We prevent cyber attacks by reinforcing foolproof cybersecurity practices into software architecture

When things do not work as they should, it often means that standards are absent

Regulations and standards in information security and cloud computing are complicated. Let us help you implement, maintain, audit and certify compliance with these standards if needs be.

We use multiple security standards and regulations to assess the cybersecurity posture of an organization and answer the question of how secure it is right now. The assessment is based on CMM and RA which are proven, practical, proactive, comprehensive and cost effective methodologies. Whereas organizations can obtain certification against a standard, after completing our audit assessment we provide quotations from several Accredited Certification Body so clients can chose from.

Our very own tailor-made services offering CARAT℠ includes the regulations and standards below:

Security Standards in Software Development

A secure software development process covering the entire life cycle (S-SDLC) ensures that security assurance activities such as penetration testing, code review, and architecture analysis are an integral part of the development effort, and are performed regularly in production, and after major changes.

Some of the most important security standards for software development, beginning with the most critical:

European Union Regulations

Directive on Security of Networks and Information Systems (NIS2)

NIS2 is an European Union regulation designed to enhance cybersecurity across critical sectors. Building on the original NIS Directive, NIS2 sets higher security standards for essential and important entities, including energy, transport, healthcare, and digital infrastructure.

NIS2 requires organizations to implement robust risk management practices, report cybersecurity incidents, and ensure resilience against cyber threats. The directive also mandates stronger cooperation among EU member states to improve cross-border cybersecurity efforts, aiming to protect the digital economy and essential services from evolving cyber risks.

Digital Operational Resilience Act (DORA)

DORA is a regulation introduced by the European Union to strengthen the operational resilience of the financial entities in the EU and their Information and Communication Technology (ICT) suppliers against digital risk. It sets out requirements for financial institutions, including banks, insurance companies, investment firms, and their ICT suppliers, to ensure they can withstand and recover from ICT disruptions.

DORA focuses on areas such as risk management, incident reporting, third-party service provider oversight, and testing of digital systems, aiming to create a more robust and secure financial ecosystem in an increasingly digital world. The regulation is part of the EU’s broader strategy to enhance financial stability and protect consumers.

General Data Protection Regulation (GDPR)

GDPR is a comprehensive data privacy law enacted by the European Union to protect the personal data and privacy of EU citizens. It sets stringent rules on how organizations collect, store, process, and share personal data, with a strong emphasis on transparency, accountability, and individuals’ rights.

GDPR grants individuals greater control over their personal information, including rights to access, rectify, and erase their data. Organizations that fail to comply with GDPR may face significant fines. The regulation aims to harmonize data protection laws across Europe and ensure that personal data is handled responsibly in an increasingly digital world.

UAE Security Regulations and Standards

UAE Information Assurance Regulation (UAE IAR)

The UAE Information Assurance Regulation v1.1 provides requirements for raising the minimum level of information security across all relevant entities in the UAE.

The UAE IAR controls are mapped with controls of ISO/IEC 27001 as well as several other standards.

National Cyber Risk Management Framework (NCRMF)

NCRMF is a framework for identifying, assessing, treatment planning, monitoring and communicating critical National- and Sector-level cyber security risks. CII Sectors and their entities utilize the framework to provide Sector specific risk management plans.

Dubai Information Security Regulation (DISR)

Dubai ISR v2 provides information security specific controls and is closely aligned with other international information security related standards, reflecting Dubai Government acknowledgement and recognition of the information security best practices stated therein. The Dubai ISR v2 also includes distinctive items reflecting specific requirements within the context of The Dubai Government.

Abu Dhabi Information Security Standards (ADISS)

ADISS are issued in support of the Abu Dhabi Information Security Policy, and aims at providing protection to the information assets owned and managed by the government of Abu Dhabi. ADISS v2 seeks to support the government’s vision of delivering services that are effective, efficient and which add tangible value.

Abu Dhabi Healthcare Information and Cyber Security Standard (ADHICS)

ADHICS encompasses 11 information security domains composed of specific controls aimed at protecting and/or securing personal health information. ADHICS is applicable to all DOH-regulated entities and services within the Emirate of Abu Dhabi: healthcare/medical facilities, healthcare professionals and support staff who have access to health, diagnostic, and personal information, diagnostic labs, pharmacies and insurance providers.

Abu Dhabi Cloud Data Protection, Security and Technology Standards (ADCMS)

The Abu Dhabi Cloud Market Standards provide controls across nine interrelated and mutually supportive domains. ADCMS is intended to direct Abu Dhabi Government entities and other stakeholders in areas requiring focus for mitigating risks associated with cloud computing and usage of cloud services.

KSA Security Regulations and Standards

SAMA Cybersecurity Framework

SAMA Cybersecurity Framework

Enables Financial Institutions regulated by Saudi Central Bank to effectively identify and address risks related to cyber security.

Obtain mandatory certifications and skills.
LEARN MORE

NCA Essential Cybersecurity Controls

NCA Essential Cybersecurity Controls

NCA developed the ECC to set the minimum cybersecurity requirements for national organizations in scope. 
Compliance with ECC is a mandatory pre-requisite for CSTs and CSPs.

Obtain mandatory certifications and skills.
LEARN MORE

NCA Cloud Cybersecurity Controls

NCA Cloud Cybersecurity Controls

NCA developed the CCC to set the minimum cybersecurity requirements for CSTs and CSPs. 

Obtain mandatory certifications and skills.
LEARN MORE

International Security Standards and Regulations

ISO/IEC 27001

ISO/IEC 27001 sets out the requirements for an information security management system (ISMS). An ISMS includes people, processes and IT systems by applying a risk management process, and is a systematic approach to managing sensitive company information so that it remains secure. Organizations can obtain certification against this standard.

ISO/IEC 27002

ISO/IEC 27002 provides a reference set of generic controls for information security, cybersecurity and privacy protection including implementation guidance. These guidelines help an organization to build confidence in their inter-organizational activities and implement a suitable set of controls, including policies, processes, organizational structures and software and hardware functions.

ISO/IEC 27005

ISO/IEC 27005 is a guide for information security risk management which complies with the concepts, models, and general processes specified in ISO/IEC 27001.

ISO/IEC 27032

ISO/IEC 27032 sets out the baseline security practices for stakeholders in the Cyberspace, and provides guidance for improving the state of Cybersecurity drawing out the unique aspects of that activity and its dependencies on other security domains, in particular: information security, network security, internet security, and critical information infrastructure protection.

ISO/IEC 27034

ISO/IEC 27034 is an international standard that provides guidelines for integrating security into the software development lifecycle. It offers a comprehensive framework to help organizations identify, manage, and mitigate security risks throughout the development and deployment of software applications.

By aligning software development practices with robust security measures, ISO/IEC 27034 aims to enhance the confidentiality, integrity, and availability of software systems, ensuring that they are resilient against evolving cyber threats. 

ISO/IEC 27035

ISO/IEC 27035 provides guidance on aspects of information security incident management, specifically on the investigation of, and preparation to investigate, information security incidents.

ISO 31000

ISO 31000 provides principles, a framework and a process for managing risk. It can be used by any organization regardless of its size, activity or sector. Using ISO 31000 can help organizations increase the likelihood of achieving objectives, improve the identification of opportunities and threats and effectively allocate and use resources for risk treatment. 

ISO 22301

ISO 22301 provides requirements for a best-practice business continuity management system (BCMS). A BCMS is a framework for organizations to update, control and deploy an effective BCM programme that helps them prepare for, respond to and recover from disruptive incidents. Implementing a BCMS includes the development of business continuity plans, taking into account organizational contingencies and capabilities, as well as the organisation’s individual business needs. Organizations can obtain certification against this standard.

ISO 37301

ISO 37301 specifies requirements and provides guidelines for establishing, developing, implementing, evaluating, maintaining and improving a compliance management system (CMS). A CMS aims to help organizations establish the necessary processes that allow them to comply with relevant laws, industry codes, standards of good corporate governance, and community expectations. Organizations can obtain certification against this standard.

Implementing ISO/IEC 27001 and National Security Regulations

Looking to efficiently adopt information security standards and regulations in one fell swoop? We highly recommend tuning in to our informative webinar recording. We extend our sincere gratitude to our partner PECB for their generous support in spreading awareness of our webinar beyond the PECB community, completely free of charge.

error: Content is protected !!