Other tasks from the same security theme

Task name
Priority
Policy
Other requirements
Data security and compliance with legal requirements
Critical
High
Normal
Low
Supplier security
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Data security and compliance with legal requirements
Reporting of cybersecurity service providers
Critical
High
Normal
Low
Supplier security
1
requirements

Examples of other requirements this task affects

Art. 10: Dienstleister
CSV
See all related requirements and other information from tasks own page.
Go to >
Reporting of cybersecurity service providers
Process for transferring security-sensitive activities or assets
Critical
High
Normal
Low
Supplier security
1
requirements

Examples of other requirements this task affects

§ 4.13: Särskild säkerhetsskyddsbedömning
SSL
See all related requirements and other information from tasks own page.
Go to >
Process for transferring security-sensitive activities or assets
Requiring security assessments before engagement
Critical
High
Normal
Low
Supplier security
2
requirements

Examples of other requirements this task affects

§ 4.8: Tillgång till sekretessbelagd information
SSL
§ 4.9: Lämplighetsprövningen
SSL
See all related requirements and other information from tasks own page.
Go to >
Requiring security assessments before engagement
Security agreement with a supplier
Critical
High
Normal
Low
Supplier security
1
requirements

Examples of other requirements this task affects

§ 4.1: Säkerhetsskyddsavtal
SSL
See all related requirements and other information from tasks own page.
Go to >
Security agreement with a supplier
Ensuring supply chain security
Critical
High
Normal
Low
Supplier security
3
requirements

Examples of other requirements this task affects

Art. 24.3: Sicurezza della catena di approvvigionamento
NIS2 Italy
32.2.3: Sicherheit in der Lieferkette
NIS2 Austria
30.4: Sicherheit der Lieferkette
NIS2 Germany
See all related requirements and other information from tasks own page.
Go to >
Ensuring supply chain security
Security of used data centers
Critical
High
Normal
Low
Supplier security
2
requirements

Examples of other requirements this task affects

Article 32: Physical and environmental security
DORA simplified RMF
See all related requirements and other information from tasks own page.
Go to >
Security of used data centers
Classifying service providers
Critical
High
Normal
Low
Supplier security
1
requirements

Examples of other requirements this task affects

15.3: Classify Service Providers
CIS 18
See all related requirements and other information from tasks own page.
Go to >
Classifying service providers
Evaluation of prospective suppliers
Critical
High
Normal
Low
Supplier security
2
requirements

Examples of other requirements this task affects

GV.SC-06: Due diligence and planning with suppliers and third-party relationships
NIST 2.0
ID.RA-10: Critical suppliers
NIST 2.0
See all related requirements and other information from tasks own page.
Go to >
Evaluation of prospective suppliers
Safe termination of critical relationships
Critical
High
Normal
Low
Supplier security
1
requirements

Examples of other requirements this task affects

GV.SC-10: Post-partnership activities in cybersecurity supply chain risk management plans
NIST 2.0
See all related requirements and other information from tasks own page.
Go to >
Safe termination of critical relationships
Exit strategies for critical ICT services
Critical
High
Normal
Low
Supplier security
2
requirements

Examples of other requirements this task affects

Article 28: General principles
DORA
15.7: Securely Decommission Service Providers
CIS 18
See all related requirements and other information from tasks own page.
Go to >
Exit strategies for critical ICT services
Defined security arrangements for providing critical network equipment
Critical
High
Normal
Low
Supplier security
12
requirements

Examples of other requirements this task affects

13.1.2: Security of network services
ISO 27001
15.2.1: Monitoring and review of supplier services
ISO 27001
ID.BE-5: Resilience requirements
NIST
DE.CM-1: The network monitoring
NIST
5.22: Monitoring, review and change management of supplier services
ISO 27001
See all related requirements and other information from tasks own page.
Go to >
Defined security arrangements for providing critical network equipment
Minimum requirements for partner companies to gain access to different levels of information
Critical
High
Normal
Low
Supplier security
8
requirements

Examples of other requirements this task affects

15.1.1: Information security policy for supplier relationships
ISO 27001
15.1.3: Information and communication technology supply chain
ISO 27001
ID.BE-1: Role in supply chain
NIST
5.21: Managing information security in the ICT supply chain
ISO 27001
6.5: Tietojärjestelmien perustiedot, kuvaukset ja olennaisten vaatimusten täyttyminen
Tietoturvasuunnitelma
See all related requirements and other information from tasks own page.
Go to >
Minimum requirements for partner companies to gain access to different levels of information
Criteria for high priority partners
Critical
High
Normal
Low
Supplier security
36
requirements

Examples of other requirements this task affects

Članak 30.1.d: Sigurnost lanca opskrbe
NIS2 Croatia
9.4 §: Toimitusketjun hallinta ja valvonta
Kyberturvallisuuslaki
1.3.3: Use of approved external IT services
TISAX
6.1.1: Partner Information security
TISAX
30 § 3.4°: La sécurité de la chaîne d'approvisionnement
NIS2 Belgium
See all related requirements and other information from tasks own page.
Go to >
Criteria for high priority partners
Defining supplier types that can access confidential data
Critical
High
Normal
Low
Supplier security
6
requirements

Examples of other requirements this task affects

15.1.1: Information security policy for supplier relationships
ISO 27001
ID.BE-1: Role in supply chain
NIST
5.19: Information security in supplier relationships
ISO 27001
6.1.1: Partner Information security
TISAX
15.3: Classify Service Providers
CIS 18
See all related requirements and other information from tasks own page.
Go to >
Defining supplier types that can access confidential data
Supply chain cyber security risk management
Critical
High
Normal
Low
Supplier security
31
requirements

Examples of other requirements this task affects

Članak 30.2: Dobavljačka kibernetička sigurnost i rizici
NIS2 Croatia
9.4 §: Toimitusketjun hallinta ja valvonta
Kyberturvallisuuslaki
30 § 4°: Définir et contrôler les mesures de sécurité requises pour la chaîne d'approvisionnement
NIS2 Belgium
2.1.4: Reduce the risk of targeted manipulation of ICT products in the supply chain
NSM ICT-SP
2.1.9: Maintain security responsibility during outsourcing
NSM ICT-SP
See all related requirements and other information from tasks own page.
Go to >
Supply chain cyber security risk management
Prioritization of partners based on criticality
Critical
High
Normal
Low
Supplier security
3
requirements

Examples of other requirements this task affects

ID.SC-2: Suppliers and third party partners of information systems
NIST
ID.SC-2: Suppliers and third-party partners of information systems, components, and services are identified, prioritized, and assessed using a cyber supply chain risk assessment process.
CyberFundamentals
GV.SC-04: Prioritizing suppliers by criticality
NIST 2.0
See all related requirements and other information from tasks own page.
Go to >
Prioritization of partners based on criticality
Tietoliikenteen toimivuuden varmistaminen
Critical
High
Normal
Low
Supplier security
1
requirements

Examples of other requirements this task affects

VAR-06: Tietoliikenteen varmistaminen
Julkri
See all related requirements and other information from tasks own page.
Go to >
Tietoliikenteen toimivuuden varmistaminen
Organizing supplier management meetings to discuss digital security
Critical
High
Normal
Low
Supplier security
2
requirements

Examples of other requirements this task affects

75: Digiturvallisuusyhteistyö kriittisten toimittajien ja alihankkjoiden kanssa
Digiturvan kokonaiskuvapalvelu
4.1.4: Establish agreements with relevant third parties
NSM ICT-SP
See all related requirements and other information from tasks own page.
Go to >
Organizing supplier management meetings to discuss digital security
Identifying critical IT partners
Critical
High
Normal
Low
Supplier security
4
requirements

Examples of other requirements this task affects

THIRD-PARTIES-1: Identify and Prioritize Third Parties
C2M2
1.2.4: Definition of responsibilities with service providers
TISAX
Article 39: Components of the ICT business continuity plan
DORA simplified RMF
See all related requirements and other information from tasks own page.
Go to >
Identifying critical IT partners
Multiple providers for critical network equipment
Critical
High
Normal
Low
Supplier security
11
requirements

Examples of other requirements this task affects

13.1.2: Security of network services
ISO 27001
ID.BE-4: Dependencies and critical functions
NIST
ID.BE-5: Resilience requirements
NIST
VAR-08: Vikasietoisuus
Julkri
8.14: Redundancy of information processing facilities
ISO 27001
See all related requirements and other information from tasks own page.
Go to >
Multiple providers for critical network equipment
Confirming information security roles and responsibilities related to utilized cloud services
Critical
High
Normal
Low
Supplier security
26
requirements

Examples of other requirements this task affects

Članak 30.1.d: Sigurnost lanca opskrbe
NIS2 Croatia
30 § 3.4°: La sécurité de la chaîne d'approvisionnement
NIS2 Belgium
ID.AM-6: Cybersecurity roles, responsibilities, and authorities for the entire workforce and third-party stakeholders (e.g., suppliers, customers, partners) are established.
CyberFundamentals
14.5.5): Tiekimo grandinės saugumą
NIS2 Lithuania
GV.SC-02: Establishing and communicating cybersecurity roles for suppliers, customers, and partners
NIST 2.0
See all related requirements and other information from tasks own page.
Go to >
Confirming information security roles and responsibilities related to utilized cloud services
Required security objectives for cloud service subcontractors related to offered cloud services
Critical
High
Normal
Low
Supplier security
1
requirements

Examples of other requirements this task affects

15.1.3: Information and communication technology supply chain
ISO 27017
See all related requirements and other information from tasks own page.
Go to >
Required security objectives for cloud service subcontractors related to offered cloud services
Tietoteknisten ympäristöjen toimivuuden varmistaminen
Critical
High
Normal
Low
Supplier security
2
requirements

Examples of other requirements this task affects

VAR-07: Tietoteknisten ympäristöjen varmentaminen
Julkri
6.11: Alusta- ja verkkopalvelujen tietoturvallinen käyttö tietosuojan ja varautumisen kannalta
Tietoturvasuunnitelma
See all related requirements and other information from tasks own page.
Go to >
Tietoteknisten ympäristöjen toimivuuden varmistaminen

Never duplicate effort. Do it once - improve compliance across frameworks.

Reach multi-framework compliance in the simplest possible way
Security frameworks tend to share the same core requirements - like risk management, backup, malware, personnel awareness or access management.
Cyberday maps all frameworks’ requirements into shared tasks - one single plan that improves all frameworks’ compliance.
Do it once - we automatically apply it to all current and future frameworks.
Get to know Cyberday
Start your free trial
Cyberday is your all-in-one solution for building a secure and compliant organization. Whether you're setting up a cyber security plan, evaluating policies, implementing tasks, or generating automated reports, Cyberday simplifies the entire process.
With AI-driven insights and a user-friendly interface, it's easier than ever to stay ahead of compliance requirements and focus on continuous improvement.
Clear framework compliance plans
Activate relevant frameworks and turn them into actionable policies tailored to your needs.
Credible reports to proof your compliance
Use guided tasks to ensure secure implementations and create professional reports with just a few clicks.
AI-powered improvement suggestions
Focus on the most impactful improvements in your compliance with help from Cyberday AI.