Direct links from the subject.
| Property | Value |
|---|---|
|
The subject is an instance of a class. |
|
|
The subject is an instance of a class. |
An idea or notion; a unit of thought. |
|
A human-readable name for the subject. |
ID.IM-03.6: The organisation shall implement, where feasible, automated mechanisms to facilitate the process of information sharing and collaboration. |
|
ID.IM-03.6 |
|
|
http://cyfun.data.gift/data/loc_CyFun2025_Booklet_ESSENTIAL_E_p77 |
|
|
http://cyfun.data.gift/data/loc_CyFun2025_Booklet_IMPORTANT_E_p57 |
|
|
Relates a concept to a concept that is more general in meaning. |
|
|
A general note, for any purpose. |
The goal of this control is to improve the efficiency, accuracy, and security of information sharing and collabo- ration byimplementing automated mechanisms where feasible. In OperationalTechnology (OT) environments, automation helps reduce manual errors, enforce access controls, and support timely decision-making across interconnected systems. To achieve this goal, the organisation should: - Match Access Authorisations Automated tools should verify that the access rights of information-sharing partners align with the sensitiv- ity of the information. Mismatches should be flagged before sharing occurs. - Automate Policy Enforcement Systems should automatically evaluate whether information can be shared based on its classification and the recipient’s access rights.These checks should be integrated with identity and access management (IAM) systems to ensure up-to-date authorisation data. - Control Search and Retrieval Search and retrieval tools should enforce access restrictions using metadata tagging and classification, ensuring users can only access authorised information. - Monitor and Audit Activities Automated logging and monitoring should track all information-sharing actions. Logs should be reviewed regularly to detect unauthorised access or policy violations. - Promote Usability and Training Automated tools should be user-friendly to encourage correct usage. Training should be provided to ensure users understand how to use these tools effectively and responsibly. - Ensure Conformance and Compliance All automated mechanisms should align with internal policies and comply with applicable laws, regulations, and industry standards. |
|
A general note, for any purpose. |
The goal of this control is to improve the efficiency, accuracy, and security of information sharing and collabo- ration byimplementing automated mechanisms where feasible. In OperationalTechnology (OT) environments, automation helps reduce manual errors, enforce access controls, and support timely decision-making across interconnected systems. To achieve this goal, the organisation should: • Match Access Authorisations Automated tools should verify that the access rights of information-sharing partners align with the sensitiv- ity of the information. Mismatches should be flagged before sharing occurs. • Automate Policy Enforcement Systems should automatically evaluate whether information can be shared based on its classification and the recipient’s access rights.These checks should be integrated with identity and access management (IAM) systems to ensure up-to-date authorisation data. • Control Search and Retrieval Search and retrieval tools should enforce access restrictions using metadata tagging and classification, ensuring users can only access authorised information. • Monitor and Audit Activities Automated logging and monitoring should track all information-sharing actions. Logs should be reviewed regularly to detect unauthorised access or policy violations. • Promote Usability and Training Automated tools should be user-friendly to encourage correct usage. Training should be provided to ensure users understand how to use these tools effectively and responsibly. • Ensure Conformance and Compliance All automated mechanisms should align with internal policies and comply with applicable laws, regulations, and industry standards. |
|
A general note, for any purpose. |
<div><p>The goal of this control is to improve the efficiency, accuracy, and security of information sharing and collabo- ration byimplementing automated mechanisms where feasible. In OperationalTechnology (OT) environments, automation helps reduce manual errors, enforce access controls, and support timely decision-making across interconnected systems. To achieve this goal, the organisation should:</p><ul><li>Match Access Authorisations Automated tools should verify that the access rights of information-sharing partners align with the sensitiv- ity of the information. Mismatches should be flagged before sharing occurs.</li><li>Automate Policy Enforcement Systems should automatically evaluate whether information can be shared based on its classification and the recipient’s access rights.These checks should be integrated with identity and access management (IAM) systems to ensure up-to-date authorisation data.</li><li>Control Search and Retrieval Search and retrieval tools should enforce access restrictions using metadata tagging and classification, ensuring users can only access authorised information.</li><li>Monitor and Audit Activities Automated logging and monitoring should track all information-sharing actions. Logs should be reviewed regularly to detect unauthorised access or policy violations.</li><li>Promote Usability and Training Automated tools should be user-friendly to encourage correct usage. Training should be provided to ensure users understand how to use these tools effectively and responsibly.</li><li>Ensure Conformance and Compliance All automated mechanisms should align with internal policies and comply with applicable laws, regulations, and industry standards.</li></ul></div> |
|
A general note, for any purpose. |
The goal of this control is to improve the efficiency, accuracy, and security of information sharing and collabo- ration byimplementing automated mechanisms where feasible. In OperationalTechnology (OT) environments, automation helps reduce manual errors, enforce access controls, and support timely decision-making across interconnected systems. To achieve this goal, the organisation should: - Match Access Authorisations Automated tools should verify that the access rights of information-sharing partners align with the sensitiv- ity of the information. Mismatches should be flagged before sharing occurs. - Automate Policy Enforcement Systems should automatically evaluate whether information can be shared based on its classification and the recipient’s access rights.These checks should be integrated with identity and access management (IAM) systems to ensure up-to-date authorisation data. - Control Search and Retrieval Search and retrieval tools should enforce access restrictions using metadata tagging and classification, ensuring users can only access authorised information. - Monitor and Audit Activities Automated logging and monitoring should track all information-sharing actions. Logs should be reviewed regularly to detect unauthorised access or policy violations. - Promote Usability and Training Automated tools should be user-friendly to encourage correct usage. Training should be provided to ensure users understand how to use these tools effectively and responsibly. - Ensure Conformance and Compliance All automated mechanisms should align with internal policies and comply with applicable laws, regulations, and industry standards. |
|
A notation, also known as classification code, is a string of characters such as "T58.5" or "303.4833" used to uniquely identify a concept within the scope of a given concept scheme. |
ID.IM-03.6 |
|
skos:prefLabel, skos:altLabel and skos:hiddenLabel are pairwise disjoint properties. |
Automated information sharing mechanisms |
|
A resource has no more than one value of skos:prefLabel per language tag, and no more than one value of skos:prefLabel without language tag. |
The organisation shall implement, where feasible, automated mechanisms to facilitate the process of information sharing and collaboration. |
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
|
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
http://cyfun.data.gift/data/CyFun2025_delta_BASIC_to_IMPORTANT |
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
|
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
|
|
The number of triples associated with the subject. |
19 |
|
Specifies the dataset the subject is part of. |
Resultaten 1 - 21 of 21
Inverse links to the subject.
| Property | Subject |
|---|---|
|
Relates a concept to a concept that is more specific in meaning. |
Resultaten 1 - 1 of 1