Cloud Cybersecurity Controls  (CCC)

Free Trial

Endpoint Central helps comply with Cloud Cybersecurity Controls

The National Cybersecurity Authority (NCA) develops cybersecurity policies, frameworks, and guidelines to address the growing security risks in Saudi Arabia. As cloud services rapidly expand, new risks require specific cybersecurity controls, extending from the Essential Cybersecurity Controls. In this context, the Cloud Cybersecurity Controls, released in 2020, aim to reduce cybersecurity risks for both CSPs and CSTs by defining key objectives, scope, and compliance approaches.

Things to note:
Cloud Service Providers (CSPs) are organizations that offer cloud-based services, while Cloud Service Tenants (CSTs) are the customers or users of these services.

As a CSP, Endpoint Central assists CSTs in complying with the CCC by offering security controls for cloud environments, as outlined in the following section.

S.No Cloud Cybersecurity Control How Endpoint Central helps
2-5 Mobile Devices Security

In addition to sub-controls in the ECC control 2-6-3, the CST shall cover the following additional sub-controls for cybersecurity requirements for mobile device security, as a minimum:

2-5-T-1-1 Data sanitation and secure disposal for end-user devices with access to the cloud services.



Endpoint Central helps admins perform remote wipes to ensure corporate data security in case a device is lost.

Endpoint Central also has Enterprise Factory Reset Protection so that device used by ex- employee can be reprovisioned to current employee of your organization.
 

 

 

Was this article helpful?

Thank you for your feedback!

Sorry about that!

By clicking "Submit", you agree to processing of personal data according to thePrivacy Policy.
Back to Top