arrow-left

All pages
gitbookPowered by GitBook
1 of 2

Loading...

Loading...

Coherent Security

hashtag
Summary

The BDI provides security measures based on ISO 27001. This is an internationally recognized standard for establishing, implementing, maintaining, and continually improving an Information Security Management System (ISMS).

In essence, ISO 27001 provides a framework for organizations to establish a robust and comprehensive information security management system that helps them protect their valuable assets and infrastructure. This page contains a breakdown of the key measures it encompasses.

hashtag
Purpose of this building block

circle-info

This building block provides guidelines to implement security measures to prevent unauthorized access to data

hashtag
1. Information Security Policy:

  • Foundation: The cornerstone of the ISMS.

  • Scope: Defines the organization's commitment to information security, outlining its scope, objectives, and responsibilities.

  • Key Elements:

hashtag
2. Risk Assessment and Treatment:

  • Identification: Identifying potential threats to information assets (e.g., cyberattacks, natural disasters, human error).

  • Analysis: Evaluating the likelihood and impact of these threats.

  • Treatment: Implementing controls to mitigate identified risks. This can involve:

hashtag
3. Control Implementation:

  • Selecting Controls: Choosing appropriate security controls from Annex A of ISO 27001. These controls address a wide range of security areas, including:

    • Access Control: Restricting access to information based on need-to-know principles.

    • Physical Security: Protecting physical assets such as servers, data centers, and mobile devices.

hashtag
4. Monitoring, Measurement, Analysis, and Improvement:

  • Internal Audits: Conducting regular internal audits to assess the effectiveness of the ISMS.

  • Management Reviews: Conducting periodic reviews by management to evaluate the overall performance of the ISMS and identify areas for improvement.

  • Corrective and Preventive Actions: Implementing corrective actions to address identified nonconformities and preventive actions to prevent future problems.

hashtag
Key Benefits of Implementing ISO 27001:

  • Enhanced security posture: Reduces the risk of data breaches, cyber attacks, and other security incidents.

  • Increased customer trust: Demonstrates a commitment to data protection and security.

  • Improved operational efficiency: Streamlines security processes and reduces the costs associated with security incidents.

Confidentiality: Protecting sensitive data from unauthorized disclosure.
  • Integrity: Ensuring the accuracy and completeness of information.

  • Availability: Guaranteeing timely and reliable access to information when needed.

  • Accountability: Assigning responsibility for information security to individuals and departments.

  • Risk Avoidance: Eliminating the risk altogether.
  • Risk Mitigation: Reducing the likelihood or impact of the risk.

  • Risk Transfer: Shifting the risk to another party (e.g., insurance).

  • Risk Acceptance: Accepting the risk based on a cost-benefit analysis.

  • Cryptography: Using encryption to protect data in transit and at rest.

  • Incident Management: Establishing procedures for responding to security incidents.

  • Business Continuity Management: Ensuring the continued operation of critical business functions in the event of a disruption.

  • Implementation and Documentation:

    • Implementing the selected controls and documenting their implementation.

  • Continuous Improvement: Continuously improving the ISMS based on feedback from audits, reviews, and other sources.
    Enhanced compliance: Helps organizations comply with relevant regulations and legal requirements.
  • Competitive advantage: Differentiates the organization from competitors by demonstrating a strong commitment to information security.

  • BDI Security Framework

    hashtag
    1. Introduction

    circle-info

    Security is a prerequisite for trust in the BDI. Without verifiable, enforceable, and context-aware protection measures, data exchange between actors loses its integrity, availability, and confidentiality.

    The BDI Security Framework defines a structured approach to cybersecurity within BDI’s federated, many-to-many architecture. The framework provides the following functionality:

    hashtag
    2. Security in relation to Trust

    It is important to note the difference between security and trust. Trust serves as the foundation for recognition and mandate within the BDI, while security safeguards these relationships by ensuring systems execute them safely. The current building block focuses on the Security framework. The table below highlights the distinct focus of the Trust and Security frameworks.

    circle-exclamation

    Without security, trust erodes. Without trust, security cannot scale.

    Trust framework

    • is defined through governance agreements, roles, mandates, and ecosystem-wide business rules.

    • organizes trust between parties through business rules, governance, agreements, and audits.

    While the domains Trust and Security are closely related and mutually reinforcing, a deliberate distinction should be made. The agreements and business rules defined in the trust framework influence the security architecture, but the Security framework focuses purely on the execution and assurance side.

    For enforcement across internal and external domains, see “Delegated Implementation vs. Retained Accountability.”

    hashtag
    3. Purpose

    The BDI Security Framework delivers a common reference model for coordinated security across distributed actors. It is based on , providing coordinated, outcome-oriented security guidelines. The security framework ensures the protection of digital interactions between independent actors.


    hashtag
    3.1 Features of the BDI Security Framework

    The framework

    • Aligns with BDI's federated, role-based architectural model

    • Supports multi-party risk governance across diverse maturity levels

    • Will be extended with minimum requirements per role and example implementation controls

    See “Profiles and Risk Assessment” and “Roles and Profiles: Separation and Mapping” for current definitions and mappings.

    hashtag
    4. Enforcement and local implementation autonomy

    The BDI Security Framework is neither a compliance baseline nor a certification mechanism. Instead, it acts as a practical guide, while the actual enforcement decisions remain the responsibility of each association or federation.

    • Associations may mandate profiles or specific requirements.

    • Additional controls may be applied depending on risk classification.

    • Coordination with the agreement framework ensures that trust enforcement and security execution remain aligned.

    This model preserves interoperability while allowing flexibility in local adoption and scaling.

    hashtag
    5. Why NIST CSF 2.0?

    This security framework is built on NIST CSF 2.0 to meet the operational realities and governance needs of BDI. Rather than introducing a new model, the framework intentionally leverages an established and adaptable framework that aligns with existing organizational practices.

    hashtag
    6. Structure of the Security Framework

    This framework is organized around the six core functions of :

    • Govern: Establish and monitor cybersecurity risk governance, accountability, and strategic alignment.

    • Identify: Develop an understanding of assets, systems, data, and risks across the ecosystem.

    • Protect: Implement safeguards to ensure service continuity, data protection, and access control.

    Each function is further elaborated per profile with relevant subcategories, implementation tiers, and control examples. These are provided as part of the Coherent Security Register, which can be found at the end of this page.

    Role-specific mappings and associated responsibilities are elaborated in “Roles and Profiles: Separation and Mapping".

    hashtag
    7. Scope

    This security framework provides a common foundation for cybersecurity across the BDI ecosystem, enabling secure, scalable, and trust-based data interaction between independent participants. The system

    • focuses on the enforceable interface between participants in the BDI ecosystem (roles, systems, interfaces).

    • extends into internal domains only where trust agreements impose obligations on processing or safeguarding received data.

    • allows for enforceable controls if trust agreements call for it.

    hashtag
    8. Design principles and capabilities

    The design principles and capabilities of the security framework are specified as follows:

    • Covers technical controls, governance processes, behavioral practices, and/or operational workflows

    • Provides a role-based structure with minimum and maturity-based requirements, enabling capability growth over time

    • Supports interoperable and auditable trust decisions across organizations, using a shared language of controls

    hashtag
    9. Security profiles and risk assessment

    Profiles define the minimum set of security outcomes required to fulfill responsibilities associated with BDI Security Framework Profiles. They represent coherent bundles of responsibilities aligned to ecosystem needs.

    Each association implementing BDI must assess whether the “Minimum” Profile requirements are sufficient for their respective use cases, based on risk classification (e.g., information sensitivity or business impact). A practical approach is to use classification schemes such as CIA (Confidentiality, Integrity, Availability). If risks exceed the Minimum baseline, additional controls should be selected.

    Profiles are based on real-world usage scenarios. For guidance on creating and using profiles, please refer to . They ensure that actors in similar roles apply comparable protection levels and contribute to ecosystem-wide assurance.

    circle-exclamation

    Detailed subcategories, required outcomes, and implementation examples per profile are maintained in the separate BDI Coherent Security implementation register.

    hashtag
    10. BDI roles and profiles: separation and mapping

    Profiles do not define what technology to use. They define the responsibilities of a role, regardless of implementation. For BDI-specific implementation examples, refer to the Coherent Security Register documentation (See the attached document at the bottom of this page).

    Each maps to a BDI CSF Profile as follows:

    BDI Roles
    BDI CSF Profile
    Rationale for Profile

    An organization may assume multiple roles and thus implement multiple profiles. The security requirements that follow depend on which profiles are fulfilled.

    hashtag
    11. Delegated implementation vs. retained accountability

    circle-exclamation

    BDI acknowledges that many organizations, especially smaller ones, may outsource or delegate parts of their technical implementation to software vendors or ICT service providers.

    Note that outsourcing does not shift accountability.

    Each profile assigns accountability for meeting its associated security outcomes. Delegated responsibilities must be traceable, enforced contractually if needed, and auditable where required. This allows vendors and partners to understand what is expected of them, even if they are not directly bound by trust agreements.

    Security framework
    • is the enforcement and operational execution of the trust agreements via protective and assurance mechanisms.

    • manages risks and prevents undesirable behavior through technical and organizational measures.

    Functions as a living framework, continuously refined based on operational feedback and practical adoption

    Detect: Establish capabilities to identify the occurrence of cybersecurity events in real time or retrospectively.

  • Respond: Coordinate actions during and after a detected incident to contain impact and communicate effectively.

  • Recover: Maintain plans for restoring assets and services and improving future resilience.

  • is aligned with the BDI agreement framework.
  • complements trust governance with enforceable security execution.

  • Data owner

    Data Provisioning Profile

    Covers the provisioning of data or event access. Organizations implementing this profile might delegate responsibilities (but not accountability) to others.

    Data Consumer

    Data Access Requesting Profile

    Covers the requesting of data or event access. Organizations implementing this profile might delegate responsibilities (but not accountability) to others.

    Identity Provider, Identity Broker & Association Administrator

    Trust Services Profile

    Provides foundational trust services through authentication and federation for digital actors, and maintains oversight via registry, role, and mandate governance at the ecosystem level.

    Data Service Provider

    Policy Enforcement Profile

    NIST Cybersecurity Framework (CSF) 2.0arrow-up-right
    NIST CSF 2.0arrow-up-right
    NIST SP 1301arrow-up-right
    BDI role
    file-download
    120KB
    Coherent Security Register.xlsx
    arrow-up-right-from-squareOpen

    Participation

    The framework enables participants - regardless of their maturity - to organize security coherently across roles, organizations, and technology boundaries.

    Security

    The framework covers the full scope of security including technical controls, behavioral practices, governance processes, and recommended operational workflows.

    Cover

    Responsibility and Trust

    The framework focuses on the enforceable layer between participants, while outlining continued responsibilities once data enters internal domains where trust obligations apply.

    Federated Applicability

    CSF 2.0 is suitable for ecosystems of multiple, independent actors operating under a shared but non-centralized governance model.

    Compatibility with Legal Standards

    It allows integration and mapping with , , (Baseline Informatiebeveiliging Overheid), , and other frameworks used for compliance or internal policy.

    Operational and Strategic Usability

    The structure supports practical use in day-to-day security operations as well as in board-level and governance contexts.

    Role-based Extensibility

    The framework is designed to be expanded with role-specific minimum requirements and example control sets.

    Support for Staged Maturity

    Built-in maturity levels and outcome-oriented design allow structured capability growth over time.

    Executes technical implementation of data access and security policies defined by the Data Owner.

    NIS2arrow-up-right
    ISO/IEC 27001/2arrow-up-right
    BIOarrow-up-right
    GDPR / AVGarrow-up-right
    Cover
    Cover
    Cover
    Cover
    Cover
    Cover
    Cover
    Cover
    Cover
    Cover