cybersecurity
spain-national-security-framework
Before we start, we thoroughly cover ENS (Esquema Nacional de Seguridad) in several lessons. This lesson soly focused on the security measures and implementation. Read an Introduction to ENS and learn more about the ENS Organizational and operational framework.
In order to implement Spain's πͺπΈ National Security Framework (ENS) we first need to name a committee that will be responsible for the implementation of the scheme.
Since 2022 ENS is governed by Real Decreto 311/2022 and establishes 4 roles in 2 levels according to its article 11. These roles are also detailed in the GuΓa 801 of the National Cryptographic Center.
π‘ While the ENS defines distinct roles with specific responsibilities, it's important to note that in practice, especially in smaller organizations or those with limited resources
This committee will be composed of a president who will have the role of moderator of the meetings and in case of a tie vote, he will have the casting vote, some members who will have voice and vote within the meetings and a secretary of the committee who is in charge of the convocations and reads the minutes of the last meetings:
Determines the security requirements of the information treated according to the parameters of Annex I of the ENS. It can be a person or a collegiate body.
To implement an Information Security Management System (ISMS) that complies with Spainβs Esquema Nacional de Seguridad (ENS), you'll need to follow a structured approach that aligns with the regulatory framework. Below is a step-by-step implementation plan:
The following is a list of all the protective measures that we must implement to comply with the ENS.
The protection of facilities stands as a fundamental pillar in the National Security Scheme, playing a critical role in preserving the integrity and information of a public entity. This component, which ranges from strategic infrastructures to key buildings, becomes an essential link for secure and sustainable development.
The protection of facilities refers to the application of measures and strategies aimed at physically and strategically safeguarding places and structures considered crucial for the functioning and well-being of a society. These facilities can range from power plants and water treatment plants to government buildings and research centers.
Among its controls we have:
According to the ENS, the infrastructure of all systems must follow a distribution of separate zones according to their function and have access control for these zones
Dimensions | Protection measures | |||
---|---|---|---|---|
L | M | H | Org | Operational Framework |
Applies | = | = | mp.if.1 | Separate areas with access control |
All entities must have access control to the premises and with entry and exit registration
Dimensions | Protection measures | |||
---|---|---|---|---|
L | M | H | Org | Operational Framework |
Applies | = | = | mp.if.2 | Identification of people |
All facilities must have favorable temperature and humidity conditions, and have protection against threats obtained from risk analysis
Dimensions | Protection measures | |||
---|---|---|---|---|
L | M | H | Org | Operational Framework |
Applies | = | = | mp.if.3 | Conditioning of premises |
According to the ENS, facilities must have power supply in case of electrical failure or at least guarantee the correct operation of emergency lights
Dimensions | Protection measures | |||
---|---|---|---|---|
L | M | H | Org | Operational Framework |
Applies | + | = | mp.if.4 | Electrical power |
Facilities must have fire protection, as well as equipment to extinguish fire
Dimensions | Protection measures | |||
---|---|---|---|---|
L | M | H | Org | Operational Framework |
Applies | = | = | mp.if.5 | Fire protection |
As with the previous point, there must be protection in case of floods, we can reference this protection according to the industrial regulations followed in the installation and adaptation of the building for fires and floods
In this case, controls must be applied in medium and high category entities.
Dimensions | Protection measures | |||
---|---|---|---|---|
L | M | H | Org | Operational Framework |
Does not apply | Applies | = | mp.if.6 | Flood protection |
All equipment that leaves and enters must be identified and documented, as well as who authorized it, the date of departure and the estimated time.
Dimensions | Protection measures | |||
---|---|---|---|---|
L | M | H | Org | Operational Framework |
Applies | = | = | mp.if.7 | Equipment entry and exit registry |
Public entities with high category systems must have alternative facilities in case an incident takes the main facility out of operation, these alternative facilities must have the same security guarantees as the usual ones
Dimensions | Protection measures | |||
---|---|---|---|---|
L | M | H | Org | Operational Framework |
Does not apply | Does not apply | Applies | mp.if.1 | Alternative facilities |
The protection of assets and personnel involves the implementation of strategies and measures aimed at safeguarding both the critical resources of the country's public entities, as well as strategic information and the security of its citizens.
Within the ENS, personnel management and protection is mostly related to the function and obligations within their job position as well as training and awareness regarding security, its controls are:
In this control, documentation must be stipulated with the security responsibilities of each employee according to their job position, as well as the requirements that must be met to occupy the job position and in personnel selection.
Dimensions | Protection measures | |||
---|---|---|---|---|
L | M | H | Org | Operational Framework |
Does not apply | Applies | = | mp.if.1 | Job characterization |
The duties and responsibilities regarding security in the job position must be explained. Disciplinary measures must also be taken in case of non-compliance with duties in the job position
Dimensions | Protection measures | |||
---|---|---|---|---|
L | M | H | Org | Operational Framework |
Applies | = | = | mp.per2 | Duties and obligations |
The ENS explains that talks should be given periodically to staff to remind them of security regulations and incident management procedures
Dimensions | Protection measures | |||
---|---|---|---|---|
L | M | H | Org | Operational Framework |
Applies | = | = | mp.per3 | Awareness |
This control involves correctly managing the institution's information and training staff so they know how to react to different types of incidents
Dimensions | Protection measures | |||
---|---|---|---|---|
L | M | H | Org | Operational Framework |
Applies | = | = | mp.per4 | Training |
There must be personnel who take charge of functions in case of any unavailability of regular personnel.
Dimensions | Protection measures | |||
---|---|---|---|---|
L | M | H | Org | Operational Framework |
Does not apply | Does not apply | Applies | mp.per5 | Alternative Personnel |
Regarding the protection of assets, the standard is more oriented towards workstations and their manipulation and protection
This control establishes the policy that the work desk must be clean and only the activity that is being carried out at the moment should be performed, material that is not being used must be stored in a closed place
Dimensions | Protection measures | |||
---|---|---|---|---|
L | M | H | Org | Operational Framework |
Does not apply | Does not apply | Applies | mp.eq1 | Clear desk |
In medium category systems, workstations must have a lock after a period of inactivity and require authentication to be reactivated, mainly for the purpose of closing open sessions.
Dimensions | Protection measures | |||
---|---|---|---|---|
L | M | H | Org | Operational Framework |
Does not apply | Does not apply | Applies | mp.eq2 | Workstation lock |
This is the most rigorous control within the asset protection controls and it is that there must be an inventory of all portable equipment that leaves the facility along with the person responsible for it, and there must be documentation of all information procedures on any incident that may exist with said equipment
This equipment must also have limitation of accessible information and storage of sensitive information, it is advisable to handle information with a high level of encryption
Dimensions | Protection measures | |||
---|---|---|---|---|
L | M | H | Org | Operational Framework |
Does not apply | Does not apply | Applies | mp.eq3 | Protection of portable equipment |
Alternative equipment must be available in case the usual equipment fails.
Dimensions | Protection measures | |||
---|---|---|---|---|
L | M | H | Org | Operational Framework |
Does not apply | Does not apply | Applies | mp.per4 | Alternative means |
It is important to have protection of the information that can be handled within a public entity, as well as its services, which is why the ENS maintains controls regarding these areas which we will see below
This control is based on systems with personal data, which must meet the requirements of the Organic Law on Data Protection and Guarantee of Digital Rights
Dimensions | Information protection | |||
---|---|---|---|---|
L | M | H | Org | Operational Framework |
Applies | = | = | mp.info1 | Personal data |
This policy gives the information manager the responsibility to determine its classification and describe the criteria for labeling information according to its security level
Dimensions | Information protection | |||
---|---|---|---|---|
L | M | H | Org | Operational Framework |
Applies | + | = | mp.info2 | Information classification |
There must be high-level encryption for stored and transmitted information
Dimensions | Information protection | |||
---|---|---|---|---|
L | M | H | Org | Operational Framework |
Does not apply | Does not apply | Applies | mp.info3 | Encryption |
The electronic signature must exist within systems and documents to verify their integrity and authenticity
Dimensions | Information protection | |||
---|---|---|---|---|
L | M | H | Org | Operational Framework |
Applies | + | ++ | mp.info4 | Electronic signature |
Time stamps help analyze the integrity of information when it is required temporarily, generally oriented to data used as electronic evidence
Dimensions | Information protection | |||
---|---|---|---|---|
L | M | H | Org | Operational Framework |
Applies | = | = | mp.info5 | Time stamps |
Dimensions | Information protection | |||
---|---|---|---|---|
L | M | H | Org | Operational Framework |
Applies | = | = | mp.info6 | Document cleaning |
There must be backups that have the same level of security as the original data and must cover both work information and applications and keys
Dimensions | Information protection | |||
---|---|---|---|---|
L | M | H | Org | Operational Framework |
Applies | = | = | mp.info9 | Backups |
Within the protection of services, the following controls are established
There must be security measures that will be used to prevent incidents such as SPAM or malware, in addition to documentation explaining the safe use of email
It is advisable to use a trusted email provider
Dimensions | Service protection | |||
---|---|---|---|---|
L | M | H | Org | Operational Framework |
Applies | = | = | mp.s.1 | Email protection |
There must be security measures to prevent incidents such as URL and cookie manipulation, privilege escalation, among others. For high category systems, the use of qualified authentication certificates is recommended
Dimensions | Service protection | |||
---|---|---|---|---|
L | M | H | Org | Operational Framework |
Applies | = | + | mp.s.2 | Protection of web services and applications |
There must be protection against these types of attacks, such as request control and load balancers, as well as systems to detect the attack and procedures to react to the attack
Dimensions | Service protection | |||
---|---|---|---|---|
L | M | H | Org | Operational Framework |
Does not apply | Applies | + | mp.s.8 | Protection against denial of service |
There must be availability of alternative means to provide the service of applications with the same guarantees as the usual means, this can be included in the business continuity plan
Dimensions | Service protection | |||
---|---|---|---|---|
L | M | H | Org | Operational Framework |
Does not apply | Does not apply | Applies | mp.s.9 | Alternative means |