Free ebook: NIS2 ready using ISO 27001 best practices
Download ebook

Learn more about the connected frameworks

GDPR

1.5.1
TISAX

Assessment of policies and requirements

18.2.2
ISO27 Full

Compliance with security policies and standards

5.36
ISO27k1 Full

Compliance with policies, rules and standards for information security

5.37
ISO27k1 Full

Documented operating procedures

CC4.1
SOC 2

Evaluation of internal controls

HAL-12
Julkri

Ohjeet

HAL-13
Julkri

Koulutukset

T-12
Katakri 2020

TURVALLISUUSKOULUTUS

T11
Katakri

Turvallisuuskoulutus ja -tietoisuus

Other tasks from the same security theme

General security guidelines for staff

Critical
High
Normal
Low

Personnel must have security guidelines that deal with e.g. the following topics:

  • Using and updating mobile devices
  • Storing and backing up data
  • Privacy
  • Using email
  • Handling of printouts, papers and files
  • Reporting incidents
  • Scam prevention
T11: Turvallisuuskoulutus ja -tietoisuus
Katakri
4 §: Tiedonhallinnan järjestäminen tiedonhallintayksikössä
TiHL
29. Processing under the authority of the controller or processor
GDPR
9.4.4: Use of privileged utility programs
ISO27 Full
11.2.7: Secure disposal or re-use of equipment
ISO27 Full

Early orientation of security guidelines for personnel

Critical
High
Normal
Low

Tietoa käsitteleville henkilöille selvitetään tietojen suojaamista ja asiakirjojen käsittelyä koskevat tietoturvaohjeet ja -periaatteet ennen pääsyä tietoihin tai organisaation tarkasti määrittelemien aikamääreiden sisällä.

HAL-11: Salassapito- ja vaitiolovelvollisuus
Julkri
HAL-14: Käyttö- ja käsittelyoikeudet
Julkri

Monitoring compliance with security guidelines

Critical
High
Normal
Low

Following security guidelines can be monitored either technically or directly by asking / testing employees.

T11: Turvallisuuskoulutus ja -tietoisuus
Katakri
29. Processing under the authority of the controller or processor
GDPR
18.2.2: Compliance with security policies and standards
ISO27 Full
HAL-12: Ohjeet
Julkri
HAL-13: Koulutukset
Julkri

Unit- or role-specific security guidelines

Critical
High
Normal
Low

The security guidelines are specified in connection with the employee's job role. The organization has identified units and roles that require separate guidance and develops its own detailed security guidelines for these.

Examples of units that may require their own guidelines are e.g. customer service, IT and HR. Examples of work roles that require their own instructions are the system administrators and the remote workers.

4 §: Tiedonhallinnan järjestäminen tiedonhallintayksikössä
TiHL
7.2.2: Information security awareness, education and training
ISO27 Full
6.1: Tietojärjestelmien käyttäjiltä vaadittava koulutus ja kokemus
Self-monitoring
6.2: Tietojärjestelmien asianmukaisen käytön kannalta tarpeelliset käyttöohjeet
Self-monitoring
PR.AT-1: Awareness
NIST

Informing about threats and guidelines related to classified information and related to work tasks

Critical
High
Normal
Low

The management of the organization must ensure that the organization has up-to-date instructions on data processing, the use of information systems, data processing rights, the implementation of data management responsibilities, the implementation of access to information rights and information security measures.

In practice, the management defines how the up-to-dateness of the instructions is ensured and to which actors the instructions apply. taking care of up-to-dateness is part of it.

It is recommended to assign the responsibility for keeping the instructions up-to-date to those actors who have overall responsibility for information security, information systems, data reserves, record keeping, decision-making related to document requests, case management and archive work.

T-04: TURVALLISUUSOHJEISTUS
Katakri 2020

Guidelines for password safety for personnel

Critical
High
Normal
Low

The organization should remind the employees that it is their responsibility to keep password and secrets safe. They should never share them with anyone, including colleagues and superiors.

They should also always lock they devices when leaving them.

No items found.

Personnel guidelines for approved devices and software

Critical
High
Normal
Low

Personnel must have guidelines that deal with the following topics:

  • Approved devices and software the employees need for work
  • Devices and software that are not required for work but still permitted
  • Devices and software that are unwanted
No items found.

Communicate Guidelines to staff

Critical
High
Normal
Low

Guidelines must be communicated to staff when a new guideline is introduced or existing guidelines are modified.

No items found.

Continuous development of guidelines

Critical
High
Normal
Low

If staff have conflicting goals with the security guidelines, they are unlikely to follow the guidelines.

The organization actively seeks to find poorly functioning guidelines and modify either the guidelines, tools or staff priorities to enable following the guidelines.

T11: Turvallisuuskoulutus ja -tietoisuus
Katakri
12.1.1: Documented operating procedures
ISO27 Full
HAL-12: Ohjeet
Julkri
5.37: Documented operating procedures
ISO27k1 Full
6.3: Information security awareness, education and training
ISO27k1 Full