Direct Inward Dialing: +1 408 916 9393
The Signals Intelligence Agency (SIA), formerly known as the National Electronic Security Authority (NESA), is the federal cybersecurity authority in the UAE established to tackle cybersecurity challenges and ultimately strengthen its national security infrastructure. SIA developed the UAE National Information Assurance Framework (NIAF) to implement the National Cyber Security Strategy, which aims to secure information systems and networks within the country. Information Assurance (IA), in turn, focuses on managing the risks related to the use, processing, storage, and transmission of information, both physically and electronically.
Entities operating within the UAE are required to comply with IA controls. This includes:
Entities trying to comply with SIA controls must ensure that the following components are in place for seamless compliance:
A risk management policy must be implemented to ensure that data-related risks are promptly identified and mitigated.
Access control measures, such as strong authentication methods and periodic access reviews, must be in place to ensure that only authorized individuals have access to sensitive information and systems.
Data must be regularly backed up to protect organizations from accidental data loss.
Access to data and systems has to be continuously monitored for detecting anomalies and potential vulnerabilities.
ADManager Plus is an IGA solution that helps organizations meet their IGA needs and demonstrate compliance. With features such as risk assessment, comprehensive reporting, and more, ADManager Plus can help entities operating in the UAE swiftly achieve IA compliance. Here's how:
| Controls | Description | How ADManager helps comply with UAE IA |
|---|---|---|
| M2.2.1 | The entity shall:
1) Apply the information security risk assessment process to identify risks associated with the loss of confidentiality, integrity, and availability for its information by:
2) Identify the risk owners. 3) Document the results of the risk identification. |
Entities can assess, identify, and mitigate identity-related risks from the Identity Risk Assessment report. This report provides a comprehensive view of an entity's security posture with a risk score, list of risky objects, risk exposure, and other relevant information. |
| M2.2.2 (1) | The entity shall:
1) Assess the potential consequences that would result if the identified risks were to materialize by assessing the consequences of losses of confidentiality, integrity or availability. 2) Assess the realistic likelihood of the occurrence of the identified risks based on the existing controls, identified vulnerabilities, and threats. 3) Determine the level of risk. 4) Document the results of the risk analysis. |
The Identity Risk Assessment report assesses and provides actionable insights such as likelihood of occurrence, remediation measures, severity, and more. |
| M2.3 | To identify and plan appropriate risk treatment for the risks that have been assessed. | Entities can manage the identified risky objects right away from the report itself and can execute their risk treatment. |
| T5.2.1 (4) | The entity shall periodically check and revoke access related to temporary and inactive accounts. | Access certification campaigns can be configured to run periodically to review users' access rights and take necessary actions. |
| T5.2.4 (2) | The entity shall establish a access rights review procedure to ensure access rights are reviewed periodically or on any changes in users’ statuses. | Periodic access reviews can be performed to validate users' access rights and take appropriate actions. |
| T5.2.4 (3) | The entity shall periodically check the granted special access to ensure its validity. | |
| T5.5.3 (1) | The user credential management system shall automate the user credential change procedure, ensuring the authenticity of the associated user identity. | Password resets can be automatically performed at a desired schedule. |
| T5.5.3 (2) | The user credential management system shall validate that the changed credentials have sufficient strength for their intended use to ensure quality secret authentication. | Password complexity can be configured to ensure that passwords have a minimum and maximum length and contain a mix of alphanumeric characters for added security. |
| T5.6.1 (2) | The entity shall ensure access restriction is based on users' roles and responsibilities. | Users can be delegated with tasks and permissions based on their roles. |
To ensure ongoing compliance with the UAE's IA controls, entities can:
Schedule and generate over 200 predefined reports and meet audit requirements effortlessly.
Implement role-based access control, just-in-time access, and complex password policies to strengthen your security posture.
Automate access reviews and efficiently manage access to network resources.
Notify stakeholders and audit committee members as and when a compliance-related report is generated.
Exhaustive reporting on Active Directory Users and user-attributes. Generate reports in user-activity in your Active Directory. Perform user-management actions right from the report interface!
Learn moreActive Directory reports to assist you for compliance to Government Regulatory Acts like SOX, HIPAA, GLBA, PCI, USA PATRIOT...and much more! Make your organization compliance-perfect!
Learn moreMake your everyday Active Directory management tasks easy and light with ADManager Plus's AD Management features. Create, modify and delete users in a few clicks!
Learn moreConfigure Active Directory Terminal Services attributes from a much simpler interface than AD native tools. Exercise complete control over technicians accessing other domain users' computers.
Learn moreGet rid of the inactive, obsolete and unwanted objects in your Active Directory to make it more secure and efficient...assisted by ADManager Plus's AD Cleanup capabilities.
Learn moreA complete automation of AD critical tasks such as user provisioning, inactive-user clean up etc. Also lets you sequence and execute follow-up tasks and blends with workflow to offer a brilliant controlled-automation.
Learn more