Content library
CyberFundamentals (Belgium)
PR.IP-8: Effectiveness of protection technologies is shared.

How to fill the requirement

CyberFundamentals (Belgium)

PR.IP-8: Effectiveness of protection technologies is shared.

Task name
Priority
Status
Theme
Policy
Other requirements
Sharing threat intelligence
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Development and cloud
Technical vulnerability management
requirements

Task is fulfilling also these other security requirements

5.7: Threat intelligence
ISO27k1 Full
77: Menettely toimintaympäristön seuraamiseen
Sec overview
THREAT-2: Respond to Threats and Share Threat Information
C2M2: MIL1
Article 45: Information-sharing arrangements on cyber threat information and intelligence
DORA
DE.CM-8: Vulnerability scans are performed.
CyFun
1. Task description

Organization should share threat intelligence information actively with other organizations to improve its own threat awareness.

Regular periodic analysis and learning of incidents
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Incident management
Incident management and response
requirements

Task is fulfilling also these other security requirements

16.1.6: Learning from information security incidents
ISO27 Full
PR.IP-7: Protection processes
NIST
PR.IP-8: Protection effectiveness
NIST
DE.DP-5: Detection processes improvment
NIST
RS.AN-2: The impact of the incident
NIST
1. Task description

The knowledge gained from analyzing and resolving security incidents should be used to reduce the likelihood of future incidents and their impact.

The organization regularly analyzes incidents as a whole. This process examines the type, amount and cost of incidents with the aim of identifying recurrent and significant incidents that need more action.

If recurrent incidents requiring response are identified, based on them:

  • new management tasks are created or current ones expanded
  • security guidelines in this area are refined or extended
  • a case example of the incident is created that is used to train staff to respond to or avoid similar incidents
Communicating the results of cyber security incident analysis
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Incident management
Incident management and response
requirements

Task is fulfilling also these other security requirements

16.1.6: Learning from information security incidents
ISO27 Full
PR.IP-8: Protection effectiveness
NIST
DE.DP-4: Event detection
NIST
5.27: Learning from information security incidents
ISO27k1 Full
CC2.2: Internal communication of information
SOC 2
1. Task description

The organization has defined procedures to ensure that the original reporter and other personnel involved in the incident are informed of the outcome of the incident management.

Linked personnel can be documented on an optional field on the incident documentation template.

No items found.