Content library
Virtualization
Securing data transfer when switching to cloud environments

Other tasks from the same security theme

Task name
Priority
Status
Theme
Policy
Other requirements
Choosing and using network protection systems
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Technical cyber security
Virtualization
11
requirements

Examples of other requirements this task affects

PR.PT-4: Communications and control networks
NIST
ARCHITECTURE-2: Implement Network Protections as an Element of the Cybersecurity Architecture
C2M2: MIL1
CC6.6: Logical access security measures against threats from sources outside system boundries
SOC 2
6.11: Alusta- ja verkkopalvelujen tietoturvallinen käyttö tietosuojan ja varautumisen kannalta
Tietoturvasuunnitelma
3.1.1: Management of secure areas
TISAX
See all related requirements and other information from tasks own page.
Go to >
Choosing and using network protection systems
1. Task description

Cyber criminals can exploit configuration errors or technical vulnerabilities in applications, firewalls, or networks to access our information.

An organization must use defense-in-depth technologies to protect against, detect, and respond to cyber-attacks. The techniques should be suitable for controlling physical, logical and administrative controls.

Verifying network configuration consistency between virtual and physical networks
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Technical cyber security
Virtualization
4
requirements

Examples of other requirements this task affects

13: Communications security
ISO 27017
CLD 13.1: Network security management
ISO 27017
CLD 13.1.4: Alignment of security management for virtual and physical networks
ISO 27017
2.2.3: Segment the organisation’s network in accordance with its risk profile
NSM ICT-SP
See all related requirements and other information from tasks own page.
Go to >
Verifying network configuration consistency between virtual and physical networks
1. Task description

In environments that include virtual and physical layers, inconsistency of network policies can cause e.g. system outages or defective access control.

The organisation must ensure that the configuration of virtual networks is aligned with the policies for configuring physical networks. Network configuration should match the policy no matter what means are used to create the configuration.

Securing data transfer when switching to cloud environments
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Technical cyber security
Virtualization
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Securing data transfer when switching to cloud environments
1. Task description

The organization must use secure and encrypted connections to move servers, services, applications, or data to the cloud. Only the latest versions and approved protocols may be used for connections.

Process for utilizing an active discovery tool
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Technical cyber security
Virtualization
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Process for utilizing an active discovery tool
1. Task description

The organization employs an active discovery tool that:

  • continuously scans the network
  • executes daily to update the asset inventory
  • generates real-time alerts for new devices
  • integrates with the asset management system
  • conducts scheduled compliance checks
  • undergoes regular review and optimization

to ensure alignment with security policies and network changes.

Visualizing high-risk network architectures
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Technical cyber security
Virtualization
1
requirements

Examples of other requirements this task affects

No items found.
See all related requirements and other information from tasks own page.
Go to >
Visualizing high-risk network architectures
1. Task description

An organization needs to draw the high-risk network environments. The drawing should show:

  • Network components (physical and logical)
  • Hypervisors, servers, networks and other relevant elements
  • Data flow between different components
  • Different domains and related policies
  • Interfaces between different network environments
Virtualization policy
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Technical cyber security
Virtualization
2
requirements

Examples of other requirements this task affects

2.9.2: Include backups of software to ensure recovery
NSM ICT-SP
See all related requirements and other information from tasks own page.
Go to >
Virtualization policy
1. Task description

The organization must have clear policies for developing virtualization security. The policy should be reviewed and updated at least annually.

The virtualization policy should consider at least:

  • Virtual Machine Lifecycle Management
  • Limiting the storage of virtual machine icons and snapshots
  • < li>Backup and fault tolerance
  • Labeling virtual machines by risk level
  • Change management process for creating, storing, and using virtual machine icons
  • Using firewalls to separate virtual machine groups

Universal cyber compliance language model: Comply with confidence and least effort

In Cyberday, all frameworks’ requirements are mapped into universal tasks, so you achieve multi-framework compliance effortlessly.

Security frameworks tend to share the common core. All frameworks cover basic topics like risk management, backup, malware, personnel awareness or access management in their respective sections.
Cyberday’s universal cyber security language technology creates you a single security plan and ensures you implement the common parts of frameworks just once. You focus on implementing your plan, we automate the compliance part - for current and upcoming frameworks.
Start your free trial
Get to know Cyberday
Start your free trial
Cyberday is your all-in-one solution for building a secure and compliant organization. Whether you're setting up a cyber security plan, evaluating policies, implementing tasks, or generating automated reports, Cyberday simplifies the entire process.
With AI-driven insights and a user-friendly interface, it's easier than ever to stay ahead of compliance requirements and focus on continuous improvement.
Clear framework compliance plans
Activate relevant frameworks and turn them into actionable policies tailored to your needs.
Credible reports to proof your compliance
Use guided tasks to ensure secure implementations and create professional reports with just a few clicks.
AI-powered improvement suggestions
Focus on the most impactful improvements in your compliance with help from Cyberday AI.
No items found.