In the Gazzetta the decree of 15 June. There are four macro-categories of solutions that must be "stamped" to guarantee national networks and data. Update at least once a year 20 Aug 2021 Mi Fio
The Prime Minister's decree of 15 June 2021 was published in the Official Journal, which sets out in black and white the categories of ICT goods, systems and services intended to be used within the national cyber security perimeter. Categories that - as specified by the decree itself - will be updated at least annually in line with the times of technological developments. There are four macro-categories of goods and services that the Government considers "strategic" for the purposes of guaranteeing national networks and data and which must therefore be authorized. Here they are in detail Index of topics • Hardware and software components that perform telecommunication network functions and services (access, transport, switching) • Hardware and software components that perform functions for the security of telecommunication networks and the data they process • Hardware and software components for data acquisition, monitoring, supervision, control, implementation and automation of telecommunication networks and industrial and infrastructural systems • Software applications for the implementation of security mechanisms Hardware and software components that perform telecommunication network functions and services (access, transport, switching) • Router • Switch • Repeater • Load balancers • Traffic shaper • Proxy • Radio link • Access Network for mobile radio networks • or 2G, 3G, 4G, 5G • Wifi gateway • Network Function Virtualization (NFV): • vSwitch • vRouter • Application Function (5G) • Optical transmission board • Multiservice Provisioning Platform • (MSPP) • Automotive ECU switch (Ethernet, CAN, LIN) • IoT Edge Gateway Hardware and software components that perform functions for the security of telecommunication networks and the data they process • Firewall • Security Gateway • Hardware Security Module (HSM) • Intrusion Detection System (IDS) • Intrusion Prevention System (IPS) • Network Function Virtualization (NFV) • Authentication Server Function (5G) • Process whitelisting • Virtual Private Network (VPN) • Trusted Platform Module Hardware and software components for data acquisition, monitoring, supervision, control, implementation and automation of telecommunication networks and industrial and infrastructural systems • SCADA systems (Supervisory Control • And Data Acquisition) • Manufacturing Execution Systems (MES) • Software Defined Network (SDN) • Controller • Artificial Intelligence (AI) and Machine Learning (ML) systems for network / systems management • 5G Mobile Edge Computing (MEC) • NFV: • o Network Slice Selection Function • (5G) • o Application Function (5G) • o Policy Control Function (5G) • o Unified Data Management (5G) • o Session Management Function (5G) • Management and Orchestration (MANO) • IoT orchestrator Software applications for the implementation of security mechanisms • IT applications for security • o Public Key Infrastructure (PKI) • o Single Sign-On (SSO) • o Access Control • Software modules that implement Web Service through API, for communication protocols •
May 24
• CYBERSECURITY: six reasons not to postpone further • I STUDY The US is the first cyber power in the world. China is "beaten" June 28, 2021 • CYBERSECURITY Cyber perimeter, the Government raises the bar: armored 223 essential functions of the state June 15, 2021 • CYBERSECURITY Cyber perimeter, the Dis crash test in June: over 100 companies under examination 03 May 2021 • The US is the first cyber power in the world. China is "beaten" Related articles 1. Cyber security: here is the list of ICT goods and services within the national "perimeter" 2. The US is the first cyber power in the world. China is "beaten" 3. Cyber perimeter, the Government raises the bar: armored 223 essential functions of the State 4. Pnrr, the game is all to be played: here is the industrial plan of the ICT leaders 5. Cyber perimeter, in June the Dis crash test: over 100 companies under examination
ARTICLE MI-FIO