Inhoud bibliotheek
NSM ICT-SP

Vereisten in het raamwerk

Beleid
Linked frameworks
Framework
Taken
Control data flow between network zones
2.5.1
NSM ICT-beveiligingsbeginselen (Noorwegen)
3
Restrict access to internal services from external locations
2.5.2
NSM ICT-beveiligingsbeginselen (Noorwegen)
3
Block all direct traffic between clients
2.5.3
NSM ICT-beveiligingsbeginselen (Noorwegen)
1
Isolate vulnerable and low-trust equipment
2.5.4
NSM ICT-beveiligingsbeginselen (Noorwegen)
1
Control the data flow of especially exposed services
2.5.5
NSM ICT-beveiligingsbeginselen (Noorwegen)
2
Protect particularly critical services with their own data flow
2.5.6
NSM ICT-beveiligingsbeginselen (Noorwegen)
3
Maintain control of data flow between the organisation and its partners / service providers
2.5.7
NSM ICT-beveiligingsbeginselen (Noorwegen)
2
Direct all data flow to and from managed mobile clients via the organisation’s network
2.5.8
NSM ICT-beveiligingsbeginselen (Noorwegen)
2
Create guidelines for access control
2.6.1
NSM ICT-beveiligingsbeginselen (Noorwegen)
9
Establish a formal process for administration of accounts, access rights and privileges
2.6.2
NSM ICT-beveiligingsbeginselen (Noorwegen)
6
Use a centralised tool to manage accounts, access rights and privileges
2.6.3
NSM ICT-beveiligingsbeginselen (Noorwegen)
6
Minimise privileges for end users and special users
2.6.4
NSM ICT-beveiligingsbeginselen (Noorwegen)
4
Minimise privileges for management accounts
2.6.5
NSM ICT-beveiligingsbeginselen (Noorwegen)
5
Manage access to devices
2.6.6
NSM ICT-beveiligingsbeginselen (Noorwegen)
2
Use multifactor authentication
2.6.7
NSM ICT-beveiligingsbeginselen (Noorwegen)
4
Establish crypto strategy in the organisation
2.7.1
NSM ICT-beveiligingsbeginselen (Noorwegen)
7
Activate encryption in services which offer such functionality
2.7.2
NSM ICT-beveiligingsbeginselen (Noorwegen)
1
Encrypt storage media which contain confidential data and which can easily be lost or compromised
2.7.3
NSM ICT-beveiligingsbeginselen (Noorwegen)
3
Use encryption when transferring confidential information or when trust in the information channel is low
2.7.4
NSM ICT-beveiligingsbeginselen (Noorwegen)
2
Define security levels for different types of information
2.7.5
NSM ICT-beveiligingsbeginselen (Noorwegen)
1
Verify the sender address of incoming emails
2.8.1
NSM ICT-beveiligingsbeginselen (Noorwegen)
4
Activate STARTTLS on the organisation’s email server
2.8.2
NSM ICT-beveiligingsbeginselen (Noorwegen)
2
Only use supported email clients, browsers and plugins
2.8.3
NSM ICT-beveiligingsbeginselen (Noorwegen)
2
Only permit organisation-approved plugins
2.8.4
NSM ICT-beveiligingsbeginselen (Noorwegen)
2

Universal cyber compliance language model: Comply with confidence and least effort

In Cyberday worden alle frameworkvereisten in kaart gebracht in universele taken, zodat je moeiteloos voldoet aan meerdere frameworks.

Beveiligingsframeworks hebben meestal een gemeenschappelijke kern. Alle raamwerken behandelen basisonderwerpen zoals risicomanagement, back-up, malware, bewustzijn van personeel of toegangsbeheer in hun respectievelijke secties.
CyberdayDe universele cybersecuritytaaltechnologie creëert één beveiligingsplan en zorgt ervoor dat u de gemeenschappelijke onderdelen van frameworks slechts één keer hoeft te implementeren. U concentreert zich op het implementeren van uw plan, wij automatiseren het compliance-gedeelte - voor huidige en toekomstige frameworks.
Start uw gratis proefabonnement
Cyberday is your all-in-one solution for building a secure and compliant organization. Whether you're setting up a cyber security plan, evaluating policies, implementing tasks, or generating automated reports, Cyberday simplifies the entire process.
With AI-driven insights and a user-friendly interface, it's easier than ever to stay ahead of compliance requirements and focus on continuous improvement.
Clear framework compliance plans
Activate relevant frameworks and turn them into actionable policies tailored to your needs.
Credible reports to proof your compliance
Use guided tasks to ensure secure implementations and create professional reports with just a few clicks.
AI-powered improvement suggestions
Focus on the most impactful improvements in your compliance with help from Cyberday AI.