Requirement

Malware protection

Oh no! No description found. But not to worry. Read from Tasks below how to advance this topic.

This requirement is part of the framework:  

Other requirements of the framework

No items found.
0
Malware protection
No items found.
Technical cyber security
Best practices
How to implement:
Malware protection
This policy on
Malware protection
provides a set concrete tasks you can complete to secure this topic. Follow these best practices to ensure compliance and strengthen your overall security posture.
Read below what concrete actions you can take to improve this ->

How to improve security around this topic

In Cyberday, requirements and controls are mapped to universal tasks. A set of tasks in the same topic create a Policy, such as this one.

Here's a list of tasks that help you improve your information and cyber security related to
Malware protection
Task name
Priority
Task completes
Complete these tasks to increase your compliance in this policy.
Critical
Defining requirements for malware protection
Critical
High
Normal
Low
3
requirements
Technical cyber security
Malware protection

Defining requirements for malware protection

This task helps you comply with the following requirements

Dissemination of security updates
Critical
High
Normal
Low
1
requirements
Technical cyber security
Malware protection

Dissemination of security updates

This task helps you comply with the following requirements

Publicly disclosing information about fixed vulnerabilities
Critical
High
Normal
Low
1
requirements
Technical cyber security
Malware protection

Publicly disclosing information about fixed vulnerabilities

This task helps you comply with the following requirements

Process for deleting data from products
Critical
High
Normal
Low
1
requirements
Technical cyber security
Malware protection

Process for deleting data from products

This task helps you comply with the following requirements

Product security testing
Critical
High
Normal
Low
1
requirements
Technical cyber security
Malware protection

Product security testing

This task helps you comply with the following requirements

Listing essential cybersecurity requirements, related to the product and cyber security processes
Critical
High
Normal
Low
1
requirements
Technical cyber security
Malware protection

Listing essential cybersecurity requirements, related to the product and cyber security processes

This task helps you comply with the following requirements

Unauthorized access to digital products is prevented
Critical
High
Normal
Low
1
requirements
Technical cyber security
Malware protection

Unauthorized access to digital products is prevented

This task helps you comply with the following requirements

Enabling features of anti-exploitation
Critical
High
Normal
Low
1
requirements
Technical cyber security
Malware protection

Enabling features of anti-exploitation

This task helps you comply with the following requirements

Configuring automatic anti-malware scanning of removable media
Critical
High
Normal
Low
1
requirements
Technical cyber security
Malware protection

Configuring automatic anti-malware scanning of removable media

This task helps you comply with the following requirements

Creating an allowlist for approved libraries
Critical
High
Normal
Low
2
requirements
Technical cyber security
Malware protection

Creating an allowlist for approved libraries

This task helps you comply with the following requirements

Establish a allowlist for approved scripts
Critical
High
Normal
Low
1
requirements
Technical cyber security
Malware protection

Establish a allowlist for approved scripts

This task helps you comply with the following requirements

Automatic blocking and detecting of unauthorized hardware
Critical
High
Normal
Low
2
requirements
Technical cyber security
Malware protection

Automatic blocking and detecting of unauthorized hardware

This task helps you comply with the following requirements

Protection of programs in the data processing environment from network attacks
Critical
High
Normal
Low
1
requirements
Technical cyber security
Malware protection

Protection of programs in the data processing environment from network attacks

This task helps you comply with the following requirements

Detecting and blocking access to dangerous websites
Critical
High
Normal
Low
Laitteiden liityntöjen rajoittaminen (ST III-II)
Critical
High
Normal
Low
1
requirements
Technical cyber security
Malware protection

Laitteiden liityntöjen rajoittaminen (ST III-II)

This task helps you comply with the following requirements

Disabling auto-run of software
Critical
High
Normal
Low
2
requirements
Technical cyber security
Malware protection

Disabling auto-run of software

This task helps you comply with the following requirements

Automatic file scan by malware protection software
Critical
High
Normal
Low
3
requirements
Technical cyber security
Malware protection

Automatic file scan by malware protection software

This task helps you comply with the following requirements

Automatic website scan by malware protection software
Critical
High
Normal
Low
2
requirements
Technical cyber security
Malware protection

Automatic website scan by malware protection software

This task helps you comply with the following requirements

Blacklisting
Critical
High
Normal
Low
1
requirements
Technical cyber security
Malware protection

Blacklisting

This task helps you comply with the following requirements

Haittaohjelmasuojaus tietojärjestelmissä (TL IV)
Critical
High
Normal
Low
2
requirements
Technical cyber security
Malware protection

Haittaohjelmasuojaus tietojärjestelmissä (TL IV)

This task helps you comply with the following requirements

Haittaohjelmasuojaus julkisista verkoista eristetyissä järjestelmissä (TL III)
Critical
High
Normal
Low
2
requirements
Technical cyber security
Malware protection

Haittaohjelmasuojaus julkisista verkoista eristetyissä järjestelmissä (TL III)

This task helps you comply with the following requirements

Minimize the risk posed by the software that accompanies documents
Critical
High
Normal
Low
1
requirements
Technical cyber security
Malware protection

Minimize the risk posed by the software that accompanies documents

This task helps you comply with the following requirements

Use malware systems from multiple vendors
Critical
High
Normal
Low
4
requirements
Technical cyber security
Malware protection

Use malware systems from multiple vendors

This task helps you comply with the following requirements

Informing staff about new, relevant malware
Critical
High
Normal
Low

How to comply with this requirement

In Cyberday, requirements and controls are mapped to universal tasks. Each requirement is fulfilled with one or multiple tasks.

Here's a list of tasks that help you comply with the requirement
Malware protection
of the framework  
Task name
Priority
Task completes
Complete these tasks to increase your compliance in this policy.
Critical
No other tasks found.

The ISMS component hierachy

When building an ISMS, it's important to understand the different levels of information hierarchy. Here's how Cyberday is structured.

Framework

Sets the overall compliance standard or regulation your organization needs to follow.

Requirements

Break down the framework into specific obligations that must be met.

Tasks

Concrete actions and activities your team carries out to satisfy each requirement.

Policies

Documented rules and practices that are created and maintained as a result of completing tasks.

Never duplicate effort. Do it once - improve compliance across frameworks.

Reach multi-framework compliance in the simplest possible way
Security frameworks tend to share the same core requirements - like risk management, backup, malware, personnel awareness or access management.
Cyberday maps all frameworks’ requirements into shared tasks - one single plan that improves all frameworks’ compliance.
Do it once - we automatically apply it to all current and future frameworks.