{"id":955,"date":"2024-07-16T13:33:18","date_gmt":"2024-07-16T13:33:18","guid":{"rendered":"https:\/\/nis2compliant.org\/?p=955"},"modified":"2024-08-14T19:52:06","modified_gmt":"2024-08-14T19:52:06","slug":"how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001","status":"publish","type":"post","link":"https:\/\/nis2compliant.org\/hr\/kako-implementirati-nis-2-mjere-cyber-sigurnosti-mapiranje-s-iso-27001\/","title":{"rendered":"Kako implementirati mjere kiberneti\u010dke sigurnosti NIS 2: Mapiranje s ISO 27001"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"955\" class=\"elementor elementor-955\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-31ee495 elementor-section-boxed elementor-section-height-default elementor-section-height-default tf-sticky-section tf-sticky-no\" data-id=\"31ee495\" data-element_type=\"section\" data-settings=\"{&quot;tf_sticky&quot;:&quot;no&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f5e6b28\" data-id=\"f5e6b28\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c5c2f41 elementor-widget elementor-widget-heading\" data-id=\"c5c2f41\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.22.0 - 26-06-2024 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">Kako implementirati mjere kiberneti\u010dke sigurnosti NIS 2: Mapiranje s ISO 27001\n<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ba9bbc elementor-widget elementor-widget-image\" data-id=\"1ba9bbc\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.22.0 - 26-06-2024 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"448\" src=\"https:\/\/nis2compliant.org\/wp-content\/uploads\/2024\/07\/nis2articleimage3-1024x573.png\" class=\"attachment-large size-large wp-image-956\" alt=\"\" srcset=\"https:\/\/nis2compliant.org\/wp-content\/uploads\/2024\/07\/nis2articleimage3-1024x573.png 1024w, https:\/\/nis2compliant.org\/wp-content\/uploads\/2024\/07\/nis2articleimage3-300x168.png 300w, https:\/\/nis2compliant.org\/wp-content\/uploads\/2024\/07\/nis2articleimage3-768x430.png 768w, https:\/\/nis2compliant.org\/wp-content\/uploads\/2024\/07\/nis2articleimage3-1536x860.png 1536w, https:\/\/nis2compliant.org\/wp-content\/uploads\/2024\/07\/nis2articleimage3-18x10.png 18w, https:\/\/nis2compliant.org\/wp-content\/uploads\/2024\/07\/nis2articleimage3.png 1879w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3b7beef elementor-widget elementor-widget-text-editor\" data-id=\"3b7beef\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.22.0 - 26-06-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p><span style=\"font-weight: 400;\">Ako se trebate uskladiti s NIS 2, mo\u017eda se pitate kako to u\u010diniti. Direktiva opisuje \u0161to trebate posti\u0107i, ali ne daje smjernice kako to u\u010diniti.<\/span><\/p><p><span style=\"font-weight: 400;\">Jedan od najboljih na\u010dina za rje\u0161avanje ovog zadatka uskla\u0111ivanja jest slijediti utvr\u0111eni okvir kiberneti\u010dke sigurnosti. U ovom \u0107u \u010dlanku istra\u017eiti mo\u017ee li ISO 27001, vode\u0107i me\u0111unarodni standard kiberneti\u010dke sigurnosti, pomo\u0107i u ispunjavanju ovih zahtjeva.<\/span><\/p><p><span style=\"font-weight: 400;\">ISO 27001 mo\u017ee pokriti ve\u0107inu zahtjeva kiberneti\u010dke sigurnosti iz NIS 2, osim za izvje\u0161\u0107ivanje o incidentima.<\/span><\/p><h3><b>Koji su zahtjevi za kiberneti\u010dku sigurnost i izvje\u0161\u0107ivanje u NIS 2?<\/b><\/h3><p><span style=\"font-weight: 400;\">Pogledajmo \u0161to tvrtke moraju implementirati. Zanimljivo je da su samo tri \u010dlanka u cijeloj NIS 2 Direktivi posebno relevantna za bitne i va\u017ene organizacije koje moraju postati uskla\u0111ene.<\/span><\/p><p><b>\u00a0\u00a0\u00a0\u00a0\u010clanak 20. \u2013 Upravljanje<\/b><\/p><p><b>\u00a0\u00a0\u00a0\u00a0\u010clanak 21. \u2013 Mjere upravljanja rizikom kiberneti\u010dke sigurnosti<\/b><\/p><p><b>\u00a0\u00a0\u00a0\u00a0\u010clanak 23. \u2013 Obveze izvje\u0161\u0107ivanja<\/b><\/p><p><span style=\"font-weight: 400;\">Svi ostali \u010dlanci NIS 2 u osnovi su namijenjeni dr\u017eavnim tijelima koja trebaju provoditi NIS 2.<\/span><\/p><p><span style=\"font-weight: 400;\">Detaljnu ra\u0161\u010dlambu zahtjeva iz \u010dlanaka 20. i 21. prona\u0107i \u0107ete u tablici u nastavku.<\/span><\/p><p><b>Je li ISO 27001 relevantan za NIS 2?<\/b><\/p><p><span style=\"font-weight: 400;\">Iako NIS 2 ne spominje izri\u010dito ISO 27001, poti\u010de kori\u0161tenje &quot;relevantnih europskih i me\u0111unarodnih standarda&quot;. Dodatno, preambula NIS 2 predla\u017ee kori\u0161tenje serije standarda ISO\/IEC 27000 za provedbu mjera kiberneti\u010dke sigurnosti.<\/span><\/p><p><span style=\"font-weight: 400;\">ENISA, Agencija Europske unije za kiberneti\u010dku sigurnost, dobro cijeni ISO 27001:<\/span><\/p><p><span style=\"font-weight: 400;\">ENISA-in alat za mapiranje: ENISA je razvila alat koji mapira klauzule i kontrole ISO 27001 u izvorne zahtjeve NIS Direktive (prethodnik NIS 2).<\/span><\/p><p><span style=\"font-weight: 400;\">Izvje\u0161\u0107e za 2017.: U izvje\u0161\u0107u \u201eMapiranje sigurnosnih zahtjeva OES-a za odre\u0111ene sektore,\u201d ENISA je identificirala ISO 27001 kao standard koji naj\u010de\u0161\u0107e slijede operateri osnovnih usluga (OES) koji moraju biti u skladu sa starom NIS Direktivom.<\/span><\/p><p><span style=\"font-weight: 400;\">Izvje\u0161\u0107e za 2021.: Izvje\u0161\u0107e \u201cNIS Investments\u201d navodi da je ve\u0107ina organizacija (51.1%) koje su u skladu sa starom NIS Direktivom certificirala svoje sustave i procese na temelju certifikata ISO 27001.<\/span><\/p><p><span style=\"font-weight: 400;\">S obzirom na ove to\u010dke, uz globalno prihva\u0107anje ISO 27001 kao ISO standarda i njegovu istaknutost u seriji ISO 27000, ISO 27001 je logi\u010dan izbor za postizanje uskla\u0111enosti s NIS 2.<\/span><\/p><h2><b>Karta NIS 2 \u010dlanaka s ISO 27001 klauzulama i kontrolama<\/b><\/h2>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4352d58 elementor-widget elementor-widget-text-editor\" data-id=\"4352d58\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>\u00a0<\/p><div><div dir=\"ltr\" style=\"margin-left: 0pt;\" align=\"left\"><table style=\"border: none;\"><colgroup> <col width=\"170\" \/> <col width=\"134\" \/> <col width=\"152\" \/> <col width=\"144\" \/><\/colgroup><tbody><tr style=\"height: 38.75pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; background-color: #44b3e1; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Arial, sans-serif; color: #ffffff; background-color: transparent; font-weight: bold; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Zahtjev NIS 2<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; background-color: #44b3e1; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Arial, sans-serif; color: #ffffff; background-color: transparent; font-weight: bold; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">NI\u0160 2 \u010dlanak<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; background-color: #44b3e1; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Arial, sans-serif; color: #ffffff; background-color: transparent; font-weight: bold; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">ISO 27001 klauzula ili kontrola<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; background-color: #44b3e1; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Arial, sans-serif; color: #ffffff; background-color: transparent; font-weight: bold; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Predlo\u017eeni dokument<\/span><\/p><\/td><\/tr><tr style=\"height: 68.75pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Upravlja\u010dka tijela moraju odobriti mjere upravljanja rizikom kiberneti\u010dke sigurnosti<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">\u010clanak 20. stavak 1<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">6.1.3 Tretman rizika informacijske sigurnosti<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Plan lije\u010denja rizika<\/span><\/p><\/td><\/tr><tr style=\"height: 85.25pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Upravlja\u010dka tijela moraju nadzirati provedbu mjera za upravljanje rizikom kiberneti\u010dke sigurnosti<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">\u010clanak 20. stavak 1<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">9.1 Pra\u0107enje, mjerenje, analiza i evaluacija 9.2 Interna revizija 9.3 Pregled uprave<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Izvje\u0161\u0107e o mjerenju + Izvje\u0161\u0107e interne revizije + Zapisnik pregleda uprave<\/span><\/p><\/td><\/tr><tr style=\"height: 101pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">\u010clanovi upravlja\u010dkih tijela du\u017eni su poha\u0111ati edukaciju i redovito nuditi sli\u010dne edukacije svojim zaposlenicima<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">\u010clanak 20. stavak 2<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">7.2 Kompetencija A.6.3 Svijest o informacijskoj sigurnosti, obrazovanje i obuka<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Plan obuke i podizanja svijesti<\/span><\/p><\/td><\/tr><tr style=\"height: 116.75pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Subjekti moraju poduzeti odgovaraju\u0107e i razmjerne tehni\u010dke, operativne i organizacijske mjere za upravljanje rizicima<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">\u010clanak 21. stavak 1<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">6.1.3 Tretman rizika informacijske sigurnosti 6.2 Ciljevi informacijske sigurnosti i planiranje za njihovo postizanje 8.1 Operativno planiranje i kontrola<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Tablica tretmana rizika + Plan tretmana rizika + razne politike i postupci navedeni u nastavku<\/span><\/p><\/td><\/tr><tr style=\"height: 181.25pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Pri ocjenjivanju proporcionalnosti mjera potrebno je uzeti u obzir stupanj subjektove izlo\u017eenosti rizicima, veli\u010dinu subjekta i vjerojatnost pojave incidenata te njihovu te\u017einu, uklju\u010duju\u0107i njihov dru\u0161tveni i ekonomski u\u010dinak.<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">\u010clanak 21. stavak 1<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">6.1.2 Procjena rizika informacijske sigurnosti<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Metodologija procjene rizika + Tablica procjene rizika<\/span><\/p><\/td><\/tr><tr style=\"height: 44pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Politika analize rizika<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">\u010clanak 21. stavak 2. to\u010dka (a)<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">6.1.2 Procjena rizika informacijske sigurnosti<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Metodologija procjene rizika<\/span><\/p><\/td><\/tr><tr style=\"height: 44pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Politika sigurnosti informacijskog sustava<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">\u010clanak 21. stavak 2. to\u010dka (a)<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">5.2 Politika<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Politika sigurnosti informacijskog sustava<\/span><\/p><\/td><\/tr><tr style=\"height: 164.75pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Rje\u0161avanje incidenata<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">\u010clanak 21. stavak 2. to\u010dka (b)<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">A.5.24 Planiranje i priprema upravljanja incidentima informacijske sigurnosti A.5.25 Procjena i odluka o doga\u0111ajima informacijske sigurnosti A.5.26 Odgovor na incidente informacijske sigurnosti<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Postupak upravljanja incidentima + Dnevnik incidenta<\/span><\/p><\/td><\/tr><tr style=\"height: 53pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Kontinuitet poslovanja<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">\u010clanak 21. stavak 2. to\u010dka (c)<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">A.5.29 Sigurnost informacija tijekom prekida<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Plan kontinuiteta poslovanja<\/span><\/p><\/td><\/tr><tr style=\"height: 44pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Upravljanje sigurnosnom kopijom<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">\u010clanak 21. stavak 2. to\u010dka (c)<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">A.8.13 Sigurnosna kopija informacija<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Politika sigurnosne kopije<\/span><\/p><\/td><\/tr><tr style=\"height: 85.25pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Oporavak od katastrofe<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">\u010clanak 21. stavak 2. to\u010dka (c)<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">A.5.30 Spremnost ICT-a za kontinuitet poslovanja A.8.14 Redundancija objekata za obradu informacija<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Plan oporavka od katastrofe<\/span><\/p><\/td><\/tr><tr style=\"height: 56pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Upravljanje krizama<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">\u010clanak 21. stavak 2. to\u010dka (c)<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">(nema izravno relevantnu klauzulu niti kontrolu u ISO 27001)<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Plan upravljanja kriznim situacijama<\/span><\/p><\/td><\/tr><tr style=\"height: 229.25pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Sigurnost lanca opskrbe, uklju\u010duju\u0107i sigurnosne aspekte koji se ti\u010du odnosa izme\u0111u svakog subjekta i njegovih izravnih dobavlja\u010da ili pru\u017eatelja usluga<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">\u010clanak 21. stavak 2. to\u010dka (d)<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">A.5.19 Informacijska sigurnost u odnosima s dobavlja\u010dima A.5.20 Rje\u0161avanje informacijske sigurnosti unutar ugovora s dobavlja\u010dima A.5.21 Upravljanje informacijskom sigurno\u0161\u0107u u ICT opskrbnom lancu A.5.22 Pra\u0107enje, pregled i upravljanje promjenama usluge dobavlja\u010da A.5.23 Informacijska sigurnost za kori\u0161tenje usluga u oblaku<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Politika sigurnosti dobavlja\u010da + sigurnosne klauzule za dobavlja\u010de i partnere + Izjava o povjerljivosti<\/span><\/p><\/td><\/tr><tr style=\"height: 414.5pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Sigurnost u nabavi, razvoju i odr\u017eavanju mre\u017enih i informacijskih sustava<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">\u010clanak 21. stavak 2. to\u010dka (e)<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">A.8.6 Upravljanje kapacitetom A.8.7 Za\u0161tita od zlonamjernog softvera A.8.8 Upravljanje tehni\u010dkim ranjivostima A.8.9 Upravljanje konfiguracijom A.8.25 \u017divotni ciklus sigurnog razvoja A.8.26 Zahtjevi za sigurnost aplikacije A.8.27 Arhitektura sigurnog sustava i principi in\u017eenjeringa A.8.28 Sigurno kodiranje A.8.29 Sigurnosno testiranje u razvoju i prihva\u0107anju A.8.30 Vanjski razvoj A.8.31 Odvajanje razvojnog, testnog i proizvodnog okru\u017eenja A.8.32 Upravljanje promjenama A.8.33 Testne informacije<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Politika sigurnog razvoja + specifikacija zahtjeva informacijskog sustava<\/span><\/p><\/td><\/tr><tr style=\"height: 149pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Politike i postupci za procjenu u\u010dinkovitosti mjera za upravljanje rizikom kiberneti\u010dke sigurnosti<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">\u010clanak 21. stavak 2. to\u010dka (f)<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">9.1 Pra\u0107enje, mjerenje, analiza i evaluacija 9.2 Interna revizija 9.3 Pregled uprave<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Metodologija mjerenja + Izvje\u0161\u0107e o mjerenju + Postupak interne revizije + Kontrolni popis interne revizije + Izvje\u0161\u0107e interne revizije + Postupak pregleda uprave<\/span><\/p><\/td><\/tr><tr style=\"height: 260.75pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Osnovne prakse cyber higijene<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">\u010clanak 21. stavak 2. to\u010dka (g)<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">A.6.8 Izvje\u0161\u0107ivanje o doga\u0111ajima u vezi s informacijskom sigurno\u0161\u0107u A.7.7 \u010cisti stol i \u010disti zaslon A.7.9 Sigurnost imovine izvan prostorija A.7.10 Mediji za pohranu A.8.1 Ure\u0111aji korisni\u010dkih krajnjih to\u010daka A.8.5 Sigurna autentifikacija A.8.7 Za\u0161tita od zlonamjernog softvera A.8.13 Informacije sigurnosna kopija A.8.19 Instalacija softvera na operativnim sustavima A.8.24 Kori\u0161tenje kriptografije<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">IT sigurnosna politika<\/span><\/p><\/td><\/tr><tr style=\"height: 68.75pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Obuka o kiberneti\u010dkoj sigurnosti<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">\u010clanak 21. stavak 2. to\u010dka (g)<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">7.2 Kompetencija A.6.3 Svijest o informacijskoj sigurnosti, obrazovanje i obuka<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Plan obuke i podizanja svijesti<\/span><\/p><\/td><\/tr><tr style=\"height: 68.75pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Politike i procedure koje se odnose na kori\u0161tenje kriptografije i enkripcije<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">\u010clanak 21. stavak 2. to\u010dka (h)<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">A.8.24 Kori\u0161tenje kriptografije<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Politika kori\u0161tenja enkripcije<\/span><\/p><\/td><\/tr><tr style=\"height: 164.75pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Sigurnost ljudskih resursa<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">\u010clanak 21. stavak 2. to\u010dka (i)<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">A.6.1 Provjera A.6.2 Uvjeti zapo\u0161ljavanja A.6.3 Svijest o informacijskoj sigurnosti, obrazovanje i obuka A.6.4 Disciplinski postupak A.6.5 Odgovornosti nakon prekida ili promjene zaposlenja<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Sigurnosna politika za ljudske resurse<\/span><\/p><\/td><\/tr><tr style=\"height: 44pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Politike kontrole pristupa<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">\u010clanak 21. stavak 2. to\u010dka (i)<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">A.5.15 Kontrola pristupa<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Politika kontrole pristupa<\/span><\/p><\/td><\/tr><tr style=\"height: 149pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Upravljanje imovinom<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">\u010clanak 21. stavak 2. to\u010dka (i)<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">A.5.9 Popis informacija i druge povezane imovine A.5.10 Prihvatljivo kori\u0161tenje informacija i druge povezane imovine A.5.11 Povrat imovine A.7.9 Sigurnost imovine izvan poslovnih prostorija<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Postupak upravljanja imovinom + popis imovine<\/span><\/p><\/td><\/tr><tr style=\"height: 85.25pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Kori\u0161tenje vi\u0161efaktorske provjere autenti\u010dnosti ili rje\u0161enja kontinuirane provjere autenti\u010dnosti<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">\u010clanak 21. stavak 2. to\u010dka (j)<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">A.5.16 Upravljanje identitetom A.5.17 Podaci o autentifikaciji A.8.5 Sigurna autentifikacija<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Politika autentifikacije<\/span><\/p><\/td><\/tr><tr style=\"height: 68.75pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Sigurna glasovna, video i tekstualna komunikacija<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">\u010clanak 21. stavak 2. to\u010dka (j)<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">A.5.14 Prijenos informacija A.8.21 Sigurnost mre\u017enih usluga<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Politika prijenosa informacija + Politika sigurne komunikacije<\/span><\/p><\/td><\/tr><tr style=\"height: 53pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Osigurani komunikacijski sustavi za hitne slu\u010dajeve unutar entiteta<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">\u010clanak 21. stavak 2. to\u010dka (j)<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">A.8.20 Sigurnost mre\u017ee<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Politika sigurne komunikacije<\/span><\/p><\/td><\/tr><tr style=\"height: 181.25pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Uzmite u obzir ranjivosti specifi\u010dne za svakog izravnog dobavlja\u010da i pru\u017eatelja usluga te ukupnu kvalitetu proizvoda i prakse kiberneti\u010dke sigurnosti njihovih dobavlja\u010da i pru\u017eatelja usluga, uklju\u010duju\u0107i njihove sigurnosne razvojne postupke<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">\u010clanak 21. stavak 3<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">A.5.19 Informacijska sigurnost u odnosima s dobavlja\u010dima A.5.21 Upravljanje informacijskom sigurno\u0161\u0107u u ICT opskrbnom lancu A.5.22 Pra\u0107enje, pregled i upravljanje promjenama usluge dobavlja\u010da A.5.23 Informacijska sigurnost za kori\u0161tenje usluga u oblaku<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Politika sigurnosti dobavlja\u010da + Izvje\u0161\u0107e o procjeni rizika i postupanju<\/span><\/p><\/td><\/tr><tr style=\"height: 56pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Poduzmite odgovaraju\u0107e i razmjerne korektivne mjere<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">\u010clanak 21. stavak 4<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">10.2 Nesukladnost i korektivne mjere<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Postupak za korektivne radnje + Obrazac za korektivne radnje<\/span><\/p><\/td><\/tr><\/tbody><\/table><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8f046ed elementor-widget elementor-widget-text-editor\" data-id=\"8f046ed\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h3><b>ISO 27001 i NIS 2: Pokrivenost i implementacija<\/b><\/h3><p><span style=\"font-weight: 400;\">Od 26 kibersigurnosnih zahtjeva navedenih u NIS 2, ISO 27001 mo\u017ee se pozabaviti 25. Jedina iznimka je upravljanje kriznim situacijama, koje ISO 27001 ne pokriva u potpunosti.<\/span><\/p><h3><b>Rje\u0161avanje obveza izvje\u0161\u0107ivanja<\/b><\/h3><p><span style=\"font-weight: 400;\">\u010clanak 23. NIS-a 2 propisuje posebne zahtjeve za izvje\u0161\u0107ivanje koji se ne mogu u potpunosti rije\u0161iti uporabom ISO 27001.<\/span><\/p><h3><b>Kori\u0161tenje ISO 27001 za uskla\u0111enost s NIS 2<\/b><\/h3><p><span style=\"font-weight: 400;\">Na temelju mapiranja, evo koraka koji se mogu implementirati kori\u0161tenjem ISO 27001:<\/span><\/p><ol><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Provedite po\u010detnu obuku<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Napi\u0161ite politiku najvi\u0161e razine o sigurnosti informacijskog sustava<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Definirati metodologiju upravljanja rizicima<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Provedite procjenu rizika i lije\u010denje<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Napi\u0161ite i odobrite Plan lije\u010denja rizika<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Provedite mjere kiberneti\u010dke sigurnosti<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Postavite sigurnost opskrbnog lanca<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Postavite procjenu u\u010dinkovitosti kiberneti\u010dke sigurnosti<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Postavite stalnu obuku o kiberneti\u010dkoj sigurnosti<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Provoditi periodi\u010dne interne revizije<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Provoditi periodi\u010dni pregled uprave<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Izvr\u0161ite korektivne radnje<\/span><\/li><\/ol><p><span style=\"font-weight: 400;\">Koraci 1 i 2 nisu ovdje navedeni jer su usmjereni na upravljanje projektom. Korak 11, \u201cPostavljanje obavijesti o incidentima,\u201d isklju\u010den je iz razloga koji su ranije spomenuti.<\/span><\/p><h3><b>Zaklju\u010dak: NIS 2 u odnosu na ISO 27001<\/b><\/h3><p><span style=\"font-weight: 400;\">Da sa\u017ememo kako se ISO 27001 mo\u017ee koristiti za NIS 2 uskla\u0111enost:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">ISO 27001 mo\u017ee odgovoriti na ve\u0107inu zahtjeva kiberneti\u010dke sigurnosti iz NIS 2, osim za prijavu incidenata.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">12 od 15 koraka implementacije mo\u017ee se posti\u0107i kori\u0161tenjem ISO 27001.<\/span><\/li><\/ul><p><span style=\"font-weight: 400;\">Ovo je sna\u017ena uskla\u0111enost, \u0161to ukazuje na to da je ISO 27001 robustan izbor za uskla\u0111enost s NIS 2, posebno s obzirom na to da NIS 2 i ENISA poti\u010du kori\u0161tenje uspostavljenih standarda kiberneti\u010dke sigurnosti.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Kako implementirati mjere kiberneti\u010dke sigurnosti NIS 2: Mapiranje s ISO 27001 Ako se trebate uskladiti s NIS 2, mo\u017eda se pitate kako to u\u010diniti. Direktiva opisuje \u0161to trebate posti\u0107i, ali ne daje smjernice kako to u\u010diniti. Jedan od najboljih na\u010dina za rje\u0161avanje ovog zadatka uskla\u0111enosti [\u2026]<\/p>","protected":false},"author":4,"featured_media":956,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to implement NIS 2 cybersecurity measures: Mapping with ISO 27001 - Nis2Compliant.org<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nis2compliant.org\/hr\/kako-implementirati-nis-2-mjere-cyber-sigurnosti-mapiranje-s-iso-27001\/\" \/>\n<meta property=\"og:locale\" content=\"hr_HR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to implement NIS 2 cybersecurity measures: Mapping with ISO 27001 - Nis2Compliant.org\" \/>\n<meta property=\"og:description\" content=\"How to implement NIS 2 cybersecurity measures: Mapping with ISO 27001 If you need to comply with NIS 2, you might be wondering how to go about it. The directive outlines what you need to achieve but doesn&#8217;t provide guidance on how to do it. One of the best ways to tackle this compliance task [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nis2compliant.org\/hr\/kako-implementirati-nis-2-mjere-cyber-sigurnosti-mapiranje-s-iso-27001\/\" \/>\n<meta property=\"og:site_name\" content=\"Nis2Compliant.org\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-16T13:33:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-14T19:52:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nis2compliant.org\/wp-content\/uploads\/2024\/07\/nis2articleimage3.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1879\" \/>\n\t<meta property=\"og:image:height\" content=\"1052\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Matjaz Marin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Napisao\/la\" \/>\n\t<meta name=\"twitter:data1\" content=\"Matjaz Marin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Procijenjeno vrijeme \u010ditanja\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minuta\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/nis2compliant.org\/how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001\/\",\"url\":\"https:\/\/nis2compliant.org\/how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001\/\",\"name\":\"How to implement NIS 2 cybersecurity measures: Mapping with ISO 27001 - Nis2Compliant.org\",\"isPartOf\":{\"@id\":\"https:\/\/nis2compliant.org\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/nis2compliant.org\/how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/nis2compliant.org\/how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/nis2compliant.org\/wp-content\/uploads\/2024\/07\/nis2articleimage3.png\",\"datePublished\":\"2024-07-16T13:33:18+00:00\",\"dateModified\":\"2024-08-14T19:52:06+00:00\",\"author\":{\"@id\":\"https:\/\/nis2compliant.org\/#\/schema\/person\/2970b359513cc5166b5792397f560a2d\"},\"breadcrumb\":{\"@id\":\"https:\/\/nis2compliant.org\/how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001\/#breadcrumb\"},\"inLanguage\":\"hr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/nis2compliant.org\/how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hr\",\"@id\":\"https:\/\/nis2compliant.org\/how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001\/#primaryimage\",\"url\":\"https:\/\/nis2compliant.org\/wp-content\/uploads\/2024\/07\/nis2articleimage3.png\",\"contentUrl\":\"https:\/\/nis2compliant.org\/wp-content\/uploads\/2024\/07\/nis2articleimage3.png\",\"width\":1879,\"height\":1052},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/nis2compliant.org\/how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/nis2compliant.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to implement NIS 2 cybersecurity measures: Mapping with ISO 27001\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/nis2compliant.org\/#website\",\"url\":\"https:\/\/nis2compliant.org\/\",\"name\":\"Nis2Compliant.org\",\"description\":\"The NIS 2 Directive Explained\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/nis2compliant.org\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"hr\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/nis2compliant.org\/#\/schema\/person\/2970b359513cc5166b5792397f560a2d\",\"name\":\"Matjaz Marin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hr\",\"@id\":\"https:\/\/nis2compliant.org\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/54a984366b70b8234bdbdcaef18066b0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/54a984366b70b8234bdbdcaef18066b0?s=96&d=mm&r=g\",\"caption\":\"Matjaz Marin\"},\"url\":\"https:\/\/nis2compliant.org\/hr\/author\/matjaz-maringmail-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to implement NIS 2 cybersecurity measures: Mapping with ISO 27001 - Nis2Compliant.org","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nis2compliant.org\/hr\/kako-implementirati-nis-2-mjere-cyber-sigurnosti-mapiranje-s-iso-27001\/","og_locale":"hr_HR","og_type":"article","og_title":"How to implement NIS 2 cybersecurity measures: Mapping with ISO 27001 - Nis2Compliant.org","og_description":"How to implement NIS 2 cybersecurity measures: Mapping with ISO 27001 If you need to comply with NIS 2, you might be wondering how to go about it. The directive outlines what you need to achieve but doesn&#8217;t provide guidance on how to do it. One of the best ways to tackle this compliance task [&hellip;]","og_url":"https:\/\/nis2compliant.org\/hr\/kako-implementirati-nis-2-mjere-cyber-sigurnosti-mapiranje-s-iso-27001\/","og_site_name":"Nis2Compliant.org","article_published_time":"2024-07-16T13:33:18+00:00","article_modified_time":"2024-08-14T19:52:06+00:00","og_image":[{"width":1879,"height":1052,"url":"https:\/\/nis2compliant.org\/wp-content\/uploads\/2024\/07\/nis2articleimage3.png","type":"image\/png"}],"author":"Matjaz Marin","twitter_card":"summary_large_image","twitter_misc":{"Napisao\/la":"Matjaz Marin","Procijenjeno vrijeme \u010ditanja":"7 minuta"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/nis2compliant.org\/how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001\/","url":"https:\/\/nis2compliant.org\/how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001\/","name":"How to implement NIS 2 cybersecurity measures: Mapping with ISO 27001 - Nis2Compliant.org","isPartOf":{"@id":"https:\/\/nis2compliant.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nis2compliant.org\/how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001\/#primaryimage"},"image":{"@id":"https:\/\/nis2compliant.org\/how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001\/#primaryimage"},"thumbnailUrl":"https:\/\/nis2compliant.org\/wp-content\/uploads\/2024\/07\/nis2articleimage3.png","datePublished":"2024-07-16T13:33:18+00:00","dateModified":"2024-08-14T19:52:06+00:00","author":{"@id":"https:\/\/nis2compliant.org\/#\/schema\/person\/2970b359513cc5166b5792397f560a2d"},"breadcrumb":{"@id":"https:\/\/nis2compliant.org\/how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001\/#breadcrumb"},"inLanguage":"hr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nis2compliant.org\/how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001\/"]}]},{"@type":"ImageObject","inLanguage":"hr","@id":"https:\/\/nis2compliant.org\/how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001\/#primaryimage","url":"https:\/\/nis2compliant.org\/wp-content\/uploads\/2024\/07\/nis2articleimage3.png","contentUrl":"https:\/\/nis2compliant.org\/wp-content\/uploads\/2024\/07\/nis2articleimage3.png","width":1879,"height":1052},{"@type":"BreadcrumbList","@id":"https:\/\/nis2compliant.org\/how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nis2compliant.org\/"},{"@type":"ListItem","position":2,"name":"How to implement NIS 2 cybersecurity measures: Mapping with ISO 27001"}]},{"@type":"WebSite","@id":"https:\/\/nis2compliant.org\/#website","url":"https:\/\/nis2compliant.org\/","name":"Nis2Compliant.org","description":"The NIS 2 Directive Explained","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nis2compliant.org\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"hr"},{"@type":"Person","@id":"https:\/\/nis2compliant.org\/#\/schema\/person\/2970b359513cc5166b5792397f560a2d","name":"Matjaz Marin","image":{"@type":"ImageObject","inLanguage":"hr","@id":"https:\/\/nis2compliant.org\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/54a984366b70b8234bdbdcaef18066b0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/54a984366b70b8234bdbdcaef18066b0?s=96&d=mm&r=g","caption":"Matjaz Marin"},"url":"https:\/\/nis2compliant.org\/hr\/author\/matjaz-maringmail-com\/"}]}},"_links":{"self":[{"href":"https:\/\/nis2compliant.org\/hr\/wp-json\/wp\/v2\/posts\/955"}],"collection":[{"href":"https:\/\/nis2compliant.org\/hr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nis2compliant.org\/hr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nis2compliant.org\/hr\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/nis2compliant.org\/hr\/wp-json\/wp\/v2\/comments?post=955"}],"version-history":[{"count":5,"href":"https:\/\/nis2compliant.org\/hr\/wp-json\/wp\/v2\/posts\/955\/revisions"}],"predecessor-version":[{"id":961,"href":"https:\/\/nis2compliant.org\/hr\/wp-json\/wp\/v2\/posts\/955\/revisions\/961"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nis2compliant.org\/hr\/wp-json\/wp\/v2\/media\/956"}],"wp:attachment":[{"href":"https:\/\/nis2compliant.org\/hr\/wp-json\/wp\/v2\/media?parent=955"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nis2compliant.org\/hr\/wp-json\/wp\/v2\/categories?post=955"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nis2compliant.org\/hr\/wp-json\/wp\/v2\/tags?post=955"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}