ARTICLE
16 January 2026

Saudi Arabia Issues New Non-CNI Cybersecurity Controls For The Private Sector

BA
BSA Law

Contributor

BSA is a full-service law firm headquartered in Dubai, UAE, with 9 offices across the region. We are deeply rooted in the region, offering a competitive advantage to clients seeking advice that works in the real world and is truly in tune with the market. We have rights of audience in every country where we have an office, means that we can litigate all the way from the boardroom to the courtroom.
The Saudi National Cybersecurity Authority ("NCA") has issued the Non-CNI Private Sector Entities Cybersecurity Controls (the "Controls")...
Saudi Arabia Technology
Jana Mrad’s articles from BSA Law are most popular:
  • in United States
BSA Law are most popular:
  • within Technology, Media, Telecoms, IT, Entertainment and Insolvency/Bankruptcy/Re-Structuring topic(s)

The Saudi National Cybersecurity Authority (“NCA”) has issued the Non-CNI Private Sector Entities Cybersecurity Controls (the “Controls”), establishing a mandatory baseline and detailed requirements for private‑sector entities that are not part of sensitive national critical infrastructure, to strengthen national security and enable a safe digital economy.

The Controls apply to two categories: (A) Large entities (250+ full‑time employees or annual revenue over SAR 200,000,000) and (B) Small and Medium Enterprises (6–249 full‑time employees or annual revenue between SAR 3,000,000 and SAR 200,000,000).

The new controls are tailored by entity size across three components: Governance, Cybersecurity Defense, and Third-party and Cloud Computing Cybersecurity.

Core defense measures include endpoint protection, data classification, backup management and periodic penetration testing. The Controls also mandate establishing a designated leadership function for cybersecurity for each entity.

While the Controls do not specify by when companies are expected to become compliant, we advise in-scope entities to begin assessing their current controls against the baseline, prioritize mandatory items by category, and build a remediation plan that addresses governance, technical, and third‑party/cloud requirements, with documented verification and reporting workflows.

The content of this article is intended to provide a general guide to the subject matter. Specialist advice should be sought about your specific circumstances.

[View Source]
See More Popular Content From

Mondaq uses cookies on this website. By using our website you agree to our use of cookies as set out in our Privacy Policy.

Learn More