{"id":3105863,"date":"2025-08-06T08:26:59","date_gmt":"2025-08-06T07:26:59","guid":{"rendered":"https:\/\/nordu.net\/?p=3105863"},"modified":"2025-08-06T13:25:54","modified_gmt":"2025-08-06T12:25:54","slug":"nordunet-documents-cybersecurity","status":"publish","type":"post","link":"https:\/\/nordu.net\/nordunet-documents-cybersecurity\/","title":{"rendered":"NORDUnet documents cybersecurity"},"content":{"rendered":"<p>Following a lengthy auditing process, NORDUnet\u2019s management regime for data security is certified as complying with the leading international standard.<\/p>\n<p>In recent years, ISO 27001 has become the world&#8217;s leading information security management system (ISMS) standard. By late June 2025, NORDUnet received the certificate documenting compliance with the standard.<\/p>\n<p>\u201cGiven the rising level of cyberthreats, it is only natural that still more external partners take interest in what we are doing in the field. And often they ask specifically about ISO 27001. For instance, this is often a requirement in EU tenders,\u201d says Josva Kleist, Chief Technology Officer at NORDUnet.<\/p>\n<p>ISO 27001 does not require specific technical solutions to be implemented. Instead, an organization under audit must do a comprehensive initial risk assessment, the CTO explains:<\/p>\n<p>\u201cFor instance, we mapped the security risks associated with each of the services we provide. Next, we would assess if these risks were at an acceptable level \u2013 meaning they could be managed during daily operation &#8211; or if they were unacceptable, meaning we would have to implement more radical measures to reduce these risks. \u201c<\/p>\n<p><strong>Better documentation is the main improvement<\/strong><\/p>\n<p>The auditing has not resulted in any major changes in the way NORDUnet handles cybersecurity, according to Josva Kleist:<\/p>\n<p>\u201cStill, this has been a very healthy exercise. We had to scrutinize in detail how we handle data security. In close to all cases, we knew we were already addressing the issue appropriately, but we were not always able to document this. We are now. Notably, the people responsible for the data security of our services have obtained a methodology allowing them to explain to management, what they are doing.\u201d<\/p>\n<p>The certification process has added to the work hours of the technical staff, the CTO admits:<\/p>\n<p>\u201cWe spend more time on documentation now, but it is worth it. Anybody can claim they have a high level of data security, but thanks to the certification we can document this.\u201d<\/p>\n<p><strong>A never-ending process<\/strong><\/p>\n<p>While valuable, the ISO certification is just a first step, Josva Kleist explains:<\/p>\n<p>\u201cWe will be required to comply with upcoming EU regulation, and much of the content will be equivalent to ISO 27001. Thereby, we will have a head start.\u201d<\/p>\n<p>The EU directive NIS2 (the second directive on Net and Information Security) will aim to disseminate high standards for data security management to a wide range of organizations across Europe. By October 2025, organizations subject to the directive\u2019s focus are requested to register with their national authorities, and by early 2026 some will be chosen for audits.<\/p>\n<p>\u201cWe all remember the process around the GDPR directive some years ago. Despite extensive attention leading up to the implementation, it seemed that everybody was quite unprepared when it finally came. We are determined not to be caught by surprise this time!\u201d<\/p>\n<p>The ISO 27001 certification is valid for three years. A yearly self-evaluation and an external evaluation are required.<\/p>\n<p>\u201cInformation security is an ongoing process. There is no end goal, we will need to find improvements constantly,\u201d the CTO emphasizes.<\/p>\n\n\n<div class=\"wp-block-cover\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim\" style=\"background-color:#005eb8\"><\/span><div class=\"wp-block-cover__inner-container is-layout-constrained wp-block-cover-is-layout-constrained\">\n<p class=\"has-text-align-left has-white-color has-text-color has-link-color has-large-font-size wp-elements-4260e38a98605d11362da29e4511ad2f\"><strong>ISO 27001<\/strong><\/p>\n\n\n\n<p class=\"has-medium-font-size\">The ISO 27001 standard provides companies of any size and from all sectors of activity with guidance for establishing, implementing, maintaining and continually improving an information security management system (ISMS).<\/p>\n\n\n\n<p class=\"has-medium-font-size\">Conformity with ISO 27001 means that an organization or business has put in place a system to manage risks related to the security of data owned or handled by the company, and that this system respects all the best practices and principles enshrined in this International Standard.<\/p>\n\n\n\n<p class=\"has-medium-font-size\">ISO 27001 promotes a holistic approach to information security: vetting people, policies and technology. An information security management system implemented according to this standard is a tool for&nbsp;risk management,cyber-resilienceandoperational excellence.<\/p>\n\n\n\n<p class=\"has-text-align-left has-white-color has-text-color has-link-color has-medium-font-size wp-elements-c13bc2e3ec7f753633cc242d89aa1fab\"><em>Source: International Organization for Standardization (ISO).<\/em><\/p>\n<\/div><\/div>\n\n\n\n<div data-wp-interactive=\"core\/file\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!state.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/nordu.net\/wp-content\/uploads\/2025\/08\/Certificate-NORDUnet-CI-22610-20250626-ENG.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Certificate NORDUnet CI-22610-20250626 ENG.\"><\/object><a id=\"wp-block-file--media-8550a187-5c26-4e19-9a2c-db92c21c195f\" href=\"https:\/\/nordu.net\/wp-content\/uploads\/2025\/08\/Certificate-NORDUnet-CI-22610-20250626-ENG.pdf\">Certificate NORDUnet CI-22610-20250626 ENG<\/a><a href=\"https:\/\/nordu.net\/wp-content\/uploads\/2025\/08\/Certificate-NORDUnet-CI-22610-20250626-ENG.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-8550a187-5c26-4e19-9a2c-db92c21c195f\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Following a lengthy auditing process, NORDUnet\u2019s management regime for data security is certified as complying with the leading international standard. In recent years, ISO 27001 has become the world&#8217;s leading information security management system (ISMS) standard. By late June 2025, NORDUnet received the certificate documenting compliance with the standard. \u201cGiven the rising level of cyberthreats, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3105929,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[132],"tags":[],"class_list":["post-3105863","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-nordunet"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.9 (Yoast SEO v26.9) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>NORDUnet documents cybersecurity - NORDUnet<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nordu.net\/nordunet-documents-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NORDUnet documents cybersecurity\" \/>\n<meta property=\"og:description\" content=\"Following a lengthy auditing process, NORDUnet\u2019s management regime for data security is certified as complying with the leading international standard. In recent years, ISO 27001 has become the world&#8217;s leading information security management system (ISMS) standard. By late June 2025, NORDUnet received the certificate documenting compliance with the standard. \u201cGiven the rising level of cyberthreats, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nordu.net\/nordunet-documents-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"NORDUnet\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NORDUnet\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-06T07:26:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-06T12:25:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nordu.net\/wp-content\/uploads\/2025\/08\/Screenshot-2025-08-06-at-09.23.06-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1812\" \/>\n\t<meta property=\"og:image:height\" content=\"1168\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Ani@\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@nordunet\" \/>\n<meta name=\"twitter:site\" content=\"@nordunet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ani@\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/nordu.net\/nordunet-documents-cybersecurity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/nordu.net\/nordunet-documents-cybersecurity\/\"},\"author\":{\"name\":\"Ani@\",\"@id\":\"https:\/\/nordu.net\/#\/schema\/person\/a561afb9c504ae4c58ae53efb7ca5d4e\"},\"headline\":\"NORDUnet documents cybersecurity\",\"datePublished\":\"2025-08-06T07:26:59+00:00\",\"dateModified\":\"2025-08-06T12:25:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/nordu.net\/nordunet-documents-cybersecurity\/\"},\"wordCount\":623,\"publisher\":{\"@id\":\"https:\/\/nordu.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/nordu.net\/nordunet-documents-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/nordu.net\/wp-content\/uploads\/2025\/08\/Screenshot-2025-08-06-at-09.23.06-1.png\",\"articleSection\":[\"NORDUnet\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/nordu.net\/nordunet-documents-cybersecurity\/\",\"url\":\"https:\/\/nordu.net\/nordunet-documents-cybersecurity\/\",\"name\":\"NORDUnet documents cybersecurity - NORDUnet\",\"isPartOf\":{\"@id\":\"https:\/\/nordu.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/nordu.net\/nordunet-documents-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/nordu.net\/nordunet-documents-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/nordu.net\/wp-content\/uploads\/2025\/08\/Screenshot-2025-08-06-at-09.23.06-1.png\",\"datePublished\":\"2025-08-06T07:26:59+00:00\",\"dateModified\":\"2025-08-06T12:25:54+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/nordu.net\/nordunet-documents-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/nordu.net\/nordunet-documents-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/nordu.net\/nordunet-documents-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/nordu.net\/wp-content\/uploads\/2025\/08\/Screenshot-2025-08-06-at-09.23.06-1.png\",\"contentUrl\":\"https:\/\/nordu.net\/wp-content\/uploads\/2025\/08\/Screenshot-2025-08-06-at-09.23.06-1.png\",\"width\":1812,\"height\":1168},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/nordu.net\/nordunet-documents-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/nordu.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NORDUnet documents cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/nordu.net\/#website\",\"url\":\"https:\/\/nordu.net\/\",\"name\":\"NORDUnet\",\"description\":\"Nordic Gateway for Research and Education\",\"publisher\":{\"@id\":\"https:\/\/nordu.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/nordu.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/nordu.net\/#organization\",\"name\":\"NORDUnet\",\"url\":\"https:\/\/nordu.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/nordu.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/nordu.net\/wp-content\/uploads\/2021\/09\/NORDUnet_2020forWEBtransparent.png\",\"contentUrl\":\"https:\/\/nordu.net\/wp-content\/uploads\/2021\/09\/NORDUnet_2020forWEBtransparent.png\",\"width\":914,\"height\":232,\"caption\":\"NORDUnet\"},\"image\":{\"@id\":\"https:\/\/nordu.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NORDUnet\",\"https:\/\/x.com\/nordunet\",\"https:\/\/mastodon.social\/@nordunet\/\",\"https:\/\/www.linkedin.com\/company\/nordunet\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/nordu.net\/#\/schema\/person\/a561afb9c504ae4c58ae53efb7ca5d4e\",\"name\":\"Ani@\",\"sameAs\":[\"http:\/\/nordu.net\"],\"url\":\"https:\/\/nordu.net\/author\/ani\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"NORDUnet documents cybersecurity - NORDUnet","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nordu.net\/nordunet-documents-cybersecurity\/","og_locale":"en_GB","og_type":"article","og_title":"NORDUnet documents cybersecurity","og_description":"Following a lengthy auditing process, NORDUnet\u2019s management regime for data security is certified as complying with the leading international standard. In recent years, ISO 27001 has become the world&#8217;s leading information security management system (ISMS) standard. By late June 2025, NORDUnet received the certificate documenting compliance with the standard. \u201cGiven the rising level of cyberthreats, [&hellip;]","og_url":"https:\/\/nordu.net\/nordunet-documents-cybersecurity\/","og_site_name":"NORDUnet","article_publisher":"https:\/\/www.facebook.com\/NORDUnet","article_published_time":"2025-08-06T07:26:59+00:00","article_modified_time":"2025-08-06T12:25:54+00:00","og_image":[{"width":1812,"height":1168,"url":"https:\/\/nordu.net\/wp-content\/uploads\/2025\/08\/Screenshot-2025-08-06-at-09.23.06-1.png","type":"image\/png"}],"author":"Ani@","twitter_card":"summary_large_image","twitter_creator":"@nordunet","twitter_site":"@nordunet","twitter_misc":{"Written by":"Ani@","Estimated reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nordu.net\/nordunet-documents-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/nordu.net\/nordunet-documents-cybersecurity\/"},"author":{"name":"Ani@","@id":"https:\/\/nordu.net\/#\/schema\/person\/a561afb9c504ae4c58ae53efb7ca5d4e"},"headline":"NORDUnet documents cybersecurity","datePublished":"2025-08-06T07:26:59+00:00","dateModified":"2025-08-06T12:25:54+00:00","mainEntityOfPage":{"@id":"https:\/\/nordu.net\/nordunet-documents-cybersecurity\/"},"wordCount":623,"publisher":{"@id":"https:\/\/nordu.net\/#organization"},"image":{"@id":"https:\/\/nordu.net\/nordunet-documents-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/nordu.net\/wp-content\/uploads\/2025\/08\/Screenshot-2025-08-06-at-09.23.06-1.png","articleSection":["NORDUnet"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/nordu.net\/nordunet-documents-cybersecurity\/","url":"https:\/\/nordu.net\/nordunet-documents-cybersecurity\/","name":"NORDUnet documents cybersecurity - NORDUnet","isPartOf":{"@id":"https:\/\/nordu.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nordu.net\/nordunet-documents-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/nordu.net\/nordunet-documents-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/nordu.net\/wp-content\/uploads\/2025\/08\/Screenshot-2025-08-06-at-09.23.06-1.png","datePublished":"2025-08-06T07:26:59+00:00","dateModified":"2025-08-06T12:25:54+00:00","breadcrumb":{"@id":"https:\/\/nordu.net\/nordunet-documents-cybersecurity\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nordu.net\/nordunet-documents-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/nordu.net\/nordunet-documents-cybersecurity\/#primaryimage","url":"https:\/\/nordu.net\/wp-content\/uploads\/2025\/08\/Screenshot-2025-08-06-at-09.23.06-1.png","contentUrl":"https:\/\/nordu.net\/wp-content\/uploads\/2025\/08\/Screenshot-2025-08-06-at-09.23.06-1.png","width":1812,"height":1168},{"@type":"BreadcrumbList","@id":"https:\/\/nordu.net\/nordunet-documents-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nordu.net\/"},{"@type":"ListItem","position":2,"name":"NORDUnet documents cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/nordu.net\/#website","url":"https:\/\/nordu.net\/","name":"NORDUnet","description":"Nordic Gateway for Research and Education","publisher":{"@id":"https:\/\/nordu.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nordu.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/nordu.net\/#organization","name":"NORDUnet","url":"https:\/\/nordu.net\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/nordu.net\/#\/schema\/logo\/image\/","url":"https:\/\/nordu.net\/wp-content\/uploads\/2021\/09\/NORDUnet_2020forWEBtransparent.png","contentUrl":"https:\/\/nordu.net\/wp-content\/uploads\/2021\/09\/NORDUnet_2020forWEBtransparent.png","width":914,"height":232,"caption":"NORDUnet"},"image":{"@id":"https:\/\/nordu.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NORDUnet","https:\/\/x.com\/nordunet","https:\/\/mastodon.social\/@nordunet\/","https:\/\/www.linkedin.com\/company\/nordunet"]},{"@type":"Person","@id":"https:\/\/nordu.net\/#\/schema\/person\/a561afb9c504ae4c58ae53efb7ca5d4e","name":"Ani@","sameAs":["http:\/\/nordu.net"],"url":"https:\/\/nordu.net\/author\/ani\/"}]}},"_links":{"self":[{"href":"https:\/\/nordu.net\/wp-json\/wp\/v2\/posts\/3105863","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nordu.net\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nordu.net\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nordu.net\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nordu.net\/wp-json\/wp\/v2\/comments?post=3105863"}],"version-history":[{"count":4,"href":"https:\/\/nordu.net\/wp-json\/wp\/v2\/posts\/3105863\/revisions"}],"predecessor-version":[{"id":3106524,"href":"https:\/\/nordu.net\/wp-json\/wp\/v2\/posts\/3105863\/revisions\/3106524"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nordu.net\/wp-json\/wp\/v2\/media\/3105929"}],"wp:attachment":[{"href":"https:\/\/nordu.net\/wp-json\/wp\/v2\/media?parent=3105863"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nordu.net\/wp-json\/wp\/v2\/categories?post=3105863"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nordu.net\/wp-json\/wp\/v2\/tags?post=3105863"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}