Suomi.fi for Service Developers
Go directly to contents.
VAHTI best practices
Digital security risk management

To get the best help for your situation, first answer the questions on the guide's start page.

Shield against threats

Involve everyone in the organisation in threat identification

Use the knowledge and professional skills of the entire organisation and its key stakeholders to identify digital security threats. The organisation’s ICT services, information management or information security professionals cannot notice all information security threats.

Updated: 29/10/2024

Take care of identity and access management

The admin rights are not human rights.

– information security professional Sami Laiho

The digitalised operating environment includes a wide range of important systems, services and resources that you use by logging in with different user IDs. The use of identity and access management methods, that is, ensuring that everyone cannot log in to any given system, is a key way of ensuring information security.

In order to organise identity and access management, the organisation must have a policy approved by the management as well as processes and control mechanisms approved by the management.

Updated: 29/10/2024

Ensure adequate and regular training

The organisation must ensure that all employees and management have sufficient skills and competence development. Competence development must be

  • regular
  • predictive
  • documented and
  • comprehensive.

Updated: 29/10/2024

Protect and back up your data

You can reduce the number of information security threats to the organisation’s data and manage the information security risks by

  1. protecting the information
  2. backing up data
  3. protecting the backups
  4. testing the backups regularly.

Backups must be checked regularly.

Updated: 29/10/2024

Protect the technical environments

Technical environments must be appropriately protected using technical and organisation-related means. The more important the technical environment is, the better it should be protected.

Updated: 29/10/2024

Take care of the safety and security of the systems

Updated: 29/10/2024

Plan out the maintenance of the safety level in case of changes

The digital operating environment is changing rapidly and technology is diversifying. Rapid changes in the operating environment require maintaining the safety level and planning change processes in advance. Both technical and organisational measures should be taken into account in the change processes.

Updated: 29/10/2024

Protect the physical operating environment

Everyone in the organisation has a responsibility to participate in the protection of the physical operating environment. The operating environment must protected in be in accordance with the

  • instructions
  • processes and
  • operating models the organisation has devised and approved.

The processes that protect the physical operating environment must support a good safety culture.

Updated: 29/10/2024

Ensure continuity and preparedness

In a digitalised society and operational environment, risks related to information security may cause significant problems for the organisation’s operations if they become real.

In order for information security risk management to be of high quality, the organisation must also be prepared for a situation where residual risks are triggered. For this reason, you must develop the necessary processes for the realisation of risks related to information security, to ensure the continuity of critical functions.

In addition to taking into account the continuity management and precautionary measures related to realised information security risks, the organisation must also plan, document and implement disaster recovery plans for information systems.

Read more about residual risks on the guide and page Get an overview of risk management.

Updated: 29/10/2024

Are you satisfied with the content on this page?

Checklist