ECC-2:2024 Key Enhancements

1. Streamlined Structure ECC offers a streamlined structure that enhances efficiency and effectiveness in various applications.

The ECC-2:2024 framework has been restructured for clarity and efficiency: 

  • 4 Main Domains: Cybersecurity Governance, Cybersecurity Defense, Cybersecurity Resilience, and Third-Party & Cloud Computing Cybersecurity. 
  • 28 Subdomains: Providing detailed focus areas within each main domain. 
  • 110 Controls and 90 Subcontrols: Refined from the previous 114 controls to enhance clarity and applicability.  

2. Tier-Based Compliance Model

A new tiered approach categorizes organizations into Essential, Advanced, or Minimal tiers based on their criticality and risk exposure. This model allows for tailored cybersecurity implementations, ensuring that entities apply controls commensurate with their operational significance.  

3. Data Localization Adjustments

While ECC-1:2018 mandated in-country data hosting, ECC-2:2024 delegates data localization responsibilities to the National Data Management Office (NDMO). Organizations must now consult NDMO guidelines to ensure compliance with data residency requirements.  

4. Emphasis on Saudization

The updated controls mandate that all cybersecurity roles be occupied by qualified Saudi nationals, extending beyond the previous requirement for only senior positions. This aligns with national efforts to bolster local expertise in cybersecurity.  

5. Enhanced Compliance Tools

To assist organizations in aligning with ECC-2:2024, the NCA plans to release an Assessment and Compliance Tool. This tool will facilitate self-assessments, periodic reporting, and on-site audits, streamlining the compliance process.  


Domains of ECC-2:2024

Cybersecurity Governance

Focuses on establishing robust cybersecurity strategies, policies, and risk management practices. It ensures that organizations have clear roles, responsibilities, and compliance mechanisms in place. 

Cybersecurity Defense

Encompasses controls related to asset management, identity and access management, network security, and vulnerability management. It aims to fortify an organization’s defenses against cyber threats. 

Cybersecurity Resilience

Emphasizes the integration of cybersecurity into business continuity planning, ensuring that organizations can maintain operations and recover swiftly from cyber incidents.

Third-Party & Cloud Computing Cybersecurity

Addresses the security risks associated with third-party vendors and cloud services, promoting secure partnerships and cloud infrastructure. 


Implementation Steps for Organizations

  1. Conduct a Gap Analysis: Assess current cybersecurity measures against ECC-2:2024 requirements to identify areas needing improvement. 
  2. Update Policies and Procedures: Revise organizational policies to align with the new controls and ensure they are effectively communicated and enforced.
  3. Engage Qualified Saudi Professionals: Recruit and train Saudi nationals to fulfill cybersecurity roles, complying with the Saudization mandate. 
  4. Utilize the NCA’s Compliance Tool: Once available, employ the Assessment and Compliance Tool to monitor and report on compliance status. 
  5. Stay Informed on NDMO Guidelines: Regularly consult the NDMO for updates on data localization and related requirements. 

For detailed guidance and resources on implementing ECC-2:2024, organizations can refer to the NCA’s official website

We Cyber Space offer GRC services, which you can book through here.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top