Macksofy Technologies
National Cybersecurity Authority · Essential Cybersecurity Controls v2

Saudi NCA ECC-2:2024 Audit

NCA ECC-2:2024 audit — baseline cybersecurity for all organisations in KSA.

Full NCA Essential Cybersecurity Controls v2 (ECC-2:2024) audit — applicability scoping, control-by-control assessment across governance, defence, resilience and third-party / cloud domains. Designed for government entities, critical national infrastructure operators and private-sector organisations in the Kingdom of Saudi Arabia.

Aligned to
  • NCA Essential Cybersecurity Controls v2 (ECC-2:2024)
  • NCA Critical Systems Cybersecurity Controls (CSCC)
  • NCA Cloud Cybersecurity Controls (CCC)
  • NCA Telework Cybersecurity Controls
  • Saudi PDPL (Personal Data Protection Law)
  • SAMA CSF overlay (financial sector)
  • ISO 27001:2022 (mapped)
  • NIST CSF (mapped)
Why this matters

Compliance is leverage, not paperwork.

The National Cybersecurity Authority's Essential Cybersecurity Controls v2 (ECC-2:2024) is the baseline cybersecurity standard for any organisation operating in the Kingdom of Saudi Arabia — government, critical national infrastructure and private sector. NCA performs compliance assessments and references ECC compliance in its national cybersecurity reporting; sector regulators (SAMA, CMA, CITC, Ministry of Health) layer their own controls on top. Macksofy's NCA ECC-2 audit walks the four domains end-to-end and produces the assessment artefacts NCA samples first.

Applicability
  • Saudi government entities (ministries, authorities, government-owned companies)
  • Critical national infrastructure operators (energy, water, transport, finance, health)
  • Private-sector organisations operating in KSA (any size)
  • Cloud and digital-platform providers serving KSA customers
  • Suppliers and managed-service providers to NCA-regulated entities
  • Multinationals with Saudi operations or KSA data-residency commitments
Standards & frameworks

Aligned to the regulations that matter.

NCA Essential Cybersecurity Controls v2 (ECC-2:2024)
NCA Critical Systems Cybersecurity Controls (CSCC)
NCA Cloud Cybersecurity Controls (CCC)
NCA Telework Cybersecurity Controls
Saudi PDPL (Personal Data Protection Law)
SAMA CSF overlay (financial sector)
ISO 27001:2022 (mapped)
NIST CSF (mapped)
Methodology

How we run a NCA ECC-2 engagement.

Interactive walkthrough — every phase clickable, every activity documented, every artefact regulator-ready.

Phase 01 / 5
20% complete

1 · Applicability + scoping

  • 01
    Sector classification + NCA scope test
  • 02
    Critical-system identification (CSCC overlay)
  • 03
    Cloud / telework overlay assessment
Deliverables

Everything you need to satisfy auditors.

  • NCA ECC-2 applicability + scoping memo
  • Control-by-control compliance register
  • Critical-system + cloud overlay risk pack
  • Incident-response + tabletop drill report
  • Third-party cybersecurity review
  • NCA-format submission pack
  • Annual recertification plan + closure tracker
Recent engagements
Saudi government-owned enterprise

NCA ECC-2 audit + CSCC overlay on critical systems

Outcome: Closed all priority-1 gaps in one cycle; NCA assessment cleared with no follow-up actions on critical systems

Multinational SaaS with KSA data-residency

ECC-2 + Cloud Cybersecurity Controls (CCC) overlay

Outcome: Cloud-overlay evidence pack accepted by two NCA-regulated customer assessments without remediation

At a glance

The shape of a NCA ECC-2 engagement.

Every number below is grounded in how Macksofy actually runs the engagement — not aspirational marketing copy.

0
Methodology phases
0
Documented activities
0
Auditor-ready deliverables
0 day
Day retest window
Audit pillars

What we actually examine.

Each pillar is a distinct workstream inside the engagement — scoped, evidenced, and signed off independently before the audit pack is assembled.

18CONTROLS MAPPEDacross 6 pillars
Coverage breakdown
  • Applicability & scoping3 pts
  • Governance domain3 pts
  • Defence domain3 pts
  • Resilience domain3 pts
  • Third-party & cloud3 pts
  • NCA submission pack3 pts
Pillar 01
Applicability & scoping

ECC-2 baseline applies broadly — CSCC and CCC overlays apply selectively. Clean scoping prevents over-engineering.

  • Sector + criticality classification
  • Critical-system + cloud-overlay scoping
  • Telework-control applicability
Pillar 02
Governance domain

Cybersecurity strategy, risk management and human-resources controls — the spine of ECC-2.

  • Cybersecurity strategy + governance
  • Cyber-risk management framework
  • HR + awareness controls
Pillar 03
Defence domain

Asset, identity, network and endpoint defence walked end-to-end with technical evidence.

  • Asset + identity-and-access management
  • Network, endpoint + email defence
  • Cryptography + secure data handling
Pillar 04
Resilience domain

Backup, recovery, log management and incident response — the controls that decide breach outcomes.

  • Backup + recovery evidence
  • Event-log management + retention
  • Incident-response + tabletop drill
Pillar 05
Third-party & cloud

Supplier and cloud-provider controls under ECC-2 + the CCC overlay where cloud is used.

  • Third-party cybersecurity controls
  • Cloud Cybersecurity Controls (CCC) overlay
  • Contractual + exit-plan evidence
Pillar 06
NCA submission pack

Artefacts assembled exactly the way NCA assessments consume them.

  • Control-statement to evidence map
  • Compliance-level heatmap
  • Assessor Q&A walk-through
Engagement timeline

From kick-off to regulator-ready report.

The horizontal flow below shows the typical week-by-week shape of a NCA ECC-2 engagement. Click any station for detail in the methodology section above.

01
Week 1
Applicability + scoping
02
Week 2
Governance + defence domains
03
Week 3
Resilience domain
04
Week 4
Third-party + cloud
05
Week 5
Assessment + submission
What clients say · Trusted India + UAE

Rated 4.9 ★ from 612 client reviews.

CERT-In Empanelled
Govt of India · MeitY
EC-Council ATC
Authorized Training
ISO 27001 Certified
Info Security Mgmt
We've worked with three Big 4 firms before Macksofy. None found what their team did in our payments stack. The most actionable report we've received in a decade.
AK
Aisha Khan
Information Security Manager · Listed Fintech · BKC, Mumbai
The CHFI training Macksofy delivered for our cyber cell raised investigation quality measurably. Practical, India-context-aware, and respectful of our operational realities.
IK
Inspector K. Joshi
Cyber Cell · Maharashtra Police · Mumbai
Came in with zero security background. 5 weeks later I was running Burp Suite and Metasploit confidently. Cleared CEH on the first attempt.
VI
Vivek Iyer
DevSecOps Lead · Healthcare SaaS · Hyderabad
FAQ

Things compliance leads ask before signing.

ECC-2 is the baseline for any organisation operating in KSA — government, critical national infrastructure and private sector. Sector regulators layer their own controls on top.
Talk to us

Get a fixed-price proposal in 48 hours.

Tell us about your security need — pentest, audit, training or a wider engagement. A senior consultant will reply within a few business hours.

CERT-In Empanelled
Information Security Auditor · India
  • CERT-In Empanelled
  • EC-Council ATC · CompTIA Authorized
  • 20,000+ professionals trained
  • India + UAE engagements
Human verification· Cloudflare Turnstile

By submitting this form you agree to be contacted by Macksofy. We typically respond within a few business hours and never share your details. Protected by Cloudflare Turnstile and rate limiting.