Oh no! No description found. But not to worry. Read from Tasks below how to advance this topic.
1. When Classified Information is transferred outside physically protected areas, the information or the traffic is encrypted with a method approved by the competent authority to the
respective classification level. In addition to this, the information transfer procedure has
to include the identification and authentication of the recipient in a sufficiently secure way
before the recipient is getting access to the transferred Classified Information.
2. When transmission of Classified Information is confined within physically protected
areas, unencrypted transmission or encryption at a lower level may be used, based on
the outcome of a risk management process and subject to the approval of the competent
authority.
1. When Classified Information is transferred outside physically protected areas, the information or the traffic is encrypted with a method approved by the competent authority to the
respective classification level. In addition to this, the information transfer procedure has
to include the identification and authentication of the recipient in a sufficiently secure way
before the recipient is getting access to the transferred Classified Information.
2. When transmission of Classified Information is confined within physically protected
areas, unencrypted transmission or encryption at a lower level may be used, based on
the outcome of a risk management process and subject to the approval of the competent
authority.
In Cyberday, requirements and controls are mapped to universal tasks. A set of tasks in the same topic create a Policy, such as this one.
In Cyberday, requirements and controls are mapped to universal tasks. Each requirement is fulfilled with one or multiple tasks.
When building an ISMS, it's important to understand the different levels of information hierarchy. Here's how Cyberday is structured.
Sets the overall compliance standard or regulation your organization needs to follow.
Break down the framework into specific obligations that must be met.
Concrete actions and activities your team carries out to satisfy each requirement.
Documented rules and practices that are created and maintained as a result of completing tasks.