Charter of Trust

For a secure digital world. Cybersecurity is becoming the most important security topic of the future – particularly in the age of digitalization.  

Charter of Trust

The digital world is changing everything. Today, billions of devices are connected through the Internet of Things. While this creates great opportunities, it also harbors great risks. To make the digital world more secure, we have joined forces with the Charter of Trust. It is the beginning of a unique initiative by leading global companies – with a cooperation that is showing the first signs of success and has ambitious goals for the future. Stay updated on the global cybersecurity initiative by following our activities here.
Latest updates

Important milestones towards more cybersecurity

Videos

Trust as a benchmark

Digital transformation will only be successful if we succeed in ensuring the security of data and networked systems. Digitalization and cybersecurity are two sides of the same coin. Learn more in our Charter of Trust videos.
Principles

Cybersecurity concerns all of us

Cybersecurity is and has to be more than a seatbelt or an airbag here; it's a factor that's crucial to the success of the digital economy. People and organizations need to trust that their digital technologies are safe and secure; otherwise they won't embrace the digital transformation. That's why we are signing together a Charter of Trust bearing the principles that are fundamental to a secure digital world.

Anchor the responsibility for cybersecurity at the highest governmental and business levels by designating specific ministries and CISOs. Establish clear measures and targets as well as the right mindset throughout organizations – “It is everyone’s task”.
 

Companies – and if necessary – governments must establish risk-based rules that ensure adequate protection across all IoT layers with clearly defined and mandatory requirements. Ensure confidentiality, authenticity, integrity, and availability by setting baseline standards, such as

  • Identity and access management: Connected devices must have secure identities and safeguarding measures that only allow authorized users and devices to use them.
  • Encryption: Connected devices must ensure confidentiality for data storage and transmission purposes, wherever appropriate.
  • Continuous protection: Companies must offer updates, upgrades, and patches throughout a reasonable lifecycle for their products, systems, and services via a secure update mechanism.
     

Adopt the highest appropriate level of security and data protection and ensure that it is preconfigured into the design of products, functionalities, processes, technologies, operations, architectures, and business models.
 

Serve as a trusted partner throughout a reasonable lifecycle, providing products, systems, and services as well as guidance based on the customer’s cybersecurity needs, impacts, and risks.

Combine domain know-how and deepen a joint understanding between firms and policymakers of cybersecurity requirements and rules in order to continuously innovate and adapt cybersecurity measures to new threats; drive and encourage i.a. contractual Public Private Partnerships.
 

Include dedicated cybersecurity courses in school curricula – as degree courses in universities, professional education, and trainings – in order to lead the transformation of skills and job profiles needed for the future.
 

Companies – and if necessary – governments establish mandatory independent third-party certifications (based on future-proof definitions, where life and limb is at risk in particular) for critical infrastructure as well as critical IoT solutions.
 

Participate in an industrial cybersecurity network in order to share new insights, information on incidents et al.; report incidents beyond today’s practice which is focusing on critical infrastucture.
 

Promote multilateral collaborations in regulation and standardization to set a level playing field matching the global reach of WTO; inclusion of rules for cybersecurity into Free Trade Agreements (FTAs).

Drive joint initiatives including all relevant stakeholders in order to implement the above principles in the various parts of the digital world without undue delay.

Partners

Together we will shape Cybersecurity

In order to keep pace with continuous advances in the market as well as threats from the criminal world, businesses and governments need to coordinate their actions in a targeted manner. We are therefore joining together to protect our democratic and economic values against cyber and hybrid threats. In this charter, the signing partners outline the key principles we consider essential for establishing a new charter of trust between society, politics, business partners, and customers.