Content library
CyberFundamentals (Belgium)
DE.CM-2: The physical environment is monitored to detect potential cybersecurity events.

Requirement description

The physical access to organization's critical systems and devices shall be, on top of the
physical access monitoring to the facility, increased through physical intrusion alarms, surveillance equipment, independent surveillance teams.
Guidance
It is recommended to log all visitors.

How to fill the requirement

CyberFundamentals (Belgium)

DE.CM-2: The physical environment is monitored to detect potential cybersecurity events.

Task name
Priority
Status
Theme
Policy
Other requirements
Visitor instructions and log
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Physical security
Property security
21
requirements

Examples of other requirements this task affects

F04: Kulkuoikeuksien hallinta
Katakri
11.1.2: Physical entry controls
ISO 27001
PR.AC-2: Physical access control
NIST
FYY-04: Tiedon säilytys
Julkri
FYY-05.5: Turvallisuusalue - Vierailijat
Julkri
See all related requirements and other information from tasks own page.
Go to >
Visitor instructions and log
1. Task description

Visitors shall have access to secure areas only with permission, after they are appropriately identified and their access rights shall be limited to the necessary facilities. All visits are recorded in the visitor log. In addition, staff have guidelines about safe operating in connection with visits.

Physical access control to building, offices and other premises
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Physical security
Property security
32
requirements

Examples of other requirements this task affects

F04: Kulkuoikeuksien hallinta
Katakri
11.1.2: Physical entry controls
ISO 27001
11.1.1: Physical security perimeter
ISO 27001
6.6.4: Fyysisten tilojen, laitteiden ja tulosteiden turvallisuus
Omavalvontasuunnitelma
PR.AC-2: Physical access control
NIST
See all related requirements and other information from tasks own page.
Go to >
Physical access control to building, offices and other premises
1. Task description

Secure areas of the organization cannot be accessed unnoticed. The premises are protected by appropriate access control. Only authorized persons have access to the secure areas.

Security services in real estates
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Physical security
Property security
13
requirements

Examples of other requirements this task affects

11.1.1: Physical security perimeter
ISO 27001
PR.AC-2: Physical access control
NIST
DE.CM-2: The physical environment monitoring
NIST
FYY-07.6: Turva-alue - tunkeutumisen ilmaisujärjestelmät - TL III
Julkri
7.1: Physical security perimeters
ISO 27001
See all related requirements and other information from tasks own page.
Go to >
Security services in real estates
1. Task description

Organisation's premises and the operating environments of the equipment are actively protected by security.

Strong authentication for processing or storage areas of highly confidential information
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Physical security
Property security
16
requirements

Examples of other requirements this task affects

11.1.1: Physical security perimeter
ISO 27001
11.1.3: Securing offices, rooms and facilities
ISO 27001
PR.AC-2: Physical access control
NIST
DE.CM-2: The physical environment monitoring
NIST
FYY-03: Tiedon käsittely
Julkri
See all related requirements and other information from tasks own page.
Go to >
Strong authentication for processing or storage areas of highly confidential information
1. Task description

Access to areas where confidential information is handled or stored should be restricted to authorized individuals through appropriate access control, e.g. using a two-step authentication mechanism such as an access card and a passcode.

Camera surveillance in real estates
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Physical security
Property security
11
requirements

Examples of other requirements this task affects

11.1.1: Physical security perimeter
ISO 27001
PR.AC-2: Physical access control
NIST
DE.CM-2: The physical environment monitoring
NIST
7.1: Physical security perimeters
ISO 27001
7.4: Physical security monitoring
ISO 27001
See all related requirements and other information from tasks own page.
Go to >
Camera surveillance in real estates
1. Task description

Security personnel use camera surveillance to verify unauthorized access, sabotage, or other alarms at the organization's premises.

Tasks included in the policy

Task name
Priority
Status
Theme
Policy
Other requirements
No items found.

Never duplicate effort. Do it once - improve compliance across frameworks.

Reach multi-framework compliance in the simplest possible way
Security frameworks tend to share the same core requirements - like risk management, backup, malware, personnel awareness or access management.
Cyberday maps all frameworks’ requirements into shared tasks - one single plan that improves all frameworks’ compliance.
Do it once - we automatically apply it to all current and future frameworks.
Get to know Cyberday
Start your free trial
Cyberday is your all-in-one solution for building a secure and compliant organization. Whether you're setting up a cyber security plan, evaluating policies, implementing tasks, or generating automated reports, Cyberday simplifies the entire process.
With AI-driven insights and a user-friendly interface, it's easier than ever to stay ahead of compliance requirements and focus on continuous improvement.
Clear framework compliance plans
Activate relevant frameworks and turn them into actionable policies tailored to your needs.
Credible reports to proof your compliance
Use guided tasks to ensure secure implementations and create professional reports with just a few clicks.
AI-powered improvement suggestions
Focus on the most impactful improvements in your compliance with help from Cyberday AI.