Framework
Full specification

CyberFundamentals

Oh no! No description found. But not to worry. Read from Tasks below how to advance this topic.

The CyberFundamentals framework is created by Centre for Cyber security Belgium. It provides a set of concrete measures to protect your data, significantly reduce the risk of the most common cyber-attacks, and increase your organisation's cyber resilience.

The CyberFundamentals framework is created by Centre for Cybersecurity Belgium. It provides a set of concrete measures to protect your data, significantly reduce the risk of the most common cyber-attacks, and increase your organisation's cyber resilience. The framework is based on:

  • Four commonly used cybersecurity frameworks (NIST CSF, ISO 27001 / ISO 27002, CIS Controls and IEC 62443)
  • Anonymized historical data of successful cyber-attacks. Through retro-fitting, we are able to assess what percentage of past attacks the measures of the Framework will protect you against.
  • The Cyberfundamentals are structured in 4 levels, with a subsequent level containing a little more measures than the previous one each time. A beginner level Small, followed by Basic, Important and Essential. The Essential level contains all the basic information security mesures from previous ones and introduces more advanced controls. The essential level is in line with the NIS2 directive.

    Tasks
    125
    Scope
    Belgium
    Here's what
    CyberFundamentals
    requires and how to comply.

    Below you'll find all of the requirements of this framework. In Cyberday, we map all requirement to global tasks, making multi-compliance management easy. Do it once, and see the progress across all frameworks!

    Requirements
    ID.RA-5: Threats, vulnerabilities, likelihoods, and impacts are used to determine risk
    ID.RA-6: Risk responses are identified and prioritized.
    ID.RM-1: Risk management processes are established, managed, and agreed to by organizational stakeholders.
    ID.RM-2: Organizational risk tolerance is determined and clearly expressed.
    ID.RM-3: The organization’s determination of risk tolerance is informed by its role in critical infrastructure and sector specific risk analysis.
    ID.SC-1: Cyber supply chain risk management processes are identified, established, assessed, managed, and agreed to by organizational stakeholders.
    ID.SC-2: Suppliers and third-party partners of information systems, components, and services are identified, prioritized, and assessed using a cyber supply chain risk assessment process.
    ID.SC-3: Contracts with suppliers and third-party partners are used to implement appropriate measures designed to meet the objectives of an organization’s cybersecurity program and Cyber Supply Chain Risk Management Plan.
    ID.SC-4: Suppliers and third-party partners are routinely assessed using audits, test results, or other forms of evaluations to confirm they are meeting their contractual obligations.
    ID.SC-5: Response and recovery planning and testing are conducted with suppliers and third-party providers.
    PR.AC-1: Identities and credentials are issued, managed, verified, revoked, and audited for authorized devices, users, and processes.
    PR.AC-2: Physical access to assets is managed and protected.
    PR.AC-3: Remote access is managed.
    PR.AC-4: Access permissions and authorizations are managed, incorporating the principles of least privilege and separation of duties.
    PR.AC-5: Network integrity (network segregation, network segmentation… ) is protected.
    PR.AC-6: Identities are proofed and bound to credentials and asserted in interactions.
    CyberFundamentals
    learning hub

    Explore our comprehensive resources and improve your security with the themes of this framework.

    How Cyberday helps with
    CyberFundamentals

    Discover specific ways our platform streamlines your ISO 27001 compliance process, from automated controls to audit preparation.

    Explore use case
    Free
    CyberFundamentals
    assessment

    Take our comprehensive assessment to identify gaps in your current implementation and get personalized recommendations.

    Start assessment
    Read more about
    CyberFundamentals

    Dive deeper with our articles, case studies, and expert insights on framework implementation.

    Read article
    Guide to compliance

    Get a concise overview of all requirements, controls, and implementation steps in our quick guide.

    Get the guide
    Framework comparison

    See how the overlap and differences with any other framework to optimize your compliance strategy.

    Compare framework
    Join a live
    CyberFundamentals
    webinar

    Participate in expert-led sessions covering implementation strategies, common pitfalls, and best practices for compliance.

    Register for webinar
    Join our live webinars

    Participate in expert-led sessions covering implementation strategies, common pitfalls, and best practices for compliance.

    Register for webinar
    What are frameworks?

    Understand the basics of cyber security frameworks with our comprehensive guide.

    Read the article

    The ISMS component hierachy

    When building an ISMS, it's important to understand the different levels of information hierarchy. Here's how Cyberday is structured.

    Framework

    Sets the overall compliance standard or regulation your organization needs to follow.

    Requirements

    Break down the framework into specific obligations that must be met.

    Tasks

    Concrete actions and activities your team carries out to satisfy each requirement.

    Policies

    Documented rules and practices that are created and maintained as a result of completing tasks.

    Never duplicate effort. Do it once - improve compliance across frameworks.

    Reach multi-framework compliance in the simplest possible way
    Security frameworks tend to share the same core requirements - like risk management, backup, malware, personnel awareness or access management.
    Cyberday maps all frameworks’ requirements into shared tasks - one single plan that improves all frameworks’ compliance.
    Do it once - we automatically apply it to all current and future frameworks.