This table shows the 20 compliance areas where Saudi NCA ECC and ISO 27001 controls overlap. When you mark a control as implemented in either framework, Venvera automatically propagates the status to the equivalent control in the other.

Compliance AreaNCA ECCISO 27001
Information Security GovernanceECC-1-1, ECC-1-2A.5.1, A.5.2
Cybersecurity Roles & ResponsibilitiesECC-1-3, ECC-1-4A.5.2, A.5.4
Cybersecurity Strategy & PlanningECC-1-5, ECC-1-6A.5.1, A.5.36
Information Asset ManagementECC-2-1, ECC-2-2A.5.9, A.5.10
Asset Classification & HandlingECC-2-3, ECC-2-4A.5.12, A.5.13
Identity & Access ManagementECC-3-1, ECC-3-2A.5.15, A.5.16
Privileged Access ManagementECC-3-3, ECC-3-4A.8.2, A.8.5
Authentication ControlsECC-3-5, ECC-3-6A.5.17, A.8.5
Network SecurityECC-4-1, ECC-4-2A.8.20, A.8.21
Data Protection & PrivacyECC-4-3, ECC-4-4A.5.34, A.8.11
Cryptographic ControlsECC-4-5, ECC-4-6A.8.24
Physical SecurityECC-5-1, ECC-5-2A.7.1, A.7.2
Environmental ControlsECC-5-3, ECC-5-4A.7.5, A.7.11
Vulnerability ManagementECC-6-1, ECC-6-2A.8.8
Patch ManagementECC-6-3, ECC-6-4A.8.8, A.8.19
Security Event MonitoringECC-7-1, ECC-7-2A.8.15, A.8.16
Incident Response & ReportingECC-7-3, ECC-7-4A.5.24, A.5.25, A.5.26
Business ContinuityECC-8-1, ECC-8-2A.5.29, A.5.30
Security Awareness & TrainingECC-9-1, ECC-9-2A.6.3
Third-Party & Supplier SecurityECC-10-1, ECC-10-2A.5.19, A.5.20, A.5.21
ℹ️
For details on how propagation works, thresholds, and the auto-mapped badge, see the Cross-Framework Control Propagation overview article.