Oh no! No description found. But not to worry. Read from Tasks below how to advance this topic.
Katakri is used when evaluating organisation's ability to secure confidential information from Finnish national authorities.
Katakri is used when evaluating organisation's ability to secure confidential information from Finnish national authorities. It can be used to guide security work in an organisation, that wants to be ready for an audit performed by authorities.
Below you'll find all of the requirements of this framework. In Cyberday, we map all requirement to global tasks, making multi-compliance management easy. Do it once, and see the progress across all frameworks!
The management of the organisation is responsible for:
a) approved by the senior management, the organisation has introduced security principles, which describe how information security measures are linked to the organisation’s activities,
b) security principles are comprehensive and appropriate for the protection of Classified Information,
c) security principles provide guidance for security measures, and
d) sufficient monitoring has been put in place to ensure that the organisation follows the requirements and guidance on the handling of Classified Information.
The organisation has defined the tasks and responsibilities of security management.
The organisation has assessed the essential risks for Classified Information and established the information security measures accordingly.
The organisation possesses up-to-date guidance for the handling of Classified Information, for the use of information systems, for access rights to the information, for realization of responsibilities in information management, for realization of access rights to the information and for information security measures. Security instructions cover the processes and handling environments that are related to Classified Information during the entire life cycle of the information.
There is a sufficient level of expertise in the organisation to ensure information security.
The organisation has defined preventive and corrective measures to minimize effects of
significant malfunctions and exceptional events to the handling and storage of Classified
Information.
a) The organisation has noted the need to protect Classified Information in emergency OR in disruptive situations.
b) Protective measures are considered adequate to prevent unauthorized access and disclosure to Classified Information and to ensure the integrity and availability of the CI.
c) Classified Information has been protected against technological and physical accidents.
1. Detected or possible security event, which has put the security of international Classified
Information in danger, has to be reported immediately to the competent security authority.
2. The organisation has a set of procedures in place to handle security events.
a) The organisation has the guidance and procedure in place to immediately share information
within the organization about such a detected or suspected security event, which may have put the
Classified Information in danger.
b) The organisation has defined the persons/actors to whom to report on (possible) security events.
c) The organisation has figured out, what kind of security events trigger the communication with
authorities.
This requirement will apply only on the information management of authorities:
1. Information has been classified on the basis of statutory requirements:
a) The authority has instructions for classification of information.
b) Classified Information (including drafts) is marked to indicate the protection level.
c) A document is marked to indicate the highest classification level of its parts (e. g. annexes).
d) If the classification level of the main document and annexes is not the same, this must be
indicated in the document.
The changes in the handling of Classified Information are noted in different phases of the life cycle of the employment. Special attention has to be paid to the measures in recruitment, in changes of responsibilities and in the termination of the employment contract.
1. The trustworthiness and reliability of individuals handling Classified Information is
determined, if necessary, by means of security clearance methods for the relevant level.
2. When international information security requirements so demand, the person may be
given access to the information classified to classification level III (CONFIDENTIAL) and
higher only after the person has been issued a Personnel Security Clearance (PSC) for the
respective level.
Security principles and procedures for protecting Classified Information have been sorted out for the personnel dealing with it and the personnel has signed an agreement for non- disclosure and confidentiality. Non-disclosure agreement or confidentiality commitment is in place in cases where the person handling Classified Information is not bound by the responsibility of an official.
1. The management has to make sure that the organisation offers education, which ensures
that the personnel and other people working for the organisation have appropriate
knowledge of relevant legislation, rules and regulations for information management, data
management, as well as of the publicity and non-disclosure of the information (ref. T-04).
2. Threats against Classified Information and the updated instructions (ref. T-04) have been
taught for the personnel.
3. The education and training concerning the handling of Classified Information is done on a regular basis and the participation is registered.
1. An up-to-date list of personnel with access rights to Classified Information on classification
level II and III (SECRET and CONFIDENTIAL) is maintained in the organisation.
2. The above mentioned list has to include the tasks on which the right to handle Classified
Information is based on.
3. Access to Classified Information can only be granted after an individual's task-based need-to-know has been determined.
4. The organisation has a procedure in place to remove an individual's access rights after
the need-to-know has ended.
1. The goal for physical security measures is to prevent unauthorized access to Classified
Information by:
a) ensuring that Classified Information is handled and stored in an appropriate manner;
b) ensuring that the access to Classified Information for the personnel is based on the need-to-know and the personnel has been cleared to the required classification level when needed;
c) deterring, impeding and detecting unauthorized actions; and
d) denying or delaying surreptitious or forced entry by intruders.
1. A risk management process has to be applied for protecting confidential information on the
premises to ensure that a commensurate level of physical protection is afforded against the
assessed risk.
2. The risk management process has to take into account all relevant factors, in particular:
a) A risk management process has to be applied for protecting confidential information on the premises to ensure that a commensurate level of physical protection
is afforded against the assessed risk.
b) Ways of handling and storing Classified Information, bearing in mind that large amounts of Classified Information compiled together might cause a need to strengthen the risk management measures.
c) The handling and storage time of Classified Information.
d) The environment for the handling and storage of Classified Information (Security Area): surroundings of the facility, location inside the facility or at one of its parts;
e) Reaction time in alarm situations;
f) Outsourced functions, like maintenance, cleaning and security services
g) The estimated threat to the information caused by intelligence services, criminal actions or own personnel;
3. In case the Classified Information is international by nature, the choice of controls and risk assessment has to be based on the threat assessment of the Finnish Security and Intelligence Service or the Defence Command.
1. In Security Areas and in premises around, preventive and limiting measures have to be
taken into use to ensure the security of the Security Area. Actions to detect and track the
intensives have to be included. Procedure to recover normal functions immediately has
to be in force.
2. The principle of defence-in-depth has to be used to evaluate and accredit an appropriate and - based on risk assessment - sufficient combination of security measures, consisting of administrative, functional and physical means, like:
a) structural barriers: physical obstacle(s) which sets the boundary for Security Areas and the premises around it, causing complications and delays for the intrusion;
b) Access control: access to Security Areas and premises around them is limited with access control mechanisms. The goal is to detect unauthorized attempts, to prevent the access of unauthorized people and to monitor the individuals moving around and inside the area. Access control may be targeted on an area, on one
or more facilities on the area, on areas within facilities or on rooms. The monitoring may be based on mechanical or electronic systems or on the combination of these or on some other physical means. Security personnel, receptionist and own personnel may be used as part of the monitoring procedure.
c) Intrusion detection system: in order to improve the security level given by a perimeter barrier, an intrusion detection system (burglar alarm) may be used. The
system may also be used in place of, or to assist, security staff.
d) Security personnel: trained, supervised and, where necessary, appropriately security-cleared security personnel may be employed, inter alia, in order to deter individuals planning covert intrusion.
e) CCTV: closed circuit camera surveillance may be used on Security Areas or around it especially for preventing illegal intelligence actions and other unwanted actions, as well as for verification of alarms and unexpected findings. The security personnel may use CCTV as a real time tool for monitoring or as a passive means to analyze the footage.
f) Measures which maintain the level of security: Definition of responsibilities and tasks. Various processes and working models, like the management of access rights and keys, introduction of new personnel and instructing them, and the service and maintenance processes of different systems.
g) Lighting: the possible intruder may be detected with the help of proper lighting. It also makes the monitoring of the area more efficient for the guarding personnel either visually or by using the CCTV.
h) Other relevant physical measures aiming at preventing or detecting unauthorized access or to prevent the loss or damage of Classified Information.
3) The devices have to be inspected and serviced on a regular basis.
Explore our comprehensive resources and improve your security with the themes of this framework.
Discover specific ways our platform streamlines your ISO 27001 compliance process, from automated controls to audit preparation.
Explore use caseTake our comprehensive assessment to identify gaps in your current implementation and get personalized recommendations.
Start assessmentDive deeper with our articles, case studies, and expert insights on framework implementation.
Read articleGet a concise overview of all requirements, controls, and implementation steps in our quick guide.
Get the guideSee how the overlap and differences with any other framework to optimize your compliance strategy.
Compare frameworkParticipate in expert-led sessions covering implementation strategies, common pitfalls, and best practices for compliance.
Register for webinarParticipate in expert-led sessions covering implementation strategies, common pitfalls, and best practices for compliance.
Register for webinarUnderstand the basics of cyber security frameworks with our comprehensive guide.
Read the articleWhen building an ISMS, it's important to understand the different levels of information hierarchy. Here's how Cyberday is structured.
Sets the overall compliance standard or regulation your organization needs to follow.
Break down the framework into specific obligations that must be met.
Concrete actions and activities your team carries out to satisfy each requirement.
Documented rules and practices that are created and maintained as a result of completing tasks.