Introductory Text
1.Citation, commencement and extent
2.Interpretation
3.Network architecture
4.Protection of data and network functions
5.Protection of certain tools enabling monitoring or analysis
6.Monitoring and analysis
7.Supply chain
8.Prevention of unauthorised access or interference
9.Preparing for remediation and recovery
10.Governance
11.Reviews
12.Patches and updates
13.Competency
14.Testing
15.Assistance
16.Exemption for micro-entities
Signature
SCHEDULE
Countries listed for purposes of regulations 5(3) and 8(6)
Explanatory Note