Lange - Industrial Data Space – Digital Sovereignty over Data
Digital Sovereignty
Transcript of Digital Sovereignty
... as the Basis of aSociety’s Digital Self-Determination
Digital Sovereignty
The Customer Magazine Issue 1/2016
Svenja Schulze
Interview: Minister for
Innovation, Science and
Research in North-Rhine
Westphalia
Wolf-Rüdiger Moritz
Interview: Chief Security
Officer at Infineon and
Member of secunet’s
Supervisory Board
NATO
NAPMA uses SINA for
secure remote access
Content
2 secuview 1/2016
28
The Transparent Man – Myth or Reality?
Revealing one’s location in social networks means
opening up to the risk of being very easily monitored.
Control the Network – Tailored
Real-Time Network Analysis
32Science04 Massive Innovation Through Excellent
Research Infrastructure
National08 Digital Sovereignty as a Basis for
a Society’s Digital Self-Determination
11 Three Questions for secunet’s CTO
Dr Kai Martius
International13 Montenegro – Securely Connected
to the World
14 NAPMA Uses SINA for
Secure Remote Access
18 More Security at Passport Control
19 Trust is Good, Checks are Better
Technologies & Solutions21 Protecting Network Infrastructures:
Security Through Intelligent Separation
25 Certified Trustworthiness: the secunet
eID PKI Suite and secunet wall
26 SINA Rejuvenated
26 Sneaker Administration is History!
27 News from the SINA Workstation S
27 The First Ethernet Encoder with
SECRET-Level Approval
28 Control the Network – Tailored
Real-Time Network Analysis
30 Long-term Key Management
32 The Transparent Man – Myth or Reality?
34 German IT Security Congress:
Call for Papers
News in Brief07 Microsoft and secunet Provide Cloud
Solution for German High-Security Market
07 20 Million Income Tax Declarations
Last Year
20 EasyPASS is Growing
35 New Address
Dates35 Upcoming Events
secuview 1/2016 3
Editorial
here are many aspects to the much discussed
issue of digital sovereignty. One of them we
know from our private lives: anyone who wants
to avoid becoming a ‘Transparent Man’ on social
networks, mobile apps and more needs to exercise
caution and be digitally literate. However, in this issue
of secuview, we focus on another aspect at a much
higher level: that of the economy, state and society.
What enables a society to act and make decisions
independently on data and IT systems? One oft-cited
factor is control over key information technologies –
but as Wolf-Rüdiger Moritz explains in his interview,
this is hardly achieved in Germany and throughout
Europe. Indeed, the local IT industry is niche-based
and basic IT infrastructure components increasingly
have to be imported from non-European markets.
This makes it all the more important to bolster our
existing niches, both nationally and at the European
level. The transformation of the fragmented European
IT industry into a digital single market – as envisaged
by EU Commissioner Günther Oettinger – has the aim
of achieving greater digital sovereignty. secunet is also
increasingly making its voice heard at the European
level, for instance at the newly founded European
Cyber Security Organisation (ECSO) or at the ENISA
permanent stakeholders’ group.
Is our society vulnerable to attack due to our frag-
mented local IT industry? The good news is that digital
sovereignty has more to do with autonomy than autarky.
That means that we don’t necessarily have to return all
aspects of the IT industry to Germany or Europe. The
most important step towards digital sovereignty is the
consistent use of trusted IT security solutions.
The conditions for this are good; Germany for example
has traditionally been highly sensitive to data pro-
tection and security – and not just since the revelations
in connection with Edward Snowden. Another advan-
tage is Germany’s open encryption policies, which
don’t curtail the use of encryption technologies in this
country. Also, thanks to the German IT Security Act, it
is hoped that even greater protection for critical infra-
structures can be achieved. Add to that the aforemen-
tioned European initiatives. It is now up to us to take
up the thread and achieve greater digital sovereignty
for our societies.
Happy reading and have a wonderful summer!
Dr Rainer Baumgart
T
4 secuview 1/2016
Science
We at secunet benefit a great deal from NRW’s
strong scientific landscape; we’ve already recruited
several highly capable employees from the region’s
universities – and just a few months ago, we founded
finally safe GmbH with the Westphalian University of
Applied Sciences in Gelsenkirchen. In your work,
you aim to strengthen the position of universities in
NRW. How are you going about this? What initiatives
are you currently involved in and what ideas do you
have for the future?
Schulze: The regional government has a clear focus
on education and research. In 2016, our budget was
increased by €430 million to €8.2 billion. That’s a new
record and leaves us with 41% more funds than we
had in 2010. The region worked very hard to achieve
this and the boost in funds will be used to continue
improving teaching and learning conditions.
Excellent research infrastructure is crucial to the in-
novative spirit of NRW as a business hub and forms
the foundation of pioneering research and develop-
ment. It is also one reason that experts from all over
the world travel to NRW to conduct their research.
To ensure that this continues, the state has (among
other things) joined forces with the EU to create
a new funding programme to enhance university
Massive InnovationThrough ExcellentResearch Infrastructure
In interview:
Svenja Schulze was appointed as the North-Rhine
Westphalian regional government’s Minister for
Innovation, Science and Research by Hannelore
Kraft in July 2010. With the abolition of tuition fees
in North-Rhine Westphalia, Schulze orchestrated
one of the regional government’s largest political
projects. On 21 June 2012, Schulze was reappoint-
ed to the same ministerial post for a second term in
Cabinet Kraft II.
An interview with Svenja Schulze, Minister for Innovation, Science and Research in North-Rhine Westphalia
Science
secuview 1/2016 5
research infrastructure, with up to €200 million
earmarked for modernising and expanding applied
research in NRW.
We work closely with the Westphalian University of
Applied Sciences and the Ruhr University Bochum’s
Horst Görtz Institute on joint projects to create syn-
ergies between science and business. What advan-
tages are there to this type of cooperation? And what
do you do to promote closer cooperation?
Schulze: Virtually all areas of our daily lives are now
experiencing a digital transformation. These changes
offer new potential, but are also associated with
significant security challenges. Secure IT systems
and processes are key factors in successfully shap-
ing the digital revolution.
In April, we founded the Wirtschaft und Arbeit 4.0
alliance in NRW. The regional government, business-
es, trade unions and scientific community want to
develop NRW as a top location for all things digital.
In a joint declaration, the participants set out the key
areas we want to work on in the coming years. One
thing we want to do is advance digitalisation and as-
sist business and society in the transition.
Important areas here include technology transfer
for SMEs, IT security, developing broadband infra-
structure, promoting key skills in further and higher
education and continually monitoring our funding in-
struments for currency and efficiency.
The region also founded the HochschulStart-up.
NRW initiative, which aims to accelerate knowledge
and technology transfer between science and busi-
ness. Together with the European Regional Develop-
ment Fund, the ministries of science and economic
affairs have earmarked almost €70 million for this
until 2020.
University spin-offs are vitally important for the
region, as they ensure innovations are put into
practice as quickly and efficiently as possible. They
also create jobs and apprenticeships and enhance
the region’s global competitiveness. Through the
START-UP-Hochschul-Ausgründungen programme,
the Ministry of Science will invest €21 million into a
university spin-off funding competition until 2020.
Another of your objectives is to increase NRW’s
technological capabilities. How important are the
cross-cutting issues of IT and IT security?
Schulze: IT security is crucial for NRW – particularly
when it comes to SMEs, manufacturing and Industry
4.0. The opportunities and risks of digitalisation are
key factors in the future development of our region
and its economy. For this reason, we also need ideas
from scientists, many of whom are already grappling
with the challenges of the digital revolution through-
out NRW.
In NRW, 800 researchers are currently working in
the field of IT security. To ensure that NRW retains
its global edge in IT security research, the ministries
“Secure IT systems and processes are key factors in successfully shaping the digital revolution.”
>>>
6 secuview 1/2016
Science
of science and economic affairs have committed
€400,000 of public funds to developing the Horst
Görtz Institute for IT Security at the Ruhr Universi-
ty Bochum. In addition, exchanges between experts
on the nrw.unITS network will receive funding to the
tune of €600,000.
Structural change has long been an important issue
in NRW – and in the advent of digitalisation, industri-
al change has now gone in an entirely new direction.
What role do you think IT security has to play here?
Schulze: NRW is already a leading national hub for
IT security. I believe we should exploit this position
and develop it further. The regional government is
currently working closely with universities and re-
search institutes to develop a long-term strategy
for boosting IT security. In April, an expert panel of
scientific and commercial representatives drafted a
strategy paper on IT security. We are now seeking to
expand on these initial objectives in order to devise
an appropriate research agenda.
The authors of the paper summarised their ten most
important recommendations for a successful digital
economy as follows:
1. Implement lighthouse IT security projects
2. Conduct media campaigns to raise user
awareness of IT security
3. Boost digital skills (including IT security) in
schools and universities
4. Increase the number of IT security
professorships
5. Develop a further education platform
for IT security
6. Found an IT security start-up centre together
with Digitale Wirtschaft NRW
7. Expand support for research on secure and
reliable IT systems as prospective measures
(‘security by design’ principle)
8. Implement European minimum standards for
procurement by authorities and public
institutions
9. Increase user acceptance of IT security
10. Develop the ‘Mehr Verschlüsselung für alle!’
(More Encryption for All!) security initiative n
News in Brief
secuview 1/2016 7
20 Million Income TaxDeclarations Last Year
secunet supports a part of the ELSTER infrastruc-
ture: On behalf of the Regional Tax Authority of
Bavaria, secunet implemented a secure platform for
authentication and encryption through certificate-
based processes. n
*Source: Behörden Spiegel, Newsletter E-Government No. 772, April 20th, 2016
n Germany, the ELSTER electronic tax decla-
ration has become a firmly established virtual
administrative channel. In 2015, 20 million decla-
rations of income tax were submitted electronically*
– more than ever before! The main idea behind
ELSTER is to efficiently and securely transfer tax
information electronically between citizens, employ-
ers, tax consultants, income tax assistants, tax
officials, municipalities and associations.
I
The jointly-provided solution is to offer both on-prem-
ises products, which the user operates itself at a
transition point in its infrastructure, and virtualised
solutions that are fully integrated into the public
cloud. n
More information:
Dr Kai Martius
CTO secunet
Armin Wappenschmidt
n future, secunet will also offer data-sensitive or-
ganisations, particularly from the public sector,
the tried and tested, certified SINA encryption
technology via the cloud platform Azure from Micro-
soft Cloud Germany: Customer data is stored in
German data centres, and access to the data is un-
der the control of a German data trustee. The SINA
core functions such as network and data encryption
supplement the security mechanisms that exist in
Microsoft Azure for authentication, HSM usage and
safeguarding virtual machines in a way that enables
sovereignty over the keys to be retained.
I
Microsoft and secunetProvide Cloud Solution forGerman High-Security Market
National
8 secuview 1/2016
You chair the ZVEI Digital Sovereignty working group,
which is examining Germany’s sovereignty and the
new challenges it faces in the digital era. What does
digital sovereignty mean in Germany?
Moritz: In the strategic working group we drew up
the following definition:
Digital sovereignty describes the ability to continually
control the reliability, integrity and availability of data
transfer, storage and processing.
If you think about it, you’ll quickly see that this is a
tall order that can only be achieved through con-
certed effort. We are far from reaching this milestone
in Germany; the aforementioned conditions have
not been met for essential, security-related network
components and encryption systems used by large
corporations. Due to the state of the market and
established standards, there is no de facto freedom
of choice in products from Germany and Europe that
can guarantee the security and integrity of our data.
This applies in a wide range of areas and, particularly,
to operating systems, CPUs and network infrastruc-
ture. German companies live off of their knowledge
and expertise – and protecting this is a strategic
objective. But knowledge isn’t everything. The
digital revolution has also changed the manufacturing
landscape and even penetrated the private sphere.
The increased networking of people, machines
and products offers both risks and opportunities.
Digital Sovereignty asa Basis for a Society’s Digital Self-DeterminationAn Interview with Supervisory Board MemberWolf-Rüdiger Moritz
In interview:
Wolf-Rüdiger Moritz is the
Chief Security Officer at chip
manufacturer Infineon, based
in Neubiberg near Munich.
He has been a member of
secunet’s Supervisory Board
since 2014. Like secunet,
Infineon is a security partner
of the Federal Republic of
Germany
secuview 1/2016 9
National
However, these opportunities will only outweigh the
risks if we succeed in creating this connection in a
secure environment that offers no attack vectors
for industrial espionage and criminal organisations.
Skills gaps in security-related fields of information
technology can have a significant, long-term impact
on a country’s competitiveness and national security.
Politicians have now come to recognise this. The
coalition agreement therefore details measures for
reclaiming Germany’s and Europe’s digital sove-
reignty – an urgently important task.
What would the consequences be if digital sove-
reignty were neglected or ignored? What (long-term)
impact would this have for our society?
Moritz: Digital sovereignty is the basis of our socie-
ty’s digital self-determination. If we don’t achieve it,
the reverse will apply: digital dependence, whereby
key ICT products are developed outside of our own
sphere of influence. Over the long-term, this means
losing our connection to constantly increasing tech-
nological developments in this area. Politically speak-
ing, this would pose significant risks to national
security. Consequently, we’re talking about a strate-
gic topic that’s of considerable importance for our
future.
As I said earlier, increased integration is the basis of
ever faster processes and, in turn, higher productivi-
ty. In the market, the winners are those who can con-
trol these processes and implement them best. But
what happens if this control is merely tolerated and
an external entity has actual control of the system?
Companies’ strategic knowledge can be siphoned
off unnoticed and critical control processes can be
manipulated. This could lead to financial losses, sab-
otage and blackmail; from ransomware as we know
it to major, damaging events, anything and every-
thing is possible. In a scenario like this, it seems
to me that a nation’s digital sustainability would be
seriously at risk.
Many companies are digitalising – or have already
digitalised – their processes to stay one step ahead
of the competition. What role does digital sovereign-
ty currently play here? And what role should it play?
Moritz: This process is not really new; it’s simply
taking place on a much larger scale. Take Industry
4.0 and the Internet of Things: neither would work
without security. The more processes are digital-
ised, the greater the risk of them being compromised
and the greater the potential for damage as a result.
Without using trusted security components around
vulnerabilities, this development could be a ticking
time-bomb.
Let’s talk about Made in Germany. German IT
security products offer a high degree of security
and robustness in conjunction with Germany’s open
encryption policies. How important are these prod-
ucts on the global market today?
Moritz: Germany has developed considerable
technical expertise in security technology and
secunet AG is one of the leading providers in
Germany; SINA Boxes are used in national securi-
ty networks for good reason. Unfortunately, despite
internationally renowned quality, German providers
have so far failed to adequately position themselves
in the market. We need to work on this.
What steps do we need to take to improve the global
success of the German IT security industry? >>>
“Skills gaps in security- related fields of information technology can have a significant, long-term impact on a country’s competitiveness and national security.”
10 secuview 1/2016
Moritz: I believe that we’ve not yet sufficiently
realised the importance of information security in
Germany. In my view, the IT Security Act is a step in
the right direction to raise general awareness.
However, I’d go a step further. The question is: is
defence against cyber attacks like APTs on multiple
German companies still an isolated problem for the
affected companies, or is it rather a national duty
to protect the economy? During cyber attacks, it is
often very difficult – or even impossible – to identify
the attacker. Cyber attacks can be motivated by any
number of factors. Script kids, hacktivists, criminals,
intelligence services and the military are all possible
attackers. It is therefore difficult to draw the line be-
tween attacks in the civilian environment and infor-
mation warfare. This poses even more questions in
the context of international law. If Germany is able
to find the answer to this problem and adopts a
pioneering role in security design and technology,
this could also help the entire German IT security
industry.
What we need is a comprehensive, holistic national
cyber strategy that interlinks politics, academia and
industry, and launches and promotes targeted proj-
ects that will advance Germany on the road to dig-
ital sovereignty. A strong domestic market – which
uses products from trusted environments as a start-
ing point, flanked by politically endorsed European
initiatives – could be the perfect springboard into
the global market for German security products. n
secuview 1/2016 11
National
Digitalisation means faster processes, more net-
working and higher data volumes – as well as a
greater risk of attack. Storing our information on
internal servers is becoming a challenge – and
despite all our doubts and questions, cloud-based
solutions are looking more appealing every day. How
secure are cloud solutions? Is it acceptable to store
classified information in the cloud?
Dr Martius: When applied to cloud computing as a
generally available, inexpensive infrastructure, the
economies of scale are essential and indisputa-
ble. Today, no-one would surely think to set up their
own telephone lines to liaise with their partners. In
this respect, we may be on the verge of a new para-
digm, as it was the case in the telecoms industry 100
years ago. However, cloud computing differs in one
big way from just transferring data across telephone
lines: the data is processed and edited by the pro-
vider. As a result, I can’t simply encrypt my data
before transferring it to the provider (unless I’m
using a solution that uses the cloud as mere storage
space; we are working on a product like this which
will be called SINA Cloud Connector). We’re there-
fore looking for ways to use the cornerstones of
SINA technology – separation and encryption – in
the cloud to prevent unauthorised access and mini-
mise the effects of errors. All in all, it’s about only mak-
ing data accessible at the time it is processed, and
allowing this processing to take place in a secure
‘shell’. In addition, communication from the out-
side must be encrypted up to (or near) its end point.
Crucially, the encryption and separation components
must have a high degree of reliability and integrity.
It’s also important that key management takes place
under our own sovereignty. This suggests the use of
the SINA technology components.
Despite this, you have to have a certain amount of
trust in the provider, as at some point the data and
temporary encryption key will be exposed on the >>>
Three Questions forsecunet’s CTO Dr Kai Martius
In interview:
Dr Kai Martius has been secunet’s CTO since
2015. From 2007 to 2015, he managed secunet’s
High-Security / Public Sector division. Before that,
he had held various positions in Consulting and
Product Development since 1999. Dr Martius
significantly contributed to the development of
SINA.
12 secuview 1/2016
National
operator’s computers. Using technology, you can
still only increase the effort and outlay required to
successfully access data, so I’m sure there’s a
certain amount of highly sensitive data that I
wouldn’t want to process in the cloud.
It’s also necessary to make the integrated SINA func-
tions and the cloud’s existing mechanisms compat-
ible. That’s why close cooperation with cloud provid-
ers is vital to achieving the highest possible level of
security while retaining the key features of the cloud.
Close cooperation already exists between Microsoft
and secunet, for instance, the aim being to combine
trusted, high-tech SINA components with the high
provider reliability that Microsoft likes to establish by
operating two German Azure data centres according
to the data trustee concept.
In his interview, Wolf-Rüdiger Moritz described digi-
tal sovereignty as the ability to continually control the
reliability, integrity and availability of data transfer,
storage and processing. How does secunet support
public authorities and companies in acquiring and
retaining this ability in the face of digitalisation?
Dr Martius: The cornerstones of digital sovereignty,
and therefore of secure IT in general, are trusted en-
cryption and separation characteristics (or data flow
control). Reliability must be earned by technology
(and its manufacturers) – it’s a question of technical
competence, transparency and processes. secunet
has worked towards this for over 15 years with the
German Federal Office for Information Security (BSI),
the German body responsible for evaluating IT secur-
ity. The result is the highly successful SINA product
range, which we continue to develop today. For us,
it’s important to continually adapt the technology to
new requirements in order to remove any security
stumbling blocks for our customers and deliver ‘the
trusted components of a secure IT infrastructure’.
Examples of our innovative developments include
the aforementioned integration with cloud technolo-
gy in cooperation with Microsoft, close cooperation
with the company Citrix for the seamless integra-
tion of SINA into their infrastructures, and efforts to
boost the performance of our network products in
such a way that we can keep pace with the network’s
growth rates.
What do you make of current developments in the
European IT security industry?
Dr Martius: On one hand, the industry is subject to
consolidation processes, which – at least in terms
of digital sovereignty – could be very problematic.
What influence will foreign owners ultimately have on
‘national’ companies? On the other hand, it’s clear
that national markets alone cannot guarantee a com-
pany’s future viability. European cooperation in de-
veloping technologies is certainly welcome, but this
sensitive topic must be handled under the watchful
eye of the government. After all, digital sovereignty
is (still?) a national issue, not a European one. We
favour technology partnerships that allow us to meet
our high standards for products’ constructive secur-
ity, while also retaining the transparency required by
the BSI, for instance – as with the aforementioned
partnerships with Microsoft and Citrix.
This dovetails with another topic, which doesn’t just
affect the European security industry: the availability
of skilled employees. At this year’s RSA Conference,
it was estimated that the USA alone will have a short-
fall of around two million IT security experts by 2020.
Apparently, the education sector is lagging behind
the demands of a rapidly growing industry. Conse-
quently, secunet is deeply committed to cooperating
with secondary schools to promote IT security and
pique the younger generation’s interest in the sub-
ject. As our society steadily becomes more depen-
dent on technology and IT security, there will be a
global imperative to give the subject more weight at
each stage of education. n
“Reliability must be earned by technology.”
secuview 1/2016 13
International
fter its secession from Serbia in 2006,
Montenegro needed to establish a foreign
ministry and its own network of embassies
connected to the ministry for communication pur-
poses. As a candidate country for the European
Union, it made sense to implement the project in
conformance with EU standards from the beginning.
In March 2015, the Montenegrin foreign ministry
awarded secunet (as a qualified partner) a Europe-
wide public tender for the “supply of equipment
for strengthening the capacities of the diplomatic
consular network of the Ministry of Foreign Affairs
and European Integration”. In particular, secunet’s
cooperation with the German Federal Foreign Office
and its experience working on the joint SINA project
gave it an excellent footing for the project. secunet
started the project for the encrypted connection of
28 embassies and consulates to the ministry in the
Montenegrin capital of Podgorica last year.
Alongside over 30 SINA Boxes and a few SINA
Workstations, secunet realised the project – which
was financed wholly through the EU Infrastructure
Fund (EU Delegation to Montenegro) – with SINA
Management, SINA Training and SINA Installation
Support.
By July and September 2015, secunet had already
implemented pilot installations with encrypted
connections to the embassies in Berlin, Belgrade
and Vienna. Additional SINA Boxes were then set
up by the end clients; approximately half of the
embassies are securely connected through SINA.
The connections to the foreign ministry are secured
up to EU RESTRICTED level – meaning emails, data
server access and VoIP telephone connections are
reliably protected. The key applications that run
via the new SINA-secured communication network
handle matters regarding visa and passport ad-
ministration.
In the meantime, four additional embassies have
been opened: little Montenegro – an EU and NATO
candidate country and a member of the UN, WTO,
OSCE and the Council of Europe – is growing! n
More information:
Christian Linke
Montenegro – Securely Connected to the Worldsecunet is currently enabling 28 embassies and consulates to encrypt connections to the Ministry of Foreign Affairs and European Integration in Podgorica. From now on, over 30 SINA Boxes will secure the Balkan state of Montenegro’s communications with its outposts
A
14 secuview 1/2016
n December 1978, a number of NATO Na-
tions joined together to establish the NAEW&C
Programme. NAPMO was created as a NATO
Production and Logistics Organisation to imple-
ment the Programme. It is directly responsible to
the North Atlantic Council for all aspects of the
NAEW&C Programme.
The NAPMA is the executive agency of NAPMO. Its
approximately 115 posts are filled by seconded mil-
itary officers and civilian personnel drawn from the
Nations participating in the NAEW&C Programme.
Within the responsibilities granted to NAPMA, the
agency manages all aspects of the Programme from
acquisition through delivery and on through Life
Cycle Management of the NE-3A.
NE-3AThe NE-3A aircraft is a militarised version of the
Boeing 707 commercial airliner airframe. It is dis-
tinguished by the addition of a large, rotating roto-
dome containing its radar antenna. Its mission system
includes surveillance radar, navigation, communi-
cations, data processing, identification, and display
NAPMA Uses SINA forSecure Remote AccessNAPMA is the NATO Airborne Early Warning & Control(NAEW&C) Programme Management Agency
I
secuview 1/2016 15
International
equipment. The NE-3A fills the needs of both air-
borne surveillance and Command and Control (C2)
functions for tactical and air defence forces. It pro-
vides a highly mobile, survivable surveillance and
C2 platform. The NE-3A offers superior surveillance
capabilities. Equipped with a “look-down” radar,
the NE-3A can separate airborne targets from the
ground and sea clutter returns that confuse other
present-day radars. Its radar “eye” has a 360-degree
view of the horizon and, at operating altitudes, can
“see” more than 400 kilometres (215 nautical miles).
It also can detect and track both air and sea targets
simultaneously.
Current and potential upcomingmodernisation projectsCurrently NAPMA executes the Follow-Up (FUP)
Modernisation projects that are primarily aiming at
enhancing the Identification system (Mode5 / En-
hanced Mode S) and replacing the analogue cockpit
technology with a digital environment (Cockpit
Modernisation – CNS/ATM). Studies are also being
pursued to integrate Internet Protocol (IP) commu-
nications.
Besides the current modernisation projects, studies
and analysis on a potential Final Lifetime Extension
Programme (FLEP) are ongoing to determine feasible
technical solutions to meet unfulfilled operational
requirements, maintain the platform’s relevance and
extend the NE-3A fleet’s lifetime to support NATO
operations to 2035.
Use of SINA at NAPMANAPMA operates a small secure dedicated client-
server environment centered on Microsoft tech-
nology to provide office automation and external
connectivity (NAPMA NR domain). The main services
provided to the users are email (MS Exchange),
document management (MS SharePoint) and an >>>
The NAPMA is responsible for planning and coordinating acquisition strategies and for managing contracts
associated with modernisation of the NE-3A fleet. The NAPMA General Manager is responsible for the day-to-day
management of the Programme. He is aided in this task by a Deputy General Manager, a Legal advisor, and an
Internal Auditor. The Agency is then organised around the following Divisions or Offices:
- The Programme Management Division is responsible for implementing projects throughout the development,
production and retrofit phases in response to operational military requirements and for Programme-wide
planning and development. It performs concept definition and project validation studies, provides primary liaison
with external organisations, and performs system test activities and quality assurance.
- The Programme Support Division is responsible for contracting, industrial benefits and industrial participation,
logistics and configuration management duties, and Information Management.
- The Financial Controller’s Office is responsible for the treasury, budgeting, accounting and cost analysis
functions necessary for the effective execution of the Programme.
- The Human Resources and General Services Office is responsible for all personnel matters, security, and
general administrative support services, including travel and registry functions.
- The Chief Engineer’s Office is responsible for advising the General Manager, as the Technical Airworthiness
Authority, on engineering matters and ensuring that Operational, Safety, Suitability, and Effectiveness (OSS&E)
requirements are adequately addressed.
16 secuview 1/2016
International
enterprise resource planning system (SAP/R3). The
users are equipped with desktop as well as laptop
workstations.
Approximately 20 NAPMA employees are assigned
with mobile devices and are regularly working off-
site via secure remote access during business
trips (mostly, but not excluding: Europe and North
America) and outside the regular business hours.
About five employees with assigned mobile devices
are constantly working off-site via secure remote
access (e.g. in Germany, Belgium, and the United
States of America). Five devices are needed in a
pool, in order to provide secure remote access to
alternating employees for business trips or other
off-site work. They all require the same functionality
as the in-house workstations.
To cope with this requirement, NAPMA initiated an
international competitive bid. The operational objec-
tive was to establish, maintain and operate a NOS
accredited Secure Remote Access (SRA) capabili-
ty as an integral part of NAPMA infrastructure that
enables staff to work on- and off-site, on- and
off-line with the same functionality as the in-house
NAPMA NR workstations and a similar performance.
NAPMA’s Secure Remote Access Capability is
maintained and operated by CONET Services
GmbH. Currently, NAPMA has 30 SINA Workstation
S ThinkPad T540p in use. The backend consists of
a SINA Management Workstation and two SINA L3
Box S 30M. The workstations provide two separate
Sessions/Workspaces to the users:
- For NAPMA business use up to and including
NATO RESTRICTED, there is the NAPMA NR
Workspace based on the same image like on any
other NAPMA Workstation. It is flanked with
centralised configuration management through
MS SCCM and restricted internet access.
- In addition there is a “Dirty Internet” Work-
space based on a simple Linux setup (Linux
Porteus 3.1) allowing web-browsing and basic
Open Office applications without content filter-
ing on the internet access (e.g. check-in for flights
during TDY). This license free system requires low
maintenance and is running from memory (frugal)
with read-only on the disk, to ensure the next
launch will reload an unmodified configuration
into the memory.
Overall the NAPMA users are very pleased with the
SINA system and its performance. From an admin-
istrator perspective, the SINA system works fine
for NAPMA. The system requires less support than
initially expected and the IT operators are satisfied
with the required management, configuration as
well as the integration into the existing NAPMA NR
domain. n
More information:
Stephan Sauer
Holger Kalnischkies
EMSCHERGENOSSENSCHAFT / LIPPEVERBAND Kronprinzenstraße 24
45128 Essenwww.eglv.de
International
18 secuview 1/2016
t airport border control, travel documents
are checked electronically and using opti-
cal methods. In Germany, both tasks can be
carried out by a machine, provided that the machine
follows the TR-03135 technical guideline set out by
the German Federal Office for Information Security
(BSI). As there is an additional need for practical
guidelines for optical document verification, the Ger-
man Federal Criminal Police Office (BKA) recently
commissioned secunet to create them.
Since 2013, secunet has been working with the BKA
to evaluate the performance of optical document
verification systems under Project AROMA (Ad-
vanced Research on Optical Machine Authentication).
Based on the results of this analysis, secunet is
now working with the BKA to devise best practice
guidelines for automated optical passport control.
The guidelines will address document designers,
document verification system manufacturers and
machine operators.
The new guidelines will help to improve verification
quality and enhance border security – and they will
ultimately play an international role; the Technical
Advisory Group of the International Civil Aviation
Organization (ICAO) has already given the green
light for further development of the guidelines into
an official ICAO technical report. What’s more, the
insights from Project AROMA have already been fed
into the TR-03135 guideline.
However, this is just one milestone in the project;
secunet is currently working with the BKA to de-
velop the second part of the guidelines, which will
contain recommendations for evaluating optical
document verification systems – from test planning
to evaluation. This part of the document will also
include the results of a detailed practical test con-
ducted at border control gates at Frankfurt airport.
The BKA and the German Federal Police thus have
a strong partner onside as they continue to analyse
and optimise the quality of optical document verifi-
cation systems. n
More information:
Dr Jörn-Marc Schmidt
More Security atPassport ControlTogether with the German Federal Criminal Police Office, secunet is developing the first guidelines for automated optical passport verification
A
secuview 1/2016 19
International
n the future, the EU Member States (and Schen-
gen states) want to more reliably check that only
the holders of genuine travel documents are able
to criss-cross Europe’s borders. To this end, the
European Commission has launched a pilot proj-
ect aiming to create a uniform basis for checking
electronic documents at the border.
In order to verify the integrity and authenticity of
an electronic identity document, the verifying state
needs access to special (public) certificates from
the issuing state. EU Member States have always
had different ways of handling the exchange of
certificates. The establishment of a so-called
Schengen master list would facilitate this task. It
would contain all available trusted certificates. All EU
Member States will then be in a position to securely
verify international travel documents electronically.
This will help the authorities to identify forgeries and
manipulations more reliably, while also paving the
way for all Member States to issue modern identity
documents (eIDs).
The Schengen master list will contain trusted cer-
tificates which a minimum number of Member
States have verified as being authentic. This initial
certificate authentication is primarily performed at
border-control using high volumes of genuine travel
documents.
Besides its extensive expertise in creating the
policies needed for the new system, secunet will
be delivering software (N-PKD) for managing the
certificates and generating the central Schengen
master list. n
More information:
Matthias Niesing
Trust is Good,Checks are BetterIn the EU, the European Commission starts a pilot projectto trial a Schengen master list for checking electronic travel documents
I
Mr Rossi, an Italian citizen, is returning home from a business trip in the USA. He first lands at the Charles de Gaulle
airport in Paris before continuing on to Fiumicino Airport in Rome. When checking Mr Rossi’s documents, the French
border police verify the integrity – or accuracy – of Mr Rossi’s data and the authenticity of his electronic identity
document. To do this, they check the so-called document signer (DS) certificate stored in the document against the CS
certificate issued by the Italian Republic. Through this certificate, the French border police have access to the central
Schengen master list, which contains certificates from the 28 EU Member States, as well as those from other, non-
European countries. If the DS certificate and other security features are verified successfully, the French border police
can be sure that nothing is amiss with Mr Rossi’s passport. Mr Rossi is therefore permitted to cross the EU border and is
later greeted in Rome by his overjoyed dog Gaston.
Mr Rossi travels home
News in Brief
20 secuview 1/2016
EasyPASSis Growing
There are currently 140 EasyPASS border control
gates in operation at the Frankfurt, Düsseldorf,
Munich, Berlin-Tegel, Hamburg and Cologne/Bonn
airports. With this year’s expansion, the German
Federal Police will easily be able to handle growing
passenger numbers at airports throughout Ger-
many; in 2015, footfall increased by 3.9% on the
previous year (source: ADV). n
More information:
Thomas P. Schäfer
he German Federal Police has announced
plans to considerably expand its use of the
EasyPASS system in German airports. By
the end of the year, a further 35 automated border
control gates will be installed. The existing consort-
ium between secunet and Bundesdruckerei GmbH
will deliver the systems.
For two years now, travellers have been able to
voluntarily use the EasyPASS system at Germany’s
busiest airports – and more people use the system
every day. During the system’s first year, around 4.3
million travellers opted to use the automated bor-
der control gates, with this number increasing to 6
million passengers in 2015.
T
systems are barely existent, let alone controllable.
Does digitalisation mean boosting efficiency at the
cost of security? Legislators only recently set out
requirements for an appropriate level of security with
the IT Security Act.
Easier said than done?To proactively tackle new threats and prevent the
exploitation of system vulnerabilities, security must
be approached from the following angles:
- Who is allowed to access the network and who
can access what security domain?
- Who can access what system?
- How are access rights managed for internal and
external employees, service providers and auto-
mated data communication between machines?
- How can this be implemented across different
security domains – especially with different security
classifications – without jeopardising business-
critical processes?
rior to digitalisation, critical networks were
strictly separated – thus providing optimal
network security. Public authorities used
paper-based processes and paper documents were
then securely stored and forwarded as necessary.
Critical infrastructures used to be on their own
network with their own protocols, with no connection
to the outside world, and the first industry robots had
no UMTS connection to the internet. Instead, they
were directly wired into a control console.
However, this is now a thing of the past. Thanks to
digitalisation, all systems are integrated – and are
often based on common technologies like the inter-
net protocol. This creates fast digital connectivity,
efficiency and potential cost savings. Networks are
also often based on so-called management systems
like the ERP system. Nowadays, all systems are in
some way connected and in many cases, differ-
ent security classifications between networks and
Protecting NetworkInfrastructures: SecurityThrough Intelligent Separation
P
secuview 1/2016 21
Technologies & Solutions
Today, digitalisation is occurring in a wide range of areas. The government is taking its processes digital, industrial companies are boosting efficiency with digital networking, and critical infrastructures are better able to meet modern-day requirements – arising from the energy market’s decentralised supply, for instance – thanks to IT-based systems. However, digitalisation is also giving way to technical conformity, because systems are increasingly built on IP technology. This offers a big boost in efficiency and compatibility, but also presents a huge increase in risk. Is it possible to achieve an adequate level of security nonetheless?
>>>
Technologies & Solutions
There are already a number of answers to these
questions, but in many cases isolated individual
solutions are used to approach the issue. However,
individual solutions are not sufficient to provide
comprehensive protection, as small deficiencies that
are often found in complex interfaces (in teleworking,
employees’ remote access, remote maintenance
access, etc.) can weaken the overall system.
A concept for secure IT infrastructures Security can only ever be guaranteed if data flows
are controllable and different security domains are
separated. Technology can achieve precisely that. It
is vital to analyse the infrastructure from a holistic
point of view and to assign it appropriate security
domains. When doing so, it is not necessary to de-
velop an entirely new network in one go. In fact, it
is perfectly possible to use existing and comple-
mentary components to gradually improve security
– provided that you always keep an eye on the bigger
picture.
secunet shows how a concept like this can help you
to meet the opposing requirements of network sepa-
ration and integration simultaneously. The approach
is based on the intelligent use of separation tech-
nologies: security domains which are fundamentally
separated are then selectively connected using intel-
ligent security measures. The basis for the specific
technical implementation is the organisational struc-
turing of the security domains.
Strong network boundariesdespite networking
In many public authorities and companies, specific
applications and systems are defined in networks
that require especially strong protection. These in-
clude public administration networks used to process
classified information and industrial networks used to
operate network management systems, for instance.
In the figures below and on the right, you can see how
isolated security domains can be created in these net-
work areas – even across different locations. Commu-
nication links are managed through private and public
networks via VPN – and only authorised, authentica-
ted partners, who may be temporary and recordable
– are allowed. In order to map the structures and
processes of your organisation, you can create as
many security domains as you wish.
Simultaneously manage multiplesecurity domains from anywhere with a single deviceSeparation shouldn’t end at the network infrastruc-
ture; it should be maintained even in the end device.
The ideal client for this is the SINA Workstation,
which can be used as a fixed or mobile workstation.
It is equipped with secure VPN technology, two-fac-
tor authentication and encrypted data storage. SINA
Workstation makes it possible to simultaneously use
several work environments which belong to different
security domains – and therefore have hitherto been
physically separated – on the same device. The work
Secure data
processing
in public
administration
22 secuview 1/2016
>>>
environments are proven to be securely separated.
The user then works with several so-called guest
systems, allowing them to simultaneously handle
email correspondence, browse the web, edit confid-
ential documents and operate a critical system, all
without having to compromise the strict separation
of security domains.
Data locks between networksIn many cases, it must be possible to transfer data
between domains with different protection require-
ments despite separation. For example, documents
that are subject to higher security classifications dur-
ing editing must be able to be transferred for further
processing in higher-classified security domains. In
addition, some companies need to export specific
operational parameters from the isolated security do-
main of the plant control system, in order to forward
these to consumers through sales, for instance. When
doing so, the connections between domains always
pose a risk for the more highly classified network.
In order to create a connection while maintaining
strict separation between networks, you need a
so-called connector, which decouples differently
classified networks at the logical level. Positioned at
network boundaries, it takes data from the source
network, processes it with help from its transport
and testing services, and then makes it availab-
le for use by the target network. Between CI-clas-
sified networks in public authorities, a diode – like
the SINA One Way which is approved up to German
national GEHEIM level - can be used for this logical
decoupling, which helps to prevent attacks from
lower-classified networks and data outflows from
higher-classified networks. In industrial networks,
connectors can manage data flows using similar
frameworks and separation technologies.
Monitoring and managing threat levelsBy continually monitoring data flows, anomalies
caused by malware or malfunctions can be detected
early in order to prevent potential loss or damage.
The use of a monitoring system like spotuation can
provide an added layer of security at this stage. It will
check whether or not the requirements for specific
encryption technologies have been met and can use
‘learned behaviour’ to detect anomalies in network
data flows, which can be an indication of advanced
persistent threats (APTs).
Accessing the internet fromcritical areasThere are few workplaces in the world that can get
by without access to the internet. However, there
are technologies that permit internet access from
critical networks without increasing the security risk.
ReCoBS-based systems like secunet safe surfer al-
low networks to access the internet through terminal
server logic. This means there is no direct connec-
tion between the critical network and the internet.
Instead, access is only provided via audio-visual
secuview 1/2016 23
Technologies & Solutions
Secure plant
and system
operation
in critical
infrastructures
Technologies & Solutions
24 secuview 1/2016
transmission through separate, so-called sacrificial
systems, on which the actual browser sessions
are isolated and run. This achieves strict network
separation, as access to the internet is not achieved
from within the critical network.
Digitalisation: securely implemented using your existing systemRegardless of your field, industry, sector or country,
the challenges of developing a secure infrastructure
with multiple security domains are generally very
similar, at least from a technical standpoint. The
architecture components shown here are merely
illustrative. They can be used in parallel and in com-
bination with existing technology.
IT security always requires a holistic approach.
secunet can draw on nearly 20 years of experience
in IT and network security to develop tailored, intelli-
gent concepts for diverse applications. An intelligent
blend of existing technology and good IT organisation
is the key to security in the digital era. n
More information:
For CRITIS companies
Torsten Redlich
For public authorities
Norbert Müller
A secure foundation: SINA technologySINA (Secure Inter-Network Architecture), which secunet developed on behalf of the German Federal Office for
Information Security (BSI), offers all the aforementioned possibilities for network separation. The key idea behind
SINA is to protect differently classified data locally and during transfer via open networks. SINA is a holistic system
architecture whose security components mesh completely.
The approval-compliant dimensioned and configured hardware is available in special, hardened constructions as
required. It provides protection against emissions and manipulation, as well as cryptographic modules. In addition,
the hardware contains security-evaluated firmware. The software-related basis of the SINA technology is the min-
imised and functionally hardened SINA OS, which has been intensively evaluated with respect to security. Both
smartcards as trust anchors and loopback file systems are embedded in the system platform. Many highly
developed security modules stacked on multiple levels within the system depth (e.g. IPsec encryption, access
control and firewall functions) protect SINA against any number of attacks. There are strictly separated work
environments with various classifications at the top level of the SINA layer model. On the one hand, they contain
commercially available guest operating systems and applications encapsulated in virtual machines (PCs). On the
other hand, they contain terminal functionality.
The SINA L3 Box is a key component used as an encrypted VPN gateway, while the SINA L2 Box can be used as an
Ethernet encoder. The entire network and all SINA components are administered in SINA Management.
secuview 1/2016 25
Technologies & Solutions
Certified Trustworthiness: the secunet eID PKI Suite and secunet wall
he secunet eID PKI Suite and the firewall
solution secunet wall have been success-
fully certified according to Common Crite-
ria EAL4 augmented. At CeBIT, Arne Schönbohm,
the President of the German Federal Office for In-
formation Security, presented secunet with two IT
security certificates that independently certify the
trustworthiness of both products.
With the eID PKI Suite, secunet is making soft-
ware components available that combine to form a
powerful overall system – both for a valuable pub-
lic key infrastructure (PKI) based on the X.509
standard and for handling official documents. The
components can also be integrated individually into
an existing system architecture. Using the certified
kernel, the eID PKI Suite can be deployed in environ-
ments that need to meet high security standards
according to Common Criteria.
The certified secunet wall Packet Filter 5.1.0 is a
Linux-based packet filter component and makes it
possible to integrate packet filter functionality into
firewall or VPN products that are components of
secunet wall or the SINA product range. Its most
important security functions include information
flow controls, audit data generation and configu-
ration management. n
T
Two new IT security certificates for secunet’s products
Arne
Schönbohm,
President of the
BSI, presents
the new
IT security
certificates
to secunet
CEO Dr Rainer
Baumgart.
26 secuview 1/2016
Technologies & Solutions
remote configuration updates, SNMP connections,
HSB-2 and VLAN according to IEEE 802.1Q for the
first time. n
More information:
Carsten Fischer
he demands on modern VPN solutions are
constantly growing. Indeed, throughput, man-
ageability, reliability, user-friendliness and
easy monitoring capabilities are increasingly im-
portant, because more and more services and data
sources are connected via VPN – thus guaranteeing
data protection on one hand and faster processes
on the other.
Last year, the entire SINA L3 Box range was gradu-
ally overhauled, meaning the range can now meet
future demands of our clients as well. Redundant
power supply units and a dedicated hardware
monitoring module have improved operational
security, while larger memories and more power-
ful processors have enhanced
cryptographic efficiency with
higher throughput per VPN.
And enhanced performance
doesn’t always cost more! The new generation of
SINA products will cost the same as the previous
versions.
The new SINA portfolio will be delivered with stand-
ardised generation 3.7 SINA software. This means
that the entire SINA product range will offer enter-
prise functionality like remote software updates,
T
SINA Rejuvenated
Sneaker Administration is History!rom Q1 2017, the SINA Remote Admin Server S
will enable administrators to carry out conven-
ient remote maintenance and administration
for all SINA Workstation S on their network. Admin-
istrators can use the system to implement new
installations of SINA software and make retrospec-
tive configuration changes from their office – for any
number of clients. Security-critical certificates, new
SINA Apps and additional network profiles can also
Fbe installed remotely, no matter where the compa-
ny’s employees are! This minimises the adminis-
trative workload and travel costs, and also helps to
automate certain operational procedures. n
More information:
Jan-Dominik Müller
The SINA L3
Box S 30M:
the powerful
SINA desktop
device – also
suitable
for rack
installation.
The SINA L3 Box S R 50M is optimised for
rugged use in vehicles or production plants.
The SINA L3 Box S 5G is designed
for use in central hubs.
Technologies & Solutions
secuview 1/2016 27
News from the SINA Workstation S remote data processing centre – thus making it pos-
sible to save bandwidth when using LTE or UMTS
on the move. The feature can also be used as a data
lock for USB sticks, meaning Windows guest sys-
tems no longer need to have direct access to USBs.
New application scenarios Alongside supporting new hardware, version 3.3.5
of the SINA Workstation S will offer USB 3.0 sup-
port in virtual guest systems for the first time. This
has the advantage of significantly increasing data
transfer speeds while also providing better support
for isochronous USB devices. This means USB au-
dio and video devices – or passport and document
scanners, for instance – will receive high-powered
support, thus expanding SINA Workstation S appli-
cations considerably. n
More information:
Gordon Freiburg
oot from ISO imagesSince the SINA Workstation S 3.3.2, it has
been possible to boot SINA guest systems
from ISO images, meaning that a Windows installa-
tion can now be implemented easily without using a
physical data storage device. This feature can also
be used to boot a guest system using specific boot-
loader images from a USB stick or fixed network ad-
dress. A virus scanner can also be booted from an
ISO image, which will analyse the hard drive without
having to start up the guest system.
Private networksIn private networks on the SINA Workstation S (from
version 3.3.4.1), two guest systems with different se-
curity domains and the same security classification
can communicate with each other across the net-
work. This expansion could soon be used to operate
the ReCoBS-based secunet safe surfer applica-
tion locally on the SINA Workstation – including the
sacrificial system that would usually be run from a
The First Ethernet Encoder with SECRET-Level Approval
secunet will soon be expanding the SINA
product range to include the SINA L2 Box H,
the first Ethernet encoder to be approved for
the German national GEHEIM level by the German
Federal Office for Information Security. The product
is currently expected to be available in Q4 2016.
With the SINA L2 Box H, secunet has developed a
special Ethernet encryption device for national and
international high-security networks based on the
SINA L3 Box H product range. The new range suit-
able for security classifications up to GEHEIM will
include powerful encryption devices for secure data
S
B
transfers in networks on OSI
layer 2 (Ethernet). Thanks to its
low latency, the SINA L2 Box H
is destined for use in scenarios involving a high qua-
lity of service or real-time requirements. In addition,
with a 1 GBit/s full duplex data throughput, it is set
to open up new horizons for the communication of
GEHEIM-level data. n
More information:
Jörg Rösch
28 secuview 1/2016
The consequences of digitalisation for hitherto strictly separated company processes and networks – and the associated difficulties and risks – are well-recognised. Consequently, practical solutions that don’t require complete restructuring or complex interventions in existing structures are in demand. But how can managers, CISOs and technicians be sure that their network meets all relevant security requirements?
Control the Network – Tailored Real-TimeNetwork Analysis
Technologies & Solutions
secuview 1/2016 29
This kind of monitoring system offers a number of
advantages for all those involved:
- Senior management receives reports for evaluating
compliance in accordance with company guide-
lines; the use of outdated browser versions will be
reported, for instance
- IT and security experts receive ongoing situation
reports that illustrate the current network security
status; hidden communication channels and asso-
ciated anomalies will become visible, for instance
- Administrators and security analysts will gain
insights into the network, up to and including the
potentially anomalous header information of indi-
vidual IP packets
Security arises from the interplay of these organisa-
tional and technical elements. In order for a company
to always maintain an appropriately high level of IT
security infrastructure, information handling must be
understood as a process following the well-known
PDCA pattern:
define IT security objectives (plan), implement the
relevant measures (do), check efficacy with probes
(check) and implement countermeasures in case of
deviation (act). n
More information:
Dr Marc Lindlbauer
or holistic IT security – which is necessary for
companies and authorities that want com-
plete control over their data – safeguards
designed to prevent or respond to threats must be
introduced at both the organisational and technical
levels. On the organisational level, it is common for
companies to establish an ISMS, which can be used
to define processes and make managing and con-
trolling company-wide IT security more concrete and
effective. An ISMS is a prerequisite for maintaining
an up-to-date overview of all relevant security
processes – and thus for well-founded risk man-
agement.
Making network IT security visibleOn the technical level, preventive measures like
firewalls, VPNs and well-known access control
mechanisms (e.g. two-factor authentication) are still
indispensable, but are no longer nearly enough. In
order to ward off today’s targeted attacks, so-called
APTs, a range of new methods and approaches
are vital. An efficient method for controlling data
movement in and between networks – and thus for
detecting deviations from technical guidelines – is
the use of so-called ‘probes’, which continually ana-
lyse and evaluate data flows for compliance with
defined rules. When using these probes, it is essen-
tial that data flows or the information gleaned from
these data flows be visualised continually.
F
30 secuview 1/2016
Long-term Key Management
Car2X and autonomous driving are hot topics in the automotive industry. Besides communication between cars, emergency vehicles and roadside infrastructure, ‘off-highway’ vehicles are also increasingly opening up to data exchanges
obile commercial vehicles like agricultural,
forestry or construction vehicles bene-
fit from digitalisation in a variety of ways.
Agricultural machines, for instance, can help farmers
to optimise fertilising and harvest planning based on
information fed into the vehicle about the location,
yield and soil quality. Among other things, this can
also lead to energy savings in field logistics and a
dynamic plan for achieving higher sales prices in
electronic marketplaces.
Just as in the automotive industry, data is reliably pro-
tected here with cryptography, which helps to gua-
rantee information security attributes like integrity
and confidentiality, etc. These safeguards against
attacks on electronic vehicle systems and networking
services are increasingly – and logically – factored
into early designs for implementation during manu-
facture.
The challenges faced by OEMs in the automotive
industry differ from those in other industries, as
described below:
- Lifetime: For an average of 18-30 years (cars: 18,
lorries: 24, transporters and motorbikes: 30), the
cryptographic infrastructure must be able to
handle large unit volumes (expected: 100 million
new cars worldwide every year from 2020) and
model lifecycle functions like certificate call-back
lists or even changes to algorithms.
- Performance and latency: Electronic vehicle com-
ponents and, in particular, cryptographically
secured services like permission allocation and
activation are much more dynamic than they are
for official document permissions. This means
‘live’ functions need to be integrated that will allow
data to be securely changed during operation.
M
Technologies & Solutions
secuview 1/2016 31
- Limited vehicle resources: Due to price pressures
on unit costs, many vehicles lack vital resources
like comprehensive security elements at the hard-
ware level. This must be offset through complex
cryptographic concepts, which are developed
differently from model to model and require the
support of a flexible cryptographic infrastructure.
In the future, Car2X communication and auton-
omous driving will both play a major role in the
automotive industry. Fully automated driving
presents greater risks with regard to operational
safety, as in the event of a vehicle incident the
driver will be unable to intervene directly. This must
be compensated by the proactive implementation
of safety features early on in the design process.
secunet KeyCore 2.0, our solution for automotive
key management, makes it possible to imple-
ment the security necessary for current and future
application scenarios – and look at the challenges
of ‘secure key management’ and ‘certificate infra-
structure’ in the rear-view mirror. n
More information:
Hartmut Kaiser
Technologies & Solutions
The number of mobile devices is growing rapidly. One of the factors in their success is the use of social networks. However, revealing your location (in particular) means opening yourself up to the risk of being very easily monitored
The Transparent Man – Myth or Reality?
Technologies & Solutions
32 secuview 1/2016
Thanks to your location, a complete profile of
your movements can be created without the
need to hack data from the network – sim-
ply by using the so-called ‘Nearby Friends’ feature,
which shows how far away your friends are.
Example: Andrea is sitting in a cafe in Marienplatz
in Munich and wants to know who is nearby. Her
friend Bernd is in the English Garden and her friend
Christina is in Odeonsplatz. Once she activates the
Nearby Friends feature, she receives the following
information:
1. Bernd is three kilometres away.
2. Christina is one kilometre away.
As it would be difficult to find Bernd in a three-kilo-
metre radius, Andrea needs a more specific loca-
tion. It’s easy to get one with the help of her Android
smartphone. She goes to Developer Options and
activates the Simulated Location feature – which
can change the GPS position of the smartphone at
any time to whatever coordinates you wish – and
sets her position to Königsplatz. All of the apps in-
stalled on her device will now use this location as
the phone’s GPS position. Now the Nearby Friends
feature says Bernd is two kilometres away.
The actual locations of friends Bernd and
Christina. The app only gives a person’s
distance in kilometres.
Bernd
Christina
Andrea
~ 1 km
~ 3 km
Bernd
Andrea
Königsplatz
Theresienwiese
secuview 1/2016 33
Technologies & Solutions
Andrea’s
three location
requests about
Bernd give
her this
information.
>>>
So Andrea has two pieces of information which
can be visualised as two circles. These have two
intersecting points and Bernd is at one of them. To
determine which is the correct position, a third
measurement is needed. Andrea therefore creates
a new simulated location at Theresienwiese. The
Nearby Friends feature now displays a circle with
a four-kilometre radius. Bernd is at the intersecting
point of all three circles.
As the numbers in the apps are rounded, the infor-
mation gleaned is still not entirely accurate. Bernd is
not located exactly where the three circles meet; he
will be within one kilometre of the intersecting point.
His exact position can be determined using a simple
algorithm.
For this purpose, Andrea places simulated locations
in a one-kilometre circle around the intersecting
point. If the feature shows Bernd is just one kilo-
metre away, the intersection of these two circles will
create a new, smaller area in which Bernd can be
found. If they show a greater distance, Bernd will
Bernd’s exact
position can
be determined
using a simple
algorithm.
Technologies & Solutions
34 secuview 1/2016
German IT SecurityCongress: Call for Papers
research institutes, local administration and other
institutions can submit their proposals on IT security
by email at [email protected]. The dead-
line for proposals is 31 August 2016.
The proposals will be anonymously evaluated by
a top-class programme committee. The best sub-
missions will be selected for the congress. You can
find more information on the BSI’s website. n
rom 16 to 18 May 2017, the 15th German
IT Security Congress will take place in Bonn
with the theme “Digital Society: Between
Risk Taking and Security Needs”. The German
Federal Office for Information Security (BSI) is look-
ing for companies, public authorities and research
institutes to help shape the agenda with topical,
creative and practice-orientated contributions.
Interested authors from companies, universities,
F
not be in the intersection of the two circles, meaning
those areas can be dismissed. Andrea must simply
repeat these steps until she has determined Bernd’s
position to the desired degree of accuracy. At best,
Bernd’s GPS position can be determined to within
10 metres.
The attack described here may seem very compli-
cated, but in practice, the steps can be completely
automated using Android emulators. Services like
this can be used for a fee online. If the Nearby
Friends feature is activated on the account users
want to spy on, the online programme will deliver
a precise breakdown of the individual’s location to
paying customers.
For the app industry, it’s even simpler; companies
can implement their own code directly in smartphone
apps in order to read the phone’s location – and
potentially contacts, emails, photos, etc. too. This
means that market research companies can easily
access personal data and advertising companies
can place highly targeted ads, for instance. De-
velopers can earn good money by integrating
these codes into their apps. According to c’t
Android 2016, around two-thirds of Android
apps share contacts with advertising or analytics
networks.
secunet is currently working on solutions that will
make it possible to create and implement rules for
forwarding and processing user data. However, as
always, the most powerful tool against data collec-
tion is the user themselves. Users should only install
apps they need on their smartphones and should
read each app’s required permissions carefully. n
More information:
Thomas Maier
secuview 1/2016 35
Dates
secunet’s head office has moved! You’ll now find us
at Kurfürstenstraße 58, 45138 Essen, Germany. Our
previous telephone and fax numbers haven’t changed.
In the office building on the Ruhrallee junction, we
now have enough room again for all of our Essen
employees.
New Address
Press Law Representative: Christine Skropke, [email protected] Editor, Head of Design and Content: Claudia Roers,[email protected]; deputy: Marc Pedack, [email protected]: Agentur für dynamisches Marketing, www.knoerrich-marketing.de
Copyright: © secunet Security Networks AG. All rights reserved. All content herein is protected under copyright law. No part of this magazine may be reproduced or otherwise used without the prior written consent of secunet Security Networks AG.Illustrations: Cover, p. 10: Sergey Nivens / Shutterstock; p. 2, 28: Andrey_Popov / Shutter- stock; p. 2, 32, 33 map: OpenStreetMap; p. 4, 6: Dietmar Wadewitz; p. 13 map: pavalena / Shutterstock; p. 13 Foto: Nikolai Sorokin / Fotolia; p. 14, 16: source: NAPMA; p. 18: from left to right: Klaus Hertz-Ladiges / Shutterstock, Zlatko Guzmic / Fotolia, Gena96 / Shutterstock; p. 31 Illustration: Lutz Lange; Others: secunet
September to November» NIAS - Cyber Security Symposium / Mons, Belgium
» One Day - One Topic Seminar on Biometrics / Zurich, Switzerland
» security essen / Essen, Germany
» AFCEA TechNet Europe / Rotterdam, Netherlands
» it-sa / Nuremberg, Germany
» Future of Cyber Conference 2016 / Prague, Czech Republic
» 12th ICAO TRIP Symposium & Exhibition / Montreal, Canada
» National IT Summit / Saarbrücken, Germany
» Workshop “IT Security on Board” / Munich, Germany
» Berlin Security Conference / Berlin, Germany
07 – 08 Sept 2016
22 Sept 2016
27 – 30 Sept 2016
04 – 05 Oct 2016
18 – 20 Oct 2016
20 – 21 Oct 2016
15 – 17 Nov 2016
16 – 17 Nov 2016
25 Nov 2016
29 – 30 Nov 2016
Would you like
to arrange an
appointment with us?
Just send an e-mail to
Editor:secunet Security Networks AGKurfürstenstraße 5845138 Essen, Germanywww.secunet.com
Subscribeto secuview
Would you like to receive secuview on a regular basis, free of charge?
Please choose between the print and electronic versions and subscribe at https://www.secunet.com/en/secuview.
There you can also change your preference or unsubscribe.
Imprint
Information is a key asset for a company. Therefore keeping it secure
is not a one-time issue but an on-going, comprehensive process. With
the ISMS (Information Security Management System) from secunet you
can manage the protection of these assets permanently, appropriately
and according to approved standards. And it is measurable and
comparable – at any time.
Sounds impossible? Put us to the test!
www.secunet.com/isms
Highly sensitive becomes highly secure.With the ISMS from secunet.
IT security partner of the Federal Republic of Germany