Oh no! No description found. But not to worry. Read from Tasks below how to advance this topic.
Katakri is used when evaluating organisation's ability to secure confidential information from Finnish national authorities.
Katakri is used when evaluating organisation's ability to secure confidential information from Finnish national authorities. It can be used to guide security work in an organisation, that wants to be ready for an audit performed by authorities.
Below you'll find all of the requirements of this framework. In Cyberday, we map all requirement to global tasks, making multi-compliance management easy. Do it once, and see the progress across all frameworks!
In case a risk to disclose Classified Information through unauthorized observation or unintended overlooking exists, appropriate countermeasures shall be taken to counter this risk.




1. Organization has to inspect all electronic equipment, which are used in such an
Administrative Area, where classification level II (SECRET) information is handled. This
requirement is relevant in cases when the threat against disclosure of the information has
been evaluated high.
2. In addition, the area needs to be regularly inspected, physically and technically. In addition, inspections have to be conducted following any unauthorized entry or suspicion of such entry.




1. Classified Information of all classification levels may be stored in the area, based on risk
assessment and physical security measures.
2. Information belonging to the classification level III (CONFIDENTIAL) or higher has to be stored using an appropriate storage solution. In addition, terminal devices have to be stored equally, when possible. In case appropriate storage solution is not available in the area, the walls, the floor, the ceiling and the doors have to offer the security level sufficient for the storage of information.
3. Keys or access codes have to be kept under control of such personnel, who has the need-to-know to the information stored in the storage solution. Access codes have to be committed to memory by the authorized individuals.
Combination settings to storage units containing Classified Information have to be changed:
• on receipt of a new container;
• whenever there is a change in personnel knowing the combination;
• whenever a compromise has occurred or is suspected;
• when a lock has undergone maintenance or repair;
4. It is allowed to handle information classified on all levels in the Secured Area when access to the information by unauthorized persons has been prevented.
















1. In addition to the minimum requirements set for Secured Areas (F-06), following requirements apply:
a) such areas have to be equipped with intrusion detection system, be locked when not occupied and be guarded when occupied. Any keys have to be controlled
b) all persons and material entering such areas have to be controlled
c) such areas have to be regularly physically and/or technically inspected as required by the Finnish Security and Intelligence Service or the Defence Command. In additions, such inspections have to be conducted following any unauthorized entry or suspicion of such entry.
d) area may only be equipped with data connections, phones and other communication or electronic devices approved to be used in the area.
2. All such communication devices, electric appliances or electronics have to be inspected before they can be used within areas where meetings handling EU SECRET / NATO SECRET information are organized or such information is worked with in cases when the threat against the Classified Information of EU or NATO is considered to be high. This procedure ensures that those devices cannot intentionally or unintentionally transfer information outside the perimeter of the Secured Area in an understandable form.
3. Threat analysis, risk management procedures and approval of security measures for the potential Technically Secured Area are done on case by case basis by the Finnish Security and Intelligence Service or by Defence Command.




1. Classified Information has to be transported or delivered according to the instructions
given by the organisation, taking into account necessary protective measures.
2. Classified Information has to be packed in a manner, which prevents their unauthorized disclosure.
3. Classified Information may be transported outside Security Areas in electronic format by
using encryption accredited my authorities (see I-12).
4. Information belonging to classification level IV (RESTRICTED) may be transferred in unencrypted form by using postal services.
5. Classified Information belonging to level II (SECRET) or III (CONFIDENTIAL) needs to be packed in a secure way and transported in unencrypted form to the recipient under
constant control. Also other methods may be used for transportation in case the confidentiality and integrity of the information can be sufficiently ensured, bearing in mind the
classification level.
6. Requirements for the transport of international Classified Information have to be asked case by case from the Finnish Security and Intelligence Service or from Defence
Command.












1. The security measures applicable to the original document shall apply to copies and translations thereof.
Classification level II (SECRET): in addition to point 1 above
2. Copies produced of the material belonging to classification level II (SECRET) have to be
listed. Same applies to people handling these copies.
3. Before copying material belonging to classification level II (SECRET), an approval for copies has to be provided by the originating authority.
4. International Classified Information may be copied and translated, unless these procedures have been prohibited by the deliverer of the information.








1. A registration point or a diary has to be dedicated for organizations, which handle
international Classified Information. Registration points or diaries have to be defined as
Secured Areas.
2. Reception and sending of information belonging to national classification levels II and III and international classification level CONFIDENTIAL or above has to be registered.
3. Handling of information belonging to classification level III (CONFIDENTIAL) or higher is
marked either into an electronic log, information system, case processing system, case
register or case information (e. g. as a part of the document).
4. Registration of international Classified Information belonging to classification level CONFIDENTIAL or above has to be done in a registration point dedicated for the purpose.








Classification level IV (RESTRICTED)
1. Disposal of Classified Information in non-electronic format has to be organized in a reliable manner. When disposing, such procedures are used which prevent reconstruction of the pieces of information in whole or in part. For the information in electronic format see I-21.
Classification level III (CONFIDENTIAL): in addition to point 1 above
2. When international information belonging to the classification level CONFIDENTIAL is
concerned, a disposal certificate has to be signed by the person disposing the information.
This certificate will be saved at the registry. Registered information has to be updated
correspondingly. The registry has to save certificates of disposal for at least five years
(compare to F-08.3).
Classification level II (SECRET): in addition to points 1 and 2 above
3. In case the originator of the information is another authority, it has to be informed about the disposal of the now unnecessary information, unless the information was returned to the originating authority.
4. Only a person nominated for the task by an authority may dispose information. The drafter may dispose draft versions.
5. International information belonging to the classification level SECRET has to be disposed in the presence of a witness. The person witnessing the disposal has to be security cleared at least to the classification level of the information being disposed.








Classification level IV (RESTRICTED)
1. The information processing environment has been separated from other respective environments.
2. The connection of the information processing environment to the one(s) of another classification level requires the use of a firewall in minimum.
3. Data traffic exceeding the perimeter of a controlled physical Security Area has been encrypted using an encryption solution approved by the Crypto Approval Authority (CAA)
for the respective level (see I-12 and I-15).
Classification levels III (CONFIDENTIAL) and II (SECRET): in addition to points 1 and 3 above
4. The connection of the information processing environment to the one(s) of another classification level requires the use of a boundary protection service approved by the competent authority for the respective level.
















The segmenting of the communication network and the filtering rules has to be done following the principles of least privilege and defence-in-depth.








The appropriate operation of filtering and monitoring systems will be taken care of through-
out the life cycle of the information-processing environment.
a) Amendments, changes or removals in the setup of filtering and monitoring systems has been organized and tasked.
b) The documentation of the network and the respective filtering and monitoring systems is maintained through its life cycle as an integral part of the process of change
and configuration management.
c) The setup and the desirable operation of the systems filtering and monitoring the traffic will be performed periodically during the operation and maintenance of the information-processing environment and when exceptional circumstances arise.




1. Management connections have been separated on the basis of the classification level,
unless a boundary protection service approved by the competent authority for the
particular classification level is used.
2. In case Classified Information is embedded to the management traffic and if the traffic has been routed through a lower classification level environment, the Classified Information has been encrypted using a crypto solution approved by the competent authority.
3. In case the management traffic flow will stay inside the same classification level, the unencrypted transmission or encryption at a lower level may be used based on the results of the risk management process and subject to the approval by competent authority.
4. Management connections have been limited according to the least privilege principle.
























Wireless transmission is encrypted using a crypto solution approved by the competent authority to the respective classification level (see I-12).




1. User rights to information systems have been defined.
2. User rights to information systems may be issued only after verifying that people involved have the right to handle this information (see T-13).
3. Users and the automated processes of the information-processing environment shall be given only the access, privileges or authorizations they require to perform their tasks.
4. User rights to have to be maintained updated.
















People, devices and information systems using the information-processing environment are identified reliably enough.




















1. Only the essential functionalities, devices and services to meet operational requirements
shall be implemented in order to avoid unnecessary risks.
2. Organization uses a procedure through which systems are installed and configured systematically, resulting on a hardened installation.
3. Configuration contains only such components, services, user and process rights which are mandatory in order to fulfill the operational as well as the security requirements.
4. Configurations are maintained throughout the life cycle of the information system, including the effectiveness.












Explore our comprehensive resources and improve your security with the themes of this framework.
Discover specific ways our platform streamlines your ISO 27001 compliance process, from automated controls to audit preparation.
Explore use caseTake our comprehensive assessment to identify gaps in your current implementation and get personalized recommendations.
Start assessmentDive deeper with our articles, case studies, and expert insights on framework implementation.
Read articleGet a concise overview of all requirements, controls, and implementation steps in our quick guide.
Get the guideSee how the overlap and differences with any other framework to optimize your compliance strategy.
Compare frameworkParticipate in expert-led sessions covering implementation strategies, common pitfalls, and best practices for compliance.
Register for webinarParticipate in expert-led sessions covering implementation strategies, common pitfalls, and best practices for compliance.
Register for webinarUnderstand the basics of cyber security frameworks with our comprehensive guide.
Read the articleWhen building an ISMS, it's important to understand the different levels of information hierarchy. Here's how Cyberday is structured.
Sets the overall compliance standard or regulation your organization needs to follow.
Break down the framework into specific obligations that must be met.
Concrete actions and activities your team carries out to satisfy each requirement.
Documented rules and practices that are created and maintained as a result of completing tasks.
