Sisältökirjasto
CyberFundamentals (Belgia)

Vaatimuskehikkoon sisältyvät vaatimukset

Vaatimuksen nimi
Tunniste
Vaatimuskehikko
Tehtävät
The organization’s place in critical infrastructure and its industry sector is identified and communicated.

ID.BE-2

CyberFundamentals (Belgia)
1
Priorities for organizational mission, objectives, and activities are established and communicated.

ID.BE-3

CyberFundamentals (Belgia)
2
Dependencies and critical functions for delivery of critical services are established.

ID.BE-4

CyberFundamentals (Belgia)
3
Resilience requirements to support delivery of critical services are established for all operating states (e.g. under duress/attack, during recovery, normal operations).

ID.BE-5

CyberFundamentals (Belgia)
6
Organizational cybersecurity policy is established and communicated.

ID.GV-1

CyberFundamentals (Belgia)
6
Legal and regulatory requirements regarding cybersecurity, including privacy and civil liberties obligations, are understood, and managed.

ID.GV-3

CyberFundamentals (Belgia)
5
Governance and risk management processes address cybersecurity risks.

ID.GV-4

CyberFundamentals (Belgia)
4
Asset vulnerabilities are identified and documented.

ID.RA-1

CyberFundamentals (Belgia)
6
Cyber threat intelligence is received from information sharing forums and sources.

ID.RA-2

CyberFundamentals (Belgia)
4
Threats, vulnerabilities, likelihoods, and impacts are used to determine risk

ID.RA-5

CyberFundamentals (Belgia)
2
Risk responses are identified and prioritized.

ID.RA-6

CyberFundamentals (Belgia)
3
Risk management processes are established, managed, and agreed to by organizational stakeholders.

ID.RM-1

CyberFundamentals (Belgia)
1
Organizational risk tolerance is determined and clearly expressed.

ID.RM-2

CyberFundamentals (Belgia)
1
The organization’s determination of risk tolerance is informed by its role in critical infrastructure and sector specific risk analysis.

ID.RM-3

CyberFundamentals (Belgia)
2
Cyber supply chain risk management processes are identified, established, assessed, managed, and agreed to by organizational stakeholders.

ID.SC-1

CyberFundamentals (Belgia)
1
Suppliers and third-party partners of information systems, components, and services are identified, prioritized, and assessed using a cyber supply chain risk assessment process.

ID.SC-2

CyberFundamentals (Belgia)
2
Contracts with suppliers and third-party partners are used to implement appropriate measures designed to meet the objectives of an organization’s cybersecurity program and Cyber Supply Chain Risk Management Plan.

ID.SC-3

CyberFundamentals (Belgia)
4
Suppliers and third-party partners are routinely assessed using audits, test results, or other forms of evaluations to confirm they are meeting their contractual obligations.

ID.SC-4

CyberFundamentals (Belgia)
5
Response and recovery planning and testing are conducted with suppliers and third-party providers.

ID.SC-5

CyberFundamentals (Belgia)
2
Identities and credentials are issued, managed, verified, revoked, and audited for authorized devices, users, and processes.

PR.AC-1

CyberFundamentals (Belgia)
11
Physical access to assets is managed and protected.

PR.AC-2

CyberFundamentals (Belgia)
7
Remote access is managed.

PR.AC-3

CyberFundamentals (Belgia)
7
Access permissions and authorizations are managed, incorporating the principles of least privilege and separation of duties.

PR.AC-4

CyberFundamentals (Belgia)
8
Network integrity (network segregation, network segmentation… ) is protected.

PR.AC-5

CyberFundamentals (Belgia)
7

CyberFundamentals (Belgia)

CyberFundamentals vaatimuskehikon on luonut Centre for Cybersecurity Belgium. Se tarjoaa joukon konkreettisia toimenpiteitä, joilla voit suojata tietojasi, vähentää merkittävästi yleisimpien verkkohyökkäysten riskiä ja lisätä organisaatiosi kyberkestävyyttä. Vaatimuskehikko perustuu:

  • Neljään yleisesti käytettyyn kyberturvallisuuden viitekehykseen (NIST CSF, ISO 27001 / ISO 27002, CIS Controls ja IEC 62443).
  • Anonymisoidut historialliset tiedot onnistuneista kyberhyökkäyksistä. Jälkiasennuksen avulla pystymme arvioimaan, kuinka suurelta prosentilta aiemmista hyökkäyksistä viitekehyksen toimenpiteet suojaavat sinua.
  • Kyberperusteet on jäsennetty neljään tasoon, joista seuraava taso sisältää joka kerta hieman enemmän toimenpiteitä kuin edellinen. Aloitustaso Small, jota seuraavat Basic, Important ja Essential. Essential-taso sisältää kaikki perustietoturvatoimenpiteet edellisistä tasoista ja esittelee edistyneempiä hallintakeinoja. Essential-taso on NIS2-direktiivin mukainen.

    Vaatimuskehikon teema-alueet

    No items found.