{"id":1389,"date":"2024-03-20T12:00:56","date_gmt":"2024-03-20T11:00:56","guid":{"rendered":"https:\/\/memority.p2.pp-izhak.fr\/2024\/03\/20\/changement-climatique-et-iso27001\/"},"modified":"2024-07-07T23:37:52","modified_gmt":"2024-07-07T21:37:52","slug":"climate-change-and-information-security","status":"publish","type":"post","link":"https:\/\/memority.p2.pp-izhak.fr\/en\/climate-change-and-information-security\/","title":{"rendered":"Climate change and information security"},"content":{"rendered":"<h3 class=\"wp-block-heading has-text-align-left\"><strong>Climate change in ISO 27001<\/strong><\/h3>\n<p class=\"has-text-align-left\">On February 22<sup>nd<\/sup>, the ISO (International Standard Organization) published, jointly with the IAF (International Accreditation Forum),\u00a0<a href=\"https:\/\/www.iso.org\/files\/live\/sites\/isoorg\/files\/standards\/popular_standards\/management_systems\/ISO-IAF%20Joint%20Communique%20Feb%202024.pdf\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>a press release<\/strong><\/a>\u00a0on the addition of climate change considerations to management system standards.<\/p>\n<p>On the next day, this publication was followed by updates of numerous standards, including\u00a0<strong>ISO 27001, dedicated to information security, which is now supplemented by two mentions concerning climate change:<\/strong><\/p>\n<ul>\n<li>Article 4.1, which deals with understanding the context of the organization, and requires that internal and external factors be considered in the company\u2019s security, now concludes with \u201c<strong>The organization shall determine whether climate change is a relevant issue.<\/strong>\u201d<\/li>\n<li>Article 4.2, which requires that the expectations of interested parties be considered by the management system, now states that \u201c<strong>Relevant interested parties can have requirements related to climate change.<\/strong>\u201d<\/li>\n<\/ul>\n<p>The international organisation\u2019s desire\u00a0<strong>to include environmental issues into their standards\u00a0<\/strong>appear to be an adaptation to the challenges of the moment. It is indeed imperative to address them, but should we stop there?<\/p>\n<p>There are two ways of dealing with the subject.<\/p>\n<div class=\"wp-block-spacer\" aria-hidden=\"true\"><\/div>\n<h3 class=\"wp-block-heading\"><strong>Reacting to change<\/strong><\/h3>\n<p><strong>First, the reactive way.<\/strong>\u00a0We are facing significant and uncertain climate changes that are likely to change our habits, our way of life and our constraints in the years to come. The main idea of these articles is to try and deal with these changes, to anticipate, to include these changes our threat models, and address them during our risk analysis exercises.<\/p>\n<p>The risks are indeed multiple, especially on the physical side:<\/p>\n<ul>\n<li><strong>Increased risk of fire or disruption of electrical supply equipment,<\/strong>\u00a0due to the increase of the global temperature<\/li>\n<li><strong>Increased risk of natural disasters\u00a0<\/strong>(fires, but also floods, large-scale weather events<\/li>\n<li><strong>Hindrance to people\u2019s mobility<\/strong>\u00a0due to climatic events and increased energy costs<\/li>\n<\/ul>\n<p>Modern needs, which are increasingly \u201cdigital\u201d, also lead to an increasing need for energy and natural resources, fuelling these risks instead of reducing them.<\/p>\n<p><strong>The 100% Cloud architecture of Memority<\/strong>\u00a0(both the Memority platform offered to customers and our internal information system)<strong>, multi-region, enables the management of some of these problems.<\/strong>\u00a0On the one hand, by ensuring active\/passive high availability across several European regions, reducing the risks induced by climate change. On the other hand, by relying on the competence and qualification of datacentre operators in terms of energy optimisation management and climate events anticipation.<\/p>\n<p>Finally, the Article 4.2 requires the consideration of our customers\u2019 requirements concerning climate change. As they have always been,\u00a0<strong>Memority\u2019s teams listen to our customers\u2019 needs in terms of resilience.<\/strong><\/p>\n<p>Companies will certainly be able to address the norm\u2019s recommendations this way, but couldn\u2019t we take an opportunity to go further?<\/p>\n<h3 class=\"wp-block-heading\"><strong>Preventing change<\/strong><\/h3>\n<p><strong>The second way to deal with this subject is the preventive way.<\/strong>\u00a0It is the challenge of our time and the generations to come: how can we change our posture and no longer settle with belated and insufficient reactions to climate change? How can we ensure that we control the climate impact of our activity? How do we ensure survival, in a nutshell? Unfortunately, I can\u2019t pretend to answer these questions, but I want to work on them the best I can.<\/p>\n<h4 class=\"wp-block-heading\"><strong>A reasonable and reasoned platform<\/strong><\/h4>\n<p>Having been a CISO in a very large company, having been a consultant in others,\u00a0<strong>I have witnessed how expensive identity and access management can be,<\/strong>\u00a0not only in terms of time but also in terms of material resources, and therefore energy.<\/p>\n<p><strong>At Memority, we mutualize and offer our skills and qualifications to help our clients as well.<\/strong>\u00a0The 100% Cloud infrastructure and the software architecture organized in micro-services allows for optimized resource pooling and avoids hardware oversizing, while keeping agility and flexibility in case of upscaling. Memority\u2019s multi-tenant architecture at the application level allows us to accommodate all our customers on the same physical infrastructure, which is sized in accordance to the load generated by all customers. This architecture also helps reducing IT actions and therefore resources consumption. Therefore, a version upgrade is conducted on the platform for all customers simultaneously, unlike single-tenant architectures where the servers are dedicated and require a version upgrade for each client.<\/p>\n<p>Recently, we have met a prospect company who manages on premise the equivalent of half of all Memority servers. Welcoming them to our platform would not induce the deployment of any new server\/service on Memority\u2019s side, while having the benefit of removing all the servers they use.<\/p>\n<p><strong>In a fragile climate context, our offer is coherent, integrated, and efficient.<\/strong>\u00a0We don\u2019t even deploy a single appliance on our customers\u2019 premises!<\/p>\n<p>Avoiding waste, optimising resources, that\u2019s already a first step.<\/p>\n<p>The principles of safety, simplification, and control of one\u2019s environment are fully aligned with the principles of energy frugality.<\/p>\n<h4 class=\"wp-block-heading\"><strong>A European and French position<\/strong><\/h4>\n<p><strong>Assuming choices of European and even French sovereignty,\u00a0<\/strong>when choosing our partnerships and suppliers, is not only a matter of data protection but also of commitment to the climate. Not unlike the logic of local food supply, using a local agent implies a shorter communication infrastructure, fewer intermediary servers, fewer resources and smaller risk exposure.<\/p>\n<p>We are also fortunate to operate in a country where electricity production is particularly carbon-free.<\/p>\n<p>In information security, when we\u2019re talking about decreasing the attack surface, we are also talking about a decrease in the consumed resources. Here as well, security and climate concerns are working in the same direction.<\/p>\n<h4 class=\"wp-block-heading\"><strong>Influencing capabilities<\/strong><\/h4>\n<p>Finally, the addition of these two sentences to the ISO 27001 norm\u00a0<strong>gives us leverage to act with our ISO 27001 certified suppliers,\u00a0<\/strong>so that they too take the climate considerations more into account.<\/p>\n<h3 class=\"wp-block-heading\"><strong>In Conclusion<\/strong><\/h3>\n<p>It is up to each of us to try to work positively, with our own means.\u00a0<strong>At Memority, we are committed to ensuring that information security and resource optimization go hand in hand in the face of climate changes,<\/strong>\u00a0within our perimeter, and that our customers benefit from this.<\/p>\n<p>We can now also rejoice that ISO and IAF have taken this first step in the right direction, with a direct positive impact on our business!<\/p>\n<p class=\"has-link-color wp-elements-075215aaa8a82f341d892155255aee0d\">-&gt; To find out more about the benefits of the Memority platform:\u00a0<a href=\"https:\/\/www.memority.com\/\">click here<\/a><\/p>\n<div class=\"wp-block-uagb-container uagb-block-bf81a720\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Climate change in ISO 27001 On February 22nd, the ISO (International Standard Organization) published, jointly with the IAF (International Accreditation Forum),\u00a0a press release\u00a0on the addition of climate change considerations to management system standards. On the next day, this publication was followed by updates of numerous standards, including\u00a0ISO 27001, dedicated to information security, which is now [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":989,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[30,31,32,33],"class_list":["post-1389","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-non-classifiee","tag-cybersecurity-en","tag-iam-en","tag-idaas-en","tag-identityfactory-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Climate change and information security - Memority<\/title>\n<meta name=\"description\" content=\"La norme ISO 27001, d\u00e9di\u00e9e \u00e0 la s\u00e9curit\u00e9 de l\u2019information, se voit d\u00e9sormais\u00a0compl\u00e9t\u00e9e de deux mentions concernant les changements climatiques.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Climate change and information security - Memority\" \/>\n<meta property=\"og:description\" content=\"La norme ISO 27001, d\u00e9di\u00e9e \u00e0 la s\u00e9curit\u00e9 de l\u2019information, se voit d\u00e9sormais\u00a0compl\u00e9t\u00e9e de deux mentions concernant les changements climatiques.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/memority.p2.pp-izhak.fr\/en\/climate-change-and-information-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Memority\" \/>\n<meta property=\"article:published_time\" content=\"2024-03-20T11:00:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-07T21:37:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/memority.p2.pp-izhak.fr\/wp-content\/uploads\/2024\/06\/Changement-climatique.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1257\" \/>\n\t<meta property=\"og:image:height\" content=\"658\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Izhak-contenu\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Izhak-contenu\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/memority.p2.pp-izhak.fr\/en\/climate-change-and-information-security\/\",\"url\":\"https:\/\/memority.p2.pp-izhak.fr\/en\/climate-change-and-information-security\/\",\"name\":\"Climate change and information security - Memority\",\"isPartOf\":{\"@id\":\"https:\/\/memority.p2.pp-izhak.fr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/memority.p2.pp-izhak.fr\/en\/climate-change-and-information-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/memority.p2.pp-izhak.fr\/en\/climate-change-and-information-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/memority.p2.pp-izhak.fr\/wp-content\/uploads\/2024\/06\/Changement-climatique.png\",\"datePublished\":\"2024-03-20T11:00:56+00:00\",\"dateModified\":\"2024-07-07T21:37:52+00:00\",\"author\":{\"@id\":\"https:\/\/memority.p2.pp-izhak.fr\/#\/schema\/person\/c6ac154af9e29cdadf1380102b48a162\"},\"description\":\"La norme ISO 27001, d\u00e9di\u00e9e \u00e0 la s\u00e9curit\u00e9 de l\u2019information, se voit d\u00e9sormais\u00a0compl\u00e9t\u00e9e de deux mentions concernant les changements climatiques.\",\"breadcrumb\":{\"@id\":\"https:\/\/memority.p2.pp-izhak.fr\/en\/climate-change-and-information-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/memority.p2.pp-izhak.fr\/en\/climate-change-and-information-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/memority.p2.pp-izhak.fr\/en\/climate-change-and-information-security\/#primaryimage\",\"url\":\"https:\/\/memority.p2.pp-izhak.fr\/wp-content\/uploads\/2024\/06\/Changement-climatique.png\",\"contentUrl\":\"https:\/\/memority.p2.pp-izhak.fr\/wp-content\/uploads\/2024\/06\/Changement-climatique.png\",\"width\":1257,\"height\":658},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/memority.p2.pp-izhak.fr\/en\/climate-change-and-information-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/memority.p2.pp-izhak.fr\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Climate change and information security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/memority.p2.pp-izhak.fr\/#website\",\"url\":\"https:\/\/memority.p2.pp-izhak.fr\/\",\"name\":\"Memority\",\"description\":\"L&#039;IDaaS europ\u00e9enau service des enjeux business\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/memority.p2.pp-izhak.fr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/memority.p2.pp-izhak.fr\/#\/schema\/person\/c6ac154af9e29cdadf1380102b48a162\",\"name\":\"Izhak-contenu\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/memority.p2.pp-izhak.fr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/60656c8b16f6a95bfb54034344a959d53d08b47923ca24bc24069dc93f6c7bf1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/60656c8b16f6a95bfb54034344a959d53d08b47923ca24bc24069dc93f6c7bf1?s=96&d=mm&r=g\",\"caption\":\"Izhak-contenu\"},\"url\":\"https:\/\/memority.p2.pp-izhak.fr\/en\/author\/izhak-contenu\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Climate change and information security - Memority","description":"La norme ISO 27001, d\u00e9di\u00e9e \u00e0 la s\u00e9curit\u00e9 de l\u2019information, se voit d\u00e9sormais\u00a0compl\u00e9t\u00e9e de deux mentions concernant les changements climatiques.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Climate change and information security - Memority","og_description":"La norme ISO 27001, d\u00e9di\u00e9e \u00e0 la s\u00e9curit\u00e9 de l\u2019information, se voit d\u00e9sormais\u00a0compl\u00e9t\u00e9e de deux mentions concernant les changements climatiques.","og_url":"https:\/\/memority.p2.pp-izhak.fr\/en\/climate-change-and-information-security\/","og_site_name":"Memority","article_published_time":"2024-03-20T11:00:56+00:00","article_modified_time":"2024-07-07T21:37:52+00:00","og_image":[{"width":1257,"height":658,"url":"https:\/\/memority.p2.pp-izhak.fr\/wp-content\/uploads\/2024\/06\/Changement-climatique.png","type":"image\/png"}],"author":"Izhak-contenu","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Izhak-contenu","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/memority.p2.pp-izhak.fr\/en\/climate-change-and-information-security\/","url":"https:\/\/memority.p2.pp-izhak.fr\/en\/climate-change-and-information-security\/","name":"Climate change and information security - Memority","isPartOf":{"@id":"https:\/\/memority.p2.pp-izhak.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/memority.p2.pp-izhak.fr\/en\/climate-change-and-information-security\/#primaryimage"},"image":{"@id":"https:\/\/memority.p2.pp-izhak.fr\/en\/climate-change-and-information-security\/#primaryimage"},"thumbnailUrl":"https:\/\/memority.p2.pp-izhak.fr\/wp-content\/uploads\/2024\/06\/Changement-climatique.png","datePublished":"2024-03-20T11:00:56+00:00","dateModified":"2024-07-07T21:37:52+00:00","author":{"@id":"https:\/\/memority.p2.pp-izhak.fr\/#\/schema\/person\/c6ac154af9e29cdadf1380102b48a162"},"description":"La norme ISO 27001, d\u00e9di\u00e9e \u00e0 la s\u00e9curit\u00e9 de l\u2019information, se voit d\u00e9sormais\u00a0compl\u00e9t\u00e9e de deux mentions concernant les changements climatiques.","breadcrumb":{"@id":"https:\/\/memority.p2.pp-izhak.fr\/en\/climate-change-and-information-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/memority.p2.pp-izhak.fr\/en\/climate-change-and-information-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/memority.p2.pp-izhak.fr\/en\/climate-change-and-information-security\/#primaryimage","url":"https:\/\/memority.p2.pp-izhak.fr\/wp-content\/uploads\/2024\/06\/Changement-climatique.png","contentUrl":"https:\/\/memority.p2.pp-izhak.fr\/wp-content\/uploads\/2024\/06\/Changement-climatique.png","width":1257,"height":658},{"@type":"BreadcrumbList","@id":"https:\/\/memority.p2.pp-izhak.fr\/en\/climate-change-and-information-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/memority.p2.pp-izhak.fr\/en\/"},{"@type":"ListItem","position":2,"name":"Climate change and information security"}]},{"@type":"WebSite","@id":"https:\/\/memority.p2.pp-izhak.fr\/#website","url":"https:\/\/memority.p2.pp-izhak.fr\/","name":"Memority","description":"L&#039;IDaaS europ\u00e9enau service des enjeux business","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/memority.p2.pp-izhak.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/memority.p2.pp-izhak.fr\/#\/schema\/person\/c6ac154af9e29cdadf1380102b48a162","name":"Izhak-contenu","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/memority.p2.pp-izhak.fr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/60656c8b16f6a95bfb54034344a959d53d08b47923ca24bc24069dc93f6c7bf1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/60656c8b16f6a95bfb54034344a959d53d08b47923ca24bc24069dc93f6c7bf1?s=96&d=mm&r=g","caption":"Izhak-contenu"},"url":"https:\/\/memority.p2.pp-izhak.fr\/en\/author\/izhak-contenu\/"}]}},"_links":{"self":[{"href":"https:\/\/memority.p2.pp-izhak.fr\/en\/wp-json\/wp\/v2\/posts\/1389","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/memority.p2.pp-izhak.fr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/memority.p2.pp-izhak.fr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/memority.p2.pp-izhak.fr\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/memority.p2.pp-izhak.fr\/en\/wp-json\/wp\/v2\/comments?post=1389"}],"version-history":[{"count":2,"href":"https:\/\/memority.p2.pp-izhak.fr\/en\/wp-json\/wp\/v2\/posts\/1389\/revisions"}],"predecessor-version":[{"id":1391,"href":"https:\/\/memority.p2.pp-izhak.fr\/en\/wp-json\/wp\/v2\/posts\/1389\/revisions\/1391"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/memority.p2.pp-izhak.fr\/en\/wp-json\/wp\/v2\/media\/989"}],"wp:attachment":[{"href":"https:\/\/memority.p2.pp-izhak.fr\/en\/wp-json\/wp\/v2\/media?parent=1389"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/memority.p2.pp-izhak.fr\/en\/wp-json\/wp\/v2\/categories?post=1389"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/memority.p2.pp-izhak.fr\/en\/wp-json\/wp\/v2\/tags?post=1389"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}