MIM6: Securing Data
OASC MIM6 (global) and MIM6 Plus (EU) on Securing Data
Description
As cities become smarter and more technology-driven, they become a target for cyber attacks with significant consequences in terms of costs and loss of services. In order to deliver reliable digital services for citizens, cities have to continuously evaluate the cyber risks and to put in place security measures to prepare for cyber attacks.
The first version of MIM 6 focuses on addressing interoperability for secure data transfer. The limited scope is to get progress and later iterations can and probably will expand the scope.
Objectives
When information is transferred, between parts of the data platform or externally, this is done securely.
Data processors know what requirements concerning security and interoperability to make of suppliers and systems when evaluating, procuring, developing, operating, and using solutions.
Capabilities & Requirements
(see Notes for additional information)
C1: Data is only accessible to users that should have access to it.
R1: Rules to control physical and logical access to information and other associated assets shall be established and implemented based on business and information security requirements.
R2: The full life cycle of identities shall be managed.
R3: Allocation and management of authentication information shall be controlled by a management process, including advising personnel on appropriate handling of authentication information.
R4: Access rights to information and other associated assets shall be provisioned, reviewed, modified and removed in accordance with the organization’s topic-specific policy on and rules for access control.
C2: Data that has been transmitted has not been altered.
R5: Rules for the effective use of cryptography, including cryptographic key management, shall be defined and implemented.
C3: Data accessed by users originates from a verified source.
R3: See above
R5: See above
R6: Secure authentication technologies and procedures shall be implemented based on information access restrictions and the topic-specific policy on access control.
Specifications
(see Notes for Specifications from an earlier version of this MIM. This list includes relevant Specifications for the current stage of development; more detailed information to be added in due course)
Information security, cybersecurity and privacy protection — Information security management systems — Requirements
Requirements and processes for implementing and maintaining electronically secure industrial automation and control systems.
Last updated