Documentation
Difficulty level:
Mandatory Standards
Mandatory Standards
| Standard | Description | In Use |
|---|---|---|
| Ades Baseline Profile | For the importance of creating digital signatures | No |
| Aquo Standard | Water management information regarding the recording and use of data in the water sector | No |
| BWB | Used for referring to nationally established rules | No |
| DANE | DNS-Based Authentication of Named Entities | Yes |
| Digikoppeling | Used for the secure exchange of data between government sectors | No |
| Digital accessibility | Ensures easier accessibility for everyone to (government) information | No |
| DKIM | Protection against e-mail fraud | Yes |
| DMARC* | Protection against e-mail fraud using SPF and DKIM | Yes* |
| DNSSEC | Security for the use of domain names | Yes |
| E-Portofolio NL | Keeping track of educational competencies per student | No |
| ECLI | Referring to judicial decisions | No |
| EML_NL | Exchanging and storing data during elections | No |
| Geo-Standards | Describing, registering and exchanging geographical information | No |
| BWB | Used to refer to nationally established rules | No |
| GSGW | Exchanging and recording data for urban water management | No |
| HTTPS & HSTS | HTTPS ensures encrypted web traffic. HTSTS ensures that there is no reverting to an unencrypted HTTP connection | Yes |
| IFC | Exchanging and sharing building information models | No |
| IPv6 & IPv4 | Both are used to allow users to communicate with the internet | Yes |
| JCDR | Used when decentralized regulations are used. | No |
| NEN-ISO/IEC 27001* | Requirements set up for an information security management system | Yes* |
| NEN-ISO/IEC 27002 | Requirements supporting NEN-ISO/IEC 27001 | No |
| NL GOV Assurance profile for OAuth 2.0 | Standard used to secure applications that use REST APIs | Yes |
| PDF (NEN-ISO) | Explanation of what a PDF is and what a PDF should look like | No |
| RPKI | Security applied to IP addresses by network providers and holders | No |
| SAML | Secure exchange of authentication and authorization data | No |
| security.txt | A written description of how an ethical hacker can approach a specific organization if a digital vulnerability has been found | Yes |
| SETU | Standardizing the information that is exchanged, such as vacancy, selection and invoicing, between the provider and recipient of flexible labor | No |
| SIKB0101 | Describes the agreements on the exchange of information about soil structure and water quality | No |
| SIKB0102 | Regulations regarding the exchange of archaeological data | No |
| SKOS | Enables the knowledge representations of certain databases such as glossaries and digital dictionaries to be linked to the Internet | No |
| SPF | Reduces the risk of e-mail phishing | Yes |
| STARTTLS and DANE | Secure connection between mail servers | No |
| STIX and TAXII | Enables the structured processing and sharing of cyber threats and attacks with organizations in real time | No |
| StUF | Basic agreements on the exchange of data between applications in the municipality |





