KSA OTCC-1:2022 Simplified
The National Cybersecurity Authority (NCA) OTCC-1:2022 sets OT cybersecurity controls for Saudi Arabia. Dragos solutions help exceed OTCC requirements.
OTCC-1:2022 is Saudi Arabia’s NCA regulation for OT cybersecurity controls. It applies to critical infrastructure in oil and gas, refineries, manufacturing, power, water, and essential sectors, building upon NCA ECC-1:2018 requirements.
NCA OTCC-1:2022 covers: Cybersecurity Governance (people, process, technology), Defense (controls to secure OT environments), Resilience (risk analysis and incident response), and Third-Party Cybersecurity (extending controls to suppliers).
Dragos Services provides OT Security Assessments, Capability Maturity Assessments, and Incident Response Planning. Our platform validates controls and generates audit-ready documentation while Services establish risk frameworks and policies.
Dragos Platform delivers OT asset visibility, vulnerability management, IOC and anomaly-based threat detection, and behavioral analysis to help meet NCA controls. Our Intelligence provides specialized vulnerability analysis and alternative mitigation strategies integrated into the platform to align to NCA guidelines.
Our Services provide risk analysis, architecture reviews, and incident response planning. The platform enhances OT asset resiliency while Intelligence delivers insights on attack groups and TTPs to reduce response times and ensure continued operations.
Yes, Dragos Services provides architecture reviews to design third-party security policies. Our platform validates control effectiveness and monitors third-party interactions with OT systems, identifying potential cyber risks from suppliers and service providers.
Our platform is purpose-built for industrial environments, providing asset inventory, ICS protocol analysis, vulnerability management, and OT-specific threat detection. We understand industrial protocols and operational constraints while maintaining uptime and safe operations.
WorldView delivers OT-specific intelligence covering adversary campaigns, detection TTPs, vulnerability mitigation advice, and insights from global threats. This intelligence integrates with our platform and supports risk assessment and incident response planning.