The National Cybersecurity Authority's Essential Cybersecurity Controls — the NCA ECC — have been mandatory for Saudi organisations since 2020. Yet many SMEs operating in the Kingdom either don't know they apply to them, assume compliance is only for large enterprises, or have been told by their IT company that they're "basically compliant" without any formal assessment ever taking place.

This guide gives you the plain-English version of what the ECC is, who it applies to, what each domain actually requires, what happens if you don't comply, and a self-assessment checklist you can use right now — without needing a technical background to understand it.

What the NCA ECC Actually Is

The Essential Cybersecurity Controls are a framework published by the National Cybersecurity Authority — Saudi Arabia's government body responsible for cybersecurity regulation across the Kingdom. The framework defines a baseline set of security controls that organisations operating in Saudi Arabia are expected to implement and maintain.

The ECC is not a suggestion. It carries regulatory weight and is enforced through the NCA's oversight function. Think of it as Saudi Arabia's minimum cybersecurity standard — the floor, not the ceiling.

The controls are organised into five domains:

Domain What It Covers SME Priority
1. Cybersecurity Governance Policies, roles, accountability, risk management High Priority
2. Cybersecurity Defence Access control, endpoint protection, network security, logging High Priority
3. Cybersecurity Resilience Backup, recovery, business continuity, incident response High Priority
4. Third-party & Cloud Security Vendor management, cloud risk, supplier contracts Medium Priority
5. Industrial Control Systems OT/ICS environments, manufacturing, operational technology Sector-Specific

Does It Apply to You?

This is where most SME owners get confused. The NCA ECC technically applies to all government entities and organisations in the national critical information infrastructure. Healthcare, financial services, telecoms, energy, and transport are explicitly within scope.

However, any business operating in Saudi Arabia that processes sensitive data, works with government clients, or operates in a regulated sector should treat ECC alignment as expected practice — not a tick-box exercise but a genuine baseline. Increasingly, large Saudi enterprises require their suppliers and partners to demonstrate NCA ECC alignment as a condition of doing business.

If you're a fintech, a clinic, a logistics company, or a professional services firm operating in the Kingdom, ECC alignment is not optional in any practical commercial sense — even if your specific entity isn't explicitly named in the mandatory scope.

A practical test: if a large Saudi corporate asked you today to demonstrate your cybersecurity posture before awarding a contract, could you? If the answer is no — or "not without scrambling for a week" — that's your answer on whether ECC alignment matters to your business.

What Each Domain Requires in Practice

Let's translate all five domains into plain English for a typical SME with 50 to 500 users:

1. Governance

You need a written cybersecurity policy, a named person accountable for cybersecurity, and a process for reviewing and updating both. For an SME this doesn't need to be an elaborate CISO function — it needs to be documented, owned, and acted upon. The NCA wants to see that someone is responsible and that the business treats security as a managed risk, not an IT afterthought.

2. Defence

This is the largest domain and covers: asset inventory (you can't protect what you don't know you have), access management and multi-factor authentication, network segmentation, endpoint protection, email security, vulnerability management, and security logging. Most SMEs have some of these in place already. The gap is usually in the documentation proving they exist and the consistency with which they're applied across the whole organisation — not just head office.

3. Resilience

You need tested backups, a documented incident response plan, and evidence that you can restore operations within a defined timeframe. Having backups is not the same as having tested backups. The ECC requires both — and the distinction matters enormously when you're dealing with a ransomware incident at 2am on a Friday.

The single most common finding in Saudi SME assessments is a resilience gap — organisations that have backup systems configured but have never actually tested whether a full recovery works. Discovering this during an incident is significantly more expensive than discovering it during an assessment.

4. Third-party and Cloud Security

If you use cloud services — and virtually every business does — or if you share data with suppliers, partners, or outsourced IT providers, this domain applies to you. The ECC requires you to have written agreements covering cybersecurity responsibilities with key third parties, and to assess the security posture of vendors who have access to your systems or data. For most SMEs, this means reviewing your SaaS agreements and your IT support contracts, not conducting deep due diligence on every supplier.

5. Industrial Control Systems

This domain is specific to organisations that operate Operational Technology (OT) environments — manufacturing plants, utilities, building management systems. If your business is purely office-based, this domain has limited applicability. If you operate physical infrastructure of any kind, it warrants specific attention.

What Happens If You Don't Comply?

The NCA has enforcement powers and has demonstrated willingness to use them for organisations in regulated sectors. But for most SMEs, the more immediate consequences are commercial rather than regulatory:

Compliance is not primarily about avoiding fines. It's about being the kind of business that Saudi clients and partners are willing to trust with their data and their operations.

NCA ECC Self-Assessment Checklist

Use this checklist to get an honest picture of where your business currently stands. A "no" or "unsure" answer on any item represents a gap that a formal assessment would address.

Question Yes No / Unsure
Do you have a written cybersecurity policy that has been reviewed in the last 12 months?
Is there a named individual in your organisation responsible for cybersecurity?
Do you maintain a current inventory of all devices and systems connected to your network?
Is multi-factor authentication (MFA) enforced for all staff accessing business systems and email?
Are user access rights reviewed and updated when staff join, change roles, or leave?
Do you have endpoint protection (antivirus/EDR) deployed on all devices, including remote worker laptops?
Are your backups tested regularly — meaning you have actually restored from them to verify they work?
Do you have a documented incident response plan that staff are aware of?
Do your contracts with IT suppliers and cloud providers include cybersecurity obligations?
Have you ever had an independent review of your security posture — not from your IT provider, but from an external advisor?

If you answered "No" or "Unsure" to three or more of the above, a formal gap assessment would give you a clear, prioritised remediation plan. Most SMEs can address the majority of NCA ECC gaps within a 3–6 month window with the right guidance.

How to Approach Compliance Practically

The most common mistake is treating ECC compliance as a one-time project rather than an ongoing posture. The right sequence for an SME is:

  1. Gap assessment — understand where you currently stand against the ECC controls, documented formally. This is the starting point — you cannot build a remediation plan without it.
  2. Prioritised remediation — address high-risk gaps first, using a phased roadmap that is realistic for your budget and team size. Not everything needs to be fixed at once.
  3. Documentation — ensure all controls have written policies and evidence of implementation. The NCA wants to see proof, not promises.
  4. Periodic review — review your posture at least annually, or after any significant system change, staff restructure, or new cloud adoption.
NCA ECC and SAMA CSF — what is the difference? If your business is in financial services — banking, insurance, fintech, or payment processing — you also fall under the Saudi Arabian Monetary Authority Cybersecurity Framework (SAMA CSF). The two frameworks overlap significantly but are not identical. Read our comparison guide: SAMA CSF vs NCA ECC to understand which controls apply to your sector.
A note on PDPL: In addition to the NCA ECC, Saudi businesses handling personal data should also be aware of the Personal Data Protection Law (PDPL), enforced by the Saudi Data and AI Authority (SDAIA). NCA ECC compliance provides a strong foundation for PDPL compliance, but the two are not identical. If you handle personal data — which most businesses do — PDPL requires separate consideration.

ECC compliance isn't about achieving a perfect score on day one. It's about being able to demonstrate — to a client, regulator, or insurer — that you understand your security posture and have a credible plan to manage it. That starts with knowing where you stand, which is exactly what a Nexasecure Security Health Check is designed to provide.