Example: marketing

Cyber Security Framework Saudi Arabian Monetary …

Cyber Security Framework Saudi Arabian Monetary authority Version May 2017. Foreword In view of the ever-growing seriousness of Cyber -attacks, we are conscious of the need to stay one-step ahead. The issuance of a Cyber Security Framework ( Framework ) seeks to support our regulated entities in their efforts to have an appropriate Cyber Security governance and to build a robust infrastructure along with the necessary detective and preventive controls. The Framework articulates appropriate controls and provide guidance on how to assess maturity level. The adoption and implementation of the Framework is a vital step for ensuring that Saudi Arabian Banking, Insurance and Financing Companies sectors can manage and withstand Cyber Security threats.

Cyber Security Framework Saudi Arabian Monetary Authority Version 1.0 May 2017

Tags:

  Security, Framework, Saudi, Arabian, Monetary, Security framework saudi arabian monetary, Security framework saudi arabian monetary authority, Authority

Information

Domain:

Source:

Link to this page:

Please notify us if you found a problem with this document:

Other abuse

Transcription of Cyber Security Framework Saudi Arabian Monetary …

1 Cyber Security Framework Saudi Arabian Monetary authority Version May 2017. Foreword In view of the ever-growing seriousness of Cyber -attacks, we are conscious of the need to stay one-step ahead. The issuance of a Cyber Security Framework ( Framework ) seeks to support our regulated entities in their efforts to have an appropriate Cyber Security governance and to build a robust infrastructure along with the necessary detective and preventive controls. The Framework articulates appropriate controls and provide guidance on how to assess maturity level. The adoption and implementation of the Framework is a vital step for ensuring that Saudi Arabian Banking, Insurance and Financing Companies sectors can manage and withstand Cyber Security threats.

2 In designing the Framework , we have considered the ways that our regulated entities are leveraging technology and felt that each entity will be able to adopt a common approach for addressing Cyber Security . This will ensure Cyber Security risks are properly managed throughout the sectors To achieve the above, the full support and oversight from the Board of Directors and Senior Management are required for its implementation. The Information Technology Risk team within the Deputyship of Supervision is at your disposal for any clarifications and we remain committed to guiding our regulated entities in creating a safer Cyber environment. Ahmed Al Sheikh Deputy Governor for Supervision Version Page 2 of 56.

3 Contents 1 Introduction .. 5. Introduction to the Framework .. 5. Definition of Cyber Security .. 5. Scope .. 6. 6. Responsibilities .. 7. 7. Target Audience .. 7. Review, Updates and Maintenance .. 7. Reading Guide .. 7. 2 Framework Structure and Features .. 8. Structure .. 8. 9. Self-Assessment, Review and Audit .. 9. Cyber Security Maturity 10. Maturity Level 3 .. 10. Maturity Level 4 .. 11. Maturity Level 5 .. 12. 3 Control domains .. 13. Cyber Security Leadership and Governance .. 13. Cyber Security Governance .. 13. Cyber Security Strategy .. 14. Cyber Security Policy .. 14. Cyber Security Roles and 15. Cyber Security in Project Management .. 17. Cyber Security 17.

4 Cyber Security Training .. 18. Cyber Security Risk Management and Compliance .. 19. Cyber Security Risk Management .. 19. Regulatory Compliance .. 22. Compliance with (inter)national industry standards .. 22. Cyber Security 22. Version Page 3 of 56. Cyber Security Audits .. 23. Cyber Security Operations and Technology .. 24. Human Resources .. 24. Physical 24. Asset Management .. 25. Cyber Security Architecture .. 25. Identity and Access 26. Application Security .. 27. Change Management .. 27. Infrastructure Security .. 28. 29. Bring Your Own Device (BYOD) .. 30. Secure Disposal of Information Assets .. 30. Payment Systems .. 31. Electronic Banking Services.

5 31. Cyber Security Event Management .. 33. Cyber Security Incident Management .. 33. Threat Management .. 34. Vulnerability Management .. 35. Third Party Cyber Security .. 36. Contract and Vendor Management .. 36. Outsourcing .. 37. Cloud Computing .. 37. Appendices .. 39. Appendix A - Overview previous issued SAMA circulars .. 40. Appendix B - How to request an Update to the Framework .. 41. Appendix C Framework Update request form .. 42. Appendix D - How to request a Waiver from the Framework .. 43. Appendix E Framework Waiver request form .. 44. Appendix F - 45. Version Page 4 of 56. 1 Introduction Introduction to the Framework The current digital society has high expectations of flawless customer experience, continuous availability of services and effective protection of sensitive data.

6 Information assets and online services are now strategically important to all public and private organizations, as well as to broader society. These services are vital to the creation of a vibrant digital economy. They are also becoming systemically important to the economy and to broader national Security . All of which underlines the need to safeguard sensitive data and transactions, and thereby ensure confidence in the overall Saudi Financial Sector. The stakes are high when it comes to the confidentiality, integrity and availability of information assets, and applying new online services and new developments ( Fintech, block chain); while improving resilience against Cyber threats.

7 Not only is the dependency on these services growing, but the threat landscape is rapidly changing. The Financial Sector recognizes the rate at which the Cyber threats and risks are evolving, as well as the changing technology and business landscape. SAMA established a Cyber Security Framework ( the Framework ) to enable Financial Institutions regulated by SAMA ( the Member Organizations ) to effectively identify and address risks related to Cyber Security . To maintain the protection of information assets and online services, the Member Organizations must adopt the Framework . The objective of the Framework is as follows: 1. To create a common approach for addressing Cyber Security within the Member Organizations.

8 2. To achieve an appropriate maturity level of Cyber Security controls within the Member Organizations. 3. To ensure Cyber Security risks are properly managed throughout the Member Organizations. The Framework will be used to periodically assess the maturity level and evaluate the effectiveness of the Cyber Security controls at Member Organizations, and to compare these with other Member Organizations. The Framework is based on the SAMA requirements and industry Cyber Security standards, such as NIST, ISF, ISO, BASEL and PCI. The Framework supersedes all previous issued SAMA circulars with regard to Cyber Security . Please refer to Appendix A Overview previous issued SAMA circulars' for more details.

9 Definition of Cyber Security Cyber Security is defined as the collection of tools, policies, Security concepts, Security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance, and technologies that can be used to protect the member organization's information assets against internal and external threats. The general Security objectives comprise the following: Confidentiality Information assets are accessible only to those authorized to have access ( , protected from unauthorized disclosure or (un)intended leakage of sensitive data). Version Page 5 of 56. Integrity Information assets are accurate, complete and processed correctly ( , protected from unauthorized modification, which may include authenticity and non-repudiation).

10 Availability Information assets are resilient and accessible when required ( , protected from unauthorized disruption). Scope The Framework defines principles and objectives for initiating, implementing, maintaining, monitoring and improving Cyber Security controls in Member Organizations. The Framework provides Cyber Security controls which are applicable to the information assets of the Member Organization, including: Electronic information. Physical information (hardcopy). Applications, software, electronic services and databases. Computers and electronic machines ( , ATM). Information storage devices ( , hard disk, USB stick). Premises, equipment and communication networks (technical infrastructure).


Related search queries