{"id":2884,"date":"2015-10-18T17:25:13","date_gmt":"2015-10-18T16:25:13","guid":{"rendered":"https:\/\/dn-www.azurewebsites.net\/2015\/10\/18\/nesa-uae-information-assurance-standards\/"},"modified":"2024-02-06T10:23:43","modified_gmt":"2024-02-06T10:23:43","slug":"nesa-uae-information-assurance-standards","status":"publish","type":"post","link":"https:\/\/dionach.com\/en-us\/nesa-uae-information-assurance-standards\/","title":{"rendered":"NESA UAE Information Assurance Standards"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2884\" class=\"elementor elementor-2884\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-765fd7fc elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"765fd7fc\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-295f7154\" data-id=\"295f7154\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7fb75293 elementor-widget elementor-widget-text-editor\" data-id=\"7fb75293\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The UAE\u2019s National Electronic Security Authority (NESA) is tasked with developing and monitoring the UAE Information Assurance Standards (IAS).&nbsp; The IAS come under the National Information Assurance Framework (NIAF), which itself is part of the Critical Information Infrastructure Protection (CIIP) Policy.<\/p>\n<p>The IAS are primarily based on ISO 27001:2005, with some additional controls. Some of these additional controls are taken from ISO 2700:2013 and some taken from NIST, whereas others are new, such as cloud security and BYOD security. The IAS also have additional specific requirements for each control compared to ISO 27001, namely sub-controls, document requirements and performance indicators.<\/p>\n<p>From a high level perspective, organisations (or entities as the IAS terms them) in the UAE need to comply with the common IAS standards and any specific IAS standards relating&nbsp; to their industry sector . Organisations need to report compliance progress to sector regulators, who then report to NESA.<\/p>\n<p>The IAS are based on organisations understanding their &nbsp;information security requirements, which will involve carrying out risk assessments, implementing security controls, monitoring those controls, and ensuring continual improvement.<\/p>\n<p>The risk assessment mandated by the M2 control family in the IAS requires specific steps in the risk assessment, which are very close to the ISO 27001 risk assessment &nbsp;requirements. Firstly the organisation needs to determine the context and scope, and then establish the risk criteria and risk methodology. The organisation then needs to identify risks, threats, vulnerabilities, impacts and likelihoods along with a resulting risk level. The risk criteria will then determine whether risks are acceptable or need treatment. The organisation needs to then monitor risks and regularly review the risk assessment.<\/p>\n<p>The list of security controls within the IAS are applicable depending on whether they are marked as \u201calways applicable\u201d or whether they are applicable determined by the risk assessment. Controls are prioritized to allow an incremental implementation, although all are mandatory based on whether the controls are applicable. Priorities of controls, other than those controls with P1 priority, can be changed based on the risk assessment outcome.<\/p>\n<p>Each control has a number of sub-controls. The sub-controls give a clear list of requirements for the control.&nbsp; Each control has implementation guidance, which is similar to ISO 27002:2005 but is part of each control, which will help with implementation.<\/p>\n<p>The controls are divided into families of management controls and technical controls, as shown in the tables below:<\/p>\n<style scoped=\"\" type=\"text\/css\"><!--\/*--><![CDATA[\/* ><!--*\/ .IsoTable2 { margin:0px;padding:0px; border:1px solid #000000; width:500px; } .IsoTable2 table{ border-collapse: collapse; border-spacing: 0; margin:0px;padding:0px; width: 100%; } .IsoTable2 tr:nth-child(odd){ background-color:#aad4ff; } .IsoTable2 tr:nth-child(even) { background-color:#ffffff; } .IsoTable2 td{ vertical-align:middle; border:1px solid #000000; border-width:0px 1px 1px 0px; text-align:left; padding:4px; font-weight:normal; color:#000000; }.IsoTable2 tr:last-child td{ border-width:0px 1px 0px 0px; }.IsoTable2 tr td:last-child{ border-width:0px 0px 1px 0px; }.IsoTable2 tr:last-child td:last-child{ border-width:0px 0px 0px 0px; } .IsoTable2 tr:first-child td{ background-color:#005fbf; border:0px solid #000000; text-align:center; border-width:0px 0px 1px 1px; font-weight:bold; color:#ffffff; } .IsoTable2 tr:first-child:hover td{ background-color:#005fbf; } .IsoTable2 tr:first-child td:first-child{ border-width:0px 0px 1px 0px; } .IsoTable2 tr:first-child td:last-child{ border-width:0px 0px 1px 1px; } \/*--><!]]>*\/<br \/>\n<\/style>\n<div class=\"IsoTable2\">\n<table>\n<tbody>\n<tr>\n<td style=\"width:308px;\">Management control families<\/td>\n<td style=\"width:77px;\">Controls<\/td>\n<\/tr>\n<tr>\n<td style=\"width:308px;\">M1 Strategy and planning<\/td>\n<td style=\"width:77px;\">15<\/td>\n<\/tr>\n<tr>\n<td style=\"width:308px;\">M2 Information security risk management<\/td>\n<td style=\"width:77px;\">11<\/td>\n<\/tr>\n<tr>\n<td style=\"width:308px;\">M3 Awareness and training<\/td>\n<td style=\"width:77px;\">8<\/td>\n<\/tr>\n<tr>\n<td style=\"width:308px;\">M4 Human resources security<\/td>\n<td style=\"width:77px;\">8<\/td>\n<\/tr>\n<tr>\n<td style=\"width:308px;\">M5 Compliance<\/td>\n<td style=\"width:77px;\">13<\/td>\n<\/tr>\n<tr>\n<td style=\"width:308px;\">M6 Performance evaluation and improvement<\/td>\n<td style=\"width:77px;\">5<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p>&nbsp;<\/p>\n<div class=\"IsoTable2\">\n<table>\n<tbody>\n<tr>\n<td style=\"width:433px;\">Technical control families<\/td>\n<td style=\"width:73px;\">Controls<\/td>\n<\/tr>\n<tr>\n<td style=\"width:433px;\">T1Asset management<\/td>\n<td style=\"width:73px;\">10<\/td>\n<\/tr>\n<tr>\n<td style=\"width:433px;\">T2 Physical and environmental security<\/td>\n<td style=\"width:73px;\">16<\/td>\n<\/tr>\n<tr>\n<td style=\"width:433px;\">T3 Operations management<\/td>\n<td style=\"width:73px;\">17<\/td>\n<\/tr>\n<tr>\n<td style=\"width:433px;\">T4 Communications<\/td>\n<td style=\"width:73px;\">15<\/td>\n<\/tr>\n<tr>\n<td style=\"width:433px;\">T5 Access control<\/td>\n<td style=\"width:73px;\">22<\/td>\n<\/tr>\n<tr>\n<td style=\"width:433px;\">T6 Third party security<\/td>\n<td style=\"width:73px;\">6<\/td>\n<\/tr>\n<tr>\n<td style=\"width:433px;\">T7 Information systems acquisition, development and maintenance<\/td>\n<td style=\"width:73px;\">25<\/td>\n<\/tr>\n<tr>\n<td style=\"width:433px;\">T8 Information security incident management<\/td>\n<td style=\"width:73px;\">13<\/td>\n<\/tr>\n<tr>\n<td style=\"width:433px;\">T9 Information security continuity management<\/td>\n<td style=\"width:73px;\">4<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p>&nbsp;<\/p>\n<p>There are 188 controls of which 60 are management controls and 128 are technical controls. 35 of the management controls are \u201calways applicable\u201d, none of the technical controls are \u201calways applicable\u201d.<\/p>\n<p>Each control has one of four priorities, with the number of each as follows:<\/p>\n<div class=\"IsoTable2\">\n<table>\n<tbody>\n<tr>\n<td style=\"width:67px;\">Priority<\/td>\n<td style=\"width:73px;\">Controls<\/td>\n<\/tr>\n<tr>\n<td style=\"width:67px;\">P1<\/td>\n<td style=\"width:73px;\">39<\/td>\n<\/tr>\n<tr>\n<td style=\"width:67px;\">P2<\/td>\n<td style=\"width:73px;\">69<\/td>\n<\/tr>\n<tr>\n<td style=\"width:67px;\">P3<\/td>\n<td style=\"width:73px;\">35<\/td>\n<\/tr>\n<tr>\n<td style=\"width:67px;\">P4<\/td>\n<td style=\"width:73px;\">45<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<p>&nbsp;<\/p>\n<p>NESA has also published a summary list of the P1 controls, with the list in order of relative impact level.&nbsp; For example it shows that controls against malware and good password management can have a very high level impact on attack mitigation.<\/p>\n<p>Although there are only 35 controls that are always applicable, it is very likely that many of the other controls will apply. If controls do apply, organisations will still need to achieve compliance regardless of the priority level of the control.<\/p>\n<p>In my opinion there are several stages to achieving and maintaining compliance to the NESA UAE IAS:<\/p>\n<ul>\n<li>Gap audit<\/li>\n<li>Training<\/li>\n<li>Risk assessment<\/li>\n<li>Implementation<\/li>\n<li>Annual compliance audits<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>Gap audits determine how compliant organisations are and the actions needed to achieve compliance with estimations of resources and timescales.<\/p>\n<p>Training gives those who need to be involved in working towards and maintaining compliance with the required knowledge. This will help the organisation implement the IAS more efficiently, more quickly and more cost effectively. Training is appropriate for internal stakeholders, information security staff, business unit leaders and certain IT staff.<\/p>\n<p>The risk assessment methodology is specific to the M2 control family and can determine which controls apply to each organisation. It is important to start with a risk assessment methodology that fits the organisation to ensure it is meaningful, efficient and meets the requirements of the IAS. The risk assessment requires input from internal stakeholders and business unit leaders.<\/p>\n<p>The gap audit can occur after training and risk assessment, however many organisations benefit from seeing what work is needed at the start of the compliance journey. An organisation can also have gap audits at key stages of the implementation phase.<\/p>\n<p>Implementation is best done internally. Actions from the gap audit and risk treatment actions from the risk assessment will drive implementation.<\/p>\n<p>Annual compliance audits can ensure organisations remain compliant. The compliance audit complements the internal audit process in M6 by providing an external, independent audit.<\/p>\n<p>In summary, the NESA UAE Information Assurance Standards are a good set of standards based on solid international information security standards. The IAS also have the benefit of having clear sub-controls and performance indicators, which I think sets them apart. Although ISO 27001 is the international standard for an information security management system, I think any organisation would benefit from using the UAE IAS.<\/p><p><br><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The UAE\u2019s National Electronic Security Authority (NESA) has developed the&nbsp;UAE Information Assurance Standards (IAS). These are&nbsp;primarily based on ISO 27001:2005. This blog entry reviews the IAS and looks at how organisations can get compliant to them.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1],"tags":[216],"class_list":["post-2884","post","type-post","status-publish","format-standard","hentry","category-researchblog","tag-compliance","wpbf-post"],"contentshake_article_id":"","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NESA UAE Information Assurance Standards<\/title>\n<meta name=\"description\" content=\"The UAE\u2019s National Electronic Security Authority (NESA) has developed the&nbsp;UAE Information Assurance Standards (IAS). These are&nbsp;primarily based on ISO 27001:2005. This blog entry reviews the IAS and looks at how organisations can get compliant to them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dionach.com\/en-us\/nesa-uae-information-assurance-standards\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NESA UAE Information Assurance Standards\" \/>\n<meta property=\"og:description\" content=\"The UAE\u2019s National Electronic Security Authority (NESA) has developed the&nbsp;UAE Information Assurance Standards (IAS). These are&nbsp;primarily based on ISO 27001:2005. This blog entry reviews the IAS and looks at how organisations can get compliant to them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dionach.com\/en-us\/nesa-uae-information-assurance-standards\/\" \/>\n<meta property=\"og:site_name\" content=\"Dionach\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/dionachcyber\" \/>\n<meta property=\"article:published_time\" content=\"2015-10-18T16:25:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-02-06T10:23:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg?fit=512%2C512&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"512\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dionach Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@dionachcyber\" \/>\n<meta name=\"twitter:site\" content=\"@dionachcyber\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dionach Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/dionach.com\/en-us\/nesa-uae-information-assurance-standards\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/dionach.com\/en-us\/nesa-uae-information-assurance-standards\/\"},\"author\":{\"name\":\"Dionach Admin\",\"@id\":\"https:\/\/dionach.com\/en-us\/#\/schema\/person\/e73f3537233924cf4944f7807068b3c8\"},\"headline\":\"NESA UAE Information Assurance Standards\",\"datePublished\":\"2015-10-18T16:25:13+00:00\",\"dateModified\":\"2024-02-06T10:23:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/dionach.com\/en-us\/nesa-uae-information-assurance-standards\/\"},\"wordCount\":907,\"publisher\":{\"@id\":\"https:\/\/dionach.com\/en-us\/#organization\"},\"keywords\":[\"compliance\"],\"articleSection\":[\"researchblog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dionach.com\/en-us\/nesa-uae-information-assurance-standards\/\",\"url\":\"https:\/\/dionach.com\/en-us\/nesa-uae-information-assurance-standards\/\",\"name\":\"NESA UAE Information Assurance Standards\",\"isPartOf\":{\"@id\":\"https:\/\/dionach.com\/en-us\/#website\"},\"datePublished\":\"2015-10-18T16:25:13+00:00\",\"dateModified\":\"2024-02-06T10:23:43+00:00\",\"description\":\"The UAE\u2019s National Electronic Security Authority (NESA) has developed the&nbsp;UAE Information Assurance Standards (IAS). These are&nbsp;primarily based on ISO 27001:2005. This blog entry reviews the IAS and looks at how organisations can get compliant to them.\",\"breadcrumb\":{\"@id\":\"https:\/\/dionach.com\/en-us\/nesa-uae-information-assurance-standards\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dionach.com\/en-us\/nesa-uae-information-assurance-standards\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dionach.com\/en-us\/nesa-uae-information-assurance-standards\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dionach.com\/en-us\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NESA UAE Information Assurance Standards\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dionach.com\/en-us\/#website\",\"url\":\"https:\/\/dionach.com\/en-us\/\",\"name\":\"Dionach\",\"description\":\"Real Security in a Virtual World\",\"publisher\":{\"@id\":\"https:\/\/dionach.com\/en-us\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dionach.com\/en-us\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/dionach.com\/en-us\/#organization\",\"name\":\"Dionach\",\"url\":\"https:\/\/dionach.com\/en-us\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dionach.com\/en-us\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg\",\"contentUrl\":\"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg\",\"width\":512,\"height\":512,\"caption\":\"Dionach\"},\"image\":{\"@id\":\"https:\/\/dionach.com\/en-us\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/dionachcyber\",\"https:\/\/x.com\/dionachcyber\",\"https:\/\/uk.linkedin.com\/company\/dionach-ltd\",\"https:\/\/www.instagram.com\/dionachcyber\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/dionach.com\/en-us\/#\/schema\/person\/e73f3537233924cf4944f7807068b3c8\",\"name\":\"Dionach Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g\",\"caption\":\"Dionach Admin\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NESA UAE Information Assurance Standards","description":"The UAE\u2019s National Electronic Security Authority (NESA) has developed the&nbsp;UAE Information Assurance Standards (IAS). These are&nbsp;primarily based on ISO 27001:2005. This blog entry reviews the IAS and looks at how organisations can get compliant to them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dionach.com\/en-us\/nesa-uae-information-assurance-standards\/","og_locale":"en_US","og_type":"article","og_title":"NESA UAE Information Assurance Standards","og_description":"The UAE\u2019s National Electronic Security Authority (NESA) has developed the&nbsp;UAE Information Assurance Standards (IAS). These are&nbsp;primarily based on ISO 27001:2005. This blog entry reviews the IAS and looks at how organisations can get compliant to them.","og_url":"https:\/\/dionach.com\/en-us\/nesa-uae-information-assurance-standards\/","og_site_name":"Dionach","article_publisher":"https:\/\/www.facebook.com\/dionachcyber","article_published_time":"2015-10-18T16:25:13+00:00","article_modified_time":"2024-02-06T10:23:43+00:00","og_image":[{"width":512,"height":512,"url":"https:\/\/i0.wp.com\/dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg?fit=512%2C512&ssl=1","type":"image\/jpeg"}],"author":"Dionach Admin","twitter_card":"summary_large_image","twitter_creator":"@dionachcyber","twitter_site":"@dionachcyber","twitter_misc":{"Written by":"Dionach Admin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dionach.com\/en-us\/nesa-uae-information-assurance-standards\/#article","isPartOf":{"@id":"https:\/\/dionach.com\/en-us\/nesa-uae-information-assurance-standards\/"},"author":{"name":"Dionach Admin","@id":"https:\/\/dionach.com\/en-us\/#\/schema\/person\/e73f3537233924cf4944f7807068b3c8"},"headline":"NESA UAE Information Assurance Standards","datePublished":"2015-10-18T16:25:13+00:00","dateModified":"2024-02-06T10:23:43+00:00","mainEntityOfPage":{"@id":"https:\/\/dionach.com\/en-us\/nesa-uae-information-assurance-standards\/"},"wordCount":907,"publisher":{"@id":"https:\/\/dionach.com\/en-us\/#organization"},"keywords":["compliance"],"articleSection":["researchblog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/dionach.com\/en-us\/nesa-uae-information-assurance-standards\/","url":"https:\/\/dionach.com\/en-us\/nesa-uae-information-assurance-standards\/","name":"NESA UAE Information Assurance Standards","isPartOf":{"@id":"https:\/\/dionach.com\/en-us\/#website"},"datePublished":"2015-10-18T16:25:13+00:00","dateModified":"2024-02-06T10:23:43+00:00","description":"The UAE\u2019s National Electronic Security Authority (NESA) has developed the&nbsp;UAE Information Assurance Standards (IAS). These are&nbsp;primarily based on ISO 27001:2005. This blog entry reviews the IAS and looks at how organisations can get compliant to them.","breadcrumb":{"@id":"https:\/\/dionach.com\/en-us\/nesa-uae-information-assurance-standards\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dionach.com\/en-us\/nesa-uae-information-assurance-standards\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/dionach.com\/en-us\/nesa-uae-information-assurance-standards\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dionach.com\/en-us\/"},{"@type":"ListItem","position":2,"name":"NESA UAE Information Assurance Standards"}]},{"@type":"WebSite","@id":"https:\/\/dionach.com\/en-us\/#website","url":"https:\/\/dionach.com\/en-us\/","name":"Dionach","description":"Real Security in a Virtual World","publisher":{"@id":"https:\/\/dionach.com\/en-us\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dionach.com\/en-us\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/dionach.com\/en-us\/#organization","name":"Dionach","url":"https:\/\/dionach.com\/en-us\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dionach.com\/en-us\/#\/schema\/logo\/image\/","url":"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg","contentUrl":"https:\/\/www.dionach.com\/wp-content\/uploads\/2025\/02\/cropped-Dionach-vertical-col-yel-nomios-black-1.jpg","width":512,"height":512,"caption":"Dionach"},"image":{"@id":"https:\/\/dionach.com\/en-us\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/dionachcyber","https:\/\/x.com\/dionachcyber","https:\/\/uk.linkedin.com\/company\/dionach-ltd","https:\/\/www.instagram.com\/dionachcyber\/"]},{"@type":"Person","@id":"https:\/\/dionach.com\/en-us\/#\/schema\/person\/e73f3537233924cf4944f7807068b3c8","name":"Dionach Admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3061726a64a760303f6ea8f0976d3e8e0a6997b4da543be9a650b81584b4e79e?s=96&d=mm&r=g","caption":"Dionach Admin"}}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/ph4Ojq-Kw","_links":{"self":[{"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/posts\/2884","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/comments?post=2884"}],"version-history":[{"count":0,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/posts\/2884\/revisions"}],"wp:attachment":[{"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/media?parent=2884"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/categories?post=2884"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dionach.com\/en-us\/wp-json\/wp\/v2\/tags?post=2884"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}