Tuesday 25 August 2020

European standards for information security in Ukraine

The Verkhovna Rada of Ukraine adopted the law “On Amendments to the Law“ On Information Protection in Information and Telecommunication Systems ”regarding confirmation of the compliance of the information system with information protection requirements.

The law on the territory of Ukraine adopted the requirements of the ISMS family standards for certain categories of information, the protection of which is ensured by the legislation of Ukraine. Also, the law has been amended to the basic requirements for the protection of information, as well as the criteria for establishing compliance with these requirements google cloud certification

Corresponding amendments were made to the Law of Ukraine "On the protection of information in information and telecommunication systems" and for the most part affected the ways of confirming the compliance of the information system with the requirements for information protection by establishing appropriate criteria.

The explanatory note to the above document indicates that the main purpose of the adoption of this law is to integrate European requirements and criteria for assessing information protection against cyber threats with the Ukrainian legislative data protection system. Standards that regulate data protection issues, cybersecurity - information security management systems, ISMS (Information Security Management System, ISMS).

The law touched upon the main topics of protection and exchange of information, such as cryptographic protection of information. The law established the main points and requirements for the placement, storage of basic information resources, their protection and other regulatory requirements, both general and industry-specific.

The adoption of this law is undoubtedly a step forward for information security in Ukraine. The implementation of international standards, European ISMS will provide uniform cybersecurity requirements for companies of all sizes, thanks to a single independent standards base. Also, this, unambiguously, will facilitate the procedure for confirming the compliance of systems with information security requirements, as well as public procurement in government agencies and organizations where information protection is ensured by law.

The training center "Network Technologies" invites you to attend the NT-Security IT course Building an information security management system (ISMS) . The course is built on Ukrainian and international requirements for information security, reveals the main standards of the legal framework and is constantly updated with the release of new requirements and the adoption of updated standards.

No comments:

Post a Comment

What You Can Model with the Heat Transfer Module

Conduction, Convection, and Radiation Analyses The Heat Transfer Module can be used to study the three types of heat transfer in detail, exp...