Dataset Viewer
Auto-converted to Parquet Duplicate
content
stringlengths
26
2.54k
metadata
dict
Guide to Essential Cybersecurity Controls (ECC) Implementation (GECC – 1: 2023) TLP: White Document Classification: Public
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 0, "page_label": "1", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 2 Document Classification: Public TLP: White
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 1, "page_label": "2", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 3 Document Classification: Public TLP: White Disclaimer: This Guide has been developed by the National Cybersecurity Authority (NCA) to enable organization to implement the Essential Cybersecurity Controls (ECC). Organizations must not rely so...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 2, "page_label": "3", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 4 Document Classification: Public TLP: White In the Name of Allah, The Most Gracious, The Most Merciful
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 3, "page_label": "4", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 5 Document Classification: Public TLP: White Traffic Light Protocol (TLP): This marking protocol is widely used around the world. It has four colors (traffic lights): Red – Personal, Confidential, and for the Intended Recipient Only The reci...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 4, "page_label": "5", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 6 Document Classification: Public TLP: White Table of Contents Introduction ................................................................................................................................................................7 Objective ....
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 5, "page_label": "6", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 7 Document Classification: Public TLP: White Introduction The National Cybersecurity Authority (referred to in this document as developed this guide for implementing the Essential Cybersecurity Controls (ECC 1: 2018), to aid national organi...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 6, "page_label": "7", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
1-1 استراتيجية الأمن السيبراني Cybersecurity Strategy
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
1-2 إدارة الأمن السيبراني Cybersecurity Management
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
1-3 سياسات وإجراءات الأمن السيبراني Cybersecurity Policies and Procedures
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
1-4 أدوار ومسؤوليات الأمن السيبراني Cybersecurity Roles and Responsibilities
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
1-5 إدارة مخاطر الأمن السيبراني Cybersecurity Risk Management
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
1-6 الأمن السيبراني ضمن إدارة المشاريع المعلوماتية والتقنية Cybersecurity in Information Technology Projects
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
1-7 الالتزام بتشريعات وتنظيمات ومعايير الأمن السيبراني Cybersecurity Regulatory Compliance
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
1-8 المراجعة والتدقيق الدوري للأمن السيبراني Periodical Cybersecurity Review and Audit
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
1-9 الأمن السيبراني المتعلق بالموارد البشرية Cybersecurity in Human Resources
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
1-10 برنامج التوعية والتدريب بالأمن السيبراني Cybersecurity Awareness and Training Program 2 تعزيز الأمن السيبراني Cybersecurity Defense
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
2-1 إدارة الأصول Asset Management
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
2-2 إدارة هويات الدخول والصلاحيات Identity and Access Management
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
2-3 حماية الأنظمة وأجهزة معالجة المعلومات Information System and Processing Facilities Protection
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
2-4 حماية البريد الإلكتروني Email Protection
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
2-5 إدارة أمن الشبكات Networks Security Management
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
2-6 أمن الأجهزة المحمولة Mobile Devices Security
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
2-7 حماية البيانات والمعلومات Data and Information Protection
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
2-8 التشفير Cryptography
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
2-9 إدارة النسخ الاحتياطية Backup and Recovery Management
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
2-10 إدارة الثغرات Vulnerability Management
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
2-11 اختبار الاختراق Penetration Testing
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
2-12 إدارة سجلات الأحداث ومراقبة الأمن السيبراني Cybersecurity Event Logs and Monitoring Management
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
2-13 إدارة حوادث وتهديدات الأمن السيبراني Cybersecurity Incident and Threat management
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
2-14 الأمن المادي Physical Security
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
2-15 حماية تطبيقات الويب Web Application Security 3 صمود الأمن السيبراني Cybersecurity Resilience
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
3-1 جوانب صمود الأمن السيبراني في إدارة استمرارية الأعمال Cybersecurity Resilience Aspects of Business Continuity Management (BCM) 4 الأمن السيبراني المتعلق بالأطراف الخارجية والحوسبة السحابية Third-Party and Cloud Computing Cybersecurity
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
4-1 الأمن السيبراني المتعلق بالأطراف الخارجية Third-Party Cybersecurity
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
4-2 الأمن السيبراني المتعلق بالحوسبة السحابية والاستضافة Cloud Computing and Hosting Cybersecurity 5 الأمن السيبراني لأنظمة التحكم الصناعي ICS Cybersecurity
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
5-1 حماية أجهزة وأنظمة التحكم الصناعي Industrial Control Systems (ICS) Protection FIGURE 1: ECC DOMAINS AND SUBDOMAINS
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 7, "page_label": "8", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 9 Document Classification: Public TLP: White Guide Structure Name of Main Domain Reference number of the Main Domain Reference No. of the Subdomain Name of Subdomain Objective Controls Control Reference No. Control Clauses Relevan...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 8, "page_label": "9", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
1-1 Cybersecurity Strategy Objective To ensure that cybersecurity plans, goals, initiatives and projects are contributing to compliance with related laws and regulations. Controls 1-1-1 A cybersecurity strategy must be defined, documented and approved. It must be supported by the head of the organization or his/...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 9, "page_label": "10", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 11 Document Classification: Public TLP: White • The cybersecurity strategy document approved by the organization (electronic copy or official hard copy). • Initiatives and projects included in the cybersecurity strategy of the organization. ...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 10, "page_label": "11", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
1-2 Cybersecurity Management Objective cybersecurity programs within the organization as per related laws and regulations Controls 1-2-1 A dedicated cybersecurity function (e.g., division, department) must be established within the organization. This function must be independent from the Information Technology...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 11, "page_label": "12", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 13 Document Classification: Public TLP: White Control implementation guidelines: • Establish a cybersecurity function within the organization to enable it to carry out its cybersecurity tasks as required, taking into account the following poin...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 12, "page_label": "13", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 14 Document Classification: Public TLP: White activities, and providing insights to the organiz ation's leadership regarding effective cybersecurity risk management methods for the organization. o Supervisory positions within the cybersecurity func...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 13, "page_label": "14", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 15 Document Classification: Public TLP: White contractual type, position titles, job roles, years of experience, academic and professional qualifications. • Job descriptions of the head of the cybersecurity and the supervisory and critical pos...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 14, "page_label": "15", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
1-3 Cybersecurity Policies and Procedures Objective To ensure that cybersecurity requirements are documented, communicated and complied with by the organization as per related laws and regulations, and organizational requirements. Controls 1-3-1 Cybersecurity policies and procedures must be defined and documen...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 15, "page_label": "16", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 17 Document Classification: Public TLP: White • Ensure the communication of policies and procedures to the organization's personnel and internal and external stakeholders. Such communication must be done through the approved comm unication chan...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 16, "page_label": "17", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 18 Document Classification: Public TLP: White • A report that outlines the review of the implementation of cybersecurity policies and procedures 1-3-3 The cybersecurity policies and procedures must be supported by technical security standards (e...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 17, "page_label": "18", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
1-4 Cybersecurity Roles and Responsibilities Objective To ensure that roles and responsibilities are defined for all parties participating in implementing the cybersecurity controls within the organization. Controls 1-4-1 Cybersecurity organizational structure and related roles and responsibilities must be defin...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 18, "page_label": "19", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 20 Document Classification: Public TLP: White o Roles and responsibilities related to the head of the cybersecurity function o Roles and responsibilities related to t he cybersecurity function ( e.g., develop and update cybersecurity policies and...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 19, "page_label": "20", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
1-5 Cybersecurity Risk Management Objective To ensure managing cybersecurity risks in a methodological approach in order to protect the policies and procedures, and related laws and regulations. Controls 1-5-1 Cybersecurity risk management methodology and procedures must be defined, documented and approved as ...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 20, "page_label": "21", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 22 Document Classification: Public TLP: White - Risk assessment, so that the likelihood and impact of the identified risks are defined - Risk response, where cyber risk treatment methods are identified - Risk monitoring, so that the risk regis...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 21, "page_label": "22", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 23 Document Classification: Public TLP: White • Define and document the requirements of this ECC in the cybersecurity requirements document and approve them by the representative • Include cybersecurity requirements within the first phase of ...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 22, "page_label": "23", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 24 Document Classification: Public TLP: White • A report that outlines the identification, assessment, and remediation of the cybersecurity risks of material changes to the production environment of the organization's information and technology asse...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 23, "page_label": "24", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 25 Document Classification: Public TLP: White identification of information and technology assets in technology projects, potential exposure to threats, and relevant vulnerabilities. • Remediate all cybersecurity risks in accordance with the ap...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 24, "page_label": "25", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
1-6 Cybersecurity in Information and Technology Project Management Objective To ensure that cybersecurity requirements are included in project management methodology and procedures in order to protect the confidentiality, integrity and availability of information and technology assets as per organization policies ...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 25, "page_label": "26", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 27 Document Classification: Public TLP: White 1-6-2 The cybersecurity requirements in project and assets (information/technology) change management must include at least the following: 1-6-2-1 Vulnerability assessment and remediation Contr...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 26, "page_label": "27", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 28 Document Classification: Public TLP: White • Define systems, services, and technology components subject to Secure Configuration and Hardening review within the scope of technical projects and change requests • Provide technical Security Stand...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 27, "page_label": "28", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 29 Document Classification: Public TLP: White and external threats in the organization to minimize cyber risks and focus on key security objectives namely; confidentiality, integrity, and availability • Communicate Secure Coding Standard cont...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 28, "page_label": "29", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 30 Document Classification: Public TLP: White cybersecurity controls are applied to the development of secure coding standard controls and detect weaknesses, vulnerabilities, and issues in software • Access Management requirements for users and ...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 29, "page_label": "30", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 31 Document Classification: Public TLP: White o Secure Configuration and Hardening of i nformation and technology assets and applications must be reviewed periodically and their implementation according to the approved technical security standa...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 30, "page_label": "31", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
1-7 Compliance with Cybersecurity Standard controls, Laws and Regulations Objective To ensure laws and regulations. Controls 1-7-1 The organization must comply with related national cybersecurity laws and regulations. Relevant cybersecurity tools • Compliance with Cybersecurity Standard controls, Laws and Re...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 31, "page_label": "32", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
1-8 Periodical Cybersecurity Review and Audit
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 32, "page_label": "33", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 34 Document Classification: Public TLP: White Objective To ensure that cybersecurity controls are implemented and in compliance with organizational policies and procedures, as well as related national and international laws, regulations and agreeme...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 33, "page_label": "34", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 35 Document Classification: Public TLP: White interest, as per the Generally Accepted Auditing Standard controls (GAAS), and related laws and regulations. Relevant cybersecurity tools • Cybersecurity Review and Audit Template. • Cybersecur...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 34, "page_label": "35", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
1-9 Cybersecurity in Human Resources Objective To ensure that cybersecurity risks and requirements related to personnel (employees and contractors) are managed efficiently prior to employment, during employment and after termination/separation as per organizational policies and procedures, and related laws and r...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 35, "page_label": "36", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 37 Document Classification: Public TLP: White • Define and document personnel cybersecurity requirements in the cybersecurity requirements document and approved by the representativ e Requirements include, but are not limited to o Include cyb...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 36, "page_label": "37", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 38 Document Classification: Public TLP: White • Screening or vetting requests for the personnel of cybersecurity functions and technical functions with privileged access 1-9-3 The personnel cybersecurity requirements prior to employment must incl...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 37, "page_label": "38", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 39 Document Classification: Public TLP: White • Work with relevant departments to ensure the Screening or Vetting of all employees working in technical functions with privileged access, including database management personnel, firewall manageme...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 38, "page_label": "39", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 40 Document Classification: Public TLP: White • Documents that confirm the provision of awareness content to employees in cybersecurity before work at the organization and providing them with access through e-mails, workshops, or any other means, in...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 39, "page_label": "40", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
1-10 Cybersecurity Awareness and Training Program Objective To ensure that personnel are aware of their cybersecurity responsibilities and have the essential cybersecurity awareness. It is also to ensure that personnel are provided with the required cybersecurity training, skills and credentials needed to accompli...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 40, "page_label": "41", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 42 Document Classification: Public TLP: White technology assets. Controls 1-10-1 A cybersecurity awareness program must be developed and approved. The program must be conducted periodically through multiple channels to strengthen the awareness ab...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 41, "page_label": "42", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 43 Document Classification: Public TLP: White • Implement the approved cybersecurity awareness and training program in coordination with the cybersecurity awareness and training department, which may include the following o Implement the app...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 42, "page_label": "43", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 44 Document Classification: Public TLP: White • Provide cybersecurity awareness programs to cover the safe handling of mobile devices and storage media Expected deliverables • A document (such as approved policy or procedure) indicating the id...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 43, "page_label": "44", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 45 Document Classification: Public TLP: White • A document (such as approved policy or procedure) indicating the identification and documentation of the requirements related to this control • Action plan to implement the cybersecurity awarene...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 44, "page_label": "45", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 46 Document Classification: Public TLP: White • Define and document the requirements of this ECC in the cybersecurity requirements document and approve them by the representative • Develop and implement an approved training plan in the field of se...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 45, "page_label": "46", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 47 Document Classification: Public TLP: White o Awareness of the importance of cybersecurity, developing the cybersecurity culture and the key risks and threats, such as phishing emails for supervisory and executive positions (Whale phishing) m...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 46, "page_label": "47", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 48 Document Classification: Public TLP: White • Results of cybersecurity awareness program implementation review in the organization • A document that defines the cybersecurity awareness and training implementation review cycle (Compliance Assess...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 47, "page_label": "48", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
2-1 Asset Management Objective To ensure that the organization has an accurate and detailed inventory of information operational requirements to maintain the confidentiality, integrity and availability of information and technology assets. Controls 2-1-1 Cybersecurity requirements for managing information an...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 48, "page_label": "49", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 50 Document Classification: Public TLP: White • Information asset management cybersecurity requirements (in form of policy or standard) approved by the organization (e.g., electronic copy or official hard copy) • Formal approval by the head of th...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 49, "page_label": "50", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 51 Document Classification: Public TLP: White 2-1-3 Acceptable use policy of information and technology assets must be defined, documented and approved. Relevant cybersecurity tools • Asset Acceptable Use Policy Template. Control implemen...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 50, "page_label": "51", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 52 Document Classification: Public TLP: White • Cybersecurity policy for the acceptable use policy of the information and technology assets of the organization must be implemented, including the following o Requirements for the acceptable use of ...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 51, "page_label": "52", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 53 Document Classification: Public TLP: White o Peripherals (e.g., printers) o Operating systems (if any) • Document all information and technology assets in a single register with characteristics such as (asset name, description, owner and c...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 52, "page_label": "53", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
2-2 Identity and Access Management
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 53, "page_label": "54", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 55 Document Classification: Public TLP: White Objective To ensure the secure and restricted logical access to information and technology assets in order to prevent unauthorized access and allow only authorized access for users which are necess...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 54, "page_label": "55", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 56 Document Classification: Public TLP: White Control implementation guidelines: • All cybersecurity requirements must be implemented for the organization's approved identity and access management procedures. It is also recommended that the identit...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 55, "page_label": "56", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 57 Document Classification: Public TLP: White • Prepare password standard co ntrols taking into consideration best practices, including but not limited to o Expiration Period o Complexity o Lockout o Activation o Password History o A sec...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 56, "page_label": "57", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 58 Document Classification: Public TLP: White o Something you have, e.g., using One time password through SMS or applications o Something you are, e.g., using biometrics such as fingerprint or face recognition Expected deliverables • Cybers...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 57, "page_label": "58", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 59 Document Classification: Public TLP: White o Time required for authorization o Approvals required (e.g., Line Manager approval) Expected deliverables • Cybersecurity policy that covers Identity and Access Management ( e.g., electronic co...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 58, "page_label": "59", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 60 Document Classification: Public TLP: White • Define modern and advanced technologies and mechanisms for the Privileged Access Management • Grant privileged access based on functional duties after obtaining the necessary approvals, taking into ...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 59, "page_label": "60", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 61 Document Classification: Public TLP: White o Expiry of the access period Expected deliverables • Privileged Access Management Policy in the organization (e.g., electronic copy or official hard copy) • Formal approval by the head of the...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 60, "page_label": "61", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
2-3 Information System and Information Processing Facilities Protection Objective To ensure the protection of information systems and information processing facilities (including workstations and infrastructures) against cyber risks. Controls 2-3-1 Cybersecurity requirements for protecting information systems and...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 61, "page_label": "62", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 63 Document Classification: Public TLP: White o Secure copies of the operating systems used in the organization must be built and prepared in a secure manner, protection programs must be installed, and unused services must be disabled. Such cop...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 62, "page_label": "63", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 64 Document Classification: Public TLP: White o Use of external storage media and its security must be restricted o Patches throughout the organization's devices, systems, and applications must be implemented o Central Clock Synchronization and...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 63, "page_label": "64", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 65 Document Classification: Public TLP: White o Review the protection system periodically to ensure that the scope of the protection system is comprehensive for all workstations, systems, and servers of the organization through the protection s...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 64, "page_label": "65", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 66 Document Classification: Public TLP: White approvals via e -mail, paper, or through an internal system). Such procedures include - Reason for requesting approval for use - Use start and end date. - Mechanism for handling data stored in sto...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 65, "page_label": "66", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 67 Document Classification: Public TLP: White o Patches procedures must be included in change management methodology or change ma nagement must be included into patch management policy. o Change management approval must be included as part of ...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 66, "page_label": "67", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 68 Document Classification: Public TLP: White • Define and document the requirements of this ECC in the cybersecurity requirements document and approve them by the representative. • Perform time synchronization through the organization's central ser...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 67, "page_label": "68", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
2-4 Email Protection Objective Controls 2-4-1 Cybersecurity requirements for protecting email service must be defined, documented and approved. Relevant cybersecurity tools: • Email Security Policy Template. Control implementation guidelines • Develop and document cybersecurity policy for email protection ...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 68, "page_label": "69", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 70 Document Classification: Public TLP: White • Formal approval by the head of the organization or his/her deputy on the policy (e.g., via the organization's official e-mail, paper or electronic signature). 2-4-2 The cybersecurity requirements for ...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 69, "page_label": "70", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 71 Document Classification: Public TLP: White 2-4-3-1 Analyzing and filtering email messages (specifically phishing emails and spam) using advanced and up-to-date email protection techniques. Control implementation guidelines • Define and doc...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 70, "page_label": "71", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
Guide to Essential Cybersecurity Controls (ECC) Implementation 72 Document Classification: Public TLP: White o Mobile device management applications must be used to allow users' devices (as another element of access) to email for protocols (such as EWS, outlook anywhere protocols) that do not support text messa...
{ "creationdate": "2023-10-22T08:42:54+03:00", "creator": "Microsoft® Word LTSC", "moddate": "2023-10-22T08:42:54+03:00", "page": 71, "page_label": "72", "producer": "Microsoft® Word LTSC", "source": "/content/Guide-to-Essential-Cybersecurity-Controls-(ECC)-Implementation.pdf", "total_pages": 180 }
End of preview. Expand in Data Studio
README.md exists but content is empty.
Downloads last month
20