Other tasks from the same security theme

Task name
Priority
Policy
Other requirements
Management and storage of national and international classified information
Critical
High
Normal
Low
Management of secure areas
1
requirements

Examples of other requirements this task affects

F-04: HANDLING AND STORAGE OF INFORMATION IN SECURITY AREAS AND OUTSIDE
Katakri 2020
See all related requirements and other information from tasks own page.
Go to >
Management and storage of national and international classified information
Registry for classified information
Critical
High
Normal
Low
Management of secure areas
1
requirements

Examples of other requirements this task affects

F-08.3: REGISTERING OF CLASSIFIED INFORMATION
Katakri 2020
See all related requirements and other information from tasks own page.
Go to >
Registry for classified information
Handling classified information in physically protected areas
Critical
High
Normal
Low
Management of secure areas
1
requirements

Examples of other requirements this task affects

I-17: HANDLING OF CLASSIFIED INFORMATION WITHIN PHYSICALLY PROTECTED AREAS - PHYSICAL SECURITY
Katakri 2020
See all related requirements and other information from tasks own page.
Go to >
Handling classified information in physically protected areas
Sound proofing areas used to discuss classified material
Critical
High
Normal
Low
Management of secure areas
2
requirements

Examples of other requirements this task affects

F-05.4: SOUNDPROOFING
Katakri 2020
F-06.6: SOUNDPROOFING
Katakri 2020
See all related requirements and other information from tasks own page.
Go to >
Sound proofing areas used to discuss classified material
Processing of international classified information in security areas
Critical
High
Normal
Low
Management of secure areas
1
requirements

Examples of other requirements this task affects

F-06.3: MANAGEMENT OF ACCESS RIGHTS
Katakri 2020
See all related requirements and other information from tasks own page.
Go to >
Processing of international classified information in security areas
Secure storage of classified information (CL IV)
Critical
High
Normal
Low
Management of secure areas
4
requirements

Examples of other requirements this task affects

FYY-04.1: Tiedon säilytys
Julkri
F-05.8: HANDLING AND STORAGE OF INFORMATION
Katakri 2020
F-06.10: HANDLING AND STORAGE OF INFORMATION
Katakri 2020
I-17: HANDLING OF CLASSIFIED INFORMATION WITHIN PHYSICALLY PROTECTED AREAS - PHYSICAL SECURITY
Katakri 2020
See all related requirements and other information from tasks own page.
Go to >
Secure storage of classified information (CL IV)
Tietovarantojen ja tietojärjestelmien sijoittaminen (TL IV)
Critical
High
Normal
Low
Management of secure areas
1
requirements

Examples of other requirements this task affects

FYY-04.2: Tiedon säilytys - Tietovarannot ja tietojärjestelmät
Julkri
See all related requirements and other information from tasks own page.
Go to >
Tietovarantojen ja tietojärjestelmien sijoittaminen (TL IV)
Tietovarantojen ja tietojärjestelmien sijoittaminen (TL III)
Critical
High
Normal
Low
Management of secure areas
1
requirements

Examples of other requirements this task affects

FYY-04.3: Tiedon säilytys - Tietovarannot ja tietojärjestelmät - TL III
Julkri
See all related requirements and other information from tasks own page.
Go to >
Tietovarantojen ja tietojärjestelmien sijoittaminen (TL III)
Secure storage of classified information (CL III)
Critical
High
Normal
Low
Management of secure areas
4
requirements

Examples of other requirements this task affects

FYY-04.4: Tiedon säilytys - TL III
Julkri
F-05.8: HANDLING AND STORAGE OF INFORMATION
Katakri 2020
F-06.10: HANDLING AND STORAGE OF INFORMATION
Katakri 2020
I-17: HANDLING OF CLASSIFIED INFORMATION WITHIN PHYSICALLY PROTECTED AREAS - PHYSICAL SECURITY
Katakri 2020
See all related requirements and other information from tasks own page.
Go to >
Secure storage of classified information (CL III)
Secure storage of classified information (CL II)
Critical
High
Normal
Low
Management of secure areas
2
requirements

Examples of other requirements this task affects

FYY-04.5: Tiedon säilytys - TL II
Julkri
I-17: HANDLING OF CLASSIFIED INFORMATION WITHIN PHYSICALLY PROTECTED AREAS - PHYSICAL SECURITY
Katakri 2020
See all related requirements and other information from tasks own page.
Go to >
Secure storage of classified information (CL II)
Turvallisuusluokitellun tiedon turvallinen säilyttäminen (TL I)
Critical
High
Normal
Low
Management of secure areas
1
requirements

Examples of other requirements this task affects

FYY-04.6: Tiedon säilytys - TL I
Julkri
See all related requirements and other information from tasks own page.
Go to >
Turvallisuusluokitellun tiedon turvallinen säilyttäminen (TL I)
Facility and equipment inspections in security areas (CL II)
Critical
High
Normal
Low
Management of secure areas
3
requirements

Examples of other requirements this task affects

FYY-05.3: Turvallisuusalue - Tila- ja laitetarkastukset - TL II
Julkri
F-05.7: INSPECTIONS OF WORKING SPACES AND DEVICES (ONLY FOR NATIONAL CLASSIFICATION LEVEL II OR EU SECRET)
Katakri 2020
F-06.9: INSPECTIONS OF WORKING SPACES AND DEVICES (ONLY FOR NATIONAL CLASSIFICATION LEVEL II OR EU SECRET)
Katakri 2020
See all related requirements and other information from tasks own page.
Go to >
Facility and equipment inspections in security areas (CL II)
Key management and access control procedures of secure areas
Critical
High
Normal
Low
Management of secure areas
5
requirements

Examples of other requirements this task affects

FYY-05.4: Turvallisuusalue - Pääsyoikeuksien ja avaintenhallinnan menettelyt
Julkri
ACCESS-3: Control Physical Access
C2M2
F-05.2: MANAGEMENT OF ACCESS RIGHTS
Katakri 2020
F-06.3: MANAGEMENT OF ACCESS RIGHTS
Katakri 2020
3.2: Toimitilaturvallisuus
TiHL tietoturvavaatimukset
See all related requirements and other information from tasks own page.
Go to >
Key management and access control procedures of secure areas
Visitor practices for security areas (CL IV)
Critical
High
Normal
Low
Management of secure areas
3
requirements

Examples of other requirements this task affects

FYY-05.5: Turvallisuusalue - Vierailijat
Julkri
F-05.3: VISITORS
Katakri 2020
F-06.4: VISITORS
Katakri 2020
See all related requirements and other information from tasks own page.
Go to >
Visitor practices for security areas (CL IV)
Hallinnollisen alueen ulkoraja ja rajaavat rakenteet (TL IV)
Critical
High
Normal
Low
Management of secure areas
1
requirements

Examples of other requirements this task affects

FYY-06.1: Hallinnollinen alue - alueen raja ja rakenteet
Julkri
See all related requirements and other information from tasks own page.
Go to >
Hallinnollisen alueen ulkoraja ja rajaavat rakenteet (TL IV)
Authorization of access rights to administrative areas
Critical
High
Normal
Low
Management of secure areas
2
requirements

Examples of other requirements this task affects

FYY-06.3: Hallinnollinen alue - pääsyoikeuksien myöntäminen
Julkri
F-06.3: MANAGEMENT OF ACCESS RIGHTS
Katakri 2020
See all related requirements and other information from tasks own page.
Go to >
Authorization of access rights to administrative areas
Use of intrusion detection systems in administrative areas (CL IV)
Critical
High
Normal
Low
Management of secure areas
2
requirements

Examples of other requirements this task affects

FYY-06.4: Hallinnollinen alue - tunkeutumisen ilmaisujärjestelmät
Julkri
F-06.7: INTRUSION DETECTIONS SYSTEMS
Katakri 2020
See all related requirements and other information from tasks own page.
Go to >
Use of intrusion detection systems in administrative areas (CL IV)
Outer boundary and structural enclosures of security areas (CL III)
Critical
High
Normal
Low
Management of secure areas
2
requirements

Examples of other requirements this task affects

FYY-07.1: Turva-alue - alueen raja ja rakenteet - TL III
Julkri
F-06.1: BOUNDARY AND STRUCTURES FOR THE AREA (WALLS, DOORS, WINDOWS, FLOOR AND CEILING STRUCTURES)
Katakri 2020
See all related requirements and other information from tasks own page.
Go to >
Outer boundary and structural enclosures of security areas (CL III)
Turva-alueen kulunvalvontajärjestelmän lisävaatimukset (TL III)
Critical
High
Normal
Low
Management of secure areas
1
requirements

Examples of other requirements this task affects

FYY-07.2: Turva-alue - kulunvalvonta - TL III
Julkri
See all related requirements and other information from tasks own page.
Go to >
Turva-alueen kulunvalvontajärjestelmän lisävaatimukset (TL III)
Process for granting independent access rights to security areas (CL III)
Critical
High
Normal
Low
Management of secure areas
2
requirements

Examples of other requirements this task affects

FYY-07.3: Turva-alue - pääsyoikeuksien myöntäminen - TL III
Julkri
F-06.3: MANAGEMENT OF ACCESS RIGHTS
Katakri 2020
See all related requirements and other information from tasks own page.
Go to >
Process for granting independent access rights to security areas (CL III)
Visitor practices for the security area (CL III)
Critical
High
Normal
Low
Management of secure areas
3
requirements

Examples of other requirements this task affects

FYY-07.4: Turva-alue - vierailijat - TL III
Julkri
F-05.3: VISITORS
Katakri 2020
F-06.4: VISITORS
Katakri 2020
See all related requirements and other information from tasks own page.
Go to >
Visitor practices for the security area (CL III)
Security instructions specific to security areas (CL III)
Critical
High
Normal
Low
Management of secure areas
4
requirements

Examples of other requirements this task affects

FYY-07.5: Turva-alue - turvallisuusohjeet - TL III
Julkri
F-05.8: HANDLING AND STORAGE OF INFORMATION
Katakri 2020
F-06.5: SECURITY INSTRUCTIONS
Katakri 2020
F-06.10: HANDLING AND STORAGE OF INFORMATION
Katakri 2020
See all related requirements and other information from tasks own page.
Go to >
Security instructions specific to security areas (CL III)
Use of intrusion detection systems in administrative areas (CL III)
Critical
High
Normal
Low
Management of secure areas
2
requirements

Examples of other requirements this task affects

FYY-07.6: Turva-alue - tunkeutumisen ilmaisujärjestelmät - TL III
Julkri
F-06.7: INTRUSION DETECTIONS SYSTEMS
Katakri 2020
See all related requirements and other information from tasks own page.
Go to >
Use of intrusion detection systems in administrative areas (CL III)
Keys and access codes for storage units in security areas (CL III)
Critical
High
Normal
Low
Management of secure areas
3
requirements

Examples of other requirements this task affects

FYY-07.7: Turva-alue - säilytysyksiköiden avaimet ja pääsykoodit - TL III
Julkri
F-05.8: HANDLING AND STORAGE OF INFORMATION
Katakri 2020
F-06.10: HANDLING AND STORAGE OF INFORMATION
Katakri 2020
See all related requirements and other information from tasks own page.
Go to >
Keys and access codes for storage units in security areas (CL III)
Security of administrative connections involving classified information (CL III)
Critical
High
Normal
Low
Management of secure areas
2
requirements

Examples of other requirements this task affects

TEK-04.8: Hallintayhteydet - TL III
Julkri
I-04: SECURE INTERCONNECTION OF CIS – MANAGEMENT CONNECTIONS
Katakri 2020
See all related requirements and other information from tasks own page.
Go to >
Security of administrative connections involving classified information (CL III)
Risk-based encryption for data transferred inside secure areas
Critical
High
Normal
Low
Management of secure areas
1
requirements

Examples of other requirements this task affects

TEK-16.1: Tiedon salaaminen - salaaminen turvallisuusalueen sisällä
Julkri
See all related requirements and other information from tasks own page.
Go to >
Risk-based encryption for data transferred inside secure areas
Turvallisuusluokitellun tiedon salaaminen siirrettäessä turvallisuusalueiden sisällä (TL IV)
Critical
High
Normal
Low
Management of secure areas
1
requirements

Examples of other requirements this task affects

TEK-16.3: Tiedon salaaminen - turvallisuusluokitellun tiedon siirto turvallisuusalueiden sisällä
Julkri
See all related requirements and other information from tasks own page.
Go to >
Turvallisuusluokitellun tiedon salaaminen siirrettäessä turvallisuusalueiden sisällä (TL IV)
Restriction of remote access to security areas (CL II)
Critical
High
Normal
Low
Management of secure areas
2
requirements

Examples of other requirements this task affects

TEK-18.8: Etäkäyttö - etäkäyttö turvallisuusalueella - TL II
Julkri
I-18: HANDLING AND TRANSFER OF CLASSIFIED INFORMATION BETWEEN PHYSICALLY PROTECTED AREAS - REMOTE USE AND REMOTE MANAGEMENT
Katakri 2020
See all related requirements and other information from tasks own page.
Go to >
Restriction of remote access to security areas (CL II)
Processing and storage of CL I information only in security areas (CL I)
Critical
High
Normal
Low
Management of secure areas
2
requirements

Examples of other requirements this task affects

TEK-18.9: Etäkäyttö - TL I
Julkri
I-18: HANDLING AND TRANSFER OF CLASSIFIED INFORMATION BETWEEN PHYSICALLY PROTECTED AREAS - REMOTE USE AND REMOTE MANAGEMENT
Katakri 2020
See all related requirements and other information from tasks own page.
Go to >
Processing and storage of CL I information only in security areas (CL I)
Use of intrusion detection systems
Critical
High
Normal
Low
Management of secure areas
1
requirements

Examples of other requirements this task affects

F-05.5: INTRUSION DETECTION SYSTEMS
Katakri 2020
See all related requirements and other information from tasks own page.
Go to >
Use of intrusion detection systems

Never duplicate effort. Do it once - improve compliance across frameworks.

Reach multi-framework compliance in the simplest possible way
Security frameworks tend to share the same core requirements - like risk management, backup, malware, personnel awareness or access management.
Cyberday maps all frameworks’ requirements into shared tasks - one single plan that improves all frameworks’ compliance.
Do it once - we automatically apply it to all current and future frameworks.
Get to know Cyberday
Start your free trial
Cyberday is your all-in-one solution for building a secure and compliant organization. Whether you're setting up a cyber security plan, evaluating policies, implementing tasks, or generating automated reports, Cyberday simplifies the entire process.
With AI-driven insights and a user-friendly interface, it's easier than ever to stay ahead of compliance requirements and focus on continuous improvement.
Clear framework compliance plans
Activate relevant frameworks and turn them into actionable policies tailored to your needs.
Credible reports to proof your compliance
Use guided tasks to ensure secure implementations and create professional reports with just a few clicks.
AI-powered improvement suggestions
Focus on the most impactful improvements in your compliance with help from Cyberday AI.