Decoding NESA
Decoding NESA
Decoding NESA
implement information security controls around appropriate risk treatment actions, and selecting the
appropriate controls to manage the risks;
information infrastructures supporting critical national
services.. These standards are a crucial part of the NCSS IMPLEMENTING and operating security controls to
(National Cyber Security Strategy) and are the minimum manage information security risks in the context of
requirements for entities to assimilate into the Sector the entitys or sectors overall business risks;
and National platforms.
MONITORING and reviewing the performance and
It is mandatory for all UAE government entities and effectiveness of the information security processes
other entities identified as critical by NESA to apply its and its controls.
requirements to the usage, processing, storage, and
ENSURING continual improvement based on
transmission of information, both in physical &
objective measurements.
electronic form. Compliance with NESA can help
entities in the following ways: Performing a risk management policy is a key step
towards the implementation of the UAE IA Standard,
Strengthen security of critical information
as it helps entities identify, prioritize, and measure the
infrastructure and reduce corresponding risk levels;
effectiveness of the security controls that are needed
Detect, respond, and recover from significant cyber to treat identified entity-specific risks. Critical entities
security threat incidents and reduce its impact to the implementing this standard will have to refer to the
society and economy of the UAE; National Cyber Risk Management Framework
(NCRMF), which highlights the National Risk
Increase cyber security awareness among its
Management approach and process of Critical
workforce and the capability of the nation;
Information Infrastructure.
Foster collaboration at sector and national level.
The security controls contained in NESA UAE IA
The UAE IA Standards provides management and Standard are developed to treat a typical entity risk
technical information security controls for entities to profile and are grouped in four priority levels based on
establish, implement, maintain, and continuously their relative impact to:
improve information assurance. It promotes a life
cycle approach for establishing, implementing,
Understanding UAEs Information Security Standard PALADION NETWORKS 3
1. Mitigate common threats and begin implementing these Standards with P1 security
controls given their highest relative impact in
2. Build foundational capabilities.
protecting against critical threats and building
foundational Information Assurance capabilities.
Priority Level Number of Controls The overall set of security controls that are Always
Applicable and those security controls that have been
P1 39
determined as being applicable based on the risk
P2 69 assessment are mandatory for the entity to
While this common risk profile including the above 188 meeting compliance of the NESA UAE IA Standard:
However, there are 35 mandatory controls out of the NESA will consolidate maturity-based self-
above 188 controls that are referred as Always assessments by stakeholders to generate entity,
Applicable in the standard, as these represents sector and national views. This may be more targeted
requirements for instituting foundational IA for diagnostic analysis of critical entities.
capabilities within an entity. Given their foundational
Auditing
role, the Always Applicable security controls needs
to be implemented by each relevant entity regardless When appropriate, NESA may audit stakeholders by
of its risk assessment outcomes. Prior to performing requesting specific evidence in support of self-
the risk assessment process, an entity should assessment reports.
consider all security controls to be applicable.
Testing
While all the applicable security controls across the
four priority levels are mandatory for critical entities
implementing these Standards, they are required to
Understanding UAEs Information Security Standard PALADION NETWORKS 4
When appropriate, NESA can commission tests of evaluations of information security controls on
information security measures in place at applicable services.
stakeholders.
3) Awareness and Training
National Security Intervention
An awareness and training program shall be
In extreme cases, NESA may directly intervene when implemented to inform entities of risks associated
an entity's activities are consistently leading to with their activities and to ensure that entities are
unacceptable national security risks. adequately trained to carry out their assigned
information security responsibilities.
Determining the correct compliance check for the
organization depends on the amount of security 4) Human Resource Security
threat it poses to the UAE information infrastructure.
Human resources security requirements and security
This depends on the type of security controls currently
responsibilities shall be addressed prior to
employed by the organization, as well as the type of
employment, during employment, and after
sector in which it operates that will inform the extent
termination or change of employment.
to which NESA and the sectors regulator will be
working with the organization. 5) Compliance
2) Information Security Risk Management Physical and environmental security measures shall
be implemented to ensure critical or sensitive
An information security risk management process
information systems are physically protected from
shall be implemented to conduct risk assessments,
unauthorized access, damage and interference, and all
statements of applicability, security testing, and
Understanding UAEs Information Security Standard PALADION NETWORKS 5
equipments are protected from physical and ensure that a cryptographic control policy is in place
environmental threats. for maintaining security in development and support
processes, as well as to manage technical
3) Operations Management
vulnerabilities.
Operational procedures and responsibilities shall be
8) Information Security Incident Management
developed to ensure an adequate level of information
security is achieved. In addition, backup, media Information security events and weaknesses shall be
handling, e-services security, and monitoring reported and evidence of security incidents shall be
capabilities shall be addressed to ensure protection collected and analyzed to ensure that information
against malicious code and spyware. security events and weaknesses are properly
communicated and security incidents are adequately
4) Communications Security
managed.
Network security and information sharing shall be
9) Information Security Continuity Management
addressed to ensure protection of information in
transit. A business continuity management process shall be
implemented to counteract interruptions to business
5) Access Controls
activities, in addition to protecting critical business
Access control processes shall be developed to control processes from information system failures.
access to information, manage user access, and
Paladion Control Implementation Advisory
control access to internal and external network
services, operating systems, applications, and to apply All of the aforementioned security controls should be
appropriate protection when using mobile computing implemented through adequate planning by
and teleworking services. addressing 5 critical parameters of any management
system:
6) Third Party Security
1. Organizational structure implementation;
Third-party security shall be managed to ensure third
parties implement and maintain the appropriate level 2. Manpower recruitment;
of information security and service delivery. Also, all
3. Information security processes implementation;
information that is stored, processed, and retrieved,
including via cloud services, will be ensure that it is 4. Infrastructure and application implementation;
secure.
5. Awareness and Training requirements.
7) Information Systems Acquisition Development and
Paladion has expertise in enabling organizations to
Maintenance meet NESA compliance standards. We propose a
An information systems acquisition, development, detailed implementation of the NESA UAE IA Standard
and maintenance process shall be implemented to in a phased wise manner as shown below.
prevent unauthorized modification or misuse of
information in applications. This will be carried out to
Understanding UAEs Information Security Standard PALADION NETWORKS 6
Phase 1: Critical Service Identification- This will Phase 3: Control Development & Implementation-
involve detailed project planning, high level This will involve comprehensive advisory by Paladion
understanding of the organization by Paladion Subject Subject Matter Expert in development &
Matter Experts, identification of critical business implementation of NESA security controls. This will be
services whose loss in CIA can lead to direct sectoral approached in a sequential manner starting from the
and national level. Finally, mapping the underlying P1 controls. Paladion Subject Matter Experts will first
information infrastructure (in both electronic and assist in the development & implementation of P1, P2,
physical form) to the critical business services is also P3, and P4 security controls in a sequential manner.
included. Implementation support will also include a
Phase 2
Phase 3
Phase 4
comprehensive security awareness program covering Paladion is privileged to offer consulting services to
all the security controls. help organizations meet compliance regulations and
laws. With over 15 years of experience in the
Phase 4: Control Effectiveness Check & Audit- This
information security industry, we know first-hand the
will involve one full round of performance evaluation
challenges in protecting your information assets.
of the implemented P1, P2, P3, and P4 security
controls, one full round of pre-compliance audit to
check the maturity level of entitys security posture,
and assistance provided to the organization in
meeting compliance to NESA requirements during the
compliance audit.
ABOUT PALADION
Paladion Networks is a specialized partner for information risk management providing
end-to-end services and solutions in the US,Europe,Asia and the Middle East. Paladion is
rated and has been recognized and awarded by Gartner, Asian Banker and Red
Herring,amongst others.
For over 15 years, Paladion has been actively managing information risks for over 700
customers. Paladion provides a complete spectrum of information risk management
comprising of security assurance, compliance, governance, monitoring, security analytics
and security management services to large and medium-sized organizations. Paladion is
also actively involved in several information risk management research forums and has
authored many books on the same. With a staff of over 800 dedicated security experts,
Paladion has 6 Security Operations Centers (SOCs) across the world.
.........................................................................................................................................................................
Head Office: Bangalore: Shilpa Vidya, 49 1st Main, 3rd Phase, JP Nagar, Bangalore- 560078
Phone : +91-80-42543444, Fax : +91-80-41208929