data.gift
  • Datasets

http://cyfun.data.gift/data/requirement_ID_IM_03_6

http://cyfun.data.gift/data/requirement_ID_IM_03_6
Concept

  • http://cyfun.data.gift/data/CyFun2025

    • External link
    • Internal link
  • http://cyfun.data.gift/data/CyFun2025_delta_BASIC_to_IMPORTANT

    • External link
    • Internal link
  • http://cyfun.data.gift/data/CyFun2025_IMPORTANT

    • External link
    • Internal link
  • http://cyfun.data.gift/data/CyFun2025_ESSENTIAL

    • External link
    • Internal link

  • http://cyfun.data.gift/data/subcategory_ID.IM-03

    • External link
    • Internal link

Properties and relations

Direct links from the subject.

Property Value

type

The subject is an instance of a class.

  • External link
  • Internal link

http://cyfun.data.gift/ontology#Requirement

  • External link
  • Internal link

type

The subject is an instance of a class.

  • External link
  • Internal link

Concept

An idea or notion; a unit of thought.

  • External link
  • Internal link

label

A human-readable name for the subject.

  • External link
  • Internal link

ID.IM-03.6: The organisation shall implement, where feasible, automated mechanisms to facilitate the process of information sharing and collaboration.

http://cyfun.data.gift/ontology#requirementId

  • External link
  • Internal link

ID.IM-03.6

http://cyfun.data.gift/ontology#foundIn

  • External link
  • Internal link

http://cyfun.data.gift/data/loc_CyFun2025_Booklet_ESSENTIAL_E_p77

  • External link
  • Internal link

http://cyfun.data.gift/ontology#foundIn

  • External link
  • Internal link

http://cyfun.data.gift/data/loc_CyFun2025_Booklet_IMPORTANT_E_p57

  • External link
  • Internal link

has broader

Relates a concept to a concept that is more general in meaning.

  • External link
  • Internal link

http://cyfun.data.gift/data/subcategory_ID.IM-03

  • External link
  • Internal link

note

A general note, for any purpose.

  • External link
  • Internal link

The goal of this control is to improve the efficiency, accuracy, and security of information sharing and collabo- ration byimplementing automated mechanisms where feasible. In OperationalTechnology (OT) environments, automation helps reduce manual errors, enforce access controls, and support timely decision-making across interconnected systems. To achieve this goal, the organisation should: - Match Access Authorisations Automated tools should verify that the access rights of information-sharing partners align with the sensitiv- ity of the information. Mismatches should be flagged before sharing occurs. - Automate Policy Enforcement Systems should automatically evaluate whether information can be shared based on its classification and the recipient’s access rights.These checks should be integrated with identity and access management (IAM) systems to ensure up-to-date authorisation data. - Control Search and Retrieval Search and retrieval tools should enforce access restrictions using metadata tagging and classification, ensuring users can only access authorised information. - Monitor and Audit Activities Automated logging and monitoring should track all information-sharing actions. Logs should be reviewed regularly to detect unauthorised access or policy violations. - Promote Usability and Training Automated tools should be user-friendly to encourage correct usage. Training should be provided to ensure users understand how to use these tools effectively and responsibly. - Ensure Conformance and Compliance All automated mechanisms should align with internal policies and comply with applicable laws, regulations, and industry standards.

note

A general note, for any purpose.

  • External link
  • Internal link

The goal of this control is to improve the efficiency, accuracy, and security of information sharing and collabo- ration byimplementing automated mechanisms where feasible. In OperationalTechnology (OT) environments, automation helps reduce manual errors, enforce access controls, and support timely decision-making across interconnected systems. To achieve this goal, the organisation should: • Match Access Authorisations Automated tools should verify that the access rights of information-sharing partners align with the sensitiv- ity of the information. Mismatches should be flagged before sharing occurs. • Automate Policy Enforcement Systems should automatically evaluate whether information can be shared based on its classification and the recipient’s access rights.These checks should be integrated with identity and access management (IAM) systems to ensure up-to-date authorisation data. • Control Search and Retrieval Search and retrieval tools should enforce access restrictions using metadata tagging and classification, ensuring users can only access authorised information. • Monitor and Audit Activities Automated logging and monitoring should track all information-sharing actions. Logs should be reviewed regularly to detect unauthorised access or policy violations. • Promote Usability and Training Automated tools should be user-friendly to encourage correct usage. Training should be provided to ensure users understand how to use these tools effectively and responsibly. • Ensure Conformance and Compliance All automated mechanisms should align with internal policies and comply with applicable laws, regulations, and industry standards.

note

A general note, for any purpose.

  • External link
  • Internal link

<div><p>The goal of this control is to improve the efficiency, accuracy, and security of information sharing and collabo- ration byimplementing automated mechanisms where feasible. In OperationalTechnology (OT) environments, automation helps reduce manual errors, enforce access controls, and support timely decision-making across interconnected systems. To achieve this goal, the organisation should:</p><ul><li>Match Access Authorisations Automated tools should verify that the access rights of information-sharing partners align with the sensitiv- ity of the information. Mismatches should be flagged before sharing occurs.</li><li>Automate Policy Enforcement Systems should automatically evaluate whether information can be shared based on its classification and the recipient’s access rights.These checks should be integrated with identity and access management (IAM) systems to ensure up-to-date authorisation data.</li><li>Control Search and Retrieval Search and retrieval tools should enforce access restrictions using metadata tagging and classification, ensuring users can only access authorised information.</li><li>Monitor and Audit Activities Automated logging and monitoring should track all information-sharing actions. Logs should be reviewed regularly to detect unauthorised access or policy violations.</li><li>Promote Usability and Training Automated tools should be user-friendly to encourage correct usage. Training should be provided to ensure users understand how to use these tools effectively and responsibly.</li><li>Ensure Conformance and Compliance All automated mechanisms should align with internal policies and comply with applicable laws, regulations, and industry standards.</li></ul></div>

note

A general note, for any purpose.

  • External link
  • Internal link

The goal of this control is to improve the efficiency, accuracy, and security of information sharing and collabo- ration byimplementing automated mechanisms where feasible. In OperationalTechnology (OT) environments, automation helps reduce manual errors, enforce access controls, and support timely decision-making across interconnected systems. To achieve this goal, the organisation should: - Match Access Authorisations Automated tools should verify that the access rights of information-sharing partners align with the sensitiv- ity of the information. Mismatches should be flagged before sharing occurs. - Automate Policy Enforcement Systems should automatically evaluate whether information can be shared based on its classification and the recipient’s access rights.These checks should be integrated with identity and access management (IAM) systems to ensure up-to-date authorisation data. - Control Search and Retrieval Search and retrieval tools should enforce access restrictions using metadata tagging and classification, ensuring users can only access authorised information. - Monitor and Audit Activities Automated logging and monitoring should track all information-sharing actions. Logs should be reviewed regularly to detect unauthorised access or policy violations. - Promote Usability and Training Automated tools should be user-friendly to encourage correct usage. Training should be provided to ensure users understand how to use these tools effectively and responsibly. - Ensure Conformance and Compliance All automated mechanisms should align with internal policies and comply with applicable laws, regulations, and industry standards.

notation

A notation, also known as classification code, is a string of characters such as "T58.5" or "303.4833" used to uniquely identify a concept within the scope of a given concept scheme.

  • External link
  • Internal link

ID.IM-03.6

alternative label

skos:prefLabel, skos:altLabel and skos:hiddenLabel are pairwise disjoint properties.

  • External link
  • Internal link

Automated information sharing mechanisms

preferred label

A resource has no more than one value of skos:prefLabel per language tag, and no more than one value of skos:prefLabel without language tag.

  • External link
  • Internal link

The organisation shall implement, where feasible, automated mechanisms to facilitate the process of information sharing and collaboration.

is in scheme

Relates a resource (for example a concept) to a concept scheme in which it is included.

  • External link
  • Internal link

http://cyfun.data.gift/data/CyFun2025

  • External link
  • Internal link

is in scheme

Relates a resource (for example a concept) to a concept scheme in which it is included.

  • External link
  • Internal link

http://cyfun.data.gift/data/CyFun2025_delta_BASIC_to_IMPORTANT

  • External link
  • Internal link

is in scheme

Relates a resource (for example a concept) to a concept scheme in which it is included.

  • External link
  • Internal link

http://cyfun.data.gift/data/CyFun2025_IMPORTANT

  • External link
  • Internal link

is in scheme

Relates a resource (for example a concept) to a concept scheme in which it is included.

  • External link
  • Internal link

http://cyfun.data.gift/data/CyFun2025_ESSENTIAL

  • External link
  • Internal link

http://cyfun.data.gift/ontology#level

  • External link
  • Internal link

http://cyfun.data.gift/data/level_IMPORTANT

  • External link
  • Internal link

triple count

The number of triples associated with the subject.

  • External link
  • Internal link

19

in dataset

Specifies the dataset the subject is part of.

  • External link
  • Internal link

http://data.gift/d/datasets/69E8863AA6CE46D9ACD13109

  • External link
  • Internal link

Resultaten 1 - 21 of 21

References

Inverse links to the subject.

Property Subject

http://cyfun.data.gift/ontology#hasRequirement

  • External link
  • Internal link

http://cyfun.data.gift/data/subcategory_ID.IM-03

  • External link
  • Internal link

has narrower

Relates a concept to a concept that is more specific in meaning.

  • External link
  • Internal link

http://cyfun.data.gift/data/subcategory_ID.IM-03

  • External link
  • Internal link

Resultaten 1 - 1 of 1

© 2024 redpencil.io. All rights reserved.