I believe that all nations in the world should have at least one National CSIRT - an operational unit that coordinates national cyber security initiatives and activities in the country. Do small countries and economies set up their National CSIRTs in the same way as large ones? Typically, not exactly the same. I try to look at the similarities and differences in this post. Hopefully this information will be useful for many smaller economies that are still trying to initiate or are in the process of building a National CSIRT.
There are almost 200 sovereign (=fully independent) countries in the world, and about 40 of them have less than 1 million inhabitants. A further 20+ countries have less than 3 million inhabitants while being relatively small economies. There are a further 40 or so dependent smaller territories - i.e. they do not have full sovereignty. So there are about 100 economies that would set up and run smaller national CSIRTs. It is estimated that only about 30-50% of them already have National CSIRTs.
The design constraints and opportunities of smaller economies are typically as follows:
- Lack of people in the country who understand advanced IT and cyber security.
- Lack of funding to hire such professionals for government positions, as they typically work for the highest paying organisations.
- Lack of a local cybersecurity ecosystem - organisations that see it as their mission to support the cybersecurity sector in the country (educational organisations, cybersecurity consultants, cybersecurity technology integrators, cybersecurity technology vendors).
- Smaller economies have simpler governance structures - fewer levels of hierarchy and usually very clear who is responsible for an issue. This makes it easier to get everyone in the same room to discuss and agree.
- There is naturally less need for formalism, so verbal agreements are often sufficient, resulting in fewer written policies and procedures.
For smaller and larger economies, national CSIRTs share some similar characteristics:
- Their institutional framework, governance model is the same - based on budget allocation, approved mandate to operate, service model, processes, automation.
- Their constituency definition is often similar - including government and private organisations, citizens.
- Basic technology automation is the same - communication platforms (CSIRT website based on Wordpress or Drupal, email based on Zimbra or O365, email lists based on phpList, social media), ticketing systems (based on free RTIR, commercial OTRS, or even shared mailbox) for incident accounting and automation, and other automation to reduce human workload, threat intelligence routing and processing (IntelMQ, Shuffle. io, MISP, OpenCTI, IntelOwl, TheHive), visualisation of observed toxicity and badness (on Elastic and Kibana or Arctic Security; data sourced from ShadowServer, TeamCymru, Communities MISP and various OSINT feeds; LDCs benefit from free Bitsight subscription through ITU's Cyber4Good programme), vulnerability scanners (such as Nessus, Netsparker, Acunetix, Artemis, ImmuniWeb and CTM360 though ITU's Cyber4Good program).
The main differences we often observe are the following ones:
- Existing cybersecurity skills of CSIRT staff of smaller economies dominate their service structure. If such CSIRT has strong awareness specialist, then Knowledge Transfer Service Area starts to dominate. If CSIRT is made up of technical experts - often Information Security Event and Incident Management Service Area as well as Vulnerability Management is more dominant - often focusing on government constituency needs.
- Those who successfully document their CSIRT operating model (clear mandate, service definitions, processes and procedures, workflows) - ultimately have better effectiveness and resilience - when staff change, or due to self-confidence - that it is very clear what CSIRT staff do, and how each part of the operation comes together in a coherent operational picture, with clear outcomes and accountable value creation.
- The national CSIRT is often treated as the only organisation responsible for cyber security in the country. This means that services such as policy and technical advice are often unexpectedly more focused than originally planned. For example, the typical preparation and updating of national cybersecurity strategies and legislation often ends up on the CSIRT's desk.
- Responsibility for critical information infrastructure protection is often less structured, with a relatively simpler national methodology: how to identify CII, how to regulate CII, and how to support their owners and operators.
- The size and skills of the team dominate what value is created. The typical team size is often between 1 and 5 people. Some technical solutions are not used because such teams are too small to operate complex technologies - for example those for national threat monitoring from open sources or sensor networks, or for conducting large-scale technical cyber exercises (CTFs and similar), or technologies such as Taranis (-NG, .AI).
- Internal partnerships in the country are very well established and strong, and they form naturally - due to the size of the community and the size of the country.
There are numerous examples how smaller nations make great success with their CSIRTs, and become source for regional inspiration – such as CSIRTs of Grenada, Cyprus, Jersey, Bahamas, Bhutan, and many more.
Some reference readings I suggest (none of them focus directly on small economies, but are good references anyway):
CIRT lead, CIRT/SOC architect at NRD Cyber Security
2moOne more constraint I can suggest is an education system. Universities in lower population countries do not have wide offer of technological, cybersecurity related study programs often and that is the reason young people leave the country for studies abroad. Part of them come back to the home country after the studies, but anyway the effect is the cybersecurity market and national CSIRTs as well starving for young talents more than in big countries. That is actually related to constraint 1
Advisor, United Nations, Internet Governance Forum, Multistakeholder Advisory Group (MAG) | vCISO | Cybersecurity Advisor | Professor | Researcher | Speaker
2moThank you for sharing such a valuable article. One key takeaway is the importance of establishing a National CSIRT, even in smaller economies, to coordinate cybersecurity efforts effectively. Additionally, the article highlights how simplified governance structures in these countries can foster smoother collaboration among key stakeholders. This is a must-read for anyone involved in strengthening global cybersecurity. Great contribution!
Thank you Vilnius for the insightful analysis
Bridge builder in legacy mode
3moGood learning
Cybersecurity Consultant | CISSP, PMP, TOGAF 9 | MBA
3moGreat articulation as always, Vilius. Thanks for sharing this.