Indholdsbibliotek
NSM ICT-SP

Krav inkluderet i rammen

Politik
Linked frameworks
Framework
Opgaver
Plan for regular backups of all the organisation’s data
2.9.1
NSM's principper for IKT-sikkerhed (Norge)
5
Include backups of software to ensure recovery
2.9.2
NSM's principper for IKT-sikkerhed (Norge)
3
Test backups regularly
2.9.3
NSM's principper for IKT-sikkerhed (Norge)
2
Protect backups against intentional and unintentional deletion, manipulation and reading
2.9.4
NSM's principper for IKT-sikkerhed (Norge)
2
Conduct regular vulnerability assessments
3.1.1
NSM's principper for IKT-sikkerhed (Norge)
4
Subscribe to vulnerability intelligence services
3.1.2
NSM's principper for IKT-sikkerhed (Norge)
2
Use automated and centralised tools to handle known threats
3.1.3
NSM's principper for IKT-sikkerhed (Norge)
5
Determine a strategy and guidelines for security monitoring
3.2.1
NSM's principper for IKT-sikkerhed (Norge)
6
Comply with laws, regulations and the organisation’s guidelines on security monitoring
3.2.2
NSM's principper for IKT-sikkerhed (Norge)
1
Decide which parts of the ICT system to monitor
3.2.3
NSM's principper for IKT-sikkerhed (Norge)
5
Decide which data is security-relevant and should be collected
3.2.4
NSM's principper for IKT-sikkerhed (Norge)
5
Verify that the monitoring is working as intended
3.2.5
NSM's principper for IKT-sikkerhed (Norge)
3
Prevent manipulation of monitoring-data
3.2.6
NSM's principper for IKT-sikkerhed (Norge)
4
Review the security relevant monitoring-data regularly and, if necessary, reconfigure the monitoring
3.2.7
NSM's principper for IKT-sikkerhed (Norge)
3
Create a plan for analysing data from security monitoring
3.3.1
NSM's principper for IKT-sikkerhed (Norge)
7
Establish and maintain expertise on the desired state of the organisation’s information systems
3.3.2
NSM's principper for IKT-sikkerhed (Norge)
4
Select tools that support manual and automated searches including criteria based alerts
3.3.3
NSM's principper for IKT-sikkerhed (Norge)
3
Obtain and process threat information from relevant sources
3.3.4
NSM's principper for IKT-sikkerhed (Norge)
3
Continually assess whether the collected data is sufficiently relevant and detailed
3.3.5
NSM's principper for IKT-sikkerhed (Norge)
1
Establish a procedure for escalating alerts
3.3.6
NSM's principper for IKT-sikkerhed (Norge)
4
Use analytics tools, technology and algorithms
3.3.7
NSM's principper for IKT-sikkerhed (Norge)
1
Plan penetration testing with defined goals and scope
3.4.1
NSM's principper for IKT-sikkerhed (Norge)
1
Involve relevant stakeholders in advance
3.4.2
NSM's principper for IKT-sikkerhed (Norge)
1
Use vulnerability scanning tools and attack tools
3.4.3
NSM's principper for IKT-sikkerhed (Norge)
2

Universal cyber compliance language model: Comply with confidence and least effort

I Cyberday er alle frameworks' krav kortlagt i universelle opgaver, så du nemt kan opnå overensstemmelse med flere frameworks.

Sikkerhedsrammer har en tendens til at dele den fælles kerne. Alle rammer dækker grundlæggende emner som risikostyring, backup, malware, personalebevidsthed eller adgangsstyring i deres respektive afsnit.
Cyberday's universelle cybersikkerhedssprogteknologi giver dig en enkelt sikkerhedsplan og sikrer, at du kun implementerer de fælles dele af rammeværkerne én gang. Du fokuserer på at implementere din plan, vi automatiserer compliance-delen - for nuværende og kommende frameworks.
Start din gratis prøveperiode
Get to know Cyberday
Start din gratis prøveperiode
Cyberday is your all-in-one solution for building a secure and compliant organization. Whether you're setting up a cyber security plan, evaluating policies, implementing tasks, or generating automated reports, Cyberday simplifies the entire process.
With AI-driven insights and a user-friendly interface, it's easier than ever to stay ahead of compliance requirements and focus on continuous improvement.
Clear framework compliance plans
Activate relevant frameworks and turn them into actionable policies tailored to your needs.
Credible reports to proof your compliance
Use guided tasks to ensure secure implementations and create professional reports with just a few clicks.
AI-powered improvement suggestions
Focus on the most impactful improvements in your compliance with help from Cyberday AI.