Free ebook: NIS2 ready using ISO 27001 best practices
Download ebook

Requirements included in the framework

J5
Cyberday

Network security

K1
Cyberday

Management of data sets

K2
Cyberday

Removable media

K2
Cyberday

Data classification

L2
Cyberday

Informing and data subject requests

L3
Cyberday

Security and responsibilities

L4
Cyberday

Privacy by design and default

L5
Cyberday

Data transfer and disclosure

Om
Cyberday

Omavalvonta