Cybersecurity Regulatory Framework (CRF) For The ICT Sector: Date: 29/05/2019 Classification: Public
Cybersecurity Regulatory Framework (CRF) For The ICT Sector: Date: 29/05/2019 Classification: Public
Version: 1.0
Date: 29/05/2019
Classification: Public
CONTENT
1. Introduction ...................................................................................................................................... 3
2. Purpose ............................................................................................................................................. 3
3. Scope ................................................................................................................................................ 3
4. Applicability ..................................................................................................................................... 4
5. Roles and Responsibilities ................................................................................................................ 4
6. Glossary ............................................................................................................................................ 5
7. Regulatory Framework ..................................................................................................................... 8
1. Governance ................................................................................................................................... 8
2. Asset Management ....................................................................................................................... 8
3. Cybersecurity Risk Management.................................................................................................. 9
4. Logical Security............................................................................................................................ 9
5. Physical Security ........................................................................................................................ 10
6. Third Party Security ................................................................................................................... 10
Annex ......................................................................................................................................................... 10
1. Compliance Level........................................................................................................................... 10
2. Structure of the controls ................................................................................................................. 11
3. Documentation of Requirements .................................................................................................... 14
4. Control Domains ............................................................................................................................ 15
1. Governance ................................................................................................................................. 15
2. Asset Management ..................................................................................................................... 22
3. Cybersecurity Risk Management................................................................................................ 26
4. Logical Security.......................................................................................................................... 29
5. Physical Security ........................................................................................................................ 45
6. Third Party Security ................................................................................................................... 49
REFERENCES ....................................................................................................................................... 52
One of the main pillars of economic growth is the ICT sector providing the
fundamental competitiveness of the national economy through high-speed
broadband, online services, and information assets. With rising expectations
towards continuous availability of services, immaculate user experience and
effective protection of sensitive data, the strengthening of Saudi Arabia’s
cybersecurity becomes crucial to increase the digital nation’s trust in safe and
resilient ICT infrastructure and services.
2. Purpose
3. Scope
This framework is applicable to all the LSPs and their subsidiaries, staff, third
parties and customers. Each LSP is required to comply with all applicable
requirements through developing their own way of achieving the cybersecurity
objectives.
The words and expressions defined in CITC Statutes shall have the same meaning when used
in this document. The following words and expressions shall have the meaning assigned to
them below, unless the context says otherwise:
Access Control The process of granting or denying specific requests for obtaining
and using information and related information processing services
and to enter specific physical facilities.
Advanced Advanced Persistent Threats is a stealthy computer network attack
Persistent Threats in which a person or group gains unauthorized access to a network
and remains undetected for an extended period.
Baseline A documented set of specifications for an information system, or a
Configuration configuration item within a system, that has been formally reviewed
and agreed on at a given point in time, and which can be changed
only through change control procedures.
BYOD Bring your own device (BYOD) refers to personally owned devices
(laptops, tablets, and smart phones) that employees and contractors
are permitted to use to carry out business functions.
Cloud Computing Usage of scalable and elastic pool of shareable physical or virtual
resources (such as servers, operating systems, networks, software,
applications, and storage equipment) with self-service provisioning
and administration on-demand.
Critical Systems Any systems in which breakdown, unauthorized changes of their
operations, and unauthorized access to their information lead to
highly affect the availability of the services, organization's
operations, economic or financial or social effects at the national
level.
Cryptography Cryptography is the bases that contains principles, means, and
methods of storing and transmitting data or information in certain
forms to hide its semantic contents and to prevent unauthorized use
or not-detected modification so that only the persons concerned can
read and process such information and data.
Cyber Threats Intentional exploitation of computer systems, networks and the
entities whose work depend on information technology and digital
communication with the aim of causing harm.
Cybersecurity Protection of networks, systems, operations, and their components
of hardware and software, provided services, and contained data
from any unauthorized access or disruption or misuse. The
Cybersecurity concept includes information security and digital
security.
Cybersecurity A breach of a system's security policy in order to affect its integrity
Incidents or availability and/or the unauthorized access or attempted access to
a system or systems.
Cybersecurity Risk An unwanted event or exposure with potentially negative
The CRF defines the following regulatory statements LSPs shall comply to.
Detailed requirements pertaining to each regulatory statement can be found in the
Annex.
1. Governance
2. Asset Management
2.1. Maintain an up-to-date asset inventory of all the information assets that
includes all relevant details to facilitate efficient protection of the
information assets.
2.2. Classify the information assets to ensure a risk-based protection of the
information assets.
2.3. Manage the use of personnel devices for business purposes to protect the
organization from the risks imposed by such devices.
2.4. Define and enforce the acceptable use policy to protect the organization
from the risks imposed by the inappropriate use of information assets.
2.5. Maintain information assets and recover them in case of a cybersecurity
incident to ensure their continued availability and integrity.
2.6. Ensure secure disposal of information assets in order to prevent
4. Logical Security
5. Physical Security
Annex
1. Compliance Level
CITC will set a security target by defining three compliance levels following a
risk based approach. Each level comprises of a set of cybersecurity controls. The
three levels vary in the complexity of the controls.
In order to achieve compliance with a higher level, compliance with all preceding
levels is required.
Level 2
Level 1
The criticality of the LSP defines the target compliance level and date, which will
be officially communicated by CITC (via e.g. memos, website).
Important notes
The controls within the CRF are interconnected, for example an outcome from
a control in one category could be an input to another control within a different
category (e.g. the [Vulnerabilities Report] generated in the Vulnerability
Management category acts as an input to the Patch Management category).
The highlighted processes and outcomes cover most but not necessarily all
cybersecurity measures. They just emphasize expected implementations of
processes and outcomes to improve the usability and clarity of the CRF
controls.
New Outcome
Outcome
New Process
Process
Reference
ICT-specific
3. Documentation of Requirements
In almost all CRF categories, documenting the requirements will be the first
step of the implementation by the LSP. The CRF does not prescribe a standard
format for the documentation of the requirements mentioned in each of the
categories. These requirements can be defined in form of directives, rules,
standards or policy documents. However, the requirements document –
regardless of its name – must at least include the following:
Documents that do not fulfil the above requirements will not be qualified to be
compliant with the control requirements.
1. Governance
• Activities
• Budget
• Timeline
• Resources (e.g. capabilities, personnel)
2.3.2 CL 1
Enforce the defined [Cybersecurity Requirements for
BYOD] within the organization.
2.3.3 CL2 Ensure that the organization’s information stored on the devices
are encrypted.
2.3.4 CL 3 Continuously review and optimize the [Cybersecurity
Requirements for BYOD] within the organization.
SANS v6.1 - 15.9
NCA ECC - 2-6-1
NCA ECC - 2-6-2
References
NCA ECC - 2-6-3
NCA CSCC -2-6-3
NCA CSCC - 2-5-1
2.4.2 CL 1
Ensure that the [Acceptable Use of Information Assets] has
been implemented by the personnel in the organization (e.g.
prohibiting installation of unwanted software and application,
control access to web pages and prohibit access to malicious sites
or dangerous websites).
2.4.3 CL 3 Continuously review and optimize the requirements for the
[Acceptable Use of Information Assets].
ISO 27002 - 8.1.3
References NCA ECC - 2-1-3
NCA ECC - 2-1-4
2.5 Asset Maintenance
Controls
2.5.1 CL 2 Define [Requirements for Asset Maintenance] which
consider the following:
• Asset maintenance
• Tracking and monitoring
• Recovery plan
2.5.2 CL 2
Define and implement an {Asset Maintenance} process to
maintain and repair the organization's information assets
(including offsite assets) and keeping a log of these activities.
2.5.3 CL 2 As per the organization defined recovery plan, execute the asset
recovery during or after a security incident.
2.5.4 CL 2 Perform remote monitoring and tracking (e.g. using location
tracking technologies) of the information assets and ensure that
they are kept within the organization controlled areas.
2.5.5 CL 3 Continuously review and optimize the [Requirements for
Asset Maintenance] and the {Asset Maintenance} process.
NIST CSWP - PR.MA-1
NIST CSWP - PR.MA-2
References NIST CSWP - RC.RP-1
NIST.sp.800-53r4 – PE - 20
ISO 27002 - 11.2.4
2.6.2 CL 1
Define and implement an {Asset Disposal} process to handle
the disposal of the information assets based on the
[Requirements for Disposal of Assets]. Use appropriate
techniques (e.g. secure erase, drilling, shredding) when they are
no longer required (or when they are reused) in order to prevent
unauthorized disclosure or modification of information stored on
the assets.
2.6.3 CL 3 Continuously review and optimize the [Requirements for
Disposal of Assets] and the {Asset Disposal} process.
ISO 27002 - 8.3.2
SANS v7.0 - 1.6
References
SANS v7.0 - 2.6
NCA ECC 2-14-3-4
3.1.3 CL 2 Integrate the {Risk Assessment} process into the LSP risk
management and apply it at least for the following events:
3.2.2 CL 1
Define and implement a {Risk Treatment} process
describing how assessed risks are treated resulting in a [Risk
Treatment Plan].
3.2.3 CL 1 Define and implement a {Risk Monitoring} process
consisting of the defined risk monitoring plan, the monitoring
of the implementation of the risk treatment plan periodically,
the residual risks after, and the status of the accepted risks.
3.2.4 CL 2 Automate the risk treatment and monitoring activities through the
use of dedicated tools (e.g. GRC tool).
3.2.5 CL 3 Continuously review and optimize the [Requirements for
Cybersecurity Risk Treatment and Monitoring].
ISO 27005 - 9.3
NIST.sp.800-53r4 - PM-9
NIST CSWP - ID.RA
NIST CSWP - ID.SC
NCA ECC - 1.5.1
References
NCA ECC - 1.5.2
NCA ECC - 1.5.4
NCA CSCC -1-5-1
NCA CSCC -1-5-2
NCA CSCC -1-5-4
4.1 Cryptography
Controls
4.1.1 CL 1 Define [Requirements for Cryptography] which consider
the following:
4.6.2 CL 1 Activate event logging and record the event logs (e.g. user
activities, exceptions, information security events, privileged
operations) related to the information assets.
4.6.3 CL 1 Protect log information and logging facilities from unauthorized
access and tampering.
4.6.4 CL 1 Periodically review the event logs and report suspicious events
and detected anomalies to the responsible personnel [Incident
Management].
4.6.5 CL 1 Retain the logs for a defined time duration as specified in the
requirements (e.g. 12 months).
4.6.6 CL 2 Collect, monitor and, analyze events using a log management tool
(e.g. SIEM) that includes advanced detection and integration
capabilities.
4.6.7 CL 2 Real-time monitoring and review of the event logs of critical
information assets.
4.6.8 CL 2 Improve the event detection methods by the use of dedicated tools
(e.g. security intelligence tools). Update the rules of the log
management tools.
4.6.9 CL 3 Continuously review and optimize the [Requirements for
Logging and Monitoring] as well as the effectiveness of the
logging and monitoring.
References ISO 27002 - 12.4.1
4.7.3 CL 1 Control and restrict the allocation and use of privilege access
rights.
4.7.4 CL 1 Provide multi-factor authentication for access to sensitive and
critical information systems as well as for remote access.
4.7.5 CL 1 Enforce the defined password management (e.g. use of strong
passwords for authentication, regular password changes) and that
the user authentication information is secured against disclosure
4.10.2 CL 1 Use end-point protection software and ensure that this software
regularly updates its signature database. Implement measures to
prevent this software from being deactivated or altered by users.
4.10.3 CL 1 Implement appropriate security measures to block different
sources of malicious traffic (e.g. using internet filters, emails
filters to block phishing emails, restricting download of
dangerous content) [Email & Web-Based Protection].
4.10.4 CL 1 Implement protective measures to safeguard removable media
5.2.2 CL 1
Create and approve a [Physical Access Control List] of
individuals with authorized access to the organization's facilities
and issue appropriate authorization credentials.
5.2.3 CL 1 Define and implement {Physical Access Management}
process to grant and manage access (e.g. secure keys) to the
physical facilities.
5.2.4 CL 1 Establish physical entry controls for visitors (e.g. provide security
badges to the visitors and monitor unusual activity).
5.2.5 CL 2 Continuously review the [Physical Access Control List] of
individuals with authorized access to facilities and remove them
from the list when access is no longer required.
5.2.6 CL 2 Regularly review physical access logs for suspicious activity
[Logging and Monitoring].
5.2.7 CL 3 Continuously review and optimize the [Requirements for
Physical Access Management] as well as the effectiveness of the
controls used for handling the physical access management.
ISO 27002 - 11.1.2
NIST.sp.800-53r4 PE-2
NIST.sp.800-53r4 PE-3
References
NIST.sp.800-53r4 PE-6
NIST.sp.800-53r4 PE-8
NCA ECC - 2-14
6.1.5 Ensure the hosting and storage site of the organization's data is in
CL 1
the Kingdom of Saudi Arabia.
6.1.6 CL 2 Audit, review, and monitor the cloud service provider for
compliance with contractual obligations.
6.1.7 CL 3 Continuously review and optimize the [Requirements for
Cloud] as well as the procedures involved in selecting the cloud
services and the expected cybersecurity requirements.
ISO 27002 - 15.1
References
ISO 27002 - 15.2.1
6.2.5 Audit, review, and monitor the third party provider for
CL 2
compliance with contractual obligations.
6.2.6 CL 2 Ensure that third party personnel are screened when they are
contracted to work on critical systems.
6.2.7 CL 3 Continuously review and optimize the [Requirements for
Outsourcing Services] as well as the procedures involved in
selecting the third party service provider and the expected
cybersecurity requirements.
ISO 27002 - 15.1
ISO 27002 - 15.2.1
References
NIST CSWP - ID.SC-4
NIST CSWP - ID.SC-5
For the development of this Framework CITC has considered inputs from a
number of related cybersecurity standards, frameworks, regulations and similar
work done by other regulatory authorities. The following references were
considered during the development of the CRF:
• ITU-T X series
• SANS CIS Critical Security Controls Version 6.1 (2016) and 7 (2018)