Iso-23234-2021 3
Iso-23234-2021 3
STANDARD 23234
First edition
2021-02
Corrected version
2021-05
Reference number
ISO 23234:2021(E)
© ISO 2021
ISO 23234:2021(E)
Contents Page
Foreword...........................................................................................................................................................................................................................................v
Introduction................................................................................................................................................................................................................................. vi
1 Scope.................................................................................................................................................................................................................................. 1
2 Normative references....................................................................................................................................................................................... 1
3 Terms and definitions...................................................................................................................................................................................... 1
4 Planning of security measures for the built environment......................................................................................... 5
4.1 General............................................................................................................................................................................................................ 5
4.2 Security planning as part of risk management............................................................................................................ 6
4.3 Size of projects......................................................................................................................................................................................... 6
4.4 Division of the building process into stages................................................................................................................... 6
4.4.1 General...................................................................................................................................................................................... 6
4.4.2 Strategic definition.......................................................................................................................................................... 7
4.4.3 Preparation and brief.................................................................................................................................................... 8
4.4.4 Concept design................................................................................................................................................................... 8
4.4.5 Developed and technical design.......................................................................................................................... 8
4.4.6 Construction......................................................................................................................................................................... 8
4.4.7 Testing and handover................................................................................................................................................... 9
4.4.8 In use........................................................................................................................................................................................... 9
4.4.9 Decommissioning............................................................................................................................................................. 9
4.5
4.6
iTeh STANDARD PREVIEW
Organization and principal............................................................................................................................................................ 9
Special advisers in security projects.................................................................................................................................. 10
4.6.1 (standards.iteh.ai)
General................................................................................................................................................................................... 10
4.6.2 Security planner............................................................................................................................................................. 10
4.6.3 Security risk adviser ISO ...................................................................................................................................................
23234:2021 10
4.6.4https://standards.iteh.ai/catalog/standards/sist/96b467ad-f7d6-48d8-982a-
Technical security adviser..................................................................................................................................... 11
4.6.5 Operational security adviser............................................................................................................................... 12
4dc205d79d93/iso-23234-2021
4.6.6 Project information security adviser............................................................................................................ 12
5 Security deliverables in stages............................................................................................................................................................13
5.1 Strategic definition............................................................................................................................................................................ 13
5.1.1 Asset inventory............................................................................................................................................................... 13
5.1.2 Protective security objectives............................................................................................................................. 13
5.1.3 Requirements for protective security planning.................................................................................. 14
5.1.4 Threat assessment, scenario selection and design-basis threats........................................ 14
5.1.5 Information security for the project............................................................................................................. 15
5.1.6 Security risk analysis (strategic)...................................................................................................................... 15
5.1.7 Clarification of conditions...................................................................................................................................... 15
5.2 Preparation and brief...................................................................................................................................................................... 16
5.2.1 Input to the dependency map............................................................................................................................. 16
5.2.2 Security risk analysis (preparation and brief)..................................................................................... 16
5.2.3 External requirements report............................................................................................................................ 16
5.2.4 Security strategy............................................................................................................................................................ 17
5.2.5 Input to zoning................................................................................................................................................................ 17
5.2.6 Input to the spatial and functional programming............................................................................. 17
5.2.7 Identification and assessment of security measures..................................................................... 17
5.2.8 Cost survey.......................................................................................................................................................................... 17
5.2.9 Contributions to preliminary design report.......................................................................................... 18
5.3 Concept design...................................................................................................................................................................................... 18
5.3.1 Reassessment of security objectives............................................................................................................ 18
5.3.2 Security risk analysis (concept)........................................................................................................................ 18
5.3.3 Reassessment of security strategy................................................................................................................. 18
5.3.4 Description of security measures.................................................................................................................... 18
5.3.5 Integration of security measures..................................................................................................................... 19
Foreword
ISO (the International Organization for Standardization) is a worldwide federation of national standards
bodies (ISO member bodies). The work of preparing International Standards is normally carried out
through ISO technical committees. Each member body interested in a subject for which a technical
committee has been established has the right to be represented on that committee. International
organizations, governmental and non-governmental, in liaison with ISO, also take part in the work.
ISO collaborates closely with the International Electrotechnical Commission (IEC) on all matters of
electrotechnical standardization.
The procedures used to develop this document and those intended for its further maintenance are
described in the ISO/IEC Directives, Part 1. In particular, the different approval criteria needed for the
different types of ISO documents should be noted. This document was drafted in accordance with the
editorial rules of the ISO/IEC Directives, Part 2 (see www.iso.org/directives).
Attention is drawn to the possibility that some of the elements of this document may be the subject of
patent rights. ISO shall not be held responsible for identifying any or all such patent rights. Details of
any patent rights identified during the development of the document will be in the Introduction and/or
on the ISO list of patent declarations received (see www.iso.org/patents).
Any trade name used in this document is information given for the convenience of users and does not
constitute an endorsement.
For an explanation of the voluntary nature of standards, the meaning of ISO specific terms and
expressions related to conformity assessment, as well as information about ISO's adherence to the
iTeh STANDARD PREVIEW
World Trade Organization (WTO) principles in the Technical Barriers to Trade (TBT), see www.iso.org/
iso/foreword.html. (standards.iteh.ai)
This document was prepared by Technical Committee ISO/TC 59, Buildings and civil engineering works.
ISO 23234:2021
Any feedback or questions on this document should be directed to the user’s national standards body. A
https://standards.iteh.ai/catalog/standards/sist/96b467ad-f7d6-48d8-982a-
complete listing of these bodies can4dc205d79d93/iso-23234-2021
be found at www.iso.org/members.html.
This corrected version of ISO 23234:2021 incorporates the following corrections:
— Table 1 has been corrected to be consistent with the rest of the text.
Introduction
0.1 General
The objective of this document is to provide requirements and recommendations for organizations to
effectively plan security measures in order to protect their built environment (e.g. buildings, plants,
infrastructure, and property) against undesirable intentional actions.
This document describes an approach to planning security measures in the built environment based
on generic stages and corresponding security deliverables in each stage. This document also defines a
number of roles that should be assigned in the project organization to ensure that the security input to
the design and construction process has been founded on professional assessment.
For practical use, the individual organization can adapt this document to its own project model and
other organization-specific factors. This can also require that individual tasks be moved or allocated to
other stages than those specified in this document.
This document is applicable independent from the chosen risk assessment methods, standards and
guidelines for the project. Risk assessment methods are not described in this document and neither is
the design of mitigation measures.
Figure 1 shows a checklist for when this document becomes applicable.
Figure 1 — Checklist as guidance for possible use of ISO 23234 in built environment projects
1 Scope
This document provides requirements and recommendations for effective planning and design of
security measures in the built environment.
The purpose of the document is to achieve optimal protection of assets against all kinds of malicious
acts, while ensuring functional, financial, and aesthetic aspects.
The document describes which methods and routines need to be implemented in various stages of a
building or civil engineering works project, as well as the competencies needed to achieve a good result.
This document is applicable to new builds, refurbishments and development projects by government
and private entities, for various environments, buildings and infrastructure.
2 Normative references
The following documents are referred to in the text in such a way that some or all of their content
iTeh STANDARD PREVIEW
constitutes requirements of this document. For dated references, only the edition cited applies. For
undated references, the latest edition of the referenced document (including any amendments) applies.
(standards.iteh.ai)
ISO 6707-1, Buildings and civil engineering works — Vocabulary — Part 1: General terms
ISO 23234:2021
ISO 19650-5, Organization and digitization of information about buildings and civil engineering works,
https://standards.iteh.ai/catalog/standards/sist/96b467ad-f7d6-48d8-982a-
including building information modelling (BIM) — Information management using building information
4dc205d79d93/iso-23234-2021
modelling — Part 5: Security-minded approach to information management
3.4
actor
organization or individual that fulfils a role
3.5
project stage
delimited stage within a project
Note 1 to entry: A project stage can in turn be divided into sub-processes. The division is often justified on
the basis of identifying deliverables, decisions, and changes of actors (3.4). It can be adapted to the individual
organization or situation.
3.6
strategic definition
project stage (3.5) during which the justification, overarching aim, and framework of the project are
identified
3.7
preparation and brief
project stage (3.5) during which it is ascertained whether the project is feasible, and determined which
conceptual solution is most appropriate
3.8
concept design
project stage (3.5) during which principles are developed for a technical solution with realistic strategies
and plans for the project, so that a final decision on implementation can be made on a correct basis
iTeh STANDARD PREVIEW
3.9
developed design (standards.iteh.ai)
project stage (3.5) that includes coordinated and updated proposals for structural design, building
services systems, outline specifications, cost information and project strategies in accordance with the
ISO 23234:2021
design programme https://standards.iteh.ai/catalog/standards/sist/96b467ad-f7d6-48d8-982a-
4dc205d79d93/iso-23234-2021
3.10
technical design
project stage (3.5) that occurs after the developed design (3.9) has been completed and in which the
residual technical work of the core design team is completed
3.11
construction
project stage (3.5) during which deliverables are completed in accordance with plans and intentions
3.12
testing and handover
project stage (3.5) during which a fault-free technical delivery is handed over and it is ensured that all
systems are correctly adjusted to their intended use
3.13
user
organization or person which uses or is intended to use, a building or other construction works
Note 1 to entry: A user can also be the owner of the building or construction works.
[SOURCE: ISO/TR 15686-11:2014, 3.1.131, modified — "animal or object" has been deleted; Note 1 to
entry has been deleted and replaced with a new Note 1 to entry; cross-references to terminological
entries in ISO 6707-1 have been removed.]
3.14
in use
project stage (3.5) during which technically sound and economic operation is ensured that satisfies the
user's requirements for the project and that provides the intended effect
3.15
decommissioning
project stage (3.5) during which a viable and prudent conclusion to ownership or period of use is
ensured
3.16
asset
item, thing or entity that has potential or actual value to an organization
Note 1 to entry: Value can be tangible or intangible, financial, or non-financial, and includes consideration of risks
(3.20) and liabilities. It can be positive or negative at different stages of the asset life.
Note 2 to entry: Physical assets usually refer to equipment, inventory and properties owned by the organization.
Physical assets are the opposite of intangible assets, which are non-physical assets such as leases, brands, digital
assets, use rights, licences, intellectual property rights, reputation, or agreements.
Note 3 to entry: A grouping of assets referred to as an asset system could also be considered as an asset.
Note 4 to entry: Life, health and welfare of humans and other living beings can also be an asset.
Note 5 to entry: In the context of this document, organization can be understood as both owner and user of the
physical asset in question.
[SOURCE: ISO 55000:2014, 3.2.1, modified — Notes 4 and 5 to entry have been added.]
3.17
vulnerability
iTeh STANDARD PREVIEW
lack of resilience against an undesirable intentional action or inability to recover a new stable condition
of an asset (3.16) (standards.iteh.ai)
3.18
threat ISO 23234:2021
potential, deliberate action that can cause harm to an asset (3.16)
https://standards.iteh.ai/catalog/standards/sist/96b467ad-f7d6-48d8-982a-
4dc205d79d93/iso-23234-2021
Note 1 to entry: A threat is always related to a threat actor (3.4), which can be an individual or an organization.
3.19
design-basis threat
threat (3.18) used as a basis for preparing security measures
3.20
risk
effect of uncertainty on objectives
Note 1 to entry: An effect is a deviation from the expected. It can be positive, negative or both, and can address,
create or result in opportunities and threats (3.18).
Note 2 to entry: Objectives can have different aspects and categories, and can be applied at different levels.
Note 3 to entry: Risk is usually expressed in terms of risk sources, potential events, their consequences, and their
likelihood.
Note 4 to entry: In the context of protective security (3.2) against threats, risk is usually expressed in terms of
threat, impact, and vulnerability (3.17).
Note 5 to entry: In the context of this document, risk is used as a negative deviation.
[SOURCE: ISO 31000:2018, 3.1, modified — Notes 4 and 5 to entry have been added.]
3.21
residual risk
risk (3.20) remaining after risk treatment
Note 1 to entry: Residual risk can contain unidentified risk.
Note 3 to entry: “Risk treatment” in this document means carrying out mitigating measures to reduce the risk.
[SOURCE: ISO Guide 73:2009, 3.8.1.6, modified — Note 3 to entry has been added.]
3.22
risk assessment
overall process of risk (3.20) identification, risk analysis (3.23) and risk evaluation
[SOURCE: ISO Guide 73:2009, 3.4.1]
3.23
risk analysis
process to comprehend the nature of risk (3.20) and to determine the level of risk
Note 1 to entry: Risk analysis provides the basis for risk evaluation and decisions about risk treatment.
3.27
project manager
person with the responsibility for planning, executing, and closing off a project
3.28
supplier
person or organization supplying materials or products
Note 1 to entry: In this document, supplier can also mean person or organization supplying services.
[SOURCE: ISO 6707-2:2017, 3.8.30, modified— Note 1 to entry has been added.]
3.29
security deliverable
security-specific written report, memorandum, drawing, digital information model, product solution
or other documentable work based on specialist professional input
Note 1 to entry: The security deliverable is normally a sub-element of or input to the project to be executed.