ICT-Innovation How digital sovereignty and it-security can help pushing Europe forward Prof. Reinhard POSCH reinhard.posch@cio.gv.at
DIGIT GITAL AL SO SOVERE EREIG IGNTY NTY – HOW IS S IT EN ENDAGE GERED RED juri risdi sdiction ction awar are e IT and d communica unication tion switc tching ing mobile le connections nections – floating ting cros oss s jurisdiction isdiction to redu duce ce cost push h noti tifica ication tion – always s on a leash sh cloud ud stor orage e – do we have e to fear ar about ut IPR docume cument nt colla labor boration tion – in the e cloud ud as you type certif tific icates tes and upda dates tes – who o contr trols s what t you use DEMOCRA OCRATIC TIC MODE ODEL L – GO GOVERA ERANCE NCE BY HUGE GE COM OMPANIES ANIES
SA SAFE FE HA HARB RBOR OR SAFE HARB RBOR OR
DIGITAL : AUSTRIA E ID ID – S ECURITY – MOBILE D EVICES CLOUD IS OF NTY - future IGNT - challenge storage ID – BASIS documents - collaboration SOVEREIG WEB SERVICES Tablet Handy Laptop PC ... eID identification signature encryption security services
DIGITAL : AUSTRIA BIG PLAYER IN THE CLOUD – EU LEGISLATION CLOUD o eIDaS assigns control on electronic identity and supervision to member states not to cloud provider o technical and legal schemes with big PUBLIC CLOUDs need adjustments to comply with technical and legal requirements
DIGITAL : AUSTRIA no se securit ity wit ithout id identit ity before defending interests we need to know and identify the partners o multi factor identification o crypto based identification o robust against replay o simple for users o broad acceptance
DIGITAL : AUSTRIA STORK – the root of f EU eID ID o assuming minimum security o mutual recognition – technology, legal o Interoperability – protocol o for administration and private sector model for eIDaS
NO O SECURITY RITY WITHOUT THOUT HRDWAR WARE NO O SO SOVEREI EREIGNTY GNTY W/O O HW W SU SUPP PPOR ORT
DIGITAL : AUSTRIA BASIC NEEDS MUST NOT FADE AWAY WITH CLOUD o user and services need to know about jurisdictions for data in rest and in transit NOT YET EVIDENT IN PRACTICAL SITUATIONS o user and services need to make sure that they are the only ones having access to content IMPORTANCE BECAME EVIDENT ALONG WITH RECENT SITUATIONS o law enforcement and interception may be needed on a national level STILL UNSOLVED AND HARDLY EVER DISCUSSED FOR GOVERNMENT DATA CROSS BORDER
DIGITAL : AUSTRIA PROVIDER INFRASTRUCTURE ENHANCEMENTS JURISDICTION MATTERS WITH LIABILITY DNSSEC + TLS w CLIENT CERTIFICATE COMPULRORY SECURITY SUITES o users need to keep control and possibly choice o relevant jurisdictions to be known at the time of communication o availability at all services to allow taking advantage o needed to assign responsibilities
DIGITAL : AUSTRIA CLOUD : COMMUNICATION AND TRUST ADMINISTRATION SMEs EDUCATION (GOV) CLOUD BYOD = existing devices, PCs, laptops, tablets... HTML5 WEBSERVICES Open DATA SSO AVOID LOCAL MINIMUM FOCUS ON WEBAPPS PROCESSING AND DEVICE PROPERTIES STORAGE e.g: SAP DOCS MAIL/CAL ... Specific APPS SECURITY SERVICES ... STORAGE
DIGITAL : AUSTRIA CRYPTO and CLOUD NATIONAL USABILITY AND INTERESTS HNDLING CONVENIENCE COMPLEXITY RESEARCH CRYPTO UNDER OPEN NATIONAL CRYPTO FOR CLOUD PROBLEMS / COMPANY CONTROL EUROPE COULD PLAY A COMPETENT ROLE COST/EFFICIENCY
DIGITAL : AUSTRIA TECHNOLOGY – PRODUCTS – RULE LES implementation – cycle innovation regulation standards product } } industry pushing Industry to care to avoid hurdles for an as short as possible interval who empowers users to be able to minimize the time to standards??
DIGITAL : AUSTRIA CLOUD AND RISK attack potential CLOUD damage = probability * value protection PROVISIONING USER
in inno novatio tion n and nd dig igit ital al sover ereign eignty ty in indust ustry ry taking ing in inno novati tion on to o product oducts avoidi oiding ng the he sell lling ing to o over erseas seas in indus ustry try 4.0 .0
Data protection? Security? Applications? Sovereignty? SOFTWARE HARDWARE
DIGITAL : AUSTRIA THE FUTURE OF DOCUMENTS EDITING DOCUMENTS THE CHANGE IS ON THE WAY WHAT DOES THIS MEAN TO OTHER SYSTEMS ?
DIGITAL : AUSTRIA documents – coll llaboration CLOUD group key(doc) documents security - service
DIGITAL : AUSTRIA U SE SER – G OVERNANCE – C ONTROL security - service CLOUD Reduced Risk Content identity mobility
DIGITAL : AUSTRIA R EDUCED R ISK ISK C ONTENT key per document security - service REDUCED RISK CONTENT CONTENT document per key key(Doc i ) ≠ key(Doc j ) falls i ≠ j
DIGITAL : AUSTRIA R EDUCED R ISK ISK C ONTENT calendar ( … tasks) SMIME mail SMIME documents SMIME collaboration ?????? security has to be bound to identity in all cases! identity
DIGITAL : AUSTRIA TTIP IP – SAFE HARBOR TTIP – WILL THE PUZZLE FIT? WHAT NOW we certainly need a closer look chaos or chance?
SECURITY= STRENGTH * TAKE-UP If we miss out on one – we loose If we loose this formula – we loose the game
Recommend
More recommend