Fixed Intel
Back to Frameworks
NCA

NCA ECC

v2:2024ACTIVE

NCA Essential Cybersecurity Controls

Saudi Arabia's National Cybersecurity Authority Essential Cybersecurity Controls. Mandatory for government entities and critical infrastructure operators.

National Cybersecurity Authority (NCA)
Saudi Arabia
Official Website
Mandatory for:GovernmentBankingTelecommunicationsEnergyHealthcare

25

Total Controls

7

Domains

35

Cross-Framework Mappings

Saudi Arabia

Region

Cybersecurity Governance

حوكمة الأمن السيبراني4
1-1HIGH2 mappings

Cybersecurity Policy

Plain Language

Your organization must have a written cybersecurity policy approved by top management.

Implementation Guidance

Create a concise policy (10-20 pages) covering scope, objectives, roles. Get CEO/board sign-off. Review annually.

Evidence Examples

Signed policy document, board minutes, employee acknowledgment records.

1-2HIGH2 mappings

Cybersecurity Roles and Responsibilities

Plain Language

A dedicated cybersecurity function must exist with clear roles and reporting lines.

Implementation Guidance

Appoint a CISO. Define reporting to C-suite. Create RACI matrix for security responsibilities.

Evidence Examples

Org chart, CISO appointment, RACI matrix, job descriptions.

1-3MEDIUM1 mapping

Cybersecurity in Project Management

1-4HIGH1 mapping

Cybersecurity Awareness

Plain Language

All employees must receive cybersecurity awareness training regularly.

Implementation Guidance

Conduct onboarding training, quarterly phishing simulations, and annual refresher courses.

Evidence Examples

Training attendance records, phishing simulation reports, quiz results.

Cybersecurity Risk Management

إدارة مخاطر الأمن السيبراني3
2-1HIGH2 mappings

Risk Management

Plain Language

Regularly identify, assess, and treat cybersecurity risks to your organization.

Implementation Guidance

Conduct annual risk assessments. Use ISO 27005 or similar methodology. Maintain risk register. Report to management.

Evidence Examples

Risk assessment reports, risk register, risk treatment plans, management reviews.

2-2HIGH

Asset Management

2-3MEDIUM1 mapping

Information Classification

Cybersecurity Operations

عمليات الأمن السيبراني4
3-1HIGH2 mappings

Access Control Policy

Plain Language

Control who can access systems and data based on need-to-know and least privilege.

Implementation Guidance

Implement RBAC. Enforce least privilege. Require manager approval for access. Quarterly access reviews.

Evidence Examples

Access control policy, RBAC matrix, access review reports, privilege account inventory.

3-2HIGH1 mapping

Identity Management

3-3HIGH2 mappings

Authentication

3-4CRITICAL1 mapping

Privileged Access Management

Cybersecurity Technology

تقنيات الأمن السيبراني5
4-1HIGH2 mappings

Secure Configuration

4-2HIGH1 mapping

Malware Protection

4-3HIGH2 mappings

Vulnerability Management

Plain Language

Regularly scan for and manage technical vulnerabilities, including timely patching.

Implementation Guidance

Weekly vulnerability scans. Patch critical vulns within 48h, high within 7 days. Subscribe to vendor bulletins.

Evidence Examples

Vulnerability scan reports, patch management records, SLA compliance, remediation tracking.

4-4HIGH2 mappings

Security Logging and Monitoring

4-5HIGH1 mapping

Network Security

Incident Management

إدارة الحوادث4
5-1HIGH2 mappings

Incident Response Planning

Plain Language

Have a documented plan for detecting, responding to, and recovering from cybersecurity incidents.

Implementation Guidance

Create IR playbooks for common scenarios. Define escalation paths. Conduct tabletop exercises quarterly.

Evidence Examples

IR plan, playbooks, tabletop exercise reports, contact lists, post-incident reviews.

5-2HIGH1 mapping

Incident Detection

5-3HIGH2 mappings

Incident Handling

5-4MEDIUM1 mapping

Lessons Learned

Business Continuity

استمرارية الأعمال2
6-1HIGH2 mappings

Business Continuity Planning

6-2HIGH1 mapping

Disaster Recovery

Physical Security

الأمن المادي3
7-1MEDIUM1 mapping

Physical Security Perimeters

7-2MEDIUM1 mapping

Physical Entry Controls

Mapped to Other Frameworks

7-3MEDIUM1 mapping

Physical Security Monitoring