content
stringlengths
26
2.54k
metadata
dict
Guide to Essential Cybersecurity Controls (ECC) Implementation 73 Document Classification: Public TLP: White 2-4-3-4 Secure management and protection against Advanced Persistent Threats (APT), which normally utilize zero-day viruses and malware. Control implementation guidelines • Define and document the...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 72, "page_label": "73", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 74 Document Classification: Public TLP: White o Create DKIM Record, which uses the digital signature in all emails issued by the organization's domain to ensure the integrity of e-mails. • -based Message Authentication, Reporting & Conformance (D...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 73, "page_label": "74", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
2-5 Networks Security Management Objective Controls 2-5-1 Cybersecurity requirements for network security management must be defined, documented and approved. Relevant cybersecurity tools: • Network Security Policy Template. Control implementation guidelines • Develop and document cybersecurity policy for ...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 74, "page_label": "75", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 76 Document Classification: Public TLP: White o Third Parties Access Requirements to the Network o Network Protection Requirements o Physical and environmental security requirements to ensure that network devices are stored in a secure and appropri...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 75, "page_label": "76", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 77 Document Classification: Public TLP: White o Protect the internet browsing channel from advanced persistent threats o Ensure the security and protection of wireless networks at the organization o Ensure the security of the organization's net...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 76, "page_label": "77", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 78 Document Classification: Public TLP: White • Define network zones based on trust level e.g., trust in the internet zone is "low", trust level in an internet-isolated zone hosting databases is "high". • Define necessary procedure s to ensure the p...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 77, "page_label": "78", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 79 Document Classification: Public TLP: White Control implementation guidelines • Define and document the requirements of this ECC in the cybersecurity requirements of network security management at the organization and must be approved by the...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 78, "page_label": "79", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 80 Document Classification: Public TLP: White • Define necessary procedures to ensure naviga tion and internet connection security at the organization, including but not limited to: o Procedures for restriction of suspicious websites, file sharing a...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 79, "page_label": "80", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 81 Document Classification: Public TLP: White • Implement security requirements of wireless networks in the organization, which may include the following: o Appropriate and advanced technologies for wireless network security and protection. o...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 80, "page_label": "81", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 82 Document Classification: Public TLP: White includes identifying and classifying risks, notes, and remediation plan ( e.g., through an advanced automation program or an Excel sheet) o Sample of separating the internal network (LAN) from the wirele...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 81, "page_label": "82", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 83 Document Classification: Public TLP: White • Cybersecurity policy that covers all the requirements of network security management in the organization (e.g., electronic copy or official hard copy). • Formal approval by the head of the organiz...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 82, "page_label": "83", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 84 Document Classification: Public TLP: White • Protect the organization by using (IPS/IDS) to cover all infrastructure of the organization, including: o Internal Network o DMZ. o Wireless network. • Periodically review (IPS/IDS) configurations, ...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 83, "page_label": "84", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 85 Document Classification: Public TLP: White • Define and document the requirements of this ECC in the cybersecurity requirements of network security management at the organization and must be approved by the representative. • Use DNS Securit...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 84, "page_label": "85", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 86 Document Classification: Public TLP: White Expected deliverables: • Cybersecurity policy that covers all the requirements of network security management in the organization (e.g., electronic copy or official hard copy). • Formal approval by the ...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 85, "page_label": "86", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
2-6 Mobile Devices Security Objective To ensure the protection of mobile devices (including laptops, smartphones, tablets) (including sensitive information) while utilizing Bring Your Own Device (BYOD) policy. Controls 2-6-1 Cybersecurity requirements for mobile devices security and BYOD must be defined, docum...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 86, "page_label": "87", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 88 Document Classification: Public TLP: White o BOYD Cybersecurity Requirements • Support the organization's policy by the Executive Management. This must be done through the approval of the organization head or his/ her deputy. Expected deliverabl...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 87, "page_label": "88", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 89 Document Classification: Public TLP: White o Centrally mana ge workstations and mobile devices through, but not limited to, the Active Directory server or through a centralized management system. o Implement secure configuration and hardeni...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 88, "page_label": "89", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 90 Document Classification: Public TLP: White Control implementation guidelines • Define and document the requirements of this ECC in the cybersecurity requirements of mobile devices and BYOD at the organization and must be approved by the represen...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 89, "page_label": "90", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 91 Document Classification: Public TLP: White • Implement the specified and restricted use requirements based on the requirements of the organization's business interest. Thes e requirements may include the following: o The use must be specifi...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 90, "page_label": "91", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 92 Document Classification: Public TLP: White 2-6-3-3 devices and BYOD in cases of device loss, theft or after termination/separation from the organization. Control implementation guidelines • Define and document the requirements of this ECC in t...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 91, "page_label": "92", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 93 Document Classification: Public TLP: White 2-6-3-4 Security awareness for mobile devices users. Control implementation guidelines • Define and document the requirements of this ECC in the cybersecurity requirements of mobile devices and BY...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 92, "page_label": "93", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 94 Document Classification: Public TLP: White documented and approved plan for review, and based on a planned interval "e.g., quarterly") to implement the organization's mobile devices and BYOD security procedures by the Cybersecurity function and ...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 93, "page_label": "94", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
2-7 Data and Information Protection Objective information as per organizational policies and procedures, and related laws and regulations. Controls 2-7-1 Cybersecurity requirements for protecting and handling data and information must be defined, documented and approved as per the related laws and regulations....
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 94, "page_label": "95", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 96 Document Classification: Public TLP: White • Implement all cybersecurity requirements to data and information protection procedures in the organization. The data and information protection procedures must cover at least the following, but not lim...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 95, "page_label": "96", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 97 Document Classification: Public TLP: White 2-7-3-1 Data and information ownership. Control implementation guidelines • Define data and information ownership requirements in accordance with policies issued by the National Data Management Of...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 96, "page_label": "97", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 98 Document Classification: Public TLP: White • Define data and information classification and labelling requirements in accordance with policies issued by the National Data Management Office and documented in the cybersecurity requirements document...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 97, "page_label": "98", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 99 Document Classification: Public TLP: White regulations, and must be approved by the representative, which may include the following: o Include cybersecurity responsibilities and clauses in protecting data and information privacy. o Develop...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 98, "page_label": "99", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
2-8 Cryptography Objective To ensure the proper and efficient use of cryptography to protect information assets as per organizational policies and procedures, and related laws and regulations. Controls 2-8-1 Cybersecurity requirements for cryptography must be defined, documented and approved. Relevant cybersecu...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 99, "page_label": "100", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 101 Document Classification: Public TLP: White • Develop and document cybersecurity policy for cryptography in the organization, including the following: o Standard controls of approved cryptography solutions and applicable restrictions (techn...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 100, "page_label": "101", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 102 Document Classification: Public TLP: White • Evidence showing the uses modern cryptography technologies in the organization (e.g., the presence of advanced encryption technologies in the organization, security procedures and standard controls t...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 101, "page_label": "102", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 103 Document Classification: Public TLP: White • Evidence showing the implementation of the requirements of the approved technical cryptographic solutions standard controls and the restrictions applied to them ( e.g., a screenshot showing evide...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 102, "page_label": "103", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 104 Document Classification: Public TLP: White • Cybersecurity policy that covers all the requirements of cryptography in the organization (e.g., electronic copy or official hard copy). • Cybersecurity procedure that covers all the requirements of c...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 103, "page_label": "104", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 105 Document Classification: Public TLP: White Expected deliverables: • Cryptography of data in transit document approved by the organization ( e.g., electronic copy or official hard copy). • Formal approval by the head of the organization or ...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 104, "page_label": "105", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
2-9 Backup and Recovery Management Objective information systems and software configurations from cyber risks as per organizational policies and procedures, and related laws and regulations. Controls 2-9-1 Cybersecurity requirements for backup and recovery management must be defined, documented and approved. ...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 105, "page_label": "106", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 107 Document Classification: Public TLP: White o Fast recovery of data and systems after exposure to cybersecurity incidents o Periodic inspection of backup recovery effectiveness o Time limit for backups o Appropriate and advanced technologi...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 106, "page_label": "107", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 108 Document Classification: Public TLP: White • Evidence such as, but not limited to, a screenshot of a backup tool showing the latest backups taken, schedule and scope of backups. 2-9-3 The cybersecurity requirements for backup and recovery manag...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 107, "page_label": "108", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 109 Document Classification: Public TLP: White 2-9-3-2 Ability to perform quick recovery of data and systems after cybersecurity incidents. Control implementation guidelines • Define and document the requirements of this ECC in the cybersecur...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 108, "page_label": "109", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 110 Document Classification: Public TLP: White according to the period specified in the procedures and according to the period calculated to complete the recovery of backup copies. Expected deliverables: • Documents indicating the identification an...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 109, "page_label": "110", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
2-10 Vulnerabilities Management Objective To ensure timely detection and effective remediation of technical vulnerabilities to prevent or minimize the probability of exploiting these vulnerabilities to launch cyber- attacks against the organization. Controls 2-10-1 Cybersecurity requirements for technical vulner...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 110, "page_label": "111", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 112 Document Classification: Public TLP: White o Requirements for the classification of vulnerabilities according to their severity. o Requirements to address vulnerabilities using effective tools and methods. • Support the organization's policy b...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 111, "page_label": "112", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 113 Document Classification: Public TLP: White • Vulnerabilities detection and testing reports (pre - and post -treatment) indicating classification of vulnerabilities 2-10-3 The cybersecurity requirements for technical vulnerabilities managem...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 112, "page_label": "113", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 114 Document Classification: Public TLP: White • Vulnerabilities management procedures and a periodic plan to assess and detect vulnerabilities • Periodic reports to assess and detect vulnerabilities 2-10-3-2 Vulnerabilities classification based o...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 113, "page_label": "114", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 115 Document Classification: Public TLP: White • Define and document the requirements of this ECC in the cybersecurity requirements document and approve them by the representative. • Share the organization's information and technology asset vul...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 114, "page_label": "115", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 116 Document Classification: Public TLP: White • Define and document the requirements of this ECC in the cybersecurity requirements document and approve them by the representative. • Link vulnerabilities management procedures to the security patch ...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 115, "page_label": "116", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 117 Document Classification: Public TLP: White o Cybersecurity companies through their tools and technologies Expected deliverables: • Cybersecurity policy that covers this control (e.g., electronic copy or official hard copy). • Formal appro...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 116, "page_label": "117", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
2-11 Penetration Testing Objective capabilities through simulated cyber-attacks to discover unknown weaknesses within the technical infrastructure that may lead to a cyber breach. Controls 2-11-1 Cybersecurity requirements for penetration testing exercises must be defined, documented and approved. Relevant cy...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 117, "page_label": "118", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 119 Document Classification: Public TLP: White o Determine the scope of the penetration test in the organization. o Define periodic penetration testing requirements. o Define penetration testing requirements using effective tools and methods. ...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 118, "page_label": "119", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 120 Document Classification: Public TLP: White Control implementation guidelines • Define and document the requirements of this ECC in the cybersecurity requirements document and approve them by the representative. • Identify and document all servi...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 119, "page_label": "120", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 121 Document Classification: Public TLP: White • Define and document the requirements of this ECC in the cybersecurity requirements document and approve them by the representative. • Develop procedures for penetration testing. • Develop and im...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 120, "page_label": "121", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
2-12 Cybersecurity Event Logs and Monitoring Management Objective To ensure timely collection, analysis and monitoring of cybersecurity events for early detection of potential cyber -attacks in order to prevent or minimize the negative Controls 2-12-1 Cybersecurity requirements for event logs and monitoring ma...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 121, "page_label": "122", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 123 Document Classification: Public TLP: White o Define the scope of information assets to which event logs must be activated. o Activate cybersecurity event logs on critical information assets in the organization. o Activate cybersecurity e ...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 122, "page_label": "123", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 124 Document Classification: Public TLP: White o Define technologies to collect activated cybersecurity event logs. o Define a team to continuously monitor cybersecurity event logs. o Define the retention period for cybersecurity event logs (not les...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 123, "page_label": "124", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 125 Document Classification: Public TLP: White • Develop rules in SIEM system to enable the monitoring team to monitor the activated records of critical information assets (after linking them). Expected deliverables: • A document (such as appr...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 124, "page_label": "125", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 126 Document Classification: Public TLP: White 2-12-3-3 Identification of required technologies (e.g., SIEM) for cybersecurity event logs collection. Control implementation guidelines • Define and document the requirements of this ECC in the cyber...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 125, "page_label": "126", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 127 Document Classification: Public TLP: White Control implementation guidelines • Define and document the requirements of this ECC in the cybersecurity requirements document and approve them by the representative. • Identify a team for contin...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 126, "page_label": "127", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 128 Document Classification: Public TLP: White • A document (such as approved policy or procedure) indicating the identification and documentation of the requirements related to this control. • A screenshot or direct directory from the SIEM system s...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 127, "page_label": "128", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
2-13 Cybersecurity Incident and Threat Management Objective To ensure timely identification, detection, effective management and handling of cybersecurity incidents and threats to prevent or minimize negative impacts on dated 14/8/1438H. 2-13-1 Requirements for cybersecurity incidents and threat management must ...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 128, "page_label": "129", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 130 Document Classification: Public TLP: White o Collect and handle threat intelligence feeds. o Periodically review of cybersecurity incident response plan. • Support the organization's policy by the Executive Management. This must be done through...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 129, "page_label": "130", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 131 Document Classification: Public TLP: White 2-13-3 The requirements for cybersecurity incidents and threat management must include at least the following: 2-13-3-1 Cybersecurity incident response plans and escalation procedures. Relevant ...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 130, "page_label": "131", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 132 Document Classification: Public TLP: White Expected deliverables: • A document (such as approved policy or procedure) indicating the identification and documentation of the requirements related to this control. • The approved cybersecurity inci...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 131, "page_label": "132", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 133 Document Classification: Public TLP: White o The roles and responsibilities for cybersecurity incident response and how to communicate with all stakeholders. o The key information of the incident, including but not limited to, date and tim...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 132, "page_label": "133", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 134 Document Classification: Public TLP: White • A document (such as approved policy or procedure) indicating the identification and documentation of the requirements related to this control. • Procedures followed to share alerts, threat intelligenc...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 133, "page_label": "134", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 135 Document Classification: Public TLP: White • Screenshot or direct example of alerts that have been dealt with in advance according to the necessary procedures. 2-13-4 The requirements for cybersecurity incidents and threat management must ...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 134, "page_label": "135", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
2-14 Physical Security Objective To ensure the protection of information and technology assets from unauthorized physical access, loss, theft and damage. Controls 2-14-1 Cybersecurity requirements for physical protection of information and technology assets must be defined, documented and approved. Relevant cyb...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 135, "page_label": "136", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 137 Document Classification: Public TLP: White • Formal approval by the head of the organization or his/her deputy on such document ( e.g., via the organization's official e -mail, paper or electronic signature). 2-14-2 The cybersecurity requ...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 136, "page_label": "137", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 138 Document Classification: Public TLP: White • Evidence that clarifies the implementation of information and technology asset protection controls against unauthorized physical access, loss, theft and vandalism, including, but not limited to: o An...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 137, "page_label": "138", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 139 Document Classification: Public TLP: White • Identify access mechanism to critical areas (e.g., card access, fingerprint access, face access, etc.). • Restrict the authority of managing the physical access system to individuals with specif...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 138, "page_label": "139", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 140 Document Classification: Public TLP: White o Outside the building. o Building corridors. o Entry and exit doors. Expected deliverables: • A document (such as approved policy or procedure) indicating the identification and documentation of the...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 139, "page_label": "140", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 141 Document Classification: Public TLP: White 2-14-3-4 Secure destruct ion and re -use of physical assets that hold classified information (including documents and storage media). Control implementation guidelines • Define and document the r...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 140, "page_label": "141", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 142 Document Classification: Public TLP: White 2-14-3-5 facilities. Control implementation guidelines • Define and document the requirements of this ECC in the cybersecurity requirements document and approve them by the representative. • Identif...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 141, "page_label": "142", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 143 Document Classification: Public TLP: White 2-14-4 The cybersecurity requirements for physical protection of information and technology assets must be reviewed periodically. Control implementation guidelines • Review the implementation of ...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 142, "page_label": "143", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
2-15 Web Application Security Objective To ensure the protection of external web applications against cyber risks. Controls 2-15-1 Cybersecurity requirements for external web applications must be defined, documented and approved. Relevant cybersecurity tools: • Web Application Protection Policy Template. Contr...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 143, "page_label": "144", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 145 Document Classification: Public TLP: White o Screening for application -specific vulnerabilities (Vulnerability Assessment). o Regular backups in secure locations (Backup Log Files). o Regular screening of open ports, services, processes, ...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 144, "page_label": "145", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 146 Document Classification: Public TLP: White • Documents that confirm the implementation of cybersecurity requirements related to the protection of external web applications as documented in the policy. • An action plan document to implement the ...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 145, "page_label": "146", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 147 Document Classification: Public TLP: White o Identify the firewall technologies that the organization wishes to acquire, including but not limited to: ▪ Firewall with pre-managed rules managed by the system itself. ▪ A firewall with the op...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 146, "page_label": "147", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 148 Document Classification: Public TLP: White • If there are internally developed applications or external applications purchased from a third -party that are operated by the organization, the following must be done: o Determine the tiers of the a...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 147, "page_label": "148", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 149 Document Classification: Public TLP: White • If there are web applications purchased and operated by a third party, the following must be done: o Ensure the supplier's compliance with cybersecurity policies and standard controls including ...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 148, "page_label": "149", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 150 Document Classification: Public TLP: White • Secure Use of Web Application Users Policy. • Screenshot from the organization's website indicating the publication of the secure usage policy for users. 2-15-3-5 Multi- Control implementation gu...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 149, "page_label": "150", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 151 Document Classification: Public TLP: White • Review and update cybersecurity requirements for external web applications security in the organization periodically according to a documented and approved plan for review and based on a planned ...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 150, "page_label": "151", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
3-1 Cybersecurity Resilience Aspects of Business Continuity Management (BCM) Objective To ensure the inclusion of the cybersecurity resiliency requirements within the impacts on systems, information processing facilities and critical e -services from disasters caused by cybersecurity incidents. Controls 3-1-1 C...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 151, "page_label": "152", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 153 Document Classification: Public TLP: White 3-1-2 The cybersecurity requirements for business continuity management must be implemented. Control implementation guidelines • Implement cybersecurity requirements within business continuity m...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 152, "page_label": "153", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 154 Document Classification: Public TLP: White • Laws and regulations related to business continuity in the organization must be defined. • Include high -risk cybersecurity incidents as a rationale for activating the organization's business continu...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 153, "page_label": "154", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 155 Document Classification: Public TLP: White 3-1-3-2 Developing response plans for cybersecurity incidents that may affect the business continuity. Control implementation guidelines • Define and document the requirements of this ECC in the ...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 154, "page_label": "155", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 156 Document Classification: Public TLP: White Expected deliverables: • A document (such as approved policy or procedure) indicating the identification and documentation of the requirements related to this control • Approved plans to respond to cyb...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 155, "page_label": "156", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 157 Document Classification: Public TLP: White • Formal approval by the head of the organization or his/her deputy on such documents ( e.g., via the organization's official e -mail, paper or electronic signature). 3-1-4 The cybersecurity req...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 156, "page_label": "157", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
4-1 Third-Party Cybersecurity Objective To ensure the protection of assets against the cybersecurity risks related to third-parties including outsourcing and managed services as per organizational policies and procedures, and related laws and regulations. Controls 4-1-1 Cybersecurity requirements for contracts ...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 157, "page_label": "158", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 159 Document Classification: Public TLP: White 4-1-2 The cybersecurity requirements for contracts and agreements with third -parties (e.g., Service Level Agreement (SLA)) - or services- must include at least the following: 4-1-2-1 Non-disclos...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 158, "page_label": "159", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 160 Document Classification: Public TLP: White • Ensure that third parties develop communication procedures with the organization, including communication means and data in the e vent of a cybersecurity incident that may affect the organization's d...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 159, "page_label": "160", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 161 Document Classification: Public TLP: White 4-1-3 The cybersecurity requirements for contracts and agreements with IT outsourcing and managed services third-parties must include at least the following: 4-1-3-1 Conducting a cybersecurity r...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 160, "page_label": "161", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 162 Document Classification: Public TLP: White • Ensure that Cybersecurity operation centers managed for operation and monitoring are located within the Kingdom. • Ensure that remote access to Cybersecurity operation centers managed for operation a...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 161, "page_label": "162", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
4-2 Cloud Computing and Hosting Cybersecurity Objective To ensure the proper and efficient remediation of cyber risks and the implementation of cybersecurity requirements related to hosting and cloud computing as per organizational policies and procedures, and related laws and regulations. It is also to on the cl...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 162, "page_label": "163", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 164 Document Classification: Public TLP: White • Cybersecurity policy that covers the requirements of the use of cloud computing and hosting services (e.g., electronic copy or official hard copy). • Formal approval by the head of the organization or...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 163, "page_label": "164", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 165 Document Classification: Public TLP: White • An action plan to implement the cybersecurity requirements for cloud computing and hosting services. • A signed sample of the agreement or contract between the organization and the cloud service...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 164, "page_label": "165", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 166 Document Classification: Public TLP: White • Approved procedures for data return after the termination of cloud computing services. • Classification policies and procedures for data to be hosted on computing and hosting services. • Up to date ...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 165, "page_label": "166", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 167 Document Classification: Public TLP: White • Ensure that the location of hosting and storing the organization's information is within the Kingdom by, but not limited to: o Include a clause in the contract or service level agreement signed w...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 166, "page_label": "167", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 168 Document Classification: Public TLP: White • Policy indicating that it is up to date and the changes to the cybersecurity requirements for cloud computing and hosting services have been documented and approved by the head of the organization or ...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 167, "page_label": "168", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
5-1 Industrial Control Systems (ICS) Protection Objective To ensure the appropriate and effective cybersecurity management of Industrial Controls Systems and Operational Technology (ICS/OT) to protect the confidentiality, cyber attacks (e.g., cybersecurity strategy and related and applicable local and internation...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 168, "page_label": "169", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 170 Document Classification: Public TLP: White 5-1-2 The cybersecurity requirements related to Industrial Controls Systems and Operational Technology (ICS/OT) must be implemented. Control implementation guidelines • Implement all cybersecurity req...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 169, "page_label": "170", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 171 Document Classification: Public TLP: White • Isolate industrial production networks ( ICS/OT) from other networks physically or logically based on cyber risks, including: o Corporate network o Industrial demilitarized zone • Ensure that i...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 170, "page_label": "171", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 172 Document Classification: Public TLP: White • Ensure that industrial production networks are not linked with other networks in the organization except for necessary communications and ensure the restriction and physical and logical segregation i...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 171, "page_label": "172", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }