Framework
Full specification

CyberFundamentals

Oh no! No description found. But not to worry. Read from Tasks below how to advance this topic.

The CyberFundamentals framework is created by Centre for Cyber security Belgium. It provides a set of concrete measures to protect your data, significantly reduce the risk of the most common cyber-attacks, and increase your organisation's cyber resilience.

The CyberFundamentals framework is created by Centre for Cybersecurity Belgium. It provides a set of concrete measures to protect your data, significantly reduce the risk of the most common cyber-attacks, and increase your organisation's cyber resilience. The framework is based on:

  • Four commonly used cybersecurity frameworks (NIST CSF, ISO 27001 / ISO 27002, CIS Controls and IEC 62443)
  • Anonymized historical data of successful cyber-attacks. Through retro-fitting, we are able to assess what percentage of past attacks the measures of the Framework will protect you against.
  • The Cyberfundamentals are structured in 4 levels, with a subsequent level containing a little more measures than the previous one each time. A beginner level Small, followed by Basic, Important and Essential. The Essential level contains all the basic information security mesures from previous ones and introduces more advanced controls. The essential level is in line with the NIS2 directive.

    Tasks
    125
    Scope
    Belgium
    Here's what
    CyberFundamentals
    requires and how to comply.

    Below you'll find all of the requirements of this framework. In Cyberday, we map all requirement to global tasks, making multi-compliance management easy. Do it once, and see the progress across all frameworks!

    Requirements
    PR.AC-7: Identities are proofed, bound to credentials and asserted in interactions.
    PR.AT-1: All users are informed and trained.
    PR.AT-2: Privileged users understand their roles and responsibilities.
    PR.AT-3: Third-party stakeholders (e.g., suppliers, customers, partners) understand their roles and responsibilities.
    PR.AT-4: Senior executives understand their roles and responsibilities.
    PR.AT-5: Physical security and cybersecurity personnel understand their roles and responsibilities.
    PR.DS-1: Data-at-rest is protected.
    PR.DS-2: Data-in-transit is protected.
    PR.DS-3: Assets are formally managed throughout removal, transfers, and disposition.
    PR.DS-4: Adequate capacity to ensure availability is maintained.
    PR.DS-5: Protections against data leaks are implemented.
    PR.DS-6: Integrity checking mechanisms are used to verify software, firmware, and information integrity.
    PR.DS-7: The development and testing environment(s) are separate from the production environment.
    PR.DS-8: Integrity checking mechanisms are used to verify hardware integrity.
    PR.IP-1: A baseline configuration of information technology/industrial control systems is created and maintained incorporating security principles.
    PR.IP-2: A System Development Life Cycle to manage systems is implemented.
    CyberFundamentals
    learning hub

    Explore our comprehensive resources and improve your security with the themes of this framework.

    How Cyberday helps with
    CyberFundamentals

    Discover specific ways our platform streamlines your ISO 27001 compliance process, from automated controls to audit preparation.

    Explore use case
    Free
    CyberFundamentals
    assessment

    Take our comprehensive assessment to identify gaps in your current implementation and get personalized recommendations.

    Start assessment
    Read more about
    CyberFundamentals

    Dive deeper with our articles, case studies, and expert insights on framework implementation.

    Read article
    Guide to compliance

    Get a concise overview of all requirements, controls, and implementation steps in our quick guide.

    Get the guide
    Framework comparison

    See how the overlap and differences with any other framework to optimize your compliance strategy.

    Compare framework
    Join a live
    CyberFundamentals
    webinar

    Participate in expert-led sessions covering implementation strategies, common pitfalls, and best practices for compliance.

    Register for webinar
    Join our live webinars

    Participate in expert-led sessions covering implementation strategies, common pitfalls, and best practices for compliance.

    Register for webinar
    What are frameworks?

    Understand the basics of cyber security frameworks with our comprehensive guide.

    Read the article

    The ISMS component hierachy

    When building an ISMS, it's important to understand the different levels of information hierarchy. Here's how Cyberday is structured.

    Framework

    Sets the overall compliance standard or regulation your organization needs to follow.

    Requirements

    Break down the framework into specific obligations that must be met.

    Tasks

    Concrete actions and activities your team carries out to satisfy each requirement.

    Policies

    Documented rules and practices that are created and maintained as a result of completing tasks.

    Never duplicate effort. Do it once - improve compliance across frameworks.

    Reach multi-framework compliance in the simplest possible way
    Security frameworks tend to share the same core requirements - like risk management, backup, malware, personnel awareness or access management.
    Cyberday maps all frameworks’ requirements into shared tasks - one single plan that improves all frameworks’ compliance.
    Do it once - we automatically apply it to all current and future frameworks.