Indholdsbibliotek
NSM ICT-SP

Krav inkluderet i rammen

Politik
Linked frameworks
Framework
Opgaver
Involve necessary ICT security staff when making changes
2.10.2
NSM's principper for IKT-sikkerhed (Norge)
2
Test affected security functions
2.10.3
NSM's principper for IKT-sikkerhed (Norge)
1
Integrate security into the organisation’s urgent change processes
2.10.4
NSM's principper for IKT-sikkerhed (Norge)
1
Establish and maintain a comprehensive security architecture
2.2.1
NSM's principper for IKT-sikkerhed (Norge)
3
Design the ICT system using ICT products which integrate well
2.2.2
NSM's principper for IKT-sikkerhed (Norge)
2
Segment the organisation’s network in accordance with its risk profile
2.2.3
NSM's principper for IKT-sikkerhed (Norge)
4
Physically isolate the most critical subnets
2.2.4
NSM's principper for IKT-sikkerhed (Norge)
2
Partition the domain architecture in accordance with the organisation’s needs
2.2.5
NSM's principper for IKT-sikkerhed (Norge)
1
Control access to services based on knowledge of users and devices
2.2.6
NSM's principper for IKT-sikkerhed (Norge)
4
Establish a robust and resilient ICT architecture
2.2.7
NSM's principper for IKT-sikkerhed (Norge)
2
Establish centrally managed practices for security updates
2.3.1
NSM's principper for IKT-sikkerhed (Norge)
4
Reduce the risk posed by IoT devices
2.3.10
NSM's principper for IKT-sikkerhed (Norge)
4
Configure clients so that only software known to the organisation is able to execute
2.3.2
NSM's principper for IKT-sikkerhed (Norge)
6
Deactivate unnecessary functionality
2.3.3
NSM's principper for IKT-sikkerhed (Norge)
3
Establish and maintain standard security configurations
2.3.4
NSM's principper for IKT-sikkerhed (Norge)
3
Verify that activated security configurations comply with the organisation’s approved security configurations
2.3.5
NSM's principper for IKT-sikkerhed (Norge)
2
Ensure that maintenance of all configurations, installations and operations are done securely
2.3.6
NSM's principper for IKT-sikkerhed (Norge)
1
Change all standard passwords on ICT products before deployment
2.3.7
NSM's principper for IKT-sikkerhed (Norge)
2
Do not deactivate exploit protection functions
2.3.8
NSM's principper for IKT-sikkerhed (Norge)
2
Synchronize time across devices and use trusted time sources
2.3.9
NSM's principper for IKT-sikkerhed (Norge)
1
Establish access control on as many network ports as possible
2.4.1
NSM's principper for IKT-sikkerhed (Norge)
3
Encrypt all wireless and wired connections
2.4.2
NSM's principper for IKT-sikkerhed (Norge)
2
Identify physical access to switches and cables
2.4.3
NSM's principper for IKT-sikkerhed (Norge)
4
Activate firewall on all clients and servers
2.4.4
NSM's principper for IKT-sikkerhed (Norge)
4

Universal cyber compliance language model: Comply with confidence and least effort

I Cyberday er alle frameworks' krav kortlagt i universelle opgaver, så du nemt kan opnå overensstemmelse med flere frameworks.

Sikkerhedsrammer har en tendens til at dele den fælles kerne. Alle rammer dækker grundlæggende emner som risikostyring, backup, malware, personalebevidsthed eller adgangsstyring i deres respektive afsnit.
Cyberday's universelle cybersikkerhedssprogteknologi giver dig en enkelt sikkerhedsplan og sikrer, at du kun implementerer de fælles dele af rammeværkerne én gang. Du fokuserer på at implementere din plan, vi automatiserer compliance-delen - for nuværende og kommende frameworks.
Start din gratis prøveperiode
Get to know Cyberday
Start din gratis prøveperiode
Cyberday is your all-in-one solution for building a secure and compliant organization. Whether you're setting up a cyber security plan, evaluating policies, implementing tasks, or generating automated reports, Cyberday simplifies the entire process.
With AI-driven insights and a user-friendly interface, it's easier than ever to stay ahead of compliance requirements and focus on continuous improvement.
Clear framework compliance plans
Activate relevant frameworks and turn them into actionable policies tailored to your needs.
Credible reports to proof your compliance
Use guided tasks to ensure secure implementations and create professional reports with just a few clicks.
AI-powered improvement suggestions
Focus on the most impactful improvements in your compliance with help from Cyberday AI.