Baseline Informatiebeveiliging Overheid 2 (Dutch Government Information Security Baseline)
Mandatory information security baseline for all Dutch government organisations at all levels: central government, provinces, municipalities, and water authorities. Aligned with ISO/IEC 27002:2022 with 93 controls plus government-specific measures (overheidsmaatregelen). Integrates NIS2 Article 21 requirements and supports ENSIA audit compliance. Replaces BIO 1.04 with a risk-based approach.
Clauses: 93
Avg Coverage: 83.0%
Publisher: Dutch Ministry of the Interior and Kingdom Relations (BZK) Version: 1.2 (2025) | Clause | Title | SP 800-53 Controls |
|---|---|---|
| 5.1 | Policies for information security (BIO2) | |
| 5.2 | Information security roles and responsibilities (BIO2) | |
| 5.3 | Segregation of duties (BIO2) | |
| 5.4 | Management responsibilities (BIO2) | |
| 5.5 | Contact with authorities (BIO2) | |
| 5.6 | Contact with special interest groups (BIO2) | |
| 5.7 | Threat intelligence (BIO2) | |
| 5.8 | Information security in project management (BIO2) | |
| 5.9 | Inventory of information and other associated assets (BIO2) | |
| 5.10 | Acceptable use of information and other associated assets (BIO2) | |
| 5.11 | Return of assets (BIO2) | |
| 5.12 | Classification of information (BIO2) | |
| 5.13 | Labelling of information (BIO2) | |
| 5.14 | Information transfer (BIO2) | |
| 5.15 | Access control (BIO2) | |
| 5.16 | Identity management (BIO2) | |
| 5.17 | Authentication information (BIO2) | |
| 5.18 | Access rights (BIO2) | |
| 5.19 | Information security in supplier relationships (BIO2) | |
| 5.20 | Addressing information security within supplier agreements (BIO2) | |
| 5.21 | Managing information security in the ICT supply chain (BIO2) | |
| 5.22 | Monitoring, review and change management of supplier services (BIO2) | |
| 5.23 | Information security for use of cloud services (BIO2) | |
| 5.24 | Information security incident management planning and preparation (BIO2) | |
| 5.25 | Assessment and decision on information security events (BIO2) | |
| 5.26 | Response to information security incidents (BIO2) | |
| 5.27 | Learning from information security incidents (BIO2) | |
| 5.28 | Collection of evidence (BIO2) | |
| 5.29 | Information security during disruption (BIO2) | |
| 5.30 | ICT readiness for business continuity (BIO2) | |
| 5.31 | Legal, statutory, regulatory and contractual requirements (BIO2) | |
| 5.32 | Intellectual property rights (BIO2) | |
| 5.33 | Protection of records (BIO2) | |
| 5.34 | Privacy and protection of PII (BIO2) | |
| 5.35 | Independent review of information security (BIO2) | |
| 5.36 | Compliance with policies, rules and standards (BIO2) | |
| 5.37 | Documented operating procedures (BIO2) | |
| 6.1 | Screening (BIO2) | |
| 6.2 | Terms and conditions of employment (BIO2) | |
| 6.3 | Information security awareness, education and training (BIO2) | |
| 6.4 | Disciplinary process (BIO2) | |
| 6.5 | Responsibilities after termination or change of employment (BIO2) | |
| 6.6 | Confidentiality or non-disclosure agreements (BIO2) | |
| 6.7 | Remote working (BIO2) | |
| 6.8 | Information security event reporting (BIO2) | |
| 7.1 | Physical security perimeters (BIO2) | |
| 7.2 | Physical entry (BIO2) | |
| 7.3 | Securing offices, rooms and facilities (BIO2) | |
| 7.4 | Physical security monitoring (BIO2) | |
| 7.5 | Protecting against physical and environmental threats (BIO2) | |
| 7.6 | Working in secure areas (BIO2) | |
| 7.7 | Clear desk and clear screen (BIO2) | |
| 7.8 | Equipment siting and protection (BIO2) | |
| 7.9 | Security of assets off-premises (BIO2) | |
| 7.10 | Storage media (BIO2) | |
| 7.11 | Supporting utilities (BIO2) | |
| 7.12 | Cabling security (BIO2) | |
| 7.13 | Equipment maintenance (BIO2) | |
| 7.14 | Secure disposal or re-use of equipment (BIO2) | |
| 8.1 | User endpoint devices (BIO2) | |
| 8.2 | Privileged access rights (BIO2) | |
| 8.3 | Information access restriction (BIO2) | |
| 8.4 | Access to source code (BIO2) | |
| 8.5 | Secure authentication (BIO2) | |
| 8.6 | Capacity management (BIO2) | |
| 8.7 | Protection against malware (BIO2) | |
| 8.8 | Management of technical vulnerabilities (BIO2) | |
| 8.9 | Configuration management (BIO2) | |
| 8.10 | Information deletion (BIO2) | |
| 8.11 | Data masking (BIO2) | |
| 8.12 | Data leakage prevention (BIO2) | |
| 8.13 | Information backup (BIO2) | |
| 8.14 | Redundancy of information processing facilities (BIO2) | |
| 8.15 | Logging (BIO2) | |
| 8.16 | Monitoring activities (BIO2) | |
| 8.17 | Clock synchronization (BIO2) | |
| 8.18 | Use of privileged utility programs (BIO2) | |
| 8.19 | Installation of software on operational systems (BIO2) | |
| 8.20 | Networks security (BIO2) | |
| 8.21 | Security of network services (BIO2) | |
| 8.22 | Segregation of networks (BIO2) | |
| 8.23 | Web filtering (BIO2) | |
| 8.24 | Use of cryptography (BIO2) | |
| 8.25 | Secure development life cycle (BIO2) | |
| 8.26 | Application security requirements (BIO2) | |
| 8.27 | Secure system architecture and engineering principles (BIO2) | |
| 8.28 | Secure coding (BIO2) | |
| 8.29 | Security testing in development and acceptance (BIO2) | |
| 8.30 | Outsourced development (BIO2) | |
| 8.31 | Separation of development, test and production environments (BIO2) | |
| 8.32 | Change management (BIO2) | |
| 8.33 | Test information (BIO2) | |
| 8.34 | Protection of information systems during audit testing (BIO2) |