Inhoud bibliotheek
NSM ICT-SP

Vereisten in het raamwerk

Beleid
Linked frameworks
Framework
Taken
Identify the organisation’s strategy and priorities
1.1.1
NSM ICT-beveiligingsbeginselen (Noorwegen)
2
Identify the organisation’s structures and processes for security management
1.1.2
NSM ICT-beveiligingsbeginselen (Noorwegen)
7
Identify the organisation’s processes for ICT risk management
1.1.3
NSM ICT-beveiligingsbeginselen (Noorwegen)
7
Identify the organisation’s tolerances for ICT risk
1.1.4
NSM ICT-beveiligingsbeginselen (Noorwegen)
2
Identify the organisation’s deliverables, information systems and supporting ICT functions
1.1.5
NSM ICT-beveiligingsbeginselen (Noorwegen)
6
Identify information processing and data flow
1.1.6
NSM ICT-beveiligingsbeginselen (Noorwegen)
5
Establish a process to identify devices and software in use at the organisation
1.2.1
NSM ICT-beveiligingsbeginselen (Noorwegen)
2
Establish organisational guidelines for approved devices and software
1.2.2
NSM ICT-beveiligingsbeginselen (Noorwegen)
4
Identify devices in use at the organisation
1.2.3
NSM ICT-beveiligingsbeginselen (Noorwegen)
4
Identify the software in use at the organisation
1.2.4
NSM ICT-beveiligingsbeginselen (Noorwegen)
2
Identify the users of the information systems
1.3.1
NSM ICT-beveiligingsbeginselen (Noorwegen)
4
Identify and define the different user categories
1.3.2
NSM ICT-beveiligingsbeginselen (Noorwegen)
1
Identify roles and responsibilities linked especially to ICT security
1.3.3
NSM ICT-beveiligingsbeginselen (Noorwegen)
2
Include security in the organisation’s procurement process
2.1.1
NSM ICT-beveiligingsbeginselen (Noorwegen)
3
Review the service provider’s security when outsourcing
2.1.10
NSM ICT-beveiligingsbeginselen (Noorwegen)
6
Procure modern and up-to-date hardware and software
2.1.2
NSM ICT-beveiligingsbeginselen (Noorwegen)
2
Prefer ICT products which have been certified and evaluated by a trusted third party
2.1.3
NSM ICT-beveiligingsbeginselen (Noorwegen)
1
Reduce the risk of targeted manipulation of ICT products in the supply chain
2.1.4
NSM ICT-beveiligingsbeginselen (Noorwegen)
6
Use a secure software development method
2.1.5
NSM ICT-beveiligingsbeginselen (Noorwegen)
6
Use separate environments for development, test and production
2.1.6
NSM ICT-beveiligingsbeginselen (Noorwegen)
2
Implement adequate testing throughout the development process
2.1.7
NSM ICT-beveiligingsbeginselen (Noorwegen)
3
Maintain the software code developed/used by the organisation
2.1.8
NSM ICT-beveiligingsbeginselen (Noorwegen)
5
Maintain security responsibility during outsourcing
2.1.9
NSM ICT-beveiligingsbeginselen (Noorwegen)
5
Include security in the organisation’s change management process
2.10.1
NSM ICT-beveiligingsbeginselen (Noorwegen)
3

Universal cyber compliance language model: Comply with confidence and least effort

In Cyberday worden alle frameworkvereisten in kaart gebracht in universele taken, zodat je moeiteloos voldoet aan meerdere frameworks.

Beveiligingsframeworks hebben meestal een gemeenschappelijke kern. Alle raamwerken behandelen basisonderwerpen zoals risicomanagement, back-up, malware, bewustzijn van personeel of toegangsbeheer in hun respectievelijke secties.
CyberdayDe universele cybersecuritytaaltechnologie creëert één beveiligingsplan en zorgt ervoor dat u de gemeenschappelijke onderdelen van frameworks slechts één keer hoeft te implementeren. U concentreert zich op het implementeren van uw plan, wij automatiseren het compliance-gedeelte - voor huidige en toekomstige frameworks.
Start uw gratis proefabonnement
Cyberday is your all-in-one solution for building a secure and compliant organization. Whether you're setting up a cyber security plan, evaluating policies, implementing tasks, or generating automated reports, Cyberday simplifies the entire process.
With AI-driven insights and a user-friendly interface, it's easier than ever to stay ahead of compliance requirements and focus on continuous improvement.
Clear framework compliance plans
Activate relevant frameworks and turn them into actionable policies tailored to your needs.
Credible reports to proof your compliance
Use guided tasks to ensure secure implementations and create professional reports with just a few clicks.
AI-powered improvement suggestions
Focus on the most impactful improvements in your compliance with help from Cyberday AI.