Choose a desired framework

ISO 27001:2022

ISO 27001 is a leading international standard focusing on information security, published by the International Organization for Standardization (ISO) in collaboration with the International Electrotechnical Commission (IEC). Both are leading international organizations that develop commonly used, international standards.

ISO 27001 has been developed to help organizations of all sizes or functionalities protect their data in a systematic and cost-effective manner by adopting an Information Security Management System (ISMS).

Not only does ISO 27001 provide organizations with the information they need to protect their critical information, but an organization can also obtain ISO 27001 certification, thereby demonstrating to its customers and partners that the organization's security is organized in a proper and systematic manner.

Cyberday content library

Cyberday unravels cyber security and privacy requirements into clear tasks, which can be delegated and clearly demonstrated as done.

Cyberday is used to show "assurance information" of implementing the task, which either mean documentation, guidelines or reports directly in Cyberday, or free descriptions of task implementation when it's executed outside of the ISMS.

Feel free to familiarize yourself with Cyberday task content. Each task has its own page, which includes a description, connected Cyberday features and related requirements that are complied with through the task.

Cybersecurity Capability Maturity Model (C2M2)

The Cybersecurity Capability Maturity Model (C2M2) helps organizations evaluate their cybersecurity capabilities and optimize security investments.

It uses a set of industry-vetted cybersecurity practices focused on both information technology (IT) and operations technology (OT) assets and environments.

General Data Protection Regulation

GDPR stands for General Data Protection Regulation. It is a law governing the processing of personal data, which came into force in all EU countries in spring 2018.

The General Data Protection Regulation sets out precise requirements for companies and organizations that collect, store and manage personal data. The requirements apply both to European organizations that process people's personal data in the EU and to non-EU organizations that process data on people living in the EU.

From an individual's perspective, GDPR provides better protection for your personal data and more control over the processing of your data.

ISO 27001:2013

ISO 27001 is a leading international standard focusing on information security, published by the International Organization for Standardization (ISO) in collaboration with the International Electrotechnical Commission (IEC). Both are leading international organizations that develop commonly used, international standards.

ISO 27001 has been developed to help organizations of all sizes or functionalities protect their data in a systematic and cost-effective manner by adopting an Information Security Management System (ISMS).

Not only does ISO 27001 provide organizations with the information they need to protect their critical information, but an organization can also obtain ISO 27001 certification, thereby demonstrating to its customers and partners that the organization's security is organized in a proper and systematic manner.

ISO 27017

ISO 27017 is a security standard developed especially for cloud service providers and users to create a safer cloud-based environment and reduce the risk of security incidents.

  • Technical tasks related to cloud environment and shared responsibilities.
  • Advanced tasks e.g. about virtualization and monitoring cloud services

ISO 27017 gives cloud-specific additions to ISO 27001, so these two frameworks should be used together.

ISO 27018

ISO 27018 is a security standard developed especially for cloud service providers to ensure risks are assessed and controls are implemented to protect personally identifiable information (PII).

  • Documentation related to processing personally identifiable information (PII).
  • Tasks related to purpose, data and retention minimization.
  • Advanced tasks related to the information security while processing PII.

ISO 27018 gives cloud-specific additions to ISO 27001, so these two frameworks should be used together.

ISO 27701

ISO 27701 is a privacy extension to ISO 27001. The framework aims to upgrade the existing Information Security Management System (ISMS) with additional requirements related to processing and protecting personal data in order to establish also a Privacy Information Management System (PIMS).

  • Documentation related to processing activities, transfers and disclosures of personal data.
  • Tasks related to data subject rights and ensuring lawfulness of processing.
  • Advanced privacy-related tasks about ensuring proper consent and filling other requirements for personal data controllers and processors.

Certifications are available for ISO 27701. As the framework extends ISO 27001, organizations seeking an ISO 27701 certification will need to have the ISO 27001 certification.

NIST Cybersecurity Framework

NIST Cybersecurity Framework is a collaborative effort coordinated by The National Institute of Standards and Technology (NIST, part of the U.S. Department of Commerce) and involving industry, academia, and government.

Framework is designed to help owners and operators of critical infrastructure to identify, assess and manage cyber risks.

  • Advanced tasks e.g. about risk management and incident detection, response and recovery.
  • Advanced documentation e.g. on information security risks
  • Generic cyber security guidelines for empoyees, priviliged users, senior management and other stakeholders.

Choose a desired policy topic

Policy
Linked frameworks
Tasks
Access control and authentication
ISO 27001
ISO 27017
ISO 27018
ISO 27701
NIST CSF
44
Agreements and monitoring
ISO 27001
GDPR
NIST CSF
ISO 27017
ISO 27701
16
Backups
ISO 27001
NIST CSF
9
Cloud service management
ISO 27001
ISO 27017
ISO 27018
Continuity management
ISO 27001
ISO 27001
NIST CSF
22
Cyber security in contracts
ISO 27001
NIST CSF
6
Cyber security management
ISO 27001
ISO 27001
NIST CSF
43
Cyber security training
ISO 27001
GDPR
NIST CSF
8
Data breach management
GDPR
NIST CSF
ISO 27701
ISO 27018
5
Data classification
ISO 27001
NIST CSF
9
Data system management
ISO 27001
NIST CSF
GDPR
22
Data transfer and disclosure
ISO 27701
GDPR
ISO 27018
9
Encryption
ISO 27001
C2M2
GDPR
NIST CSF
44
Equipment maintenance and safety
ISO 27001
ISO 27001
ISO 27017
NIST CSF
14
Incident management and response
ISO 27001
ISO 27018
NIST CSF
GDPR
23
Informing and data subject requests
GDPR
ISO 27701
ISO 27018
19
Interoperability
ISO 27017
5
Management of data sets
ISO 27001
NIST CSF
25
Management of secure areas
ISO 27001
24
Mobile device management
ISO 27001
ISO 27001
ISO 27017
NIST CSF
C2M2
15
Network security
ISO 27001
NIST CSF
C2M2
33
Non-electronic data and copies
ISO 27001
NIST CSF
12
Privacy by design and default
GDPR
ISO 27701
ISO 27018
13
Property security
ISO 27001
ISO 27001
NIST CSF
C2M2
28
Remote work
ISO 27001
NIST CSF
11
Removable media
ISO 27001
ISO 27018
NIST CSF
15
Risk management
ISO 27001
NIST CSF
GDPR
C2M2
32
Secure development
ISO 27001
ISO 27017
ISO 27018
NIST CSF
24
Security and responsibilities
GDPR
ISO 27701
11
Security guidelines
ISO 27001
GDPR
NIST CSF
5
Security systems and logging
ISO 27001
ISO 27017
NIST CSF
C2M2
29
Virtualization
NIST CSF
5

Choose a desired cyber security requirement

6
GDPR

Lawfulness of processing

2.1 (MIL2)
C2M2

Reduce Cybersecurity Vulnerabilities

1.1
C2M2

Manage IT and OT Asset Inventory

39
GDPR

Tasks of the data protection officer

8.2.1
ISO 27001

Tiedon luokittelu

7.11
ISO 27001

Supporting utilities

2.2 (MIL2)
C2M2

Respond to Threats and Share Threat Information

9.4
ISO 27017

System and application access management

38
GDPR

Position of the data protection officer

12
GDPR

Transparent information, communication and modalities for the exercise of the rights of the data subject

9.4 (MIL3)
C2M2

Implement Software Security as an Element of the Cybersecurity Architecture

A.11.10
ISO 27018

User ID management

PR.IP-1
NIST CSF

A baseline configuration of information technology systems

4.2
C2M2

Control Logical Access

1.1 (MIL1)
C2M2

Manage IT and OT Asset Inventory

PR.AC
NIST CSF

Identity Management, Authentication and Access Control

PR.IP-3
NIST CSF

Configuration change control processes

3.2
C2M2

Identify Cyber Risk

ID.AM-3
NIST CSF

Communication and data flows

8.5
ISO 27001

Secure authentication

2.3 (MIL1)
C2M2

Management Activities for the THREAT domain

5
ISO 27001

Governance

14.2.2
ISO 27001

Järjestelmään tehtävien muutosten hallintamenettelyt

6.4 (MIL1)
C2M2

Address Cybersecurity in Continuity of Operations