Indholdsbibliotek
NSM ICT-SP

Krav inkluderet i rammen

Politik
Linked frameworks
Framework
Opgaver
Identify the organisation’s strategy and priorities
1.1.1
NSM's principper for IKT-sikkerhed (Norge)
2
Identify the organisation’s structures and processes for security management
1.1.2
NSM's principper for IKT-sikkerhed (Norge)
7
Identify the organisation’s processes for ICT risk management
1.1.3
NSM's principper for IKT-sikkerhed (Norge)
7
Identify the organisation’s tolerances for ICT risk
1.1.4
NSM's principper for IKT-sikkerhed (Norge)
2
Identify the organisation’s deliverables, information systems and supporting ICT functions
1.1.5
NSM's principper for IKT-sikkerhed (Norge)
6
Identify information processing and data flow
1.1.6
NSM's principper for IKT-sikkerhed (Norge)
5
Establish a process to identify devices and software in use at the organisation
1.2.1
NSM's principper for IKT-sikkerhed (Norge)
2
Establish organisational guidelines for approved devices and software
1.2.2
NSM's principper for IKT-sikkerhed (Norge)
4
Identify devices in use at the organisation
1.2.3
NSM's principper for IKT-sikkerhed (Norge)
4
Identify the software in use at the organisation
1.2.4
NSM's principper for IKT-sikkerhed (Norge)
2
Identify the users of the information systems
1.3.1
NSM's principper for IKT-sikkerhed (Norge)
4
Identify and define the different user categories
1.3.2
NSM's principper for IKT-sikkerhed (Norge)
1
Identify roles and responsibilities linked especially to ICT security
1.3.3
NSM's principper for IKT-sikkerhed (Norge)
2
Include security in the organisation’s procurement process
2.1.1
NSM's principper for IKT-sikkerhed (Norge)
3
Review the service provider’s security when outsourcing
2.1.10
NSM's principper for IKT-sikkerhed (Norge)
6
Procure modern and up-to-date hardware and software
2.1.2
NSM's principper for IKT-sikkerhed (Norge)
2
Prefer ICT products which have been certified and evaluated by a trusted third party
2.1.3
NSM's principper for IKT-sikkerhed (Norge)
1
Reduce the risk of targeted manipulation of ICT products in the supply chain
2.1.4
NSM's principper for IKT-sikkerhed (Norge)
6
Use a secure software development method
2.1.5
NSM's principper for IKT-sikkerhed (Norge)
6
Use separate environments for development, test and production
2.1.6
NSM's principper for IKT-sikkerhed (Norge)
2
Implement adequate testing throughout the development process
2.1.7
NSM's principper for IKT-sikkerhed (Norge)
3
Maintain the software code developed/used by the organisation
2.1.8
NSM's principper for IKT-sikkerhed (Norge)
5
Maintain security responsibility during outsourcing
2.1.9
NSM's principper for IKT-sikkerhed (Norge)
5
Include security in the organisation’s change management process
2.10.1
NSM's principper for IKT-sikkerhed (Norge)
3

Universal cyber compliance language model: Comply with confidence and least effort

I Cyberday er alle frameworks' krav kortlagt i universelle opgaver, så du nemt kan opnå overensstemmelse med flere frameworks.

Sikkerhedsrammer har en tendens til at dele den fælles kerne. Alle rammer dækker grundlæggende emner som risikostyring, backup, malware, personalebevidsthed eller adgangsstyring i deres respektive afsnit.
Cyberday's universelle cybersikkerhedssprogteknologi giver dig en enkelt sikkerhedsplan og sikrer, at du kun implementerer de fælles dele af rammeværkerne én gang. Du fokuserer på at implementere din plan, vi automatiserer compliance-delen - for nuværende og kommende frameworks.
Start din gratis prøveperiode
Get to know Cyberday
Start din gratis prøveperiode
Cyberday is your all-in-one solution for building a secure and compliant organization. Whether you're setting up a cyber security plan, evaluating policies, implementing tasks, or generating automated reports, Cyberday simplifies the entire process.
With AI-driven insights and a user-friendly interface, it's easier than ever to stay ahead of compliance requirements and focus on continuous improvement.
Clear framework compliance plans
Activate relevant frameworks and turn them into actionable policies tailored to your needs.
Credible reports to proof your compliance
Use guided tasks to ensure secure implementations and create professional reports with just a few clicks.
AI-powered improvement suggestions
Focus on the most impactful improvements in your compliance with help from Cyberday AI.