Freely Accessible Resources


Free Resources
DISASTER RECOVERY PLAN
One of the points of NIS2 is the implementation of business continuity and disaster recovery. The Dognet Technologies created a template for writing disaster recovery plans.
Doc NIS2
Freely available
Easy Reading
DISASTERRECOVERY PLAN

Free Resources
INCLUDING THE AREA OF ATTACK
The attack surface is the set of all potential entry points through which an attacker can access a system, network or organization to steal data or cause damage. It includes both digital assets (such as applications, APIs, servers, network ports, websites) and physical ones (such as endpoints and IoT devices), as well as less direct attack vectors such as the IT shadow. Reducing and managing this surface is crucial for cybersecurity, as a smaller surface is easier to protect.
Security
Hardening
Easy Reading
AREA

Free Resources
VULNERABILITY AND MITIGATION
A vulnerability is a weakness in a system, software or process that can be exploited by a threat. Mitigation is the set of actions to reduce or eliminate these vulnerabilities, often identifying them through vulnerability analysis and correcting those at higher risk.
Prevention
Resilience
Easy Reading
VULNERABILITY

Free Resources
GUIDE TO ANSIBLE INTEGRATION
Ansible strengthens system security by automating security activities such as configuration, patching and security policy application. Using its playbooks, administrators can consistently define the desired security status of each system, ensuring that everyone follows the same security procedures, which is essential to prevent vulnerabilities. .
Continuous Integration
Workflow
Avazata Reading
ANSIBLE INTEGRATION

Pro Resources – To access our enterprise level resources on advanced themes leave your email!



Pro Resources
NIS2 OPERATIONAL PLAN
The NIS2 Directive is a key regulatory framework for strengthening the security level of networks and information systems within the European Union. For the organisations concerned, compliance with NIS2 must not be interpreted solely as regulatory compliance, but as a structured path to the maturation of cyber governance.
This Operational Plan provides a clear, progressive and timely roadmap to accompany the company towards full compliance with the NIS2 Directive within a 12-month horizon, integrating organisational, technical and cultural aspects.
NIS2
Workflow
Avazata Reading
PIANOOPERAtivoNIS2

Pro Resources
NIS2 RISK ASSESSMENT CHECKLIST
This resource contains a full NIS2 compliance checklist to help you concretely assess and not "feel" the risk present in every network infrastructure. This document is part of the complete series of material dedicated to NIS2 that you can download for free and consult whenever you want.
NIS2
Checklist
Easy Reading
Checklis RiskNIS2

CONTACT US

Contact Sales Team

EnglishenEnglishEnglish