Framework
Full specification

CyberFundamentals

Oh no! No description found. But not to worry. Read from Tasks below how to advance this topic.

The CyberFundamentals framework is created by Centre for Cyber security Belgium. It provides a set of concrete measures to protect your data, significantly reduce the risk of the most common cyber-attacks, and increase your organisation's cyber resilience.

The CyberFundamentals framework is created by Centre for Cybersecurity Belgium. It provides a set of concrete measures to protect your data, significantly reduce the risk of the most common cyber-attacks, and increase your organisation's cyber resilience. The framework is based on:

  • Four commonly used cybersecurity frameworks (NIST CSF, ISO 27001 / ISO 27002, CIS Controls and IEC 62443)
  • Anonymized historical data of successful cyber-attacks. Through retro-fitting, we are able to assess what percentage of past attacks the measures of the Framework will protect you against.
  • The Cyberfundamentals are structured in 4 levels, with a subsequent level containing a little more measures than the previous one each time. A beginner level Small, followed by Basic, Important and Essential. The Essential level contains all the basic information security mesures from previous ones and introduces more advanced controls. The essential level is in line with the NIS2 directive.

    Tasks
    125
    Scope
    Belgium
    Here's what
    CyberFundamentals
    requires and how to comply.

    Below you'll find all of the requirements of this framework. In Cyberday, we map all requirement to global tasks, making multi-compliance management easy. Do it once, and see the progress across all frameworks!

    Requirements
    PR.IP-3: Configuration change control processes are in place.
    PR.IP-4: Backups of information are conducted, maintained, and tested.
    PR.IP-5: Policy and regulations regarding the physical operating environment for organizational assets are met.
    PR.IP-6: Data is destroyed according to policy.
    PR.IP-7: Protection processes are improved.
    PR.IP-8: Effectiveness of protection technologies is shared.
    PR.IP-9: Response plans (Incident Response and Business Continuity) and recovery plans (Incident Recovery and Disaster Recovery) are in place and managed.
    PR.IP-11: Cybersecurity is included in human resources practices (deprovisioning, personnel screening…).
    PR.IP-12: A vulnerability management plan is developed and implemented.
    PR.MA-1: Maintenance and repair of organizational assets are performed and logged, with approved and controlled tools.
    PR.MA-2: Remote maintenance of organizational assets is approved, logged, and performed in a manner that prevents unauthorized access.
    PR.PT-1: Audit/log records are determined, documented, implemented, and reviewed in accordance with policy.
    PR.PT-2: Removable media is protected, and its use restricted according to policy.
    PR.PT-3: The principle of least functionality is incorporated by configuring systems to provide only essential capabilities.
    PR.PT-4: Communications and control networks are protected. Web and e-mail filters shall be installed and used.
    DE.AE-1: A baseline of network operations and expected data flows for users and systems is established and managed.
    CyberFundamentals
    learning hub

    Explore our comprehensive resources and improve your security with the themes of this framework.

    How Cyberday helps with
    CyberFundamentals

    Discover specific ways our platform streamlines your ISO 27001 compliance process, from automated controls to audit preparation.

    Explore use case
    Free
    CyberFundamentals
    assessment

    Take our comprehensive assessment to identify gaps in your current implementation and get personalized recommendations.

    Start assessment
    Read more about
    CyberFundamentals

    Dive deeper with our articles, case studies, and expert insights on framework implementation.

    Read article
    Guide to compliance

    Get a concise overview of all requirements, controls, and implementation steps in our quick guide.

    Get the guide
    Framework comparison

    See how the overlap and differences with any other framework to optimize your compliance strategy.

    Compare framework
    Join a live
    CyberFundamentals
    webinar

    Participate in expert-led sessions covering implementation strategies, common pitfalls, and best practices for compliance.

    Register for webinar
    Join our live webinars

    Participate in expert-led sessions covering implementation strategies, common pitfalls, and best practices for compliance.

    Register for webinar
    What are frameworks?

    Understand the basics of cyber security frameworks with our comprehensive guide.

    Read the article

    The ISMS component hierachy

    When building an ISMS, it's important to understand the different levels of information hierarchy. Here's how Cyberday is structured.

    Framework

    Sets the overall compliance standard or regulation your organization needs to follow.

    Requirements

    Break down the framework into specific obligations that must be met.

    Tasks

    Concrete actions and activities your team carries out to satisfy each requirement.

    Policies

    Documented rules and practices that are created and maintained as a result of completing tasks.

    Never duplicate effort. Do it once - improve compliance across frameworks.

    Reach multi-framework compliance in the simplest possible way
    Security frameworks tend to share the same core requirements - like risk management, backup, malware, personnel awareness or access management.
    Cyberday maps all frameworks’ requirements into shared tasks - one single plan that improves all frameworks’ compliance.
    Do it once - we automatically apply it to all current and future frameworks.