Content library
ISO27 Full

Requirements included in the framework

Policy
Linked frameworks
Framework
Tasks
Controls against malware
12.2.1
ISO 27001 (2013): Full
11
Backup
12.3
ISO 27001 (2013): Full
7
Information backup
12.3.1
ISO 27001 (2013): Full
7
Event logging
12.4.1
ISO 27001 (2013): Full
7
Protection of log information
12.4.2
ISO 27001 (2013): Full
2
Administrator and operator logs
12.4.3
ISO 27001 (2013): Full
1
Clock synchronisation
12.4.4
ISO 27001 (2013): Full
1
Control of operational software
12.5
ISO 27001 (2013): Full
4
Installation of software on operational systems
12.5.1
ISO 27001 (2013): Full
4
Management of technical vulnerabilities
12.6.1
ISO 27001 (2013): Full
9
Restrictions on software installation
12.6.2
ISO 27001 (2013): Full
2
Information systems audit considerations
12.7
ISO 27001 (2013): Full
1
Information systems audit controls
12.7.1
ISO 27001 (2013): Full
1
Network controls
13.1.1
ISO 27001 (2013): Full
4
Security of network services
13.1.2
ISO 27001 (2013): Full
3
Segregation in networks
13.1.3
ISO 27001 (2013): Full
2
Information transfer policies and procedures
13.2.1
ISO 27001 (2013): Full
9
Agreements on information transfer
13.2.2
ISO 27001 (2013): Full
2
Electronic messaging
13.2.3
ISO 27001 (2013): Full
9
Confidentiality or non-disclosure agreements
13.2.4
ISO 27001 (2013): Full
2
Information security requirements analysis and specification
14.1.1
ISO 27001 (2013): Full
5
Securing application services on public networks
14.1.2
ISO 27001 (2013): Full
4
Protecting application services transactions
14.1.3
ISO 27001 (2013): Full
3
Secure development policy
14.2.1
ISO 27001 (2013): Full
2

Universal cyber compliance language model: Comply with confidence and least effort

In Cyberday, all frameworks’ requirements are mapped into universal tasks, so you achieve multi-framework compliance effortlessly.

Security frameworks tend to share the common core. All frameworks cover basic topics like risk management, backup, malware, personnel awareness or access management in their respective sections.
Cyberday’s universal cyber security language technology creates you a single security plan and ensures you implement the common parts of frameworks just once. You focus on implementing your plan, we automate the compliance part - for current and upcoming frameworks.
Start your free trial
Get to know Cyberday
Start your free trial
Cyberday is your all-in-one solution for building a secure and compliant organization. Whether you're setting up a cyber security plan, evaluating policies, implementing tasks, or generating automated reports, Cyberday simplifies the entire process.
With AI-driven insights and a user-friendly interface, it's easier than ever to stay ahead of compliance requirements and focus on continuous improvement.
Clear framework compliance plans
Activate relevant frameworks and turn them into actionable policies tailored to your needs.
Credible reports to proof your compliance
Use guided tasks to ensure secure implementations and create professional reports with just a few clicks.
AI-powered improvement suggestions
Focus on the most impactful improvements in your compliance with help from Cyberday AI.