Annex (1) to Decision No. 2 of 2026 Kuwait National Basic Cybersecurity Controls

  1. Introduction

The State of Kuwait recognizes that a strong cybersecurity posture is essential to protect national interests, public services, economic stability, and the safety of citizens and residents. Amiri Decree No. 37 of 2022 established the National Cyber Security Center (NCSC) as the competent national authority for cybersecurity. At a strategic level, NCSC’s objectives include building and developing an effective national cybersecurity ecosystem; protecting vital interests and critical infrastructure; strengthening national cybersecurity capabilities; promoting a national cybersecurity culture; and enabling cooperation, coordination, and information sharing with relevant local and international stakeholders. To achieve these objectives, NCSC is mandated to develop and issue national cybersecurity strategies, policies, standards, and implementation mechanisms; establish governance and national plans to address cyber risks and threats; coordinate cybersecurity operations and incident response, and provide support and guidance where needed; and conduct assessments and audits to verify compliance with issued requirements. Entities are obligated to maintain cybersecurity in a manner consistent with NCSC’s mandate; implement NCSC-issued strategies, policies, standards, and controls; promptly notify NCSC of actual or suspected cybersecurity threats or incidents; provide the documents, information, and access necessary to enable NCSC oversight; and comply with applicable requirements in the National Data Classification Framework (Decision No. 1 of 2025). This document sets out a minimum cybersecurity baseline that Entities MUST implement as essential cyber hygiene. This baseline forms Annex (1) to Decision No. 2 of 2026 concerning the National Basic Cybersecurity Controls in the State of Kuwait.

The baseline is:

• Aligned with recognized international frameworks, particularly the CIS Controls v8.1 – Implementation Group 1 (IG1) and the NIST Cybersecurity Framework (CSF).

• Referenced to the National Data Classification Framework (Decision No. 1 of 2025).

• Risk-oriented and practical, designed for Entities with limited cybersecurity resources.

• Intended as a starting point, not an end state. Entities can later build on this baseline with more advanced controls as their maturity increases. This baseline aligns with Kuwait’s national cybersecurity mandates, including the National Cybersecurity Governance Framework (Decision No. 35 of 2023), the National Data Classification Framework (Decision No. 1 of 2025), and Amiri Decree No. 37 of 2022 establishing NCSC.

• Establish a national baseline. Define realistic, implementable minimum controls that Entities MUST adopt to achieve a common level of cybersecurity hygiene and to protect the confidentiality, integrity, and availability of Entity assets.

• Align with international best practice. Ensure that the baseline is consistent with widely recognized international frameworks and guidance, such as CIS Controls v8.1 and NIST CSF, while allowing adaptation to Kuwait’s regulatory and operational context.

• Promote accountability and risk management. Require Entities to assign clear responsibilities, maintain policies and procedures, classify their data, manage service providers, and document compliance so that cybersecurity risks are identified, owned, and managed in a structured way.

• Enable measurable compliance. Ensure that implementation can be measured at least through periodic self-assessment against this baseline. Entities MUST be able to demonstrate their level of implementation of this baseline to NCSC upon request. Entities MUST also provide such information to other competent authorities where required under applicable law or sector-specific regulation.

This baseline, as Annex (1) to Decision No. 2 of 2026, applies to all Entities that fall under the mandate of NCSC as defined in Amiri Decree No. 37 of 2022 regarding the establishment of NCSC. Other public and private Entities not formally within this mandate are strongly encouraged to adopt this baseline on a voluntary basis in the interest of the resilience, safety, and economic stability of the State of Kuwait.

This baseline defines the national minimum cybersecurity controls that Entities MUST implement. Entities MAY implement stronger or additional controls where required by their risk profile, legal obligations, sector-specific requirements, or the sensitivity and criticality of the systems, services, and data they manage. This baseline is intended to establish a common national minimum level of cybersecurity and does not limit Entities from adopting more advanced or additional safeguards where appropriate. In this baseline: MUST – indicates a mandatory requirement; SHOULD – indicates a recommended practice; and MAY – indicates an optional practice.

• GOV – Govern: Establish and monitor the Entity’s cybersecurity risk management strategy, expectations, and policy.

• ID – Identify: Determine the current cybersecurity risk to the Entity.

• PR – Protect: Prevent or reduce cybersecurity risks.

• DE – Detect: Find and analyze possible cybersecurity attacks and compromise.

• RS – Respond: Take action regarding a detected cybersecurity incident.

• RC – Recover: Restore assets and operations that were impacted by a cybersecurity incident. Each control table below uses the following fields:

• Control ID – Unique identifier;

• Control Title – Short descriptive name;

• Purpose / Description – What risk or need it addresses; and

• Minimum Requirement – Simple, auditable expectation.

Control IDControl TitlePurpose / DescriptionMinimum Requirement
GOV-1Governance & RoleEstablish clear accountability for cybersecurity.The entity MUST designate an employee at manager level or above with overall responsibility for cybersecurity. Define and document roles and responsibilities for information security, IT operations, risk management, data classification, and incident response. Review and update this structure at least annually or when major organizational changes occur.
GOV-2Policies & Exception ManagementEnsure behavior and decisions are guided by documented, approved rules.Maintain core written policies that, at minimum, cover: acceptable use, Secure Configuration, data classification, access control, backup & recovery, incident response, and third party / service provider security. Policies SHOULD be approved by management and reviewed at least every two years. Any deviations MUST follow a simple exception process with documented risk acceptance and an expiry date.
GOV-3Data Classification & SovereigntyEnsure data is handled according to its sensitivity and legal requirements.Implement a data classification program aligned with the National Data Classification Framework, using at least Sensitive, Restricted, and Public categories, with clear criteria and examples. Issue a Data Classification Policy/Document approved by senior management and submitted to NCSC for approval, in accordance with Decision No. 1 of 2025. Tag or label data (and related systems/records) with its classification and ensure protection measures increase with sensitivity (for example: stronger access controls and encryption for Sensitive data). Storing or processing Sensitive data outside Kuwait MUST follow the national approval process and receive explicit NCSC approval before use (per applicable regulations).
GOV-4Kuwaitization & Vetting for Cyber RolesSupport national capacity building and reduce insider risk in critical cyber rolesFor key cybersecurity roles (e. g., SOC analysts, administrators, incident responders), prioritize qualified Kuwaiti nationals where feasible and consistent with national HR frameworks and local laws and regulations. For staff in such sensitive roles, perform basic pre employment screening (e.g., identity verification, employment history, conflict-of-interest checks) in line with applicable laws and HR policies. Maintain a simple list of designated “sensitive cyber roles” and ensure screening is documented.
GOV-5Periodic Self Assessment & Continuous ImprovementProvide a minimal mechanism to measure implementatio n of this baseline.At least once per year, complete a self assessment against this baseline using an NCSC-issued or NCSC approved checklist. Document the results, key gaps, actions, and target dates. Retain the record for at least three years and make it available to NCSC upon request. Use major incidents or audits to update priorities.
GOV-6Service Provider & Outsourcing GovernanceManage cybersecurity risk arising from external providers, including cloudEstablish and maintain an inventory of service providers (including cloud/managed services), including classification and an entity contact for each provider; review at least annually or upon significant change. • For service providers handling Sensitive data or supporting critical services, document the service scope and shared responsibilities for protecting the service and data. • Ensure incident response contact information includes relevant service providers, and define incident reporting timeframes and mechanisms for provider-related incidents. • For offboarding/termin ation, ensure required actions are performed to remove access and handle data appropriately, retaining evidence where applicable.
Control IDControl TitlePurpose / DescriptionMinimum Requirement
ID-1Asset & Service InventoryMaintain an up-to-date view of hardware and key servicesMaintain a central electronic inventory of hardware assets (servers, workstations, laptops, network equipment, IoT/OT devices, etc. ) and key on-premises services. Record at least: owner, ocation, purpose, criticality, and lifecycle state (in use, spare, retired). For physical assets, use unique, machine-readable labels (e.g., barcode/QR style) to support scanning and tracking. At least weekly, review network discovery or similar tools to identify unauthorized devices and either remove, block, or formally approve them.
ID-2Software & Provider InventoryMaintain visibility of software in use and service providers.Maintain a list of authorized software (including version families) and service providers (including cloud and SaaS). At least monthly, review systems for unauthorized software and either remove it or record a documented exception. The list register SHOULD include owner, contact details, service description, criticality, and data sensitivity (which classifications are processed). Review provider information at least annually
ID-3Data & Account InventoryUnderstand what data and accounts exist and who owns them.Maintain an inventory of critical and sensitive data sets, including classification, location, and business owner. Maintain an inventory of user and service accounts including privileges and last activity. Review accounts at least quarterly. Disable or remove dormant interactive user accounts that have not been used for 90 days, where the technology supports it. Review service accounts at least quarterly to validate continued business need. Ensure high-risk or privileged accounts are clearly identified.

8.1 PR-1 Secure Configuration, Hardening & Network Segmentation

Control IDControl TitlePurpose / DescriptionMinimum Requirement
PR-1Secure Configuration & HardeningReduce the attack surface of systems and devices.Establish hardened configuration baselines for servers, workstations, network devices, and key applications. From this baseline, disable or remove services, features and ports that are not needed for the system’s role. Change or disable default accounts and default passwords. Enable a host-based firewall on endpoints and servers and allow only the network traffic required for normal operation. Review configurations at least annually and after major changes.
PR-1.1Network SegmentationLimit the spread and impact of attacks by separating networks.Where feasible, separate user networks from server/data networks, and keep management/admin interfaces on a more restricted network segment. Place internet facing systems in a more controlled network zone. Avoid direct access from user networks to sensitive servers unless explicitly required and approved. • Do not treat network location alone as sufficient basis for trust. Access to management/admi n interfaces and Critical Systems MUST be explicitly authorized based on least privilege and protected with strong authentication in accordance with PR-2 (including MFA for administrative access where supported). • Document such access and review it at least annually.
PR-1.2Vulnerability Management & PatchingIdentify and address technical weaknesses in a structured way.Have a simple written process for vulnerability management and review it at least annually. Run automated vulnerability scans on key systems: at least monthly for internet-facing systems, at least quarterly for other important internal systems, and after major changes. After each scan, review the report, produce a short action list, and fix the most serious issues first (for example, high and critical findings). Aim to apply operating system and application patches at least monthly on supported systems. Keep records of scans and key remediation actions.

8.2 PR-2 Identity, Authentication & Password Hygiene

Control IDControl TitlePurpose / DescriptionMinimum Requirement
PR-2Identity, Authentication & Password HygieneEnsure access is properly controlled and accounts are harder to compromise.Require unique passwords for all accounts; do not reuse the same password across different systems. As a simple rule, require at least 8 characters for accounts protected by multi-factor authentication (MFA) and at least 14 characters for accounts without MFA. Avoid forcing regular password changes unless compromise is suspected. Enforce session lock or screen saver after 15 minutes of inactivity for workstations and around 2 minutes for mobile devices where practical. Limit administrator privileges to dedicated admin accounts, and require staff to perform day-to-day activities (email, web browsing, office work) from a normal user account. Implement MFA for all remote network access, externally exposed applications, and privileged/admin accounts where supported, using at least two different types of factor (something you know, something you have, something you are).

PR-2 – Additional baseline requirements

Control IDControl TitlePurpose / DescriptionMinimum Requirement
PR-2.1Corporate Email Only & Personal Email BanEnsure work communications use managed, auditable channels and reduce data leakage via personal email.Require that all official business communications use only Entity approved corporate email accounts on approved domains. Personal/consumer email accounts MUST NOT be configured on corporate devices and MUST NOT be used for work related communication. Enforce this via (1) an acceptable use policy, and (2) device and email configuration (e.g., MDM or mail client settings) that prevent adding personal accounts where feasible.
PR-2.2Password Manager & Credential HygieneHelp staff maintain strong, unique passwords without reuse.Provide or approve a password manager-style solution for staff who manage multiple credentials. Encourage use of long, unique passwords generated by the manager for each system. For shared/team accounts (where unavoidable), use shared password vaults or similar capabilities; do not share passwords through email, chat, or on paper.

8.3 PR-3 Awareness & Human Factors

Control IDControl TitlePurpose / DescriptionMinimum Requirement
PR-3Security Awareness & TrainingBuild a basic culture of secure behavior.Establish a security awareness program and provide training at least annually and for new joiners. At minimum, cover: social engineering and phishing, safe use of email and the web, handling of Sensitive and Restricted data, password and MFA hygiene, use of approved communication tools, use of portable media, and how to report suspicious activity or incidents. Use simple language and relevant examples.
Control IDControl TitlePurpose / DescriptionMinimum Requirement
PR-3.1Official Social Media & Digital PresenceEnsure official accounts are authentic, protected, and clearly distinguished from impostors.Maintain a central register of official Entity accounts on external platforms (e. g., major social networks, video platforms). Create official accounts using corporate email addresses and appropriate naming conventions. Where the platform provides it and criteria are met, enable verification or “official” status. Protect these accounts with MFA and role-based administration; review access at least annually and remove access when staff leave or change roles.

8.4 PR-4 Malware, Email & Web Protection

Control IDControl TitlePurpose / DescriptionMinimum Requirement
PR-4Malware, Email & Web ProtectionReduce the risk of malware and phishing attacks.Deploy endpoint protection (e. g., anti malware/EDR software) on supported servers and workstations with automatic updates and centralized alerting where possible. Use email and web security controls (e.g., spam filtering, attachment and URL filtering) to block common malicious content and clearly suspicious file types. Configure email systems to block or warn on dangerous file extensions that are not needed for business and to limit very large attachments according to business need. Configure email domains with appropriate anti-spoofing controls (SPF, DKIM, DMARC) to prevent impersonation. Train staff to be cautious with unexpected links and attachments, and to report suspicious messages.
Control IDControl TitlePurpose / DescriptionMinimum Requirement
PR-4.1Approved Communication & Videoconferencing PlatformsReduce risk from unapproved chat/voice/video tools and remote control apps.For official work (meetings, calls, messaging, screen sharing), use only Entity approved communication and collaboration platforms. Do not use personal or unapproved apps (for example, private messaging, personal email, unauthorized remote-control tools) for work data or meetings. Maintain a simple list of approved platforms and ensure staff are aware of it. Where feasible, restrict installation or use of unapproved tools on corporate devices via configuration.
Control IDControl TitlePurpose / DescriptionMinimum Requirement
PR-4.2Portable Media Device ControlLimit the risks from use of unapproved removable media devices.Where feasible, restrict or technically disable the use of unapproved portable storage media (e. g., USB drives) on Entity systems, especially those handling Sensitive data. Establish procedures to allow only authorized portable media if necessary for business, and train staff on proper usage of portable media devices.

8.5 PR-5 Data Protection, Backup & Lifecycle

Control IDControl TitlePurpose / DescriptionMinimum Requirement
PR-5Data Protection, Backup & LifecycleEnsure critical data is appropriately protected, can be restored, and is disposed of safely.Implement regular, automated backups for critical systems and data, with priority to Sensitive and Restricted data. Store backups in at least one separate location (for example, a separate network segment, storage system, or cloud account). Protect backup data from unauthorized access and tampering (e.g., access controls, encryption). Test restoration of backups for key systems at least annually. Define and apply retention periods and secure disposal procedures aligned with legal requirements and the National Data Classification Framework, ensuring Sensitive data is securely erased or destroyed when no longer needed. For Sensitive data, if backups involve storage outside Kuwait (such as cloud backups), obtain any required approvals in line with data sovereignty requirements.

8.6 PR-6 Physical Protection of Critical IT Assets

Control IDControl TitlePurpose / DescriptionMinimum Requirement
PR-6Physical Protection of Critical IT AssetsReduce the risk of tampering, theft or damage to critical IT equipment.Identify critical IT areas (for example, data centers, server rooms, main network rooms, and locations where backup media are stored) and keep a simple list of them. For these areas, implement basic physical protections appropriate to the site, including at least: • Doors or cabinets that can be locked when the area is unattended. • Restricted access so that only authorized personnel can enter or unlock equipment (for example, keys, access cards, or codes managed by IT or facilities). • A simple record of non-routine visitors (such as contractors or vendors) to critical IT areas, which MAY be kept using existing building or guard logs. Store backup media and portable equipment (such as laptops) in a locked room or cabinet when not in use; avoid leaving them unattended in public or shared areas. This control focuses on the physical protection of IT assets and SHOULD make use of the entity’s existing building or facility security arrangements wherever possible.
Control IDControl TitlePurpose / DescriptionMinimum Requirement
DE-1Audit Logging & MonitoringProvide visibility into suspicious activity and support investigations.Enable audit logging on critical systems, network devices, security tools, and key applications. At minimum, log authentication events, administrative actions, and important security events. Where feasible, centralize logs into a basic logging solution for easier review. • Restrict access to logs to authorized personnel only and protect logs from unauthorized modification or deletion (including logging configuration changes), prioritizing Critical Systems and the central logging solution where used. • Retain logs for at least 90 days live and 12 months in total (live or archived). Review logs for suspicious activity at a frequency appropriate to the Entity’s risk (for example, weekly for smaller Entities, daily for higher-risk environments)
DE-2Time SynchronizationEnsure consistent timestamps across systems to facilitate incident investigation.Ensure all information systems (servers, workstations, network devices) synchronize their system clocks to a reliable, authoritative time source (e. g., NTP). Timestamps in logs MUST be consistent across the infrastructure. Periodically verify that system clocks remain in sync (for example, by comparing log timestamps from different systems).
  1. RESPOND (RS) – Incident Reporting & Management
Control IDControl TitlePurpose / DescriptionMinimum Requirement
RS-1Incident Reporting to NCSC & LeadershipEnsure serious incidents are reported to NCSC and handled by designated leadersEstablish and communicate a simple incident reporting process so that staff know how to report suspected incidents (for example, phishing, data loss, or system compromise). Appoint one person as the incident response lead and at least one backup to coordinate incident handling, even if external service providers are used. Maintain up-to-date contact details for the incident lead, backup, relevant service providers, and NCSC. Where an actual or suspected cybersecurity incident or threat may be reportable under NCSC issued incident management or reporting guidance, the Entity MUST notify NCSC promptly through the official channels and within the applicable timelines set by NCSC. Where appropriate, the Entity MUST use out of-band communication channels during active incidents or where normal channels may be affected. The Entity MUST provide follow-up updates and information as required by applicable NCSC reporting guidance.
RS-2Basic Incident Handling & CoordinationProvide a structured but simple way to handle incidents and cooperate with NCSC.Maintain a short written incident response procedure that covers: initial triage, containment, communication, evidence preservation, recovery, and reporting/escalation (including when and how to notify NCSC and other regulators or law enforcement). When NCSC or another competent authority notifies the entity of a potential incident, promptly triage and investigate, take reasonable remedial actions, and provide feedback where requested. After significant incidents, perform a brief lessons learned review and record key improvements to be implemented, and share relevant lessons learned with NCSC or sector authorities where appropriate.
  1.  RECOVER (RC) – Recovery & Improvement
Control IDControl TitlePurpose / DescriptionMinimum Requirement
RC-1Recovery PlanningSupport structured recovery after incidents and disruptions.Maintain a simple recovery plan or documented procedures for restoring critical systems and services after incidents or other disruptions. The plan SHOULD reference backup locations, key contacts, and any sequencing needed for restoration, especially for Sensitive and Restricted data. Review and update the plan at least annually and after major changes.
RC-2Testing & Continuous ImprovementEnsure recovery works in practice and improvements are implemented.Conduct basic recovery or continuity tests (for example, tabletop exercises or partial restoration tests) for critical systems at least annually. After tests or real incidents, capture lessons learned, update procedures and controls where practical, and track completion of agreed improvements.
  1. Appendix A – Cloud Security Minimum Controls

This Appendix applies to all Entities using public cloud services, including Software-as-a Service (SaaS), Platform-as-a-Service (PaaS), and Infrastructure-as-a-Service (IaaS). It complements the national baseline controls by addressing the unique characteristics of cloud computing. In this Appendix, the Entity refers to the entity acting as the cloud tenant/customer, and CSP refers to the Cloud Service Provider. Core Principles:

• Shared Responsibility: Security in the cloud is a partnership. The Cloud Service Provider (CSP) secures the infrastructure, while the Entity secures the data and configuration.

• Identity as the Perimeter: In the cloud, identity (who you are) is more critical than the network (where you are).

Crucial Distinction: Customer Content vs. Operational Metadata – To ensure the baseline is technically feasible, it is vital to distinguish between the Entity’s data and the system data required to run the cloud. Customer Content: (Files, databases, application data). Residency and processing rules apply to Customer Content in accordance with the National Data Classification Framework and this Appendix. Operational Metadata: (Resource IDs, file names, IP addresses, billing logs, system status).

A.1 Cloud Acquisition & Contractual Governance

Goal: Ensure security is embedded before the contract is signed, leveraging existing national authorizations and global standards.

Control IDControl TitleMinimum Requirement
CLD-1Regulatory AuthorizationEntities MUST ensure the Cloud Service Provider (CSP) is authorized to operate in the State of Kuwait in accordance with regulations issued by the relevant national authorities
CLD-2Provider Due DiligencePrior to selection, Entities MUST evaluate the CSP’s security posture. This requirement is satisfied by reviewing the CSP’s valid, independent international security certifications (e.g., ISO 27001, SOC 2 Type II, CSA STAR Level 2).
CLD-3Right to Audit (Third-Party Assurance)Contracts MUST include a “Right to Audit. ” To protect the security of multi-tenant environments, this right is exercised by the Entity reviewing the CSP’s independent Third-Party Audit Reports (e.g., SOC 2, C5) rather than conducting physical data center visits.
CLD-4Incident Notification ClauseContracts MUST include a commitment from the CSP to notify the Entity of a confirmed data incident without undue delay to allow for accurate investigation and reporting.
CLD-5Data Ownership & ExitThe contract MUST explicitly state that the Entity retains exclusive ownership of their data. The CSP MUST provide tools or standard APIs to allow the Entity to retrieve their data upon contract termination.
CLD-6Service Level Agreements (SLAs)Contracts MUST define Service Level Agreements (SLAs) for availability. The agreement SHOULD include financial remedies (service credits) for failure to meet these standards.

A.2 Governance & Shared Responsibility

Control IDControl TitleMinimum Requirement
CLD-7Shared Responsibility MatrixEntities MUST document the cloud service model IaaS, PaaS, or SaaS) and the resulting division of security responsibilities. The Entity retains accountability for Data Classification, Identity & Access Management (IAM), and Resource Configuration, regardless of the model.
CLD-8Cloud Asset InventoryMaintain a real-time inventory of cloud resources. Use programmatic resource tagging to identify the Data Classification (Public, Restricted, Sensitive) and Business Owner of each resource.

A.3 Identity & Access Management (IAM)

Control IDControl TitleMinimum Requirement
CLD-9MFA for Cloud ConsolesMulti-Factor Authentication (MFA) MUST be enforced for all users with administrative access to the Cloud Management Console and root accounts.
CLD-10Service Account HygieneService Accounts (non-human identities) MUST NOT be used for interactive human login. Keys for service accounts SHOULD be rotated periodically based on risk, or managed via automated identity federation (e.g., OIDC) to prevent credential theft.

A.4 Data Protection & Sovereignty

Control IDControl TitleMinimum Requirement
CLD-11Encryption by DefaultAll data at rest in the cloud MUST be encrypted. Entities SHOULD utilize the CSP’s default encryption (platform-managed keys) as a minimum standard. For Sensitive data, Entities MAY opt for Customer-Managed Encryption Keys (CMEK) on cloud, based on a risk assessment. In accordance with Decision (1) of 2025.
CLD-12Data Residency (Customer Content)The Entity MUST configure cloud services and related contracts to store and process Customer Content (files, databases, application data) according to the National Data Classification Framework (Decision No. 1 of 2025).
CLD-13Operational Metadata ExemptionResidency requirements apply to Customer Content. Operational Metadata (e.g., project IDs, billing logs, system status, and IP addresses) can be processed globally to ensure platform security, reliability, and accurate billing. Entities must ensure that metadata identifiers (such as Project IDs, folder names and labels) remain non-sensitive.
CLD-14Public Access PreventionCloud storage resources (e. g., object storage buckets) MUST be configured to block public access by default. Public exposure MUST be an explicit, documented exception approved by the data owner.

A.5 Operational Security

Control IDControl TitleMinimum Requirement
CLD-15Cloud Audit LoggingEnable audit logging for cloud projects. Logs MUST capture “Admin Activity” (configuration changes) and “Data Access” (who accessed data) for sensitive workloads. Retain logs for a minimum of 12 months.
CLD-16Secure ConnectivityAll traffic between the entity and the cloud provider MUST be encrypted in transit using industry-standard protocols (e. g., TLS 1.2 or higher). Management interfaces MUST NOT be exposed directly to the public internet; use secure bastions, VPNs, or Identity-Aware Proxies
  1. Appendix B – Glossary and Acronyms

B.1 Glossary

TermDefinition
EntityCivil, military, or security government agencies, as well as public and private sector agencies within the State of Kuwait that are relevant to the Center, and other entities designated by the chief of NCSC in accordance with the provisions of Amiri Decree No. 37 of 2022.
Minimum RequirementsThe mandatory control statements in this baseline. Guidance and implementation notes are non-mandatory unless explicitly stated as a requirement.
ApplicableA requirement that is relevant to the Entity’s environment, systems, and services and is therefore included in compliance calculation.
Not Applicable (N/A)A requirement that does not apply to the Entity’s environment, with documented justification and approval per the Entity’s governance process.
ExceptionA formally approved, time-bound deviation from a Minimum Requirement, documented under the exception process (GOV-2), including scope, duration, and compensating controls where applicable.
Compensating ControlAn alternative control that reduces risk to a comparable level when a Minimum Requirement cannot be met as written; it MUST be documented and approved as part of an exception.
EvidenceDocumentation or artifacts demonstrating implementation (for example: policy, procedures, configurations, logs, tickets, inventories, or reports) sufficient for audit and oversight review.
Data classification levelsAs defined in the National Data Classification Framework (Decision No. 1 of 2025).
Cloud Service Provider (CSP)The provider of cloud services (for example: SaaS, PaaS, IaaS) used by the Entity.
Customer ContentData provided to, created by, or managed for the Entity within cloud services (for example: files, databases, application data).
Operational MetadataSystem and service metadata required to operate, secure, monitor, and bill cloud services (for example: resource IDs, billing logs, system status, IP addresses).

Unless explicitly defined in this document or in referenced national instruments, undefined technical terms should be interpreted using the NIST glossary. In case of any discrepancy, definitions in applicable national instruments and NCSC issuances take precedence.

B.2 Acronyms

AcronymMeaning
CISCenter for Internet Security
CMEKCustomer-Managed Encryption Keys
CSACloud Security Alliance
CSA CCMCloud Controls Matrix
CSPCloud Service Provider
CSFCybersecurity Framework
DEDetect (NIST CSF function)
EDREndpoint Detection and Response
GOVGovern (NIST CSF function)
IAMIdentity and Access Management
IDIdentify (NIST CSF function)
IG1Implementation Group 1
IaaSInfrastructure as a Service
MFAMulti-Factor Authentication
NCSCNational Cyber Security Center
NDANon-Disclosure Agreement
NISTNational Institute of Standards and Technology
PaaSPlatform as a Service
PRProtect (NIST CSF function)
RCRecover (NIST CSF function)
RSRespond (NIST CSF function)
SaaSSoftware as a Service
SIEMSecurity Information and Event Management
SLAService Level Agreement
SPFSender Policy Framework
DKIMDomainKeys Identified Mail
DMARCDomain-based Message Authentication, Reporting, and Conformance

الإشتراك بالنشرة الإخبارية