Indholdsbibliotek
NSM ICT-SP

Krav inkluderet i rammen

Politik
Linked frameworks
Framework
Opgaver
Control data flow between network zones
2.5.1
NSM's principper for IKT-sikkerhed (Norge)
3
Restrict access to internal services from external locations
2.5.2
NSM's principper for IKT-sikkerhed (Norge)
3
Block all direct traffic between clients
2.5.3
NSM's principper for IKT-sikkerhed (Norge)
1
Isolate vulnerable and low-trust equipment
2.5.4
NSM's principper for IKT-sikkerhed (Norge)
1
Control the data flow of especially exposed services
2.5.5
NSM's principper for IKT-sikkerhed (Norge)
2
Protect particularly critical services with their own data flow
2.5.6
NSM's principper for IKT-sikkerhed (Norge)
3
Maintain control of data flow between the organisation and its partners / service providers
2.5.7
NSM's principper for IKT-sikkerhed (Norge)
2
Direct all data flow to and from managed mobile clients via the organisation’s network
2.5.8
NSM's principper for IKT-sikkerhed (Norge)
2
Create guidelines for access control
2.6.1
NSM's principper for IKT-sikkerhed (Norge)
9
Establish a formal process for administration of accounts, access rights and privileges
2.6.2
NSM's principper for IKT-sikkerhed (Norge)
6
Use a centralised tool to manage accounts, access rights and privileges
2.6.3
NSM's principper for IKT-sikkerhed (Norge)
6
Minimise privileges for end users and special users
2.6.4
NSM's principper for IKT-sikkerhed (Norge)
4
Minimise privileges for management accounts
2.6.5
NSM's principper for IKT-sikkerhed (Norge)
5
Manage access to devices
2.6.6
NSM's principper for IKT-sikkerhed (Norge)
2
Use multifactor authentication
2.6.7
NSM's principper for IKT-sikkerhed (Norge)
4
Establish crypto strategy in the organisation
2.7.1
NSM's principper for IKT-sikkerhed (Norge)
7
Activate encryption in services which offer such functionality
2.7.2
NSM's principper for IKT-sikkerhed (Norge)
1
Encrypt storage media which contain confidential data and which can easily be lost or compromised
2.7.3
NSM's principper for IKT-sikkerhed (Norge)
3
Use encryption when transferring confidential information or when trust in the information channel is low
2.7.4
NSM's principper for IKT-sikkerhed (Norge)
2
Define security levels for different types of information
2.7.5
NSM's principper for IKT-sikkerhed (Norge)
1
Verify the sender address of incoming emails
2.8.1
NSM's principper for IKT-sikkerhed (Norge)
4
Activate STARTTLS on the organisation’s email server
2.8.2
NSM's principper for IKT-sikkerhed (Norge)
2
Only use supported email clients, browsers and plugins
2.8.3
NSM's principper for IKT-sikkerhed (Norge)
2
Only permit organisation-approved plugins
2.8.4
NSM's principper for IKT-sikkerhed (Norge)
2

Universal cyber compliance language model: Comply with confidence and least effort

I Cyberday er alle frameworks' krav kortlagt i universelle opgaver, så du nemt kan opnå overensstemmelse med flere frameworks.

Sikkerhedsrammer har en tendens til at dele den fælles kerne. Alle rammer dækker grundlæggende emner som risikostyring, backup, malware, personalebevidsthed eller adgangsstyring i deres respektive afsnit.
Cyberday's universelle cybersikkerhedssprogteknologi giver dig en enkelt sikkerhedsplan og sikrer, at du kun implementerer de fælles dele af rammeværkerne én gang. Du fokuserer på at implementere din plan, vi automatiserer compliance-delen - for nuværende og kommende frameworks.
Start din gratis prøveperiode
Get to know Cyberday
Start din gratis prøveperiode
Cyberday is your all-in-one solution for building a secure and compliant organization. Whether you're setting up a cyber security plan, evaluating policies, implementing tasks, or generating automated reports, Cyberday simplifies the entire process.
With AI-driven insights and a user-friendly interface, it's easier than ever to stay ahead of compliance requirements and focus on continuous improvement.
Clear framework compliance plans
Activate relevant frameworks and turn them into actionable policies tailored to your needs.
Credible reports to proof your compliance
Use guided tasks to ensure secure implementations and create professional reports with just a few clicks.
AI-powered improvement suggestions
Focus on the most impactful improvements in your compliance with help from Cyberday AI.