Other tasks from the same security theme

Task name
Priority
Policy
Other requirements
Selection and use of malware detection software on all devices
Critical
High
Normal
Low
Malware protection
31
requirements

Examples of other requirements this task affects

Članak 30.1.b (logs): Postupanje s incidentima, uključujući njihovo praćenje, evidentiranje i prijavljivanje
NIS2 Croatia
9.9a §: Poikkeamien havainnointi
Kyberturvallisuuslaki
5.2.3: Malware protection
TISAX
30 § 3.2° (détection et journaux): La gestion des incidents
NIS2 Belgium
3.1.3: Use automated and centralised tools to handle known threats
NSM ICT-SP
See all related requirements and other information from tasks own page.
Go to >
Selection and use of malware detection software on all devices
Defining requirements for malware protection
Critical
High
Normal
Low
Malware protection
1
requirements

Examples of other requirements this task affects

5.2.3: Malware protection
TISAX
See all related requirements and other information from tasks own page.
Go to >
Defining requirements for malware protection
Enabling features of anti-exploitation
Critical
High
Normal
Low
Malware protection
1
requirements

Examples of other requirements this task affects

10.5: Enable Anti-Exploitation Features
CIS 18
See all related requirements and other information from tasks own page.
Go to >
Enabling features of anti-exploitation
Configuring automatic anti-malware scanning of removable media
Critical
High
Normal
Low
Malware protection
1
requirements

Examples of other requirements this task affects

10.4: Configure Automatic Anti-Malware Scanning of Removable Media
CIS 18
See all related requirements and other information from tasks own page.
Go to >
Configuring automatic anti-malware scanning of removable media
Creating an allowlist for approved libraries
Critical
High
Normal
Low
Malware protection
2
requirements

Examples of other requirements this task affects

2.6: Allowlist Authorized Libraries
CIS 18
16.5: Use Up-to-Date and Trusted Third-Party Software Components
CIS 18
See all related requirements and other information from tasks own page.
Go to >
Creating an allowlist for approved libraries
Establish a allowlist for approved scripts
Critical
High
Normal
Low
Malware protection
1
requirements

Examples of other requirements this task affects

2.7: Allowlist Authorized Scripts
CIS 18
See all related requirements and other information from tasks own page.
Go to >
Establish a allowlist for approved scripts
Automatic blocking and detecting of unauthorized hardware
Critical
High
Normal
Low
Malware protection
1
requirements

Examples of other requirements this task affects

ID.AM-1: Physical devices and systems used within the organization are inventoried.
CyberFundamentals
See all related requirements and other information from tasks own page.
Go to >
Automatic blocking and detecting of unauthorized hardware
Protection of programs in the data processing environment from network attacks
Critical
High
Normal
Low
Malware protection
1
requirements

Examples of other requirements this task affects

I-13: MONITASOINEN SUOJAAMINEN KOKO ELINKAAREN AJAN – OHJELMISTOJEN SUOJAAMINEN VERKKOHYÖKKÄYKSILTÄ
Katakri 2020
See all related requirements and other information from tasks own page.
Go to >
Protection of programs in the data processing environment from network attacks
Detecting and blocking access to dangerous websites
Critical
High
Normal
Low
Malware protection
6
requirements

Examples of other requirements this task affects

12.2.1: Controls against malware
ISO 27001
12.2: Protection from malware
ISO 27001
8.7: Protection against malware
ISO 27001
8.23: Web filtering
ISO 27001
CC6.8: Detection and prevention of unauthorized or malicious software
SOC 2
See all related requirements and other information from tasks own page.
Go to >
Detecting and blocking access to dangerous websites
Regular malware inspection of data systems supporting critical business processes
Critical
High
Normal
Low
Malware protection
18
requirements

Examples of other requirements this task affects

Članak 30.1.b (logs): Postupanje s incidentima, uključujući njihovo praćenje, evidentiranje i prijavljivanje
NIS2 Croatia
9.9a §: Poikkeamien havainnointi
Kyberturvallisuuslaki
30 § 3.2° (détection et journaux): La gestion des incidents
NIS2 Belgium
PR.DS-6: Integrity checking mechanisms are used to verify software, firmware, and information integrity.
CyberFundamentals
DE.CM-4: Malicious code is detected.
CyberFundamentals
See all related requirements and other information from tasks own page.
Go to >
Regular malware inspection of data systems supporting critical business processes
Procedures and data sources for gathering reliable information about malware
Critical
High
Normal
Low
Malware protection
7
requirements

Examples of other requirements this task affects

12.2.1: Controls against malware
ISO 27001
12.2: Protection from malware
ISO 27001
ID.RA-2: Cyber threat intelligence
NIST
8.7: Protection against malware
ISO 27001
ID.RA-2: Cyber threat intelligence is received from information sharing forums and sources.
CyberFundamentals
See all related requirements and other information from tasks own page.
Go to >
Procedures and data sources for gathering reliable information about malware
Laitteiden liityntöjen rajoittaminen (ST III-II)
Critical
High
Normal
Low
Malware protection
1
requirements

Examples of other requirements this task affects

I09: Haittaohjelmasuojaus
Katakri
See all related requirements and other information from tasks own page.
Go to >
Laitteiden liityntöjen rajoittaminen (ST III-II)
Disabling auto-run of software
Critical
High
Normal
Low
Malware protection
2
requirements

Examples of other requirements this task affects

SEC-04: Disabling auto-run of software
Cyber Essentials
10.3: Disable Autorun and Autoplay for Removable Media
CIS 18
See all related requirements and other information from tasks own page.
Go to >
Disabling auto-run of software
Automatic file scan by malware protection software
Critical
High
Normal
Low
Malware protection
3
requirements

Examples of other requirements this task affects

MWP-02: Automatic file scan by anti-malware software
Cyber Essentials
3.1.3: Use automated and centralised tools to handle known threats
NSM ICT-SP
10.1: Deploy and Maintain Anti-Malware Software
CIS 18
See all related requirements and other information from tasks own page.
Go to >
Automatic file scan by malware protection software
Automatic website scan by malware protection software
Critical
High
Normal
Low
Malware protection
2
requirements

Examples of other requirements this task affects

MWP-03: Automatic website scan by anti-malware software
Cyber Essentials
10.1: Deploy and Maintain Anti-Malware Software
CIS 18
See all related requirements and other information from tasks own page.
Go to >
Automatic website scan by malware protection software
Blacklisting
Critical
High
Normal
Low
Malware protection
1
requirements

Examples of other requirements this task affects

MWP-04: Blocking connections to malicious websites
Cyber Essentials
See all related requirements and other information from tasks own page.
Go to >
Blacklisting
Whitelisting
Critical
High
Normal
Low
Malware protection
8
requirements

Examples of other requirements this task affects

MWP-05: Whitelisting
Cyber Essentials
MWP: Application allow listing
Cyber Essentials
1.2.2: Establish organisational guidelines for approved devices and software
NSM ICT-SP
1.2.4: Identify the software in use at the organisation
NSM ICT-SP
2.3.2: Configure clients so that only software known to the organisation is able to execute
NSM ICT-SP
See all related requirements and other information from tasks own page.
Go to >
Whitelisting
Haittaohjelmasuojaus tietojärjestelmissä (TL IV)
Critical
High
Normal
Low
Malware protection
2
requirements

Examples of other requirements this task affects

TEK-11.1: Haittaohjelmilta suojautuminen
Julkri
I-09: MONITASOINEN SUOJAAMINEN – HAITTAOHJELMASUOJAUS
Katakri 2020
See all related requirements and other information from tasks own page.
Go to >
Haittaohjelmasuojaus tietojärjestelmissä (TL IV)
Haittaohjelmasuojaus julkisista verkoista eristetyissä järjestelmissä (TL III)
Critical
High
Normal
Low
Malware protection
2
requirements

Examples of other requirements this task affects

TEK-11.2: Haittaohjelmilta suojautuminen - TL III
Julkri
I-09: MONITASOINEN SUOJAAMINEN – HAITTAOHJELMASUOJAUS
Katakri 2020
See all related requirements and other information from tasks own page.
Go to >
Haittaohjelmasuojaus julkisista verkoista eristetyissä järjestelmissä (TL III)
Minimize the risk posed by the software that accompanies documents
Critical
High
Normal
Low
Malware protection
1
requirements

Examples of other requirements this task affects

2.3.2: Configure clients so that only software known to the organisation is able to execute
NSM ICT-SP
See all related requirements and other information from tasks own page.
Go to >
Minimize the risk posed by the software that accompanies documents
Detecting unconfirmed mobile apps
Critical
High
Normal
Low
Malware protection
5
requirements

Examples of other requirements this task affects

12.2.1: Controls against malware
ISO 27001
12.2: Protection from malware
ISO 27001
SEC-03: Removing unnecessary software and network services
Cyber Essentials
DE.CM-5: Unauthorized mobile code is detected.
CyberFundamentals
2.3.2: Configure clients so that only software known to the organisation is able to execute
NSM ICT-SP
See all related requirements and other information from tasks own page.
Go to >
Detecting unconfirmed mobile apps
Use malware systems from multiple vendors
Critical
High
Normal
Low
Malware protection
4
requirements

Examples of other requirements this task affects

12.2.1: Controls against malware
ISO 27001
12.2: Protection from malware
ISO 27001
DE.CM-4: Malicious code detection
NIST
DE.CM-4: Malicious code is detected.
CyberFundamentals
See all related requirements and other information from tasks own page.
Go to >
Use malware systems from multiple vendors
Automatic blocking and detecting of unauthorized software
Critical
High
Normal
Low
Malware protection
17
requirements

Examples of other requirements this task affects

12.2.1: Controls against malware
ISO 27001
12.2: Protection from malware
ISO 27001
DE.CM-5: Unauthorized mobile code detection
NIST
8.7: Protection against malware
ISO 27001
5.2.3: Malware protection
TISAX
See all related requirements and other information from tasks own page.
Go to >
Automatic blocking and detecting of unauthorized software
Informing staff about new, relevant malware
Critical
High
Normal
Low
Malware protection
5
requirements

Examples of other requirements this task affects

7.2.2: Information security awareness, education and training
ISO 27001
12.2.1: Controls against malware
ISO 27001
12.2: Protection from malware
ISO 27001
WORKFORCE-2: Increase Cybersecurity Awareness
C2M2
2.1.3: Staff training
TISAX
See all related requirements and other information from tasks own page.
Go to >
Informing staff about new, relevant malware
Instructing and training staff regarding malware
Critical
High
Normal
Low
Malware protection
18
requirements

Examples of other requirements this task affects

Članak 30.1.b (logs): Postupanje s incidentima, uključujući njihovo praćenje, evidentiranje i prijavljivanje
NIS2 Croatia
9.9a §: Poikkeamien havainnointi
Kyberturvallisuuslaki
5.2.3: Malware protection
TISAX
30 § 3.2° (détection et journaux): La gestion des incidents
NIS2 Belgium
14.5.3.b): žurnalai ir aptikimas
NIS2 Lithuania
See all related requirements and other information from tasks own page.
Go to >
Instructing and training staff regarding malware

Never duplicate effort. Do it once - improve compliance across frameworks.

Reach multi-framework compliance in the simplest possible way
Security frameworks tend to share the same core requirements - like risk management, backup, malware, personnel awareness or access management.
Cyberday maps all frameworks’ requirements into shared tasks - one single plan that improves all frameworks’ compliance.
Do it once - we automatically apply it to all current and future frameworks.
Get to know Cyberday
Start your free trial
Cyberday is your all-in-one solution for building a secure and compliant organization. Whether you're setting up a cyber security plan, evaluating policies, implementing tasks, or generating automated reports, Cyberday simplifies the entire process.
With AI-driven insights and a user-friendly interface, it's easier than ever to stay ahead of compliance requirements and focus on continuous improvement.
Clear framework compliance plans
Activate relevant frameworks and turn them into actionable policies tailored to your needs.
Credible reports to proof your compliance
Use guided tasks to ensure secure implementations and create professional reports with just a few clicks.
AI-powered improvement suggestions
Focus on the most impactful improvements in your compliance with help from Cyberday AI.