{"id":36196,"date":"2023-11-17T09:40:15","date_gmt":"2023-11-17T09:40:15","guid":{"rendered":"https:\/\/beacontower.io\/?p=36196"},"modified":"2023-12-07T08:21:25","modified_gmt":"2023-12-07T08:21:25","slug":"nis2-ot-og-scada-en-guide-til-nis2-overholdelse-for-automationssystemer","status":"publish","type":"post","link":"https:\/\/beacontower.io\/da\/nis2-ot-og-scada-en-guide-til-nis2-overholdelse-for-automationssystemer\/","title":{"rendered":"NIS2, OT og SCADA: En guide til NIS2-overholdelse for automationssystemer"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;section&#8221; _builder_version=&#8221;4.16&#8243; min_height=&#8221;891px&#8221; custom_padding=&#8221;1px||12px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row admin_label=&#8221;row&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; min_height=&#8221;876px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text admin_label=&#8221;Text&#8221; _builder_version=&#8221;4.16&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p>I takt med den hastige udvikling inden for automationssystemer (p\u00e5 engelsk Operational Technologies: OT) er det blevet afg\u00f8rende for virksomheder at opretholde et h\u00f8jt niveau af cybersikkerhed. Den seneste lovgivning, Network and Information Systems Directive 2 (NIS2), stiller sk\u00e6rpede krav til sikkerheden af informationssystemer, herunder OT-milj\u00f8er. I denne blog beskrives, hvilke teknologier og protokoller virksomheder b\u00f8r v\u00e6re opm\u00e6rksomme p\u00e5 for at opfylde NIS2-kravene og beskytte deres OT-infrastruktur.<\/p>\n<ol>\n<li><strong>SCADA-systemer (Supervisory Control and Data Acquisition):<\/strong> <br \/>SCADA-systemer spiller en central rolle i overv\u00e5gning og styring af industrielle processer. Ved implementering af NIS2 b\u00f8r virksomheder sikre, at deres SCADA-systemer er opdaterede med de nyeste sikkerhedsopdateringer og patches. Brugen af autentifikation og kryptering i SCADA-kommunikationen er ogs\u00e5 afg\u00f8rende for at forhindre uautoriseret adgang.<\/li>\n<li><strong>Industriel Firewall:<\/strong> <br \/>Implementering af industrielle firewalls er afg\u00f8rende for at segmentere OT-netv\u00e6rk og beskytte mod cybertrusler. Firewalls b\u00f8r konfigureres til kun at tillade n\u00f8dvendig trafik og blokere uautoriseret adgang. Deep packet inspection og intrusion detection systemer kan yderligere forbedre sikkerheden ved at identificere og reagere p\u00e5 potentielle angreb.<\/li>\n<li><strong>Protokolstandarder (Modbus, DNP3, OPC):<\/strong> <br \/>Mange industrielle protokoller, s\u00e5som Modbus, DNP3 og OPC, er grundpiller i OT-milj\u00f8er. Det er vigtigt at sikre, at disse protokoller implementeres korrekt og opdateres for at lukke kendte s\u00e5rbarheder. Brugen af kryptering og digital signering kan forhindre manipulation af data under transmission og sikre integriteten af kommunikationen.<\/li>\n<li><strong>Specialiserede OT&lt;-&gt;cloud edge gateways:<br \/><\/strong>Specialiserede edge gateways muligg\u00f8re netv\u00e6rkssegmentering ved at adskille OT-netv\u00e6rk fra IT-netv\u00e6rk. Dette reducerer overfladen for angreb ved at isolere operationelle systemer fra mere s\u00e5rbare IT-systemer og sikrer, at adgangen mellem de to milj\u00f8er er kontrolleret og overv\u00e5get.<strong><br \/><\/strong>Edge gateways er ofte udstyret med funktioner til protokolkonvertering og filtrering, hvilket betyder, at de kan overs\u00e6tte kommunikationsprotokoller mellem OT- og IT-enheder. Dette er vigtigt for at sikre, at dataudvekslingen over gr\u00e6nsen mellem OT og IT er sikker.<br \/>Edge gateways h\u00e5ndterer adgangskontrol og autentifikation for at sikre, at kun autoriserede brugere og enheder har adgang til OT-systemer. Implementering af st\u00e6rk autentifikation og autorisationsmekanismer bidrager til overholdelse af NIS2&#8217;s krav.<br \/>Edge gateways logger og overv\u00e5ger aktiviteter og h\u00e6ndelser, der sker ved gr\u00e6nsen mellem OT og IT. Dette giver indsigt i potentielle trusler og hj\u00e6lper med at opfylde NIS2&#8217;s krav om overv\u00e5gning og rapportering af sikkerhedsh\u00e6ndelser.<br \/>Specialiserede edge gateways b\u00f8r have mekanismer til styring af firmware og software for at sikre, at de altid k\u00f8rer opdaterede og sikre versioner. Dette reducerer s\u00e5rbarheder og bidrager til opfyldelse af NIS2-kravene om sikkerhed og opdatering.<br \/>Edge gateways b\u00f8r designes med n\u00f8dfunktionalitet og redundans for at sikre, at OT-systemer forbliver tilg\u00e6ngelige og operative, selv i tilf\u00e6lde af hardwarefejl eller angreb. Dette underst\u00f8tter NIS2&#8217;s krav om kontinuitet og tilg\u00e6ngelighed.<\/li>\n<li><strong>Anomalidetektionssystemer<\/strong>: Implementering af avancerede anomalidetektionssystemer kan hj\u00e6lpe med at identificere us\u00e6dvanlig adf\u00e6rd i OT-milj\u00f8et. Maskinl\u00e6ring og kunstig intelligens kan analysere store m\u00e6ngder data for at opdage potentielle trusler og reagere i realtid. Integrering af disse systemer i NIS2-overholdelsesstrategien er afg\u00f8rende for proaktiv beskyttelse.<\/li>\n<li><strong>Incident Response Plan<\/strong>: Udvikling og implementering af en detaljeret incident response-plan er afg\u00f8rende for at minimere skader i tilf\u00e6lde af en cyberh\u00e6ndelse. Dette omfatter regelm\u00e6ssig tr\u00e6ning af personale, oprettelse af backup-procedurer og etablering af et effektivt kommunikationssystem for at h\u00e5ndtere kriser hurtigt og effektivt.<\/li>\n<\/ol>\n<h3>Konklusion:<\/h3>\n<p>NIS2-kravene stiller virksomheder over for nye udfordringer inden for OT-sikkerhed. Ved at investere i moderne teknologier, protokoller og edge gateways kan virksomheder opn\u00e5 en robust cybersikkerhedsinfrastruktur og overholde lovgivningsm\u00e6ssige standarder. Det er afg\u00f8rende at forst\u00e5, at OT-sikkerhed er en kontinuerlig proces, og at regelm\u00e6ssig evaluering og opdatering af sikkerhedsforanstaltninger er n\u00f8glen til at im\u00f8deg\u00e5 fremtidige trusler i den digitale \u00e6ra.<\/p>\n<p>L\u00e6s mere om <a href=\"https:\/\/beacontower.io\/da\/nis2-iot-cybersecurity-krav-hvordan-overholder-vi-kravene-nu-og-fremover\/\" aria-current=\"page\">NIS2 IoT cybersecurity krav: Hvordan overholder vi kravene nu og fremover?<\/a><a href=\"https:\/\/beacontower.io\/da\/nis2-cloud-azure-iot-faa-overblik-over-de-vigtigste-komponenter\/\"><\/a> og <a href=\"https:\/\/beacontower.io\/da\/nis2-cloud-azure-iot-faa-overblik-over-de-vigtigste-komponenter\/\">NIS2 og Azure IoT cloud: F\u00e5 overblik over de vigtigste komponenter<\/a>.<\/p>\n<h2>Interesseret i at h\u00f8re hvordan I kommer i gang?<\/h2>\n<p>Beacon Tower bruges af adskillige forsyningsvirksomheder med kritisk infrastruktur og vi har lavet adskillige cyber risk assessments indenfor for sikkerhedskritiske brancher og vi har indg\u00e5ende kendskab til diverse edge gateways. Vi tilbyder b\u00e5de standardiserede cyber security forl\u00f8b samt skr\u00e6ddersyet konsulentassistance udf\u00f8rt af NIS2 og cybersecurity eksperter, som tilpasses jeres behov og forretning. <a href=\"mailto:info@beacontower.io?subject=NIS2%20og%20cybersecurity&amp;body=Vi vil gerne aftale et uforpligtende m\u00f8de for at h\u00f8re mere om NIS2 og cybersecurity, samt hvordan I kan hj\u00e6lpe. Hvorn\u00e5r kan det lade sig g\u00f8re?\">Klik her for at booke et uforpligtende m\u00f8de.<\/a><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I takt med den hastige udvikling inden for automationssystemer (p\u00e5 engelsk Operational Technologies: OT) er det blevet afg\u00f8rende for virksomheder at opretholde et h\u00f8jt niveau af cybersikkerhed. Den seneste lovgivning, Network and Information Systems Directive 2 (NIS2), stiller sk\u00e6rpede krav til sikkerheden af informationssystemer, herunder OT-milj\u00f8er. I denne blog beskrives, hvilke teknologier og protokoller virksomheder [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":36226,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"I takt med den hastige udvikling inden for industrielle styringssystemer (OT) er det blevet afg\u00f8rende for virksomheder at opretholde et h\u00f8jt niveau af cybersikkerhed. Den seneste lovgivning, Network and Information Systems Directive 2 (NIS2), stiller sk\u00e6rpede krav til sikkerheden af informationssystemer, herunder OT-milj\u00f8er. I denne blog vil vi beskrive, hvilke teknologier og protokoller virksomheder b\u00f8r v\u00e6re opm\u00e6rksomme p\u00e5 for at opfylde NIS2-kravene og beskytte deres OT-infrastruktur.\r\n\r\n1. SCADA-systemer (Supervisory Control and Data Acquisition): SCADA-systemer spiller en central rolle i overv\u00e5gning og styring af industrielle processer. Ved implementering af NIS2 b\u00f8r virksomheder sikre, at deres SCADA-systemer er opdaterede med de nyeste sikkerhedsopdateringer og patches. Brugen af autentifikation og kryptering i SCADA-kommunikationen er ogs\u00e5 afg\u00f8rende for at forhindre uautoriseret adgang.\r\n2. Industriel Firewall: Implementering af industrielle firewalls er afg\u00f8rende for at segmentere OT-netv\u00e6rk og beskytte mod cybertrusler. Firewalls b\u00f8r konfigureres til at tillade kun n\u00f8dvendig trafik og blokere uautoriseret adgang. Deep packet inspection og intrusion detection systemer kan yderligere forbedre sikkerheden ved at identificere og reagere p\u00e5 potentielle angreb.\r\n3. Protokolstandarder (Modbus, DNP3, OPC): Mange industrielle protokoller, s\u00e5som Modbus, DNP3 og OPC, er grundpiller i OT-milj\u00f8er. Det er vigtigt at sikre, at disse protokoller implementeres korrekt og opdateres for at lukke kendte s\u00e5rbarheder. Brugen af kryptering og digital signering kan forhindre manipulation af data under transmission og sikre integriteten af kommunikationen.\r\n4. Anomalidetektionssystemer: Implementering af avancerede anomalidetektionssystemer kan hj\u00e6lpe med at identificere us\u00e6dvanlig adf\u00e6rd i OT-milj\u00f8et. Maskinl\u00e6ring og kunstig intelligens kan analysere store m\u00e6ngder data for at opdage potentielle trusler og reagere i realtid. Integrering af disse systemer i NIS2-overholdelsesstrategien er afg\u00f8rende for proaktiv beskyttelse.\r\n5. Incident Response Plan: Udvikling og implementering af en detaljeret incident response-plan er afg\u00f8rende for at minimere skader i tilf\u00e6lde af en cyberh\u00e6ndelse. Dette omfatter regelm\u00e6ssig tr\u00e6ning af personale, oprettelse af backup-procedurer og etablering af et effektivt kommunikationssystem for at h\u00e5ndtere kriser hurtigt og effektivt.\r\n\r\nKonklusion: NIS2-kravene stiller virksomheder over for nye udfordringer inden for OT-sikkerhed. Ved at investere i moderne teknologier og protokoller kan virksomheder opn\u00e5 en robust cybersikkerhedsinfrastruktur og overholde lovgivningsm\u00e6ssige standarder. Det er afg\u00f8rende at forst\u00e5, at OT-sikkerhed er en kontinuerlig proces, og at regelm\u00e6ssig evaluering og opdatering af sikkerhedsforanstaltninger er n\u00f8glen til at im\u00f8deg\u00e5 fremtidige trusler i den digitale \u00e6ra.","_et_gb_content_width":"","footnotes":""},"categories":[19],"tags":[],"class_list":["post-36196","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized-da"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NIS2, OT og SCADA: En guide til NIS2-overholdelse for automationssystemer - Beacon Tower<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/beacontower.io\/da\/nis2-ot-og-scada-en-guide-til-nis2-overholdelse-for-automationssystemer\/\" \/>\n<meta property=\"og:locale\" content=\"da_DK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NIS2, OT og SCADA: En guide til NIS2-overholdelse for automationssystemer - Beacon Tower\" \/>\n<meta property=\"og:description\" content=\"I takt med den hastige udvikling inden for automationssystemer (p\u00e5 engelsk Operational Technologies: OT) er det blevet afg\u00f8rende for virksomheder at opretholde et h\u00f8jt niveau af cybersikkerhed. Den seneste lovgivning, Network and Information Systems Directive 2 (NIS2), stiller sk\u00e6rpede krav til sikkerheden af informationssystemer, herunder OT-milj\u00f8er. I denne blog beskrives, hvilke teknologier og protokoller virksomheder [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/beacontower.io\/da\/nis2-ot-og-scada-en-guide-til-nis2-overholdelse-for-automationssystemer\/\" \/>\n<meta property=\"og:site_name\" content=\"Beacon Tower\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-17T09:40:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-07T08:21:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/beacontower.io\/wp-content\/uploads\/2023\/11\/nis2-ot-scada.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jakob Appel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Skrevet af\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jakob Appel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimeret l\u00e6setid\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/beacontower.io\\\/da\\\/nis2-ot-og-scada-en-guide-til-nis2-overholdelse-for-automationssystemer\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/beacontower.io\\\/da\\\/nis2-ot-og-scada-en-guide-til-nis2-overholdelse-for-automationssystemer\\\/\"},\"author\":{\"name\":\"Jakob Appel\",\"@id\":\"https:\\\/\\\/beacontower.io\\\/da\\\/#\\\/schema\\\/person\\\/c241382a256ec0f2de3cc46babd7ab1d\"},\"headline\":\"NIS2, OT og SCADA: En guide til NIS2-overholdelse for automationssystemer\",\"datePublished\":\"2023-11-17T09:40:15+00:00\",\"dateModified\":\"2023-12-07T08:21:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/beacontower.io\\\/da\\\/nis2-ot-og-scada-en-guide-til-nis2-overholdelse-for-automationssystemer\\\/\"},\"wordCount\":854,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/beacontower.io\\\/da\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/beacontower.io\\\/da\\\/nis2-ot-og-scada-en-guide-til-nis2-overholdelse-for-automationssystemer\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/beacontower.io\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/nis2-ot-scada.png\",\"articleSection\":[\"Uncategorized @da\"],\"inLanguage\":\"da-DK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/beacontower.io\\\/da\\\/nis2-ot-og-scada-en-guide-til-nis2-overholdelse-for-automationssystemer\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/beacontower.io\\\/da\\\/nis2-ot-og-scada-en-guide-til-nis2-overholdelse-for-automationssystemer\\\/\",\"url\":\"https:\\\/\\\/beacontower.io\\\/da\\\/nis2-ot-og-scada-en-guide-til-nis2-overholdelse-for-automationssystemer\\\/\",\"name\":\"NIS2, OT og SCADA: En guide til NIS2-overholdelse for automationssystemer - Beacon Tower\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/beacontower.io\\\/da\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/beacontower.io\\\/da\\\/nis2-ot-og-scada-en-guide-til-nis2-overholdelse-for-automationssystemer\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/beacontower.io\\\/da\\\/nis2-ot-og-scada-en-guide-til-nis2-overholdelse-for-automationssystemer\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/beacontower.io\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/nis2-ot-scada.png\",\"datePublished\":\"2023-11-17T09:40:15+00:00\",\"dateModified\":\"2023-12-07T08:21:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/beacontower.io\\\/da\\\/nis2-ot-og-scada-en-guide-til-nis2-overholdelse-for-automationssystemer\\\/#breadcrumb\"},\"inLanguage\":\"da-DK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/beacontower.io\\\/da\\\/nis2-ot-og-scada-en-guide-til-nis2-overholdelse-for-automationssystemer\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\\\/\\\/beacontower.io\\\/da\\\/nis2-ot-og-scada-en-guide-til-nis2-overholdelse-for-automationssystemer\\\/#primaryimage\",\"url\":\"https:\\\/\\\/beacontower.io\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/nis2-ot-scada.png\",\"contentUrl\":\"https:\\\/\\\/beacontower.io\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/nis2-ot-scada.png\",\"width\":1200,\"height\":628,\"caption\":\"nis2 ot scada\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/beacontower.io\\\/da\\\/nis2-ot-og-scada-en-guide-til-nis2-overholdelse-for-automationssystemer\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/beacontower.io\\\/da\\\/azure-iot-cloud-and-edge-platform\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NIS2, OT og SCADA: En guide til NIS2-overholdelse for automationssystemer\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/beacontower.io\\\/da\\\/#website\",\"url\":\"https:\\\/\\\/beacontower.io\\\/da\\\/\",\"name\":\"Beacon Tower\",\"description\":\"Azure IoT Cloud and Edge Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/beacontower.io\\\/da\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/beacontower.io\\\/da\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"da-DK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/beacontower.io\\\/da\\\/#organization\",\"name\":\"Beacon Tower\",\"url\":\"https:\\\/\\\/beacontower.io\\\/da\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\\\/\\\/beacontower.io\\\/da\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/beacontower.io\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/BT-logo-web.png\",\"contentUrl\":\"https:\\\/\\\/beacontower.io\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/BT-logo-web.png\",\"width\":400,\"height\":175,\"caption\":\"Beacon Tower\"},\"image\":{\"@id\":\"https:\\\/\\\/beacontower.io\\\/da\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/company\\\/glaze-about\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/beacontower.io\\\/da\\\/#\\\/schema\\\/person\\\/c241382a256ec0f2de3cc46babd7ab1d\",\"name\":\"Jakob Appel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/154751ee44dd51fb1a3377a2a3c6b4415d5e614f3f0ce8187f0c875a9b728ce9?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/154751ee44dd51fb1a3377a2a3c6b4415d5e614f3f0ce8187f0c875a9b728ce9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/154751ee44dd51fb1a3377a2a3c6b4415d5e614f3f0ce8187f0c875a9b728ce9?s=96&d=mm&r=g\",\"caption\":\"Jakob Appel\"},\"url\":\"https:\\\/\\\/beacontower.io\\\/da\\\/author\\\/appel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NIS2, OT og SCADA: En guide til NIS2-overholdelse for automationssystemer - Beacon Tower","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/beacontower.io\/da\/nis2-ot-og-scada-en-guide-til-nis2-overholdelse-for-automationssystemer\/","og_locale":"da_DK","og_type":"article","og_title":"NIS2, OT og SCADA: En guide til NIS2-overholdelse for automationssystemer - Beacon Tower","og_description":"I takt med den hastige udvikling inden for automationssystemer (p\u00e5 engelsk Operational Technologies: OT) er det blevet afg\u00f8rende for virksomheder at opretholde et h\u00f8jt niveau af cybersikkerhed. Den seneste lovgivning, Network and Information Systems Directive 2 (NIS2), stiller sk\u00e6rpede krav til sikkerheden af informationssystemer, herunder OT-milj\u00f8er. I denne blog beskrives, hvilke teknologier og protokoller virksomheder [&hellip;]","og_url":"https:\/\/beacontower.io\/da\/nis2-ot-og-scada-en-guide-til-nis2-overholdelse-for-automationssystemer\/","og_site_name":"Beacon Tower","article_published_time":"2023-11-17T09:40:15+00:00","article_modified_time":"2023-12-07T08:21:25+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/beacontower.io\/wp-content\/uploads\/2023\/11\/nis2-ot-scada.png","type":"image\/png"}],"author":"Jakob Appel","twitter_card":"summary_large_image","twitter_misc":{"Skrevet af":"Jakob Appel","Estimeret l\u00e6setid":"2 minutter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/beacontower.io\/da\/nis2-ot-og-scada-en-guide-til-nis2-overholdelse-for-automationssystemer\/#article","isPartOf":{"@id":"https:\/\/beacontower.io\/da\/nis2-ot-og-scada-en-guide-til-nis2-overholdelse-for-automationssystemer\/"},"author":{"name":"Jakob Appel","@id":"https:\/\/beacontower.io\/da\/#\/schema\/person\/c241382a256ec0f2de3cc46babd7ab1d"},"headline":"NIS2, OT og SCADA: En guide til NIS2-overholdelse for automationssystemer","datePublished":"2023-11-17T09:40:15+00:00","dateModified":"2023-12-07T08:21:25+00:00","mainEntityOfPage":{"@id":"https:\/\/beacontower.io\/da\/nis2-ot-og-scada-en-guide-til-nis2-overholdelse-for-automationssystemer\/"},"wordCount":854,"commentCount":0,"publisher":{"@id":"https:\/\/beacontower.io\/da\/#organization"},"image":{"@id":"https:\/\/beacontower.io\/da\/nis2-ot-og-scada-en-guide-til-nis2-overholdelse-for-automationssystemer\/#primaryimage"},"thumbnailUrl":"https:\/\/beacontower.io\/wp-content\/uploads\/2023\/11\/nis2-ot-scada.png","articleSection":["Uncategorized @da"],"inLanguage":"da-DK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/beacontower.io\/da\/nis2-ot-og-scada-en-guide-til-nis2-overholdelse-for-automationssystemer\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/beacontower.io\/da\/nis2-ot-og-scada-en-guide-til-nis2-overholdelse-for-automationssystemer\/","url":"https:\/\/beacontower.io\/da\/nis2-ot-og-scada-en-guide-til-nis2-overholdelse-for-automationssystemer\/","name":"NIS2, OT og SCADA: En guide til NIS2-overholdelse for automationssystemer - Beacon Tower","isPartOf":{"@id":"https:\/\/beacontower.io\/da\/#website"},"primaryImageOfPage":{"@id":"https:\/\/beacontower.io\/da\/nis2-ot-og-scada-en-guide-til-nis2-overholdelse-for-automationssystemer\/#primaryimage"},"image":{"@id":"https:\/\/beacontower.io\/da\/nis2-ot-og-scada-en-guide-til-nis2-overholdelse-for-automationssystemer\/#primaryimage"},"thumbnailUrl":"https:\/\/beacontower.io\/wp-content\/uploads\/2023\/11\/nis2-ot-scada.png","datePublished":"2023-11-17T09:40:15+00:00","dateModified":"2023-12-07T08:21:25+00:00","breadcrumb":{"@id":"https:\/\/beacontower.io\/da\/nis2-ot-og-scada-en-guide-til-nis2-overholdelse-for-automationssystemer\/#breadcrumb"},"inLanguage":"da-DK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/beacontower.io\/da\/nis2-ot-og-scada-en-guide-til-nis2-overholdelse-for-automationssystemer\/"]}]},{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/beacontower.io\/da\/nis2-ot-og-scada-en-guide-til-nis2-overholdelse-for-automationssystemer\/#primaryimage","url":"https:\/\/beacontower.io\/wp-content\/uploads\/2023\/11\/nis2-ot-scada.png","contentUrl":"https:\/\/beacontower.io\/wp-content\/uploads\/2023\/11\/nis2-ot-scada.png","width":1200,"height":628,"caption":"nis2 ot scada"},{"@type":"BreadcrumbList","@id":"https:\/\/beacontower.io\/da\/nis2-ot-og-scada-en-guide-til-nis2-overholdelse-for-automationssystemer\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/beacontower.io\/da\/azure-iot-cloud-and-edge-platform\/"},{"@type":"ListItem","position":2,"name":"NIS2, OT og SCADA: En guide til NIS2-overholdelse for automationssystemer"}]},{"@type":"WebSite","@id":"https:\/\/beacontower.io\/da\/#website","url":"https:\/\/beacontower.io\/da\/","name":"Beacon Tower","description":"Azure IoT Cloud and Edge Platform","publisher":{"@id":"https:\/\/beacontower.io\/da\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/beacontower.io\/da\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"da-DK"},{"@type":"Organization","@id":"https:\/\/beacontower.io\/da\/#organization","name":"Beacon Tower","url":"https:\/\/beacontower.io\/da\/","logo":{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/beacontower.io\/da\/#\/schema\/logo\/image\/","url":"https:\/\/beacontower.io\/wp-content\/uploads\/2021\/04\/BT-logo-web.png","contentUrl":"https:\/\/beacontower.io\/wp-content\/uploads\/2021\/04\/BT-logo-web.png","width":400,"height":175,"caption":"Beacon Tower"},"image":{"@id":"https:\/\/beacontower.io\/da\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/glaze-about"]},{"@type":"Person","@id":"https:\/\/beacontower.io\/da\/#\/schema\/person\/c241382a256ec0f2de3cc46babd7ab1d","name":"Jakob Appel","image":{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/secure.gravatar.com\/avatar\/154751ee44dd51fb1a3377a2a3c6b4415d5e614f3f0ce8187f0c875a9b728ce9?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/154751ee44dd51fb1a3377a2a3c6b4415d5e614f3f0ce8187f0c875a9b728ce9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/154751ee44dd51fb1a3377a2a3c6b4415d5e614f3f0ce8187f0c875a9b728ce9?s=96&d=mm&r=g","caption":"Jakob Appel"},"url":"https:\/\/beacontower.io\/da\/author\/appel\/"}]}},"_links":{"self":[{"href":"https:\/\/beacontower.io\/da\/wp-json\/wp\/v2\/posts\/36196","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/beacontower.io\/da\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/beacontower.io\/da\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/beacontower.io\/da\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/beacontower.io\/da\/wp-json\/wp\/v2\/comments?post=36196"}],"version-history":[{"count":9,"href":"https:\/\/beacontower.io\/da\/wp-json\/wp\/v2\/posts\/36196\/revisions"}],"predecessor-version":[{"id":36275,"href":"https:\/\/beacontower.io\/da\/wp-json\/wp\/v2\/posts\/36196\/revisions\/36275"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/beacontower.io\/da\/wp-json\/wp\/v2\/media\/36226"}],"wp:attachment":[{"href":"https:\/\/beacontower.io\/da\/wp-json\/wp\/v2\/media?parent=36196"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/beacontower.io\/da\/wp-json\/wp\/v2\/categories?post=36196"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/beacontower.io\/da\/wp-json\/wp\/v2\/tags?post=36196"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}