{"id":955,"date":"2024-07-16T13:33:18","date_gmt":"2024-07-16T13:33:18","guid":{"rendered":"https:\/\/nis2compliant.org\/?p=955"},"modified":"2024-08-14T19:52:06","modified_gmt":"2024-08-14T19:52:06","slug":"how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001","status":"publish","type":"post","link":"https:\/\/nis2compliant.org\/sl\/kako-implementirati-nis-2-cybersecurity-measures-mapping-with-iso-27001\/","title":{"rendered":"Kako izvajati ukrepe kibernetske varnosti NIS 2: Preslikava z ISO 27001"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"955\" class=\"elementor elementor-955\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-31ee495 elementor-section-boxed elementor-section-height-default elementor-section-height-default tf-sticky-section tf-sticky-no\" data-id=\"31ee495\" data-element_type=\"section\" data-settings=\"{&quot;tf_sticky&quot;:&quot;no&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f5e6b28\" data-id=\"f5e6b28\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c5c2f41 elementor-widget elementor-widget-heading\" data-id=\"c5c2f41\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.22.0 - 26-06-2024 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-default\">Kako izvajati ukrepe kibernetske varnosti NIS 2: Preslikava z ISO 27001\n<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1ba9bbc elementor-widget elementor-widget-image\" data-id=\"1ba9bbc\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.22.0 - 26-06-2024 *\/\n.elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a img[src$=\".svg\"]{width:48px}.elementor-widget-image img{vertical-align:middle;display:inline-block}<\/style>\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"448\" src=\"https:\/\/nis2compliant.org\/wp-content\/uploads\/2024\/07\/nis2articleimage3-1024x573.png\" class=\"attachment-large size-large wp-image-956\" alt=\"\" srcset=\"https:\/\/nis2compliant.org\/wp-content\/uploads\/2024\/07\/nis2articleimage3-1024x573.png 1024w, https:\/\/nis2compliant.org\/wp-content\/uploads\/2024\/07\/nis2articleimage3-300x168.png 300w, https:\/\/nis2compliant.org\/wp-content\/uploads\/2024\/07\/nis2articleimage3-768x430.png 768w, https:\/\/nis2compliant.org\/wp-content\/uploads\/2024\/07\/nis2articleimage3-1536x860.png 1536w, https:\/\/nis2compliant.org\/wp-content\/uploads\/2024\/07\/nis2articleimage3-18x10.png 18w, https:\/\/nis2compliant.org\/wp-content\/uploads\/2024\/07\/nis2articleimage3.png 1879w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3b7beef elementor-widget elementor-widget-text-editor\" data-id=\"3b7beef\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.22.0 - 26-06-2024 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p><span style=\"font-weight: 400;\">\u010ce morate biti skladni z NIS 2, se morda spra\u0161ujete, kako to storiti. Direktiva opisuje, kaj morate dose\u010di, vendar ne daje navodil, kako to storiti.<\/span><\/p><p><span style=\"font-weight: 400;\">Eden najbolj\u0161ih na\u010dinov za re\u0161evanje te naloge skladnosti je sledenje uveljavljenemu okviru kibernetske varnosti. V tem \u010dlanku bom raziskal, ali lahko ISO 27001, vodilni mednarodni standard kibernetske varnosti, pomaga pri izpolnjevanju teh zahtev.<\/span><\/p><p><span style=\"font-weight: 400;\">ISO 27001 lahko pokrije ve\u010dino zahtev kibernetske varnosti iz NIS 2, razen poro\u010danja o incidentih.<\/span><\/p><h3><b>Katere zahteve glede kibernetske varnosti in poro\u010danja so v NIS 2?<\/b><\/h3><p><span style=\"font-weight: 400;\">Poglejmo, kaj morajo podjetja izvajati. Zanimivo je, da so samo trije \u010dleni v celotni direktivi NIS 2 \u0161e posebej pomembni za bistvene in pomembne organizacije, ki morajo postati skladne.<\/span><\/p><p><b>\u00a0\u00a0\u00a0\u00a020. \u010dlen \u2013 Upravljanje<\/b><\/p><p><b>\u00a0\u00a0\u00a0\u00a021. \u010dlen \u2013 Ukrepi za obvladovanje tveganja kibernetske varnosti<\/b><\/p><p><b>\u00a0\u00a0\u00a0\u00a023. \u010dlen \u2013 Obveznosti poro\u010danja<\/b><\/p><p><span style=\"font-weight: 400;\">Vsi ostali \u010dleni NIS 2 so v bistvu namenjeni dr\u017eavnim organom, ki morajo uveljaviti NIS 2.<\/span><\/p><p><span style=\"font-weight: 400;\">V spodnji tabeli boste na\u0161li podrobno raz\u010dlenitev zahtev iz 20. in 21. \u010dlena.<\/span><\/p><p><b>Ali je ISO 27001 ustrezen za NIS 2?<\/b><\/p><p><span style=\"font-weight: 400;\">\u010ceprav NIS 2 izrecno ne omenja ISO 27001, spodbuja uporabo \u00bbustreznih evropskih in mednarodnih standardov\u00ab. Poleg tega preambula NIS 2 predlaga uporabo serije standardov ISO\/IEC 27000 za izvajanje ukrepov kibernetske varnosti.<\/span><\/p><p><span style=\"font-weight: 400;\">ISO 27001 dobro ceni ENISA, Agencija Evropske unije za kibernetsko varnost:<\/span><\/p><p><span style=\"font-weight: 400;\">Orodje ENISA za preslikavo: ENISA je razvila orodje, ki preslika klavzule in kontrole ISO 27001 v prvotne zahteve direktive NIS (predhodnik NIS 2).<\/span><\/p><p><span style=\"font-weight: 400;\">Poro\u010dilo iz leta 2017: ENISA je v poro\u010dilu \u00bbMapping of OES Security Requirements to Specific Sectors\u00ab opredelila ISO 27001 kot standard, ki ga operaterji bistvenih storitev (OES) najpogosteje upo\u0161tevajo in morajo biti v skladu s staro direktivo NIS.<\/span><\/p><p><span style=\"font-weight: 400;\">Poro\u010dilo 2021: Poro\u010dilo \u00bbNIS Investments\u00ab ugotavlja, da je ve\u010dina organizacij (51.1%), ki izpolnjujejo staro direktivo NIS, certificirala svoje sisteme in procese na podlagi certifikata ISO 27001.<\/span><\/p><p><span style=\"font-weight: 400;\">Glede na te to\u010dke, skupaj z globalno sprejetostjo ISO 27001 kot standarda ISO in njegovega pomena v seriji ISO 27000, je ISO 27001 logi\u010dna izbira za doseganje skladnosti z NIS 2.<\/span><\/p><h2><b>Zemljevid \u010dlankov NIS 2 s klavzulami in kontrolami ISO 27001<\/b><\/h2>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4352d58 elementor-widget elementor-widget-text-editor\" data-id=\"4352d58\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<p>\u00a0<\/p><div><div dir=\"ltr\" style=\"margin-left: 0pt;\" align=\"left\"><table style=\"border: none;\"><colgroup> <col width=\"170\" \/> <col width=\"134\" \/> <col width=\"152\" \/> <col width=\"144\" \/><\/colgroup><tbody><tr style=\"height: 38.75pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; background-color: #44b3e1; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Arial, sans-serif; color: #ffffff; background-color: transparent; font-weight: bold; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Zahteva NIS 2<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; background-color: #44b3e1; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Arial, sans-serif; color: #ffffff; background-color: transparent; font-weight: bold; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">NIS 2 \u010dlen<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; background-color: #44b3e1; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Arial, sans-serif; color: #ffffff; background-color: transparent; font-weight: bold; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Klavzula ali nadzor ISO 27001<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; background-color: #44b3e1; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; text-align: center; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 12pt; font-family: Arial, sans-serif; color: #ffffff; background-color: transparent; font-weight: bold; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Predlagani dokument<\/span><\/p><\/td><\/tr><tr style=\"height: 68.75pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Organi upravljanja morajo odobriti ukrepe za obvladovanje tveganja kibernetske varnosti<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">20. \u010dlen, 1. odst<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">6.1.3 Obravnava tveganja informacijske varnosti<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Na\u010drt zdravljenja tveganja<\/span><\/p><\/td><\/tr><tr style=\"height: 85.25pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Organi upravljanja morajo nadzorovati izvajanje ukrepov za obvladovanje tveganja kibernetske varnosti<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">20. \u010dlen, 1. odst<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">9.1 Spremljanje, merjenje, analiza in vrednotenje 9.2 Notranja revizija 9.3 Vodstveni pregled<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Poro\u010dilo o meritvah + poro\u010dilo notranje revizije + zapisnik vodstvenega pregleda<\/span><\/p><\/td><\/tr><tr style=\"height: 101pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">\u010clani vodstvenih organov so se dol\u017eni izobra\u017eevati in redno zagotavljati podobna izobra\u017eevanja svojim zaposlenim<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">20. \u010dlen, 2. odst<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">7.2 Usposobljenost A.6.3 Ozave\u0161\u010denost, izobra\u017eevanje in usposabljanje o varnosti informacij<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Na\u010drt usposabljanja in ozave\u0161\u010danja<\/span><\/p><\/td><\/tr><tr style=\"height: 116.75pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Subjekti morajo sprejeti ustrezne in sorazmerne tehni\u010dne, operativne in organizacijske ukrepe za obvladovanje tveganj<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">21. \u010dlen, 1. odst<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">6.1.3 Obravnava tveganja informacijske varnosti 6.2 Cilji informacijske varnosti in na\u010drtovanje za njihovo doseganje 8.1 Operativno na\u010drtovanje in nadzor<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Tabela obravnave tveganja + na\u010drt obravnave tveganja + razli\u010dne politike in postopki, navedeni spodaj<\/span><\/p><\/td><\/tr><tr style=\"height: 181.25pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Pri ocenjevanju sorazmernosti ukrepov je treba ustrezno upo\u0161tevati stopnjo izpostavljenosti subjekta tveganjem, velikost subjekta in verjetnost pojava incidentov ter njihovo resnost, vklju\u010dno z njihovim dru\u017ebenim in gospodarskim u\u010dinkom.<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">21. \u010dlen, 1. odst<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">6.1.2 Ocena tveganja informacijske varnosti<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Metodologija ocene tveganja + tabela ocene tveganja<\/span><\/p><\/td><\/tr><tr style=\"height: 44pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Politika analize tveganja<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">\u010clen 21, odstavek 2, to\u010dka (a)<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">6.1.2 Ocena tveganja informacijske varnosti<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Metodologija ocenjevanja tveganja<\/span><\/p><\/td><\/tr><tr style=\"height: 44pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Politika varnosti informacijskega sistema<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">\u010clen 21, odstavek 2, to\u010dka (a)<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">5.2 Politika<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Politika varnosti informacijskega sistema<\/span><\/p><\/td><\/tr><tr style=\"height: 164.75pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Obravnava incidentov<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">21. \u010dlen, 2. odstavek, to\u010dka (b)<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">A.5.24 Na\u010drtovanje in priprava obvladovanja incidentov informacijske varnosti A.5.25 Ocena in odlo\u010ditev o dogodkih informacijske varnosti A.5.26 Odziv na incidente informacijske varnosti<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Postopek obvladovanja incidentov + Dnevnik incidentov<\/span><\/p><\/td><\/tr><tr style=\"height: 53pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Neprekinjeno poslovanje<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">\u010clen 21, odstavek 2, to\u010dka (c)<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">A.5.29 Varnost informacij med motnjami<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Na\u010drt neprekinjenega poslovanja<\/span><\/p><\/td><\/tr><tr style=\"height: 44pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Upravljanje varnostnih kopij<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">\u010clen 21, odstavek 2, to\u010dka (c)<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">A.8.13 Varnostno kopiranje informacij<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Politika varnostnega kopiranja<\/span><\/p><\/td><\/tr><tr style=\"height: 85.25pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Obnovitev po katastrofi<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">\u010clen 21, odstavek 2, to\u010dka (c)<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">A.5.30 Pripravljenost IKT za neprekinjeno poslovanje A.8.14 Redundanca zmogljivosti za obdelavo informacij<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Na\u010drt za obnovo po katastrofi<\/span><\/p><\/td><\/tr><tr style=\"height: 56pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Krizno upravljanje<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">\u010clen 21, odstavek 2, to\u010dka (c)<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">(nima neposredno ustrezne klavzule ali nadzora v ISO 27001)<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Na\u010drt kriznega upravljanja<\/span><\/p><\/td><\/tr><tr style=\"height: 229.25pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Varnost dobavne verige, vklju\u010dno z varnostnimi vidiki v zvezi z odnosi med vsakim subjektom in njegovimi neposrednimi dobavitelji ali ponudniki storitev<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">21. \u010dlen, 2. odstavek, to\u010dka (d)<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">A.5.19 Varnost informacij v odnosih z dobavitelji A.5.20 Obravnavanje varnosti informacij v pogodbah z dobavitelji A.5.21 Upravljanje varnosti informacij v dobavni verigi IKT A.5.22 Spremljanje, pregledovanje in upravljanje sprememb dobaviteljskih storitev A.5.23 Varnost informacij za uporabo storitev v oblaku<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Varnostna politika dobavitelja + varnostne klavzule za dobavitelje in partnerje + izjava o zaupnosti<\/span><\/p><\/td><\/tr><tr style=\"height: 414.5pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Varnost pri pridobivanju, razvoju in vzdr\u017eevanju omre\u017eij in informacijskih sistemov<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">\u010dlen 21, odstavek 2, to\u010dka (e)<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">A.8.6 Upravljanje zmogljivosti A.8.7 Za\u0161\u010dita pred zlonamerno programsko opremo A.8.8 Upravljanje tehni\u010dnih ranljivosti A.8.9 Upravljanje konfiguracije A.8.25 Varen razvojni \u017eivljenjski cikel A.8.26 Varnostne zahteve aplikacij A.8.27 Varna sistemska arhitektura in in\u017eenirska na\u010dela A.8.28 Varno kodiranje A.8.29 Varnostno testiranje v razvoju in sprejemanju A.8.30 Zunanji razvoj A.8.31 Lo\u010devanje razvojnega, testnega in produkcijskega okolja A.8.32 Upravljanje sprememb A.8.33 Testne informacije<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Politika varnega razvoja + specifikacija zahtev informacijskega sistema<\/span><\/p><\/td><\/tr><tr style=\"height: 149pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Politike in postopki za ocenjevanje u\u010dinkovitosti ukrepov za obvladovanje tveganja kibernetske varnosti<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">\u010dlen 21, odstavek 2, to\u010dka (f)<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">9.1 Spremljanje, merjenje, analiza in vrednotenje 9.2 Notranja revizija 9.3 Vodstveni pregled<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Metodologija merjenja + Poro\u010dilo o merjenju + Postopek notranje revizije + Kontrolni seznam notranje revizije + Poro\u010dilo notranje revizije + Postopek vodstvenega pregleda<\/span><\/p><\/td><\/tr><tr style=\"height: 260.75pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Osnovne kibernetske higienske prakse<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">21. \u010dlen, 2. odstavek, to\u010dka (g)<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">A.6.8 Poro\u010danje o varnostnih dogodkih informacij A.7.7 \u010cista miza in \u010dist zaslon A.7.9 Varnost sredstev zunaj prostorov A.7.10 Mediji za shranjevanje A.8.1 Uporabni\u0161ke kon\u010dne naprave A.8.5 Varna avtentikacija A.8.7 Za\u0161\u010dita pred zlonamerno programsko opremo A.8.13 Informacije varnostno kopiranje A.8.19 Namestitev programske opreme na operacijske sisteme A.8.24 Uporaba kriptografije<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Varnostna politika IT<\/span><\/p><\/td><\/tr><tr style=\"height: 68.75pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Usposabljanje o kibernetski varnosti<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">21. \u010dlen, 2. odstavek, to\u010dka (g)<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">7.2 Usposobljenost A.6.3 Ozave\u0161\u010denost, izobra\u017eevanje in usposabljanje o varnosti informacij<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Na\u010drt usposabljanja in ozave\u0161\u010danja<\/span><\/p><\/td><\/tr><tr style=\"height: 68.75pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Politike in postopki glede uporabe kriptografije in \u0161ifriranja<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">\u010clen 21, odstavek 2, to\u010dka (h)<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">A.8.24 Uporaba kriptografije<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Politika uporabe \u0161ifriranja<\/span><\/p><\/td><\/tr><tr style=\"height: 164.75pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Varnost \u010dlove\u0161kih virov<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">21. \u010dlen, 2. odstavek, to\u010dka (i)<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">A.6.1 Pregled A.6.2 Pogoji zaposlitve A.6.3 Ozave\u0161\u010danje o informacijski varnosti, izobra\u017eevanje in usposabljanje A.6.4 Disciplinski postopek A.6.5 Odgovornosti po prekinitvi ali spremembi zaposlitve<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Varnostna politika za \u010dlove\u0161ke vire<\/span><\/p><\/td><\/tr><tr style=\"height: 44pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Politike nadzora dostopa<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">21. \u010dlen, 2. odstavek, to\u010dka (i)<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">A.5.15 Nadzor dostopa<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Politika nadzora dostopa<\/span><\/p><\/td><\/tr><tr style=\"height: 149pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Upravljanje premo\u017eenja<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">21. \u010dlen, 2. odstavek, to\u010dka (i)<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">A.5.9 Popis informacij in drugih povezanih sredstev A.5.10 Sprejemljiva uporaba informacij in drugih povezanih sredstev A.5.11 Vrnitev sredstev A.7.9 Varnost sredstev zunaj poslovnih prostorov<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Postopek upravljanja s premo\u017eenjem + popis premo\u017eenja<\/span><\/p><\/td><\/tr><tr style=\"height: 85.25pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Uporaba ve\u010dfaktorske avtentikacije ali re\u0161itev za stalno avtentikacijo<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">21. \u010dlen, 2. odstavek, to\u010dka (j)<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">A.5.16 Upravljanje identitete A.5.17 Informacije o avtentifikaciji A.8.5 Varna avtentikacija<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Politika avtentikacije<\/span><\/p><\/td><\/tr><tr style=\"height: 68.75pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Zavarovana glasovna, video in besedilna komunikacija<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">21. \u010dlen, 2. odstavek, to\u010dka (j)<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">A.5.14 Prenos informacij A.8.21 Varnost omre\u017enih storitev<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Politika prenosa informacij + Politika varne komunikacije<\/span><\/p><\/td><\/tr><tr style=\"height: 53pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Zavarovani komunikacijski sistemi v sili znotraj subjekta<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">21. \u010dlen, 2. odstavek, to\u010dka (j)<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">A.8.20 Varnost omre\u017eij<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Politika varne komunikacije<\/span><\/p><\/td><\/tr><tr style=\"height: 181.25pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Upo\u0161tevajte ranljivosti, zna\u010dilne za vsakega neposrednega dobavitelja in ponudnika storitev, ter splo\u0161no kakovost izdelkov in praks kibernetske varnosti njihovih dobaviteljev in ponudnikov storitev, vklju\u010dno z njihovimi varnimi razvojnimi postopki.<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">21. \u010dlen, 3. odst<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">A.5.19 Informacijska varnost v odnosih z dobavitelji A.5.21 Upravljanje informacijske varnosti v dobavni verigi IKT A.5.22 Spremljanje, pregled in upravljanje sprememb dobaviteljskih storitev A.5.23 Informacijska varnost za uporabo storitev v oblaku<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Varnostna politika dobavitelja + poro\u010dilo o oceni in zdravljenju tveganja<\/span><\/p><\/td><\/tr><tr style=\"height: 56pt;\"><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Sprejmite ustrezne in sorazmerne korektivne ukrepe<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">21. \u010dlen, 4. odst<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">10.2 Neskladnost in korektivni ukrep<\/span><\/p><\/td><td style=\"border-width: 0.416667pt; border-color: #000000; padding: 1pt 1pt 5pt; overflow: hidden; overflow-wrap: break-word;\"><p dir=\"ltr\" style=\"line-height: 1.38; margin-top: 0pt; margin-bottom: 0pt;\"><span style=\"font-size: 11pt; font-family: Arial, sans-serif; color: #000000; background-color: transparent; font-variant-numeric: normal; font-variant-east-asian: normal; font-variant-alternates: normal; font-variant-position: normal; vertical-align: baseline; white-space-collapse: preserve;\">Postopek za korektivne ukrepe + Obrazec za korektivne ukrepe<\/span><\/p><\/td><\/tr><\/tbody><\/table><\/div><\/div>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8f046ed elementor-widget elementor-widget-text-editor\" data-id=\"8f046ed\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h3><b>ISO 27001 in NIS 2: Pokritost in implementacija<\/b><\/h3><p><span style=\"font-weight: 400;\">Od 26 zahtev kibernetske varnosti, ki jih dolo\u010da NIS 2, lahko ISO 27001 obravnava 25. Edina izjema je krizno upravljanje, ki ga ISO 27001 ne pokriva v celoti.<\/span><\/p><h3><b>Obravnava obveznosti poro\u010danja<\/b><\/h3><p><span style=\"font-weight: 400;\">23. \u010dlen NIS 2 dolo\u010da posebne zahteve za poro\u010danje, ki jih ni mogo\u010de v celoti obravnavati z uporabo standarda ISO 27001.<\/span><\/p><h3><b>Uporaba ISO 27001 za skladnost z NIS 2<\/b><\/h3><p><span style=\"font-weight: 400;\">Na podlagi preslikave so tukaj naslednji koraki, ki jih je mogo\u010de izvesti z uporabo ISO 27001:<\/span><\/p><ol><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Izvedite za\u010detno usposabljanje<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Napi\u0161ite politiko na najvi\u0161ji ravni o varnosti informacijskega sistema<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Dolo\u010dite metodologijo upravljanja tveganj<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Izvedite oceno tveganja in zdravljenje<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Napi\u0161ite in potrdite na\u010drt obravnave tveganja<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Izvajati ukrepe kibernetske varnosti<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Vzpostavite varnost dobavne verige<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Vzpostavite oceno u\u010dinkovitosti kibernetske varnosti<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Vzpostavite stalno usposabljanje za kibernetsko varnost<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Izvajati redne notranje revizije<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Izvedite redne vodstvene preglede<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Izvedite korektivne ukrepe<\/span><\/li><\/ol><p><span style=\"font-weight: 400;\">Koraka 1 in 2 tukaj nista navedena, ker se osredoto\u010data na vodenje projekta. 11. korak, \u00bbNastavitev obvestil o dogodkih\u00ab, je izklju\u010den zaradi razlogov, o katerih smo govorili prej.<\/span><\/p><h3><b>Zaklju\u010dek: NIS 2 proti ISO 27001<\/b><\/h3><p><span style=\"font-weight: 400;\">\u010ce povzamemo, kako se lahko ISO 27001 uporablja za skladnost z NIS 2:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">ISO 27001 lahko obravnava ve\u010dino zahtev kibernetske varnosti iz NIS 2, razen za poro\u010danje o incidentih.<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">12 od 15 korakov implementacije je mogo\u010de dose\u010di z uporabo ISO 27001.<\/span><\/li><\/ul><p><span style=\"font-weight: 400;\">To je mo\u010dna usklajenost, ki ka\u017ee, da je ISO 27001 zanesljiva izbira za skladnost z NIS 2, zlasti glede na to, da NIS 2 in ENISA spodbujata uporabo uveljavljenih standardov kibernetske varnosti.<\/span><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Kako izvajati ukrepe kibernetske varnosti NIS 2: preslikava z ISO 27001 \u010ce morate biti skladni z NIS 2, se morda spra\u0161ujete, kako to storiti. Direktiva opisuje, kaj morate dose\u010di, vendar ne daje navodil, kako to storiti. Eden najbolj\u0161ih na\u010dinov za re\u0161evanje te naloge skladnosti [\u2026]<\/p>","protected":false},"author":4,"featured_media":956,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to implement NIS 2 cybersecurity measures: Mapping with ISO 27001 - Nis2Compliant.org<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nis2compliant.org\/sl\/kako-implementirati-nis-2-cybersecurity-measures-mapping-with-iso-27001\/\" \/>\n<meta property=\"og:locale\" content=\"sl_SI\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to implement NIS 2 cybersecurity measures: Mapping with ISO 27001 - Nis2Compliant.org\" \/>\n<meta property=\"og:description\" content=\"How to implement NIS 2 cybersecurity measures: Mapping with ISO 27001 If you need to comply with NIS 2, you might be wondering how to go about it. The directive outlines what you need to achieve but doesn&#8217;t provide guidance on how to do it. One of the best ways to tackle this compliance task [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nis2compliant.org\/sl\/kako-implementirati-nis-2-cybersecurity-measures-mapping-with-iso-27001\/\" \/>\n<meta property=\"og:site_name\" content=\"Nis2Compliant.org\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-16T13:33:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-14T19:52:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nis2compliant.org\/wp-content\/uploads\/2024\/07\/nis2articleimage3.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1879\" \/>\n\t<meta property=\"og:image:height\" content=\"1052\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Matjaz Marin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Matjaz Marin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/nis2compliant.org\/how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001\/\",\"url\":\"https:\/\/nis2compliant.org\/how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001\/\",\"name\":\"How to implement NIS 2 cybersecurity measures: Mapping with ISO 27001 - Nis2Compliant.org\",\"isPartOf\":{\"@id\":\"https:\/\/nis2compliant.org\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/nis2compliant.org\/how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/nis2compliant.org\/how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/nis2compliant.org\/wp-content\/uploads\/2024\/07\/nis2articleimage3.png\",\"datePublished\":\"2024-07-16T13:33:18+00:00\",\"dateModified\":\"2024-08-14T19:52:06+00:00\",\"author\":{\"@id\":\"https:\/\/nis2compliant.org\/#\/schema\/person\/2970b359513cc5166b5792397f560a2d\"},\"breadcrumb\":{\"@id\":\"https:\/\/nis2compliant.org\/how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001\/#breadcrumb\"},\"inLanguage\":\"sl-SI\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/nis2compliant.org\/how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sl-SI\",\"@id\":\"https:\/\/nis2compliant.org\/how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001\/#primaryimage\",\"url\":\"https:\/\/nis2compliant.org\/wp-content\/uploads\/2024\/07\/nis2articleimage3.png\",\"contentUrl\":\"https:\/\/nis2compliant.org\/wp-content\/uploads\/2024\/07\/nis2articleimage3.png\",\"width\":1879,\"height\":1052},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/nis2compliant.org\/how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/nis2compliant.org\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to implement NIS 2 cybersecurity measures: Mapping with ISO 27001\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/nis2compliant.org\/#website\",\"url\":\"https:\/\/nis2compliant.org\/\",\"name\":\"Nis2Compliant.org\",\"description\":\"The NIS 2 Directive Explained\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/nis2compliant.org\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"sl-SI\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/nis2compliant.org\/#\/schema\/person\/2970b359513cc5166b5792397f560a2d\",\"name\":\"Matjaz Marin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sl-SI\",\"@id\":\"https:\/\/nis2compliant.org\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/54a984366b70b8234bdbdcaef18066b0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/54a984366b70b8234bdbdcaef18066b0?s=96&d=mm&r=g\",\"caption\":\"Matjaz Marin\"},\"url\":\"https:\/\/nis2compliant.org\/sl\/author\/matjaz-maringmail-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to implement NIS 2 cybersecurity measures: Mapping with ISO 27001 - Nis2Compliant.org","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nis2compliant.org\/sl\/kako-implementirati-nis-2-cybersecurity-measures-mapping-with-iso-27001\/","og_locale":"sl_SI","og_type":"article","og_title":"How to implement NIS 2 cybersecurity measures: Mapping with ISO 27001 - Nis2Compliant.org","og_description":"How to implement NIS 2 cybersecurity measures: Mapping with ISO 27001 If you need to comply with NIS 2, you might be wondering how to go about it. The directive outlines what you need to achieve but doesn&#8217;t provide guidance on how to do it. One of the best ways to tackle this compliance task [&hellip;]","og_url":"https:\/\/nis2compliant.org\/sl\/kako-implementirati-nis-2-cybersecurity-measures-mapping-with-iso-27001\/","og_site_name":"Nis2Compliant.org","article_published_time":"2024-07-16T13:33:18+00:00","article_modified_time":"2024-08-14T19:52:06+00:00","og_image":[{"width":1879,"height":1052,"url":"https:\/\/nis2compliant.org\/wp-content\/uploads\/2024\/07\/nis2articleimage3.png","type":"image\/png"}],"author":"Matjaz Marin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Matjaz Marin","Est. reading time":"7 minut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/nis2compliant.org\/how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001\/","url":"https:\/\/nis2compliant.org\/how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001\/","name":"How to implement NIS 2 cybersecurity measures: Mapping with ISO 27001 - Nis2Compliant.org","isPartOf":{"@id":"https:\/\/nis2compliant.org\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nis2compliant.org\/how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001\/#primaryimage"},"image":{"@id":"https:\/\/nis2compliant.org\/how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001\/#primaryimage"},"thumbnailUrl":"https:\/\/nis2compliant.org\/wp-content\/uploads\/2024\/07\/nis2articleimage3.png","datePublished":"2024-07-16T13:33:18+00:00","dateModified":"2024-08-14T19:52:06+00:00","author":{"@id":"https:\/\/nis2compliant.org\/#\/schema\/person\/2970b359513cc5166b5792397f560a2d"},"breadcrumb":{"@id":"https:\/\/nis2compliant.org\/how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001\/#breadcrumb"},"inLanguage":"sl-SI","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nis2compliant.org\/how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001\/"]}]},{"@type":"ImageObject","inLanguage":"sl-SI","@id":"https:\/\/nis2compliant.org\/how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001\/#primaryimage","url":"https:\/\/nis2compliant.org\/wp-content\/uploads\/2024\/07\/nis2articleimage3.png","contentUrl":"https:\/\/nis2compliant.org\/wp-content\/uploads\/2024\/07\/nis2articleimage3.png","width":1879,"height":1052},{"@type":"BreadcrumbList","@id":"https:\/\/nis2compliant.org\/how-to-implement-nis-2-cybersecurity-measures-mapping-with-iso-27001\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nis2compliant.org\/"},{"@type":"ListItem","position":2,"name":"How to implement NIS 2 cybersecurity measures: Mapping with ISO 27001"}]},{"@type":"WebSite","@id":"https:\/\/nis2compliant.org\/#website","url":"https:\/\/nis2compliant.org\/","name":"Nis2Compliant.org","description":"The NIS 2 Directive Explained","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nis2compliant.org\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"sl-SI"},{"@type":"Person","@id":"https:\/\/nis2compliant.org\/#\/schema\/person\/2970b359513cc5166b5792397f560a2d","name":"Matjaz Marin","image":{"@type":"ImageObject","inLanguage":"sl-SI","@id":"https:\/\/nis2compliant.org\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/54a984366b70b8234bdbdcaef18066b0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/54a984366b70b8234bdbdcaef18066b0?s=96&d=mm&r=g","caption":"Matjaz Marin"},"url":"https:\/\/nis2compliant.org\/sl\/author\/matjaz-maringmail-com\/"}]}},"_links":{"self":[{"href":"https:\/\/nis2compliant.org\/sl\/wp-json\/wp\/v2\/posts\/955"}],"collection":[{"href":"https:\/\/nis2compliant.org\/sl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nis2compliant.org\/sl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nis2compliant.org\/sl\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/nis2compliant.org\/sl\/wp-json\/wp\/v2\/comments?post=955"}],"version-history":[{"count":5,"href":"https:\/\/nis2compliant.org\/sl\/wp-json\/wp\/v2\/posts\/955\/revisions"}],"predecessor-version":[{"id":961,"href":"https:\/\/nis2compliant.org\/sl\/wp-json\/wp\/v2\/posts\/955\/revisions\/961"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nis2compliant.org\/sl\/wp-json\/wp\/v2\/media\/956"}],"wp:attachment":[{"href":"https:\/\/nis2compliant.org\/sl\/wp-json\/wp\/v2\/media?parent=955"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nis2compliant.org\/sl\/wp-json\/wp\/v2\/categories?post=955"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nis2compliant.org\/sl\/wp-json\/wp\/v2\/tags?post=955"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}