Ilmainen e-kirja: NIS2 haltuun hyödyntäen ISO 27001 -käytäntöjä
Lataa e-kirja

Vaatimuskehikkoon sisältyvät vaatimukset

3.1
C2M2

Establish and Maintain Cyber Risk Management Strategy and Program

3.1 (MIL1)
C2M2

Establish and Maintain Cyber Risk Management Strategy and Program

3.1 (MIL2)
C2M2

Establish and Maintain Cyber Risk Management Strategy and Program

3.1 (MIL3)
C2M2

Establish and Maintain Cyber Risk Management Strategy and Program

3.2
C2M2

Identify Cyber Risk

3.2 (MIL1)
C2M2

Identify Cyber Risk

3.2 (MIL2)
C2M2

Identify Cyber Risk

3.2 (MIL3)
C2M2

Identify Cyber Risk

3.3
C2M2

Analyze Cyber Risk

3.3 (MIL1)
C2M2

Analyze Cyber Risk

3.3 (MIL2)
C2M2

Analyze Cyber Risk

3.3 (MIL3)
C2M2

Analyze Cyber Risk

3.4
C2M2

Respond to Cyber Risk

3.4 (MIL1)
C2M2

Respond to Cyber Risk

3.4 (MIL2)
C2M2

Respond to Cyber Risk

3.4 (MIL3)
C2M2

Respond to Cyber Risk

3.5
C2M2

Management Activities for the RISK domain

3.5 (MIL1)
C2M2

Management Activities for the RISK domain

3.5 (MIL2)
C2M2

Management Activities for the RISK domain

3.5 (MIL3)
C2M2

Management Activities for the RISK domain

4
C2M2

Identity and Access Management (ACCESS)

4.1
C2M2

Establish Identities and Manage Authentication

4.1 (MIL1)
C2M2

Establish Identities and Manage Authentication

4.1 (MIL2)
C2M2

Establish Identities and Manage Authentication

Cybersecurity Capability Maturity Model (C2M2)

The Cybersecurity Capability Maturity Model (C2M2) helps organizations evaluate their cybersecurity capabilities and optimize security investments.

It uses a set of industry-vetted cybersecurity practices focused on both information technology (IT) and operations technology (OT) assets and environments.

Vaatimuskehikon teema-alueet

No items found.