Page 29 - U4SSC Compendium of survey results on integrated digital solutions for city platforms around the world
P. 29

El Hierro, was selected, with a budget of EUR 3 852 670, which is 100 per cent contributed by the
            Ministry, through Red.es, with co-financing from the European Regional Development Fund (ERDF).

            Since then, Red.es has tendered the main project actions in the initiative, which includes the
            Smart Platform. The winner of the tender is the company IDOM CONSULTING, ENGINEERING,
            ARCHITECTURE, whose smart platform has been described above.

            Compliance with all current regulations is a commitment to carry out the actions.


            Data protection is given special attention, applying the requirements established by the Spanish
            Data Protection Agency and the regulations (LOPD, Organic Law on Data Protection).

            On the other hand, all actions entail compliance with specific security policies that cover the
            following aspects:

            •  Authentication and authorization.

            •  Security in communications and securing of all the elements deployed in the different
                components, especially the sensorization layer, enables mechanisms that guarantee data
                security, to prevent unauthorized access to devices. For example encryption, authentication of
                communications between devices, defence mechanism against cyberattacks.
            •  System monitoring and integrity.

            •  Centralized log registry.
            •  Backup, restoring and duplication of data.


            The security policies revolve around the axes of confidentiality, integrity, authenticity, traceability
            and availability:

            •  Confidentiality: regarding disclosure to unauthorized persons or those who do not need to
                have the information.

            •  Integrity: responding to the consequences of its modification by someone who is not authorized
                to modify the information.
            •  Authenticity: responding to the consequences of the fact that the information they manage or
                contain was not authentic.

            •  Traceability: responding to the consequences of not being able to trace after the fact who has
                accessed or modified certain information.

            •  Availability: responding to the situation when an authorized person is not being able to access
                the information when they need it.


            The developments also apply to the requirements established in the National Security Scheme
            (ENS) and the National Interoperability Scheme (ENI).





                                      Compendium of survey results on integrated digital solutions for city platforms around the world  17
   24   25   26   27   28   29   30   31   32   33   34