Free ebook: NIS2 ready using ISO 27001 best practices
Download ebook

Requirements included in the framework

10.1 (MIL2)
C2M2

Establish Cybersecurity Program Strategy

10.1 (MIL3)
C2M2

Establish Cybersecurity Program Strategy

10.2
C2M2

Establish and Maintain Cybersecurity Program

10.2 (MIL1)
C2M2

Establish and Maintain Cybersecurity Program

10.2 (MIL2)
C2M2

Establish and Maintain Cybersecurity Program

10.2 (MIL3)
C2M2

Establish and Maintain Cybersecurity Program

10.3
C2M2

Management Activities for the PROGRAM domain

10.3 (MIL1)
C2M2

Management Activities for the PROGRAM domain

10.3 (MIL2)
C2M2

Management Activities for the PROGRAM domain

10.3 (MIL3)
C2M2

Management Activities for the PROGRAM domain

2
C2M2

Threat and Vulnerability Management (THREAT)

2.1
C2M2

Reduce Cybersecurity Vulnerabilities

2.1 (MIL1)
C2M2

Reduce Cybersecurity Vulnerabilities

2.1 (MIL2)
C2M2

Reduce Cybersecurity Vulnerabilities

2.1 (MIL3)
C2M2

Reduce Cybersecurity Vulnerabilities

2.2
C2M2

Respond to Threats and Share Threat Information

2.2 (MIL1)
C2M2

Respond to Threats and Share Threat Information

2.2 (MIL2)
C2M2

Respond to Threats and Share Threat Information

2.2 (MIL3)
C2M2

Respond to Threats and Share Threat Information

2.3
C2M2

Management Activities for the THREAT domain

2.3 (MIL1)
C2M2

Management Activities for the THREAT domain

2.3 (MIL2)
C2M2

Management Activities for the THREAT domain

2.3 (MIL3)
C2M2

Management Activities for the THREAT domain

3
C2M2

Risk Management (RISK)