Compliance with CA:Sec alone, without also performing the other cybersecurity activities, is not sufficient to provide adequate cybersecurity.

There are many security-related aspects that play a critical role in providing adequate cybersecurity to computer systems, such as User Authentication, Authorization, Access Control, Privacy/Consent, Logging, Auditing, Governance and more. While these cybersecurity activities are of utmost importance, these are not included in the focus area of CA:Sec Implementation Guidance. Instead, many of these aspects are covered in other IHE profiles that are specialized in those areas.

To achieve a high degree of cybersecurity, the actors from the various IHE profiles can be grouped together, wherever possible. Alternatively, other non-IHE methods can be used.

  • No labels