National Academies Press: OpenBook
« Previous: Chapter 2 - Overview of Tasks
Page 9
Suggested Citation:"Chapter 3 - Conclusion." National Academies of Sciences, Engineering, and Medicine. 2023. Guidelines on Collaboration and Information Security for State DOTs. Washington, DC: The National Academies Press. doi: 10.17226/26851.
×
Page 9
Page 10
Suggested Citation:"Chapter 3 - Conclusion." National Academies of Sciences, Engineering, and Medicine. 2023. Guidelines on Collaboration and Information Security for State DOTs. Washington, DC: The National Academies Press. doi: 10.17226/26851.
×
Page 10
Page 11
Suggested Citation:"Chapter 3 - Conclusion." National Academies of Sciences, Engineering, and Medicine. 2023. Guidelines on Collaboration and Information Security for State DOTs. Washington, DC: The National Academies Press. doi: 10.17226/26851.
×
Page 11

Below is the uncorrected machine-read text of this chapter, intended to provide our own search engines and external engines with highly rich, chapter-representative searchable text of each book. Because it is UNCORRECTED material, please consider the following text as a useful but insufficient proxy for the authoritative book pages.

9   This research project has shown that the most effective way to promote the safe and secure col- laboration and the sharing of information and data among transportation agencies is to ensure that best practices for safety and security are documented and followed by agency staff. The fol- lowing best practices summarize key points that agency staff should consider prior to engaging in collaboration or sharing data and information with external parties. Following these practices will help to ensure that the activities, tools, and participants in such activities are authorized, compliant, safe, and secure. 3.1 Establish Collaboration Business Needs Agencies should document the business needs and benefits of collaboration and the sharing of data and knowledge. It is important to understand the use cases that rely on or are dependent upon collaborative efforts and to recognize the benefits that arise from these efforts. Once these needs and benefits are comprehended, the agency can use this data to create the appropriate guidance, policies, and procedures. 3.2 Document Policies and Procedures Agencies should document permissible activities and uses pertaining to data, information, and knowledge and make that documentation available and publicized to users. This will inform the user of the level of collaboration and sharing that is allowed and encouraged while also denoting what is not allowed. The answers to the following questions should be documented as part of this process: • Who is permitted to perform these collaborative activities? With whom can they be performed? • What information can be shared? What tools or methods can be used in collaboration? • Where can data or knowledge exchanges occur? Where is data or knowledge stored? What are the attributes of information that determine restrictions on whether or how it is shared? • When is the audience for information more restrictive? When are specific collaboration methods or tools allowed? Are there restrictions on the period of time in which an activity can occur? • Why are there restrictions? What are the security risks and vulnerabilities? • How can a party be authorized to obtain knowledge or access, view, obtain, utilize, modify, or extend a specific set of data? How does a user know when a dataset is allowed to be shared? C H A P T E R 3 Conclusion

10 Guidelines on Collaboration and Information Security for State DOTs 3.3 Follow Best Practices for Security Agencies should define rules to manage risk and protect points of vulnerability. Security best practices should be followed for protecting the network, data, and users. Agency collaborators should have access to these rules, understand them, and comply. Agencies should ensure that a feedback mechanism is in place to allow users to give feedback when restrictions are preventing collaborative efforts from occurring. Agencies should be agile in adjusting and changing as the business needs change. For instance, prior to COVID-19, many agencies had policies in place that would not allow work from home or web teleconferences. When the pandemic occurred, those agencies that could pivot and adjust were better able to handle the transition to support remote work. 3.4 Determine Data Restrictions and Protections Agency users should define the attributes of Knowledge Assets (e.g., data, information, and media content or tools); these attributes may include restrictions on access, protection against changes, and updates when changed. Following are several items to consider with regard to restrictions and protections on Knowledge Assets: • Agency owners should define which parties can have access to or exchange what content, in what manner, for what purpose, at what time, through which media, and in what format. • Data may be restricted depending on its content, such as whether it includes Personally Iden- tifiable Information (PII) or sensitive or confidential data [such as Internet Protocol (IP) addresses]. • The integrity for a Knowledge Asset indicates the degree of fidelity of its content and accuracy of its values and information based on the extent of its protection from—or exposure to— access, modification or usage by another party or exposure to vulnerabilities such as cyber risk or threats. • Agency users must ensure that a Knowledge Asset has not been modified by unauthorized parties or left unprotected and exposed via unsecure virtual media during acquisition, exchange, storage, or viewing activities. • Knowledge Assets may be incomplete; if so, the parties using the asset should be notified of any changes. 3.5 Document Collaborative Activities Agencies should also consider the need to observe and document the collaborative activities to ensure that all participating parties, tools, environments, and the formats used are authorized and authenticated, and that all engagement activities are compliant with protocols for safety, security, or other requirements. Agency users should obtain permission from all of the parties whose activities will be observed, and should consider the authenticity of those parties as well as the authorization, proprietorship, usage limitations, and privacy of the activities to be observed. 3.6 Identify Collaborative Tools and Shared Media Agency users should consider providing guidance for the appropriate electronic, virtual, or physical tools a party might use to facilitate activities involving collaboration and coordination or for use in the acquisition, exchange, use, or management of data, information, and other Knowledge Assets. Agency users should also consider the detailed procedures a party should follow for the safe, secure, and effective use of such assets.

Conclusion 11   For purposes of procurement, deployment, establishment of usage guidelines, or ongoing usage of collaborative tools, the agency should consider the following four things: • Efficacy of a tool and its ability to successfully fulfill or support a party’s activities involving collaboration, coordination or exchange and usage of Knowledge Assets • Safety and security of, and a party’s authorization to use, a designated tool • Deployment and proper usage of the tool, including determination of when, where, by whom, for what purpose, for how long, and under what conditions the tool can be used by certain parties • Management of the tool, including acquiring, deploying, maintaining, and protecting it 3.7 Perform Records Management Records management refers to activities involving the planned, controlled, and organized docu- mentation (in a stored electronic media or paper format) of files, information, activities, and other Knowledge Assets related to a project or task. The purpose of such activities is to make these records accessible for future use and modification. Agency users should consider which Knowledge Assets need to be documented and stored in an organized way. Such assets may include data or information, formatted knowledge, tools, and other stored media relevant to business objectives and related activities. While managing a system of storage and organiza- tion, agency owners are required to (1) determine which records warrant storage, updates, and required notification to designated parties; and (2) to identify a retention policy for these records.

Next: Chapter 4 - Future Research »
Guidelines on Collaboration and Information Security for State DOTs Get This Book
×
 Guidelines on Collaboration and Information Security for State DOTs
MyNAP members save 10% online.
Login or Register to save!
Download Free PDF

State departments of transportation (DOTs) have various practices for ensuring information security, cybersecurity, and physical security, and for controlling permissions for interactive tools, which can make collaboration, information access, and knowledge sharing difficult.

The TRB National Cooperative Highway Research Program's NCHRP Research Report 1034: Guidelines on Collaboration and Information Security for State DOTs presents guidelines for facilitating secure collaboration and information sharing within state DOTs and with other transportation agencies.

Supplemental to the report are a Presentation and an Interactive Tool.

READ FREE ONLINE

  1. ×

    Welcome to OpenBook!

    You're looking at OpenBook, NAP.edu's online reading room since 1999. Based on feedback from you, our users, we've made some improvements that make it easier than ever to read thousands of publications on our website.

    Do you want to take a quick tour of the OpenBook's features?

    No Thanks Take a Tour »
  2. ×

    Show this book's table of contents, where you can jump to any chapter by name.

    « Back Next »
  3. ×

    ...or use these buttons to go back to the previous chapter or skip to the next one.

    « Back Next »
  4. ×

    Jump up to the previous page or down to the next one. Also, you can type in a page number and press Enter to go directly to that page in the book.

    « Back Next »
  5. ×

    To search the entire text of this book, type in your search term here and press Enter.

    « Back Next »
  6. ×

    Share a link to this book page on your preferred social network or via email.

    « Back Next »
  7. ×

    View our suggested citation for this chapter.

    « Back Next »
  8. ×

    Ready to take your reading offline? Click here to buy this book in print or download it as a free PDF, if available.

    « Back Next »
Stay Connected!