Skip to main content

Unicis Cybersecurity Controls for Jira: Enhancing Security Standards

· 12 min read
Predrag Tasevski
Founder & CEO of Unicis.Tech OÜ

We are thrilled to announce the integration of new cybersecurity controls for Jira, aimed at elevating the security posture of your organization. In addition to the default Minimum Viable Secure Product (MVSP), we have incorporated the ISO/IEC 27001 standards for both 2013 and the latest 2022 version. Furthermore, we are aligning our controls with the upcoming EU NIS Directive, contributing to a common and converged level of security in network and information systems.

New Security Standards

ISO/IEC 27001:2013 and 2022

We understand the importance of staying ahead in the ever-evolving landscape of cybersecurity. By integrating the ISO/IEC 27001 standards of 2013 and 2022, we ensure that our cybersecurity controls are in line with the latest industry best practices, providing robust protection against emerging threats.

Unicis Platform Beta

With Unicis, you can manage tasks for security, privacy, and compliance team in one place.
Collaborate accross multiple teams about gap analysis, register of procedures and transfer impact assessment.

NIS Cooperation Group Security Measures

To address the requirements of the new EU NIS Directive, we have created a comprehensive table mapping the NIS Cooperation Group Security Measures for Operators of Essential Services (OES) with MVSP and ISO/IEC 27001 standards. This table aims to facilitate a common and converged level of security in network and information systems at the EU level.

The table goes on to comprehensively map various security domains, sub-domains, and measures against the MVSP and ISO/IEC standards.

SECURITY DOMAIN / SUB-DOMAIN / MEASUREMVSP (v1.0-20211007)ISO 27001:2013ISO 27001:2022
Defence / Computer Security Incident Management / Incident ReportMVSP 1.1 Vulnerability reports
MVSP 1.7 Incident handling
7.5 Documented information
A.12.1.1 Documented operating procedures
A.16.1.1 Responsibilities and procedures
A.16.1.2 Reporting information security events
A.16.1.3 Reporting information security weaknesses
7.5 Documented information
A.5.37 Documented operating procedures
A.5.2 Information security roles and responsibilities
A.5.25 Assessment and decision on information security events
A.6.8 Information security event reporting
Defence / Computer Security Incident Management / Communication with competent authoritiesMVSP 1.7 Incident handling7.4 Communication
7.5 Documented information
A.6.1.3 Contact with authorities
A.6.1.4 Contact with special interest groups
A.8.2.2 Labelling of information
7.4 Communication
7.5 Documented information
A.5.5 Contact with authorities
A.5.6 Contact with special interest groups
A.5.12 Labelling of information
Defence / Detection / LoggingMVSP 2.7 Logging9.1 Monitoring, measurement, analysis and evaluation
A.12.4 Logging and monitoring
A.14.1.2 Securing application services on public networks
A.15.2.1 Monitoring and review of supplier services
A.18.1.3 Protection of records
9.1 Monitoring, measurement, analysis and evaluation
A.5.22 Monitoring, review and change management of supplier services
A.5.33 Protection of records
A.8.15 Logging
A.8.16 Monitoring
A.8.20 Networks security
A.8.21 Security of network services
Defence / Detection / Logs correlation and analysisMVSP 2.7 Logging9.1 Monitoring, measurement, analysis and evaluation
9.3 Management review
A.16.1.4 Assessment of and decision on information security events
A.16.1.7 Collection of evidence
9.1 Monitoring, measurement, analysis and evaluation
9.3 Management review
A.5.25 Assessment of and decision on information security events
A.5.28 Collection of evidence
Defence / Computer Security Incident Management / Communication with competent authorities and CSIRTsMVSP 1.7 Incident handling7.4 Communication
7.5 Documented information
A.6.1.3 Contact with authorities
A.6.1.4 Contact with special interest groups
A.8.2.2 Labelling of information
7.4 Communication
7.5 Documented information
A.5.5 Contact with authorities
A.5.6 Contact with special interest groups
A.5.13 Labelling of information
Defence / Detection / DetectionMVSP 1.8 Data handling
MVSP 3.3 Vulnerability prevention
MVSP 3.4 Time to fix vulnerabilities
9.1 Monitoring, measurement, analysis and evaluation
A.12.2 Protection from malware
A.12.4 Logging and monitoring
A.12.6.1 Management of technical vulnerabilities
A.15.2.1 Monitoring and review of supplier services
9.1 Monitoring, measurement, analysis and evaluation
A.8.7 Protection from malware
A.8.15 Logging
A.8.16 Monitoring
A.8.8 Management of technical vulnerabilities
A.5.22 Monitoring, review and change management of supplier services
Defence / Computer Security Incident Management /Information system security incident responseMVSP 1.7 Incident handlingA.16.1.1 Responsibilities and procedures
A.16.1.4Assessment of and decision on information security events
A.16.1.5 Response to information security incidents
A.16.1.6 Learning from information security incidents
A.16.1.7 Collection of evidence
A.5.2 Information security roles and responsibilities
A.5.37 Documented operating procedures
A.5.25 Assessment of and decision on information security events
A.5.26 Response to information security incidents
A.5.27 Learning from information security incidents
A.5.28 Collection of evidence
Governance and Ecosystem / Information System Security Governance & Risk Management / Human resource securityMVSP 1.5 Training4.1 Understanding the organization and its context
4.2 Understanding the needs and expectations of interested parties
5.3 Organizational roles, responsibilities, and authorities
6.2 Information security objectives and planning to achieve them
7 Support
9.1 Monitoring, measurement, analysis and evaluation
A.6.1.1 Information security roles and responsibilities
A.6.1.2 Segregation of duties
A.7 Human resource security
A.9.3 User responsibilities
4.1 Organisational context
4.2 Interested parties
5.3 Organizational roles, responsibilities, and authorities
6.2 Information security objectives & plans 7 Support 9.1 Monitoring, measurement, analysis and evaluation
A.5.2 Information security roles and responsibilities
A.5.3 Segregation of duties
A.5.10 Acceptable use of information and other associated assets
A.6 People controls
A.6.3 Information security awareness, education and training
Governance and Ecosystem / Information System Security Governance & Risk Management / Information system security indicatorsMVSP 1.6 Compliance6.2 Information security objectives and planning to achieve them
7.1 Resources
7.2 Competence
9 Performance evaluation
A.12.1.3.Capacity Management
6.2 Information security objectives & plans
7.1 Resources
7.2 Competence
9 Performance evaluation
A.8.6 Capacity Management
Governance and Ecosystem / Information System Security Governance & Risk Management / Information system security risk analysisMVSP 1.3 Self-assessment
MVSP 1.4 External testing
MVSP 1.8 Data handling
MVSP 2.6 Dependency Patching
6 Planning
8 Operation
9.3 Management review
10 Improvement
A.8.1.1 Inventory of assets
A.12.6.1 Management of technical vulnerabilities
A.18.2.1 Independent review of information security
6 Planning
8 Operation
9.3 Management review
10 Improvement
A.5.9 Inventory of information and other associated assets
A.8.8 Management of technical vulnerabilities
A.5.35 Independent review of information security
Governance and Ecosystem / Information System Security Governance & Risk Management / Information system security auditMVSP 1.4 External testing6 Planning
8 Operation
9.2 Internal audit
9.3 Management review
10 Improvement
A.5.1.2 Review of the policies for information security
A.12.7.1 Information systems audit controls
A.18.2 Information security reviews
6 Planning
8 Operation
9.2 Internal audit
9.3 Management review
10 Improvement
A.5.1 Policies for information security
A.5.35 Independent review of information security
A.8.34 Protection of information systems during audit testing
Governance and Ecosystem / Ecosystem Management / Ecosystem mappingMVSP 1.2 Customer testing4.1 Understanding the organization and its context
4.2 Understanding the needs and expectations of interested parties
4.3 Determining the scope of the information security management system
5.2 Policy
8.1 Operational planning and control
4.1 Organisational context
4.2 Interested parties
4.3 ISMS scope
5.2 Policy
8.1 Operational planning and control
Governance and Ecosystem / Information System Security Governance & Risk Management / Information system security accreditationMVSP 1.3 Self-assessment
MVSP 1.4 External testing
MVSP 1.8 Data handling
6.1 Actions to address risks and opportunities
8 Operation
9.2 Internal audit
10.1 Nonconformity and corrective action
A.12.1.1 Documented operating procedures
A.12.7.1 Information systems audit controls
6.1 Actions to address risks and opportunities
8 Operation
9.2 Internal audit
10.2 Nonconformity and corrective action
A.5.37 Documented operating procedures
A.8.34 Protection of information systems during audit testing
Governance and Ecosystem / Information System Security Governance & Risk Management / Information system security policyMVSP 1.6 Compliance
MVSP 1.5 Training
MVPS 3.1 List of data
MVSP 3.2 Data flow diagram
4.3 Determining the scope of the information security management system
4.4 Information security management system
5.1 Leadership and commitment
5.2 Policy
5.3 Organizational roles, responsibilities and authorities
6.2 Information security objectives and planning to achieve them
9.3 Management review
A.5.1.1 Policies for information security
A.5.1.2 Review of the policies for information security
A.6.1.1 Information security roles and responsibilities
A.7.2.1 Management responsibilities
A.18.1.1 Identification of applicable legislation and contractual requirements
A.18.1.2 Intellectual property rights
A.18.2.2 Compliance with security policies and standards
4.3 ISMS scope
4.4 Information security management system
5.1 Leadership and commitment
5.2 Policy
5.3 Organizational roles, responsibilities and authorities
6.2 Information security objectives & plans
9.3 Management review
A.5.1 Policies for information security
A.5.35 Independent review of information security
A.5.2 Information security roles and responsibilities
A.5.4 Management responsibilities
A.5.31 Legal, statutory, regulatory and contractual requirements
A.5.32 Intellectual property rights
A.5.36 Compliance with policies, rules and standards for information security
Governance and Ecosystem / Ecosystem Management / Ecosystem relationsMVSP 4.1 Physical access
MVSP 4.2 Logical access
MVSP 4.3 Subprocessors
4.2 Understanding the needs and expectations of interested parties
5.2 Policy
7.4 Communication
7.5 Documented information
8.1 Operational planning and control
9.3 Management review
A.5.1.1 Policies for information Security
A.7.1.2 Terms and conditions of employment
A.7.2 During employment
A.7.3 Termination and change of employment
A.12.7 Information systems audit considerations
A.13.2 Information transfer
A.14.2.7 Outsourced development
A.15 Supplier relationships
A.18.1.1 Identification of applicable legislation and contractual requirements
4.2 Interested parties
5.2 Policy
7.4 Communication
7.5 Documented information
8.1 Operational planning and control
9.3 Management review
A.5.1 Policies for information security
A.76.2 Terms and conditions of employment
A.6.5 Responsibilities after termination or change of employment
A.5.23 Independent review of information security
A.5.14 Information transfer
A.8.30 Outsourced development
A.5.19 Information security in supplier relationships
A.5.31 Legal, statutory, regulatory and contractual requirements
Potection / Identity and access management / Authentication and identificationMVSP 2.1 Single Sign-On
MVSP 2.4 Password policy
MVSP 4.1 Physical access
MVSP 4.2 Logical access
A.9.1 Business requirements of access control
A.9.3 User responsibilities
A.9.4.1 Information access restriction
A.9.4.2 Secure log-on procedures
A.9.4.3 Password management system
A.5.15 Access control
A.8.3 Information access restriction
A.8.5 Secure authentication A.8.6 Capacity management
Potection / IT Security Maintenance / IT security maintenance procedureMVSP 1.1 Vulnerability reports
MVSP 1.2 Customer testing
MVSP 2.5 Security libraries
MVSP 2.6 Dependency Patching
7.5.3 Control of documented information
8.1 Operational planning and control
10.1 Nonconformity and corrective action
A.11.2.4 Equipment maintenance
A.12.1.2 Change management
A.12.6.1 Management of technical vulnerabilities
A.14.1.1 Information security requirements analysis and specification
A.14.2 Security in development and support processes
A.15.2.2 Managing changes to supplier services
7.5.3 Control of documented properly
8.1 Operational planning and control
10.1 Nonconformity and corrective action
A.7.13 Equipment maintenance
A.8.32 Change management
A.8.8 Management of technical vulnerabilities
A.5.31 Legal, statutory, regulatory and contractual requirements
A.8.25 Secure development life cycle
A.8.26 Application security requirements
A.8.27 Secure system architecture and engineering principles
A.5.22 Monitoring, review and change management of supplier services
Potection / IT Security Architecture / System segregationMVSP 4.2 Logical accessA.12.1.4 Separation of development, testing and operational environments
A.13.1 Network security management
A.8.31 Separation of development, testing and operational environments
A.8.20 Network security management
A.8.21 Security of network services
Potection / IT Security Architecture / CryptographyMVSP 2.2 HTTPS-only
MVSP 2.8 Encryption
MVSP 3.1 List of data
MVSP 3.2 Data flow diagram
A.10.1 Cryptographic controls
A.18.1.5 Regulation of cryptographic controls
A.8.24 Use of cryptography
A.5.36 Compliance with policies, rules and standards for information security
Potection / IT Security Maintenance / Industrial control systemsMVSP 1.6 Compliance4 Context of the organization
5.2 Policy
5.3 Organizational roles, responsibilities and authorities
7 Support
8 Operation
9.1 Monitoring, measurement, analysis and evaluation
A.6.1.1 Information security roles and responsibilities
A.8.1.1 Inventory of assets
A.8.2.3 Handling of assets
A.9 Access control
A.11 Physical and environmental security
A.12 Operations security
A.14 System acquisition, development and maintenance
A.15 Supplier relationships
A.17 Information security aspects of business continuity management
4 Context of the organization
5.2 Policy
5.3 Organizational roles, responsibilities and authorities
7 Support
8 Operation
9.1 Monitoring, measurement, analysis and evaluation
A.5,2 Information security roles and responsibilities
A.5.9 Inventory of information and other associated assets
A.5.10 Acceptable use of information and other associated assets
A.9 Access control
A.7 Physical controls
A.8 Technological controls
A.5.19 Information security in supplier relationships
A.5.30 ICT readiness for business continuity
Potection / IT Security Administration / Administration accountsMVSP 2.1 Single Sign-On
MVSP 2.2 HTTPS-only
MVSP 2.3 Security Headers
MVSP 2.4 Password policy
A.9.2.3 Management of privileged access rights
A.9.2.5 Review of user access rights
A.9.2.6 Removal or adjustment of access rights
A.12.4.3 Administrator and operator logs
A.8.2 Privileged access rights
A.8.3 Information access restriction
A.8.4 Access to source code
A.8.5 Secure authentication
Potection / Physical and environmental security / Physical and environmental securityMVSP 4.1 Physical accessA.8.1 Responsibility for assets
A.11 Physical and environmental security
A.5.9 Inventory of information and other associated assets
A.5.10 Acceptable use of information and other associated assets
A.5.11 Return of assets
Potection / Identity and access management / Access rightsMVSP 4.2 Logical accessA.9.2 User access management
A.9.4.4 Use of privileged utility programs
A.9.4.5 Access control to program source code
A.5.15 Access control
A.8.2 Privileged access rights
A.8.3 Information access restriction
A.8.4 Access to source code
Potection / IT Security Architecture / Traffic filteringMVSP 3.5 Build process8.1 Operational planning and control
A.13.1 Network security management
A.13.2.1 Information transfer policies and procedures
A.13.2.2 Agreements on information transfer
8.1 Operational planning and control
A.8.20 Network security
A.8.21 Security of network services
A.8.22 Segregation of networks
A.5.14 Information transfer
Potection / IT Security Administration / Administration information systemsMVSP 3.1 List of data
MVSP 3.2 Data flow diagram
A.9.3.1 Use of secret authentication information
A.9.4 System and application access control
A.12.1.4 Separation of development, testing and operational environments
A.12.4.3 Administrator and operator logs
A.5.17 Authentication Information
A.8.31 Separation of Development, Test and Production Environments
A.8.15 Logging
Potection / IT Security Architecture / Systems configurationMVSP 2.3 Security Headers
MVSP 2.5 Security libraries
MVSP 2.6 Dependency Patching
4.3 Determining the scope of the information security management system
A.6.2.1 Mobile device policy
A.8.3.1 Management of removable media
A.12.1 Operational procedures and responsibilities
A.12.5 Control of operational software
A.12.6.2 Restrictions on software installation
A.13.1.2 Security of network services
A.14.1 Security requirements of information systems
A.14.2.1 Secure development policy
A.14.2.2 System change control procedures
A.14.2.3 Technical review of applications after operating platform changes
A.14.2.4 Restrictions on changes to software packages
A.14.2.5 Secure system engineering principles
A.14.2.6 Secure development environment
4.3 ISMS scope
A.7.10 Storage media
A.8 Technological controls
Resilience / Continuity of operations / Disaster recovery managementMVSP 4.4 Backup and Disaster recoveryA.17.2 RedundanciesA.8.14 Redundancy of information processing facilities
Resilience / Crisis management / Crisis management organisationMVSP 1.7 Incident handling
MVSP 4.4 Backup and Disaster recovery
5.3 Organizational roles, responsibilities and authorities
A.6.1.1 Information security roles and responsibilities
A.11.2.4 Equipment maintenance
A.17.1 Information security continuity
5.3 Organizational roles, responsibilities and authorities
A.5.2 Information security roles and responsibilities
A.7.13 Equipment maintenance
A.5.30 ICT readiness for business continuity
Resilience / Crisis management Crisis management organizationMVSP 1.7 Incident handling5.3 Organizational roles, responsibilities and authorities
A.6.1.1 Information security roles and responsibilities
A.11.2.4 Equipment maintenance
A.17.1 Information security continuity
5.3 Organizational roles, responsibilities and authorities
A.5.2 Information security roles and responsibilities
A.7.13 Equipment maintenance
A.5.30 ICT readiness for business continuity
Resilience / Continuity of operations / Business continuity managementMVSP 3.3 Vulnerability prevention
MVSP 3.4 Time to fix vulnerabilities
MVSP 3.5 Build process
MVSP 4.4 Backup and Disaster recovery
9.3 Management review
10.2 Continual improvement
A.5.1.2 Review of the policies for information security
A.11.2.4 Equipment maintenance
A.17.1 Information security continuity
A.17.2 Redundancies
9.3 Management review
10.2 Continual improvement
A.5.35 Independent review of information security
A.7.13 Equipment maintenance
A.5.30 ICT readiness for business continuity
A.8.14 Redundancy of information processing facilities
Resilience / Crisis management / Crisis management processMVSP 3.3 Vulnerability prevention
MVSP 3.4 Time to fix vulnerabilities
MVSP 3.5 Build process
MVSP 4.4 Backup and Disaster recovery
7.4 Communication
9.3 Management review
10.2 Continual improvement
A.5.1.2 Review of the policies for information security
A.6.1.3 Contact with authorities
A.11.2.4 Equipment maintenance
A.17.1 Information security continuity
7.4 Communication
9.3 Management review
10.2 Continual improvement
A.5.35 Independent review of information security
A.5.5 Contact with authorities
A.7.14 Equipment maintenance
A.5.30 ICT readiness for business continuity

ENISA Minimum Security Measures

To achieve these standards and mappings, we have leveraged the expertise of the European ENISA agency and its Minimum Security Measures for Operators of Essential Services. This collaborative effort ensures that our cybersecurity controls not only meet international standards but also align with the specific requirements of essential services.

Conclusion

With the integration of new cybersecurity controls and alignment with ISO/IEC standards and the EU NIS Directive, Unicis Cybersecurity Controls for Jira is committed to providing a robust and comprehensive security solution. This initiative aims to enhance the security posture of organizations, contributing to a safer and more secure digital ecosystem.

Subscribe to our newsletters below for further updates and enhancements as we continue to evolve our cybersecurity controls to meet the dynamic challenges of the cybersecurity landscape. Your security is our highest priority.

Newsletter