Consulting services
First: Obtaining licenses from the Space and Technology Communications Commission (CST)

Assist telecommunications or cloud service providers (LSPs) in obtaining the necessary license from the TRA through:

  • Achieve minimum cybersecurity requirements, and comply with the regulations required by the Authority.
  • Raising the levels of classification of companies in accordance with the levels approved by the Authority. CSP Registration Class (A, B or C)
  • Conducting the necessary assessment of the Cybersecurity Regulatory Framework (CRF)
01 01
How do I start complying with the regulations issued by the Communications, Space and Technology Commission (CST)?
1. See regulatory requirements
Begin to review all the manuals and regulatory frameworks issued by the Authority, such as:
2. Define the scope of commitment

Identify activities and services of your entity that are subject to the Authority’s regulations (e.g. Internet services, infrastructure, cloud, satellite…) to apply only the relevant requirements.

3. Implement a Gap Assessment

Compare the current situation in the region with regulatory requirements to identify strengths and gaps.
Based on this assessment, an action plan is prepared to address the gaps and achieve full commitment.

4. Develop policies and procedures

Prepare or update the following policies to comply with the requirements of the Authority:

5. Apply technical and organizational controls

Implementing the required security and technical measures such as:

6. Outreach and Training

Spreading the culture of compliance among the entity’s employees through periodic training and awareness programs on:

7. Continuous Follow-up and Improvement
Second: Compliance Solutions for the Relevant Regulations and Legislations
1. ISO/IEC 27017 Cloud Information Security Certification

Assist in obtaining the  ISO 27017 (Cloud Information Security) compliance certificate by providing the following consulting services:

2. NCA CCC Compliance

Compliance with the Cloud Computing Cybersecurity Controls Framework (NCA CCC – 2:2024) is carried out through an integrated methodology that goes through five main phases developed by the National Cybersecurity Authority, and is based on the linkage between CCC and ECC controls (core controls):

WE WILL BE HAPPY TO SERVE YOU