy
recommendations. In this deliverable we collect these contributions, phrase them as policy
recommendations and provide evidence that underlines their importance.
iii
CyberSec4Europe D9.8 Policy Recommendation Report I
Document information
Contributors
Name Partner
Reviewers
Name Partner
History
iv
CyberSec4Europe D9.8 Policy Recommendation Report I
v
CyberSec4Europe D9.8 Policy Recommendation Report I
Table of Contents
1 Introduction .................................................................................................................................... 1
2 The Proactive Approach ................................................................................................................ 2
3 Policy Recommendations ............................................................................................................... 4
3.1 EU to support novel privacy-preserving technologies including data sharing for COVID-19...... 4
3.2 EU university curricula to provide more attention to certain cybersecurity topics including
security-by-design and privacy-by-design ....................................................................................................... 6
3.3 EU to adopt integrated models for legal compliance and sanction avoidance ................................ 7
3.4 EU to coordinate Member States on achieving cybersecurity sovereignty ..................................... 9
3.5 EU to continue to invest in novel solutions for cybersecurity threats ............................................ 10
3.6 EU to take leadership in the research and development of blockchain applications ................... 12
3.7 EU to consider secure 5G as a crucial enabler ................................................................................. 13
3.8 EU to adopt a common eIDAS-based trust framework for Member State digital identity trust
schemes .............................................................................................................................................................. 15
3.9 EU financial services institutions to adopt a privacy-preserving approach to sharing KYC data
and IBAN information among banks and other financial institutions........................................................ 17
3.10 Communication – Next Steps ............................................................................................................. 18
4 The Reactive Approach ............................................................................................................... 19
4.1 ECSO – The European Cyber Security Organisation ..................................................................... 19
4.2 ENISA Research Prioritisation .......................................................................................................... 22
4.3 First CyberSecurity Project Workshop ............................................................................................ 22
4.4 Other contributions ............................................................................................................................ 23
5 Summary – Recommendations ................................................................................................... 24
Annex I: Policy-related Considerations (by Deliverable) ................................................................. 25
I.1 Deliverable D2.1: Governance Structure 1 ....................................................................................... 25
I.2 Deliverable D3.1: Common Framework Handbook 1 ..................................................................... 26
I.3 Deliverable D3.3: Research challenges and requirements to manage digital evidence ................ 26
I.4 Deliverable D3.4: Analysis of key research challenges for adaptive security ............................... 26
I.5 Deliverable D3.5: Usable security & privacy methods and recommendations ............................. 26
I.6 Deliverable D3.7: Usability requirements validation ..................................................................... 27
I.7 Deliverable D4.2: Legal Framework ................................................................................................. 27
I.8 Deliverable D4.3: Research and Development Roadmap 1 ............................................................ 27
I.9 Deliverable D5.1 Requirements Analysis of Demonstration Cases Phase 1 .................................. 28
T5.1: Open Banking – Adoption of an agreement from the competent authorities to allow the
exchange of sensitive fraud-related information between banks ............................................................ 28
T5.2: Supply Chain – Policies for supply chain security assurance ................................................ 28
T5.3: Identity Management – A way to manage strong authentication keys for end users .......... 29
T5.7: Smart Cities – Addressing data management challenges in 5G smart cities ........................ 29
I.10 Deliverable D6.2: Education and Training Review ......................................................................... 30
I.11 Deliverable D10.1: Clustering results and SU-ICT-03 project CONCERTATION conference . 30
vi
CyberSec4Europe D9.8 Policy Recommendation Report I
List of Figures
Figure 1: Contribution of CyberSec4Europe partners to ECSO’s research priorities document.
CyberSec4Europe proposes that research should be funded in the area of software hardening. ........... 20
Figure 2: Contribution of CyberSec4Europe partners to ECSO’s research priorities document.
CyberSec4Europe proposes that research should be funded in the area of software-controlled hardware
bugs. ....................................................................................................................................................... 21
List of Acronyms
EU European Union
vii
CyberSec4Europe D9.8 Policy Recommendation Report I
viii
CyberSec4Europe D9.8 Policy Recommendation Report I
1 Introduction
This is the first deliverable of Task 9.6: Policy Recommendations. According to the Description Of Action,
the task identifies and prioritises policy recommendations based on the results of the conclusions and
roadmaps associated with the demonstration activities, to define a sustainable path for the technologies
developed in CyberSec4Europe.
Indeed, several of the project deliverables
have produced solid technical results that
can be used to guide future policy
recommendations. Capitalising on these
EU MEMBER STATES MUST
results, the project can have an impact not COORDINATE TO ACHIEVE
only technically, but also in the field of CYBERSECURITY INDEPENDENCE
policy. FROM NON-EU COUNTRIES
To pave the road towards effective policy Deliverable D2.1
recommendations, the project is following a two-pronged approach:
• The proactive approach. The partners collect possible policy contributions created by the various
technical activities of the project and present them in a form that can be used by policymakers.
• The reactive approach. The partners decided to accept (to the extent possible) requests for
contributions to policy documents at either the EU or Member State level.
This deliverable describes the outcomes of these two approaches.
Section 2 describes the proactive approach and lists the main deliverables of the project and their
contributions to various policies. Section 3 summarises some of the most distinct policy recommendations.
Section 4 describes the reactive approach and provides pointers to our contributions. Finally, Annex I
provides more policy-related information.
1
CyberSec4Europe D9.8 Policy Recommendation Report I
To collect these policy recommendations, we selected a set of project deliverables to study. The deliverables
chosen were those that had been delivered at the time this work started. From those deliverables we excluded
any ones that did not have any policy-making potential (such as those from WP1: Project Management).
The final set deliverables studied were:
• Deliverable D2.1: Governance Structure2
• Deliverable D3.1: Common Framework Handbook #13
• Deliverable D3.2: Cross Sectoral Cybersecurity Building Blocks4
• Deliverable D3.3: Research Challenges and Requirements to Manage Digital Evidence5
• Deliverable D3.4: Analysis of Key Research Challenges for Adaptive Security6
• Deliverable D3.5: Usable Security & Privacy Methods and Recommendations7
• Deliverable D3.6: Guidelines for GDPR Compliant User Experience 8
• Deliverable D3.7: Usability Requirements Validation9
• Deliverable D3.8: Framework and Toolset for Conformity10
• Deliverable D3.9: Research Challenges and Requirements for Secure Software Development11
• Deliverable D4.1: Requirements Analysis from Vertical Stakeholders12
• Deliverable D4.2: Legal Framework13
• Deliverable D4.3: Research and Development Roadmap14
2 https://cybersec4europe.eu/wp-content/uploads/2020/02/D2.1-Governance-Structure-final-Submitted.pdf
3 https://cybersec4europe.eu/wp-content/uploads/2020/06/D3.1-Handbook-v2.0-submitted-1.pdf
4 https://cybersec4europe.eu/wp-content/uploads/2020/06/D3.2-Cross_sectoral_cybersecurity-building-blocks-
v2.0.pdf
5 https://cybersec4europe.eu/wp-content/uploads/2020/02/D3.3-Research-challenges-and-requirements-to-manage-
digital-evidence-Submitted.pdf
6 https://cybersec4europe.eu/wp-content/uploads/2020/02/D3.4-Analysis-of-key-research-challenges-for-adaptive-
security_Submitted.pdf
7 https://cybersec4europe.eu/wp-content/uploads/2020/02/D3.5-Usable-security-privacy-methods-and-
recommendations-Submitted.pdf
8 https://cybersec4europe.eu/wp-content/uploads/2020/02/D3.6-Guidelines-for-GDPR-compliant-user-experience-
Submitted.pdf
9 https://cybersec4europe.eu/wp-content/uploads/2020/03/D3.7_Usability_requirements_validation_Submitted.pdf
10 https://cybersec4europe.eu/wp-content/uploads/2020/03/D3.8-Framework-and-Toolset-for-Conformity-v1.0-
Submitted.pdf
11 https://cybersec4europe.eu/wp-content/uploads/2020/04/D3.9-Research-challenges-and-requirements-for-secure-
software-development-v1.0-Submitted.pdf
12 https://cybersec4europe.eu/wp-content/uploads/2020/06/D4.1-Requirements-Analysis-from-Vertical-
Stakeholders-WithAnnex-v14.0.pdf
13 https://cybersec4europe.eu/wp-content/uploads/2020/02/D4.2-Legal-Framework-Submitted.pdf
14 https://cybersec4europe.eu/wp-content/uploads/2020/02/D4.3.Research-and-Development-Roadmap-1-
Submitted.pdf
2
CyberSec4Europe D9.8 Policy Recommendation Report I
15 https://cybersec4europe.eu/wp-content/uploads/2020/06/D5.1-Requirements-Analysis-of-Demonstration-Cases-
Phase-1-v3.0.pdf
16 https://cybersec4europe.eu/wp-content/uploads/2020/06/D6.1-Case-Pilot-for-WP2-Governance-V4-.pdf
17 https://cybersec4europe.eu/wp-content/uploads/2020/02/D6.2-Education-and-Training-Review-V1.2-
Submtted.pdf
18 https://cybersec4europe.eu/wp-content/uploads/2019/11/CS4E-Deliverable-D8.1_v2.1_2019_08_05_final.pdf
19 https://cybersec4europe.eu/wp-content/uploads/2020/03/D10.1-Clustering-results-and-SU-ICT-03-project-
CONCERTATION-conference-year-1.pdf
3
CyberSec4Europe D9.8 Policy Recommendation Report I
3 Policy Recommendations
In this section we list the main policy recommendations derived from the various project activities and
deliverables, as well as possible next steps.
3.1 EU to support novel privacy-preserving technologies including data
sharing for COVID-19
Europe has traditionally been a leader in the
area of data protection and privacy. For
example, the General Data Protection
Regulation (GDPR) has demonstrated this
leadership by completely changing the legal
landscape of data collection, data processing
and data protection; significantly, it has been
used as the basis for similar regulations in
other jurisdictions. The regulation reflects
the values held dear by European citizens –
values that govern their everyday lives and
shape their future.
Building on top of these values and the
strong legal foundation, now, more than
ever, we need to support novel technologies
in the area of privacy. Indeed, the COVID-19 outbreak shows that we need to find a way to share location
data in order to identify people who have come in contact with COVID-19 cases and help them to stay
healthy. At the same time, it was clearly expressed that such sharing of location data must be carried out in
a privacy-preserving way; otherwise, we run the danger of creating a surveillance society, an ever-present
panopticon that would monitor the whereabouts of all citizens at all times – a virtual jail that would allow
virtual “guards” to monitor European citizens as they come and go. The goal would be noble: to protect
citizens’ health; the means could end up being a little better than digital slavery.
Privacy-preserving COVID-19 contact tracing seems like a contradiction: we want to know whether people
have contacted other people with COVID-19 but we do not want anyone to know who contacted whom.
This sounds like an impossible trade-off, an unsolvable problem. Fortunately, such problems do have
solutions – even better, numerous European research activities are addressing them. Having realised the
impact that data sharing can have during a pandemic, we believe that we should support scientific
endeavours in this challenging field. To be more specific we need to support:
• Privacy-preserving data sharing could be used for medical/health purposes, such as COVID-19
contact tracing. Such sharing may also be needed in other fields, including scientific processing,
research, secondary processing, epidemiology, etc.
• Privacy-by-design technological approaches. Do not let privacy be an afterthought. It should
be included in the production process from the first design phases on. Such emphasis on privacy
should also be taken seriously even in times of emergency, when privacy can easily fall prey to
fear or demagogy.
• Privacy-enhancing technologies. Help European citizens protect their privacy when online.
When people are online they leave digital “crumbs” that can be used to follow citizens all over
the Internet. Like it or not, citizens frequently have no other choice: they need to provide their IP
address in order to communicate, have to accept a cookie if they want to receive decent service
from the web server, and have to be subjected to device fingerprinting if they want to access an
4
CyberSec4Europe D9.8 Policy Recommendation Report I
online service, etc. Privacy-enhancing technologies can help users protect their IP address, protect
their devices, protect their identity.
For more detailed insights:
• Deliverable D10.1: Clustering Results and SU-ICT-03 Project Concertation Conference Year 1
Target audience:
• European Commission (DG CNECT)
• ENISA
5
CyberSec4Europe D9.8 Policy Recommendation Report I
6
CyberSec4Europe D9.8 Policy Recommendation Report I
• An overview of the potential overlap among the existing legal obligations in the field of cybersecurity
(e.g. notifications, certifications)
• The outline of a general, comprehensive and cross-cutting map of legal obligations and procedures
related to cybersecurity.
The results of this analysis show how the GDPR provides a general framework, setting out the key principles
for the use of data, also in terms of data security. In this sense, these general principles – such as data
minimisation, storage limitation and data confidentiality – shape the entire regulatory framework and are
further applied in detail by sector-specific legal instruments (PSD2, the eIDAS regulation and the NIS
directive). These different legal instruments define the common core of the EU approach, which is based on
five main pillars:
• Risk-based approach: technological development must be based on an operational and security risk-
management framework, including adequate technical measures
• By-design approach: secure technologies by design and by default must be provided
• Reporting obligations: specific procedures for reporting must be adopted
• Resilience: mandatory response and recovery plans must be developed
• Certification schemes: ad hoc certification schemes have been provided for by law
Based on the above, all the provisions laid down in the legal instruments under examination require,
explicitly or implicitly, the development of specific technologies for cybersecurity and data security. The
framework provided by these different legal sources is not to be understood as a patchwork, but as a
coordinated harmonious model, in which similar technologies are required by different regulations to
address issues related to the common core of these legal instruments.
20 https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&from=EL
21 https://ec.europa.eu/info/law/payment-services-psd-2-directive-eu-2015-2366_en
22 https://ec.europa.eu/futurium/en/content/eidas-regulation-regulation-eu-ndeg9102014
23 https://ec.europa.eu/digital-single-market/en/network-and-information-security-nis-directive
7
CyberSec4Europe D9.8 Policy Recommendation Report I
This uniformity demonstrates the coherence that guides the whole approach adopted by EU legislators in
the field of data protection and cybersecurity, and undoubtedly provides a clear and unique framework for
the development of a roadmap for the implementation of the NNCCs. Taking into consideration the analysis
undertaken in D4.2, we can repeat the need for better harmonised interaction between the different
obligations imposed by the existing EU directives, and regulation in the field of data and security.
Considering that various obligations are similar, they could be better harmonised through integrated models
for legal compliance and avoidance of sanctions. This could be particularly relevant in light of the
forthcoming EU initiatives connected to the EU data strategy.
8
CyberSec4Europe D9.8 Policy Recommendation Report I
9
CyberSec4Europe D9.8 Policy Recommendation Report I
• Deliverable D3.9: Research Challenges and Requirements for Secure Software Development
Target audience:
• European Commission (DG CNECT)
• ENISA
11
CyberSec4Europe D9.8 Policy Recommendation Report I
Take, for example, supply chains that are complex systems that move products or services from suppliers
to customers. Supply chain processes unfold over a multitude of stages and geographical locations, making
it very hard to trace events and investigate incidents, or to track the ownership of goods and inventory at
each step. Furthermore, transactions between the companies involved usually require the manual transfer of
paper records (orders, invoices, etc.), a costly bureaucratic process that is subject to human errors, losses,
damages, thefts and frauds. This inherent complexity only leads to economic losses, inefficiencies and
delays that will upset both a company’s health and its customers’ satisfaction. Customers have no reliable
way to verify and validate the value of the goods that they purchase, because of a lack of transparency and
prices that do not reflect the true costs of production. In some extreme cases, there might be serious legal
consequences. In a hard to manage supply chain, it is difficult to detect illicit activities such as counterfeiting
or forced labour in factories. Blockchain can help with most of the mentioned problems by providing a
secure and distributed way to record information that cannot be altered. This accurate record of information
can be used to resolve many future disputes and false claims. Some potential research areas related to
blockchain include:
• Novel solutions: That is, solutions for industrial challenges that combine scalable secure and
practical consensus layers, smart contract security and efficient privacy-preserving blockchain
protocols.
• Blockchain compliance with EU regulation. Blockchain provides a secure immutable log. This
means that once data is written in the blockchain ledger it cannot be removed. Unfortunately, this
immutability of the blockchain’s ledger may not be compatible with the GDPR, unless more
research is carried out in this area that will preserve the benefits of blockchain while also being
compliant with the GDPR.
12
CyberSec4Europe D9.8 Policy Recommendation Report I
24 https://ec.europa.eu/digital-single-market/en/5g-europe-action-plan
25 https://5g-ppp.eu/
26 https://ec.europa.eu/digital-single-market/en/news/cybersecurity-5g-networks
27 https://ec.europa.eu/commission/presscorner/detail/en/ip_19_6049
28 https://www.enisa.europa.eu/publications/enisa-threat-landscape-for-5g-networks
29 https://ec.europa.eu/digital-single-market/en/eu-cybersecurity-act
13
CyberSec4Europe D9.8 Policy Recommendation Report I
• Identification of a common set of cybersecurity requirements that can be tested and certified for
5G systems. These requirements should be based on standardised approaches and can leverage the
results of existing initiatives (e.g. the toolbox mentioned above).
• Definition of common assessment and testing procedures for the cybersecurity certification of
5G systems, considering the different assurance levels described in the Cybersecurity Act
• Analysis of the potential risks associated with the deployment of 5G systems certified under
conformity self-assessment procedures (Article 53 of the Cybersecurity Act)
• Fostering the creation of a cybersecurity certification scheme to promote mutual recognition of
5G systems across Member States by considering a specified common set of requirements. This
initiative can be considered in the scope of the Union rolling work programme, which is intended
to identify strategic priorities for future European cybersecurity certification schemes.30
• To promote collaboration and cooperation among Member States for the creation of a common
platform to share cybersecurity information associated with 5G systems throughout their lifecycle.
This “living” platform could include information about new software/hardware vulnerabilities,
relationships among several certification schemes, or the cybersecurity certificates of any 5G
system.
30 https://ec.europa.eu/digital-single-market/en/european-cybersecurity-certification-group
14
CyberSec4Europe D9.8 Policy Recommendation Report I
31 https://ec.europa.eu/digital-single-market/en/news/electronic-identification-and-trust-services-eidas-clear-
benefits-smes
32 https://ec.europa.eu/digital-single-market/en/news/cross-border-digital-identification-eu-countries-
major-step-trusted-digital-single-market
15
CyberSec4Europe D9.8 Policy Recommendation Report I
Even if not apparent before, one of the impacts of the COVID-19 lockdown has been the recognition that
many societal and business processes – including track-and-trace app development – are stalled without
the availability of easily verifiable digital identity credentials.
Although there are numerous national and EC-funded projects and initiatives, it is our belief that a greater
concerted effort should be made to build an identity ecosystem that works across all sectors and across
borders. A first step would be to get the backing and support of Member States and key verticals.
For more detailed insights:
• D4.1: Requirements Analysis from Vertical Stakeholders
• D4.3: Research and Development Roadmap
• D5.1: Requirements Analysis of Demonstration Cases
• D5.2: Specification and Set-up Demonstration case Phase 1
Target audience:
• European Commission (DG CNECT, DG SANTE, DG ECFIN)
• European Banking Association
16
CyberSec4Europe D9.8 Policy Recommendation Report I
17
CyberSec4Europe D9.8 Policy Recommendation Report I
18
CyberSec4Europe D9.8 Policy Recommendation Report I
33 Note that in some cases the participants were invited as representatives of the CyberSec4Europe project and in
other cases they were invited in their personal capacity as experts in the area. This is because some events invite
projects (such as the concertation events) whereas other events invite experts. Similarly, some bodies (such as
ENISA’s Advisory Group) invite people ad personam as experts – they do not invite organisations or projects. For
the purposes of this document we do not make any distinction.
34 The document is not publicly available. However, we have included some screen dumps of this document in Figure
2.
19
CyberSec4Europe D9.8 Policy Recommendation Report I
HEU.06
Description of the Most of the recent cyberattacks usually depend on some kind of programming error (usually called “bug” in the
challenges colourful language of computers), which, when exploited, may give control of the execution to the attacker,
compromising in this way the victim computer. Buffer overflows, heap overflows, dangling pointers, etc. have all been
used in the past to hijack the program’s execution and enable the attacker to gain control of the victim computer with
no explicit user interaction.
One might think that we can find these software bugs through an ordinary “debugging” process. Unfortunately, it is
not easy to find these software bugs, since by definition, they are mistakes made inadvertently by computer
programmers, and thus they are not known.
One way to deal with these unknown bugs is to “harden” the executable so that when/if the bug is triggered it will not
allow the attacker to compromise the computer. Hardening should not introduce significant performance overhead.
The approach software hardening takes is the following: “We do not know what the bug is, but we can make sure than
when/if it is triggered, it will not compromise the computer.
BASELINE
What has been This is a very recent area. Although the initial ideas may be traced back to the 80’s, real work in the area has blossomed
done so far (in EU only in the past decade, after the realization that software security is much more difficult that what we originally
and in the World – thought.
EU position)
Effort until now Since this area is very recent, there are only very few projects underway:
https://www.cybersec4europe.eu/
http://react-h2020.eu/
DESIRED SCENARIO
What more should We need to do more research in order to understand the potential and cost of software hardening. In effect we need
be done? What to see how we can move the software prototypes out of the lab and into the real market.
gaps to be filled?
For what reason?
Expected benefit; • Protection of software against unknown bugs with low performance overhead
strategic or • Reduce the financial impact of zero-day attacks since zero days will not be able to compromise the victim computers
economic impact
Timeline 2027
(2025/2027/beyond
)
Figure 1: Contribution of CyberSec4Europe partners to ECSO’s research priorities document. CyberSec4Europe proposes that
research should be funded in the area of software hardening.
20
CyberSec4Europe D9.8 Policy Recommendation Report I
HEU.27
Description of the Over the past few years, Cyber Security has focused mostly on
challenges Software Security. That is, it has focused on how to develop secure software, how to find software bugs, how to
mitigate/tolerate software bugs that may already exist in an executable, etc.
Recently however, the research community discovered, that, much like software, hardware also may suffer from bugs
that can be exploited by cyber attackers. Hardware bugs, such as rowhammer, RIDL, or spectre, can be triggered by
malicious software, and as a result, may compromise a computer (or its data) by reading/writing arbitrary memory
locations.
Although software bugs may be solved by releasing and installing a software update, hardware bugs are much more
difficult to mitigate, as no such hardware updates exist. Thus, hardware bugs may be much more important, because
they may not be easily solved.
BASELINE
What has been This is an extremely recent area. Over the past 4-5 years the first hardware bugs were found, and the first mitigations
done so far (in EU were developed. We are still contemplating what is the extent of the damage that such attacks may cause. Initial
and in the World – results suggest that such attacks may break cryptography (by reading/writing bits of the secret key), may hijack the
EU position) flow of control (by changing conditions in if statements), etc.
Effort until now Since this area is very recent, there are only very few projects underway:
https://cordis.europa.eu/project/rcn/200247/factsheet/en
http://react-h2020.eu/
DESIRED SCENARIO
What more should More research is needed in this area to (i) uncover the extent of the problem and (ii) to evaluate work-around solutions.
be done? What
gaps to be filled?
For what reason?
Figure 2: Contribution of CyberSec4Europe partners to ECSO’s research priorities document. CyberSec4Europe proposes that
research should be funded in the area of software-controlled hardware bugs.
21
CyberSec4Europe D9.8 Policy Recommendation Report I
35 At the time of writing the document has not been published. That is why we do not have a link to it.
36 https://www.ffg.at/sites/default/files/downloads/CCCNworkshop.pdf
22
CyberSec4Europe D9.8 Policy Recommendation Report I
37 Deliverable D10.1: Clustering Results and SU-ICT-03 Project Concertation Conference Year 1
23
CyberSec4Europe D9.8 Policy Recommendation Report I
5 Summary – Recommendations
CyberSec4Europe aspires to help policymakers formulate the policies that will shape the future of the EU
and the Member States. Towards this goal, CyberSec4Europe provides policy recommendation using a two-
pronged approach. In the first reactive approach, Cyber4Europe partners receive and accept invitations to
provide recommendations in several fora, including workshops, concertation meetings, EU-level
organisations, including ECSO, ENISA, the European Data Protection Supervisor, et al. In the second
proactive approach, the partners suggest that much of the work already performed in the project may
essentially create contributions that are practically policy recommendations. In this deliverable we collected
these contributions, phrased them as policy recommendations and provided evidence that underlines their
importance.
24
CyberSec4Europe D9.8 Policy Recommendation Report I
38 https://eur-lex.europa.eu/procedure/EN/2018_328
25
CyberSec4Europe D9.8 Policy Recommendation Report I
industry-related practices and expertise. As a part of its ongoing activities, CyberSec4Europe will evaluate
the internal governance of the suggested institutions, such as the competence centre and CHECKs.
I.2 Deliverable D3.1: Common Framework Handbook 1
D3.1 made recommendations for research priorities that were included in the ECSO research priorities (see
section 4.1):
• Certification schemes for data protection
• Disintermediated and user-centric, privacy-respecting identity and access control ecosystem
• Holistic security orchestration in heterogeneous systems and networks
• Security certification formal format
• Hardware (in)security (software-controlled hardware bugs)
• 5G and IoT convergence
• Software hardening
I.3 Deliverable D3.3: Research challenges and requirements to manage
digital evidence
Some of the key findings that can be used by policymakers include the following:
• Lack of trust in the way threat intelligence information is handled by receiving parties is a key factor
in making organisations reluctant to share information
• The application of security techniques – such as end-to-end encryption, onion routing, etc. – makes
it harder to harvest threat intelligence from monitoring data and event logs.
• The AI capabilities of contemporary threat intelligence platforms enable new kinds of attacks that
allow adversaries to learn how to evade detection or may leak sensitive information and thus require
strong protection to avoid privacy concerns or loss of reputation of the reporting entity.
I.4 Deliverable D3.4: Analysis of key research challenges for adaptive
security
We recommend that future research should focus on:
a) considering the cyber and physical spaces where modern systems operate during monitoring and
execution of security controls;
b) integrating multiple security objectives during decision-making;
c) considering the stakeholders during design and development of the activities of the adaptive
security MAPE loop;
d) provision of perpetual security assurances that can be regenerated after adaptation;
e) reducing security uncertainties.
It is also important to think about “adaptive security/privacy policies” to create policies that are more robust,
resilient to change over time and make explicit provision for learning. A promising idea could be related to
taking into account the principle of “design for change” and the adaptive security decision-making process
in the way security and privacy policies are defined.
I.5 Deliverable D3.5: Usable security & privacy methods and
recommendations
To reach more usable security and privacy enhancing systems, D3.5 provided a short list of
recommendations. Some of these are general and some are directed towards specific use cases, such as user
authentication.
26
CyberSec4Europe D9.8 Policy Recommendation Report I
• Authenticated encryption should be used in the application layer or during network layer
communications whenever possible. The use of authenticated encryption protects both the integrity
of the communications and the privacy of the content. There are many tools available to achieve
this, and they can be applied in a vast majority of use cases that involve communication over a
network. When this is done right, and when user needs, user knowledge and user work are carefully
identified at design time, the impact to
end users is minimal
• Early user involvement should be a
priority for new security and privacy
features. User centred design approaches
advocate the involvement of end users in
CYBERSECURITY IS NOT JUST ABOUT
the early stages of the development PROTECTING COMPUTERS: IT IS
process (e.g. via brainstorming sessions ABOUT PROTECTING DATA: PEOPLE’S
and work analysis). DATA
• User modelling and/or user tests should
be conducted for new security and Deliverable D4.3
privacy features. Although collecting
information on users is not a
straightforward task, as both automated and other approaches have their shortcomings, it is
important to test and/or model users in all new security and privacy features. User research methods
should thus be used throughout the design, development and assessment of security mechanisms.
• Users need to be provided with authentication methods that are both secure and privacy-friendly, as
user authentication is the security measure that in many cases is the most visible to users. This may
be accomplished in many ways, but at the moment convenience and user experience seem to be
pushing towards the use of biometrics. It should be possible to conduct user authentication in a user-
friendly way while meeting security objectives and respecting users’ privacy.
I.6 Deliverable D3.7: Usability requirements validation
• Usability and security or privacy requirements need to be reconciled and considered as two facets
of the same objective, rather than being viewed as mutually exclusive, as is often the case.
• Validating usability is neither simple nor cheap, so care needs to be taken to include elements of
user modelling and/or user testing in the early stages of the design of new security and privacy
features.
I.7 Deliverable D4.2: Legal Framework
There is a need for a better harmonised interaction between the different obligations imposed by recent EU
directives and regulations. Considering that various obligations (e.g. notifications) are similar, they could
be better harmonised through integrated models for legal compliance and sanction avoidance.
Only after having fully understood the potential attackers is one able to reasonably protect a system
against them.
I.9 Deliverable D5.1 Requirements Analysis of Demonstration Cases Phase 1
Integration of vertical sectors with IT technologies. Surprisingly enough, the deliverables revealed that,
despite today’s technological advancements, key industrial sectors are still relying upon outdated
technologies, often inadequate against modern attackers. In some cases, important operations (e.g. dispute
resolution in supply chains) are still carried out via tedious, error-prone, bureaucratic processes.
Blockchain. This relatively new technology is at the forefront of the modernisation of the industry sectors.
Three out of seven project’s verticals– open banking, supply chain security assurance, and medical data
exchange – plan to use it as a core part of their solution to bring about security by design, reliability,
scalability, and traceability of transactions.
User data protection technologies are still lacking. Today’s cybersecurity techniques are inadequate to
counter modern attacks. In particular, privacy-preserving identity management and privacy-preserving data
handling techniques are in high demand. The number of data breaches and data (mis)management scandals
in recent years corroborate their importance. They are, in one way or another, at the core of all seven
demonstrators that need to handle sensitive data, from storing for traceability and transparency reasons, to
trading as a part of their services.
Lack of interoperability in today’s cybersecurity technologies. Today’s cybersecurity solutions solve a
single problem well – a good strategy, because it reduces the attack surface. However, they often do not
work well in concert with other technologies as building blocks of broader solutions. This is what
CyberSec4Europe’s demonstrators are trying to achieve.
T5.1: Open Banking – Adoption of an agreement from the competent authorities to allow
the exchange of sensitive fraud-related information between banks
Threats are increasingly professional and repeatable and continue to succeed, particularly leveraging human
weaknesses pitted against the high skills and large resources of the attackers, who are able to move from
one bank to another without significant effort and without being tracked.
The evolution of consumer banking towards ever more real-time transactions limits the ability of banking
players to react effectively in the event of proven fraud.
Banking information system architectures have been deeply remodelled with a focus on APIs as critical
business components, fuelled by the preferential use of mobile devices to consume banking services and
accelerated by PSD2. This reliance on the APIs of a banking information system creates organisational and
methodological impacts that go beyond pure software development and introduce new security issues.
These new issues require a complete transformation in the provision of banking services, and in particular
the co-creation and co-design of an open approach to security by federating the whole banking ecosystem,
to make it globally aware and informed of any fraud attack in real time.
28
CyberSec4Europe D9.8 Policy Recommendation Report I
T5.3: Identity Management – A way to manage strong authentication keys for end users
The need to construct identity management (IDM) in a strong privacy-preserving and easy-to-
use approach leads to several recommendations. The core challenge is to develop IDM solutions that satisfy
all the following requirements at the same time:
29
CyberSec4Europe D9.8 Policy Recommendation Report I
performance and the user experience, but at the same time new challenges will appear regarding how data
will be shared and by whom, and the need to define different levels of security and privacy management
over the whole data-flow process. Sharing data may lead to security breaches, data losses and, in extreme
instances, high-impact cyberattacks. As data sharing grows and new technologies drive a more
interconnected infrastructure ecosystem, the range of potential threats reported will expand.
5G will soon promote the rapid proliferation of the IoT, connecting billions of devices to billions of people.
5G’s strong and robust data transport capacity – 1000 times faster than 4G – will produce enormous amounts
of information, where location, identity and personal data leakage will become the new security challenges.
As more 5G antennae and base stations are placed in high population density areas, location privacy
protection of IoT and end-users is expected. By implementing privacy protocols within the very architecture
of 5G networks, the actors in 5G deployments can collectively take a proactive approach towards privacy
protection, and assure users their identity, location and personal data are in safe hands.
39 https://cybersec4europe.eu/wp-content/uploads/2020/02/D6.2-Education-and-Training-Review-V1.2-
Submtted.pdf
30
CyberSec4Europe D9.8 Policy Recommendation Report I
Enhancing European competitiveness. In Europe, civilised values and people’s welfare are cherished.
However, they cannot be taken for granted and need to be made sustainable. For this, it is necessary to be
competitive, e.g. in 5G, data management, artificial intelligence, etc., and the responsible sharing of data
needs to be facilitated, while respecting the GDPR and privacy regulations in general. Help from
cybersecurity experts is needed to design and implement the sharing of data in a responsible manner.
Attainable certification for all. As certification comes with costs, which smaller players, such as SMEs,
might find it hard to cover, it is essential that the application of certification, including financing models,
should be well planned. Research can provide better solutions: however, it is time for decisions, at least as
regards trials for a limited time. This process should include a spectrum of mechanisms, from liability
provisions to simple self-declaration by providers.
Cybersecurity must be considered an important component in all projects in European funding
programmes. Cybersecurity should be considered as part of every call, not just specific cybersecurity calls.
Almost all R&D projects that have some IT dimension should take cybersecurity into account. European
funding programmes (such as H2020, DEP and others) should ensure that cybersecurity is a component of
all projects, e.g. health, financial, transport, critical infrastructure, etc.
Cybersecurity education should be a priority. To have a perspective from outside the research and
innovation bubble is extremely important
Common vision and mission promoting European values via hub communities. Hub communities
should federate with a common vision and mission that promote European values. Furthermore, hubs should
remain open and engage with effective strategies to build trust with the communities involved.
Real-time reactive data sharing solutions. Cybersecurity has an immediate impact in the digital world;
hence, it is important that we have real-time and reactive data sharing.
New tools to support data sharing while preserving privacy. It is important to have tools that enable
cross-border sharing of data without compromising privacy. Although methods and tools already exist
(including differential privacy40 and k-anonymity41), new challenges need to be addressed, such as those
presented by COVID-19.
Machine learning tools to improve data management. The increase in size of shared data and transferred
data needs to be made more manageable. Using machine learning, it is possible to find out which threats are
more important and the order of sharing.
Provision of privacy default settings. This might include the provision of a dynamic consent form that
users can update according to their needs and the different application privacy requirements.
Fund larger projects. Short-term projects (two to three years long) do not provide the sustainability needed
to start from research and go all the way to market. Projects longer than five years – possibly in the form of
“Grand Challenges”, such as the ones set by the CERN model – can completely transform projects and their
results.
Restructure funding. A good architecture of European funding would therefore consist of blue-sky
individual projects under the ERC, plus a large number of collaborative FET Open projects in strategic areas
– that could also network the results stemming from the ERC – complemented by DARPA-like technology
projects that would bring close to market the most promising ideas that have most impact potential.
40 https://link.springer.com/chapter/10.1007%2F11681878_14
41 https://epic.org/privacy/reidentification/Sweeney_Article.pdf
31
CyberSec4Europe D9.8 Policy Recommendation Report I
Move from “national” to “European”. There is a need for EU solidarity (the EU budget should take into
account the digital market along with the welfare of its citizens). We should move from national security
approaches to a pan-European security approach.
Improve communication. We may also need better communication: the research community needs a better
way to communicate its ideas to decision makers, including the European Commission, the European
Parliament, and the European Council.
Addressing strategic autonomy. An ever-present conundrum is the lack of strategic autonomy for
cybersecurity in European industry, despite the wealth of talent and experience.
32