<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Hervé Guillou-Hely, Auteur</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/author/herve-guillou-hely/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/author/herve-guillou-hely/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Wed, 15 Apr 2020 09:00:51 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>Hervé Guillou-Hely, Auteur</title>
	<link>https://www.riskinsight-wavestone.com/author/herve-guillou-hely/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Cybersecurity issues around Smart City (2/2)</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/04/cybersecurity-issues-around-smart-city-2-2/</link>
		
		<dc:creator><![CDATA[Hervé Guillou-Hely]]></dc:creator>
		<pubDate>Wed, 15 Apr 2020 09:00:51 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[architecture]]></category>
		<category><![CDATA[change]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[risks]]></category>
		<category><![CDATA[smart city]]></category>
		<category><![CDATA[SOC]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=12966</guid>

					<description><![CDATA[<p>In a previous article, we saw that the Smart City was inducing a paradigm shift which, combined with the general public&#8217;s high expectations on the security of its data, required adapting the approach to such a project. Indeed, as the...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/04/cybersecurity-issues-around-smart-city-2-2/">Cybersecurity issues around Smart City (2/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>In a previous </em><a href="https://www.riskinsight-wavestone.com/en/2020/03/cybersecurity-issues-around-smart-city-1-2/"><em>article</em></a><em>, we saw that the Smart City was inducing a paradigm shift which, combined with the general public&#8217;s high expectations on the security of its data, required adapting the approach to such a project. Indeed, as the Smart City develops, urban activity becomes more and more dependent on its services, increasing not only its security needs, but also the interest of cyber attackers. Based on these observations, the challenge will therefore be to identify a new approach to take account of Cyber ​​Security risks and, if not completely eliminate them, to reduce them. This is the purpose of this second article.</em></p>
<p>&nbsp;</p>
<h2>Building a Smart City project with Cybersecurity</h2>
<p>It is essential to integrate cyber security aspects from the start of a Smart City project. Indeed, carrying it out later in the project may prove to be more complex and expensive, with the risk of not dealing with it / not being able to deal with all the risks.</p>
<p>This requires <strong>rethinking the organization of the project regarding data and security governance</strong>: security principles must be defined at the global project level and considered by each of the sub-projects composing the Smart City, depending on their constraints. This is particularly true as Smart Cities involve many actors with different core businesses, means and cybersecurity maturity. A global and shared vision is essential to ensure that each element processes the data with the appropriate level of security.</p>
<p>It is then necessary <strong>to define the main principles of architecture and interoperability</strong>, according to the constraints inherent to the Smart City, related to Edge Computing and the deployment of objects in a hostile environment. System resilience must be at the heart of safety requirements, as the fall or compromise of one element should not cause the entire system to fall.</p>
<p>To this end, common <strong>standards</strong> must be adopted, based on specific frameworks such as ETSI or OneM2M. These increase the chances of maintaining scalable interoperable systems. More generally, the NIST or the ISO 27002 standard are proven Cybersecurity frameworks on which it would be interesting to rely.</p>
<p>The development mode must be <a href="https://www.riskinsight-wavestone.com/en/2019/07/cybersecurity-in-an-agile-world/">agile</a>, integrating a long-term vision to anticipate new use cases, and with short milestones in order to quickly deliver the first services. <strong>Cybersecurity must be included in the development process</strong>, by defining Evil User Stories, enabling risks to be identified and considered each time services or the information system evolves, and by appointing cybersecurity experts in a support and validation role.</p>
<p>&nbsp;</p>
<figure id="post-12967 media-12967" class="align-none"><img fetchpriority="high" decoding="async" class="size-full wp-image-12967 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image1.png" alt="" width="1740" height="571" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image1.png 1740w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image1-437x143.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image1-71x23.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image1-768x252.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image1-1536x504.png 1536w" sizes="(max-width: 1740px) 100vw, 1740px" /></figure>
<p>&nbsp;</p>
<p>Defining and maintaining a satisfactory level of security will, more than ever, require the rigorous integration of security in all phases of the project, which may lead to greater but necessary human and technological investments.</p>
<p>&nbsp;</p>
<h2>Protecting critical and regulated data</h2>
<p>Given the propensity of the Smart City to collect and process large amounts of data, their protection will primarily involve <strong>identifying critical data and assets.</strong></p>
<p>&nbsp;</p>
<figure id="post-12969 media-12969" class="align-none"><img decoding="async" class="size-full wp-image-12969 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image2.png" alt="" width="1340" height="661" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image2.png 1340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image2-387x191.png 387w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image2-71x35.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image2-768x379.png 768w" sizes="(max-width: 1340px) 100vw, 1340px" /></figure>
<p>&nbsp;</p>
<p>Most of the services offered by the Smart City are aimed at citizens. Therefore, personal and potentially sensitive data will be collected. Furthermore, a loss of availability or integrity of certain services could have serious repercussions since some components of the IS have a direct hold on the physical world. <strong>Smart Cities are not exempt from regulations</strong>, in particular the General Data Protection Regulations (GDPR), but also, depending on usage, from the General Security Regulations (GSR), the Military Programming Law (MPL) or the Network and Information Security (NIS) directive, whose data protection requirements will have to be integrated into the programs.</p>
<p>Levels of data sensitivity classification must therefore be formalized in order to enable the prioritization of actions and the setting up of an appropriate framework for the processing of critical data such as encryption and anonymization.</p>
<p>The problem of access to data should also be raised. There are many actors in the Smart City and it will be necessary to segment the &#8220;vision&#8221; they may have of the IS. This will involve a preliminary phase of defining the authorization profiles, necessary to respect the principle of least privilege, combined with a regular review of their assignments to ensure that they are still legitimate.</p>
<p>&nbsp;</p>
<h2>Operating in trusted environments</h2>
<figure id="post-12971 media-12971" class="align-none"><img decoding="async" class="size-full wp-image-12971 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image-4.png" alt="" width="1612" height="203" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image-4.png 1612w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image-4-437x55.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image-4-71x9.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image-4-768x97.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image-4-1536x193.png 1536w" sizes="(max-width: 1612px) 100vw, 1612px" /></figure>
<p>&nbsp;</p>
<p>The Smart City project will necessarily rely on <strong>different technical and organizational foundations</strong>. If these bases are to the Information System what foundations are to a house, it is easy to understand that it will be difficult to build anything if this base is fragile.</p>
<p>As always, these technical bases must be covered by fundamental security measures: implementation of trust bubbles, hardening of systems, patch management, securing of privileged accounts and their use, etc.</p>
<p>Furthermore, an information system with a large attack area such as the Smart City will necessarily have to break with the traditional security model known as &#8220;castle security&#8221;, by relying more on aspects of partitioning and access control of the data itself. The conformity of assets within the information system will have to be continuously evaluated using common configuration and hardening frameworks. Exposed systems and applications must be subject to controls and audits, particularly during the development phase, but also during the operational phase.</p>
<p>In addition, business continuity and disaster recovery will have to be at the heart of the security strategy. Plans will have to be formalized, but also tested, including both technical considerations such as the resilience of different systems, with the ability to restore systems independently of each other, and organizational considerations through crisis management exercises.</p>
<p>Finally, as Smart City involves many players, all stakeholders should ensure the implementation of significant means in the protection of the information systems involved and comply with the requirements of the project&#8217;s security policy. To do this, they will have to be contractually committed, at the very least by including security requirements in contracts, but also by formalizing and implementing security assurance plans, particularly for the most critical service providers. Regular controls may be commissioned to ensure that the security level is maintained over time and to address future risk scenarios.</p>
<p>&nbsp;</p>
<h2>Detecting, reacting and sharing</h2>
<p>The Smart City cannot do without <strong>a service to detect and deal with security incidents.</strong></p>
<p>It will be necessary to collect traces of activity on the systems and look for weak signals. In view of the large number of events to be processed, it will be essential to define the risks to be guarded against and to rely on correlation solutions to facilitate these searches. The use of automation tools will allow a first sorting of false positives, facilitating the work of analysts in the qualification of security alerts.</p>
<p>The detection and response service can be built using the PDIS and PRIS standards. Qualified external suppliers may be used for these two services as required.</p>
<p>The use of <strong>Cyber Threat Intelligence services</strong> will bring a significant efficiency gain in the creation and enrichment of SOC detection rules. Indeed, it will be possible to adopt a proactive detection posture by monitoring attacks that have targeted Smart Cities and the operating modes used. This will also have the advantage of improving the efficiency of the response service by saving precious investigation time.</p>
<p>Finally, the process of handling significant and major security incidents cannot be carried out without the formalization of a <strong>crisis management unit</strong>, composed of actors with well-defined roles and trained for this exercise. Particular attention will be paid to the external communication system, since the &#8220;severity&#8221; of a crisis depends as much on the event that caused it as on how it is perceived by the outside world.</p>
<p>&nbsp;</p>
<figure id="post-12973 media-12973" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-12973" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image3.png" alt="" width="1647" height="873" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image3.png 1647w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image3-360x191.png 360w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image3-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image3-768x407.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image3-1536x814.png 1536w" sizes="auto, (max-width: 1647px) 100vw, 1647px" /></figure>
<p>&nbsp;</p>
<p>In conclusion, and as we have seen through these two articles, the Smart City is a self-evident development in an era where demographic, ecological and economic issues are all intertwined. Its promises are seductive, but the implementation framework may give rise to some fears.</p>
<p>As with any digital transformation, ensuring a level of security in line with the challenges of the project will necessarily involve identifying the vulnerabilities and security risks it generates.</p>
<p><strong>In the era of cyber-warfare and cyber-threats</strong>, the Smart City should be considered as a Digital Service Provider, within the meaning of the NIS directive, and be protected by security measures adapted to this status.</p>
<p>The provision of secure services, respectful of their users&#8217; data, is a sine qua non condition for the success of a Smart City project, the benefits of which will only be matched by the magnitude of the impact of a successful cyberattack.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/04/cybersecurity-issues-around-smart-city-2-2/">Cybersecurity issues around Smart City (2/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersecurity issues around Smart City (1/2)</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/03/cybersecurity-issues-around-smart-city-1-2/</link>
		
		<dc:creator><![CDATA[Hervé Guillou-Hely]]></dc:creator>
		<pubDate>Mon, 16 Mar 2020 09:08:39 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[architecture]]></category>
		<category><![CDATA[change]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[smart city]]></category>
		<category><![CDATA[stakes]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=12777</guid>

					<description><![CDATA[<p>Smart City, a possible answer to today&#8217;s challenges &#8220;A smart sustainable city is an innovative city that uses information and communication technologies (ICTs) and other means to improve quality of life, efficiency of urban operation, and services and competitiveness, while...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/03/cybersecurity-issues-around-smart-city-1-2/">Cybersecurity issues around Smart City (1/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Smart City, a possible answer to today&#8217;s challenges</h2>
<p><em>&#8220;A smart sustainable city is an innovative city that uses information and communication technologies (ICTs) and other means to improve quality of life, efficiency of urban operation, and services and competitiveness, while ensuring that it meets the needs of present and future generations with respect to economic, social, environmental and cultural aspects.»</em>, International Telecommunication Union (ITU) &#8211; United Nations Specialized Agency for Information and Communication Technologies.</p>
<p>Increase in the urban population, ecological emergency and energy transition, constraints on public finances, need to reinvent the link between the public service and the user, increase in the living comfort of the inhabitants, etc. All of these issues are challenges that the Smart City could help respond to and which are pushing communities to invest in this direction.</p>
<p>In order to meet these challenges of today and tomorrow, the Smart City will have to create a synergy between different areas such as intelligent traffic management, the development of new modes of transport, the optimization of energy consumption and waste management, the protection of goods and services, home automation, etc.</p>
<p>&nbsp;</p>
<figure id="post-12618 media-12618" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-12618 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-1.png" alt="" width="1233" height="667" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-1.png 1233w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-1-353x191.png 353w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-1-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-1-768x415.png 768w" sizes="auto, (max-width: 1233px) 100vw, 1233px" /></figure>
<p>&nbsp;</p>
<p>All these services can be federated around a single control center which will provide an uplink and downlink, giving the possibility of collecting information on the state of the services and/or acting directly on the infrastructure.</p>
<p>&nbsp;</p>
<h2>A new target for cyber attackers</h2>
<p>Many cities in France and around the world have taken up the subject of the Smart City to meet the challenges set out above: large metropolises of course, but also smaller cities.</p>
<p>In parallel with these initiatives, it is becoming more and more frequent to observe cyberattacks targeting cities. As an illustration, in 2019, 22 US municipalities were victims of cyberattacks. <strong>The losses amount to millions</strong>. The governor of Louisiana went so far as to declare a state of emergency following attacks on several cities in the state. But these attacks are not limited to the United States, as evidenced by the attacks in France on the cities of Sarrebourg (Moselle), Sequedin (Nord), Huez (Oisans), La Croix-Valmer (Var) or even Nuits-Saint-Gorges (Côtes-d&#8217;Or).</p>
<p>So, the question now is why Smart Cities present a new playground for Cyber Attacks and how to protect oneself from them.</p>
<p>&nbsp;</p>
<h2>The Smart City induces a paradigm shift</h2>
<p>Conducting a Smart City project requires changing the usual ways of proceeding by implementing a new kind of information system (IS), mixing many issues and generating new risks in terms of Cybersecurity.</p>
<p>&nbsp;</p>
<h3>A complex architecture</h3>
<p>The Smart City is partly characterized by the new structure of its architecture. <strong>Its atypical IS</strong> compiles the constraints of a management IS, those of an industrial IS and those of an IoT IS.</p>
<p>Thus, its management IS will have a propensity to collect and process a large amount of data, whereas its industrial IS will have the characteristic of being directly connected to the physical world: water management, traffic lights, variable road signs, retractable bollards, intelligent lighting, autonomous car control, etc. and reconciling the challenges of these two worlds is no easy task: where the industrial world traditionally focuses on availability, the IT world will focus on the integrity and confidentiality of information and processing, considering furthermore that the Smart City will reinforce the existing IT and digital dimension of industrial systems.</p>
<p>Furthermore, the rationale for an IoT IS must be considered, which is to collect data as close as possible to their sources, through the deployment of connected objects, multiple entry points to the IS in potentially hostile environments. As a result, these objects will be individually exposed to physical attacks against which it was not previously necessary or easier to guard against (e.g. physical access to a serial or USB port, replacement of flash memory, etc.).</p>
<p>Finally, the systems that make up the Smart City must be able to evolve rapidly in order to benefit from the innovations of market players. The challenge is to succeed in building a flexible IS with the capacity to respond to uses yet unidentified today while providing systems capable of being maintained over time, on the scale of a Smart City built for decades.</p>
<p>&nbsp;</p>
<h3>The paradox of interoperability</h3>
<p>Moreover, <strong>a Smart City approach is intended to be inclusive</strong> in order to take advantage of the strengths of all the players in the area. This implies managing heterogeneous systems, mixing new and old technological bricks, and mastering the opening of its IS.</p>
<p>Smart Cities polymorphism complicates the definition of global security policies. Their implementation evolves alongside the development of new technologies, making the security policies of another generation obsolete or inapplicable. This problem has already been present in the industrial world for years, where operational constraints make it sometimes impossible to evolve systems that have become vulnerable.</p>
<p>Beyond security policy, while interoperability between multi-generational systems makes it possible to develop new functionalities that create value for the user, it also implies using disparate protocols that can lead to security breaches. A &#8220;security by design&#8221; approach would consist in identifying the current need and its potential evolutions, in order to be able to propose specifications integrating both concrete answers to the functional need and minimum security rules allowing the service deployment with a satisfactory level of confidence. However, this is likely to oppose to the principle of inclusiveness of the Smart City.</p>
<h4>The importance of data</h4>
<h4>An operational and political challenge</h4>
<p>Information from the field is of paramount importance in driving the Smart City: assisting in decision-making, communicating information to citizens, planning events, and evaluating public policy. While the data itself is not necessarily critical, this is no longer true when it is aggregated into a larger whole. Errors in the collection or processing of data can lead to operational inefficiencies in services or to inappropriate choices in response to changing circumstances.</p>
<p>&nbsp;</p>
<figure id="post-12778 media-12778" class="align-none">
<figure id="post-12778 media-12778" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-12778 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-2.png" alt="" width="958" height="554" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-2.png 958w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-2-330x191.png 330w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-2-67x39.png 67w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-2-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-2-768x444.png 768w" sizes="auto, (max-width: 958px) 100vw, 958px" /></figure>
</figure>
<p>&nbsp;</p>
<p>Moreover, the construction of the Smart City is done by layer. Gradually, new services appear and develop. Historically siloed, the trend is to look for synergies between the different services to create ever more added value for the user. These growing interconnections and overlapping induce such complexity that in the event of a failure, there is a risk, if we are not careful, of seeing the whole infrastructure collapse, either because of error propagation or because each service has become dependent on the others.</p>
<h4>Security: a request coming from the citizens themselves</h4>
<p>Elabe and Wavestone have conducted a survey on the importance of data in tomorrow&#8217;s public services, and on the challenges facing stakeholders in such projects.</p>
<p>Among these challenges lies the use made of the user personal data. Overall, citizens are in favor of the idea of ​​digital transformation of public services, and a fortiori of the Smart City as a public service but remain <strong>concerned about the purpose</strong> of processing their data.</p>
<p>&nbsp;</p>
<figure id="post-12780 media-12780" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-12780 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-3.png" alt="" width="878" height="666" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-3.png 878w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-3-252x191.png 252w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-3-51x39.png 51w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-3-768x583.png 768w" sizes="auto, (max-width: 878px) 100vw, 878px" /></figure>
<p>&nbsp;</p>
<p>However, a significant proportion of the population, between 30% and 50%, is not in favour of transferring their data even if it could save money, save time or reduce their carbon footprint. This could be due to the fact that 76% of the population surveyed believe that the administration is not currently able to ensure the security of the data it collects.</p>
<p>&nbsp;</p>
<figure id="post-12782 media-12782" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-12782 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-4.png" alt="" width="1209" height="546" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-4.png 1209w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-4-423x191.png 423w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-4-71x32.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-4-768x347.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-4-730x330.png 730w" sizes="auto, (max-width: 1209px) 100vw, 1209px" /></figure>
<p>&nbsp;</p>
<p>The success of the Smart City therefore also lies in the ability of stakeholders <strong>to reassure users</strong> about the use and protection of their data.</p>
<p>Thus, we have seen that the Smart City is inducing a paradigm shift which, combined with the high expectations of the general public on the security of its data, required an adaptation of its approach. Indeed, as the Smart City grows, urban activity becomes more and more dependent on its services, increasing its security needs, but also the interest of cyber attackers. Based on these observations, the challenge will therefore be to identify which approach to implement to take into account the risk of cybersecurity and, failing to completely eliminate it, to reduce it. We will talk about it in a second article.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/03/cybersecurity-issues-around-smart-city-1-2/">Cybersecurity issues around Smart City (1/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>La carte CPS : un projet d’établissement ou un projet informatique ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2013/03/la-carte-cps-un-projet-detablissement-ou-un-projet-informatique/</link>
		
		<dc:creator><![CDATA[Hervé Guillou-Hely]]></dc:creator>
		<pubDate>Fri, 08 Mar 2013 15:53:57 +0000</pubDate>
				<category><![CDATA[Métiers - Stratégie & projets IT]]></category>
		<category><![CDATA[carte de professionnel de santé]]></category>
		<category><![CDATA[CPS]]></category>
		<category><![CDATA[gestion des accès]]></category>
		<category><![CDATA[gestion des identités]]></category>
		<category><![CDATA[secteur santé]]></category>
		<category><![CDATA[SIH]]></category>
		<category><![CDATA[Système d’information hospitalier]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=3411</guid>

					<description><![CDATA[<p>La Carte de Professionnel de Santé (CPS) est une carte d’identité électronique, personnelle et unique, garantissant l’identification nationale des professionnels de santé. Dorénavant distribuée gratuitement et systématiquement par l’ASIP Santé à tout professionnel de santé (libéral et hospitalier) inscrit au...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2013/03/la-carte-cps-un-projet-detablissement-ou-un-projet-informatique/">La carte CPS : un projet d’établissement ou un projet informatique ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>La Carte de Professionnel de Santé (CPS) est une carte d’identité électronique, personnelle et unique, garantissant l’identification nationale des professionnels de santé. Dorénavant distribuée gratuitement et systématiquement par l’ASIP Santé à tout professionnel de santé (libéral et hospitalier) inscrit au RPPS, et sur demande aux autres professions (plus de 835 000 cartes de la famille CPS en circulation, dont 160 000 en établissements de santé), elle permet notamment de répondre aux besoins du personnel médical, soignant et médico technique d’accéder de manière discontinue et fréquente au Système d’Information Hospitalier (SIH) depuis des postes généralement partagés. Comment mettre en œuvre cette carte au sein d’un établissement de santé ? Quels sont les particularités et les acteurs d’un tel projet ? </em></p>
<h2>Mettre en œuvre la carte CPS au travers d’un projet de gestion des identités et des accès</h2>
<p>Le SI, tout en connaissant de profondes transformations, devient un enjeu majeur dans les hôpitaux : informatisation continue des services de soins, ouverture du SIH, dématérialisation des échanges et interopérabilité, renforcement des exigences réglementaires, etc. Ces évolutions facilitent le partage de l’information médicale mais rendent sa protection plus difficile.</p>
<p>La mise en œuvre d’un espace de confiance numérique pour le partage des données de santé devient alors une nécessité. Cette nécessité devient un prérequis dans le cadre du programme Hôpital Numérique et de la certification HAS (Haute Autorité de Santé).</p>
<p>La mise en place d’une gestion des identités et des accès, qui associe l’utilisation d’un dispositif d’<strong>authentification forte</strong> comme la <strong>Carte de Professionnel de Santé</strong>, permet de créer un espace de confiance numérique qui répond aux problématiques suivantes :</p>
<ul>
<li>Respecter les nouvelles règlementations ;</li>
<li>Simplifier et sécuriser l’accès au SIH ;</li>
<li>Accélérer les processus de gestion des droits ;</li>
<li>Diminuer la charge d’administration et réduire les coûts de support.</li>
</ul>
<h2>Mener un projet de gestion des identités et des accès adapté au monde hospitalier</h2>
<p>La gestion des identités et des accès associe des processus, des technologies et une stratégie de gestion des identités numériques et de spécification de leur usage pour accéder aux ressources informatiques de l’entreprise.</p>
<p>Mener un tel projet s’avère généralement plus complexe que la plupart des autres projets informatiques en raison du nombre et de la diversité des référentiels d’identités numériques, des solutions techniques mises en œuvre et des besoins des entités gouvernantes amenées à collaborer.</p>
<p>Notamment, les acteurs concernés par un tel projet dans le monde hospitalier sont nombreux : la Direction Générale, la Commission Médicale d’Établissement (CME), le Département d’Information Médicale (DIM), les directions gérant le personnel salarié et non salarié de l’établissement (Direction des Affaires Médicales, Direction des Ressources Humaines), le corps médical et soignant, la Direction des systèmes d’information (ou le service informatique), etc.</p>
<p>Par ailleurs, certains thèmes à aborder sont spécifiques aux établissements de santé :</p>
<ul>
<li>Comment instruire ce projet dans le cadre d’une mise en réseau de l’établissement au sein d’une ou plusieurs communautés hospitalières ?</li>
<li>Faut-il limiter l’utilisation de la carte à l’accès aux postes de travail ou bien ai-je intérêt à étendre son usage comme pour l’accès aux locaux ?</li>
<li>À qui dois-je la fournir ?</li>
<li>Comment m’assurer que la carte CPS facilitera l’accès aux postes de travail ?</li>
<li>Quelles applications dois-je prendre en compte dans mon projet ?</li>
</ul>
<h2>Un projet <strong>d’établissement</strong> nécessitant un engagement de moyens ainsi qu’une implication de tous les acteurs pour le rendre maîtrisable</h2>
<p>Mettre en œuvre la carte CPS au travers d’un projet de gestion des identités et des accès se révèle être un <strong>projet stratégique d’établissement</strong>, porteur d&#8217;enjeux à la fois techniques, organisationnels et de conduite du changement, et à ce titre requiert une phase préalable de cadrage qui permettra :</p>
<ul>
<li>De définir le périmètre et évaluer la dimension du projet : état des lieux, besoins et les attentes, axes d’amélioration, périmètre fonctionnel cible, macro-évaluation charges, coûts, délais ;</li>
<li>D’inscrire le projet dans une démarche globale : acteurs à mobiliser, instances de pilotage, possibilités de mutualisation.</li>
</ul>
<p>Et vous, où en êtes-vous de la mise en œuvre de la carte de Professionnel de Santé au sein de votre établissement ?</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2013/03/la-carte-cps-un-projet-detablissement-ou-un-projet-informatique/">La carte CPS : un projet d’établissement ou un projet informatique ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
