Protect
Once you have identified your assets and performed risk analysis, you can start to protect these assets from cybersecurity risks.Â
On this page you will learn what is being expected from the NIS2 law and what kind of solutions Kappa Data can offer you.Â
Protect definition from Cyberfundamentals Framework
Guidelines and Obiligations from CCB Belgium
In the Cyberfudamentals framework of CCB Belgium a list of measures are described where you can find the headlines below :
- Identities and credentials are issued, managed, verified, revoked and audited for authorized devices
- Physical access to assets is managed and protected
- Access permissions and authorizations are managed, incorporating, the principles of least privilege and separation of duties
- Network integrity (network segregation, network segmentation..) is protected
- Identities are proofed and bound to credentials and asserted in interactions
- All users are informed and trained
- Privileged users understand their roles and responsibilities
- Third-party stakeholders (like suppliers, customers, partners) understand their roles and responsibilities.
- Senior Executives understand their roles and responsibilities
- Physical security and cybersecurity personnel understand their roles and responsibilities
- Data-at rest is protected
- Data-in transit is protected
- Assets are formally managed throughout removal, transfers and disposition
- Adequate capacity to ensure availability is maintained
- Protection against data leaks are implemented
- Integrity checking mechanisms are used to verify software, firmware and information integrity
- The development and testing environment(s) are separate from the production environment
- Integrity checking mechanisms are used to verify hardware integrity
- A baseline configuration of information technology/industrial control systems is created and maintained incorporating security policies
- A System Development Life Cycle to manage systems is implemented
- Configuration change control processes are in place
- Backups of information are conducted, maintained and tested
- Policy and regulations regarding the physical operating environment for organizational assets are met.
- Data is destroyed according to policy
- Protection processes are improved
- Effectiveness of protection technologies is shared
- Response plan (incident response and business continuity) and recovery plans (Incident Recovery and Disaster Recovery) are in place and managed.
- Cybersecurity is included in human resources practices (deprovisioning, personnel screening…)
- A vulnerability management plan is developed and implemented.
- Maintenance and repair of organizational assets are performed and logged, with approved and controlled tools.
- Remote maintenance of organizational assets is approved, logged, and performed in a manner that prevents unauthorized access.
- Audit/log records are determined, documented, implemented, and reviewed in accordance with policy.
- Removable media is protected, and its use restricted according to policy.
- The principle of least functionality is incorporated by configuring systems to provide only essential capabilities.
- Communications and control networks are protected.