Oh no! No description found. But not to worry. Read from Tasks below how to advance this topic.
MIL1 requirements
a. Information assets that are important to the delivery of the function (for example, SCADA set points and customer information) are inventoried, at least in an ad hoc manner
MIL2 requirements
b. The information asset inventory includes information assets within the function that may be leveraged to achieve a threat objective
c. Inventoried information assets are categorized based on defined criteria that includes importance to the delivery of the function
d. Categorization criteria include consideration of the degree to which an asset within the function may be leveraged to achieve a threat objective
e. The information asset inventory includes attributes that support cybersecurity activities (for example, asset category, backup locations and frequencies, storage locations, asset owner, cybersecurity requirements)
MIL3 requirements
f. The information asset inventory is complete (the inventory includes all assets within the function)
g. The information asset inventory is current, that is, it is updated periodically and according to defined triggers, such as system changes
h. Information assets are sanitized or destroyed at end of life using techniques appropriate to their cybersecurity requirements
MIL1 requirements
a. Information assets that are important to the delivery of the function (for example, SCADA set points and customer information) are inventoried, at least in an ad hoc manner
MIL2 requirements
b. The information asset inventory includes information assets within the function that may be leveraged to achieve a threat objective
c. Inventoried information assets are categorized based on defined criteria that includes importance to the delivery of the function
d. Categorization criteria include consideration of the degree to which an asset within the function may be leveraged to achieve a threat objective
e. The information asset inventory includes attributes that support cybersecurity activities (for example, asset category, backup locations and frequencies, storage locations, asset owner, cybersecurity requirements)
MIL3 requirements
f. The information asset inventory is complete (the inventory includes all assets within the function)
g. The information asset inventory is current, that is, it is updated periodically and according to defined triggers, such as system changes
h. Information assets are sanitized or destroyed at end of life using techniques appropriate to their cybersecurity requirements
In Cyberday, requirements and controls are mapped to universal tasks. A set of tasks in the same topic create a Policy, such as this one.
In Cyberday, requirements and controls are mapped to universal tasks. Each requirement is fulfilled with one or multiple tasks.
When building an ISMS, it's important to understand the different levels of information hierarchy. Here's how Cyberday is structured.
Sets the overall compliance standard or regulation your organization needs to follow.
Break down the framework into specific obligations that must be met.
Concrete actions and activities your team carries out to satisfy each requirement.
Documented rules and practices that are created and maintained as a result of completing tasks.
