- 1. Executive Summary
- 2. Saudi Arabia's Cyber Threat Landscape
- 3. NCA: National Cybersecurity Authority
- 4. Essential Cybersecurity Controls (ECC)
- 5. PDPL: Personal Data Protection Law
- 6. SAMA Cybersecurity Framework
- 7. Saudi CERT Operations
- 8. Critical Infrastructure Protection
- 9. Oil & Gas Cybersecurity
- 10. Vision 2030 & Digital Transformation Security
- 11. NEOM & Giga-Project Cybersecurity
- 12. Cloud Cybersecurity Controls (CCC)
- 13. CITC Telecommunications Security
- 14. Cybersecurity Talent Development
- 15. Compliance Frameworks & Certifications
- 16. Frequently Asked Questions
1. Executive Summary
Saudi Arabia has emerged as one of the most dynamic and strategically significant cybersecurity markets globally, driven by an unprecedented national transformation program that is simultaneously digitizing the Kingdom's economy, diversifying away from hydrocarbon dependence, and building entirely new cities, sectors, and digital ecosystems under Vision 2030. The establishment of the National Cybersecurity Authority (NCA) in 2017, reporting directly to the King, signaled the Kingdom's recognition that cybersecurity is a matter of national sovereignty and a prerequisite for successful economic transformation.
The Saudi cybersecurity market reached approximately SAR 33.4 billion (US$8.9 billion) in 2025, making it the largest cybersecurity market in the Middle East and Africa region by a significant margin. Year-over-year growth stands at 16.7%, the highest among G20 nations, driven by mandatory NCA compliance requirements, the scale of Vision 2030 digital infrastructure investments, heightened geopolitical threat landscape, PDPL enforcement commencing in full from September 2024, and the cybersecurity requirements of giga-projects including NEOM, Red Sea Global, Qiddiya, and ROSHN.
The regulatory landscape has matured rapidly since 2017. The NCA has issued a comprehensive suite of mandatory frameworks including the Essential Cybersecurity Controls (ECC), Cloud Cybersecurity Controls (CCC), Critical Systems Cybersecurity Controls (CSCC), Data Cybersecurity Controls (DCC), Operational Technology Cybersecurity Controls (OT-CC), and Telework Cybersecurity Controls (TCC). These are complemented by sector-specific requirements from SAMA (Saudi Central Bank) for financial services, CITC (Communications, Space and Technology Commission) for telecommunications, and the National Data Management Office (NDMO) for government data governance.
Saudi Arabia faces a cybersecurity threat landscape shaped by its geopolitical position, energy sector criticality, and rapid digitization. The devastating 2012 Shamoon attack on Saudi Aramco, the 2017 Triton/TRISIS attack on a petrochemical safety system, and ongoing targeting by state-sponsored groups from Iran and others have embedded cybersecurity as a national security imperative. The Kingdom is investing heavily in building sovereign cybersecurity capabilities while simultaneously addressing a talent shortage of 30,000-40,000 professionals through domestic education, international recruitment, and ambitious Saudization programs.
2. Saudi Arabia's Cyber Threat Landscape
2.1 Geopolitical Threat Actors
Saudi Arabia's geopolitical position, particularly its role as the world's largest oil exporter and a key US security partner in the Middle East, makes it a primary target for state-sponsored cyber operations. Iranian-attributed groups represent the most persistent threat, with APT33 (Elfin/Refined Kitten), APT34 (OilRig/Helix Kitten), APT35 (Charming Kitten), and MuddyWater conducting sustained campaigns against Saudi government, energy, defense, and financial targets. These groups employ sophisticated techniques including destructive malware (Shamoon variants, ZeroCleare), supply chain compromises targeting IT managed service providers serving Saudi organizations, and DNS hijacking campaigns redirecting Saudi government domains.
The NCA's Cyber Threat Intelligence Center reported a 43% increase in detected sophisticated cyber operations targeting Saudi entities between 2023 and 2025. Beyond Iranian threats, the Kingdom faces operations from other state-sponsored actors seeking economic intelligence, Houthi-affiliated hacktivist operations conducting DDoS attacks and website defacement, and sophisticated cybercriminal groups targeting Saudi Arabia's wealthy population and financial institutions. Saudi CERT handled over 8,500 cybersecurity incidents in 2024, with targeted intrusions (28%), ransomware (22%), and phishing campaigns (19%) as the leading incident categories.
2.2 Landmark Cyber Incidents
2012 -- Shamoon / Disttrack: The most destructive cyberattack against a single company in history. Iranian-attributed malware wiped data from 35,000 workstations at Saudi Aramco, replacing master boot records with an image of a burning American flag. Aramco was forced to operate on paper for weeks and replaced every compromised machine. The attack fundamentally transformed Saudi cybersecurity posture and directly led to the establishment of the NCA.
2016-2017 -- Shamoon 2.0: A second wave of Shamoon attacks targeted Saudi government agencies and private companies, with improved evasion capabilities and targeting of virtual desktop infrastructure. Multiple organizations were affected, though the impact was less severe due to improved defenses deployed after the original Shamoon attack.
2017 -- Triton / TRISIS: The first publicly known cyberattack specifically targeting industrial safety instrumented systems (SIS). The malware targeted Schneider Electric Triconex safety controllers at a Saudi petrochemical facility, attempting to disable safety systems that prevent catastrophic equipment failures and potentially lethal conditions. The attack was attributed to a Russian government-linked research institute and represented a dangerous escalation in OT cyber threats.
2019-2020 -- Sustained Campaigns: Multiple Iranian-attributed campaigns targeting Saudi government, energy, and financial sectors using ZeroCleare wiper malware, Dustman destructive malware, and extensive phishing infrastructure mimicking Saudi government e-services portals.
2.3 Threat Intelligence by Sector
| Sector | Primary Threat Actors | Common Attack Vectors | Risk Level |
|---|---|---|---|
| Oil & Gas / Energy | APT33, APT34, Shamoon operators | Destructive malware, OT targeting, supply chain | Critical |
| Government | APT35, MuddyWater, hacktivists | Spear-phishing, DNS hijacking, web defacement | Critical |
| Financial Services | Cybercrime syndicates, APT groups | BEC, credential theft, mobile banking trojans | High |
| Telecommunications | State-sponsored actors | Infrastructure compromise, SIM swap, surveillance | High |
| Defense & Aerospace | Multiple state-sponsored groups | Supply chain, insider threats, IP exfiltration | Critical |
| Healthcare | Ransomware groups | Ransomware, medical data theft, IoMT targeting | Medium-High |
| Giga-Projects (NEOM etc.) | State-sponsored, hacktivists | Construction IT targeting, smart city IoT, IP theft | High |
3. NCA: National Cybersecurity Authority
3.1 Establishment and Mandate
The National Cybersecurity Authority (NCA, Al-Hai'a al-Wataniya lil-Amn al-Sibrany), established by Royal Order in October 2017, serves as Saudi Arabia's supreme authority for cybersecurity. The NCA reports directly to the King through the President of State Security, reflecting the Kingdom's treatment of cybersecurity as a sovereign national security function. The NCA's mandate encompasses developing national cybersecurity strategy and policy, issuing mandatory cybersecurity regulations, frameworks, and controls, overseeing cybersecurity compliance across all government entities and critical national infrastructure, operating the national CERT and cyber threat intelligence capabilities, licensing and regulating cybersecurity service providers, and developing the national cybersecurity workforce.
3.2 NCA Regulatory Framework Suite
The NCA has issued a comprehensive and rapidly expanding suite of mandatory cybersecurity frameworks:
| Framework | Scope | Controls | Mandatory For |
|---|---|---|---|
| ECC (Essential Cybersecurity Controls) | General cybersecurity baseline | 114 controls across 5 domains | All government entities, CNI, entities serving government |
| CCC (Cloud Cybersecurity Controls) | Cloud computing security | 72 controls | Government entities and CNI using cloud |
| CSCC (Critical Systems Cybersecurity Controls) | Critical national systems | 105 controls | Operators of critical national systems |
| DCC (Data Cybersecurity Controls) | Data protection and governance | 58 controls | Government entities and data-intensive organizations |
| OT-CC (OT Cybersecurity Controls) | Operational technology / ICS | 86 controls | Critical infrastructure OT operators |
| TCC (Telework Cybersecurity Controls) | Remote work security | 42 controls | Government entities enabling telework |
3.3 NCA Licensing and Provider Regulation
The NCA requires all cybersecurity service providers operating in Saudi Arabia to obtain an NCA license. The licensing regime, implemented through the Cybersecurity Service Provider Regulation (CSPR), covers managed security service providers (MSSPs), penetration testing firms, cybersecurity consulting companies, incident response service providers, and security product distributors. License requirements include minimum staffing qualifications, Saudi employment quotas (Saudization), insurance coverage, and adherence to NCA service delivery standards. As of 2025, approximately 180 cybersecurity service providers hold NCA licenses, a number that reflects both market growth and the NCA's gatekeeping function ensuring service quality.
4. Essential Cybersecurity Controls (ECC)
4.1 Framework Structure
The Essential Cybersecurity Controls (ECC), first issued as ECC-1:2018 and updated to ECC-2:2024, constitute the NCA's foundational cybersecurity framework. The ECC establishes a comprehensive set of minimum cybersecurity controls that must be implemented by all government entities, their subsidiaries and affiliates, and private sector organizations that operate, host, or provide systems and services to government entities. The ECC's broad applicability -- extending to private companies through government supply chain relationships -- gives it one of the widest scopes of any national cybersecurity framework globally.
4.2 ECC Five Domains
Domain 1 -- Cybersecurity Governance (22 controls): Cybersecurity strategy and policies, organizational structure and responsibilities, risk management, cybersecurity in project management, compliance and audit, and human resource cybersecurity aspects including background checks and security awareness training.
Domain 2 -- Cybersecurity Defense (38 controls): Asset management, identity and access management (IAM), information system and application security, email and web security, network security management, mobile device security, data and information protection, cryptographic controls, and backup and recovery management.
Domain 3 -- Cybersecurity Resilience (24 controls): Cybersecurity event management and monitoring, cybersecurity incident management, threat and vulnerability management, penetration testing, cybersecurity monitoring (SOC operations), and cybersecurity logging and audit trail management.
Domain 4 -- Third-Party Cybersecurity (16 controls): Third-party and outsourcing cybersecurity, cloud computing and hosting cybersecurity, and managed cybersecurity services including requirements for NCA-licensed providers.
Domain 5 -- ICS/OT Cybersecurity (14 controls): Industrial control system protection, SCADA security, safety instrumented system cybersecurity, and OT network segmentation and monitoring.
4.3 Compliance Assessment and Enforcement
ECC compliance is assessed through a combination of organizational self-assessment (conducted annually using the NCA's assessment methodology and submitted to the NCA), NCA compliance audits (conducted by NCA teams or NCA-approved audit firms), and continuous monitoring through the NCA's National Cybersecurity Compliance Portal. Organizations must achieve a minimum compliance score established by the NCA, with scores below the threshold triggering remediation plans and follow-up assessments. Non-compliance consequences include restriction from government procurement eligibility, mandatory remediation orders, and potential penalties under the Anti-Cyber Crime Law. The NCA publishes anonymized aggregate compliance statistics to drive improvement across sectors.
5. PDPL: Personal Data Protection Law
5.1 Legislative Framework
The Personal Data Protection Law (PDPL, Nizam Himayat al-Bayanat al-Shakhsiya), enacted by Royal Decree M/19 in September 2021 with implementing regulations issued in March 2023 and full enforcement from September 2024, is Saudi Arabia's first comprehensive data protection law. The PDPL is administered by the Saudi Data and Artificial Intelligence Authority (SDAIA), reflecting the Kingdom's integration of data protection governance with its national AI strategy. The PDPL applies to all processing of personal data related to individuals in Saudi Arabia, with extraterritorial reach covering foreign entities processing Saudi residents' data.
Key PDPL provisions include: explicit consent as the primary legal basis for personal data processing, with defined exceptions for contractual necessity, legal obligations, vital interests, and legitimate interests (added in the 2023 implementing regulations); mandatory appointment of a Data Protection Officer (DPO) for entities processing large-scale personal data or sensitive data; data breach notification to SDAIA within 72 hours and to affected individuals without undue delay; data localization requirements mandating that sensitive personal data be processed and stored within Saudi Arabia, with cross-border transfers permitted only to countries with adequate protection levels or under approved safeguards; mandatory privacy impact assessments (PIAs) for processing that presents high risks to data subjects; and individual rights including access, correction, erasure, portability, and objection to automated decision-making.
5.2 PDPL Penalties and Enforcement
PDPL penalties include administrative fines of up to SAR 5 million (approximately $1.3 million USD) per violation, with repeat violations potentially doubling the fine. Criminal penalties under the Anti-Cyber Crime Law may also apply for egregious violations involving unauthorized access to or disclosure of personal data, with imprisonment of up to 2 years and fines of up to SAR 3 million. SDAIA has the authority to issue warnings, impose corrective measures, suspend data processing activities, and publish enforcement decisions. The initial enforcement period (September 2024 onwards) has focused on high-visibility sectors including telecommunications, banking, healthcare, and e-commerce, with SDAIA conducting compliance reviews of major data controllers.
5.3 Data Localization and Cross-Border Transfers
PDPL data localization requirements represent one of the law's most operationally significant provisions. Sensitive personal data (including health data, financial data, and genetic data) must be processed and stored within Saudi Arabia unless the entity demonstrates adequate protection in the destination country (as determined by SDAIA), implements appropriate safeguards including binding corporate rules or standard contractual clauses approved by SDAIA, or obtains specific SDAIA authorization for the transfer. Non-sensitive personal data may be transferred cross-border subject to consent, adequate protection, or approved safeguards. These requirements have significant implications for multinational companies, cloud service providers, and global platforms operating in Saudi Arabia.
6. SAMA Cybersecurity Framework
6.1 Framework Overview
The Saudi Central Bank (SAMA, formerly Saudi Arabian Monetary Authority) Cybersecurity Framework (SCF), issued in May 2017 and updated in 2022, establishes mandatory cybersecurity requirements for all SAMA-regulated financial institutions. The SCF applies to banks (12 domestic and 12 branches of foreign banks), insurance and reinsurance companies, finance companies, payment service providers, and other SAMA-licensed financial entities. The SCF represents one of the most prescriptive financial sector cybersecurity frameworks globally, with detailed requirements that go beyond high-level principles to specify technical implementation expectations.
6.2 SCF Control Structure
| Domain | Control Areas | Key Requirements |
|---|---|---|
| Leadership & Governance | Strategy, organization, awareness, training | Board-level cyber committee, CISO appointment, annual strategy review, staff training |
| Risk Management & Compliance | Risk assessment, regulatory compliance, audit | Annual risk assessment, compliance monitoring, internal and external audit |
| Operations & Technology | Asset mgmt, IAM, network, app, endpoint, data, crypto, logging, incident | MFA, encryption at rest and in transit, 24/7 SOC, vulnerability management, IR testing |
| Third-Party Security | Vendor management, outsourcing, cloud | Vendor risk assessment, contractual requirements, cloud security controls |
6.3 SAMA Compliance and Assessment
SAMA conducts regular cybersecurity assessments of regulated institutions through multiple mechanisms: annual self-assessment submissions aligned with the SCF control framework, on-site inspections by SAMA's Information Technology Supervision Department, thematic reviews focusing on specific risk areas (recent themes have included ransomware preparedness, open banking security, and cloud migration security), and threat-led penetration testing for systemically important financial institutions. Compliance findings directly impact institutions' supervisory ratings and can trigger enhanced supervisory requirements, restrictions on new product launches, or operational limitations. SAMA has published enforcement actions against institutions with persistent non-compliance, signaling an increasingly assertive regulatory posture.
7. Saudi CERT Operations
7.1 National CERT Functions
Saudi CERT, operated by the NCA, serves as the Kingdom's national computer emergency response team with comprehensive responsibilities for monitoring, detecting, and responding to cybersecurity threats across Saudi Arabia's cyberspace. Saudi CERT operates a 24/7 National Cybersecurity Operations Center (NCOC) that provides real-time situational awareness across government networks and critical infrastructure, coordinates incident response for national-level cyber incidents, and maintains threat intelligence sharing with government entities and CNI operators through the National Cyber Threat Intelligence Platform.
Saudi CERT's operational capabilities include threat monitoring through deployment of network sensors across government networks and partnerships with ISPs for visibility into national internet traffic; incident response coordination providing direct technical assistance for significant incidents and coordinating multi-stakeholder response for large-scale events; vulnerability management including proactive scanning of government-facing assets and coordinated disclosure with affected organizations; threat intelligence production and dissemination through the National Cyber Threat Intelligence Platform sharing IOCs, TTPs, and strategic threat assessments; and international coordination through memberships in FIRST, OIC-CERT, and bilateral CERT-to-CERT agreements with key partner nations.
8. Critical Infrastructure Protection
8.1 Critical National Infrastructure Sectors
Saudi Arabia designates critical national infrastructure (CNI) across sectors that are essential to the Kingdom's security, economy, and public welfare. The NCA, in coordination with sector-specific regulators, oversees cybersecurity compliance for CNI operators through the CSCC (Critical Systems Cybersecurity Controls) and sector-specific requirements.
Ministry of Energy
ECRA
SWCC / NWC
SAMA / CMA
CITC
MCIT / NCA
MOH / NPHIES
MOT / TGA
GACA
Mawani
9. Oil & Gas Cybersecurity
9.1 Strategic Context
Saudi Arabia's oil and gas sector, dominated by Saudi Aramco (the world's most valuable company with production capacity exceeding 12 million barrels per day), represents arguably the highest-value industrial cybersecurity target on earth. The sector's cybersecurity has been shaped by two landmark incidents: the 2012 Shamoon attack on Aramco and the 2017 Triton/TRISIS attack on a Saudi petrochemical facility's safety systems. These incidents, combined with ongoing Iranian cyber operations targeting Saudi energy infrastructure, have driven massive investment in OT cybersecurity capabilities.
9.2 OT/ICS Security Architecture
The NCA's OT-CC (Operational Technology Cybersecurity Controls) establishes mandatory requirements for OT/ICS environments in critical infrastructure. For the oil and gas sector, these requirements are supplemented by Saudi Aramco's own cybersecurity standards (among the most stringent in any industrial organization globally) and industry standards including IEC 62443 and NIST SP 800-82. Key requirements include complete air-gapping of safety instrumented systems (SIS) from business networks and the internet; defense-in-depth architecture implementing the Purdue Model with controlled communication between zones; continuous OT network monitoring using dedicated industrial network detection and response (NDR) tools; 24/7 OT-SOC operations staffed by personnel with combined cybersecurity and process engineering expertise; supply chain security requirements for all industrial control system components, with particular scrutiny on equipment from geopolitically sensitive suppliers; and regular OT-specific penetration testing and red team exercises conducted in controlled environments.
Saudi Aramco operates one of the world's largest industrial cybersecurity programs with over 1,000 dedicated cybersecurity professionals. Following the Shamoon and Triton incidents, Aramco invested billions of riyals in a comprehensive cybersecurity transformation including deploying dedicated OT network monitoring across all production facilities, establishing the Aramco Cybersecurity Operations Center (ACSOC) with integrated IT and OT monitoring, implementing a zero-trust architecture for remote access to operational environments, and developing an internal cybersecurity workforce pipeline through partnerships with KFUPM and other Saudi universities.
10. Vision 2030 & Digital Transformation Security
10.1 Digital Transformation Scale
Saudi Arabia's Vision 2030, the Kingdom's comprehensive economic and social transformation program, has cybersecurity implications across every initiative. The scale of digital transformation is unprecedented: the Digital Government Authority is digitizing all government services through the Absher and National Single Sign-On platforms (serving 34 million users); Saudi Arabia's cloud market is projected to reach $10 billion by 2030 driven by the Saudi Cloud Computing Strategic Framework and Oracle, Google Cloud, and AWS establishing local regions; the Kingdom is deploying 5G across all major cities through STC, Zain, and Mobily; and giga-projects including NEOM ($500B), Red Sea Global ($28B), Qiddiya ($8B), and ROSHN ($20B) are building entirely new digital ecosystems from the ground up.
10.2 Cybersecurity as a Vision 2030 Enabler
The NCA's National Cybersecurity Strategy explicitly positions cybersecurity as an enabler of Vision 2030 rather than a constraint. The strategy establishes a target of ranking among the top 5 nations globally in the ITU Global Cybersecurity Index (Saudi Arabia ranked 2nd in the 2024 GCI), building a SAR 30 billion+ domestic cybersecurity industry, achieving 70% Saudization in cybersecurity roles by 2030, and ensuring cybersecurity-by-design in all Vision 2030 giga-projects and digital initiatives. The NCA allocates specific cybersecurity requirements and budgets for each major Vision 2030 initiative, conducting security architecture reviews and compliance assessments as part of project governance frameworks.
11. NEOM & Giga-Project Cybersecurity
11.1 NEOM Cybersecurity Architecture
NEOM, the $500 billion mega-city being constructed on the Red Sea coast in Tabuk Province, represents the world's most ambitious smart city project and, correspondingly, one of the most complex cybersecurity challenges ever attempted. NEOM's three primary developments -- THE LINE (a 170km linear city), Oxagon (an industrial and port city), and Trojena (a mountain tourism destination) -- will incorporate millions of IoT sensors, autonomous vehicles, drone delivery systems, robotics, AI-driven city management, and pervasive digital services that create an attack surface of unprecedented scale and complexity.
NEOM's Cybersecurity Division has established foundational principles including: security-by-design embedded in all technology system architectures from inception; zero-trust networking as the default model across all NEOM infrastructure; AI-powered threat detection and autonomous response capabilities; quantum-resistant cryptography for long-lived critical infrastructure communications; comprehensive IoT security standards mandating secure boot, encrypted communications, and centralized lifecycle management for all connected devices; and a dedicated NEOM-CERT for 24/7 incident monitoring and response. NEOM's cybersecurity requirements extend to all technology vendors, system integrators, and service providers operating within the NEOM ecosystem, creating a cascading compliance obligation across the supply chain.
11.2 Other Giga-Project Security
Beyond NEOM, other giga-projects have adopted NCA ECC as baseline requirements with project-specific enhancements. Red Sea Global, developing ultra-luxury tourism destinations across 22 islands and 6 inland sites, requires cybersecurity controls for hospitality management systems, guest data protection aligned with PDPL, and critical infrastructure protection for desalination and power generation facilities. Qiddiya, the entertainment destination south of Riyadh, mandates cybersecurity for theme park ride control systems, event management platforms, and smart venue technologies. ROSHN, the national housing developer, incorporates smart home cybersecurity standards and community digital infrastructure protection requirements.
12. Cloud Cybersecurity Controls (CCC)
12.1 CCC Framework
The NCA's Cloud Cybersecurity Controls (CCC-1:2020, updated to CCC-2:2024) establishes mandatory requirements for cloud computing security applicable to government entities, CNI operators, and entities with national significance utilizing cloud services. The CCC addresses the full cloud lifecycle from service selection and risk assessment through operational security to exit management, covering IaaS, PaaS, and SaaS deployment models across public, private, community, and hybrid cloud architectures.
CCC-2:2024 comprises 72 controls organized across cloud governance, cloud identity and access management, cloud data protection, cloud infrastructure security, cloud application security, cloud operations and monitoring, and cloud exit and portability. A critical provision requires that classified and sensitive government data must be processed and stored within Saudi Arabia (data sovereignty requirement), which has driven hyperscale cloud providers (AWS, Azure, Google Cloud, Oracle) to establish Saudi Arabia cloud regions and local data center presence. Less sensitive data may be processed in cloud regions outside Saudi Arabia subject to NCA-approved risk assessments and contractual safeguards.
13. CITC Telecommunications Security
13.1 Regulatory Framework
The Communications, Space and Technology Commission (CITC, formerly CITC), regulates cybersecurity for Saudi Arabia's telecommunications sector, which is served by three major operators: Saudi Telecom Company (STC), Mobily (Etihad Etisalat), and Zain Saudi Arabia. CITC's cybersecurity regulations cover network security, customer data protection, infrastructure resilience, and supply chain security for telecommunications equipment. The CITC's Regulatory Framework for Cybersecurity in the Telecommunications Sector mandates annual security audits, real-time network monitoring, incident reporting within 4 hours for significant incidents, and compliance with NCA ECC as a baseline with sector-specific extensions.
13.2 5G Security Requirements
Saudi Arabia's extensive 5G deployment (one of the world's largest by coverage area) has been accompanied by specific security requirements issued by CITC in coordination with the NCA. These include equipment vendor security evaluation requirements for all 5G RAN and core network components, network slicing security controls ensuring isolation between virtual network slices, edge computing security requirements for Mobile Edge Computing (MEC) deployments, and supply chain integrity verification for critical network infrastructure. STC, as the Kingdom's largest operator and 5G deployment leader, has established a dedicated 5G Security Operations Center and partnered with the NCA on 5G threat research.
14. Cybersecurity Talent Development
14.1 Workforce Challenge and Vision 2030 Alignment
Saudi Arabia faces a cybersecurity talent shortage estimated at 30,000-40,000 professionals, compounded by the Kingdom's Saudization objectives requiring increasing replacement of expatriate workers with Saudi nationals. The challenge is particularly acute given the rapid expansion of cybersecurity demand driven by Vision 2030 digital initiatives, NCA compliance requirements, and the growing threat landscape. The NCA's National Cybersecurity Workforce Framework establishes six specialization tracks: Cybersecurity Governance, Risk and Compliance; Security Architecture and Engineering; Threat Intelligence and Analysis; Security Operations and Incident Response; Application and Product Security; and OT/ICS Cybersecurity.
14.2 National Talent Development Programs
15. Compliance Frameworks & Certifications
15.1 Regulatory and Certification Landscape
| Framework / Certification | Scope | Requirement Type | Key Application |
|---|---|---|---|
| NCA ECC | Government, CNI, government suppliers | Mandatory | Baseline cybersecurity controls |
| NCA CCC | Government cloud users | Mandatory for cloud adoption | Cloud computing security |
| NCA OT-CC | CNI OT operators | Mandatory | OT/ICS cybersecurity |
| SAMA SCF | Financial institutions | Mandatory (SAMA-regulated) | Financial sector cybersecurity |
| PDPL (SDAIA) | All data controllers/processors | Mandatory | Personal data protection |
| ISO/IEC 27001 | All sectors | Voluntary (widely expected) | Information security management |
| SOC 2 Type II | Service providers | Voluntary (client-required) | Service organization security |
| PCI DSS v4.0 | Payment card industry | Mandatory for card processors | Payment data security |
| NIST CSF | Cross-sector | Reference framework | Cybersecurity risk management |
| IEC 62443 | Industrial automation | Required for OT environments | OT/ICS security |
| NCA CSPR License | Cybersecurity service providers | Mandatory for all providers | Provider licensing and regulation |
16. Frequently Asked Questions
The NCA, established by Royal Decree in 2017, is Saudi Arabia's supreme cybersecurity authority reporting directly to the King. It develops national strategy, issues mandatory frameworks (ECC, CCC, OT-CC, CSCC, DCC, TCC), oversees compliance across government and CNI, operates Saudi CERT and the Cyber Threat Intelligence Center, licenses all cybersecurity service providers through CSPR, and develops the national workforce through CyberHub. With approximately 180 licensed cybersecurity providers and mandatory compliance across all government entities, the NCA is one of the most powerful cybersecurity regulators globally.
The ECC (updated to ECC-2:2024) is the NCA's foundational cybersecurity framework with 114 controls across five domains: Cybersecurity Governance (22 controls), Cybersecurity Defense (38 controls), Cybersecurity Resilience (24 controls), Third-Party Cybersecurity (16 controls), and ICS/OT Cybersecurity (14 controls). The ECC is mandatory for all government entities, their subsidiaries, and private sector organizations that operate systems for or provide services to government. Compliance is assessed through self-assessment and NCA audits, with non-compliance affecting government contract eligibility.
The PDPL (Royal Decree M/19, full enforcement from September 2024) is Saudi Arabia's data protection law administered by SDAIA. It requires explicit consent for processing, DPO appointment for large-scale processors, 72-hour breach notification, data localization for sensitive data within Saudi Arabia (with conditional cross-border transfer mechanisms), and privacy impact assessments. Penalties reach SAR 5 million per violation with doubling for repeats. SDAIA enforces through inspections, corrective measures, and processing suspension. The PDPL has extraterritorial reach covering foreign entities processing Saudi residents' data.
The SAMA SCF (issued 2017, updated 2022) is mandatory for all SAMA-regulated financial institutions (24 banks, insurers, finance companies, payment providers). It defines 32 control areas across four domains: Leadership & Governance, Risk Management & Compliance, Operations & Technology, and Third-Party Security. Requirements include board-level cyber committees, CISO appointment, MFA, 24/7 SOC, encryption, vulnerability management, incident response testing, and vendor risk management. SAMA conducts regular assessments through self-reporting, on-site inspections, thematic reviews, and threat-led penetration testing for systemically important institutions.
Vision 2030 creates massive cybersecurity demand through NEOM ($500B smart city), digital government transformation (34M users on Absher), $10B cloud market growth, 5G deployment, and giga-projects. The NCA estimates cybersecurity spending for Vision 2030 will exceed SAR 30 billion ($8B) through 2030. Each giga-project has project-specific cybersecurity requirements beyond NCA ECC baseline. The National Cybersecurity Strategy targets top-5 ITU GCI ranking (currently 2nd), a SAR 30B+ domestic cyber industry, and 70% Saudization in cyber roles by 2030. Cybersecurity is positioned as an enabler rather than a constraint on transformation.
Following the 2012 Shamoon attack (35,000 Aramco workstations destroyed) and 2017 Triton/TRISIS safety system attack, Saudi oil and gas has some of the world's strictest OT cybersecurity requirements. The NCA's OT-CC mandates air-gapped safety systems, continuous OT network monitoring, 24/7 OT-SOC operations, supply chain security for industrial components, and regular OT-specific penetration testing. Saudi Aramco operates 1,000+ dedicated cyber professionals and implemented comprehensive OT security architecture including data diodes, microsegmentation, and application allowlisting. IEC 62443 compliance is required for all industrial automation systems.
Saudi CERT, operated by the NCA, provides 24/7 threat monitoring through the National Cybersecurity Operations Center (NCOC), incident response coordination, security advisory publication (1,200+ advisories in 2024), the National Cyber Threat Intelligence Platform for IOC/TTP sharing, proactive threat hunting across national infrastructure, and international coordination through FIRST and OIC-CERT. In 2024, Saudi CERT handled 8,500+ incidents with targeted intrusions (28%), ransomware (22%), and phishing (19%) as top categories. It works alongside sector-specific CERTs including Aramco's ACSOC and SAMA-coordinated financial sector incident response.
NEOM's Cybersecurity Division mandates security-by-design for all systems, zero-trust as default network architecture, AI-powered threat detection with autonomous response, quantum-resistant encryption for critical communications, comprehensive IoT security for millions of planned devices across THE LINE/Oxagon/Trojena, and a dedicated NEOM-CERT. Requirements cascade to all vendors and integrators. Other giga-projects (Red Sea Global, Qiddiya, ROSHN) use NCA ECC as baseline with project-specific enhancements covering hospitality data protection, entertainment ride control systems, and smart community infrastructure security.
With a 30,000-40,000 professional gap and Saudization requirements, Saudi Arabia has launched aggressive programs: NCA's CyberHub Academy (15,000+ trained), SAFCSP youth programs (50,000+ annual participants), university cybersecurity degrees at KSU/KAUST/PSU/Alfaisal, 500+ annual international scholarships, the NCA Workforce Framework with six specialization tracks, and mandated Saudization (50% in 2024, 70% target by 2030) for licensed cybersecurity providers. Average senior cyber salaries (~$95K USD) are competitive regionally. Saudi Arabia's 2nd-place ITU GCI ranking reflects the national commitment to cybersecurity capability building.
The CCC (CCC-2:2024) establishes 72 mandatory cloud security controls for government entities, CNI operators, and nationally significant organizations. It covers cloud governance, IAM, data protection, infrastructure security, application security, operations monitoring, and exit planning. The critical data sovereignty requirement mandates classified and sensitive government data be processed and stored within Saudi Arabia, driving AWS, Azure, Google Cloud, and Oracle to establish Saudi cloud regions. Less sensitive data may go cross-border subject to NCA-approved risk assessments and contractual safeguards.
Seraphim Vietnam provides cybersecurity consulting services for organizations operating in or entering the Saudi Arabian market. Our expertise spans NCA ECC compliance implementation, PDPL data protection programs, SAMA SCF assessment preparation, OT/ICS security for energy and industrial operations, cloud security architecture aligned with CCC requirements, and Vision 2030 project cybersecurity advisory. Contact our Saudi Arabia cybersecurity advisory team to discuss your requirements.

