{"id":21639,"date":"2025-01-06T05:05:00","date_gmt":"2025-01-06T02:05:00","guid":{"rendered":"https:\/\/www.qu.edu.sa\/?post_type=documents&#038;p=21639"},"modified":"2026-04-15T08:45:54","modified_gmt":"2026-04-15T05:45:54","slug":"documents-cybersecurity-1357","status":"publish","type":"documents","link":"https:\/\/www.qu.edu.sa\/en\/documents\/cybersecurity\/1357\/","title":{"rendered":"Data Cybersecurity Controls"},"content":{"rendered":"<p><strong>The Data Cybersecurity Controls (DCC-1: 2022) document issued by the National Cybersecurity Authority forms an integrated strategic framework aimed at protecting national information assets and enhancing cybersecurity requirements throughout all phases of the data lifecycle.<\/strong><p><strong> These controls are based on the Kingdom's Vision 2030, which considers data a vital economic resource and a foundation for supporting decision-making and developing digital services. This necessitates strict security requirements to mitigate cybersecurity threats and risks that could negatively impact the Kingdom's national security, economy, or international reputation.<\/strong><\/p><p><strong> The structure of these controls consists of three primary components and 11 subcomponents, which collectively include 19 primary controls and 47 subcontrols, all designed to complement the Essential Cybersecurity Controls (ECC).<\/strong><\/p><p><strong> The scope of these controls extends to all government entities and their affiliates, as well as private sector entities that own or operate critical national infrastructure. The controls cover all forms of data, whether physical or digital, structured like databases or unstructured like documents and records.<\/strong><\/p><p><strong> The document adopts a precise data classification system consisting of four levels: Public, Restricted, Confidential, and Top Secret, based on their sensitivity and the risks associated with their loss or leakage.<\/strong><\/p><p><strong> The main control pillars include cybersecurity governance through periodic review and auditing to ensure the effectiveness of implemented measures, enhancing human resource-related cybersecurity by conducting security screening for employees, and preventing the use of unauthorized messaging applications or cloud storage for sharing sensitive data.<\/strong><\/p><\/p> <p>","protected":false},"excerpt":{"rendered":"<p>&#1578;&#1615;&#1588;&#1603;&#1604; &#1608;&#1579;&#1610;&#1602;&#1577; &#1590;&#1608;&#1575;&#1576;&#1591; &#1575;&#1604;&#1571;&#1605;&#1606; &#1575;&#1604;&#1587;&#1610;&#1576;&#1585;&#1575;&#1606;&#1610; &#1604;&#1604;&#1576;&#1610;&#1575;&#1606;&#1575;&#1578; (DCC-1: 2022) &#1575;&#1604;&#1589;&#1575;&#1583;&#1585;&#1577; &#1593;&#1606; &#1575;&#1604;&#1607;&#1610;&#1574;&#1577; &#1575;&#1604;&#1608;&#1591;&#1606;&#1610;&#1577; &#1604;&#1604;&#1571;&#1605;&#1606; &#1575;&#1604;&#1587;&#1610;&#1576;&#1585;&#1575;&#1606;&#1610; &#1573;&#1591;&#1575;&#1585;&#1575;&#1611; &#1575;&#1587;&#1578;&#1585;&#1575;&#1578;&#1610;&#1580;&#1610;&#1575;&#1611; &#1605;&#1578;&#1603;&#1575;&#1605;&#1604;&#1575;&#1611; &#1610;&#1607;&#1583;&#1601; &#1573;&#1604;&#1609; &#1581;&#1605;&#1575;&#1610;&#1577; &#1575;&#1604;&#1571;&#1589;&#1608;&#1604; &#1575;&#1604;&#1605;&#1593;&#1604;&#1608;&#1605;&#1575;&#1578;&#1610;&#1577; &#1575;&#1604;&#1608;&#1591;&#1606;&#1610;&#1577; &#1608;&#1578;&#1593;&#1586;&#1610;&#1586; &#1605;&#1578;&#1591;&#1604;&#1576;&#1575;&#1578; &#1575;&#1604;&#1571;&#1605;&#1606; &#1575;&#1604;&#1587;&#1610;&#1576;&#1585;&#1575;&#1606;&#1610; &#1582;&#1604;&#1575;&#1604; &#1603;&#1575;&#1601;&#1577; &#1605;&#1585;&#1575;&#1581;&#1604; &#1583;&#1608;&#1585;&#1577; &#1581;&#1610;&#1575;&#1577; &#1575;&#1604;&#1576;&#1610;&#1575;&#1606;&#1575;&#1578;. &#1578;&#1606;&#1591;&#1604;&#1602; &#1607;&#1584;&#1607; &#1575;&#1604;&#1590;&#1608;&#1575;&#1576;&#1591; &#1605;&#1606; &#1585;&#1572;&#1610;&#1577; &#1575;&#1604;&#1605;&#1605;&#1604;&#1603;&#1577; 2030 &#1575;&#1604;&#1578;&#1610; &#1578;&#1593;&#1578;&#1576;&#1585; &#1575;&#1604;&#1576;&#1610;&#1575;&#1606;&#1575;&#1578; &#1605;&#1608;&#1585;&#1583;&#1575;&#1611; &#1575;&#1602;&#1578;&#1589;&#1575;&#1583;&#1610;&#1575;&#1611; &#1581;&#1610;&#1608;&#1610;&#1575;&#1611; &#1608;&#1571;&#1587;&#1575;&#1587;&#1575;&#1611; &#1604;&#1583;&#1593;&#1605; &#1589;&#1606;&#1575;&#1593;&#1577; &#1575;&#1604;&#1602;&#1585;&#1575;&#1585; &#1608;&#1578;&#1591;&#1608;&#1610;&#1585; &#1575;&#1604;&#1582;&#1583;&#1605;&#1575;&#1578; &#1575;&#1604;&#1585;&#1602;&#1605;&#1610;&#1577;&#1548; &#1605;&#1605;&#1575; &#1610;&#1578;&#1591;&#1604;&#1576; [&hellip;]<\/p>\n","protected":false},"author":53,"template":"","sdgs":[],"beneficiaries":[],"post-setting":[],"documents-type":[691],"departments-list":[140],"class_list":["post-21639","documents","type-documents","status-publish","hentry","documents-type-regulatory-documents1","departments-list-cybersecurity"],"_links":{"self":[{"href":"https:\/\/www.qu.edu.sa\/en\/wp-json\/wp\/v2\/documents\/21639","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.qu.edu.sa\/en\/wp-json\/wp\/v2\/documents"}],"about":[{"href":"https:\/\/www.qu.edu.sa\/en\/wp-json\/wp\/v2\/types\/documents"}],"author":[{"embeddable":true,"href":"https:\/\/www.qu.edu.sa\/en\/wp-json\/wp\/v2\/users\/53"}],"version-history":[{"count":5,"href":"https:\/\/www.qu.edu.sa\/en\/wp-json\/wp\/v2\/documents\/21639\/revisions"}],"predecessor-version":[{"id":70557,"href":"https:\/\/www.qu.edu.sa\/en\/wp-json\/wp\/v2\/documents\/21639\/revisions\/70557"}],"wp:attachment":[{"href":"https:\/\/www.qu.edu.sa\/en\/wp-json\/wp\/v2\/media?parent=21639"}],"wp:term":[{"taxonomy":"sdgs","embeddable":true,"href":"https:\/\/www.qu.edu.sa\/en\/wp-json\/wp\/v2\/sdgs?post=21639"},{"taxonomy":"beneficiaries","embeddable":true,"href":"https:\/\/www.qu.edu.sa\/en\/wp-json\/wp\/v2\/beneficiaries?post=21639"},{"taxonomy":"post-setting","embeddable":true,"href":"https:\/\/www.qu.edu.sa\/en\/wp-json\/wp\/v2\/post-setting?post=21639"},{"taxonomy":"documents-type","embeddable":true,"href":"https:\/\/www.qu.edu.sa\/en\/wp-json\/wp\/v2\/documents-type?post=21639"},{"taxonomy":"departments-list","embeddable":true,"href":"https:\/\/www.qu.edu.sa\/en\/wp-json\/wp\/v2\/departments-list?post=21639"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}