MIL1 requirements
a. Senior management with proper authority provides support for the cybersecurity program, at least in an ad hoc manner
MIL2 requirements
b. The cybersecurity program is established according to the cybersecurity program strategy
c. Senior management sponsorship for the cybersecurity program is visible and active
d. Senior management sponsorship is provided for the development, maintenance, and enforcement of cybersecurity policies
e. Responsibility for the cybersecurity program is assigned to a role with sufficient authority
f. Stakeholders for cybersecurity program management activities are identified and involved
MIL3 requirements
g. Cybersecurity program activities are periodically reviewed to ensure that they align with the cybersecurity program strategy
h. Cybersecurity activities are independently reviewed to ensure conformance with cybersecurity policies and procedures, periodically and according to defined triggers, such as process changes
i. The cybersecurity program addresses and enables the achievement of legal and regulatory compliance, as appropriate
j. The organization collaborates with external entities to contribute to the development and implementation of cybersecurity standards, guidelines, leading practices, lessons learned, and emerging technologies
The organization must operate, maintain, and continuously develop a security management system.
The boundaries and scope, contents, role, cumulative implementation information and other necessary descriptive information related to the management system must be clearly documented.
Organization's top management sets security objectives. Security objectives meet the following requirements:
In connection with the documentation of security objectives, the necessary top-level improvements and tasks, needed resources, responsible persons, due dates and methods for evaluating the results in order to achieve the objectives are also defined.
The organization has an information security policy developed and approved by top management. The policy shall include at least the following:
In addition, the task owner shall ensure that:
The organization must establish and maintain a cyber security program. The program must have the support of the top management.
The program must be established:
The organization's top management must demonstrate a commitment to cyber security work and the management system. Management commits to:
Top management also decides the scope of the information security management system and records the decision in the description of the system. This means, for example, whether some parts of the organisation's activities or information are excluded from the scope of the management system, or whether it applies to all information / activities of the organization.
In Cyberday, all frameworks’ requirements are mapped into universal tasks, so you achieve multi-framework compliance effortlessly.