Ilmainen e-kirja: NIS2 haltuun hyödyntäen ISO 27001 -käytäntöjä
Lataa e-kirja

Vaatimuskehikkoon sisältyvät vaatimukset

1
C2M2

Asset, Change and Configuration Management (ASSET)

1.1
C2M2

Manage IT and OT Asset Inventory

1.1 (MIL1)
C2M2

Manage IT and OT Asset Inventory

1.1 (MIL2)
C2M2

Manage IT and OT Asset Inventory

1.1 (MIL3)
C2M2

Manage IT and OT Asset Inventory

1.2
C2M2

Manage Information Asset Inventory

1.2 (MIL1)
C2M2

Manage Information Asset Inventory

1.2 (MIL2)
C2M2

Manage Information Asset Inventory

1.2 (MIL3)
C2M2

Manage Information Asset Inventory

1.3
C2M2

Manage IT and OT Asset Configuration

1.3 (MIL1)
C2M2

Manage IT and OT Asset Configuration

1.3 (MIL2)
C2M2

Manage IT and OT Asset Configuration

1.3 (MIL3)
C2M2

Manage IT and OT Asset Configuration

1.4
C2M2

Manage Changes to IT and OT Assets

1.4 (MIL1)
C2M2

Manage Changes to IT and OT Assets

1.4 (MIL2)
C2M2

Manage Changes to IT and OT Assets

1.4 (MIL3)
C2M2

Manage Changes to IT and OT Assets

1.5
C2M2

Management Activities for the ASSET domain

1.5 (MIL1)
C2M2

Management Activities for the ASSET domain

1.5 (MIL2)
C2M2

Management Activities for the ASSET domain

1.5 (MIL3)
C2M2

Management Activities for the ASSET domain

10
C2M2

Cybersecurity Program Management (PROGRAM)

10.1
C2M2

Establish Cybersecurity Program Strategy

10.1 (MIL1)
C2M2

Establish Cybersecurity Program Strategy

Cybersecurity Capability Maturity Model (C2M2)

The Cybersecurity Capability Maturity Model (C2M2) helps organizations evaluate their cybersecurity capabilities and optimize security investments.

It uses a set of industry-vetted cybersecurity practices focused on both information technology (IT) and operations technology (OT) assets and environments.

Vaatimuskehikon teema-alueet

No items found.