Other tasks from the same security theme

Task name
Priority
Policy
Other requirements
General security guidelines for staff
Critical
High
Normal
Low
Security guidelines
50
requirements

Examples of other requirements this task affects

Članak 30.1.g: Kibernetičke higijene i osposobljavanje o kibernetičkoj sigurnosti
NIS2 Croatia
2.6: Ohjeet ja koulutus
TiHL tietoturvavaatimukset
9.11 §: Perustason tietoturvakäytännöt ja henkilöstön vastuu
Kyberturvallisuuslaki
2.1.2: Staff compliance with information security policies
TISAX
9.7.1: Personnel commitment to Confidentiality
TISAX
See all related requirements and other information from tasks own page.
Go to >
General security guidelines for staff
Collecting feedback on security suggestions
Critical
High
Normal
Low
Security guidelines
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Collecting feedback on security suggestions
Comprehensive basis for security assessments
Critical
High
Normal
Low
Security guidelines
2
requirements

Examples of other requirements this task affects

§ 3.4: Ansvar för säkerhetsprövningen
SSL
§ 4.9: Lämplighetsprövningen
SSL
See all related requirements and other information from tasks own page.
Go to >
Comprehensive basis for security assessments
Personnel security clearance procedure
Critical
High
Normal
Low
Security guidelines
1
requirements

Examples of other requirements this task affects

16: Krav om sikkerhedsgodkendelse af medarbejdere
NIS2 Denmark
See all related requirements and other information from tasks own page.
Go to >
Personnel security clearance procedure
Communicate guideline updates to staff
Critical
High
Normal
Low
Security guidelines
1
requirements

Examples of other requirements this task affects

1.2.2: Establish organisational guidelines for approved devices and software
NSM ICT-SP
See all related requirements and other information from tasks own page.
Go to >
Communicate guideline updates to staff
Personnel guidelines for approved devices and software
Critical
High
Normal
Low
Security guidelines
1
requirements

Examples of other requirements this task affects

1.2.2: Establish organisational guidelines for approved devices and software
NSM ICT-SP
See all related requirements and other information from tasks own page.
Go to >
Personnel guidelines for approved devices and software
Guidelines for password safety for personnel
Critical
High
Normal
Low
Security guidelines
1
requirements

Examples of other requirements this task affects

2.6.1: Create guidelines for access control
NSM ICT-SP
See all related requirements and other information from tasks own page.
Go to >
Guidelines for password safety for personnel
Informing about threats and guidelines related to classified information and related to work tasks
Critical
High
Normal
Low
Security guidelines
2
requirements

Examples of other requirements this task affects

T-04: TURVALLISUUSOHJEISTUS
Katakri 2020
Art. 13.2.2: Mesures internes de sécurité graduelles
Loi infrastructures critiques
See all related requirements and other information from tasks own page.
Go to >
Informing about threats and guidelines related to classified information and related to work tasks
Unit- or role-specific security guidelines
Critical
High
Normal
Low
Security guidelines
36
requirements

Examples of other requirements this task affects

Članak 30.1.g: Kibernetičke higijene i osposobljavanje o kibernetičkoj sigurnosti
NIS2 Croatia
2.6: Ohjeet ja koulutus
TiHL tietoturvavaatimukset
9.11 §: Perustason tietoturvakäytännöt ja henkilöstön vastuu
Kyberturvallisuuslaki
4 §: Tiedonhallinnan järjestäminen tiedonhallintayksikössä
TiHL
30 § 3.7°: Les pratiques et la formation en matière d'hygiène cybernétique
NIS2 Belgium
See all related requirements and other information from tasks own page.
Go to >
Unit- or role-specific security guidelines
Monitoring compliance with security guidelines
Critical
High
Normal
Low
Security guidelines
13
requirements

Examples of other requirements this task affects

T11: Turvallisuuskoulutus ja -tietoisuus
Katakri
29. Processing under the authority of the controller or processor
GDPR
18.2.2: Compliance with security policies and standards
ISO 27001
HAL-12: Ohjeet
Julkri
HAL-13: Koulutukset
Julkri
See all related requirements and other information from tasks own page.
Go to >
Monitoring compliance with security guidelines
Early orientation of security guidelines for personnel
Critical
High
Normal
Low
Security guidelines
2
requirements

Examples of other requirements this task affects

HAL-11: Salassapito- ja vaitiolovelvollisuus
Julkri
HAL-14: Käyttö- ja käsittelyoikeudet
Julkri
See all related requirements and other information from tasks own page.
Go to >
Early orientation of security guidelines for personnel
Continuous development of guidelines
Critical
High
Normal
Low
Security guidelines
31
requirements

Examples of other requirements this task affects

Članak 30.1.g: Kibernetičke higijene i osposobljavanje o kibernetičkoj sigurnosti
NIS2 Croatia
2.1: Tietoturvallisuusvastuiden määrittely
TiHL tietoturvavaatimukset
9.11 §: Perustason tietoturvakäytännöt ja henkilöstön vastuu
Kyberturvallisuuslaki
30 § 3.7°: Les pratiques et la formation en matière d'hygiène cybernétique
NIS2 Belgium
14.5.8): Kibernetinės higienos praktiką ir mokymus
NIS2 Lithuania
See all related requirements and other information from tasks own page.
Go to >
Continuous development of guidelines

Never duplicate effort. Do it once - improve compliance across frameworks.

Reach multi-framework compliance in the simplest possible way
Security frameworks tend to share the same core requirements - like risk management, backup, malware, personnel awareness or access management.
Cyberday maps all frameworks’ requirements into shared tasks - one single plan that improves all frameworks’ compliance.
Do it once - we automatically apply it to all current and future frameworks.
Get to know Cyberday
Start your free trial
Cyberday is your all-in-one solution for building a secure and compliant organization. Whether you're setting up a cyber security plan, evaluating policies, implementing tasks, or generating automated reports, Cyberday simplifies the entire process.
With AI-driven insights and a user-friendly interface, it's easier than ever to stay ahead of compliance requirements and focus on continuous improvement.
Clear framework compliance plans
Activate relevant frameworks and turn them into actionable policies tailored to your needs.
Credible reports to proof your compliance
Use guided tasks to ensure secure implementations and create professional reports with just a few clicks.
AI-powered improvement suggestions
Focus on the most impactful improvements in your compliance with help from Cyberday AI.
No items found.