单核细胞高是什么原因| 吃什么对大脑记忆力好| hiv1是什么意思| 老鼠尿是什么颜色的| 碱性磷酸酶低是什么原因| 高危妊娠监督什么意思| 4月28日是什么日子| 亲家是什么意思| 什么生肖没有牙齿| 初中毕业可以考什么证| 幽门螺杆菌感染吃什么药| 穷指什么生肖| 漂洋过海是什么生肖| 24岁属什么| 偶发性房性早搏是什么意思| 跑马什么意思| 为什么会得飞蚊症| 梦到吃螃蟹是什么意思| 高度鳞状上皮内病变是什么意思| 飞花令是什么| 修面皮是什么皮| 土命是什么意思| 李小龙是什么生肖| 喜结连理是什么意思| 小猫什么时候断奶| 百香果什么味道| 吃什么可以降低血糖| 血尿是什么颜色的| 车牌颜色代表什么| 手足口病有什么症状| 肝硬化早期吃什么药| 梦见孩子拉粑粑是什么意思| 抖s是什么意思| 梦见杀蛇是什么意思| 穿刺和活检有什么区别| 芫荽是什么| 什么是淋巴结| 月老叫什么名字| 什么样的山| 唐氏综合症是什么病| 软组织密度影什么意思| 什么牌子皮带结实耐用| 桂花代表什么生肖| 蓝五行属什么| 命好的人都有什么特征| 冷笑话是什么意思| tia是什么| 明矾是什么| 白酒配什么饮料好喝| 检查肾脏挂什么科| 酉是什么字| 细菌性毛囊炎用什么药| 做梦梦到老婆出轨是什么意思| 滴滴什么意思| 忆字五行属什么| 女性尿里带血是什么原因| 家家酒是什么意思| 王维被称为什么| 属兔五行属什么| 破壁机是干什么用的| 吃饭老是噎着是什么原因| 阳历三月是什么星座| 吃什么可以降火| 朱砂痣什么意思| 梦见吃螃蟹是什么预兆| 骆驼是什么牌子| 怡五行属性是什么| 疝气吃什么药| 拉雪橇的狗是什么狗| bbw女孩是什么意思| 三岁看小七岁看老是什么意思| 工作是为了什么| 最贵的金属是什么| 岁寒三友是指什么| 丙辰是什么时辰| 梦见胡萝卜是什么意思| 寸关尺代表什么器官| 感冒咳嗽可以吃什么水果| 吸尘器什么牌子好| 梦见自己化妆是什么意思| 前庭是什么意思| 又什么又什么造句| 阿司匹林肠溶片治什么病| 为什么空调外机不转| 香砂是什么| 一只脚面肿是什么原因| 香港代表什么生肖| 伴侣是什么| 手指甲有竖纹是什么原因| 慢性病都包括什么病| 六月六日是什么节日| 教师节唱什么歌| 1月16日什么星座| 晚上没有睡意什么原因| 小鱼缸适合养什么鱼| 什么颜色加什么颜色等于绿色| 干眼症有什么症状| 营销号是什么| 时光静好是什么意思| 什么叫无产阶级| 眼睛过敏用什么眼药水| 13点是什么意思| 萃的意思是什么| 被和谐了是什么意思| 后位子宫什么意思| 纠察是什么意思| cob是什么意思| 灰紫色是什么颜色| 体外射精什么意思| dwi是什么检查| 射线是什么| 五十年是什么婚| 根有什么作用| 618是什么| 世界上最大的鸟是什么鸟| 精子成活率低吃什么药| 细菌计数高是什么原因| 晚上9点到11点是什么时辰| 软蛋是什么意思| 6月18日什么星座| 低密度结节是什么意思| 痛心疾首的疾什么意思| 四肢厥逆是什么意思| 麒麟臂什么意思| 窥见是什么意思| 复方什么意思| 肺结核有什么症状| 宫高是什么意思| 梦见好多猫是什么意思| 宋江是一个什么样的人| 验孕棒一深一浅是什么意思| 占便宜是什么意思| 10月15号是什么星座的| 内分泌失调是什么原因| 拉谷谷女装什么档次的| 木马是什么意思| 大学211和985是什么意思| 0到3个月的婴儿惊吓吃什么药| 肛门出血是什么原因| 雪花秀属于什么档次| 命脉是什么意思| 角膜塑形镜什么牌子好| 慢热是什么意思| 蜈蚣进家有什么预兆| 扶苏姓什么| 什么伤肝| 化妆水是干什么用的| 99年属兔的是什么命| 印度是什么教| 杜甫被称为什么| 不寐病属于什么病症| 蜻蜓点水的目的是什么| 西游记什么朝代写的| 女人吃鹿茸有什么好处| 为什么低烧比高烧可怕| 儿童嗓子哑吃什么药| 无创什么时候做| 厅局级是什么级别| 物以类聚形容什么动物| 西洋参长什么样子图片| 龙井茶属于什么茶| 一个日一个斤念什么| 孩子气是什么意思| sand是什么颜色| 敌敌畏是什么| 什么药膏可以去黑头| 征信对个人有什么影响| 西腾手表属于什么档次| 打狂犬疫苗不能吃什么食物| 苹果像什么| 人为什么要喝酒| zoom 是什么意思| epr是什么| 桃子像什么| 维生素c主治什么| 绍兴本地人喝什么黄酒| 无花果和什么不能一起吃| 改姓需要什么手续| 抑郁吃什么药可以缓解情绪| 树菠萝什么时候成熟| 羊肉炖什么| 融合是什么意思| 什么什么之财| 中元节开什么生肖| 夏天吃什么养生| 拔罐紫色说明什么| 豆芽和什么一起炒好吃| 荷叶又什么又什么| 南京有什么好玩的| 虚岁是什么意思| 这个季节吃什么水果| 在于是什么意思| 援交什么意思| 酸碱度是什么意思| 精神内科一般检查什么| 皮肤属于什么组织| 诱惑是什么意思| 健胃消食片什么时候吃| 钙化影是什么意思| 砂锅是什么材料做的| 什么情况下容易怀孕| 处女膜是什么样的| 仁爱是什么意思| 神经官能症挂什么科| 2010属什么生肖| 钡餐是什么| 梦见自己得了绝症预示着什么| nag是什么意思| 排卵期一般在什么时候| 吓着了有什么症状| 尿酸高是什么造成的| 普拉提是什么运动| 免疫抑制剂是什么意思| 走路摔跤是什么征兆| 4.21什么星座| 气管憩室什么意思| 肋骨属于什么骨| 宠物兔吃什么| 大便带血是什么原因男| 89年五行属什么| 水泻拉肚子吃什么药| 结核杆菌dna检测是检查什么| 脾胃不好吃什么食物可以调理| 下面有味道用什么药| 蜜蜂为什么会蜇人| 思诺思是什么药| 罗非鱼长什么样| 用苦良心是什么意思| 身上很痒是什么原因| 乌鸦反哺是什么意思| 马拉松pb是什么意思| 扁平苔藓有什么症状| 性格是什么| 便溏吃什么药| 滑脉是什么意思| 1030是什么星座| 篮子房是什么意思| 脸部爱出油是什么原因| 为什么痛风就痛一只脚| 吃什么避孕药可以推迟月经| 扭曲是什么意思| 红虫是什么的幼虫| 欲盖弥彰什么意思| 7月16日什么星座| 上午九点多是什么时辰| 覆盖的意思是什么| fw是什么意思| eblan是什么品牌| 经常耳鸣是为什么| 破釜沉舟是什么意思| 钦此是什么意思| 四叶草代表什么意思| 红红的眼睛是什么生肖| 咳嗽出血是什么原因| hiv1是什么意思| 桦树茸的功效主治什么病| 吃什么降血压| 腾冲有什么好玩的景点| 什么原因引起尿酸高| fu是什么| VA什么意思| 饭后胃胀是什么原因导致的| 喝鲜牛奶有什么好处和坏处| 为什么喝中药越来越胖| 百度
Request demo

驻省卫计委纪检组:以规则为尺子 强化监督执纪

百度 各级政府和有关部门要把污染减排作为牵一发而动全身、纲举目张的重要工作,坚持“四个重在”的实践要领,重点抓好五个关键环节的工作,即:在调整结构中减排、走绿色发展之路,在改革创新中减排、增强绿色发展动力,在持续推进中减排、拓展绿色发展空间,在生态建设中减排、改善绿色发展环境,在保障民生中减排、共享绿色发展成果。

Businesses with operational tech (OT) environments, especially those within the EU, must understand and comply with the NIS Directive. Here’s a comprehensive overview — and an outline of how organizations can ensure compliance.

NOTE: The NIS Directive is going to be replaced by the NIS2 Directive. Learn more about NIS2 here.

When it comes to operational technology (OT), compliance is critical. Many regulations, rules, and directives have recently been formed — especially in the EU — in order to promote the secure sharing, storage, and management of sensitive data.

The Directive on Security of Network and Information System, known as the NIS Directive, was the first cybersecurity legislation passed by the EU in 2016. The NIS Directive aims to widely establish shared NIS security standards and practices across the EU. 

The NIS Directive instructs member states to implement laws that follow the “spirit” of the Directive. For this reason, it is of the utmost importance that organizations fully comprehend the NIS Directive, its objectives, and how to meet all compliance requirements that apply to them.

This article will discuss the purpose of the NIS Directive, to whom it applies, and how organizations can execute effective and enduring compliance. We will also cover the difference between the NIS and the GDPR, a well-known cybersecurity regulation for EU data, and address the unique significance of the NIS Directive.

Contents

What is the NIS Directive?
Who are the Operators of Essential Services (OES)?
Who does the NIS Directive apply to?
Incidents the NIS Directive is intended to prevent
Penalties for failing to comply with the NIS Directive
What's the difference between NIS and GDPR?
Best practices for NIS Directive compliance
Secure remote OT and access governance in the spotlight
More OT regulations: ISA/IEC 62443 and NIST 800-82
Successful NIS compliance with SSH

 

New call-to-action

What is the NIS Directive?

The NIS Directive establishes specific security technical practices, measures, and requirements for companies in EU member states. These rules apply to the operators of essential enterprise services (OES) and digital service providers (DSPs) of EU data. The NIS Directive classifies a digital service as “any service normally provided […] by electronic means and at the individual request of a recipient.”

The aim of the NIS Directive is to promote more robust, reliable cybersecurity between European nations. In the not-so-distant past, EU member states handled cybersecurity challenges at the national level, which created weak links between international digital networks. By supporting secure cross-border communications, the NIS Directive encourages safe and seamless proprietary collaboration between enterprises across the EU.

In addition to guiding individuals towards better cybersecurity practices, the NIS Directive encourages  “effective, proportionate, and dissuasive” penalties for non-compliance. However, each member state must decide and enforce NIS penalties within its own nation. 

EU member states must also possess a national framework that meets the Directive and monitors cybersecurity incidents. However, DSPs who must adhere to the NIS Directive require less rigid frameworks than operators of essential services.

Who are the Operators of Essential Services (OES)?

The NIS Directive does not directly define which organizations are to be regarded as OES. However, it includes a set of criteria for member states to identify which enterprises fall under the purview of the directive as OES.

According to Article 5(2), the criteria for the identification of the operators of essential services are as follows:

  • The entity provides a service that is essential for the maintenance of critical societal and/or economic activities.
  • The provision of that service depends on network and information systems.
  • An incident would have significant disruptive effects on the provision of that service.

Furthermore, Article 4(4) of the NIS Directive states that an OES is a “public or private entity of a type referred to in Annex II” meeting the criteria above. Examples include: 

  • Energy
  • Electricity, oil, and gas
  • Transport: air, rail water, and road
  • Drinking water supply and distribution

When you add the manufacturing industry into the mix, you can see that operational technology is strongly covered by the NIS Directive.

Who does the NIS Directive apply to?

The NIS Directive applies to all companies within the 27 EU member states, as well as any enterprise outside of the EU that leverages services available to individuals within the European Union. 

Non-EU companies that must comply with the NIS Directive must assign an EU-based representative who can act on their behalf to ensure appropriate implementation of the Directive.

Incidents the NIS Directive is intended to prevent

The NIS Directive is intended to prevent many different types of cybersecurity vulnerabilities and related attacks, including but not limited to:

  • Ransomware. When ransomware finds its way into an enterprise system, it can quickly jump from network to network. Take the WannaCry virus, which exposed a specific vulnerability in Microsoft Windows that spread through the internet. This ransomware afflicted more than 200,000 computers across 150 countries, ultimately costing up to £6 billion globally. 

  • Cyberattack side effects. When malicious software weaves its way into international enterprise networks, issues unrelated to cybersecurity arise. For example, infrastructure crashes and transport paralysis can lead to delayed operations and roadblocked or compromised communication. These problems can spiral into even more drastic consequences, all of which occur alongside the damage associated with the data compromise.

  • New-wave cyberattacks. Hackers are getting smarter every year, and the NIS Directive accounts for this by ensuring NIS practices are designed to prevent new and emerging forms of cyberattack. For instance, the infamous NotPetya malware used a non-authentic decryption-for-payment approach that resulted in a complete lack of decryption keys. NotPetya attacked the websites of Ukrainian organizations, including banks, newspapers, ministries, and electricity firms. Similar infections were reported across Germany, France, Italy, the United States, and other countries. This is just one example of the new, malicious cryptography emerging today. NotPetya also caused a power surge that left 75,000 people stranded and cost roughly £100 million.

Penalties for failing to comply with the NIS Directive

Instead of enforcing specific penalties, the NIS Directive gives individual EU member states the right to determine distinct non-compliance penalties. However, NIS clearly explains that these penalties should be “effective, proportionate, and dissuasive” — that is, they be appropriate to the nature of the non-compliance and prevent repeat charges.

NIS fines can reach up to £17 million. In addition to imposing financial penalties, the NIS Directive can:

  • Conduct assessment inspections of NIS obligations
  • Demand information notices that provide proof of NIS compliance
  • Impart enforcement notices telling organizations how to fix identified NIS failures

Organizations need to know that they can be penalized more than once under the NIS Directive. That means businesses can be fined and punished for every separate NIS violation under each aspect of the legislation.

What’s the difference between NIS and GDPR?

The GDPR (General Data Protection Regulation) is a document that seeks to promote the privacy, security, and management of personal data in the EU. GDPR defines personal data as any information that could directly or indirectly be linked back to a person and used to identify them. Personal data includes names, email addresses, locations, and web cookies.

Like the NIS Directive, GDPR laws apply to any organization that provides services to and collects data associated with residents of the European Union — even if the organization is outside of the EU itself. But the key difference between GDPR and the NIS Directive is what they pertain to. The NIS Directive aims to secure network and information systems, as well as their digital data; it covers personal data, enterprise data, and other critical information. Meanwhile, GDPR only applies to information that malicious actors could use to identify individuals.

Other differences between GDPR and the NIS Directive include the following:

  1. The NIS Directive does not apply to operators of essential services (OES) or relevant digital service providers (RDSPs) — instead, these enterprises must follow GDPR security requirements.

  2. By default, “digital data” does not include manual data — meaning the NIS Directive does not cover manual data. GDPR, on the other hand, covers data forms that are involved in filing systems.

  3. As Dennis ’t Jong, specialist inspector at the Dutch Telecom Agency, put it: “GDPR is aimed at protecting the privacy of citizens, and the NIS at protecting the cyber resilience of organizations.”

Best practices for NIS Directive compliance

In order to follow best practices for the NIS Directive, organizations should adhere to the four objectives and 14 principles of NIS compliance laid out by the Cyber Assessment Framework (CAF). The CAF was released in 2018 by the UK’s National Cyber Security Center (NCSC) and highlights ways for organizations to ensure NIS compliance.

The four objectives, and their corresponding principles, of the CAF are as follows:

Managing Security Risk

The four principles within this objective help organizations employ the appropriate policies, structures, and processes for systematically assessing and understanding NIS security risks.

  1. Governance: Putting processes and policies in place for properly conducted, controlled NIS security.
  2. Risk management: Identifying, assessing, and understanding present security risks, and establishing a steady risk management approach within an organization.
  3. Asset management: Determining all systems and services that support essential functions.
  4. Supply chain: Recognizing NIS security risks resulting from external suppliers.

 

Protecting Against Cyberattack

The six principles within this objective help organizations leverage suitable security measures around critical structures for protection against cyberattacks.

  1. Service protection and policies: Denoting appropriate processes and procedures for securing essential systems and data.

  2. Identity and access control: Comprehending, documenting, and controlling access to NIS properties that support essential functions.

  3. Data security: Preventing harm from coming to electronically transmitted and stored data, which could lead to adverse impacts. 

  4. System security: Protecting critical NIS and other technology from cyberattacks.

  5. Resilient networks and systems: Fostering resilience against cyberattacks.

  6. Staff awareness and training: Ensuring training helps staff make positive contributions to NIS cybersecurity. 

 

Detecting Cybersecurity Events

The two principles within this objective help organizations form security defenses that can properly, consistently, and rapidly detect cybersecurity incidents without negatively impacting essential operations. 

  1. Security monitoring: Detecting potential cybersecurity issues and tracking the effectiveness of existing measures.

  2. Proactive security event discovery: Spotting anomalous, irregular, and unexplained NIS events.

 

Minimizing the Impact of Cyber Security Incidents

The two principles within this objective help organizations shrink the extended impact of a cybersecurity event and restore critical functions when necessary.

  1. Response and recovery planning: Ensuring incident management and mitigation best practices are in place. 

  2. Lessons learned: Taking past incidents and implementing lessons learned from these experiences, for improved resilience of essential NIS functions.

Secure remote OT and access governance in the spotlight

Reading through all the above requirements is a hefty task, and that’s without attempting to implement all the required security measures in critical infrastructures.

But there are some fundamentals every serious company in the industrial automation business should take action on.

Article 4(7) describes an incident as “any event having an actual adverse effect on the security of network and information systems.” The term ‘security of network and information systems’ is then described under Article 4(2) as “the ability of a network or an information system to resist, at a given level of confidence, any actions that compromise the availability, authenticity, integrity, and confidentiality of stored or processed data or the related services offered by, or accessible via, those network and information systems.”

The above is an important point. It places special emphasis on how secure remote OT access to data and systems is being managed and how well the credentials that grant such access are being controlled.

We believe all OT businesses should be able to answer the following five questions.

  • What are my critical data and systems?

  • Where are my critical data and systems?

  • Who can access them?

  • Where are my keys and passwords?

  • Is my OT security future-proof?

If a company can give a sensible answer to all of the five questions above, their OT cybersecurity foundation is already in really good shape.  

More OT regulations: ISA/IEC 62443 and NIST 800-82

ISA/IEC 62443 is the global standard for the security of Industrial Control System (ICS) networks that help organizations maintain a high-security posture and mitigate the risk of ICS networks being victim to cyber-attacks.

NIST 800-82, Guide to Industrial Control Systems (ICS) Security, provides guidelines on how to protect ICS, including Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as Programmable Logic Controllers (PLC).

ISA/IEC 62443, NIST 800-82, and NIS 2.0 all put special emphasis on OT security, system and data access, and credentials management.

Successful NIS compliance with SSH

Meeting and maintaining compliance with the NIS Directive can challenge many organizations. With our PrivX OT Edition solution, companies can apply the long-standing expertise of SSH for successful NIS implementation, preservation, and lifecycle management.

PrivX OT Edition leverages built-in features that tick all the boxes for complete, confident OT secure remote access lifecycle management including:

  • Secure remote access and sharing, plus secure files and uploads

  • Lifecycle management of access and credentials

  • A straightforward and uniform platform for excellent user experience

  • Automated linking of identities to roles with advanced workflow approval for jobs

With these capabilities and more, PrivX helps OT companies meet NIS compliance and overcome a wide range of OT challenges. Learn more about PrivX OT Edition!

伤口发炎用什么药 红花泡水喝有什么功效和作用 虫草泡水喝有什么功效 黄金分割点是什么 青菜炒什么好吃
打哈欠是什么原因 二狗是什么意思 口中发甜是什么原因 酌情是什么意思 五加一笔是什么字
nicu是什么意思 被动什么意思 眩晕症是什么原因引起的 小狗能吃什么 夏天刮什么风
杜建英是宗庆后什么人 吃什么养肝护肝最好 偏头痛什么原因引起 黄芪最佳搭配是什么 仓促是什么意思
病毒感冒吃什么消炎药hcv8jop2ns6r.cn 乳腺3类是什么意思hcv8jop8ns8r.cn 生理盐水是什么hcv8jop8ns9r.cn 胃酸反流是什么原因造成hcv8jop8ns7r.cn 经期血块多是什么原因hcv8jop8ns6r.cn
女人梦见烧纸什么预兆zhongyiyatai.com 爱是什么颜色hcv8jop8ns3r.cn 喉咙发炎不能吃什么食物weuuu.com 百合什么时候种植hcv7jop4ns7r.cn tax是什么意思hcv9jop3ns1r.cn
白起为什么被赐死hcv8jop5ns4r.cn 西凤酒属于什么香型1949doufunao.com 着床出血是什么颜色helloaicloud.com 蚕屎有什么作用和功效hcv8jop2ns0r.cn 76年属什么生肖hcv7jop7ns0r.cn
卡替治疗是什么意思hcv9jop1ns6r.cn 慕名而来是什么意思hcv9jop1ns2r.cn 什么是冤亲债主hcv8jop1ns6r.cn 箬叶和粽叶有什么区别hcv8jop9ns7r.cn 辣椒炒什么好吃xianpinbao.com
百度