Other tasks from the same security theme

Task name
Priority
Policy
Other requirements
General security guidelines for staff
Critical
High
Normal
Low
Security guidelines
55
requirements

Examples of other requirements this task affects

29. Processing under the authority of the controller or processor
GDPR
8.3.2: Disposal of media
ISO 27001
9.4.4: Use of privileged utility programs
ISO 27001
11.2.7: Secure disposal or re-use of equipment
ISO 27001
12.1.1: Documented operating procedures
ISO 27001
See all related requirements and other information from tasks own page.
Go to >
General security guidelines for staff
Collecting feedback on security suggestions
Critical
High
Normal
Low
Security guidelines
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Collecting feedback on security suggestions
Comprehensive basis for security assessments
Critical
High
Normal
Low
Security guidelines
2
requirements

Examples of other requirements this task affects

§ 3.4: Ansvar för säkerhetsprövningen
SSL
§ 4.9: Lämplighetsprövningen
SSL
See all related requirements and other information from tasks own page.
Go to >
Comprehensive basis for security assessments
Personnel security clearance procedure
Critical
High
Normal
Low
Security guidelines
1
requirements

Examples of other requirements this task affects

16: Krav om sikkerhedsgodkendelse af medarbejdere
NIS2 Denmark
See all related requirements and other information from tasks own page.
Go to >
Personnel security clearance procedure
Communicate guideline updates to staff
Critical
High
Normal
Low
Security guidelines
1
requirements

Examples of other requirements this task affects

1.2.2: Establish organisational guidelines for approved devices and software
NSM ICT-SP
See all related requirements and other information from tasks own page.
Go to >
Communicate guideline updates to staff
Personnel guidelines for approved devices and software
Critical
High
Normal
Low
Security guidelines
1
requirements

Examples of other requirements this task affects

1.2.2: Establish organisational guidelines for approved devices and software
NSM ICT-SP
See all related requirements and other information from tasks own page.
Go to >
Personnel guidelines for approved devices and software
Guidelines for password safety for personnel
Critical
High
Normal
Low
Security guidelines
1
requirements

Examples of other requirements this task affects

2.6.1: Create guidelines for access control
NSM ICT-SP
See all related requirements and other information from tasks own page.
Go to >
Guidelines for password safety for personnel
Informing about threats and guidelines related to classified information and related to work tasks
Critical
High
Normal
Low
Security guidelines
2
requirements

Examples of other requirements this task affects

T-04: SECURITY GUIDANCE
Katakri 2020
Art. 13.2.2: Mesures internes de sécurité graduelles
Loi infrastructures critiques
See all related requirements and other information from tasks own page.
Go to >
Informing about threats and guidelines related to classified information and related to work tasks
Unit- or role-specific security guidelines
Critical
High
Normal
Low
Security guidelines
41
requirements

Examples of other requirements this task affects

7.2.2: Information security awareness, education and training
ISO 27001
4 §: Tiedonhallinnan järjestäminen tiedonhallintayksikössä
TiHL
6.1: Tietojärjestelmien käyttäjiltä vaadittava koulutus ja kokemus
Omavalvontasuunnitelma
6.2: Tietojärjestelmien asianmukaisen käytön kannalta tarpeelliset käyttöohjeet
Omavalvontasuunnitelma
PR.AT-1: Awareness
NIST
See all related requirements and other information from tasks own page.
Go to >
Unit- or role-specific security guidelines
Monitoring compliance with security guidelines
Critical
High
Normal
Low
Security guidelines
15
requirements

Examples of other requirements this task affects

29. Processing under the authority of the controller or processor
GDPR
18.2.2: Compliance with security policies and standards
ISO 27001
T11: Turvallisuuskoulutus ja -tietoisuus
Katakri
HAL-12: Ohjeet
Julkri
HAL-13: Koulutukset
Julkri
See all related requirements and other information from tasks own page.
Go to >
Monitoring compliance with security guidelines
Early orientation of security guidelines for personnel
Critical
High
Normal
Low
Security guidelines
2
requirements

Examples of other requirements this task affects

HAL-11: Salassapito- ja vaitiolovelvollisuus
Julkri
HAL-14: Käyttö- ja käsittelyoikeudet
Julkri
See all related requirements and other information from tasks own page.
Go to >
Early orientation of security guidelines for personnel
Continuous development of guidelines
Critical
High
Normal
Low
Security guidelines
35
requirements

Examples of other requirements this task affects

12.1.1: Documented operating procedures
ISO 27001
T11: Turvallisuuskoulutus ja -tietoisuus
Katakri
HAL-12: Ohjeet
Julkri
5.37: Documented operating procedures
ISO 27001
6.3: Information security awareness, education and training
ISO 27001
See all related requirements and other information from tasks own page.
Go to >
Continuous development of guidelines

Never duplicate effort. Do it once - improve compliance across frameworks.

Reach multi-framework compliance in the simplest possible way
Security frameworks tend to share the same core requirements - like risk management, backup, malware, personnel awareness or access management.
Cyberday maps all frameworks’ requirements into shared tasks - one single plan that improves all frameworks’ compliance.
Do it once - we automatically apply it to all current and future frameworks.
Get to know Cyberday
Start your free trial
Cyberday is your all-in-one solution for building a secure and compliant organization. Whether you're setting up a cyber security plan, evaluating policies, implementing tasks, or generating automated reports, Cyberday simplifies the entire process.
With AI-driven insights and a user-friendly interface, it's easier than ever to stay ahead of compliance requirements and focus on continuous improvement.
Clear framework compliance plans
Activate relevant frameworks and turn them into actionable policies tailored to your needs.
Credible reports to proof your compliance
Use guided tasks to ensure secure implementations and create professional reports with just a few clicks.
AI-powered improvement suggestions
Focus on the most impactful improvements in your compliance with help from Cyberday AI.