Featured
- Get link
- X
- Other Apps
Information inventory and its assessment
A detailed list of the information that is handled is recorded, together with its assessment as established in Annex I of the National Security Scheme .
There may be several causes that prevent fully achieving the
objective proposed in the previous paragraph:
1. A
security policy is lacking or insufficient.
2. The
person responsible for any of the information processed is not named.
3. The
assessment of the information is not formally approved.
In this case, the assessment will be made and argued by the
security officer , at his best judgment, stating the reasons or reasoning. This
assessment is only binding on the body until the formal assessment is
available.
It must have a deadline to have the formal assessment .
Thus, an inventory of information-type assets will be carried out, assessing
confidentiality, integrity, authenticity, traceability, and if relevant,
availability.
The National Security Scheme is limited to assessing those
types of information that are relevant to the administrative process and can be
processed in a service subject to law 11/2007 on electronic access of citizens
to public services . For example, medical, fiscal, administrative data,
contracts, resolutions, notifications, etc. In general, it is expected that
these types of information are identified in some type of general or particular
organization of the body, which gives them their own entity and implies some
duties of the administration regarding the treatment of said type of
information.
There are several types of security levels:
1. The level
of security required in the confidentiality dimension will be established based
on the consequences that its disclosure would have to unauthorized persons or
who do not need to know the information.
2. The level
of security required in the integrity dimension will be established based on
the consequences of its modification by someone who is not authorized to modify
the information.
3. The level
of security required in the dimension of authenticity will be established based
on the consequences of the fact that the information is not authentic.
4. The level
of security required in the traceability dimension will be established based on
the consequences of not being able to trace a posteriori who has accessed or
modified certain information.
5. The level
of security required in the availability dimension will be established based on
the consequences of an authorized person not being able to access the
information when they need it.
When an aspect does not require security measures, in the
valuation section it will be indicated without valuation . Auxiliary data that
are not a direct object of the administrative process and only appear as instrumental
for the provision of services will not be directly assessed .
For example, directory services, passwords, etc. This list
of information-type assets will be included in the risk analysis tool.
For each classified information asset, it will be valued
according to the criteria described in Annex II of the ENS . As described, the
table below shows a list of information-type assets and their valuation based
on the aforementioned criteria. These data are those that have been entered in
the risk analysis tool.
- Get link
- X
- Other Apps
Popular Posts
Beauty and Technology of Digital Landscape
- Get link
- X
- Other Apps
EDGE-CLOUD: The 5G Pathway to Serviced Operating Technology
- Get link
- X
- Other Apps