miniOrange Logo

Products

Plugins

Pricing

Resources

Company

SAMA CSF Compliance Framework: Complete Guide

Minal Purwar
28th January, 2026

SAMA compliance in Saudi Arabia marks a pivotal cybersecurity evolution, safeguarding the booming financial sector against sophisticated cyber threats. As Saudi Arabia advances its Vision 2030 digital transformation, the Saudi Arabian Monetary Authority (SAMA) has rolled out the SAMA compliance framework, a comprehensive set of regulations mandating robust cybersecurity for all licensed financial institutions.

What is SAMA compliance? At its core, it's Saudi Arabia's strategic cybersecurity move to fortify banks, insurance firms, financing companies, and financial market infrastructures. The framework spans four key domains: governance and oversight, cybersecurity controls (including identity and access management), third-party risk management, and incident response. Enforced since 2020 with periodic updates, it requires organizations to achieve specific maturity levels, verified through annual audits.

This guide breaks down SAMA compliance in Saudi Arabia, from framework basics to a practical roadmap. Whether you're building a SAMA compliance checklist or seeking consulting, miniOrange's identity and privileged identity solutions align seamlessly to speed up your compliance.

Understanding SAMA Compliance Framework

The SAMA compliance framework serves as the cornerstone of SAMA compliance in Saudi Arabia, providing a structured blueprint for cybersecurity resilience. Drawing from global benchmarks like NIST CSF, ISO 27001, Basel Committee guidelines, and PCI DSS, it ensures financial entities in the Kingdom maintain high maturity across critical areas. SAMA compliance in cybersecurity emphasizes proactive defenses, making it indispensable for protecting sensitive customer data and operations.

What is SAMA Compliance?

SAMA compliance in cybersecurity delivers a unified approach to cyber risk management, fostering optimal maturity in security controls while safeguarding the broader financial ecosystem. Unlike generic standards, it's tailored to Saudi Arabia's regulatory environment, integrating Sharia principles where applicable. The framework mandates 20 control objectives across domains, scored on a 1-5 maturity scale, Level 3+ required for most banks.

Who Must Comply with SAMA Compliance?

SAMA compliance in Saudi Arabia mandates adherence for these SAMA-licensed entities:

  • Banks and banking institutions (full framework required)
  • Insurance and reinsurance companies (risk-based implementation)
  • Financing companies and money changers (cybersecurity/third-party focus)
  • Financial market infrastructures (e.g., stock exchanges, clearing houses)
  • Fintech firms and digital banks (pre-licensing proof required)
  • Foreign branches/subsidiaries (subject to on-site inspections)

Core SAMA Compliance Principles & Internal Control

The SAMA Compliance Principles & Internal Control drive execution through these pillars:

  • Board-endorsed cybersecurity governance (strategy approval, KPIs)
  • Risk management integrated with enterprise processes (annual threat modeling)
  • Operational controls for information assets (IAM, PAM, encryption, vulnerability management)
  • Third-party security (vendor assessments, SLAs, right-to-audit)

Consequences of Non-Compliance

Non-compliance triggers escalating penalties under SAMA compliance. Financial fines reach SAR 5 million per breach (e.g., SAR 100K+ for IAM gaps), alongside operational restrictions like service suspensions. Severe cases lead to license revocation, public disclosures, and executive liability under Saudi cyber laws. In 2025, SAMA levied over SAR 20M in penalties across 50+ violations.

The Four SAMA Compliance Framework Domains

The SAMA compliance framework structures cybersecurity requirements into four interconnected domains that collectively fortify Saudi Arabia's financial ecosystem. Each domain addresses specific risk areas while ensuring organizations achieve maturity-optimized security controls aligned with SAMA compliance principles & internal control standards. Here's the detailed breakdown:

Four SAMA Compliance Framework

Cyber Security Leadership & Governance

Boardroom Accountability is Non-Negotiable. This foundational domain demands executive-level commitment through a board-endorsed cybersecurity governance structure that cascades responsibility throughout the organization. Organizations must establish:

  • Documented cybersecurity strategy aligned with Vision 2030 business objectives
  • Enterprise-wide cybersecurity policy communicated to all employees
  • Clear roles & responsibilities matrix following SAMA internal audit principles
  • Cybersecurity governance integrated into project management frameworks

The Outcome: Significant shift from siloed IT security to enterprise-wide risk ownership. Boards answer directly to SAMA for cybersecurity maturity, ensuring SAMA compliance principles drive organizational culture.

Cyber Security Risk Management & Compliance

From Reactive Firefighting to Proactive Risk Mastery. This domain mandates enterprise risk-aligned cybersecurity processes that identify, assess, prioritize, and mitigate threats systematically. Key requirements include:

  • Cybersecurity risk management process integrated with enterprise risk frameworks
  • Regulatory compliance tracking for PCI-DSS, EMV standards, and SWIFT CSCF
  • Continuous risk monitoring with documented risk registers
  • International standards adherence (NIST, ISO 27001, Basel Committee)

Business Impact: Converts cybersecurity from a cost center to a strategic advantage. SAMA laws and regulations compliance becomes an automated, audit-ready reality rather than an annual scramble. Risk officers gain executive visibility into threats affecting financial stability.

Cyber Security Operations & Technology

Where Technical Controls Meet Business Reality. Domain 3 delivers 17+ operational controls protecting information assets across the technology stack:

Cyber Security Operations & Technology

Reality Check: Banks require 100% Domain 3 compliance. Fintechs prioritize 1.3.5 IAM with 1.3.12 Payments. SAMA compliance in cybersecurity demands production-grade controls, not theoretical policies. This domain represents the technical foundation proving organizational maturity to SAMA auditors.

Third-Party Cyber Security

Your Weakest Vendor is Your Biggest Risk. Domain 4 extends SAMA compliance boundaries beyond corporate walls, mandating:

  • Vendor contract cybersecurity clauses with audit rights
  • Third-party risk assessments before engagement
  • Outsourcing policy with security exit criteria
  • IAM enforcement on partner access (Control 1.3.5 extension)

The Challenge: 70%+ of Saudi financial breaches trace to third-party compromise. SAMA compliance in Saudi Arabia holds you accountable for vendor security failures. Organizations must demonstrate equivalent security controls that extend to all external relationships.

Critical SAMA Compliance Controls

While the four domains provide the strategic framework, SAMA compliance Saudi Arabia certification depends entirely on implementing and documenting specific technical controls that SAMA auditors verify during mandatory annual self-assessments.

The Priority SAMA Compliance Controls Reference Table

Control Code Requirement Summary Auditor Evidence Requirements Banks Fintechs Insurance
1.3.3 Asset Management Define, approve, implement asset management process supporting unified, up-to-date asset register Complete asset inventory, update procedures documentation, and asset classification policy Required Required Risk-based
1.3.5 Identity & Access Management Restrict access to information assets based on business requirements and need-to-know principles Access control policy, 90-day user entitlement reviews, privileged account logs, and failed login analysis MANDATORY MANDATORY Required
1.3.6 Application Security Define, approve, implement cybersecurity standards for application systems with periodic effectiveness evaluation Secure coding standards document, quarterly vulnerability scan reports, and application security testing results Required Required Risk-based
1.3.8 Infrastructure Security Define, approve, implement cybersecurity standards for infrastructure components Server hardening checklists, network segmentation diagrams, and firewall rule audits MANDATORY Required Required
1.3.12 Payment Systems Define, approve, implement, monitor cybersecurity standard for payment systems ensuring confidentiality/integrity TLS certificate validation, payment gateway security configs, transaction monitoring logs, and tokenization proof MANDATORY MANDATORY N/A
1.3.14 Cyber Security Event Management Define, approve, implement security event management process analyzing operational/security logging SIEM configuration reports, incident response timelines, and log retention policy compliance Required Required Required
1.3.16 Threat Management Define, approve, implement the threat intelligence management process Threat intelligence feed subscriptions, quarterly threat reports, and intelligence integration evidence Required Risk-based Risk-based
1.3.17 Vulnerability Management Define, approve, implement the vulnerability management process for identification/mitigation Vulnerability scan schedules, patch management records, and remediation SLA compliance MANDATORY Required Required

Talk to expert accelerate your sama readiness

Get personalized guidance from miniOrange experts to fast‑track compliance success.

Talk to an Expert

Common Challenges in Achieving SAMA Compliance

Governance Buy-In & Executive Accountability

Boards treat cybersecurity as IT's problem rather than enterprise risk. Only 42% of Saudi banks have established board-endorsed governance structures required by SAMA. Budgets remain trapped in IT departments, CISOs lack executive reporting cadence, and project governance ignores security requirements. SAMA rejects self-assessments failing Control 1.1.1. This creates a critical roadblock for all organizations. No governance guarantees automatic SAMA rejection.

Technical Debt & Legacy Systems

65% of banks run unsupported mainframes that block modern IAM implementation for Control 1.3.5. Custom payment gateways lack the tokenization required by Control 1.3.12. Mixed OS environments defy hardening standards mandated by Control 1.3.8. Remediation delays span 6-18 months. This creates operational restrictions during modernization under SAMA scrutiny. Legacy systems ultimately dictate certification timelines.

Third-Party Risk Management Complexity

Banks average 200+ vendors, but 87% lack standardized security contract clauses. Organizations fail to deploy vendor security questionnaires. Offshore developers operate beyond SAMA jurisdiction. SaaS platforms provide no audit rights. 70% of breaches originate from third parties. SAMA holds primary institutions fully accountable regardless. Vendor failures directly cause your audit failure.

Resource & Skills Shortage

Saudi Arabia faces a 47% cybersecurity skills gap that cripples compliance execution. Compliance teams consist of 2-3 FTEs managing 47 controls simultaneously. Banks lack dedicated IAM engineers, SIEM experts, and third-party risk specialists. SAMA rejects 60% of self-assessments for incompleteness. Talent competition with Aramco and NEOM kills timelines, as local hiring also requires 6-9 months.

Evidence Collection & Monitoring Gaps

Manual access reviews consume 4 weeks every quarter. Excel-based asset inventories remain perpetually outdated. Organizations lack centralized logging, providing Event Management capability for Control 1.3.14. Maturity remains capped at Level 2 maximum. SAMA demands continuous measurement rather than one-time deployment. Manual processes limit compliance to the minimum.

Evolving Regulatory Requirements

SAMA updates its framework annually, with 2026 cloud and AI revisions pending. Static compliance policies become obsolete during mid-project execution. Organizations lack mechanisms for tracking SAMA circulars. Riyadh and Jeddah offices apply varying interpretations. This moving target frustrates roadmap execution. Mid-year control additions force planning cycle restarts.

How miniOrange Maps to SAMA Compliance Requirements

Saudi financial institutions struggle with the same SAMA controls year after year, particularly Control 3.3.5 Identity and Access Management, cited in 60%+ of audit findings. miniOrange delivers production-grade solutions specifically engineered for SAMA compliance across both Identity and Access Management (IAM) and Privileged Access Management (PAM). This section details exact control mappings with auditor-ready evidence generation.

A. Identity and Access Management Solutions

SAMA Control 3.3.5 mandates that access to information assets must be restricted based on "need-to-know" business requirements, with only approved users receiving sufficient privileges. miniOrange provides comprehensive IAM capabilities that directly satisfy this control and its sub-requirements.

Identity and Access Management

Centralized Identity Platform

miniOrange delivers a single platform managing identities and access across all enterprise applications, infrastructure components, and user populations, both internal employees and external third parties. This eliminates siloed access management systems that create compliance gaps. The centralized dashboard provides SAMA auditors with immediate visibility into access entitlements across the entire organization, satisfying the unified management requirement (SAMA 3.3.5-1).

Role-Based and Attribute-Based Access Control

The platform enforces both Role-Based Access Control (RBAC) and Attribute-Based Access Control (ABAC) to map business roles and contextual attributes to permissions precisely. Least privilege enforcement occurs automatically at enterprise scale, ensuring employees only access systems necessary for their specific job functions. Quarterly access certification campaigns generate audit-ready reports proving ongoing compliance with SAMA's need-to-know principles (SAMA 3.3.5-4a).

Automated User Lifecycle Management

miniOrange integrates with HR systems, Active Directory, and other authoritative sources to automate user provisioning, modification, and de-provisioning. When employees join, change roles, or leave the organization, access rights update automatically according to predefined workflows. Third-party contractor access follows identical lifecycle controls, ensuring external users never retain access beyond contractual periods (SAMA 3.3.5-4 b1–b3).

Enterprise-Grade Multi-Factor Authentication

MFA deployment proves comprehensive across all sensitive systems:

  • Core banking applications: Hardware tokens, FIDO2, and biometrics
  • Payment gateways: SMS OTP fallback with adaptive authentication
  • Administrative consoles: Mandatory push notification approval
  • Remote access channels: VPN, RDP, SSH, and Citrix with continuous re-authentication

miniOrange supports 15+ authentication methods, ensuring 100% MFA coverage required by SAMA for critical and remote systems (SAMA 3.3.5-4e, 4f1a).

Federated Single Sign-On

Support for SAML 2.0, OAuth 2.0, OpenID Connect, and SCIM enables seamless federation across cloud, on-premises, and partner applications. Centralized policy enforcement ensures consistent authentication and authorization regardless of application location or ownership, simplifying SAMA compliance across hybrid environments.

Fast Track Your SAMA Compliance

Connect with miniOrange specialists and get tailored guidance for your SAMA compliance needs.

Book Consultation

B. Privileged Access Management Solutions

SAMA explicitly mandates strict controls over privileged and remote accounts, requiring individual accountability, password rotation, and session monitoring. miniOrange PAM solutions deliver complete coverage.

Privileged Access Management Solutions

Automated Privileged Account Discovery

The platform automatically discovers all privileged accounts through the Privileged Account Discovery feature, such as local administrator, domain admin, service accounts, database owners, network device credentials across Windows, Linux, Unix, databases (Oracle, SQL Server, MySQL), and cloud infrastructure (AWS IAM roles, Azure AD). No manual inventory required, eliminating the common audit gap where organizations overlook service accounts (SAMA 3.3.5-4f1).

Secure Credential Vaulting

With the Enterprise Password Vault Solution, all discovered privileged credentials are stored in an encrypted vault. Administrators never know actual passwords, eliminating password sharing and insider threat risks. Checkout/check-in workflows ensure credentials remain protected while enabling legitimate administrative tasks (SAMA 3.3.5-4f4a).

Automated Password Rotation

Non-personal privileged account automates the password rotation, following configurable policies: Daily rotation: Service accounts, application accounts Post-session rotation: Elevated administrator accounts Pre-defined schedules: Database and network device credentials

Rotation events generate immutable audit logs proving compliance with SAMA password management requirements (SAMA 3.3.5-4f4c).

Comprehensive Session Management

All privileged sessions proxy through miniOrange with:

  • Keystroke/video recording for forensic analysis
  • Real-time session monitoring with termination capabilities
  • Complete command logging with contextual metadata
  • RDP/SSH/VNC gateway eliminating direct server access

The session management through miniOrange PAM enables SAMA auditors with direct evidence of privileged activity, who performed actions, and compliance with operational policies (SAMA 3.3.5-4f1–f3).

Just-In-Time Privilege Elevation

Standing administrator privileges become obsolete. With just-in-time access, users request temporary elevated access for specific systems with a defined duration and scope. Approval workflows, risk-based MFA, and automatic de-elevation ensure privileges exist only when business justified, satisfying SAMA's least privilege mandate.

Individual Accountability Enforcement

Every privileged action traces to a specific individual identity, not shared accounts. Integration with enterprise directories ensures actions link to verifiable user identities. Audit logs contain complete accountability chains proving which human performed which actions on which systems at which times.

Break-Glass Emergency Access

Controlled break glass account scenarios support multi-approver MFA workflows, comprehensive session recording, and mandatory post-incident reviews. All break-glass usage generates immediate executive notifications and detailed forensic evidence for SAMA incident reporting requirements.

Audit-Ready Evidence Generation

miniOrange automatically generates SAMA self-assessment deliverables:

  • Access certification reports proving Control 3.3.5 effectiveness
  • Privileged session logs with complete accountability chains
  • Password rotation audit trails spanning the credential lifecycle
  • MFA enforcement statistics across all covered systems
  • User lifecycle management reports demonstrating provisioning/de-provisioning

Centralized dashboards provide real-time compliance status across all 3.3.5 sub-controls, eliminating months of manual evidence collection common with legacy approaches.

Experience SAMA Compliance without barriers

Start your free trial today and explore miniOrange’s powerful compliance features risk‑free.

Start Free Trial

Roadmap to Achieve SAMA Compliance: Your 6-Step Certification Journey

This roadmap addresses the documented challenges from governance gaps, legacy systems, and resource constraints, while providing clear milestones for self-assessment submission.

Step 1: Framework Comprehension and Gap Analysis

Begin by understanding SAMA laws and regulations, and objectives for managing cybersecurity risks within your specific organizational context. Review all four domains - Governance, Risk Management, Operations, and Third-Party Security, identifying which controls apply based on your institution type. Banks face mandatory compliance across all 47 controls. Fintechs prioritize Control 3.3.5 IAM and 3.3.12 Payment Systems. Insurance companies focus on Governance and Risk Management domains.

Conduct initial gap analysis comparing current security posture against SAMA requirements. Document existing controls, identify missing capabilities, and estimate remediation effort. This assessment informs executive presentations, securing the necessary budget and board endorsement. Engage external SAMA compliance consulting if internal expertise lacks depth; early expert guidance prevents costly mid-project course corrections.

Step 2: Scope Definition and CISO Accountability

The Chief Information Security Officer must formally determine compliance requirements and document all compulsory controls with explicit scope boundaries and justified exclusions. Create the compliance project charter, defining:

In-scope systems: Core banking platforms, payment gateways, customer databases, and administrative infrastructure. Out-of-scope systems: Justified exclusions with risk acceptance documentation signed by executive leadership. Control applicability matrix: Mapping all 47 SAMA controls to organizational assets with implementation priority rankings. Resource allocation: Dedicated FTEs, external consultants, and technology budgets spanning a 12-18 month implementation timeline.

Step 3: Governance Foundation Establishment

Domain 1 implementation begins immediately because governance provides the authorization structure enabling all subsequent technical deployments. Without board endorsement, cybersecurity remains an IT project lacking enterprise commitment.

Define the cybersecurity governance structure endorsed by the board. Create a cybersecurity committee with independent senior leadership reporting directly to the board. Establish meeting cadence (minimum quarterly) with documented minutes proving active oversight. Define escalation paths, ensuring cyber incidents reach board awareness within prescribed timelines.

Establish a comprehensive cybersecurity strategy aligned with Vision 2030 business objectives and organizational risk tolerance. Strategy documents must address a three-year cybersecurity maturity roadmap, budget projections, technology modernization plans, and integration with enterprise risk management frameworks.

Document and communicate enterprise-wide cybersecurity policy. Policy must mandate employee compliance, define acceptable use standards, establish consequences for violations, and integrate cybersecurity responsibilities into employment agreements. Conduct an organization-wide policy acknowledgment campaign with signed attestations providing audit evidence.

Define roles and responsibilities following SAMA internal audit principles. Create RACI matrix clarifying who owns each control, who implements technical requirements, who provides consultation, and who receives status information. Governance without accountability fails immediately.

Step 4: Operational Control Implementation

Domain 3 technical controls represent the compliance heavy lifting, consuming 60-70% of total project effort. This is where miniOrange solutions directly accelerate SAMA compliance.

Phase 4A: Identity and Access Management (Control 3.3.5)

Deploy the miniOrange IAM platform, implementing need-to-know access principles across all enterprise applications. Configure Role-Based Access Control, mapping business roles to system permissions. Integrate with HR systems, enabling automated provisioning and de-provisioning. Deploy Multi-Factor Authentication across core banking, payment systems, administrative consoles, and remote access channels. Establish quarterly access certification campaigns, generating audit-ready compliance reports. Control 3.3.5 represents the highest audit priority.

Phase 4B: Privileged Access Management (Control 3.3.5 sub-requirements)

Deploy miniOrange PAM, discovering all privileged accounts across the infrastructure. Configure secure credential vaulting, eliminating password sharing. Implement automated password rotation for service accounts and elevated credentials. Enable comprehensive session recording for all privileged activities. Establish Just-In-Time access, replacing standing administrator privileges. PAM deployment proves individual accountability required by SAMA auditors.

Phase 4C: Infrastructure and Payment Security (Controls 3.3.8, 3.3.12)

Implement infrastructure hardening standards based on CIS Benchmarks. Deploy network segmentation, preventing lateral movement. Configure database access controls beyond the application layer. For payment systems, validate end-to-end encryption, deploy transaction monitoring, implement tokenization for cardholder data, and prove PCI DSS alignment. Payment system failures trigger immediate SAMA intervention—prioritize accordingly.

Phase 4D: Event Management and Vulnerability Tracking

Deploy centralized logging and SIEM capabilities, capturing security events across all systems. Establish incident response procedures with defined escalation paths. Implement continuous vulnerability scanning with defined remediation SLAs. Integrate vulnerability assessment tools providing systematic identification and mitigation processes.

Step 5: Self-Assessment Preparation and SAMA Audit

SAMA requires annual self-assessments gauging cybersecurity maturity across all implemented controls. Organizations submit detailed documentation proving control effectiveness, not just deployment.

Conduct a comprehensive internal self-assessment following SAMA internal audit principles. Evaluate each control against maturity levels (Initial, Repeatable, Defined, Managed, Optimized). Target Maturity Level 3 (Defined) minimum with documented processes. Collect evidence proving effectiveness: access review reports, privileged session logs, password rotation audit trails, MFA statistics, vulnerability scan results, and incident response timelines.

Generate a self-assessment report documenting current maturity, identified gaps, and remediation plans with timelines. miniOrange automatically produces required IAM and PAM evidence, eliminating months of manual log analysis common with legacy systems. Submit report to SAMA within prescribed timelines (typically 90 days following fiscal year end).

SAMA auditors validate self-assessments through evidence review, technical interviews, and potential on-site inspections. Auditors verify control implementation authenticity, test technical capabilities, and assess organizational culture. Auditor findings require formal responses with corrective action plans for identified deficiencies.

Step 6: Continuous Compliance and Improvement

SAMA compliance represents an ongoing commitment, not a one-time certification. Organizations must maintain compliance through consistent monitoring, regular updates, and cultural embedding.

Establish continuous monitoring using miniOrange real-time dashboards tracking IAM effectiveness, privileged access usage, MFA adoption, and access certification status. Configure automated alerts for policy violations requiring immediate investigation. Continuous evidence collection eliminates annual audit scrambles.

Conduct regular framework reviews as SAMA updates requirements annually. Subscribe to SAMA circulars tracking regulatory changes. Adjust policies and technical controls, maintaining alignment with evolving standards. 2026 cloud and AI revisions require proactive roadmap adjustments.

Implement comprehensive employee awareness training covering cybersecurity policies, social engineering threats, incident reporting procedures, and individual responsibilities. Track training completion with documented attestations proving organization-wide awareness. Cybersecurity culture separates mature organizations from checkbox compliance.

Perform quarterly internal audits validating control effectiveness before SAMA reviews. Identify gaps early, enabling remediation without regulatory pressure. Leverage external SAMA compliance consulting for periodic independent assessments, providing objective maturity evaluation.

Summing It Up

SAMA compliance in Saudi Arabia represents mandatory cybersecurity maturity for financial institutions operating in Vision 2030's digital economy. This roadmap, from governance establishment through technical control deployment and continuous monitoring, transforms regulatory complexity into structured execution. With 68% first-time audit failures, organizations require proven solutions to accelerate certification while ensuring audit success and ongoing compliance.

Frequently Asked Questions

What is SAMA compliance in Saudi Arabia?

SAMA compliance refers to the Cyber Security Framework (CSF) mandated by the Saudi Arabian Monetary Authority for all financial institutions. It requires comprehensive cybersecurity controls across governance, risk management, operations, and third-party security. Banks need full compliance; fintechs follow risk-based controls.​

How long does SAMA certification take?

Banks average 18 months; fintechs require 12-18 months. Strong governance accelerates to 9-12 months. Legacy systems extend timelines 6-18 months. miniOrange reduces evidence collection by 3-6 months through automated reporting.

How do SOPs ensure SAMA compliance?

Standard Operating Procedures document control implementation processes proving SAMA maturity Level 3+. SOPs detail access request workflows (3.3.5), incident response (3.3.14), vendor assessments (Domain 4), and evidence collection procedures required for self-assessments.

What happens with the SAMA audit failure?

68% first submissions require remediation. SAMA issues corrective action plans (90-180 days). Repeated failures trigger financial penalties, operational restrictions, and license suspension. External consultants recommended for remediation.

Does ZATCA relate to SAMA compliance?

ZATCA (Zakat, Tax and Customs Authority) governs e-invoicing and tax compliance for Saudi businesses. SAMA regulates financial institutions specifically. Both require strong IAM, but ZATCA focuses on fiscal compliance while SAMA emphasizes cybersecurity framework adherence.

Leave a Comment

    contact us button