Meet Us at Gartner® Security & Risk Management Summit | 10-11 March 2025 | Grand Hyatt, Mumbai | Booth 319
Meet us at Gartner® Security & Risk Management Summit  | 10-11 March 2025 | Grand Hyatt, Mumbai | Booth 319

An Overview of SAMA Cybersecurity Framework

Summary 

  1. The SAMA Cybersecurity Framework aims to bolster cybersecurity in Saudi Arabia’s financial sector. 
  2. The framework applies to a range of financial institutions, including banks, insurance companies, and fintech firms. 
  3. The framework uses a maturity model with six levels to guide institutions in progressively enhancing their cybersecurity posture. 
  4. Benefits include stronger defences, regulatory compliance, incident recovery, and more. 

This article delves into the SAMA Cybersecurity Framework’s objectives, scope, and profound impact on the Saudi Arabian financial landscape. We will examine the framework’s structure, and the myriad benefits it offers to compliant organisations.  

Additionally, we will discuss how Sectona can assist enterprises in meeting SAMA’s stringent requirements related to privileged access, thereby enhancing overall cybersecurity posture. 

Background of the SAMA Cybersecurity Framework 

Founded in 1952, the Saudi Arabian Monetary Authority (SAMA) has played a key role in regulating and overseeing Saudi Arabia’s financial sector. The financial industry has always faced unprecedented cybersecurity challenges. SAMA introduced the Cybersecurity Framework through a collaborative process, recognising the critical need to safeguard sensitive financial data and maintain public trust. This involved incorporating international best practices and feedback from stakeholders such as financial institutions, technology providers, and cybersecurity experts. 

The framework encourages financial institutions to adopt a culture of security awareness and continuous vigilance by elevating cybersecurity to a board-level priority. It also recognises the technological advances in digital banking, fintech, and mobile payments, which have expanded the potential attack surface. 

The Objective of SAMA Cybersecurity Framework 

The SAMA Cybersecurity Framework has multiple objectives aimed at creating a secure financial ecosystem in Saudi Arabia: 

  • Uniform Cybersecurity Practices: Establishing consistent cybersecurity measures across institutions to enable more effective benchmarking and evaluation. 
  • Incremental Security Development: Offering a clear roadmap for financial institutions to gradually enhance their cybersecurity capabilities. 
  • Holistic Risk Management Focus: Promoting a culture of security and comprehensive risk management strategies across the sector. 
  • Strengthened Resilience: Enhancing the ability of institutions to prepare for, respond to, and recover from cyber incidents. 
  • Secure Innovation Integration: Guiding institutions on safely adopting new technologies while effectively managing associated risks. 
  • Trust Building: Increasing customer, investor, and stakeholder confidence by showcasing a strong commitment to cybersecurity. 
  • Global Competitiveness Alignment: Aligning with international standards such as NIST and ISO 27001 to ensure competitiveness on a global scale. 
  • Ongoing Adaptation: Ensuring cybersecurity practices evolve to address changing threats and new technological developments. 

What is the Scope? – Which Organisations Must Comply with SAMA? 

The framework encompasses a wide array of financial institutions in Saudi Arabia, promoting consistency in cybersecurity practices across the sector: 

  • Banks: Includes domestic institutions and foreign branches operating within the Kingdom of Saudi Arabia. 
  • Insurance and Reinsurance Companies: These firms handle customer data and financial information, making them prime targets for cyber threats. 
  • Financing Companies: Entities providing financial services are required to comply due to their management of sensitive data. 
  • Credit Bureaus: Given their role in maintaining credit information. 
  • Financial Market Infrastructures: Entities such as payment systems, clearinghouses, and securities depositories, essential to market stability. 
  • Fintech Companies and Technology Service Providers: Especially those that collaborate closely with regulated financial entities or manage financial data. 
  • Subsidiaries and Affiliates of Financial Institutions: Ensuring that cybersecurity measures are applied consistently across an organisation. 
  • Non-Financial Institutions: Although not directly regulated, organisations like telecommunications providers may choose to align with the framework for stronger security measures. 

The framework’s scope is adaptable, allowing for updates as the financial landscape evolves and financial services emerge. 

Applicability of SAMA 

The framework’s principles apply across all aspects of an organisation, addressing: 

1. Governance and Risk Management: Implementing security into governance structures and risk management practices, considering internal and third-party risks. 

2. Information Technology: Covering infrastructure, data management, and cybersecurity policies while securing physical and digital assets. 

3. Access Control: Implementing stringent measures to regulate user access and safeguard data confidentiality. 

4. Operations Security: Maintaining consistent cybersecurity measures across local and international operations. 

5. Incident Management and Business Continuity: Preparing for and addressing disruptions caused by cyber threats to ensure business continuity. 

6. Leadership Involvement: Emphasising the role of top leadership in driving cybersecurity efforts throughout the organisation. 

Overview of SAMA Framework and Maturity Levels 

The SAMA Cybersecurity Framework uses a maturity model to guide financial institutions through progressive improvements. It categorises organisations into six maturity levels, from 0 to 5, allowing them systematically to assess and improve their cybersecurity posture.

1. Level 0 – Non-Existent:

At this stage, there is no formal awareness or implementation of cybersecurity measures. The organisation has not recognized cybersecurity as a critical risk and lacks any structured approach to address potential threats.

2. Level 1 – Ad-Hoc:

Here, there is some awareness of cybersecurity risks, but the approach is reactive and inconsistent. Measures may be implemented case-by-case without an overarching strategy, resulting in fragmented security efforts.

3. Level 2 – Repeatable but Informal:

The organisation begins to adopt more consistent cybersecurity practices, though they are not formally documented or standardised. Some recurring processes may exist, but they lack rigour in enforcement.

4. Level 3 – Structured and Formalised:

At this level, organisations have established formal, documented processes for cybersecurity that are standardised across the organisation. Cybersecurity is actively managed, though certain areas may still have inconsistencies.

5. Level 4 – Managed and Measurable:

At this stage, organisations have formalised their processes and actively measure their effectiveness. They use metrics and key performance indicators (KPIs) to monitor, assess, and improve their cybersecurity practices continuously. There is a proactive approach to managing risks and security controls.

6. Level 5 – Adaptive:

This is the highest maturity level, characterised by a highly advanced cybersecurity posture. Organisations continuously adapt their practices based on emerging threats and changing business requirements. Cybersecurity is deeply integrated into risk management, governance, and decision-making processes across all levels.

The maturity levels provide a roadmap for institutions to systematically enhance their cybersecurity measures, rather than merely implementing more controls.

SAMA Cybersecurity Framework
  • Stronger Cybersecurity Defences: Organisations can achieve more robust protection against cyber threats. 
  • Structured Risk Mitigation Approach: Provides a systematic framework for identifying, prioritising, and addressing potential risks. 
  • Compliance Assurance: Ensures alignment with regulatory cybersecurity requirements, reducing exposure to penalties. 
  • Commitment to Continuous Evolution: Encourages regular updates to security practices in response to emerging threats. 
  • Enhanced Incident Recovery: Improves the organisation’s capacity to maintain business operations during and after a cyber incident. 
  • Customer Confidence and Market Advantage: Demonstrates a dedication to high-security standards, maintaining customer trust and a competitive edge. 
  • Facilitation of Digital Transformation: Supports the secure adoption and integration of new technologies. 

Addressing SAMA Controls with Sectona 

Sectona, a leader in Privileged Access Management (PAM) solutions, offers tools that help financial institutions comply with the SAMA Cybersecurity Framework. 

Here’s how Sectona aligns with key SAMA controls: 

1. Centralised Platform: Sectona provides centralised control and visibility for managing privileged access, ensuring consistent policies throughout. 

2. Secure Remote Access: With VPN-less workflow-based access for outsourced activities and browser-based access that doesn’t require plugins, Sectona enhances remote security and ease of use. 

3. Session Management: Real-time session monitoring and recording, as well as the ability to terminate suspicious sessions align with SAMA’s auditing controls. 

4. Multi-Factor Authentication: Integration with various MFA providers and adaptive MFA adds multiple layers, enhancing authentication security. 

5. Password Management: Sectona offers a secure vault, automated password rotation, and customizable policies for password management. 

6. Access Provisioning and De-provisioning: Integration with Active Directory enables efficient provisioning and de-provisioning of user access. 

7. Risk Assessment: Sectona’s risk scoring and analytics help identify security anomalies and support ongoing risk management. 

8. Third-Party Access Management: Secure collaboration tools and granular access controls address third-party risk management. 

9. Just-in-Time Access: This feature minimises standing privileges by granting access only when needed. 

10. Compliance Reporting: Sectona provides pre-built and customizable compliance reports to support SAMA efforts. 

11. Scalability and Availability: The solution is designed for scalability and high availability, ensuring continuous access to critical systems. 

To learn more about the SAMA Cybersecurity Framework, please download the solution brief. 

Additionally, you can explore the Sectona Security Platform here.