EN ISO 19650-5:2020
(Main)Organization and digitization of information about buildings and civil engineering works, including building information modelling (BIM) - Information management using building information modelling - Part 5: Security-minded approach to information management (ISO 19650-5:2020)
Organization and digitization of information about buildings and civil engineering works, including building information modelling (BIM) - Information management using building information modelling - Part 5: Security-minded approach to information management (ISO 19650-5:2020)
This document specifies the principles and requirements for security-minded information management at a stage of maturity described as "building information modelling (BIM) according to the ISO 19650 series", and as defined in ISO 19650-1, as well as the security-minded management of sensitive information that is obtained, created, processed and stored as part of, or in relation to, any other initiative, project, asset, product or service.
It addresses the steps required to create and cultivate an appropriate and proportionate security mindset and culture across organizations with access to sensitive information, including the need to monitor and audit compliance.
The approach outlined is applicable throughout the lifecycle of an initiative, project, asset, product or service, whether planned or existing, where sensitive information is obtained, created, processed and/or stored.
This document is intended for use by any organization involved in the use of information management and technologies in the creation, design, construction, manufacture, operation, management, modification, improvement, demolition and/or recycling of assets or products, as well as the provision of services, within the built environment. It will also be of interest and relevance to those organizations wishing to protect their commercial information, personal information and intellectual property.
Organisation und Digitalisierung von Informationen zu Bauwerken und Ingenieurleistungen, einschließlich Bauwerksinformationsmodellierung (BIM) - Informationsmanagement mit BIM - Teil 5: Sicherheitsbewusster Ansatz für das Informationsmanagement (ISO 19650-5:2020)
1 Anwendungsbereich
Dieses Dokument legt die Grundsätze und Anforderungen eines ausgereiften sicherheitsbewussten Informationsmanagements fest, das als „Bauwerksinformationsmodellierung (BIM) nach der Normenreihe ISO 19650“, und wie in ISO 19650 1 festgelegt, beschrieben werden kann, und behandelt das sicherheitsbewusste Management von sensiblen Informationen, die als Teil von oder im Zusammenhang mit einer Initiative, einem Projekt, einem Asset, einem Produkt oder einer Dienstleistung erhalten, erstellt, verarbeitet und gespeichert werden.
Es adressiert die Schritte, die erforderlich sind, um ein angemessenes und verhältnismäßiges Sicherheitsbewusstsein und eine entsprechende Sicherheitskultur für Organisationen zu schaffen und zu erhalten, die Zugriff auf sensible Informationen haben, einschließlich der Notwendigkeit, die Einhaltung der Sicherheitsanforderungen zu überwachen und zu prüfen.
Der beschriebene Ansatz kann über den gesamten Lebenszyklus einer Initiative, eines Projekts, eines Assets, eines Produkts oder einer Dienstleistung, egal ob in Planung oder bereits vorhanden, angewendet werden, in dem/der sensible Informationen erhalten, erstellt, verarbeitet und/oder gespeichert werden.
Dieses Dokument ist zur Anwendung durch jede Organisation vorgesehen, die beteiligt ist an der Anwendung des Informationsmanagements und an Technologien bei der Bedarfsfeststellung, der Planung, der Bauausführung, der Herstellung, des Betriebs, des Managements, der Modifizierung, der Verbesserung, dem Rückbau und/oder dem Recycling von Assets oder Produkten sowie an der Bereitstellung von Dienstleistungen in der gebauten Umwelt. Sie wird auch für Organisationen interessant sein, die ihre Geschäftsinformationen, ihre persönlichen Informationen und ihr geistiges Eigentum schützen möchten.
Organisation et numérisation des informations relatives aux bâtiments et ouvrages de génie civil, y compris modélisation des informations de la construction (BIM) - Gestion de l’information par la modélisation des informations de la construction - Partie 5: Approche de la gestion de l’information axée sur la sécurité (ISO 19650-5:2020)
Le présent document spécifie les principes et les exigences relatifs à la gestion de l'information axée sur la sécurité à un stade de maturité décrit comme la « modélisation des informations de la construction (BIM) selon la série ISO 19650 », et comme défini dans l'ISO 19650-1, ainsi qu'à la gestion axée sur la sécurité des informations sensibles qui sont obtenues, créées, traitées et stockées dans le cadre de tout autre initiative, projet, actif, produit ou service, ou en relation avec ceux-ci.
Il traite des étapes requises pour créer et développer une culture et un état d'esprit de sécurité appropriés et proportionnés au sein des organismes ayant accès à des informations sensibles, y compris la nécessité de surveiller et de vérifier la conformité.
L'approche décrite est applicable pendant tout le cycle de vie d'une initiative, d'un projet, d'un actif, d'un produit ou d'un service, qu'il soit planifié ou existant, au cours duquel des informations sensibles sont obtenues, créées, traitées et/ou stockées.
Le présent document est destiné à être utilisé par tout organisme concerné par l'utilisation de technologies et de la gestion de l'information dans la création, la conception, la construction, la fabrication, l'exploitation, la gestion, la modification, l'amélioration, la démolition et/ou le recyclage d'actifs ou de produits, ainsi que la prestation de services, dans l'environnement bâti. Il sera également intéressant et pertinent pour les organismes qui souhaitent protéger leurs informations commerciales, leurs informations personnelles et leur propriété intellectuelle.
Organizacija in digitalizacija informacij v gradbeništvu - Upravljanje informacij z BIM - 5. del: Varnostni pristop k upravljanju informacij (ISO 19650-5:2020)
General Information
- Status
- Published
- Publication Date
- 30-Jun-2020
- Withdrawal Date
- 30-Jan-2021
- Technical Committee
- CEN/TC 442 - Building Information Modelling (BIM)
- Drafting Committee
- CEN/TC 442 - Building Information Modelling (BIM)
- Current Stage
- 6060 - Definitive text made available (DAV) - Publishing
- Start Date
- 01-Jul-2020
- Due Date
- 16-Jul-2020
- Completion Date
- 01-Jul-2020
Overview
EN ISO 19650-5:2020 (ISO 19650-5:2020) defines a security-minded approach to information management for building information modelling (BIM) and related digital information in the built environment. It specifies principles and requirements for protecting sensitive information-commercial, personal and intellectual property-created, processed or stored during the lifecycle of initiatives, projects, assets, products or services. The standard is applicable across design, construction, manufacture, operation, maintenance, modification, demolition and recycling activities where BIM and information management are used.
Key topics and requirements
- Sensitivity assessment and security triage: Establishing whether sensitive information exists and determining the need for a security-minded approach.
- Governance, accountability and roles: Defining organizational responsibilities for implementing and maintaining security-minded information management.
- Security strategy development: Assessing risks, defining mitigation measures, recording residual and tolerated risks, and periodic review.
- Security management plan: Operational rules for handling information, logistical security, third‑party information provision, monitoring and auditing compliance.
- Breach and incident management: Procedures for detection, containment, recovery and post-incident review.
- Working with appointed parties: Managing security obligations throughout appointments, including measures in contracts and end-of-appointment actions.
- Supporting guidance: Informative annexes on security context, types of personnel/physical/technical controls, third‑party assessments and information sharing agreements.
Practical applications
- Implementing proportionate security controls within BIM workflows and Common Data Environments (CDE).
- Performing sensitivity assessments early in project initiation to decide security requirements.
- Embedding security clauses and responsibility matrices in appointment documents and contracts.
- Developing incident response plans for breaches involving digital asset data or personally identifiable information.
- Auditing and monitoring compliance across project partners to sustain a security-minded culture.
Who should use this standard
- Project owners, asset operators and facility managers in the built environment.
- Designers, contractors, manufacturers and digital delivery teams using BIM.
- Information security managers, compliance officers and procurement teams responsible for protecting commercial and personal data.
- Organizations aiming to integrate information security into BIM-based collaboration and lifecycle asset management.
Related standards
- ISO 19650 series (information management using BIM) - see ISO 19650-1 for definitions and context used by ISO 19650-5.
Keywords: EN ISO 19650-5:2020, ISO 19650-5, BIM security, security-minded information management, sensitivity assessment, security management plan, information sharing agreements.
Frequently Asked Questions
EN ISO 19650-5:2020 is a standard published by the European Committee for Standardization (CEN). Its full title is "Organization and digitization of information about buildings and civil engineering works, including building information modelling (BIM) - Information management using building information modelling - Part 5: Security-minded approach to information management (ISO 19650-5:2020)". This standard covers: This document specifies the principles and requirements for security-minded information management at a stage of maturity described as "building information modelling (BIM) according to the ISO 19650 series", and as defined in ISO 19650-1, as well as the security-minded management of sensitive information that is obtained, created, processed and stored as part of, or in relation to, any other initiative, project, asset, product or service. It addresses the steps required to create and cultivate an appropriate and proportionate security mindset and culture across organizations with access to sensitive information, including the need to monitor and audit compliance. The approach outlined is applicable throughout the lifecycle of an initiative, project, asset, product or service, whether planned or existing, where sensitive information is obtained, created, processed and/or stored. This document is intended for use by any organization involved in the use of information management and technologies in the creation, design, construction, manufacture, operation, management, modification, improvement, demolition and/or recycling of assets or products, as well as the provision of services, within the built environment. It will also be of interest and relevance to those organizations wishing to protect their commercial information, personal information and intellectual property.
This document specifies the principles and requirements for security-minded information management at a stage of maturity described as "building information modelling (BIM) according to the ISO 19650 series", and as defined in ISO 19650-1, as well as the security-minded management of sensitive information that is obtained, created, processed and stored as part of, or in relation to, any other initiative, project, asset, product or service. It addresses the steps required to create and cultivate an appropriate and proportionate security mindset and culture across organizations with access to sensitive information, including the need to monitor and audit compliance. The approach outlined is applicable throughout the lifecycle of an initiative, project, asset, product or service, whether planned or existing, where sensitive information is obtained, created, processed and/or stored. This document is intended for use by any organization involved in the use of information management and technologies in the creation, design, construction, manufacture, operation, management, modification, improvement, demolition and/or recycling of assets or products, as well as the provision of services, within the built environment. It will also be of interest and relevance to those organizations wishing to protect their commercial information, personal information and intellectual property.
EN ISO 19650-5:2020 is classified under the following ICS (International Classification for Standards) categories: 35.240.67 - IT applications in building and construction industry; 91.010.01 - Construction industry in general. The ICS classification helps identify the subject area and facilitates finding related standards.
You can purchase EN ISO 19650-5:2020 directly from iTeh Standards. The document is available in PDF format and is delivered instantly after payment. Add the standard to your cart and complete the secure checkout process. iTeh Standards is an authorized distributor of CEN standards.
Standards Content (Sample)
SLOVENSKI STANDARD
01-oktober-2020
Organizacija in digitalizacija informacij v gradbeništvu - Upravljanje informacij z
BIM - 5. del: Varnostni pristop k upravljanju informacij (ISO 19650-5:2020)
Organization and digitization of information about buildings and civil engineering works,
including building information modelling (BIM) - Information management using building
information modelling - Part 5: Security-minded approach to information management
(ISO 19650-5:2020)
Organisation von Daten zu Bauwerken - Informationsmanagement mit BIM - Teil 5:
Spezifikation für Sicherheitsbelange von BIM, der digitalisierten Bauwerke und smarten
Assetmanagement (ISO 19650-5:2020)
Organisation des informations concernant les ouvrages de construction -- Gestion de
l'information par la modélisation des informations de la construction (ISO 19650-5:2020)
Ta slovenski standard je istoveten z: EN ISO 19650-5:2020
ICS:
35.240.67 Uporabniške rešitve IT v IT applications in building
gradbeništvu and construction industry
91.010.01 Gradbeništvo na splošno Construction industry in
general
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.
EN ISO 19650-5
EUROPEAN STANDARD
NORME EUROPÉENNE
July 2020
EUROPÄISCHE NORM
ICS 35.240.67; 91.010.01
English Version
Organization and digitization of information about
buildings and civil engineering works, including building
information modelling (BIM) - Information management
using building information modelling - Part 5: Security-
minded approach to information management (ISO 19650-
5:2020)
Organisation et numérisation des informations Organisation von Daten zu Bauwerken -
relatives aux bâtiments et ouvrages de génie civil, y Informationsmanagement mit BIM - Teil 5:
compris modélisation des informations de la Spezifikation für Sicherheitsbelange von BIM, der
construction (BIM) - Gestion de l'information par la digitalisierten Bauwerke und des smarten
modélisation des informations de la construction - Assetmanagements (ISO 19650-5:2020)
Partie 5: Approche de la gestion de l'information axée
sur la sécurité (ISO 19650-5:2020)
This European Standard was approved by CEN on 15 June 2020.
CEN members are bound to comply with the CEN/CENELEC Internal Regulations which stipulate the conditions for giving this
European Standard the status of a national standard without any alteration. Up-to-date lists and bibliographical references
concerning such national standards may be obtained on application to the CEN-CENELEC Management Centre or to any CEN
member.
This European Standard exists in three official versions (English, French, German). A version in any other language made by
translation under the responsibility of a CEN member into its own language and notified to the CEN-CENELEC Management
Centre has the same status as the official versions.
CEN members are the national standards bodies of Austria, Belgium, Bulgaria, Croatia, Cyprus, Czech Republic, Denmark, Estonia,
Finland, France, Germany, Greece, Hungary, Iceland, Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway,
Poland, Portugal, Republic of North Macedonia, Romania, Serbia, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and
United Kingdom.
EUROPEAN COMMITTEE FOR STANDARDIZATION
COMITÉ EUROPÉEN DE NORMALISATION
EUROPÄISCHES KOMITEE FÜR NORMUNG
CEN-CENELEC Management Centre: Rue de la Science 23, B-1040 Brussels
© 2020 CEN All rights of exploitation in any form and by any means reserved Ref. No. EN ISO 19650-5:2020 E
worldwide for CEN national Members.
Contents Page
European foreword . 3
European foreword
This document (EN ISO 19650-5:2020) has been prepared by Technical Committee ISO/TC 59
"Buildings and civil engineering works" in collaboration with Technical Committee CEN/TC 442
“Building Information Modelling (BIM)” the secretariat of which is held by SN.
This European Standard shall be given the status of a national standard, either by publication of an
identical text or by endorsement, at the latest by January 2021, and conflicting national standards shall
be withdrawn at the latest by January 2021.
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. CEN shall not be held responsible for identifying any or all such patent rights.
According to the CEN-CENELEC Internal Regulations, the national standards organizations of the
following countries are bound to implement this European Standard: Austria, Belgium, Bulgaria,
Croatia, Cyprus, Czech Republic, Denmark, Estonia, Finland, France, Germany, Greece, Hungary, Iceland,
Ireland, Italy, Latvia, Lithuania, Luxembourg, Malta, Netherlands, Norway, Poland, Portugal, Republic of
North Macedonia, Romania, Serbia, Slovakia, Slovenia, Spain, Sweden, Switzerland, Turkey and the
United Kingdom.
Endorsement notice
The text of ISO 19650-5:2020 has been approved by CEN as EN ISO 19650-5:2020 without any
modification.
INTERNATIONAL ISO
STANDARD 19650-5
First edition
2020-06
Organization and digitization of
information about buildings and civil
engineering works, including building
information modelling (BIM) —
Information management using
building information modelling —
Part 5:
Security-minded approach to
information management
Organisation et numérisation des informations relatives aux
bâtiments et ouvrages de génie civil, y compris modélisation des
informations de la construction (BIM) — Gestion de l’information par
la modélisation des informations de la construction —
Partie 5: Approche de la gestion de l’information axée sur la sécurité
Reference number
ISO 19650-5:2020(E)
©
ISO 2020
ISO 19650-5:2020(E)
© ISO 2020
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting
on the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address
below or ISO’s member body in the country of the requester.
ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
ii © ISO 2020 – All rights reserved
ISO 19650-5:2020(E)
Contents Page
Foreword .v
Introduction .vi
1 Scope . 1
2 Normative references . 1
3 Terms and definitions . 1
4 Establishing the need for a security-minded approach using a sensitivity
assessment process . 3
4.1 Undertaking a sensitivity assessment process . 3
4.2 Understanding the range of security risks . 4
4.3 Identifying organizational sensitivities . 4
4.4 Establishing any third-party sensitivities . 5
4.5 Recording the outcome of the sensitivity assessment . 5
4.6 Reviewing the sensitivity assessment . 5
4.7 Determining whether a security-minded approach is required . 5
4.8 Recording the outcome of the application of the security triage process . 6
4.9 Security-minded approach required . 7
4.10 No security-minded approach required . 7
5 Initiating the security-minded approach . 7
5.1 Establishing governance, accountability and responsibility for the security-
minded approach . 7
5.2 Commencing the development of the security-minded approach . 8
6 Developing a security strategy . 9
6.1 General . 9
6.2 Assessing the security risks . 9
6.3 Developing security risk mitigation measures .10
6.4 Documenting residual and tolerated security risks .10
6.5 Review of the security strategy .11
7 Developing a security management plan .11
7.1 General .11
7.2 Provision of information to third parties .12
7.3 Logistical security.12
7.4 Managing accountability and responsibility for security .13
7.5 Monitoring and auditing .13
7.6 Review of the security management plan .13
8 Developing a security breach/incident management plan .14
8.1 General .14
8.2 Discovery of a security breach or incident .14
8.3 Containment and recovery .15
8.4 Review following a security breach or incident .15
9 Working with appointed parties .15
9.1 Working outside formal appointments .15
9.2 Measures contained in appointment documentation .16
9.3 Post appointment award .17
9.4 End of appointment .17
Annex A (informative) Information on the security context.18
Annex B (informative) Information on types of personnel, physical, and technical security
controls and management of information security .20
Annex C (informative) Assessments relating to the provision of information to third parties .24
Annex D (informative) Information sharing agreements .26
ISO 19650-5:2020(E)
Bibliography .28
iv © ISO 2020 – All rights reserved
ISO 19650-5:2020(E)
Foreword
ISO (the International Organization for Standardization) is a worldwide federation of national standards
bodies (ISO member bodies). The work of preparing International Standards is normally carried out
through ISO technical committees. Each member body interested in a subject for which a technical
committee has been established has the right to be represented on that committee. International
organizations, governmental and non-governmental, in liaison with ISO, also take part in the work.
ISO collaborates closely with the International Electrotechnical Commission (IEC) on all matters of
electrotechnical standardization.
The procedures used to develop this document and those intended for its further maintenance are
described in the ISO/IEC Directives, Part 1. In particular, the different approval criteria needed for the
different types of ISO documents should be noted. This document was drafted in accordance with the
editorial rules of the ISO/IEC Directives, Part 2 (see www .iso .org/ directives).
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. ISO shall not be held responsible for identifying any or all such patent rights. Details of
any patent rights identified during the development of the document will be in the Introduction and/or
on the ISO list of patent declarations received (see www .iso .org/ patents).
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and
expressions related to conformity assessment, as well as information about ISO's adherence to the
World Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT), see www .iso .org/
iso/ foreword .html.
This document was prepared by Technical Committee ISO/TC 59, Buildings and civil engineering works,
Subcommittee SC 13, Organization and digitization of information about buildings and civil engineering
works, including building information modelling (BIM), in collaboration with the European Committee
for Standardization (CEN) Technical Committee CEN/TC 442 Building Information Modelling (BIM), in
accordance with the Agreement on technical cooperation between ISO and CEN (Vienna Agreement).
A list of all parts in the ISO 19650 series can be found on the ISO website.
Any feedback or questions on this document should be directed to the user’s national standards body. A
complete listing of these bodies can be found at www .iso .org/ members .html.
ISO 19650-5:2020(E)
Introduction
The built environment is experiencing a period of rapid evolution. It is anticipated that the adoption
of building information modelling (BIM) and the increasing use of digital technologies in the design,
construction, manufacture, operation and management of assets or products, as well as the provision
of services, within the built environment will have a transformative effect on the parties involved. It
is likely that to increase effectiveness and efficiency, initiatives or projects that are developing new
assets or solutions, or modifying or managing existing ones, must become more collaborative in nature.
Such collaboration requires more transparent, open ways of working, and, as much as possible, the
appropriate sharing and use of digital information.
The combined physical and digital built environment will need to deliver future fiscal, financial,
functional, sustainability and growth objectives. This will have an impact on procurement, delivery and
operational processes, including greater cross-discipline and sector collaboration. It will also lead to an
increased use of digital tools and availability of information. The use of computer-based technologies
is already supporting new ways of working, such as the development of off-site, factory-based
fabrication and on-site automation. Sophisticated cyber-physical systems, by using sensors (the cyber
or computation element) to control or influence physical parts of the system, are able to work in real-
time to influence outcomes in the real world. It is anticipated that such systems will be used to achieve
benefits such as increases in energy efficiency and better asset lifecycle management by capturing
real-time information about asset use and condition. They can already be found in transportation,
utilities, infrastructure, buildings, manufacturing, health care and defence, and when able to interact as
integrated cyber-physical environments, can be used in the development of smart communities.
As a consequence of this increasing use of, and dependence on, information and communications
technologies, there is a need to address inherent vulnerability issues, and therefore the security
implications that arise, whether for built environments, assets, products, services, individuals or
communities, as well as any associated information.
This document provides a framework to assist organizations in understanding the key vulnerability
issues and the nature of the controls required to manage the resultant security risks to a level that
is tolerable to the relevant parties. Its purpose is not in any way to undermine collaboration or the
benefits that BIM, other collaborative work methods and digital technologies can generate.
The term organization captures not only appointing parties and appointed parties, as defined in
ISO 19650-1, but also demand-side organizations who are not directly involved in an appointment.
Information security requirements for an individual organization, organizational department or
system are set out in ISO/IEC 27001 but cannot be applied across multiple organizations. BIM and other
digital collaborative work methods and technologies generally involve the collaborative sharing of
information across a broad range of independent organizations within the built environment sector.
Therefore, this document encourages the adoption of a security-minded, risk-based approach that can
be applied across, as well as within, organizations. The appropriate and proportionate nature of the
approach also has the benefit that measures should not prohibit the involvement of small and medium-
sized enterprises in the delivery team.
The security-minded approach can be applied throughout the lifecycle of an initiative, project, asset,
product or service, whether planned or existing, where sensitive information is obtained, created,
processed and/or stored.
Figure 1 shows the integration of this security-minded approach with other organizational strategies,
policies, plans and information requirements for the digitally-enabled delivery of projects, and the
maintenance and operation of assets, using BIM.
vi © ISO 2020 – All rights reserved
ISO 19650-5:2020(E)
Key
A coordinated and consistent strategies and policies
B coordinated and consistent plans
C coordinated and consistent information requirements
D activities undertaken during the operational phase of assets
E activities undertaken during the delivery phase of the asset (see also ISO 19650-2)
1 organizational plans and objectives
2 strategic asset management plan/policy (see ISO 55000)
3 security strategy
4 other organizational strategies and policy
5 asset management plan (see ISO 55000)
6 security management plan
7 other organizational plans
8 asset information requirements (AIR)
9 security information requirements (which form part of the security management plan)
10 organizational information requirements (OIR)
11 strategic business case and strategic brief
12 asset operational use
13 performance measurement and improvement actions
NOTE No order is implied by the numbering in A, B and C.
Figure 1 — The integration of the security-minded approach within the wider BIM process
NOTE Refer to ISO 19650-1 for concepts and principles including OIR and AIR to assist further understanding
of security-mindedness within the context of the ISO 19650 series.
The process for deciding on the need for and, where appropriate, implementing a security-minded
approach in relation information management is summarised in Figure 2.
ISO 19650-5:2020(E)
Key
A initiate a security-minded approach
B develop a security strategy
C develop a security management plan
Y yes
N no
1 determine, using the security triage process whether a security-minded approach is required
2 establish governance, accountability and responsibility arrangements for the security-minded approach
3 commence development of the security-minded approach
4 assess the security risks
5 develop security mitigation measures
6 document tolerated security risks
7 develop policies and processes to implement the security mitigation measures
8 develop security information requirements
9 develop requirements relating to provision of information to third parties
10 develop logistical security requirements
11 develop a security breach/incident management plan
12 work with appointed parties in and out of formal contracts to embed the security-minded approach,
including the development of information sharing agreements where necessary
13 monitor, audit and review
14 protect any sensitive commercial and personal information (no other security-minded approach required)
15 review if there is change in the initiative, project, asset, product or service which may impact on its sensitivity
Figure 2 — The process for implementing the security-minded approach set out in this
document
viii © ISO 2020 – All rights reserved
ISO 19650-5:2020(E)
Implementation of the measures outlined in this document will assist in reducing the risk of the loss,
misuse or modification of sensitive information that can impact on the safety, security and resilience
of assets, products, the built environment, or the services provided by, from or through them. It will
also assist in protecting against the loss, theft or disclosure of commercial information, personal
information and intellectual property. Any such incidents can lead to significant reputational damage,
impacting through lost opportunities and the diversion of resources to handle investigation, resolution
and media activities, in addition to the disruption of, and delay to, day-to-day operational activities.
Further, where incidents do occur and information has been made publicly available, it is virtually
impossible to recover all of that information or to prevent ongoing distribution.
INTERNATIONAL STANDARD ISO 19650-5:2020(E)
Organization and digitization of information about
buildings and civil engineering works, including building
information modelling (BIM) — Information management
using building information modelling —
Part 5:
Security-minded approach to information management
1 Scope
This document specifies the principles and requirements for security-minded information management
at a stage of maturity described as “building information modelling (BIM) according to the ISO 19650
series”, and as defined in ISO 19650-1, as well as the security-minded management of sensitive
information that is obtained, created, processed and stored as part of, or in relation to, any other
initiative, project, asset, product or service.
It addresses the steps required to create and cultivate an appropriate and proportionate security
mindset and culture across organizations with access to sensitive information, including the need to
monitor and audit compliance.
The approach outlined is applicable throughout the lifecycle of an initiative, project, asset, product or
service, whether planned or existing, where sensitive information is obtained, created, processed and/
or stored.
This document is intended for use by any organization involved in the use of information management
and technologies in the creation, design, construction, manufacture, operation, management,
modification, improvement, demolition and/or recycling of assets or products, as well as the provision
of services, within the built environment. It will also be of interest and relevance to those organizations
wishing to protect their commercial information, personal information and intellectual property.
2 Normative references
The following documents are referred to in the text in such a way that some or all of their content
constitutes requirements of this document. For dated references, only the edition cited applies. For
undated references, the latest edition of the referenced document (including any amendments) applies.
ISO 19650-2, Organization and digitization of information about buildings and civil engineering works,
including building information modelling (BIM) — Information management using building information
modelling — Part 2: Delivery phase of the assets
1)
ISO 19650-3 , Organization and digitization of information about buildings and civil engineering works,
including building information modelling (BIM) — Information management using building information
modelling — Part 3: Operational phase of assets
3 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
1) Under preparation. Stage at the time of publication: ISO/FDIS 19650-3:2020.
ISO 19650-5:2020(E)
ISO and IEC maintain terminological databases for use in standardization at the following addresses:
— ISO Online browsing platform: available at https:// www .iso .org/ obp
— IEC Electropedia: available at http:// www .electropedia .org/
3.1
asset
item, thing or entity that has potential or actual value to an organization
Note 1 to entry: An asset can be fixed, mobile or movable. It can be an individual item of plant, a vehicle, a system
of connected equipment, a space within a structure, a piece of land, an entire piece of infrastructure, an entire
building, or a portfolio of assets including associated land or water. It can also comprise information in digital or
in printed form.
Note 2 to entry: The value of an asset can vary throughout its life and an asset can still have value at the end of its
life. Value can be tangible, intangible, financial or non-financial.
[SOURCE: ISO 55000:2014, 3.2.1, modified — The original notes 1, 2 and 3 to entry have been removed;
new notes 1 and 2 to entry have been added.]
3.2
crowded place
location or environment to which members of the public have access that can be considered more at
risk from a terrorist attack by virtue of its crowd density or the nature of the site
Note 1 to entry: Crowded places can include: sports stadia, arenas, festivals and music venues; hotels and
restaurants; pubs, clubs, bars and casinos; high streets, shopping centres and markets; visitor attractions;
cinemas and theatres; schools and universities; hospitals and places of worship; commercial centres; and
transport hubs. They can also include events and public realm spaces such as parks and squares.
Note 2 to entry: A crowded place will not necessarily be crowded at all times — crowd densities can vary and can
be temporary, as in the case of sporting events or open-air festivals.
3.3
metadata
data about data
3.4
need-to-know
legitimate requirement of a prospective recipient of information to know, to access, or to possess
sensitive information (3.11)
3.5
risk appetite
amount and type of risk that an organization is willing to pursue or retain
[SOURCE: ISO 22300:2018, 3.202]
3.6
safety
state of relative freedom from threat (3.13) or harm caused by random, unintentional acts or events
3.7
security
state of relative freedom from threat (3.13) or harm caused by deliberate, unwanted, hostile or
malicious acts
3.8
security breach
infraction or violation of security (3.7)
[SOURCE: ISO 14298:2013, 3.30]
2 © ISO 2020 – All rights reserved
ISO 19650-5:2020(E)
3.9
security incident
suspicious act or circumstance threatening security (3.7)
3.10
security-minded
understanding and routinely applying appropriate and proportionate security (3.7) measures in any
business situation so as to deter and/or disrupt hostile, malicious, fraudulent and criminal behaviours
or activities
3.11
sensitive information
information, the loss, misuse or modification of which, or unauthorized access to, can:
— adversely affect the privacy, security (3.7) or safety (3.6) of an individual or individuals;
— compromise intellectual property or trade secrets of an organization;
— cause commercial or economic harm to an organization or country; and/or
— jeopardize the security, internal and foreign affairs of a nation
3.12
residual risk
risk that remains after controls have been implemented
[SOURCE: ISO 16530-1:2017, 3.52]
3.13
threat
potential cause of an incident which may result in harm
3.14
top management
person or group of people who directs and controls an organization at the highest level
Note 1 to entry: Top management has the power to delegate authority and provide resources within the
organization.
Note 2 to entry: In the context of this document, management should be regarded as the function, not the activity.
[SOURCE: ISO 9000:2015, 3.1.1, modified — The original notes 2 and 3 to entry have been removed;
new note 2 entry has been added.]
3.15
vulnerability
weakness that can be exploited to cause harm
4 Establishing the need for a security-minded approach using a sensitivity
assessment process
4.1 Undertaking a sensitivity assessment process
The process for undertaking a sensitivity assessment is set out in 4.2 to 4.4.
ISO 19650-5:2020(E)
4.2 Understanding the range of security risks
4.2.1 The top management of an organization involved in:
a) initiating a project to develop a new asset(s), product(s) or service(s) or modify/enhance an
existing one;
b) managing, operating, re-purposing or disposing of an asset(s); and/or
c) the provision of an asset-based service(s),
shall determine the range of security risks that arise through greater availability of information,
integration of services and systems, and the increased dependency on technology-based systems.
4.2.2 Information on the types of security risks that should be considered are contained in Annex A.
4.2.3 Where two or more organizations are involved, the top management of each organisation shall
follow 4.2.1 in a coordinated manner.
NOTE Such an arrangement of multiple organizations can occur in a city/community, a large, multi-purpose
development or in the provision of a transport system.
4.3 Identifying organizational sensitivities
4.3.1 Taking into consideration the range of security risks that exist, the organization(s) cited in 4.2.1
and 4.2.3 shall determine whether an initiative, project, asset, product or service, as well as any associated
information, in whole or in part, and whether planned or existing, shall be considered sensitive.
NOTE Wherever the term "organization(s)" is used in the reminder of this document, it refers to the
organization(s) referred to in 4.2.1 and 4.2.3.
4.3.2 A built asset shall be considered sensitive, as a whole or in part, if it:
a) comprises critical national infrastructure, identified by the local or national government;
b) fulfils a defence, law enforcement, national security or diplomatic function;
c) is a commercial site involving the creation, processing, trading or storage of valuable materials,
currency, pharmaceuticals, chemicals, petrochemicals, or gases or the provision or production of
enablers for production of these materials;
d) constitutes a landmark, nationally significant site or crowded place;
e) is used, or is planned to be used, to host events of security significance.
NOTE The fact that a built asset does not fall within the criteria described does not preclude the application
of a higher level of security if the organization(s) wishes to adopt this.
4.3.3 An asset, product or service shall be considered sensitive if there is sufficient risk that it is, or can
be, used to significantly compromise the integrity, safety, security and/or resilience of an asset, product
or service, or its ability to function.
4.3.4 An asset, product or service shall also be considered sensitive if the risk to the safety, security
and/or privacy of individuals or communities or their personal information exceeds the risk appetite of
the organization(s).
4 © ISO 2020 – All rights reserved
ISO 19650-5:2020(E)
4.3.5 If there is any uncertainty as to whether or not an initiative, project, asset, product or service is
sensitive, the organization(s) shall seek advice from appropriate security experts who can demonstrate
competence in the required areas.
NOTE Information on obtaining suitable security advice is contained in Annex A.
4.4 Establishing any third-party sensitivities
4.4.1 An assessment of an initiative, project, asset, product or service shall also consider whether
access will be, or has already been, gained to information about other organizations, their assets,
products or services that is not otherwise publicly available.
NOTE As an example, information not otherwise publicly available that can be sensitive can arise from
physical surveys of underground structures, infrastructure networks and systems on private land.
4.4.2 The organization(s) shall, unless prohibitive for commercially or locally sensitive reasons, consult
with the affected organization(s) to establish whether any of that information is sensitive, and where this
is the case, what measures need to be applied to its capture, processing, storage, sharing and disposal
and destruction.
4.5 Recording the outcome of the sensitivity assessment
The organization(s) shall record and retain the outcome of each sensitivity assessment process,
including where there is no identified sensitivity, and recognize that the outcome may itself be sensitive.
4.6 Reviewing the sensitivity assessment
4.6.1 The organization(s) shall establish a suitable mechanism for performing periodic and event-
driven reviews that check whether there has been any change to the sensitivity of an initiative, project,
asset, product or service, whether for political, economic, social, technological, legal or environmental
reasons.
4.6.2 A review shall also be undertaken when there is a significant change to the initiative, project,
asset, product or service, including:
a) the ownership, use or occupancy of a built asset;
b) the processes or systems used in the management of a built asset or the production of an asset or
product;
c) the information collected, processed and/or stored;
d) the service delivered; or
e) the security context.
4.6.3 Additional event-driven reviews shall be undertaken when events occur that reveal vulnerabilities
not previously anticipated.
4.7 Determining whether a security-minded approach is required
The organization(s) shall apply the security triage process outlined in Figure 3 to determine whether
a security-minded approach is required in relation to the initiative, project, asset, product or service.
ISO 19650-5:2020(E)
Key
A Is the initiative, project, asset, product or service, as well as any associated information, in whole or in part,
whether planned or existing, considered sensitive (see 4.3)?
B Will access be, or has already been, gained to information about another organization, its assets, products or
services that is not otherwise publicly available (see 4.4.1)?
C Is the information about another organization, its assets, products or services considered sensitive (see 4.4.2)?
Y yes
N no
ST1 protect sensitive information regarding initiative, project, asset, product or service as well as third-party
sensitive information by applying Clause 5 to Clause 9
ST2 protect sensitive information regarding initiative, project, asset, product or service by applying Clause 5 to
Clause 9
ST3 protect third-party sensitive information by applying Clause 5 to Clause 9. Protect any sensitive commercial
and personal information
ST4 protect any sensitive commercial and personal information
NOTE ST is the abbreviated term for "security triage".
Figure 3 — The security triage process
4.8 Recording the outcome of the application of the security triage process
The organization(s) shall record the outcome (ST1, ST2, ST3 or ST4) of the application of the security
triage process for each initiative, project, asset, product or service to which it is applied, including where
there is no identified need for a security-minded approach beyond protection of sensitive commercial
and personal information.
6 © ISO 2020 – All rights reserved
ISO 19650-5:2020(E)
4.9 Security-minded approach required
Where an initiative, project, asset, product or service:
a) has been determined to be sensitive, whether in whole or in part; and/or
b) will be holding third-party information that has been identified as sensitive,
the top management of the organization(s) shall, following the requirements of this document, develop
and implement an appropriate and proportionate security-minded approach.
4.10 No security-minded approach required
Where an initiative, project, asset, product or service is not considered sensitive and does not have
access to other third-party sensitive information, the organization(s) shall consider whether there are
business benefits to be derived from applying a security-minded approach.
NOTE 1 It is prudent that organizations take appropriate steps to minimize threats arising from fraud and
other criminal activity and from cyber security incidents.
NOTE 2 It is likely that baseline security measures relating to personal information and commercial
information will be required within the terms of the appointment or legislation.
NOTE 3 Unless the organization(s) wishes to adopt any higher level of security, there is no necessity for the
requirements of the Clause 5 to Clause 9 to be applied to the initiative, project, asset, product or service as
currently assessed.
5 Initiating the security-minded approach
5.1 Establishing governance, accountability and responsibility for the security-minded
approach
5.1.1 Where an organization is developing a security-minded approach, the top management shall
define the individual at top management level accountable for the security-minded approach to be
adopted.
5.1.2 Where two or more organizations are developing a collaborative security-minded approach, the
top management of each organization shall establish a formal mechanism for:
a) creating the required governance structure, ensuring it is legally constituted and that the relationship
of this structure with the relevant organizations is formally documented and agreed on;
b) agreeing on a party or parties to lead on the development of the approach and where this
leadership function is split between organizations, ensuring there is clarity over accountabilities
and responsibilities;
c) appointing those individuals who shall be accountable for the security-minded approach to be
adopted; and
NOTE 1 The individuals are appointed to exercise the legal rights and fulfil the obligations of their
respective organization.
d) reviewing and, where appropriate, updating the governance structure and appointments.
NOTE 2 Having an agreed collaborative security-minded approach is more robust than one where those
organizations work in isolation.
ISO 19650-5:2020(E)
5.1.3 The organization(s) implemen
...
The standard EN ISO 19650-5:2020 provides a comprehensive framework for security-minded information management, particularly in the context of building information modelling (BIM). This standard is a critical addition to the ISO 19650 series, enhancing the principles of information management by incorporating a focus on the security of sensitive data within the built environment. The scope of this document is broad, addressing the full lifecycle of initiatives including design, construction, operation, and even the demolition of assets. It sets forth specific principles and requirements that organizations must adhere to in order to establish a robust security mindset and culture. Notably, it emphasizes the need for ongoing monitoring and auditing to ensure compliance, which is pivotal to maintaining the integrity of sensitive information. One of the major strengths of EN ISO 19650-5:2020 is its applicability to various organizations involved in different sectors of the built environment. It is particularly relevant to those who manage sensitive information related to commercial data, personal data, and intellectual property. The standard’s approach facilitates an effective management strategy that helps organizations protect this information throughout all stages of a project. Moreover, the standard not only addresses the technical and procedural aspects of information management but also promotes organizational culture that prioritizes security. This holistic approach ensures that organizations are not only compliant with the standards but are also fostering an environment that values and prioritizes the security of sensitive information. In summary, EN ISO 19650-5:2020 is instrumental for any organization that utilizes information management technologies within the built environment. Its emphasis on a security-minded approach to information management makes it a vital resource for enhancing operational integrity and safeguarding sensitive data against potential threats.
SIST EN ISO 19650-5:2020は、建物および土木工事に関する情報の標準化とデジタル化に焦点を当てた重要な文書であり、特に建築情報モデリング(BIM)に関連する情報管理のセキュリティに特化しています。本標準は、「ISO 19650シリーズ」に基づくBIMの成熟段階におけるセキュリティを重視した情報管理の原則と要件を明確に定義しています。 本標準の強みは、その適用範囲の広さにあります。プロジェクト、資産、製品、サービスのライフサイクル全体にわたり、敏感な情報の取得、作成、処理および保存に関する管理を行う方法を提供します。このアプローチは、組織内でのセキュリティマインドセットや文化を育成するために必要な手順も含まれており、敏感な情報にアクセスする組織での監視やコンプライアンス監査の必要性を強調しています。 さらに、SIST EN ISO 19650-5:2020は、情報管理技術を活用するあらゆる組織に対して、有用なガイドラインを提供します。特に、資産や製品の設計、建設、運営、管理、改良、解体、リサイクルに関与する組織にとって、この標準は商業情報、個人情報、知的財産を保護するためのフレームワークを示します。 総じて、SIST EN ISO 19650-5:2020は、情報管理におけるセキュリティへの配慮を強化するための不可欠な文書であり、適切な情報管理の実現を目指す組織にとって、価値ある指針となります。この標準は、建設環境における情報管理のベストプラクティスを確立し、企業が直面する情報セキュリティの課題に対処するための重要なリソースと言えるでしょう。
SIST EN ISO 19650-5:2020 표준은 건물 및 토목공사에 관한 정보의 조직화 및 디지털화, 특히 빌딩 정보 모델링(BIM)과 관련된 정보 관리의 보안-minded 접근 방식을 규정하는 중요한 문서입니다. 이 표준의 범위는 ISO 19650 시리즈에 따른 BIM의 성숙도 단계에서 보안-oriented 정보 관리의 원칙 및 요구사항을 상세히 설명하고 있습니다. 이 표준의 강점은 민감한 정보의 수집, 생성, 처리 및 저장에 대한 보안-minded 관리를 확립하려는 노력을 포함하여, 정보의 사용과 관련된 모든 프로젝트나 서비스의 라이프사이클 전반에 걸쳐 적용 가능하다는 점입니다. 조직 내에서 민감한 정보에 접근하는 모든 이들에게 적절하고 비례적인 보안 마인드셋 및 문화를 확립하는 단계도 다루고 있어, 이를 통해 보안 수칙 준수를 모니터링하고 감사하는 필요성을 강조합니다. 또한, 이 문서는 정보 관리 및 기술을 활용하여 자산이나 제품의 창출, 설계, 건설, 운영, 관리, 수정, 개선, 철거 및 재활용과 같은 다양한 분야에 종사하는 조직에 의해 활용될 수 있도록 설계되었습니다. 따라서, 상업 정보, 개인 정보 및 지적 재산을 보호하고자 하는 조직들에게도 큰 관심과 중요성이 부여됩니다. 결론적으로, SIST EN ISO 19650-5:2020은 정보 관리를 위한 보안-minded 접근 방식을 설정하고자 하는 조직에게 필수적인 지침을 제공하며, 민감한 정보를 효과적으로 관리하기 위한 기초를 마련하는 데 중요한 역할을 합니다.










Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.
Loading comments...