SAMA Cyber Security Framework in Saudi Arabia

 

 

What is SAMA CSF

The Saudi Central Bank (SAMA) has taken the initiative to enhance cyber resilience by adopting industry best practices, standards, and frameworks. As a result, SAMA developed the Cyber Security Framework and mandated its implementation across all sectors. This ensures entities achieve the minimum required level of cybersecurity compliance, enabling them to effectively manage and withstand cybersecurity threats.

CyberProLab helps customers improve their Cyber Resilience with the SAMA Cyber Security Framework

SAMA CSF GAP Assessment
Assess the current state of your SAMA CSF Compliance using the SAMA CSF gap assessment methodology.
SAMA CSF Risk Assessment

Perform SAMA CSF risk assessment based on the SAMA Cyber Risk Management Framework

SAMA CSF Risk Treatment Plan

Develop Risk Treatment Plans to remediate the gaps and risks identified to acceptable levels.

SAMA CSF Policies & Procedures

Our security analysts will develop the required Information Security policies and procedures for you, which will suit your organization’s required.

Security Testing & Implementation

Perform periodic vulnerability assessments and penetration testing. Advisory on remediation of technology gaps and implementation 

Security Awareness

All your employees receive security awareness through the cloud portal helping you improve the human side of security.

SAMA CSF Internal Audits and Progress Review

Internal audits help you identify deviations from the defined SAMA CSF policies and procedures. Perform periodic SAMA CSF Implementation progress reviews to measure the maturity level.

Phase 1 – Assessment

 

The first phase of a SAMA CSF Compliance project is to assess the current state of compliance.

Identify Critical Assets

  • Project Initiation
  • Understand the organization
  • Identify critical business services
  • Identify information infrastructure

Gap & Risk Assessment

  • Assessment of current state and mapping it to SAMA CSF Standard
  • Identification of threats and vulnerabilities exploiting the gaps resulting in risk.

CSF Controls Identification

  • Identify cybersecurity controls that can mitigate the risks and thereby result in SAMA CSF Compliance.
  • Define SAMA CSF Risk treatment plan

SAMA CSF Compliance Reports

  • Develop the SAMA CSF compliance reports

Phase 2 – Control Development

 

This second phase of the project is to develop the controls to treat the risks identified. SAMA CSF Risk Treatment Plan provides the directions for this phase of the implementation.

Policies & Procedures

  

Policies and procedures provide the basis for implementing cybersecurity within the organization.

Security Awareness

 

Humans are often considered the weakest link in cyber security. Security awareness improves the cyber security posture.

Technology Controls

 
  • Security Architecture
  • Technology gaps
  • Configuration advisory

Management Controls

 
  • Operational controls
  • Physical Security
  • Managerial Controls

Phase 3 – Security Services

 

This phase of the engagement supplements existing security practices in the organization. Some of the key service performed by ValueMentor team are:

Periodic Security Testing

 
  • Vulnerability Assessments
  • Penetration Testing
  • Security configuration reviews

SIEM & Incident Response

 
  • SIEM Solution deployment
  • 24×7 Security Monitoring
  • Security Device Management

Managed Network Security

 
  • Next-Gen Firewalls, UTMs
  • URL Filter, Web Security
  • Wi-Fi Security
  • VPN and remote access securit

Data & Endpoint Security

 
  • DLP Solutions
  • Patch Management
  • Endpoint security
  • Mobile Device Management

Phase 4 – Compliance Review

 

Periodic review of the SAMA CSF Compliance status is critical for the success of the Information Security Management System.

ISMS Performance Review

 

Assess the performance of the ISMS against the defined metrics. This is a key measure towards continual improvement of the ISMS

SAMA CSF Internal Audits

 

Perform periodic ISMS audits to assess the compliance to the defined policies and procedures

Mock Compliance Audit

 

Perform mock compliance audits help you identify the weak areas of ISMS implementation.

External Audit Support

 

Assist the customer during the compliance audit to meet the required SAMA CSF requirements.

Scroll to Top