Other tasks from the same security theme

Task name
Priority
Policy
Other requirements
Ensuring sufficient client data segregation and protection in external IT services
Critical
High
Normal
Low
Cloud service management
1
requirements

Examples of other requirements this task affects

5.3.4: Information protection in external IT services
TISAX
See all related requirements and other information from tasks own page.
Go to >
Ensuring sufficient client data segregation and protection in external IT services
Listing offered digital services and activities to competent authority
Critical
High
Normal
Low
Cloud service management
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Listing offered digital services and activities to competent authority
Documenting partners who are related to offered digital services supply chain
Critical
High
Normal
Low
Cloud service management
10
requirements

Examples of other requirements this task affects

A.8: Openness, transparency and notice
ISO 27018
A.8.1: Disclosure of sub-contracted PII processing
ISO 27018
15.1.3: Information and communication technology supply chain
ISO 27017
A.8.5.6: Disclosure of subcontractors used to process PII
ISO 27701
A.8.5.7: Engagement of subcontractor to process PII
ISO 27701
See all related requirements and other information from tasks own page.
Go to >
Documenting partners who are related to offered digital services supply chain
Terms and conditions related to the offered digital services
Critical
High
Normal
Low
Cloud service management
2
requirements

Examples of other requirements this task affects

A.3.1: Public cloud PII processor’s purpose
ISO 27018
See all related requirements and other information from tasks own page.
Go to >
Terms and conditions related to the offered digital services
Listing offered digital services and naming owners
Critical
High
Normal
Low
Cloud service management
18
requirements

Examples of other requirements this task affects

A.2.1: Obligation to co-operate regarding PII principals’ rights
ISO 27018
A.2: Consent and choice
ISO 27018
6: Organization of information security
ISO 27017
CLD 6.3: Relationship between cloud service customer and cloud service provider
ISO 27017
CLD 6.3.1: Shared roles and responsibilities within a cloud computing environment
ISO 27017
See all related requirements and other information from tasks own page.
Go to >
Listing offered digital services and naming owners
Use of a software firewall to protect provided digital services
Critical
High
Normal
Low
Cloud service management
4
requirements

Examples of other requirements this task affects

2.5.6: Protect particularly critical services with their own data flow
NSM ICT-SP
DE.CM-09: Monitoring IT resources
NIST 2.0
4.5: Implement and Manage a Firewall on End-User Devices
CIS 18
See all related requirements and other information from tasks own page.
Go to >
Use of a software firewall to protect provided digital services
Documenting security-related responsibilities for offered cloud services and utilized data systems
Critical
High
Normal
Low
Cloud service management
8
requirements

Examples of other requirements this task affects

6: Organization of information security
ISO 27017
CLD 6.3: Relationship between cloud service customer and cloud service provider
ISO 27017
CLD 6.3.1: Shared roles and responsibilities within a cloud computing environment
ISO 27017
6.1: Internal organization
ISO 27017
6.1.3: Contact with authorities
ISO 27017
See all related requirements and other information from tasks own page.
Go to >
Documenting security-related responsibilities for offered cloud services and utilized data systems
Segregation of customer’s virtual environments in relation to offered cloud services
Critical
High
Normal
Low
Cloud service management
1
requirements

Examples of other requirements this task affects

CLD 9.5.1: Segregation in virtual computing environments
ISO 27017
See all related requirements and other information from tasks own page.
Go to >
Segregation of customer’s virtual environments in relation to offered cloud services
Documented procedures and supervision for critical admin operations on offered cloud services
Critical
High
Normal
Low
Cloud service management
2
requirements

Examples of other requirements this task affects

CLD 12.1: Operational procedures and responsibilities
ISO 27017
CLD 12.1.5: Administrator's operational security
ISO 27017
See all related requirements and other information from tasks own page.
Go to >
Documented procedures and supervision for critical admin operations on offered cloud services
Data subject’s right facilitation through offered cloud services
Critical
High
Normal
Low
Cloud service management
2
requirements

Examples of other requirements this task affects

A.2.1: Obligation to co-operate regarding PII principals’ rights
ISO 27018
A.2: Consent and choice
ISO 27018
See all related requirements and other information from tasks own page.
Go to >
Data subject’s right facilitation through offered cloud services
Customer-oriented description of personal data return, transfer and disposal processes for offered cloud services
Critical
High
Normal
Low
Cloud service management
2
requirements

Examples of other requirements this task affects

A.10.3: PII return, transfer and disposal
ISO 27018
A.8.4.2: Return, transfer, or disposal of PII
ISO 27701
See all related requirements and other information from tasks own page.
Go to >
Customer-oriented description of personal data return, transfer and disposal processes for offered cloud services
Detailed descriptions of implemented security measures on contracts related to offered cloud services
Critical
High
Normal
Low
Cloud service management
4
requirements

Examples of other requirements this task affects

A.11.11: Contract measures
ISO 27018
15: Supplier relationships
ISO 27017
15.1: Information security in supplier relationships
ISO 27017
15.1.2: Addressing security within supplier agreements
ISO 27017
See all related requirements and other information from tasks own page.
Go to >
Detailed descriptions of implemented security measures on contracts related to offered cloud services
Clear communication of organisation and data storage location in relation to offered cloud services
Critical
High
Normal
Low
Cloud service management
2
requirements

Examples of other requirements this task affects

6.1: Internal organization
ISO 27017
6.1.3: Contact with authorities
ISO 27017
See all related requirements and other information from tasks own page.
Go to >
Clear communication of organisation and data storage location in relation to offered cloud services
Documentation of data owned by cloud service customers
Critical
High
Normal
Low
Cloud service management
1
requirements

Examples of other requirements this task affects

8.1.1: Inventory of assets
ISO 27017
See all related requirements and other information from tasks own page.
Go to >
Documentation of data owned by cloud service customers
Secure disposal of cloud service specific resources
Critical
High
Normal
Low
Cloud service management
6
requirements

Examples of other requirements this task affects

11: Physical and environmental security
ISO 27017
11.2: Equipment
ISO 27017
11.2.7: Secure disposal or re-use of equipment
ISO 27017
PR.DS-3: Asset management
NIST
PR.DS-3: Assets are formally managed throughout removal, transfers, and disposition.
CyberFundamentals
See all related requirements and other information from tasks own page.
Go to >
Secure disposal of cloud service specific resources
IPR complaint process in relation to offered cloud services
Critical
High
Normal
Low
Cloud service management
3
requirements

Examples of other requirements this task affects

18.1: Compliance with legal and contractual requirements
ISO 27017
18.1.2: Intellectual property rights
ISO 27017
18: Compliance
ISO 27017
See all related requirements and other information from tasks own page.
Go to >
IPR complaint process in relation to offered cloud services
Description of administrative data flows
Critical
High
Normal
Low
Cloud service management
3
requirements

Examples of other requirements this task affects

ID.AM-3: Communication and data flows
NIST
ID.AM-3: Organizational communication and data flows are mapped.
CyberFundamentals
ID.AM-03: Organizational network communication and data flows are mapped
NIST 2.0
See all related requirements and other information from tasks own page.
Go to >
Description of administrative data flows
The role of the organization in the supply chain
Critical
High
Normal
Low
Cloud service management
3
requirements

Examples of other requirements this task affects

ID.BE-1: Role in supply chain
NIST
ID.BE-1: The organization’s role in the supply chain is identified and communicated.
CyberFundamentals
GV.SC-02: Establishing and communicating cybersecurity roles for suppliers, customers, and partners
NIST 2.0
See all related requirements and other information from tasks own page.
Go to >
The role of the organization in the supply chain
The role of the organization in critical infrastructure
Critical
High
Normal
Low
Cloud service management
4
requirements

Examples of other requirements this task affects

ID.BE-2: Place in critical infrastructure
NIST
14.5.13): Kitus taikomus kibernetinio saugumo reikalavimus
NIS2 Lithuania
71: Organisaation roolin tunnistaminen
Digiturvan kokonaiskuvapalvelu
ID.BE-2: The organization’s place in critical infrastructure and its industry sector is identified and communicated.
CyberFundamentals
See all related requirements and other information from tasks own page.
Go to >
The role of the organization in critical infrastructure
Providing information for fulfilling customer obligations
Critical
High
Normal
Low
Cloud service management
1
requirements

Examples of other requirements this task affects

A.8.2.5: Customer obligations
ISO 27701
See all related requirements and other information from tasks own page.
Go to >
Providing information for fulfilling customer obligations
Assisting customer in fulfilling data subject requests
Critical
High
Normal
Low
Cloud service management
2
requirements

Examples of other requirements this task affects

A.8.3: Obligations to PII principals
ISO 27701
A.8.3.1: Obligations to PII principals
ISO 27701
See all related requirements and other information from tasks own page.
Go to >
Assisting customer in fulfilling data subject requests
Defining the information needed to maintain the services or products offered
Critical
High
Normal
Low
Cloud service management
1
requirements

Examples of other requirements this task affects

PI1.1: Definitions of processed data
SOC 2
See all related requirements and other information from tasks own page.
Go to >
Defining the information needed to maintain the services or products offered
Ensuring the completeness and accuracy of the information entering the systems
Critical
High
Normal
Low
Cloud service management
1
requirements

Examples of other requirements this task affects

PI1.2: Implementation of policies and procedures for system inputs
SOC 2
See all related requirements and other information from tasks own page.
Go to >
Ensuring the completeness and accuracy of the information entering the systems
Measures for the implementation of information security objectives in the offered services
Critical
High
Normal
Low
Cloud service management
1
requirements

Examples of other requirements this task affects

PI1.3: Procedures for system processing to produce results accodring to objectives
SOC 2
See all related requirements and other information from tasks own page.
Go to >
Measures for the implementation of information security objectives in the offered services
Measures for data transfer of services in accordance with information security goals
Critical
High
Normal
Low
Cloud service management
2
requirements

Examples of other requirements this task affects

PI1.4: Procedures for availability accodring to objectives
SOC 2
Article 35: Data, system and network security
DORA simplified RMF
See all related requirements and other information from tasks own page.
Go to >
Measures for data transfer of services in accordance with information security goals
Regular security assessment of partners in the supply chain of provided digital services
Critical
High
Normal
Low
Cloud service management
15
requirements

Examples of other requirements this task affects

Članak 30.1.d: Sigurnost lanca opskrbe
NIS2 Croatia
9.4 §: Toimitusketjun hallinta ja valvonta
Kyberturvallisuuslaki
30 § 3.4°: La sécurité de la chaîne d'approvisionnement
NIS2 Belgium
2.1.4: Reduce the risk of targeted manipulation of ICT products in the supply chain
NSM ICT-SP
ID.SC-3: Contracts with suppliers and third-party partners are used to implement appropriate measures designed to meet the objectives of an organization’s cybersecurity program and Cyber Supply Chain Risk Management Plan.
CyberFundamentals
See all related requirements and other information from tasks own page.
Go to >
Regular security assessment of partners in the supply chain of provided digital services

Never duplicate effort. Do it once - improve compliance across frameworks.

Reach multi-framework compliance in the simplest possible way
Security frameworks tend to share the same core requirements - like risk management, backup, malware, personnel awareness or access management.
Cyberday maps all frameworks’ requirements into shared tasks - one single plan that improves all frameworks’ compliance.
Do it once - we automatically apply it to all current and future frameworks.
Get to know Cyberday
Start your free trial
Cyberday is your all-in-one solution for building a secure and compliant organization. Whether you're setting up a cyber security plan, evaluating policies, implementing tasks, or generating automated reports, Cyberday simplifies the entire process.
With AI-driven insights and a user-friendly interface, it's easier than ever to stay ahead of compliance requirements and focus on continuous improvement.
Clear framework compliance plans
Activate relevant frameworks and turn them into actionable policies tailored to your needs.
Credible reports to proof your compliance
Use guided tasks to ensure secure implementations and create professional reports with just a few clicks.
AI-powered improvement suggestions
Focus on the most impactful improvements in your compliance with help from Cyberday AI.