To get the best help for your situation, first answer the questions on the guide's start page.
- Guide's start page
- Introduction to digital security risk management
- Risk management
- Safety and security management
- Continuity management and preparedness
- Information security
- Get an overview of information security
- Identify threats
- Shield against threats
- Involve everyone in the organisation in threat identification
- Take care of identity and access management
- Define the roles and responsibilities related to information security
- Ensure adequate and regular training
- Protect and back up your data
- Protect the technical environments
- Take care of the safety and security of the systems
- Plan out the maintenance of the safety level in case of changes
- Protect the physical operating environment
- Ensure continuity and preparedness
- Implement observation and handling processes
- Recovery from security breaches
- Use instructions and tools
- Learn more about courses and services
- Data protection
- Checklist
Shield against threats

Involve everyone in the organisation in threat identification
Use the knowledge and professional skills of the entire organisation and its key stakeholders to identify digital security threats. The organisation’s ICT services, information management or information security professionals cannot notice all information security threats.
Take care of identity and access management
The admin rights are not human rights.
– information security professional Sami Laiho
The digitalised operating environment includes a wide range of important systems, services and resources that you use by logging in with different user IDs. The use of identity and access management methods, that is, ensuring that everyone cannot log in to any given system, is a key way of ensuring information security.
In order to organise identity and access management, the organisation must have a policy approved by the management as well as processes and control mechanisms approved by the management.
Ensure adequate and regular training
The organisation must ensure that all employees and management have sufficient skills and competence development. Competence development must be
- regular
- predictive
- documented and
- comprehensive.
Protect and back up your data
You can reduce the number of information security threats to the organisation’s data and manage the information security risks by
- protecting the information
- backing up data
- protecting the backups
- testing the backups regularly.
Backups must be checked regularly.
Protect the technical environments
Technical environments must be appropriately protected using technical and organisation-related means. The more important the technical environment is, the better it should be protected.
Take care of the safety and security of the systems
Plan out the maintenance of the safety level in case of changes
The digital operating environment is changing rapidly and technology is diversifying. Rapid changes in the operating environment require maintaining the safety level and planning change processes in advance. Both technical and organisational measures should be taken into account in the change processes.

Protect the physical operating environment
Everyone in the organisation has a responsibility to participate in the protection of the physical operating environment. The operating environment must protected in be in accordance with the
- instructions
- processes and
- operating models the organisation has devised and approved.
The processes that protect the physical operating environment must support a good safety culture.
Ensure continuity and preparedness
In a digitalised society and operational environment, risks related to information security may cause significant problems for the organisation’s operations if they become real.
In order for information security risk management to be of high quality, the organisation must also be prepared for a situation where residual risks are triggered. For this reason, you must develop the necessary processes for the realisation of risks related to information security, to ensure the continuity of critical functions.
In addition to taking into account the continuity management and precautionary measures related to realised information security risks, the organisation must also plan, document and implement disaster recovery plans for information systems.
Read more about residual risks on the guide and page Get an overview of risk management.