D8.3 Cybersecurity Standardization Engagement Plan 2

Page created by Aaron Ingram
 
CONTINUE READING
Proposal No. 830929                              Project start: February 1, 2019
    Call H2020-SU-ICT-03-2018                        Project duration: 42 months

                         D8.3
    Cybersecurity Standardization Engagement Plan 2
                                 Document Identification
                                 Due date          31.01.2021
                                 Submission date
                                 Revision          V1.0

          Related WP      WP 8                 Dissemination         PU
                                               Level
          Lead            CONCEPT              Lead Author           CONCEPT
          Participant
          Contributing    GUF, CYBER, AIT, Related                   D8.1
          Beneficiaries   POLITO,   UPRC, Deliverables
                          VTT

i
CyberSec4Europe D8.3 Cybersecurity Standardization Engagement Plan

Abstract

The aim of this document is to provide a further picture of the current engagement of the project partners
within cybersecurity standardization/certification related activities, both international and national. By
compiling this information, we demonstrate the potential of Cybersec4Europe to actively contribute to the
further development of cybersecurity standardization/certification areas.

COVID-19 NOTE:
The reviewers and readers of this deliverable should be informed that due to the COVID-19 crisis in Europe,
many standardization/certification related efforts were delayed and postponed significantly during the
period covered in the deliverable. However, as such, over the past few months, new ways of working have
begun and standardization activities have restarted and will again regain some traction in 2021.

 This document is issued within the CyberSec4Europe project. This project has received
 funding from the European Union's Horizon 2020 Programme under grant agreement no.
 830929. This document and its content are the property of the CyberSec4Europe Consortium.
 All rights relevant to this document are determined by the applicable laws. Access to this
 document does not grant any right or license on the document or its contents. This document
 or its contents are not to be used or treated in any manner inconsistent with the rights or
 interests of the CyberSec4Europe Consortium and are not to be disclosed externally without
 prior written consent from the CyberSec4Europe Partners. Each CyberSec4Europe Partner
 may use this document in conformity with the CyberSec4Europe Consortium Grant
 Agreement provisions and the Consortium Agreement.

 The information in this document is provided as is, and no warranty is given or implied that
 the information is fit for any particular purpose. The user thereof uses the information at its
 sole risk and liability.

                                                                                                         ii
CyberSec4Europe D8.3 Cybersecurity Standardization Engagement Plan

Executive Summary

This deliverable is an update to Deliverable 8.1. It gives a report on the activities that our CyberSec4Europe
partners are undertaking in the realm of standardization and certification. It is important to note that, even
though many partners go to a very significant depth in their extensive involvement in standardization, this
deliverable summarizes these activities. While some partners are clearly driving the efforts with Standards
Development Organizations (SDOs) and their committees, others are active participants in contributing
content and feedback.

Deliverable D8.1 showed us the involvement of partners and their interest in standardization organizations.
This helped us to select three organizations with whom our partners collaborate most – ISO/IEC JTC 1/SC
27 (Information security, cybersecurity and privacy protection), CEN/CENELEC JTC 13 (Cybersecurity
and Data Protection) and ETSI TC CYBER (privacy and security) – for inclusion in the project standards
matrix (Deliverable D8.2). We also chose ISO/IEC because these standards are among the most used
worldwide, and CEN/CENELEC and ETSI because the standards of these two organizations are recognized
as European Standards.

The matrices in Deliverable 8.2 contain privacy, and cybersecurity standards from ISO/IEC,
CEN/CENELEC and ETSI that are relevant to the CyberSec4Europe verticals and research topics. We
studied the standards and mapped them to the CyberSec4Europe topics to direct the attention of the project
partners to the standards and technical reports that could be relevant in their vertical or research topic so
that they can more quickly find the necessary information. In addition, we have included draft projects from
ISO/IEC JTC1/SC27 and ETSI in the matrices. CyberSec4Europe applied for liaison status in ISO/IEC
JTC1/SC27 WG2 and WG5 in September 2019. This request was approved in September 2020, and with
this, CyberSec4Europe partners can contribute with the results of the project to the standards that are under
development, thus ensuring that the bleeding-edge research reaches standardization projects.

                                                                                                           iii
CyberSec4Europe D8.3 Cybersecurity Standardization Engagement Plan

Document information
Contributors

  Mark Miller / Victoria Menezes Miller                                       CONCEPT
  Liina Kamm                                                                  CYBER
  Kai Rannenberg                                                              GUF
  Stephan Krenn / Thomas Lorünser                                             AIT
  Antonio Skarmeta                                                            UMU
  Luca Durante                                                                CNR
  Pasquale Annicchino                                                         ARCH
  Kimmo Halunen/ Jarno Salonen                                                VTT
  Lea Hemetsberger                                                            OASC
  Juan Carlos Perez Baun                                                      ATOS
  Javier Lopez / Carmen Fernandez Gago / Ruben Rios                           UMA
  Martin Wimmer / Prabhakaran Kasinathan                                      SIE
  Marco Angelini                                                              ENG
  Marco Crabu                                                                 ABI
  Antonio Lioy                                                                POLITO
  Liliana Pasquale                                                            UCD
  Vasileios Gkioulos                                                          NTNU
  Vanesa Gil Laredo                                                           BBVA

Reviewers

 The Reviewer                                   Sandhra-Mirella Valdma (CYBER)
 The Reviewer                                   Jozef Vyskoc (VAF)
 The Reviewer                                   Peter Hamm (GUF)

History

 0.01 2020-10-20     M. Miller / V. Menezes Miller (CONCEPT) 1st Draft for high-level review
 0.02 2020-11-02     M. Miller / V. Menezes Miller (CONCEPT) 2nd Draft requesting updated
                                                             information
 0.03 2020-11-18     S. Krenn (AIT)                          Updated activities
                     A. Skarmeta (UMU)
 0.04 2020-11-23     L. Durante (CNR)                        Updated activities
                     P. Annicchino (ARCH)
                     K. Halunen (VTT)
 0.05 2020-11-23     L. Kamm (CYBER)                         Information on liaison, plans for
                                                             Task 8.2, info on SC27 standard
                                                             projects, updated activities
 0.06 2020-11-23     K. Rannenberg (GUF)                     Updated activities
 0.07 2020-11-26     L. Hemetsberger (OASC)                  Updated activities
                     J.-C. Perez Baun (ATOS)
 0.08 2020-12-01     M. Miller, V. Menezes Miller (CONCEPT) Updated activities

                                                                                             iv
CyberSec4Europe D8.3 Cybersecurity Standardization Engagement Plan

 0.09 2020-12-15     C. Fernandez Gago, J. Lopez (UMA)       Updated activities
 0.10 2020-12-17     M. Wimmer, P. Kasinathan (SIE)          New standardization activities
                                                             (CSA, OASIS, IEC, W3C)
 0.11   2020-12-17   M. Angelini (ENG)                       Contribution to Impact
 0.12   2020-12-18   P. Annicchino (ARCH)                    Updated activities
 0.13   2020-12-18   A. Skarmeta (UMU)                       Updated activities
 0.14   2020-12-18   A. Lioy (POLITO)                        Updated activities
 0.15   2020-12-18   M. Crabu (ABI)                          Updated activities
 0.16   2020-12-18   M. Wimmer, P. Kasinathan (SIE)          Updated activities
 0.17   2020-12-18   K. Rannenberg (GUF)                     Updated activities
 0.18   2020-12-18   C. Fernandez Gago (UMA)                 Editorial changes
 0.19   2020-12-29   M. Miller / V. Menezes Miller (CONCEPT) Editing, authoring and integration
                                                             of multiple extensive inputs
 0.20 2021-01-11     Review of S.-M. Valdma (CYBER)          1st Review
                     Review by e-mail of J. Vyskoc (VAF)
 0.21   2021-01-11   L. Pasquale (UCD)                       Updated activities
 0.22   2021-01-12   M. Crabu (ABI)                          Section 2.3.7.1
 0.23   2021-01-12   L. Kamm (CYBER)                         Editorial changes
 0.24   2021-01-14   A. Skarmeta (UMU)                       1st Review changes
 0.25   2021-01-14   J. Salonen (VTT)                        1st Review changes
 0.26   2021-01-15   V. Gkioulos (NTNU)                      1st Review changes
 0.27   2021-01-15   L. Kamm (CYBER)                         1st Review changes
 0.28   2021-01-18   R. Rios (UMA)                           1st Review changes
 0.29   2021-01-18   L. Durante (CNR)                        1st Review changes
 0.30   2021-01-18   P. Annicchino (ARCH)                    1st Review changes
 0.31   2021-01-18   M. Crabu (ABI)                          1st Review changes
 0.32   2021-01-18   R. Rannenberg (GUF)                     1st Review changes
 0.33   2021-01-18   L. Pasquale (UCD)                       1st Review changes
 0.34   2021-01-18   M. Wimmer (SIE)                         1st Review changes
 0.35   2021-01-19   L. Hemetsberger (OASC)                  1st Review changes
 0.36   2021-01-19   M. Miller / V. Menezes Miller (CONCEPT) Editing, authoring and integration
                                                             of multiple extensive inputs and
                                                             changes
 0.37 2021-01-19     M. Miller / V. Menezes Miller (CONCEPT) Editing, authoring and integration
                                                             of changes, verification of changes
                                                             and removal of tracking
 0.38   2021-01-19   S. Krenn (AIT)                          Updates of AIT-related activities
 0.39   2021-01-21   M. Miller / V. Menezes Miller (CONCEPT) Updates, editing, integration
 0.40   2021-01-21   V. Gil Laredo (BBVA)                    Updated activities
 0.41   2021-01-21   M. Miller / V. Menezes Miller (CONCEPT) Editing, authoring and integration
                                                             of changes, verification of changes
                                                             and removal of tracking
 0.42 2021-01-22     V. Menezes Miller (CONCEPT)             Last second review changes
 0.43 2021-01-26     P. Hamm (GUF)                           High-level review changes
 0.44 2021-01-27     V. Menezes Miller (CONCEPT)             Final formatting, Figure 1
                                                             modification, list of references
 1.0    2021-01-31   Peter Hamm (GUF)                        Final Edits

                                                                                                   v
CyberSec4Europe D8.3 Cybersecurity Standardization Engagement Plan

List of Contents
1     Introduction .....................................................................................................1
2     Landscape of Consortium Standardization Activities ...................................2
    2.1      Standardization Organizations ...............................................................................................2
      2.1.1       CEN/CENELEC ..................................................................................................................3
      2.1.2       European Telecommunications Standards Institute (ETSI) ...................................................4
      2.1.3       International Organization for Standardization (ISO) ...........................................................9
      2.1.4       International Telecommunications Union (ITU) ................................................................. 22
      2.1.5       Internet Engineering Task Force (IETF) ............................................................................. 24
      2.1.6       International Electrotechnical Commission (IEC)............................................................... 27
      2.1.7       Organization for the Advancement of Structured Information Standards (OASIS) .............. 27
      2.1.8       World Wide Web Consortium (W3C) ................................................................................ 28
    2.2      National Standardization Bodies .......................................................................................... 29
      2.2.1       Estonian Centre for Standardisation (EVS)......................................................................... 29
      2.2.2       Finnish Standards Association (SFS).................................................................................. 30
      2.2.3       Austrian Standards International (ASI)............................................................................... 31
      2.2.4       German Standardization Body for Information Technologies (DIN) ................................... 31
      2.2.5       Italian Standardization Body for Information Technologies (UNINFO) .............................. 32
      2.2.6       Standards Norway (SN) ..................................................................................................... 32
      2.2.7       Spanish Association for Standardization (UNE) ................................................................. 33
      2.2.8       National Institute of Standards and Technology (NIST) – USA ......................................... 34
    2.3      Other Bodies .......................................................................................................................... 36
      2.3.1       Alliance for Internet of Things Innovation (AIOTI)............................................................ 36
      2.3.2       Cloud Security Alliance ..................................................................................................... 36
      2.3.3       Criminal Use of Information Hiding (CUIng) Initiative ...................................................... 37
      2.3.4       CSPCERT – European Cloud Service Provider Certification Working Group..................... 38
      2.3.5 Directorate-General for Communications Networks, Content and Technology (DG
      CONNECT) .................................................................................................................................... 39
      2.3.6       Estonian Information Security Authority ............................................................................ 39
      2.3.7       European Banking Federation (EBF).................................................................................. 40
      2.3.8       European Cyber Security Organization (ECSO) ................................................................. 41
      2.3.9       European Payments Council (EPC) .................................................................................... 44
      2.3.10 European Union Agency for Cybersecurity (ENISA) ......................................................... 45
      2.3.11 European Union Agency for Law Enforcement Cooperation (Europol) .............................. 46
      2.3.12 Financial Services Information Sharing and Analysis Center (FS-ISAC) ............................ 47
      2.3.13 G7 Cyber Expert Group ..................................................................................................... 48
      2.3.14 Institute of Electrical and Electronics Engineers (IEEE) ..................................................... 48

                                                                                                                                                    vi
CyberSec4Europe D8.3 Cybersecurity Standardization Engagement Plan

      2.3.15 Innovation and Networks Innovation Agency (INEA) ........................................................ 49
      2.3.16 Trusted Computing Group (TCG) ...................................................................................... 50
      2.3.17 ZKProof ............................................................................................................................ 51
3     Impact Upon CyberSec4Europe Objectives ................................................52
4     Conclusions, Recommendations and Next Steps .........................................55

List of Figures
Figure 1: Consortium members participating in SDOs and other standardization-related bodies ................2

List of Tables
Table 1: Brief summary of deliverable chapters ........................................................................................1
Table 2: Partners involvement in CEN/CENELEC ....................................................................................3
Table 3: Partners involvement in ETSI......................................................................................................6
Table 4: Milestones for ETSI T004 ...........................................................................................................7
Table 5: Partners involvement in ISO/IEC JTC 1/SC 27.......................................................................... 15
Table 6: Partners involvement in ISO/IEC JTC 1/SC 37.......................................................................... 15
Table 7: Partners involvement in ISO/PC 317 ......................................................................................... 16
Table 8: Partners involvement in ISO/TC 307 ......................................................................................... 16
Table 9: Partners involvement in ISO/TC 215 ......................................................................................... 17
Table 10: Partners involvement in ITU .................................................................................................. 23
Table 11: Partners involvement in IETF .................................................................................................. 25

                                                                                                                                                vii
CyberSec4Europe D8.3 Cybersecurity Standardization Engagement Plan

List of Acronyms

  A   AAA            Authentication, Authorization and Accounting
      API            Application Programming Interface
  C   CD             Committee Draft
      CEF            Connecting Europe Facility
      CEG            Cyber Expert Group
      CIM            Context Information Management
      CSA            Cloud Security Alliance
  D   DIS            Draft International Standard
      DSI            Digital Service Infrastructure
      DLT            Distributed Ledger Technologies
      DPM            Data Processing and Management
  E   EBF            European Banking Federation
      ECSO           European Cyber Security Organization
      ENISA          European Union Agency for Cybersecurity
      EPC            European Payments Council
      ETSI           European Telecommunications Standards Institute
      EUROPOL        European Union Agency for Law Enforcement Cooperation
  F   FDIS           Final Draft International Standard
  I   IEC            International Electrotechnical Commission
      IEEE           Institute of Electrical and Electronics Engineers
      IETF           Internet Engineering Task Force
      IIF            International Institute of Finance
      INEA           Innovation and Networks Innovation Agency
      IS             International Standard
      ISACA          Information Systems Audit and Control Association
      ISO            International Organization for Standardization
      ITU            International Telecommunications Union
  J   JTC            Joint Technical Committee
      JWG            Joint Working Group
  L   LAKE           Lightweight Authenticated Key Exchange
      LD             Linked Data
      LoRaWAN        Long Range Wide Area Network
      LSP            Large Scale Pilots
  M   MISP           Malware Information Sharing Platform
  N   NGSI           Next Generation Services Interface
      NIST           National Institute of Standards and Technology
  O   OBA            Open Banking Architecture

                                                                             viii
CyberSec4Europe D8.3 Cybersecurity Standardization Engagement Plan

      OMA            Open Mobile Alliance
      OASIS          Organization for the Advancement of Structured Information Standards
  P   PDTR           Preliminary Draft Technical Report
      PDTS           Preliminary Draft Technical Specification
  S   SDO            Standards Developing Organizations
      SEPA           Single Euro Payments Area
      SG             Study Group
  T   TEE            Trusted Execution Environment
      TCG            Trusted Computing Group
      TNC            Trusted Network Communications
      TPM            Trusted Platform Module
      TR             Technical Report
      TS             Technical Specification
  U   UNE            Spanish Association for Standardization
  W   W3C            World Wide Web Consortium (W3C)
      WD             Working Draft
      WG             Working Group
      WP             Work Package

List of Acronyms of Consortium Partners
  A   ABI            ABI LAB-CENTRO DI RICERCA E INNOVAZIONE PER LA BANCA
      AIT            AUSTRIAN INSTITUTE OF TECHNOLOGY GMBH
      ARCH           ARCHIMEDE SOLUTIONS SARL
      ATOS           ATOS SPAIN SA
  B   BBVA           BANCO BILBAO VIZCAYA ARGENTARIA SA*
      BRNO           MASARYKOVA UNIVERZITA
  C   C3P            UNIVERSIDADE DO PORTO
      CNR            CONSIGLIO NAZIONALE DELLE RICERCHE
      CONCEPT        CONCEPTIVITY SARL
      CTI            INSTITOUTO   TECHNOLOGIAS                YPOLOGISTONKAI            EKDOSEON
                     DIOFANTOS
      CYBER          CYBERNETICA AS
      DAWEX          DAWEX SYSTEMS
  D   DTU            DANMARKS TEKNISKE UNIVERSITET
      ENG            ENGINEERING - INGEGNERIA INFORMATICA SPA
  F   FORTH          FOUNDATION FOR RESEARCH AND TECHNOLOGY HELLAS
  G   GEN            COMUNE DI GENOVA
      GUF            JOHANN WOLFGANG GOETHE-UNIVERSITAT FRANKFURT AM MAIN
  I   I-BP           INFORMATIQUE BANQUES POPULAIRES

                                                                                              ix
CyberSec4Europe D8.3 Cybersecurity Standardization Engagement Plan

      ICITA          INTERNATIONAL CYBER            INVESTIGATION    TRAINING   ACADEMY
                     SDRUZHENIE
      ISGS           INTESA SANPAOLO SPA
  J   JAMK           JYVASKYLAN AMMATTIKORKEAKOULU
  K   KAU            KARLSTADS UNIVERSITET
      KUL            KATHOLIEKE UNIVERSITEIT LEUVEN
  N   NEC            NEC LABORATORIES EUROPE GMBH
      NTNU           NORGES TEKNISK-NATURVITENSKAPELIGE UNIVERSITET NTNU
  O   OASC           OPEN & AGILE SMART CITIES
  P   POLITO         POLITECNICO DI TORINO
  S   SIE            SIEMENS AKTIENGESELLSCHAFT
      SINTEF         SINTEF AS
  T   TDL            TRUST IN DIGITAL LIFE
      TLEX           TIME.LEX
      TUD            TECHNISCHE UNIVERSITEIT DELFT
  U   UCD            UNIVERSITY COLLEGE DUBLIN, NATIONAL UNIVERSITY OF IRELAND,
                     DUBLIN
      UCY            UNIVERSITY OF CYPRUS
      UM             UNIVERZA V MARIBORU
      UMA            UNIVERSIDAD DE MALAGA
      UMU            UNIVERSIDAD DE MURCIA
      UNILU          UNIVERSITE DU LUXEMBOURG
      UNITN          UNIVERSITA DEGLI STUDI DI TRENTO
      UPRC           UNIVERSITY OF PIRAEUS RESEARCH CENTER
      UPS-IRIT       UNIVERSITE PAUL SABATIER TOULOUSE III
  V   VAF            VaF, S. R. O.
       VTT           TEKNOLOGIAN TUKIMUSKESKUS VTT Oy

                                                                                     x
CyberSec4Europe D8.3 Cybersecurity Standardization Engagement Plan

1 Introduction
This Cybersecurity Stakeholder Engagement Plan provides a snapshot of engagement of the Consortium of
43 partners in standardization activities, their collaboration and relationships with standardization bodies.

It is recognized that although there are significant standardization activities of CyberSec4Europe
Consortium partners, which have a direct relationship with the objectives of the project, due to the long-
term nature of standardization efforts, many of these activities began well before the start of the
CyberSec4Europe pilot project and many will continue well beyond the life of the project, also ensuring a
legacy to the work that was done. However, at the same time there are important standardization activities
which would not have a direct link to the CyberSec4Europe objectives, but at the same time can be
considered critical for the future. As such, we have specifically noted those areas where there is a direct link
between standardization activities and the project objectives. The overall impact of the CyberSec4Europe
Consortium standardization efforts is significant now and well into the future. At the same time, the efforts
represent more than just the connection to the CyberSec4Europe project objectives, so therefore we have
taken the opportunity to include work efforts that are not directly linked as well. The result is that others
can benefit from this knowledge even at the early stage as sharing enables many to profit from these
opportunities. And furthermore, this demonstrates the depth and breadth of the capabilities and efforts
undertaken by our partners.

It is also important to note that CyberSec4Europe Deliverable 8.2 is a companion document to this
Deliverable 8.3, in that D8.2 addresses that linkages of standards to the different demonstrations and
elements and work within the CyberSec4Europe project. Such that D8.2 does map what is being done with
the relevant standards and thus the standardization work which is in this D8.3.

Table 1 below provides a brief summary of the content of this deliverable. While it is mainly a stocktaking
exercise it also contains comments on the strategic opportunities and challenges for Europe.

 Chapter             Title
                     Describes the involvement of Consortium partners in standardization activities and
 Chapter 2
                     related and pre-cursor activities

 Chapter 3           Impact upon CyberSec4Europe objectives

 Chapter 4           Conclusions
                                   Table 1: Brief summary of deliverable chapters

                                                                                                              1
CyberSec4Europe D8.3 Cybersecurity Standardization Engagement Plan

2 Landscape of Consortium Standardization Activities
Between March and June 2019, information was collected from all partners concerning their involvement
in standardization activities, specifically, the standards groups they participate in, their area of interest, the
ongoing activity and the focal point in each case. This was the basis for D8.1 – Cybersecurity
Standardization Engagement Plan.

Between July 2019 and January 2021, these standardization activities were further updated and include
information which relates the partner involvement to the objectives of the project.

Figure 1 contains a snapshot of the standards bodies and/or related organizations in which partners are
involved, including national standardization offices and “Other Bodies”, the latter of which have an indirect
impact on standardization (See Section 2.3).

                            Standardization Activities of the Consortium
                            Other Bodies
          National Standardization Bodies
                                     ISO
                                     ETSI
                           CEN/CENELEC
                                     IETF
                                     ITU
                                      IEC
                                   OASIS
                                    W3C

                                            0     2      4       6      8      10      12     14      16      18
                Figure 1: Consortium members participating in SDOs and other standardization-related bodies

2.1 Standardization Organizations
This section contains information on the main standardization organizations and activities that our partners
have indicated they participate in. A list of the working group(s)/committee(s) in which a partner of the
consortium is a member is provided, together with a brief explanation of the specific standard or area in
which a partner of the consortium is involved and the current status in that activity.

                                                                                                                   2
CyberSec4Europe D8.3 Cybersecurity Standardization Engagement Plan

2.1.1   CEN/CENELEC

          “The European Committee for Standardization (CEN) and the European Committee for
         Electrotechnical Standardization (CENELEC) are two distinct private international non-profit
         organizations based in Brussels.

         By setting common standards that are applied across the whole of the European single market,
         CEN and CENELEC ensure the protection of consumers, facilitate cross-border trade, ensure
         the interoperability of products, encourage innovation and technological development, include
         environmental protection and enable businesses to grow. Products and services that meet these
         European Standards (ENs) can be offered and sold in all of the participating countries.

         CEN and CENELEC bring together the national standards agencies of 34 countries.”

         (Extract from CEN/CENELEC web site.)

         Web site: www.cencenelec.eu/Pages/default.aspx

The Committee and Focus Group of CEN/CENELEC in which partners of the Consortium are involved are:

    •   CEN/CLC/JTC 13 “Cybersecurity and Data Protection” which has six Working Groups (WGs)
    •   CEN/CENELEC Focus Group on Blockchain and DLT which advises on EU technical
        requirements relating to blockchain and Distributed Ledger Technologies (DLT). The Focus Group
        does not develop standards.

  Committee                  Title                                                              Partners

  CEN/CLC/JTC 13             Cybersecurity and Data Protection                                  GUF

  Relation to CyberSec4Europe:
  CEN/CLC/JTC 13 is the Committee for Cybersecurity and Data Protection in CEN/CENELC. It is one
  of Europe’s fora for this topic and has strategic relevance for European standardization in the field.
  Hence it is important for e.g. WP 8 Standardization and all its tasks. More details can be found in Section
  2.1.1.1.

  Focus Group                CEN/CENELEC Focus Group on Blockchain and DLT                      NTNU

  Relation to CyberSec4Europe:
  The CEN/CENELEC Focus Group on Blockchain and DLT focused on preliminary investigations on
  blockchain and Distributed Ledger Technologies (DLT) in the context of European deployments and
  standardization. These results are relevant to the project, especially within the Task 3.2, where it is
  envisioned to investigate distributed access control using blockchain.
                                 Table 2: Partners involvement in CEN/CENELEC

The following describes the participation of each partner in the above-mentioned Committee and Focus
Group.

                                                                                                            3
CyberSec4Europe D8.3 Cybersecurity Standardization Engagement Plan

2.1.1.1    GUF
CEN/CLC/JTC 13
The Johann Wolfgang Goethe-Universitat Frankfurt am Main (GUF) participates in CEN/CLC/JTC 13
“Cybersecurity and Data Protection”. In general, the JTC and 4 of its WGs are mirroring the work of
ISO/IEC JTC 1/SC 27 (except SC 27/WG 2), but they have recently started their own initiatives as well,
either to produce guidelines to ISO/IEC standards or for specific projects, such as prEN 17529 on Data
protection and privacy by design and by default and a new Work Item proposal “Privacy Information
Management System per ISO/IEC 27701 – Refinements in European context” (in WG 5), often to underpin
European regulation with international or adaptation standards. On top of that WG 1 functions as “Chairman
advisory group” and WG 6 as group for “Product security”.

Current status:
Several SC 27 projects are in the process of being adopted, about 8 have already been adopted by the JTC
(including 27001, 29100, and 29134 (29134 originally handled by the previous JTC 8)) and are waiting for
CEN and CENELEC Board decision. Several CEN/CENELEC “own” projects are now also under work.

2.1.1.2    NTNU
Norges Teknisk-Naturvitenskapelige Universitet (NTNU) participates mainly in the CEN/CENELEC Focus
Group on Blockchain and DLT. This is a European Union-based Focus Group, to conduct the preliminary
investigations on blockchain and Distributed Ledger Technologies (DLT) in the context of European
deployments and standardization. The lifetime of this Group was limited to the end of 2020, and the
members have been migrated to ISO/TC 307. At the beginning of 2020, CEN/CLC/JTC 19 - Blockchain
and Distributed Ledger Technologies was created as a continuation of the Focus Group.

Current status:
The work of the Focus Group culminated in a publication of the official Blockchain and DLT whitepaper
that summarizes the current state-of-the-art as well as the standardization needs, risks, future directions, and
current problems and solutions in this space. The Focus Group was followed by the creation of the joint
technical committee for blockchain and DLT

2.1.2     European Telecommunications Standards Institute (ETSI)

           The European Telecommunications Standards Institute (ETSI) is a European Standards
           Organization (ESO). ETSI is the recognized regional standards body dealing with
           telecommunications, broadcasting and other electronic communications networks and services
           with more than 900 member organizations drawn from over 65 countries and five continents.

           Web site: https://www.etsi.org/

Partners are involved in the following groups:

                                                                                                              4
CyberSec4Europe D8.3 Cybersecurity Standardization Engagement Plan

  Study      Title                                                                      Partner
  Group                                                                                 involvement
  STF 561    Smart cities and communities: standardization to meet citizen and OASC
             consumer requirements

  Relation to CyberSec4Europe Objectives:
  The objective of this ETSI STF 561 was to prepare and develop an ETSI Technical Report (TR)
  identifying the requirements for citizen-related standardization in the area of Smart City development.
  The report identifies requirements for citizen-related standardization in the area of Smart-City
  development which are closely linked to CyberSec4Europe and WP5, Task 5.7 (Smart City Pilot). The
  report provides an overview of citizen and city requirements with specific recommendations to
  cybersecurity.
  TC         Technical Committee on Cyber Security                                      AIT
  CYBER
  Relation to CyberSec4Europe:
  TC CYBER focuses on the standardization of security solutions for reliable and secure network
  infrastructure, privacy and data protection mechanisms, IoT security, support to EU legislation,
  quantum-safe cryptography, and related aspects, thereby following a market-driven approach. The focus
  of TC CYBER is thus directly aligned with the ambitions of CyberSec4Europe to meet next generation
  cybersecurity challenges of the Member States, and to increase the resilience of European society
  against cyber risks. In particular the market-driven approach of ETSI guarantees for a near-term to mid-
  term impact on the expertise and findings of CyberSec4Europe on a broad scale.

  ISG        Industry Specification Group Context Information Management                UMU
  CIM
  The purpose of this Work Item is to provide a state-of-the-art assessment of security and privacy issues
  associated with ISG CIM specifications, in particular related to the API, Data Publishing Platforms and
  Data Model Work Items. The WG focuses on several issues that need to be addressed, including but not
  limited to provenance of data, assuring privacy and security between stakeholders, assuring trust,
  understanding how to ensure the aggregation of data does not increase the attack space or compromise
  privacy.

  Relation to CyberSec4Europe:
  The work of this group is related to the WP5, Task 5.6 and the deployment of security for smart city
  and IoT solutions the contribution of CS4E focused on the security and privacy aspects of the NGSI-
  LD models.

  T004      Specialist Testing Taskforce T004 (ISG CIM)                           OASC
  OASC is part of the ETSI T004 which has the objective to produce a conformance test suite for the
  NGSI-LD API (see ISG CIM) specification and a testing environment to execute and validate the test
  cases.
  Relation to CyberSec4Europe:
  The work of this Testing Taskforce T004 is related to the overall objective of CyberSec4Europe, i.e. to
  pave the way for a sustainable cybersecurity ecosystem through the development and pilot operation of
  a feasible governance model for a Cybersecurity Competence Network thoroughly tested through

                                                                                                             5
CyberSec4Europe D8.3 Cybersecurity Standardization Engagement Plan

      Study        Title                                                                    Partner
      Group                                                                                 involvement
      successful pilot projects addressing important industrial challenges in the areas of smart cities.
      Specifically, the T004 activities are related to the WP5, Task 5.6 and the deployment of security for
      smart city and IoT solutions the contribution of CS4E focused on the security and privacy aspects of the
      NGSI-LD models. T004 particularly contributes to Technical Objective 3 as it provides a testing and
      certification services to the smart city community linked to the work on ISG CIM.
      ISG             Industry Specification Group for Network Functions Virtualization        POLITO
      NFV
      Relation to CyberSec4Europe:
      The work of ISG NFV is relevant to WP3 and WP4 because it develops architectures, reference models,
      and prototypes for NFV in general, including the security aspects. As such, it relevant for the project for
      the aspects related to network security and automatic management of network-based security controls.
                                            Table 3: Partners involvement in ETSI

The following describes the participation of each partner in the above-mentioned committees and groups:

2.1.2.1         AIT
The Austrian Institute of Technology GGMBH (AIT) participates in TC CYBER, which is the most
security-focused technical committee within ETSI. The committee works with stakeholders to increase
privacy and security for citizens and organizations in Europe and beyond. As explained in Table 3, TC
CYBER covers aspects like cyber security ecosystems, IoT security, critical infrastructures, or personal data
protection and cryptography.

AIT contributed webinar talks on the standardization efforts of ETSI towards attribute-based encryption and
post-quantum cryptography in the “Even More Advanced Cryptography” track at the ETSI virtual Security
Week 2020. Furthermore, AIT experts provided comments and feedback on the current draft technical report
ETSI TR 103 616 on “Quantum Safe Signatures”. This activity is also related to WP2, Task 3.2, which
among others investigates technologies providing long-term integrity guarantees.

All contributions to TC CYBER are performed in close collaboration with, and under the lead of, the ECSEL
Joint Undertaking SECREDAS1.

2.1.2.2         BBVA
Banco Bilbao Vizcaya Argentaria SA (BBVA) has been in contact with ETSI to explore future
collaborations and they have also invited ETSI to participate in a cloud stakeholder plenary session for them
to present ETSI and to explain the challenges and solutions they see with certifications in Europe, but BBVA
is currently not a member of ETSI.

1
    https://secredas-project.eu/

                                                                                                                    6
CyberSec4Europe D8.3 Cybersecurity Standardization Engagement Plan

2.1.2.3   OASC
ETSI STF 561:
As a representative of 156 cities and communities in Europe and beyond, Open & Agile Smart Cities
(OASC) has participated in ETSI STF 561: “Smart cities and communities: standardisation to meet citizen
and consumer requirements”. In this STF 561, OASC has the role of Advisory Group Member to the Special
Task Force with the ambition to highlight critical aspects for consideration from the point of view of the
city concerning interoperability of data and services as well as cybersecurity linked to the specific pilot
operations of CyberSec4Europe.

In September 2020, ETSI STF 561 has published the final report which is available onlinei. The report
highlights, among other critical aspects for smart cities, the needs of citizens for protecting data and
safeguarding ethical values to data management and protection of personal data. The report highlights the
need for the work carried out by the smart city pilot in Task 5.7, and specifically recommends to:

    1. “Provide guidance for cities, oriented towards protection of the citizen, on security measures to be
       implemented across the city, and for individual services
    2. Provide guidance to city personnel who have legitimate access to city services and technology, to
       protect citizen security, including staff training and a code of good practice for management
    3. Review physical security arrangements by cities in the context of the vulnerabilities these create for
       city services, and the requirements to ensure the safety and security of citizens.“

ETSI T004:
ETSI has set up a specialist testing task force for ISG CIM with the goal to produce a conformance test suite
for this NGSI-LD API specification and a testing environment to execute and validate the test cases which
will be of relevance for the smart city pilot activities (WP5, Task 5.7). Recently, in June 2020, the first
Milestone has been achieved. The work will be concluded in March 2021 (see Table 4 below)

 Code              Task / Milestone                                            Target Date
                                                                               From       To
                   Progress Report approved by ISG CIM                         May 2020 Jul 2020
 Milestone A
                   D1-1, D1-2 and D2 Drafts V1.0.1 accepted by ISG CIM
                   Progress Report approved by ISG CIM                                      Dec 2020
 Milestone B
                   D3 and D4 Draft V1.0.1 accepted by ISG CIM
                   Final Report and D1, D2, D3, D4 and D5 Final                             Jan 2021
 Milestone C
                   Drafts approved by ISG CIM
                   D1-1, D1-2, D2, D3, D4 and D5 published and TTF                          Mar 2021
 Milestone D
                   closed
                                       Table 4: Milestones for ETSI T004

                                                                                                           7
CyberSec4Europe D8.3 Cybersecurity Standardization Engagement Plan

2.1.2.4   UMU
Universidad de Murcia (UMU) is working in the ETSI Industry Specification Group for cross-cutting
Context Information Management (ISG CIM). This group has released the NGSI-LD API, an extension of
the Next Generation Services Interface (NGSI) provided by Open Mobile Alliance (OMA) which has been
extended to support linked data (LD). The main activity of UMU in this work is related to security and
privacy. The goal of this activity is to introduce these considerations from the point of view of the
information itself. Currently, Juan A. Martinez, is rapporteur for the WI-007-SECii of this group.

Current status:
Regarding the work on the ISG-CIM, UMU is actively collaborating in this Working Group by attending
regular meetings, as well as the development of Work Item 007. There has been a second release of this
document in which different security and privacy mechanisms such as authentication, authorization and
confidentiality have been considered. Additionally, UMU is working on using the current NGSI-LD
vocabulary as a means to represent security properties that can be associated to entities represented using
NGSI-LD.

2.1.2.5   POLITO
Politecnico di Torino (POLITO) is working on the security aspects of network functions within the ETSI
Industry Specification Group for Network Functions Virtualization. More specifically, the emphasis of the
work of POLITO is in trust and integrity verification of software-defined infrastructures. As POLITO is not
a full member of ETSI, it works in cooperation with Telefonica and Hewlett-Packard and participates in
meetings upon their invitation.

                                                                                                         8
CyberSec4Europe D8.3 Cybersecurity Standardization Engagement Plan

2.1.3   International Organization for Standardization (ISO)

         The International Organization for Standardization (ISO) is based in Geneva, Switzerland, and
         is an independent, non-governmental international organization with a membership of 165
         national standards bodies. and 783 technical committees and subcommittees to take care of
         standards development.

         Together with IEC, it is operating the Joint Technical Committee (JTC) 1 “Information
         Technology”, which in turn has several subcommittees, eg. SC 27 and SC 37.

         The scope of ISO/IEC JTC 1/SC 27 is the development of standards for the protection of
         information and ICT. This includes generic methods, techniques and guidelines to address both
         security and privacy aspects, such as Security requirements capture methodology, management
         of information and ICT security, cryptographic and other security mechanisms, security aspects
         of identity management, biometrics and privacy, conformance assessment, accreditation and
         auditing requirements in the area of information security management systems, security
         evaluation criteria and methodology.

         The scope of ISO/IEC JTC 1/SC 37 is the Standardization of generic biometric technologies
         pertaining to human beings to support interoperability and data interchange among applications
         and systems. Generic human biometric standards include for instance Biometric application
         programming interfaces, Biometric data interchange formats,

             •    Application of evaluation criteria to biometric technologies.
             •    The mission of ISO/IEC JTC 1/SC 37 is to ensure a comprehensive and high priority,
                  worldwide approach for the development and approval of international biometric
                  standards

         Web site: www.iso.org

Partners of the Consortium are involved in the following committees:

    •   ISO/IEC JTC 1/SC 27 “Information Security, cybersecurity and privacy protection” and ISO/IEC
        JTC 1/SC 37 “Biometrics” which are subcommittees of the Joint Technical Committee ISO/IEC
        JTC 1 of the International Organization for Standardization (ISO) and the International
        Electrotechnical Commission (IEC). SC 27 aims at developing standards for the protection of
        information and ICT.
            o SC 27 currently has published 198 ISO/IEC standards (includes updates), 86 ISO/IEC
                standards are under development (includes updates); there are 48 participating members
                and 32 observing members from all over the world.iii

                 In the February and October 2020 general meetings of CyberSec4Europe, we discussed
                 how the partners can contribute to commenting on the standard projects using the methods
                 that ISO/IEC JTC 1/SC 27 uses. We decided on the following procedure. We will share the
                 names of the standards in WG 2 and WG 5 and their scope with all the project partners.
                 Then, we will make the standard drafts available on request and we will consolidate the
                 received comments. Then, we will send these to the list for partners to review and agree
                 upon (as our contribution needs to be commonly accepted within the project). If there are
                 disputes, we will hold a meeting to resolve any issues. If a unanimous solution cannot be

                                                                                                        9
CyberSec4Europe D8.3 Cybersecurity Standardization Engagement Plan

               found, the comments under question will not be sent to the editors of the standard. Even
               though the liaison organizations are not required to, we will endeavor to send the comments
               by the date that the comments from national bodies are due (these dates differ for different
               WGs and different standard projects) to have a higher rate of acceptance of comments.

           o   SC 37 currently has published 131 ISO/IEC standards (includes updates), 31 ISO/IEC
               standards are under development (includes updates); there are 28 participating members
               and 20 observing members.iv

   •   ISO/PC 317 “Consumer protection: privacy by design for consumer goods and services” currently
       with 15 participating members and 25 observing members. There is one ISO standard under
       development.v
   •   ISO/TC 307 “Blockchain and distributed leger technologies” currently has published 3 ISO
       standards, 10 ISO standards are under development; there are 44 participating members and 13
       observing members.vi
   •   ISO/TC 215 “Health informatics” currently has published 201 ISO standards (includes updates),
       has published 67 ISO standards (includes updates); there are 28 participating members and 35
       observing members.vii

Table 5 to Table 9 provide a breakdown of the committees, Working Groups and involvement of each
partner.

                                                                                                        10
CyberSec4Europe D8.3 Cybersecurity Standardization Engagement Plan

 Technical Committee/ Sub-    Title of Committee/                       Partners   Related Vertical
 Committee/Committee/         Identification Number and title of        involved   and/or WP Task
 Study Group                  standard
 ISO/IEC JTC 1/SC 27          Information Security, cybersecurity and
                              privacy protection
 ISO/IEC JTC 1/SC 27/WG 1                                               ATOS       WP3, Tasks T3.2,
                                                                                   T3.4
                              Information security management                      WP5, Tasks 5.4,
                              systems                                              T5.6

                              ISO/IEC 27005:2018                        ATOS       WP3, Tasks T3.4,
                                                                                   T3.5,
                              Information security risk management
                                                                                   WP5, Task T5.4

                              ISO/IEC 27010:2015                        ATOS       WP3, Tasks T3.4,
                                                                                   T3.5,
                              Information security management for
                                                                                   WP5, Task T5.4
                              inter-sector and inter-organizational
                              communications
 ISO/IEC JTC 1/SC 27/WG 2     Cryptography and security mechanisms      AIT,       WP3, Task T3.2,
                                                                        CYBER      WP5, Task T5.3

                              ISO/IEC 19592-1:2016 Secret sharing,      CYBER      WP3, Task T3.2
                              Part 1: General
                              ISO/IEC 19592-2:2017 Secret sharing –     AIT,       WP3, Task T3.2
                              Part 2: Fundamental Mechanisms            CYBER

                              ISO/IEC DIS 23264-1:                      CYBER      WP3, Tasks T3.2,
                              Redaction of Authentic Data – Part 1:                WP5, Task T5.3
                                                                        AIT
                              General
                              ISO/IEC CD 23264-2 Redaction of           AIT        WP3, Tasks T3.2,
                              Authentic Data – Part 2: Schemes based               WP5, Task T5.3
                              on asymmetric mechanisms
                              ISO/IEC DIS 20009-3:                      AIT        WP3, Tasks T3.2,
                                                                                   WP5, Task T5.3
                              Anonymous entity authentication – Part
                              3: Mechanisms based on blind
                              signatures

                              ISO/IEC WD 4922-1:                        AIT,       WP3, Task T3.2
                                                                        CYBER
                              Secure multiparty computation – Part 1:
                              General
                              ISO/IEC WD 4922-2:                        AIT,       WP3, Task T3.2
                                                                        CYBER
                              Secure multiparty computation – Part 2:
                              Mechanisms based on secret sharing

                                                                                                 11
CyberSec4Europe D8.3 Cybersecurity Standardization Engagement Plan

 Technical Committee/ Sub-    Title of Committee/                         Partners   Related Vertical
 Committee/Committee/         Identification Number and title of          involved   and/or WP Task
 Study Group                  standard
                              ISO/IEC WD 20008-2 AMD2:                    AIT        WP3, Tasks T3.2,
                                                                                     WP5, T5.3
                              Anonymous digital signatures – Part 2:
                              Mechanisms using a group public key –
                              Amendment 2

 ISO/IEC JTC 1/SC 27/WG 3     Security evaluation, testing and            NTNU,      WP 7, T7.1 T7.3
                              specification                               GUF        WP 7

 ISO/IEC JTC 1/SC 27/WG 4     Security controls and services              GUF        WP 5
                              ISO/IEC CD 20547-4                          GUF        WP3, Tasks T3.2,
                                                                                     T3.7
                              Big data reference architecture – Part 4:
                              Security and Privacy                                   WP5, Task T5.3
 ISO/IEC JTC 1/SC 27/WG 5     Identity management and privacy             AIT,       WP3, Tasks T3.2,
                              technologies                                ATOS,      T3.3, T3.7
                                                                          CYBER,
                                                                                     WP5, Tasks T5.3,
                                                                          GUF,
                                                                                     T5.6, T5.7
                                                                          NTNU
                                                                                     WP 8, all Tasks
                              ISO/IEC 17922:2017                          GUF        WP3, Tasks T3.2,
                              Telebiometric authentication framework                 T3.7
                              using biometric hardware security
                                                                                     WP5, Task T5.3
                              module

                              ISO/IEC 20889:2018                          GUF        WP3, Tasks T3.2,
                                                                                     T3.7
                              Privacy enhancing data de-identification
                              terminology and classification of                      WP5, Task T5.3
                              techniques
                              ISO/IEC 24745:2011                          GUF        WP3, Tasks T3.2,
                                                                                     T3.7
                              Biometric information protection
                                                                                     WP5, Task T5.3
                              ISO/IEC 24760-1:2011, 2019                  GUF        WP3, Tasks T3.2,
                                                                                     T3.7
                              A framework for identity management –
                              Part 1: Terminology and concepts                       WP5, Task T5.3
                              ISO/IEC 24760-2:2015                        GUF        WP3, Tasks T3.2,
                                                                                     T3.7
                              A framework for identity management –
                              Part 2: Reference architecture and                     WP5, Task T5.3
                              requirements
                              ISO/IEC 24760-3:2016                        GUF        WP3, Tasks T3.2,
                                                                                     T3.7

                                                                                                   12
CyberSec4Europe D8.3 Cybersecurity Standardization Engagement Plan

 Technical Committee/ Sub-    Title of Committee/                         Partners   Related Vertical
 Committee/Committee/         Identification Number and title of          involved   and/or WP Task
 Study Group                  standard
                              A framework for identity management –                  WP5, Task T5.3
                              Part 3: Practice
                              ISO/IEC DTS 27006-2
                                                                          GUF        WP3, Tasks T3.2,
                              Requirements for bodies providing audit                T3.7
                              and certification of information security
                                                                                     WP5, Task T5.3
                              management systems – Part 2: Privacy
                              information management systems

                              ISO/IEC 27550:2019                          GUF        WP3, Tasks T3.2,
                                                                                     T3.7
                              Privacy engineering for system life cycle
                              processes                                              WP5, Task T5.3
                              ISO/IEC DIS 27551                           AIT,       WP3, Tasks T3.2,
                                                                          GUF        T3.7
                              Requirements for attribute-based
                              unlinkable entity authentication                       WP5, Task T5.3

                              ISO/IEC 27701:2019 (was 27552)              GUF        WP3, Tasks T3.2,
                                                                                     T3.7
                              Extension to ISO/IEC 27001 and
                              ISO/IEC 27002 for privacy management                   WP5, Task T5.3
                              – Requirements and guidelines

                              ISO/IEC CD 27553                            GUF        WP3, Tasks T3.2,
                                                                                     T3.7
                              Security requirements for authentication
                              using biometrics on mobile devices                     WP5, Task T5.3
                              ISO/IEC WD 27554                            GUF        WP3, Tasks T3.2,
                                                                                     T3.7
                              Application of ISO 31000 for
                              assessment of identity management-                     WP5, Task T5.3
                              related risk

                              ISO/IEC DIS 27555                           GUF        WP3, Tasks T3.2,
                                                                                     T3.7
                              Establishing a PII deletion concept in
                              organizations                                          WP5, Task T5.3
                              ISO/IEC CD 27556                            GUF        WP3, Tasks T3.2,
                                                                                     T3.7
                              User-centric framework for the handling
                              of personally identifiable information                 WP5, Task T5.3
                              (PII) based on privacy preferences

                              ISO/IEC WD 27557                            GUF        WP3, Tasks T3.2,
                                                                                     T3.7
                              Organizational privacy risk management
                                                                                     WP5, Task T5.3

                                                                                                   13
CyberSec4Europe D8.3 Cybersecurity Standardization Engagement Plan

 Technical Committee/ Sub-    Title of Committee/                        Partners   Related Vertical
 Committee/Committee/         Identification Number and title of         involved   and/or WP Task
 Study Group                  standard
                              ISO/IEC WD 27559                           GUF,       WP3, Tasks T3.2,
                                                                         CYBER      T3.3, T3.7
                              Privacy enhancing data de-identification
                              framework                                             WP5, Task T5.3
                              ISO/IEC WD 27560                           GUF        WP3, Tasks T3.2,
                                                                                    T3.7
                              Consent record information structure
                                                                                    WP5, Task T5.3
                              ISO/IEC NP TS 27561                        GUF        WP3, Tasks T3.2,
                                                                                    T3.7
                              Privacy operationalisation model and
                              method for engineering (POMME)                        WP5, Task T5.3
                              ISO/IEC NP 27562                           GUF        WP3, Tasks T3.2,
                                                                                    T3.7
                              Privacy guidelines for fintech services
                                                                                    WP5, Task T5.3

                              ISO/IEC TS 29115:2013                      ATOS,      Tasks T3.2 and
                                                                         AIT,       T5.3.
                              Entity authentication assurance
                                                                         GUF
                              framework

                              ISO/IEC 29134:2017                         GUF        WP3, Tasks T3.2,
                                                                                    T3.7
                              Privacy impact assessment –
                              methodology                                           WP5, Task T5.3
                              ISO/IEC 29146:2016                         GUF        WP3, Tasks T3.2,
                              A framework for access management                     T3.7
                                                                                    WP5, Task T5.3

                              ISO/IEC 29151:2017                         GUF        WP3, Tasks T3.2,
                                                                                    T3.7
                              Code of practice for PII protection
                                                                                    WP5, Task T5.3
                              ISO/IEC 29190:2015                         GUF        WP3, Tasks T3.2,
                                                                                    T3.7
                              Privacy capability assessment model
                                                                                    WP5, Task T5.3
                              ISO/IEC 29191:2012                         GUF        WP3, Tasks T3.2,
                                                                                    T3.7
                              Requirements for partially anonymous,
                              partially unlinkable authentication                   WP5, Task T5.3
                              ISO/IEC DIS 29184:2019                     GUF        WP3, Tasks T3.2,
                                                                                    T3.7
                              Online privacy notice and consent
                                                                                    WP5, Task T5.3

                                                                                                  14
CyberSec4Europe D8.3 Cybersecurity Standardization Engagement Plan

 Technical Committee/ Sub-       Title of Committee/                                 Partners   Related Vertical
 Committee/Committee/            Identification Number and title of                  involved   and/or WP Task
 Study Group                     standard
 Relation to CyberSec4Europe:
 Several projects in SC 27 are related to WPs and tasks in CyberSec4Europe. The respective standards help
 to describe the state of the art. New results and from CyberSec4Europe can be integrated into new and
 revised standards.
 This subcommittee works on standards of information security, cybersecurity and privacy protection. These
 topics are all relevant to the objectives of CyberSec4Europe. ISO/IEC JTC 1/SC 27 is dedicated to the
 development of standards for the protection of information and ICT, including information security
 management systems (WG 1), cryptography (WG 2), security evaluation, testing and specification (WG 3),
 security controls and services (WG 4), and identity management and privacy technologies (WG 5). The
 relation to CyberSec4Europe in particular includes the following aspects:
     •   WG 1 (Information security management systems) manages one of the most used information
         security standards: ISO/IEC 27001 and its companions, including ISO/IEC 27005, which deals with
         information security risk management. Several of the developed assets in WP 3 and WP 5 deal with
         risk assessment and management, so this is an important source of information.
     •   WG 2 (Cryptography and security mechanisms) provides standardization for the cryptographic and
         security mechanisms that are the building blocks for most assets included in WP3 and WP 5. The
         standardization of cryptographic mechanisms is of crucial importance to increase the reliability,
         interoperability, and security of cyber security solutions. WG2 provides a platform to standardize
         advanced cryptographic mechanisms (e.g., redactable signatures, group- and ring signatures, secure
         multi-party computation) investigated in particular within T3.2. For example, the Sharemind
         (CYBER) asset from Task 3.2 uses multi-party computation based on secret sharing which is
         currently under standardization in WG2.
     •   WG 5 (Identity management and privacy technologies) is dedicated to identity management and
         privacy technologies and is therefore directly related to cryptographic protocols developed within
         WP3, Task 3.2 as well as on the CyberSec4Europe demonstrator on privacy-preserving identity
         management (WP5, Task 5.3), Task 5.6 (medical data exchange), Task 5.7 (smart cities).
         Furthermore, the ambition of WG5 is directly linked to the CyberSec4Europe objective to increase
         the security and privacy of end users in an increasingly interconnected world.
                              Table 5: Partners involvement in ISO/IEC JTC 1/SC 27

 Technical Committee/ Sub-       Title of Committee                                  Partners   Related Vertical
 Committee/Committee/Study                                                           involved   and/or WP Task
 Group
 ISO/IEC JTC 1/SC 37             Biometrics

 ISO/IEC JTC 1/SC 37/WG 3        Biometric Data Interchange Formats                  NTNU       WP3, Task 3.6
 Relation to CyberSec4Europe:
 ISO/IEC JTC 1/SC 37 focuses on the Standardization of biometric technologies to support interoperability
 and data interchange among applications and systems. This is directly related with WP3, Task 3.6, which
 among others focuses on specifying a unified validation framework to test both usability and security
 requirements of biometric-based and multi-modal user authentication mechanisms.
                              Table 6: Partners involvement in ISO/IEC JTC 1/SC 37

                                                                                                                15
CyberSec4Europe D8.3 Cybersecurity Standardization Engagement Plan

 Technical Committee/ Sub-     Title of Committee/                              Partners   Related Vertical
 Committee/Committee/Stu       Identification Number and title of standard      involved   and/or WP Task
 dy Group
 ISO/PC 317                    Consumer protection: privacy by design for       GUF        WP3, Tasks T3.2,
                               consumer goods and services                                 T3.7
                                                                                           WP5, Task T5.3
                                                                                           WP 8, all tasks
 Relation to CyberSec4Europe:
 Project Committee ISO/PC 317 works on ISO CD 31700 Consumer protection — Privacy by design for
 consumer goods and services. This is relevant for e.g. WP3, Tasks T3.2, T3.7 and WP5, Task T5.3, but also
 WP 8 and its tasks
                                  Table 7: Partners involvement in ISO/PC 317

 Technical Committee/ Sub-     Title of Committee/                              Partners    Related Vertical
 Committee/Committee/Stu       Identification Number and title of standard      involved    and/or WP Task
 dy Group
 ISO/TC 307                    Blockchain and distributed leger                 NTNU
                               technologies

 ISO/TC 307/WG 1               Foundations                                      NTNU        WP3, Task 3.2
 ISO/TC 307/WG 2               Security, privacy and identity                   NTNU        WP3, Task 3.2
 ISO/TC 307/WG 3               Smart contracts and their applications           NTNU        WP3, Task 3.2

 ISO/TC 307/WG 5               Governance                                       NTNU        WP3, Task 3.2
 ISO/TC 307/SG 2               Use cases                                        NTNU        WP3, Task 3.2
 ISO/TC 307/SG 7               Interoperability of blockchain and               NTNU        WP3, Task 3.2
                               distributed ledger technology systems
 Relation to CyberSec4Europe:
 This is the international committee for standardization in the blockchain and DLT space. The work goes on
 in multiple study and working groups, as described above. The work of the committee is relevant to the
 project and vice versa, especially within WP3, Task 3.2, where it is envisioned to investigate distributed
 access control using blockchain, addressing applications in IoT and investigate approaches that achieve
 extreme privacy- and integrity-preserving storage and processing of critical data with long-term protection
 requirements.
                                  Table 8: Partners involvement in ISO/TC 307

                                                                                                         16
CyberSec4Europe D8.3 Cybersecurity Standardization Engagement Plan

 Technical Committee/ Sub-     Title of Committee/                              Partners   Related Vertical
 Committee/Committee/Stu       Identification Number and title of standard      involved   and/or WP Task
 dy Group
 ISO/TC 215                    Health Informatics
 ISO/TC    215       IEC/SC Safe, effective and secure health software          UCD        T5.6
 62A/JWG 7                  and health IT systems, including those
                            incorporating medical devices

 IEC 80001-1:2010              Application of risk management for IT-           UCD        T5.5, T3.5
                               networks incorporating medical devices –
                               Part 1: Roles, responsibilities and activities

 ISO TR 80001-2-7:2015         Application of risk management for IT-           UCD        T5.5, T3.5
                               networks incorporating medical devices –
                               Application guidance – Part 2-7: Guidance
                               for healthcare delivery organizations
                               (HDOs) on how to self-assess their
                               conformance with IEC 80001-1
 ISO/IEC Study Group           Societal and Human Factors in IoT Based          ARCH
                               Services
 Relation to CyberSec4Europe:
 The objective of ISO/TC 215 IEC/SC62A/JWG7 is to identify standards for the development of secure
 software in the area of health informatics. This objective is directly linked to CyberSec4Europe and Task5.6
 (Medical Data Exchange Pilot). The latter aims to identify requirements and security best practices for
 exchange of data collected using medical devices.
 The objectives of the IEC 80001-1:2010 and ISO TR 80001-2-7:2015 are to respectively apply and assess
 conformance of risk management to networks incorporating medical devices. This objective is directly
 linked to WP3, Task 3.5 of CyberSec4Europe which partly aims to explore an approach to adapt risk
 assessment activities depending on varying contextual factors. Also, the report produced in these standards
 will inform the activities of WP5, Task 5.5 (Maritime Transport Pilot) which aims to provide a risk
 assessment approach in networks of communicating vessels.
 The objective of this ETSI STF 561 was to prepare and develop an ETSI Technical Report (TR) identifying
 the requirements for citizen-related standardization in the area of Smart City development. The report
 identifies requirements for citizen-related standardization in the area of Smart-City development which are
 closely linked to CyberSec4Europe and WP5, Task 5.7 (Smart City Pilot). The report provides an overview
 of citizen and city requirements with specific recommendations to cybersecurity.
                                  Table 9: Partners involvement in ISO/TC 215

                                                                                                        17
You can also read