{"id":10,"date":"2022-04-12T00:52:01","date_gmt":"2022-04-12T00:52:01","guid":{"rendered":"http:\/\/tcm.gov.to\/?page_id=10"},"modified":"2022-05-02T22:12:31","modified_gmt":"2022-05-02T22:12:31","slug":"home","status":"publish","type":"page","link":"https:\/\/tcm.gov.to\/","title":{"rendered":"Home"},"content":{"rendered":"<div id=\"themify_builder_content-10\" data-postid=\"10\" class=\"themify_builder_content themify_builder_content-10 themify_builder\">\n    \t<!-- module_row -->\n\t<div   class=\"themify_builder_row module_row clearfix module_row_0 themify_builder_10_row module_row_10-0 tb_yito657\">\n\t    \t    <div class=\"row_inner col_align_top\" >\n\t\t\t<div  class=\"module_column tb-column col-full first tb_10_column module_column_0 module_column_10-0-0 tb_8ovb657\" >\n\t    \t    \t        <div class=\"tb-column-inner\">\n\t\t    <!-- module text -->\n<div  class=\"module module-text tb_uumg894    \">\n            <div  class=\"tb_text_wrap\">\n    <h2 class=\"u-align-center u-text u-text-1\" style=\"text-align: center;\">Tonga Cybersecurity Manual<\/h2>    <\/div>\n<\/div>\n<!-- \/module text -->\n\t        <\/div>\n\t    \t<\/div>\n\t\t    <\/div>\n\t    <!-- \/row_inner -->\n\t<\/div>\n\t<!-- \/module_row -->\n\t\t<!-- module_row -->\n\t<div   class=\"themify_builder_row module_row clearfix module_row_1 themify_builder_10_row module_row_10-1 tb_xh6c273\">\n\t    \t    <div class=\"row_inner col_align_top\" >\n\t\t\t<div  class=\"module_column tb-column col-full first tb_10_column module_column_0 module_column_10-1-0 tb_fw8i274\">\n\t    \t    \t        <div class=\"tb-column-inner\">\n\t\t    <!-- module text -->\n<div  class=\"module module-text tb_7lu3985    \">\n            <div  class=\"tb_text_wrap\">\n    <h2 style=\"text-align: left;\"><strong>Purpose:<\/strong><\/h2>\n<p style=\"text-align: left;\">The purpose of the Tonga Cybersecurity Manual is to provide strategic and practical guidance on how organizations in Tonga can protect their systems and data from cyber threats.<\/p>\n<h2><b>Scope<\/b>:<\/h2>\n<p style=\"text-align: left;\">The manual was developed taking into account internationally recognized IT security frameworks, especially ISO standards ISO\/IEC 27002 (Code of practice for information security controls) and ISO\/IEC 27005 (Information security risk management).<\/p>\n<h2><b>Target audience<\/b>:<\/h2>\n<p style=\"text-align: left;\">The Tonga Cybersecurity Manual is<strong> targeted at Tongan Government agencies<\/strong> to improve the overall security profile and ICT capabilities across the government. The manual also addresses enterprises through raising risk awareness and improving corporate cyber hygiene.<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->\n<!-- module text -->\n<div  class=\"module module-text tb_ctg1299    \">\n            <div  class=\"tb_text_wrap\">\n    <h2 style=\"text-align: center;\">Steps of Cybersecurity Management<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-135 aligncenter\" src=\"http:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/04\/123-221x300.jpg\" alt=\"\" width=\"342\" height=\"465\" srcset=\"https:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/04\/123-221x300.jpg 221w, https:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/04\/123-768x1041.jpg 768w\" sizes=\"auto, (max-width: 342px) 100vw, 342px\" \/><\/p>\n<p class=\"u-align-center u-text u-text-palette-1-base u-text-4\" style=\"text-align: center;\">Figure 1: Steps of cybersecurity management<\/p>\n<p class=\"u-align-left u-text u-text-5\">The Management of the organization initiates the implementation of the Tonga Cybersecurity Manual by assigning a responsible person for the information security management (see also 1.1.2 Information security roles and responsibilities). Furthermore, the Management is responsible for providing the required resources, e.g. training, time and finances. For efficient and effective implementation, the Management should support the information security manager with high-level decisions and receive and review periodical overviews about the progress of information security management and information security incidents. \u00a0\u00a0<\/p>\n<p>There are several vital steps to be performed in the process of cybersecurity implementation. These steps are cyclical (the completion of the last step initiates the first step one more time, ideally within annual cycles) and are descibed in detail in the next chapters. They can be summarized as follows:<\/p>\n<p class=\"u-align-left u-text u-text-6\"><strong>1.\u00a0INFORMATION ASSET INVENTORY<\/strong><br \/>Protection of information assets starts with establishing a clear picture of the organization\u2019s information assets \u2013 systems, applications, data and other resources that are vital to keeping information systems running. Secondly, system owners assign systems and data with the requirements of confidentiality, integrity and availability.<\/p>\n<p><strong>2.a.\u00a0\u00a0[BASELINE] RISK SCENARIOS<\/strong><br \/>Once the organization has a good understanding of what systems and data need protection, security risks are identified, analysed and evaluated. For smaller organizations, a simplified method of risk scenarios can be used as a step in cyber risk management.<\/p>\n<p><strong>2.b.\u00a0\u00a0[ADVANCED] RISK ASSESSMENT<\/strong><br \/>Risk assessment identifies the applicable threats and vulnerabilities, determines the potential consequences and, finally, prioritizes the derived risks.<\/p>\n<p><strong>3.\u00a0\u00a0RISK TREATMENT<\/strong><br \/>All important cyber security risks that can impact systems and data are managed by selecting and applying protective measures \u2013 the security controls. The highest risks should be considered with highest priority.<\/p>\n<p><strong>4.\u00a0SECURITY CONTROL ASSESSMENT<\/strong><br \/>After the security controls have been applied, an assessment of their effectiveness must be introduced in order to verify that the measures are implemented correctly and are operating as intended.<\/p>\n<p><strong>5.\u00a0MONITORING OF CYBER THREATS<\/strong><br \/>Finally, as the cyber security environment never stops changing, monitoring of cyber threats and associated risks must be introduced to enable corrective actions.<\/p>    <\/div>\n<\/div>\n<!-- \/module text -->\n\t        <\/div>\n\t    \t<\/div>\n\t\t    <\/div>\n\t    <!-- \/row_inner -->\n\t<\/div>\n\t<!-- \/module_row -->\n\t<\/div>\n\n\n","protected":false},"excerpt":{"rendered":"<p>Tonga Cybersecurity Manual Purpose: The purpose of the Tonga Cybersecurity Manual is to provide strategic and practical guidance on how organizations in Tonga can protect their systems and data from cyber threats. Scope: The manual was developed taking into account internationally recognized IT security frameworks, especially ISO standards ISO\/IEC 27002 (Code of practice for information [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-10","page","type-page","status-publish","hentry","has-post-title","has-post-date","has-post-category","has-post-tag","has-post-comment","has-post-author",""],"builder_content":"<h2 style=\"text-align: center;\">Tonga Cybersecurity Manual<\/h2>\n<h2 style=\"text-align: left;\"><strong>Purpose:<\/strong><\/h2> <p style=\"text-align: left;\">The purpose of the Tonga Cybersecurity Manual is to provide strategic and practical guidance on how organizations in Tonga can protect their systems and data from cyber threats.<\/p> <h2><b>Scope<\/b>:<\/h2> <p style=\"text-align: left;\">The manual was developed taking into account internationally recognized IT security frameworks, especially ISO standards ISO\/IEC 27002 (Code of practice for information security controls) and ISO\/IEC 27005 (Information security risk management).<\/p> <h2><b>Target audience<\/b>:<\/h2> <p style=\"text-align: left;\">The Tonga Cybersecurity Manual is<strong> targeted at Tongan Government agencies<\/strong> to improve the overall security profile and ICT capabilities across the government. The manual also addresses enterprises through raising risk awareness and improving corporate cyber hygiene.<\/p>\n<h2 style=\"text-align: center;\">Steps of Cybersecurity Management<\/h2> <p><img loading=\"lazy\" decoding=\"async\" src=\"http:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/04\/123-221x300.jpg\" alt=\"\" width=\"342\" height=\"465\" srcset=\"https:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/04\/123-221x300.jpg 221w, https:\/\/tcm.gov.to\/wp-content\/uploads\/2022\/04\/123-768x1041.jpg 768w\" sizes=\"auto, (max-width: 342px) 100vw, 342px\" \/><\/p> <p style=\"text-align: center;\">Figure 1: Steps of cybersecurity management<\/p> <p>The Management of the organization initiates the implementation of the Tonga Cybersecurity Manual by assigning a responsible person for the information security management (see also 1.1.2 Information security roles and responsibilities). Furthermore, the Management is responsible for providing the required resources, e.g. training, time and finances. For efficient and effective implementation, the Management should support the information security manager with high-level decisions and receive and review periodical overviews about the progress of information security management and information security incidents. \u00a0\u00a0<\/p> <p>There are several vital steps to be performed in the process of cybersecurity implementation. These steps are cyclical (the completion of the last step initiates the first step one more time, ideally within annual cycles) and are descibed in detail in the next chapters. They can be summarized as follows:<\/p> <p><strong>1.\u00a0INFORMATION ASSET INVENTORY<\/strong><br \/>Protection of information assets starts with establishing a clear picture of the organization\u2019s information assets \u2013 systems, applications, data and other resources that are vital to keeping information systems running. Secondly, system owners assign systems and data with the requirements of confidentiality, integrity and availability.<\/p> <p><strong>2.a.\u00a0\u00a0[BASELINE] RISK SCENARIOS<\/strong><br \/>Once the organization has a good understanding of what systems and data need protection, security risks are identified, analysed and evaluated. For smaller organizations, a simplified method of risk scenarios can be used as a step in cyber risk management.<\/p> <p><strong>2.b.\u00a0\u00a0[ADVANCED] RISK ASSESSMENT<\/strong><br \/>Risk assessment identifies the applicable threats and vulnerabilities, determines the potential consequences and, finally, prioritizes the derived risks.<\/p> <p><strong>3.\u00a0\u00a0RISK TREATMENT<\/strong><br \/>All important cyber security risks that can impact systems and data are managed by selecting and applying protective measures \u2013 the security controls. The highest risks should be considered with highest priority.<\/p> <p><strong>4.\u00a0SECURITY CONTROL ASSESSMENT<\/strong><br \/>After the security controls have been applied, an assessment of their effectiveness must be introduced in order to verify that the measures are implemented correctly and are operating as intended.<\/p> <p><strong>5.\u00a0MONITORING OF CYBER THREATS<\/strong><br \/>Finally, as the cyber security environment never stops changing, monitoring of cyber threats and associated risks must be introduced to enable corrective actions.<\/p>","_links":{"self":[{"href":"https:\/\/tcm.gov.to\/index.php?rest_route=\/wp\/v2\/pages\/10","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/tcm.gov.to\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/tcm.gov.to\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/tcm.gov.to\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/tcm.gov.to\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=10"}],"version-history":[{"count":16,"href":"https:\/\/tcm.gov.to\/index.php?rest_route=\/wp\/v2\/pages\/10\/revisions"}],"predecessor-version":[{"id":300,"href":"https:\/\/tcm.gov.to\/index.php?rest_route=\/wp\/v2\/pages\/10\/revisions\/300"}],"wp:attachment":[{"href":"https:\/\/tcm.gov.to\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=10"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}