Safety is becoming cybersecurity under most circumstances. This should be reflected in the Cybersecurity Resilience Act when it is proposed and agreed upon in the European Union. In this paper, we define a range of principles which this future Act should build upon, a structure and argue why it should be as broad as possible. It is based on what the cybersecurity research community for long have asked for, and on what constitutes clear hard legal rules instead of soft. Important areas such as cybersecurity should be taken seriously, by regulating it in the same way we see other types of critical infrastructure and physical structures, and be uncompromising and logical, to encompass the risks and potential for chaos which its ubiquitous nature entails. We find that principles which regulate cybersecurity systems' life-cycles in detail are needed, as is clearly stating what technology is being used, due to Kirkhoffs principle, and dismissing the idea of technosolutionism. Furthermore, carefully analysing risks is always necessary, but so is understanding when and how the systems manufacturers may fail or almost fail. We do this through the following principles: Ex ante and Ex post assessment, Safety and Security by Design, Denial of Obscurity, Dismissal of Infallibility, Systems Acknowledgement, Full Transparency, Movement towards a Zero-trust Security Model, Cybersecurity Resilience, Enforced Circular Risk Management, Dependability, Hazard Analysis and mitigation or limitation, liability, A Clear Reporting Regime, Enforcement of Certification and Standards, Mandated Verification of Security and Continuous Servicing. To this, we suggest that the Act employs similar authorities and mechanisms as the GDPR and create strong national authorities to coordinate inspection and enforcement in each Member State, with ENISA being the top and coordinating organ.
翻译:在多数情况下,安全正在成为网络安全。当欧洲联盟提出和商定《网络安全复原力法》时,这一点应该反映在《网络安全复原力法》中。在本文件中,我们界定了未来法案应该建立的一系列原则,该未来法案应该建立起来,一个结构,并争论为什么它应该尽可能广泛。它是基于网络安全研究界长期以来一直要求采用什么,以及什么构成明确的硬性法律规则而不是软性。像网络安全这样的重要领域应该认真对待,以我们看到其他类型关键基础设施和实体结构的方式对它进行监管,并且不妥协和合乎逻辑,以涵盖其无所不在的性质所带来的混乱风险和潜在。我们发现,需要制定监管网络安全体系生命周期的一系列原则,同时明确指出由于柯克霍夫原则而正在使用何种技术,以及什么是明确的硬性法律规则而不是软性规则。 仔细分析风险总是有必要的,但理解系统制造商何时和如何失败或几乎失败。 我们通过下列原则来做到这一点:事后评估、安全和安保、设计时的强度、不透明性、不可靠性、不可靠性、不可靠性、不可靠性国家保险和可靠性的可靠性评级管理、透明度的每个机构。