Skip to main content
  • 3.3 Cyber Security Operations and Technology

    In order to safeguard the protection of the operations and technology of the Member Organization’s information assets and its staff, third parties and customers, the Member Organizations have to ensure that security requirements for their information assets and the supporting processes are defined, approved and implemented.

    The compliance with these cyber security requirements should be monitored and the effectiveness of the cyber security controls should be periodically measured and evaluated in order to identify potential revisions of the controls or measurements.

    • 3.3.1 Human Resources

      Principle

      The Member Organization should incorporate cyber security requirements into human resources processes.

      Objective

      To ensure that Member Organization staff’s cyber security responsibilities are embedded in staff agreements and staff are being screened before and during their employment lifecycle.

      Control considerations

      1.The human resources process should define, approve and implement cyber security requirements.
       
       
      2.The effectiveness of the human resources process should be monitored, measured and periodically evaluated.
       
       
      3.The human resource process should include:
       
       
       a.cyber security responsibilities and non-disclosure clauses within staff agreements (during and after the employment);
       
       b.staff should receive cyber security awareness at the start and during their employment;
       
       c.when disciplinary actions will be applicable;
       
       d.screening and background check;
       
       e.post-employment cyber security activities, such as:
       
        1.revoking access rights;
       
       
        2.returning information assets assigned (e.g., access badge, tokens, mobile devices, all electronic and physical information).
       
       
    • 3.3.2 Physical Security

      Principle

      The Member Organization should ensure all facilities which host information assets are physically protected against intentional and unintentional security events.

      Objective

      To prevent unauthorized physical access to the Member Organization information assets and to ensure its protection.

      Control considerations

      1.The physical security process should be defined, approved and implemented.
       
      2.The effectiveness of the physical security process should be monitored, measured and periodically evaluated.
       
      3.The physical security process should include (but not limited to):
       
       a.physical entry controls (including visitor security);
       
       b.monitoring and surveillance (e.g., CCTV, ATMs GPS tracking, sensitivity sensors);
       
       c.protection of data centers and data rooms;
       
       d.environmental protection;
       
       e.protection of information assets during lifecycle (including transport and secure disposal, avoiding unauthorized access and (un)intended data leakage.
       
    • 3.3.3 Asset Management

      Principle

      The Member Organization should define, approve, implement, communicate and monitor an asset management process, which supports an accurate, up-to-date and unified asset register.

      Objective

      To support the Member Organization in having an accurate and up-to-date inventory and central insight in the physical / logical location and relevant details of all available information assets, in order to support its processes, such as financial, procurement, IT and cyber security processes.

      Control considerations

      1.The asset management process should be defined, approved and implemented.
       
      2.The effectiveness of the asset management process should be monitored, measured and periodically evaluated.
       
      3.The asset management process should include:
       
       a.a unified register;
       
       b.ownership and custodianship of information assets;
       
       c.the reference to relevant other processes, depending on asset management;
       
       d.information asset classification, labeling and handling;
       
       e.the discovery of new information assets.
       
    • 3.3.4 Cyber Security Architecture

      Principle

      The Member Organization should define, follow and review the cyber security architecture, which Outlines the cyber security requirements in the enterprise architecture and addresses the design principles for developing cyber security capabilities.

      Objective

      To support the Member Organization in achieving a strategic, consistent, cost effective and end-to-end cyber security architecture.

      Control considerations

      1.The cyber security architecture should be defined, approved and implemented.
       
      2.The compliance with the cyber security architecture should be monitored.
       
      3.The cyber security architecture should include:
       
       a.a strategic outline of cyber security capabilities and controls based on the business requirements;
       
       b.approval of the defined cyber security architecture;
       
       c.the requirement of having qualified cyber security architects;
       
       d.design principles for developing cyber security controls and applying cyber security requirements (i.e., the security-by-design principle);
       
       e.periodic review of the cyber security architecture.
       
    • 3.3.5 Identity and Access Management

      Principle

      The Member Organization should restrict access to its information assets in line with their business requirements based on the need-to-have or need-to-know principles.

      Objective

      To ensure that the Member Organization only provides authorized and sufficient access privileges to approved users.

      Control considerations

      1.The identity and access management policy, including the responsibilities and accountabilities, should be defined, approved and implemented.
       
        
      2.The compliance with the identity and access policy should be monitored.
       
        
      3.The effectiveness of the cyber security controls within the identity and access management policy should be measured and periodically evaluated.
       
        
      4.The identity and access management policy should include:
       
        
       a.business requirements for access control (i.e., need-to-have and need-to-know);
       
       
       b.user access management (e.g., joiners, movers, leavers):
       
       
        1.all identified user types should be covered (i.e., internal staff, third parties);
       
        2.changes of job status or job positions for internal staff (e.g. joiner, mover and leaver) should be instigated by the human resources department;
       
        3.changes for external staff or third parties should be instigated by the appointed accountable party;
       
        4.user access requests are formally approved in accordance with business and compliance requirements (i.e., need-to-have and need-to-know to avoid unauthorized access and (un)intended data leakage));
       
        5.changes in access rights should be processed in a timely manner;
       
        6.periodically user access rights and profiles should be reviewed;
       
        7.an audit trail of submitted, approved and processed user access requests and revocation requests should be established;
       
       c.user access management should be supported by automation;
       
       
       d.centralization of the identity and access management function;
       
       
       e.multi-factor authentication for sensitive and critical systems and profiles;
       
       
       f.privileged and remote access management, which should address:
       
       
        1.the allocation and restricted use of privileged and remote access, specifying:
       
         a.multi-factor authentication should be used for all remote access;
       
        
         b.multi-factor authentication should be used for privilege access on critical systems based on a risk assessment;
       
        
        2.the periodic review of users with privileged and remote accounts;
       
        3.individual accountability;
       
        4.the use of non-personal privileged accounts, including:
       
         a.limitation and monitoring;
       
        
         b.confidentiality of passwords;
       
        
         c.changing passwords frequently and at the end of each session.
       
        
    • 3.3.6 Application Security

      Principle

      The Member Organization should define, approve and implement cyber security standards for application systems. The compliance with these standards should be monitored and the effectiveness of these controls should be measured and periodically evaluated.

      Objective

      To ensure that sufficient cyber security controls are formally documented and implemented for all applications, and that the compliance is monitored and its effectiveness is evaluated periodically within the Member Organization.

      Control considerations

      1.The application cyber security standards should be defined, approved and implemented.
       
      2.The compliance with the application security standards should be monitored.
       
      3.The effectiveness of the application cyber security controls should be measured and periodically evaluated.
       
      4.Application development should follow the approved secure system development life cycle methodology (SDLC).
       
      5.The application security standard should include:
       
       a.secure coding standards;
       
       b.the cyber security controls implemented (e.g., configuration parameters, events to monitor and retain [including system access and data], identity and access management);
       
       c.the segregation of duties within the application (supported with a documented authorization matrix);
       
       d.the protection of data aligned with the (agreed) classification scheme (including privacy of customer data and, avoiding unauthorized access and (un)intended data leakage);
       
       e.vulnerability and patch management;
       
       f.back-up and recovery procedures;
       
       g.periodic cyber security compliance review.
       
    • 3.3.7 Change Management

      Principle

      The Member Organization should define, approve and implement a change management process that controls all changes to information assets. The compliance with the process should be monitored and the effectiveness should be measured and periodically evaluated.

      Objective

      To ensure that all change in the information assets within the Member Organization follow a strict change control process.

      Control considerations

      1.The change management process should be defined, approved and implemented.
       
       
      2.The compliance with the change management process should be monitored.
       
       
      3.The effectiveness of the cyber security controls within the change management process should be measured and periodically evaluated.
       
       
      4.The change management process should include:
       
       
       a.cyber security requirements for controlling changes to information assets, such as assessing the impact of requested changes, classification of changes and the review of changes;
       
       b.security testing, which should (if applicable) include:
       
        1.penetration testing;
       
       
        2.code review if applications are developed internally;
       
       
        3.code review of externally developed applications and if the source code is available
       
       
        4.a code review report (or equivalent, such as an independent assurance statement) in case the source code cannot be provided;
       
       
       c.approval of changes by the business owner;
       
       d.approval from the cyber security function before submitting to Change Advisory Board (CAB);
       
       e.approval by CAB;
       
       f.post-implementation review of the related cyber security controls;
       
       g.development, testing and implementation are segregated for both the (technical) environment and involved individuals;
       
       h.the procedure for emergency changes and fixes;
       
       i.fall-back and roll-back procedures.
       
    • 3.3.8 Infrastructure Security

      Principle

      The Member Organization should define, approve and implement cyber security standards for their infrastructure components. The compliance with these standards should be monitored and the effectiveness should be measured and periodically evaluated.

      Objective

      To support that all cyber security controls within the infrastructure are formally documented and the compliance is monitored and its effectiveness is evaluated periodically within the Member Organization.

      Control considerations

      1.The infrastructure security standards should be defined, approved and implemented.
       
       
      2.The compliance with the infrastructure security standards should be monitored.
       
       
      3.The effectiveness of the infrastructure cyber security controls should be measured and periodically evaluated.
       
       
      4.The infrastructure security standards should cover all instances of infrastructure available in the main datacenter(s), the disaster recovery data site(s) and office spaces.
       
       
      5.The infrastructure security standards should cover all instances of infrastructure (e.g., operating systems, servers, virtual machines, firewalls, network devices, IDS, IPS, wireless network, gateway servers, proxy servers, email gateways, external connections, databases, file-shares, workstations, laptops, tablets, mobile devices, PBX).
       
       
      6.The infrastructure security standard should include:
       
       
       a.the cyber security controls implemented (e.g., configuration parameters, events to monitor and retain [including system access and data], data-leakage prevention [DLP], identity and access management, remote maintenance);
       
       b.the segregation of duties within the infrastructure component (supported with a documented authorization matrix);
       
       c.the protection of data aligned with the (agreed) classification scheme (including privacy of customer data and, avoiding unauthorized access and (un)intended data leakage);
       
       d.the use of approved software and secure protocols;
       
       e.segmentation of networks;
       
       f.malicious code/software and virus protection (and applying application whitelisting and APT protection);
       
       g.vulnerability and patch management;
       
       h.DDOS protection (where applicable); this should include:
       
        1.the use of scrubbing services;
       
       
        2.specification of the bandwidth agreed;
       
       
        3.24x7 monitoring by Security Operating Center (SOC), Service Provider (SP) and scrubbing provider;
       
       
        4.testing of DDOS scrubbing (minimum twice a year);
       
       
        5.DDOS services should be implemented for the main datacenter(s) as well as the disaster recovery site(s);
       
       
       i.back-up and recovery procedures;
       
       j.periodic cyber security compliance review.
       
    • 3.3.9 Cryptography

      Principle

      The use of cryptographic solutions within the Member Organizations should be defined, approved and implemented.

      Objective

      To ensure that access to and integrity of sensitive information is protected and the originator of communication or transactions can be confirmed.

      Control considerations

      1.A cryptographic security standard should be defined, approved and implemented.
       
      2.The compliance with the cryptographic security standard should be monitored.
       
      3.The effectiveness of the cryptographic security controls should be measured and periodically evaluated.
       
      4.The cryptographic security standard should include:
       
       a.an overview of the approved cryptographic solutions and relevant restrictions (e.g., technically,legally);
       
       b.the circumstances when the approved cryptographic solutions should be applied;
       
       c.the management of encryption keys, including lifecycle management, archiving and recovery.
       
    • 3.3.10 Bring Your Own Device (BYOD)

      Principle

      When the Member Organization allows the use of personal devices (e.g., smartphones, tablets, laptops) for business purposes, the use should be supported by a defined, approved and implemented cyber security standard, additional staff agreements and a cyber security awareness training.

      Objective

      To ensure that business and sensitive information of the Member Organization is securely handled by staff and protected during transmission and storage, when using personal devices.

      Control considerations

      1.The BYOD cyber security standard should be defined, approved and implemented.
       
      2.The compliance with the BYOD cyber security standard should be monitored.
       
      3.The effectiveness of the BYOD cyber security controls should be measured and periodically evaluated.
       
      4.The BYOD standard should include:
       
       a.responsibilities of the user (including awareness training);
       
       b.information regarding the restrictions and consequences for staff when the Member Organization implements cyber security controls on their personal devices; for example when using modified devices (jailbreaking), terminating the employment or in case of loss or theft of the personal device;
       
       c.the isolation of business information from personal information (e.g., containerization);
       
       d.the regulation of corporate mobile applications or approved “public” mobile applications;
       
       e.the use of mobile device management (MDM); applying access controls to the device and business container and encryption mechanisms on the personal device (to ensure secure transmission and storage).
       
    • 3.3.11 Secure Disposal of Information Assets

      Principle

      The information assets of the Member Organization should be securely disposed when the information assets are no longer required.

      Objective

      To ensure that the Member Organization’s business, customer and other sensitive information are protected from leakage or unauthorized disclosure when disposed.

      Control considerations

      1. The secure disposal standard and procedure should be defined, approved and implemented.
      2. The compliance with the secure disposal standard and procedure should be monitored.
      3. The effectiveness of the secure disposal cyber security controls should be measured and periodically evaluated.
      4. Information assets should be disposed in accordance with legal and regulatory requirements, when no longer required (i.e. meeting data privacy regulations to avoid unauthorized access and avoid (un)intended data leakage).
      5. Sensitive information should be destroyed using techniques to make the information non-retrievable (e.g., secure erase, secure wiping, incineration, double crosscut, shredding)
      6. The Member Organization should ensure that third party service providers used for secure disposal, transport and storage comply with the secure disposal standard and procedure and the effectiveness is periodically measured and evaluated.
    • 3.3.12 Payment Systems

      Principle

      The Member Organization should define, approve, implement and monitor a cyber security standard for payment systems. The effectiveness of this process should be measured and periodically evaluated.

      Objective

      To ensure the Member Organization safeguards the confidentiality and integrity of shared banking systems.

      Control considerations

      •  
      For Saudi Arabian Riyal Interbank Express (SARIE) information, please refer to the SARIE Information Security Policy, Version Issue 1.0 - June 2016.
       
      •  
      For MADA information, please refer to the following sections in the MADA Rules and Standards Technical Book (see appendix A):
       
       
      •  
      Part IIIa - Security Framework, Version Issue 6.0.0 - May 2016
       
       
      •  
      Part IIIb - HSM Requirements, Version Issue 6.0.0 - May 2016
       
       
      •  
      SAMA CA IPK Certificate Procedures, Version Issue 6.0.1 - October 2016
       
    • 3.3.13 Electronic Banking Services

      Principle

      The Member Organization should define, approve, implement and monitor a cyber security standard for electronic banking services. The effectiveness of this standard should be measured and periodically evaluated.

      Objective

      To ensure the Member Organization safeguards the confidentiality and integrity of the customer information and transactions.

      Control Considerations

      1.The cyber security standards for electronic banking services should be defined, approved and implemented.
       
         
      2.The compliance with cyber security standards for electronic banking services should be monitored.
       
         
      3.The effectiveness of the cyber security standard for electronic banking services should be measured and periodically evaluated.
       
         
      4.Electronic banking services security standard should cover:
       
         
       a.use of brand protection measures to protect online services including social media.
       
        
       b.online, mobile and phone banking:
       
        
        1.use of official application stores and websites (applicable for online and mobile banking);
       
       
        2.use of detection measures and take-down of malicious apps and websites (applicable for online and mobile banking);
       
       
        3.use of sandboxing (applicable for online and mobile banking);
       
       
        4.use of non-caching techniques (applicable for online and mobile banking);
       
       
        5.use of communication techniques to avoid ‘man-in-the-middle'-attacks (applicable for online and mobile banking);
       
       
        6.use of multi-factor authentication mechanisms:
       
       
         a.multi-factor authentication should be used during the registration process for the customer in order to use of electronic banking services;
       
         b.multi-factor authentication should be implemented for all electronic banking services available to customers;
       
         c.the use of hard and soft tokens should be password protected;
       
         d.revoking the access of customers after 3 successive incorrect passwords or invalid PINs;
       
         e.the process for changing the customer mobile number should only be done from either a branch or ATM;
       
         f.the processes for requesting and activating of the multi-factor authentication should be done through different delivery channels;
       
         g.multi-factor authentication should be implemented for the following processes:
       
          1.sign-on;
       
         
          2.adding or modifying beneficiaries;
       
         
          3.adding utility and government payment services;
       
         
          4.high-risk transactions (when it exceeds predefined limits);
       
         
          5.password reset;
       
         
        7.the processes for adding and activating beneficiaries should be done through different delivery channels (applicable for mobile and online banking);
       
       
        8.high availability of the electronic banking services should be ensured;
       
       
        9.scheduled downtime of the electronic banking services should be timely communicated to SAMA and customers;
       
       
        10.contractual agreements between the Member Organization and the customer addressing the roles, responsibilities and liabilities for both the Member Organization and the customers;
       
       
        11.obtaining approval of SAMA before launching a new electronic banking service.
       
       
       c.ATMs and POSs:
       
        
        1.prevention and detection of exploiting the ATM/POS application and infrastructure vulnerabilities (e.g., cables, (USB)-ports, rebooting);
       
       
        2.cyber security measures, such as hardening of operating systems, malware protection, privacy screens, masking of passwords or account numbers (e.g., screen and receipt), geo-blocking (e.g., disable cards per default for outside GCC countries, disable magnetic strip transactions), video monitoring (CCTV), revoking cards after 3 successive invalid PINs, anti-skimming solutions (hardware/software), and PIN-pad protection;
       
       
        3.remote stopping of ATMs in case of malicious activities.
       
       
       d.SMS instant notification services:
       
        
        1.SMS messages should not contain sensitive data (e.g., account balance - except for credit cards);
       
       
        2.SMS alert should be sent to both mobile numbers (old and new) when the customer’s mobile number has been changed;
       
       
        3.SMS notification should be sent to the customer’s mobile number when requesting a new multi-factor authentication mechanism.
       
       
        4.SMS notification should be sent to the customer’s mobile number for all retail and personal financial transactions.
       
       
        5.SMS notification should be sent to the customer’s mobile number when beneficiaries are added, modified and activated.
       
       
    • 3.3.14 Cyber Security Event Management

      Principle

      The Member Organization should define, approve and implement a security event management process to analyze operational and security loggings and respond to security events. The effectiveness of this process should be measured and periodically evaluated.

      Objective

      To ensure timely identification and response to anomalies or suspicious events within regard to information assets.

      Control considerations

      1.The security event management process should be defined, approved and implemented.
       
      2.The effectiveness of the cyber security controls within the security event management process should be measured and periodically evaluated.
       
      3.To support this process a security event monitoring standard should be defined, approved and implemented.
       
       a.the standard should address for all information assets the mandatory events which should be monitored, based on the classification or risk profile of the information asset.
       
      4.The security event management process should include requirements for:
       
       a.the establishment of a designated team responsible for security monitoring (i.e., Security Operations Center (SOC));
       
       b.skilled and (continuously) trained staff;
       
       c.a restricted area to facilitate SOC activities and workspaces;
       
       d.resources required continuous security event monitoring activities (24x7);
       
       e.detection and handling of malicious code and software;
       
       f.detection and handling of security or suspicious events and anomalies;
       
       g.deployment of security network packet analysis solution;
       
       h.adequately protected logs;
       
       i.periodic compliance monitoring of applications and infrastructure cyber security standards
       
       j.automated and centralized analysis of security loggings and correlation of event or patterns (i.e., Security Information and Event Management (SIEM));
       
       k.reporting of cyber security incidents;
       
       l.independent periodic testing of the effectiveness of the security operations center (e.g., red- teaming).
       
    • 3.3.15 Cyber Security Incident Management

      Principle

      The Member Organization should define, approve and implement a cyber security incident management that is aligned with the enterprise incident management process, to identify, respond to and recover from cyber security incidents. The effectiveness of this process should be measured and periodically evaluated.

      Objective

      To ensure timely identification and handling of cyber security incidents in order to reduce the (potential) business impact for the Member Organization.

      Control considerations

      1.The cyber security incident management process should be defined, approved, implemented and aligned with the enterprise incident management process.
       
      2.The effectiveness of the cyber security controls within the cyber security incident management process should be measured and periodically evaluated.
       
      3.The standard should address the mandatory and suspicious security events which should be responded to.
       
      4.The security incident management process should include requirements for:
       
       a.the establishment of a designated team responsible for security incident management;
       
       b.skilled and (continuously) trained staff;
       
       c.sufficient capacity available of certified forensic staff for handling major incidents (e.g., internal staff or contracting an external forensic team);
       
       d.a restricted area to facilitate the computer emergency response team (CERT) workspaces;
       
       e.the classification of cyber security incidents;
       
       f.the timely handling of cyber security incidents, recording and monitoring progress;
       
       g.the protection of relevant evidence and loggings;
       
       h.post-incident activities, such as forensics, root-cause analysis of the incidents;
       
       i.reporting of suggested improvements to the CISO and the Committee;
       
       j.establish a cyber security incident repository.
       
      5.The Member Organization should inform ‘SAMA IT Risk Supervision' immediately when a medium or high classified security incident has occurred and identified.
       
      6.The Member Organization should obtain ‘no objection' from ‘SAMA IT Risk Supervision' before any media interaction related to the incident.
       
      7.The Member Organization should submit a formal incident report ‘SAMA IT Risk Supervision' after resuming operations, including the following incident details:
       
       a.title of incident;
       
       b.classification of the incident (medium or high);
       
       c.date and time of incident occurred;
       
       d.date and time of incident detected;
       
       e.information assets involved;
       
       f.(technical) details of the incident;
       
       g.root-cause analysis;
       
       h.corrective activities performed and planned;
       
       i.description of impact (e.g., loss of data, disruption of services, unauthorized modification of data, (un)intended data leakage, number of customers impacted);
       
       j.total estimated cost of incident;
       
       k.estimated cost of corrective actions.
       
    • 3.3.16 Threat Management

      Principle

      The Member Organization should define, approve and implement a threat intelligence management process to identify, assess and understand threats to the Member Organization information assets, using multiple reliable sources. The effectiveness of this process should be measured and periodically evaluated.

      Objective

      To obtain an adequate understanding of the Member Organization’s emerging threat posture.

      Control considerations

      1.The threat intelligence management process should be defined, approved and implemented.
       
      2.The effectiveness of the threat intelligence management process should be measured and periodically evaluated.
       
      3.The threat intelligence management process should include:
       
       a.the use of internal sources, such as access control, application and infrastructure logs, IDS, IPS, security tooling, Security Information and Event Monitoring (SIEM), support functions (e.g., Legal, Audit, IT Helpdesk, Forensics, Fraud Management, Risk Management, Compliance);
       
       b.the use of reliable and relevant external sources, such as SAMA, government agencies, security forums, (security) vendors, security organizations and specialist notification services;
       
       c.a defined methodology to analyze the threat information periodically;
       
       d.the relevant details on identified or collected threats, such as modus operandi, actors, motivation and type of threats;
       
       e.the relevance of the derived intelligence and the action-ability for follow-up (for e.g., SOC, Risk Management);
       
       f.sharing the relevant intelligence with the relevant stakeholders (e.g., SAMA, BCIS members).
       
    • 3.3.17 Vulnerability Management

      Principle

      The Member Organization should define, approve and implement a vulnerability management process for the identification and mitigation of application and infrastructural vulnerabilities. The effectiveness of this process should be measured and the effectiveness should be periodically evaluated.

      Objective

      To ensure timely identification and effective mitigation of application and infrastructure vulnerabilities in order to reduce the likelihood and business impact for the Member Organization.

      Control considerations

      1.The vulnerability management process should be defined, approved and implemented.
       
      2.The effectiveness of the vulnerability management process should be measured and periodically evaluated.
       
      3.The vulnerability management process should include:
       
       a.all information assets;
       
       b.frequency of performing the vulnerability scan (risk-based);
       
       c.classification of vulnerabilities;
       
       d.defined timelines to mitigate (per classification);
       
       e.prioritization for classified information assets;
       
       f.patch management and method of deployment.