Free ebook: NIS2 ready using ISO 27001 best practices
Download ebook

Choosing and using network protection systems

Critical
High
Normal
Low

Cyber criminals can exploit configuration errors or technical vulnerabilities in applications, firewalls, or networks to access our information.

An organization must use defense-in-depth technologies to protect against, detect, and respond to cyber-attacks. The techniques should be suitable for controlling physical, logical and administrative controls.

Connected other frameworks and requirements:
PR.PT-4: Communications and control networks
NIST CSF
9.2 (MIL1): Implement Network Protections as an Element of the Cybersecurity Architecture
C2M2

Endpoint security management system

Critical
High
Normal
Low

Endpoint security management system can be used to demand the desired security criteria from the devices before they are allowed to connect to the network resources. Devices can be laptops, smartphones, tablets or industry-specific hardware.

Criteria for the use of network resources may include e.g. approved operating system, VPN and antivirus systems, and the timeliness of these updates.

Connected other frameworks and requirements:
13.1.1: Network controls
ISO 27001
6.2.1: Mobile device policy
ISO 27001
PR.PT-4: Communications and control networks
NIST CSF
8.1: User endpoint devices
ISO 27001
9.3 (MIL1): Implement IT and OT Asset Security as an Element of the Cybersecurity Architecture
C2M2

Protection of wireless connections

Critical
High
Normal
Low

The use of the wireless network is secured with sufficient keys and the connection traffic to the network router is encrypted. The wireless network for guest use is isolated from the company's own internal network.

Connected other frameworks and requirements:
I05: Langattomat verkot
13.1.2: Security of network services
ISO 27001
PR.PT-4: Communications and control networks
NIST CSF
8.21: Security of network services
ISO 27001

Network usage log and process for detecting inappropriate network traffic

Critical
High
Normal
Low

An appropriate log is generated from the use of the network to enable the detection of actions relevant to cyber security.

The normal state of network traffic (traffic volumes, protocols, and connections) is known. In order to detect anomalies, there is a procedure for detecting events that are different from the normal state of network traffic (for example, anomalous connections or their attempts).

Connected other frameworks and requirements:
I11: Poikkeamien havainnointikyky ja toipuminen
12.4.1: Event logging
ISO 27001
13.1.1: Network controls
ISO 27001
PR.AC-3: Remote access management
NIST CSF
PR.AC-5: Network integrity
NIST CSF
No items found.