Public Connectivity System (SPC)

Last updated

The Public Connectivity System, also known as the System of Public Connectivity (SPC) is a network that connects Italy's government agencies, allowing them to share and exchange data and information resources. The system is managed by DigitPA.

Contents

Establishment

The system was established and is governed by the Legislative Decree of February 28, 2005, no. 42. The Decree was in turn merged into the Legislative Decree of March 7, 2005, n. 82, defined as:

"the set of Infrastructure Technology rules and techniques for developing, sharing, integration and dissemination of information assets and government data, necessary to ensure basic interoperability and application cooperation and evolved computer systems and information flows, ensuring security, confidentiality and preservation of information assets and the autonomy of each government." [1]

Basic principles

Security

Central coordination of safety management is carried out by CERT-SPC. The Local Unit Security (ULS) established in the domains related to SPC, in conjunction with the SOC (Security Operation Center) provides access to federated network SPC (Fastweb, Telecom, Wind and BT) to oversee the operational management and continuous operation. Until 2009, the management model of security in SPC also provided a Management Centre, whose duties were transferred to the SOC.

Notes

  1. "Codice dell'amministrazione digitale" (PDF). p. 53. Archived from the original (PDF) on 2009-12-28. Retrieved May 3, 2010.

Related Research Articles

<span class="mw-page-title-main">Configuration management</span> Process for maintaining consistency of a product attributes with its design

Configuration management (CM) is a systems engineering process for establishing and maintaining consistency of a product's performance, functional, and physical attributes with its requirements, design, and operational information throughout its life. The CM process is widely used by military engineering organizations to manage changes throughout the system lifecycle of complex systems, such as weapon systems, military vehicles, and information systems. Outside the military, the CM process is also used with IT service management as defined by ITIL, and with other domain models in the civil engineering and other industrial engineering segments such as roads, bridges, canals, dams, and buildings.

Interoperability is a characteristic of a product or system to work with other products or systems. While the term was initially defined for information technology or systems engineering services to allow for information exchange, a broader definition takes into account social, political, and organizational factors that impact system-to-system performance.

<span class="mw-page-title-main">Defense Information Systems Agency</span> United States Department of Defense combat support agency

The Defense Information Systems Agency (DISA), known as the Defense Communications Agency (DCA) until 1991, is a United States Department of Defense (DoD) combat support agency composed of military, federal civilians, and contractors. DISA provides information technology (IT) and communications support to the President, Vice President, Secretary of Defense, the military services, the combatant commands, and any individual or system contributing to the defense of the United States.

The Secure Communications Interoperability Protocol (SCIP) is a US standard for secure voice and data communication, for circuit-switched one-to-one connections, not packet-switched networks. SCIP derived from the US Government Future Narrowband Digital Terminal (FNBDT) project. SCIP supports a number of different modes, including national and multinational modes which employ different cryptography. Many nations and industries develop SCIP devices to support the multinational and national modes of SCIP.

A federated identity in information technology is the means of linking a person's electronic identity and attributes, stored across multiple distinct identity management systems.

Software assurance (SwA) is defined as "the level of confidence that software is free from vulnerabilities, either intentionally designed into the software or accidentally inserted at any time during its lifecycle, and that the software functions in the intended manner."

An information assurance vulnerability alert (IAVA) is an announcement of a computer application software or operating system vulnerability notification in the form of alerts, bulletins, and technical advisories identified by US-CERT, https://www.us-cert.gov/ US-CERT is managed by National Cybersecurity and Communications Integration Center (NCCIC), which is part of Cybersecurity and Infrastructure Security Agency (CISA), within the U.S. Department of Homeland Security (DHS). CISA, which includes the National Cybersecurity and Communications Integration Center (NCCIC) realigned its organizational structure in 2017, integrating like functions previously performed independently by the U.S. Computer Emergency Readiness Team (US-CERT) and the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT). These selected vulnerabilities are the mandated baseline, or minimum configuration of all hosts residing on the GIG. US-CERT analyzes each vulnerability and determines if it is necessary or beneficial to the Department of Defense to release it as an IAVA. Implementation of IAVA policy will help ensure that DoD Components take appropriate mitigating actions against vulnerabilities to avoid serious compromises to DoD computer system assets that would potentially degrade mission performance.

A chief security officer (CSO) is an organization's most senior executive accountable for the development and oversight of policies and programs intended for the mitigation and/or reduction of compliance, operational, strategic, financial and reputational security risk strategies relating to the protection of people, intellectual assets and tangible property.

Doron Tamir is a former top intelligence officer of the Israel Defense Forces who participated in the founding of the Israel National Cyber Bureau (INCB) in the office of the Prime Minister of Israel.

A cross-domain solution (CDS) is an integrated information assurance system composed of specialized software, and sometimes hardware, that provides a controlled interface to manually or automatically enable and/or restrict the access or transfer of information between two or more security domains based on a predetermined security policy. CDSs are designed to enforce domain separation and typically include some form of content filtering, which is used to designate information that is unauthorized for transfer between security domains or levels of classification, such as between different military divisions, intelligence agencies, or other operations which critically depend on the timely sharing of potentially sensitive information.

<i>Dipartimento delle Informazioni per la Sicurezza</i> Military unit

The Dipartimento delle Informazioni per la Sicurezza is a department of the Presidency of the Council of Ministers of Italy, instituted in 2007 as part of the reform of the Italian security services. The department is part of Sistema di informazione per la sicurezza della Repubblica. It is currently headed by Elisabetta Belloni, the successor to General Gennaro Vecchione.

The Centro Nazionale per l'Informatica nella Pubblica Amministrazione or CNIPA was an Italian public body which operated at the Presidency of the Council of Ministers for the implementation of the policies of the Minister for Innovation and Technology, with technical autonomy, functional, administrative, accounting and financial and independence of mind. It was established by Legislative Decree 30 June 2003, n. 196 Art. 176 in place of the Authority for IT in Public Administration (AIPA), which retains its powers. It has also been assigned by the Legislative Decree of 5 December 2003, n. 343 tasks, functions and activities carried out by the Technical Centre for the Unified Network of Public Administration (RUPA), including financial resources and equipment, as well as human resources.

<span class="mw-page-title-main">PM WIN-T</span> Military unit

PM WIN-T is a component of Program Executive Office Command, Control and Communications-Tactical in the United States Army. PM WIN-T has been absorbed into PM Tactical Networks as Product Manager for Mission Networks.

<span class="mw-page-title-main">Information security operations center</span> Facility where enterprise information systems are monitored, assessed, and defended

An information security operations center is a facility where enterprise information systems are monitored, assessed, and defended.

<span class="mw-page-title-main">Ministry of Digital Development and Transportation (Azerbaijan)</span>

The Ministry of Digital Development and Transportation is a central executive body implementing state policy and regulation in the areas of transport, including maritime transport and civil aviation, communications, high technologies.

Medical device connectivity is the establishment and maintenance of a connection through which data is transferred between a medical device, such as a patient monitor, and an information system. The term is used interchangeably with biomedical device connectivity or biomedical device integration. By eliminating the need for manual data entry, potential benefits include faster and more frequent data updates, diminished human error, and improved workflow efficiency.

<span class="mw-page-title-main">Federated Mission Networking</span>

Federated Mission Networking (FMN) is a significant initiative to help ensure interoperability and operational effectiveness of the North Atlantic Treaty Organization, it is a key contribution to the Connected Forces Initiative, helping Allied and Partner forces to better communicate, train and operate together. This includes the NATO Command Structure as well as the NATO Force Structure. The purpose of FMN is ultimately to support Command, Control, Communications, Computers, Intelligence, Surveillance and Reconnaissance (C4ISR) and decision-making in operations by enabling a rapid instantiation of mission networks. Including the NATO Command Structure, 37 nations have joined the FMN initiative as so called "FMN Affiliates" and work together under the FMN Framework Process to coordinate the design, development and delivery of operational and technical capabilities required to conduct net-centric operations. Each development increment is referred to as an "FMN Spiral". The respective requirements, architecture, standards, procedural and technical instructions are documented in so called "FMN Spiral Specifications". FMN Spiral Specifications are based on well known standards and best practices, hence supported by most off-the-shelf products and vendor neutral. TACOMS standards and profiles specify a common, technology and topology independent network interoperability layer for federated mission networks. There is also a rolling 10-year FMN Spiral Specification Roadmap of the envisioned future capabilities. At the same time, the Coalition Interoperability Assurance and Validation (CIAV) process ensures that current interoperability issues are being identified and fed back into FMN capability development.

The Network Operations Command is an Italian cyberwarfare Joint military unit. Until its merger with the Comando C4 Difesa in 2020 it was called Joint Cybernetic Operations Command

The National Cryptologic Center (CCN) is a Spanish intelligence agency within the National Intelligence Center responsible for cryptanalyzing and deciphering by manual procedures, electronic media and cryptophony, as well as to carry out technological-cryptographic investigations and to train the personnel specialized in cryptology. The CCN is legally regulated by Royal Decree 421/2004, of March 12.

eu-LISA

The European Union Agency for the Operational Management of Large-Scale IT Systems in the Area of Freedom, Security and Justice (eu-LISA) is an agency of the European Union (EU) that was founded in 2011 to ensure the uninterrupted operation of large-scale IT systems within the area of freedom, security and justice (AFSJ), that are instrumental in the implementation of the asylum, border management and migration policies of the EU. It began its operational activities on 1 December 2012. The current establishing regulation entered into force on 11 December 2018, repealing the previous regulation and expanding the Agency's mandate. The new mandate strengthens the Agency's capacity to improve, design and develop information systems for European security, border management and migration, and broadens the scope of the Agency's work on research, innovation, testing and on the possibility to support the development of pilot projects and proofs of concept.