<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>C&amp;ESAR'22: Ensuring Trust in a Decentralized World (Preface)</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Gurvan Le Guernic</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>DGA Maîtrise de l'Information</institution>
          ,
          <addr-line>Rennes</addr-line>
          ,
          <country country="FR">France</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Univ Rennes</institution>
          ,
          <addr-line>Inria, CNRS, IRISA, Rennes</addr-line>
          ,
          <country country="FR">France</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Erwan Abgrall • Frédéric Besson, Université de Rennes 1 • Christophe Bidan, CentraleSupélec • Yves Correc, ARCSI • Frédéric Cuppens, Polytechnique Montréal • Herve Debar, Télécom SudParis • Ivan Fontarensky, Thales • Jacques Fournier, CEA • Julien Francq, Naval Group • Brittia Guiriec, DGA MI • Gurvan Le Guernic, DGA MI &amp; Université de Rennes 1 (Univ Rennes) • Frédéric Majorczyk, DGA MI &amp; CentraleSupélec</institution>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2022</year>
      </pub-date>
      <abstract>
        <p>C&amp;ESAR is an educational, professional and scientific conference on cybersecurity whose specific topic changes every year. This year C&amp;ESAR is focused on means to ensure trust in a decentralized digital world. The digital world is becoming more and more decentralized. The traditional cybersecurity perimeter defense paradigm does not fit well with those decentralized architectures. New means are required in order to gain confidence from a security point of view in the transactions going on in a decentralized system. How can one trust, especially through control and audit, in the legitimacy of interactions in the context of remote work, hybrid cloud, and other decentralization concepts? C&amp;ESAR 2022 received 16 submissions for peer-review. Out of these, 8 papers were accepted for presentation at the conference. After the conference, 7 were short listed for inclusion in this volume.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Cybersecurity</kwd>
        <kwd>Trust</kwd>
        <kwd>Decentralization</kwd>
        <kwd>C&amp;ESAR</kwd>
        <kwd>Conference</kwd>
        <kwd>Preface</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Résumé
C&amp;ESAR est une conférence pédagogique, professionnelle et scientifique sur la cybersécurité
dont le thème spécifique change chaque année. Cette année, C&amp;ESAR se concentre sur les
moyens d’assurer la confiance dans un monde numérique décentralisé. Le monde numérique est
de plus en plus décentralisé. Le paradigme traditionnel de défense périmétrique ne correspond
pas bien à ces architectures décentralisées. De nouveaux moyens sont nécessaires pour gagner la
confiance d’un point de vue sécuritaire dans les transactions qui se déroulent dans un système
décentralisé. Comment faire confiance, notamment par le contrôle et l’audit, à la légitimité
des interactions dans le cadre du travail à distance, du cloud hybride et d’autres concepts de
décentralisation ? C&amp;ESAR 2022 a reçu 16 soumissions pour examen par les pairs. Parmi
ceux-ci, 8 articles ont été acceptés pour présentation à la conférence, dont 7 pour inclusion
dans les actes.
Every year since 1997, the French Ministry of Defense organizes a cybersecurity conference,
called C&amp;ESAR. This conference is now one of the main events of the European Cyber
Week (ECW) organized every fall in Rennes, Brittany, France.</p>
      <p>The goal of C&amp;ESAR is to bring together governmental, industrial, and academic
stakeholders interested in cybersecurity. This event, both educational and scientific,
gathers experts, researchers, practitioners and decision-makers. This inter-disciplinary
approach allows operational practitioners to learn about and anticipate future
technological inflection points, and for industry and academia to confront research and product
development to operational realities. Every year, C&amp;ESAR explores a diferent topic
within the field of cybersecurity.</p>
      <p>This year’s topic is: Ensuring Trust in a Decentralized World. This topic is
subtitled: Control and Audit of Interactions in a Decentralized System.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Ensuring Trust in a Decentralized World</title>
      <p>The notion of trust in the context of this call relates to the notions of integrity,
harmlessness/innocuousness, fitness for purpose, … Can I trust this data to act on it? Can I trust
this treatment to let it “execute” in my system or on my data? Can I trust this entity to
let it access those services and data? Can I (still) trust a subsystem (potentially my own,
and potentially only a communication channel) to rely on it to run my operations and
handle my data?</p>
      <p>
        In the “good old days” of atomic enclosed and guarded information systems [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ], trust
issues were (very) roughly reduced to the following question: are you (or your initiator)
already in the system, or are you still out? Any entity inside the system (or process
initiated from inside) was implicitly trusted to have the legitimate right to access, act on,
act on behalf, or support the system [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. Every entity composing the system (hardware
or software) was “vetted” through your procurement process involving some (varying)
level of evaluation; data in your system was mostly produced by yourself; processes in
your system were executed under your control; and, access to your system was mostly
a (trusted) physical control problem (not an IT one), except for some well-identified
points such as (early days) websites and email servers. You had (nearly) full control over
(nearly) everything in a clearly defined perimeter. The game was to maintain trust inside
this perimeter by maintaining untrusted entities or “resources” outside of this perimeter.
This approach to securing such systems is called the Castle Security Model [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ].
      </p>
      <p>
        Since then, information systems have evolved a lot. Information systems are becoming
more and more decentralized. For the “simple” case of an information system made of
multiple fully controlled and interconnected enclaves, using Virtual Private Networks
(VPN) allows getting back to a setting compatible with the Castle Security Model
(although it may not be relevant for today’s attacks, which among other diferences involve
more lateral movements than in the “good old days”). However, today’s information
systems are usually more decentralized than that and have lost more control over their
defenses and dependencies. They may have weaker physical controls of their enclaves
perimeters, such as in the case of Remote work / Work from Home and Internet of Things
(IoT). They rely more and more heavily on the cloud and, from Infrastructure as a Service
(IaaS) to Platform as a Service (PaaS), lose more and more control over part of their
interconnections, isolation from neighboring processes, and execution stack, loosing even
control over their payload in the case of Software as a Service (SaaS). They may even
accept the fact that some of their “supporting components” may not be administered at
all, or at least not at an enterprise level, as is the case with the Bring Your Own Device
(BYOD) trend. The decentralization process itself may even not be fully controlled,
as in the case of Shadow IT which is one of the main cybersecurity risks according to
44% of respondents to a recent cybersecurity survey [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Even if usage of the cloud is
controlled, there are trust issues with it, such as lack of control over the access of the
cloud provider administrators for 45% of the respondents, and no visibility on the cloud
provider’s supply chain for 51% of the respondents. Overall, 86% of companies estimate
that the tools provided by cloud providers do not allow to secure data and that other
specific tools are required [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ].
      </p>
      <p>
        Zero Trust [
        <xref ref-type="bibr" rid="ref5 ref6">5, 6</xref>
        ] is a security model that addresses part of the cybersecurity issues
resulting from the decentralization of information systems. It is gaining more and more
traction in the real world and is getting deployed in the industry [
        <xref ref-type="bibr" rid="ref4 ref7">7, 4</xref>
        ] as well as public
institutions [
        <xref ref-type="bibr" rid="ref8 ref9">8, 9</xref>
        ]. Rather than a specific architecture or a set of methods and technologies,
Zero Trust is a set of cybersecurity design principles and management strategies [
        <xref ref-type="bibr" rid="ref10 ref5">10, 5</xref>
        ].
Its main principle is to never rely on implicit trust. In particular authorizations (not only
for access but for any transactions) should never be given solely based on the location of
its requester (from which network the request comes). It does not mean that the system
should not rely on trust, but that trust must be gained and renewed [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. “[T]rust is never
granted implicitly but must be continually evaluated” [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] prior (control) and posterior
(audit) to granting it. This principle is not new and can be traced back to the Jericho
Forum [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] in 2004 [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Other principles, such as the least privilege principle [
        <xref ref-type="bibr" rid="ref12 ref13">12, 13</xref>
        ],
are even older but became more pregnant with decentralization and easier to enforce
with modern technologies. Another important principle of Zero Trust is to refine the
granularity of controls toward a per transaction basis. The goal is to authorize the least
privileges needed just-in-time of need [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        Not all of the principles of Zero Trust are covered by C&amp;ESAR 2022. Exact definitions
of Zero Trust vary, but the NSA summarizes it to 4 main points [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ]: a) Coordinated and
aggressive system monitoring, system management, and defensive operations capabilities;
b) Assuming all requests for critical resources and all network trafic may be malicious;
c) Assuming all devices and infrastructure may be compromised; d) Accepting that all
access approvals to critical resources incur risk, and being prepared to perform rapid
damage assessment, control, and recovery operations. In the scope of this Zero Trust
definition, C&amp;ESAR 2022 focuses on points b and c in a highly decentralized setting:
at a fine granularity level, how to gain trust in requests for resources, network trafic,
devices, and infrastructure? Implied by this question, but not equivalent, is the problem
of authentication which is one of the main concerns for Zero Trust [
        <xref ref-type="bibr" rid="ref14 ref5 ref6">5, 14, 6</xref>
        ], as well as in
general [
        <xref ref-type="bibr" rid="ref15 ref8">15, 8</xref>
        ].
      </p>
      <p>Though useful to address some of the problems related to trust in a decentralized
system, some of the issues covered by C&amp;ESAR 2022 may or may not be included in
Zero Trust depending on the definition used.</p>
      <p>Related to Zero Trust are the problem of transitive trust and trust propagation. For
example, in the setting of a developer in a controlled enclave that pushes code to a version
control SaaS, that pushes this code to a Continuous Integration / Continuous Deployment
(CI/CD) SaaS of another provider, that pushes the resulting “binaries” to a web server
SaaS of yet another provider, what are the potential solutions for the developer to trust
(control and audit) SaaS not to abuse their privileges to push something diferent on your
behalf? What are the potential solutions for the SaaS providers to trust other providers
to faithfully act on behalf of the developer, including and beyond signature preserving
versioning and compilation? More generally, how to trust a previously unknown or
unvetted entity starting to interact with your system? How to rely on the trust of others
to trust an interaction?</p>
      <p>On a diferent subject, trust evaluation requires (meta)data. In a highly geographically
decentralized system that may move payloads between enclaves, how to ensure the
dissemination and synchronization of this (meta)data in a secured way compatible
with the timing constraints of the system and the laws applicable to the owner of the
(meta)data, the owner of the payload, and the location where the executing enclave
resides?</p>
    </sec>
    <sec id="sec-3">
      <title>3. Solicited Papers</title>
      <p>In this context, C&amp;ESAR solicited submissions presenting clear surveys, innovative
solutions, or insightful experience reports on the subject “Ensuring Trust in a
Decentralized World”.</p>
      <p>The scope covered:
• all steps of cybersecurity, from system design to operational cyberdefense or
pentesting, including DevSecOps loops and disposal/retirement of equipment and
systems;
• all types of systems as long as they have a decentralized architecture (every type of
decentralized information system, IoT, extended enterprise networks, …) ;
• all types of trust, control, and audit-related technologies and methodologies (as
long as a focus on the decentralized setting is made).</p>
      <p>The topics included (without being limited to them and applied in a decentralized
world setting) those mentioned above and below:
• the trust-related keywords in the first and second areas of Wavestone’s Global CISO</p>
      <p>Radar;
• Zero Trust concepts related to trust inference and evaluation;
• identity, authentication, and access management;
• usage of blockchain technologies for trust, control, and audit (but not blockchain
technologies for their own sake);
• methods and techniques to improve trust in the supply chain (but not supply chain
attack reports);
• technical and legal issues related to handling and exploitation of control and audit
data in the Edge Computing and Tactile Internet settings ;
• …</p>
      <p>The topic also covered all the following keywords applied in a decentralized context:
Zero Trust [ Network [Access] | Architecture | Security Model ] (ZT…), Trust Algorithm
(TA), Continuous Adaptive Risk and Trust Assessment (CARTA), Identity and Access
Management (IAM), Identity, Credential, and Access Management (ICAM), Password,
Passwordless Authentication, Multi-Factor Authentication (MFA), Single Sign-On (SSO),
Trusted Platform Module (TPM), Access Policy Manager (APM), Identity Aware Proxy
(IAP), Policy Decision Point (PDP), Policy Enforcement Point (PEP), Continuous
Diagnostics and Mitigation (CDM), Identity Governance Program (IGP), Secure Access
Service Edge (SASE), Work-from-Home, Hybrid Multi-Cloud, Edge Computing, “Tactile
Internet”, IoT, Cybersecurity Mesh Architecture.</p>
    </sec>
    <sec id="sec-4">
      <title>4. Review Process</title>
      <p>C&amp;ESAR received 16 submissions. Among those, 12 proposals have been selected for
the final round of reviews (75% pre-selection rate). Out of those pre-selected proposals,
9 final versions were submitted; out of which, 8 have been selected for presentation at
the conference (a 89% acceptation rate for the final round of reviews, and a 50% overall
acceptation rate for the conference). Finally, 7 of the presented papers have been selected
for inclusion in the proceedings (an overall acceptation rate of 44% for the proceedings).</p>
    </sec>
    <sec id="sec-5">
      <title>5. Program Committee</title>
      <p>This peer review has been made possible thanks to the dedication of the members of the
following program committee:
• Guillaume Meier, Airbus R&amp;D
• Laurence Ogor, DGA MI
• Marc-Oliver Pahl, IMT Atlantique &amp; Chaire Cyber CNI
• Yves-Alexis Perez, ANSSI
• Ludovic Pietre-Cambacedes, EDF
• Olivier Poupel, DGA MI
• Louis Rilling, DGA MI
• Franck Rousset, DGNum
• Eric Wiatrowski</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>ANSSI</given-names>
            ,
            <surname>Système d'Information Hybride</surname>
          </string-name>
          et Sécurité : un Retour à la Réalité, Note Blanche,
          <string-name>
            <surname>ANSSI</surname>
          </string-name>
          ,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>F.</given-names>
            <surname>Pouchet</surname>
          </string-name>
          , G. Billois,
          <article-title>What is the next generation cybersecurity model?</article-title>
          , Insights, Wavestone,
          <year>2017</year>
          . URL: https://www.wavestone.com/en/insight/ next
          <article-title>-generation-cybersecurity-model/.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>S.</given-names>
            <surname>Viou</surname>
          </string-name>
          ,
          <article-title>Zero Trust Network : faut-il (vraiment) n'avoir confiance en rien ?, Paroles d'experts</article-title>
          , StromShield,
          <year>2021</year>
          . URL: https://www.stormshield.com/fr/actus/ zero
          <article-title>-trust-network-access-avoir-confiance-en-rien/.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4] OpinionWay, Baromètre de la cyber
          <article-title>-sécurité des entreprises</article-title>
          ,
          <string-name>
            <surname>Rapport</surname>
            <given-names>CESIN</given-names>
          </string-name>
          , OpinionWay,
          <year>2021</year>
          . URL: https://www.cesin.fr/ fonds-documentaire
          <string-name>
            <surname>-</surname>
          </string-name>
          6eme
          <article-title>-edition-du-barometre-annuel-du-cesin.html, sponsored by CESIN</article-title>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>NIST</surname>
          </string-name>
          , Zero Trust Architecture,
          <source>Special Publication 800-207</source>
          , NIST,
          <year>2020</year>
          . URL: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.
          <volume>800</volume>
          -
          <fpage>207</fpage>
          .pdf.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>ANSSI</surname>
          </string-name>
          ,
          <article-title>Le modèle Zero Trust, Avis scientifique et technique</article-title>
          , ANSSI,
          <year>2021</year>
          . URL: https://www.ssi.gouv.fr/agence/publication/le-modele
          <string-name>
            <surname>-</surname>
          </string-name>
          zero-trust/.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>B.</given-names>
            <surname>Osborn</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>McWilliams</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Beyer</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Saltonstall</surname>
          </string-name>
          , Beyondcorp: Design to deployment at google, ;login:
          <volume>41</volume>
          (
          <year>2016</year>
          )
          <fpage>28</fpage>
          -
          <lpage>34</lpage>
          . URL: https://www.usenix.org/ publications/login/spring2016/osborn.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname />
            <given-names>DoD</given-names>
            , DoD Digital Modernization Strategy: DoD Information Resource Management Strategic Plan FY
          </string-name>
          19-
          <issue>23</issue>
          ,
          <string-name>
            <surname>Technical</surname>
            <given-names>Report</given-names>
          </string-name>
          , Department of Defense,
          <year>2019</year>
          . URL: https://media.defense.gov/2019/Jul/12/2002156622/-1/-1/1/
          <string-name>
            <surname>DOD-DIGITAL-MODERNIZATION-</surname>
          </string-name>
          STRATEGY-
          <year>2019</year>
          .pdf.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>DOT&amp;E</surname>
          </string-name>
          , FY 2020
          <string-name>
            <given-names>Annual</given-names>
            <surname>Report</surname>
          </string-name>
          ,
          <source>Technical Report</source>
          , Director,
          <string-name>
            <given-names>Operational</given-names>
            <surname>Test</surname>
          </string-name>
          and
          <string-name>
            <surname>Evaluation (DOT&amp;E)</surname>
          </string-name>
          ,
          <year>2021</year>
          . URL: https://www.dote.osd.mil/Portals/97/pub/ reports/FY2020/other/2020DOTEAnnualReport.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>NSA</surname>
          </string-name>
          ,
          <article-title>Embracing a Zero Trust Security Model</article-title>
          , Cybersecurity Information U/OO/115131-
          <fpage>21</fpage>
          , NSA,
          <year>2021</year>
          . URL: https://media.defense.gov/2021/Feb/ 25/2002588479/-1/-1/0/CSI_EMBRACING_ZT_SECURITY_MODEL_
          <fpage>UOO115131</fpage>
          -
          <lpage>21</lpage>
          .pdf.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Jericho</surname>
            <given-names>Forum</given-names>
          </string-name>
          , Jericho Forum™ Commandments,
          <source>Technical Report</source>
          , Open Group,
          <year>2007</year>
          . URL: https://collaboration.opengroup.
          <source>org/jericho/commandments_v1.2.pdf, version 1</source>
          .2.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>J. H.</given-names>
            <surname>Saltzer</surname>
          </string-name>
          ,
          <article-title>Protection and the Control of Information Sharing in Multics, Commun</article-title>
          . ACM
          <volume>17</volume>
          (
          <year>1974</year>
          )
          <fpage>388</fpage>
          -
          <lpage>402</lpage>
          . URL: https://doi.org/10.1145/361011.361067. doi:
          <volume>10</volume>
          .1145/ 361011.361067.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Wikipedia</surname>
            <given-names>contributors</given-names>
          </string-name>
          ,
          <source>Principle of least privilege - Wikipedia</source>
          , the free encyclopedia,
          <year>2021</year>
          . URL: https://en.wikipedia.org/w/index.php?title=Principle_of_least_ privilege&amp;oldid=1062355963, [Online; accessed 17-January-2022].
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>R.</given-names>
            <surname>Ward</surname>
          </string-name>
          ,
          <string-name>
            <given-names>B.</given-names>
            <surname>Beyer</surname>
          </string-name>
          ,
          <article-title>Beyondcorp: A new approach to enterprise security, ;login: 39 (</article-title>
          <year>2014</year>
          )
          <fpage>6</fpage>
          -
          <lpage>11</lpage>
          . URL: https://research.google/pubs/pub43231/.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>ECSO's Users</surname>
            <given-names>Committee</given-names>
          </string-name>
          ,
          <source>Survey Analysis Report: Chief Information Security Oficers' (CISO) Challenges &amp; Priorities, Technical Report, ??www.ecs-org.eu</source>
          ,
          <year>2021</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>