content stringlengths 26 2.54k | metadata dict |
|---|---|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
73 Document Classification: Public TLP: White
2-4-3-4 Secure management and protection against Advanced Persistent Threats
(APT), which normally utilize zero-day viruses and malware.
Control implementation guidelines
• Define and document the... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 72,
"page_label": "73",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
74 Document Classification: Public TLP: White
o Create DKIM Record, which uses the digital signature in all emails
issued by the organization's domain to ensure the integrity of e-mails.
•
-based Message Authentication, Reporting & Conformance
(D... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 73,
"page_label": "74",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
2-5 Networks Security Management
Objective
Controls
2-5-1 Cybersecurity requirements for network security management must be defined,
documented and approved.
Relevant cybersecurity tools:
• Network Security Policy Template.
Control implementation guidelines
• Develop and document cybersecurity policy for ... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 74,
"page_label": "75",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
76 Document Classification: Public TLP: White
o Third Parties Access Requirements to the Network
o Network Protection Requirements
o Physical and environmental security requirements to ensure that network
devices are stored in a secure and appropri... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 75,
"page_label": "76",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
77 Document Classification: Public TLP: White
o Protect the internet browsing channel from advanced persistent threats
o Ensure the security and protection of wireless networks at the organization
o Ensure the security of the organization's net... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 76,
"page_label": "77",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
78 Document Classification: Public TLP: White
• Define network zones based on trust level e.g., trust in the internet zone is "low",
trust level in an internet-isolated zone hosting databases is "high".
• Define necessary procedure s to ensure the p... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 77,
"page_label": "78",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
79 Document Classification: Public TLP: White
Control implementation guidelines
• Define and document the requirements of this ECC in the cybersecurity
requirements of network security management at the organization and must be
approved by the... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 78,
"page_label": "79",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
80 Document Classification: Public TLP: White
• Define necessary procedures to ensure naviga tion and internet connection
security at the organization, including but not limited to:
o Procedures for restriction of suspicious websites, file sharing a... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 79,
"page_label": "80",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
81 Document Classification: Public TLP: White
• Implement security requirements of wireless networks in the organization,
which may include the following:
o Appropriate and advanced technologies for wireless network security and
protection.
o... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 80,
"page_label": "81",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
82 Document Classification: Public TLP: White
includes identifying and classifying risks, notes, and remediation plan ( e.g.,
through an advanced automation program or an Excel sheet)
o Sample of separating the internal network (LAN) from the wirele... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 81,
"page_label": "82",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
83 Document Classification: Public TLP: White
• Cybersecurity policy that covers all the requirements of network security
management in the organization (e.g., electronic copy or official hard copy).
• Formal approval by the head of the organiz... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 82,
"page_label": "83",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
84 Document Classification: Public TLP: White
• Protect the organization by using (IPS/IDS) to cover all infrastructure of the
organization, including:
o Internal Network
o DMZ.
o Wireless network.
• Periodically review (IPS/IDS) configurations, ... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 83,
"page_label": "84",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
85 Document Classification: Public TLP: White
• Define and document the requirements of this ECC in the cybersecurity
requirements of network security management at the organization and must be
approved by the representative.
• Use DNS Securit... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 84,
"page_label": "85",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
86 Document Classification: Public TLP: White
Expected deliverables:
• Cybersecurity policy that covers all the requirements of network security
management in the organization (e.g., electronic copy or official hard copy).
• Formal approval by the ... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 85,
"page_label": "86",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
2-6 Mobile Devices Security
Objective
To ensure the protection of mobile devices (including laptops, smartphones, tablets)
(including sensitive information) while utilizing Bring Your Own Device (BYOD)
policy.
Controls
2-6-1 Cybersecurity requirements for mobile devices security and BYOD must be defined,
docum... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 86,
"page_label": "87",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
88 Document Classification: Public TLP: White
o BOYD Cybersecurity Requirements
• Support the organization's policy by the Executive Management. This must be
done through the approval of the organization head or his/ her deputy.
Expected deliverabl... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 87,
"page_label": "88",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
89 Document Classification: Public TLP: White
o Centrally mana ge workstations and mobile devices through, but not
limited to, the Active Directory server or through a centralized
management system.
o Implement secure configuration and hardeni... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 88,
"page_label": "89",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
90 Document Classification: Public TLP: White
Control implementation guidelines
• Define and document the requirements of this ECC in the cybersecurity
requirements of mobile devices and BYOD at the organization and must be
approved by the represen... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 89,
"page_label": "90",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
91 Document Classification: Public TLP: White
• Implement the specified and restricted use requirements based on the
requirements of the organization's business interest. Thes e requirements may
include the following:
o The use must be specifi... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 90,
"page_label": "91",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
92 Document Classification: Public TLP: White
2-6-3-3
devices and BYOD in cases of device loss, theft or after
termination/separation from the organization.
Control implementation guidelines
• Define and document the requirements of this ECC in t... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 91,
"page_label": "92",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
93 Document Classification: Public TLP: White
2-6-3-4 Security awareness for mobile devices users.
Control implementation guidelines
• Define and document the requirements of this ECC in the cybersecurity
requirements of mobile devices and BY... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 92,
"page_label": "93",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
94 Document Classification: Public TLP: White
documented and approved plan for review, and based on a planned interval
"e.g., quarterly") to implement the organization's mobile devices and BYOD
security procedures by the Cybersecurity function and ... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 93,
"page_label": "94",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
2-7 Data and Information Protection
Objective
information as per organizational policies and procedures, and related laws and
regulations.
Controls
2-7-1 Cybersecurity requirements for protecting and handling data and information must be
defined, documented and approved as per the related laws and regulations.... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 94,
"page_label": "95",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
96 Document Classification: Public TLP: White
• Implement all cybersecurity requirements to data and information protection
procedures in the organization. The data and information protection
procedures must cover at least the following, but not lim... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 95,
"page_label": "96",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
97 Document Classification: Public TLP: White
2-7-3-1 Data and information ownership.
Control implementation guidelines
• Define data and information ownership requirements in accordance with
policies issued by the National Data Management Of... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 96,
"page_label": "97",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
98 Document Classification: Public TLP: White
• Define data and information classification and labelling requirements in
accordance with policies issued by the National Data Management Office and
documented in the cybersecurity requirements document... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 97,
"page_label": "98",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
99 Document Classification: Public TLP: White
regulations, and must be approved by the representative, which may include the
following:
o Include cybersecurity responsibilities and clauses in protecting data and
information privacy.
o Develop... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 98,
"page_label": "99",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
2-8 Cryptography
Objective To ensure the proper and efficient use of cryptography to protect information assets as
per organizational policies and procedures, and related laws and regulations.
Controls
2-8-1 Cybersecurity requirements for cryptography must be defined, documented and
approved.
Relevant cybersecu... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 99,
"page_label": "100",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
101 Document Classification: Public TLP: White
• Develop and document cybersecurity policy for cryptography in the
organization, including the following:
o Standard controls of approved cryptography solutions and applicable
restrictions (techn... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 100,
"page_label": "101",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
102 Document Classification: Public TLP: White
• Evidence showing the uses modern cryptography technologies in the
organization (e.g., the presence of advanced encryption technologies in the
organization, security procedures and standard controls t... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 101,
"page_label": "102",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
103 Document Classification: Public TLP: White
• Evidence showing the implementation of the requirements of the approved
technical cryptographic solutions standard controls and the restrictions applied
to them ( e.g., a screenshot showing evide... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 102,
"page_label": "103",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
104 Document Classification: Public TLP: White
• Cybersecurity policy that covers all the requirements of cryptography in the
organization (e.g., electronic copy or official hard copy).
• Cybersecurity procedure that covers all the requirements of c... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 103,
"page_label": "104",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
105 Document Classification: Public TLP: White
Expected deliverables:
• Cryptography of data in transit document approved by the organization ( e.g.,
electronic copy or official hard copy).
• Formal approval by the head of the organization or ... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 104,
"page_label": "105",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
2-9 Backup and Recovery Management
Objective
information systems and software configurations from cyber risks as per
organizational policies and procedures, and related laws and regulations.
Controls
2-9-1 Cybersecurity requirements for backup and recovery management must be defined,
documented and approved.
... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 105,
"page_label": "106",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
107 Document Classification: Public TLP: White
o Fast recovery of data and systems after exposure to cybersecurity
incidents
o Periodic inspection of backup recovery effectiveness
o Time limit for backups
o Appropriate and advanced technologi... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 106,
"page_label": "107",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
108 Document Classification: Public TLP: White
• Evidence such as, but not limited to, a screenshot of a backup tool showing
the latest backups taken, schedule and scope of backups.
2-9-3 The cybersecurity requirements for backup and recovery manag... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 107,
"page_label": "108",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
109 Document Classification: Public TLP: White
2-9-3-2 Ability to perform quick recovery of data and systems after cybersecurity
incidents.
Control implementation guidelines
• Define and document the requirements of this ECC in the cybersecur... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 108,
"page_label": "109",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
110 Document Classification: Public TLP: White
according to the period specified in the procedures and according to the period
calculated to complete the recovery of backup copies.
Expected deliverables:
• Documents indicating the identification an... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 109,
"page_label": "110",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
2-10 Vulnerabilities Management
Objective
To ensure timely detection and effective remediation of technical vulnerabilities to
prevent or minimize the probability of exploiting these vulnerabilities to launch cyber-
attacks against the organization.
Controls
2-10-1 Cybersecurity requirements for technical vulner... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 110,
"page_label": "111",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
112 Document Classification: Public TLP: White
o Requirements for the classification of vulnerabilities according to their
severity.
o Requirements to address vulnerabilities using effective tools and
methods.
• Support the organization's policy b... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 111,
"page_label": "112",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
113 Document Classification: Public TLP: White
• Vulnerabilities detection and testing reports (pre - and post -treatment)
indicating classification of vulnerabilities
2-10-3 The cybersecurity requirements for technical vulnerabilities managem... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 112,
"page_label": "113",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
114 Document Classification: Public TLP: White
• Vulnerabilities management procedures and a periodic plan to assess and detect
vulnerabilities
• Periodic reports to assess and detect vulnerabilities
2-10-3-2 Vulnerabilities classification based o... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 113,
"page_label": "114",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
115 Document Classification: Public TLP: White
• Define and document the requirements of this ECC in the cybersecurity
requirements document and approve them by the representative.
• Share the organization's information and technology asset vul... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 114,
"page_label": "115",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
116 Document Classification: Public TLP: White
• Define and document the requirements of this ECC in the cybersecurity
requirements document and approve them by the representative.
• Link vulnerabilities management procedures to the security patch
... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 115,
"page_label": "116",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
117 Document Classification: Public TLP: White
o Cybersecurity companies through their tools and technologies
Expected deliverables:
• Cybersecurity policy that covers this control (e.g., electronic copy or official hard
copy).
• Formal appro... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 116,
"page_label": "117",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
2-11 Penetration Testing
Objective
capabilities through simulated cyber-attacks to discover unknown weaknesses within
the technical infrastructure that may lead to a cyber breach.
Controls
2-11-1 Cybersecurity requirements for penetration testing exercises must be defined,
documented and approved.
Relevant cy... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 117,
"page_label": "118",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
119 Document Classification: Public TLP: White
o Determine the scope of the penetration test in the organization.
o Define periodic penetration testing requirements.
o Define penetration testing requirements using effective tools and
methods. ... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 118,
"page_label": "119",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
120 Document Classification: Public TLP: White
Control implementation guidelines
• Define and document the requirements of this ECC in the cybersecurity
requirements document and approve them by the representative.
• Identify and document all servi... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 119,
"page_label": "120",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
121 Document Classification: Public TLP: White
• Define and document the requirements of this ECC in the cybersecurity
requirements document and approve them by the representative.
• Develop procedures for penetration testing.
• Develop and im... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 120,
"page_label": "121",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
2-12 Cybersecurity Event Logs and Monitoring Management
Objective
To ensure timely collection, analysis and monitoring of cybersecurity events for early
detection of potential cyber -attacks in order to prevent or minimize the negative
Controls
2-12-1 Cybersecurity requirements for event logs and monitoring ma... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 121,
"page_label": "122",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
123 Document Classification: Public TLP: White
o Define the scope of information assets to which event logs must be
activated.
o Activate cybersecurity event logs on critical information assets in the
organization.
o Activate cybersecurity e ... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 122,
"page_label": "123",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
124 Document Classification: Public TLP: White
o Define technologies to collect activated cybersecurity event logs.
o Define a team to continuously monitor cybersecurity event logs.
o Define the retention period for cybersecurity event logs (not les... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 123,
"page_label": "124",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
125 Document Classification: Public TLP: White
• Develop rules in SIEM system to enable the monitoring team to monitor the
activated records of critical information assets (after linking them).
Expected deliverables:
• A document (such as appr... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 124,
"page_label": "125",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
126 Document Classification: Public TLP: White
2-12-3-3 Identification of required technologies (e.g., SIEM) for cybersecurity event
logs collection.
Control implementation guidelines
• Define and document the requirements of this ECC in the cyber... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 125,
"page_label": "126",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
127 Document Classification: Public TLP: White
Control implementation guidelines
• Define and document the requirements of this ECC in the cybersecurity
requirements document and approve them by the representative.
• Identify a team for contin... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 126,
"page_label": "127",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
128 Document Classification: Public TLP: White
• A document (such as approved policy or procedure) indicating the
identification and documentation of the requirements related to this control.
• A screenshot or direct directory from the SIEM system s... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 127,
"page_label": "128",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
2-13 Cybersecurity Incident and Threat Management
Objective
To ensure timely identification, detection, effective management and handling of
cybersecurity incidents and threats to prevent or minimize negative impacts on
dated 14/8/1438H.
2-13-1 Requirements for cybersecurity incidents and threat management must ... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 128,
"page_label": "129",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
130 Document Classification: Public TLP: White
o Collect and handle threat intelligence feeds.
o Periodically review of cybersecurity incident response plan.
• Support the organization's policy by the Executive Management. This must be
done through... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 129,
"page_label": "130",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
131 Document Classification: Public TLP: White
2-13-3 The requirements for cybersecurity incidents and threat management must include at
least the following:
2-13-3-1 Cybersecurity incident response plans and escalation procedures.
Relevant ... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 130,
"page_label": "131",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
132 Document Classification: Public TLP: White
Expected deliverables:
• A document (such as approved policy or procedure) indicating the
identification and documentation of the requirements related to this control.
• The approved cybersecurity inci... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 131,
"page_label": "132",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
133 Document Classification: Public TLP: White
o The roles and responsibilities for cybersecurity incident response and
how to communicate with all stakeholders.
o The key information of the incident, including but not limited to, date
and tim... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 132,
"page_label": "133",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
134 Document Classification: Public TLP: White
• A document (such as approved policy or procedure) indicating the
identification and documentation of the requirements related to this control.
• Procedures followed to share alerts, threat intelligenc... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 133,
"page_label": "134",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
135 Document Classification: Public TLP: White
• Screenshot or direct example of alerts that have been dealt with in advance
according to the necessary procedures.
2-13-4 The requirements for cybersecurity incidents and threat management must ... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 134,
"page_label": "135",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
2-14 Physical Security
Objective To ensure the protection of information and technology assets from unauthorized
physical access, loss, theft and damage.
Controls
2-14-1 Cybersecurity requirements for physical protection of information and technology
assets must be defined, documented and approved.
Relevant cyb... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 135,
"page_label": "136",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
137 Document Classification: Public TLP: White
• Formal approval by the head of the organization or his/her deputy on such
document ( e.g., via the organization's official e -mail, paper or electronic
signature).
2-14-2 The cybersecurity requ... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 136,
"page_label": "137",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
138 Document Classification: Public TLP: White
• Evidence that clarifies the implementation of information and technology
asset protection controls against unauthorized physical access, loss, theft and
vandalism, including, but not limited to:
o An... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 137,
"page_label": "138",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
139 Document Classification: Public TLP: White
• Identify access mechanism to critical areas (e.g., card access, fingerprint access,
face access, etc.).
• Restrict the authority of managing the physical access system to individuals
with specif... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 138,
"page_label": "139",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
140 Document Classification: Public TLP: White
o Outside the building.
o Building corridors.
o Entry and exit doors.
Expected deliverables:
• A document (such as approved policy or procedure) indicating the
identification and documentation of the... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 139,
"page_label": "140",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
141 Document Classification: Public TLP: White
2-14-3-4 Secure destruct ion and re -use of physical assets that hold classified
information (including documents and storage media).
Control implementation guidelines
• Define and document the r... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 140,
"page_label": "141",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
142 Document Classification: Public TLP: White
2-14-3-5
facilities.
Control implementation guidelines
• Define and document the requirements of this ECC in the cybersecurity
requirements document and approve them by the representative.
• Identif... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 141,
"page_label": "142",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
143 Document Classification: Public TLP: White
2-14-4 The cybersecurity requirements for physical protection of information and technology
assets must be reviewed periodically.
Control implementation guidelines
• Review the implementation of ... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 142,
"page_label": "143",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
2-15 Web Application Security
Objective To ensure the protection of external web applications against cyber risks.
Controls
2-15-1 Cybersecurity requirements for external web applications must be defined,
documented and approved.
Relevant cybersecurity tools:
• Web Application Protection Policy Template.
Contr... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 143,
"page_label": "144",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
145 Document Classification: Public TLP: White
o Screening for application -specific vulnerabilities (Vulnerability
Assessment).
o Regular backups in secure locations (Backup Log Files).
o Regular screening of open ports, services, processes, ... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 144,
"page_label": "145",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
146 Document Classification: Public TLP: White
• Documents that confirm the implementation of cybersecurity requirements
related to the protection of external web applications as documented in the
policy.
• An action plan document to implement the ... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 145,
"page_label": "146",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
147 Document Classification: Public TLP: White
o Identify the firewall technologies that the organization wishes to
acquire, including but not limited to:
▪ Firewall with pre-managed rules managed by the system itself.
▪ A firewall with the op... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 146,
"page_label": "147",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
148 Document Classification: Public TLP: White
• If there are internally developed applications or external applications
purchased from a third -party that are operated by the organization, the
following must be done:
o Determine the tiers of the a... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 147,
"page_label": "148",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
149 Document Classification: Public TLP: White
• If there are web applications purchased and operated by a third party, the
following must be done:
o Ensure the supplier's compliance with cybersecurity policies and
standard controls including ... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 148,
"page_label": "149",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
150 Document Classification: Public TLP: White
• Secure Use of Web Application Users Policy.
• Screenshot from the organization's website indicating the publication of the
secure usage policy for users.
2-15-3-5 Multi-
Control implementation gu... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 149,
"page_label": "150",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
151 Document Classification: Public TLP: White
• Review and update cybersecurity requirements for external web applications
security in the organization periodically according to a documented and
approved plan for review and based on a planned ... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 150,
"page_label": "151",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
3-1 Cybersecurity Resilience Aspects of Business Continuity Management (BCM)
Objective
To ensure the inclusion of the cybersecurity resiliency requirements within the
impacts on systems, information processing facilities and critical e -services from
disasters caused by cybersecurity incidents.
Controls
3-1-1 C... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 151,
"page_label": "152",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
153 Document Classification: Public TLP: White
3-1-2 The cybersecurity requirements for business continuity management must be
implemented.
Control implementation guidelines
• Implement cybersecurity requirements within business continuity
m... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 152,
"page_label": "153",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
154 Document Classification: Public TLP: White
• Laws and regulations related to business continuity in the organization must
be defined.
• Include high -risk cybersecurity incidents as a rationale for activating the
organization's business continu... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 153,
"page_label": "154",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
155 Document Classification: Public TLP: White
3-1-3-2 Developing response plans for cybersecurity incidents that may affect the
business continuity.
Control implementation guidelines
• Define and document the requirements of this ECC in the ... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 154,
"page_label": "155",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
156 Document Classification: Public TLP: White
Expected deliverables:
• A document (such as approved policy or procedure) indicating the
identification and documentation of the requirements related to this control
• Approved plans to respond to cyb... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 155,
"page_label": "156",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
157 Document Classification: Public TLP: White
• Formal approval by the head of the organization or his/her deputy on such
documents ( e.g., via the organization's official e -mail, paper or electronic
signature).
3-1-4 The cybersecurity req... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 156,
"page_label": "157",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
4-1 Third-Party Cybersecurity
Objective
To ensure the protection of assets against the cybersecurity risks related to third-parties
including outsourcing and managed services as per organizational policies and
procedures, and related laws and regulations.
Controls
4-1-1 Cybersecurity requirements for contracts ... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 157,
"page_label": "158",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
159 Document Classification: Public TLP: White
4-1-2 The cybersecurity requirements for contracts and agreements with third -parties (e.g.,
Service Level Agreement (SLA)) -
or services- must include at least the following:
4-1-2-1 Non-disclos... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 158,
"page_label": "159",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
160 Document Classification: Public TLP: White
• Ensure that third parties develop communication procedures with the
organization, including communication means and data in the e vent of a
cybersecurity incident that may affect the organization's d... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 159,
"page_label": "160",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
161 Document Classification: Public TLP: White
4-1-3 The cybersecurity requirements for contracts and agreements with IT outsourcing and
managed services third-parties must include at least the following:
4-1-3-1
Conducting a cybersecurity r... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 160,
"page_label": "161",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
162 Document Classification: Public TLP: White
• Ensure that Cybersecurity operation centers managed for operation and
monitoring are located within the Kingdom.
• Ensure that remote access to Cybersecurity operation centers managed for
operation a... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 161,
"page_label": "162",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
4-2 Cloud Computing and Hosting Cybersecurity
Objective
To ensure the proper and efficient remediation of cyber risks and the implementation
of cybersecurity requirements related to hosting and cloud computing as per
organizational policies and procedures, and related laws and regulations. It is also to
on the cl... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 162,
"page_label": "163",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
164 Document Classification: Public TLP: White
• Cybersecurity policy that covers the requirements of the use of cloud
computing and hosting services (e.g., electronic copy or official hard copy).
• Formal approval by the head of the organization or... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 163,
"page_label": "164",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
165 Document Classification: Public TLP: White
• An action plan to implement the cybersecurity requirements for cloud
computing and hosting services.
• A signed sample of the agreement or contract between the organization and the
cloud service... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 164,
"page_label": "165",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
166 Document Classification: Public TLP: White
• Approved procedures for data return after the termination of cloud computing
services.
• Classification policies and procedures for data to be hosted on computing and
hosting services.
• Up to date ... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 165,
"page_label": "166",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
167 Document Classification: Public TLP: White
• Ensure that the location of hosting and storing the organization's information
is within the Kingdom by, but not limited to:
o Include a clause in the contract or service level agreement signed w... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 166,
"page_label": "167",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
168 Document Classification: Public TLP: White
• Policy indicating that it is up to date and the changes to the cybersecurity
requirements for cloud computing and hosting services have been documented
and approved by the head of the organization or ... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 167,
"page_label": "168",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
5-1 Industrial Control Systems (ICS) Protection
Objective
To ensure the appropriate and effective cybersecurity management of Industrial
Controls Systems and Operational Technology (ICS/OT) to protect the confidentiality,
cyber attacks (e.g.,
cybersecurity strategy and related and applicable local and internation... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 168,
"page_label": "169",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
170 Document Classification: Public TLP: White
5-1-2 The cybersecurity requirements related to Industrial Controls Systems and Operational
Technology (ICS/OT) must be implemented.
Control implementation guidelines
• Implement all cybersecurity req... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 169,
"page_label": "170",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
171 Document Classification: Public TLP: White
• Isolate industrial production networks ( ICS/OT) from other networks
physically or logically based on cyber risks, including:
o Corporate network
o Industrial demilitarized zone
• Ensure that i... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 170,
"page_label": "171",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
172 Document Classification: Public TLP: White
• Ensure that industrial production networks are not linked with other networks
in the organization except for necessary communications and ensure the
restriction and physical and logical segregation i... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 171,
"page_label": "172",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.