Inhoud bibliotheek
NSM ICT-SP

Vereisten in het raamwerk

Beleid
Linked frameworks
Framework
Taken
Plan for regular backups of all the organisation’s data
2.9.1
NSM ICT-beveiligingsbeginselen (Noorwegen)
5
Include backups of software to ensure recovery
2.9.2
NSM ICT-beveiligingsbeginselen (Noorwegen)
3
Test backups regularly
2.9.3
NSM ICT-beveiligingsbeginselen (Noorwegen)
2
Protect backups against intentional and unintentional deletion, manipulation and reading
2.9.4
NSM ICT-beveiligingsbeginselen (Noorwegen)
2
Conduct regular vulnerability assessments
3.1.1
NSM ICT-beveiligingsbeginselen (Noorwegen)
4
Subscribe to vulnerability intelligence services
3.1.2
NSM ICT-beveiligingsbeginselen (Noorwegen)
2
Use automated and centralised tools to handle known threats
3.1.3
NSM ICT-beveiligingsbeginselen (Noorwegen)
5
Determine a strategy and guidelines for security monitoring
3.2.1
NSM ICT-beveiligingsbeginselen (Noorwegen)
6
Comply with laws, regulations and the organisation’s guidelines on security monitoring
3.2.2
NSM ICT-beveiligingsbeginselen (Noorwegen)
1
Decide which parts of the ICT system to monitor
3.2.3
NSM ICT-beveiligingsbeginselen (Noorwegen)
5
Decide which data is security-relevant and should be collected
3.2.4
NSM ICT-beveiligingsbeginselen (Noorwegen)
5
Verify that the monitoring is working as intended
3.2.5
NSM ICT-beveiligingsbeginselen (Noorwegen)
3
Prevent manipulation of monitoring-data
3.2.6
NSM ICT-beveiligingsbeginselen (Noorwegen)
4
Review the security relevant monitoring-data regularly and, if necessary, reconfigure the monitoring
3.2.7
NSM ICT-beveiligingsbeginselen (Noorwegen)
3
Create a plan for analysing data from security monitoring
3.3.1
NSM ICT-beveiligingsbeginselen (Noorwegen)
7
Establish and maintain expertise on the desired state of the organisation’s information systems
3.3.2
NSM ICT-beveiligingsbeginselen (Noorwegen)
4
Select tools that support manual and automated searches including criteria based alerts
3.3.3
NSM ICT-beveiligingsbeginselen (Noorwegen)
3
Obtain and process threat information from relevant sources
3.3.4
NSM ICT-beveiligingsbeginselen (Noorwegen)
3
Continually assess whether the collected data is sufficiently relevant and detailed
3.3.5
NSM ICT-beveiligingsbeginselen (Noorwegen)
1
Establish a procedure for escalating alerts
3.3.6
NSM ICT-beveiligingsbeginselen (Noorwegen)
4
Use analytics tools, technology and algorithms
3.3.7
NSM ICT-beveiligingsbeginselen (Noorwegen)
1
Plan penetration testing with defined goals and scope
3.4.1
NSM ICT-beveiligingsbeginselen (Noorwegen)
1
Involve relevant stakeholders in advance
3.4.2
NSM ICT-beveiligingsbeginselen (Noorwegen)
1
Use vulnerability scanning tools and attack tools
3.4.3
NSM ICT-beveiligingsbeginselen (Noorwegen)
2

Universal cyber compliance language model: Comply with confidence and least effort

In Cyberday worden alle frameworkvereisten in kaart gebracht in universele taken, zodat je moeiteloos voldoet aan meerdere frameworks.

Beveiligingsframeworks hebben meestal een gemeenschappelijke kern. Alle raamwerken behandelen basisonderwerpen zoals risicomanagement, back-up, malware, bewustzijn van personeel of toegangsbeheer in hun respectievelijke secties.
CyberdayDe universele cybersecuritytaaltechnologie creëert één beveiligingsplan en zorgt ervoor dat u de gemeenschappelijke onderdelen van frameworks slechts één keer hoeft te implementeren. U concentreert zich op het implementeren van uw plan, wij automatiseren het compliance-gedeelte - voor huidige en toekomstige frameworks.
Start uw gratis proefabonnement
Cyberday is your all-in-one solution for building a secure and compliant organization. Whether you're setting up a cyber security plan, evaluating policies, implementing tasks, or generating automated reports, Cyberday simplifies the entire process.
With AI-driven insights and a user-friendly interface, it's easier than ever to stay ahead of compliance requirements and focus on continuous improvement.
Clear framework compliance plans
Activate relevant frameworks and turn them into actionable policies tailored to your needs.
Credible reports to proof your compliance
Use guided tasks to ensure secure implementations and create professional reports with just a few clicks.
AI-powered improvement suggestions
Focus on the most impactful improvements in your compliance with help from Cyberday AI.