Requirement

Property security

Oh no! No description found. But not to worry. Read from Tasks below how to advance this topic.

This requirement is part of the framework:  

Other requirements of the framework

No items found.
0
Property security
No items found.
Physical security
Best practices
How to implement:
Property security
This policy on
Property security
provides a set concrete tasks you can complete to secure this topic. Follow these best practices to ensure compliance and strengthen your overall security posture.
Read below what concrete actions you can take to improve this ->

How to improve security around this topic

In Cyberday, requirements and controls are mapped to universal tasks. A set of tasks in the same topic create a Policy, such as this one.

Here's a list of tasks that help you improve your information and cyber security related to
Property security
Task name
Priority
Task completes
Complete these tasks to increase your compliance in this policy.
Critical
Notification process in case of loss of physical identifiers
Critical
High
Normal
Low
5
requirements
Physical security
Property security

Notification process in case of loss of physical identifiers

This task helps you comply with the following requirements

Development and implementation of physical security procedures
Critical
High
Normal
Low
3
requirements
Physical security
Property security

Development and implementation of physical security procedures

This task helps you comply with the following requirements

Protecting connections from physical tampering or damage
Critical
High
Normal
Low
2
requirements
Physical security
Property security

Protecting connections from physical tampering or damage

This task helps you comply with the following requirements

Access control to premises
Critical
High
Normal
Low
1
requirements
Physical security
Property security

Access control to premises

This task helps you comply with the following requirements

No items found.
Reviewing and revoking physical access rights
Critical
High
Normal
Low
1
requirements
Physical security
Property security

Reviewing and revoking physical access rights

This task helps you comply with the following requirements

No items found.
Physical security measures for facilities
Critical
High
Normal
Low
1
requirements
Physical security
Property security

Physical security measures for facilities

This task helps you comply with the following requirements

Environmental security
Critical
High
Normal
Low
3
requirements
Physical security
Property security

Environmental security

This task helps you comply with the following requirements

Management of supporting assets
Critical
High
Normal
Low
0
requirements
Physical security
Property security

Management of supporting assets

This task helps you comply with the following requirements

No items found.
Physical security objectives
Critical
High
Normal
Low
1
requirements
Physical security
Property security

Physical security objectives

This task helps you comply with the following requirements

Using keys and other IDs that produce electronic movement log
Critical
High
Normal
Low
5
requirements
Physical security
Property security

Using keys and other IDs that produce electronic movement log

This task helps you comply with the following requirements

Principle of layered protection
Critical
High
Normal
Low
Turvallisuusjärjestelmien sekä -laitteiden turvallisuus ja testaus
Critical
High
Normal
Low
2
requirements
Physical security
Property security

Turvallisuusjärjestelmien sekä -laitteiden turvallisuus ja testaus

This task helps you comply with the following requirements

Numeroyhdistelmien vaihtamiskäytännöt
Critical
High
Normal
Low
0
requirements
Physical security
Property security

Numeroyhdistelmien vaihtamiskäytännöt

This task helps you comply with the following requirements

No items found.
Management practices for access codes
Critical
High
Normal
Low
Avainten hallintajärjestelmä
Critical
High
Normal
Low
1
requirements
Physical security
Property security

Avainten hallintajärjestelmä

This task helps you comply with the following requirements

Definition and protection of areas designated for the handling of confidential information
Critical
High
Normal
Low
Hallinnollisen alueen suojauskäytännöt
Critical
High
Normal
Low
1
requirements
Physical security
Property security

Hallinnollisen alueen suojauskäytännöt

This task helps you comply with the following requirements

Turva-alueen suojauskäytännöt
Critical
High
Normal
Low
1
requirements
Physical security
Property security

Turva-alueen suojauskäytännöt

This task helps you comply with the following requirements

Protection practices for technical security areas
Critical
High
Normal
Low
3
requirements
Physical security
Property security

Protection practices for technical security areas

This task helps you comply with the following requirements

Access control on datacenter perimeter
Critical
High
Normal
Low
1
requirements
Physical security
Property security

Access control on datacenter perimeter

This task helps you comply with the following requirements

No items found.
Training against unauthorized ingress and egress
Critical
High
Normal
Low
1
requirements
Physical security
Property security

Training against unauthorized ingress and egress

This task helps you comply with the following requirements

No items found.
Countermeasures against compromising emanations (TEMPEST) (CL III)
Critical
High
Normal
Low
2
requirements
Physical security
Property security

Countermeasures against compromising emanations (TEMPEST) (CL III)

This task helps you comply with the following requirements

Countermeasures against compromising emanations (TEMPEST) and verification of adequacy (CL II)
Critical
High
Normal
Low
2
requirements
Physical security
Property security

Countermeasures against compromising emanations (TEMPEST) and verification of adequacy (CL II)

This task helps you comply with the following requirements

Countermeasures against compromising emanations (TEMPEST) (CL I)
Critical
High
Normal
Low
2
requirements
Physical security
Property security

Countermeasures against compromising emanations (TEMPEST) (CL I)

This task helps you comply with the following requirements

How to comply with this requirement

In Cyberday, requirements and controls are mapped to universal tasks. Each requirement is fulfilled with one or multiple tasks.

Here's a list of tasks that help you comply with the requirement
Property security
of the framework  
Task name
Priority
Task completes
Complete these tasks to increase your compliance in this policy.
Critical
No other tasks found.

The ISMS component hierachy

When building an ISMS, it's important to understand the different levels of information hierarchy. Here's how Cyberday is structured.

Framework

Sets the overall compliance standard or regulation your organization needs to follow.

Requirements

Break down the framework into specific obligations that must be met.

Tasks

Concrete actions and activities your team carries out to satisfy each requirement.

Policies

Documented rules and practices that are created and maintained as a result of completing tasks.

Never duplicate effort. Do it once - improve compliance across frameworks.

Reach multi-framework compliance in the simplest possible way
Security frameworks tend to share the same core requirements - like risk management, backup, malware, personnel awareness or access management.
Cyberday maps all frameworks’ requirements into shared tasks - one single plan that improves all frameworks’ compliance.
Do it once - we automatically apply it to all current and future frameworks.