Oh no! No description found. But not to worry. Read from Tasks below how to advance this topic.
The CyberFundamentals framework is created by Centre for Cyber security Belgium. It provides a set of concrete measures to protect your data, significantly reduce the risk of the most common cyber-attacks, and increase your organisation's cyber resilience.
The CyberFundamentals framework is created by Centre for Cybersecurity Belgium. It provides a set of concrete measures to protect your data, significantly reduce the risk of the most common cyber-attacks, and increase your organisation's cyber resilience. The framework is based on:
The Cyberfundamentals are structured in 4 levels, with a subsequent level containing a little more measures than the previous one each time. A beginner level Small, followed by Basic, Important and Essential. The Essential level contains all the basic information security mesures from previous ones and introduces more advanced controls. The essential level is in line with the NIS2 directive.
Below you'll find all of the requirements of this framework. In Cyberday, we map all requirement to global tasks, making multi-compliance management easy. Do it once, and see the progress across all frameworks!
An inventory of assets associated with information and information processing facilities within the organization shall be documented, reviewed, and updated when changes occur.
Guidance
- This inventory includes fixed and portable computers, tablets, mobile phones, Programmable Logic Controllers (PLCs), sensors, actuators, robots, machine tools, firmware, network switches, routers, power supplies, and other networked components or devices.
- This inventory must include all assets, whether or not they are connected to the organization's
network.
- The use of an IT asset management tool could be considered.
The inventory of assets associated with information and information processing facilities shall reflect changes in the organization’s context and include all information necessary for effective accountability.
Guidance
- Inventory specifications include for example, manufacturer, device type, model, serial number, machine names and network addresses, physical location…
- Accountability is the obligation to explain, justify, and take responsibility for one's actions, it implies
answerability for the outcome of the task or process.
- Changes include the decommissioning of material.
When unauthorized hardware is detected, it shall be quarantined for possible exception handling, removed, or replaced, and the inventory shall be updated accordingly.
Guidance
- Any unsupported hardware without an exception documentation, is designated as unauthorized.
- Unauthorized hardware can be detected during inventory, requests for support by the user or other means.
Mechanisms for detecting the presence of unauthorized hardware and firmware
components within the organization's network shall be identified.
Guidance
- Where safe and feasible, these mechanisms should be automated.
- There should be a process to address unauthorized assets on a frequently basis; The organization may choose to remove the asset from the network, deny the asset from connecting remotely to the network, or quarantine the asset.
An inventory that reflects what software platforms and applications are being used in the organization shall be documented, reviewed, and updated when changes occur.
Guidance
- This inventory includes software programs, software platforms and databases, even if outsourced (SaaS).
- Outsourcing arrangements should be part of the contractual agreements with the provider.
- Information in the inventory should include for example: name, description, version, number of users,
data processed, etc.
- A distinction should be made between unsupported software and unauthorized software.
- The use of an IT asset management tool could be considered.
The inventory of software platforms and applications associated with information and information processing shall reflect changes in the organization’s context and include all information necessary for effective accountability.
Guidance
The inventory of software platforms and applications should include the title, publisher, initial install/use date, and business purpose for each entry; where appropriate, include the Uniform Resource Locator (URL), app store(s), version(s), deployment mechanism, and decommission date.
Individuals who are responsible and who are accountable for administering software platforms and applications within the organization shall be identified.
When unauthorized software is detected, it shall be quarantined for possible exception handling, removed, or replaced, and the inventory shall be updated accordingly.
Guidance
- Any unsupported software without an exception documentation, is designated as unauthorized.
- Unauthorized software can be detected during inventory, requests for support by the user or other means.
Mechanisms for detecting the presence of unauthorized software within the organization’s ICT/OT environment shall be identified.
Guidance
- Where safe and feasible, these mechanisms should be automated.
- There should be a process to regularly address unauthorised assets; The organization may choose to remove the asset from the network, deny the asset from connecting remotely to the network, or quarantine the asset.
Information that the organization stores and uses shall be identified.
Guidance
- Start by listing all the types of information your business stores or uses. Define “information type” in any useful way that makes sense to your business. You may want to have your employees make a list of all the information they use in their regular activities. List everything you can think of, but you do not need to be too specific. For example, you may keep customer names and email addresses, receipts for raw material, your banking information, or other proprietary information.
- Consider mapping this information with the associated assets identified in the inventories of physical devices, systems, software platforms and applications used within the organization (see ID.AM-1 &ID.AM-2).
All connections within the organization's ICT/OT environment, and to other organization internal platforms shall be mapped, documented, approved, and updated as appropriate.
Guidance
- Connection information includes, for example, the interface characteristics, data characteristics, ports,
protocols, addresses, description of the data, security requirements, and the nature of the connection.
- Configuration management can be used as supporting asset.
- This documentation should not be stored only on the network it represents.
- Consider keeping a copy of this documentation in a safe offline environment (e.g. offline hard disk,paper hardcopy, …).
The information flows/data flows within the organization’s ICT/OT environment, as well as to other organization-internal systems shall be mapped, documented, authorized, and updated when changes occur.
Guidance
- With knowledge of the information/data flows within a system and between systems, it is possible to determine where information can and cannot go.
- Consider:
- Enforcing controls restricting connections to only authorized interfaces.
- Heightening system monitoring activity whenever there is an indication of increased risk to organization's critical operations and assets.
- Protecting the system from information leakage due to electromagnetic signals emanations.
The organization shall map, document, authorize and when changes occur, update, all external services and the connections made with them.
Guidance
- Outsourcing of systems, software platforms and applications used within the organization is covered in ID.AM-1 & ID.AM-2
- External information systems are systems or components of systems for which organizations typically have no direct supervision and authority over the application of security requirements and controls, or the determination of the effectiveness of implemented controls on those systems i.e., services that
are run in cloud, SaaS, hosting or other external environments, API (Application Programming interface)…
- Mapping external services and the connections made to them and authorizing them in advance avoids wasting unnecessary resources investigating a supposedly non-authenticated connection to external systems.
The flow of information to/from external systems shall be mapped, documented, authorized, and update when changes occur.
Guidance
Consider requiring external service providers to identify and document the functions, ports, protocols, and services necessary for the connection services.
The organization’s resources (hardware, devices, data, time, personnel, information, and software) shall be prioritized based on their classification, criticality, and business value.
Guidance
- Determine organization’s resources (e.g., hardware, devices, data, time, personnel, information, and software):
- What would happen to my business if these resources were made public, damaged, lost…?
- What would happen to my business when the integrity of resources is no longer guaranteed?
- What would happen to my business if I/my customers couldn’t access these resources? And rank these resources based on their classification, criticality, and business value.
- Resources should include enterprise assets.
- Create a classification for sensitive information by first determining categories, e.g.
- Public - freely accessible to all, even externally
- Internal - accessible only to members of your organization
- Confidential - accessible only to those whose duties require access.
- Communicate these categories and identify what types of data fall into these categories (HR data, financial data, legal data, personal data, etc.).
- Consider the use of the Traffic Light Protocol (TLP).
- Data classification should apply to the three aspects: C-I-A
- Consider implementing an automated tool, such as a host-based Data Loss Prevention (DLP) tool to identify all sensitive data stored, processed, or transmitted through enterprise assets, including those located onsite or at a remote service provider.
Information security and cybersecurity roles, responsibilities and authorities within the organization shall be documented, reviewed, authorized, and updated and alignment with organization-internal roles and external partners.
Guidance
It should be considered to:
- Describe security roles, responsibilities, and authorities: who in your organization should be
consulted, informed, and held accountable for all or part of your assets.
- Provide security roles, responsibilities, and authority for all key functions in information/cyber
security (legal, detection activities…).
- Include information/cybersecurity roles and responsibilities for third-party providers with physical or logical access to the organization’s ICT/OT environment.
The organization shall appoint an information security officer.
Guidance
The information security officer should be responsible for monitoring the implementation of the organization's information/cyber security strategy and safeguards.
The organization’s role in the supply chain shall be identified, documented, and communicated.
Guidance
- The organisation should be able to clearly identify who is upstream and downstream of the organisation and which suppliers provide services, capabilities, products and items to the organisation.
- The organisation should communicate its position to its upstream and downstream so that it is understood where they sit in terms of critical importance to the organisation's operations.
The organization shall protect its ICT/OT environment from supply chain threats by applying security safeguards as part of a documented comprehensive security strategy.
The organization’s place in critical infrastructure and its industry sector shall be identifiedand communicated.
Guidance
The organisation covered by NIS legislation has a responsibility to know the other organisations in the same sector in order to work with them to achieve the objectives set by NIS for that particular sector.
Priorities for organization's business, objectives, and activities shall be established and communicated.
Guidance
- Organizational mission, objectives and activities should be determined and prioritized.
- Information protection needs should be determined, and the related processes revised as necessary, until an achievable set is obtained.
Dependencies and mission-critical functions for the delivery of critical services shall be identified, documented, and prioritized according to their criticality as part of the risk assessment process. Guidance Dependencies and business critical functions should include support services.
To support cyber resilience and secure the delivery of critical services, the necessary requirements are identified, documented and their implementation tested and approved.
Guidance
- Consider implementing resiliency mechanisms to support normal and adverse operational situations
(e.g., failsafe, load balancing, hot swap).
- Consider aspects of business continuity management in e.g. Business Impact Analyse (BIA), Disaster Recovery Plan (DRP) and Business Continuity Plan (BCP).
Information processing & supporting facilities shall implement redundancy to meet availability requirements, as defined by the organization and/or regulatory frameworks.
Guidance
- Consider provisioning adequate data and network redundancy (e.g. redundant network devices, servers with load balancing, raid arrays, backup services, 2 separate datacentres, fail-over network connections, 2 ISP's…).
- Consider protecting critical equipment/services from power outages and other failures due to utility interruptions (e.g. UPS & NO-break, frequent test, service contracts that include regular maintenance, redundant power cabling, 2 different power service providers...).
Recovery time and recovery point objectives for the recovery of essential ICT/OT system processes shall be defined.
Guidance
- Consider applying the 3-2-1 back-up rule to improve RPO and RTO (maintain at least 3 copies of your data, keep 2 of them at separate locations and one copy should be stored at an off-site location).
- Consider implementing mechanisms such as hot swap, load balancing and failsafe to increase resilience.
Policies and procedures for information security and cyber security shall be created, documented, reviewed, approved, and updated when changes occur.
Guidance
- Policies and procedures used to identify acceptable practices and expectations for business operations, can be used to train new employees on your information security expectations, and can aid an investigation in case of an incident. These policies and procedures should be readily accessible
to employees.
- Policies and procedures for information- and cybersecurity should clearly describe your expectations for protecting the organization’s information and systems, and how management expects the company’s resources to be used and protected by all employees.
- Policies and procedures should be reviewed and updated at least annually and every time there are changes in the organization or technology. Whenever the policies are changed, employees should be made aware of the changes.
An organization-wide information security and cybersecurity policy shall be established,documented, updated when changes occur, disseminated, and approved by senior management.
Guidance
The policy should include, for example:
- The identification and assignment of roles, responsibilities, management commitment, coordination among organizational entities, and compliance. Guidance on role profiles along with their identified titles, missions, tasks, skills, knowledge, competences is available in the "European Cybersecurity Skills Framework Role Profiles" by ENISA. (https://www.enisa.europa.eu/publications/europeancybersecurity-skills-framework-role-profiles)
- The coordination among organizational entities responsible for the different aspects of security (i.e., technical, physical, personnel, cyber-physical, information, access control, media protection, vulnerability management, maintenance, monitoring)
- The coverage of the full life cycle of the ICT/OT systems.
Legal and regulatory requirements regarding information/cybersecurity, including privacy obligations, shall be understood, implemented, and managed.
Guidance
- There should be regular reviews to ensure the continuous compliance with legal and regulatory
requirements regarding information/cybersecurity, including privacy obligations.
- This requirement also applies to contractors and service providers.
As part of the company's overall risk management, a comprehensive strategy to manage information security and cybersecurity risks shall be developed and updated when changes occur.
Guidance
This strategy should include determining and allocating the required resources to protect the organization’s business-critical assets.
Information security and cybersecurity risks shall be documented, formally approved, and updated when changes occur.
Guidance
Consider using Risk Management tools.
Threats and vulnerabilities shall be identified.
Guidance
- A vulnerability refers to a weakness in the organization’s hardware, software, or procedures. It is a gap through which a bad actor can gain access to the organization’s assets. A vulnerability exposes an organization to threats.
- A threat is a malicious or negative event that takes advantage of a vulnerability.
- The risk is the potential for loss and damage when the threat does occur.
A process shall be established to monitor, identify, and document vulnerabilities of the organisation's business critical systems in a continuous manner.
Guidance
- Where safe and feasible, the use of vulnerability scanning should be considered.
- The organization should establish and maintain a testing program appropriate to its size, complexity, and maturity.
To ensure that organization's operations are not adversely impacted by the testing process, performance/load testing and penetration testing on the organization’s systems shall be conducted with care.
Guidance
Consider validating security measures after each penetration test.
A threat and vulnerability awareness program that includes a cross organization information-sharing capability shall be implemented.
Guidance
A threat and vulnerability awareness program should include ongoing contact with security groups and associations to receive security alerts and advisories. (Security groups and associations include, for example, special interest groups, forums, professional associations, news groups, and/or peer groups of security professionals in similar organizations).This contact can include the sharing of information about potential vulnerabilities and incidents. This sharing capability should have an unclassified and classified information sharing capability.
It shall be identified where automated mechanisms can be implemented to make security alert and advisory information available to relevant organization stakeholders.
Explore our comprehensive resources and improve your security with the themes of this framework.
Discover specific ways our platform streamlines your ISO 27001 compliance process, from automated controls to audit preparation.
Explore use caseTake our comprehensive assessment to identify gaps in your current implementation and get personalized recommendations.
Start assessmentDive deeper with our articles, case studies, and expert insights on framework implementation.
Read articleGet a concise overview of all requirements, controls, and implementation steps in our quick guide.
Get the guideSee how the overlap and differences with any other framework to optimize your compliance strategy.
Compare frameworkParticipate in expert-led sessions covering implementation strategies, common pitfalls, and best practices for compliance.
Register for webinarParticipate in expert-led sessions covering implementation strategies, common pitfalls, and best practices for compliance.
Register for webinarUnderstand the basics of cyber security frameworks with our comprehensive guide.
Read the articleWhen building an ISMS, it's important to understand the different levels of information hierarchy. Here's how Cyberday is structured.
Sets the overall compliance standard or regulation your organization needs to follow.
Break down the framework into specific obligations that must be met.
Concrete actions and activities your team carries out to satisfy each requirement.
Documented rules and practices that are created and maintained as a result of completing tasks.