Free ebook: NIS2 ready using ISO 27001 best practices
Download ebook

General security guidelines for staff

Critical
High
Normal
Low

Personnel must have security guidelines that deal with e.g. the following topics:

  • Using and updating mobile devices
  • Storing and backing up data
  • Privacy
  • Using email
  • Handling of printouts, papers and files
  • Reporting incidents
  • Scam prevention
Connected other frameworks and requirements:
T11: Turvallisuuskoulutus ja -tietoisuus
2 luku, 4 §: Tiedonhallinnan järjestäminen tiedonhallintayksikössä
29. Processing under the authority of the controller or processor
GDPR
9.4.4: Use of privileged utility programs
ISO 27001
11.2.7: Secure disposal or re-use of equipment
ISO 27001

Safe disposal of laptops

Critical
High
Normal
Low

The organization has defined procedures for the safe disposal of laptops that are no longer required.

Connected other frameworks and requirements:
8.3.2: Disposal of media
ISO 27001
11.2.7: Secure disposal or re-use of equipment
ISO 27001
PR.DS-3: Asset management
NIST CSF
7.10: Storage media
ISO 27001
7.14: Secure disposal or re-use of equipment
ISO 27001

Process for secure disposal of removable media containing confidential information

Critical
High
Normal
Low

Unnecessary media should be disposed of in a safe, industry-accepted manner (such as by incineration, shredding or wiping) in accordance with formal procedures. Media that requires safe disposal must be clearly marked.

Data destroyed in accordance with the process should not be recoverable, even by forensic means.

Connected other frameworks and requirements:
8.3.2: Disposal of media
ISO 27001
11.2.7: Secure disposal or re-use of equipment
ISO 27001
PR.DS-3: Asset management
NIST CSF
PR.IP-6: Data destruction
NIST CSF
A.11.7: Secure disposal of hardcopy materials
ISO 27018
No items found.