content stringlengths 26 2.54k | metadata dict |
|---|---|
Guide to Essential Cybersecurity
Controls (ECC) Implementation
(GECC – 1: 2023)
TLP: White
Document Classification: Public | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 0,
"page_label": "1",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
2 Document Classification: Public TLP: White | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 1,
"page_label": "2",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
3 Document Classification: Public TLP: White
Disclaimer: This Guide has been developed by the National Cybersecurity Authority (NCA)
to enable organization to implement the Essential Cybersecurity Controls (ECC).
Organizations must not rely so... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 2,
"page_label": "3",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
4 Document Classification: Public TLP: White
In the Name of Allah,
The Most Gracious,
The Most Merciful | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 3,
"page_label": "4",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
5 Document Classification: Public TLP: White
Traffic Light Protocol (TLP):
This marking protocol is widely used around the world. It has four colors (traffic lights):
Red – Personal, Confidential, and for the Intended Recipient
Only
The reci... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 4,
"page_label": "5",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
6 Document Classification: Public TLP: White
Table of Contents
Introduction ................................................................................................................................................................7
Objective .... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 5,
"page_label": "6",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
7 Document Classification: Public TLP: White
Introduction
The National Cybersecurity Authority (referred to in this document as
developed this guide for implementing the Essential Cybersecurity Controls (ECC
1: 2018),
to aid national organi... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 6,
"page_label": "7",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
1-1 استراتيجية الأمن السيبراني
Cybersecurity Strategy | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
1-2 إدارة الأمن السيبراني
Cybersecurity Management | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
1-3 سياسات وإجراءات الأمن السيبراني
Cybersecurity Policies and Procedures | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
1-4 أدوار ومسؤوليات الأمن السيبراني
Cybersecurity Roles and
Responsibilities | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
1-5 إدارة مخاطر الأمن السيبراني
Cybersecurity Risk Management | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
1-6
الأمن السيبراني ضمن إدارة المشاريع
المعلوماتية والتقنية
Cybersecurity in Information
Technology Projects | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
1-7 الالتزام بتشريعات وتنظيمات ومعايير الأمن
السيبراني
Cybersecurity Regulatory Compliance | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
1-8 المراجعة والتدقيق الدوري للأمن السيبراني
Periodical Cybersecurity Review and
Audit | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
1-9 الأمن السيبراني المتعلق بالموارد البشرية
Cybersecurity in Human Resources | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
1-10 برنامج التوعية والتدريب بالأمن السيبراني
Cybersecurity Awareness and Training
Program
2 تعزيز الأمن السيبراني
Cybersecurity Defense | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
2-1 إدارة الأصول
Asset Management | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
2-2 إدارة هويات الدخول والصلاحيات
Identity and Access Management | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
2-3 حماية الأنظمة وأجهزة معالجة المعلومات
Information System and Processing
Facilities Protection | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
2-4 حماية البريد الإلكتروني
Email Protection | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
2-5 إدارة أمن الشبكات
Networks Security Management | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
2-6 أمن الأجهزة المحمولة
Mobile Devices Security | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
2-7 حماية البيانات والمعلومات
Data and Information Protection | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
2-8 التشفير
Cryptography | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
2-9 إدارة النسخ الاحتياطية
Backup and Recovery Management | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
2-10 إدارة الثغرات
Vulnerability Management | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
2-11 اختبار الاختراق
Penetration Testing | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
2-12 إدارة سجلات الأحداث ومراقبة الأمن السيبراني
Cybersecurity Event Logs and
Monitoring Management | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
2-13 إدارة حوادث وتهديدات الأمن السيبراني
Cybersecurity Incident and Threat
management | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
2-14 الأمن المادي
Physical Security | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
2-15 حماية تطبيقات الويب
Web Application Security
3 صمود الأمن السيبراني
Cybersecurity Resilience | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
3-1 جوانب صمود الأمن السيبراني في إدارة استمرارية الأعمال
Cybersecurity Resilience Aspects of Business Continuity Management (BCM)
4
الأمن السيبراني المتعلق
بالأطراف الخارجية والحوسبة
السحابية
Third-Party and Cloud
Computing Cybersecurity | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
4-1 الأمن السيبراني المتعلق بالأطراف الخارجية
Third-Party Cybersecurity | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
4-2
الأمن السيبراني المتعلق بالحوسبة السحابية
والاستضافة
Cloud Computing and Hosting
Cybersecurity
5 الأمن السيبراني لأنظمة التحكم
الصناعي
ICS Cybersecurity | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
5-1 حماية أجهزة وأنظمة التحكم الصناعي
Industrial Control Systems (ICS) Protection
FIGURE 1: ECC DOMAINS AND SUBDOMAINS | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 7,
"page_label": "8",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
9 Document Classification: Public TLP: White
Guide Structure
Name of Main Domain Reference number of the Main Domain
Reference No. of the Subdomain Name of Subdomain
Objective
Controls
Control Reference No. Control Clauses
Relevan... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 8,
"page_label": "9",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
1-1 Cybersecurity Strategy
Objective To ensure that cybersecurity plans, goals, initiatives and projects are contributing to
compliance with related laws and regulations.
Controls
1-1-1 A cybersecurity strategy must be defined, documented and approved. It must be
supported by the head of the organization or his/... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 9,
"page_label": "10",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
11 Document Classification: Public TLP: White
• The cybersecurity strategy document approved by the organization
(electronic copy or official hard copy).
• Initiatives and projects included in the cybersecurity strategy of the
organization.
... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 10,
"page_label": "11",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
1-2 Cybersecurity Management
Objective
cybersecurity programs within the organization as per related laws and regulations
Controls
1-2-1 A dedicated cybersecurity function (e.g., division, department) must be established
within the organization. This function must be independent from the Information
Technology... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 11,
"page_label": "12",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
13 Document Classification: Public TLP: White
Control implementation guidelines:
• Establish a cybersecurity function within the organization to enable it to carry
out its cybersecurity tasks as required, taking into account the following
poin... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 12,
"page_label": "13",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
14 Document Classification: Public TLP: White
activities, and providing insights to the organiz ation's leadership
regarding effective cybersecurity risk management methods for the
organization.
o Supervisory positions within the cybersecurity func... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 13,
"page_label": "14",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
15 Document Classification: Public TLP: White
contractual type, position titles, job roles, years of experience, academic and
professional qualifications.
• Job descriptions of the head of the cybersecurity and the supervisory and
critical pos... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 14,
"page_label": "15",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
1-3 Cybersecurity Policies and Procedures
Objective
To ensure that cybersecurity requirements are documented, communicated and
complied with by the organization as per related laws and regulations, and
organizational requirements.
Controls
1-3-1 Cybersecurity policies and procedures must be defined and documen... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 15,
"page_label": "16",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
17 Document Classification: Public TLP: White
• Ensure the communication of policies and procedures to the organization's
personnel and internal and external stakeholders. Such communication must
be done through the approved comm unication chan... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 16,
"page_label": "17",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
18 Document Classification: Public TLP: White
• A report that outlines the review of the implementation of cybersecurity
policies and procedures
1-3-3 The cybersecurity policies and procedures must be supported by technical security
standards (e... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 17,
"page_label": "18",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
1-4 Cybersecurity Roles and Responsibilities
Objective To ensure that roles and responsibilities are defined for all parties participating in
implementing the cybersecurity controls within the organization.
Controls
1-4-1 Cybersecurity organizational structure and related roles and responsibilities must be
defin... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 18,
"page_label": "19",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
20 Document Classification: Public TLP: White
o Roles and responsibilities related to the head of the cybersecurity
function
o Roles and responsibilities related to t he cybersecurity function ( e.g.,
develop and update cybersecurity policies and... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 19,
"page_label": "20",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
1-5 Cybersecurity Risk Management
Objective
To ensure managing cybersecurity risks in a methodological approach in order to
protect the
policies and procedures, and related laws and regulations.
Controls
1-5-1 Cybersecurity risk management methodology and procedures must be defined,
documented and approved as ... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 20,
"page_label": "21",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
22 Document Classification: Public TLP: White
- Risk assessment, so that the likelihood and impact of the
identified risks are defined
- Risk response, where cyber risk treatment methods are
identified
- Risk monitoring, so that the risk regis... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 21,
"page_label": "22",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
23 Document Classification: Public TLP: White
• Define and document the requirements of this ECC in the cybersecurity
requirements document and approve them by the representative
• Include cybersecurity requirements within the first phase of ... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 22,
"page_label": "23",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
24 Document Classification: Public TLP: White
• A report that outlines the identification, assessment, and remediation of the
cybersecurity risks of material changes to the production environment of the
organization's information and technology asse... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 23,
"page_label": "24",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
25 Document Classification: Public TLP: White
identification of information and technology assets in technology projects,
potential exposure to threats, and relevant vulnerabilities.
• Remediate all cybersecurity risks in accordance with the ap... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 24,
"page_label": "25",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
1-6 Cybersecurity in Information and Technology Project Management
Objective
To ensure that cybersecurity requirements are included in project management
methodology and procedures in order to protect the confidentiality, integrity and
availability of information and technology assets as per organization policies ... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 25,
"page_label": "26",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
27 Document Classification: Public TLP: White
1-6-2 The cybersecurity requirements in project and assets (information/technology)
change management must include at least the following:
1-6-2-1 Vulnerability assessment and remediation
Contr... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 26,
"page_label": "27",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
28 Document Classification: Public TLP: White
• Define systems, services, and technology components subject to Secure
Configuration and Hardening review within the scope of technical projects
and change requests
• Provide technical Security Stand... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 27,
"page_label": "28",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
29 Document Classification: Public TLP: White
and external threats in the organization to minimize cyber risks and focus on
key security objectives namely; confidentiality, integrity, and availability
• Communicate Secure Coding Standard cont... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 28,
"page_label": "29",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
30 Document Classification: Public TLP: White
cybersecurity controls are applied to the development of secure coding
standard controls and detect weaknesses, vulnerabilities, and issues in
software
• Access Management requirements for users and ... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 29,
"page_label": "30",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
31 Document Classification: Public TLP: White
o Secure Configuration and Hardening of i nformation and technology
assets and applications must be reviewed periodically and their
implementation according to the approved technical security standa... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 30,
"page_label": "31",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
1-7 Compliance with Cybersecurity Standard controls, Laws and Regulations
Objective To ensure
laws and regulations.
Controls
1-7-1 The organization must comply with related national cybersecurity laws and
regulations.
Relevant cybersecurity tools
• Compliance with Cybersecurity Standard controls, Laws and Re... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 31,
"page_label": "32",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
1-8 Periodical Cybersecurity Review and Audit | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 32,
"page_label": "33",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
34 Document Classification: Public TLP: White
Objective
To ensure that cybersecurity controls are implemented and in compliance with
organizational policies and procedures, as well as related national and international
laws, regulations and agreeme... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 33,
"page_label": "34",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
35 Document Classification: Public TLP: White
interest, as per the Generally Accepted Auditing Standard controls (GAAS), and
related laws and regulations.
Relevant cybersecurity tools
• Cybersecurity Review and Audit Template.
• Cybersecur... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 34,
"page_label": "35",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
1-9 Cybersecurity in Human Resources
Objective
To ensure that cybersecurity risks and requirements related to personnel (employees
and contractors) are managed efficiently prior to employment, during employment
and after termination/separation as per organizational policies and procedures, and
related laws and r... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 35,
"page_label": "36",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
37 Document Classification: Public TLP: White
• Define and document personnel cybersecurity requirements in the
cybersecurity requirements document and approved by the representativ e
Requirements include, but are not limited to
o Include cyb... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 36,
"page_label": "37",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
38 Document Classification: Public TLP: White
• Screening or vetting requests for the personnel of cybersecurity functions and
technical functions with privileged access
1-9-3 The personnel cybersecurity requirements prior to employment must incl... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 37,
"page_label": "38",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
39 Document Classification: Public TLP: White
• Work with relevant departments to ensure the Screening or Vetting of all
employees working in technical functions with privileged access, including
database management personnel, firewall manageme... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 38,
"page_label": "39",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
40 Document Classification: Public TLP: White
• Documents that confirm the provision of awareness content to employees in
cybersecurity before work at the organization and providing them with access
through e-mails, workshops, or any other means, in... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 39,
"page_label": "40",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
1-10 Cybersecurity Awareness and Training Program
Objective
To ensure that personnel are aware of their cybersecurity responsibilities and have
the essential cybersecurity awareness. It is also to ensure that personnel are provided
with the required cybersecurity training, skills and credentials needed to accompli... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 40,
"page_label": "41",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
42 Document Classification: Public TLP: White
technology assets.
Controls
1-10-1 A cybersecurity awareness program must be developed and approved. The program
must be conducted periodically through multiple channels to strengthen the
awareness ab... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 41,
"page_label": "42",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
43 Document Classification: Public TLP: White
• Implement the approved cybersecurity awareness and training program in
coordination with the cybersecurity awareness and training department,
which may include the following
o Implement the app... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 42,
"page_label": "43",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
44 Document Classification: Public TLP: White
• Provide cybersecurity awareness programs to cover the safe handling of
mobile devices and storage media
Expected deliverables
• A document (such as approved policy or procedure) indicating the
id... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 43,
"page_label": "44",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
45 Document Classification: Public TLP: White
• A document (such as approved policy or procedure) indicating the
identification and documentation of the requirements related to this control
• Action plan to implement the cybersecurity awarene... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 44,
"page_label": "45",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
46 Document Classification: Public TLP: White
• Define and document the requirements of this ECC in the cybersecurity
requirements document and approve them by the representative
• Develop and implement an approved training plan in the field of se... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 45,
"page_label": "46",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
47 Document Classification: Public TLP: White
o Awareness of the importance of cybersecurity, developing the
cybersecurity culture and the key risks and threats, such as phishing
emails for supervisory and executive positions (Whale phishing) m... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 46,
"page_label": "47",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
48 Document Classification: Public TLP: White
• Results of cybersecurity awareness program implementation review in the
organization
• A document that defines the cybersecurity awareness and training
implementation review cycle (Compliance Assess... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 47,
"page_label": "48",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
2-1 Asset Management
Objective
To ensure that the organization has an accurate and detailed inventory of information
operational requirements to maintain the confidentiality, integrity and availability of
information and technology assets.
Controls
2-1-1
Cybersecurity requirements for managing information an... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 48,
"page_label": "49",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
50 Document Classification: Public TLP: White
• Information asset management cybersecurity requirements (in form of policy
or standard) approved by the organization (e.g., electronic copy or official hard
copy)
• Formal approval by the head of th... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 49,
"page_label": "50",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
51 Document Classification: Public TLP: White
2-1-3 Acceptable use policy of information and technology assets must be defined,
documented and approved.
Relevant cybersecurity tools
• Asset Acceptable Use Policy Template.
Control implemen... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 50,
"page_label": "51",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
52 Document Classification: Public TLP: White
• Cybersecurity policy for the acceptable use policy of the information and
technology assets of the organization must be implemented, including the
following
o Requirements for the acceptable use of ... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 51,
"page_label": "52",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
53 Document Classification: Public TLP: White
o Peripherals (e.g., printers)
o Operating systems (if any)
• Document all information and technology assets in a single register with
characteristics such as (asset name, description, owner and c... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 52,
"page_label": "53",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
2-2 Identity and Access Management | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 53,
"page_label": "54",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
55 Document Classification: Public TLP: White
Objective
To ensure the secure and restricted logical access to information and technology assets
in order to prevent unauthorized access and allow only authorized access for users
which are necess... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 54,
"page_label": "55",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
56 Document Classification: Public TLP: White
Control implementation guidelines:
• All cybersecurity requirements must be implemented for the organization's
approved identity and access management procedures. It is also recommended
that the identit... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 55,
"page_label": "56",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
57 Document Classification: Public TLP: White
• Prepare password standard co ntrols taking into consideration best practices,
including but not limited to
o Expiration Period
o Complexity
o Lockout
o Activation
o Password History
o A sec... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 56,
"page_label": "57",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
58 Document Classification: Public TLP: White
o Something you have, e.g., using One time password through SMS or
applications
o Something you are, e.g., using biometrics such as fingerprint or face
recognition
Expected deliverables
• Cybers... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 57,
"page_label": "58",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
59 Document Classification: Public TLP: White
o Time required for authorization
o Approvals required (e.g., Line Manager approval)
Expected deliverables
• Cybersecurity policy that covers Identity and Access Management ( e.g.,
electronic co... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 58,
"page_label": "59",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
60 Document Classification: Public TLP: White
• Define modern and advanced technologies and mechanisms for the Privileged
Access Management
• Grant privileged access based on functional duties after obtaining the necessary
approvals, taking into ... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 59,
"page_label": "60",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
61 Document Classification: Public TLP: White
o Expiry of the access period
Expected deliverables
• Privileged Access Management Policy in the organization (e.g., electronic copy
or official hard copy)
• Formal approval by the head of the... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 60,
"page_label": "61",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
2-3 Information System and Information Processing Facilities Protection
Objective To ensure the protection of information systems and information processing facilities
(including workstations and infrastructures) against cyber risks.
Controls
2-3-1 Cybersecurity requirements for protecting information systems and... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 61,
"page_label": "62",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
63 Document Classification: Public TLP: White
o Secure copies of the operating systems used in the organization must be
built and prepared in a secure manner, protection programs must be
installed, and unused services must be disabled. Such cop... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 62,
"page_label": "63",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
64 Document Classification: Public TLP: White
o Use of external storage media and its security must be restricted
o Patches throughout the organization's devices, systems, and applications
must be implemented
o Central Clock Synchronization and... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 63,
"page_label": "64",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
65 Document Classification: Public TLP: White
o Review the protection system periodically to ensure that the scope of the
protection system is comprehensive for all workstations, systems, and
servers of the organization through the protection s... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 64,
"page_label": "65",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
66 Document Classification: Public TLP: White
approvals via e -mail, paper, or through an internal system). Such
procedures include
- Reason for requesting approval for use
- Use start and end date.
- Mechanism for handling data stored in sto... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 65,
"page_label": "66",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
67 Document Classification: Public TLP: White
o Patches procedures must be included in change management
methodology or change ma nagement must be included into patch
management policy.
o Change management approval must be included as part of ... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 66,
"page_label": "67",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
68 Document Classification: Public TLP: White
• Define and document the requirements of this ECC in the cybersecurity
requirements document and approve them by the representative.
• Perform time synchronization through the organization's central ser... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 67,
"page_label": "68",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
2-4 Email Protection
Objective
Controls
2-4-1 Cybersecurity requirements for protecting email service must be defined, documented
and approved.
Relevant cybersecurity tools:
• Email Security Policy Template.
Control implementation guidelines
• Develop and document cybersecurity policy for email protection ... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 68,
"page_label": "69",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
70 Document Classification: Public TLP: White
• Formal approval by the head of the organization or his/her deputy on the policy
(e.g., via the organization's official e-mail, paper or electronic signature).
2-4-2 The cybersecurity requirements for ... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 69,
"page_label": "70",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
71 Document Classification: Public TLP: White
2-4-3-1 Analyzing and filtering email messages (specifically phishing emails and
spam) using advanced and up-to-date email protection techniques.
Control implementation guidelines
• Define and doc... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 70,
"page_label": "71",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
Guide to Essential Cybersecurity
Controls (ECC) Implementation
72 Document Classification: Public TLP: White
o Mobile device management applications must be used to allow users'
devices (as another element of access) to email for protocols (such as
EWS, outlook anywhere protocols) that do not support text messa... | {
"creationdate": "2023-10-22T08:42:54+03:00",
"creator": "Microsoft® Word LTSC",
"moddate": "2023-10-22T08:42:54+03:00",
"page": 71,
"page_label": "72",
"producer": "Microsoft® Word LTSC",
"source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf",
"total_pages": 180
} |
End of preview. Expand in Data Studio
README.md exists but content is empty.
- Downloads last month
- 20