Free ebook: NIS2 ready using ISO 27001 best practices
Download ebook

Determining the responsibility of network devices

Critical
High
Normal
Low

Owners have been assigned to various network devices, who are responsible for ensuring that the information processed on the networks and related services are protected from unauthorized access. Where appropriate, liability for network equipment must be separated from other related responsibilities.

Connected other frameworks and requirements:
13.1.1: Network controls
ISO 27001
PR.AC-5: Network integrity
NIST CSF
DE.CM-1: The network monitoring
NIST CSF
8.20: Networks security
ISO 27001

Endpoint security management system

Critical
High
Normal
Low

Endpoint security management system can be used to demand the desired security criteria from the devices before they are allowed to connect to the network resources. Devices can be laptops, smartphones, tablets or industry-specific hardware.

Criteria for the use of network resources may include e.g. approved operating system, VPN and antivirus systems, and the timeliness of these updates.

Connected other frameworks and requirements:
6.2.1: Mobile device policy
ISO 27001
13.1.1: Network controls
ISO 27001
PR.PT-4: Communications and control networks
NIST CSF
8.1: User endpoint devices
ISO 27001
9.3 (MIL1): Implement IT and OT Asset Security as an Element of the Cybersecurity Architecture
C2M2

Network usage log and process for detecting inappropriate network traffic

Critical
High
Normal
Low

An appropriate log is generated from the use of the network to enable the detection of actions relevant to cyber security.

The normal state of network traffic (traffic volumes, protocols, and connections) is known. In order to detect anomalies, there is a procedure for detecting events that are different from the normal state of network traffic (for example, anomalous connections or their attempts).

Connected other frameworks and requirements:
I11: Poikkeamien havainnointikyky ja toipuminen
12.4.1: Event logging
ISO 27001
13.1.1: Network controls
ISO 27001
PR.AC-3: Remote access management
NIST CSF
PR.AC-5: Network integrity
NIST CSF

Blocking downloads of confidential information on external networks

Critical
High
Normal
Low

Often, employees want access to data systems as easily as possible - from anywhere, anytime. However, in order to protect the data, it may be desirable to prevent the data from being downloaded locally outside the self-maintained network, as the security of the network cannot be guaranteed.

Connected other frameworks and requirements:
13.1.1: Network controls
ISO 27001
13.2.1: Information transfer policies and procedures
ISO 27001
No items found.