Erwägungsgrund 10

To detect anomalous behaviour and potential incidents, the relevant entities should monitor their network and information systems and should take actions to evaluate potential incidents. Those measures should be capable of allowing the detection of network-based attacks based on anomalous ingress or egress traffic patterns and distributed denial of service attacks in a timely manner.

Holen Sie sich den NIS2-Umsetzungs-Fahrplan und unseren Newsletter!