Skip to content
Cyber security solution

Cyber security solution

Cyber security solution from the company TESCO SW a.s. responds to the introduction of cyber law No. 181/2014 and the relevant implementing Decree No. 316/2014.

Solution benefits

On 1.1.2015, Law No. 181/2014 Coll. on Cyber Security (LoCS) came into effect. At the same time, Decree No. 316/2014 on Cyber Security (DoCS) became effective. Their aim is to ensure on country level especially: orderliness and organization in the field of cyber security, unifying level of security measures on critical and important IS, monitoring and evaluation of security incidents, definition of procedures, how to act in emergency situations.

Authorities and persons, onto whom there are imposed obligations in the area of cyber security, are set out in section 3 of LoCS. Those are usually, but not exclusively, providers of information and communication system of critical infrastructure and administrators of important information system.

According to section 30 and section 31 of LoCS, they are required, within 1 year from the date of determining critical or important IS, to establish and implement security measures and keep up security documentation.

Group of major IS is formed by such systems, which are explicitly stated by Decree No. 317/2014 Dig. on important IS or which correspond to defining criteria stated in this Decree. Similarly, it will be in the case of critical IS. The relevant decree has not yet been published.

Introduction of obligations according to LoCS and DoCS also implies the introduction or strengthening of service management processes (ITSM), such as management of events, incidents, problems, changes, release & deployment, SLA, suppliers, etc.

Identification of necessary security measures according to section 5 of LoCS.

Identification of necessary security measures according to section 5 of LoCS.

Implementation of necessary security measures = fulfilling administrator’s obligations according to section 4 of LoCS.

Implementation of necessary security measures = fulfilling administrator’s obligations according to section 4 of LoCS.

Introduction or update of processes related to information security management system (ISMS) according to section 3 of DoCS.

Introduction or update of processes related to information security management system (ISMS) according to section 3 of DoCS.

Provision of security monitoring services.

Provision of security monitoring services.

Introduction or update of processes related to IT service management (ITSM) within the meaning of DoCS, title I and II.

Introduction or update of processes related to IT service management (ITSM) within the meaning of DoCS, title I and II.

Provision of support services.

Provision of support services.

Modules / Solution areas

1. Differential analysis

It maps the effects of LoCS and DoCS on customer’s IS in question. Analysis is based on the detailed study of LoCS and DoCS. It contains:

Identification of administrator’s obligations

Division into 3 areas: obligation is met; failure to meet it; partially met, change is necessary.

Product break-down

It identifies customer needs in the form of documents, services and HW & SW deliveries necessary to ensure the fulfilment of administrator’s obligations.

Contracting sheets

Logical division of product break-down into individual partial executions and detailed wording of assignment for implementer. Implementer may be a supplier, third party and in some cases customer himself. They also contain a price estimate and proposed date of partial execution.

Migration schedule or delivery timetable

Process schedule for introduction of organizational and technical measures, incl. timetable for partial deliveries.

2. Implementation of security measures

After approval of differential analysis, there follows a phase of executing organisational and technical security measures:

Bezpečnostní dokumentace

Editing or creating documentation, whose subject is to define (security policy) objectives and state how to achieve them (for example IT service management strategy). Subject also includes determination of security assets (Risk analysis).

Other documentation

In connection with the introduction of changes to updating of organizational and controlling documents.

Monitoring and security SW

modification or delivery of systems, monitoring and protecting the concerned infrastructure – proactive monitoring tool of IT environment (e.g. MS SCOM for operational logs), SIEM for security logs (security information and event management), firewall, IPS (Intrusion Prevension Systems) for advanced service management of network data flow filtering or HSM for advanced security operations.

Application SW

Modification or delivery of Service Desk supporting processes in the area of ITSM and providing reporting tool functionality on the basis of logs and alerts from monitoring systems. According to the set rules, Service Desk notifies about reports via SMS or email.

3. Provision of support services

This part includes the following services:

Provision of expertise according to section 6 of clause 2 of DoCS (Cyber security administrator, Cyber security architect).
Training in accordance with the development plan of the security awareness according to section 9 of DoCS.
Preparation for ISO 27001 certification according to section 29 of DoCS.
Providing execution of reactive and protective measures of NSO according to section 11 of LoCS.

4. Security monitoring

It includes the following services:

Online operation and security monitoring in 24×7 mode (continuous oversight and immediate operating support for the cyber security solution of events and incidents, according to section 13 of DoCS).
Providing processes of information security management (ISMS) according to section 3 of DoCS (maintenance and update of security documentation, regular updates of risk analysis).
Providing processes of IT service management (ITSM) according to DoCS, title I and II.
Security audit and inspection according to section 15 of DoCS.

Reference projects

 
  • The Office for Personal Data Protection
  • Ministry for Regional Development

Technology

  • HW: Thales e-Security nShield Connect
  • SW: CryptoID, FaMa+ ITSM, Microsoft System Center Operations Manager

QUICK CONTACT

info@tescosw.cz
tel. 587 333 602

tř. Kosmonautů 1288/1
779 00 Olomouc

FOLLOW US

TESCO SW 

QUICK CONTACT

info@tescosw.cz
tel. 587 333 602

tř. Kosmonautů 1288/1
779 00 Olomouc