The National Information Assurance Framework
The National Information Assurance Framework
The National Information Assurance Framework
ASSURANCE FRAMEWORK
1 INTRODUCTION 3
1.1 Purpose of the Document 5
1.2 Principles of Information Assurance 6
1.2.1 Confidentiality 7
1.2.2 Integrity 7
1.2.3 Availability 7
1.2.4 Authentication 7
1.2.5 Non-repudiation 7
1.3 Limitations of Existing IA Frameworks 8
1.4 Sector and National IA Context 10
1.5 Applicability of UAE NIAF 12
3 ENTITY CONTEXT 21
3.1 Risk Assessment 24
3.1.1 Asset Inventory 24
3.1.2 Business Impact Analysis 24
3.1.3 Vulnerability Assessment 24
3.2 Integrated Security 25
3.2.1 Logical Security 25
3.2.2 Physical Security 25
3.2.3 Personnel Security 25
3.3 Incident Management 26
3.3.1 Situational Awareness 26
3.3.2 Entity Incident Response 26
3.3.3 Escalation to Sector and National Levels 26
3.4 Business Continuity 27
3.4.1 Continuity Planning 27
3.4.2 Disaster Recovery 27
3.4.3 Return to Steady State 27
4 SECTOR AND NATIONAL CONTEXTS 29
4.1 Sector/National Risk Assessment 33
4.2 UAE National Cybersecurity Capabilities 34
4.3 Sector and National Situational Awareness 35
4.4 Continuity of Critical National Services 36
5 INFORMATION SHARING 39
6 UAE STANDARDS 45
6.1 Common Standards 48
6.2 Sector-specific Standards 49
6.3 Service and Product-specific Standards 50
6.4 Certification 51
6.5 Information Assurance Technical Forums 53
7 NATIONAL IA GOVERNANCE 55
7.1 Stakeholder Interaction with NESA 58
7.2 Compliance Monitoring 59
ANNEXES 61
Annex 1 NIAF Supporting Instruments 63
Annex 2 Key Definitions 64
Annex 3 Acronyms 66
FOREWORD
As cyber threats such as hacktivism and cybercrime evolve, so must our efforts to
defend against them in a coordinated and systematic manner. To align and direct national
cybersecurity efforts, the UAE Government created the National Electronic Security
Authority (NESA) to improve our national cybersecurity, and protect our national
information and communications infrastructure. As part of this mandate, NESA
developed the UAE Information Assurance (IA) Standards to provide requirements for
raising the minimum level of IA across all relevant entities in the UAE.
The adoption of these Standards by UAE entities will sustain the benefits of a trusted
digital environment for businesses and individuals across the nation. As cybersecurity
is the shared responsibility of every organization and individual, collaboration and
partnerships between the Government and private sector organizations are key to
success. I am confident that our combined efforts will make great strides in achieving
the UAE’s national cybersecurity objectives and allow our nation’s interests to thrive.
1
HAPTER 01
INTRODUCTION
National Information Assurance Framework | Chapter 01 | Introduction
1.1
PURPOSE OF THE DOCUMENT
As the custodian of a safe and secure The UAE National Information Assurance
nation, the UAE government aims to Framework (NIAF) described herein
address cybersecurity challenges. The supports the implementation of the NCSS.
goal is to ensure the security of national The purpose of this NIAF is to outline for
cyberspace in order to foster trust stakeholders the NIAF components that
and confidence in the UAE’s digital and aim to accomplish two core objectives:
information environment and to promote
economic growth. In accordance with
the Federal Law No. 3 of 2012 (and as
• Raise the minimum
amended) the UAE government has
cybersecurity levels across all
therefore created the National Electronic
UAE entities by helping
Security Authority (NESA) with the
to build a common
mission to enhance the UAE’s national
understanding of Information
security by improving the protection
Assurance (IA) requirements at
of its Information and Communication
the entity level
Technologies (ICT) infrastructure through
world-class technical and regulatory
• Raise information
capabilities, human capital and increasing
infrastructure security
public awareness.
levels that support critical
national services through
The UAE National Cyber Security Strategy
the integration of individual
(NCSS), developed and governed by NESA,
entities into a sector and
sets the course for the government’s
national context
ongoing commitment to protect national
cyberspace. It outlines the strategic areas
of focus required to sustain national
cybersecurity, and the specific objectives
within each focus area and a roadmap to
achieve these objectives.
5
National Information Assurance Framework | Chapter 01 | Introduction
1.2
PRINCIPLES OF INFORMATION ASSURANCE
6
National Information Assurance Framework | Chapter 01 | Introduction
1.2.1 CONFIDENTIALITY
Confidentiality ensures that information is accessible only to those authorized to have
access, and that it is not made available or disclosed to unauthorized entities. It requires
those who hold, process or transmit information to be diligent in preventing intentional
or accidental security breaches.
1.2.2 INTEGRITY
Integrity ensures that changes to information cannot be executed without detection.
1.2.3 AVAILABILITY
Availability ensures that an information asset is accessible and usable when needed by
an authorized entity. In this context, information assets include data, systems, facilities,
networks, and computers.
1.2.4 AUTHENTICATION
Authentication is the process of determining whether the claim of identity made by an
entity is true or not. During authentication, an entity presents its credentials, which are
then validated against stored credential information.
1.2.5 NON-REPUDIATION
Non-repudiation provides the proof of origin of the data. Non-repudiation guarantees
that the sender of a message cannot later deny having sent the communication and
that the recipient cannot deny having received the communication.
7
National Information Assurance Framework | Chapter 01 | Introduction
1.3
LIMITATIONS OF EXISTING IA FRAMEWORKS
There are many publicly available Information Assurance (or information security)
frameworks, most of which are designed for implementation within a single entity. While
many frameworks include provisions for direct network connectivity between certain
actors (e.g. purchasing entity and supplier), most do not take into account the IA issues
that emerge from the systemic interconnectivity of modern organizations at the sector
and national levels.
For example, many entities in the UAE have existing IA (or information security)
capabilities and internal frameworks. These IA frameworks are based upon a wide range
of best practices and have been tailored to meet the needs of each individual entity or
specific group of entities, often in a specifically defined context. This approach neither
produces comparable results across different entities nor creates a sense of sector
or national IA community where all entities across the various sectors work together
to address similar IA challenges. This potentially results in overlaps in capabilities that
needlessly consume valuable resources and, perhaps more dangerously, could result in
security gaps that no single entity or specific group within a sector is able to address in
disconnection with others.
8
National Information Assurance Framework | Chapter 01 | Introduction
9
National Information Assurance Framework | Chapter 01 | Introduction
1.4
SECTOR AND NATIONAL IA CONTEXT
To help overcome these limitations the UAE NIAF addresses cybersecurity topics on
the entity, sector, and national levels. It outlines a national policy reference that directs
and guides the development and implementation of entities’ internal IA frameworks
and controls.
NATIONAL LEVEL
NE
NE
RE
AT
&W
ITY
SECTOR LEVEL
EAR
CIAL
S
IC
GA
TR
NUCL
N
&
EC
FINA
ICT
OIL
EL
N
1
OPERATOR N
TOR N
1
R1
ION
ION
N
OPERATOR
1
ENTITY LEVEL
RATO
OR
ITUT
OR
YN
UT
Y1
AT
OPERA
AT
TIT
TIT
TIT
INST
ER
ER
OPE
INS
EN
EN
OP
OP
10
National Information Assurance Framework | Chapter 01 | Introduction
It establishes a minimum IA capability for all UAE entities, while outlining the value-
added mechanisms for each entity to integrate into a sector and into national IA
context with other stakeholders.
)
ON
ICE
I
AT
T R
EN NIST
I
SP OR
RN M
NC
VE IC AD
IC A
M
HEALTH
L
TRAN
UB
ME
(P
GO
E
sector IA context.
N
TY 1
Y1
YN
N
Y1
OPERAT
ITY
TIT
TIT
TIT
OPER
ENTI
T
N
EN
EN
N
N
E
IA context.
Eliminating the silos created by the single-entity approach to IA reduces the risk of
gaps, overlaps, and duplicated efforts between individual actors, thereby creating a
stronger, integrated national IA context that is better prepared to protect the country
from cyber threats.
11
National Information Assurance Framework | Chapter 01 | Introduction
1.5
APPLICABILITY OF UAE NIAF
Compliance with NIAF will be mandatory for all UAE government entities and other
entities identified as critical1 by NESA in other sectors. For all other UAE entities, NESA
highly recommends following the guidelines on a voluntary basis, in order to participate
in raising the nation’s minimum security levels.
1
The process for NESA to designate an entity as “critical” is outlined in the UAE Critical Information Infrastructure
Protection (CIIP) Policy produced by NESA.
12
National Information Assurance Framework | Chapter 01 | Introduction
13
HAPTER 02
UAE NATIONAL
INFORMATION
ASSURANCE
FRAMEWORK
National Information Assurance Framework | Chapter 02 | UAE National Information Assurance Framework
2.0
UAE NATIONAL INFORMATION
ASSURANCE FRAMEWORK
NIAF outlines the entity, sector, and national contexts of IA through a life cycle-based
approach supported by a set of UAE standards, effective information-sharing capability
and a comprehensive governance program governed by NESA.
RITY
SECU S
SITU ECT
R
BE S AT O
IO R/
CY ITIE NA
IL
NA WA
CA AL
L
B
TI RENE
N
PA
URITY INC
IO
ON
SEC IDE
ED
NAT
N
AL
AT
T
R
MA
UAE
EG
NA
INT
SS
GEMENT
Information
Assurance
AL
RIS K
IT Y
SE C RITIC
AS
NU
S
SE
IC E
SM
TI
N
IMP
EN CO
NA AN
T SS
RV
AL O F
B U SI N E
AC
TI
EN
O A
Y
T
AL TIT Y T
IT
CO N TEX
N
NU
LY TI IO
N
SI N
S CO T
NA
SE T
CT EX
OR
& NATIONAL CONT
IN F G
ORMA
TIO N S H A RIN
UAE STA ARDS
ND
NAT E
IONAL
IA GOVERNANC
17
National Information Assurance Framework | Chapter 02 | UAE National Information Assurance Framework
IOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
IOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
ENTITY CONTEXT
IOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
Risk-based approach to identifying and protecting key information assets within
an entity.
OIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
SECTOR AND NATIONAL CONTEXT
OIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
Value-added components that establish the links from an individual entity to the sector
OIOIOIOIOIOIOIOIOIOIOIOIOIOOIOIOIO
and national context.
IOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
INFORMATION SHARING
IOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
Primary mechanism for entities to effectively exchange information with external actors.
IOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
UAE STANDARDS
Common, sector-specific and product/service-specific standards applicable to specific
IOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
entities, sectors, or across all stakeholders.
IOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
NATIONAL IA GOVERNANCE
IOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
Management elements needed to monitor progress and successfully implement the
national IA framework.
IOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
Through this framework, NESA aims to ensure a minimum level of IA capabilities within
OIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
all UAE entities and establish a common approach that allows them to interact with each
other and approach IA with a sector and national perspective.
OIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
OIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
OIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
OIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
OIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
OIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
OIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
OIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
18
OIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
IOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
IOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
National Information Assurance Framework | Chapter 02 | UAE National Information Assurance Framework
OIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
OIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
OIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
OOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
IOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
OIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOI
IOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
IOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
OIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOI
IOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
IOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
OIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOI
IOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
IOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
OIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
IOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
IOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
OIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
IOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
IOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
OIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
IOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
IOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
OIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOI
IOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
OIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOI
OIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOI
IOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
IOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
OIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOI
IOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
IOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
OIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOI
IOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
IOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
OIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOI
IOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
IOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
OIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOI
IOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
IOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
OIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOI
IOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
IOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
OIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
IOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
IOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
OIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
IOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
OIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOI
OIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
IOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
OIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOI
OIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
IOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
OIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOI
OIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
IOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
OIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOI
OIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
IOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOI
OIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOI
OIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
OIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOI
OIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO
OIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOI
OIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIO 19
OIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOIOI
HAPTER 03
ENTITY CONTEXT
National Information Assurance Framework | Chapter 03 | Entity Context
3.0
ENTITY CONTEXT
Identification of assets,
risk areas, threats,
Prioritize risk areas
RISK vulnerability, in-place
(vulnerability points
ASSESSMENT security controls,
overall impacts, and and impacts)
prioritization
Resource protection
(logical, physical, Limit
INTEGRATED personnel) against
RS
ECU
RITY S
SITU ECT vulnerability
BE S
SECURITY
AT O
IO R/
CY ITIE
internal/external threats
NA
IL
NA WA
CA AL
LA
B
TI RENE
N
PA
URITY INC
IO
ON
SEC IDE
ED
NAT
N
AL
AT
FEEDBACK
T
R
MA
UAE
EG
NA
INT
SS
GEMENT
Information
Assurance
CAL
RI S K
ITY
AS
RITI
NU
S
SE
IC E
TI
SM
IMP
N
S
O
AL O F C
EN
NA AN
C
T SS
RV
B U S I NE
AC
TI
SE
EN
O A
Y
T
AL TIT Y T
IT
CO N T E X
N
U
IN
Management of activities,
LY
N T TI O
N
SI
S CO
NA
SE T
CT EX
OR
INF
& NATIO NAL CO NT
OR M A
TI O N S H A R I N
G communications, and Limit
NAT
UAE ST
IO N AL
ANDARDS
IA GOVERNAN
CE
INCIDENT command/control lines impacts
MANAGEMENT during and after
cyber-related incidents
Development of plans
and technologies to
ensure continuity of Limit impacts in
BUSINESS extreme conditions
business processes and
CONTINUITY activities against (crisis)
identified risks during
emergency or crisis
23
National Information Assurance Framework | Chapter 03 | Entity Context
3.1
RISK ASSESSMENT
Risk assessment is the central component of an effective life cycle approach to IA,
helping to identify the highest risk areas and assisting IA (or information security)
managers with the prioritizing and allocation of resources to efficiently reduce overall
risk. This requires a systematic and repeatable approach for assessing the posture of
cybersecurity systems and networks, enabling expenditures on controls to be balanced
against the potential harm of security failures.
The risk assessment methodology outlined here ensures a uniform approach across
all entities and produces comparable results, while still offering each entity the
freedom needed to leverage its existing processes and meet its own business needs.
The National Cyber Security Risk Management Framework provides further detailed
description and guidance to critical entities on the appropriate approach and
methodology to conduct risk assessment.
24
National Information Assurance Framework | Chapter 03 | Entity Context
3.2
INTEGRATED SECURITY
Based on the results of the risk assessment, the individual entities must document
how identified risks will be mitigated. As a minimum, this includes clearly identifying an
integrated set of logical, physical, and personnel security controls to be implemented
and the underlying rationale for a control selection based on a cost-benefit analysis.
25
National Information Assurance Framework | Chapter 03 | Entity Context
3.3
INCIDENT MANAGEMENT
To minimize the impact of cybersecurity incidents, each entity must have the capacity
to monitor its own information assets, identify and manage cybersecurity incidents,
and escalate incidents to a sector or national level taking into account and utilizing as
appropriate the National Incident Management Capability established by NESA.
The national framework for cybersecurity incident management, as well as other NESA’s
issuances, define these minimum capabilities to be put in place by the critical entities.
26
National Information Assurance Framework | Chapter 03 | Entity Context
3.4
BUSINESS CONTINUITY
As a result of the business impact analysis, each entity should identify which information
assets are the most crucial to the normal functioning of business. Each entity must
ensure that these critical business functions will be available to customers, suppliers,
and other actors as needed, including during significant cybersecurity events or other
incidents (e.g. natural disasters) that might impact availability of these critical information
assets. Business continuity is not only implemented at the time of a disaster but requires
the performance of daily activities to maintain service, consistency, and recoverability.
27
HAPTER 04
SECTOR AND NATIONAL
CONTEXTS
National Information Assurance Framework | Chapter 04 | Sector and National Contexts
4.0
SECTOR AND NATIONAL CONTEXTS
SECTOR/ NATIONAL
RISK ASSESSMENT RISK
ASSESSMENT
RS
ECU
RITY S
SITU ECT
UAE NATIONAL
BE S
CY ITIE
IL
AT O
IO R/
NA CYBERSECURITY INTEGRATED
NA WA
CA AL
B
LA
TI RENE
N
CAPABILITIES SECURITY
PA
URITY INC
IO
ON
SEC IDE
ED
NAT
N
AL
AT
T
R
MA
UAE
EG
NA
INT
SS
GEMENT
Information
Assurance
CAL
RIS K
IT Y
AS
RITI
NU
S
SE
ICE
TI
SM
IM P
N
S
CO
AL O F C
EN
NA AN
T SS
RV
B U SI N E
AC
TI
SE
EN
O A
Y
T
AL TIT Y T
IT
CO N T E X
N
U
LY IN
N T TI O SECTOR /NATIONAL
N
SI
S CO
NA
SE
CT
OR
& NATIO NAL CO N T EX
T SITUATIONAL INCIDENT
INF
OR M A
T IO N SH A R IN
G AWARENESS MANAGEMENT
UAE ST
ANDARDS
NAT
IO N AL CE
IA GOVERNAN
CONTINUITY OF
CRITICAL NATIONAL BUSINESS
SERVICES CONTINUITY
31
National Information Assurance Framework | Chapter 04 | Sector and National Contexts
32
National Information Assurance Framework | Chapter 04 | Sector and National Contexts
4.1
SECTOR/NATIONAL RISK ASSESSMENT
The UAE Critical Information Infrastructure Protection (CIIP) Policy outlines the national
risk assessment methodology detailed in the National Risk Management Framework,
which ensures that a uniform approach is applied across all entities to produce
comparable results, while offering each entity the freedom needed to leverage its
existing processes and meet its own business needs. This includes:
2
Critical national services are defined in the UAE Critical Information Infrastructure Protection (CIIP) Policy.
33
National Information Assurance Framework | Chapter 04 | Sector and National Contexts
4.2
UAE NATIONAL CYBERSECURITY CAPABILITIES
When deemed necessary, NESA will support individual entities in implementing the
integrated approach to security by providing access to national-level cybersecurity
capabilities, such as:
• Access to international
stakeholders and capabilities
Based upon sector and national risk assessment results, NESA will determine where the
application of a specific national cybersecurity capability is needed.
34
National Information Assurance Framework | Chapter 04 | Sector and National Contexts
4.3
SECTOR AND NATIONAL SITUATIONAL
AWARENESS
While managing their own internal incidents, individual entities must also be aware of
activities within the environment that surrounds them and adequately share information
with other stakeholders before, during, and after significant incidents occur.
The national framework for cybersecurity incident management will provide guidance to
individual entities on how to evaluate the impact of a breach of confidentiality, integrity,
or availability, and how to escalate such a situation to the sector and national level.
35
National Information Assurance Framework | Chapter 04 | Sector and National Contexts
4.4
CONTINUITY OF CRITICAL NATIONAL SERVICES
In addition to assuring the continuity of services critical to its own operations, each
individual entity is responsible for ensuring the continuity of critical national services
that depend on its information infrastructure. In the normal process of business
continuity planning within each entity, national requirements must therefore be
considered when outlining the parameters used to define backup, short-term and
long-term disaster/incident recovery and business resumption capabilities.
NESA, in collaboration with sector regulators and key relevant stakeholders, will provide
guidance on the continuity of critical national services, including:
36
National Information Assurance Framework | Chapter 04 | Sector and National Contexts
37
HAPTER 05
INFORMATION SHARING
National Information Assurance Framework | Chapter 05 | Information Sharing
5.0
INFORMATION SHARING
The National Information-Sharing Policy, as well as other NESA issuances, will detail the
requirements for the national information-sharing capability that includes:
PARTICIPATING ENTITIES
Interaction will occur at three layers of interaction; entity, sector, and national. This
model provides a manageable information-sharing structure that facilitates the cross-
entity and cross-sector exchange of information on cybersecurity topics.
SERVICES PROVIDED
Multiple information-sharing services will be supported by facilities including but not
limited to filtered warning, advice brokering, and incident reporting.
KEY FEATURES
To improve the the information-sharing model, a number of features will be utilized
such as secure platform, including anonymity and owner control of information rights.
OPERATING MODEL
This includes delineation of the functional and technical requirements.
41
National Information Assurance Framework | Chapter 05 | Information Sharing
OPERATOR X
ENTITY X
ENTITY X
ELECTR
& WAT
INSTITUTION X OIL & GAS
INSTITUTION X
FINANCIAL
OPERATOR X
NES
NUCLEAR
ENTITY X DEFENSE
INTELLIGENCE
ENTITY X
ENTITY X
42
National Information Assurance Framework | Chapter 05 | Information Sharing
OPERATOR X
OPERATOR X
OPERATOR X
RICITY ENTITY X
TER
TRANSPORT
ENTITY X
INTERNATIONAL
PROVIDER X
SA
HEALTH
PROVIDER X
OPERATOR X
ICT
GOVERNMENT
(PUBLIC ADMINISTRATION) OPERATOR X
NATIONAL LEVEL
SECTOR LEVEL
ENTITY X ENTITY X
ENTITY LEVEL
43
HAPTER 06
UAE STANDARDS
National Information Assurance Framework | Chapter 06 | UAE Standards
6.0
UAE STANDARDS
UAE Standards raise the IA capabilities within all entities to a common minimum
required level and to establish the components required to unite these actors within a
sector and national context.
NESA, in collaboration with sector regulators and key stakeholders, will review these
standards periodically, or as needed, and validate their continued relevance.
47
National Information Assurance Framework | Chapter 06 | UAE Standards
6.1
COMMON STANDARDS
All UAE government and other entities identified as critical3 by NESA in other sectors
must demonstrate compliance with the Common Standards, although certification by
these standards may not be required.
3
The process for NESA to designate an entity as “critical” is outlined in the UAE CIIP Policy.
48
National Information Assurance Framework | Chapter 06 | UAE Standards
6.2
SECTOR-SPECIFIC STANDARDS
Every sector has unique characteristics and operational complexities that may not
apply to other sectors. As a result, the types of cybersecurity threats and vulnerabilities
entities must manage in their specific sectors can vary greatly. For example, Industrial
Control Systems (ICS) used in the electricity sector present cybersecurity challenges
that are not relevant for the financial sector.
Each Sector-specific Standard will outline how NESA, respective regulators and sector-
specific entities will collaborate to implement such measures.
49
National Information Assurance Framework | Chapter 06 | UAE Standards
6.3
SERVICE AND PRODUCT-SPECIFIC STANDARDS
When required, NESA will develop tailored standards for specific services and products.
Based upon interaction with relevant stakeholders, NESA will determine when a
service or product-specific standard is needed, and the type and level of security
controls required. Given the ad-hoc nature of these types of standards, the scope and
applicability of each will be defined within the standard itself.
50
National Information Assurance Framework | Chapter 06 | UAE Standards
6.4
CERTIFICATION
51
National Information Assurance Framework | Chapter 06 | UAE Standards
Evaluate
• Design and execution of products, infra and services
ASSESSMENT security plan through testing, risk assessment, etc.
• Knowledge, skill of people, and organizations
The UAE Certification Against UAE IA Standards Policy outlines the detailed
activities along each step of the certification process.
52
National Information Assurance Framework | Chapter 06 | UAE Standards
6.5
INFORMATION ASSURANCE TECHNICAL FORUMS
Members of the IATF would include industry leaders, vendors, academia, government
agencies, and technical experts for general review and discussion of the IA Standards
at various levels.
53
HAPTER 07
NATIONAL IA GOVERNANCE
National Information Assurance Framework | Chapter 07 | National IA Governance
7.0
NATIONAL IA GOVERNANCE
• Impact of organizations’
implementation of NIAF
overall (e.g. required Liaison
Officers (focal coordinators) in
stakeholder organization)
57
National Information Assurance Framework | Chapter 07 | National IA Governance
7.1
STAKEHOLDER INTERACTION WITH NESA
The UAE NIAF Governance Model defines the requirements for an individual to be
named as the Liaison Officer within each entity.
In cases where the entity intends to replace or temporary substitute its Liaison Office,
NESA shall be informed by the entity before such action is taken.
58
National Information Assurance Framework | Chapter 07 | National IA Governance
7.2
COMPLIANCE MONITORING
The figure below describes the four levels of monitoring that NESA will use to manage
stakeholder compliance across all aspects of NIAF:
NESA will consolidate When appropriate, When appropriate, In extreme cases, NESA may directly
maturity-based NESA may audit NESA can commission intervene when an entity's activities are
self assessments stakeholders by tests of information consistently leading to unacceptable
by stakeholders to requesting specific security measures in national security risks
generate entity, evidence in support place at stakeholders
sector and national of self-assessment
views. May be more reports
targeted for
diagnostic analysis of
“critical” entities
Level 4
Level 3
Level 2
Level 1
The UAE NIAF Governance Model will provide further details of the process under which
NESA may choose to elevate the level of compliance monitoring within a specific entity
or sector.
59
NNEXES
National Information Assurance Framework | Annex 1 | Annexes
ANNEX 1
NIAF SUPPORTING INSTRUMENTS
63
National Information Assurance Framework | Annex 2 | Annexes
ANNEX 2
KEY DEFINITIONS
TERM DEFINITION
Vital service, the disruption or destruction of which may have a
CRITICAL SERVICE 4 debilitating impact on the national security, economy, society, or any
combination of these.
64
National Information Assurance Framework | Annex 2 | Annexes
UAE COMMON
Custom UAE Standard that provides a model for establishing,
INFORMATION
implementing, operating, monitoring, reviewing, maintaining, and
ASSURANCE
improving an Information Security Management System (ISMS).
STANDARD
4
Detailed criteria used to define a critical service will be outlined in phase one of the UAE CIIP process.
5
Very similar to the definition by the U.S. Department Of Defence (DOD)
65
National Information Assurance Framework | Annex 3 | Annexes
ANNEX 3
ACRONYMS
IA INFORMATION ASSURANCE
66
66