The Incoherency Risk in the EU's New Cyber Security Policies

Jukka Ruohonen
DOI: https://doi.org/10.1007/978-3-031-72234-9_24
2024-09-27
Abstract:The European Union (EU) has been pursuing new cyber security policies in recent years. This paper presents a short reflection of four such policies. The focus is on potential incoherency, meaning a lack of integration, divergence between the member states, institutional dysfunction, and other related problems that should be at least partially avoidable by sound policy-making. According to the results, the four policies have substantially increased the complexity of the EU's cyber security framework. In addition, there are potential problems with trust, divergence between industry sectors and different technologies, bureaucratic conflicts, and technical issues, among other things. With these insights, the paper not only contributes to the study of EU policies but also advances the understanding of cyber security policies in general.
Cryptography and Security,Computers and Society
What problem does this paper attempt to address?
The problem that this paper attempts to solve is the risk of incoherence in the new EU cybersecurity policies. Specifically, the author focuses on the following issues: 1. **Lack of integration**: There may be problems of poor cooperation among different member states and institutions, resulting in the ineffective transmission of key information. 2. **Differences among member states**: Different member states may have differences in the understanding and implementation of policies, thus affecting the overall effect. 3. **Institutional dysfunction**: The implementation of the new policies may lead to problems in the functions of the existing institutions, such as poor information exchange, administrative conflicts, etc. 4. **Technical problems**: The application of new technologies (such as artificial intelligence) may not be mature yet, resulting in difficulties in actual operations. Through the analysis of four specific cybersecurity policies, the paper explores the potential problems that these policies may bring during the formulation and implementation processes, and emphasizes that these problems should be avoided or reduced through reasonable policy - making. ### Four specific cybersecurity policies 1. **Critical Entities Resilience (CER) Directive**: - Expands the scope of critical infrastructure, covering multiple fields such as energy, transportation, banking, financial markets, and healthcare. - Stipulates requirements for risk assessment, incident notification, and employee background checks for critical entities. 2. **Network and Information Systems Security (NIS2) Directive**: - Increases the security requirements for critical entities, including aspects such as business continuity and supply - chain security. - Establishes national Computer Security Incident Response Teams (CSIRTs) and strengthens the coordinating role of ENISA at the EU level. 3. **Cybersecurity Solidarity Act (CSA) Proposal**: - Proposes to establish pan - European Security Operations Centers (SOCs) and emergency mechanisms to deal with cross - border cybersecurity crises. - Emphasizes the importance of cross - border threat intelligence sharing and emergency response. 4. **Cybersecurity Resilience Act (CRA) Proposal**: - Aims to improve the security of information technology products, stipulating that manufacturers must provide necessary security patches and support. - Classifies products for management to ensure that high - risk products are strictly reviewed. ### Potential incoherence 1. **Horizontal incoherence among member states**: - Different member states may have differences in the interpretation and implementation of EU laws, resulting in inconsistency in policy implementation. 2. **Conflicts arising from background checks**: - Background checks in the CER Directive are carried out by law enforcement or intelligence agencies, while incident notifications are handled by other organizations, which may lead to operational conflicts. 3. **Synchronization problems of critical entities**: - The definition and management of critical entities may vary among different member states, resulting in duplication or omission of work. 4. **Inequal treatment of industries and technologies**: - Policies do not pay equal attention to different industries and technologies, which may lead to unreasonable resource allocation. 5. **Redundant administrative agencies**: - The newly established EU - CyCLONe network and CSIRT network may have overlapping functions, increasing administrative costs. 6. **Trust issues**: - Insufficient trust among member states and between member states and EU institutions may affect the effective implementation of policies. 7. **Technical and interoperability challenges**: - Building large cross - border SOCs faces challenges in technical interoperability and data sharing. 8. **Trust issues in information transmission**: - Member states have concerns about transmitting sensitive information to ENISA, which may lead to poor information circulation. 9. **Complexity at the EU level**: - The new policies increase the administrative complexity at the EU level, which may lead to permanent institutional incoherence. In general, through a detailed analysis of these potential incoherencies, this paper provides important references and improvement suggestions for future policy - making.