Uploaded by zaeemkingdom

List of policy that is available and need NO update in organization currently

advertisement
List of policy that is available and need NO update in organization currently
1. To be in tune with the requirements and objectives of Kingdom Vision 2030.
2. To be consistent with the directions of the National Transformation Program 2020.
3. Adhere to the policy of protecting intellectual property of content in accordance with the
intellectual property regulations in the Kingdom.
4. Conflict of interest
A 'conflict of interest' occurs when the personal interest of the company in any way conflicts
with the interests of the company.
Leave and Time-Off Benefits
Employee holidays and exit policy
Leave and departure of employees from important policies concerning employee rights
The employee takes out his annual 25-day vacation
He can choose other vacations depending on his need, which may be (sick, maternity leave, test
leave or marriage leave).
Other than official holidays specified as Such as national holidays, Al-Fitr or Al-Adha holiday
Workplace safety policies
Goal:
Because there are risks to an employee while in the workplace this policy has been used to
protect employees, by developing workplace safety policies, we can help mitigate any damage
caused by employee negligence.
5- Risk Management
Goal
Ensure risk management to protect assets of interest to a company, natural disasters and all
risks systematically, in accordance with a company's regulatory policies and procedures.
Controls
A minimum management methodology should include:
Implement a company's risk assessment procedure, at least once a year.
Create a special record of all risks, and follow it at least once a month
6- Identity and Access Management
Goal
Ensure logical access to the company's assets in order to prevent unauthorized access and
restrict access to what is required to do company-related work.
Controls
Multi-Factor Authentication (MFA)
Develop and apply a high-standard password policy.
Use safe methods and algorithms to save and process passwords such as: use
Hashing Functions for all beneficiaries
7- Human Resources Policy
Goal
Programs providers must have professional qualifications and appropriate levels of experience
and training;
Ensure that the risks, related to employees (employees and contractors) of the company, are
effectively addressed, before, during, and upon completion of their work. This is in accordance
with the company's regulatory policies and procedures. This policy includes everything about
the ethics of the employee and the consequences for it
Controls
Before starting a professional relationship with the company, cybersecurity requirements must
cover a minimum:
Perform or Vetting for employees.
The incumbent must be highly qualified.
That the employee has high morals
8. Cybersecurity Awareness and Training Program
Goal
Ensure that employees have the necessary security awareness and are aware of their
cybersecurity responsibilities. Ensure that the staff are provided with the skills, qualifications
and training courses required in the field of cybersecurity to protect the information and
technical assets of the authority and carry out their responsibilities towards security
Cyber.
Controls
A cybersecurity awareness program must be developed and adopted through multiple channels
periodically to promote awareness of cybersecurity, threats and risks, and build a positive
culture of cybersecurity.
The cybersecurity awareness program should cover how to protect the body from the most
important cyber threats and new ones
Specialized skills and training must be provided to workers in functional areas directly related to
the company's cybersecurity.
10- Asset Management
Goal
Ensure that the entity has an accurate and up-to-date inventory of assets, including relevant
details, of all information assets, and all assets available to the authority, in order to support the
authority's operational operations and cybersecurity requirements, with a view to achieving the
confidentiality, integrity, accuracy and availability of the entity's information and technical
assets.
Controls:
Keep an updated list annually, for all assets of the Academy.
Identify assets owner and involve them in the Academy's asset management life cycle.
11- Networks Security Management
Goal
Ensure that the entity's networks are protected from cyber risks.
Controls
To manage the security of systems for a company must contain at a minimum the following:
Physical, or logical, insulation and division of sensitive system networks. Review firewall settings
and menus every six months, at least.
Prevent direct connectivity, for any device to the local network of sensitive systems, except after
inspection, and to ensure that the verified protection elements are available to acceptable levels
of sensitive systems.
Prevent sensitive systems from connecting to the wireless network.
12- Cryptography
Goal
Ensure the proper and effective use of encryption to protect the assets of a company, in
accordance with the company's policies and regulatory procedures.
Controls
Encrypt all sensitive data during transport (Data-In-Transit).
Encrypt all sensitive systems data during storage (Data-At-Rest) at file level, database, or specific
column level, within the database.
Use updated and secure methods, algorithms, keys and encryption devices as issued by the
Authority.
13- Backup and Recovery Management
Goal
Ensure that the company's data and information, technical settings for the company's systems
and applications, are protected from damage caused by cyber risks, in accordance with the
company's policies and regulatory procedures.
Controls
Online and Offline Backup to include all systems.
Backup worked at planned intervals; the company recommends that backups of sensitive data
be made on a daily basis.
Secure access, storage, and transportation of backup content for sensitive systems and their
media, and protect them from damage, modification, or unauthorized access.
A periodic examination must be conducted at least every three months to determine the
effectiveness of restoring backups for sensitive systems
14- Third-Party Policy
Goal
Ensure that the entity's assets are protected from third-party risks, including outsourcing
services and managed services. This is in accordance with the regulatory policies and procedures
of the company.
Controls
Screening or Vetting for support service companies, support service staff and managed services
working on sensitive systems.
Support services, systems-managed services, through highly trusted companies
List of policy that is available in organization, but it needs to be updated.
Management of information and technical projects
)Cybersecurity in Information Technology Projects(
Goal
Ensure that the management of the company's projects and procedures is properly applied to
protect confidentiality, the integrity, accuracy and availability of the entity's information and
technical assets.
Controls
In order to cover the company's project management requirements and changes to the
company's information and technical assets well, Miley will be challenged in the future.
Stress Testing to ensure the capacity of different components.
Stress Testing: Software and hardware test to make sure they are available;
The level of their effectiveness in unexpected circumstances.
Juvenile Records Management and Monitoring
)Cybersecurity Event Logs and Monitoring Management(
Goal
Ensure that event records are compiled and analyzed in a timely manner to prevent the effects
of unauthorized entry and affect or reduce the company's business.
The Somme is updated and added:
Activate and monitor file integrity management alerts and event records.
Monitoring and analyzing user behavior Analytics (UBA).
Monitor event records for sensitive systems 24 hours a day.
Protection of information system and Processing Facilities Protection systems and devices
Goal
Ensure that systems and information processing devices, including user devices, and entity
infrastructure, are protected from cyber risks.
Applicable controls:
In addition to preconceptions, it allows only a specific list of Whitelisting files for applications
and programs to work on servers for sensitive systems.
Protect servers for sensitive systems with company-approved End-point Protection
technologies.
The following application will be updated:
Apply updates packages, and security fixes, at least once a month, to sensitive external,
internet-connected systems.
Allocation of Workstations to technical personnel with important and sensitive powers, to be
isolated in a private network, to manage systems and not to be connected to any network, or
other service (e.g.:
E-mail service, Internet).
Review secure configuration and Hardening settings and fortifications at least every six months.
Review and modify Default Configuration and make sure there are no fixed, background, and
virtual passwords (Hard-Coded, Backdoor and Default Passwords) as applicable.
Application Security
Goal:
Ensure that internal applications, for the sensitive systems of the entity, are protected from risks
and attacks.
Applicable controls:
Protection requirements for internal applications of a company's sensitive systems must be
identified, documented and adopted through the use of secure protocols (such as HTTPS
protocol).
Clarify the user safe use policy.
The following application should be updated to increase the rate of protection and security:
Secure Session Management, including authenticity, lockout and timeout.
Data and Information Protection
Goal
Ensure the protection of confidentiality, integrity, accuracy and availability of company data and
information, in accordance with the company's regulatory policies and procedures.
Controls
In addition to pre-existing controls such as classifying all sensitive system data, protecting
classified data for sensitive systems through techniques, data leakage prevention.
Data Leakage Prevention is a strategy to preserve important data, from unauthorized persons,
and prevent it from circulating outside the organization in any form and location of such data,
whether stored on In-Rest volumes, user devices, and servers
.) In-Transit or in-Use
Some other important aspects of data and information protection should be covered as follows:
Determine the required retention period for business data on sensitive systems, depending on
relevant legislation, and only required data are retained in production environments for
sensitive systems.
- List of policy that is NOT available in organization
Share, view or sell user data to those who want to conduct studies and statistics
No building for disaster recovery plans
remote work policy does not use this policy because all employees perform their jobs from the
job site and come to it to finish their work
The policy of paying bills to users does not apply this policy in the company because the
programs are applied free of charge and do not need to have a payment policy.
Download