Cyber Security Framework: Saudi Arabian Monetary Authority

SAMA established a Cyber Security Framework (“the Framework”) to enable Financial Institutions regulated by SAMA (“the Member Organizations”) to effectively identify and address risks related to cyber security. To maintain the protection of information assets and online services, the Member Organizations must adopt the Framework.

Saudi Arabian Monetary Authority

Download the SAMA Framework Datasheet

The SAMA Definition of Cyber Security:

Within the SAMA Framework, Cyber security is defined as the collection of tools, policies, security concepts, security safeguards, guidelines, risk management approaches, actions, training, best practices, assurance, and technologies that can be used to protect the member organization's information assets against internal and external threats.

The Framework provides cyber security controls which are applicable to the information assets of the Member Organization, including:

  • Electronic information.
  • Physical information (hardcopy).
  • Applications, software, electronic services and databases.
  • Computers and electronic machines (e.g., ATM).
  • Information storage devices (e.g., hard disk, USB stick).
  • Premises, equipment and communication networks (technical infrastructure).
NNT SecureOps™ is the perfect solution for operating and demonstrating SAMA compliance.

vulnerability tracker logo

NNT’s Vulnerability Tracker™ identifies known vulnerabilities within software and configuration settings before they can be exploited by a cyber-attack.

  • Directly addresses SAMA 3.3.3 (Asset Management), 3.3.6 (Application Security) and 3.3.17 Vulnerability Management.
  • Continuously tests and assesses your IT network and any device connected to it against thousands of Network Vulnerability Tests (NVTs).
  • Unique, fully meshed, distributed scanning solution providing UNLIMITED scanning, not restricted by device counts. This makes Vulnerability Tracker the most scalable, flexible and cost-effective enterprise-class scanner.

change tracker gen7r2 logo

NNT Change Tracker Gen 7 R2 provides fundamental cyber security prevention and detection. It does this by leveraging the required security best practice disciplines of system configuration and integrity assurance combined with the most comprehensive and intelligent change control solution available. Change Tracker from NNT will ensure that your IT systems remain in a known, secure and compliant state at all times.

  • Directly addresses 3.3.6 (Application Security), 3.3.7 (Change Management) and 3.3.8 (Infrastructure Security)
  • Provides context-based File Integrity Monitoring and File Whitelisting to assure all change activity is automatically analyzed and validated.
  • Certified CIS configuration hardening ensures all systems remain securely configured at all times
  • Intelligent change control technology, provides unparalleled change noise reduction along with the ultimate reassurance that the changes occurring within your production environment are consistent, safe and as required.

log tracker logo logo

NNT Log Tracker records full audit trails of all user and system activity then correlates events to provide early-warning of hacker behavior.

  • Directly addresses 3.3.14 (Cyber Security Event Management)
  • Securely protects all logs and audit trails
  • Correlates logs from all devices including network devices, Unix and Windows servers, applications and databases, and analyzing them for unusual or suspicious activity
  • Pre-built compliance reports and scorecards
Additional Resources
The Most Powerful & Reliable Cybersecurity Products

change tracker gen7r2 logo

Change Tracker Gen 7R2: Complete configuration and system integrity assurance combined with the most comprehensive and intelligent change control solution available.

FAST Cloud logo

Fast Cloud: Leverage the world’s largest whitelist repository to automatically evaluate and verify the authenticity of file changes in real-time with NNT FAST™ (File Approved-Safe Technology)

vulnerability tracker logo

Vulnerability Tracker: The world’s only limitless and unrestricted vulnerability scanning solution with unparalleled accuracy and efficiency, protecting your IT assets on premises, in the cloud and mobile endpoints.

log tracker logo

Log Tracker: Comprehensive and easy to use security information & event log management with intelligent & self-learning correlation technology to highlight potentially harmful activity in seconds

Contact Us

USA Offices

New Net Technologies LLC
4850 Tamiami Trail, Suite 301
Naples, Florida, 34103

New Net Technologies LLC
1175 Peachtree St NE
Atlanta, Georgia, 30361.

Tel: (844) 898-8358
[email protected]

 

UK Office

New Net Technologies Ltd
The Russell Building, West Common
Harpenden, Hertfordshire
AL5 2JQ

Tel: 020 3917 4995
 [email protected]

SC Magazine Cybersecurity 500 CSGEA Winners 2021 CIS benchmarking SEWP Now Certified IBM Security
Copyright 2023, New Net Technologies LLC. All rights reserved. 
NNT and Change Tracker are registered trademarks of New Net Technologies LLC.
All other product, company names and trademarks are the property of their respective owners.