7. POLICIES AND PROCEDURES TO ASSESS THE EFFECTIVENESS OF CYBERSECURITY RISK-MANAGEMENT MEASURES
8. BASIC CYBER HYGIENE PRACTICES AND SECURITY TRAINING
9. CRYPTOGRAPHY

11.4 Administration systems

11.4.1. The relevant entities shall restrict and control the use of system administration systems.

11.4.2. For that purpose, the relevant entities shall:

(a) only use system administration systems for system administration purposes, and not for any other operations;
(b) separate logically such systems from application software not used for system administrative purposes,
(c) protect access to system administration systems through authentication and encryption.

Stand: 27.06.2024

Holen Sie sich den NIS2-Umsetzungs-Fahrplan und unseren Newsletter!