Cybersecurity Controls Requirements - Dec 2022
Cybersecurity Controls Requirements - Dec 2022
Guideline
12/7/2022
Page 1 of 17
1. General Requirements
Page 2 of 17
TPC-5 Multi-factor authentication must be - Provide technical check evidence to confirm that
enforced on all access to Cloud services strong authentication is in place on cloud access (e.g.,
utilized by the Third Party, including access multifactor) a clear evidence of the Authentication
to cloud-based email. page must be provided.
- Provide policies and procedures related to cloud
security policy part of the third party access control
policy.
TPC-6 Third Party must inform Saudi Aramco when - Provide the third party policy/contract in term of
employees provided with Saudi Aramco user dealing with Saudi Aramco credentials.
credentials no longer need their access, or - Provide a sample of communication (Email) to Saudi
are transferred, re-assigned, retired, Aramco to revoke invalid accounts.
resigned or no longer associated with the - Provide evidence for revoked accounts that are invalid
Third Party. accounts for people who are retired, resigned or no
longer associated with the Third Party.
TPC-7 Third Party must require all information - Provide acceptable use policy and/or training
systems users to take a yearly mandatory materials to ensure content is adequate.
Cybersecurity training that addresses - Provide user training reports and/or documentation
acceptable use and good computing to ensure users are trained in accordance with
practices. Training must address the applicable policy, guidance, and/or requirement (e.g.,
following topics: annual cybersecurity training of all employees).
1. Internet and social media security - Provide evidences of updating the training materials
2. Cybersecurity Acceptable Use based on changes in cyber threat environment.
3. Social Engineering and phishing emails
4. Sharing credentials (i.e. username and
password)
5. Data Security
TPC-8 Third Party must inform personnel, in - Provide Third Party Company Policy and contract of
keeping with Third Party Company Policy, using personal email.
that using personal email to share and - Provide the Third Party policy / contract ensure third
transmit Saudi Aramco data is strictly parties are complying with cybersecurity
prohibited. responsibilities defined in contracts and agreements.
-Provide related emails communicated to third party’s
employees to ensure the compliance of this control.
- Provide relevant counter measure that third party has
taken to comply with the control requirements.
Page 3 of 17
TPC-11 Third Party Technology Assets and Systems - Provide evidence of patch management policy and
must be regularly updated with operating procedures
system (OS), software and applets patches - Provide evidence of on sample of workstations to
(i.e. Adobe, Flash, Java etc.) ensure that OS and software are up-to-date
- Provide evidence of scheduling and technology used
for patch and updates deployment.
TPC-12 Third Party Technology Assets must be - Provide evidence of the anti-virus installed on
protected with anti-virus (AV) software. endpoint devices
Updates must be applied daily, and full - Provide evidence of configuration console of the
system scans must be performed every two installed anti-virus software to determine the last
weeks. updates and full system scan that were performed
- Provide evidence of the history of updates
TPC-13 Third party must implement Sender Policy - Provide evidence of SPF implementation on the third
Framework (SPF) technology on the mail party mail server.
server.
TPC-14 Third party must enforce Sender Policy - Provide evidence of SPF enforcement on Saudi
Framework (SPF) feature on Saudi Aramco Aramco email domains: Aramco.com and
email domains: Aramco.com and Aramco.com.sa.
Aramco.com.sa.
TPC-15 Third Party must publish SPF record in DNS - Provide evidence of SPF record on the third party DNS
server. server.
TPC-16 Third Party must inspect all incoming emails - Provide evidence of using an anti-spam protection for
originating from the Internet using anti- all incoming emails on the email security appliance.
spam protection.
TPC-17 Third Party must use a private email domain. - Provide evidence of the third party acceptable use
Generic domains, such as Gmail and policy (AUP) that highlights the use of the third party
Hotmail, must not be used. private email domain only and prohibit the use of
generic domains.
TPC-18 Third Party must have formal procedures for - Provide evidence of the third party termination
off-boarding employees. Off-boarding procedures to determine whether accounts/access are
procedures must include the return of disabled in a timely manner.
assets, and removal of all associated access. -Provide evidence of the return of assets.
- Provide samples of the removal of all access to Assets
part of the third party Off-boarding procedures.
Page 4 of 17
TPC-23 If Third Party discovers a Cybersecurity - Provide evidence of the third party cybersecurity
Incident, Third Party must (besides its Incident management policies and procedures that
continuous efforts to resolve and mitigate conform with the requirements of this control.
the Incident):
- Notify SAUDI ARAMCO within two (24)
hours of discovering the Incident
- Follow the Cybersecurity Incident Response
Instructions set forth in Appendix A.
Page 5 of 17
TPC-25 Third Party must establish, maintain and - Provide evidence of the third party Cybersecurity
communicate Cybersecurity Policies and Policies and Standards.
Standards. - Provide evidence of communicating Cybersecurity
Policies to employees.
- Provide different policy updates versions
TPC-26 Third Party must be staffed by employee(s) - Provide a copy of the organizational chart.
whose primary responsibility is - Provide evidence of job descriptions, agreements,
Cybersecurity. Responsibilities of that RACI charts, service level agreements (SLAs) and/or
personnel must include maintaining the contracts to determine if they include cybersecurity
security of information systems and ensuring roles and responsibilities.
compliance with existing policies.
TPC-27 Third Party must conduct annual external - Provide evidence of Penetration testing reports
Penetration Testing on its IT infrastructure conducted and analyzed on IT infrastructure
systems, and internet facing applications. considering all critical, internal and external systems,
and internet facing applications.
- Provide evidence of a policy tackling penetration test
schedule, scope and requirements exist and
communicated to stakeholders
- Provide evidence of remediation and action plan
related to penetration test results.
TPC-28 Third Party must conduct annual external - Provide evidence of Penetration testing reports
Penetration Testing on Cloud Computing conducted on Cloud Computing Service(s) used by
Service(s) used by Saudi Aramco. Saudi Aramco.
- Provide evidence of a policy tackling penetration test
schedule, scope and requirements exist and
communicated to stakeholders
- Provide evidence of remediation and action plan
related to penetration test results.
TPC-29 If Third Party is hosting a website for Saudi - Provide evidence of Penetration testing reports
Aramco, annual Penetration Testing must be conducted to test website security.
conducted to test website security. - Provide evidence of a policy tackling penetration test
schedule, scope and requirements exist and
communicated to stakeholders
- Provide evidence of remediation and action plan
related to penetration test results.
TPC-30 Third party data center must be certified by -Provide evidence of data center certificate from
an internationally-recognized authority. internationally-recognized authority.
Page 6 of 17
Page 7 of 17
Page 8 of 17
TPC-45 Multi-Factor authentication must be - Provide technical check evidence to confirm that
enforced on end-users accessing Content strong authentication is in place on Content
Management Services (CMS) of Cloud Management Services (CMS) of Cloud Computing
Computing Service Service (e.g., multifactor)
- A clear evidence of the Authentication page must be
provided.
- Provide policies and procedures related to cloud
security policy part of access control policy.
TPC-46 All systems (routers, switches, servers and - Provide evidence of Physical security controls are
firewalls) must be housed in a used to prevent unauthorized access to
communication room and locked rack(s). The telecommunication systems.
access to the communication room must be - Provide evidence of access is restricted to authorized
contingent on security requirements such as people.
access card readers or biometric devices.
TPC-47 Third party must define a process for visitor - Provide evidence of the third party visitor
management. The process should include management policy
maintaining and regularly reviewing visitor
logs. The visitor log should capture - Provide evidence of visitor logs, including the
information such as: following:
- Visitor identification e.g. Government ID - Visitor Government ID
- Visit Purpose - Visit Purpose
- Check in/check out date and time - Check in/check out date and time
TPC-48 Visitors accessing Critical Facilities must be - Provide evidence of a policy that state the
escorted at all times. requirement of escorting visitors accessing critical
facilities on the company premise.
TPC-49 Third Party must dedicate an access - Provide evidence of dedicated working area is
restricted working area for personnel with allocated for Saudi Aramco projects and workstations.
access to Saudi Aramco network. - Provide evidence of physical security control
implementation on Aramco working area.
TPC-50 Backup media must be secured to - Provide evidence of backup media physical security
block/inhibit unauthorized physical access. controls implemented.
- Provide evidence of backup media related policy and
configuration.
Page 9 of 17
TPC-52 Third Party must encrypt data in transit (e.g. - Provide evidence of web security appliance to ensure
SSH, FTPS, HTTPS, IPSEC). that encryption technology is used and enabled when
data is transmitted across publicly-accessible networks.
- Provide evidence of adequate policies are in place
regarding transmission of data, especially the one
transmitted via email.
TPC-53 Third Party must encrypt (e.g. using HTTPS) -Provide evidence of applied configurations from the
sessions where Critical Saudi Aramco available security appliance, showing the use of secure
information or data will be transmitted from transmission protocols.
and to the Public Cloud Computing Services, - Provide evidence of configurations for session
and enforce session authentication, lockout, authentication enforcement, lockout, and timeout.
and timeout.
TPC-54 Third Party must implement encryption - Provide evidence of encryption mechanisms applied
mechanisms, using at least AES encryption on all devices, including disk drives by checking
algorithm, and 256 bit key, on all devices or BitLocker Drive encryption.
storage media hosting sensitive data per the - Provide evidence of a policy ensuring mobile devices
Third Party’s assets classification policy. (e.g., laptops, tablets, and removable media) that are
used to store confidential data are encrypted.
TPC-55 Encryption key management capability, -Provide evidence of encryption key management
including preservation and retrieval, must be procedure and policy.
defined, applied, and periodically reviewed. -Provide evidence of key management configurations
TPC-56 Third Party must implement a device control - Provide evidence of assets used to perform/conduct
mechanism on Assets that are used to Aramco business with removable media restrictions to
receive, store, process or transmit Saudi ensure restrictions are working as expected and
Aramco data such as disabling the use of comply with the organization's policy.
external storage media. - Provide evidence of the removable media policy,
which may include:
- Encryption of removable media
- Restricted access to removable media (e.g., USB
restrictions)
Page 10 of 17
Page 11 of 17
TPC-65 Backup stored at an off-site location must be - Provide evidence of third party backup policy,
encrypted using at least AES encryption process and procedures.
algorithm, and 256 bit key, except for data - Provide evidence of the backup tapes are encrypted
classified as public. for off-site location.
TPC-66 Third Party must implement a sanitization - Provide evidence of media sanitization (data
process before any Assets are loaned, destruction) policies.
donated, destroyed, transferred, or - Provide evidence of sanitization techniques and
surplused. The process must be aligned to procedures are commensurate with the security
industry best practices such as NIST 800-88. category or classification of the information or asset
and in accordance with organizational standards and
policies.
- Provide proof (e.g., destruction certificates) that
media sanitization is occurring according to policy.
Page 12 of 17
Page 13 of 17
Page 14 of 17
Page 15 of 17
TPC-87 Information systems and applications must - Provide a list of the monitoring controls implemented
log auditable events as stated in Appendix C. by the third party at the application/user account level
(e.g., account management, user access roles, and user
activity monitoring, file and database access).
- Provide evidence of monitoring reports includes
detection and alerting of cybersecurity events (e.g.,
unauthorized account access, unauthorized file/system
access, access out of hours, access to sensitive data,
unusual access, unauthorized physical access, privilege
escalation attacks).
- Consider Appendix C on Third Party Standard.
TPC-88 Incident management policy and plan must - Provide evidence of incident management policy and
be documented, maintained and procedures to determine if reporting structure and
communicated to management and communication channels are clearly defined.
appropriate team members. - Provide evidence that employees are trained to
report suspected security incidents.
- Provide copies of reports from recent incidents to
validate reporting is consistent and follows the plan.
TPC-89 Third Party must have an Incident Response - Provide evidence of the incident response plan to
capability that includes preparation, determine if appropriate steps are taken consider the
detection and analysis, containment, following:
eradication, recovery, documentation and 1. Obtain evidence of event notifications (e.g.,
preservation of evidence, communication detection alerts, reports) from different
protocols and lessons learned. systems.
2. Determine who receives alerts or reports
from detection systems and what actions are
taken once reports are received.
3. Review the incident response plan to
determine if actions taken follow the plan.
Page 16 of 17
Page 17 of 17