Documentation
Difficulty level:
Mandatory Standards
Mandatory Standards
Standard | Description | In Use |
---|---|---|
Ades Baseline Profile | For the importance of creating digital signatures | No |
Aquo Standard | Water management information regarding the recording and use of data in the water sector | No |
BWB | Used for referring to nationally established rules | No |
DANE | DNS-Based Authentication of Named Entities | Yes |
Digikoppeling | Used for the secure exchange of data between government sectors | No |
Digital accessibility | Ensures easier accessibility for everyone to (government) information | No |
DKIM | Protection against e-mail fraud | Yes |
DMARC* | Protection against e-mail fraud using SPF and DKIM | Yes* |
DNSSEC | Security for the use of domain names | Yes |
E-Portofolio NL | Keeping track of educational competencies per student | No |
ECLI | Referring to judicial decisions | No |
EML_NL | Exchanging and storing data during elections | No |
Geo-Standards | Describing, registering and exchanging geographical information | No |
BWB | Used to refer to nationally established rules | No |
GSGW | Exchanging and recording data for urban water management | No |
HTTPS & HSTS | HTTPS ensures encrypted web traffic. HTSTS ensures that there is no reverting to an unencrypted HTTP connection | Yes |
IFC | Exchanging and sharing building information models | No |
IPv6 & IPv4 | Both are used to allow users to communicate with the internet | Yes |
JCDR | Used when decentralized regulations are used. | No |
NEN-ISO/IEC 27001* | Requirements set up for an information security management system | Yes* |
NEN-ISO/IEC 27002 | Requirements supporting NEN-ISO/IEC 27001 | No |
NL GOV Assurance profile for OAuth 2.0 | Standard used to secure applications that use REST APIs | Yes |
PDF (NEN-ISO) | Explanation of what a PDF is and what a PDF should look like | No |
RPKI | Security applied to IP addresses by network providers and holders | No |
SAML | Secure exchange of authentication and authorization data | No |
security.txt | A written description of how an ethical hacker can approach a specific organization if a digital vulnerability has been found | Yes |
SETU | Standardizing the information that is exchanged, such as vacancy, selection and invoicing, between the provider and recipient of flexible labor | No |
SIKB0101 | Describes the agreements on the exchange of information about soil structure and water quality | No |
SIKB0102 | Regulations regarding the exchange of archaeological data | No |
SKOS | Enables the knowledge representations of certain databases such as glossaries and digital dictionaries to be linked to the Internet | No |
SPF | Reduces the risk of e-mail phishing | Yes |
STARTTLS and DANE | Secure connection between mail servers | No |
STIX and TAXII | Enables the structured processing and sharing of cyber threats and attacks with organizations in real time | No |
StUF | Basic agreements on the exchange of data between applications in the municipality |