Estonian Free PressEstonian Free Press
  • National Security
    • United States
    • United Kingdom
    • Europe
    • Estonia
    • Latvia
    • Lithuania
    • Moldova
    • Poland
    • Russia
    • Ukraine
  • Counterterrorism
  • Cybersecurity
  • Intelligence

Subscribe to Updates

Get the latest National Security News directly to your inbox.

What's Hot

Membrii CPA cer începerea negocierilor de aderare a Moldovei la UE

March 24, 2023

A.Mazuronis tvirtina, kad A.Skardžiui kelio atgal į Darbo partiją nėra: mūsų partija nėra alaus baras

March 24, 2023

US Offers Heavily Discounted AH-1Zs to Slovakia to Compensate for Donated MiG-29s 

March 24, 2023
Facebook Twitter Instagram
  • Privacy Policy
  • Terms and Conditions
  • Contact
Friday, March 24
Estonian Free PressEstonian Free Press
  • National Security
    • United States
    • United Kingdom
    • Europe
    • Estonia
    • Latvia
    • Lithuania
    • Moldova
    • Poland
    • Russia
    • Ukraine
  • Counterterrorism
  • Cybersecurity
  • Intelligence
en English
en Englishet Estonianlv Latvianlt Lithuanianpl Polishro Romanianru Russianuk Ukrainian
Trending
  • Membrii CPA cer începerea negocierilor de aderare a Moldovei la UE
  • A.Mazuronis tvirtina, kad A.Skardžiui kelio atgal į Darbo partiją nėra: mūsų partija nėra alaus baras
  • US Offers Heavily Discounted AH-1Zs to Slovakia to Compensate for Donated MiG-29s 
  • Gavrilița ar putea candida la alegerile pentru Primăria Capitalei
  • Fost șef PG critică reforma justiției: Lucrurile nu merg spre bine
  • Opozicija reikalauja parlamentinio tyrimo dėl galimo informacijos nutekinimo K.Bartoševičiui
  • Dosar de corupție: Președintele raionului Călărași și un șef, în arest
  • Boris Johnson would lose Uxbridge by-election, says Tory pollster
Subscribe
Facebook Twitter Instagram
Estonian Free PressEstonian Free Press
Home » EU countries seek way out of impasse on sovereignty requirements for cloud services

EU countries seek way out of impasse on sovereignty requirements for cloud services

January 30, 20235 Mins Read Cybersecurity
Share
Facebook Twitter LinkedIn Pinterest Email

A joint paper obtained by EURACTIV details six possible scenarios to deal with the controversial sovereignty requirements in the upcoming certification scheme for cloud providers.

The European Commission has been pushing to include sovereignty requirements in the Cybersecurity Certification Scheme for Cloud Services (EUCS), the first certificate under the EU’s Cybersecurity Act.

These sovereignty requirements are intended to put the EU data out of the reach of foreign jurisdictions, notably by mandating the localisation of European data centres, immunity from non-EU laws and conditions for the people or organisations that control the cloud provider.

Although the scheme per se is not mandatory, its level of assurance ‘high’ might become mandatory for sectors like energy operators and banks, deemed highly critical under the recently revised Networks and Information System Directive (NIS2).

The Netherlands and smaller member states have opposed the scheme, while France, Italy and Spain rallied behind Commissioner Thierry Breton’s push toward ‘technological sovereignty’. The two camps have discussed a potential compromise in the last weeks.

The joint document, dated 23 January, has been developed in this context, as it sets out six scenarios to prompt feedback from other member states. The non-paper states that future discussions should involve market actors and consider the effect of the sovereignty criteria on future schemes.

Moreover, it requests the Commission to assess the potential economic impact of these requirements and to what extent they would be compatible with trade law.

Sub/Sub+ and High

The first option entails setting up an extra level of assurance in the scheme by splitting in two the level ‘substantial’, the one below high, with the latter maintaining the immunity requirements. Level substantial two would essentially be a level high without the sovereignty requirements.

As pros, the paper mentions that critical service providers must comply with immunity requirements providing extensive protection from foreign government access, the original technical requirements would be maintained, and EUCS would remain comparable with similar schemes.

As cons, the scope is deemed too broad as it might become mandatory under NIS2, the market impact remains unclear, the number of cloud service providers at level ‘high’ would remain limited, and there might be inconsistencies with the Cybersecurity Act.

High+ (critical uses)

An alternative option would be to split the top assurance level, creating a ‘high’ without immunity criteria and a ‘high+’ with the requirements. This high+ would apply to specific critical uses that would be self-assessed by the users based on general guidelines.

On the plus side, this approach would be more targeted, as the immunity criteria would be limited to types of data that need this protection, whilst the other users would be able to identify cloud services with high cybersecurity, bringing clarity to the market.

The downside is similar to the first scenario, especially regarding vagueness and legal consistency. Moreover, “not covering all assurance levels and might make assurance level “high” somewhat irrelevant,” the paper reads.

Extension Profiles

The third possibility is to create extension profiles that introduce the sovereignty criteria, regardless of the assurance levels, for cloud usage in specific sectors, like health or military.

As most EU providers still lack the resources for the level of assurance ‘high’, this option would still give them a competitive advantage over foreign competitors as it would apply to all assurance levels. Moreover, this alternative enables flexibility and a case-by-case approach driven by the customer.

However, the paper also notes that the immunity criteria would be needed to protect sensitive data, which would not be sufficiently protected with assurance levels’ basic’ and ‘substantial’.

Five evaluation levels

The fourth option combines the first two, creating sub-levels for both ‘high’ and ‘substantial’. The positive side is that this approach would provide all the benefits of the Extension Profiles whilst also being easier to communicate and operationalise.

Nevertheless, the joint paper reiterates concerns about the vagueness, mandatory nature, lack of flexibility, legal challenges and lack of consistency with other certification schemes.

Trustworthiness evaluation

An alternative proposed is outside the Cybersecurity Act’s scope and would include introducing a European evaluation mechanism based on trustworthiness for non-EU cloud operators and supplies as a pre-requisite to entering the single market.

The assessment could be based on security and legislative criteria, such as extra-territorial legislation, data transfers and compliance with European data protection rules. Germany’s IT Security Law 2.0 and the risk profiles of the 5G toolbox are mentioned as potential building blocks.

This approach would not affect technical certification, leaving maximum flexibility to customise the requirements of political nature. Still, it would further delay the process since a new initiative would be needed.

Additional disadvantages are that the scope can hardly be made future-proof, compatibility with trade agreements would have to be assessed, users’ choices might be limited, and it would create uncertainty for non-EU providers.

Integration through compliance

The final idea is to introduce the immunity requirements under EU legislation like the Data Act, which already includes provisions on international data transfers.

Therefore, the criteria would not be in the scheme itself, but to qualify for the scheme, cloud providers would have to show compliance with the relevant legislation.

The pros listed are that these criteria would be politically discussed, the EUCS would move forward, and the approach might be targeted and applied to all assurance levels and future schemes.

Nevertheless, this scenario would require modifying current or upcoming legislation to add the immunity aspect, meaning it would take significantly longer.

[Edited by Alice Taylor]

Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email

Articles Liés

EU institutions, member states in competition over cyber intelligence

March 22, 2023 Cybersecurity

TikTok, apps ‘sensitive to espionage’ to be banned from Dutch civil servants’ devices

March 22, 2023 Cybersecurity

ESF Partners, NSA, and CISA Release Identity and Access Management Recommended Best Practices for Administrators

March 22, 2023 Cybersecurity

Cybersecurity Advisory Committee Discusses Work to Help ‘Target-Rich, Cyber-Poor’ Sectors

March 22, 2023 Cybersecurity

#StopRansomware: LockBit 3.0

March 21, 2023 Cybersecurity

New CISA Cybersecurity Advisory Committee Members Include Former National Cyber Director

March 21, 2023 Cybersecurity
Don't Miss
Lithuania

A.Mazuronis tvirtina, kad A.Skardžiui kelio atgal į Darbo partiją nėra: mūsų partija nėra alaus baras

By woe whMarch 24, 20230

1 nuotr. Andrius Mazuronis. Eltos nuotr.   „Pasakysiu tokį palyginimą – mūsų partija, kad ir…

US Offers Heavily Discounted AH-1Zs to Slovakia to Compensate for Donated MiG-29s 

March 24, 2023

Gavrilița ar putea candida la alegerile pentru Primăria Capitalei

March 24, 2023

Fost șef PG critică reforma justiției: Lucrurile nu merg spre bine

March 24, 2023
Stay In Touch
  • Facebook
  • Twitter
  • Pinterest
  • Instagram
  • YouTube
  • Vimeo
Our Picks

Dosar de corupție: Președintele raionului Călărași și un șef, în arest

March 24, 2023

Boris Johnson would lose Uxbridge by-election, says Tory pollster

March 24, 2023

TikTok CEO grilled by US lawmakers on safety

March 24, 2023

Gavrilița sparge tăcerea: În ce relație e cu Maia Sandu și Dorin Recean

March 24, 2023

Subscribe to Updates

Get the latest National Security News directly to your inbox.

© 2023 Estonian Free Press. All rights reserved.
  • Privacy Policy
  • Terms and Conditions
  • Contact

Type above and press Enter to search. Press Esc to cancel.