🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to implement Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 1-2-2: Practical checklist for vetting, credentialing, and onboarding experienced Saudi cybersecurity professionals

Practical, compliance-focused checklist to vet, credential, and securely onboard experienced Saudi cybersecurity professionals in line with ECC–2:2024 Control 1-2-2.

April 16, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post gives a practical, step-by-step checklist for meeting ECC – 2 : 2024 Control 1-2-2 when hiring experienced cybersecurity professionals in Saudi Arabia, with implementation details, small-business scenarios, and compliance tips tailored to the Compliance Framework.

Why this control matters and the Compliance Framework context

Control 1-2-2 requires organizations to demonstrate controlled, auditable processes for vetting, credentialing, and onboarding cybersecurity staff so that privileged and sensitive capabilities are only granted to verified, trustworthy personnel; for small businesses this is about reducing insider risk and meeting audit evidence requirements under the Compliance Framework.

Pre-hire vetting: practical steps you can implement today

Step 1 — Identity and legal status: verify Saudi nationals via Absher-compatible identity checks or approved e‑KYC vendors that support Saudi National ID; for expatriates validate Iqama status and employer sponsorship; capture copies of ID and signed consent to perform background checks to comply with PDPL. Step 2 — Background checks: obtain criminal and civil record checks (where permitted), employment verification, and education verification; for roles with access to critical infrastructure consider reference interviews and, if available, government security clearance validation through the National Cybersecurity Authority (NCA) channels. Step 3 — Certification and credentials: verify claimed professional certifications (CISSP, CISM, CCSP, OSCP, SANS/GIAC) directly via the issuing body's verification API or portal, and record the certificate number, issue and expiry dates in the HR credentialing record.

Technical screening and credential validation

Run technical assessments that match the role: a live SOC triage exercise for analysts, exploit development/task-based labs for red-team talent, and architecture review exercises for senior engineers. Use time-limited lab environments (e.g., CTF-style sandboxes) and capture session logs as evidence. Verify access to public code repositories, but do not require private repo credentials; instead request code samples or timed practical tasks. For high-trust hires, require multi-factor proof of identity such as a government-issued ID plus a live video interview and attestations from prior managers.

Onboarding controls: least privilege, tooling, and device posture

Provision accounts using an approval workflow (manager + security approver) and assign role-based access groups rather than individual permissions. Implement Just-In-Time (JIT) elevation for administrative tasks using Azure AD Privileged Identity Management (PIM) or a PAM product (CyberArk, BeyondTrust) and require MFA (prefer FIDO2/WebAuthn hardware keys for privileged accounts). Issue corporate devices with MDM enforced policies (BitLocker/FileVault, disk encryption, tamper protections), enforce disk encryption, full-disk anti-malware, endpoint detection and response (EDR) with tamper protection, and register devices into inventory. For SSH and service credentials, use ephemeral SSH certificates or secrets stored in a secrets manager (HashiCorp Vault, AWS Secrets Manager) and rotate keys frequently with automated rotation policies.

Practical small-business example

A 15-person IT consultancy in Jeddah hires a senior penetration tester: the HR lead collects signed consent for background checks, the owner verifies the candidate's CISSP via ISC2 portal and OSCP via OffSec; the technical lead runs a 4-hour hands-on lab in a pre-configured VM; upon hire the company creates an Azure AD account, places the user into a "Contractor-SecOps-Limited" group, issues a company laptop enrolled in Intune, requires a FIDO2 key for MFA, and sets a 90-day probation access profile where PAM controls are required for any production account use.

Joiner–Mover–Leaver (JML) lifecycle and evidence retention

Define and automate the JML workflow: provisioning forms, approval stamps (manager + security), periodic access reviews (quarterly), and immediate revocation steps on termination. Maintain an auditable log of all provisioning and deprovisioning events—SSO provisioning logs, PAM session recordings, SIEM alerts for anomalous behavior—and retain these artifacts in compliance with the Compliance Framework retention requirements and local PDPL guidance (ensure candidate consent covers storing background check artifacts and personal data). Design offboarding to include remote wipe of corporate devices, credential revocation, recovery of hardware security keys, and revoking external service API keys.

Compliance tips, evidence collection, and Saudi-specific considerations

Document each step and map evidence to Control 1-2-2: signed consents, verification screenshots (ID, certification verification), technical assessment artifacts, approval emails, provisioning logs, and access review records. For Saudi operations, be cognizant of Saudization (Nitaqat) policies when setting hiring plans and use local verification channels for identity and employment checks; consult SAMA guidance if in financial services. Ensure PDPL compliance by obtaining explicit consent for personal data processing, storing personal records in approved jurisdictions, and implementing access controls on HR records.

Risks of not implementing the control and how to prioritize mitigation

Failure to properly vet and control credentials exposes the organization to insider threats, lateral movement, supply-chain compromise, regulatory penalties, and loss of customer trust. Small businesses often suffer worst because limited staff means a single compromised privileged account can lead to full business disruption. Prioritize controls that reduce blast radius: enforce MFA + PAM for privileged accounts, automate provisioning/deprovisioning, and keep thorough audit trails for investigations.

In summary, implement a documented, auditable pipeline for vetting, credential validation, and onboarding that ties hiring approvals to technical assessments, enforces least privilege through PAM and JIT elevation, protects credentials and devices through MDM and secrets management, and preserves evidence for Compliance Framework audits—adapting identity verification and data handling to Saudi regulations and small-business constraints will reduce risk while meeting ECC – 2 : 2024 Control 1-2-2.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes