Content library
Julkri: TL IV-I
TEK-03.3: Suodatus- ja valvontajärjestelmien hallinnointi - tarkastukset

How to fill the requirement

Julkri: TL IV-I

TEK-03.3: Suodatus- ja valvontajärjestelmien hallinnointi - tarkastukset

Task name
Priority
Status
Theme
Policy
Other requirements
Management of filtering and monitoring systems
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Technical cyber security
Network security
requirements

Task is fulfilling also these other security requirements

I03: Suodatus- ja valvontajärjestelmien hallinnointi
Katakri
TEK-03: Suodatus- ja valvontajärjestelmien hallinnointi
Julkri
TEK-03.2: Suodatus- ja valvontajärjestelmien hallinnointi - dokumentointi
Julkri
TEK-03.3: Suodatus- ja valvontajärjestelmien hallinnointi - tarkastukset
Julkri
TEK-03.1: Suodatus- ja valvontajärjestelmien hallinnointi - vastuutus ja organisointi
Julkri
1. Task description

Examples of traffic filtering and monitoring systems are firewalls, routers, intrusion detection or prevention systems (IDS / IPS) and network devices / servers / applications with similar functionalities.

To ensure the functionality of filtering and monitoring:

  • An owner has been appointed for the systems, who takes care of the proper operation of the system throughout the life cycle of the data processing environment
  • It is the responsibility of the system owner to add, change, and delete settings for systems that filter or control traffic
  • Documentation of the network and associated filtering and control systems is maintained throughout its lifecycle as an integral part of the change and settings management process
  • The settings and desired operation of the systems are checked periodically during the operation and maintenance of the data processing environment and in the event of exceptional situations
No items found.