Content library
CyberFundamentals

Requirements included in the framework

Policy
Linked frameworks
Framework
Tasks
A baseline of network operations and expected data flows for users and systems is established and managed.
DE.AE-1
CyberFundamentals (Belgium)
4
Detected events are analysed to understand attack targets and methods.
DE.AE-2
CyberFundamentals (Belgium)
4
Event data are collected and correlated from multiple sources and sensors.
DE.AE-3
CyberFundamentals (Belgium)
2
Impact of events is determined.
DE.AE-4
CyberFundamentals (Belgium)
2
Incident alert thresholds are established.
DE.AE-5
CyberFundamentals (Belgium)
2
The network is monitored to detect potential cybersecurity events.
DE.CM-1
CyberFundamentals (Belgium)
7
The physical environment is monitored to detect potential cybersecurity events.
DE.CM-2
CyberFundamentals (Belgium)
5
Personnel activity is monitored to detect potential cybersecurity events.
DE.CM-3
CyberFundamentals (Belgium)
4
Malicious code is detected.
DE.CM-4
CyberFundamentals (Belgium)
5
Unauthorized mobile code is detected.
DE.CM-5
CyberFundamentals (Belgium)
4
External service provider activity is monitored to detect potential cybersecurity events.
DE.CM-6
CyberFundamentals (Belgium)
4
Monitoring for unauthorized personnel, connections, devices, and software is performed.
DE.CM-7
CyberFundamentals (Belgium)
4
Vulnerability scans are performed.
DE.CM-8
CyberFundamentals (Belgium)
4
Detection activities comply with all applicable requirements.
DE.DP-2
CyberFundamentals (Belgium)
2
Detection processes are tested.
DE.DP-3
CyberFundamentals (Belgium)
1
Event detection information is communicated.
DE.DP-4
CyberFundamentals (Belgium)
3
Detection processes are continuously improved.
DE.DP-5
CyberFundamentals (Belgium)
3
Physical devices and systems used within the organization are inventoried.
ID.AM-1
CyberFundamentals (Belgium)
3
Software platforms and applications used within the organization are inventoried.
ID.AM-2
CyberFundamentals (Belgium)
4
Organizational communication and data flows are mapped.
ID.AM-3
CyberFundamentals (Belgium)
6
External information systems are catalogued.
ID.AM-4
CyberFundamentals (Belgium)
3
Resources are prioritized based on their classification, criticality, and business value.
ID.AM-5
CyberFundamentals (Belgium)
5
Cybersecurity roles, responsibilities, and authorities for the entire workforce and third-party stakeholders (e.g., suppliers, customers, partners) are established.
ID.AM-6
CyberFundamentals (Belgium)
2
The organization’s role in the supply chain is identified and communicated.
ID.BE-1
CyberFundamentals (Belgium)
5

Never duplicate effort. Do it once - improve compliance across frameworks.

Reach multi-framework compliance in the simplest possible way
Security frameworks tend to share the same core requirements - like risk management, backup, malware, personnel awareness or access management.
Cyberday maps all frameworks’ requirements into shared tasks - one single plan that improves all frameworks’ compliance.
Do it once - we automatically apply it to all current and future frameworks.
Get to know Cyberday
Start your free trial
Cyberday is your all-in-one solution for building a secure and compliant organization. Whether you're setting up a cyber security plan, evaluating policies, implementing tasks, or generating automated reports, Cyberday simplifies the entire process.
With AI-driven insights and a user-friendly interface, it's easier than ever to stay ahead of compliance requirements and focus on continuous improvement.
Clear framework compliance plans
Activate relevant frameworks and turn them into actionable policies tailored to your needs.
Credible reports to proof your compliance
Use guided tasks to ensure secure implementations and create professional reports with just a few clicks.
AI-powered improvement suggestions
Focus on the most impactful improvements in your compliance with help from Cyberday AI.