guidance

Operational Technology Cybersecurity Controls Implementation Guide

Issuing bodyNCA
CountrySaudi Arabia
RegionNational
operational technologycybersecuritygovernance

This document, titled "Operational Technology Cybersecurity Controls Implementation Guide," provides guidance on implementing cybersecurity controls for Operational Technology (OT) environments. It outlines general guidelines and specific controls related to cybersecurity governance. The document is intended for public use and aims to improve OT cybersecurity posture.

Key requirements
  • Establish and maintain a cybersecurity governance framework for OT.
  • Implement specific cybersecurity controls across various OT domains and subdomains.
  • Adhere to general guidelines for OTCC implementation.
Applies to: Organizations operating and maintaining Operational Technology (OT) infrastructure in Saudi Arabia
View original document ↗Ask GCC LexAI about this →

More from NCA
Cloud Cybersecurity Controls (CCC-2: 2024)Cloud Cybersecurity Controls Implementation Guide for CSPsCloud Cybersecurity Controls Implementation Guide for CSTsCritical Systems Cybersecurity Controls (CSCC-1: 2019)Critical Systems Cybersecurity Controls Implementation GuidelinesData Cybersecurity Controls (DCC-1: 2022)
AI-generated summaries only. Arabic originals are legally binding. This is not legal advice. · ← All documents