SlideShare a Scribd company logo
1 of 75
Download to read offline
Regulation of Cryptography
in Russia
Alexey Lukatsky
Security Business Consultant




© 2011 Cisco and/or its affiliates. All rights reserved.   1
Increasing Role of Cryptography




                          •          Extended interaction with customers and partners,
                                     enhanced efficiency, accelerated globalization
                          •          Growth of system complexity, IT maturity, appearance of new tools
                          •          Changed threat landscape
© 2011 Cisco and/or its affiliates. All rights reserved.                                                 2/75
Social
Outsourcing                                  Virtualization   Clouds   Mobility   Web 2.0
                                                                                            Networks




  © 2011 Cisco and/or its affiliates. All rights reserved.                                         3/75
BUSINESS AND IT                                        REQUIREMENTS OF
    PREFERENCES                                                REGULATORY
                                                                    BODIES



                 Co-working                                       Legal Import

                  Clouds and
                                                                  Legal usage
                  outsourcing

                 Holdings                                    Legal distribution




© 2011 Cisco and/or its affiliates. All rights reserved.                          4/75
• The first public regulatory documents
       date back to 1995
• The key prerequisite when developing
       legal documents is the total control
       cryptographic tools through their
       whole lifetime
• The legal document development is
       based on protection of state secrets
• Federal Security Bureau (FSB) is still
       adhering to this approach even after
       15 years, despite the growing number
       of its opponents


© 2011 Cisco and/or its affiliates. All rights reserved.   5/75
Import of cryptographic tools to
                                                           the territory of the Russian
                                                           Federation
                                                           Licensing of cryptography-
                                                           related activities
                                                           Use of certified cryptographic
                                                           tools


© 2011 Cisco and/or its affiliates. All rights reserved.                                6/75
1           Fuzzy terminology

                                                                              4    Incomprehension of a modern
                                                                                   business threat model




                                                           3   Various stages of
                                                               life cycle imply
                                                               various                    Unavailability of well-defined
                    Legacy                                     requirements           5   position of the regulatory
          2         rules                                                                 body
© 2011 Cisco and/or its affiliates. All rights reserved.                                                              7/75
© 2011 Cisco and/or its affiliates. All rights reserved.   8
• Cryptographic solutions of arbitrary implementation
• HMAC of arbitrary implementation
• Digital signature tools of arbitrary implementation
            But not electronic signature tools (DS ≠ ES in new Russian regulations)

• Encoding tools
• Tools for creation of crypto keys
• Crypto keys


• but that is not all



© 2011 Cisco and/or its affiliates. All rights reserved.                              9/75
• Systems, equipment, and components designed or modified
       to perform cryptanalytic functions
• Systems, equipment, and components designed or
       modified for using cryptographic techniques to generate
       the expanding code for systems with broadening
       spectrum, including code hopping for systems with
       frequency hopping
• Systems, equipment, and components designed or
       modified for using cryptographic techniques of channel or
       scrambling code formation for time-modulated ultra-
       wideband systems.
• Cryptography ≠ compression or encoding techniques
© 2011 Cisco and/or its affiliates. All rights reserved.           10/75
• The new law "On Licensing Certain Activities" has made
       companies obtain FSB-issued licenses for the development,
       manufacture, distribution, and maintenance of
            information systems protected via cryptographic tools
            telecommunication systems protected via cryptographic tools


• Information system, in the aggregate, consists of database
       information together with IT and hardware




© 2011 Cisco and/or its affiliates. All rights reserved.                  11/75
• Usually, the need for using encryption
      (cryptographic) tools arises when other                     Laws
      methods fail to provide secure
      information storage and processing
            These cases include, for example, transfer
            of personal data via Internet where it is
            fundamentally impossible to exclude              Confidentiality
            illegal intruder access to information being
            transferred
                                                                   ≠
                                                               Encryption



                                                              Normative legal
                                                           documents issued by
                                                             regulatory bodies

© 2011 Cisco and/or its affiliates. All rights reserved.                         12/75
• Obtain entity's approval for transferring clear information
            This is what Roskomnadzor does on its web site

• Provide a controlled access zone
• Use optical communication channels
            and correct threat model

• Assign the task of providing confidentiality to communication
       provider
            Under special agreement

• Use encryption tools




© 2011 Cisco and/or its affiliates. All rights reserved.          13/75
• Most of FSB's legal documents refer to 'confidential information'
       or 'information of confidential nature'
• Federal law FZ-149 "On Information, Information Technologies,
       and Information Security" (as revised in 2006) refers to
       confidentiality as requirement, not as property or feature of
       information
• Decree No.188 ("On Approval of a List of Data of Confidential
       Nature") also says nothing of confidentiality




© 2011 Cisco and/or its affiliates. All rights reserved.               14/75
• All life cycle stages of cryptographic tool

                                                                           Providing
                                                             Import                       Operation
                                                                           services




                                                           Development    Maintenance       Export




                                                                                          Control and
                                                           Manufacture    Distribution
                                                                                          supervision




                                                            Evaluation   Implementation




© 2011 Cisco and/or its affiliates. All rights reserved.                                                15/75
© 2011 Cisco and/or its affiliates. All rights reserved.   16
• Statute on importation of the encryption (cryptographic) tools to
       the customs territory of the customs union and exportation from
       the customs territory of the customs union
• Encryption (cryptographic) tools which are subject to restricted
       importation to the customs territory of the customs union and
       restricted exportation from the customs territory of the customs
       union
• These provisions are applied to ANY manufactures


• If a tool's encrypting functionality is not used or it is not its primary
       purpose, the tool is nevertheless considered to be cryptographic


© 2011 Cisco and/or its affiliates. All rights reserved.                  17/75
• Printers, copymakers, and faxes
• Cash registers
• Pocket computers
• Pocket devices for recording, playing and displaying
• Computing machinery and their constituent parts
• Subscribers' communication units
• Basic stations
• Telecommunications equipment
• Software


© 2011 Cisco and/or its affiliates. All rights reserved.   18/75
• Equipment for radio- and television broadcasting and reception
• Radio-navigation receivers, remote control devices
• Internet access equipment
• Electronic circuitry, integrated microcircuits, data storage devices
• Other
• A large number of items from Groups 84 and 85 of the Unified
       Customs Tariff of the customs union formed by the Republic of
       Belarus, Republic of Kazakstan, and Russian Federation




© 2011 Cisco and/or its affiliates. All rights reserved.                 19/75
Simplified Procedure                     By Licensing

                • Import under                             • FSB's authorization
                  notification                             • Import by the
                                                             license issued by
                                                             the Ministry of
                                                             Industry and Trade

• Verification of the legality of import under notification
            http://www.tsouz.ru/db/entr/notif/Pages/default.aspx

• Verification of the legality of import under license
            A copy of FSB's authorization for import

© 2011 Cisco and/or its affiliates. All rights reserved.                           20/75
• Goods containing encryption (cryptographic) tools, which include
       any of the following components:
            symmetric cryptographic algorithm using cryptographic key of up to 56 bit
            length; or
            asymmetric cryptographic algorithm based on any of the following methods:
                            Factorization of integers with length shorter than or equal to 512 bits;
                  Calculation of discrete logarithms in multiplicative group of the finite field
            with the size less or equal to 512 bits; or
                Discrete logarithm in the group with the size different from the one
            mentioned in “ii” above but less than 112 bits

• Goods with cryptographic functionality blocked by manufacturer
• Authentication and digital signature tools



© 2011 Cisco and/or its affiliates. All rights reserved.                                               21/75
• Encryption (cryptographic) tools which are components of
       software operating systems, with cryptographic capabilities that
       cannot be changed by users, which have been developed to be
       installed by users themselves without further essential vendor
       support, their technical documentation (description of
       cryptographic conversion algorithms, interaction protocols,
       interface description, etc.) being publicly accessible
• Encryption (cryptographic) equipment specially designed and
       restricted for use in banking or financial sphere
• Wireless electronic equipment performing data encryption only in
       radio channel with maximum distance of wireless action, without
       amplification and retransmission, less than 400 m according to
       manufacture's technical requirements

© 2011 Cisco and/or its affiliates. All rights reserved.                  22/75
• Encryption (cryptographic) tools used for protection of process
       channels of information and telecommunications systems and
       communications networks
• Portable or mobile electronic means of civilian use without end-to-
       end encryption
• Personal smart cards

• Receiving equipment for radio broadcasting, commercial
       television and broadcasting for limited audience
• Copy protection tools




© 2011 Cisco and/or its affiliates. All rights reserved.            23/75
© 2011 Cisco and/or its affiliates. All rights reserved.   24
• FSB license for encryption business
            Providing services in the sphere of information encryption
            Support and maintenance of encryption tools
            Distribution of encryption tools
            Development and production of encryption tools protected by using encryption
            (cryptographic) tools of information and telecommunication systems



• On May 4, 2011, a new version of law "On Licensing Certain
       Activities" (99-FZ) was adopted
            Unified license for development, production, distribution, performance of
            works, providing of services, and maintenance of encryption tools, information
            and telecommunications systems protected by encryption tools



© 2011 Cisco and/or its affiliates. All rights reserved.                                     25/75
• In explicit form - no; however, activities including
            mounting, installation, configuration of encryption (cryptographic) tools
            repair, servicing of encryption (cryptographic) tools
            recycling and destruction of encryption (cryptographic) tools
            works on support and maintenance of encryption (cryptographic) tools
            provided for in technical and operational documentation

• shall be attributed, in FSB opinion, to licensable activities –
       engineering maintenance
• Engineering maintenance is a set of operations or an operation
       aimed at maintenance or serviceability of a product under
       conditions of its intended use, expectation, storage, and
       transportation
            GOST18322-78 "A System of engineering maintenance and repair of
            equipment. Terms and definitions"

© 2011 Cisco and/or its affiliates. All rights reserved.                                26/75
• Representatives of FSB's 8-th Center have repeatedly asserted
       that licenses are not required for in-house needs




© 2011 Cisco and/or its affiliates. All rights reserved.          27/75
• The new law "On Licensing Certain Activities" dated May 4, 2011
       restored the 'in-house needs' term (but only with respect to
       maintenance of encryption tools)


• However, this term, 'in-house needs', has not been defined, and it
       brings forth a great many questions
            Can encryption aimed at protection of employees' and customers' information
            be attributed to in-house needs or not?
            Does encryption of personal data mean protection of own interests or
            protection of rights of personal data holders?




© 2011 Cisco and/or its affiliates. All rights reserved.                                  28/75
• What is maintenance?
            Operation of crypto tools in compliance with
            requirements of technical and operational
            documentation included in crypto tools
            delivery set is not considered to be
            maintenance activity relating to encryption
            (cryptographic) tools

• Non-attributable to licensable
       activities
            Transferring crypto tools to customers and
            affiliates
            Generation and transfer of generated keys




© 2011 Cisco and/or its affiliates. All rights reserved.   29/75
• Federal Law dated April 29, 2008 No. 57-FZ, Moscow "On the
       Procedure of Foreign Investments to Business Entities Which are
       Strategically Important for National Defense and State Security"
            In order to provide for national defense and state security, this Federal Law
            establishes expropriations of restrictive nature for foreign investors and groups
            of persons including foreign investors in case they participate in authorized
            capitals of business entities which are strategically important for national
            defense and state security and (or) make transactions which lead to instituting
            control over the specified business entities




© 2011 Cisco and/or its affiliates. All rights reserved.                                    30/75
• A business entity which is strategically important for national
       defense and state security is an enterprise established in the
       territory of the Russian Federation and performing at least one of
       the activities which are strategically important for national defense
       and state security, these activities being specified in Article 6 of
       this Federal Law
            i.i. 11-14 – 4 types of licensing related to encryption activities
            Availability of just one router with IPSec requires a license for CIPT
            maintenance

• On March 23, there were amendments adopted in the first
       reading to exclude banks (and only banks) from the list of
       'strategic' enterprises



© 2011 Cisco and/or its affiliates. All rights reserved.                             31/75
© 2011 Cisco and/or its affiliates. All rights reserved.   32
• Signed on April 3, 1995 (amended on July 25, 2000)

• It is forbidden for state authorities to use encryption tools without
       certificate issued by FSB
• State authorities are disallowed to place state-guaranteed order at
       enterprises that use encryption tools without a certificate
• Appropriate measures shall be taken with respect to the banks which do
       not use certified encryption tools when communicating with the Bank of
       Russia
• Activities of legal entities and individuals related to operation of
       encryption tools without a FSB license shall be enjoined
• Import of encryption tools without a license issued by the Ministry of
       Industry and Trade together with FSB authorization shall be enjoined
• The defaulters shall be punished with the utmost rigour of the law
© 2011 Cisco and/or its affiliates. All rights reserved.                        33/75
• Some of its provisions are still unexpired
            For example, requirements on import of encryption tools and on the sole use of
            properly certified encryption tools by state authorities

• Some articles have been virtually repealed by new statutory legal
       acts
            The law "On Licensing Certain Activities"
            The law "On Technical Regulation"
            Civil Code

• However, Decree No. 334 has not been explicitly repealed yet
            Despite circulating rumors




© 2011 Cisco and/or its affiliates. All rights reserved.                                 34/75
• Yes! The basic document is the Order on Approval of the
       Provision on the Development, Manufacturing, Sale, and
       Operation of Encryption (Cryptographic) Tools of Information
       Protection (PKZ-2005)
• PKZ-2005 regulates relations which arise in the course of
       development, production, sale, and operation of encryption
       (cryptographic) tools for protecting limited-access data, which
       does not contain information classified as state secret (hereinafter
       - information of confidential nature)
            Order dated 9.02.2005, No. 66 (signed by the Director of FSB and registered in
            the Ministry of Justice)

• PKZ-2005 is not applicable to foreign crypto tools



© 2011 Cisco and/or its affiliates. All rights reserved.                                 35/75
• PKZ-2005 is used for
            the protection of information of confidential nature, subject to protection in
            compliance with the RF law
            Information protection in the Federal executive authorities and executive
            authorities of the RF constituent entities
            Information protection in organizations, irrespective of their form of
            incorporation and pattern of ownership, when they fulfill orders for delivery of
            goods, performance of works, or provision of services for state needs
            (hereinafter - organizations fulfilling state-guaranteed orders)
            Information protection assigned by the RF law to persons who have access to
            this information or who are provided with authority to administer data contained
            in this information
            Protection of information owned by state authorities or organizations fulfilling
            state-guaranteed orders



© 2011 Cisco and/or its affiliates. All rights reserved.                                       36/75
• The mode of information protection by using CIPT is established
       by
            the holder of information of confidential nature
            the possessor (owner) of information resources (information systems)
            persons duly authorized by them on the basis of the RF law




© 2011 Cisco and/or its affiliates. All rights reserved.                           37/75
• Holder of information
                                          Exchange of own data
                                                                       • Possessor (owner) of the system


                                              Exchange with state
                                                  authorities          • State authority


                                               Exchange with
                                            organizations fulfilling   • Organization fulfilling state-
                                              state-guaranteed           guaranteed orders
                                                    orders

                                                     Processing and    • Holder of information
                                                     storage without
                                                         transfer      • User (consumer)

© 2011 Cisco and/or its affiliates. All rights reserved.                                                   38/75
© 2011 Cisco and/or its affiliates. All rights reserved.   39
• Crypto tools must meet the requirements of technical regulations,
       with the degree of compliance with them being assessed
       according to the procedure described in 184-FZ "On Technical
       Regulation"
            PKZ-2005
• The quality of cryptographic protection of confidential information
       performed by crypto tools is provided through implementation of
       requirements for information security imposed on crypto tools




© 2011 Cisco and/or its affiliates. All rights reserved.                 40/75
• In certain cases, protection level (crypto tools certification) is
       established in regulatory documents
            Predominantly, in Requirements Specifications for Federal information systems

• The package of standards for information security of the Bank of
       Russia (The Standard for information security of the organizations
       of the banking system of the Russian Federation (STO BR IBBS))
       provides for using encryption tools certified for class of protection
       КС2, at least
• In other cases, the required protection level is determined by
       crypto tools user basing on a model of illegal intruder




© 2011 Cisco and/or its affiliates. All rights reserved.                                41/75
• 3 protection levels – А (KА1), В (KВ1, KВ2), and C (KС1, KС2,
       KС3)
            The level of crypto tools certification depends on the number and severity of
            requirements

• 6 models of intruder
            Н1 – external intruder acting without in-house assistance
            Н2 – in-house intruder who is not crypto tools user
            Н3 – in-house intruder who is crypto tools user
            Н4 – intruder inviting experts in the sphere of crypto tools development and
            analysis
            Н5 – intruder inviting research institutes in the sphere of crypto
            toolsdevelopment and analysis
            Н6 – intelligence services of foreign states


© 2011 Cisco and/or its affiliates. All rights reserved.                                    42/75
• For cryptographic protection of confidential information, it is
       necessary to use crypto tools which meet the requirements for
       information security established in compliance with the Russian
       Federation law
            PKZ-2005




© 2011 Cisco and/or its affiliates. All rights reserved.                 43/75
• Decree No. 351 and FZ-85 (on participation in international exchange of information)
• Government regulation (PP-424) (on connection of the Federal state information
       systems to Internet)
• FSS Order No. 487 (on the Russian segment of Internet)
• Order of the Ministry of Communications No. 104 (on state-owned IS in public use)
• Order of the Federal Service on Technical and Export Control/FSB No. 489/416 (on
       requirements for protection of publicly used IS)
• Government regulation (PP-330) (on specific features of assessment of compliance
       of protection tools for state-owned Information Systems and Personal Data
       Information Systems)
• Order of the Ministry of Economic Development No. 54 (on electronic sales areas)
• FSB's guidelines on personal data
• Government regulation (PP-781) (on protection of personal data)
• As well as FZ-149, Special requirements on technical protection of confidential
       information, PP-608, Decree No. 334, Gidelines of FSTEC on Key systems of
       information infrastructure

© 2011 Cisco and/or its affiliates. All rights reserved.                              44/75
The number of regulatory legal documents which
                                      require certification in compliance with
                                               security requirements
       8
       7
       6
       5
       4
       3
       2
       1
       0



                     * - for 2011 – preliminary assessment of new regulatory documents drafts (FZ “On National Payment System”,
                     FZ “On Official Secrecy”, new orders of FSTEC/FSB, etc.)


   45
© 2011 Cisco and/or its affiliates. All rights reserved.                                                                          45/75
• There are two certification systems under FSB line
            The system of certification of cryptographic information protection tools (РОСС
            RU.0001.030001)
            The system of certification of information protection tools in compliance with
            security requirements for information classified as state secret (РОСС
            RU.0003.01БИ00)

• Crypto tools are estimated for compliance with "The
       Requirements to Tools for Cryptographic Protection of
       Confidential Information"
• User shall be responsible for using non-certified crypto tools
• Impossibility to update certified products




© 2011 Cisco and/or its affiliates. All rights reserved.                                     46/75
• Old regulatory documents refer
       predominantly to certification,
       whereas new ones - to evaluation
• Evaluation ≠ certification
• Evaluation is direct or indirect
       determination of meeting the
       requirements imposed on the
       object
• Evaluation is controlled by FZ-
       184 "On Technical Regulation"




© 2011 Cisco and/or its affiliates. All rights reserved.   47/75
State control and
                                                                    supervision



                                                                   Accreditation



                                                                       Tests



                                                 Evaluation         Registration          Facultative certification



                                                               Compliance approval        Obligatory certification



                                                                  Acceptance and              Declaration of
                                                              introduction into service        compliance



                                                                   In other form



© 2011 Cisco and/or its affiliates. All rights reserved.                                                              48/75
• Work of representative offices of foreign companies in Russia
            Import of western cryptography or export of domestic one

• Commercial IP television and IP video surveillance
            The devices do not and will not support GOSTs as they are manufactured
            abroad and delivered to hundreds of countries in the world

• Encryption at rates higher than 10 Gbit/s
            Backbone links or synchronization of data centers

• Standards of wireless communications 802.11i, mobile
       communications 2.5G, 3G, as well as LTE and Wi-Max




© 2011 Cisco and/or its affiliates. All rights reserved.                             49/75
• Encryption in smartphones, iPhones, etc.
• Access to Russian Internet banks from a computer in Internet
       cafe when on holiday abroad
            No certified cryptolibraries with GOSTs is available for this

• Access from abroad to any Russian payment system (Assist,
       ChronoPay, Yandex.Dengi, Rapida, etc.), as well as to any other
       system of e-commerce (booking tickets, buying books in Internet
       stores, etc.)
• Protected electronic Web mail via HTTPS




© 2011 Cisco and/or its affiliates. All rights reserved.                    50/75
• Encryption using FibreChannel protocol when recording to tape in
       a data center
• Encryption using FibreChannel protocol when transferring data
       within a data center or between different data centers
• Outsourcing and XaaS (Cloud Computing)
            All processing operations are performed via Internet and, probably, somewhere
            abroad.

• Support of SCADA
• And so on




© 2011 Cisco and/or its affiliates. All rights reserved.                                51/75
© 2011 Cisco and/or its affiliates. All rights reserved.   52/75
• Encryption at rates 40 Gbit/s
• The regulatory body / domestic manufacturers have proposed to
       make a cluster of VPN gateways
            A gateway can support rate up to 1 Gbit/s

• A final solution – 40+n gateways at one end and the same
       number of gateways at the other end
            How much do 80+2n domestic VPN gateways cost?
            n items are required for redundancy




© 2011 Cisco and/or its affiliates. All rights reserved.          53/75
• You install certified crypto tools, then
• You cannot
            Work efficiently with multimedia traffic (Telepresence, etc.) at the same level as
            foreign crypto tools do
            Work at multi-gigabit rates (especially higher than 3.5 Gbit/s)
            Work from abroad using leased computers/devices
            Use outsourcing and cloud computing (including in Russia)
            Use most of mobile platforms in your business

• And it would cost you a colossal amount of money ;-(




© 2011 Cisco and/or its affiliates. All rights reserved.                                     54/75
• Non-Russian VPN products cannot be used for encryption of
       most types of information to be protected
            If it is not authorized by FSB
            De facto, having obtained permission for import, you gain the right to use
            The issue related to the terms including 'confidential information',
            'confidentiality', 'information of confidential nature remains open
• It is impossible to certify foreign crypto tools
            Only GOST-implementing crypto tools are subject to certification
            Requirements for certification of foreign-manufacture crypto tools are
            unavailable
• The collision: in certain cases, you only can use certified crypto
       tools. Domestic crypto tools do not meet technical requirements,
       whereas it is impossible to certify crypto tools of foreign
       manufacture
© 2011 Cisco and/or its affiliates. All rights reserved.                                 55/75
• To provide security of personal data when processing them in
       information systems, you must use cryptotools certified in the
       framework of certification system of FSB of Russia (those
       approved by examining organization for compliance with
       requirements of regulatory documents on information security
• Incorporation of cryptotools of classes KC1 and KC2 can be
       performed without control on the part of FSB of Russia
            FSB's guidelines on personal data
• Incorporation does not remove the problem of legal import of
       foreign VPN products




© 2011 Cisco and/or its affiliates. All rights reserved.                56/75
• Is it possible to use a certified cryptolibrary as a component of
       VPN solutions?
            Yes, it is possible

• Will this use be a legitimate one?
            No!!!




© 2011 Cisco and/or its affiliates. All rights reserved.              57/75
© 2011 Cisco and/or its affiliates. All rights reserved.   58
• Article 13.12. Violation of Information Security Rules (Code of
       Administrative Offences)
            i.1 – violation of licensing provisions (up to RUB 10000)
            i.2. – use of non-certified security tools, if they are subject to obligatory
            certification (up to RUB 20000 + confiscation)
            i.3 – violation of licensing provisions related to state secret (up to RUB 20000)
            i.4. – use of non-certified security tools related to state secret (up to RUB
            30000 + confiscation)
            i.5 – gross violation of licensing provisions (up to RUB 15000 + suspension of
            activities for up to 90 day period)




© 2011 Cisco and/or its affiliates. All rights reserved.                                        59/75
• Article 13.13. Illegal Activity Related to Information Security (Code
       of Administrative Offences)
            i.1 – dealing with information protection without a license, if it is obligatory (up
            to RUB 20000 + confiscation)
            i.2. – dealing with state secret protection and development of tools for its
            protection without a license (up to RUB 40000 + confiscation)




© 2011 Cisco and/or its affiliates. All rights reserved.                                           60/75
• Article 171. Illegal Enterprise (RF Criminal Code)
            i.1 – performing activities without registration (if a license is obligatory), with
            violations of registration rules, submittance of false facts to the licensing
            agency, if it caused damage to citizens, organizations or state or was
            accompanied by absorbing significant revenue (up to RUB 300000 or
            compulsory labour up to 240 hours or detention up to 6 months)
            i.2 – the same but committed by a group of persons or absorption of
            particularly large revenue (up to RUB 500000 or imprisonment for up to 5
            years)


• There are about 20 criminal cases initiated by FSB against
       Russian organizations




© 2011 Cisco and/or its affiliates. All rights reserved.                                          61/75
• Recall of a licence by FSB (only for service licenses)
            k) use, by Licensee, of encryption (cryptographic) tools of foreign manufacture
            if these tools have been imported to the territory of the Russian Federation and
            distributed there in compliance with the procedure established by statutory
            legal acts of the Russian Federation



• Article 188. Contraband (RF Criminal Code)
            i.1 – transferring goods in large quantities across customs border by-passing
            customs, non-declaring or false declaring (up to RUB 300000 or imprisonment
            for up to 5 years)




© 2011 Cisco and/or its affiliates. All rights reserved.                                    62/75
• Article 16.2. Non-Declaring or False Declaring (Code of Administrative
       Offences)
            i.1 – non-declaring (up to RUB 20000 or confiscation or double cost of contraband)
            i.2 – false declaring aimed at understatement of custom amount (up to RUB 20000
            or double cost of unpaid taxes or confiscation)
            i.3 – false declaring aimed at by-passing import restrictions (up to RUB 300000 or
            confiscation)

• Article 16.3. Incompliance With Restrictions for Import of Goods (Code
       of Administrative Offences)
            i.1 – incompliance with import restrictions of economic nature (up to RUB 300000)
            i.2 – incompliance with import restrictions (up to RUB 100000 + confiscation)

• Article 16.7. Submittance of invalid documents when declaring goods at
       customs (Code of Administrative Offences)
            i.1 – alse declaring (up to RUB 300000 + confiscation)

© 2011 Cisco and/or its affiliates. All rights reserved.                                         63/75
• Article 14.1. Performance of entrepreneurial activities without
       state registration or without a license (Code of Administrative
       Offences))
            i.3 – performance of activity with violation of licensing provisions (up to RUB
            40000)
            i.4 – performance of activity with gross violation of licensing provisions (up to
            RUB 50000 + suspension of activities for up to 90 day period)




© 2011 Cisco and/or its affiliates. All rights reserved.                                        64/75
© 2011 Cisco and/or its affiliates. All rights reserved.   65
• In Spring of 2011, FSB expressed disquietude related to using
       encryption tools of foreign manufacture in public-service
       communications networks of the Russian Federation
            Skype, Gmail, Hotmail, etc.
• The Commission decided to form an interagency task force for
       the development of the RF Government proposals on using
       cryptographic tools
• The proposals shall be submitted to the Government in the period
       before October 1, 2011
            Excursus in history: in August of 2007, the Minister of Education, Fursenko,
            suggested to conquer the whole world through implementation of Russian
            cryptography. Proposals on the world conquering must have been submitted to
            the Government before December 1, 2007
            It is true that later on our GOSTs were taken as RFC, and also as a basis for
            DNSSEC… though afterwards it was announced that GOST 28147 had been
            broken

© 2011 Cisco and/or its affiliates. All rights reserved.                                66/75
Everything will
             Liberalization                                Crackdown
                                                                                       remain as it is
            • Probability -                                • Probability -            • Probability -
              20%                                            45%                        30%
              (currently)                                    (currently)                (currently)
            • Probability in 2                             • Probability in 2
              years - 35%                                    years - 20%
              and 10%                                        and 55%
              (depending on                                  (depending on
              the winner of                                  the winner of
              presidential                                   presidential
              election)                                      election)

                                                                          Expert evidence of Cisco specialists

© 2011 Cisco and/or its affiliates. All rights reserved.                                                         67/75
Adopt unified definition of the
                                                           'encryption tools' term
                                                           Define concept 'for in-house
                                                           needs'
                                                           Authorize the use of non-
                                                           certified crypto tools if
                                                           countertypes are unavailable
                                                           Add transparency to the
                                                           procedure of decision making
                                                           on crypto tools import
                                                           authorization
                                                           Refine the conditions of
                                                           licensing
© 2011 Cisco and/or its affiliates. All rights reserved.                                  68/75
© 2011 Cisco and/or its affiliates. All rights reserved.   69
• Cisco and S-Terra CSP have developed VPN solutions supporting
       Russian crypto algorithms based on Cisco equipment
• FSB Certificate SF/114-1622, 114-1624, 124-1623, 124-1625,
       124-1626 dated February 28, 2011
            The Certificate is for KC2 class for both solutions


                                                           Solution for remote offices
                                                           • Based on the module for ISR G1 and G2
                                                             (2800/2900/3800/3900)


                                                           Solution for data centers and
                                                           headquarters
                                                           • Based on UCS C-200

© 2011 Cisco and/or its affiliates. All rights reserved.                                             70/75
Tried-and-true
                                                                                                   The local
                                                                         procedure of
                   Over 5,300                                                                    production of
                                                                          submitting
               notifications for the                                                           encryption module
                                                                     applications for the
                Cisco equipment                                                                 NME-RVPN has
                                                                       import of 'strict'
                                                                                                 been started
                                                                        cryptography




                                                            In Spring of 2011, Cisco obtained
                                                           FSB licenses for encryption activities


© 2011 Cisco and/or its affiliates. All rights reserved.                                                           71/75
Consultative
                                                                              Technical            Center on               RG
                                                                            Committee 127      Compliance with             CB
        Subcommittee                                       Subcommittee 3    "Security of     the Requirements
          127 (PK-3)                                           (PK-3)        Information     of a set of BR IBBS
                                                                            Technologies"    of the Association
                                                                               (TK-362)         of the Russian
                                                                                             Banks (CC of ARB)

        "IT Security"                                       "Information     "Information    Consulting to         Development of
     (representative of                                     Protection in   Protection" of   banks on              recommendations on
        ISO SC27 in                                           Financial       the Federal    personal data         personal data and on
           Russia)                                          Institutions"     Service on     issues                the standard for
                                                                            Technical and                          information security
                                                                            Export Control                         of the organizations
                                                                                (FSTEC)                            of the banking
                                                                                                                   system of the
                                                                                                                   Russian Federation
                                                                                                                   (STO BR IBBS) v4

© 2011 Cisco and/or its affiliates. All rights reserved.                                                                              72/75
Non-
               500+                                            FSB                Declared                28                   96
                                                                                 Capabilities
                                                                                   (NDV)

            FSTEC                                          has certified Cisco   unavailable in a   product lines of   product lines of Cisco
        certificates for                                    (together with S-      number of        Cisco have         have been sertified
        Cisco products                                         Terra CSP)        product lines of   passed             by FSTEC
                                                                solutions            Cisco          certification
                                                                                                    under "batch
                                                                                                    production"




© 2011 Cisco and/or its affiliates. All rights reserved.                                                                                   73/75
FAQ about import of encryption tools

                                     Cisco solutions on certified
                                     cryptography
                                     Cryptography regulation chart in
                                     Russia (from slide 5)
                                     … as well as many other things

                          http://www.facebook.com/CiscoRu
                          http://twitter.com/CiscoRussia
                          http://www.youtube.com/CiscoRussiaMedia
                          http://www.flickr.com/photos/CiscoRussia
                          http://vkontakte.ru/Cisco


© 2011 Cisco and/or its affiliates. All rights reserved.                    74/75
Thank you!




        security-request@cisco.com

More Related Content

What's hot

What is disruptive innovation?
What is disruptive innovation?What is disruptive innovation?
What is disruptive innovation?Nei Grando
 
The Rise of Digital Darwinism and the Real-world Business Drivers for Digital...
The Rise of Digital Darwinism and the Real-world Business Drivers for Digital...The Rise of Digital Darwinism and the Real-world Business Drivers for Digital...
The Rise of Digital Darwinism and the Real-world Business Drivers for Digital...Brian Solis
 
Product strategy nokia
Product strategy nokiaProduct strategy nokia
Product strategy nokiafrudoking
 
SWOT ANALYSIS OF NOKIA
SWOT ANALYSIS OF NOKIASWOT ANALYSIS OF NOKIA
SWOT ANALYSIS OF NOKIAsayyedasif1
 
The Rise of Digital Darwinism and the Fall of Business As Usual by Brian Solis
The Rise of Digital Darwinism and the Fall of Business As Usual by Brian SolisThe Rise of Digital Darwinism and the Fall of Business As Usual by Brian Solis
The Rise of Digital Darwinism and the Fall of Business As Usual by Brian SolisBrian Solis
 
Samsung Presentation
Samsung PresentationSamsung Presentation
Samsung Presentationulugbek55
 
The State of Digital Transformation 2018 - 2019 by Brian Solis
The State of Digital Transformation 2018 - 2019 by Brian SolisThe State of Digital Transformation 2018 - 2019 by Brian Solis
The State of Digital Transformation 2018 - 2019 by Brian SolisBrian Solis
 
Powerpoint on logitech
Powerpoint on logitechPowerpoint on logitech
Powerpoint on logitechmominul_Islam
 
What challenger brands are, how they work and how to become one. Illustrated ...
What challenger brands are, how they work and how to become one. Illustrated ...What challenger brands are, how they work and how to become one. Illustrated ...
What challenger brands are, how they work and how to become one. Illustrated ...Drthomasbrand Limited
 
Wireless charging of mobile phones using microwaves ppt
Wireless charging of mobile phones using microwaves pptWireless charging of mobile phones using microwaves ppt
Wireless charging of mobile phones using microwaves pptHarish N Nayak
 
Marketing strategy Of Xiaomi Inc.
Marketing strategy Of Xiaomi Inc.Marketing strategy Of Xiaomi Inc.
Marketing strategy Of Xiaomi Inc.SubhankarDe4
 
Solutions manual for guide to sql 9th edition by pratt
Solutions manual for guide to sql 9th edition by prattSolutions manual for guide to sql 9th edition by pratt
Solutions manual for guide to sql 9th edition by prattAldis8862
 
Samsung ppt
Samsung pptSamsung ppt
Samsung pptdee1987
 
Top 10 discoveries of the decade
Top 10 discoveries of the decadeTop 10 discoveries of the decade
Top 10 discoveries of the decadeHimanshu Gupta
 

What's hot (20)

What is disruptive innovation?
What is disruptive innovation?What is disruptive innovation?
What is disruptive innovation?
 
The Rise of Digital Darwinism and the Real-world Business Drivers for Digital...
The Rise of Digital Darwinism and the Real-world Business Drivers for Digital...The Rise of Digital Darwinism and the Real-world Business Drivers for Digital...
The Rise of Digital Darwinism and the Real-world Business Drivers for Digital...
 
Product strategy nokia
Product strategy nokiaProduct strategy nokia
Product strategy nokia
 
M&A - Microsoft and Nokia deal
M&A - Microsoft and Nokia dealM&A - Microsoft and Nokia deal
M&A - Microsoft and Nokia deal
 
SWOT ANALYSIS OF NOKIA
SWOT ANALYSIS OF NOKIASWOT ANALYSIS OF NOKIA
SWOT ANALYSIS OF NOKIA
 
Digital transformation - Jo Caudron
Digital transformation - Jo CaudronDigital transformation - Jo Caudron
Digital transformation - Jo Caudron
 
The Rise of Digital Darwinism and the Fall of Business As Usual by Brian Solis
The Rise of Digital Darwinism and the Fall of Business As Usual by Brian SolisThe Rise of Digital Darwinism and the Fall of Business As Usual by Brian Solis
The Rise of Digital Darwinism and the Fall of Business As Usual by Brian Solis
 
Samsung Presentation
Samsung PresentationSamsung Presentation
Samsung Presentation
 
The State of Digital Transformation 2018 - 2019 by Brian Solis
The State of Digital Transformation 2018 - 2019 by Brian SolisThe State of Digital Transformation 2018 - 2019 by Brian Solis
The State of Digital Transformation 2018 - 2019 by Brian Solis
 
LG
LGLG
LG
 
Powerpoint on logitech
Powerpoint on logitechPowerpoint on logitech
Powerpoint on logitech
 
What challenger brands are, how they work and how to become one. Illustrated ...
What challenger brands are, how they work and how to become one. Illustrated ...What challenger brands are, how they work and how to become one. Illustrated ...
What challenger brands are, how they work and how to become one. Illustrated ...
 
Wireless charging of mobile phones using microwaves ppt
Wireless charging of mobile phones using microwaves pptWireless charging of mobile phones using microwaves ppt
Wireless charging of mobile phones using microwaves ppt
 
Marketing strategy Of Xiaomi Inc.
Marketing strategy Of Xiaomi Inc.Marketing strategy Of Xiaomi Inc.
Marketing strategy Of Xiaomi Inc.
 
How to Choose a Successful Brand Name?
How to Choose a Successful Brand Name?How to Choose a Successful Brand Name?
How to Choose a Successful Brand Name?
 
Solutions manual for guide to sql 9th edition by pratt
Solutions manual for guide to sql 9th edition by prattSolutions manual for guide to sql 9th edition by pratt
Solutions manual for guide to sql 9th edition by pratt
 
on-the-horizon
on-the-horizonon-the-horizon
on-the-horizon
 
Samsung ppt
Samsung pptSamsung ppt
Samsung ppt
 
Samsung final
Samsung finalSamsung final
Samsung final
 
Top 10 discoveries of the decade
Top 10 discoveries of the decadeTop 10 discoveries of the decade
Top 10 discoveries of the decade
 

Viewers also liked

New in russia electronic (digital) signatures, electronic vat invoices, elect...
New in russia electronic (digital) signatures, electronic vat invoices, elect...New in russia electronic (digital) signatures, electronic vat invoices, elect...
New in russia electronic (digital) signatures, electronic vat invoices, elect...Awara Direct Search
 
Российская криптография: блочные шифры и их режимы шифрования (Russian crypto...
Российская криптография: блочные шифры и их режимы шифрования (Russian crypto...Российская криптография: блочные шифры и их режимы шифрования (Russian crypto...
Российская криптография: блочные шифры и их режимы шифрования (Russian crypto...Advanced monitoring
 
EAC Mark - Eurasian Custom Union
EAC Mark - Eurasian Custom UnionEAC Mark - Eurasian Custom Union
EAC Mark - Eurasian Custom UnionSoe Hein Kyaw
 
Измерение эффективности ИБ
Измерение эффективности ИБИзмерение эффективности ИБ
Измерение эффективности ИБAleksey Lukatskiy
 
Encryption Boot Camp on the JVM
Encryption Boot Camp on the JVMEncryption Boot Camp on the JVM
Encryption Boot Camp on the JVMMatthew McCullough
 
Cisco Meraki Cloud Managed Networking
Cisco Meraki Cloud Managed NetworkingCisco Meraki Cloud Managed Networking
Cisco Meraki Cloud Managed NetworkingCisco Russia
 
Huawei smart grid rus
Huawei smart grid rusHuawei smart grid rus
Huawei smart grid rusNick Turunov
 
Cybercrime in Russia: Trends and Issues
Cybercrime in Russia: Trends and IssuesCybercrime in Russia: Trends and Issues
Cybercrime in Russia: Trends and IssuesAlex Matrosov
 
CE Marking- EMC- Products Regulatory
CE Marking- EMC- Products RegulatoryCE Marking- EMC- Products Regulatory
CE Marking- EMC- Products RegulatorySoe Hein Kyaw
 
Вебинар по криптомаршрутизаторам, 14.12.2016
Вебинар по криптомаршрутизаторам, 14.12.2016Вебинар по криптомаршрутизаторам, 14.12.2016
Вебинар по криптомаршрутизаторам, 14.12.2016S-Terra CSP
 
SanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
SanDisk SecureAccess Encryption - Forensic Processing & USB FlashingSanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
SanDisk SecureAccess Encryption - Forensic Processing & USB FlashingBrent Muir
 
Cisco crypto FAQ 2013
Cisco crypto FAQ 2013Cisco crypto FAQ 2013
Cisco crypto FAQ 2013Cisco Russia
 
Шифровальные средства: ввоз и использование
Шифровальные средства: ввоз и использованиеШифровальные средства: ввоз и использование
Шифровальные средства: ввоз и использованиеCisco Russia
 
How to encrypt everything that moves and keep it usable
How to encrypt everything that moves and keep it usableHow to encrypt everything that moves and keep it usable
How to encrypt everything that moves and keep it usableDenis Gundarev
 
Весь магнитогорск за 15 минут
Весь магнитогорск за 15 минутВесь магнитогорск за 15 минут
Весь магнитогорск за 15 минутAleksey Lukatskiy
 
Требования ИБ для бирж
Требования ИБ для биржТребования ИБ для бирж
Требования ИБ для биржAleksey Lukatskiy
 
Security Effectivness and Efficiency
Security Effectivness and EfficiencySecurity Effectivness and Efficiency
Security Effectivness and EfficiencyAleksey Lukatskiy
 
Security and football: what's difference
Security and football: what's differenceSecurity and football: what's difference
Security and football: what's differenceAleksey Lukatskiy
 

Viewers also liked (20)

New in russia electronic (digital) signatures, electronic vat invoices, elect...
New in russia electronic (digital) signatures, electronic vat invoices, elect...New in russia electronic (digital) signatures, electronic vat invoices, elect...
New in russia electronic (digital) signatures, electronic vat invoices, elect...
 
Российская криптография: блочные шифры и их режимы шифрования (Russian crypto...
Российская криптография: блочные шифры и их режимы шифрования (Russian crypto...Российская криптография: блочные шифры и их режимы шифрования (Russian crypto...
Российская криптография: блочные шифры и их режимы шифрования (Russian crypto...
 
EAC Mark - Eurasian Custom Union
EAC Mark - Eurasian Custom UnionEAC Mark - Eurasian Custom Union
EAC Mark - Eurasian Custom Union
 
Измерение эффективности ИБ
Измерение эффективности ИБИзмерение эффективности ИБ
Измерение эффективности ИБ
 
Encryption Boot Camp on the JVM
Encryption Boot Camp on the JVMEncryption Boot Camp on the JVM
Encryption Boot Camp on the JVM
 
Cisco Meraki Cloud Managed Networking
Cisco Meraki Cloud Managed NetworkingCisco Meraki Cloud Managed Networking
Cisco Meraki Cloud Managed Networking
 
Huawei smart grid rus
Huawei smart grid rusHuawei smart grid rus
Huawei smart grid rus
 
Cybercrime in Russia: Trends and Issues
Cybercrime in Russia: Trends and IssuesCybercrime in Russia: Trends and Issues
Cybercrime in Russia: Trends and Issues
 
CE Marking- EMC- Products Regulatory
CE Marking- EMC- Products RegulatoryCE Marking- EMC- Products Regulatory
CE Marking- EMC- Products Regulatory
 
Вебинар по криптомаршрутизаторам, 14.12.2016
Вебинар по криптомаршрутизаторам, 14.12.2016Вебинар по криптомаршрутизаторам, 14.12.2016
Вебинар по криптомаршрутизаторам, 14.12.2016
 
SanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
SanDisk SecureAccess Encryption - Forensic Processing & USB FlashingSanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
SanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
 
Cisco crypto FAQ 2013
Cisco crypto FAQ 2013Cisco crypto FAQ 2013
Cisco crypto FAQ 2013
 
Шифровальные средства: ввоз и использование
Шифровальные средства: ввоз и использованиеШифровальные средства: ввоз и использование
Шифровальные средства: ввоз и использование
 
How to encrypt everything that moves and keep it usable
How to encrypt everything that moves and keep it usableHow to encrypt everything that moves and keep it usable
How to encrypt everything that moves and keep it usable
 
Secure Mobile Office
Secure Mobile OfficeSecure Mobile Office
Secure Mobile Office
 
Весь магнитогорск за 15 минут
Весь магнитогорск за 15 минутВесь магнитогорск за 15 минут
Весь магнитогорск за 15 минут
 
Требования ИБ для бирж
Требования ИБ для биржТребования ИБ для бирж
Требования ИБ для бирж
 
DLP for top managers
DLP for top managersDLP for top managers
DLP for top managers
 
Security Effectivness and Efficiency
Security Effectivness and EfficiencySecurity Effectivness and Efficiency
Security Effectivness and Efficiency
 
Security and football: what's difference
Security and football: what's differenceSecurity and football: what's difference
Security and football: what's difference
 

Similar to Crypto regulations in Russia

Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate CloudEngineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate CloudMarketingArrowECS_CZ
 
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013
Cloud security innovation  - Cloud Security Alliance East Europe Congress 2013Cloud security innovation  - Cloud Security Alliance East Europe Congress 2013
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013Moshe Ferber
 
Transforming cloud security into an advantage
Transforming cloud security into an advantageTransforming cloud security into an advantage
Transforming cloud security into an advantageMoshe Ferber
 
CipherCloud Technology Overview: Tokenization
CipherCloud Technology Overview: TokenizationCipherCloud Technology Overview: Tokenization
CipherCloud Technology Overview: TokenizationCipherCloud
 
Counterfeit Risk & New Defense Regulations
Counterfeit Risk & New Defense RegulationsCounterfeit Risk & New Defense Regulations
Counterfeit Risk & New Defense RegulationsIHS
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New PerspectiveWen-Pai Lu
 
Entitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 VisionEntitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 VisionFlexera
 
Migrating To Cloud & Security @ FOBE 2011
Migrating To Cloud & Security @ FOBE 2011Migrating To Cloud & Security @ FOBE 2011
Migrating To Cloud & Security @ FOBE 2011commandersaini
 
2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity RoadmapRaleigh ISSA
 
ReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered serviceReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered serviceGen-i
 
Express Data - BYOD
Express Data - BYODExpress Data - BYOD
Express Data - BYODGen-i
 
Express Data - BYOD
Express Data - BYODExpress Data - BYOD
Express Data - BYODGen-i
 
Talk IT_ Oracle_김상엽_110822
Talk IT_ Oracle_김상엽_110822Talk IT_ Oracle_김상엽_110822
Talk IT_ Oracle_김상엽_110822Cana Ko
 
Security in the cloud planning guide
Security in the cloud planning guideSecurity in the cloud planning guide
Security in the cloud planning guideYury Chemerkin
 
Virtual security is no less real
Virtual security is no less realVirtual security is no less real
Virtual security is no less realguest24ab95c
 

Similar to Crypto regulations in Russia (20)

Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate CloudEngineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
Engineered Systems - nejlepší cesta, jak zabezpečit váš dataAccelerate Cloud
 
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013
Cloud security innovation  - Cloud Security Alliance East Europe Congress 2013Cloud security innovation  - Cloud Security Alliance East Europe Congress 2013
Cloud security innovation - Cloud Security Alliance East Europe Congress 2013
 
Transforming cloud security into an advantage
Transforming cloud security into an advantageTransforming cloud security into an advantage
Transforming cloud security into an advantage
 
CipherCloud Technology Overview: Tokenization
CipherCloud Technology Overview: TokenizationCipherCloud Technology Overview: Tokenization
CipherCloud Technology Overview: Tokenization
 
Counterfeit Risk & New Defense Regulations
Counterfeit Risk & New Defense RegulationsCounterfeit Risk & New Defense Regulations
Counterfeit Risk & New Defense Regulations
 
Cloud Security: A New Perspective
Cloud Security: A New PerspectiveCloud Security: A New Perspective
Cloud Security: A New Perspective
 
150819_oml_pki_v1p
150819_oml_pki_v1p150819_oml_pki_v1p
150819_oml_pki_v1p
 
150819_oml_pki_v1p
150819_oml_pki_v1p150819_oml_pki_v1p
150819_oml_pki_v1p
 
Entitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 VisionEntitlement and Compliance Management: Trends and 2012 Vision
Entitlement and Compliance Management: Trends and 2012 Vision
 
Migrating To Cloud & Security @ FOBE 2011
Migrating To Cloud & Security @ FOBE 2011Migrating To Cloud & Security @ FOBE 2011
Migrating To Cloud & Security @ FOBE 2011
 
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
David Knox: How do we Protect our Systems and Meet Compliance in a Rapidly Ch...
 
Presd1 10
Presd1 10Presd1 10
Presd1 10
 
2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap
 
ReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered serviceReadyCloud Collaboration, a Cisco Powered service
ReadyCloud Collaboration, a Cisco Powered service
 
Express Data - BYOD
Express Data - BYODExpress Data - BYOD
Express Data - BYOD
 
Express Data - BYOD
Express Data - BYODExpress Data - BYOD
Express Data - BYOD
 
Talk IT_ Oracle_김상엽_110822
Talk IT_ Oracle_김상엽_110822Talk IT_ Oracle_김상엽_110822
Talk IT_ Oracle_김상엽_110822
 
Security in the cloud planning guide
Security in the cloud planning guideSecurity in the cloud planning guide
Security in the cloud planning guide
 
Tyler Technology Expo
Tyler Technology ExpoTyler Technology Expo
Tyler Technology Expo
 
Virtual security is no less real
Virtual security is no less realVirtual security is no less real
Virtual security is no less real
 

More from Aleksey Lukatskiy

4 сценария мониторинга ИБ изолированных промышленных площадок
4 сценария мониторинга ИБ изолированных промышленных площадок4 сценария мониторинга ИБ изолированных промышленных площадок
4 сценария мониторинга ИБ изолированных промышленных площадокAleksey Lukatskiy
 
Аутсорсинг. Управление рисками информационной безопасности
Аутсорсинг. Управление рисками информационной безопасностиАутсорсинг. Управление рисками информационной безопасности
Аутсорсинг. Управление рисками информационной безопасностиAleksey Lukatskiy
 
Чеклист организации, выстраивающей стратегию безопасного удаленного доступа
Чеклист организации, выстраивающей стратегию безопасного удаленного доступаЧеклист организации, выстраивающей стратегию безопасного удаленного доступа
Чеклист организации, выстраивающей стратегию безопасного удаленного доступаAleksey Lukatskiy
 
Как ловить кибермафию с помощью DNS
Как ловить кибермафию с помощью DNSКак ловить кибермафию с помощью DNS
Как ловить кибермафию с помощью DNSAleksey Lukatskiy
 
Презентация по ИБ для руководства компании
Презентация по ИБ для руководства компанииПрезентация по ИБ для руководства компании
Презентация по ИБ для руководства компанииAleksey Lukatskiy
 
13 советов, от которых зависит успешность вашего SOC
13 советов, от которых зависит успешность вашего SOC13 советов, от которых зависит успешность вашего SOC
13 советов, от которых зависит успешность вашего SOCAleksey Lukatskiy
 
От разрозненных фидов к целостной программе Threat intelligence
От разрозненных фидов к целостной программе Threat intelligenceОт разрозненных фидов к целостной программе Threat intelligence
От разрозненных фидов к целостной программе Threat intelligenceAleksey Lukatskiy
 
Дашборды по ИБ АСУ ТП
Дашборды по ИБ АСУ ТПДашборды по ИБ АСУ ТП
Дашборды по ИБ АСУ ТПAleksey Lukatskiy
 
Техническая защита персональных данных в соответствие с GDPR и ФЗ-152
Техническая защита персональных данных в соответствие с GDPR и ФЗ-152Техническая защита персональных данных в соответствие с GDPR и ФЗ-152
Техническая защита персональных данных в соответствие с GDPR и ФЗ-152Aleksey Lukatskiy
 
17 способов проникновения во внутреннюю сеть компании
17 способов проникновения во внутреннюю сеть компании17 способов проникновения во внутреннюю сеть компании
17 способов проникновения во внутреннюю сеть компанииAleksey Lukatskiy
 
Бизнес-метрики ИБ для руководства финансовой организации
Бизнес-метрики ИБ для руководства финансовой организацииБизнес-метрики ИБ для руководства финансовой организации
Бизнес-метрики ИБ для руководства финансовой организацииAleksey Lukatskiy
 
Уральский форум 2020 за 15 минут
Уральский форум 2020 за 15 минутУральский форум 2020 за 15 минут
Уральский форум 2020 за 15 минутAleksey Lukatskiy
 
Кибербезопасность прорывных технологий
Кибербезопасность прорывных технологийКибербезопасность прорывных технологий
Кибербезопасность прорывных технологийAleksey Lukatskiy
 
Тенденции киберугроз. Что необходимо знать?
Тенденции киберугроз. Что необходимо знать?Тенденции киберугроз. Что необходимо знать?
Тенденции киберугроз. Что необходимо знать?Aleksey Lukatskiy
 
Новая концепция кибербезопасности Zero Trust
Новая концепция кибербезопасности Zero TrustНовая концепция кибербезопасности Zero Trust
Новая концепция кибербезопасности Zero TrustAleksey Lukatskiy
 
Измерение эффективности SOC. 3 года спустя
Измерение эффективности SOC. 3 года спустяИзмерение эффективности SOC. 3 года спустя
Измерение эффективности SOC. 3 года спустяAleksey Lukatskiy
 
Как правильно выборать аутсорсингового партнера
Как правильно выборать аутсорсингового партнераКак правильно выборать аутсорсингового партнера
Как правильно выборать аутсорсингового партнераAleksey Lukatskiy
 
ICS Cyber Security Effectiveness Measurement
ICS Cyber Security Effectiveness MeasurementICS Cyber Security Effectiveness Measurement
ICS Cyber Security Effectiveness MeasurementAleksey Lukatskiy
 
Измерение эффективности ИБ промышленных систем
Измерение эффективности ИБ промышленных системИзмерение эффективности ИБ промышленных систем
Измерение эффективности ИБ промышленных системAleksey Lukatskiy
 
Один зеродей и тысяча ночей без сна
Один зеродей и тысяча ночей без снаОдин зеродей и тысяча ночей без сна
Один зеродей и тысяча ночей без снаAleksey Lukatskiy
 

More from Aleksey Lukatskiy (20)

4 сценария мониторинга ИБ изолированных промышленных площадок
4 сценария мониторинга ИБ изолированных промышленных площадок4 сценария мониторинга ИБ изолированных промышленных площадок
4 сценария мониторинга ИБ изолированных промышленных площадок
 
Аутсорсинг. Управление рисками информационной безопасности
Аутсорсинг. Управление рисками информационной безопасностиАутсорсинг. Управление рисками информационной безопасности
Аутсорсинг. Управление рисками информационной безопасности
 
Чеклист организации, выстраивающей стратегию безопасного удаленного доступа
Чеклист организации, выстраивающей стратегию безопасного удаленного доступаЧеклист организации, выстраивающей стратегию безопасного удаленного доступа
Чеклист организации, выстраивающей стратегию безопасного удаленного доступа
 
Как ловить кибермафию с помощью DNS
Как ловить кибермафию с помощью DNSКак ловить кибермафию с помощью DNS
Как ловить кибермафию с помощью DNS
 
Презентация по ИБ для руководства компании
Презентация по ИБ для руководства компанииПрезентация по ИБ для руководства компании
Презентация по ИБ для руководства компании
 
13 советов, от которых зависит успешность вашего SOC
13 советов, от которых зависит успешность вашего SOC13 советов, от которых зависит успешность вашего SOC
13 советов, от которых зависит успешность вашего SOC
 
От разрозненных фидов к целостной программе Threat intelligence
От разрозненных фидов к целостной программе Threat intelligenceОт разрозненных фидов к целостной программе Threat intelligence
От разрозненных фидов к целостной программе Threat intelligence
 
Дашборды по ИБ АСУ ТП
Дашборды по ИБ АСУ ТПДашборды по ИБ АСУ ТП
Дашборды по ИБ АСУ ТП
 
Техническая защита персональных данных в соответствие с GDPR и ФЗ-152
Техническая защита персональных данных в соответствие с GDPR и ФЗ-152Техническая защита персональных данных в соответствие с GDPR и ФЗ-152
Техническая защита персональных данных в соответствие с GDPR и ФЗ-152
 
17 способов проникновения во внутреннюю сеть компании
17 способов проникновения во внутреннюю сеть компании17 способов проникновения во внутреннюю сеть компании
17 способов проникновения во внутреннюю сеть компании
 
Бизнес-метрики ИБ для руководства финансовой организации
Бизнес-метрики ИБ для руководства финансовой организацииБизнес-метрики ИБ для руководства финансовой организации
Бизнес-метрики ИБ для руководства финансовой организации
 
Уральский форум 2020 за 15 минут
Уральский форум 2020 за 15 минутУральский форум 2020 за 15 минут
Уральский форум 2020 за 15 минут
 
Кибербезопасность прорывных технологий
Кибербезопасность прорывных технологийКибербезопасность прорывных технологий
Кибербезопасность прорывных технологий
 
Тенденции киберугроз. Что необходимо знать?
Тенденции киберугроз. Что необходимо знать?Тенденции киберугроз. Что необходимо знать?
Тенденции киберугроз. Что необходимо знать?
 
Новая концепция кибербезопасности Zero Trust
Новая концепция кибербезопасности Zero TrustНовая концепция кибербезопасности Zero Trust
Новая концепция кибербезопасности Zero Trust
 
Измерение эффективности SOC. 3 года спустя
Измерение эффективности SOC. 3 года спустяИзмерение эффективности SOC. 3 года спустя
Измерение эффективности SOC. 3 года спустя
 
Как правильно выборать аутсорсингового партнера
Как правильно выборать аутсорсингового партнераКак правильно выборать аутсорсингового партнера
Как правильно выборать аутсорсингового партнера
 
ICS Cyber Security Effectiveness Measurement
ICS Cyber Security Effectiveness MeasurementICS Cyber Security Effectiveness Measurement
ICS Cyber Security Effectiveness Measurement
 
Измерение эффективности ИБ промышленных систем
Измерение эффективности ИБ промышленных системИзмерение эффективности ИБ промышленных систем
Измерение эффективности ИБ промышленных систем
 
Один зеродей и тысяча ночей без сна
Один зеродей и тысяча ночей без снаОдин зеродей и тысяча ночей без сна
Один зеродей и тысяча ночей без сна
 

Recently uploaded

The Role of Mortgage Brokers in Retirement Housing: Key Considerations
The Role of Mortgage Brokers in Retirement Housing: Key ConsiderationsThe Role of Mortgage Brokers in Retirement Housing: Key Considerations
The Role of Mortgage Brokers in Retirement Housing: Key Considerationssunlite Mortgage
 
LCAR Unit 22 - Leasing and Property Management - 14th Edition Revised.pptx
LCAR Unit 22 - Leasing and Property Management - 14th Edition Revised.pptxLCAR Unit 22 - Leasing and Property Management - 14th Edition Revised.pptx
LCAR Unit 22 - Leasing and Property Management - 14th Edition Revised.pptxTom Blefko
 
Sobha Aranya Sector 80 Gurgaon E- Brochure.pdf
Sobha Aranya Sector 80 Gurgaon E- Brochure.pdfSobha Aranya Sector 80 Gurgaon E- Brochure.pdf
Sobha Aranya Sector 80 Gurgaon E- Brochure.pdffaheemali990101
 
Anandtara Iris Residences Mundhwa Pune Brochure.pdf
Anandtara Iris Residences Mundhwa Pune Brochure.pdfAnandtara Iris Residences Mundhwa Pune Brochure.pdf
Anandtara Iris Residences Mundhwa Pune Brochure.pdfabbu831446
 
Low Rate Call Girls in Lajpat Nagar Delhi Call 9990771857
Low Rate Call Girls in Lajpat Nagar Delhi Call 9990771857Low Rate Call Girls in Lajpat Nagar Delhi Call 9990771857
Low Rate Call Girls in Lajpat Nagar Delhi Call 9990771857delhimodel235
 
Managed Farmland Brochures to get more in
Managed Farmland Brochures to get more inManaged Farmland Brochures to get more in
Managed Farmland Brochures to get more inknoxdigital1
 
Namrata 7 Plumeria Drive Pimpri Chinchwad Pune Brochure.pdf
Namrata 7 Plumeria Drive Pimpri Chinchwad Pune Brochure.pdfNamrata 7 Plumeria Drive Pimpri Chinchwad Pune Brochure.pdf
Namrata 7 Plumeria Drive Pimpri Chinchwad Pune Brochure.pdfPrachiRudram
 
Kumar Fireworks Hadapsar Link Road Pune Brochure.pdf
Kumar Fireworks Hadapsar Link Road Pune Brochure.pdfKumar Fireworks Hadapsar Link Road Pune Brochure.pdf
Kumar Fireworks Hadapsar Link Road Pune Brochure.pdfBabyrudram
 
MADHUGIRI FARM LAND BROCHURES (11)_compressed (1).pdf
MADHUGIRI FARM LAND BROCHURES (11)_compressed (1).pdfMADHUGIRI FARM LAND BROCHURES (11)_compressed (1).pdf
MADHUGIRI FARM LAND BROCHURES (11)_compressed (1).pdfknoxdigital1
 
83770-87607 ۞Call Girls In Near The Park Hotel (Cp) Delhi
83770-87607 ۞Call Girls In Near The Park Hotel (Cp) Delhi83770-87607 ۞Call Girls In Near The Park Hotel (Cp) Delhi
83770-87607 ۞Call Girls In Near The Park Hotel (Cp) Delhidollysharma2066
 
Prestige Sector 94 at Noida E Brochure.pdf
Prestige Sector 94 at Noida E Brochure.pdfPrestige Sector 94 at Noida E Brochure.pdf
Prestige Sector 94 at Noida E Brochure.pdfsarak0han45400
 
Cashpay_Call Girls In Gaur City Mall Noida ❤️8860477959 Escorts Service In 24...
Cashpay_Call Girls In Gaur City Mall Noida ❤️8860477959 Escorts Service In 24...Cashpay_Call Girls In Gaur City Mall Noida ❤️8860477959 Escorts Service In 24...
Cashpay_Call Girls In Gaur City Mall Noida ❤️8860477959 Escorts Service In 24...lizamodels9
 
How to Navigate the Eviction Process in Pennsylvania: A Landlord's Guide
How to Navigate the Eviction Process in Pennsylvania: A Landlord's GuideHow to Navigate the Eviction Process in Pennsylvania: A Landlord's Guide
How to Navigate the Eviction Process in Pennsylvania: A Landlord's GuideezLandlordForms
 
Call Girls In Sahibabad Ghaziabad ❤️8860477959 Low Rate Escorts Service In 24...
Call Girls In Sahibabad Ghaziabad ❤️8860477959 Low Rate Escorts Service In 24...Call Girls In Sahibabad Ghaziabad ❤️8860477959 Low Rate Escorts Service In 24...
Call Girls In Sahibabad Ghaziabad ❤️8860477959 Low Rate Escorts Service In 24...lizamodels9
 
Call Girls In Mayur Vihar-1 Delhi ❤️8860477959 Good Looking Escorts In 24/7 D...
Call Girls In Mayur Vihar-1 Delhi ❤️8860477959 Good Looking Escorts In 24/7 D...Call Girls In Mayur Vihar-1 Delhi ❤️8860477959 Good Looking Escorts In 24/7 D...
Call Girls In Mayur Vihar-1 Delhi ❤️8860477959 Good Looking Escorts In 24/7 D...lizamodels9
 
Experion Elements Sector 45 Noida_Brochure.pdf.pdf
Experion Elements Sector 45 Noida_Brochure.pdf.pdfExperion Elements Sector 45 Noida_Brochure.pdf.pdf
Experion Elements Sector 45 Noida_Brochure.pdf.pdfkratirudram
 
Covid 19 and Market Impact during the Pandemic
Covid 19 and Market Impact during the PandemicCovid 19 and Market Impact during the Pandemic
Covid 19 and Market Impact during the PandemicTim Wilmath
 

Recently uploaded (20)

The Role of Mortgage Brokers in Retirement Housing: Key Considerations
The Role of Mortgage Brokers in Retirement Housing: Key ConsiderationsThe Role of Mortgage Brokers in Retirement Housing: Key Considerations
The Role of Mortgage Brokers in Retirement Housing: Key Considerations
 
LCAR Unit 22 - Leasing and Property Management - 14th Edition Revised.pptx
LCAR Unit 22 - Leasing and Property Management - 14th Edition Revised.pptxLCAR Unit 22 - Leasing and Property Management - 14th Edition Revised.pptx
LCAR Unit 22 - Leasing and Property Management - 14th Edition Revised.pptx
 
Sobha Aranya Sector 80 Gurgaon E- Brochure.pdf
Sobha Aranya Sector 80 Gurgaon E- Brochure.pdfSobha Aranya Sector 80 Gurgaon E- Brochure.pdf
Sobha Aranya Sector 80 Gurgaon E- Brochure.pdf
 
Anandtara Iris Residences Mundhwa Pune Brochure.pdf
Anandtara Iris Residences Mundhwa Pune Brochure.pdfAnandtara Iris Residences Mundhwa Pune Brochure.pdf
Anandtara Iris Residences Mundhwa Pune Brochure.pdf
 
Low Rate Call Girls in Lajpat Nagar Delhi Call 9990771857
Low Rate Call Girls in Lajpat Nagar Delhi Call 9990771857Low Rate Call Girls in Lajpat Nagar Delhi Call 9990771857
Low Rate Call Girls in Lajpat Nagar Delhi Call 9990771857
 
Managed Farmland Brochures to get more in
Managed Farmland Brochures to get more inManaged Farmland Brochures to get more in
Managed Farmland Brochures to get more in
 
Namrata 7 Plumeria Drive Pimpri Chinchwad Pune Brochure.pdf
Namrata 7 Plumeria Drive Pimpri Chinchwad Pune Brochure.pdfNamrata 7 Plumeria Drive Pimpri Chinchwad Pune Brochure.pdf
Namrata 7 Plumeria Drive Pimpri Chinchwad Pune Brochure.pdf
 
Kumar Fireworks Hadapsar Link Road Pune Brochure.pdf
Kumar Fireworks Hadapsar Link Road Pune Brochure.pdfKumar Fireworks Hadapsar Link Road Pune Brochure.pdf
Kumar Fireworks Hadapsar Link Road Pune Brochure.pdf
 
Call Girls in Mahavir Nagar whatsaap call US +919953056974
Call Girls in Mahavir Nagar  whatsaap call US  +919953056974Call Girls in Mahavir Nagar  whatsaap call US  +919953056974
Call Girls in Mahavir Nagar whatsaap call US +919953056974
 
9953056974 Low Rate Call Girls In Saket, Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR9953056974 Low Rate Call Girls In Saket, Delhi NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
MADHUGIRI FARM LAND BROCHURES (11)_compressed (1).pdf
MADHUGIRI FARM LAND BROCHURES (11)_compressed (1).pdfMADHUGIRI FARM LAND BROCHURES (11)_compressed (1).pdf
MADHUGIRI FARM LAND BROCHURES (11)_compressed (1).pdf
 
83770-87607 ۞Call Girls In Near The Park Hotel (Cp) Delhi
83770-87607 ۞Call Girls In Near The Park Hotel (Cp) Delhi83770-87607 ۞Call Girls In Near The Park Hotel (Cp) Delhi
83770-87607 ۞Call Girls In Near The Park Hotel (Cp) Delhi
 
Prestige Sector 94 at Noida E Brochure.pdf
Prestige Sector 94 at Noida E Brochure.pdfPrestige Sector 94 at Noida E Brochure.pdf
Prestige Sector 94 at Noida E Brochure.pdf
 
Cashpay_Call Girls In Gaur City Mall Noida ❤️8860477959 Escorts Service In 24...
Cashpay_Call Girls In Gaur City Mall Noida ❤️8860477959 Escorts Service In 24...Cashpay_Call Girls In Gaur City Mall Noida ❤️8860477959 Escorts Service In 24...
Cashpay_Call Girls In Gaur City Mall Noida ❤️8860477959 Escorts Service In 24...
 
How to Navigate the Eviction Process in Pennsylvania: A Landlord's Guide
How to Navigate the Eviction Process in Pennsylvania: A Landlord's GuideHow to Navigate the Eviction Process in Pennsylvania: A Landlord's Guide
How to Navigate the Eviction Process in Pennsylvania: A Landlord's Guide
 
Call Girls In Sahibabad Ghaziabad ❤️8860477959 Low Rate Escorts Service In 24...
Call Girls In Sahibabad Ghaziabad ❤️8860477959 Low Rate Escorts Service In 24...Call Girls In Sahibabad Ghaziabad ❤️8860477959 Low Rate Escorts Service In 24...
Call Girls In Sahibabad Ghaziabad ❤️8860477959 Low Rate Escorts Service In 24...
 
Hot call girls in Moti Bagh🔝 9953056974 🔝 escort Service
Hot call girls in Moti Bagh🔝 9953056974 🔝 escort ServiceHot call girls in Moti Bagh🔝 9953056974 🔝 escort Service
Hot call girls in Moti Bagh🔝 9953056974 🔝 escort Service
 
Call Girls In Mayur Vihar-1 Delhi ❤️8860477959 Good Looking Escorts In 24/7 D...
Call Girls In Mayur Vihar-1 Delhi ❤️8860477959 Good Looking Escorts In 24/7 D...Call Girls In Mayur Vihar-1 Delhi ❤️8860477959 Good Looking Escorts In 24/7 D...
Call Girls In Mayur Vihar-1 Delhi ❤️8860477959 Good Looking Escorts In 24/7 D...
 
Experion Elements Sector 45 Noida_Brochure.pdf.pdf
Experion Elements Sector 45 Noida_Brochure.pdf.pdfExperion Elements Sector 45 Noida_Brochure.pdf.pdf
Experion Elements Sector 45 Noida_Brochure.pdf.pdf
 
Covid 19 and Market Impact during the Pandemic
Covid 19 and Market Impact during the PandemicCovid 19 and Market Impact during the Pandemic
Covid 19 and Market Impact during the Pandemic
 

Crypto regulations in Russia

  • 1. Regulation of Cryptography in Russia Alexey Lukatsky Security Business Consultant © 2011 Cisco and/or its affiliates. All rights reserved. 1
  • 2. Increasing Role of Cryptography • Extended interaction with customers and partners, enhanced efficiency, accelerated globalization • Growth of system complexity, IT maturity, appearance of new tools • Changed threat landscape © 2011 Cisco and/or its affiliates. All rights reserved. 2/75
  • 3. Social Outsourcing Virtualization Clouds Mobility Web 2.0 Networks © 2011 Cisco and/or its affiliates. All rights reserved. 3/75
  • 4. BUSINESS AND IT REQUIREMENTS OF PREFERENCES REGULATORY BODIES Co-working Legal Import Clouds and Legal usage outsourcing Holdings Legal distribution © 2011 Cisco and/or its affiliates. All rights reserved. 4/75
  • 5. • The first public regulatory documents date back to 1995 • The key prerequisite when developing legal documents is the total control cryptographic tools through their whole lifetime • The legal document development is based on protection of state secrets • Federal Security Bureau (FSB) is still adhering to this approach even after 15 years, despite the growing number of its opponents © 2011 Cisco and/or its affiliates. All rights reserved. 5/75
  • 6. Import of cryptographic tools to the territory of the Russian Federation Licensing of cryptography- related activities Use of certified cryptographic tools © 2011 Cisco and/or its affiliates. All rights reserved. 6/75
  • 7. 1 Fuzzy terminology 4 Incomprehension of a modern business threat model 3 Various stages of life cycle imply various Unavailability of well-defined Legacy requirements 5 position of the regulatory 2 rules body © 2011 Cisco and/or its affiliates. All rights reserved. 7/75
  • 8. © 2011 Cisco and/or its affiliates. All rights reserved. 8
  • 9. • Cryptographic solutions of arbitrary implementation • HMAC of arbitrary implementation • Digital signature tools of arbitrary implementation But not electronic signature tools (DS ≠ ES in new Russian regulations) • Encoding tools • Tools for creation of crypto keys • Crypto keys • but that is not all © 2011 Cisco and/or its affiliates. All rights reserved. 9/75
  • 10. • Systems, equipment, and components designed or modified to perform cryptanalytic functions • Systems, equipment, and components designed or modified for using cryptographic techniques to generate the expanding code for systems with broadening spectrum, including code hopping for systems with frequency hopping • Systems, equipment, and components designed or modified for using cryptographic techniques of channel or scrambling code formation for time-modulated ultra- wideband systems. • Cryptography ≠ compression or encoding techniques © 2011 Cisco and/or its affiliates. All rights reserved. 10/75
  • 11. • The new law "On Licensing Certain Activities" has made companies obtain FSB-issued licenses for the development, manufacture, distribution, and maintenance of information systems protected via cryptographic tools telecommunication systems protected via cryptographic tools • Information system, in the aggregate, consists of database information together with IT and hardware © 2011 Cisco and/or its affiliates. All rights reserved. 11/75
  • 12. • Usually, the need for using encryption (cryptographic) tools arises when other Laws methods fail to provide secure information storage and processing These cases include, for example, transfer of personal data via Internet where it is fundamentally impossible to exclude Confidentiality illegal intruder access to information being transferred ≠ Encryption Normative legal documents issued by regulatory bodies © 2011 Cisco and/or its affiliates. All rights reserved. 12/75
  • 13. • Obtain entity's approval for transferring clear information This is what Roskomnadzor does on its web site • Provide a controlled access zone • Use optical communication channels and correct threat model • Assign the task of providing confidentiality to communication provider Under special agreement • Use encryption tools © 2011 Cisco and/or its affiliates. All rights reserved. 13/75
  • 14. • Most of FSB's legal documents refer to 'confidential information' or 'information of confidential nature' • Federal law FZ-149 "On Information, Information Technologies, and Information Security" (as revised in 2006) refers to confidentiality as requirement, not as property or feature of information • Decree No.188 ("On Approval of a List of Data of Confidential Nature") also says nothing of confidentiality © 2011 Cisco and/or its affiliates. All rights reserved. 14/75
  • 15. • All life cycle stages of cryptographic tool Providing Import Operation services Development Maintenance Export Control and Manufacture Distribution supervision Evaluation Implementation © 2011 Cisco and/or its affiliates. All rights reserved. 15/75
  • 16. © 2011 Cisco and/or its affiliates. All rights reserved. 16
  • 17. • Statute on importation of the encryption (cryptographic) tools to the customs territory of the customs union and exportation from the customs territory of the customs union • Encryption (cryptographic) tools which are subject to restricted importation to the customs territory of the customs union and restricted exportation from the customs territory of the customs union • These provisions are applied to ANY manufactures • If a tool's encrypting functionality is not used or it is not its primary purpose, the tool is nevertheless considered to be cryptographic © 2011 Cisco and/or its affiliates. All rights reserved. 17/75
  • 18. • Printers, copymakers, and faxes • Cash registers • Pocket computers • Pocket devices for recording, playing and displaying • Computing machinery and their constituent parts • Subscribers' communication units • Basic stations • Telecommunications equipment • Software © 2011 Cisco and/or its affiliates. All rights reserved. 18/75
  • 19. • Equipment for radio- and television broadcasting and reception • Radio-navigation receivers, remote control devices • Internet access equipment • Electronic circuitry, integrated microcircuits, data storage devices • Other • A large number of items from Groups 84 and 85 of the Unified Customs Tariff of the customs union formed by the Republic of Belarus, Republic of Kazakstan, and Russian Federation © 2011 Cisco and/or its affiliates. All rights reserved. 19/75
  • 20. Simplified Procedure By Licensing • Import under • FSB's authorization notification • Import by the license issued by the Ministry of Industry and Trade • Verification of the legality of import under notification http://www.tsouz.ru/db/entr/notif/Pages/default.aspx • Verification of the legality of import under license A copy of FSB's authorization for import © 2011 Cisco and/or its affiliates. All rights reserved. 20/75
  • 21. • Goods containing encryption (cryptographic) tools, which include any of the following components: symmetric cryptographic algorithm using cryptographic key of up to 56 bit length; or asymmetric cryptographic algorithm based on any of the following methods: Factorization of integers with length shorter than or equal to 512 bits; Calculation of discrete logarithms in multiplicative group of the finite field with the size less or equal to 512 bits; or Discrete logarithm in the group with the size different from the one mentioned in “ii” above but less than 112 bits • Goods with cryptographic functionality blocked by manufacturer • Authentication and digital signature tools © 2011 Cisco and/or its affiliates. All rights reserved. 21/75
  • 22. • Encryption (cryptographic) tools which are components of software operating systems, with cryptographic capabilities that cannot be changed by users, which have been developed to be installed by users themselves without further essential vendor support, their technical documentation (description of cryptographic conversion algorithms, interaction protocols, interface description, etc.) being publicly accessible • Encryption (cryptographic) equipment specially designed and restricted for use in banking or financial sphere • Wireless electronic equipment performing data encryption only in radio channel with maximum distance of wireless action, without amplification and retransmission, less than 400 m according to manufacture's technical requirements © 2011 Cisco and/or its affiliates. All rights reserved. 22/75
  • 23. • Encryption (cryptographic) tools used for protection of process channels of information and telecommunications systems and communications networks • Portable or mobile electronic means of civilian use without end-to- end encryption • Personal smart cards • Receiving equipment for radio broadcasting, commercial television and broadcasting for limited audience • Copy protection tools © 2011 Cisco and/or its affiliates. All rights reserved. 23/75
  • 24. © 2011 Cisco and/or its affiliates. All rights reserved. 24
  • 25. • FSB license for encryption business Providing services in the sphere of information encryption Support and maintenance of encryption tools Distribution of encryption tools Development and production of encryption tools protected by using encryption (cryptographic) tools of information and telecommunication systems • On May 4, 2011, a new version of law "On Licensing Certain Activities" (99-FZ) was adopted Unified license for development, production, distribution, performance of works, providing of services, and maintenance of encryption tools, information and telecommunications systems protected by encryption tools © 2011 Cisco and/or its affiliates. All rights reserved. 25/75
  • 26. • In explicit form - no; however, activities including mounting, installation, configuration of encryption (cryptographic) tools repair, servicing of encryption (cryptographic) tools recycling and destruction of encryption (cryptographic) tools works on support and maintenance of encryption (cryptographic) tools provided for in technical and operational documentation • shall be attributed, in FSB opinion, to licensable activities – engineering maintenance • Engineering maintenance is a set of operations or an operation aimed at maintenance or serviceability of a product under conditions of its intended use, expectation, storage, and transportation GOST18322-78 "A System of engineering maintenance and repair of equipment. Terms and definitions" © 2011 Cisco and/or its affiliates. All rights reserved. 26/75
  • 27. • Representatives of FSB's 8-th Center have repeatedly asserted that licenses are not required for in-house needs © 2011 Cisco and/or its affiliates. All rights reserved. 27/75
  • 28. • The new law "On Licensing Certain Activities" dated May 4, 2011 restored the 'in-house needs' term (but only with respect to maintenance of encryption tools) • However, this term, 'in-house needs', has not been defined, and it brings forth a great many questions Can encryption aimed at protection of employees' and customers' information be attributed to in-house needs or not? Does encryption of personal data mean protection of own interests or protection of rights of personal data holders? © 2011 Cisco and/or its affiliates. All rights reserved. 28/75
  • 29. • What is maintenance? Operation of crypto tools in compliance with requirements of technical and operational documentation included in crypto tools delivery set is not considered to be maintenance activity relating to encryption (cryptographic) tools • Non-attributable to licensable activities Transferring crypto tools to customers and affiliates Generation and transfer of generated keys © 2011 Cisco and/or its affiliates. All rights reserved. 29/75
  • 30. • Federal Law dated April 29, 2008 No. 57-FZ, Moscow "On the Procedure of Foreign Investments to Business Entities Which are Strategically Important for National Defense and State Security" In order to provide for national defense and state security, this Federal Law establishes expropriations of restrictive nature for foreign investors and groups of persons including foreign investors in case they participate in authorized capitals of business entities which are strategically important for national defense and state security and (or) make transactions which lead to instituting control over the specified business entities © 2011 Cisco and/or its affiliates. All rights reserved. 30/75
  • 31. • A business entity which is strategically important for national defense and state security is an enterprise established in the territory of the Russian Federation and performing at least one of the activities which are strategically important for national defense and state security, these activities being specified in Article 6 of this Federal Law i.i. 11-14 – 4 types of licensing related to encryption activities Availability of just one router with IPSec requires a license for CIPT maintenance • On March 23, there were amendments adopted in the first reading to exclude banks (and only banks) from the list of 'strategic' enterprises © 2011 Cisco and/or its affiliates. All rights reserved. 31/75
  • 32. © 2011 Cisco and/or its affiliates. All rights reserved. 32
  • 33. • Signed on April 3, 1995 (amended on July 25, 2000) • It is forbidden for state authorities to use encryption tools without certificate issued by FSB • State authorities are disallowed to place state-guaranteed order at enterprises that use encryption tools without a certificate • Appropriate measures shall be taken with respect to the banks which do not use certified encryption tools when communicating with the Bank of Russia • Activities of legal entities and individuals related to operation of encryption tools without a FSB license shall be enjoined • Import of encryption tools without a license issued by the Ministry of Industry and Trade together with FSB authorization shall be enjoined • The defaulters shall be punished with the utmost rigour of the law © 2011 Cisco and/or its affiliates. All rights reserved. 33/75
  • 34. • Some of its provisions are still unexpired For example, requirements on import of encryption tools and on the sole use of properly certified encryption tools by state authorities • Some articles have been virtually repealed by new statutory legal acts The law "On Licensing Certain Activities" The law "On Technical Regulation" Civil Code • However, Decree No. 334 has not been explicitly repealed yet Despite circulating rumors © 2011 Cisco and/or its affiliates. All rights reserved. 34/75
  • 35. • Yes! The basic document is the Order on Approval of the Provision on the Development, Manufacturing, Sale, and Operation of Encryption (Cryptographic) Tools of Information Protection (PKZ-2005) • PKZ-2005 regulates relations which arise in the course of development, production, sale, and operation of encryption (cryptographic) tools for protecting limited-access data, which does not contain information classified as state secret (hereinafter - information of confidential nature) Order dated 9.02.2005, No. 66 (signed by the Director of FSB and registered in the Ministry of Justice) • PKZ-2005 is not applicable to foreign crypto tools © 2011 Cisco and/or its affiliates. All rights reserved. 35/75
  • 36. • PKZ-2005 is used for the protection of information of confidential nature, subject to protection in compliance with the RF law Information protection in the Federal executive authorities and executive authorities of the RF constituent entities Information protection in organizations, irrespective of their form of incorporation and pattern of ownership, when they fulfill orders for delivery of goods, performance of works, or provision of services for state needs (hereinafter - organizations fulfilling state-guaranteed orders) Information protection assigned by the RF law to persons who have access to this information or who are provided with authority to administer data contained in this information Protection of information owned by state authorities or organizations fulfilling state-guaranteed orders © 2011 Cisco and/or its affiliates. All rights reserved. 36/75
  • 37. • The mode of information protection by using CIPT is established by the holder of information of confidential nature the possessor (owner) of information resources (information systems) persons duly authorized by them on the basis of the RF law © 2011 Cisco and/or its affiliates. All rights reserved. 37/75
  • 38. • Holder of information Exchange of own data • Possessor (owner) of the system Exchange with state authorities • State authority Exchange with organizations fulfilling • Organization fulfilling state- state-guaranteed guaranteed orders orders Processing and • Holder of information storage without transfer • User (consumer) © 2011 Cisco and/or its affiliates. All rights reserved. 38/75
  • 39. © 2011 Cisco and/or its affiliates. All rights reserved. 39
  • 40. • Crypto tools must meet the requirements of technical regulations, with the degree of compliance with them being assessed according to the procedure described in 184-FZ "On Technical Regulation" PKZ-2005 • The quality of cryptographic protection of confidential information performed by crypto tools is provided through implementation of requirements for information security imposed on crypto tools © 2011 Cisco and/or its affiliates. All rights reserved. 40/75
  • 41. • In certain cases, protection level (crypto tools certification) is established in regulatory documents Predominantly, in Requirements Specifications for Federal information systems • The package of standards for information security of the Bank of Russia (The Standard for information security of the organizations of the banking system of the Russian Federation (STO BR IBBS)) provides for using encryption tools certified for class of protection КС2, at least • In other cases, the required protection level is determined by crypto tools user basing on a model of illegal intruder © 2011 Cisco and/or its affiliates. All rights reserved. 41/75
  • 42. • 3 protection levels – А (KА1), В (KВ1, KВ2), and C (KС1, KС2, KС3) The level of crypto tools certification depends on the number and severity of requirements • 6 models of intruder Н1 – external intruder acting without in-house assistance Н2 – in-house intruder who is not crypto tools user Н3 – in-house intruder who is crypto tools user Н4 – intruder inviting experts in the sphere of crypto tools development and analysis Н5 – intruder inviting research institutes in the sphere of crypto toolsdevelopment and analysis Н6 – intelligence services of foreign states © 2011 Cisco and/or its affiliates. All rights reserved. 42/75
  • 43. • For cryptographic protection of confidential information, it is necessary to use crypto tools which meet the requirements for information security established in compliance with the Russian Federation law PKZ-2005 © 2011 Cisco and/or its affiliates. All rights reserved. 43/75
  • 44. • Decree No. 351 and FZ-85 (on participation in international exchange of information) • Government regulation (PP-424) (on connection of the Federal state information systems to Internet) • FSS Order No. 487 (on the Russian segment of Internet) • Order of the Ministry of Communications No. 104 (on state-owned IS in public use) • Order of the Federal Service on Technical and Export Control/FSB No. 489/416 (on requirements for protection of publicly used IS) • Government regulation (PP-330) (on specific features of assessment of compliance of protection tools for state-owned Information Systems and Personal Data Information Systems) • Order of the Ministry of Economic Development No. 54 (on electronic sales areas) • FSB's guidelines on personal data • Government regulation (PP-781) (on protection of personal data) • As well as FZ-149, Special requirements on technical protection of confidential information, PP-608, Decree No. 334, Gidelines of FSTEC on Key systems of information infrastructure © 2011 Cisco and/or its affiliates. All rights reserved. 44/75
  • 45. The number of regulatory legal documents which require certification in compliance with security requirements 8 7 6 5 4 3 2 1 0 * - for 2011 – preliminary assessment of new regulatory documents drafts (FZ “On National Payment System”, FZ “On Official Secrecy”, new orders of FSTEC/FSB, etc.) 45 © 2011 Cisco and/or its affiliates. All rights reserved. 45/75
  • 46. • There are two certification systems under FSB line The system of certification of cryptographic information protection tools (РОСС RU.0001.030001) The system of certification of information protection tools in compliance with security requirements for information classified as state secret (РОСС RU.0003.01БИ00) • Crypto tools are estimated for compliance with "The Requirements to Tools for Cryptographic Protection of Confidential Information" • User shall be responsible for using non-certified crypto tools • Impossibility to update certified products © 2011 Cisco and/or its affiliates. All rights reserved. 46/75
  • 47. • Old regulatory documents refer predominantly to certification, whereas new ones - to evaluation • Evaluation ≠ certification • Evaluation is direct or indirect determination of meeting the requirements imposed on the object • Evaluation is controlled by FZ- 184 "On Technical Regulation" © 2011 Cisco and/or its affiliates. All rights reserved. 47/75
  • 48. State control and supervision Accreditation Tests Evaluation Registration Facultative certification Compliance approval Obligatory certification Acceptance and Declaration of introduction into service compliance In other form © 2011 Cisco and/or its affiliates. All rights reserved. 48/75
  • 49. • Work of representative offices of foreign companies in Russia Import of western cryptography or export of domestic one • Commercial IP television and IP video surveillance The devices do not and will not support GOSTs as they are manufactured abroad and delivered to hundreds of countries in the world • Encryption at rates higher than 10 Gbit/s Backbone links or synchronization of data centers • Standards of wireless communications 802.11i, mobile communications 2.5G, 3G, as well as LTE and Wi-Max © 2011 Cisco and/or its affiliates. All rights reserved. 49/75
  • 50. • Encryption in smartphones, iPhones, etc. • Access to Russian Internet banks from a computer in Internet cafe when on holiday abroad No certified cryptolibraries with GOSTs is available for this • Access from abroad to any Russian payment system (Assist, ChronoPay, Yandex.Dengi, Rapida, etc.), as well as to any other system of e-commerce (booking tickets, buying books in Internet stores, etc.) • Protected electronic Web mail via HTTPS © 2011 Cisco and/or its affiliates. All rights reserved. 50/75
  • 51. • Encryption using FibreChannel protocol when recording to tape in a data center • Encryption using FibreChannel protocol when transferring data within a data center or between different data centers • Outsourcing and XaaS (Cloud Computing) All processing operations are performed via Internet and, probably, somewhere abroad. • Support of SCADA • And so on © 2011 Cisco and/or its affiliates. All rights reserved. 51/75
  • 52. © 2011 Cisco and/or its affiliates. All rights reserved. 52/75
  • 53. • Encryption at rates 40 Gbit/s • The regulatory body / domestic manufacturers have proposed to make a cluster of VPN gateways A gateway can support rate up to 1 Gbit/s • A final solution – 40+n gateways at one end and the same number of gateways at the other end How much do 80+2n domestic VPN gateways cost? n items are required for redundancy © 2011 Cisco and/or its affiliates. All rights reserved. 53/75
  • 54. • You install certified crypto tools, then • You cannot Work efficiently with multimedia traffic (Telepresence, etc.) at the same level as foreign crypto tools do Work at multi-gigabit rates (especially higher than 3.5 Gbit/s) Work from abroad using leased computers/devices Use outsourcing and cloud computing (including in Russia) Use most of mobile platforms in your business • And it would cost you a colossal amount of money ;-( © 2011 Cisco and/or its affiliates. All rights reserved. 54/75
  • 55. • Non-Russian VPN products cannot be used for encryption of most types of information to be protected If it is not authorized by FSB De facto, having obtained permission for import, you gain the right to use The issue related to the terms including 'confidential information', 'confidentiality', 'information of confidential nature remains open • It is impossible to certify foreign crypto tools Only GOST-implementing crypto tools are subject to certification Requirements for certification of foreign-manufacture crypto tools are unavailable • The collision: in certain cases, you only can use certified crypto tools. Domestic crypto tools do not meet technical requirements, whereas it is impossible to certify crypto tools of foreign manufacture © 2011 Cisco and/or its affiliates. All rights reserved. 55/75
  • 56. • To provide security of personal data when processing them in information systems, you must use cryptotools certified in the framework of certification system of FSB of Russia (those approved by examining organization for compliance with requirements of regulatory documents on information security • Incorporation of cryptotools of classes KC1 and KC2 can be performed without control on the part of FSB of Russia FSB's guidelines on personal data • Incorporation does not remove the problem of legal import of foreign VPN products © 2011 Cisco and/or its affiliates. All rights reserved. 56/75
  • 57. • Is it possible to use a certified cryptolibrary as a component of VPN solutions? Yes, it is possible • Will this use be a legitimate one? No!!! © 2011 Cisco and/or its affiliates. All rights reserved. 57/75
  • 58. © 2011 Cisco and/or its affiliates. All rights reserved. 58
  • 59. • Article 13.12. Violation of Information Security Rules (Code of Administrative Offences) i.1 – violation of licensing provisions (up to RUB 10000) i.2. – use of non-certified security tools, if they are subject to obligatory certification (up to RUB 20000 + confiscation) i.3 – violation of licensing provisions related to state secret (up to RUB 20000) i.4. – use of non-certified security tools related to state secret (up to RUB 30000 + confiscation) i.5 – gross violation of licensing provisions (up to RUB 15000 + suspension of activities for up to 90 day period) © 2011 Cisco and/or its affiliates. All rights reserved. 59/75
  • 60. • Article 13.13. Illegal Activity Related to Information Security (Code of Administrative Offences) i.1 – dealing with information protection without a license, if it is obligatory (up to RUB 20000 + confiscation) i.2. – dealing with state secret protection and development of tools for its protection without a license (up to RUB 40000 + confiscation) © 2011 Cisco and/or its affiliates. All rights reserved. 60/75
  • 61. • Article 171. Illegal Enterprise (RF Criminal Code) i.1 – performing activities without registration (if a license is obligatory), with violations of registration rules, submittance of false facts to the licensing agency, if it caused damage to citizens, organizations or state or was accompanied by absorbing significant revenue (up to RUB 300000 or compulsory labour up to 240 hours or detention up to 6 months) i.2 – the same but committed by a group of persons or absorption of particularly large revenue (up to RUB 500000 or imprisonment for up to 5 years) • There are about 20 criminal cases initiated by FSB against Russian organizations © 2011 Cisco and/or its affiliates. All rights reserved. 61/75
  • 62. • Recall of a licence by FSB (only for service licenses) k) use, by Licensee, of encryption (cryptographic) tools of foreign manufacture if these tools have been imported to the territory of the Russian Federation and distributed there in compliance with the procedure established by statutory legal acts of the Russian Federation • Article 188. Contraband (RF Criminal Code) i.1 – transferring goods in large quantities across customs border by-passing customs, non-declaring or false declaring (up to RUB 300000 or imprisonment for up to 5 years) © 2011 Cisco and/or its affiliates. All rights reserved. 62/75
  • 63. • Article 16.2. Non-Declaring or False Declaring (Code of Administrative Offences) i.1 – non-declaring (up to RUB 20000 or confiscation or double cost of contraband) i.2 – false declaring aimed at understatement of custom amount (up to RUB 20000 or double cost of unpaid taxes or confiscation) i.3 – false declaring aimed at by-passing import restrictions (up to RUB 300000 or confiscation) • Article 16.3. Incompliance With Restrictions for Import of Goods (Code of Administrative Offences) i.1 – incompliance with import restrictions of economic nature (up to RUB 300000) i.2 – incompliance with import restrictions (up to RUB 100000 + confiscation) • Article 16.7. Submittance of invalid documents when declaring goods at customs (Code of Administrative Offences) i.1 – alse declaring (up to RUB 300000 + confiscation) © 2011 Cisco and/or its affiliates. All rights reserved. 63/75
  • 64. • Article 14.1. Performance of entrepreneurial activities without state registration or without a license (Code of Administrative Offences)) i.3 – performance of activity with violation of licensing provisions (up to RUB 40000) i.4 – performance of activity with gross violation of licensing provisions (up to RUB 50000 + suspension of activities for up to 90 day period) © 2011 Cisco and/or its affiliates. All rights reserved. 64/75
  • 65. © 2011 Cisco and/or its affiliates. All rights reserved. 65
  • 66. • In Spring of 2011, FSB expressed disquietude related to using encryption tools of foreign manufacture in public-service communications networks of the Russian Federation Skype, Gmail, Hotmail, etc. • The Commission decided to form an interagency task force for the development of the RF Government proposals on using cryptographic tools • The proposals shall be submitted to the Government in the period before October 1, 2011 Excursus in history: in August of 2007, the Minister of Education, Fursenko, suggested to conquer the whole world through implementation of Russian cryptography. Proposals on the world conquering must have been submitted to the Government before December 1, 2007 It is true that later on our GOSTs were taken as RFC, and also as a basis for DNSSEC… though afterwards it was announced that GOST 28147 had been broken © 2011 Cisco and/or its affiliates. All rights reserved. 66/75
  • 67. Everything will Liberalization Crackdown remain as it is • Probability - • Probability - • Probability - 20% 45% 30% (currently) (currently) (currently) • Probability in 2 • Probability in 2 years - 35% years - 20% and 10% and 55% (depending on (depending on the winner of the winner of presidential presidential election) election) Expert evidence of Cisco specialists © 2011 Cisco and/or its affiliates. All rights reserved. 67/75
  • 68. Adopt unified definition of the 'encryption tools' term Define concept 'for in-house needs' Authorize the use of non- certified crypto tools if countertypes are unavailable Add transparency to the procedure of decision making on crypto tools import authorization Refine the conditions of licensing © 2011 Cisco and/or its affiliates. All rights reserved. 68/75
  • 69. © 2011 Cisco and/or its affiliates. All rights reserved. 69
  • 70. • Cisco and S-Terra CSP have developed VPN solutions supporting Russian crypto algorithms based on Cisco equipment • FSB Certificate SF/114-1622, 114-1624, 124-1623, 124-1625, 124-1626 dated February 28, 2011 The Certificate is for KC2 class for both solutions Solution for remote offices • Based on the module for ISR G1 and G2 (2800/2900/3800/3900) Solution for data centers and headquarters • Based on UCS C-200 © 2011 Cisco and/or its affiliates. All rights reserved. 70/75
  • 71. Tried-and-true The local procedure of Over 5,300 production of submitting notifications for the encryption module applications for the Cisco equipment NME-RVPN has import of 'strict' been started cryptography In Spring of 2011, Cisco obtained FSB licenses for encryption activities © 2011 Cisco and/or its affiliates. All rights reserved. 71/75
  • 72. Consultative Technical Center on RG Committee 127 Compliance with CB Subcommittee Subcommittee 3 "Security of the Requirements 127 (PK-3) (PK-3) Information of a set of BR IBBS Technologies" of the Association (TK-362) of the Russian Banks (CC of ARB) "IT Security" "Information "Information Consulting to Development of (representative of Protection in Protection" of banks on recommendations on ISO SC27 in Financial the Federal personal data personal data and on Russia) Institutions" Service on issues the standard for Technical and information security Export Control of the organizations (FSTEC) of the banking system of the Russian Federation (STO BR IBBS) v4 © 2011 Cisco and/or its affiliates. All rights reserved. 72/75
  • 73. Non- 500+ FSB Declared 28 96 Capabilities (NDV) FSTEC has certified Cisco unavailable in a product lines of product lines of Cisco certificates for (together with S- number of Cisco have have been sertified Cisco products Terra CSP) product lines of passed by FSTEC solutions Cisco certification under "batch production" © 2011 Cisco and/or its affiliates. All rights reserved. 73/75
  • 74. FAQ about import of encryption tools Cisco solutions on certified cryptography Cryptography regulation chart in Russia (from slide 5) … as well as many other things http://www.facebook.com/CiscoRu http://twitter.com/CiscoRussia http://www.youtube.com/CiscoRussiaMedia http://www.flickr.com/photos/CiscoRussia http://vkontakte.ru/Cisco © 2011 Cisco and/or its affiliates. All rights reserved. 74/75
  • 75. Thank you! security-request@cisco.com