NCA ECC Compliance Guide 2026 for Saudi Organisations
A practitioner's guide to NCA Essential Cybersecurity Controls — scope, five domains, assessment process and evidence for Saudi government and CNI operators.
The National Cybersecurity Authority Essential Cybersecurity Controls — NCA ECC — is the baseline cybersecurity standard every Saudi government entity and critical national infrastructure (CNI) operator is measured against. Where SAMA CSF governs the financial sector, NCA ECC governs everything else that the Kingdom considers sensitive: ministries, public authorities, state-owned enterprises, telecommunications operators, energy and water utilities, transportation, healthcare systems and the private-sector CNI that underpins national services.
This guide is a practitioner walkthrough of what ECC requires, who has to comply, and what a credible compliance programme looks like in 2026.
What the NCA ECC is
The National Cybersecurity Authority was established by Royal Order in 2017 and, in 2018, published the Essential Cybersecurity Controls. ECC is deliberately called a baseline — it is the minimum cybersecurity posture the NCA expects from any in-scope entity, and sits under a wider NCA framework family that includes the Critical Systems Cybersecurity Controls (CSCC), Cloud Cybersecurity Controls (CCC), Operational Technology Cybersecurity Controls (OTCC), Data Cybersecurity Controls (DCC) and Telework Cybersecurity Controls (TCC).
ECC is organised into five main domains:
- Cybersecurity Governance — policies, roles, risk management, compliance and audit.
- Cybersecurity Defence — asset management, identity, network and system security, email and browsing security, cryptography, backup, vulnerability and penetration testing, logging and monitoring.
- Cybersecurity Resilience — cybersecurity in business continuity management.
- Third-Party and Cloud Computing Cybersecurity — cyber requirements flowing to suppliers and cloud providers.
- Industrial Control Systems (ICS) Cybersecurity — OT-specific requirements for operators of process-control environments.
Across these five domains are roughly 114 subcontrols. Each one is a cybersecurity outcome the NCA expects, and each in-scope entity must evidence implementation.
Scope: who has to comply
ECC applies in three tiers. The first is all government entities in Saudi Arabia — every ministry, public authority, commission, bureau and agency. The second is private-sector organisations that operate critical national infrastructure — telecoms, energy, water, healthcare systems, transport, banking infrastructure, and organisations that process sensitive national data. The third is entities that hold, process or exchange national-level sensitive information regardless of sector.
The practical rule of thumb is: if an NCA compliance letter arrives, you are in scope. In-scope private-sector organisations are often surprised at how broadly "critical infrastructure" is interpreted by the NCA, and the cost of under-scoping is a finding at first assessment.
How NCA ECC differs from SAMA CSF
The two most important Saudi cybersecurity frameworks serve different audiences and behave differently in practice.
SAMA CSF is principle-led, maturity-scored, and sector-specific to the Saudi Central Bank's supervised population. It expects year-on-year improvement against a five-level maturity model and treats governance and third-party depth as distinct domains.
NCA ECC is more prescriptive and control-oriented. Each subcontrol is a stated expectation, and the assessment is primarily about whether the control exists and operates — with evidence. The NCA assesses entities through a combination of self-assessment, submission of evidence, and targeted on-site checks.
In short: CSF asks "how mature is your programme?"; ECC asks "do you have these controls operating, and can you prove it?" Both are compatible with a single unified control library, but teams running both frameworks simultaneously need to understand that the evidence format and the assessment cadence differ.
The five domains in practical terms
Cybersecurity Governance (domain 1). ECC expects a documented cybersecurity strategy approved at the highest level, a defined organisational structure with a dedicated cybersecurity function, a risk management approach, policies that are reviewed and approved on a cadence, and internal audit of the cybersecurity programme. The governance domain also includes cyber awareness and training expectations that go beyond a single annual e-learning module.
Cybersecurity Defence (domain 2). This is the largest domain by control count and covers the day-to-day technical controls: asset and inventory management, identity and access management, privileged access, network security, system hardening, email and browsing security, encryption, backup, vulnerability management, penetration testing and continuous logging and monitoring. A credible ECC programme needs evidence that these controls are not just implemented but operating — patch compliance metrics, penetration test reports with remediation tracking, vulnerability scan results with SLAs, and so on.
Cybersecurity Resilience (domain 3). Where SAMA CSF treats business continuity as adjacent, NCA ECC folds cybersecurity resilience directly into the core framework. Entities must show that cybersecurity requirements are embedded in the BCM lifecycle, that cyber events are considered in business impact analysis, and that recovery plans cover cyber scenarios.
Third-Party and Cloud Cybersecurity (domain 4). ECC expects a formal third-party cybersecurity programme: due diligence before onboarding, contractual cybersecurity requirements, ongoing monitoring and termination controls. Cloud arrangements carry their own expectations, and for in-scope entities the Cloud Cybersecurity Controls (CCC) apply in addition to ECC when cloud is used.
ICS Cybersecurity (domain 5). For entities operating industrial control systems — utilities, energy, manufacturing, certain transport operators — ECC requires ICS-specific controls: network segmentation from corporate IT, vendor support controls, hardening of ICS components and monitoring. For OT-heavy organisations the Operational Technology Cybersecurity Controls (OTCC) add significant further depth on top.
How the NCA assesses compliance
NCA assessment combines self-assessment, evidence submission through the NCA's compliance platform, and targeted on-site review. Entities are expected to submit evidence against each ECC subcontrol, and the NCA has a well-defined process for rating each control as compliant, partially compliant or non-compliant. Non-compliance carries remediation obligations with defined deadlines, and persistent non-compliance can escalate to formal enforcement.
Two things make the assessment experience much better: first, having evidence organised against control IDs before the NCA asks, not after; second, having a unified view of governance, technical and third-party controls so that evidence can be produced without a scramble across seven different teams.
A practical 2026 readiness roadmap
Phase 1 — scoping and gap. Confirm which NCA frameworks apply — ECC always, plus CSCC/CCC/OTCC/DCC/TCC where relevant. Run a structured gap assessment against every applicable subcontrol.
Phase 2 — governance uplift. Approve the cybersecurity strategy at the highest level, formalise the cybersecurity organisation, write or refresh the policy stack, and make sure internal audit has a cybersecurity audit plan.
Phase 3 — technical depth. Close the defence-domain gaps that matter most to operational resilience: identity and privileged access, vulnerability management, logging and monitoring, backup and recovery.
Phase 4 — third-party and cloud. Build the vendor lifecycle, apply ECC-derived contract clauses to new and renewed contracts, and — if cloud is in use — assess against CCC.
Phase 5 — evidence and submission. Collect evidence against every subcontrol in a single platform, so that the NCA submission is produced from live data rather than a manual scramble.
Government entities that run this programme on a connected platform typically reach a defensible ECC position in six to nine months from baseline. Entities running it on document libraries and spreadsheets routinely take twice as long.
How GRC Vantage helps with NCA ECC
GRC Vantage's compliance module ships with the full NCA ECC control library, pre-mapped to SAMA CSF, ISO 27001 and NIST CSF so that evidence is captured once and presented in the format each audience expects. The platform supports the NCA evidence-submission workflow, runs the gap assessment, manages the third-party lifecycle against ECC-tagged controls, and — critically — can be deployed inside Saudi Arabia on sovereign infrastructure to satisfy data residency expectations. Our delivery teams are based in Riyadh and Dammam and routinely work with Saudi government entities and CNI operators running their first NCA submission.
For the full picture of the NCA framework family — ECC, CSCC, CCC, OTCC, DCC and TCC — read our pillar guide on NCA frameworks. If you are preparing for your next NCA assessment, book a demo and we will walk through how Saudi organisations use GRC Vantage to run a unified NCA compliance programme.

The GRC Vantage team brings together compliance, risk, audit and business continuity practitioners based in Riyadh and Dammam. We help Saudi banks, government entities and regulated enterprises navigate the SAMA framework family, the NCA framework family, PDPL, ISO 27001 and ISO 22301.
Related articles
A free NCA ECC compliance checklist for 2026 — every domain, sub-control and evidence requirement Saudi government and CNI operators need, downloadable.
A factual comparison of SAMA CSF and NCA ECC — issuer, scope, structure, control counts, assessment methodology and how Saudi organisations manage both.
A practical guide to audit management software for Saudi internal audit functions — IIA-aligned methodology, risk-based planning, IPPF and KPIs in 2026.