Other tasks from the same security theme

Task name
Priority
Policy
Other requirements
Personnel compliance with information security policies
Critical
High
Normal
Low
Cyber security in contracts
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Personnel compliance with information security policies
Maintaining confidentiality agreements
Critical
High
Normal
Low
Cyber security in contracts
42
requirements

Examples of other requirements this task affects

Članak 30.1.i (Ljudskih resursa): Sigurnost ljudskih resursa
NIS2 Croatia
9.6 §: Henkilöstöturvallisuus ja tietoturvakoulutus
Kyberturvallisuuslaki
6.1.2: Non-disclosure agreement management
TISAX
2.1.2: Staff compliance with information security policies
TISAX
9.7.1: Personnel commitment to Confidentiality
TISAX
See all related requirements and other information from tasks own page.
Go to >
Maintaining confidentiality agreements
Defining cyber security responsibilities and tasks in employment contracts
Critical
High
Normal
Low
Cyber security in contracts
39
requirements

Examples of other requirements this task affects

Članak 30.1.i (Ljudskih resursa): Sigurnost ljudskih resursa
NIS2 Croatia
9.6 §: Henkilöstöturvallisuus ja tietoturvakoulutus
Kyberturvallisuuslaki
2.1.2: Staff compliance with information security policies
TISAX
9.7.1: Personnel commitment to Confidentiality
TISAX
30 § 3.9° (ressources humaines): La sécurité des ressources humaines
NIS2 Belgium
See all related requirements and other information from tasks own page.
Go to >
Defining cyber security responsibilities and tasks in employment contracts
Regular feedback discussions on employee performance
Critical
High
Normal
Low
Cyber security in contracts
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Regular feedback discussions on employee performance
Personnel security policies for accessing ePHI
Critical
High
Normal
Low
Cyber security in contracts
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Personnel security policies for accessing ePHI
Creating a unique identifier for employees
Critical
High
Normal
Low
Cyber security in contracts
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Creating a unique identifier for employees
Establish a review process for previously vetted individuals
Critical
High
Normal
Low
Cyber security in contracts
1
requirements

Examples of other requirements this task affects

§ 3.4: Ansvar för säkerhetsprövningen
SSL
See all related requirements and other information from tasks own page.
Go to >
Establish a review process for previously vetted individuals
Identify who is responsible for making the final suitability decision
Critical
High
Normal
Low
Cyber security in contracts
2
requirements

Examples of other requirements this task affects

§ 3.4: Ansvar för säkerhetsprövningen
SSL
§ 4.9: Lämplighetsprövningen
SSL
See all related requirements and other information from tasks own page.
Go to >
Identify who is responsible for making the final suitability decision
Security vetting for security-sensitive activities and follow-up (Sweden)
Critical
High
Normal
Low
Cyber security in contracts
1
requirements

Examples of other requirements this task affects

§ 3.3: Kriterier för säkerhetsprövning
SSL
See all related requirements and other information from tasks own page.
Go to >
Security vetting for security-sensitive activities and follow-up (Sweden)
Disciplinary process for security breaches
Critical
High
Normal
Low
Cyber security in contracts
28
requirements

Examples of other requirements this task affects

Članak 30.1.i (Ljudskih resursa): Sigurnost ljudskih resursa
NIS2 Croatia
9.6 §: Henkilöstöturvallisuus ja tietoturvakoulutus
Kyberturvallisuuslaki
30 § 3.9° (ressources humaines): La sécurité des ressources humaines
NIS2 Belgium
14.5.10.a): Žmogiškųjų išteklių saugumas
NIS2 Lithuania
PR.IP-11: Cybersecurity in human resources
NIST
See all related requirements and other information from tasks own page.
Go to >
Disciplinary process for security breaches
Reviewing confidentiality agreements
Critical
High
Normal
Low
Cyber security in contracts
6
requirements

Examples of other requirements this task affects

7.1.2: Terms and conditions of employment
ISO 27001
13.2.4: Confidentiality or non-disclosure agreements
ISO 27001
6.2: Terms and conditions of employment
ISO 27001
6.6: Confidentiality or non-disclosure agreements
ISO 27001
6.1.2: Non-disclosure agreement management
TISAX
See all related requirements and other information from tasks own page.
Go to >
Reviewing confidentiality agreements
Signing contract before getting access to the organizations information and systems
Critical
High
Normal
Low
Cyber security in contracts
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Signing contract before getting access to the organizations information and systems
Ensuring necessary aspects in personnel's non-disclosure or confidentiality agreements
Critical
High
Normal
Low
Cyber security in contracts
3
requirements

Examples of other requirements this task affects

2.1.2: Staff compliance with information security policies
TISAX
6.1.2: Non-disclosure agreement management
TISAX
§ 2.2.1 (Konfidentialitet): Informationssäkerhetsskyddsåtgärder
SSL
See all related requirements and other information from tasks own page.
Go to >
Ensuring necessary aspects in personnel's non-disclosure or confidentiality agreements
Formal adoption of security policies
Critical
High
Normal
Low
Cyber security in contracts
4
requirements

Examples of other requirements this task affects

7.2.2: Information security awareness, education and training
ISO 27001
5.1.1: Policies for information security
ISO 27001
HAL-01: Periaatteet
Julkri
5.1: Policies for information security
ISO 27001
See all related requirements and other information from tasks own page.
Go to >
Formal adoption of security policies

Never duplicate effort. Do it once - improve compliance across frameworks.

Reach multi-framework compliance in the simplest possible way
Security frameworks tend to share the same core requirements - like risk management, backup, malware, personnel awareness or access management.
Cyberday maps all frameworks’ requirements into shared tasks - one single plan that improves all frameworks’ compliance.
Do it once - we automatically apply it to all current and future frameworks.
Get to know Cyberday
Start your free trial
Cyberday is your all-in-one solution for building a secure and compliant organization. Whether you're setting up a cyber security plan, evaluating policies, implementing tasks, or generating automated reports, Cyberday simplifies the entire process.
With AI-driven insights and a user-friendly interface, it's easier than ever to stay ahead of compliance requirements and focus on continuous improvement.
Clear framework compliance plans
Activate relevant frameworks and turn them into actionable policies tailored to your needs.
Credible reports to proof your compliance
Use guided tasks to ensure secure implementations and create professional reports with just a few clicks.
AI-powered improvement suggestions
Focus on the most impactful improvements in your compliance with help from Cyberday AI.
No items found.