SIA IAS compliance support that works for your business

Find out how Fortra’s Data Classification Suite helps you meet the obligations of 54 key controls and subcontrols of the Information Assurance Standards (IAS) outlined by the UAE Signals Intelligence Agency (SIA) — formerly the National Electronic Security Authority (NESA).

Data Classification Suite (DCS) helps you protect your organization’s valuable information and supports your compliance with the Information Assurance Standards (IAS) outlined by the UAE Signals Intelligence Agency (SIA) — formerly the National Electronic Security Authority (NESA).

DCS defines and supports your policy across 54 key IAS controls and subcontrols, ensuring that sensitive and personal data is protected throughout your organization and wider ecosystem. Since the UAE controls are based on international standards, compliance helps your organization meet its data protection obligations in other jurisdictions as well.

Discover
Classify
Protect
Text

Protecting Your Information In Compliance

With SIA IAS Protection starts with discovering the information you actually have and accurately classifying the value of it. Only then can information be protected.

Classification With Machine Learning (T1.3.1)

Classification is key to ensuring that sensitive data is handled correctly. DCS uses an advanced policy engine to allow highly granular levels of control.

Fortra’s DCS Intelligent Protection is an optional system that will suggest or enforce a particular classification. The system can be trained to recognise IP that is sensitive to your organisation and data classed as personal within the UAE.

Awareness And Training (M3.3.3, M3.4.1)

Security is a continuous process. By using DCS in their everyday work, users are continuously made aware of security policies and reminded to protect valuable information correctly. DCS can suggest classifications based on its understanding of the content, continuously training users to recognise its value to the organisation.

Mobile devices and the cloud (T1.2.3, T6.3.1)

Mobile devices and the cloud are important business tools but come with higher risk of data leakage. DCS can restrict the most sensitive information from being shared in this way. DCS can also scan cloud accounts to discover information that should be classified.

Cryptography, Data Leakage And Rights Management (T7.4.1, T7.6.4, T4.3.1)

DCS works with your other systems to prevent personal data and confidential intellectual property from leaving your organisation unprotected. DLP, EDRM and encryption systems will operate with higher accuracy to secure correctly classified information.

User Access Control (T5.2.1)

As users change roles and departments and eventually leave the organisation, their access control rights must keep up. DCS defines multiple classifications to strengthen enforcement control of the types of information that users can access.

External Communications (M1.4.2)

Control the information you share with IAS-defined third parties, such as partners, customers, interest groups, outsourcers, teleworkers, the public and the supply chain. DCS open metadata ensures protection of information shared via email and messaging on desktop computers, laptops or mobile devices.

Labelling Sensitive Information (T1.3.2)

Sensitive information is labelled digitally with embedded open metadata and physically on printed copies (with headers, footers and watermarks). Users are always reminded of the value of information when sharing it. They will also know when to follow retention, clear-screen and clear-desk policies (T2.3.9), as well as disposal and reuse of equipment policies (T2.3.6).

Reporting And Compliance (M4.3.1)

Management of security in the entity requires monitoring of compliance and reporting to management and SIA if required. DCS can log users’ data classification compliance levels as needed to measure the effectiveness of training.

Data Handling (T1.3.3)

Mobile devices and the cloud are important business tools but come with higher risk of data leakage. DCS can restrict the most sensitive information from being shared in this way. DCS can also scan cloud accounts to discover information that should be classified.

Business Continuity (T3.5.1, T9.2.1)

Backup and restore and other disaster recovery systems must process sensitive data appropriately. DCS labelling enables these systems to work effectively to restrict sensitive data to the right users and locations.

Text

Information Assurance Standards Controls List

DCS solutions apply to the IAS Management and Technical Controls below. AA=Always Applies (mandatory in all entities)

Left Column

M1 Strategy & Planning

M1.1.3 AA Roles & Responsibilities

M1.2.1 AA Infosec Policy

M1.2.2 AA Supporting Policies

M1.3.2 Confidentiality Agreements

M1.3.4 Special Interest Groups

M1.3.5 Risks: External Parties

M1.3.6 Customers

M1.4.2 AA Internal and External Communications

M1.4.3 AA Documentation

M2 Risk Management

M2.2.1 AA Risk Identification

M3 Awareness & Training

M3.3.2 AA Implementation Plan

M3.3.3 AA Training Execution

M3.4.1 Awareness Campaign

M4 Human Resources Security

M4.3.1 AA Management Responsibilities

M4.4.3 AA Removal of Access Rights

M5 Compliance

M5.2.2 IP Rights

M5.2.3 Protection of Organisational Records

M5.2.4 Protection of Personal Information

M5.3.1 Standards Compliance

M5.4.1 Technical Compliance Checking

M5.5.1 Audit Controls

Middle Column

M6 Performance Evaluation & Improvement

M6.3.1 AA Corrective Action

M6.3.2 AA Continual Improvement

T1 Asset Management

T1.2.3 Acceptable Use of Assets

T1.3.1 Classification of Information

T1.3.2 Labelling of Information

T1.3.3 Handling of Assets T2 Physical and Environmental Security

T2.3.6 Disposal/Reuse of Equipment

T2.3.7 Removal of Property

T2.3.9 Clear Desk/Clear Screen Policy

T3 Operations Management

T3.5.1 Information Backup

T3.6.2 Audit Logging

T4 Communications

T4.2.1 Information Transfer Procedures

T4.2.4 Electronic Messaging

T4.2.5 Business Information Systems

T4.3.1 eCommerce

T4.3.3 Publicly Accessible Information

T4.4.2 Information Sharing Communities

T5 Access Control

T5.2.1 User Registration

T5.2.4 Review of User Access Rights

T5.6.1 Information Access Restriction

T5.6.3 Publicly Accessible Content

T5.7.1 Access Control for Mobile Devices

T5.7.2 Teleworking

Right Column

T6 Third-Party Security

T6.2.1 Service Delivery

T6.3.1 Cloud Environments

T6.3.2 Cloud Provider Agreements

T7 Information Systems Acquisition, Development & Maintenance

T7.2.1 Requirements Analysis and Specification

T7.4.1 Cryptographic Controls

T7.6.4 Information Leakage

T7.6.5 Outsourced Software Development

T7.8.1 Supply Chain Protection

T7.8.3 Limitation of Harm

T9 Information Systems Continuity Management

T9.2.1 Business Continuity

How protected is your data?

Meet with one of our experts to assess your needs, and we'll walk you through our solution.

Request a Demo