kSIST FprEN ISO 19650-5:2020
(Main)This proposed ISO standard will specify requirements for the security-minded management of projects utilizing digital technologies, associated control systems, for example building management systems, digital built environments and smart asset management. It outlines security threats to information during asset:.
• conception, strategy and briefing;
• procurement;
• design;
• construction;
• commissioning and handover;
• operation and maintenance;
• performance management;
• change of use/modification; and
• disposal/demolition.
It will explain the need for, and application of,trustworthiness and security controls throughout a built asset’s lifecycle (including the full project lifecycle) to deliver a holistic approach encompassing:
• safety;
• authenticity;
• availability (including reliability);
• confidentiality;
• integrity;
• possession;
• resilience; and
• utility.
The standard will address the steps required to create and cultivate an appropriate safety and security mindset and culture across many partners, including the need to monitor and audit compliance.
It will provide a foundation to support the evolution of future digital built environments, for example intelligent buildings, infrastructure and smart cities, but does not detail technical architectures for their implementation. While the processes contained within it may be applicable to other data management systems, this PAS does not specifically address issues relating to these systems.
Organisation von Daten zu Bauwerken - Informationsmanagement mit BIM - Teil 5: Spezifikation für Sicherheitsbelange von BIM, der digitalisierten Bauwerke und smarten Assetmanagement (ISO/FDIS 19650-5:2020)
Dieses Dokument legt die Grundsätze und Anforderungen eines ausgereiften sicherheitsbewussten Informationsmanagements fest, das als „Bauwerksinformationsmodellierung (BIM) nach der Normenreihe ISO 19650“, und wie in ISO 19650 1 festgelegt, beschrieben werden kann, und behandelt das sicherheitsbewusste Management von sensiblen Informationen, die als Teil von oder im Zusammenhang mit einer Initiative, einem Projekt, einem Asset, einem Produkt oder einer Dienstleistung erhalten, erstellt, verarbeitet und gespeichert werden.
Es geht auf die Schritte ein, die erforderlich sind, um ein angemessenes und verhältnismäßiges Sicherheitsbewusstsein und eine entsprechende Sicherheitskultur für Organisationen zu schaffen und zu erhalten, die Zugriff auf sensible Informationen haben, einschließlich der Notwendigkeit, die Einhaltung der Sicherheitsanforderungen zu überwachen und zu prüfen.
Der beschriebene Ansatz kann über den gesamten Lebenszyklus einer Initiative, eines Projekts, eines Assets, eines Produkts oder einer Dienstleistung (egal ob in Planung oder bereits vorhanden) angewendet werden, in dem sensible Informationen erhalten, erstellt, verarbeitet und/oder gespeichert werden.
Dieses Dokument ist für jede Organisation vorgesehen, die in den Einsatz des Informationsmanagements und Technologien für die Erstellung, den Entwurf, die Konstruktion, die Herstellung, den Betrieb, das Management, die Modifizierung, die Verbesserung, den Rückbau und/oder das Recycling von Assets oder Produkten sowie für die Bereitstellung von Dienstleistungen innerhalb der bebauten Umgebung eingebunden ist. Sie wird auch für Organisationen interessant sein, die ihre kommerziellen Informationen, ihre persönlichen Informationen und ihr geistiges Eigentum schützen möchten.
Organisation des informations concernant les ouvrages de construction -- Gestion de l'information par la modélisation des informations de la construction (ISO/FDIS 19650-5:2020)
Le présent document spécifie les principes et les exigences relatifs à la gestion de l'information axée sur la sécurité à un stade de maturité décrit comme la « modélisation des informations de la construction (BIM) selon la série ISO 19650 », et comme défini dans l'ISO 19650-1, ainsi qu'à la gestion axée sur la sécurité des informations sensibles qui sont obtenues, créées, traitées et stockées dans le cadre de tout autre initiative, projet, actif, produit ou service, ou en relation avec ceux-ci.
Il traite des étapes requises pour créer et développer une culture et un état d'esprit de sécurité appropriés et proportionnés au sein des organismes ayant accès à des informations sensibles, y compris la nécessité de surveiller et de vérifier la conformité.
L'approche décrite est applicable pendant tout le cycle de vie d'une initiative, d'un projet, d'un actif, d'un produit ou d'un service, qu'il soit planifié ou existant, au cours duquel des informations sensibles sont obtenues, créées, traitées et/ou stockées.
Le présent document est destiné à être utilisé par tout organisme concerné par l'utilisation de technologies et de la gestion de l'information dans la création, la conception, la construction, la fabrication, l'exploitation, la gestion, la modification, l'amélioration, la démolition et/ou le recyclage d'actifs ou de produits, ainsi que la prestation de services, dans l'environnement bâti. Il sera également intéressant et pertinent pour les organismes qui souhaitent protéger leurs informations commerciales, leurs informations personnelles et leur propriété intellectuelle.
Organizacija in digitalizacija informacij v gradbeništvu - Upravljanje informacij z BIM - 5. del: Varnostni pristop k upravljanju informacij (ISO/FDIS 19650-5:2020)
General Information
Standards Content (sample)
SLOVENSKI STANDARD oSIST prEN ISO 19650-5:2019 01-september-2019
Organizacija in digitalizacija informacij v gradbeništvu - Upravljanje informacij z
BIM - 5. del: Varnostni pristop k upravljanju informacij (ISO/DIS 19650-5:2019)Organization and digitization of information about buildings and civil engineering works,
including building information modelling (BIM) - Information management using building
information modelling - Part 5: security-minded approach to information management
(ISO/DIS 19650-5:2019)Organisation von Daten zu Bauwerken - Informationsmanagement mit BIM - Teil 5:
Spezifikation für Sicherheitsbelange von BIM, der digitalisierten Bauwerke und smarten
Assetmanagement (ISO/DIS 19650-5:2019)Organisation des informations concernant les ouvrages de construction -- Gestion de
l'information par la modélisation des informations de la construction (ISO/DIS 19650-
5:2019)Ta slovenski standard je istoveten z: prEN ISO 19650-5
ICS:
35.240.67 Uporabniške rešitve IT v IT applications in building
gradbeništvu and construction industry
91.010.01 Gradbeništvo na splošno Construction industry in
general
oSIST prEN ISO 19650-5:2019 en,fr,de
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.
---------------------- Page: 1 ----------------------oSIST prEN ISO 19650-5:2019
---------------------- Page: 2 ----------------------
oSIST prEN ISO 19650-5:2019
DRAFT INTERNATIONAL STANDARD
ISO/DIS 19650-5
ISO/TC 59/SC 13 Secretariat: SN
Voting begins on: Voting terminates on:
2019-07-05 2019-09-27
Organization and digitization of information about
buildings and civil engineering works, including building
information modelling (BIM) — Information management
using building information modelling —
Part 5:
security-minded approach to information management
ICS: 35.240.67; 91.010.01
THIS DOCUMENT IS A DRAFT CIRCULATED
This document is circulated as received from the committee secretariat.
FOR COMMENT AND APPROVAL. IT IS
THEREFORE SUBJECT TO CHANGE AND MAY
NOT BE REFERRED TO AS AN INTERNATIONAL
STANDARD UNTIL PUBLISHED AS SUCH.
IN ADDITION TO THEIR EVALUATION AS
ISO/CEN PARALLEL PROCESSING
BEING ACCEPTABLE FOR INDUSTRIAL,
TECHNOLOGICAL, COMMERCIAL AND
USER PURPOSES, DRAFT INTERNATIONAL
STANDARDS MAY ON OCCASION HAVE TO
BE CONSIDERED IN THE LIGHT OF THEIR
POTENTIAL TO BECOME STANDARDS TO
WHICH REFERENCE MAY BE MADE IN
Reference number
NATIONAL REGULATIONS.
ISO/DIS 19650-5:2019(E)
RECIPIENTS OF THIS DRAFT ARE INVITED
TO SUBMIT, WITH THEIR COMMENTS,
NOTIFICATION OF ANY RELEVANT PATENT
RIGHTS OF WHICH THEY ARE AWARE AND TO
PROVIDE SUPPORTING DOCUMENTATION. ISO 2019
---------------------- Page: 3 ----------------------
oSIST prEN ISO 19650-5:2019
ISO/DIS 19650-5:2019(E)
COPYRIGHT PROTECTED DOCUMENT
© ISO 2019
All rights reserved. Unless otherwise specified, or required in the context of its implementation, no part of this publication may
be reproduced or utilized otherwise in any form or by any means, electronic or mechanical, including photocopying, or posting
on the internet or an intranet, without prior written permission. Permission can be requested from either ISO at the address
below or ISO’s member body in the country of the requester.ISO copyright office
CP 401 • Ch. de Blandonnet 8
CH-1214 Vernier, Geneva
Phone: +41 22 749 01 11
Fax: +41 22 749 09 47
Email: copyright@iso.org
Website: www.iso.org
Published in Switzerland
ii © ISO 2019 – All rights reserved
---------------------- Page: 4 ----------------------
oSIST prEN ISO 19650-5:2019
ISO/DIS 19650-5:2019(E)
Contents Page
Foreword ..........................................................................................................................................................................................................................................v
Introduction ................................................................................................................................................................................................................................vi
1 Scope ................................................................................................................................................................................................................................. 1
2 Normative references ...................................................................................................................................................................................... 1
3 Terms and definitions ..................................................................................................................................................................................... 1
4 Establish the need for a security-minded approach using a sensitivity assessment
process ............................................................................................................................................................................................................................ 3
4.1 Understand the range of security risks .............................................................................................................................. 3
4.2 Identify organizational sensitivities ..................................................................................................................................... 4
4.3 Establish any third-party sensitivities ................................................................................................................................ 4
4.4 Record the outcome of the sensitivity assessment .................................................................................................. 5
4.5 Periodically review the sensitivity assessment .......................................................................................................... 5
4.6 Determine whether a security-minded approach is required ....................................................................... 5
4.7 The organization(s) shall record the outcome of the application of the security
triage process for each initiative, project, asset, product or service to which it
is applied, including where there is no identified need for a security-mindedapproach beyond protection of sensitive commercial and personal information. ...................... 6
4.8 Security-minded approach required .................................................................................................................................... 6
4.9 No security-minded approach required ............................................................................................................................ 7
5 Developing the security-minded approach .............................................................................................................................. 7
5.1 Establishing governance, accountability and responsibility for the security-minded approach .................................................................................................................................................................................. 7
5.2 Commencing the development of the security-minded approach ............................................................. 8
6 Developing a security strategy ............................................................................................................................................................... 9
6.1 General ........................................................................................................................................................................................................... 9
6.2 Assess the security risk s ................................................................................................................................................................. 9
6.3 Develop security risk mitigation measures .................................................................................................................10
6.4 Document residual and tolerated security risks .....................................................................................................10
6.5 R eview of the security strategy .............................................................................................................................................11
7 Developing a security management plan .................................................................................................................................11
7.1 General ........................................................................................................................................................................................................11
7.2 Requirements relating to the provision of information to third parties ............................................12
7.3 Logistical security requirements ..........................................................................................................................................12
7.4 Managing accountability and responsibility for security ................................................................................13
7.5 Monit oring and auditing ..............................................................................................................................................................13
7.6 R eview of the security management plan ....................................................................................................................13
8 Developing a security breach/incident management plan ...................................................................................14
8.1 General ........................................................................................................................................................................................................14
8.2 Discovery of a security breach or incident ..................................................................................................................14
8.3 Containment and recovery ........................................................................................................................................................14
8.4 R eview following a security breach or incident ......................................................................................................15
8.5 R eview of the security breach/incident management plan ..........................................................................15
9 Working with appointed parties .......................................................................................................................................................15
9.1 Working outside formal appointments ...........................................................................................................................15
9.2 Measures contained in the appointment documentation ...............................................................................16
9.3 Post appointment award .............................................................................................................................................................16
9.4 End of appointment .........................................................................................................................................................................17
10 Compliance with other legislation and standards ..........................................................................................................17
Annex A (informative) Information on the security context.....................................................................................................18
© ISO 2019 – All rights reserved iii---------------------- Page: 5 ----------------------
oSIST prEN ISO 19650-5:2019
ISO/DIS 19650-5:2019(E)
Annex B (informative) Information on types of personnel, physical, and technical security
controls and management of information security .........................................................................................................20
Annex C (informative) Assessments relating to the provision of information to third parties ................24
Annex D (informative) Information sharing agreements .............................................................................................................26
Bibliography .............................................................................................................................................................................................................................28
iv © ISO 2019 – All rights reserved---------------------- Page: 6 ----------------------
oSIST prEN ISO 19650-5:2019
ISO/DIS 19650-5:2019(E)
Foreword
ISO (the International Organization for Standardization) is a worldwide federation of national standards
bodies (ISO member bodies). The work of preparing International Standards is normally carried out
through ISO technical committees. Each member body interested in a subject for which a technical
committee has been established has the right to be represented on that committee. International
organizations, governmental and non-governmental, in liaison with ISO, also take part in the work.
ISO collaborates closely with the International Electrotechnical Commission (IEC) on all matters of
electrotechnical standardization.The procedures used to develop this document and those intended for its further maintenance are
described in the ISO/IEC Directives, Part 1. In particular the different approval criteria needed for the
different types of ISO documents should be noted. This document was drafted in accordance with the
editorial rules of the ISO/IEC Directives, Part 2 (see www .iso .org/directives).
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. ISO shall not be held responsible for identifying any or all such patent rights. Details of
any patent rights identified during the development of the document will be in the Introduction and/or
on the ISO list of patent declarations received (see www .iso .org/patents).Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.For an explanation on the voluntary nature of standards, the meaning of ISO specific terms and
expressions related to conformity assessment, as well as information about ISO's adherence to the
World Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT) see the following
URL: www .iso .org/iso/foreword .html.This document was prepared by Technical Committee ISO/TC 59, Buildings and civil engineering works,
Subcommittee SC 13, Organization and digitization of information about buildings and civil engineering
works, including building information modelling (BIM).A list of all parts in the ISO 19650- series, published under the general title Organization and digitization
of information about buildings and civil engineering works, including building information modelling (BIM),
can be found on the ISO website.© ISO 2019 – All rights reserved v
---------------------- Page: 7 ----------------------
oSIST prEN ISO 19650-5:2019
ISO/DIS 19650-5:2019(E)
Introduction
The built environment is experiencing a period of rapid evolution. It is anticipated that the adoption
of digital engineering, including building information modelling (BIM), and the increasing use of
digital technologies in the design, construction, manufacture, operation and management of assets or
products, as well as the provision of services, within the built environment will have a transformative
effect on the parties involved. It is likely that in order to increase effectivity and efficiency, initiatives
or projects that are developing new assets or solutions, or modifying or managing existing ones, must
become much more collaborative in nature to increase effectivity and efficiency. Such collaboration
requires more transparent, open ways of working, and, as much as possible, the appropriate sharing
and use of digital information.Digital built environments will need to deliver future fiscal, financial, functional, sustainability and
growth objectives. This is likely to have an impact on procurement, delivery and operational processes
including far greater cross-discipline and sector collaboration, significantly increasing the availability
of information.The use of computer-based technologies is already supporting new ways of working, such as the
development of off-site, factory-based fabrication and on-site automation. Sophisticated cyber-physical
systems, by using sensors (the cyber or computation element) to control or influence physical parts
of the system, are able to work in real-time to influence outcomes in the real world. It is anticipated
that such systems will be used to achieve benefits such as increases in energy efficiency and better
asset lifecycle management by capturing real-time information about asset use and condition. They
can already be found in transportation, utilities, infrastructure, buildings, manufacturing, health care
and defence, and when able to interact as integrated cyber-physical environments, could be used in the
development of smart communities.As a consequence of this increasing use of, and dependence on, information and communications
technologies there is a need to address inherent vulnerability issues, and therefore the security
implications that arise, whether for built environments, assets, products, services, individuals or
communities, as well as any associated information.This standard provides a framework to assist organizations in understanding the key vulnerability
issues and the nature of the controls required to manage the resultant security risks to a level that
is tolerable to the relevant parties. Its purpose is not in any way to undermine collaboration or the
benefits that digital engineering techniques such as BIM, other collaborative work methods and digital
technologies can generate.While information security requirements for an individual organization are set out in ISO/
IEC 27001, digital engineering generally involves the sharing of information between a broad range
of organizations. ISO/IEC 27001 therefore cannot be applied to these organizations as a whole. This
standard encourages the adoption of a security-minded, risk-based approach that can be applied across,
as well as within organizations. The appropriate and proportionate nature of the approach also has the
benefit that measures should not prohibit the involvement of small and medium-sized enterprises in
the delivery team.The security-minded approach can be applied throughout the lifecycle of an initiative, project, asset,
product or service, whether planned or existing, where sensitive information is obtained, created,
processed and/or stored.Figure 1 shows the integration of this security-minded approach with other organizational strategies,
policies, plans and information requirements for the digitally-enabled delivery, maintenance and
operation of projects and assets using BIM.Implementation of the measures outlined in this standard will assist in reducing the risk of the loss,
misuse or modification of sensitive information that could impact on the safety, security and resilience
of assets, products, the built environment, or the services provided by, from or through them. It will
also assist in protecting against the loss, theft or disclosure of commercial information, personal
information and intellectual property. Any such incidents can lead to significant reputational damage,
vi © ISO 2019 – All rights reserved---------------------- Page: 8 ----------------------
oSIST prEN ISO 19650-5:2019
ISO/DIS 19650-5:2019(E)
impacting through lost opportunities and the diversion of resources to handle investigation, resolution
and media activities, in addition to the disruption of, and delay to, day-to-day operational activities.
Further, where incidents do occur and information has been made publicly available, it is virtually
impossible to recover all of that information or to prevent ongoing distribution.
KeyA Coordinated and consistent strategies and policies
B Coordinated and consistent plans
C Coordinated and consistent information requirements
D Activities undertaken during the operational phase of assets (see also ISO 19650-3)
E Activities undertaken during the delivery phase of the asset (see also ISO 19650-2)
1 Organizational plans and objectives2 Strategic asset management plan/policy (see ISO 55000)
3 Security strategy
4 Other organizational strategies and policy
5 Asset management plan (see ISO 55000)
6 Security management plan
7 Other organizational plans
8 Asset information requirements (AIR)
9 Security information requirements
10 Organizational information requirements (OIR)
11 Strategic business case and strategic brief
12 Asset operational use
13 Performance measurement and improvement actions
Figure 1 — The integration of the security-minded approach within the wider BIM process
© ISO 2019 – All rights reserved vii---------------------- Page: 9 ----------------------
oSIST prEN ISO 19650-5:2019
---------------------- Page: 10 ----------------------
oSIST prEN ISO 19650-5:2019
DRAFT INTERNATIONAL STANDARD ISO/DIS 19650-5:2019(E)
Organization and digitization of information about
buildings and civil engineering works, including building
information modelling (BIM) — Information management
using building information modelling —
Part 5:
security-minded approach to information management
1 Scope
This standard specifies the principles and requirements for security-minded information management
at a stage of maturity described as “building information modelling (BIM) according to the ISO 19650-
series”, as well as the security-minded management of sensitive information that is obtained, created,
processed and stored as part of, or in relation to, any other initiative, project, asset, product or service.
It addresses the steps required to create and cultivate an appropriate and proportionate security
mindset and culture across organizations with access to that information, including the need to monitor
and audit compliance.The approach outlined is applicable throughout the lifecycle of an initiative, project, asset, product or
service, whether planned or existing, where sensitive information is obtained, created, processed and/
or stored.This standard is intended for use by any organization who is involved in the use of digital engineering
and related technologies in the creation, design, construction, manufacture, operation, management,
modification, improvement, demolition and/or recycling of assets or products, as well as the provision
of services, within the built environment. It will also be of interest and relevance to those organizations
who wish to protect their commercial information, personal information and intellectual property.
2 Normative referencesThe following documents are referred to in the text in such a way that some or all of their content
constitutes requirements of this document. For dated references, only the edition cited applies. For
undated references, the latest edition of the referenced document (including any amendments) applies.
ISO 19650-1:2018, Organization and digitization of information about buildings and civil engineering
works, including building information modelling (BIM) — Information management using building
information modelling — Part 1: Concepts and principlesISO 19650-2:2018, Organization and digitization of information about buildings and civil engineering
works, including building information modelling (BIM) — Information management using building
information modelling — Part 2: Delivery phase of the assetsISO 19650-3:2019, Organization of information about construction works — Information management
using building information modelling — Part 3: Operational phase of the assetsISO 55000, Asset management — Overview, principles and terminology
3 Terms a nd definiti ons
For the purposes of this document, the following terms and definitions apply.
© ISO 2019 – All rights reserved 1
---------------------- Page: 11 ----------------------
oSIST prEN ISO 19650-5:2019
ISO/DIS 19650-5:2019(E)
ISO and IEC maintain terminological databases for use in standardization at the following addresses:
— IEC Electropedia: available at http: //www .electropedia .org/— ISO Online browsing platform: available at https: //www .iso. org/obp
3.1
asset
Item, thing or entity that has potential or actual value to an organization[SOURCE: ISO 55000:2014].
Note 1 to entry: An asset can be fixed, mobile or movable. It can be an individual item of plant, a vehicle, a system
of connected equipment, a space within a structure, a piece of land, an entire piece of infrastructure, an entire
building, or a portfolio of assets including associated land or water. It can also comprise information in digital or
in printed form.Note 2 to entry: The value of an asset can vary throughout its life and an asset can still have value at the end of its
life. Value can be tangible, intangible, financial or non-financial.3.2
crowded place
location or environment to which members of the public have access that can be considered more at
risk from a terrorist attack by virtue of its crowd density or the nature of the site
Note 1 to entry: Crowded places can include: sports stadia, arenas, festivals and music venues; hotels and
restaurants; pubs, clubs, bars and casinos; high streets, shopping centres and markets; visitor attractions;
cinemas and theatres; schools and universities; hospitals and places of worship; commercial centres; and
transport hubs. They can also include events and public realm spaces such as parks and squares.
Note 2 to entry: A crowded place will not necessarily be crowded at all times – crowd densities can vary and can
be temporary, as in the case of sporting events or open-air festivals.3.3
metadata
data about data or data elements
3.4
need-to-know
legitimate requirement of a prospective recipient of information to know, to access, or to possess any
sensitive information represented by these information3.5
risk appetite
amount and type of risk that an organization is willing to pursue or retain
3.6
safety
the state of relative freedom from threat or harm caused by random, unintentional acts or events
3.7security
the state of relative freedom from threat or harm caused by deliberate, unwanted, hostile or
malicious acts3.8
security breach
infraction or violation of security
[SOURCE: ISO 14298:2013]
3.9
security incident
suspicious act or circumstance threatening security
2 © ISO 2019 – All rights reserved
---------------------- Page: 12 ----------------------
oSIST prEN ISO 19650-5:2019
ISO/DIS 19650-5:2019(E)
3.10
security-minded
the understanding and routine application of appropriate and proportionate security measures in any
business situation so as to deter and/or disrupt hostile, malicious, fraudulent and criminal behaviours
or activities3.11
sensitive information
information, the loss, misuse or modification of which, or unauthorized access to, could:
— adversely affect the privacy, welfare or safety of an individual or individuals;
— compromise intellectual property or trade secrets of an organization;— cause commercial or economic harm to an organization or country; and/or
— jeopardize the security, internal and foreign affairs of a nation
3.12
residual risk
risk that remains after controls have been implemented
[SOURCE: ISO 16530-1:2017]
3.13
threat
potential cause of an incident which may result in harm
3.14
top management
person or group of people who directs and controls an organization at the highest level
Note 1 to entry: Top management has the power to delegate authority and provide resources within the
organization.Note 2 to entry: In the context of this standard, management should be regarded as the function, not the activity
3.15vulnerability
weakness that can be exploited to cause harm
4 Establish the need for a security-minded approach using a sensitivity
assessment process
4.1 Understand the range of security risks
4.1.1 The top management of an organization creating, managing, operating, disposing or re-
purposing an initiative, project, asset, product or service shall determine the range of security risks that
arise through greater availability of information, integration of services and systems, and the increased
dependency on technology-based systems.NOTE Information on the types of security risks that should be considered are contained in Annex A.
4.1.2 Where two or more organizations are involved in:a) initiating a project to develop a new asset(s), product(s) or service(s) or modify/enhance an
existing one;b) managing, operating, re-purposing or disposing of an asset(s); and/or
© ISO 2019 – All rights reserved 3
---------------------- Page: 13 ----------------------
oSIST prEN ISO 19650-5:2019
ISO/DIS 19650-5:2019(E)
c) the provision of an asset-based service(s),
the top management of those organizations shall determine the range of security risks that arise
through greater availability of information, integration of services and systems, and the increased
dependency on technology-based systems.NOTE 1 Such an arrangement of multiple organizations can occur in a city/community, a large, multi-purpose
development or in the provision of a transport system.NOTE 2 Information on the types of security risks that should be considered are contained in Annex A.
4.2 Identify organizational sensitivities4.2.1 into consideration the
...
Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.