{"id":60358,"date":"2026-01-01T12:53:39","date_gmt":"2026-01-01T09:53:39","guid":{"rendered":"https:\/\/www.qu.edu.sa\/?post_type=documents&#038;p=60358"},"modified":"2026-04-15T09:05:26","modified_gmt":"2026-04-15T06:05:26","slug":"key-cybersecurity-controls","status":"publish","type":"documents","link":"https:\/\/www.qu.edu.sa\/en\/documents\/%D8%A7%D9%84%D8%B6%D9%88%D8%A7%D8%A8%D8%B7-%D8%A7%D9%84%D8%A3%D8%B3%D8%A7%D8%B3%D9%8A%D8%A9-%D9%84%D9%84%D8%A3%D9%85%D9%86-%D8%A7%D9%84%D8%B3%D9%8A%D8%A8%D8%B1%D8%A7%D9%86%D9%8A\/","title":{"rendered":"Key Cybersecurity Controls"},"content":{"rendered":"<p><strong>This document addresses fundamental cybersecurity controls in terms of their objective and scope. It aims to define the minimum requirements necessary to protect information and technical assets within various entities, relying on best practices and approved standards. This contributes to reducing cyber risks resulting from internal and external threats. The document also emphasizes the importance of information protection by achieving the principles of confidentiality, integrity, and availability of data, ensuring business continuity, improving system efficiency, enhancing the reliability of technical services, and limiting the negative impacts of cyberattacks.<\/strong><p><strong>The document clarifies that these controls apply to government entities in the Kingdom of Saudi Arabia, including ministries, authorities, institutions, and their affiliates, in addition to private entities that own or manage critical national infrastructure or provide related services. Other entities within the Kingdom are also encouraged to benefit from these controls and adopt them as a primary reference, with the aim of improving the level of cybersecurity and continuously developing organizational and technical practices and procedures.<\/strong><\/p><p><strong>The document also indicates that these controls are designed to be flexible and applicable across various sectors, taking into account the differing nature of entities' work and their technical and regulatory needs. Each entity must commit to implementing the controls relevant to them and work on reviewing and updating them periodically, thereby enhancing the level of protection and keeping pace with the rapid developments in cybersecurity and modern technologies.<\/strong><\/p><p><\/p><\/p> <p>","protected":false},"excerpt":{"rendered":"<p>&#1578;&#1578;&#1606;&#1575;&#1608;&#1604; &#1607;&#1584;&#1607; &#1575;&#1604;&#1608;&#1579;&#1610;&#1602;&#1577; &#1575;&#1604;&#1590;&#1608;&#1575;&#1576;&#1591; &#1575;&#1604;&#1571;&#1587;&#1575;&#1587;&#1610;&#1577; &#1604;&#1604;&#1571;&#1605;&#1606; &#1575;&#1604;&#1587;&#1610;&#1576;&#1585;&#1575;&#1606;&#1610; &#1605;&#1606; &#1581;&#1610;&#1579; &#1575;&#1604;&#1607;&#1583;&#1601; &#1608;&#1606;&#1591;&#1575;&#1602; &#1575;&#1604;&#1578;&#1591;&#1576;&#1610;&#1602;&#1548; &#1581;&#1610;&#1579; &#1578;&#1607;&#1583;&#1601; &#1573;&#1604;&#1609; &#1578;&#1581;&#1583;&#1610;&#1583; &#1575;&#1604;&#1581;&#1583; &#1575;&#1604;&#1571;&#1583;&#1606;&#1609; &#1605;&#1606; &#1575;&#1604;&#1605;&#1578;&#1591;&#1604;&#1576;&#1575;&#1578; &#1575;&#1604;&#1604;&#1575;&#1586;&#1605;&#1577; &#1604;&#1581;&#1605;&#1575;&#1610;&#1577; &#1575;&#1604;&#1571;&#1589;&#1608;&#1604; &#1575;&#1604;&#1605;&#1593;&#1604;&#1608;&#1605;&#1575;&#1578;&#1610;&#1577; &#1608;&#1575;&#1604;&#1578;&#1602;&#1606;&#1610;&#1577; &#1601;&#1610; &#1575;&#1604;&#1580;&#1607;&#1575;&#1578; &#1575;&#1604;&#1605;&#1582;&#1578;&#1604;&#1601;&#1577;&#1548; &#1608;&#1584;&#1604;&#1603; &#1576;&#1575;&#1604;&#1575;&#1593;&#1578;&#1605;&#1575;&#1583; &#1593;&#1604;&#1609; &#1571;&#1601;&#1590;&#1604; &#1575;&#1604;&#1605;&#1605;&#1575;&#1585;&#1587;&#1575;&#1578; &#1608;&#1575;&#1604;&#1605;&#1593;&#1575;&#1610;&#1610;&#1585; &#1575;&#1604;&#1605;&#1593;&#1578;&#1605;&#1583;&#1577;&#1548; &#1576;&#1605;&#1575; &#1610;&#1587;&#1607;&#1605; &#1601;&#1610; &#1578;&#1602;&#1604;&#1610;&#1604; &#1575;&#1604;&#1605;&#1582;&#1575;&#1591;&#1585; &#1575;&#1604;&#1587;&#1610;&#1576;&#1585;&#1575;&#1606;&#1610;&#1577; &#1575;&#1604;&#1606;&#1575;&#1578;&#1580;&#1577; &#1593;&#1606; &#1575;&#1604;&#1578;&#1607;&#1583;&#1610;&#1583;&#1575;&#1578; &#1575;&#1604;&#1583;&#1575;&#1582;&#1604;&#1610;&#1577; &#1608;&#1575;&#1604;&#1582;&#1575;&#1585;&#1580;&#1610;&#1577;. &#1603;&#1605;&#1575; &#1578;&#1585;&#1603;&#1586; &#1575;&#1604;&#1608;&#1579;&#1610;&#1602;&#1577; &#1593;&#1604;&#1609; &#1571;&#1607;&#1605;&#1610;&#1577; &#1581;&#1605;&#1575;&#1610;&#1577; &#1575;&#1604;&#1605;&#1593;&#1604;&#1608;&#1605;&#1575;&#1578; &#1605;&#1606; &#1582;&#1604;&#1575;&#1604; [&hellip;]<\/p>\n","protected":false},"author":53,"template":"","sdgs":[],"beneficiaries":[],"post-setting":[],"documents-type":[691],"departments-list":[140],"class_list":["post-60358","documents","type-documents","status-publish","hentry","documents-type-regulatory-documents1","departments-list-cybersecurity"],"_links":{"self":[{"href":"https:\/\/www.qu.edu.sa\/en\/wp-json\/wp\/v2\/documents\/60358","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.qu.edu.sa\/en\/wp-json\/wp\/v2\/documents"}],"about":[{"href":"https:\/\/www.qu.edu.sa\/en\/wp-json\/wp\/v2\/types\/documents"}],"author":[{"embeddable":true,"href":"https:\/\/www.qu.edu.sa\/en\/wp-json\/wp\/v2\/users\/53"}],"version-history":[{"count":7,"href":"https:\/\/www.qu.edu.sa\/en\/wp-json\/wp\/v2\/documents\/60358\/revisions"}],"predecessor-version":[{"id":70574,"href":"https:\/\/www.qu.edu.sa\/en\/wp-json\/wp\/v2\/documents\/60358\/revisions\/70574"}],"wp:attachment":[{"href":"https:\/\/www.qu.edu.sa\/en\/wp-json\/wp\/v2\/media?parent=60358"}],"wp:term":[{"taxonomy":"sdgs","embeddable":true,"href":"https:\/\/www.qu.edu.sa\/en\/wp-json\/wp\/v2\/sdgs?post=60358"},{"taxonomy":"beneficiaries","embeddable":true,"href":"https:\/\/www.qu.edu.sa\/en\/wp-json\/wp\/v2\/beneficiaries?post=60358"},{"taxonomy":"post-setting","embeddable":true,"href":"https:\/\/www.qu.edu.sa\/en\/wp-json\/wp\/v2\/post-setting?post=60358"},{"taxonomy":"documents-type","embeddable":true,"href":"https:\/\/www.qu.edu.sa\/en\/wp-json\/wp\/v2\/documents-type?post=60358"},{"taxonomy":"departments-list","embeddable":true,"href":"https:\/\/www.qu.edu.sa\/en\/wp-json\/wp\/v2\/departments-list?post=60358"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}