{"id":79767,"date":"2024-07-03T17:36:15","date_gmt":"2024-07-03T09:36:15","guid":{"rendered":"https:\/\/version-2.com\/?p=79767"},"modified":"2024-06-28T17:37:42","modified_gmt":"2024-06-28T09:37:42","slug":"understanding-iso-27001-evolution-alignment-with-network-access-control-nac","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2024\/07\/understanding-iso-27001-evolution-alignment-with-network-access-control-nac\/","title":{"rendered":"Understanding ISO 27001: Evolution &#038; Alignment with Network Access Control (NAC)"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"79767\" class=\"elementor elementor-79767\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-35fe5dd post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"35fe5dd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;cef08c3&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-409a2e9a\" data-id=\"409a2e9a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5a8be8f elementor-widget elementor-widget-text-editor\" data-id=\"5a8be8f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full\" src=\"https:\/\/www.portnox.com\/wp-content\/webp-express\/webp-images\/uploads\/2024\/06\/iso-27001-tile-v2.png.webp\" width=\"1200\" height=\"628\" \/><\/p><div class=\"fl-module-content fl-node-content\"><p>ISO 27001 stands as a cornerstone in the realm of information security, providing a structured and comprehensive approach to managing sensitive company information. Today, we delve into what ISO 27001 is, its evolution over time, and how Network Access Control (NAC) aligns with its principles to fortify organizational security.<\/p><h2>What is ISO 27001?<\/h2><p>ISO 27001 is an international standard for <a href=\"https:\/\/www.iso.org\/standard\/75652.html\" target=\"_blank\" rel=\"noopener\">Information Security Management Systems (ISMS)<\/a>. It is part of the ISO\/IEC 27000 family of standards, which are designed to help organizations keep their information assets secure. The standard provides a systematic approach to managing sensitive company information so that it remains secure. It includes people, processes, and IT systems by applying a risk management process.<\/p><h3>Core Elements:<\/h3><ol><li><strong>Risk Management<\/strong>: Identifying potential threats to information security and implementing measures to mitigate these risks.<\/li><li><strong>Leadership Commitment<\/strong>: Ensuring that top management is committed to information security and provides the necessary resources.<\/li><li><strong>Continuous Improvement<\/strong>: Regularly reviewing and updating security measures to address new threats and vulnerabilities.<\/li><li><strong>Context of the Organization<\/strong>: Understanding the internal and external issues that can affect the information security objectives.<\/li><li><strong>Support and Operations<\/strong>: Ensuring that sufficient resources are provided and that operations are managed effectively to support security measures.<\/li><\/ol><h2>Evolution of ISO 27001<\/h2><p>The journey of ISO 27001 began in the 1990s, originating from the British Standard BS 7799, which was developed by the <a href=\"https:\/\/www.iso.org\/member\/2064.html\" target=\"_blank\" rel=\"noopener\">British Standards Institution (BSI)<\/a>. It was intended to provide a framework for managing information security and was published in two parts: BS 7799-1, which provided the implementation guidelines, and BS 7799-2, which specified the requirements for an ISMS.<\/p><h3>Key Milestones:<\/h3><ol><li><strong>1995<\/strong>: BS 7799 was first published.<\/li><li><strong>2000<\/strong>: BS 7799-2 was introduced, focusing on the requirements for implementing an ISMS.<\/li><li><strong>2005<\/strong>: The International Organization for Standardization (ISO) adopted BS 7799-2, leading to the publication of ISO\/IEC 27001:2005.<\/li><li><strong>2013<\/strong>: The standard was revised, resulting in ISO\/IEC 27001:2013, which brought it in line with other management system standards and made it more flexible to align with organizational needs.<\/li><li><strong>2017<\/strong>: Minor updates were introduced to clarify certain points in the standard.<\/li><li><strong>2022<\/strong>: The latest revision, ISO\/IEC 27001:2022, further refines the standard, incorporating new technologies and methodologies to enhance information security practices.<\/li><\/ol><p>Each iteration of the standard has aimed to improve its applicability, making it more robust against emerging threats and more adaptable to the diverse needs of organizations across different industries.<\/p><h2>Network Access Control (NAC) and ISO 27001<\/h2><p>Network Access Control (NAC) is a security solution that <a href=\"https:\/\/www.portnox.com\/solutions\/network-access-control\/\" target=\"_blank\" rel=\"noopener\">manages and controls the access<\/a> of devices to a network. It ensures that only compliant and trusted devices are allowed to connect, thereby maintaining the integrity and security of the network.<\/p><h3>How NAC Aligns:<\/h3><ol><li><strong>Risk Assessment and Treatment<\/strong>:<ul><li><strong>ISO 27001 Requirement<\/strong>: Organizations must identify risks and implement measures to mitigate them.<\/li><li><strong>NAC Alignment<\/strong>: NAC identifies devices attempting to access the network, assesses their security posture, and either grants or denies access based on compliance with security policies. This aligns with the risk assessment and treatment process by preventing potentially risky devices from compromising the network.<\/li><\/ul><\/li><li><strong>Access Control<\/strong>:<ul><li><strong>ISO 27001 Requirement<\/strong>: Organizations need to implement controls to ensure that only authorized individuals have access to information.<\/li><li><strong>NAC Alignment<\/strong>: NAC enforces access control by ensuring that only authenticated and authorized devices can access the network. This prevents unauthorized access and helps protect sensitive information.<\/li><\/ul><\/li><li><strong>Asset Management<\/strong>:<ul><li><strong>ISO 27001 Requirement<\/strong>: Organizations should identify and manage their assets to protect information.<\/li><li><strong>NAC Alignment<\/strong>: NAC provides visibility into all devices connected to the network, helping organizations maintain an accurate inventory of assets. This supports the asset management requirements of ISO 27001 by ensuring that all networked devices are accounted for and managed.<\/li><\/ul><\/li><li><strong>Monitoring and Review<\/strong>:<ul><li><strong>ISO 27001 Requirement<\/strong>: Organizations must monitor and review their information security management system to ensure its effectiveness.<\/li><li><strong>NAC Alignment<\/strong>: NAC continuously monitors network traffic and device compliance, providing real-time data and insights. This ongoing monitoring aligns with ISO 27001\u2019s requirement for continuous review and improvement of security measures.<\/li><\/ul><\/li><li><strong>Incident Management<\/strong>:<ul><li><strong>ISO 27001 Requirement<\/strong>: Organizations need to establish a process for managing information security incidents.<\/li><li><strong>NAC Alignment<\/strong>: NAC helps detect and respond to security incidents by identifying anomalous behavior and unauthorized access attempts. This supports the incident management process by enabling quick identification and remediation of security breaches.<\/li><\/ul><\/li><li><strong>Compliance<\/strong>:<ul><li><strong>ISO 27001 Requirement<\/strong>: Organizations must comply with applicable legal, regulatory, and contractual requirements.<\/li><li><strong>NAC Alignment<\/strong>: NAC ensures that devices comply with organizational security policies and external regulations before granting access. This helps organizations maintain compliance with various standards and regulations, including ISO 27001.<\/li><\/ul><\/li><\/ol><h2>Conclusion<\/h2><p>ISO 27001 has evolved significantly since its inception, adapting to the changing landscape of information security. Its structured framework for managing information security risks is essential for organizations aiming to protect their sensitive data. <a href=\"https:\/\/www.portnox.com\/blog\/network-access-control\/nacs-role-in-the-larger-iam-eco-system\/\" target=\"_blank\" rel=\"noopener\">Network Access Control (NAC)<\/a> complements ISO 27001 by ensuring that only compliant and authorized devices can access the network, thus reinforcing the standard\u2019s principles.<\/p><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2004c86 elementor-widget elementor-widget-shortcode\" data-id=\"2004c86\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18148\" class=\"elementor elementor-18148\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5420368 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"5420368\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c976b64\" data-id=\"c976b64\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-24257f7 elementor-widget elementor-widget-text-editor\" data-id=\"24257f7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Portnox<\/strong><br \/>Portnox provides simple-to-deploy, operate and maintain network access control, security and visibility solutions. Portnox software can be deployed on-premises, as a cloud-delivered service, or in hybrid mode. It is agentless and vendor-agnostic, allowing organizations to maximize their existing network and cybersecurity investments. Hundreds of enterprises around the world rely on Portnox for network visibility, cybersecurity policy enforcement and regulatory compliance. The company has been recognized for its innovations by Info Security Products Guide, Cyber Security Excellence Awards, IoT Innovator Awards, Computing Security Awards, Best of Interop ITX and Cyber Defense Magazine. Portnox has offices in the U.S., Europe and Asia. For information visit <a href=\"http:\/\/www.portnox.com\" rel=\"nofollow\">http:\/\/www.portnox.com<\/a>, and follow us on Twitter and LinkedIn.\u3002<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>ISO 27001 stands as a cornerstone in the realm of infor [&hellip;]<\/p>\n","protected":false},"author":149011790,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[424,1273,61],"tags":[423,1272,352],"class_list":["post-79767","post","type-post","status-publish","format-standard","hentry","category-portnox","category-1273","category-press-release","tag-portnox","tag-1272","tag-network"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Understanding ISO 27001: Evolution &amp; Alignment with Network Access Control (NAC) - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.portnox.com\/blog\/compliance-regulations\/understanding-iso-27001-evolution-alignment-with-network-access-control-nac\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding ISO 27001: Evolution &amp; Alignment with Network Access Control (NAC) - Version 2\" \/>\n<meta property=\"og:description\" content=\"ISO 27001 stands as a cornerstone in the realm of infor [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.portnox.com\/blog\/compliance-regulations\/understanding-iso-27001-evolution-alignment-with-network-access-control-nac\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-03T09:36:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.portnox.com\/wp-content\/webp-express\/webp-images\/uploads\/2024\/06\/iso-27001-tile-v2.png.webp\" \/>\n<meta name=\"author\" content=\"tracylamv2\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"tracylamv2\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/compliance-regulations\\\/understanding-iso-27001-evolution-alignment-with-network-access-control-nac\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/07\\\/understanding-iso-27001-evolution-alignment-with-network-access-control-nac\\\/\"},\"author\":{\"name\":\"tracylamv2\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\"},\"headline\":\"Understanding ISO 27001: Evolution &#038; Alignment with Network Access Control (NAC)\",\"datePublished\":\"2024-07-03T09:36:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/07\\\/understanding-iso-27001-evolution-alignment-with-network-access-control-nac\\\/\"},\"wordCount\":795,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/compliance-regulations\\\/understanding-iso-27001-evolution-alignment-with-network-access-control-nac\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/webp-express\\\/webp-images\\\/uploads\\\/2024\\\/06\\\/iso-27001-tile-v2.png.webp\",\"keywords\":[\"Portnox\",\"2024\",\"Network\"],\"articleSection\":[\"Portnox\",\"2024\",\"Press Release\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2024\\\/07\\\/understanding-iso-27001-evolution-alignment-with-network-access-control-nac\\\/\",\"url\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/compliance-regulations\\\/understanding-iso-27001-evolution-alignment-with-network-access-control-nac\\\/\",\"name\":\"Understanding ISO 27001: Evolution & Alignment with Network Access Control (NAC) - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/compliance-regulations\\\/understanding-iso-27001-evolution-alignment-with-network-access-control-nac\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/compliance-regulations\\\/understanding-iso-27001-evolution-alignment-with-network-access-control-nac\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/webp-express\\\/webp-images\\\/uploads\\\/2024\\\/06\\\/iso-27001-tile-v2.png.webp\",\"datePublished\":\"2024-07-03T09:36:15+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/compliance-regulations\\\/understanding-iso-27001-evolution-alignment-with-network-access-control-nac\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.portnox.com\\\/blog\\\/compliance-regulations\\\/understanding-iso-27001-evolution-alignment-with-network-access-control-nac\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/compliance-regulations\\\/understanding-iso-27001-evolution-alignment-with-network-access-control-nac\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/webp-express\\\/webp-images\\\/uploads\\\/2024\\\/06\\\/iso-27001-tile-v2.png.webp\",\"contentUrl\":\"https:\\\/\\\/www.portnox.com\\\/wp-content\\\/webp-express\\\/webp-images\\\/uploads\\\/2024\\\/06\\\/iso-27001-tile-v2.png.webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.portnox.com\\\/blog\\\/compliance-regulations\\\/understanding-iso-27001-evolution-alignment-with-network-access-control-nac\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Understanding ISO 27001: Evolution &#038; Alignment with Network Access Control (NAC)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/011bc7c3731c930bcfeecd52fefb6365\",\"name\":\"tracylamv2\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g\",\"caption\":\"tracylamv2\"},\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/tracylamv2\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Understanding ISO 27001: Evolution & Alignment with Network Access Control (NAC) - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.portnox.com\/blog\/compliance-regulations\/understanding-iso-27001-evolution-alignment-with-network-access-control-nac\/","og_locale":"zh_HK","og_type":"article","og_title":"Understanding ISO 27001: Evolution & Alignment with Network Access Control (NAC) - Version 2","og_description":"ISO 27001 stands as a cornerstone in the realm of infor [&hellip;]","og_url":"https:\/\/www.portnox.com\/blog\/compliance-regulations\/understanding-iso-27001-evolution-alignment-with-network-access-control-nac\/","og_site_name":"Version 2","article_published_time":"2024-07-03T09:36:15+00:00","og_image":[{"url":"https:\/\/www.portnox.com\/wp-content\/webp-express\/webp-images\/uploads\/2024\/06\/iso-27001-tile-v2.png.webp","type":"","width":"","height":""}],"author":"tracylamv2","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"tracylamv2","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"5 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.portnox.com\/blog\/compliance-regulations\/understanding-iso-27001-evolution-alignment-with-network-access-control-nac\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2024\/07\/understanding-iso-27001-evolution-alignment-with-network-access-control-nac\/"},"author":{"name":"tracylamv2","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365"},"headline":"Understanding ISO 27001: Evolution &#038; Alignment with Network Access Control (NAC)","datePublished":"2024-07-03T09:36:15+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2024\/07\/understanding-iso-27001-evolution-alignment-with-network-access-control-nac\/"},"wordCount":795,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/www.portnox.com\/blog\/compliance-regulations\/understanding-iso-27001-evolution-alignment-with-network-access-control-nac\/#primaryimage"},"thumbnailUrl":"https:\/\/www.portnox.com\/wp-content\/webp-express\/webp-images\/uploads\/2024\/06\/iso-27001-tile-v2.png.webp","keywords":["Portnox","2024","Network"],"articleSection":["Portnox","2024","Press Release"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2024\/07\/understanding-iso-27001-evolution-alignment-with-network-access-control-nac\/","url":"https:\/\/www.portnox.com\/blog\/compliance-regulations\/understanding-iso-27001-evolution-alignment-with-network-access-control-nac\/","name":"Understanding ISO 27001: Evolution & Alignment with Network Access Control (NAC) - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.portnox.com\/blog\/compliance-regulations\/understanding-iso-27001-evolution-alignment-with-network-access-control-nac\/#primaryimage"},"image":{"@id":"https:\/\/www.portnox.com\/blog\/compliance-regulations\/understanding-iso-27001-evolution-alignment-with-network-access-control-nac\/#primaryimage"},"thumbnailUrl":"https:\/\/www.portnox.com\/wp-content\/webp-express\/webp-images\/uploads\/2024\/06\/iso-27001-tile-v2.png.webp","datePublished":"2024-07-03T09:36:15+00:00","breadcrumb":{"@id":"https:\/\/www.portnox.com\/blog\/compliance-regulations\/understanding-iso-27001-evolution-alignment-with-network-access-control-nac\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.portnox.com\/blog\/compliance-regulations\/understanding-iso-27001-evolution-alignment-with-network-access-control-nac\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/www.portnox.com\/blog\/compliance-regulations\/understanding-iso-27001-evolution-alignment-with-network-access-control-nac\/#primaryimage","url":"https:\/\/www.portnox.com\/wp-content\/webp-express\/webp-images\/uploads\/2024\/06\/iso-27001-tile-v2.png.webp","contentUrl":"https:\/\/www.portnox.com\/wp-content\/webp-express\/webp-images\/uploads\/2024\/06\/iso-27001-tile-v2.png.webp"},{"@type":"BreadcrumbList","@id":"https:\/\/www.portnox.com\/blog\/compliance-regulations\/understanding-iso-27001-evolution-alignment-with-network-access-control-nac\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/"},{"@type":"ListItem","position":2,"name":"Understanding ISO 27001: Evolution &#038; Alignment with Network Access Control (NAC)"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/011bc7c3731c930bcfeecd52fefb6365","name":"tracylamv2","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9d01d79cbfd8b2e878f5d701a362cc9fca466d33fec977b59706c23c1a2db15c?s=96&d=identicon&r=g","caption":"tracylamv2"},"url":"https:\/\/version-2.com\/zh\/author\/tracylamv2\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-kKz","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/79767","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/149011790"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=79767"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/79767\/revisions"}],"predecessor-version":[{"id":79771,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/79767\/revisions\/79771"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=79767"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=79767"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=79767"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}