Content library
Julkri: TL IV-I
TEK-16: Tiedon salaaminen

How to fill the requirement

Julkri: TL IV-I

TEK-16: Tiedon salaaminen

Task name
Priority
Status
Theme
Policy
Other requirements
Encryption solution and guidelines for personnel to encrypt transferred information
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Technical cyber security
Encryption
requirements

Task is fulfilling also these other security requirements

TEK-16: Tiedon salaaminen
Julkri
21.2.h: Encryption
NIS2
9.8 §: Salaus
KyberTL
1. Task description

The organization's personnel are offered a solution to protect unclassified confidential information with encryption when information is transferred outside of physically protected areas via the network. The solution has no known vulnerabilities and, according to the information received from the manufacturer, it supports modern encryption strengths and settings.

The staff's competence in the safe use of the encryption solution has been ensured (for example, instructions, training and supervision).

Secure transfer of confidential data outside the organization
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Management of data sets
Management of data sets
requirements

Task is fulfilling also these other security requirements

A.11.6: Encryption of PII transmitted over public data-transmission networks
ISO 27018
TEK-16: Tiedon salaaminen
Julkri
PR.DS-2: Data-in-transit is protected.
CyFun
1. Task description

The organization has to execute data transfers in public network using encrypted or otherwise protected data transfer connection or procedure, if the data is confidential.

The data transfer also has to be set up in a way where recipient can be identified securely enough before recipient can access any confidential data.

Good encryption key management practices
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
Technical cyber security
Encryption
requirements

Task is fulfilling also these other security requirements

I12: Salausratkaisut
Katakri
10.1.2: Key management
ISO27 Full
6.6.3: Tekniset vaatimukset
Self-monitoring
TEK-16: Tiedon salaaminen
Julkri
21.2.h: Encryption
NIS2
1. Task description

Our organization has defined policies for creating, storing, sharing, and deleting encryption keys.

Encryption key lengths and usage practices will be selected in accordance with best general practices by monitoring developments in the industry.

No items found.