Content library
Julkri: TL IV-I
FYY-05.4: Turvallisuusalue - Pääsyoikeuksien ja avaintenhallinnan menettelyt

Requirement description

Organisaation on määriteltävä alueen pääsyoikeuksien ja avainhallinnan menettelyt ja roolit.

How to fill the requirement

Julkri: TL IV-I

FYY-05.4: Turvallisuusalue - Pääsyoikeuksien ja avaintenhallinnan menettelyt

Task name
Priority
Status
Theme
Policy
Other requirements
Avaustunnisteiden hallintakäytännöt
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Physical security
Property security
3
requirements

Examples of other requirements this task affects

F05: Avainten ja numeroyhdistelmien hallinta
Katakri
FYY-05.4: Turvallisuusalue - Pääsyoikeuksien ja avaintenhallinnan menettelyt
Julkri
F-05.2: PÄÄSYOIKEUKSIEN MYÖNTÄMINEN
Katakri 2020
See all related requirements and other information from tasks own page.
Go to >
Avaustunnisteiden hallintakäytännöt
1. Task description

Avaustunnisteet annetaan mahdollisimman harvoille henkilöille ja henkilöt osaavat numeroyhdistelmät ulkoa.

Key management and access control procedures of secure areas
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Physical security
Management of secure areas
5
requirements

Examples of other requirements this task affects

FYY-05.4: Turvallisuusalue - Pääsyoikeuksien ja avaintenhallinnan menettelyt
Julkri
ACCESS-3: Control Physical Access
C2M2
F-05.2: PÄÄSYOIKEUKSIEN MYÖNTÄMINEN
Katakri 2020
F-06.3: PÄÄSYOIKEUKSIEN MYÖNTÄMINEN
Katakri 2020
3.2: Toimitilaturvallisuus
TiHL tietoturvavaatimukset
See all related requirements and other information from tasks own page.
Go to >
Key management and access control procedures of secure areas
1. Task description

The organisation must define procedures and roles for access rights and key management in the area. Access to the area can be restricted either mechanically, electronically or based on personal identification. A responsible person shall be appointed for the area to manage the access rights and key management procedures. Spare keys for the area shall be stored securely and locked in a sealed storage envelope with a date of closure and receipt or, alternatively, in a key cabinet connected to an access control system. Keys shall be handed over in connection with the job and against receipt. The procedure is described in the security management guidelines. Access to the area is not permitted with a master key suitable for a lower level facility.

A responsible person has been appointed to ensure the following access rights and key management procedures are in place.

  • Access rights and key management procedures and roles are established, documented and instructed.
  • A list of access rights and key holders is maintained.
  • Access rights are regularly audited and kept up to date.
  • responsibility for additional orders and changes to keys and access codes is assigned.
  • key cards, unallocated keys and access codes are stored appropriately.
  • the reason for key issuance is documented.
  • keys are issued only to the person with independent access rights to the area.
  • changes in personnel are communicated to the key management authority as appropriate.

Tasks included in the policy

Task name
Priority
Status
Theme
Policy
Other requirements
No items found.

Never duplicate effort. Do it once - improve compliance across frameworks.

Reach multi-framework compliance in the simplest possible way
Security frameworks tend to share the same core requirements - like risk management, backup, malware, personnel awareness or access management.
Cyberday maps all frameworks’ requirements into shared tasks - one single plan that improves all frameworks’ compliance.
Do it once - we automatically apply it to all current and future frameworks.
Get to know Cyberday
Start your free trial
Cyberday is your all-in-one solution for building a secure and compliant organization. Whether you're setting up a cyber security plan, evaluating policies, implementing tasks, or generating automated reports, Cyberday simplifies the entire process.
With AI-driven insights and a user-friendly interface, it's easier than ever to stay ahead of compliance requirements and focus on continuous improvement.
Clear framework compliance plans
Activate relevant frameworks and turn them into actionable policies tailored to your needs.
Credible reports to proof your compliance
Use guided tasks to ensure secure implementations and create professional reports with just a few clicks.
AI-powered improvement suggestions
Focus on the most impactful improvements in your compliance with help from Cyberday AI.