The National Cybersecurity Authority (NCA) develops cybersecurity policies, frameworks, and guidelines to address the growing security risks in Saudi Arabia. As cloud services rapidly expand, new risks require specific cybersecurity controls, extending from the Essential Cybersecurity Controls. In this context, the Cloud Cybersecurity Controls, released in 2020, aim to reduce cybersecurity risks for both CSPs and CSTs by defining key objectives, scope, and compliance approaches.
Things to note:
Cloud Service Providers (CSPs) are organizations that offer cloud-based services, while Cloud Service Tenants (CSTs) are the customers or users of these services.
As a CSP, Endpoint Central assists CSTs in complying with the CCC by offering security controls for cloud environments, as outlined in the following section.
S.No | Cloud Cybersecurity Control | How Endpoint Central helps |
---|---|---|
2-5 | Mobile Devices Security
In addition to sub-controls in the ECC control 2-6-3, the CST shall cover the following additional sub-controls for cybersecurity requirements for mobile device security, as a minimum: 2-5-T-1-1 Data sanitation and secure disposal for end-user devices with access to the cloud services. |
Endpoint Central helps admins perform remote wipes to ensure corporate data security in case a device is lost. Endpoint Central also has Enterprise Factory Reset Protection so that device used by ex- employee can be reprovisioned to current employee of your organization. |
Thank you for your feedback!
Sorry about that!