{"id":1288,"date":"2023-01-27T16:02:21","date_gmt":"2023-01-27T16:02:21","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=1288"},"modified":"2023-01-27T16:02:21","modified_gmt":"2023-01-27T16:02:21","slug":"szabalyozasi-es-szabvanyugyi-megfeleles","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/hu\/technologia-2\/szabalyozasi-es-szabvanyugyi-megfeleles\/","title":{"rendered":"Egy k\u00f6z\u00f6s von\u00e1s, amely kiemelkedik, amikor a Cisco h\u00e1l\u00f3zati routerekr\u0151l \u00e9s kapcsol\u00f3kr\u00f3l besz\u00e9l\u00fcnk: a h\u00edres Internetwork Operating System (IOS). Ez az er\u0151teljes \"motor\" az, ami ezeket az eszk\u00f6z\u00f6ket hajtja, biztos\u00edtva\u2026"},"content":{"rendered":"<p>A mesters\u00e9ges intelligencia, a virtu\u00e1lis val\u00f3s\u00e1g, a k\u00e9szp\u00e9nzmentes fizet\u00e9sek, a dolgok internete \u00e9s sok m\u00e1s inform\u00e1ci\u00f3technol\u00f3giai \u00e1g naponta n\u00f6vekszik.<\/p>\n\n\n\n<p class=\"translation-block\"><br>N\u00f6veked\u00e9s\u00fckkel \u00e9s terjeszked\u00e9s\u00fckkel \u00faj fenyeget\u00e9si vektorok \u00e9s sebezhet\u0151s\u00e9gek jelennek meg a kiber t\u00e9rben. A <a href=\"https:\/\/www.weforum.org\/reports\/global-cybersecurity-outlook-2022\/\" target=\"_self\">2022-es kiberbiztons\u00e1gi trendekr\u0151l sz\u00f3l\u00f3 jelent\u00e9s\u00e9ben<\/a> a Vil\u00e1ggazdas\u00e1gi F\u00f3rum kijelentette, hogy \u201cahogy a digitaliz\u00e1ci\u00f3 tov\u00e1bb terjed \u00e9s \u00faj technol\u00f3gi\u00e1k ker\u00fclnek bevezet\u00e9sre, a kock\u00e1zat elker\u00fclhetetlen\u00fcl n\u00f6vekedni fog\u201d. Felm\u00e9r\u00e9seik alapj\u00e1n megjegyezt\u00e9k, hogy \u201cb\u00e1r a k\u00f6z- \u00e9s mag\u00e1nszektor [\u2026] elk\u00f6telezett a magasabb kiberreziliencia el\u00e9r\u00e9se ir\u00e1nt, er\u0151fesz\u00edt\u00e9seiket gyakran k\u00fcl\u00f6nf\u00e9le [\u2026] szab\u00e1lyoz\u00e1si akad\u00e1lyok h\u00e1tr\u00e1ltatj\u00e1k\u201d.<\/p>\n\n\n\n<p>A szab\u00e1lyoz\u00e1si k\u00f6vetelm\u00e9nyek meg\u00e9rt\u00e9se val\u00f3j\u00e1ban nagy akad\u00e1lyt jelenthet a v\u00e1llalatok sz\u00e1m\u00e1ra, k\u00fcl\u00f6n\u00f6sen azok sz\u00e1m\u00e1ra, akik nemzetk\u00f6zi szintre k\u00edv\u00e1nnak l\u00e9pni. Az al\u00e1bbi cikkekben \u00e1ttekint\u00e9st ny\u00fajtunk arr\u00f3l, hogyan k\u00f6zel\u00edts\u00fck meg a kiberbiztons\u00e1gi szab\u00e1lyoz\u00e1sokat, melyek a leggyakoribbak \u00e9s hogyan k\u00f6zel\u00edts\u00fck meg \u0151ket.<\/p>\n\n\n<div role=\"navigation\" aria-label=\"Tartalomjegyz\u00e9k\" class=\"simpletoc wp-block-simpletoc-toc\"><h2 style=\"margin: 0;\"><button type=\"button\" aria-expanded=\"false\" aria-controls=\"simpletoc-content-container\" class=\"simpletoc-collapsible\">Tartalomjegyz\u00e9k<span class=\"simpletoc-icon\" aria-hidden=\"true\"><\/span><\/button><\/h2><div id=\"simpletoc-content-container\" class=\"simpletoc-content\"><ul class=\"simpletoc-list\">\n<li><a href=\"#ii-regulations-and-standards\">II. Szab\u00e1lyoz\u00e1sok \u00e9s szabv\u00e1nyok<\/a>\n\n<\/li>\n<li><a href=\"#understanding-regulations-and-standards\">Szab\u00e1lyoz\u00e1sok \u00e9s szabv\u00e1nyok meg\u00e9rt\u00e9se<\/a>\n\n<\/li>\n<li><a href=\"#how-do-you-manage-compliance-with-policies-and-regulations-challenges-and-solutions\">Hogyan kezelj\u00fck a megfelel\u00e9st a szab\u00e1lyzatokkal \u00e9s szab\u00e1lyoz\u00e1sokkal? Kih\u00edv\u00e1sok \u00e9s megold\u00e1sok<\/a>\n<\/li><\/ul><\/div><\/div>\n\n<h2 class=\"wp-block-heading\" id=\"ii-regulations-and-standards\"><a><\/a>II. Szab\u00e1lyoz\u00e1sok \u00e9s szabv\u00e1nyok<\/h2>\n\n\n<p>2005-ben a Nemzetk\u00f6zi T\u00e1vk\u00f6zl\u00e9si Egyes\u00fclet tanulm\u00e1nyt v\u00e9gzett a nemzeti szint\u0171 kiberbiztons\u00e1gi kezdem\u00e9nyez\u00e9sekr\u0151l 14 nagy vil\u00e1ggazdas\u00e1gban \u00e9s k\u00f6zel 30 ipar\u00e1gban. Becsl\u00e9seik szerint t\u00f6bb mint 174 kezdem\u00e9nyez\u00e9s volt akt\u00edv, amelyek j\u00f6v\u0151beli politik\u00e1khoz vezethettek volna. Ma, a vil\u00e1gszerte jelen l\u00e9v\u0151 szab\u00e1lyoz\u00e1sok \u00e9s szabv\u00e1nyok sz\u00e1ma alapj\u00e1n val\u00f3sz\u00edn\u0171, hogy a vil\u00e1gszerte \u00e9rv\u00e9nyben l\u00e9v\u0151 kiberbiztons\u00e1gi politik\u00e1k minim\u00e1lis sz\u00e1ma ezrekben m\u00e9rhet\u0151.<\/p>\n\n\n\n<p>Azonban fontos meg\u00e9rteni a k\u00fcl\u00f6nbs\u00e9get a szab\u00e1lyoz\u00e1sok \u00e9s szabv\u00e1nyok k\u00f6z\u00f6tt, mivel a szervezeteket k\u00f6telezhetik az egyik vagy mindkett\u0151 betart\u00e1s\u00e1ra. A kiberbiztons\u00e1gi szab\u00e1lyoz\u00e1s egy jogilag k\u00f6telez\u0151 \u00e9rv\u00e9ny\u0171 szab\u00e1ly (vagy szab\u00e1lyok halmaza), amelyet egy szervezetnek k\u00f6vetnie kell. E szab\u00e1lyoz\u00e1soknak val\u00f3 megfelel\u00e9s k\u00f6telez\u0151, \u00e9s a nem megfelel\u00e9s eset\u00e9n a szervezetek b\u00fcntet\u00e9sekkel, p\u00e9ld\u00e1ul p\u00e9nzb\u00edrs\u00e1gokkal vagy jogi l\u00e9p\u00e9sekkel n\u00e9zhetnek szembe a korm\u00e1nyzati szervek r\u00e9sz\u00e9r\u0151l.<\/p>\n\n\n\n<p>M\u00e1sr\u00e9szt a kiberbiztons\u00e1gi szabv\u00e1ny egy ir\u00e1nymutat\u00e1sok vagy bev\u00e1lt gyakorlatok halmaza, amelyet egy szervezet k\u00f6vethet a kiberbiztons\u00e1gi helyzet\u00e9nek jav\u00edt\u00e1sa \u00e9rdek\u00e9ben. E szabv\u00e1nyoknak val\u00f3 megfelel\u00e9s \u00f6nk\u00e9ntes, de k\u00f6vet\u00e9s\u00fck seg\u00edthet a szervezeteknek bemutatni \u00fcgyfeleik, partnereik \u00e9s szab\u00e1lyoz\u00f3ik sz\u00e1m\u00e1ra a kiberbiztons\u00e1gi helyzet\u00fck k\u00f6vetkezetess\u00e9g\u00e9t.<\/p>\n\n\n\n<p>In summary, regulations are legally binding and enforceable by law while standards are not. However, as standards are more frequently updated, being compliant with a standard can help an organization comply with a regulation. Additionally, given that regulations usually have broader scope, compliance with standards specific to an organization\u2019s sector can help it stand out from competitors.<\/p>\n\n\n\n<p>Therefore, depending on an organization\u2019s activity, it may need to comply with a specific standard or regulation. However, it is safe to assume that any modern business must comply with data protection and cybersecurity. For this reason, I have summarized key points from two regulations in Europe and two commonly requested standards across companies worldwide: the General Data Protection Regulation (GDPR), the Network and Information Systems (NIS) Directive, ISO 27k, and the National Institute of Standards and Technology (NIST).<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"understanding-regulations-and-standards\">Szab\u00e1lyoz\u00e1sok \u00e9s szabv\u00e1nyok meg\u00e9rt\u00e9se<\/h2>\n\n\n<p>Ha nem ismeri az \u00f6sszes fent eml\u00edtett politik\u00e1t, r\u00f6vid bevezet\u00e9st adok n\u00e9gy k\u00f6z\u00fcl\u00fck:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li> GDPR (\u00c1ltal\u00e1nos Adatv\u00e9delmi Rendelet): Ez az EU rendelete, amely a szem\u00e9lyes adatok v\u00e9delm\u00e9t \u00e9s az egy\u00e9nek jogait szab\u00e1lyozza a szem\u00e9lyes adataikkal kapcsolatban. Alkalmazand\u00f3 b\u00e1rkire, aki EU \u00e1llampolg\u00e1rok szem\u00e9lyes adatait kezeli, f\u00fcggetlen\u00fcl att\u00f3l, hogy hol tal\u00e1lhat\u00f3. Ez azt jelenti, hogy b\u00e1rki, aki eur\u00f3pai \u00e1llampolg\u00e1rok szem\u00e9lyes adatait kezeli, k\u00f6teles betartani a GDPR-t. A GDPR cikkei t\u00f6bbek k\u00f6z\u00f6tt szab\u00e1lyozz\u00e1k a szem\u00e9lyes adatok v\u00e9delm\u00e9re hozott int\u00e9zked\u00e9seket, az adatv\u00e9delmi tisztvisel\u0151 kinevez\u00e9s\u00e9t, valamint az adatv\u00e9delmi incidensek kezel\u00e9s\u00e9nek \u00e9s jelent\u00e9s\u00e9nek folyamat\u00e1t.<\/li>\n\n\n\n<li>NIS Ir\u00e1nyelv (H\u00e1l\u00f3zati \u00e9s Inform\u00e1ci\u00f3s Rendszerek Ir\u00e1nyelv): Ez az EU ir\u00e1nyelve, amely az alapvet\u0151 infrastrukt\u00fara \u00e9s alapvet\u0151 szolg\u00e1ltat\u00e1sok biztons\u00e1gi alapvonal\u00e1nak biztos\u00edt\u00e1s\u00e1ra \u00f6sszpontos\u00edt Eur\u00f3pa-szerte. Az ir\u00e1nyelv k\u00f6vet\u00e9se \u00e9rdek\u00e9ben minden kritikus ipar\u00e1gban m\u0171k\u00f6d\u0151 v\u00e1llalatnak (p\u00e9ld\u00e1ul energia, k\u00f6zleked\u00e9s \u00e9s eg\u00e9szs\u00e9g\u00fcgy) \u00e9s digit\u00e1lis szolg\u00e1ltat\u00f3iknak (p\u00e9ld\u00e1ul keres\u0151motorok \u00e9s felh\u0151szolg\u00e1ltat\u00e1sok) megfelel\u0151 biztons\u00e1gi int\u00e9zked\u00e9seket kell bevezetni\u00fck. Ezenk\u00edv\u00fcl az ir\u00e1nyelv megk\u00f6veteli az EU tag\u00e1llamait\u00f3l, hogy rendelkezzenek nemzeti kiberbiztons\u00e1gi strat\u00e9gi\u00e1kkal \u00e9s incidenskezel\u00e9si tervekkel, amelyek legal\u00e1bb egyenl\u0151ek vagy sz\u00e9lesebbek, mint a NIS Ir\u00e1nyelv. Ez azt jelenti, hogy az \u00f6sszes EU \u00e1llamnak olyan szab\u00e1lyoz\u00e1sokat kell bevezetnie, amelyeknek legal\u00e1bb a NIS Ir\u00e1nyelv \u00f6sszes t\u00e1rgy\u00e1t le kell fedni\u00fck, de lehetnek (\u00e9s kell is lenni\u00fck) kiterjedtebbek.<\/li>\n\n\n\n<li> ISO 27000 szabv\u00e1ny a kiberbiztons\u00e1gra: M\u00e1s n\u00e9ven ISO 27k, ez egy nemzetk\u00f6zi szabv\u00e1ny, amely egy inform\u00e1ci\u00f3biztons\u00e1gi ir\u00e1ny\u00edt\u00e1si rendszer (ISMS) keretrendszer\u00e9t v\u00e1zolja fel. Szisztematikus megk\u00f6zel\u00edt\u00e9st biztos\u00edt az \u00e9rz\u00e9keny v\u00e1llalati inform\u00e1ci\u00f3k kezel\u00e9s\u00e9re, hogy azok biztons\u00e1gban maradjanak. Mag\u00e1ban foglal egy sor szab\u00e1lyzatot \u00e9s elj\u00e1r\u00e1st, amelyeket a szervezetek haszn\u00e1lhatnak a bizalmas adataik v\u00e9delm\u00e9re, valamint ir\u00e1nymutat\u00e1sokat a kock\u00e1zatkezel\u00e9shez \u00e9s a megfelel\u00e9shez.<\/li>\n\n\n\n<li> NIST (National Institute of Standards and Technology) cybersecurity Framework: NIST is a U.S. government agency that publishes a wide range of cybersecurity standards, guidelines, and best practices. NIST\u2019s Cybersecurity Framework provides a risk-based approach to managing cybersecurity. The Standard is structured by detailing five core courses of action to be compliant: Identify, Protect, Detect, Respond, and Recover.<\/li>\n<\/ul>\n\n\n\n<p>A GDPR, a NIS Ir\u00e1nyelv, az ISO 27k \u00e9s a NIST mind a kiberbiztons\u00e1ggal \u00e9s az adatv\u00e9delemmel foglalkoznak. B\u00e1r terjedelemben \u00e9s k\u00f6vetelm\u00e9nyekben elt\u00e9rhetnek, egy k\u00f6z\u00fcl\u00fck val\u00f3 foglalkoz\u00e1s kulcsfontoss\u00e1g\u00fa l\u00e9p\u00e9s lehet a t\u00f6bbiek el\u00e9r\u00e9s\u00e9hez. P\u00e9ld\u00e1ul:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Ha az ISO 27k-t \u00e9s a NIST-et vessz\u00fck, l\u00e1thatjuk, hogy mindk\u00e9t szabv\u00e1ny sz\u00e9les k\u00f6rben elfogadott \u00e9s elismert bev\u00e1lt gyakorlatk\u00e9nt a kiberbiztons\u00e1g ter\u00e9n. Azonban az ISO 27k egy folyamat-alap\u00fa szabv\u00e1ny, amely ir\u00e1nymutat\u00e1sokat ny\u00fajt az \u00e9rz\u00e9keny v\u00e1llalati inform\u00e1ci\u00f3k kezel\u00e9s\u00e9re. M\u00e1sr\u00e9szt a NIST egy kock\u00e1zat-alap\u00fa megk\u00f6zel\u00edt\u00e9sre \u00e9p\u00fcl, \u00e9s c\u00e9lja a kiberbiztons\u00e1gi sebezhet\u0151s\u00e9gekb\u0151l ered\u0151 kock\u00e1zatok azonos\u00edt\u00e1sa, kezel\u00e9se \u00e9s cs\u00f6kkent\u00e9se.<\/li>\n\n\n\n<li>Ha a NIS Ir\u00e1nyelvet \u00e9s a GDPR-t vessz\u00fck, l\u00e1thatjuk, hogy \u00fatmutat\u00e1st \u00e9s k\u00f6vetelm\u00e9nyeket ny\u00fajtanak a kiberbiztons\u00e1gi helyzet jav\u00edt\u00e1s\u00e1ra. Val\u00f3j\u00e1ban a kett\u0151 bizonyos szempontokban \u00e1tfedi egym\u00e1st. Azonban meg kell jegyezni, hogy a GDPR c\u00e9lja a szem\u00e9lyes adatok v\u00e9delme minden szinten, m\u00edg a NIS Ir\u00e1nyelv c\u00e9lja az inform\u00e1ci\u00f3biztons\u00e1ggal kapcsolatos \u00f6sszes szempont \u00fatmutat\u00e1sa, de csak ipar\u00e1g-specifikus terjedelemben.<\/li>\n<\/ul>\n\n\n\n<p>To summarize: the scope, enforceability, and purpose of your cybersecurity policies can be defined after regulations and standards but you must be aware of the differences between them in order to understand which one best applies to you. Once you\u2019ve figured that out, it is just a matter of implementing them correctly. In the next section, a few suggestions on this matter.\u201d<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"how-do-you-manage-compliance-with-policies-and-regulations-challenges-and-solutions\"><a><\/a>Hogyan kezelj\u00fck a megfelel\u00e9st a szab\u00e1lyzatokkal \u00e9s szab\u00e1lyoz\u00e1sokkal? Kih\u00edv\u00e1sok \u00e9s megold\u00e1sok<\/h2>\n\n\n<p>Az eml\u00edtett politik\u00e1k v\u00e9grehajt\u00e1sa jogi k\u00f6vetelm\u00e9nyek vagy egy k\u00f6zelg\u0151 audit miatt sz\u00fcks\u00e9ges lehet. Lehet, hogy v\u00e1ltoztat\u00e1sokat kell v\u00e9grehajtania a folyamataiban \u00e9s strukt\u00far\u00e1j\u00e1ban, hogy megfeleljen a vonatkoz\u00f3 politik\u00e1nak. Azonban miel\u0151tt ezt megtenn\u00e9, van n\u00e9h\u00e1ny \u00e1ltal\u00e1nos l\u00e9p\u00e9s, amelyeket megtehet az ezekre val\u00f3 felk\u00e9sz\u00fcl\u00e9s \u00e9rdek\u00e9ben:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Lelt\u00e1r \u00e9s eszk\u00f6zkezel\u00e9s: A szervezetek \u00e1ltal\u00e1ban felm\u00e9rik jelenlegi rendszereiket, folyamataikat \u00e9s elj\u00e1r\u00e1saikat, hogy meghat\u00e1rozz\u00e1k megfelel\u0151s\u00e9gi szintj\u00fcket. Ez mag\u00e1ban foglalja a nem megfelel\u0151s\u00e9g ismert ter\u00fcleteinek \u00e9s a jelenlegi infrastrukt\u00far\u00e1jukban ismert kock\u00e1zatok \u00e9s sebezhet\u0151s\u00e9gek azonos\u00edt\u00e1s\u00e1t.<\/li>\n\n\n\n<li>K\u00e9pz\u00e9s \u00e9s kommunik\u00e1ci\u00f3: Az er\u0151forr\u00e1sok felk\u00e9sz\u00edt\u00e9se a k\u00f6zelg\u0151 v\u00e1ltoz\u00e1sokra kulcsfontoss\u00e1g\u00fa annak biztos\u00edt\u00e1sa \u00e9rdek\u00e9ben, hogy mindenki a szervezet\u00e9ben meg\u00e9rtse a sz\u00fcks\u00e9ges v\u00e1ltoz\u00e1sokat. Egy audit vagy infrastrukt\u00fara friss\u00edt\u00e9s zavarokat okozhat, \u00e9s sz\u00fcks\u00e9gess\u00e9 teheti az alkalmazottak sz\u00e1m\u00e1ra \u00faj k\u00e9szs\u00e9gek elsaj\u00e1t\u00edt\u00e1s\u00e1t. Ezeknek az \u00fcgyeknek a tudatoss\u00e1ga seg\u00edthet id\u0151t megtakar\u00edtani a priorit\u00e1sok meghat\u00e1roz\u00e1s\u00e1ban \u00e9s a lehets\u00e9ges megold\u00e1sok tervez\u00e9s\u00e9ben.<\/li>\n\n\n\n<li>Harmadik f\u00e9l \u00e9s sz\u00e1ll\u00edt\u00f3kezel\u00e9s: Ez egy gyakran figyelmen k\u00edv\u00fcl hagyott szempont. Val\u00f3sz\u00edn\u0171leg r\u00e9szletes \u00e9s friss\u00edtett lelt\u00e1rra lesz sz\u00fcks\u00e9g a sz\u00e1ll\u00edt\u00f3kr\u00f3l a legt\u00f6bb szabv\u00e1ny \u00e9s szab\u00e1lyoz\u00e1snak val\u00f3 megfelel\u00e9s biztos\u00edt\u00e1sa \u00e9rdek\u00e9ben. M\u00e9g ha egy politika k\u00f6zvetlen\u00fcl nem is foglalkozik egy harmadik f\u00e9llel, m\u00e9gis k\u00f6zvetetten v\u00e1ltoztat\u00e1sokat k\u00f6vetelhet meg a k\u00fcls\u0151 szolg\u00e1ltat\u00f3kkal k\u00f6t\u00f6tt meg\u00e1llapod\u00e1sok felt\u00e9teleiben.<\/li>\n\n\n\n<li>Hi\u00e1nyoss\u00e1g elemz\u00e9s: Ha egy szab\u00e1lyoz\u00e1snak vagy szabv\u00e1nynak val\u00f3 megfelel\u00e9st ellen\u0151riz, fontos, hogy felk\u00e9sz\u00fclj\u00f6n egy hi\u00e1nyoss\u00e1g elemz\u00e9s elv\u00e9gz\u00e9s\u00e9re, hogy azonos\u00edtsa azokat a ter\u00fcleteket, ahol kritikus m\u00f3dos\u00edt\u00e1sokra van sz\u00fcks\u00e9g. Ez az els\u0151 l\u00e9p\u00e9s a megfelel\u00e9s fel\u00e9, \u00e9s a legjobb, ha k\u00fcls\u0151 tan\u00e1csad\u00f3k v\u00e9gzik, akiknek speci\u00e1lis ismereteik vannak az el\u00e9rni k\u00edv\u00e1nt megfelel\u00e9sr\u0151l.<\/li>\n<\/ul>\n\n\n\n<p>\u00d6sszefoglalva, a szab\u00e1lyoz\u00e1soknak \u00e9s szabv\u00e1nyoknak val\u00f3 megfelel\u00e9s neh\u00e9z \u00e9s k\u00f6lts\u00e9ges lehet. Lehet, hogy k\u00fcls\u0151 tan\u00e1csad\u00f3kra kell t\u00e1maszkodnia a megfelel\u00e9s el\u00e9r\u00e9s\u00e9hez, ha nincs meg a sz\u00fcks\u00e9ges bels\u0151 kompetencia. Azonban a politik\u00e1k \u00e9s szab\u00e1lyoz\u00e1sok k\u00f6z\u00f6tti k\u00fcl\u00f6nbs\u00e9gek meg\u00e9rt\u00e9se \u00e9s egy strat\u00e9gia megl\u00e9te g\u00f6rd\u00fcl\u00e9kenyebb\u00e9 teheti a folyamatot, \u00e9s seg\u00edthet meghat\u00e1rozni, mikor \u00e9rdemes egy szabv\u00e1nyt jav\u00edtani, \u00e9s mikor sz\u00fcks\u00e9ges megfelelni a szab\u00e1lyoz\u00e1soknak.<\/p>","protected":false},"excerpt":{"rendered":"<p>Mi az a Smart DNS \u00e9s hogyan m\u0171k\u00f6dik? <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/hu\/technologia-2\/szabalyozasi-es-szabvanyugyi-megfeleles\/\">Folytat\u00e1s <span class=\"screen-reader-text\">Egy k\u00f6z\u00f6s von\u00e1s, amely kiemelkedik, amikor a Cisco h\u00e1l\u00f3zati routerekr\u0151l \u00e9s kapcsol\u00f3kr\u00f3l besz\u00e9l\u00fcnk: a h\u00edres Internetwork Operating System (IOS). Ez az er\u0151teljes \"motor\" az, ami ezeket az eszk\u00f6z\u00f6ket hajtja, biztos\u00edtva\u2026<\/span><\/a><\/p>","protected":false},"author":4,"featured_media":1298,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[30],"tags":[],"class_list":["post-1288","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Regulatory and Standard Compliance | Security Briefing<\/title>\n<meta name=\"description\" content=\"Stay up-to-date on the latest regulatory and standard compliance requirements for technology with Security Briefing.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/hu\/technologia-2\/szabalyozasi-es-szabvanyugyi-megfeleles\/\" \/>\n<meta property=\"og:locale\" content=\"hu_HU\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Regulatory and Standard Compliance | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Stay up-to-date on the latest regulatory and standard compliance requirements for technology with Security Briefing.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/hu\/technologia-2\/szabalyozasi-es-szabvanyugyi-megfeleles\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-27T16:02:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/01\/Regulatory-and-Standard-Compliance-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"779\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alessandro Mirani\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Szerz\u0151:\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alessandro Mirani\" \/>\n\t<meta name=\"twitter:label2\" content=\"Becs\u00fclt olvas\u00e1si id\u0151\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 perc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/tech\/regulatory-and-standard-compliance\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/regulatory-and-standard-compliance\/\"},\"author\":{\"name\":\"Alessandro Mirani\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/223f15fc2ffff8f95cd1f3faa3c422d2\"},\"headline\":\"Regulatory and Standard Compliance\",\"datePublished\":\"2023-01-27T16:02:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/regulatory-and-standard-compliance\/\"},\"wordCount\":1393,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/regulatory-and-standard-compliance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/01\/Regulatory-and-Standard-Compliance-1.jpg\",\"articleSection\":[\"Tech\"],\"inLanguage\":\"hu\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/tech\/regulatory-and-standard-compliance\/\",\"url\":\"https:\/\/securitybriefing.net\/tech\/regulatory-and-standard-compliance\/\",\"name\":\"Regulatory and Standard Compliance | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/regulatory-and-standard-compliance\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/regulatory-and-standard-compliance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/01\/Regulatory-and-Standard-Compliance-1.jpg\",\"datePublished\":\"2023-01-27T16:02:21+00:00\",\"description\":\"Stay up-to-date on the latest regulatory and standard compliance requirements for technology with Security Briefing.\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/tech\/regulatory-and-standard-compliance\/#breadcrumb\"},\"inLanguage\":\"hu\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/tech\/regulatory-and-standard-compliance\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/tech\/regulatory-and-standard-compliance\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/01\/Regulatory-and-Standard-Compliance-1.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/01\/Regulatory-and-Standard-Compliance-1.jpg\",\"width\":779,\"height\":300,\"caption\":\"Regulatory and Standard Compliance\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/tech\/regulatory-and-standard-compliance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Regulatory and Standard Compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"hu\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/223f15fc2ffff8f95cd1f3faa3c422d2\",\"name\":\"Alessandro Mirani\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"hu\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cc902d0ba95f7eaadf8581d353dcdfe4f1a1dd3e219cda1a3c3666cfe139d887?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cc902d0ba95f7eaadf8581d353dcdfe4f1a1dd3e219cda1a3c3666cfe139d887?s=96&d=mm&r=g\",\"caption\":\"Alessandro Mirani\"},\"url\":\"https:\/\/securitybriefing.net\/hu\/author\/alessandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Szab\u00e1lyoz\u00e1si \u00e9s Szabv\u00e1nymegfelel\u00e9s | Biztons\u00e1gi T\u00e1j\u00e9koztat\u00f3","description":"Maradjon naprak\u00e9sz a leg\u00fajabb szab\u00e1lyoz\u00e1si \u00e9s szabv\u00e1nymegfelel\u00e9si k\u00f6vetelm\u00e9nyekkel kapcsolatban a technol\u00f3gia ter\u00e9n a Security Briefing seg\u00edts\u00e9g\u00e9vel.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/hu\/technologia-2\/szabalyozasi-es-szabvanyugyi-megfeleles\/","og_locale":"hu_HU","og_type":"article","og_title":"Regulatory and Standard Compliance | Security Briefing","og_description":"Stay up-to-date on the latest regulatory and standard compliance requirements for technology with Security Briefing.","og_url":"https:\/\/securitybriefing.net\/hu\/technologia-2\/szabalyozasi-es-szabvanyugyi-megfeleles\/","og_site_name":"Security Briefing","article_published_time":"2023-01-27T16:02:21+00:00","og_image":[{"width":779,"height":300,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/01\/Regulatory-and-Standard-Compliance-1.jpg","type":"image\/jpeg"}],"author":"Alessandro Mirani","twitter_card":"summary_large_image","twitter_misc":{"Szerz\u0151:":"Alessandro Mirani","Becs\u00fclt olvas\u00e1si id\u0151":"7 perc"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/tech\/regulatory-and-standard-compliance\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/tech\/regulatory-and-standard-compliance\/"},"author":{"name":"Alessandro Mirani","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/223f15fc2ffff8f95cd1f3faa3c422d2"},"headline":"Regulatory and Standard Compliance","datePublished":"2023-01-27T16:02:21+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/tech\/regulatory-and-standard-compliance\/"},"wordCount":1393,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/tech\/regulatory-and-standard-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/01\/Regulatory-and-Standard-Compliance-1.jpg","articleSection":["Tech"],"inLanguage":"hu"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/tech\/regulatory-and-standard-compliance\/","url":"https:\/\/securitybriefing.net\/tech\/regulatory-and-standard-compliance\/","name":"Szab\u00e1lyoz\u00e1si \u00e9s Szabv\u00e1nymegfelel\u00e9s | Biztons\u00e1gi T\u00e1j\u00e9koztat\u00f3","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/tech\/regulatory-and-standard-compliance\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/tech\/regulatory-and-standard-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/01\/Regulatory-and-Standard-Compliance-1.jpg","datePublished":"2023-01-27T16:02:21+00:00","description":"Maradjon naprak\u00e9sz a leg\u00fajabb szab\u00e1lyoz\u00e1si \u00e9s szabv\u00e1nymegfelel\u00e9si k\u00f6vetelm\u00e9nyekkel kapcsolatban a technol\u00f3gia ter\u00e9n a Security Briefing seg\u00edts\u00e9g\u00e9vel.","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/tech\/regulatory-and-standard-compliance\/#breadcrumb"},"inLanguage":"hu","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/tech\/regulatory-and-standard-compliance\/"]}]},{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/tech\/regulatory-and-standard-compliance\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/01\/Regulatory-and-Standard-Compliance-1.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/01\/Regulatory-and-Standard-Compliance-1.jpg","width":779,"height":300,"caption":"Regulatory and Standard Compliance"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/tech\/regulatory-and-standard-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"Regulatory and Standard Compliance"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"hu"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Biztons\u00e1gi t\u00e1j\u00e9koztat\u00f3","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/223f15fc2ffff8f95cd1f3faa3c422d2","name":"Alessandro Mirani","image":{"@type":"ImageObject","inLanguage":"hu","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cc902d0ba95f7eaadf8581d353dcdfe4f1a1dd3e219cda1a3c3666cfe139d887?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cc902d0ba95f7eaadf8581d353dcdfe4f1a1dd3e219cda1a3c3666cfe139d887?s=96&d=mm&r=g","caption":"Alessandro Mirani"},"url":"https:\/\/securitybriefing.net\/hu\/author\/alessandro\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/1288","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/comments?post=1288"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/posts\/1288\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media\/1298"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/media?parent=1288"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/categories?post=1288"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/hu\/wp-json\/wp\/v2\/tags?post=1288"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}