Sample Cybersecurity Strategy
Sample Cybersecurity Strategy
Document Control
Classification Confidential
Document Title Cybersecurity Strategy
Document Owner Cybersecurity Department
Author(s) Technology Control Company
Document Date 26/03/2023
Issused Date
Reviewed By
Approval
Role Name Signature
Chief Executive
Officer
Change Record
Ver No Author Change Reference
1.1 Technology Control Company Initial version
Distribution
Department Role Name
Risk, Governance and
Compliance
1
Table of Contents
1. Introduction ........................................................................................................................................ 3
2. Purpose ............................................................................................................................................... 3
3. Scope ................................................................................................................................................... 3
4. Acronym ............................................................................................................................................. 3
5. Roles and Responsibilities ................................................................................................................... 4
6. XXXX Cybersecurity Vision and Mission .............................................................................................. 6
7. Drivers for Cybersecurity Strategy ...................................................................................................... 6
8. SWOT Analysis ..................................................................................................................................... 8
9. Business Strategy ................................................................................................................................ 9
10. Regulations ........................................................................................................................................ 10
11. XXXX Principles of Cybersecurity....................................................................................................... 10
12. Cybersecurity Strategic Pillars ........................................................................................................... 10
13. Cybersecurity Organization ............................................................................................................... 11
14. Cybersecurity Strategic Elements ..................................................................................................... 12
15. Implementation Roadmap ................................................................................................................ 17
16. Associated Documents ...................................................................................................................... 21
2
1. Introduction
The (XXXX) was established on DD/MM/YYYY, in conjunction with the Royal decree, with the
approval of the Council of Ministers, on the XXXX. XXXX is an independent administrative and
financial agency, associated with the Economic Affairs and Development Council. The XXXX’s
system coordinates with all sectors and agencies in Saudi Arabia which leads to a pressing need to
develop a Cybersecurity Strategy to overlay the drivers for the cybersecurity program.
Cybersecurity Strategy is comprised of high-level plans for XXXX, this Strategy document is a
guideline on how XXXX shall go about securing its assets and minimizing cyber risks and Threats.
• The Cybersecurity Strategy shall be adaptable to the current threat landscape and ever-
evolving technology and regulatory requirements.
• The Cybersecurity Strategy is developed with a three-year vision and shall be updated and
revised at a pre-defined annually or as and when need arises.
• The Cybersecurity Strategy also establishes a strategic baseline for the XXX’s cybersecurity
program to continuously adapt to emerging threats and risks.
2. Purpose
The purpose of this Cybersecurity Strategy is to provide a vision to XXXX, while it also serves as
blueprint for XXXX with an objective to guide the key stakeholders as the XXXX and business
environment evolve.
3. Scope
The Cybersecurity Strategy shall be applicable to all the facilities/ locations that XXXX operates
at currently or may plan to operate at in the future. This program applies to the XXXX and third
party/outsourced staff having access to or handling XXXX information including those involved
in providing or managing cybersecurity services as a third party of their business activities for
XXXX.
4. Acronym
• XXXX
• Political, Economic, Social, Technological, Legal and Environmental (PESTEL).
• Cybersecurity manager (CSM).
• Executive Director of Business Development and Digital Transformation
(EDBDDT).
• Executive Director of Strategy and Performance (EDSP).
• Executive Director of Risk, Governance and compliance (EDGRC).
• Executive Director of Shared Services (EDSS).
• Board of Directors (BoD).
• Cybersecurity Steering Committee (CSSC).
3
5. Roles and Responsibilities
Responsibility
Criteria
Parameters
The individual(s) with responsibility for the task or deliverable is
Responsible typically responsible for developing the deliverable or completing the
activity in XXXX.
The accountable party is typically the person or group responsible for
Accountable ensuring the work is complete and suitable. This is usually someone
with signature authority or the decision-maker in XXXX.
Consulted individuals are those from whom feedback, and input
should be solicited. Consulted individuals are considered to ensure
Consulted
their stakeholdership in XXXX is not impact while executing the
Cybersecurity Strategy.
Informed persons are those stakeholders who should be informed of
Informed the topic under discussion or the result of the decisions which will
impact the course of the Cybersecurity Strategy.
Responsibilities and
S. No R A C I
Activities
Develop the Cybersecurity
Strategy based on Political, EDGRC/
Economic, Social, EDBDDT/
01 Technological, Legal and CSM CSM BoD
/ EDSS
Environmental (PESTEL)
and align it with the Vision
2030.
Specific, Measurable, EDGRC/
Result Oriented, EDBDDT/
Achievable, Timebound
02 CSM CSM BoD
(SMART) objectives are / EDSS
developed in the
Cybersecurity Strategy.
The responsibilities of the EDGRC/
third parties, agencies and EDBDDT/
03 Ministries are identified in CSM CSM BoD
the project plan which are EDSS
associated to the
Cybersecurity Strategy.
Discuss the developed
Cybersecurity Strategies EDGRC/
along with the EDBDDT/
04 Cybersecurity Committee CSM CSM / EDSS BoD
members in the
Cybersecurity Committee
Meeting.
05 Ensure adequate budgets BoD BoD CSM EDGRC/
4
Responsibilities and
S. No R A C I
Activities
are allocated to the EDBDDT
Cybersecurity Strategy.
EDBDDT/
Develop the Key EDGRC/
Performance Indicators CSM/ BoD /
10 (KPIs) required to monitor CSM CSM
EDSS/ EDSP
the success criteria for
completing the KPI EDSP
CSM /
Attend Cybersecurity CSM/ /
Steering committee EDBDDT/
EDSP/
12 meetings related to the CSM EDGRC/ BoD
status of the Cybersecurity EDGRC/
EDSS/
Department Strategy EDBDDT EDSS
Status every quarterly.
5
Responsibilities and
S. No R A C I
Activities
implemented.
Review the capabilities of
the Cybersecurity
Department on CSM/
semiannually EDBDDT/
14 Cybersecurity Committee CSSC CSM CSM EDGRC/
Meetings to restructure the EDSS
resource plans to
successfully complete the
Cybersecurity Strategic
objectives.
Mission
will aim to develop an implementation roadmap to improve the People, Process, Technology while
continual improvement approach and exceeding performance criteria’s for the Cybersecurity
Department with oversight from the Senior Management in XXXX.
Business
Strategy
Advanced Security
Monitoring
Enterprise
IT Strategy
Ensure Continuous
operations (BCM)
Information
Risk Analysis
6
- Independent Assessments Strategy: Being a state funded XXXX is subject to multiple
regulations and standard, to stay aligned with the Vision 2030 provisions and targets while
meeting keeping the business processes and the data. Adoption of an independent assessment
strategy for evaluation and validation of XXXX’s security posture allows the XXXX to fulfil
its charter objectively more readily and without conflicts of interest.
- Information Risk Analysis: To ensure security risks to XXXX’s and its stakeholder’s
information are properly managed by protecting the Confidentiality, Integrity and Availability
of the information assets, and to ensure the cybersecurity risk management process is aligned
with the XXXX’s enterprise risk management process.
- Ensure Continuous operations (BCM): To ensure that technology initiatives related to the
continuity of business operations, and continuity of cybersecurity, are in alignment with the
strategic business objectives and embed business continuity management (BCM) best
practices.
- Advanced Security Monitoring: Advanced Security monitoring practices are crucial to the
proactive detection of potential attack vectors enabling XXXX to respond effectively to
attempted security breaches and continuously monitor the changes in its threat landscape.
7
8. Strength, Weakness Opportunity and Threat (SWOT) Analysis
SWOT analysis to analyses the gaps between the current status and the target position of
cybersecurity this analysis illustrates the strengths and weaknesses of XXXX, and the positions of
opportunities for XXXX and the threats it faces.
S W O T
• Multi-factor authentication for users • Inadequate physical security control • XXXX is the only government • Lack of Third-party risk assessments
to some web applications and e-mail enforcement like CCTV camera’s in entity or center to provide XXXX, • Lack of patch management solution
services. Data Center, physical entry controls this will support the entity to have • Lack of vulnerability assessments
etc. (VA).
• Practices for collecting Non- financial support on the current
• Inadequate access segregations and • Third-party cybersecurity
Disclosure Agreement (NDA) is cybersecurity program.
review for critical and non-critical requirements and controls are not
adopted. systems. • Mobile Device Manager (MDM) embedded in current managed
• Internal synergy between employees, • Lack of stringent Human Resources solution is planned to be services, cloud providers and
Department and Senior Management (HR) screening or employee implemented in 2023. vendors.
oversight enabling cybersecurity onboarding process for XXXX • Senior Management has the vision • The datacenter has point of failure as
employees. the resiliency plan us not developed.
initiatives were enabled. to launch new services starting
• Asset classification and Data • Lack of applying user authorization
• Hosting of virtual private cloud from 2023 and to enable the
Classification is not implemented in based on identity and access
within the Kingdom of Saudi Arabia cybersecurity controls for this
XXXX. controls.
(KSA) reducing the risks due to cross • Lack of incident response plan. vision. • Security requirements are not
border data leakage. • Lack of automation for identity and • Desire of XXXX to be prepared and embedded in the contract.
• Existence of security technologies access management with standby for secure remote work in • Data loss due to lack of Data
such as firewalls and anti-virus. centralization. case of business failure and/or Leakage Prevention (DLP) controls.
• Lack of cybersecurity policies and • Lack of brand protection services in
• Asset inventory is updated remote work need.
procedures. XXXX.
periodically to reflect the asset • Cybersecurity guidelines is capable
• Lack of risk management practices • Lack of IPS/IDS
universe to build a resilient to develop and implement the
and methodology and centralized risk • Third party access reviews are not
technology services to XXXX. register. cybersecurity hardening guidelines. performed.
• Steering Committee is formed in • Lack of business continuity and • Access to the data center is not
2022 to have oversight on the disaster recovery plan with annual adequately enforced.
Cybersecurity Department. business and recovery testing. • Cybersecurity control
• Lack of centralized asset register. implementation is not adequately
• Manual CS awareness to the
• Lack of CMDB. enforced.
employees in XXXX have been
• Lack of third-party monitoring on • Internal Audit control review is not
practiced judiciously.
cybersecurity requirements and adequately practiced.
controls
• Lack of including cybersecurity
requirements on third-party contracts.
• Lack of proper security technology
configurations and hardening.
• Lack of understanding and defining
the applicable laws and regulations on
XXXX.
• Lack of centralized patching solution.
• Lack of Change Management and
hardening of systems.
• Lack of DDoS testing and bi-annual
scrubbing review.
8
9. Business Strategy
In the year 2022, XXXX had two products: XXXX and XXXX. XXXX offers many benefits to
the holders of the XXXX. Conducting business in accordance with the Foreign Investment Law,
hiring domestic workers, issuing visiting visas for relatives, owning more than two vehicles, using
airport lanes designated for citizens, exemption from financial fees for expatriates and
companions, the freedom to leave and return to the Kingdom, and the ability to work in the private
sector. In 2023, XXXX’s vision was changed to focus on economic growth, increased foreign
investments, the acquisition of talents and exceptional efficiencies, entrepreneurship support, and
increased local consumption. XXXX will aim to launch five new products in addition to their
previous ones, which are XXXX, XXXX, XXXX, XXXX, XXXX, and XXXX.
Limited
Unlimited
2022 Duration XXXX
Duration XXXX
2023
Exceptional Business Property
2024 Efficiency Investor Owner
Talent Entrepreneur
9
10. Regulations
10
1. Cybersecurity by Design (CD): Architect cybersecurity in every facet of XXXX’ s business
ensuring cybersecurity from ground up of people, process, technology, and governance.
2. Business Resilience (BR): Protect XXXX’ s business-critical infrastructure, applications, and
data, and help accelerate recovery from data breach or similar disruptions.
3. Digitalization & Automation (DA): Automate cybersecurity solutions to protect XXXX
against sophisticated cybersecurity threats through digitalization of workflows to understand
the threat patterns to provide faster incident response.
4. Cloud Centralization and Transformation (CCT): Move towards a centralized cloud
environment through secure solutions and practices to avoid fragmented access controls and
permissions.
11
14. Cybersecurity Strategic Elements
Intended Outcomes:
Strategic Actions:
To achieve these intended outcomes, XXXX will continue to develop its governance and risk
management framework to include:
Intended Outcomes:
Employees’ cybersecurity
Cybersecurity services are updated, and security is
awareness exceeds peer
built-in to system designs
organizations
Strategic Actions:
13
• Implement next-generation automated cybersecurity (electronic) services and
controls—such as firewalls, data leakage solutions, endpoint protection and
management— to improve the resilience and security of all Business environments;
(DA) (BR)
• Ensure implementation of cryptographic controls across all classified/sensitive
information in transit and at rest; (DP)
• Ensure XXXX’s products incorporate principles of ‘security by design’ and are
developed using secure coding practices; (CD)
• Ensure all XXXX applications and products are adequately tested for security loopholes
at all stages of development and employ security best practices in product development;
(CD) (DA)
• Focus on digitization and automation of processes to enhance integrity and reduce
security risks due to human error; (DA)
• Ensure all physical premises and information processing facilities used by XXXX are
adequately protected against physical and environmental threats; (DP)
• Leverage state-of-the-art tools and technologies to centrally manage and secure
XXXX’s cloud environments; (CC)
Intended Outcomes:
Timely threat
Security configurations intelligence
Cyber-attacks are rapidly detected
are consistently applied supports effective
and appropriately managed
and monitored cyber incident
management
Strategic Actions:
• Implement next generation security monitoring tools and processes, such as real-time
analysis and behaviour analytics, to rapidly detect malicious activities and understand
the potential impact of events; (DA) (BR)
• Conduct regular cybersecurity tests to exercise cyber defences, detection, and
assessment capabilities; (BR)
• Augment detection processes and procedures, such as expanded end-point detection and
data mining capabilities; (DA)
14
• Implement strong standards for security configuration and continuously monitor for
configuration changes; (CC)
• Improve processes to handle threat intelligence information and develop threat hunting
activities to detect malicious activities; (BR)
• Establish robust BYOD policies, processes, and controls to ensure all mobile devices
(including but not limited to laptops and handhelds) connecting to XXXX’s
infrastructure are adequately secured, monitored and trustworthy; (DA)
• Ensure processes associated with the human capital at XXXX address relevant
cybersecurity risks prior to employment, during employment and termination of
employment; (CD)
Intended Outcomes:
Strategic Actions:
• Further increase the frequency and coverage of cybersecurity tests, audits, and
assessments to exercise the XXXX’s cyber defence capabilities to respond to an event.
This includes expanding response plans and testing activities using a coordinated
approach with external stakeholders, such as nation Cybersecurity Authority and the
state government. This is consistent with External Objectives outlined in the next section
(BR)
15
14.5 Internal Objective 5 – RECOVER
• Build Resilience to recover from a Cyber Event
• XXXX to ensure it can restore normal business operations.
Intended Outcomes:
Strategic Actions:
• Test cybersecurity incident recovery capabilities with internal and external stakeholders
(financial system participants, federal government, etc.) to ensure approaches are consistently
used in all scenarios. This is an important focus of our external objectives outlined below.
Incident response processes will be developed or update (BR).
• Manage cybersecurity issues efficiently through co-ordination and communication with all
stakeholders affected. Cyber recovery playbooks and tabletop exercises will be used to test
recovery preparation and speed. In particular, the XXXX’ s ability to respond and recover from
a ransomware attack will be enhanced and tested (BR)
16
15. Implementation Roadmap
15.1 Internal Objective 1 – IDENTIFY AND MANAGE
• Effectively Manage People, Risk, Resources and Governance to address cybersecurity risks.
• XXXX will have the governance and information needed to manage and oversee cybersecurity risk.
17
15.2 Internal Objective 2 – PROTECT
• Establish a proactive posture against cyber-attacks.
• Protect the mission-critical and critical digital assets, also known as the crown jewels.
18
15.3 Internal Objective 3 – DETECT
• Strengthen systems to identify a cybersecurity event
• XXXX will expand cyber defense capabilities to find a problem when it does occur.
19
15.4 Internal Objective 4 – RESPOND & Internal Objective 5 – RECOVER
The cybersecurity roadmap for objective 4 and 5 are covered in the same implementation roadmap.
RESPOND
RECOVER
20
16. Associated Documents
• Cybersecurity Steering Committee Charter.
• Cybersecurity Risk Management Methodology.
• Acceptable Use Policy.
• Anti-Malware Policy.
• Application Security Policy.
• Asset Management Policy.
• Backup Recovery Policy.
• Business Continuity Management Policy.
• Cloud Security Policy.
• Cybersecurity Policy for hosted services.
• Compliance Policy.
• Cryptography Policy.
• Cybersecurity social media Policy.
• Data Center Policy.
• Data Protection & Classification Policy.
• Email Usage Policy.
• Human Resources Security Policy.
• Identity and Access Control Policy.
• Incident Management Policy.
• Cybersecurity Management Policy.
• Cybersecurity Organization Policy.
• Mobile Device Policy.
• Network Security Policy.
• Operation Security Policy includes (Change Management, Patch Management, Capacity
Management and Log Management).
• Outsourcing and Third-party Policy.
• Password Policy.
• Penetration Test Policy.
• Physical Security Policy.
• Technical Project Management Policy.
• Remote Work Policy.
• Risk Management Policy.
• Security Auditing Policy.
• Vulnerability Management Policy.
21