The UAE Information Assurance (IA) Standards, issued under the National Electronic Security Authority (NESA, now part of the UAE Cybersecurity Council) and its successor frameworks, apply to organisations classified as critical-information-infrastructure or otherwise designated. Compliance is a posture, not a paperwork exercise. We deliver readiness audits, control implementation, and ongoing operations against IA Standards.

Documented security policy, security council with named accountabilities, exception register, annual review cycle, board-level reporting. The paper layer that makes everything else defensible.
Inventory of information assets, ownership, classification, acceptable-use rules, return of assets on contract end. Maintained as a tracked register, not a stale spreadsheet.
Pre-employment screening, onboarding security training, role-based access, contractor controls, disciplinary process for security violations, secure offboarding.
Server-room access control, environmental monitoring (temperature, smoke, leak), CCTV in sensitive areas, visitor management, secure-zone designation.
Microsoft Entra ID with MFA, role-based access design, joiners-movers-leavers process, privileged access management with just-in-time elevation, access-review cycles.
Encryption-at-rest across endpoints, servers, databases, backups. TLS 1.2+ in transit. Key management discipline with HSM or Azure Key Vault, key rotation schedules.
Microsoft Sentinel as SIEM, 24/7 monitoring with regulator-grade alert rules, log retention to IA-mandated periods, monthly threat-hunt cycle.
Written incident-response playbook, severity matrix, escalation chain, NESA/CSC notification template, quarterly tabletop exercise, lessons-learned cycle.
Quarterly evidence pack covering all 14 IA control families, internal audit cycle, supplier audit register, regulator-readiness drills. The auditor gets a folder, not a fire drill.
We hold the IA Standards mapping internally and apply the controls operationally. The output is not a 200-page compliance binder; it is a running operation that produces audit evidence on demand.
Most IA controls have a Microsoft-stack implementation path: Entra for access, Defender for endpoint and threat protection, Sentinel for monitoring, Purview for classification and retention, Intune for device compliance. We use this stack as the operational substrate.
Quarterly evidence pack delivered without you asking: control-by-control status, exception register, audit trails, training completion. Designed to be handed to your supervisor with minimal preparation.
IA Standards require role-based security awareness training. We deliver it: leadership briefing, IT-team technical training, all-staff awareness session, recorded for new joiners.
Power generation, distribution, water utilities, gas. Often CII-designated; control sets typically at maturity tier 3 or 4.
Central Bank-licensed, DFSA, ADGM-regulated. Often subject to IA Standards alongside their primary regulator framework.
Major hospitals, DHA-licensed and government healthcare facilities. Patient-safety-critical systems in scope.
Aviation, ports, mass-transit operators. Operational technology security particularly relevant.
Federal and Emirate-level government entities, semi-government corporations, government-contracting suppliers.
Private-sector firms adopting IA Standards as a best-practice cybersecurity baseline ahead of supplier requirements or future regulatory expectation.
| Feature | IA Standards | ISO 27001 | UAE PDPL |
|---|---|---|---|
Issuing body | UAE Cybersecurity Council | ISO/IEC | UAE Data Office |
Scope | Critical-info-infra UAE | Generic information security | Personal data protection |
Geographic application | UAE-only | Global | UAE |
Certifiable | Compliance attestation | Yes (certifiable) | Compliance only |
Control count | ~188 | ~93 (2022) | ~30 articles |
Maturity tiers | T1-T4 | No tiers | No tiers |
Primary focus | CII protection | Information assets | Personal data |
Overlap with each other | Strong with both | Strong with IA | Article 6 with IA |
2-3 weeks
Workshop-led discovery: current controls, existing documentation, control-by-control assessment against IA Standards. Output: written maturity assessment per control family and prioritised remediation roadmap.
4-8 weeks
Security policy refresh, identity baseline, Sentinel SOC operational, Purview classification, incident-response playbook written, asset register populated, exception register established.
2-3 weeks
Quarterly evidence-pack cadence agreed, training rolled out, change management aligned, exception-handling workflow operating, supplier-audit register populated.
Ongoing
Quarterly control review, evidence-pack assembly, threat-hunt report, training refresh, exception-register review. Annual full re-audit against IA Standards evolution.
“We are a critical-infrastructure-adjacent operator and IA Standards compliance was a 2026 board-level commitment. GR ran the baseline audit in three weeks, built the foundation in seven, and we passed our supplier-led IA review at maturity tier 3 on first attempt. The quarterly evidence pack is now part of our normal operating rhythm.”
Broader security posture review including IA-Standards technical-controls assessment.
Cloud SIEM used as the monitoring substrate for IA-Standards-compliant operations.
Federal-level personal data law that applies alongside IA Standards for many entities.
A two-to-three week structured audit covering all 14 IA control families. Output: written maturity assessment, gap report, and prioritised remediation roadmap. No commitment to an ongoing engagement.
Explore more solutions that work great with this service