Content library
Julkri: TL IV-I
TEK-22.1: Tietojärjestelmien saatavuus - saatavuutta suojaavat menettelyt

How to fill the requirement

Julkri: TL IV-I

TEK-22.1: Tietojärjestelmien saatavuus - saatavuutta suojaavat menettelyt

Task name
Priority
Status
Theme
Policy
Other requirements
Availability of data systems and procedures to protect their availability
Critical
High
Normal
Low
Fully done
Mostly done
Partly done
Not done
System management
Data system management
requirements

Task is fulfilling also these other security requirements

TEK-22: Tietojärjestelmien saatavuus
Julkri
TEK-22.1: Tietojärjestelmien saatavuus - saatavuutta suojaavat menettelyt
Julkri
31: Toipumissuunnitelmat kriittisille järjestelmille
Sec overview
Article 7: ICT systems, protocols and tools
DORA
Article 9: Protection
DORA
1. Task description

The organisation must ensure the availability of information systems throughout their entire lifecycle. For this reason, the availability requirements of different information systems (especially the maximum time a system can be out of service, recovery time objective, and recovery point objective) must be met.

The implementation of availability requirements must take into account the load endurance, fault tolerance, and recovery time required from the information system.

Additionally, the need for procedures that protect availability has been identified, and procedures have been implemented with customized protections for critical systems. These protections may include, for example, redundancy of key network connections, hardware, and application execution environments.

No items found.