Skip to main content

Platform Modules

Cybersecurity Management System (CSC) - Unicis.Tech OÜ Docs

Manage cybersecurity controls and GAP analysis across multiple frameworks in Unicis Platform.

The Cybersecurity Management System (CSC) module provides a comprehensive set of baseline security controls to safeguard against cyber threats. It supports multiple compliance frameworks, enabling organizations to assess their security posture, track control implementation, and perform GAP analysis.

Supported Frameworks

Framework availability by subscription plan:

FrameworkPlan
MVSP v1.0 (Minimum Viable Secure Product)Community (default)
GDPRCommunity
ISO/IEC 27001Premium
EU NIS2 DirectivePremium
CIS Critical Security Controls v8.1Premium
C5 (Cloud Computing Compliance Controls Catalogue)Premium
SOC 2Ultimate
NIST CSF 2.0Ultimate

Multi-framework selection by plan:

  • Community — access to one cybersecurity framework
  • Premium — select and manage up to three frameworks simultaneously
  • Ultimate — access to all frameworks with full multi-framework integration and cross-mapping support

Dashboard

The CSC dashboard is divided into two sections.

Charts

  1. Pie chart — distribution of control statuses as a proportion of all controls
  2. Radar chart — security maturity levels per domain, based on ISO/IEC 21827
    methodology

Controls Table

ColumnDescription
CodeFramework code, e.g. MVSP-1.1
SectionDomain or section, e.g. Business Controls, Application Design Controls
ControlControl name, e.g. Training, Self-assessment
RequirementsWhat must be set up and put into practice
StatusCurrent maturity level (dropdown)
TasksLinked tasks/evidence (dropdown selection from team tasks)

Frameworks

Minimum Viable Secure Product (MVSP)

MVSP v1.0 is a minimal security checklist for B2B software and business process outsourcing suppliers. Created with simplicity in mind, it only includes measures that must be in place to guarantee a product has a minimally feasible security posture. All businesses creating B2B software or managing sensitive data should implement these controls at a minimum.

GDPR (General Data Protection Regulation)

The GDPR is the EU legal framework for protecting personal data of individuals. It applies to all organizations processing personal data of EU residents. The Unicis CSC application provides a mapped set of GDPR requirements and implementation guidance, focusing on practical steps for data minimization, accountability, and privacy by design.

ISO/IEC 27001

ISO/IEC 27001 is an Information Security Management System (ISMS) standard protecting the confidentiality, integrity, and availability of data. The Unicis CSC application provides ISO/IEC 27001 revision controls, updated in 2013 and most recently in 2022.

Controls can be filtered by section using Choose a section, by status using Choose a status, and by page count (5, 10, 25, 50, 100).

EU NIS2 Directive

NIS2 is the EU’s latest cybersecurity legislation aimed at enhancing security across critical infrastructure sectors and digital service providers. It introduces risk management measures, incident reporting obligations, and board-level accountability for a wider range of organizations including energy, transport, health, digital infrastructure, and public administration.

CIS Controls v8.1

CIS v8.1 is a prioritized and actionable set of 18 cybersecurity best practices covering asset inventory, access control, vulnerability management, secure configuration, and incident response. Continuously updated by experts to reflect evolving threats.

C5 (Cloud Computing Compliance Controls Catalogue)

The C5 Framework, developed by the German Federal Office for Information Security (BSI), provides a standardized approach for assessing cloud service provider security. It defines controls across key domains including data protection, service availability, incident management, and regulatory compliance — especially relevant for organizations relying on cloud services.

NIST CSF 2.0

The NIST CSF 2.0 is a voluntary framework from the National Institute of Standards and Technology designed to help organizations protect their information systems. It provides a structured approach to evaluating cybersecurity risk, identifying areas for improvement, and managing cybersecurity programs aligned with business objectives.

SOC 2 (Service Organization Control 2)

The SOC 2 framework, developed by the AICPA, focuses on managing customer data based on five Trust Service Criteria: security, availability, processing integrity, confidentiality, and privacy. The Unicis CSC application provides mapped SOC 2 controls aligned with the Trust Services Criteria.

Maturity Levels (ISO/IEC 21827
)

Maturity level is based on ISO/IEC 21827

— Systems Security Engineering — Capability Maturity Model:

StatusMeaning
UnknownHas not been checked yet
Not ApplicableManagement has determined this can be ignored
Not PerformedComplete lack of recognizable policy, procedure, or control
Performed InformallyDevelopment barely started; requires significant work
PlannedProgressing but not yet complete
Well DefinedMostly complete; detail lacking or not yet enforced by management
Quantitatively ControlledComplete; implemented and recently started operating
Continuously ImprovingFully satisfied; actively monitored with substantial auditor evidence

Add a Control to a Task

From a task in edit mode, open the Cybersecurity Controls tab:

  1. Select a control from the dropdown (format: CODE: Section, Control name, e.g. MVSP-1.5: Business controls, Training)
  2. Set the Status
  3. Read the control requirements
  4. Add additional controls with + Add Control
  5. Remove a specific control with the Remove button next to it

Delete

Controls associated with a task can be deleted individually by clicking Remove next to the specific control, or all controls can be cleared by deleting the associated task.

Activity Logs

Access audit logs by opening the associated task and navigating to Audit Logs → Cybersecurity Audit Logs.

Logged events:

  • Created
  • Updated
  • Deleted