Learn more about the connected frameworks

11.2.7
ISO 27001

Laitteiden turvallinen käytöstä poistaminen ja kierrättäminen

12.1.1
ISO 27001

Dokumentoidut toimintaohjeet

29
GDPR

Processing under the authority of the controller or processor

4 §

Tiedonhallinnan järjestäminen tiedonhallintayksikössä

5.37
ISO 27001

Documented operating procedures

8.3.2
ISO 27001

Tietovälineiden hävittäminen

9.4.4
ISO 27001

Ylläpito- ja hallintasovellukset

T11

Turvallisuuskoulutus ja -tietoisuus

Other tasks from the same security theme

General security guidelines for staff

Critical
High
Normal
Low

Personnel must have security guidelines that deal with e.g. the following topics:

  • Using and updating mobile devices
  • Storing and backing up data
  • Privacy
  • Using email
  • Handling of printouts, papers and files
  • Reporting incidents
  • Scam prevention
29. Processing under the authority of the controller or processor
GDPR
8.3.2: Disposal of media
ISO 27001
9.4.4: Use of privileged utility programs
ISO 27001
11.2.7: Secure disposal or re-use of equipment
ISO 27001
12.1.1: Documented operating procedures
ISO 27001

Early orientation of security guidelines for personnel

Critical
High
Normal
Low

Tietoa käsitteleville henkilöille selvitetään tietojen suojaamista ja asiakirjojen käsittelyä koskevat tietoturvaohjeet ja -periaatteet ennen pääsyä tietoihin tai organisaation tarkasti määrittelemien aikamääreiden sisällä.

No items found.

Monitoring compliance with security guidelines

Critical
High
Normal
Low

Following security guidelines can be monitored either technically or directly by asking / testing employees.

29. Processing under the authority of the controller or processor
GDPR
18.2.2: Compliance with security policies and standards
ISO 27001
T11: Turvallisuuskoulutus ja -tietoisuus
5.36: Compliance with policies, rules and standards for information security
ISO 27001
5.37: Documented operating procedures
ISO 27001

Unit- or role-specific security guidelines

Critical
High
Normal
Low

The security guidelines are specified in connection with the employee's job role. The organization has identified units and roles that require separate guidance and develops its own detailed security guidelines for these.

Examples of units that may require their own guidelines are e.g. customer service, IT and HR. Examples of work roles that require their own instructions are the system administrators and the remote workers.

7.2.2: Information security awareness, education and training
ISO 27001
2 luku, 4 §: Tiedonhallinnan järjestäminen tiedonhallintayksikössä
PR.AT-1: Awareness
NIST CSF
6.3: Information security awareness, education and training
ISO 27001

Continuous development of guidelines

Critical
High
Normal
Low

If staff have conflicting goals with the security guidelines, they are unlikely to follow the guidelines.

The organization actively seeks to find poorly functioning guidelines and modify either the guidelines, tools or staff priorities to enable following the guidelines.

12.1.1: Documented operating procedures
ISO 27001
T11: Turvallisuuskoulutus ja -tietoisuus
5.37: Documented operating procedures
ISO 27001
6.3: Information security awareness, education and training
ISO 27001