🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Document and Prove Compliance with Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 1-2-2 (Code 434): Evidence for Audits Showing Full-Time Saudi Cybersecurity Positions

Practical guidance for collecting, organizing, and presenting audit-ready evidence that demonstrates full-time Saudi cybersecurity positions to meet ECC – 2 : 2024 Control 1-2-2 (Code 434).

April 17, 2026
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post explains how organizations subject to the Compliance Framework—specifically ECC – 2 : 2024 Control 1-2-2 (Code 434)—can document and prove to auditors that they employ full-time Saudi nationals in cybersecurity roles, with step-by-step, practical guidance, concrete evidence examples, and templates you can adopt immediately.

What auditors will look for

Auditors will expect clear, verifiable evidence that cybersecurity roles are filled by full-time Saudi employees and that those roles are substantive (not nominal). They typically validate identity (national ID), employment status (full-time contract and payroll), role alignment to cybersecurity responsibilities (job description and org chart), and active involvement in security operations (access logs, meeting notes, or task lists). For entities in Saudi Arabia, auditors may cross-check Saudization metrics or NCA mappings, and they will favor evidence with immutable metadata (timestamps, signed documents, and cryptographic hashes) over informal attestations.

Types of acceptable evidence to collect

Collect a compact, well-indexed evidence pack that contains: signed employment contracts explicitly stating full-time status and job title; payroll records or payslips showing salary payments and employer contributions; HRIS extracts (employee_id, name, nationality, start_date, employment_type); copies of national ID or MBR (redacted for auditors if required); official job descriptions mapping duties to ECC/NCA control areas; an organization chart showing reporting lines to the CISO or equivalent; AD/LDAP group membership or system access records proving operational access; badge access logs or timesheets confirming workplace presence; and signed attestations from HR and the CISO. Name files descriptively (for example: ECC2_1-2-2_EmploymentContract_AlAmri_Signed.pdf, ECC2_1-2-2_Payroll_Q1_2026.csv, ECC2_1-2-2_HRISExport_2026-04-15.csv) and maintain an index file (INDEX.csv) that lists each file, its description, and a SHA256 checksum.

Technical steps to extract and secure evidence

From HR/payroll systems (SAP SuccessFactors, Oracle HCM, BambooHR, or local HR tools), generate reports filtered by job_title and employment_type. Example SQL-like query for a local HR database: SELECT employee_id, full_name, national_id, nationality, job_title, employment_type, start_date, work_location FROM employees WHERE job_title ILIKE '%cyber%' AND employment_type='Full-Time' AND nationality='Saudi'; Export reports in CSV and capture the export timestamp. For system access evidence, export Active Directory/LDAP group membership and last logon timestamps: dsquery/user or PowerShell Get-ADUser -Filter {Title -like '*Cyber*' -and Enabled -eq $true} -Properties LastLogonDate. After exporting, generate cryptographic checksums (sha256sum or PowerShell Get-FileHash) and include the checksum manifest. Store the pack in a hardened location (company S3 with server-side encryption + MFA delete, or an internal secure file server with RBAC) and record access logs for the folder to demonstrate chain-of-custody.

Small-business scenarios and real-world examples

Scenario A: A 25-person fintech startup has one full-time Saudi SOC analyst and outsources other security functions to a managed security service provider (MSSP). The startup compiles the analyst's signed employment contract, the last 6 months of payslips, SOC shift rosters, and the analyst's AD account and MFA logs. They include a signed letter from the MSSP delineating responsibilities and a transition plan showing how the in-house analyst coordinates with the MSSP. Scenario B: A 60-person manufacturing SME is transitioning from expat-led security to local hires to meet ECC requirements. They prepare a transitional evidence set: current full-time Saudi security engineer contract, job requisition and recruitment timeline for remaining roles, signed training and certification plan (e.g., planned CISSP/SANS courses), and an executive attestation with dates for when roles will be staffed—all demonstrating intent plus current compliance where applicable.

Compliance tips and best practices

Maintain a standardized evidence template and updated INDEX file for every control assessment—this speeds audits and reduces back-and-forth. Tag HR records with control codes (e.g., "ECC-1-2-2") in your HRIS so you can generate reports by control quickly. Use versioning and immutability (S3 object versioning or WORM storage) for the evidence pack and keep retention of audit artifacts for at least three years (adjust per your legal or contractual requirements). When sharing sensitive documents with auditors, provide redacted copies with unredacted originals available under secure review conditions. Always accompany technical exports with a short narrative explaining methodology (how the export was produced, filters used, and the tuning of time windows) and attach a signed attestation from HR and the CISO confirming accuracy.

Risks of not implementing this requirement

Failure to demonstrate full-time Saudi cybersecurity staffing when required can lead to failed audits, loss of certifications or authority approvals, fines or remedial directives from regulators, and disqualification from government or regulated contracts. Beyond regulatory consequences, inadequate staffing evidence is often correlated with operational weaknesses—lack of in-house ownership for incident response, slower remediation times, and increased exposure to insider or configuration risk. For small businesses, these operational gaps can cause prolonged outages or data breaches that threaten business continuity.

In summary, prepare an indexed, tamper-evident evidence pack that contains contracts, payroll, HRIS exports, job descriptions, access logs, and signed attestations; automate report generation and tagging in your HR/payroll systems; secure evidence with cryptographic checksums and controlled storage; and practice the auditor walk-through in advance. These steps will materially reduce audit friction and demonstrate that your organization meets ECC – 2 : 2024 Control 1-2-2 (Code 434) regarding full-time Saudi cybersecurity positions while improving your operational security posture.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes