Other tasks from the same security theme

Task name
Priority
Policy
Other requirements
Automatically updating and running malware prevention software
Critical
High
Normal
Low
Update and patch management
47
requirements

Examples of other requirements this task affects

12.2.1: Controls against malware
ISO 27001
I09: Haittaohjelmasuojaus
Katakri
6.5: Tietojärjestelmien asennus, ylläpito ja päivitys
Omavalvontasuunnitelma
DE.CM-4: Malicious code detection
NIST
MWP-01: Keeping anti-malware software up to date
Cyber Essentials
See all related requirements and other information from tasks own page.
Go to >
Automatically updating and running malware prevention software
Organising the distribution of updates
Critical
High
Normal
Low
Update and patch management
1
requirements

Examples of other requirements this task affects

Vuln.7: Distributing updates
CRA
See all related requirements and other information from tasks own page.
Go to >
Organising the distribution of updates
Ensuring that security updates remain available after their release
Critical
High
Normal
Low
Update and patch management
1
requirements

Examples of other requirements this task affects

Article 13.9: Security updates
CRA
See all related requirements and other information from tasks own page.
Go to >
Ensuring that security updates remain available after their release
Free availability of software updates
Critical
High
Normal
Low
Update and patch management
1
requirements

Examples of other requirements this task affects

Article 13.10: Modified versions of a software product
CRA
See all related requirements and other information from tasks own page.
Go to >
Free availability of software updates
Regular security updates for offered products
Critical
High
Normal
Low
Update and patch management
1
requirements

Examples of other requirements this task affects

Vuln.2: Address and remediate vulnerabilities
CRA
See all related requirements and other information from tasks own page.
Go to >
Regular security updates for offered products
Continuous monitoring of acquired services
Critical
High
Normal
Low
Update and patch management
2
requirements

Examples of other requirements this task affects

GV.SC-09: Supply chain security practices in risk management programs
NIST 2.0
Article 34: ICT operations security
DORA simplified RMF
See all related requirements and other information from tasks own page.
Go to >
Continuous monitoring of acquired services
Keeping open-source software up to date
Critical
High
Normal
Low
Update and patch management
1
requirements

Examples of other requirements this task affects

2.1.8: Maintain the software code developed/used by the organisation
NSM ICT-SP
See all related requirements and other information from tasks own page.
Go to >
Keeping open-source software up to date
Maintenance and updating of data systems according to manufacturer guidelines
Critical
High
Normal
Low
Update and patch management
5
requirements

Examples of other requirements this task affects

6.5: Tietojärjestelmien asennus, ylläpito ja päivitys
Omavalvontasuunnitelma
6.6: Tietojärjestelmien asennus, ylläpito ja päivitys
Tietoturvasuunnitelma
6.10: Työasemien, mobiililaitteiden ja käyttöympäristön tukipalveluiden hallinta
Tietoturvasuunnitelma
Article 7: ICT systems, protocols and tools
DORA
4.1: Tietojärjestelmien tietoturvallisuus
TiHL tietoturvavaatimukset
See all related requirements and other information from tasks own page.
Go to >
Maintenance and updating of data systems according to manufacturer guidelines
Maintenance and updates of security systems that detect vulnerabilities
Critical
High
Normal
Low
Update and patch management
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Maintenance and updates of security systems that detect vulnerabilities
Keeping licensed software up to date
Critical
High
Normal
Low
Update and patch management
6
requirements

Examples of other requirements this task affects

SUM-02: Keeping licensed software up to date
Cyber Essentials
Article 9b: Prevention
DORA
2.1.8: Maintain the software code developed/used by the organisation
NSM ICT-SP
2.2: Ensure Authorized Software is Currently Supported
CIS 18
9.1: Ensure Use of Only Fully Supported Browsers and Email Clients
CIS 18
See all related requirements and other information from tasks own page.
Go to >
Keeping licensed software up to date
Evaluating and testing patches before deployment
Critical
High
Normal
Low
Update and patch management
11
requirements

Examples of other requirements this task affects

12.6.1: Management of technical vulnerabilities
ISO 27001
6.5: Tietojärjestelmien asennus, ylläpito ja päivitys
Omavalvontasuunnitelma
TEK-17: Muutoshallintamenettelyt
Julkri
8.8: Management of technical vulnerabilities
ISO 27001
6.6: Tietojärjestelmien asennus, ylläpito ja päivitys
Tietoturvasuunnitelma
See all related requirements and other information from tasks own page.
Go to >
Evaluating and testing patches before deployment
Management process for software updates
Critical
High
Normal
Low
Update and patch management
13
requirements

Examples of other requirements this task affects

12.6.1: Management of technical vulnerabilities
ISO 27001
SUM: Security update management
Cyber Essentials
8.8: Management of technical vulnerabilities
ISO 27001
Article 9b: Prevention
DORA
PR.MA-1: Maintenance and repair of organizational assets are performed and logged, with approved and controlled tools.
CyberFundamentals
See all related requirements and other information from tasks own page.
Go to >
Management process for software updates

Never duplicate effort. Do it once - improve compliance across frameworks.

Reach multi-framework compliance in the simplest possible way
Security frameworks tend to share the same core requirements - like risk management, backup, malware, personnel awareness or access management.
Cyberday maps all frameworks’ requirements into shared tasks - one single plan that improves all frameworks’ compliance.
Do it once - we automatically apply it to all current and future frameworks.
Get to know Cyberday
Start your free trial
Cyberday is your all-in-one solution for building a secure and compliant organization. Whether you're setting up a cyber security plan, evaluating policies, implementing tasks, or generating automated reports, Cyberday simplifies the entire process.
With AI-driven insights and a user-friendly interface, it's easier than ever to stay ahead of compliance requirements and focus on continuous improvement.
Clear framework compliance plans
Activate relevant frameworks and turn them into actionable policies tailored to your needs.
Credible reports to proof your compliance
Use guided tasks to ensure secure implementations and create professional reports with just a few clicks.
AI-powered improvement suggestions
Focus on the most impactful improvements in your compliance with help from Cyberday AI.