1. The relevant entities shall take the appropriate measures to protect their network and information systems from cyber threats.
2. For the purpose of point 6.7.1, the relevant entities shall: adopt an implementation plan for the full transition towards latest generation network layer communication protocols in a secure, appropriate and gradual way and establish measures to accelerate such transition.
3. The relevant entities shall review and, where appropriate, update these measures at planned intervals and when significant incidents or significant changes to operations or risks occur.






The organization needs a structured plan for moving from legacy network communication protocols to modern, secure alternatives. This helps reduce long-term security risks while ensuring operational stability during the transition.
This planned approach supports a controlled migration to modern network protocols while maintaining service continuity and reducing exposure to protocol-level vulnerabilities.
Digiturvamallissa kaikki vaatimuskehikkojen vaatimukset kohdistetaan universaaleihin tietoturvatehtäviin, jotta voitte muodostaa yksittäisen suunnitelman, joka täyttää ison kasan vaatimuksia.
.png)