Toimijoiden on toteutettava kyberturvallisuutta koskevan riskienhallinnan toimintamallin mukaiset oikeasuhtaiset tekniset, operatiiviset tai organisatoriset hallintatoimenpiteet viestintäverkkojen ja tietojärjestelmien turvallisuuteen kohdistuvien riskien hallitsemiseksi ja haitallisten vaikutusten estämiseksi tai minimoimiseksi.
Toimintamallissa ja siihen perustuvissa hallintatoimenpiteissä on otettava huomioon ja pidettävä yllä ajantasaisesti henkilöstöturvallisuus ja kyberturvallisuuskoulutus.
Our organization has defined procedures for maintaining staff's cyber security awareness.These may include e.g. the following things:
Training should focus on the most relevant security aspects for each job role and include often enough the basics, which concern all employees:
All employees handling confidential information should sign a confidentiality or non-disclosure agreement before processing confidential information.
The confidentiality commitment should include, among other things:
The requirements and needs for confidentiality agreements are reviewed and updated at regular intervals.
The employment contracts specify the responsibilities of the employee and the organization for cyber security.
Contracts should include e.g.:
Our organization has defined procedures for coordinating, at the time of termination of employment, e.g..:
Our organization has defined the actions to be taken in the event of a breach of confidentiality. These may include e.g. the following steps:
At the very least, job applicants applying for key cyber security roles should be subject to background checks, taking into account relevant laws and regulations.
The check may include:
The background check may also be extended to, for example, teleworkers, contractors or other third parties. The depth of the background check can be related to the category of the accessed data.