Oh no! No description found. But not to worry. Read from Tasks below how to advance this topic.
Katakri is used when evaluating organisation's ability to secure confidential information from Finnish national authorities.
Katakri is used when evaluating organisation's ability to secure confidential information from Finnish national authorities. It can be used to guide security work in an organisation, that wants to be ready for an audit performed by authorities.
Below you'll find all of the requirements of this framework. In Cyberday, we map all requirement to global tasks, making multi-compliance management easy. Do it once, and see the progress across all frameworks!
Reliable methods for deterrence, prevention, detection, resilience and recovery measures of malware are used in the information processing environment in order to prevent unauthorized changes and other unauthorized use of the information.




















1. In order to detect unauthorized changes or other unauthorized or inappropriate information handling within the information-processing environment, reliable methods have been
taken into use for tracing the security events.
2. The use of information systems and disclosure of their information will be logged in case the use of the information system requires identification or other methods of signing in. The idea to collect log information is to follow the use and disclosure of the information and to find out reasons for technical system failures.
3. The use of Classified Information belonging to national classification levels II and III has
to be registered into an electronic log, information system, case register of as a part of
information itself (e. g. part of a document).




















Reliable methods are taken into use in the information processing environment in order to detect attacks against the information processing environment, to limit the effect to a minimum amount of the information and to minimum resources of the information processing environment and to prevent other damages, as well as to restore the protected status within the information processing environment.




























Competent authority has approved crypto solutions or products in the current environment to the respective classification levels in order to safeguard and protect the information against unauthorized disclosure or loss of integrity.












1. Security of information-processing environment, including their technical and non-
technical security measures, shall be subject to security testing during the accreditation
process to ensure that the appropriate level of assurance is obtained and to verify that
they are correctly implemented, integrated and configured.
2. Protective measures are in place against network attacks. Protective measures and their well-functioning are taken care of throughout the life cycle of the information-processing environment.




1. Security measures shall be implemented to protect information-processing environment
handling Classified Information against compromise of such information through
unintentional electromagnetic emanations (TEMPEST security measures).
2. When handling information classified to Levels III (CONFIDENTIAL) or II (SECRET) the risks of electronic intelligence have to be mitigated sufficiently.
3. Such security measures shall be commensurate with the risk of exploitation and the level of classification of the information.
















1. When Classified Information is transferred outside physically protected areas, the information or the traffic is encrypted with a method approved by the competent authority to the
respective classification level. In addition to this, the information transfer procedure has
to include the identification and authentication of the recipient in a sufficiently secure way
before the recipient is getting access to the transferred Classified Information.
2. When transmission of Classified Information is confined within physically protected
areas, unencrypted transmission or encryption at a lower level may be used, based on
the outcome of a risk management process and subject to the approval of the competent
authority.




1. Ensuring security shall be a requirement throughout the information-processing
environment life cycle, from initiation to withdrawal from service.
2. Security assessments, inspections and reviews shall be performed periodically during the operation and maintenance of an information-processing environment and when exceptional circumstances arise.
3. Security documentation for an information-processing environment shall evolve over its
life cycle as an integral part of the process of change and configuration management.




















Classification level IV (RESTRICTED)
1. Classified Information has to be handled in Security Areas and outside of them in a way, which prevents unauthorized access to Classified Information (see F-04 and I-18).
2. Handling of information is possible inside the perimeter of a Security Area approved by a competent authority (see F-04) and outside Security Areas when procedures approved by competent authority are used (see I-18).
3. Storage of information is possible inside the perimeter of a Security Area approved by a competent authority (see F-04) and outside Security Areas when procedures approved by competent authority are used (see I-18).
4. Data pools containing information belonging to classification level IV (RESTRICTED) and information systems used to process this information have to be placed inside the perimeter of a Security Area approved by a competent authority (see F-04).
Classification levels III (CONFIDENTIAL) and II (SECRET): in addition to points 1 and 2 above:
5. Storage of information is possible inside the perimeter of a Secured Area approved by a competent authority (see F-04). Note exceptions valid only for national information in point 6 and for remote use in I-18.
6. Only for national classification level III information, the storage of information in electronic format is possible outside the perimeter of a Secured Area using a terminal device approved for the respective level and taking into account that a) information has been protected using an encryption solution approved for the respective classification level by a competent authority (see I-12), and b) information security of the terminal device has been taken care of, paying
special attention to the sufficient confidentiality and integrity using a method approved by a competent authority (see F-04). Note remote working in I-18.
























Classification level IV (RESTRICTED)
1. Users and terminal devices are identified and authenticated sufficiently reliably. Transferring and handling of Classified Information between Security Areas (see F-04) is possible only by using compensative arrangements approved by competent authorities.
2. Classified Information has to be handled outside Security Areas in a way where unauthorized access to Classified Information is prevented. Personnel has been trained and instructed on secure remote use and management.
3. Unless the classification level IV (RESTRICTED) Classified Information stored on electronic media (hard drives, USB-sticks etc.) has been encrypted using a method approved bycompetent authority, storage media has to stay under constant supervision.
4. Remote use or management requires that the traffic will be encrypted by using a crypto solution approved by a competent authority to the respective classification level.
5. Information stored inside the terminal device has to be protected with an encryption solution, which is secure enough for the respective classification level and approved by a competent authority. Integrity of the terminal device has to be taken care of on an
appropriate level.
Classification levels III and II: in addition to the points 1 to 5 above
6. Classified Information may not be decrypted or read while travelling or on public place.
7. Remote use or management of systems is limited to Security Areas approved by competent authorities (see F-04). Note: exception valid only for national information in
point 8:
8. Only for national information classified on level III, remote use (handling) and storage is possible outside Security Areas with a terminal device dedicated for the respective level, by taking into account that a) information has been encrypted with a crypto solution
approved by a competent authority to the respective level and b) information security
aspects concerning the terminal device have been taken care of, bearing especially in mind
that the sufficient confidentiality and integrity have been ensured with a method approved
by a competent authority.








































Reliable arrangements are established for the entire life cycle of the information processing environment to manage software vulnerabilities.




































Backup copies containing Classified Information are kept under protection throughout their life cycle, using protection measures of at least equal level as what is used for safeguarding the original information.




























Classification level IV (RESTRICTED)
1. Classified material that is in the electronic format is destroyed securely. The destruction is carried out with methods which are secure enough to prevent reconstruction in whole or in part of destroyed information. Concerning non-electronic information, see F-08.4.
Classification level III (CONFIDENTIAL): in addition to point 1
2. When international CONFIDENTIAL information is concerned, a destruction certificate
has to be signed by the registrar and stored in the registry. Registry information has to be
updated accordingly. The destruction certificates will be stored in the registry for at least
five years. (see F-08.3).
Classification level II (SECRET): in addition to points 1 and 2 above
3. In case the originator of the information is another authority, the authority destructing information shall inform the originator about the destruction, unless
the information is returned to the originating authority.
4. Information may be only destructed by a person who has been nominated for the task by an authority. Draft documents may be destroyed by the originator.
5. International information belonging to classification level SECRET has to be destroyed in the presence of a witness. The witness has to be security cleared
at least to the level the information to be destroyed.
















Explore our comprehensive resources and improve your security with the themes of this framework.
This framework is available in Cyberday. Start working on your compliance now!
Start free trialDiscover specific ways our platform streamlines your compliance process, from automated controls to audit preparation.
Explore use caseTake our comprehensive assessment to identify gaps in your current implementation and get personalized recommendations.
Start assessmentDive deeper with our articles, case studies, and expert insights on framework implementation.
Read articleGet a concise overview of all requirements, controls, and implementation steps in our quick guide.
Get the guideSee how the overlap and differences with any other framework to optimize your compliance strategy.
Compare frameworkParticipate in expert-led sessions covering implementation strategies, common pitfalls, and best practices for compliance.
Register for webinarParticipate in expert-led sessions covering implementation strategies, common pitfalls, and best practices for compliance.
Register for webinarUnderstand the basics of cyber security frameworks with our comprehensive guide.
Read the articleWhen building an ISMS, it's important to understand the different levels of information hierarchy. Here's how Cyberday is structured.
Sets the overall compliance standard or regulation your organization needs to follow.
Break down the framework into specific obligations that must be met.
Concrete actions and activities your team carries out to satisfy each requirement.
Documented rules and practices that are created and maintained as a result of completing tasks.
