Content library
Technical vulnerability management
Performing root cause analysis on security vulnerabilities

Other tasks from the same security theme

Task name
Priority
Status
Theme
Policy
Other requirements
The goals of threat intelligence and the collection of information related to information security threats
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Development and cloud
Technical vulnerability management
8
requirements

Examples of other requirements this task affects

5.7: Threat intelligence
ISO 27001
77: Menettely toimintaympäristön seuraamiseen
Digiturvan kokonaiskuvapalvelu
Article 13: Learning and evolving
DORA
4.1: Tietojärjestelmien tietoturvallisuus
TiHL tietoturvavaatimukset
ID.RA-2: Cyber threat intelligence is received from information sharing forums and sources.
CyberFundamentals
See all related requirements and other information from tasks own page.
Go to >
The goals of threat intelligence and the collection of information related to information security threats
1. Task description

Organization carries out threat intelligence by gathering information about information security threats related to its operations and how to protect against them. The goal is to increase awareness of the threat environment, so that own security level can be better evaluated and adequate control measures implemented.

When collecting threat intelligence, all three levels must be taken into account:

  • strategic threat intelligence (e.g. information on the growing types of attackers and attacks)
  • tactical threat intelligence (e.g. information about tools and technologies used in attacks)
  • operational threat intelligence (e.g. details of specific attacks)

Principles related to threat intelligence should include:

  • setting targets for threat intelligence
  • identification, verification and selection of information sources used in threat intelligence
  • gathering threat intelligence
  • data processing for analysis (e.g. translation, formatting, compression)
Process for managing technical vulnerabilities
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Development and cloud
Technical vulnerability management
36
requirements

Examples of other requirements this task affects

12.6.1: Management of technical vulnerabilities
ISO 27001
14.2.1: Secure development policy
ISO 27001
ID.RA-1: Asset vulnerabilities
NIST
PR.IP-12: Vulnerability management plan
NIST
RS.AN-5: Vulnerability management process
NIST
See all related requirements and other information from tasks own page.
Go to >
Process for managing technical vulnerabilities
1. Task description

The organization has defined a process for addressing identified technical vulnerabilities.

Some vulnerabilities can be fixed directly, but vulnerabilities that have a significant impact should also be documented as security incidents. Once a vulnerability with significant impacts has been identified:

  • risks related to the vulnerability and the necessary actions are identified (e.g. patching the system or other management tasks)
  • necessary actions are scheduled
  • all actions taken are documented
Regulalry conducting threat-led penetration testing (TLPT)
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Development and cloud
Technical vulnerability management
1
requirements

Examples of other requirements this task affects

Article 26: Advanced testing of ICT tools, systems and processes based on TLPT
DORA
See all related requirements and other information from tasks own page.
Go to >
Regulalry conducting threat-led penetration testing (TLPT)
1. Task description

Organization has a process for regulalry conducting threat-led penetration testing (TLPT).

TLPT process fills the following requirements:

  1. Frequency: Financial entities are required to conduct advanced TLPT by default every three years.
  2. Scope: Each TLPT must cover several or all critical or important functions of the entity and must be conducted on live production systems that support these functions.
  3. Inclusion of third-party ICT providers: If critical functions are outsourced to third-party ICT service providers, these providers must be included in the TLPT.
  4. Vulnerability mitigation: Entities must (in collaboration with third-party providers and testers) apply effective risk management controls to mitigate potential impacts on data, assets, and operations.
  5. Test reporting: Upon completing the testing, entities must provide a summary of findings and remediation plans to the designated authority.
  6. Tester requirements: Entities must engage testers as specified in the regulations, using external testers periodically (every three tests) unless classified as significant, in which case only external testers must be used.
Regularly conducting penetration testing with predefined goals and scope
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Development and cloud
Technical vulnerability management
4
requirements

Examples of other requirements this task affects

3.4.1: Plan penetration testing with defined goals and scope
NSM ICT-SP
3.4.2: Involve relevant stakeholders in advance
NSM ICT-SP
3.4.4: Perform regular penetration testing (at least annually) to identify vulnerabilities
NSM ICT-SP
See all related requirements and other information from tasks own page.
Go to >
Regularly conducting penetration testing with predefined goals and scope
1. Task description

Penetration testing should have clearly defined goals and scope. The goals may include, e.g., testing continuity plans and capabilities, assessing security controls or identifying security weaknesses. The scope can be defined as follows:

  • - Identify critical parts of the information system that should be prioritized during testing.
  • - Identify individual systems or components that are so vital they must be excluded from testing.

Vital systems or components that could be excluded, e.g., include those essential for maintaining critical organizational services or those unable to withstand the stress of a penetration test.

During the planning phase, it is important to involve relevant stakeholders in advance. This often means informing external system monitoring providers prior to testing, though it may not be necessary to inform users or system management personnel.

Penetration testing should be conducted regularly, at least annually. It should be performed both from outside the organization's network perimeter and from within. Testing from the outside simulates an external attack (black box and white box), while testing from the inside simulates potential threats from compromised clients/servers or malicious insiders (grey box).

The results of penetration tests should always be documented.

Monitoring of technical vulnerability communications
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Development and cloud
Technical vulnerability management
3
requirements

Examples of other requirements this task affects

50: Teknisten haavoittuvuuksien seuranta
Digiturvan kokonaiskuvapalvelu
THREAT-1: Reduce Cybersecurity Vulnerabilities
C2M2
9.3 §: Tietojärjestelmien hankinta ja kehittäminen
Kyberturvallisuuslaki
See all related requirements and other information from tasks own page.
Go to >
Monitoring of technical vulnerability communications
1. Task description

The organization monitors information about technical vulnerabilities of the information systems in use. When relevant technical vulnerabilities are detected, the organization takes action according to the planned operating model.

Regular analysis and utilization of information related to information security threats
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Development and cloud
Technical vulnerability management
11
requirements

Examples of other requirements this task affects

5.7: Threat intelligence
ISO 27001
23: Häiriöiden- ja poikkeamienhallintaprosessi
Digiturvan kokonaiskuvapalvelu
THREAT-2: Respond to Threats and Share Threat Information
C2M2
Article 13: Learning and evolving
DORA
3.1.2: Subscribe to vulnerability intelligence services
NSM ICT-SP
See all related requirements and other information from tasks own page.
Go to >
Regular analysis and utilization of information related to information security threats
1. Task description

Organization carries out threat intelligence by analyzing and utilizing collected information about relevant cyber security threats related and corresponding protections.

When analyzing and utilizing the collected threat intelligence information, the following points must be taken into account:

  • analyzing how the threat intelligence information relates to to our own operations
  • analyzing how relevant threat intelligence information is to our operations
  • communicating and sharing information in an understandable form to relevant persons
  • utilizing the findings of threat intelligence to determine the adequacy of technical protections, technologies used and information security testing methods for analysis
Maintaining system hardening
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Development and cloud
Technical vulnerability management
2
requirements

Examples of other requirements this task affects

TEK-10.2: Järjestelmäkovennus - kovennusten varmistaminen koko elinkaaren ajan
Julkri
I-08: VÄHIMMÄISTOIMINTOJEN JA VÄHIMPIEN OIKEUKSIEN PERIAATE – JÄRJESTELMÄKOVENNUS
Katakri 2020
See all related requirements and other information from tasks own page.
Go to >
Maintaining system hardening
1. Task description

The validity and effectiveness of used hardening is maintained throughout the whole life cycle of the data system.

Säännöllinen kattava haavoittuvuusskannaus (TL III)
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Development and cloud
Technical vulnerability management
2
requirements

Examples of other requirements this task affects

TEK-19.2: Ohjelmistohaavoittuvuuksien hallinta - TL III
Julkri
I-19: TIETOJENKÄSITTELY-YMPÄRISTÖN SUOJAUS KOKO ELINKAAREN AJAN – OHJELMISTOHAAVOITTUVUUKSIEN HALLINTA
Katakri 2020
See all related requirements and other information from tasks own page.
Go to >
Säännöllinen kattava haavoittuvuusskannaus (TL III)
1. Task description

Tietojenkäsittely-ympäristön laitteet tarkastetaan kattavasti ohjelmistohaavoittuvuuksien varalta vähintään puolivuosittain ja merkittävien muutosten yhteydessä. Prosessissa on huomioitu seuraavat seikat:

  • Verkko ja sen palvelut, palvelimet sekä verkkoon kytketyt työasemat, kannettavat tietokoneet, tulostimet, mobiililaitteet ja vastaavat tarkastetaan kattavasti vähintään (haavoittuvuusskannaus, CMDB jne.) vuosittain ja aina merkittävien muutosten jälkeen päivitysmenettelyjen korjauskohteiden löytämiseksi.
  • Laitteisto- ja ohjelmistokirjanpidon (ml. CMDB) sekä skannausohjelmiston ajantasaisuudesta ja tietoturvallisuudesta on huolehdittu.

"Merkittäviin muutoksiin" voidaan laskea esim. verkkotopologian muutokset, uusien järjestelmien käyttöönotot ja/tai vanhojen service pack -tason päivitykset sekä palomuurien ja vastaavien suodatussääntöjen merkittävät muutokset.

Säännöllinen kattava haavoittuvuusskannaus (TL IV)
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Development and cloud
Technical vulnerability management
2
requirements

Examples of other requirements this task affects

TEK-19.1: Ohjelmistohaavoittuvuuksien hallinta
Julkri
I-19: TIETOJENKÄSITTELY-YMPÄRISTÖN SUOJAUS KOKO ELINKAAREN AJAN – OHJELMISTOHAAVOITTUVUUKSIEN HALLINTA
Katakri 2020
See all related requirements and other information from tasks own page.
Go to >
Säännöllinen kattava haavoittuvuusskannaus (TL IV)
1. Task description

Tietojenkäsittely-ympäristön laitteet tarkastetaan kattavasti ohjelmistohaavoittuvuuksien varalta vähintään vuosittain ja merkittävien muutosten yhteydessä. Prosessissa on huomioitu seuraavat seikat:

  • Verkko ja sen palvelut, palvelimet sekä verkkoon kytketyt työasemat, kannettavat tietokoneet, tulostimet, mobiililaitteet ja vastaavat tarkastetaan kattavasti vähintään (haavoittuvuusskannaus, CMDB jne.) vuosittain ja aina merkittävien muutosten jälkeen päivitysmenettelyjen korjauskohteiden löytämiseksi.
  • Laitteisto- ja ohjelmistokirjanpidon (ml. CMDB) sekä skannausohjelmiston ajantasaisuudesta ja tietoturvallisuudesta on huolehdittu.

"Merkittäviin muutoksiin" voidaan laskea esim. verkkotopologian muutokset, uusien järjestelmien käyttöönotot ja/tai vanhojen service pack -tason päivitykset sekä palomuurien ja vastaavien suodatussääntöjen merkittävät muutokset.

Regular testing of the vulnerability management process
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Development and cloud
Technical vulnerability management
8
requirements

Examples of other requirements this task affects

DE.DP-3: Detection processes testing
NIST
TEK-19: Ohjelmistohaavoittuvuuksien hallinta
Julkri
I-19: TIETOJENKÄSITTELY-YMPÄRISTÖN SUOJAUS KOKO ELINKAAREN AJAN – OHJELMISTOHAAVOITTUVUUKSIEN HALLINTA
Katakri 2020
DE.DP-3: Detection processes are tested.
CyberFundamentals
RS.AN-5: Processes are established to receive, analyse, and respond to vulnerabilities disclosed to the organization from internal and external sources.
CyberFundamentals
See all related requirements and other information from tasks own page.
Go to >
Regular testing of the vulnerability management process
1. Task description

The vulnerability management process is regularly tested at intervals specified by the organization to ensure that it is up-to-date, functional, and effective.

Hardening of virtual machines utilized in cloud service offering
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Development and cloud
Technical vulnerability management
2
requirements

Examples of other requirements this task affects

CLD 9.5.2: Virtual machine hardening
ISO 27017
See all related requirements and other information from tasks own page.
Go to >
Hardening of virtual machines utilized in cloud service offering
1. Task description

Hardening is the practice of reducing system vulnerability by reducing its attack surface.

When configuring virtual machines the organization has to make sure the machines are hardened by, for example, only using ports, protocols and services that are needed. There must also be technical security measures like anti-malware and logging enabled for all virtual machines.

Defining metrics related to vulnerability management
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Development and cloud
Technical vulnerability management
3
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Defining metrics related to vulnerability management
1. Task description

The organization needs to define Monitored Metrics for identifying and correcting vulnerabilities. Meters must be monitored at specified intervals.

Prioritization of identified technical vulnerabilities and remediation goals
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Development and cloud
Technical vulnerability management
6
requirements

Examples of other requirements this task affects

4.1: Tietojärjestelmien tietoturvallisuus
TiHL tietoturvavaatimukset
3.1.1: Conduct regular vulnerability assessments
NSM ICT-SP
See all related requirements and other information from tasks own page.
Go to >
Prioritization of identified technical vulnerabilities and remediation goals
1. Task description

The organization must have a clear model for prioritizing identified technical vulnerabilities. The operating model should not be entirely new invention, but should be based on generally accepted practices.

Vulnerabilities should be prioritized based on the risk they pose, the importance of the assets involved, the potential organizational impact, and the urgency (taking into account the CVSS value).

Automating the handling of technical vulnerabilities
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Development and cloud
Technical vulnerability management
4
requirements

Examples of other requirements this task affects

RS.AN-5: Processes are established to receive, analyse, and respond to vulnerabilities disclosed to the organization from internal and external sources.
CyberFundamentals
2.3.1: Establish centrally managed practices for security updates
NSM ICT-SP
See all related requirements and other information from tasks own page.
Go to >
Automating the handling of technical vulnerabilities
1. Task description

The organization must develop a process to automate the treatment of technical vulnerabilities.

Regular penetration testing
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Development and cloud
Technical vulnerability management
23
requirements

Examples of other requirements this task affects

12.6.1: Management of technical vulnerabilities
ISO 27001
14.2.8: System security testing
ISO 27001
18.2.3: Technical compliance review
ISO 27001
DE.CM-8: Vulnerability scans
NIST
5.36: Compliance with policies, rules and standards for information security
ISO 27001
See all related requirements and other information from tasks own page.
Go to >
Regular penetration testing
1. Task description

Static scans on code are the first step in detecting risky vulnerabilities. However, once a service has been deployed, it is vulnerable to new types of attacks (e.g., cross-site scripting or authentication issues). These can be identified by penetration testing.

Ohjelmistohaavoittuvuuksien säännöllinen tarkastelu (ST III-II)
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Development and cloud
Technical vulnerability management
1
requirements

Examples of other requirements this task affects

I23: Ohjelmistohaavoittuvuuksien hallinta
Katakri
See all related requirements and other information from tasks own page.
Go to >
Ohjelmistohaavoittuvuuksien säännöllinen tarkastelu (ST III-II)
1. Task description

Ohjelmistohaavoittuvuuksien hallitsemiseksi suojaustasoilla III-II toteutetaan seuraavat toimenpiteet:

  • Verkko ja sen palvelut, palvelimet sekä verkkoon kytketyt työasemat, kannettavat tietokoneet ja vastaavat tarkastetaan vähintään (haavoittuvuusskannaus, CMDB, jne.) puolivuosittain ja aina merkittävien muutosten jälkeen päivitysmenettelyjen korjauskohteiden löytämiseksi.
  • Säännöllisesti (esim. kuukausittain) tarkastellaan keskitetyistä päivityksenjakopalveluista päivitysten asentumisen onnistumista.

Merkittäviä muutoksia ovat mm. verkkotopologian muutokset, uusien järjestelmien käyttöönotot, vanhojen järjestelmien merkittävät päivitykset sekä palomuurien ja vastaavien suodatussääntöjen merkittävät muutokset.

Ohjelmistohaavoittuvuuksien säännöllinen tarkastelu (ST IV)
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Development and cloud
Technical vulnerability management
1
requirements

Examples of other requirements this task affects

I23: Ohjelmistohaavoittuvuuksien hallinta
Katakri
See all related requirements and other information from tasks own page.
Go to >
Ohjelmistohaavoittuvuuksien säännöllinen tarkastelu (ST IV)
1. Task description

Ohjelmistohaavoittuvuuksien hallitsemiseksi suojaustasolla IV toteutetaan seuraavat toimenpiteet:

  • Verkko ja sen palvelut, palvelimet sekä verkkoon kytketyt työasemat, kannettavat tietokoneet ja vastaavat tarkastetaan vähintään (haavoittuvuusskannaus, CMDB, jne.) vuosittain ja aina merkittävien muutosten jälkeen päivitysmenettelyjen korjauskohteiden löytämiseksi.
  • Säännöllisesti (esim. kuukausittain) tarkastellaan keskitetyistä päivityksenjakopalveluista päivitysten asentumisen onnistumista.

Merkittäviä muutoksia ovat mm. verkkotopologian muutokset, uusien järjestelmien käyttöönotot, vanhojen järjestelmien merkittävät päivitykset sekä palomuurien ja vastaavien suodatussääntöjen merkittävät muutokset.

Selecting and tracking data sources for vulnerability information
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Development and cloud
Technical vulnerability management
11
requirements

Examples of other requirements this task affects

12.6.1: Management of technical vulnerabilities
ISO 27001
I23: Ohjelmistohaavoittuvuuksien hallinta
Katakri
DE.CM-8: Vulnerability scans
NIST
TEK-19: Ohjelmistohaavoittuvuuksien hallinta
Julkri
8.8: Management of technical vulnerabilities
ISO 27001
See all related requirements and other information from tasks own page.
Go to >
Selecting and tracking data sources for vulnerability information
1. Task description

Information sources for software and other technologies have been consciously identified to identify and maintain information about technical vulnerabilities that are relevant to us (e.g. authorities or hardware and software manufacturers). Data sources are evaluated and updated as new useful sources are found.

Vulnerabilities can be found directly in the vendor systems we exploit or in the open source components exploited by many of our systems. It’s important to keep track of multiple sources to get the essential information obtained.

Initial treatment of identified technical vulnerabilities
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Development and cloud
Technical vulnerability management
17
requirements

Examples of other requirements this task affects

12.6.1: Management of technical vulnerabilities
ISO 27001
ID.RA-1: Asset vulnerabilities
NIST
PR.IP-12: Vulnerability management plan
NIST
RS.AN-5: Vulnerability management process
NIST
RS.MI-3: New vulnerability mitigation
NIST
See all related requirements and other information from tasks own page.
Go to >
Initial treatment of identified technical vulnerabilities
1. Task description

We have defined the rules for responding to identified vulnerabilities. The rules may include e.g. the following things:

  • who are part of a quick-response team that is ready to respond to vulnerabilities
  • the person locating the vulnerability immediately informs the entire team down the agreed channel
  • the team determines the severity of the vulnerability (low, medium, high) based on predefined criteria
  • the team decides whether to continue processing as a security breach (more urgently) or under general change management
  • the necessary individuals are selected to continue addressing the vulnerability

Vulnerabilities related to high-risk data systems are always of high severity and are addressed first.

Regular vulnerability scanning
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Development and cloud
Technical vulnerability management
31
requirements

Examples of other requirements this task affects

12.6.1: Management of technical vulnerabilities
ISO 27001
14.2.8: System security testing
ISO 27001
18.2.3: Technical compliance review
ISO 27001
6.5: Tietojärjestelmien asennus, ylläpito ja päivitys
Omavalvontasuunnitelma
ID.RA-1: Asset vulnerabilities
NIST
See all related requirements and other information from tasks own page.
Go to >
Regular vulnerability scanning
1. Task description

The organization regularly conducts a vulnerability scan, which searches for vulnerabilities found on computers, workstations, mobile devices, networks or applications. It is important to scan even after significant changes.

It should be noted that vulnerable source code can be from operating system software, server applications, user applications, as well as from the firmware application as well as from drivers, BIOS and separate management interfaces (e.g. iLo , iDrac). In addition to software errors, vulnerabilities occur from configuration errors and old practices, such as the use of outdated encryption algorithms.

Anticipating capacity-related problems
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Development and cloud
Technical vulnerability management
11
requirements

Examples of other requirements this task affects

11.2.2: Supporting utilities
ISO 27001
12.1.3: Capacity management
ISO 27001
PR.DS-4: Availability
NIST
TEK-22: Tietojärjestelmien saatavuus
Julkri
7.11: Supporting utilities
ISO 27001
See all related requirements and other information from tasks own page.
Go to >
Anticipating capacity-related problems
1. Task description

The operation of information systems may depend on certain key resources, such as server capacity, file storage capacity, data processing capacity, monitoring capacity or certain key persons.

In particular, some of these resources may have long delivery times or high costs in certain situations, in which case special attention must be paid to future capacity problems with them.

We monitor the use of key system resources and identify trends, potential security bottlenecks and dependencies on important people.

Authorized users and rules for installing software and libraries
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Development and cloud
Technical vulnerability management
14
requirements

Examples of other requirements this task affects

12.6.2: Restrictions on software installation
ISO 27001
DE.CM-5: Unauthorized mobile code detection
NIST
SUM-02: Keeping licensed software up to date
Cyber Essentials
TEK-17: Muutoshallintamenettelyt
Julkri
8.19: Installation of software on operational systems
ISO 27001
See all related requirements and other information from tasks own page.
Go to >
Authorized users and rules for installing software and libraries
1. Task description

Unmanaged installations of software on computers can lead to vulnerabilities and security breaches.

The organization should determine what types of software or updates each user can install. The instructions may include e.g. the following guidelines:

  • only specially designated persons may install new software on the devices
  • programs previously designated as secure may be installed by anyone
  • use of certain software may be impossible for everyone
  • existing software updates and security patches are allowed to be installed by anyone
Separation of critical environments
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Development and cloud
Technical vulnerability management
8
requirements

Examples of other requirements this task affects

13.1.3: Segregation in networks
ISO 27001
PR.AC-5: Network integrity
NIST
8.22: Segregation of networks
ISO 27001
2.3.1: Establish centrally managed practices for security updates
NSM ICT-SP
See all related requirements and other information from tasks own page.
Go to >
Separation of critical environments
1. Task description

Isolate technical environments where the consequences can be very damaging.

Personnel support for chosen resilience testing operations
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Development and cloud
Technical vulnerability management
1
requirements

Examples of other requirements this task affects

Article 25: Testing of ICT tools and systems
DORA
See all related requirements and other information from tasks own page.
Go to >
Personnel support for chosen resilience testing operations
1. Task description

Organization's resilience testing programme is prepared for providing all the necessary supporting expert work for the chosen resilience testing operations. This may include e.g. performance testing, end-to-end testing, penetration testing or source code reviews.

Related resilience testing operations can e.g. include vulnerability scans, other scanning software use, network security assements, physical security reviews or other kinds of gap analyses.

TLPT tester requirements
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Development and cloud
Technical vulnerability management
1
requirements

Examples of other requirements this task affects

Article 27: Requirements for testers for the carrying out of TLPT
DORA
See all related requirements and other information from tasks own page.
Go to >
TLPT tester requirements
1. Task description

The testing organisation used for threat-led penetration testing should meet at least the following requirements:

  • Highest suitability and reputability for the task
  • Have technical and organisatory capabilities especially in threat intelligence, penetration testing and red teaming
  • Are certified in a EU member state
  • They provice an audit report in relation to management of risks related to carrying out the testing
  • They are fully covered by relevant insurances including against risks of misconduct and negligence

In the case of using internal testers along with the list above they should be:

  • Approved by competent authority
  • Authority has confirmed the organisation has sufficient resources to perform the testing and conflicts of interest are avoided
  • Threat intelligence provider must be external from the entity

In contracts with the tester management of results and any data processing do not create risks to the organisation.


Assessments for defining the scope for threat-led penetration testing (TLPT)
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Development and cloud
Technical vulnerability management
2
requirements

Examples of other requirements this task affects

Article 26: Advanced testing of ICT tools, systems and processes based on TLPT
DORA
See all related requirements and other information from tasks own page.
Go to >
Assessments for defining the scope for threat-led penetration testing (TLPT)
1. Task description

Organization carries out threat-led penetration testing. Each test needs to cover multiple critical or important functions of the related financial entity.

To properly define the proportionate scope for TLPT:

  • Financial entities shall identify relevant ICT systems, processes and technologies supporting critical or important functions
  • Financial entities shall assess which of these need to be covered by the TLPT

The result of this assessment shall determine the precise scope of TLPT and shall be validated by the competent authorities.

Defining a patch management process
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Development and cloud
Technical vulnerability management
2
requirements

Examples of other requirements this task affects

5.2.5: Vulnerability management
TISAX
See all related requirements and other information from tasks own page.
Go to >
Defining a patch management process
1. Task description

The organisation should have an adequate patch management procedure defined and implemented. This should include the testing and installation of patches.

There should measures to minimize the risk related to patch management and verification of successful installation of patches.

The patch management should be automated when possible (for example operating system updates).

The patch management process should take into account the requirements set by frameworks or other requiremetns they need to comply with.

Regularly conducting penetration testing with predefined goals and scope
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Development and cloud
Technical vulnerability management
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Regularly conducting penetration testing with predefined goals and scope
1. Task description

Penetration testing should have clearly defined goals and scope. The goals may include, e.g., testing continuity plans and capabilities, assessing security controls or identifying security weaknesses. The scope can be defined as follows:

  • - Identify critical parts of the information system that should be prioritized during testing.
  • - Identify individual systems or components that are so vital they must be excluded from testing.

Vital systems or components that could be excluded, e.g., include those essential for maintaining critical organizational services or those unable to withstand the stress of a penetration test.

During the planning phase, it is important to involve relevant stakeholders in advance. This often means informing external system monitoring providers prior to testing, though it may not be necessary to inform users or system management personnel.

Penetration testing should be conducted regularly, at least annually. It should be performed both from outside the organization's network perimeter and from within. Testing from the outside simulates an external attack (black box and white box), while testing from the inside simulates potential threats from compromised clients/servers or malicious insiders (grey box).

The results of penetration tests should always be documented.

Regularly conducting penetration testing with predefined goals and scope
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Development and cloud
Technical vulnerability management
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Regularly conducting penetration testing with predefined goals and scope
1. Task description

Penetration testing should have clearly defined goals and scope. The goals may include, e.g., testing continuity plans and capabilities, assessing security controls or identifying security weaknesses. The scope can be defined as follows:

  • - Identify critical parts of the information system that should be prioritized during testing.
  • - Identify individual systems or components that are so vital they must be excluded from testing.

Vital systems or components that could be excluded, e.g., include those essential for maintaining critical organizational services or those unable to withstand the stress of a penetration test.

During the planning phase, it is important to involve relevant stakeholders in advance. This often means informing external system monitoring providers prior to testing, though it may not be necessary to inform users or system management personnel.

Penetration testing should be conducted regularly, at least annually. It should be performed both from outside the organization's network perimeter and from within. Testing from the outside simulates an external attack (black box and white box), while testing from the inside simulates potential threats from compromised clients/servers or malicious insiders (grey box).

The results of penetration tests should always be documented.

Communicating the results of penetration tests
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Development and cloud
Technical vulnerability management
1
requirements

Examples of other requirements this task affects

3.4.6: Communicate the results of penetration tests to relevant stakeholders
NSM ICT-SP
See all related requirements and other information from tasks own page.
Go to >
Communicating the results of penetration tests
1. Task description

The results and reports of penetration tests should be communicated to relevant stakeholders. These tests should be documented with at least a summary, a list of findings, and suggested improvements.

Use of of vulnerability scanning and attack tools
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Development and cloud
Technical vulnerability management
1
requirements

Examples of other requirements this task affects

3.4.3: Use vulnerability scanning tools and attack tools
NSM ICT-SP
See all related requirements and other information from tasks own page.
Go to >
Use of of vulnerability scanning and attack tools
1. Task description

The organization should used vulnerability scanning tools as the main tool for regular vulnerability scanning process.

In addition organization should use attack tools to test those vulnerabilities found with the scanning tool.

Process for vulnerability remediation
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Development and cloud
Technical vulnerability management
2
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Process for vulnerability remediation
1. Task description

The organization has defined processes for addressing identified vulnerabilities.

These processes should include at least the following:

  • Identifying risks related to the vulnerability and the necessary actions (e.g. patching the system or other management tasks)
  • Necessary actions are scheduled
  • All actions taken are documented

The organization performs the actions necessary to prevent the vulnerability within the time limit set by the competent cyber incident prevention institution, but no later than 90 days after receiving the information, and informs the competent cyber incident prevention institution about the progress of the vulnerability prevention.

If, due to objective reasons, it is not possible to eliminate the vulnerability within the time limit specified, at the request of the organization, the cyber incident prevention institution may extend the deadline for the elimination of the vulnerability, but not more than 180 days from the moment of submitting the vulnerability detection report, by informing about it in the vulnerability detection report the submitter.

Standards for submitting vulnerability reports
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Development and cloud
Technical vulnerability management
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Standards for submitting vulnerability reports
1. Task description

The organization should have documented processes and templates for reporting detected vulnerabilities.

The vulnerability detection reports should be submitted immediately to the competent cyber incident prevention institution, and no longer than five days after detecting the vulnerability.

The detection report should include the following information:

  • Date and time of detection of vulnerability (if possible);
  • Information about the information system or electronic communication network in which a vulnerability has been detected;
  • A description of the vulnerability;
  • A description of the methodology used to detect the vulnerability or the sequence of actions performed;
  • Contact information of the vulnerability disclosure report submitter;
  • Other information that the submitter of the vulnerability detection report considers necessary for the identification and prevention of the identified vulnerability.
Conducting automated vulnerability scans of internal enterprise assets
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Development and cloud
Technical vulnerability management
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Conducting automated vulnerability scans of internal enterprise assets
1. Task description

The organization has implemented a comprehensive strategy for automated vulnerability scans of internal assets, conducting both authenticated and unauthenticated scans with thorough coverage and regular analysis of results, and continuously enhancing tools and techniques based on findings to address security risks.

Conducting automated vulnerability scans of externally-exposed enterprise assets
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Development and cloud
Technical vulnerability management
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Conducting automated vulnerability scans of externally-exposed enterprise assets
1. Task description

The organization conducts monthly automated vulnerability scans on all externally-exposed assets, utilizing advanced tools for thorough analysis and prompt response to findings, while regularly updating scanning protocols to address emerging threats and maintain security vigilance.

Performing root cause analysis on security vulnerabilities
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Development and cloud
Technical vulnerability management
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Performing root cause analysis on security vulnerabilities
1. Task description

The organization establishes a dedicated team and standardized process for root cause analysis of security vulnerabilities, ensuring thorough data gathering, cause identification, collaboration with development teams for solutions, training to prevent recurrence, and continuous improvement of security practices.

Establishing and maintaining a severity rating system for application vulnerabilities
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Development and cloud
Technical vulnerability management
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Establishing and maintaining a severity rating system for application vulnerabilities
1. Task description

The organization develops a detailed severity rating system for vulnerabilities, defining criteria for severity levels, integrating these ratings into development workflows, setting security standards, using automated assessment tools, establishing a triage process, and reviewing the system annually to ensure effective vulnerability management.

Validation of security measuers after penetration testing
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Development and cloud
Technical vulnerability management
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Validation of security measuers after penetration testing
1. Task description

The organization should after a penetration test:

  • Review the findings from the test and understand the vulnerabilities that might have been exploited
  • Asses the current security measuers and determine their effectiveness against the techniques used in the penetration test
  • Modify the rulesets on firewalls, IDS/IPS and other security measuers to address possible shortcomings
  • Enhance detection measures based on the findings
  • Implement additional controls if needed
  • Retest according to the penetration testing program
Monitoring the use of the available capacity
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Development and cloud
Technical vulnerability management
3
requirements

Examples of other requirements this task affects

A1.1: Evaluation of current processing capacity
SOC 2
4.1: Tietojärjestelmien tietoturvallisuus
TiHL tietoturvavaatimukset
3.2.5: Verify that the monitoring is working as intended
NSM ICT-SP
See all related requirements and other information from tasks own page.
Go to >
Monitoring the use of the available capacity
1. Task description

The operation of information systems may depend on certain key resources, such as server capacity,storage space, data processing capacity,monitoring capacity or certain< em>key people.

The organization has defined key resources and methods for monitoring the use of these key resources. A normal level is also determined for the resources, which is used when assessing the risk of jeopardizing availability due to capacity problems.

Sharing threat intelligence
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Development and cloud
Technical vulnerability management
9
requirements

Examples of other requirements this task affects

5.7: Threat intelligence
ISO 27001
77: Menettely toimintaympäristön seuraamiseen
Digiturvan kokonaiskuvapalvelu
THREAT-2: Respond to Threats and Share Threat Information
C2M2
Article 45: Information-sharing arrangements on cyber threat information and intelligence
DORA
ID.RA-2: Cyber threat intelligence is received from information sharing forums and sources.
CyberFundamentals
See all related requirements and other information from tasks own page.
Go to >
Sharing threat intelligence
1. Task description

Organization should share threat intelligence information actively with other organizations to improve its own threat awareness.

Consideration of threat intelligence findings in the information security risk management process
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Development and cloud
Technical vulnerability management
3
requirements

Examples of other requirements this task affects

5.7: Threat intelligence
ISO 27001
3.3.4: Obtain and process threat information from relevant sources
NSM ICT-SP
See all related requirements and other information from tasks own page.
Go to >
Consideration of threat intelligence findings in the information security risk management process
1. Task description

Organization must consider the threat intelligence process findings in the information security risk management process. Threat intelligence can detect, for example, the proliferation of certain types of attacks or the development of new technologies, based on which assessments of certain information security risks must be updated, which may lead to the need to reduce risks through treatment plans.

Regular monitoring of the vulnerability management process
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Development and cloud
Technical vulnerability management
16
requirements

Examples of other requirements this task affects

12.6.1: Management of technical vulnerabilities
ISO 27001
ID.RA-1: Asset vulnerabilities
NIST
PR.IP-12: Vulnerability management plan
NIST
TEK-19: Ohjelmistohaavoittuvuuksien hallinta
Julkri
8.8: Management of technical vulnerabilities
ISO 27001
See all related requirements and other information from tasks own page.
Go to >
Regular monitoring of the vulnerability management process
1. Task description

The technical vulnerability management process is regularly monitored and evaluated to ensure its effectiveness and efficiency.

Universal cyber compliance language model: Comply with confidence and least effort

In Cyberday, all frameworks’ requirements are mapped into universal tasks, so you achieve multi-framework compliance effortlessly.

Security frameworks tend to share the common core. All frameworks cover basic topics like risk management, backup, malware, personnel awareness or access management in their respective sections.
Cyberday’s universal cyber security language technology creates you a single security plan and ensures you implement the common parts of frameworks just once. You focus on implementing your plan, we automate the compliance part - for current and upcoming frameworks.
Start your free trial
Get to know Cyberday
Start your free trial
Cyberday is your all-in-one solution for building a secure and compliant organization. Whether you're setting up a cyber security plan, evaluating policies, implementing tasks, or generating automated reports, Cyberday simplifies the entire process.
With AI-driven insights and a user-friendly interface, it's easier than ever to stay ahead of compliance requirements and focus on continuous improvement.
Clear framework compliance plans
Activate relevant frameworks and turn them into actionable policies tailored to your needs.
Credible reports to proof your compliance
Use guided tasks to ensure secure implementations and create professional reports with just a few clicks.
AI-powered improvement suggestions
Focus on the most impactful improvements in your compliance with help from Cyberday AI.
No items found.