Content library
Digital security overview
50: Teknisten haavoittuvuuksien seuranta

How to fill the requirement

Digital security overview

50: Teknisten haavoittuvuuksien seuranta

Task name
Priority
Status
Theme
Policy
Other requirements
Monitoring of technical vulnerability communications
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Development and cloud
Technical vulnerability management
3
requirements

Task is fulfilling also these other security requirements

50: Teknisten haavoittuvuuksien seuranta
Sec overview
THREAT-1: Reduce Cybersecurity Vulnerabilities
C2M2: MIL1
9.3 §: Tietojärjestelmien hankinta ja kehittäminen
KyberTL
1. Task description

The organization monitors information about technical vulnerabilities of the information systems in use. When relevant technical vulnerabilities are detected, the organization takes action according to the planned operating model.

No items found.