Standards Comparison

    SAMA CSF

    Mandatory
    2017

    Saudi regulatory framework for financial cybersecurity

    VS

    ISO 28000

    Voluntary
    2022

    International standard for supply chain security management systems

    Quick Verdict

    SAMA CSF mandates cybersecurity maturity for Saudi financial institutions via self-assessments and audits, ensuring resilience against cyber threats. ISO 28000 offers voluntary certification for global supply chain security management, helping organizations reduce risks and gain market trust.

    Cybersecurity

    SAMA CSF

    SAMA Cyber Security Framework Version 1.0

    Cost
    €€€€
    Complexity
    High
    Implementation Time
    6-12 months

    Key Features

    • Six-level maturity model targeting Level 3 minimum
    • Four core domains with detailed subdomains
    • Principle-based risk management approach
    • Mandatory for Saudi financial institutions
    • Board oversight and independent CISO requirements
    Supply Chain Security

    ISO 28000

    ISO 28000:2022 Security management systems Requirements

    Cost
    €€€€
    Complexity
    High
    Implementation Time
    12-18 months

    Key Features

    • Risk-based supply chain security assessment
    • PDCA cycle for continual improvement
    • HLS alignment for ISO integration
    • Supplier and third-party governance
    • Incident response and resilience plans

    Detailed Analysis

    A comprehensive look at the specific requirements, scope, and impact of each standard.

    SAMA CSF Details

    What It Is

    SAMA Cyber Security Framework (CSF) Version 1.0 is a mandatory regulatory framework issued by the Saudi Arabian Monetary Authority in May 2017. It prescribes principle-based, outcome-oriented cybersecurity controls for SAMA-regulated financial institutions, including banks, insurers, and payment providers. Its primary purpose is to ensure detection, resistance, response, and recovery from cyber threats via a risk-based approach and maturity model.

    Key Components

    • Four domains: Leadership & Governance, Risk Management & Compliance, Operations & Technology, Third-Party Security.
    • Numerous subdomains with principles, objectives, and control considerations.
    • Six-level Cyber Security Maturity Model (0-5), minimum Level 3 (structured/formalized).
    • Self-assessment via questionnaire; aligns with NIST, ISO 27001, PCI-DSS.

    Why Organizations Use It

    Mandated compliance avoids penalties, audits, operational disruptions. Enhances resilience, reduces incident impacts, enables competitive differentiation, market access, efficiency via standardized controls. Builds stakeholder trust in Saudi's digital financial sector.

    Implementation Overview

    Phased program: initiation/gap analysis, risk assessment, design/roadmap, deployment, operations/monitoring, audit/improvement. Applies to all SAMA entities; requires board sponsorship, CISO, evidence for self-assessments/SAMA reviews. Iterative, multi-year for higher maturity.

    ISO 28000 Details

    What It Is

    ISO 28000:2022 — Security and resilience — Security management systems — Requirements is an international management system standard for establishing, implementing, maintaining, and improving a security management system (SMS) tailored to supply chain security. It employs a risk-based approach via the PDCA cycle and High Level Structure (HLS) for holistic protection of people, assets, and operations.

    Key Components

    • Clauses 4–10: context, leadership, planning, support, operation, evaluation, improvement
    • Risk assessment/treatment, security policies, objectives, controls (physical, procedural, personnel)
    • Supplier governance and incident response
    • Certification model per ISO 28003 with audits

    Why Organizations Use It

    • Reduces disruptions, theft, sabotage risks
    • Meets contractual/regulatory demands (e.g., C-TPAT equivalents)
    • Lowers insurance costs, enables trade facilitation
    • Boosts resilience, reputation, competitive bidding

    Implementation Overview

    • Phased: scoping, gap analysis, risk strategy, deployment, audits
    • Scalable across sizes/industries (logistics, manufacturing)
    • Involves mapping, training, supplier integration
    • Optional third-party certification with surveillance

    Key Differences

    Scope

    SAMA CSF
    Cybersecurity for financial sector info assets
    ISO 28000
    Supply chain security management system

    Industry

    SAMA CSF
    Saudi financial institutions only
    ISO 28000
    All industries worldwide, supply chain focus

    Nature

    SAMA CSF
    Mandatory regulatory framework
    ISO 28000
    Voluntary international certification standard

    Testing

    SAMA CSF
    Periodic self-assessments, SAMA audits
    ISO 28000
    Internal audits, third-party certification

    Penalties

    SAMA CSF
    Regulatory enforcement, fines, scrutiny
    ISO 28000
    Loss of certification, no legal penalties

    Frequently Asked Questions

    Common questions about SAMA CSF and ISO 28000

    SAMA CSF FAQ

    ISO 28000 FAQ

    You Might also be Interested in These Articles...

    Run Maturity Assessments with GRADUM

    Transform your compliance journey with our AI-powered assessment platform

    Assess your organization's maturity across multiple standards and regulations including ISO 27001, DORA, NIS2, NIST, GDPR, and hundreds more. Get actionable insights and track your progress with collaborative, AI-powered evaluations.

    100+ Standards & Regulations
    AI-Powered Insights
    Collaborative Assessments
    Actionable Recommendations

    Check out these other Gradum.io Standards Comparison Pages