Content library
Nacionālās kiberdrošības likums (Latvia)
31: Centralizēta aizsardzība pret pakalpojumatteices kiberuzbrukumiem

Requirement description

Subjekts veic piemērotus un samērīgus tehniskos un organizatoriskos pasākumus, lai pārvaldītu kiberriskus subjekta izmantoto elektronisko sakaru tīklu un informācijas sistēmu drošībai un novērstu vai līdz minimumam samazinātu kiberincidentu ietekmi uz subjekta pakalpojumu saņēmējiem un uz citiem pakalpojumiem.

How to fill the requirement

Nacionālās kiberdrošības likums (Latvia)

31: Centralizēta aizsardzība pret pakalpojumatteices kiberuzbrukumiem

Task name
Priority
Status
Theme
Policy
Other requirements
Choosing and using network protection systems
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Technical cyber security
Virtualization
12
requirements

Examples of other requirements this task affects

PR.PT-4: Communications and control networks
NIST
ARCHITECTURE-2: Implement Network Protections as an Element of the Cybersecurity Architecture
C2M2
CC6.6: Logical access security measures against threats from sources outside system boundries
SOC 2
6.11: Alusta- ja verkkopalvelujen tietoturvallinen käyttö tietosuojan ja varautumisen kannalta
Tietoturvasuunnitelma
3.1.1: Management of secure areas
TISAX
See all related requirements and other information from tasks own page.
Go to >
Choosing and using network protection systems
1. Task description

Cyber criminals can exploit configuration errors or technical vulnerabilities in applications, firewalls, or networks to access our information.

An organization must use defense-in-depth technologies to protect against, detect, and respond to cyber-attacks. The techniques should be suitable for controlling physical, logical and administrative controls.

Implement SIEM as part of the ICT system
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Technical cyber security
Security systems and logging
7
requirements

Examples of other requirements this task affects

3.3.1: Create a plan for analysing data from security monitoring
NSM ICT-SP
3.3.7: Use analytics tools, technology and algorithms
NSM ICT-SP
3.3.3: Select tools that support manual and automated searches including criteria based alerts
NSM ICT-SP
29: Agrās brīdināšanas sensori
NIS2 Latvia
31: Centralizēta aizsardzība pret pakalpojumatteices kiberuzbrukumiem
NIS2 Latvia
See all related requirements and other information from tasks own page.
Go to >
Implement SIEM as part of the ICT system
1. Task description

Organization should use tools that support both manual and automated searches, including criteria-based searches. The tool should be able to automatically collate data from different sources to more easily determine whether an incident is genuine, as well as its scope and nature.


These operations and processes can be implemented with SIEM (Security information and event management). SIEM solutions use analytics tools, technology and algorithms (e.g., newer SIEM solutions employ applied machine learning) to help detect unknown threats and abnormalities in the security-relevant data. Also SIEM solutions allow organizations to modify already existing (which usually come pre-configured) and add criteria-based alerts to match known threats. These things will help detect threats earlier.

Protection of critical systems from Denial-of-Service (DoS) attacks
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Technical cyber security
Network security
2
requirements

Examples of other requirements this task affects

PR.DS-4: Adequate capacity to ensure availability is maintained.
CyberFundamentals
31: Centralizēta aizsardzība pret pakalpojumatteices kiberuzbrukumiem
NIS2 Latvia
See all related requirements and other information from tasks own page.
Go to >
Protection of critical systems from Denial-of-Service (DoS) attacks
1. Task description

The organization should Implement measures to secure the organization’s critical systems from Denial-of-Service (DoS) attacks, or at least limit their impact. These could include:

  • Reviewing current system vulnerabilities
  • Deploying DoS mitigation solutions such as firewalls, intrusion detection systems, and traffic filtering
  • Using cloud-based DoS protection services
  • Configuring rate limiting and monitoring traffic patterns for anomalies
  • Developing a response plan to quickly react to and mitigate the effects of DoS attacks.
Management of filtering and monitoring systems
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Technical cyber security
Network security
18
requirements

Examples of other requirements this task affects

I03: Suodatus- ja valvontajärjestelmien hallinnointi
Katakri
TEK-03: Suodatus- ja valvontajärjestelmien hallinnointi
Julkri
TEK-03.2: Suodatus- ja valvontajärjestelmien hallinnointi - dokumentointi
Julkri
TEK-03.3: Suodatus- ja valvontajärjestelmien hallinnointi - tarkastukset
Julkri
TEK-03.1: Suodatus- ja valvontajärjestelmien hallinnointi - vastuutus ja organisointi
Julkri
See all related requirements and other information from tasks own page.
Go to >
Management of filtering and monitoring systems
1. Task description

Examples of traffic filtering and monitoring systems are firewalls, routers, intrusion detection or prevention systems (IDS / IPS) and network devices / servers / applications with similar functionalities.

To ensure the functionality of filtering and monitoring:

  • An owner has been appointed for the systems, who takes care of the proper operation of the system throughout the life cycle of the data processing environment
  • It is the responsibility of the system owner to add, change, and delete settings for systems that filter or control traffic
  • Documentation of the network and associated filtering and control systems is maintained throughout its lifecycle as an integral part of the change and settings management process
  • The settings and desired operation of the systems are checked periodically during the operation and maintenance of the data processing environment and in the event of exceptional situations
Documenting and managing the firewall administration policies
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Technical cyber security
Network security
9
requirements

Examples of other requirements this task affects

FWL-02: Documenting and managing the firewall administration policies
Cyber Essentials
PR.AC-5: Network integrity (network segregation, network segmentation… ) is protected.
CyberFundamentals
2.4.1: Establish access control on as many network ports as possible
NSM ICT-SP
2.5.7: Maintain control of data flow between the organisation and its partners / service providers
NSM ICT-SP
2.4.4: Activate firewall on all clients and servers
NSM ICT-SP
See all related requirements and other information from tasks own page.
Go to >
Documenting and managing the firewall administration policies
1. Task description

The organisation must have the following firewall rules configured and documented:

  • Firewall will by default block inbound connections
  • Firewall rules are accepted and documented by appropriate and authorized individual; the business need must be included in the documentation
  • Permissive firewall rules must be removed or disabled quickly when no longer needed

Tasks included in the policy

Task name
Priority
Status
Theme
Policy
Other requirements
No items found.

Never duplicate effort. Do it once - improve compliance across frameworks.

Reach multi-framework compliance in the simplest possible way
Security frameworks tend to share the same core requirements - like risk management, backup, malware, personnel awareness or access management.
Cyberday maps all frameworks’ requirements into shared tasks - one single plan that improves all frameworks’ compliance.
Do it once - we automatically apply it to all current and future frameworks.
Get to know Cyberday
Start your free trial
Cyberday is your all-in-one solution for building a secure and compliant organization. Whether you're setting up a cyber security plan, evaluating policies, implementing tasks, or generating automated reports, Cyberday simplifies the entire process.
With AI-driven insights and a user-friendly interface, it's easier than ever to stay ahead of compliance requirements and focus on continuous improvement.
Clear framework compliance plans
Activate relevant frameworks and turn them into actionable policies tailored to your needs.
Credible reports to proof your compliance
Use guided tasks to ensure secure implementations and create professional reports with just a few clicks.
AI-powered improvement suggestions
Focus on the most impactful improvements in your compliance with help from Cyberday AI.