CyFun Tracker

Compliance Overview

CyberFundamentals Basic Level · 34 Controls · NIST CSF v1.1

Demo Mode

6

Compliant

13

Partial

8

Non-Compliant

7

Not Assessed

Overall Compliance
63%Overall
Compliant
Partial
Non-Compliant
Not Assessed
NIST CSF Function Scores
IDIdentify
7/947%
x
PRProtect
14/1773%
x
DEDetect
4/483%
x
RSRespond
1/315%
x
RCRecover
1/110%
x
Compliance Trend

Key Measures (13)

Mandatory controls derived from Belgian cyber incidents

Critical & High Findings (8)
high

Improvement needed: Organizational cybersecurity policy is established and communicated

Draft a cybersecurity policy covering acceptable use, password requirements, incident reporting, and data handling. Have management approve it. Distribute to all employees and obtain acknowledgment. Review annually.

high

Improvement needed: Governance and risk management processes address cybersecurity risks

Establish a risk management process. Conduct a cybersecurity risk assessment at least annually. Document risk appetite and tolerance levels. Integrate cyber risks into overall business risk management.

high

Improvement needed: Threats, vulnerabilities, likelihoods, and impacts are used to determine risk

Maintain a risk register combining threats, vulnerabilities, likelihood, and business impact. Use a simple risk matrix (likelihood x impact). Prioritize mitigation based on risk scores. Review quarterly.

high

Improvement needed: Least privilege access is enforced

Audit all Global Administrator accounts — limit to maximum 2-4. Remove standing privileged access; use PIM for time-limited elevation. Restrict default user permissions in Entra ID. Disable self-service group creation if not needed.

high

Improvement needed: Administrator privileges are not used for daily tasks

Create dedicated admin accounts (e.g., admin-john@company.com) separate from daily-use accounts. Admin accounts should not have mailboxes or Microsoft 365 licenses. Use Privileged Identity Management (PIM) for just-in-time access.

+3 more findings