Direct links from the subject.
| Property | Value |
|---|---|
|
The subject is an instance of a class. |
|
|
The subject is an instance of a class. |
An idea or notion; a unit of thought. |
|
A human-readable name for the subject. |
PR.IR-01.1: Firewalls shall be installed, configured, and actively maintained on all networks used by the organisation to protect against unauthorised access and cyber threats. |
|
PR.IR-01.1 |
|
|
http://cyfun.data.gift/data/loc_CyFun2025_Booklet_BASIC_E_p38 |
|
|
http://cyfun.data.gift/data/loc_CyFun2025_Booklet_ESSENTIAL_E_p131 |
|
|
http://cyfun.data.gift/data/loc_CyFun2025_Booklet_IMPORTANT_E_p90 |
|
|
http://cyfun.data.gift/data/loc_CyFun2025_Booklet_IMPORTANT_E_p91 |
|
|
http://cyfun.data.gift/data/loc_CyFun2025_Booklet_BASIC_E_p37 |
|
|
http://cyfun.data.gift/data/loc_CyFun2025_Booklet_ESSENTIAL_E_p130 |
|
|
Relates a concept to a concept that is more general in meaning. |
|
|
A general note, for any purpose. |
The goal ofthis control is to ensure that all networks used bythe organisation are protected against unauthorised access and cyber threats through the installation, configuration, and active maintenance of firewalls. This control focuses on the installation, configuration, and maintenance of network-based firewalls to prevent unauthorisedaccessbymonitoringandcontrollingtrafficenteringorleavingthenetwork(focus:controlandpre- vention). In contrast, control DE.CM-01.1 addresses host-based firewalls,which help detect threats that bypass the network perimeter by monitoring traffic to and from individual devices (focus: visibility and detection). To implement this control, the organisation should: - Protect the Network Perimeter - A firewall should be installed between the internal network and the internet. This may be integrated into a wireless access point, router, or ISP-provided device. - Firewalls should be configured based on a baseline securitypolicyusing the principle of“denyall bydefault, allow only exceptions.” - Secure Endpoint Devices - A software firewall should be installed and regularly updated on all endpoint devices, including laptops, smartphones, and other networked systems. - Local firewalls should remain active even when using VPNs or cloud services. - Secure Home and Remote Work Environments - Home networks used for teleworking should use routers with built-in firewalls, which should be enabled, securely configured, and kept up to date. - Software firewalls should be active and updated on all remote work devices. - Default administrator credentials on home routers should be changed and updated regularly. - Protect Operational Technology (OT) Environments - Remote access to OT systems should be treated as third-party access, not standard teleworking. - A clear separation between IT and OT networks should be enforced. - When IT-to-OTaccess is necessary, it should pass through a secure jump host located in a dedicated DMZ. - Enhance Detection with IDPS An Intrusion Detection and Prevention System (IDPS) should be considered to monitor and analyse network traffic for suspicious activity and enhance overall protection. |
|
A general note, for any purpose. |
The goal ofthis control is to ensure that all networks used bythe organisation are protected against unauthorised access and cyber threats through the installation, configuration, and active maintenance of firewalls. This control focuses on the installation, configuration, and maintenance of network-based firewalls to prevent unauthorisedaccessbymonitoringandcontrollingtrafficenteringorleavingthenetwork(focus:controlandpre- vention). In contrast, control DE.CM-01.1 addresses host-based firewalls,which help detect threats that bypass the network perimeter by monitoring traffic to and from individual devices (focus: visibility and detection). To implement this control, the organisation should: • Protect the Network Perimeter o A firewall should be installed between the internal network and the internet. This may be integrated into a wireless access point, router, or ISP-provided device. o Firewalls should be configured based on a baseline securitypolicyusing the principle of“denyall bydefault, allow only exceptions.” • Secure Endpoint Devices o A software firewall should be installed and regularly updated on all endpoint devices, including laptops, smartphones, and other networked systems. o Local firewalls should remain active even when using VPNs or cloud services. • Secure Home and Remote Work Environments o Home networks used for teleworking should use routers with built-in firewalls, which should be enabled, securely configured, and kept up to date. o Software firewalls should be active and updated on all remote work devices. o Default administrator credentials on home routers should be changed and updated regularly. • Protect Operational Technology (OT) Environments o Remote access to OT systems should be treated as third-party access, not standard teleworking. o A clear separation between IT and OT networks should be enforced. o When IT-to-OTaccess is necessary, it should pass through a secure jump host located in a dedicated DMZ. • Enhance Detection with IDPS An Intrusion Detection and Prevention System (IDPS) should be considered to monitor and analyse network traffic for suspicious activity and enhance overall protection. |
|
A general note, for any purpose. |
The goal ofthis control is to ensure that all networks used bythe organisation are protected against unauthorised access and cyber threats through the installation, configuration, and active maintenance of firewalls. This control focuses on the installation, configuration, and maintenance of network-based firewalls to prevent unauthorisedaccessbymonitoringandcontrollingtrafficenteringorleavingthenetwork(focus:controlandpre- vention). In contrast, control DE.CM-01.1 addresses host-based firewalls,which help detect threats that bypass the network perimeter by monitoring traffic to and from individual devices (focus: visibility and detection). To implement this control, the organisation should: - Protect the Network Perimeter - A firewall should be installed between the internal network and the internet. This may be integrated into a wireless access point, router, or ISP-provided device. - Firewalls should be configured based on a baseline securitypolicyusing the principle of“denyall bydefault, allow only exceptions.” - Secure Endpoint Devices - A software firewall should be installed and regularly updated on all endpoint devices, including laptops, smartphones, and other networked systems. - Local firewalls should remain active even when using VPNs or cloud services. - Secure Home and Remote Work Environments - Home networks used for teleworking should use routers with built-in firewalls, which should be enabled, securely configured, and kept up to date. - Software firewalls should be active and updated on all remote work devices. - Default administrator credentials on home routers should be changed and updated regularly. - Protect Operational Technology (OT) Environments - Remote access to OT systems should be treated as third-party access, not standard teleworking. - A clear separation between IT and OT networks should be enforced. - When IT-to-OTaccess is necessary, it should pass through a secure jump host located in a dedicated DMZ. - Enhance Detection with IDPS An Intrusion Detection and Prevention System (IDPS) should be considered to monitor and analyse network traffic for suspicious activity and enhance overall protection. |
|
A general note, for any purpose. |
<div><p>The goal ofthis control is to ensure that all networks used bythe organisation are protected against unauthorised access and cyber threats through the installation, configuration, and active maintenance of firewalls. This control focuses on the installation, configuration, and maintenance of network-based firewalls to prevent unauthorisedaccessbymonitoringandcontrollingtrafficenteringorleavingthenetwork(focus:controlandpre- vention). In contrast, control DE.CM-01.1 addresses host-based firewalls,which help detect threats that bypass the network perimeter by monitoring traffic to and from individual devices (focus: visibility and detection). To implement this control, the organisation should:</p><ul><li>Protect the Network Perimeter<ul><li>A firewall should be installed between the internal network and the internet. This may be integrated into a wireless access point, router, or ISP-provided device.</li><li>Firewalls should be configured based on a baseline securitypolicyusing the principle of“denyall bydefault, allow only exceptions.”</li></ul></li><li>Secure Endpoint Devices<ul><li>A software firewall should be installed and regularly updated on all endpoint devices, including laptops, smartphones, and other networked systems.</li><li>Local firewalls should remain active even when using VPNs or cloud services.</li></ul></li><li>Secure Home and Remote Work Environments<ul><li>Home networks used for teleworking should use routers with built-in firewalls, which should be enabled, securely configured, and kept up to date.</li><li>Software firewalls should be active and updated on all remote work devices.</li><li>Default administrator credentials on home routers should be changed and updated regularly.</li></ul></li><li>Protect Operational Technology (OT) Environments<ul><li>Remote access to OT systems should be treated as third-party access, not standard teleworking.</li><li>A clear separation between IT and OT networks should be enforced.</li><li>When IT-to-OTaccess is necessary, it should pass through a secure jump host located in a dedicated DMZ.</li></ul></li><li>Enhance Detection with IDPS An Intrusion Detection and Prevention System (IDPS) should be considered to monitor and analyse network traffic for suspicious activity and enhance overall protection.</li></ul></div> |
|
A notation, also known as classification code, is a string of characters such as "T58.5" or "303.4833" used to uniquely identify a concept within the scope of a given concept scheme. |
PR.IR-01.1 |
|
skos:prefLabel, skos:altLabel and skos:hiddenLabel are pairwise disjoint properties. |
Firewall installation and configuration |
|
A resource has no more than one value of skos:prefLabel per language tag, and no more than one value of skos:prefLabel without language tag. |
Firewalls shall be installed, configured, and actively maintained on all networks used by the organisation to protect against unauthorised access and cyber threats. |
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
|
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
|
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
|
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
|
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
|
|
Relates a resource (for example a concept) to a concept scheme in which it is included. |
|
|
1 |
|
|
The number of triples associated with the subject. |
26 |
|
Specifies the dataset the subject is part of. |
Resultaten 1 - 28 of 28
Inverse links to the subject.
| Property | Subject |
|---|---|
|
Relates a concept to a concept that is more specific in meaning. |
Resultaten 1 - 1 of 1