Other tasks from the same security theme

Task name
Priority
Policy
Other requirements
Safe disposal of laptops
Critical
High
Normal
Low
Mobile device management
15
requirements

Examples of other requirements this task affects

8.3.2: Disposal of media
ISO 27001
11.2.7: Secure disposal or re-use of equipment
ISO 27001
PR.DS-3: Asset management
NIST
TEK-21: Sähköisessä muodossa olevien tietojen tuhoaminen
Julkri
7.10: Storage media
ISO 27001
See all related requirements and other information from tasks own page.
Go to >
Safe disposal of laptops
Process for theft / disappearance of mobile equipment
Critical
High
Normal
Low
Mobile device management
7
requirements

Examples of other requirements this task affects

6.2.1: Mobile device policy
ISO 27001
6.6.4: Fyysisten tilojen, laitteiden ja tulosteiden turvallisuus
Omavalvontasuunnitelma
8.1: User endpoint devices
ISO 27001
CC6.7: Restriction and protection of information in transmission, movement or removal
SOC 2
4.11: Enforce Remote Wipe Capability on Portable End-User Devices
CIS 18
See all related requirements and other information from tasks own page.
Go to >
Process for theft / disappearance of mobile equipment
Personnel guidelines for safe usage of mobile devices
Critical
High
Normal
Low
Mobile device management
21
requirements

Examples of other requirements this task affects

11.2.6: Security of equipment and assets off-premises
ISO 27001
6.2.1: Mobile device policy
ISO 27001
10.1.1: Policy on the use of cryptographic controls
ISO 27001
11.2.8: Unattended user equipment
ISO 27001
12.6.2: Restrictions on software installation
ISO 27001
See all related requirements and other information from tasks own page.
Go to >
Personnel guidelines for safe usage of mobile devices
Secure teleworking measures
Critical
High
Normal
Low
Mobile device management
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Secure teleworking measures
Tamper-proof endopoint security measures
Critical
High
Normal
Low
Mobile device management
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Tamper-proof endopoint security measures
Security of teleworking and privatively owned endpoints
Critical
High
Normal
Low
Mobile device management
1
requirements

Examples of other requirements this task affects

Article 35: Data, system and network security
DORA simplified RMF
See all related requirements and other information from tasks own page.
Go to >
Security of teleworking and privatively owned endpoints
Endpoint security management system
Critical
High
Normal
Low
Mobile device management
17
requirements

Examples of other requirements this task affects

13.1.1: Network controls
ISO 27001
6.2.1: Mobile device policy
ISO 27001
PR.PT-4: Communications and control networks
NIST
HAL-19: Tietojen käsittely
Julkri
8.1: User endpoint devices
ISO 27001
See all related requirements and other information from tasks own page.
Go to >
Endpoint security management system
Endpoint PIN-protection and automated locking
Critical
High
Normal
Low
Mobile device management
5
requirements

Examples of other requirements this task affects

11.2.9: Clear desk and clear screen policy
ISO 27001
6.6.4: Fyysisten tilojen, laitteiden ja tulosteiden turvallisuus
Omavalvontasuunnitelma
7.7: Clear desk and clear screen
ISO 27001
SEC-06: Reviewing password practices on password protected systems
Cyber Essentials
See all related requirements and other information from tasks own page.
Go to >
Endpoint PIN-protection and automated locking
Using a mobile device management system
Critical
High
Normal
Low
Mobile device management
11
requirements

Examples of other requirements this task affects

6.2.1: Mobile device policy
ISO 27001
8.1: User endpoint devices
ISO 27001
CC6.7: Restriction and protection of information in transmission, movement or removal
SOC 2
3.1.4: Management of IT and mobile data storage devices
TISAX
DE.CM-5: Unauthorized mobile code is detected.
CyberFundamentals
See all related requirements and other information from tasks own page.
Go to >
Using a mobile device management system
Mobile device security policies and their monitoring
Critical
High
Normal
Low
Mobile device management
8
requirements

Examples of other requirements this task affects

6.2.1: Mobile device policy
ISO 27001
8.1: User endpoint devices
ISO 27001
CC6.7: Restriction and protection of information in transmission, movement or removal
SOC 2
6.10: Työasemien, mobiililaitteiden ja käyttöympäristön tukipalveluiden hallinta
Tietoturvasuunnitelma
3.1.4: Management of IT and mobile data storage devices
TISAX
See all related requirements and other information from tasks own page.
Go to >
Mobile device security policies and their monitoring
Listing and monitoring allowed applications on endpoints
Critical
High
Normal
Low
Mobile device management
6
requirements

Examples of other requirements this task affects

MWP-05: Whitelisting
Cyber Essentials
MWP: Application allow listing
Cyber Essentials
ARCHITECTURE-3: Implement IT and OT Asset Security as an Element of the Cybersecurity Architecture
C2M2
DE.CM-3: Personnel activity is monitored to detect potential cybersecurity events.
CyberFundamentals
2.3.2: Configure clients so that only software known to the organisation is able to execute
NSM ICT-SP
See all related requirements and other information from tasks own page.
Go to >
Listing and monitoring allowed applications on endpoints
Process for testing the compatibility of endpoints
Critical
High
Normal
Low
Mobile device management
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Process for testing the compatibility of endpoints
Software firewall on endpoint devices
Critical
High
Normal
Low
Mobile device management
6
requirements

Examples of other requirements this task affects

FWL-03: Host based firewall protection
Cyber Essentials
ARCHITECTURE-3: Implement IT and OT Asset Security as an Element of the Cybersecurity Architecture
C2M2
DE.CM-1: The network is monitored to detect potential cybersecurity events.
CyberFundamentals
DE.CM-01: Monitoring network and network services
NIST 2.0
4.5: Implement and Manage a Firewall on End-User Devices
CIS 18
See all related requirements and other information from tasks own page.
Go to >
Software firewall on endpoint devices
Enabling remote locating on endpoint devices
Critical
High
Normal
Low
Mobile device management
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Enabling remote locating on endpoint devices
Enabling remote wipe on endpoint devices
Critical
High
Normal
Low
Mobile device management
4
requirements

Examples of other requirements this task affects

7.9: Security of assets off-premises
ISO 27001
4.11: Enforce Remote Wipe Capability on Portable End-User Devices
CIS 18
See all related requirements and other information from tasks own page.
Go to >
Enabling remote wipe on endpoint devices
Third-party endpoint security monitoring
Critical
High
Normal
Low
Mobile device management
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Third-party endpoint security monitoring
Procedure for identifying software licensing requirements
Critical
High
Normal
Low
Mobile device management
6
requirements

Examples of other requirements this task affects

18.1: Compliance with legal and contractual requirements
ISO 27017
18.1.2: Intellectual property rights
ISO 27017
18.1.2: Intellectual property rights
ISO 27001
18: Compliance
ISO 27017
5.32: Intellectual property rights
ISO 27001
See all related requirements and other information from tasks own page.
Go to >
Procedure for identifying software licensing requirements
Device list maintenance in a mobile device management system
Critical
High
Normal
Low
Mobile device management
4
requirements

Examples of other requirements this task affects

8.1.1: Inventory of assets
ISO 27001
1.2.1: Establish a process to identify devices and software in use at the organisation
NSM ICT-SP
1.2.3: Identify devices in use at the organisation
NSM ICT-SP
See all related requirements and other information from tasks own page.
Go to >
Device list maintenance in a mobile device management system

Never duplicate effort. Do it once - improve compliance across frameworks.

Reach multi-framework compliance in the simplest possible way
Security frameworks tend to share the same core requirements - like risk management, backup, malware, personnel awareness or access management.
Cyberday maps all frameworks’ requirements into shared tasks - one single plan that improves all frameworks’ compliance.
Do it once - we automatically apply it to all current and future frameworks.
Get to know Cyberday
Start your free trial
Cyberday is your all-in-one solution for building a secure and compliant organization. Whether you're setting up a cyber security plan, evaluating policies, implementing tasks, or generating automated reports, Cyberday simplifies the entire process.
With AI-driven insights and a user-friendly interface, it's easier than ever to stay ahead of compliance requirements and focus on continuous improvement.
Clear framework compliance plans
Activate relevant frameworks and turn them into actionable policies tailored to your needs.
Credible reports to proof your compliance
Use guided tasks to ensure secure implementations and create professional reports with just a few clicks.
AI-powered improvement suggestions
Focus on the most impactful improvements in your compliance with help from Cyberday AI.