Control ID | Control requirement description |
3.2.1. | Entities should establish identity and access management process to govern the logical accesses to the information assets according to need-to-have and need-to-know principles. |
3.2.2. | Entities should establish change management process to ensure that changes to the entities information assets are classified, tested and approved before their deployment into production environments. The change management process should also include cyber security requirements for controlling changes to information assets. |
3.2.3. | Entities should establish and maintain a secure network architecture that address taking into consideration the following: |
| a. | segmentation of networks, according to the functionality of services and the adoption of network security systems (e.g. firewalls) to control the network traffic between segments; and |
| b. | availability. |
3.2.4. | Entities should adopt secure and robust cryptography algorithms and ensure that the application and server communications are encrypted using secure protocols. |
3.2.5. | Entities should periodically conduct comprehensive vulnerability assessment (VA) covering both the application and infrastructure layers of the Entities technology landscape. |
3.2.6. | Entities should conduct penetration testing (PT) twice a year as a minimum or after major/ critical change to comprehensively evaluate its cyber security defense capability. |
3.2.7. | Entities should ensure up-to-date and relevant patches are tested, applied and installed in a timely manner to avoid security breaches due to existing vulnerabilities in the applications and infrastructure. |
3.2.8. | In addition to secure System Development Life Cycle (herein “Secure SDLC”) process entities should implement shielding techniques (such as but not limited to code obfuscation, white box cryptography and anti-tampering) in the application design. |
3.2.9. | Entities should implement effective brand protection controls to detect and defend against targeted attacks by continuously monitoring the online services such as apps, social media accounts and websites and proactively takedown malicious activities. |
3.2.10. | Entities should ensure that endpoints (both personal, if allowed, and corporate) are secured through implementation of a minimum set of cyber security requirements such as the following, but not limited to: |
| a. | the real time protection for the endpoints (e.g. antivirus and antimalware); |
| b. | implementation of behavioural-based and/or signature-based solutions; |
| c. | ensuring anti-malware signatures are up-to-date and the systems are regularly scanned for malicious files or anomalous activities; and |
| d. | in case of mobile devices: |
| | i. | separation and encryption of entities data; and |
| | ii. | secure wiping of stored entities data in cases of device loss, theft or decommissioning in alignment with the Secure Information Asset Disposal process. |
3.2.11. | Entities should establish and implement a process to collect, process, review and retain security logs to facilitate continuous security monitoring. These logs should provide sufficient details and should be retained securely for a period of one year as a minimum. |
3.2.12. | Entities should ensure applications and infrastructure components are integrated with a security information and event management (SIEM) solution. |
3.2.13. | Entities should ensure continuous security monitoring and analysis of cyber security events to promptly detect and respond to cyber security incidents. |
3.2.14. | Entities should develop Cyber Security Incident Management process to timely identify, respond and contain cyber security incidents impacting the Entities information assets. |
3.2.15. | Entities should implement session timeout configurations with reasonable timeframe; in-active sessions should not exceed 5 minutes for applications and underlying infrastructure. |
3.2.16. | Entities should immediately inform SAMA (F.S.Cybersecurity@SAMA.GOV.SA) in case any of the following incidents classified as medium or above has occurred and identified for: |
| a. | Cyber security; |
| b. | Fraud; |
| c. | All disruptive incidents. |
Ref. to other SAMA Framework(s) |
Cyber Security Framework |
- 3.3.5 Identity and Access Management - 3.3.6 Application Security - 3.3.7 Change Management | - 3.3.8 Infrastructure Security - 3.3.9 Cryptography - 3.3.13 Electronic Banking Services | - 3.3.14 Cyber Security Event Management - 3.315 Cyber Security Incident Management - 3.3.17 Vulnerability Management |