Skip to main content
Skip table of contents

Kingdom of Saudi Arabia (KSA) Essential Cybersecurity Controls (ECC) Deployment Guide

This guide describes how to implement the LogRhythm Kingdom of Saudi Arabia (KSA) Essential Cybersecurity Controls (ECC) module. The KSA-ECC suite provides pre-bundled content such as AI Engine (AIE) rules, alarms, investigations, lists, and reports that help organizations pursue best practice adherence around the Kingdom's ECC guidelines. This guide provides control mapping between LogRhythm SIEM content and guidelines within the ECC publication. Monitoring and awareness of risk exposures across an organization's environment(s) are foundational aspects of ECC adherence. The LogRhythm SIEM serves as an essential tool as an organization matures its compliance and security posture. Organizations can use the content within this compliance automation suite to facilitate their adherence to certain guidelines of the ECC.

Many of these phases include key resources that can be leveraged in the deployment of the compliance suite. The KSA-ECC module provides pre-bundled content available through the Knowledge Base and part of the foundation around the Consolidated Compliance Framework (CCF) methodology.  An organization, with confirmation from auditors, can use the module content to augment control objectives and support efforts to follow ECC guidelines. AIE Alarms assist with quickly identifying risk exposures, while Case Management enables the centralized collection of forensic data, including audit evidence, to support incident reporting, response time, and remediation requirements. This pre-bundled content is automatically associated with the Kingdom's ECC (March 2020) control objectives that are supported by LogRhythm Enterprise. Various lists are also available, some of which are pre-configured and others that can be catered to your environment, processes, and system classifications. Collectively, these and other LogRhythm features provide a road map to help organizations transition from compliance readiness to true security, risk-based organizations. Our team’s interpretations of the augmented best practice guidelines can be found in the matrices of this module. LogRhythm’s core set of content offered through the Consolidated Compliance Framework (CCF) is mapped to ECC guidelines, offering a streamlined approach to compliance through SIEM technology. LogRhythm SIEM technology and content align with the ECC guideline families to strengthen an organization’s security posture.

After you configure the compliance automation suite, the LogRhythm Platform Manager includes the proper components needed to support ECC guideline adherence. As AIE rules, alarms, reports, and investigations are correlated with in-scope log sources and hosts, your compliance and security teams can leverage powerful data. You can also schedule reports for periodic generation and delivery or generate them on demand for various audiences. To identify areas of non-compliance in real time, you can leverage investigations and alarms for immediate analysis of activities that impact your organization's cardholder data systems. Once a control failure or risk exposure is realized, you can quickly use Case Management to organize and understand this event. This helps the organization reduce the mean time to detection (MTTD) and mean time to respond (MTTR) to not only ensure reporting time requirements are met but also help limit the time of risk realization and damage.

As with any framework, some controls and best practices offered may require additional tailoring to augment them appropriately as determined by the organization. We encourage our LogRhythm community administrators and analysts to create their own AIE rules, alarms, investigations, and reports to augment more controls than we can provide with pre-bundled content. Many tools are available for this, including the wide range of logs in the LogRhythm MPE Rule Builder, Log Library, and ECHO tool set. Professional services and Analytics Co-Pilot services are available as needed to assist with creating and tailoring custom rules and actions. 

LogRhythm content is designed to be used by various audiences including internal and external auditors, executive management, control owners, program developers, IT security, IT operations, and other individuals or groups involved in the audit cycle.

Intended Audience

This guide is intended for LogRhythm Enterprise administrators and analysts who are responsible for maintaining compliance with various ECC best practices. Monthly and weekly reporting packages can be established to provide forensic evidence and audit data to appropriate audiences for distribution, including security operations, security management, IT operations, audit, and executive management. The reporting packages, the content included, and the frequency can be adjusted according to the needs of your audience.  

This guide details the installation, configuration, and verification of objects used in the KSA-ECC module. When this section is complete, the LogRhythm Platform Manager-enabled content will begin to provide value around your ECC compliance efforts. The process involves the following steps:

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.