Other tasks from the same security theme

Task name
Priority
Policy
Other requirements
Automatically updating and running malware prevention software
Critical
High
Normal
Low
Update and patch management
42
requirements

Examples of other requirements this task affects

Članak 30.1.b (logs): Postupanje s incidentima, uključujući njihovo praćenje, evidentiranje i prijavljivanje
NIS2 Croatia
9.9a §: Poikkeamien havainnointi
Kyberturvallisuuslaki
5.2.3: Malware protection
TISAX
30 § 3.2° (détection et journaux): La gestion des incidents
NIS2 Belgium
3.1.3: Use automated and centralised tools to handle known threats
NSM ICT-SP
See all related requirements and other information from tasks own page.
Go to >
Automatically updating and running malware prevention software
Organising the distribution of updates
Critical
High
Normal
Low
Update and patch management
1
requirements

Examples of other requirements this task affects

Vuln.7: Distributing updates
CRA
See all related requirements and other information from tasks own page.
Go to >
Organising the distribution of updates
Ensuring that security updates remain available after their release
Critical
High
Normal
Low
Update and patch management
1
requirements

Examples of other requirements this task affects

Article 13.9: Security updates
CRA
See all related requirements and other information from tasks own page.
Go to >
Ensuring that security updates remain available after their release
Free availability of software updates
Critical
High
Normal
Low
Update and patch management
1
requirements

Examples of other requirements this task affects

Article 13.10: Modified versions of a software product
CRA
See all related requirements and other information from tasks own page.
Go to >
Free availability of software updates
Regular security updates for offered products
Critical
High
Normal
Low
Update and patch management
1
requirements

Examples of other requirements this task affects

Vuln.2: Address and remediate vulnerabilities
CRA
See all related requirements and other information from tasks own page.
Go to >
Regular security updates for offered products
Continuous monitoring of acquired services
Critical
High
Normal
Low
Update and patch management
2
requirements

Examples of other requirements this task affects

GV.SC-09: Supply chain security practices in risk management programs
NIST 2.0
Article 34: ICT operations security
DORA simplified RMF
See all related requirements and other information from tasks own page.
Go to >
Continuous monitoring of acquired services
Keeping open-source software up to date
Critical
High
Normal
Low
Update and patch management
1
requirements

Examples of other requirements this task affects

2.1.8: Maintain the software code developed/used by the organisation
NSM ICT-SP
See all related requirements and other information from tasks own page.
Go to >
Keeping open-source software up to date
Maintenance and updating of data systems according to manufacturer guidelines
Critical
High
Normal
Low
Update and patch management
5
requirements

Examples of other requirements this task affects

6.5: Tietojärjestelmien asennus, ylläpito ja päivitys
Omavalvontasuunnitelma
6.10: Työasemien, mobiililaitteiden ja käyttöympäristön tukipalveluiden hallinta
Tietoturvasuunnitelma
6.6: Tietojärjestelmien asennus, ylläpito ja päivitys
Tietoturvasuunnitelma
Article 7: ICT systems, protocols and tools
DORA
4.1: Tietojärjestelmien tietoturvallisuus
TiHL tietoturvavaatimukset
See all related requirements and other information from tasks own page.
Go to >
Maintenance and updating of data systems according to manufacturer guidelines
Maintenance and updates of security systems that detect vulnerabilities
Critical
High
Normal
Low
Update and patch management
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Maintenance and updates of security systems that detect vulnerabilities
Keeping licensed software up to date
Critical
High
Normal
Low
Update and patch management
6
requirements

Examples of other requirements this task affects

SUM-02: Keeping licensed software up to date
Cyber Essentials
Article 9b: Prevention
DORA
2.1.8: Maintain the software code developed/used by the organisation
NSM ICT-SP
12.1: Ensure Network Infrastructure is Up-to-Date
CIS 18
2.2: Ensure Authorized Software is Currently Supported
CIS 18
See all related requirements and other information from tasks own page.
Go to >
Keeping licensed software up to date
Evaluating and testing patches before deployment
Critical
High
Normal
Low
Update and patch management
10
requirements

Examples of other requirements this task affects

12.6.1: Management of technical vulnerabilities
ISO 27001
6.5: Tietojärjestelmien asennus, ylläpito ja päivitys
Omavalvontasuunnitelma
TEK-17: Muutoshallintamenettelyt
Julkri
8.8: Management of technical vulnerabilities
ISO 27001
6.6: Tietojärjestelmien asennus, ylläpito ja päivitys
Tietoturvasuunnitelma
See all related requirements and other information from tasks own page.
Go to >
Evaluating and testing patches before deployment
Management process for software updates
Critical
High
Normal
Low
Update and patch management
12
requirements

Examples of other requirements this task affects

12.6.1: Management of technical vulnerabilities
ISO 27001
SUM: Security update management
Cyber Essentials
8.8: Management of technical vulnerabilities
ISO 27001
Article 9b: Prevention
DORA
PR.MA-1: Maintenance and repair of organizational assets are performed and logged, with approved and controlled tools.
CyberFundamentals
See all related requirements and other information from tasks own page.
Go to >
Management process for software updates

Never duplicate effort. Do it once - improve compliance across frameworks.

Reach multi-framework compliance in the simplest possible way
Security frameworks tend to share the same core requirements - like risk management, backup, malware, personnel awareness or access management.
Cyberday maps all frameworks’ requirements into shared tasks - one single plan that improves all frameworks’ compliance.
Do it once - we automatically apply it to all current and future frameworks.
Get to know Cyberday
Start your free trial
Cyberday is your all-in-one solution for building a secure and compliant organization. Whether you're setting up a cyber security plan, evaluating policies, implementing tasks, or generating automated reports, Cyberday simplifies the entire process.
With AI-driven insights and a user-friendly interface, it's easier than ever to stay ahead of compliance requirements and focus on continuous improvement.
Clear framework compliance plans
Activate relevant frameworks and turn them into actionable policies tailored to your needs.
Credible reports to proof your compliance
Use guided tasks to ensure secure implementations and create professional reports with just a few clicks.
AI-powered improvement suggestions
Focus on the most impactful improvements in your compliance with help from Cyberday AI.