{"id":955,"date":"2024-07-16T13:33:18","date_gmt":"2024-07-16T13:33:18","guid":{"rendered":"https:\/\/nis2compliant.org\/?p=955"},"modified":"2024-08-14T19:52:06","modified_gmt":"2024-08-14T19:52:06","slug":"how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001","status":"publish","type":"post","link":"https:\/\/nis2compliant.org\/de\/so-implementieren-sie-nis-2-cybersicherheitsmasnahmen-mapping-mit-iso-27001\/","title":{"rendered":"So implementieren Sie NIS 2-Cybersicherheitsma\u00dfnahmen: Zuordnung zu ISO 27001"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"955\" class=\"elementor elementor-955\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-31ee495 elementor-section-boxed elementor-section-height-default elementor-section-height-default tf-sticky-section tf-sticky-no\" data-id=\"31ee495\" data-element_type=\"section\" data-settings=\"{&quot;tf_sticky&quot;:&quot;no&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f5e6b28\" data-id=\"f5e6b28\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c5c2f41 elementor-widget elementor-widget-heading\" data-id=\"c5c2f41\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.22.0 - 26-06-2024 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">So implementieren Sie NIS 2-Cybersicherheitsma\u00dfnahmen: Zuordnung zu ISO 27001\n<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ba9bbc elementor-widget elementor-widget-image\" data-id=\"1ba9bbc\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.22.0 - 26-06-2024 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"448\" src=\"https:\/\/nis2compliant.org\/wp-content\/uploads\/2024\/07\/nis2articleimage3-1024x573.png\" class=\"attachment-large size-large wp-image-956\" alt=\"\" srcset=\"https:\/\/nis2compliant.org\/wp-content\/uploads\/2024\/07\/nis2articleimage3-1024x573.png 1024w, https:\/\/nis2compliant.org\/wp-content\/uploads\/2024\/07\/nis2articleimage3-300x168.png 300w, https:\/\/nis2compliant.org\/wp-content\/uploads\/2024\/07\/nis2articleimage3-768x430.png 768w, https:\/\/nis2compliant.org\/wp-content\/uploads\/2024\/07\/nis2articleimage3-1536x860.png 1536w, https:\/\/nis2compliant.org\/wp-content\/uploads\/2024\/07\/nis2articleimage3-18x10.png 18w, https:\/\/nis2compliant.org\/wp-content\/uploads\/2024\/07\/nis2articleimage3.png 1879w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3b7beef elementor-widget elementor-widget-text-editor\" data-id=\"3b7beef\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.22.0 - 26-06-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p><span style=\"font-weight: 400;\">Wenn Sie NIS 2 einhalten m\u00fcssen, fragen Sie sich vielleicht, wie Sie dabei vorgehen sollen. Die Richtlinie beschreibt, was Sie erreichen m\u00fcssen, gibt aber keine Anleitung dazu, wie Sie dies erreichen.<\/span><\/p><p><span style=\"font-weight: 400;\">Eine der besten M\u00f6glichkeiten, diese Compliance-Aufgabe anzugehen, besteht darin, einem etablierten Cybersicherheitsrahmen zu folgen. In diesem Artikel werde ich untersuchen, ob ISO 27001, der f\u00fchrende internationale Cybersicherheitsstandard, dabei helfen kann, diese Anforderungen zu erf\u00fcllen.<\/span><\/p><p><span style=\"font-weight: 400;\">ISO 27001 kann die meisten Cybersicherheitsanforderungen von NIS 2 abdecken, mit Ausnahme der Vorfallberichterstattung.<\/span><\/p><h3><b>Welche Anforderungen an Cybersicherheit und Berichterstattung enth\u00e4lt NIS 2?<\/b><\/h3><p><span style=\"font-weight: 400;\">Schauen wir uns an, was Unternehmen umsetzen m\u00fcssen. Interessanterweise sind nur drei Artikel der gesamten NIS-2-Richtlinie f\u00fcr wichtige Organisationen, die konform werden m\u00fcssen, besonders relevant.<\/span><\/p><p><b>\u00a0\u00a0\u00a0\u00a0Artikel 20 \u2013 Governance<\/b><\/p><p><b>\u00a0\u00a0\u00a0\u00a0Artikel 21 \u2013 Ma\u00dfnahmen zum Risikomanagement im Bereich der Cybersicherheit<\/b><\/p><p><b>\u00a0\u00a0\u00a0\u00a0Artikel 23 \u2013 Meldepflichten<\/b><\/p><p><span style=\"font-weight: 400;\">Alle anderen NIS 2-Artikel richten sich grunds\u00e4tzlich an staatliche Stellen, die NIS 2 durchsetzen m\u00fcssen.<\/span><\/p><p><span style=\"font-weight: 400;\">Eine detaillierte Aufschl\u00fcsselung der Anforderungen aus Artikel 20 und 21 finden Sie in der folgenden Tabelle.<\/span><\/p><p><b>Ist ISO 27001 f\u00fcr NIS 2 relevant?<\/b><\/p><p><span style=\"font-weight: 400;\">Obwohl NIS 2 ISO 27001 nicht explizit erw\u00e4hnt, empfiehlt es die Verwendung \u201erelevanter europ\u00e4ischer und internationaler Standards\u201c. Dar\u00fcber hinaus schl\u00e4gt die Pr\u00e4ambel von NIS 2 vor, die Normenreihe ISO\/IEC 27000 zur Umsetzung von Cybersicherheitsma\u00dfnahmen zu verwenden.<\/span><\/p><p><span style=\"font-weight: 400;\">ISO 27001 genie\u00dft bei ENISA, der Agentur der Europ\u00e4ischen Union f\u00fcr Cybersicherheit, hohes Ansehen:<\/span><\/p><p><span style=\"font-weight: 400;\">ENISA-Mapping-Tool: ENISA hat ein Tool entwickelt, das die Klauseln und Kontrollen von ISO 27001 den Anforderungen der urspr\u00fcnglichen NIS-Richtlinie (dem Vorg\u00e4nger von NIS 2) zuordnet.<\/span><\/p><p><span style=\"font-weight: 400;\">Bericht 2017: Im Bericht \u201eMapping of OES Security Requirements to Specific Sectors\u201c (Zuordnung der OES-Sicherheitsanforderungen zu bestimmten Sektoren) identifizierte ENISA ISO 27001 als den am h\u00e4ufigsten befolgten Standard von Betreibern wesentlicher Dienste (OES), die die alte NIS-Richtlinie einhalten m\u00fcssen.<\/span><\/p><p><span style=\"font-weight: 400;\">Bericht 2021: Der Bericht \u201eNIS Investments\u201c stellte fest, dass die Mehrheit der Organisationen (51,11 TP3T), die die alte NIS-Richtlinie einhalten, ihre Systeme und Prozesse auf der Grundlage der ISO 27001-Zertifizierung zertifiziert haben.<\/span><\/p><p><span style=\"font-weight: 400;\">Unter Ber\u00fccksichtigung dieser Punkte sowie der weltweiten Akzeptanz von ISO 27001 als ISO-Standard und seiner herausragenden Stellung in der ISO 27000-Reihe ist ISO 27001 eine logische Wahl f\u00fcr die Erreichung der NIS 2-Konformit\u00e4t.<\/span><\/p><h2><b>Karte der NIS 2-Artikel mit ISO 27001-Klauseln und -Kontrollen<\/b><\/h2>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4352d58 elementor-widget elementor-widget-text-editor\" data-id=\"4352d58\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>\u00a0<\/p><div><div dir=\"ltr\" style=\"margin-left: 0pt;\" align=\"left\"><table style=\"border: none;\"><colgroup> <col width=\"170\" \/> <col width=\"134\" \/> <col width=\"152\" \/> <col width=\"144\" \/><\/colgroup><tbody><tr style=\"height: 38.75pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; background-color: #44b3e1; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Arial, sans-serif; color: #ffffff; background-color: transparent; font-weight: bold; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">NIS 2-Anforderung<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; background-color: #44b3e1; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Arial, sans-serif; color: #ffffff; background-color: transparent; font-weight: bold; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">NIS 2 Artikel<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; background-color: #44b3e1; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Arial, sans-serif; color: #ffffff; background-color: transparent; font-weight: bold; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">ISO 27001-Klausel oder -Kontrolle<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; background-color: #44b3e1; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Arial, sans-serif; color: #ffffff; background-color: transparent; font-weight: bold; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Vorgeschlagenes Dokument<\/span><\/p><\/td><\/tr><tr style=\"height: 68.75pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Die Leitungsgremien m\u00fcssen die Ma\u00dfnahmen zum Risikomanagement im Bereich Cybersicherheit genehmigen<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Artikel 20 Absatz 1<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">6.1.3 Umgang mit Informationssicherheitsrisiken<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Risikobehandlungsplan<\/span><\/p><\/td><\/tr><tr style=\"height: 85.25pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Leitungsgremien m\u00fcssen die Umsetzung von Ma\u00dfnahmen zum Risikomanagement der Cybersicherheit \u00fcberwachen<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Artikel 20 Absatz 1<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">9.1 \u00dcberwachung, Messung, Analyse und Bewertung 9.2 Interne Revision 9.3 Managementbewertung<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Messbericht + Interner Pr\u00fcfbericht + Protokoll der Management\u00fcberpr\u00fcfung<\/span><\/p><\/td><\/tr><tr style=\"height: 101pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Die Mitglieder der Leitungsorgane sind verpflichtet, an Schulungen teilzunehmen und ihren Mitarbeitern regelm\u00e4\u00dfig entsprechende Schulungen anzubieten.<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Artikel 20 Absatz 2<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">7.2 Kompetenz A.6.3 Informationssicherheitsbewusstsein, -ausbildung und -schulung<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Schulungs- und Sensibilisierungsplan<\/span><\/p><\/td><\/tr><tr style=\"height: 116.75pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Unternehmen m\u00fcssen geeignete und verh\u00e4ltnism\u00e4\u00dfige technische, betriebliche und organisatorische Ma\u00dfnahmen ergreifen, um die Risiken zu managen<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Artikel 21 Absatz 1<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">6.1.3 Umgang mit Informationssicherheitsrisiken 6.2 Informationssicherheitsziele und Planung zu deren Erreichung 8.1 Operative Planung und Kontrolle<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Risikobehandlungstabelle + Risikobehandlungsplan + verschiedene unten aufgef\u00fchrte Richtlinien und Verfahren<\/span><\/p><\/td><\/tr><tr style=\"height: 181.25pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Bei der Beurteilung der Verh\u00e4ltnism\u00e4\u00dfigkeit von Ma\u00dfnahmen werden der Grad der Gef\u00e4hrdung des Unternehmens, seine Gr\u00f6\u00dfe sowie die Wahrscheinlichkeit des Auftretens von Vorf\u00e4llen und deren Schwere, einschlie\u00dflich ihrer gesellschaftlichen und wirtschaftlichen Auswirkungen, geb\u00fchrend ber\u00fccksichtigt.<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Artikel 21 Absatz 1<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">6.1.2 Risikobewertung der Informationssicherheit<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Methodik zur Risikobewertung + Tabelle zur Risikobewertung<\/span><\/p><\/td><\/tr><tr style=\"height: 44pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Richtlinie zur Risikoanalyse<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Artikel 21 Absatz 2 Buchstabe a<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">6.1.2 Risikobewertung der Informationssicherheit<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Methodik zur Risikobewertung<\/span><\/p><\/td><\/tr><tr style=\"height: 44pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Richtlinie zur Sicherheit von Informationssystemen<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Artikel 21 Absatz 2 Buchstabe a<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">5.2 Richtlinie<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Richtlinie zur Sicherheit von Informationssystemen<\/span><\/p><\/td><\/tr><tr style=\"height: 164.75pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Vorfallbehandlung<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Artikel 21 Absatz 2 Buchstabe b<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">A.5.24 Planung und Vorbereitung des Informationssicherheitsvorfallmanagements A.5.25 Bewertung und Entscheidung \u00fcber Informationssicherheitsereignisse A.5.26 Reaktion auf Informationssicherheitsvorf\u00e4lle<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Vorfallmanagementverfahren + Vorfallprotokoll<\/span><\/p><\/td><\/tr><tr style=\"height: 53pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Gesch\u00e4ftskontinuit\u00e4t<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Artikel 21 Absatz 2 Buchstabe c<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">A.5.29 Informationssicherheit bei St\u00f6rungen<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Gesch\u00e4ftskontinuit\u00e4tsplan<\/span><\/p><\/td><\/tr><tr style=\"height: 44pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Sicherungsverwaltung<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Artikel 21 Absatz 2 Buchstabe c<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">A.8.13 Informationssicherung<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Sicherungsrichtlinie<\/span><\/p><\/td><\/tr><tr style=\"height: 85.25pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Notfallwiederherstellung<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Artikel 21 Absatz 2 Buchstabe c<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">A.5.30 IKT-Bereitschaft f\u00fcr Gesch\u00e4ftskontinuit\u00e4t A.8.14 Redundanz von Informationsverarbeitungsanlagen<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Notfallwiederherstellungsplan<\/span><\/p><\/td><\/tr><tr style=\"height: 56pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Krisenmanagement<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Artikel 21 Absatz 2 Buchstabe c<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">(hat weder eine direkt relevante Klausel noch Kontrolle in ISO 27001)<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Krisenmanagementplan<\/span><\/p><\/td><\/tr><tr style=\"height: 229.25pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Sicherheit der Lieferkette, einschlie\u00dflich sicherheitsrelevanter Aspekte in Bezug auf die Beziehungen zwischen den einzelnen Unternehmen und ihren direkten Lieferanten oder Dienstleistern<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Artikel 21 Absatz 2 Buchstabe d<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">A.5.19 Informationssicherheit in Lieferantenbeziehungen A.5.20 Ber\u00fccksichtigung der Informationssicherheit in Lieferantenvereinbarungen A.5.21 Management der Informationssicherheit in der IKT-Lieferkette A.5.22 \u00dcberwachung, \u00dcberpr\u00fcfung und \u00c4nderungsmanagement von Lieferantenleistungen A.5.23 Informationssicherheit bei der Nutzung von Cloud-Diensten<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Lieferantensicherheitsrichtlinie + Sicherheitsklauseln f\u00fcr Lieferanten und Partner + Vertraulichkeitserkl\u00e4rung<\/span><\/p><\/td><\/tr><tr style=\"height: 414.5pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Sicherheit bei der Anschaffung, Entwicklung und Wartung von Netzwerk- und Informationssystemen<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Artikel 21 Absatz 2 Buchstabe e<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">A.8.6 Kapazit\u00e4tsmanagement A.8.7 Schutz vor Schadsoftware A.8.8 Management technischer Schwachstellen A.8.9 Konfigurationsmanagement A.8.25 Sicherer Entwicklungslebenszyklus A.8.26 Anwendungssicherheitsanforderungen A.8.27 Sichere Systemarchitektur und Engineering-Prinzipien A.8.28 Sichere Codierung A.8.29 Sicherheitstests in Entwicklung und Abnahme A.8.30 Ausgelagerte Entwicklung A.8.31 Trennung von Entwicklungs-, Test- und Produktionsumgebungen A8.32 \u00c4nderungsmanagement A8.33 Testinformationen<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Richtlinie f\u00fcr sichere Entwicklung + Spezifikation der Anforderungen an Informationssysteme<\/span><\/p><\/td><\/tr><tr style=\"height: 149pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Richtlinien und Verfahren zur Bewertung der Wirksamkeit von Ma\u00dfnahmen zum Risikomanagement im Bereich Cybersicherheit<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Artikel 21 Absatz 2 Buchstabe f<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">9.1 \u00dcberwachung, Messung, Analyse und Bewertung 9.2 Interne Revision 9.3 Managementbewertung<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Messmethodik + Messbericht + Internes Auditverfahren + Interne Audit-Checkliste + Interner Auditbericht + Management-\u00dcberpr\u00fcfungsverfahren<\/span><\/p><\/td><\/tr><tr style=\"height: 260.75pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Grundlegende Praktiken der Cyberhygiene<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Artikel 21 Absatz 2 Buchstabe g<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">A.6.8 Meldung von Informationssicherheitsereignissen A.7.7 Aufger\u00e4umter Schreibtisch und aufger\u00e4umter Bildschirm A.7.9 Sicherheit von Verm\u00f6genswerten au\u00dferhalb des Unternehmens A.7.10 Speichermedien A.8.1 Benutzerendger\u00e4te A.8.5 Sichere Authentifizierung A.8.7 Schutz vor Schadsoftware A8.13 Informationssicherung A8.19 Installation von Software auf Betriebssystemen A8.24 Einsatz von Kryptografie<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">IT-Sicherheitsrichtlinie<\/span><\/p><\/td><\/tr><tr style=\"height: 68.75pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Schulung zur Cybersicherheit<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Artikel 21 Absatz 2 Buchstabe g<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">7.2 Kompetenz A.6.3 Informationssicherheitsbewusstsein, -ausbildung und -schulung<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Schulungs- und Sensibilisierungsplan<\/span><\/p><\/td><\/tr><tr style=\"height: 68.75pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Richtlinien und Verfahren zur Verwendung von Kryptografie und Verschl\u00fcsselung<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Artikel 21 Absatz 2 Buchstabe h<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">A.8.24 Einsatz von Kryptographie<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Richtlinie zur Verwendung von Verschl\u00fcsselung<\/span><\/p><\/td><\/tr><tr style=\"height: 164.75pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Personalsicherheit<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Artikel 21 Absatz 2 Buchstabe i<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">A.6.1 Screening A.6.2 Besch\u00e4ftigungsbedingungen A.6.3 Bewusstsein, Schulung und Training zur Informationssicherheit A.6.4 Disziplinarverfahren A.6.5 Verantwortlichkeiten nach Beendigung oder Wechsel des Arbeitsverh\u00e4ltnisses<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Sicherheitsrichtlinie f\u00fcr die Personalabteilung<\/span><\/p><\/td><\/tr><tr style=\"height: 44pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Zugriffskontrollrichtlinien<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Artikel 21 Absatz 2 Buchstabe i<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">A.5.15 Zugangskontrolle<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Zugriffskontrollrichtlinie<\/span><\/p><\/td><\/tr><tr style=\"height: 149pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Verm\u00f6gensverwaltung<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Artikel 21 Absatz 2 Buchstabe i<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">A.5.9 Bestandsaufnahme von Informationen und anderen damit verbundenen Verm\u00f6genswerten A.5.10 Akzeptable Verwendung von Informationen und anderen damit verbundenen Verm\u00f6genswerten A.5.11 R\u00fcckgabe von Verm\u00f6genswerten A.7.9 Sicherheit von Verm\u00f6genswerten au\u00dferhalb der Gesch\u00e4ftsr\u00e4ume<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Verfahren zur Verm\u00f6gensverwaltung + Inventarisierung der Verm\u00f6genswerte<\/span><\/p><\/td><\/tr><tr style=\"height: 85.25pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Der Einsatz von Multi-Faktor-Authentifizierung oder kontinuierlichen Authentifizierungsl\u00f6sungen<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Artikel 21 Absatz 2 Buchstabe j<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">A.5.16 Identit\u00e4tsmanagement A.5.17 Authentifizierungsinformationen A.8.5 Sichere Authentifizierung<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Authentifizierungsrichtlinie<\/span><\/p><\/td><\/tr><tr style=\"height: 68.75pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Gesicherte Sprach-, Video- und Textkommunikation<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Artikel 21 Absatz 2 Buchstabe j<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">A.5.14 Informations\u00fcbertragung A.8.21 Sicherheit von Netzwerkdiensten<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Richtlinie zur Informations\u00fcbermittlung + Richtlinie zur sicheren Kommunikation<\/span><\/p><\/td><\/tr><tr style=\"height: 53pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Gesicherte Notfallkommunikationssysteme innerhalb der Einheit<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Artikel 21 Absatz 2 Buchstabe j<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">A.8.20 Netzwerksicherheit<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Richtlinie f\u00fcr sichere Kommunikation<\/span><\/p><\/td><\/tr><tr style=\"height: 181.25pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Ber\u00fccksichtigen Sie die spezifischen Schwachstellen jedes einzelnen Zulieferers und Dienstleisters sowie die allgemeine Produktqualit\u00e4t und Cybersicherheitspraktiken seiner Zulieferer und Dienstleister, einschlie\u00dflich ihrer sicheren Entwicklungsverfahren.<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Artikel 21 Absatz 3<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">A.5.19 Informationssicherheit in Lieferantenbeziehungen A.5.21 Management der Informationssicherheit in der IKT-Lieferkette A.5.22 \u00dcberwachung, \u00dcberpr\u00fcfung und \u00c4nderungsmanagement von Lieferantenleistungen A.5.23 Informationssicherheit bei der Nutzung von Cloud-Diensten<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Lieferantensicherheitsrichtlinie + Bericht zur Risikobewertung und -behandlung<\/span><\/p><\/td><\/tr><tr style=\"height: 56pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Ergreifen Sie geeignete und verh\u00e4ltnism\u00e4\u00dfige Korrekturma\u00dfnahmen<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Artikel 21 Absatz 4<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">10.2 Nichtkonformit\u00e4t und Korrekturma\u00dfnahmen<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Verfahren zur Korrekturma\u00dfnahme + Formular zur Korrekturma\u00dfnahme<\/span><\/p><\/td><\/tr><\/tbody><\/table><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8f046ed elementor-widget elementor-widget-text-editor\" data-id=\"8f046ed\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h3><b>ISO 27001 und NIS 2: Geltungsbereich und Umsetzung<\/b><\/h3><p><span style=\"font-weight: 400;\">Von den 26 in NIS 2 festgelegten Cybersicherheitsanforderungen kann ISO 27001 25 abdecken. Die einzige Ausnahme ist das Krisenmanagement, das in ISO 27001 nicht umfassend abgedeckt ist.<\/span><\/p><h3><b>Meldepflichten erf\u00fcllen<\/b><\/h3><p><span style=\"font-weight: 400;\">NIS 2 Artikel 23 schreibt spezielle Berichtspflichten vor, die mit ISO 27001 nicht vollst\u00e4ndig erf\u00fcllt werden k\u00f6nnen.<\/span><\/p><h3><b>Verwendung von ISO 27001 zur Einhaltung von NIS 2<\/b><\/h3><p><span style=\"font-weight: 400;\">Basierend auf der Zuordnung sind hier die Schritte, die mit ISO 27001 implementiert werden k\u00f6nnen:<\/span><\/p><ol><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Durchf\u00fchren einer Erstschulung<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Schreiben Sie eine Richtlinie auf h\u00f6chster Ebene zur Informationssystemsicherheit<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Definieren Sie die Risikomanagementmethode<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">F\u00fchren Sie eine Risikobewertung und Behandlung durch<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Erstellen und genehmigen Sie den Risikobehandlungsplan<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Implementieren Sie Cybersicherheitsma\u00dfnahmen<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Einrichten der Lieferkettensicherheit<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Richten Sie eine Bewertung der Cybersicherheitseffektivit\u00e4t ein<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Kontinuierliche Schulungen zur Cybersicherheit einrichten<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">F\u00fchren Sie regelm\u00e4\u00dfige interne Audits durch<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">F\u00fchren Sie regelm\u00e4\u00dfige Managementpr\u00fcfungen durch<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Korrekturma\u00dfnahmen durchf\u00fchren<\/span><\/li><\/ol><p><span style=\"font-weight: 400;\">Die Schritte 1 und 2 sind hier nicht aufgef\u00fchrt, da sie sich auf das Projektmanagement konzentrieren. Schritt 11, \u201eEinrichten von Vorfallbenachrichtigungen\u201c, ist aus zuvor erl\u00e4uterten Gr\u00fcnden nicht aufgef\u00fchrt.<\/span><\/p><h3><b>Zusammenfassung: NIS 2 vs. ISO 27001<\/b><\/h3><p><span style=\"font-weight: 400;\">Zusammenfassend l\u00e4sst sich sagen, wie ISO 27001 zur Einhaltung von NIS 2 verwendet werden kann:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">ISO 27001 kann die meisten Cybersicherheitsanforderungen von NIS 2 erf\u00fcllen, mit Ausnahme der Meldung von Vorf\u00e4llen.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">12 von 15 Implementierungsschritten k\u00f6nnen mit ISO 27001 erreicht werden.<\/span><\/li><\/ul><p><span style=\"font-weight: 400;\">Dies ist eine starke \u00dcbereinstimmung und weist darauf hin, dass ISO 27001 eine solide Wahl f\u00fcr die NIS 2-Konformit\u00e4t ist, insbesondere angesichts der Tatsache, dass NIS 2 und ENISA die Verwendung etablierter Cybersicherheitsstandards f\u00f6rdern.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>So implementieren Sie NIS 2-Cybersicherheitsma\u00dfnahmen: Zuordnung zu ISO 27001 Wenn Sie NIS 2 einhalten m\u00fcssen, fragen Sie sich m\u00f6glicherweise, wie Sie dabei vorgehen sollen. Die Richtlinie beschreibt, was Sie erreichen m\u00fcssen, bietet jedoch keine Anleitung dazu, wie Sie dies tun sollen. Eine der besten M\u00f6glichkeiten, diese Compliance-Aufgabe anzugehen [\u2026]<\/p>","protected":false},"author":4,"featured_media":956,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to implement NIS 2 cybersecurity measures: Mapping with ISO 27001 - Nis2Compliant.org<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nis2compliant.org\/de\/so-implementieren-sie-nis-2-cybersicherheitsmasnahmen-mapping-mit-iso-27001\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to implement NIS 2 cybersecurity measures: Mapping with ISO 27001 - Nis2Compliant.org\" \/>\n<meta property=\"og:description\" content=\"How to implement NIS 2 cybersecurity measures: Mapping with ISO 27001 If you need to comply with NIS 2, you might be wondering how to go about it. The directive outlines what you need to achieve but doesn&#8217;t provide guidance on how to do it. One of the best ways to tackle this compliance task [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nis2compliant.org\/de\/so-implementieren-sie-nis-2-cybersicherheitsmasnahmen-mapping-mit-iso-27001\/\" \/>\n<meta property=\"og:site_name\" content=\"Nis2Compliant.org\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-16T13:33:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-14T19:52:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nis2compliant.org\/wp-content\/uploads\/2024\/07\/nis2articleimage3.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1879\" \/>\n\t<meta property=\"og:image:height\" content=\"1052\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Matjaz Marin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Verfasst von\" \/>\n\t<meta name=\"twitter:data1\" content=\"Matjaz Marin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/nis2compliant.org\/how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001\/\",\"url\":\"https:\/\/nis2compliant.org\/how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001\/\",\"name\":\"How to implement NIS 2 cybersecurity measures: Mapping with ISO 27001 - Nis2Compliant.org\",\"isPartOf\":{\"@id\":\"https:\/\/nis2compliant.org\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/nis2compliant.org\/how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/nis2compliant.org\/how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/nis2compliant.org\/wp-content\/uploads\/2024\/07\/nis2articleimage3.png\",\"datePublished\":\"2024-07-16T13:33:18+00:00\",\"dateModified\":\"2024-08-14T19:52:06+00:00\",\"author\":{\"@id\":\"https:\/\/nis2compliant.org\/#\/schema\/person\/2970b359513cc5166b5792397f560a2d\"},\"breadcrumb\":{\"@id\":\"https:\/\/nis2compliant.org\/how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/nis2compliant.org\/how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/nis2compliant.org\/how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001\/#primaryimage\",\"url\":\"https:\/\/nis2compliant.org\/wp-content\/uploads\/2024\/07\/nis2articleimage3.png\",\"contentUrl\":\"https:\/\/nis2compliant.org\/wp-content\/uploads\/2024\/07\/nis2articleimage3.png\",\"width\":1879,\"height\":1052},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/nis2compliant.org\/how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/nis2compliant.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to implement NIS 2 cybersecurity measures: Mapping with ISO 27001\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/nis2compliant.org\/#website\",\"url\":\"https:\/\/nis2compliant.org\/\",\"name\":\"Nis2Compliant.org\",\"description\":\"The NIS 2 Directive Explained\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/nis2compliant.org\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/nis2compliant.org\/#\/schema\/person\/2970b359513cc5166b5792397f560a2d\",\"name\":\"Matjaz Marin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/nis2compliant.org\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/54a984366b70b8234bdbdcaef18066b0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/54a984366b70b8234bdbdcaef18066b0?s=96&d=mm&r=g\",\"caption\":\"Matjaz Marin\"},\"url\":\"https:\/\/nis2compliant.org\/de\/author\/matjaz-maringmail-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to implement NIS 2 cybersecurity measures: Mapping with ISO 27001 - Nis2Compliant.org","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nis2compliant.org\/de\/so-implementieren-sie-nis-2-cybersicherheitsmasnahmen-mapping-mit-iso-27001\/","og_locale":"de_DE","og_type":"article","og_title":"How to implement NIS 2 cybersecurity measures: Mapping with ISO 27001 - Nis2Compliant.org","og_description":"How to implement NIS 2 cybersecurity measures: Mapping with ISO 27001 If you need to comply with NIS 2, you might be wondering how to go about it. The directive outlines what you need to achieve but doesn&#8217;t provide guidance on how to do it. One of the best ways to tackle this compliance task [&hellip;]","og_url":"https:\/\/nis2compliant.org\/de\/so-implementieren-sie-nis-2-cybersicherheitsmasnahmen-mapping-mit-iso-27001\/","og_site_name":"Nis2Compliant.org","article_published_time":"2024-07-16T13:33:18+00:00","article_modified_time":"2024-08-14T19:52:06+00:00","og_image":[{"width":1879,"height":1052,"url":"https:\/\/nis2compliant.org\/wp-content\/uploads\/2024\/07\/nis2articleimage3.png","type":"image\/png"}],"author":"Matjaz Marin","twitter_card":"summary_large_image","twitter_misc":{"Verfasst von":"Matjaz Marin","Gesch\u00e4tzte Lesezeit":"7 Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/nis2compliant.org\/how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001\/","url":"https:\/\/nis2compliant.org\/how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001\/","name":"How to implement NIS 2 cybersecurity measures: Mapping with ISO 27001 - Nis2Compliant.org","isPartOf":{"@id":"https:\/\/nis2compliant.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nis2compliant.org\/how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001\/#primaryimage"},"image":{"@id":"https:\/\/nis2compliant.org\/how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001\/#primaryimage"},"thumbnailUrl":"https:\/\/nis2compliant.org\/wp-content\/uploads\/2024\/07\/nis2articleimage3.png","datePublished":"2024-07-16T13:33:18+00:00","dateModified":"2024-08-14T19:52:06+00:00","author":{"@id":"https:\/\/nis2compliant.org\/#\/schema\/person\/2970b359513cc5166b5792397f560a2d"},"breadcrumb":{"@id":"https:\/\/nis2compliant.org\/how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nis2compliant.org\/how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/nis2compliant.org\/how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001\/#primaryimage","url":"https:\/\/nis2compliant.org\/wp-content\/uploads\/2024\/07\/nis2articleimage3.png","contentUrl":"https:\/\/nis2compliant.org\/wp-content\/uploads\/2024\/07\/nis2articleimage3.png","width":1879,"height":1052},{"@type":"BreadcrumbList","@id":"https:\/\/nis2compliant.org\/how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nis2compliant.org\/"},{"@type":"ListItem","position":2,"name":"How to implement NIS 2 cybersecurity measures: Mapping with ISO 27001"}]},{"@type":"WebSite","@id":"https:\/\/nis2compliant.org\/#website","url":"https:\/\/nis2compliant.org\/","name":"Nis2Compliant.org","description":"The NIS 2 Directive Explained","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nis2compliant.org\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"de-DE"},{"@type":"Person","@id":"https:\/\/nis2compliant.org\/#\/schema\/person\/2970b359513cc5166b5792397f560a2d","name":"Matjaz Marin","image":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/nis2compliant.org\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/54a984366b70b8234bdbdcaef18066b0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/54a984366b70b8234bdbdcaef18066b0?s=96&d=mm&r=g","caption":"Matjaz Marin"},"url":"https:\/\/nis2compliant.org\/de\/author\/matjaz-maringmail-com\/"}]}},"_links":{"self":[{"href":"https:\/\/nis2compliant.org\/de\/wp-json\/wp\/v2\/posts\/955"}],"collection":[{"href":"https:\/\/nis2compliant.org\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nis2compliant.org\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nis2compliant.org\/de\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/nis2compliant.org\/de\/wp-json\/wp\/v2\/comments?post=955"}],"version-history":[{"count":5,"href":"https:\/\/nis2compliant.org\/de\/wp-json\/wp\/v2\/posts\/955\/revisions"}],"predecessor-version":[{"id":961,"href":"https:\/\/nis2compliant.org\/de\/wp-json\/wp\/v2\/posts\/955\/revisions\/961"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nis2compliant.org\/de\/wp-json\/wp\/v2\/media\/956"}],"wp:attachment":[{"href":"https:\/\/nis2compliant.org\/de\/wp-json\/wp\/v2\/media?parent=955"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nis2compliant.org\/de\/wp-json\/wp\/v2\/categories?post=955"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nis2compliant.org\/de\/wp-json\/wp\/v2\/tags?post=955"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}