4. Appendix A: cybersecurity regulatory considerations
This appendix outlines the scope and main objectives of the cybersecurity regulations passed over the past decade. All these texts have concrete consequences for IS architectures.
First and foremost, there are the military programming laws (LPM). Based on the strategic orientations contained in the 2013 White Paper on Defense and National Security , the 2014-2019 LPM specifies the security rules imposed on Vital Importance Operators (OIV) operating Vital Importance Information Systems (SIIV). These rules concern various fields of...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!
Appendix A: cybersecurity regulatory considerations
Article included in this offer
"Security of information systems"
(
86 articles
)
Updated and enriched with articles validated by our scientific committees
A set of exclusive tools to complement the resources
Bibliography
- (1) - Secrétariat général de la défense nationale - La défense en profondeur appliquée aux systèmes d'information. - Guide Version 1.1, ANSSI, juillet 2004. https://www.ssi.gouv.fr/defense-profondeur
- (2)...
Exclusive to subscribers. 97% yet to be discovered!
Already subscribed? Log in!