guidance

Cloud Cybersecurity Controls Implementation Guide for CSTs

Issuing bodyNCA
CountrySaudi Arabia
RegionNational
Cloud SecurityCybersecurity GovernanceRisk ManagementAccess Management

This document, titled "Cloud Cybersecurity Controls Implementation Guide for CSTs (GCCC-CST)," provides guidance on implementing cloud cybersecurity controls for cloud service tenants in Saudi Arabia. It outlines objectives, scope, and applicability, covering various cybersecurity domains and their structure to ensure a secure cloud environment. The guide aims to help tenants understand and implement necessary security measures.

Key requirements
  • Implement cybersecurity roles and responsibilities.
  • Manage cybersecurity risks effectively.
  • Comply with cybersecurity standards, laws, and regulations.
  • Manage identity and access control.
  • Protect information systems and processing facilities.
Applies to: Cloud Service Tenants (CSTs) in Saudi Arabia
View original document ↗Ask GCC LexAI about this →

More from NCA
Cloud Cybersecurity Controls (CCC-2: 2024)Cloud Cybersecurity Controls Implementation Guide for CSPsCritical Systems Cybersecurity Controls (CSCC-1: 2019)Critical Systems Cybersecurity Controls Implementation GuidelinesData Cybersecurity Controls (DCC-1: 2022)Essential Cybersecurity Controls (ECC-2: 2024)
AI-generated summaries only. Arabic originals are legally binding. This is not legal advice. · ← All documents