Requirement

Network security

Oh no! No description found. But not to worry. Read from Tasks below how to advance this topic.

This requirement is part of the framework:  

Other requirements of the framework

No items found.
0
Network security
No items found.
Technical cyber security
Best practices
How to implement:
Network security
This policy on
Network security
provides a set concrete tasks you can complete to secure this topic. Follow these best practices to ensure compliance and strengthen your overall security posture.
Read below what concrete actions you can take to improve this ->

How to improve security around this topic

In Cyberday, requirements and controls are mapped to universal tasks. A set of tasks in the same topic create a Policy, such as this one.

Here's a list of tasks that help you improve your information and cyber security related to
Network security
Task name
Priority
Task completes
Complete these tasks to increase your compliance in this policy.
Critical
Develop network diagrams for each logically integrated system
Critical
High
Normal
Low
1
requirements
Technical cyber security
Network security

Develop network diagrams for each logically integrated system

This task helps you comply with the following requirements

No items found.
Network configuration security
Critical
High
Normal
Low
1
requirements
Technical cyber security
Network security

Network configuration security

This task helps you comply with the following requirements

No items found.
Network perimeter security and firewall governance
Critical
High
Normal
Low
1
requirements
Technical cyber security
Network security

Network perimeter security and firewall governance

This task helps you comply with the following requirements

No items found.
Secure network design and encryption measures
Critical
High
Normal
Low
1
requirements
Technical cyber security
Network security

Secure network design and encryption measures

This task helps you comply with the following requirements

No items found.
Network security and segregation
Critical
High
Normal
Low
1
requirements
Technical cyber security
Network security

Network security and segregation

This task helps you comply with the following requirements

No items found.
Fast and accurate data transmission
Critical
High
Normal
Low
1
requirements
Technical cyber security
Network security

Fast and accurate data transmission

This task helps you comply with the following requirements

No items found.
Identify and document critical telecommunication services and networks
Critical
High
Normal
Low
1
requirements
Technical cyber security
Network security

Identify and document critical telecommunication services and networks

This task helps you comply with the following requirements

Performing application layer filtering
Critical
High
Normal
Low
1
requirements
Technical cyber security
Network security

Performing application layer filtering

This task helps you comply with the following requirements

Deploying port-level access control
Critical
High
Normal
Low
1
requirements
Technical cyber security
Network security

Deploying port-level access control

This task helps you comply with the following requirements

Performing traffic filtering between network segments
Critical
High
Normal
Low
1
requirements
Technical cyber security
Network security

Performing traffic filtering between network segments

This task helps you comply with the following requirements

Deploying a network intrusion detection solution
Critical
High
Normal
Low
3
requirements
Technical cyber security
Network security

Deploying a network intrusion detection solution

This task helps you comply with the following requirements

Using of secure communication protocols and network management
Critical
High
Normal
Low
2
requirements
Technical cyber security
Network security

Using of secure communication protocols and network management

This task helps you comply with the following requirements

Centralizing network authentication, authorization, and auditing (AAA)
Critical
High
Normal
Low
1
requirements
Technical cyber security
Network security

Centralizing network authentication, authorization, and auditing (AAA)

This task helps you comply with the following requirements

Establishing and maintaining diagram(s) of architecture
Critical
High
Normal
Low
1
requirements
Technical cyber security
Network security

Establishing and maintaining diagram(s) of architecture

This task helps you comply with the following requirements

Blocking unnecessary types of files
Critical
High
Normal
Low
2
requirements
Technical cyber security
Network security

Blocking unnecessary types of files

This task helps you comply with the following requirements

Maintaining and enforcing URL filters based on network
Critical
High
Normal
Low
1
requirements
Technical cyber security
Network security

Maintaining and enforcing URL filters based on network

This task helps you comply with the following requirements

Configuring trusted DNS servers on enterprise assets
Critical
High
Normal
Low
1
requirements
Technical cyber security
Network security

Configuring trusted DNS servers on enterprise assets

This task helps you comply with the following requirements

Procedure for implementing and managing a firewall on servers
Critical
High
Normal
Low
1
requirements
Technical cyber security
Network security

Procedure for implementing and managing a firewall on servers

This task helps you comply with the following requirements

Process for secure configuration of network infrastructure
Critical
High
Normal
Low
1
requirements
Technical cyber security
Network security

Process for secure configuration of network infrastructure

This task helps you comply with the following requirements

Process for using a passive asset discovery tool
Critical
High
Normal
Low
1
requirements
Technical cyber security
Network security

Process for using a passive asset discovery tool

This task helps you comply with the following requirements

Secure hosting of systems
Critical
High
Normal
Low
1
requirements
Technical cyber security
Network security

Secure hosting of systems

This task helps you comply with the following requirements

Physically isolate the most critical subnets
Critical
High
Normal
Low
1
requirements
Technical cyber security
Network security

Physically isolate the most critical subnets

This task helps you comply with the following requirements

Ensure that maintenance of configurations, installations and operations are done securely
Critical
High
Normal
Low
1
requirements
Technical cyber security
Network security

Ensure that maintenance of configurations, installations and operations are done securely

This task helps you comply with the following requirements

Block all direct traffic between clients
Critical
High
Normal
Low
1
requirements
Technical cyber security
Network security

Block all direct traffic between clients

This task helps you comply with the following requirements

Control the data flow of exposed services
Critical
High
Normal
Low
1
requirements
Technical cyber security
Network security

Control the data flow of exposed services

This task helps you comply with the following requirements

Protect critical services with their own data flow
Critical
High
Normal
Low
1
requirements
Technical cyber security
Network security

Protect critical services with their own data flow

This task helps you comply with the following requirements

Deciding which parts of the ICT system to monitor
Critical
High
Normal
Low
1
requirements
Technical cyber security
Network security

Deciding which parts of the ICT system to monitor

This task helps you comply with the following requirements

Secure deployment of IoT devices
Critical
High
Normal
Low
1
requirements
Technical cyber security
Network security

Secure deployment of IoT devices

This task helps you comply with the following requirements

Protection of critical systems from Denial-of-Service (DoS) attacks
Critical
High
Normal
Low
3
requirements
Technical cyber security
Network security

Protection of critical systems from Denial-of-Service (DoS) attacks

This task helps you comply with the following requirements

Authenticated proxy servers for critical systems
Critical
High
Normal
Low
1
requirements
Technical cyber security
Network security

Authenticated proxy servers for critical systems

This task helps you comply with the following requirements

Determining the responsibility of network devices
Critical
High
Normal
Low
Päätelaitteiden tekninen tunnistaminen ennen verkkoon pääsyä (ST III-II)
Critical
High
Normal
Low
1
requirements
Technical cyber security
Network security

Päätelaitteiden tekninen tunnistaminen ennen verkkoon pääsyä (ST III-II)

This task helps you comply with the following requirements

Verkon rakenteellinen turvallisuus (TL IV)
Critical
High
Normal
Low
2
requirements
Technical cyber security
Network security

Verkon rakenteellinen turvallisuus (TL IV)

This task helps you comply with the following requirements

Verkon rakenteellinen turvallisuus (TL III-II)
Critical
High
Normal
Low
2
requirements
Technical cyber security
Network security

Verkon rakenteellinen turvallisuus (TL III-II)

This task helps you comply with the following requirements

Hallintayhteyksien turvallisuus
Critical
High
Normal
Low
3
requirements
Technical cyber security
Network security

Hallintayhteyksien turvallisuus

This task helps you comply with the following requirements

Palomuurisuojaus
Critical
High
Normal
Low
1
requirements
Technical cyber security
Network security

Palomuurisuojaus

This task helps you comply with the following requirements

Firewall administration policies
Critical
High
Normal
Low
3
requirements
Technical cyber security
Network security

Firewall administration policies

This task helps you comply with the following requirements

Segregation of network access related to offered cloud services
Critical
High
Normal
Low
4
requirements
Technical cyber security
Network security

Segregation of network access related to offered cloud services

This task helps you comply with the following requirements

Baseline for normal network traffic
Critical
High
Normal
Low
2
requirements
Technical cyber security
Network security

Baseline for normal network traffic

This task helps you comply with the following requirements

Remote maintenance of assets
Critical
High
Normal
Low
Tietojenkäsittely-ympäristöjen erottelu palomuurilla
Critical
High
Normal
Low
1
requirements
Technical cyber security
Network security

Tietojenkäsittely-ympäristöjen erottelu palomuurilla

This task helps you comply with the following requirements

Tietojenkäsittely-ympäristöjen erottelu
Critical
High
Normal
Low
1
requirements
Technical cyber security
Network security

Tietojenkäsittely-ympäristöjen erottelu

This task helps you comply with the following requirements

Vähimpien oikeuksien periaate verkkojen vyöhykkeistämisessä
Critical
High
Normal
Low
Kasautumisvaikutuksen huomiointi tietojenkäsittely-ympäristön suojauksessa
Critical
High
Normal
Low
1
requirements
Technical cyber security
Network security

Kasautumisvaikutuksen huomiointi tietojenkäsittely-ympäristön suojauksessa

This task helps you comply with the following requirements

Tietojenkäsittely-ympäristöjen yhdistäminen yhdyskäytäväratkaisulla (TL III)
Critical
High
Normal
Low
1
requirements
Technical cyber security
Network security

Tietojenkäsittely-ympäristöjen yhdistäminen yhdyskäytäväratkaisulla (TL III)

This task helps you comply with the following requirements

Verkon rakenteellinen turvallisuus TL II -luokan ympäristöissä (TL II)
Critical
High
Normal
Low
2
requirements
Technical cyber security
Network security

Verkon rakenteellinen turvallisuus TL II -luokan ympäristöissä (TL II)

This task helps you comply with the following requirements

Verkon rakenteellinen turvallisuus TL I -luokan ympäristöissä (TL I)
Critical
High
Normal
Low
2
requirements
Technical cyber security
Network security

Verkon rakenteellinen turvallisuus TL I -luokan ympäristöissä (TL I)

This task helps you comply with the following requirements

Järjestelmäkovennus turvallisuusluokitelluissa ympäristöissä (TL III)
Critical
High
Normal
Low
2
requirements
Technical cyber security
Network security

Järjestelmäkovennus turvallisuusluokitelluissa ympäristöissä (TL III)

This task helps you comply with the following requirements

Laitetunnistus etäkäytön yhteydessä (TL III)
Critical
High
Normal
Low
2
requirements
Technical cyber security
Network security

Laitetunnistus etäkäytön yhteydessä (TL III)

This task helps you comply with the following requirements

Etäkäyttö turvallisuuden lisävaatimkset (TL III)
Critical
High
Normal
Low
2
requirements
Technical cyber security
Network security

Etäkäyttö turvallisuuden lisävaatimkset (TL III)

This task helps you comply with the following requirements

Isolate vulnerable and low-trust equipment
Critical
High
Normal
Low
1
requirements
Technical cyber security
Network security

Isolate vulnerable and low-trust equipment

This task helps you comply with the following requirements

Redundancy solutions for networks
Critical
High
Normal
Low
2
requirements
Technical cyber security
Network security

Redundancy solutions for networks

This task helps you comply with the following requirements

Järjestelmien koventaminen käytössä olevien palveluiden minimoinnilla
Critical
High
Normal
Low
2
requirements
Technical cyber security
Network security

Järjestelmien koventaminen käytössä olevien palveluiden minimoinnilla

This task helps you comply with the following requirements

How to comply with this requirement

In Cyberday, requirements and controls are mapped to universal tasks. Each requirement is fulfilled with one or multiple tasks.

Here's a list of tasks that help you comply with the requirement
Network security
of the framework  
Task name
Priority
Task completes
Complete these tasks to increase your compliance in this policy.
Critical
No other tasks found.

The ISMS component hierachy

When building an ISMS, it's important to understand the different levels of information hierarchy. Here's how Cyberday is structured.

Framework

Sets the overall compliance standard or regulation your organization needs to follow.

Requirements

Break down the framework into specific obligations that must be met.

Tasks

Concrete actions and activities your team carries out to satisfy each requirement.

Policies

Documented rules and practices that are created and maintained as a result of completing tasks.

Never duplicate effort. Do it once - improve compliance across frameworks.

Reach multi-framework compliance in the simplest possible way
Security frameworks tend to share the same core requirements - like risk management, backup, malware, personnel awareness or access management.
Cyberday maps all frameworks’ requirements into shared tasks - one single plan that improves all frameworks’ compliance.
Do it once - we automatically apply it to all current and future frameworks.