Cybsis /ˈkyp.sis/ (Cybersecurity Standard Implementation Software) is RaulWalter’s information security management and risk management platform, designed to support organisations in meeting E-ITS requirements, mapping information systems, assessing risks, planning security measures, and ensuring audit readiness.

Cybsis brings all elements of the Information Security Management System (ISMS) into a single workspace, offering a clear structure, role-based workflows, and traceable documentation.

The platform is built on practical project experience and years of auditing expertise, to reduce administrative overhead, increase process transparency, and give management real-time visibility into the organisation’s security posture. Cybsis is suitable for small organisations without a dedicated security officer as well as larger institutions that require a standardised, scalable, and evidence-driven environment for managing information security.

Information Security Management System (ISMS)

Cybsis supports the complete establishment and management of an organisation’s Information Security Management System in accordance with the principles of the Estonian Information Security Standard (E-ITS). The platform links assets, risks, security measures, the IMR, roles, and evidence into a single, traceable, structured, and fully auditable operational ISMS.

Cybsis supports management reviews, monitoring, periodic assessments, and the continuous improvement of information security processes. It enables organisations to manage security consistently, measurably, and in complete alignment with requirements—without the fragmentation of separate documents and disconnected tools.

Asset Management

The asset management module in Cybsis forms the foundational layer of the entire information security management system, bringing together all organisational services, information systems, components, applications, servers, data collections, and processes into a unified structure.

The platform follows the E-ITS principles for asset inventory, assigning each asset an owner, criticality level, relationships with other assets, and links to relevant security measures. Cybsis makes asset mapping systematic and transparent, ensuring that the risk analysis, IMR, and audit readiness are all based on a complete and up-to-date overview of the organisation’s assets.

The asset management module helps the organisation understand precisely what needs protection, the dependencies involved, and the extent to which required security controls cover assets.

Business Process Mapping

Cybsis supports business process mapping as an independent yet security-critical layer that connects organisational services, assets, and risks with real operational workflows. Business processes are documented together with their owners, inputs, outputs, related information systems, data repositories, and key components, creating a clear understanding of how the organisation’s core activities actually function. This forms the basis for risk assessment, control alignment, IMR development, and audit readiness.

Cybsis makes business process mapping systematic and transparent by automatically linking processes with assets, risks, and security measures. The result is an accurate and traceable view of business-critical processes that supports management decision-making and ensures that information security is fully integrated into daily operations.

Risk Management

Cybsis fully supports the E-ITS risk analysis methodology, enabling organisations to identify, assess, and manage information security risks in a systematic and evidence-based manner. Risk scenarios are created in the platform based on assets, business processes, and identified vulnerabilities, followed by evaluating their likelihood and impact and calculating the associated risk levels. Risks are automatically linked to the relevant security measures and IMR activities, helping organisations set priorities and plan corrective actions.

Cybsis allows the risk register to be continuously updated, supports the management of control mechanisms, and provides senior management with a clear overview of the organisation’s risk profile. The result is a transparent, traceable, and fully auditable risk management process that forms the core workflow of E-ITS implementation.

Security Measures Implementation

Cybsis supports the implementation of security measures in accordance with E-ITS requirements, linking each control to the relevant assets, risks, and organisational units. Every measure is documented with its objective, scope, responsible owner, validity period, and verification method, ensuring a clear overview of which requirements are already fulfilled and which still require attention.

Cybsis generates control-specific tasks, tracks implementation progress, and manages the evidence required for both internal and external audits. The platform implements systematic, transparent security measures, enabling organisations to transition from fragmented documentation to a unified, comprehensive, and controllable information security framework. The result is a clearly structured and fully auditable overview of the current status of security measure implementation.

IMR (Information Security Measures Implementation Plan)

The Cybsis IMR (Information Security Measures Implementation Plan) is a central tool for implementing E-ITS requirements, consolidating all security measures into a unified, structured, and time-bound action plan. The IMR links each measure with the corresponding risks, assets, and responsible owners, helping organisations set priorities, allocate resources, and define deadlines. The platform enables tracking implementation progress, managing deviations, adding evidence, and preparing audit packages for both internal and external audits.

The Cybsis IMR implements security measures that are transparent and controllable, reducing administrative overhead and ensuring that the organisation progresses systematically toward an E ITS–compliant security posture. The result is an operational and fully auditable corrective and implementation plan that supports the entire information security management system.

Task, Role, and Responsibility Management

Cybsis provides clear and transparent task, role, and responsibility management across the entire information security management system. The platform allows organisations to assign responsible owners for assets, risks, and security measures; create tasks for implementing IMR activities; set deadlines; and track progress throughout the process.

Role-based access control ensures that each user can view and manage only the tasks within their area of responsibility, supporting the E-ITS requirement for clearly assigned ownership and accountability within information security processes. Cybsis consolidates all security-related activities into a single workflow, reducing fragmentation and ensuring that no critical task is overlooked. The result is a consistent, traceable, and fully auditable operational structure that supports a mature information security practice.

Documentation and Evidence Management

Cybsis centralises all policies, guidelines, procedures, logs, and audit evidence required for managing information security into a single, structured environment.

Each document and piece of evidence is linked to a specific security measure, asset, or IMR activity, ensuring a transparent, fully auditable connection between E-ITS requirements and the organisation’s operational practices.

The platform supports version control, validity reviews, and cyclical evidence updates, making audit preparation significantly faster and more accurate.

Cybsis ensures that all required evidence is always accessible, up to date, and associated with the correct control or measure, reducing administrative burden and increasing the reliability and maturity of the information security management system.

Audit View

The Cybsis audit view consolidates all E-ITS requirements, security measures, evidence, and IMR activities into a single overview that displays the organisation’s compliance status in real time. The platform clearly presents fulfilled and unfulfilled requirements, nonconformities, risk areas, and all evidence needed for audit purposes in a structured format that supports both internal and external audits.

Cybsis tracks the progress of security measure implementation, the validity of documents and evidence, and automatically identifies gaps that may hinder compliance with E-ITS requirements. The audit view significantly reduces preparation time, making the audit process transparent, evidence based, and fully controllable. The result is a systematic and operational compliance overview that supports management decision-making and ensures that the organisation progresses consistently toward an E-ITS–compliant security posture.

Metrics, Reports, and Dashboards

Cybsis provides management and the information security team with real-time visibility into the organisation’s security posture, risk exposure, and the progress of security measure implementation. The platform visualises critical indicators — unfulfilled requirements, risk scenarios, IMR progress, audit readiness, nonconformities, and asset protection levels — through clear and intuitive charts.

Cybsis enables the creation of automated management reports, periodic reviews, and domain-specific operational reports that support decision-making and resource planning. The dashboards consolidate all key indicators of the information security management system into a single view, making monitoring operational, transparent, and evidence-based. The result is a practical tool that helps management assess security maturity and direct necessary actions to the right place at the right time.

Integrations

Cybsis supports a range of integrations that simplify user management, strengthen security, and streamline information security processes. The platform enables authentication using the Estonian ID card, ensuring strong cryptographic identity verification and transparent user traceability.

The Active Directory integration allows automatic synchronisation of users, roles, and organisational units, ensuring that permissions and responsibilities remain up to date and aligned with the organisation’s structure.

The Jira Cloud integration links information security tasks with the organisation’s overall workflow: IMR activities, risk-related tasks, and corrective actions from audit findings can be automatically forwarded to Jira, ensuring full traceability and reducing administrative overhead.

These integrations make Cybsis a natural part of the organisation’s technical and operational ecosystem, supporting security, efficiency, and process continuity.

Be the enabler. Let’s work together.