Content library
Julkri: TL IV-I
TEK-01: Verkon rakenteellinen turvallisuus

How to fill the requirement

Julkri: TL IV-I

TEK-01: Verkon rakenteellinen turvallisuus

Task name
Priority
Status
Theme
Policy
Other requirements
Structural security of the network
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Technical cyber security
Network security
requirements

Task is fulfilling also these other security requirements

TEK-01: Verkon rakenteellinen turvallisuus
Julkri
ARCHITECTURE-2: Implement Network Protections as an Element of the Cybersecurity Architecture
C2M2: MIL1
PR.AC-5: Network integrity (network segregation, network segmentation… ) is protected.
CyFun
1. Task description

The data processing environment is separated from public data networks and other environments with a lower security level in a sufficiently safe manner.

Separation of data systems is one of the most effective factors in protecting confidential information. The goal of separation is to delimit the processing environment of confidential information into a manageable entity, and in particular to be able to limit the processing of confidential information to sufficiently secure environments only. Separation of environments can be implemented, for example, with the help of a firewall solution.

No items found.