Requirement

Cyber security management

Oh no! No description found. But not to worry. Read from Tasks below how to advance this topic.

This requirement is part of the framework:  

Other requirements of the framework

No items found.
0
Cyber security management
No items found.
Risk management and leadership
Best practices
How to implement:
Cyber security management
This policy on
Cyber security management
provides a set concrete tasks you can complete to secure this topic. Follow these best practices to ensure compliance and strengthen your overall security posture.
Read below what concrete actions you can take to improve this ->

How to improve security around this topic

In Cyberday, requirements and controls are mapped to universal tasks. A set of tasks in the same topic create a Policy, such as this one.

Here's a list of tasks that help you improve your information and cyber security related to
Cyber security management
Task name
Priority
Task completes
Complete these tasks to increase your compliance in this policy.
Critical
Creation and maintenance of the information security plan report
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Creation and maintenance of the information security plan report

This task helps you comply with the following requirements

Creating and maintaining a statement of applicability
Critical
High
Normal
Low
3
requirements
Risk management and leadership
Cyber security management

Creating and maintaining a statement of applicability

This task helps you comply with the following requirements

Defining the frameworks that serve as the basis of the management system
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Defining the frameworks that serve as the basis of the management system

This task helps you comply with the following requirements

Regular review of the cyber security risk documentation
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Regular review of the cyber security risk documentation

This task helps you comply with the following requirements

Documentation of risk assessment
Critical
High
Normal
Low
5
requirements
Risk management and leadership
Cyber security management

Documentation of risk assessment

This task helps you comply with the following requirements

Provision of product information to the market surveillance authority
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Provision of product information to the market surveillance authority

This task helps you comply with the following requirements

Single point of contact for reporting vulnerabilities
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Single point of contact for reporting vulnerabilities

This task helps you comply with the following requirements

Maintaining a coordinated vulnerability disclosure policy and reporting procedure
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Maintaining a coordinated vulnerability disclosure policy and reporting procedure

This task helps you comply with the following requirements

Cybersecurity requirements related to the use of AI
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Cybersecurity requirements related to the use of AI

This task helps you comply with the following requirements

Integration of change management procedures
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Integration of change management procedures

This task helps you comply with the following requirements

No items found.
Disciplinary process for non-conformance
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Disciplinary process for non-conformance

This task helps you comply with the following requirements

No items found.
Cyber security policy and procedure compliance requirements
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Cyber security policy and procedure compliance requirements

This task helps you comply with the following requirements

No items found.
Security related policies and procedures for all assets
Critical
High
Normal
Low
3
requirements
Risk management and leadership
Cyber security management

Security related policies and procedures for all assets

This task helps you comply with the following requirements

Defining triggers for evaluating the information security management system
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Defining triggers for evaluating the information security management system

This task helps you comply with the following requirements

No items found.
Review of information security management system best practices
Critical
High
Normal
Low
2
requirements
Risk management and leadership
Cyber security management

Review of information security management system best practices

This task helps you comply with the following requirements

Defining system auditing roles and responsibilities
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Defining system auditing roles and responsibilities

This task helps you comply with the following requirements

No items found.
Reviewing security policies and procedures
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Reviewing security policies and procedures

This task helps you comply with the following requirements

No items found.
Conducting business impact analysis
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Conducting business impact analysis

This task helps you comply with the following requirements

No items found.
Creating and maintaining an asset management policy
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Creating and maintaining an asset management policy

This task helps you comply with the following requirements

No items found.
Creating and maintaining physical and environmental security policy
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Creating and maintaining physical and environmental security policy

This task helps you comply with the following requirements

No items found.
Creating and maintaining report on the review of the ICT risk management framework
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Creating and maintaining report on the review of the ICT risk management framework

This task helps you comply with the following requirements

No items found.
Develop and maintain an ICT project management policy
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Develop and maintain an ICT project management policy

This task helps you comply with the following requirements

No items found.
Requirements for creating policies
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Requirements for creating policies

This task helps you comply with the following requirements

No items found.
Establishing risk profile
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Establishing risk profile

This task helps you comply with the following requirements

No items found.
Safeguards to protect PHI
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Safeguards to protect PHI

This task helps you comply with the following requirements

No items found.
Security officer appointment and responsibilities (HIPAA)
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Security officer appointment and responsibilities (HIPAA)

This task helps you comply with the following requirements

No items found.
Evaluating compliance with HIPAA requirements
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Evaluating compliance with HIPAA requirements

This task helps you comply with the following requirements

No items found.
Establishing and maintaining the comprehensive ePHI security program
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Establishing and maintaining the comprehensive ePHI security program

This task helps you comply with the following requirements

No items found.
Protection from retaliation and intimidation
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Protection from retaliation and intimidation

This task helps you comply with the following requirements

No items found.
Protecting HIPAA rights from being waived
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Protecting HIPAA rights from being waived

This task helps you comply with the following requirements

No items found.
Implementation of policies and procedures
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Implementation of policies and procedures

This task helps you comply with the following requirements

No items found.
Policies and procedures for HIPAA compliance
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Policies and procedures for HIPAA compliance

This task helps you comply with the following requirements

No items found.
Appointing a qualified cybersecurity auditor (Malta)
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Appointing a qualified cybersecurity auditor (Malta)

This task helps you comply with the following requirements

Designation of the information security officer (Spain)
Critical
High
Normal
Low
3
requirements
Risk management and leadership
Cyber security management

Designation of the information security officer (Spain)

This task helps you comply with the following requirements

Statement of applied security measures (Spain)
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Statement of applied security measures (Spain)

This task helps you comply with the following requirements

Cybersecurity compliance requirements for essential and important entities (Spain)
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Cybersecurity compliance requirements for essential and important entities (Spain)

This task helps you comply with the following requirements

Adoption and implementation of security measures
Critical
High
Normal
Low
2
requirements
Risk management and leadership
Cyber security management

Adoption and implementation of security measures

This task helps you comply with the following requirements

Risk-based selection of security measures
Critical
High
Normal
Low
2
requirements
Risk management and leadership
Cyber security management

Risk-based selection of security measures

This task helps you comply with the following requirements

Security Plan development and implementation
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Security Plan development and implementation

This task helps you comply with the following requirements

Security contact point for critical infrastructure
Critical
High
Normal
Low
2
requirements
Risk management and leadership
Cyber security management

Security contact point for critical infrastructure

This task helps you comply with the following requirements

Development and maintenance of the Operator Security Plan (O.S.P.) (Belgium)
Critical
High
Normal
Low
2
requirements
Risk management and leadership
Cyber security management

Development and maintenance of the Operator Security Plan (O.S.P.) (Belgium)

This task helps you comply with the following requirements

Advance notification of planned cybersecurity audits
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Advance notification of planned cybersecurity audits

This task helps you comply with the following requirements

Self-declaration submission (Austria)
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Self-declaration submission (Austria)

This task helps you comply with the following requirements

Proof Obligations for Operators of Critical Infrastructure (Germany)
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Proof Obligations for Operators of Critical Infrastructure (Germany)

This task helps you comply with the following requirements

Annual cybersecurity maturity self-assessment and reporting
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Annual cybersecurity maturity self-assessment and reporting

This task helps you comply with the following requirements

Appointment of a Cyber Security Officer (Romania)
Critical
High
Normal
Low
2
requirements
Risk management and leadership
Cyber security management

Appointment of a Cyber Security Officer (Romania)

This task helps you comply with the following requirements

Registration for official communication systems
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Registration for official communication systems

This task helps you comply with the following requirements

Process for clarifying reporting obligations (Switzerland)
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Process for clarifying reporting obligations (Switzerland)

This task helps you comply with the following requirements

Cooperation with supervisory authorities
Critical
High
Normal
Low
2
requirements
Risk management and leadership
Cyber security management

Cooperation with supervisory authorities

This task helps you comply with the following requirements

Ensure the integrity of critical national information
Critical
High
Normal
Low
2
requirements
Risk management and leadership
Cyber security management

Ensure the integrity of critical national information

This task helps you comply with the following requirements

Notifying authorities of high-risk procurements
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Notifying authorities of high-risk procurements

This task helps you comply with the following requirements

Notify termination of security-sensitive activity
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Notify termination of security-sensitive activity

This task helps you comply with the following requirements

Notify start of security-sensitive activity
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Notify start of security-sensitive activity

This task helps you comply with the following requirements

Appointment and role of the Security Protection Manager
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Appointment and role of the Security Protection Manager

This task helps you comply with the following requirements

Appointment of a Chief Information Security Officer (Greece)
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Appointment of a Chief Information Security Officer (Greece)

This task helps you comply with the following requirements

Review reporting of simplified ICT risk management framework
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Review reporting of simplified ICT risk management framework

This task helps you comply with the following requirements

ICT project management procedure
Critical
High
Normal
Low
2
requirements
Risk management and leadership
Cyber security management

ICT project management procedure

This task helps you comply with the following requirements

Auditing of risk management framework
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Auditing of risk management framework

This task helps you comply with the following requirements

Creation and maintenance of governance and control framework
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Creation and maintenance of governance and control framework

This task helps you comply with the following requirements

Notification of a significant incident with cross-border and cross-sectoral impact
Critical
High
Normal
Low
2
requirements
Risk management and leadership
Cyber security management

Notification of a significant incident with cross-border and cross-sectoral impact

This task helps you comply with the following requirements

Conducting an external audit
Critical
High
Normal
Low
2
requirements
Risk management and leadership
Cyber security management

Conducting an external audit

This task helps you comply with the following requirements

Notifying the administrative body of incidents
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Notifying the administrative body of incidents

This task helps you comply with the following requirements

Appointment of a Cyber Security Officer (Lithuania)
Critical
High
Normal
Low
Appointment of a Chief Information Security Officer (Lithuania)
Critical
High
Normal
Low
Cybersecurity auditing (Lithuania)
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Cybersecurity auditing (Lithuania)

This task helps you comply with the following requirements

Technical cyber security measures (Lithuania)
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Technical cyber security measures (Lithuania)

This task helps you comply with the following requirements

Usage of data centers (Lithuania)
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Usage of data centers (Lithuania)

This task helps you comply with the following requirements

Usage of the Secure Network (Lithuania)
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Usage of the Secure Network (Lithuania)

This task helps you comply with the following requirements

Cyber Security Information System usage (Lithuania)
Critical
High
Normal
Low
3
requirements
Risk management and leadership
Cyber security management

Cyber Security Information System usage (Lithuania)

This task helps you comply with the following requirements

Providing the security managers information to a competent authority
Critical
High
Normal
Low
3
requirements
Risk management and leadership
Cyber security management

Providing the security managers information to a competent authority

This task helps you comply with the following requirements

Appointment, tasks and position of a Cyber security manager
Critical
High
Normal
Low
2
requirements
Risk management and leadership
Cyber security management

Appointment, tasks and position of a Cyber security manager

This task helps you comply with the following requirements

Assessment of conformity (Belgium)
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Assessment of conformity (Belgium)

This task helps you comply with the following requirements

Documentation of organization's dependencies on external resources
Critical
High
Normal
Low
3
requirements
Risk management and leadership
Cyber security management

Documentation of organization's dependencies on external resources

This task helps you comply with the following requirements

Strategic directions of risk response options
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Strategic directions of risk response options

This task helps you comply with the following requirements

Identify the organisation's strategy and priorities
Critical
High
Normal
Low
2
requirements
Risk management and leadership
Cyber security management

Identify the organisation's strategy and priorities

This task helps you comply with the following requirements

Recognizing and listing sensitive work fields and jobs
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Recognizing and listing sensitive work fields and jobs

This task helps you comply with the following requirements

Description of cyber security structure
Critical
High
Normal
Low
4
requirements
Risk management and leadership
Cyber security management

Description of cyber security structure

This task helps you comply with the following requirements

Monitoring and analysing effectiveness of digital operational resilience strategy
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Monitoring and analysing effectiveness of digital operational resilience strategy

This task helps you comply with the following requirements

Learning from testing operational resilience
Critical
High
Normal
Low
Adequate security principles of the organisation in terms of classified information
Critical
High
Normal
Low
2
requirements
Risk management and leadership
Cyber security management

Adequate security principles of the organisation in terms of classified information

This task helps you comply with the following requirements

Archiving and retaining outdated security documentation
Critical
High
Normal
Low
1
requirements
Risk management and leadership
Cyber security management

Archiving and retaining outdated security documentation

This task helps you comply with the following requirements

Security roles, responsibilities, and objectives derived from the organization's goals
Critical
High
Normal
Low
Kasautumisvaikutuksen huomiointi suojattavien kohteiden luokittelussa
Critical
High
Normal
Low
2
requirements
Risk management and leadership
Cyber security management

Kasautumisvaikutuksen huomiointi suojattavien kohteiden luokittelussa

This task helps you comply with the following requirements

How to comply with this requirement

In Cyberday, requirements and controls are mapped to universal tasks. Each requirement is fulfilled with one or multiple tasks.

Here's a list of tasks that help you comply with the requirement
Cyber security management
of the framework  
Task name
Priority
Task completes
Complete these tasks to increase your compliance in this policy.
Critical
No other tasks found.

The ISMS component hierachy

When building an ISMS, it's important to understand the different levels of information hierarchy. Here's how Cyberday is structured.

Framework

Sets the overall compliance standard or regulation your organization needs to follow.

Requirements

Break down the framework into specific obligations that must be met.

Tasks

Concrete actions and activities your team carries out to satisfy each requirement.

Policies

Documented rules and practices that are created and maintained as a result of completing tasks.

Never duplicate effort. Do it once - improve compliance across frameworks.

Reach multi-framework compliance in the simplest possible way
Security frameworks tend to share the same core requirements - like risk management, backup, malware, personnel awareness or access management.
Cyberday maps all frameworks’ requirements into shared tasks - one single plan that improves all frameworks’ compliance.
Do it once - we automatically apply it to all current and future frameworks.