3rd May 2019

vlada.cz: Prague 5G Security Conference announced series of recommendations: The Prague Proposals

On 2 May, 2019, the international Prague 5G Security Conference was held at the Czernin Palace with the following outcome.

 

PRAGUE PROPOSALS

The Chairman suggests following proposals in four distinct categories in preparation for the roll out of 5G and future networks.

A Policy

  • Communication networks and services should be designed with resilience and security in mind. They should be built and maintained using international, open, consensus-based standards and risk-informed cybersecurity best practices. Clear globally interoperable cyber security guidance that would support cyber security products and services in increasing resilience of all stakeholders should be promoted.
  • Every country is free, in accordance with international law, to set its own national security and law enforcement requirements, which should respect privacy and adhere to laws protecting information from improper collection and misuse.
  • Laws and policies governing networks and connectivity services should be guided by the principles of transparency and equitability, taking into account the global economy and interoperable rules, with sufficient oversight and respect for the rule of law.
  • The overall risk of influence on a supplier by a third country should be taken into account, notably in relation to its model of governance, the absence of cooperation agreements on security, or similar arrangements, such as adequacy decisions, as regards data protection, or whether this country is a party to multilateral, international or bilateral agreements on cybersecurity, the fight against cybercrime, or data protection.

B Technology

  • Stakeholders should regularly conduct vulnerability assessments and risk mitigation within all components and network systems, prior to product release and during system operation, and promote a culture of find/fix/patch to mitigate identified vulnerabilities and rapidly deploy fixes or patches.
  • Risk assessments of supplier’s products should take into account all relevant factors, including applicable legal environment and other aspects of supplier’s ecosystem, as these factors may be relevant to stakeholders’ efforts to maintain the highest possible level of cyber security.
  • When building up resilience and security, it should be taken into consideration that malicious cyber activities do not always require the exploitation of a technical vulnerability, e.g. in the event of insider attack.
  • In order to increase the benefits of global communication, States should adopt policies to enable efficient and secure network data flows.
  • Stakeholders should take into consideration technological changes accompanying 5G networks roll out, e.g. use of edge computing and software defined network/network function virtualization, and its impact on overall security of communication channels.
  • Customer – whether the government, operator, or manufacturer -- must be able to be informed about the origin and pedigree of components and software that affect the security level of the product or service, according to state of art and relevant commercial and technical practices, including transparency of maintenance, updates, and remediation of the products and services.

C Economy

  • A diverse and vibrant communications equipment market and supply chain are essential for security and economic resilience.
  • Robust investment in research and development benefits the global economy and technological advancement and is a way to potentially increase diversity of technological solutions with positive effects on security of communication networks
  • Communication networks and network services should be financed openly and transparently using standard best practices in procurement, investment, and contracting.
  • State-sponsored incentives, subsidies, or financing of 5G communication networks and service providers should respect principles of fairness, be commercially reasonable, conducted openly and transparently, based on open market competitive principles, while taking into account trade obligations.
  • Effective oversight on key financial and investment instruments influencing telecommunication network development is critical.
  • Communication networks and network service providers should have transparent ownership, partnerships, and corporate governance structures.

D Security, Privacy, and Resilience

  • All stakeholders including industry should work together to promote security and resilience of national critical infrastructure networks, systems, and connected devices.
  • Sharing experience and best practices, including assistance, as appropriate, with mitigation, investigation, response, and recovery from network attacks, compromises, or disruptions should be promoted.
  • Security and risk assessments of vendors and network technologies should take into account rule of law, security environment, vendor malfeasance, and compliance with open, interoperable, secure standards, and industry best practices to promote a vibrant and robust cyber security supply of products and services to deal with the rising challenges.
  • Risk management framework in a manner that respects data protection principles to ensure privacy of citizens using network equipment and services should be implemented.

>> Read full statement. 

 

Read also Countries agree on 5G security in Prague.

Members of the American Chamber of Commerce in the Czech Republic