Content library
Kyberturvallisuuslaki (NIS2)
9.12 §: Fyysinen turvallisuus

Requirement description

Toimijoiden on toteutettava kyberturvallisuutta koskevan riskienhallinnan toimintamallin mukaiset oikeasuhtaiset tekniset, operatiiviset tai organisatoriset hallintatoimenpiteet viestintäverkkojen ja tietojärjestelmien turvallisuuteen kohdistuvien riskien hallitsemiseksi ja haitallisten vaikutusten estämiseksi tai minimoimiseksi.

Toimintamallissa ja siihen perustuvissa hallintatoimenpiteissä on otettava huomioon ja pidettävä yllä ajantasaisesti toimenpiteet viestintäverkkojen ja tietojärjestelmien fyysisen ympäristön ja tilaturvallisuuden sekä välttämättömien resurssien varmistamiseksi.

How to fill the requirement

Kyberturvallisuuslaki (NIS2)

9.12 §: Fyysinen turvallisuus

Task name
Priority
Status
Theme
Policy
Other requirements
Visitor instructions and log
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Physical security
Property security
21
requirements

Examples of other requirements this task affects

F04: Kulkuoikeuksien hallinta
Katakri
11.1.2: Physical entry controls
ISO 27001
PR.AC-2: Physical access control
NIST
FYY-04: Tiedon säilytys
Julkri
FYY-05.5: Turvallisuusalue - Vierailijat
Julkri
See all related requirements and other information from tasks own page.
Go to >
Visitor instructions and log
1. Task description

Visitors shall have access to secure areas only with permission, after they are appropriately identified and their access rights shall be limited to the necessary facilities. All visits are recorded in the visitor log. In addition, staff have guidelines about safe operating in connection with visits.

Physical access control to building, offices and other premises
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Physical security
Property security
32
requirements

Examples of other requirements this task affects

F04: Kulkuoikeuksien hallinta
Katakri
11.1.2: Physical entry controls
ISO 27001
11.1.1: Physical security perimeter
ISO 27001
6.6.4: Fyysisten tilojen, laitteiden ja tulosteiden turvallisuus
Omavalvontasuunnitelma
PR.AC-2: Physical access control
NIST
See all related requirements and other information from tasks own page.
Go to >
Physical access control to building, offices and other premises
1. Task description

Secure areas of the organization cannot be accessed unnoticed. The premises are protected by appropriate access control. Only authorized persons have access to the secure areas.

Notification process in case of loss of physical identifiers
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Physical security
Property security
5
requirements

Examples of other requirements this task affects

11.1.2: Physical entry controls
ISO 27001
7.2: Physical entry
ISO 27001
CC6.4: Physical access control to facilities and protected information assets
SOC 2
9.12 §: Fyysinen turvallisuus
Kyberturvallisuuslaki
See all related requirements and other information from tasks own page.
Go to >
Notification process in case of loss of physical identifiers
1. Task description

Staff have instructions and tools to help them report a lost physical identifier (e.g. keychain, smart card, smart sticker).

Using visible IDs
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Physical security
Property security
6
requirements

Examples of other requirements this task affects

11.1.2: Physical entry controls
ISO 27001
11.1.6: Delivery and loading areas
ISO 27001
7.2: Physical entry
ISO 27001
CC6.4: Physical access control to facilities and protected information assets
SOC 2
3.1.1: Management of secure areas
TISAX
See all related requirements and other information from tasks own page.
Go to >
Using visible IDs
1. Task description

People can't move around the organization's premises without a visible identifier.

Basic service testing, fault tolerance evaluation and verification
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Physical security
Equipment maintenance and safety
15
requirements

Examples of other requirements this task affects

Toiminnan jatkuvuuden hallinta
Katakri
F08: Toiminnan jatkuvuuden varmistaminen
Katakri
11.2.2: Supporting utilities
ISO 27001
11.1.4: Protecting against external and environmental threats
ISO 27001
PR.IP-5: Physical operating environment
NIST
See all related requirements and other information from tasks own page.
Go to >
Basic service testing, fault tolerance evaluation and verification
1. Task description

The operation of basic services (such as electricity, telecommunications, water supply, sewerage, heating, ventilation and air conditioning) will be monitored to ensure that their capacity covers business growth.

Safe placement of equipment
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Physical security
Equipment maintenance and safety
19
requirements

Examples of other requirements this task affects

Toiminnan jatkuvuuden hallinta
Katakri
F08: Toiminnan jatkuvuuden varmistaminen
Katakri
11.1.3: Securing offices, rooms and facilities
ISO 27001
11.2.1: Equipment siting and protection
ISO 27001
11.1.4: Protecting against external and environmental threats
ISO 27001
See all related requirements and other information from tasks own page.
Go to >
Safe placement of equipment
1. Task description

For example, data processing equipment, as well as other important equipment, should be placed in the premises safely and with consideration. Placement should restrict unauthorized access to devices.

Documentation of other protected assets
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Physical security
Equipment maintenance and safety
31
requirements

Examples of other requirements this task affects

Članak 30.1.i (Imovina): Upravljanja programskom i sklopovskom imovinom
NIS2 Croatia
9.5 §: Suojattavan omaisuuden hallinta
Kyberturvallisuuslaki
9.12 §: Fyysinen turvallisuus
Kyberturvallisuuslaki
5.2.7: Network management
TISAX
3.1.3: Management of supporting assets
TISAX
See all related requirements and other information from tasks own page.
Go to >
Documentation of other protected assets
1. Task description

The organization shall list all relevant protected assets to determine ownership and to ensure that security measures cover all necessary items.

A large portion of the protected assets (including data sets, data systems, personnel / units, and partners) are treated through other tasks. In addition, the organization must list other important assets, which may be, depending on the nature of its operations, e.g. hardware (servers, network equipment, workstations, printers) or infrastructure (real estate, power generation, air conditioning). In addition the organization should make sure that relevant external devices are documented.

Guidelines for operating in processing areas for confidential information
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Physical security
Property security
9
requirements

Examples of other requirements this task affects

7.6: Working in secure areas
ISO 27001
42: Turvallisuusalueiden määrittely
Digiturvan kokonaiskuvapalvelu
11.1.5: Working in secure areas
ISO 27001
SEC-05: Remote access user authentication
Cyber Essentials
6.9: Fyysinen turvallisuus osana tietojärjestelmien käyttöympäristön turvallisuutta
Tietoturvasuunnitelma
See all related requirements and other information from tasks own page.
Go to >
Guidelines for operating in processing areas for confidential information
1. Task description

Organization has defined the areas for handling confidential information and the operating rules that are followed in all activities that take place in the corresponding areas.

In the rules, consideration should be given to the following points:

  • the rules and related areas are communicated only personnel for whom the information is relevant
  • unsupervised work in areas is minimized
  • areas are physically locked and checked regularly
  • prohibition of unauthorized recording devices (e.g. phones, video cameras)
  • monitoring the transportation of terminal devices
  • publishing emergency instructions in an easily accessible way
Alarm systems for equipment environment
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Physical security
Equipment maintenance and safety
14
requirements

Examples of other requirements this task affects

Toiminnan jatkuvuuden hallinta
Katakri
F08: Toiminnan jatkuvuuden varmistaminen
Katakri
11.2.1: Equipment siting and protection
ISO 27001
11.2.2: Supporting utilities
ISO 27001
PR.IP-5: Physical operating environment
NIST
See all related requirements and other information from tasks own page.
Go to >
Alarm systems for equipment environment
1. Task description

Alarm systems monitor the level of key environmental conditions (e.g. temperature and humidity) that can adversely affect the operation of data processing equipment. There should also be a functioning fire alarm system in the environment.

Tasks included in the policy

Task name
Priority
Status
Theme
Policy
Other requirements
No items found.

Never duplicate effort. Do it once - improve compliance across frameworks.

Reach multi-framework compliance in the simplest possible way
Security frameworks tend to share the same core requirements - like risk management, backup, malware, personnel awareness or access management.
Cyberday maps all frameworks’ requirements into shared tasks - one single plan that improves all frameworks’ compliance.
Do it once - we automatically apply it to all current and future frameworks.
Get to know Cyberday
Start your free trial
Cyberday is your all-in-one solution for building a secure and compliant organization. Whether you're setting up a cyber security plan, evaluating policies, implementing tasks, or generating automated reports, Cyberday simplifies the entire process.
With AI-driven insights and a user-friendly interface, it's easier than ever to stay ahead of compliance requirements and focus on continuous improvement.
Clear framework compliance plans
Activate relevant frameworks and turn them into actionable policies tailored to your needs.
Credible reports to proof your compliance
Use guided tasks to ensure secure implementations and create professional reports with just a few clicks.
AI-powered improvement suggestions
Focus on the most impactful improvements in your compliance with help from Cyberday AI.