Oh no! No description found. But not to worry. Read from Tasks below how to advance this topic.
MIL1 requirements
a. IT and OT assets that are important to the delivery of the function are inventoried, at least in an ad hoc manner
MIL2 requirements
b. The IT and OT asset inventory includes assets within the function that may be leveraged to achieve a threat objective
c. Inventoried IT and OT assets are prioritized based on defined criteria that include importance to the delivery of the function
d. Prioritization criteria include consideration of the degree to which an asset within the function may be leveraged to achieve a threat objective
e. The IT and OT inventory includes attributes that support cybersecurity activities (for example, location, asset priority, asset owner, operating system, and firmware versions)
MIL3 requirements
f. The IT and OT asset inventory is complete (the inventory includes all assets within the function)
g. The IT and OT asset inventory is current, that is, it is updated periodically and according to defined triggers, such as system changes
h. Data is destroyed or securely removed from IT and OT assets prior to redeployment and at end of life
MIL1 requirements
a. IT and OT assets that are important to the delivery of the function are inventoried, at least in an ad hoc manner
MIL2 requirements
b. The IT and OT asset inventory includes assets within the function that may be leveraged to achieve a threat objective
c. Inventoried IT and OT assets are prioritized based on defined criteria that include importance to the delivery of the function
d. Prioritization criteria include consideration of the degree to which an asset within the function may be leveraged to achieve a threat objective
e. The IT and OT inventory includes attributes that support cybersecurity activities (for example, location, asset priority, asset owner, operating system, and firmware versions)
MIL3 requirements
f. The IT and OT asset inventory is complete (the inventory includes all assets within the function)
g. The IT and OT asset inventory is current, that is, it is updated periodically and according to defined triggers, such as system changes
h. Data is destroyed or securely removed from IT and OT assets prior to redeployment and at end of life
In Cyberday, requirements and controls are mapped to universal tasks. A set of tasks in the same topic create a Policy, such as this one.
In Cyberday, requirements and controls are mapped to universal tasks. Each requirement is fulfilled with one or multiple tasks.
When building an ISMS, it's important to understand the different levels of information hierarchy. Here's how Cyberday is structured.
Sets the overall compliance standard or regulation your organization needs to follow.
Break down the framework into specific obligations that must be met.
Concrete actions and activities your team carries out to satisfy each requirement.
Documented rules and practices that are created and maintained as a result of completing tasks.