版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認領(lǐng)
文檔簡介
Europe’s
Cloud
Security
Regime
ShouldFocus
on
Technology,
Not
NationalityNIGELCORY|
MARCH2023TheEU’snewcloudcybersecurityregimeshouldfocusongoodsecuritypractices,astheU.S.FedRAMPregimedoes.EmulatingChina’sprotectionistfocusonfirmnationalityisabadsecuritypracticethatweakenstransatlanticinfluenceovercybersecurityissuesglobally.KEY
TAKEAWAYS......LikeChina,
someEuropeanUnion(EU)countrieswanttomisusecloudcybersecurityrulesfortheprotectionistpurposeofreplacingleadingU.S.cloudfirmssuchasAWSandGooglewithlocal
champions.TheproposedEuropeanCybersecurityCertificationSchemeforCloudServices(EUCS)followsChina’sapproachofmakinglocalfirmownershipandcontrolthedefiningfactorsinascertainingwhetheracloudserviceprovidercanbetrusted.TheEUCSdiffersfromtheU.S.FederalRiskandAuthorizationManagementProgram(FedRAMP)inseveralrespects:Itfocusesonfirmownership,usesclosedandpoliticizedtechnicalstandards,andassessesservicesfortheprivatesector,notjustgovernment.ProtectionistproponentsoftheEUCS(namelyFrance)wantitall:localcloudfirms,notAmericanones,butwithallthecybersecurityassistancetheycangetfromtheU.S.governmentandthesameU.S.cloudfirms
theywanttoexcludefromtheirmarkets.AprotectionistEUCSwouldunderminetransatlanticdigitaltradebymakingthenewTransatlanticDataPrivacyFrameworkirrelevant,sinceU.S.firmswouldbeprecludedfrommanagingaconsiderableamountofEU
data,nevermindtransferringitoverseas.TheEUanditsmemberstatesshouldremovetheprotectionistrestrictions
fromtheEUCS,focusontheactualtechnicalitiesofcybersecurity,andworkwiththeUnitedStatesonglobalcybersecurityissuesthrough
theEU-U.S.TradeandTechnologyCouncil.CONTENTSKeyTakeaways1Introduction3StoppingDataFlowsandCloudMarketAccessUnderminesEuropean,Transatlantic,andGlobalCybersecurity5ExplainingtheU.S.FedRAMPSystemforCloudCybersecurity6HowAmerica’sFedRAMPDiffersFromEurope’s“Sovereignty”-BasedApproachtoCybersecurity8FedRAMPIsOpentoFirmsFromAroundtheWorld8FedRAMPFocusesonCybersecurityPractices,NotFirmStructureandOwnership8DataLocalizationIsaMisguidedbutThankfullyMinorPartofFedRAMP,YetItIsCentraltoSecNumCloudandtheEUCSProposal
9FedRAMPIsOnlyUsedbyFederalGovernmentAgenciesandDoesNotImpactU.S.CriticalInfrastructureortheBroaderCommercialCloudMarket9NISTCybersecurityStandardsAreOpen,Transparent,andTechnicallyFocused—ENISAandEUCSProcessesandStandardsAreNot
10Recommendations11UseStandards“Crosswalks”toBuildTransatlanticCybersecurityCooperation
12NegotiateaTransatlanticAgreementonLawEnforcementAccesstoData
13AllowtheMutualRecognitionofU.S./EUCybersecurityCertificationandAuditingPrograms14Conclusion
14Endnotes15INFORMATIONTECHNOLOGY&INNOVATIONFOUNDATION|MARCH2022PAGE2INTRODUCTIONLikeChina,someEuropeanUnion(EU)countrieswanttomisusecloudcybersecurityrulestoreplaceleadingU.S.cloudfirmssuchasAWS,Google,andMicrosoftwithlocalones—inotherwords,enactingdigitalprotectionism.1
TheEuropeanCybersecurityCertificationSchemeforCloudServices’(EUCS)isthevehiclebywhichtheEUwantstosneakthisprotectionistschemeintooperation.Atfirstglance,theEUCSissimilartowhattheU.S.FederalRiskandAuthorizationManagementProgram
(FedRAMP)doesfortheU.S.federalgovernment:providesaharmonizedapproachtocloudcybersecuritycertificationstobothensure
abetteroveralllevelofprotectionandreducethecostandcomplexityforfirmsandgovernmentagenciescontractingcloudservices.However,unlikeFedRAMP,theEUCSfollowsChina’sapproachinmakinglocalfirmownershipandcontrol—ratherthantheuseofbest-in-classcybersecuritypractices—thedefiningfactorsinascertainingwhetheracloudserviceprovider
canbedeemed“trusted”andallowedtooperateinthe
localmarket.Thiswouldhaveamajorimpactontransatlanticdigitaltrade.ByexcludingU.S.cloudfirms,theEUCSwouldmakethenewTransatlanticDataPrivacyFramework(TDPF)irrelevant,asU.S.firmswouldbeprecludedfrommanagingaconsiderableamountofdataintheEU,nevermindtransferitoverseas—whileabidingwiththeEU’sGeneralDataProtectionRegulation(GDPR).TheEUanditsmemberstatesshouldremovetheseprotectionistrestrictions,focusontheactualtechnicalitiesofcybersecurity,andworkwiththeUnitedStatesonglobalcybersecurityissuesattheEU-U.S.TradeandTechnologyCouncil(TTC).Iftheydonot,theBidenadministrationshouldretaliate.Perhapsnotsurprisingly,FranceisleadingthepushtousetheEUCSfordigitalprotectionism.ThisfollowsFrencheffortstoreplaceAmericantechfirmswithlocalonesinsearchengines,onlineshort-termhousingrentals,andcloudservices.2
TheEUCSisbasedonsovereigntyrequirementsincludedinFrance’snational“SecNumCloud”cybersecurityregime,whichincorporatesforeignownershipandmanagementrestrictions,forcedlocaldatastoragerequirementsforpersonalandnonpersonaldata,andlocalstaffrequirements.TwoearlierreportsfromtheInformationTechnologyandInnovationFoundation(ITIF)analyzetheseprovisions,explaininghowtheybreachFrenchandEUtradelawcommitmentsundertheWorldTradeOrganization’s(WTO’s)GovernmentProcurementAgreementandtheGeneralAgreementonTradeinServices.3
Inforcingforeignfirmstosetupminority-ownedjointventurestobedeemed“trusted,”theEUCSproposalunfortunatelycopiesChina’sapproach.4U.S.
FedRAMP
differs
from
the
EUCS
in
three
key
ways:
FedRAMP
focuses
on
cybersecuritytechnicalities,
not
firm
ownership;
FedRAMP
is
only
used
by
the
federal
government,
whilethe
EUCSmay
be
used
more
broadly
in
the
economy;
and
FedRAMP
is
based
on
open
and
transparent
standards,EUCS
is
not.Ultimately,Francewantsitallandhasthegalltopushforit:Itwantslocalcloudfirms,notAmericanones,plusallthecybersecurityassistanceitcangetfromtheU.S.government
andthosesameU.S.cloudfirms.FrenchpolicymakersusethehypotheticalriskthatU.S.lawenforcementagencieshaveextraterritorialaccesstodataunderU.S.law(namely,theClarifyingLawfulOverseasUseofDataActorCLOUDAct)totargetU.S.cloudfirms.5
EvenGuillaumePoupard,theoutgoingdirectorofFrance'scybersecurityagency,admittedthata100
percentFrench"sovereign"cloudisunrealistic.6
AfteryearsofleadingtheattackagainstU.S.cloudINFORMATIONTECHNOLOGY&INNOVATIONFOUNDATION|MARCH2022PAGE3providers,PoupardrecentlytoldtheFrenchSenatethatFrenchcustomerswillneedtocontinuetorelyonpartnershipswithU.S.providers.7
Yet,thiswon’tstopFrance’songoingefforttoattackU.S.techfirms.However,itshouldhopefullygivepausetootherEUpolicymakersaboutthecybersecurity,trade,andeconomicrisksofblindlyfollowingFrance’slead.Incontrast,EuropeanpolicymakersshouldfollowAmerica’sFedRAMPleadinimplementingtheEUCS.FedRAMPdiffersfromSecNumCloudandEUCSsovereigntyrequirementsinthreekeyways.First,FedRAMPfocusesonthetechnicalitiesofcloudcybersecurityandnottheownershipofafirm;manyforeignfirmsarecertifiedunderFedRAMP.Second,FedRAMPonlyappliestothecloudservicesusedbyU.S.federalgovernmentagencies,notthebroadermarket.8SecNumCloudandtheEUCScouldpotentiallyapplytoabroadpartoftheEUeconomy.Third,theU.SNationalInstituteofStandardsandTechnology(NIST)setsthetechnicalcybersecuritystandardsusedbyFedRAMPinanopenandtransparentmanner,unliketheclosedandpoliticizedapproachtakenbytheEuropeanUnionAgencyforCybersecurity(ENISA)indevelopingthestandardsfortheEUCS.SomeEuropeanofficialshavejustifiedEUCSsovereigntyrequirements,inpartbecausetheymistakenlythinktheyarelikeprovisionsinFedRAMP—whichisfalse.Thisbriefingdetailsthesedifferencesandprovidesideasforaconstructivetransatlanticagendaoncybersecurity.ItexplainswhatFedRAMPis—and,mostimportantly,isn’t—incomparisonwithSecNumCloud,andhowit’scriticallyimportantthatEuroperemovetherestrictiveandmisguidedsovereigntyrequirementsintheEUCSproposal.Thereportthenoutlinesaconstructiveagendafortransatlanticcooperationoncybersecurity.Asummaryoftherecommendations:?
France,Germany,Italy,andtheirotherEUmemberstatesshouldremovethesovereigntyprovisionsintheirSecNumCloud-inspiredproposalfortheEUCS(andinFrance’sownSecNumCloud).TheUnitedStatesshouldrampupengagementwithGermanyandtheEuropeanCommissionatTTCtoensurethishappens.?
IfEuropefailstoremovetheserestrictions,theUnitedStatesshouldreevaluatecybersecuritycooperationandinformationsharingwiththeEUanditsmemberstatesanddevelopandinitiateretaliatorymeasures.?
TheEUandUnitedStatesshoulduseTTCtoimprovecybersecuritycooperationviastandards“crosswalks”toidentifycommonalities,differences,andpotentialfutureworktoensurecompatibilityinthedevelopmentanduseofcybersecuritystandardsintheirrespectivesystems.?
TheUnitedStatesandEUshouldprovidehigh-levelattentionandsupporttonewlyrestartedeffortsonane-evidence/CLOUDActagreement,justastheydidwiththeforthcomingTDPF.?
TheUnitedStatesandEUshouldworktowardthemutualrecognitionofU.S./EUCybersecuritycertificationandauditingprograms.INFORMATIONTECHNOLOGY&INNOVATIONFOUNDATION|MARCH2022PAGE4STOPPING
DATA
FLOWS
AND
CLOUD
MARKET
ACCESS
UNDERMINES
EUROPEAN,TRANSATLANTIC,
AND
GLOBAL
CYBERSECURITYCybersecurityconstitutesagrowingpartofforeign,trade,andnationalsecuritypolicy.However,ifleadingU.S.cloudprovidersarenot“trusted”inEurope,theycan’tshareinformationandtakecoordinatedactionaspartofthepublic-privatecollaborationneededtocombatglobalcybersecurityincidents.9
Thepublic-privatecollaborationandinformationsharingattheheartofinternationalcooperation
aregettingharder,withgrowingmarketaccessbarriersanddatatransferrestrictionsaroundtheworld.10Governmentcybersecurityagencies
alreadyfinditchallengingtohavecollaborative—andnotconfrontational—relationshipswithcloudfirms.11
Public-privatecybersecurityinformationsharingcanbedifficultinmanycountries,asfirmsneedlegalprotectionsfortheconfidentialityoftheinformationtheyshare(givenpotentiallegalandregulatoryimplications).Addingdatalocalization
andlocalcontrolandownershipbarrierswouldmakepublic-privatecollaborationevenmoredifficult,ifnotimpossible.12Forexample,inthefirstsystemicanalysisofdatalocalization’simpactoncybersecurity,PeterSwireandDeBraeKennedy-Mayohaveshownhowitseriouslyunderminesgoodcybersecurity.13Localizationpreventsthesharingofcybersecurity-relatedinformation.Italsoundermines13ofthe14controlsinoneofthemaininternationalstandardsforinformationandcybersecurity(ISO/IEC27002).14
Localizationalsopreventslocalorganizationsfrom
accessingbest-in-classcybersecurityservices.U.S.cloudfirmsneedmarketaccess,andseamlessdataflows,tobothshareinformationandtakepreventativeandremedialaction
intheeventofcyberattacks.Theyalsoneedtotransferdatatolearn
fromtheirglobaloperationstobetterdetectandrespondtocyberthreats
inEurope.UndertheEUCS,cloudproviderswouldnolongerbeabletoseamlesslymapglobalthreatpatternsagainstdomesticonesortracesignsofmaliciousactivityfromglobalnetworksontodomesticones.If
Europe
does
not
trust
U.S.
cloud
firms
at
home,
how
canthe
EU
and
United
States
make
the
case
togovernments
in
third-country
markets
to
trust
themas
part
of
new
transatlantic
efforts
to
support
theirfirms
in
building
digital
infrastructure
in
developing
countries?Forexample,in2022,GoogleCloudandothercloudfirmsdefendedthemselvesandtheircustomersfromthelargestdistributeddenial-of-serviceattackonrecord—at46millionrequestspersecond—inpartbecausetheywereabletoidentifyitearlyon,astherewereanomalousspikesinactivityfromIPaddressesinfourcountriessimultaneously:Brazil,India,Indonesia,andRussia.15
IfGoogleandotherglobalcloudproviderslosetheabilityto
collectandsharesecuritytelemetryfromaroundtheworld,it’sgoingtobefarmorechallengingtorespondtocyberthreatsandattacksinEuropeandelsewherearoundtheworld.Sovereignty
requirementswouldalsomakeitharder,ifnotimpossible,forU.S.firmstotakepreventativeactiontoprotectEuropeancustomersandcybersecurityagenciesintherun-uptoacyberattack.ItwouldalsobeharderforcloudproviderstoensureallservicevulnerabilitiesarepatchediftheirITinfrastructureisfragmentedordisconnectedfromtheglobalcloud.JointINFORMATIONTECHNOLOGY&INNOVATIONFOUNDATION|MARCH2022PAGE5incidentanalysisbetweengovernmentagenciesandfirmswouldalsobeharder,ifnotimpossible,ifU.S.andotherforeign
firmswereexcludedfromEurope’smarket.Europeancloudsovereigntyrequirementswouldprecludetransatlanticandglobalcybersecuritycooperationbeforeitevenstarts.In2022,theUnitedStatesandEuropelaunchedtheirfirstjointefforttofundtheirfirmsinbuildingsecurecriticalanddigitalinfrastructureindevelopingcountries(asanalternativetoChinesefirms).16
However,it’shardtoseehowthiscouldcontinueifEuropeenactssovereigntyrequirements.IfEuropedoesnottrustU.S.cloudfirmsathome,howcantheymakethecasetogovernmentsinthird-countrymarketstotrustthem?EXPLAINING
THE
U.S.
FEDRAMP
SYSTEM
FOR
CLOUD
CYBERSECURITYTheU.S.FedRAMPprogramprovidesastandardizedapproachtosecurityassessment,authorization,andcontinuousmonitoringforcloudservicesusedbyU.S.federalgovernmentagencies.17
AsITIFargued
in“ReformingFedRAMP:AGuidetoImprovingtheFederalProcurementandRiskManagementofCloudServices,”thetimeandcostofgettingFedRAMPcertifiedcouldbeimproved.18
However,overall,itprovidesacommon,highlevelofcloudcybersecurityprotection
insteadofeachagencydesigningits
owncloudcybersecurityspecificationsforcontracts.FedRAMPisspecificallytailoredtorisk.Itspecifiescontrolsaccordingtothreeimpactlevels:low,medium,andhigh.19
NISTsetsthetechnicalrequirementsforeach
level.20
Thehighertheimpactlevel,themorebaselinecontrols
required:123controlsforlow-impactsystems,325formoderate-impactsystems,and421forhigh-impactsystems.Low-impactrisksincludedataintendedforpublicuse,soanylossofdatawouldn’tcompromiseanagency’smission,safety,finances,orreputation.Moderate-impactrisksincludedatathat’snotavailabletothepublic,suchaspersonallyidentifiableinformation,suchthatabreachcanhaveaseriousimpactonanagency’soperations.MostU.S.federalgovernmentagenciesoperateatthismoderate-impactlevel
(in2017,nearly80percentofFedRAMPapplicationswereforthislevel)giventheiruseof“controlled,unclassifiedinformation.”21High-impactrisksincludesensitive(butunclassified)federalinformation,suchaslawenforcement,emergencyservices,andhealth
caredata,sobreachestogovernmentsystemscontainingthisdatawouldbehighlydamaging.In2017,theDepartmentofDefense(DOD)accountedfor33percentofhigh-baselineuseintheU.S.government,followedbythedepartmentsofVeteransAffairs(16percent),HomelandSecurity(13percent),andJustice(10percent).22FedRAMPassessmentsarefocusedonspecificcloudservices.FedRAMP
doesnotassessandauthorizefirmsoverall,butrathertheir“cloudserviceoffering”(CSO)atspecificimpactlevels.EachCSOgoesthroughseveralassessmentsbeforeapproval.23
EachCSOReadinessAssessmentReport(RAR)isassessedwithinan“authorizationboundary,”whichisessentiallyareviewoftheinternalservices,components,andotherdevicesalongwithconnectionstoexternalservicesandsystems.24
Ifneeded,theRARwilldetailwhatchangesthefirmwillneedtomake(andbeconfirmed)beforeitsCSOisconsideredready.FedRAMPcertificationisnotaone-and-doneassessment.25
OnceaCSOisintheFedRAMPmarketplace,itwillneedtogothroughannualassessments.Also,monthlymonitoringdetailsneedtobesubmittedtotheJointAuthorizationBoard(JAB),whichisthedecision-makingbodyINFORMATIONTECHNOLOGY&INNOVATIONFOUNDATION|MARCH2022PAGE6forFedRAMP.26
Forexample,formoderate-/high-impactservices,cloudserviceprovidersmustmitigatealldiscoveredhigh-riskvulnerabilitieswithin30days,mitigatemoderate-vulnerabilityrisksin90days,andmitigatelow-vulnerabilityrisksin180days.FedRAMPusesexpertthird-partyassessmentorganizations(PAOs)toassessCSOs.PAOsincludespecialistITcompliance,auditing,andadvisoryfirmssuchasA-Lign,Schellman,Fortreum,Kratos,Lunarline,anddozensofothers.27
PAOsthemselvesmustmeetFedRAMP-specificrequirementsandinternationalbestpractices,suchasthestandardISO/IEC17020onrequirementsforbodiesperformingconformityassessments.28
PAOsassessesaCSO’sabilitytomaintainaclearlydefinedsystemboundary,abilitytodescribeintraandinter-systemdynamics,userandsensitivemetadataflow,risksassociatedwithinterconnectionsusedtotransmitfederalorsensitivedata,andrisksassociatedwiththeuseofexternalsystemsandservicesthatarenotFedRAMPauthorized,amongotherissues.FedRAMP
is
tailored
to
risk,
using
three
impact
levels:
low,
medium,
and
high.
In
2017,
nearly
80percent
of
FedRAMP
applications
were
for
the
moderate
level,
given
government
agencies’
use
of“controlled,
unclassified
information.”NISTmaintainsandupdatestheguidelinesandtechnicalstandardsattheheartofFedRAMP’sassessmentframework,especiallyNIST’s“specialpublications”onsystemcontrolsandriskmanagement.ThecurrentstandardisNIST’s“SpecialPublication800-53-SecurityandPrivacyControlsforFederalInformationSystemsandOrganizations”series.Withinthis“800series”publicationareguidelinesonmanyspecificissues.29
NISTcontinuouslyupdatesitsguidelines,andthenperiodically(everyfiveorsoyears)doesafullreviewandupdate.
Forexample,NISTiscurrentlyrevisingguidelinesaspartofits“Revision5”withinanopenandtransparentprocess,withopportunitiesforindustryandgovernmentfeedback,toensureitaccuratelyreflectsbestpractices.30DatalocalizationisaverysmallandnarrowlytailoredpartofFedRAMP.FedRAMPdoesnotincludemisguideddatalocalizationrequirements,butindividualU.S.governmentagenciescanrequireitaspartofa
CSO.OnlyFedRAMP’shigh-impactservicesincludetheoptionforagenciestorequiredatalocalization.31
Onlyin2020didFedRAMP’sJABadddatalocalizationasanoptionalrequirementforaFedRAMPhigh-impactratingtocreatereciprocitybetweenFedRAMPandDOD‘sSecurityRequirementsGuide(SRG)—whichisDOD’sownprocessforauthorizingcloudproviders.DODSRGimpactlevel4isverysimilartoFedRAMPhigh,exceptthattheformercontainsadatalocalizationrequirement.JABandtheDefenseInformationSystemsAgencynegotiatedthiscompromisesothatinexchangeforJABaddingadatalocalizationoptiontoFedRAMPhigh,DODwouldgrantreciprocalauthorizationatimpactlevel4toanyCSOauthorizedatFedRAMPhigh.INFORMATIONTECHNOLOGY&INNOVATIONFOUNDATION|MARCH2022PAGE7HOW
AMERICA’S
FEDRAMP
DIFFERS
FROM
EUROPE’S
“SOVEREIGNTY”-BASEDAPPROACH
TO
CYBERSECURITYThefollowingsectionsdetailhowtheU.S.FedRAMPprogramisfundamentallydifferentfromFrance’sSecNumCloudandtheEUCSproposal.FedRAMP
Is
Open
to
Firms
From
Around
the
WorldFedRAMPisopentoU.S.andforeignfirms(seefigure1).CloudfirmsfromanycountrycanapplyforFedRAMPaccreditation;therearenonationalityorownershiprestrictions.AsofNovember2022,ofthe285FedRAMP-authorizedserviceofferingsandthe78undergoingreview,(atleast)20companieswereeitherheadquarteredabroadorU.S.subsidiariesofforeignfirms(e.g.,SiemensGovernmentTechnologiesInc.)thatareeitherFedRAMPauthorizedorpendingauthorization.TheseincludeAccenture(Ireland),Acendre(Australia),Blackberry(Canada),Canon(Japan),Collabware(Canada),Deloitte(UnitedKingdom),EnelX(Italy),EvidencePrime(Canada),ExLibris(Israel),Geotab(Canada),Hootsuite(Canada),Huddle(UnitedKingdom),Ipsos(France),ItamarMedical(Israel),MicroFocus(UnitedKingdom),Pexip(Norway),SAP(Germany),Siemens(Germany),ThomsonReuters(Canada),andWoltersKluwer(Netherlands).Accreditationlevelsvary;however,Accenture,Collabware,andSiemens,forexample,areallauthorizedatFedRAMPhigh.Figure
1:
Countries
with
firms
in
the
process
of
receiving
FedRAMP
accreditationFedRAMP
Focuses
on
Cybersecurity
Practices,
Not
Firm
Structure
and
OwnershipFedRAMPisfocusedondevelopingandauditingfirms’useofbest-in-classcybersecuritypractices,nottheownershiporcontroloffirms.ThebestanalogforFedRAMPinEuropeisGermany'sC5Standard,whichisalsoapurelytechnicalcybersecuritycertificationregime.32
Incontrast,manySecNumCloudrequirementsrelatetolegalaspects,organizationalstructure,andINFORMATIONTECHNOLOGY&INNOVATIONFOUNDATION|MARCH2022PAGE8investmentandownership—considerationsthatareunrelatedtotechnical-basedcertificationofcloudservicesorimprovingcybersecurity.Data
Localization
Is
a
Misguided
but
Thankfully
Minor
Part
of
FedRAMP,
Yet
It
IsCentral
to
SecNumCloud
and
the
EUCS
ProposalWhetherit’sinChina,France,ortheUnitedStates,datalocalizationisamisguidedpolicy—eveninthecaseofgovernmentdataandservices.Localizationdoesnotimprovedataprivacyorsecurity.33
Forexample,thehackoftheU.S.OfficeofManagementandBudget—oneofthemostnotorioushacks,giventheU.S.governmentdatainvolved—occurredagainstdataserviceson-premisesinU.S.governmentagencies.34
Localization’suseinFedRAMPaspartofcontractswithspecificU.S.federalgovernmentagenciesmeansit’sverynarrowlyapplied.Itsusedoesnotimpactthebroader,andmuchlarger,commercialU.S.cloudservicesmarket.Data
localization
is
bad
for
cybersecurity,
regardless
of
whether
it
involves
commercial
orgovernment
data.TheUnitedStates’limiteduseoflocalizationislikeCanada’spubliccloudmarket,whichisalsoopentoforeignfirmsandproductsandrequireslimitedlocalstorageforsensitiveandclassifieddata(atrest)inCanada.
However,Canadastillallowsdatatomove(i.e.,dataintransit),asitrecognizesthatcertaincloudservicescanberunoutsideCanada.35
BoththeU.S.’sandCanada’snarrowconceptualizationandapplicationoflocalizationforsensitivegovernmentdataandservicesisfarpreferredover
thebroad,vaguenationalsecurityconcernsChina,France,andothersinEuropeassertasarationale
fordigitalprotectionism.FedRAMP
Is
Only
Used
by
Federal
Government
Agencies
and
Does
Not
Impact
U.S.Critical
Infrastructure
or
the
Broader
Commercial
Cloud
MarketFedRAMPisacloudcybersecurityframeworkspecificallyforcloudprovidersthat
storeorprocessdatafortheU.S.federalgovernment.Itisnotrequiredforthebroaderarrayofsectorsandfirmsdeemedpartofcriticalinfrastructure(asinSecNumCloud).36
TheU.S.government’sprocurementmarketforcloudservicesissmallrelativetotherestoftheeconomy.Incomparison,SecNumCloudandEUCSsovereigntyrequirementscouldeffectivelyprecludeforeigncloudfirmsfromprovidingservicestogovernmentagenciesand
orcompetingacross
abroadswathofthecommercialeconomy.Forexample,inFrance,itappliestofirmsprovidingservicestothegovernmentaswellasto600-plusfirmsthatoperate“vital”and“essential”services.AsIreland,Sweden,andtheNetherlandsdetailedin
aletteroutliningtheirconcernsaboutSecNumCloud,itexertsbroadcommercialandtradeimplications.TheEUCSisaworkinprogress,soitsscopeisstillinflux,butthereareseveralhighlyproblematicproposalsunderconsiderationthatwouldsubstantiallyexpanditsscopebeyondhigh-impactworkloadsaffectingclassifiedinformationandnationalsecuritytomoderate/substantialorlow/basicusecases(dependingonthetierterminologytheEUCSadopts).Thiswouldbeinadditiontocoveringcriticalinfrastructure,whichisabroadpartoftheeconomy,includingfinancialservices,energy,transportation,utilities,telecommunications,andothersectors.Alternatively,inthebest-casescenario,thereisalsoaproposaltonarrowthescopeINFORMATIONTECHNOLOGY&INNOVATIONFOUNDATION|MARCH2022PAGE9ofEUCSsothatitisnarrowerthanFedRAMP,applyingonlytonationalsecurityorclassifiedworkloads.TheEUCScouldhaveabroadimpactontheEU’sdigitaleconomy.Evenifitonlyappliestosensitiveandhigh-impactareas,it’sexpectedthatallproviderswouldstriveforthishighcertificationbecausecloudservicesareusuallyjustonepartofabroaderecosystemofprovidersforgovernmentagenciesandfirmsserving
vitalinfrastructureandrelatedsectors.Inthisway,itwillessentiallybecomemandatorytobecertifiedatthehighestlevel.37TheEUCS’sbroadapplicationwouldalsobecomemandatoryinmanysectorsifitisconnectedtorelevantEUlegislation,suchastheNetworkandInformationSecurity(NIS)Directive
andtheDigitalOperationalResilienceAct(DORA,whichisfocusedonICTsecurityforfinancialfirms).Moreover,EUCSsovereigntyrequirementscouldconflictwiththoserules.Forexample,theAssociationforFinancialMarketsinEurope(AFME)poi
溫馨提示
- 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。
最新文檔
- 二零二五年度海上風(fēng)電設(shè)備駁船運輸與風(fēng)力發(fā)電合同3篇
- 二零二五年度城市綜合體電梯系統(tǒng)改造升級合同4篇
- 二零二五年度全渠道營銷方案設(shè)計合同4篇
- 2025版品牌租賃及品牌形象宣傳服務(wù)合同3篇
- 中草藥原料供應(yīng)與采購合同(2024)3篇
- 2025年度智能數(shù)據(jù)驅(qū)動促銷策略合作合同4篇
- 二零二五年度倉儲物流中心場地租賃合同終止及倉儲管理合同3篇
- 二零二五年度林業(yè)碳匯林地買賣合同模板
- 2025年度跨境電子商務(wù)平臺出資合同協(xié)議4篇
- 二零二五年度船舶股份清算合同范本4篇
- 2024年財政部會計法律法規(guī)答題活動題目及答案一
- 2024年云網(wǎng)安全應(yīng)知應(yīng)會考試題庫
- 寒假計劃表作息時間安排表
- 高考日語基礎(chǔ)歸納總結(jié)與練習(xí)(一輪復(fù)習(xí))
- 《預(yù)防犯罪》課件
- 【企業(yè)作業(yè)成本在上海汽車集團中的應(yīng)用研究案例7300字(論文)】
- 高中物理答題卡模板
- 化學(xué)用語專項訓(xùn)練
- 芳香植物與芳香療法講解課件
- 不孕癥診斷、治療新進展課件
- 學(xué)校食堂食品質(zhì)量控制方案
評論
0/150
提交評論