This document, “Cybersecurity Controls for Sensitive Systems,” outlines a comprehensive framework aimed at defining the minimum requirements and procedures necessary to protect high-priority systems within government entities and their associated organizations.
These controls are an extension of the fundamental cybersecurity controls, focusing specifically on systems whose failure or compromise could have significant negative impacts on national security, the economy, or critical services.
The document begins by clarifying fundamental concepts, such as the definition of critical systems and the criteria by which a system is classified as critical. These criteria include impacts on national security, financial losses, or the disruption of services provided to a wide segment of beneficiaries. It also reviews the components of these systems, which are not limited to technical aspects like networks, servers, and applications, but extend to include human elements, procedures, and associated documentation.
The document covers the scope of application, emphasizing the mandatory implementation of these controls for all entities owning or operating sensitive systems, with the necessity of risk assessment and identification of appropriate controls for each entity according to its nature of work. It also focuses on the importance of continuous commitment, periodic review, and updates in line with the evolution of cyber threats.
The controls are divided into four main areas, including: cybersecurity governance, cybersecurity enhancement, cybersecurity resilience, and security related to external parties and cloud computing.
Each domain includes a set of detailed controls covering multiple aspects such as identity and access management, data protection, encryption, vulnerability management, backup, and penetration testing. In general, the document aims to raise the cybersecurity readiness level of entities, enhance their ability to counter attacks, ensure business continuity, and protect information and technical assets, thereby achieving security and stability of the digital environment at the national level.