Free ebook: NIS2 ready using ISO 27001 best practices
Download ebook

Requirements included in the framework

Cyberday

G3

Cyberday

J6

A1
Cyberday

Mobile device management

A2
Cyberday

Remote work

B1
Cyberday

Property security

B2
Cyberday

Equipment maintenance and safety

B3
Cyberday

Non-electronic data and copies

B4
Cyberday

Management of secure areas

C1
Cyberday

Incident management and response

C2
Cyberday

Data breach management

D1
Cyberday

Cyber security training

D2
Cyberday

Security guidelines

D3
Cyberday

Cyber security in contracts

E1
Cyberday

Data system management

E2
Cyberday

Access control and authentication

F1
Cyberday

Agreements and monitoring

G1
Cyberday

Secure development

G4
Cyberday

Interoperability

H1
Cyberday

Cyber security management

H2
Cyberday

Risk management

H3
Cyberday

Continuity management

J1
Cyberday

Encryption

J3
Cyberday

Security systems and logging

J4
Cyberday

Backups