Skip to main content

The Evolution of German Cybersecurity Strategy

  • Chapter
  • First Online:
Cybersecurity in Germany

Part of the book series: SpringerBriefs in Cybersecurity ((BRIEFSCYBER))

Abstract

This chapter traces the evolution of German cybersecurity strategy throughout the past two and a half decades. During this period, the German approach to cybersecurity strategy has developed from a civilian preventive one to a more comprehensive one, which today includes strategic military aspects. In following, this chapter illustrates the development of cybersecurity strategy in three phases. The first phase (1991 to 2011) marks the emergence of cybersecurity as a strategic issue in the context of critical information infrastructure protection. In the second phase (2011 to 2016), the government consolidated existing policies after adopting its first national cybersecurity strategy in 2011. The Snowden revelations in 2013 lifted cybersecurity sharply up the political agenda. In the third phase, from 2016 to early 2018, Germany adopted its second national cybersecurity strategy that outlines a comprehensive approach to cybersecurity, as well as a national defence strategy, which for the first time emphasised the strategic military dimension of cybersecurity within a hybrid warfare context. In 2017 and 2018, intensified discussions about the offensive aspects of government hacking indicated a further turn in toward a more expansive cybersecurity policy.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 44.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 59.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The abbreviation KRITIS is an official abbreviation for “kritische Infrastrukturen” meaning “critical infrastructures”.

  2. 2.

    A late draft version (7.95) of the report leaked and is accessible online via (Kurzbericht der Ressortarbeitsgruppe KRITIS - Entwurfsversion and Dec 1999).

References

  • BSI-Errichtungsgesetz vom 17. Dezember 1990 (BGBl. I S. 2834), zuletzt geändert durch Artikel 11 der Verordnung vom 25. November 2003 (BGBl. I S. 2304) (1990)

    Google Scholar 

  • Bendiek A (2013) Kritische Infrastrukturen, Cybersicherheit, Datenschutz. Die EU schlägt Pflöcke für digitale Standortpolitik ein. Stiftung für Wissenschaft und Politik, Berlin

    Google Scholar 

  • Bitkom e.V (2015) Digitale Souveränität - Positionsbestimmung und erste Handlungsempfehlungen für Deutschland und Europa, Berlin

    Google Scholar 

  • Brunner EM, Suter M (2008) International CIIP handbook 2008/2009. Center for Security Studies Zurich, Zurich

    Google Scholar 

  • BND-Gesetz (2016) Gesetz zur Ausland-Ausland-Fernmeldeaufklärung des Bundesnachrichtendienstes vom 30 Dec 2016, Bundesgesetzblatt Teil I, p. 3346

    Google Scholar 

  • Bundesministerium des Innern (2005a) Nationaler Plan zum Schutz der Informationsinfrastrukturen (NPSI), Berlin

    Google Scholar 

  • Bundesministerium des Innern (2005b) Schutz Kritsicher Infrastrukturen - Basisschutzkonzept, Berlin

    Google Scholar 

  • Bundesministerium des Innern (2011) Cyber-Sicherheitsstrategie für Deutschland, Berlin

    Google Scholar 

  • Bundesministerium des Innern (2016) Cyber-Sicherheitsstrategie für Deutschland, Berlin

    Google Scholar 

  • Bundesregierung (2014) Digitale Agenda für Deutschland

    Google Scholar 

  • Bäcker M (2014) Erhebung, Bevorratung und Übermittlung von Telekommunikationsdaten durch die Nachrichtendienste des Bundes. Stellungnahme zur Anhörung des NSA-Untersuchungsausschusses

    Google Scholar 

  • CDU/CSU and SPD (2018) Ein neuer Aufbruch für Europa. Eine neue Dynamik für Deutschland. Ein neuer Zusammenhalt für unser Land. Koalitionsvertrag zwischen CDU/CSU und SPD, 19. Legislaturperiode, Berlin

    Google Scholar 

  • COM (2006) 786 final—Communication from the Commission on a European Programme for Critical Infrastructure Protection. Commission of the European Communities, Brussels

    Google Scholar 

  • Cavelty MD (2014) Cybersecurity in Switzerland. Springer, Heidelberg and Berlin

    Book  Google Scholar 

  • Cavelty MD, Suter M (2012) The art of CIIP strategy: Tacking stock of content and processes. Critical Information Infrastructure Protection, Berlin, Heidelberg, Springer-Verlag, pp 15-38

    Google Scholar 

  • Deutscher Bundestag (2017) Abschlussbericht des 1. Untersuchungsausschusses (NSA) vom Juni 2017, Drucksache 18/12850, Berlin

    Google Scholar 

  • Eckert C (2013) Digitale Vision für Europa. FAZ.NET, 23 Nov 2013

    Google Scholar 

  • eGovernment Monitor 2017, Initiative D21, 2017

    Google Scholar 

  • Federal Government (2016) White paper on german security policy and the future of the Bundeswehr, Berlin

    Google Scholar 

  • Federal Ministry of the Interior (2009) National Strategy for Critical infrastructure Protection. Available: https://www.bmi.bund.de/SharedDocs/downloads/EN/publikationen/2009/kritis_englisch.html.  Accessed 20 Jun 2018

  • Hathaway M, Klimburg A (2012) “Preliminary Considerations: On National Cyber Security. In: National cyber security framework manual. NATO Cooperative Cyber Defence Centre of Excellence, Tallinn, pp 1–43

    Google Scholar 

  • Kingdon JW (2003) Agendas, alternatives, and public policies. Harper Collins College Publishers, New York

    Google Scholar 

  • Kullik J (2014) Vernetzte (Un-)Sicherheit? Eine politisch-rechtliche Analyse der deutschen Cybersicherheitspolitik. Kovač, Hamburg

    Google Scholar 

  • Kurzbericht der Ressortarbeitsgruppe KRITIS - Entwurfsversion 7.95, 03 Dec 1999. Available: http://userpage.fu-berlin.de/~bendrath/Kritis-12-1999.html. Accessed 20 Jun 2018

  • Lindstrom G, Luiijf E (2012) Political aims and policy methods. National cybersecurity framework manual. NATO CCDCOE, Tallinn, pp 44–65

    Google Scholar 

  • Luiijf E, Besseling K, de Graaf P (2013) Nineteen national cyber security strategies. Int J Crit Infrastruct Prot 9(1–2):3–31

    Article  Google Scholar 

  • Petermann T (2011) Was bei einem Blackout geschieht: Folgen eines langandauernden und großflächigen Stromausfalls, edition sigma

    Chapter  Google Scholar 

  • President’s Commission on Critical Infrastructure Protection (1997) Critical foundations. Protecting America’s infrastructures. US Government Printing Office, Washington DC

    Google Scholar 

  • Rosenbach M, Stark H (2014) Der NSA-Komplex. Edward Snowden und der Weg in die totale Überwachung, DVA, München

    Google Scholar 

  • Schallbruch M (2017) IT-Sicherheit: Bundestag verabschiedet NIS-Umsetzungsgesetz, 14 May 2017. Available: https://www.cr-online.de/blog/2017/05/14/it-sicherheit-bundestag-verabschiedet-nis-umsetzungsgesetz/. Accessed 20 Jun 2018

  • Schuetze J (2018) Warum dem Staat IT-Sicherheitsexpert:innen fehlen. Stiftung Neue Verantwortung, Berlin

    Google Scholar 

  • Schulze T (2006) Bedingt abwehrbereit. Schutz kritischer Informations-Infrastrukturen in Deutschland und den USA. VS Verlag, Wiesbaden

    Google Scholar 

  • Wetzling T (2016) The key to intelligence reform in Germany: strengthening the G 10-commission’s role to authorise strategic surveillance. Stiftung Neue Verantwortung, Berlin

    Google Scholar 

  • Zedler D (2016) Zur strategischen Planung von Cyber Security in Deutschland. Universität zu Köln, Köln, Lehrstuhl Internationale Politik

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Martin Schallbruch .

Rights and permissions

Reprints and permissions

Copyright information

© 2018 The Author(s)

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Schallbruch, M., Skierka, I. (2018). The Evolution of German Cybersecurity Strategy. In: Cybersecurity in Germany. SpringerBriefs in Cybersecurity. Springer, Cham. https://doi.org/10.1007/978-3-319-90014-8_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-90014-8_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-90013-1

  • Online ISBN: 978-3-319-90014-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics