The National Cybersecurity Authority (NCA) developed the Data Cybersecurity Controls in 2022, after conducting a thorough review of national and international cybersecurity standards, frameworks, regulations, and best practices.
While developing the DCC, the NCA ensured these controls were in alignment with the Essential Cybersecurity Controls, which are mandatory for organizations.Compliance with the DCC can only be achieved by maintaining ongoing compliance with the ECC, as both are closely connected.
As part of this, the Saudi Data and Artificial Intelligence Authority (SDAIA) has established a clear data classification system, categorizing data into four distinct levels of sensitivity and protection needs:
Each category requires different levels of security measures, and Endpoint Central is equipped to help organizations manage and secure data across all these levels, ensuring compliance with DCC.
In the following sections, we’ll explore how Endpoint Central can help your organization navigate and implement these critical controls effectively.
S.No | Data Cybersecurity Control | How Endpoint Central helps |
---|---|---|
2-1 | Identity and Access Management To ensure the secure and restricted logical access to information and technology assets in order to prevent unauthorized access and allow only authorized access for users who are necessary to accomplish assigned tasks. 2-1-2 Managing identities and access rights to view data using privileged access management mechanisms. |
Endpoint Central enables organizations to adopt the principle of least privilege, offering robust endpoint privilege management. This includes application-specific privilege controls and just-in-time access for end users. |
2-2 | Information System and Information Processing Facilities Protection To ensure the protection of information systems and information processing facilities (including workstations and infrastructures) against cyber risks. 2-2-1-1 Applying security patches and updates from the time of announcement on systems used to handle data as specified for each data classification level. 2-2-1-2 Reviewing the security configuration and hardening of systems used to handle data as specified for each data level. 2-2-1-3 Reviewing and hardening the default configuration of the technology assets used to handle data. 2-2-1-4 Disabling the print screen or screen capture features on the devices that create or process documents. |
Endpoint Central provides comprehensive patch support for Windows, Linux, and macOSs and Windows Server OS which contain corporate data. Endpoint Central has provisions for hardening web servers and fixing security misconfigurations to prevent data breach. Endpoint Central has device restriction capabilities that can prevent the end-user from printing the screen and screen capture. |
2-3 | Mobile Devices Security To ensure the protection of mobile devices (including laptops, smartphones, tablets) from cyber risks and to ensure the secure handling of the organization’s information (including sensitive information) while utilizing Bring Your Own Device (BYOD) policy. 2-3-1-1 Centrally managing the organization's owned mobile devices using MDM system and activating the remote wipe feature. 2-3-1-2 Centrally managing BYOD devices using MDM system and activating the remote wipe feature. |
Endpoint Central leverages its MDM capabilities to manage mobiles, laptops, IoTs, rugged devices from a single location. Endpoint Central helps admins perform remote wipes to ensure corporate data security in case a device is lost. This is applicable for both BYOD devices and corporate owned devices. |
2-4 | Data and Information Protection To ensure the confidentiality, integrity, and availability of the organization’s data and information as per organizational policies and procedures and related laws and regulations. 2-4-1-1 Using the Watermark feature to label the whole document when creating, storing, and printing on the screen and on each copy so that the symbol can be traced to the user or device level. 2-4-1-2 Using DLP technologies and Rights Management technologies. 2-4-1-3 Prohibiting the use of data in any environment other than the production environment, except after conducting a risk assessment and applying controls to protect the data, such as data masking and data scrambling techniques. |
Endpoint Central can enable admins to superimpose the watermarks on sensitive documents that are allowed to be printed. Endpoint Central offers data leakage prevention features, enabling you to identify and categorize personally identifiable information (PII). It gives you full control over data movement across your IT ecosystem by allowing you to set policies governing data transfers through the cloud and peripheral devices. |
2-6 | Secure Data Disposal To ensure a secure data disposal as per organizational policies and procedures and related laws and regulations. 2-6-1-1 Identification of technologies, tools, and procedures for the implementation of secure data disposal according to data classification level. 2-6-1-2 When storage media is no longer needed, it must be securely disposed by using the technologies, tools, and procedures identified in sub-control 2-6-1-1. 2-6-1-3 When storage media needs to be reused, data must be securely erased in a manner it cannot be recovered. 2-6-1-4 Implementation of secure data disposal or erasure operations referred in sub-controls 2-6-1-2 and 2-6-1-3 must be verified. |
Endpoint Central has EFRP (Enterprise Factory Reset Protection) so that the mobile devices can be completely erased and provisioned. |
Thank you for your feedback!
Sorry about that!