Suomi.fi for Service Developers
Go directly to contents.
VAHTI best practices
Digital security risk management

To get the best help for your situation, first answer the questions on the guide's start page.

Recovery from security breaches

Use risk management to prepare for security breaches

Risk management is part of continuity management and supports good preparedness. The consequences of a security breach can be reduced and recovery made easier if the possibility of the event has been identified and the processing measures have been considered in advance.

Updated: 29/10/2024

Follow the disaster recovery plan

The organisation must prepare a disaster recovery plan for at least the critical functions and services of the organisation. The disaster recovery plan describes the actions and resources the organisation can use to return to a normal state or other level decided by the organisation’s management.
At least the most important identified risks must be taken into account in the disaster recovery plans.

Updated: 29/10/2024

Communicate recovery actions to management and stakeholders

By following the disaster recovery plan’s instructions for communications, you can keep the management and key stakeholders informed on

  • the recovery progress
  • the adequacy of resources, and
  • other relevant details.

Agree in the plan on how to communicate with the stakeholders who are key in terms of recovery, such as service providers.

Updated: 29/10/2024

Develop protection processes

Maintaining good resilience, or ability to recover, requires continuous measures, and protection and recovery processes must be continuously developed. If changes are needed in your organisation’s processes, update them to reflect the new conditions.

You should add the development of protection and recovery measures to the management’s annual clock, for example.

Updated: 29/10/2024

Learn from past security breaches

Each deviation is an opportunity to develop your operation. During recovery, you should identify development areas that can, for example,

  • develop the organisation’s protection processes
  • decrease the probability of recurrence or impacts
  • identify more effective or faster recovery methods
  • identify useful recovery or protection processes that also work on other risks.

Updated: 29/10/2024

Measure the success of information security processes

The organisation must set indicators and identifiers suitable for its operations. With indicators, the organisation can assess

  1. whether the processes set for information security, recovery and digital security work appropriately
  2. how development activities have contributed to the success of information security processes.

Setting appropriate indicators also helps to make development

  • regular
  • systematic, and
  • controlled.

Updated: 29/10/2024

Monitor needs and develop activities

As the digital operating environment changes, you must monitor the changes in the needs of the organisation and stakeholders. Changes may occur, for example, in the needs of the following actors:

  • organisation
  • management
  • human resources
  • specialists
  • suppliers
  • customers or
  • other stakeholders.

Updated: 29/10/2024

Are you satisfied with the content on this page?

Checklist