
Cybersecurity, GRC & SecOps
NCA ECC · SAMA · PDPL · NCA BCM · Aramco CCC
Saudi Arabia operates one of the most demanding cybersecurity regulatory environments in the world. Duroob’s practice is built around helping institutions not only meet these obligations, but operationalise them so compliance becomes a continuous state rather than an annual exercise.
Capabilities
| Capability | What Duroob Delivers |
|---|---|
| Integrated Risk Management (IRM/GRC) | Policy and compliance management, risk dashboards, audit management, vendor risk, pre-built control libraries mapped to NCA ECC, SAMA and PDPL. |
| Vulnerability Response | End-to-end vulnerability lifecycle — scanner integration, risk-based prioritisation, patch orchestration, exception management, executive reporting. |
| Security Incident Response (SecOps) | SOC operating model design, SIEM/SOAR integration, incident playbooks, threat intelligence enrichment, automated containment. |
| Cybersecurity Architecture | Network and security architecture for high-assurance environments — segmentation, zero-trust, OT/IT convergence, national identity integration. |
| NCA ECC & SAMA Alignment | Gap assessment, remediation roadmaps, ongoing compliance monitoring against NCA ECC and SAMA Cybersecurity Framework. |
| Business Continuity & DR | NCA BCM alignment, DR architecture, RPO/RTO design, warm standby, automated failover testing, crisis runbook authoring. |
| PDPL Privacy Programme | Personal Data Protection Law programme — data classification, processing inventory, lawful basis, data subject rights workflows, breach notification, DPO operating model. |
Our Security Products
PAM — Privileged Access Management
Secures, controls and monitors access to sensitive systems by privileged users — system admins, DBAs, and third-party vendors. Enforces least privilege, session recording, credential vaulting and just-in-time access.
IAM — Identity and Access Management
Framework for managing digital identities and controlling access to enterprise resources — single sign-on, multi-factor authentication, lifecycle automation, access governance.
