🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Meet Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 4-2-2

Practical guide for SMBs to implement Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 4-2-2

January 17, 2026
3 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

Requirement

Essential Cybersecurity Controls (ECC – 2 : 2024) - Control - 4-2-2 – The cybersecurity requirements related to the use of hosting and cloud computing services must be implemented.

Understanding the Requirement

This control — part of the Essential Cybersecurity Controls (ECC – 2 : 2024) framework — requires organizations to treat cloud and hosting services as an extension of their trusted environment. Practically, it means contracting and configuring cloud services so data residency is controlled (within the Kingdom), event logging is enabled, data can be returned and irrecoverably deleted at contract end, tenant environments are logically isolated, encryption is applied for data-in-transit and at-rest according to applicable laws, and backups are performed and protected in line with your backup policy. The organization should document an action plan and maintain continuous compliance monitoring.

Technical Implementation

  • Contract and data residency clauses: Add clear contract terms requiring the provider to store and process organizational data within the Kingdom, to provide data export in a usable format on termination, and to demonstrate secure deletion (e.g., crypto-shredding or certified wipe procedures). Ensure SLAs include evidence delivery timelines for export and deletion.
  • Enable and centralize logging: Turn on audit/event logging for all hosted assets (compute, storage, databases, network gateways). Ship logs to a centralized collector or SIEM you control (or a trusted managed service) with immutable storage and retention settings mapped to your compliance needs. Monitor key events (access, configuration changes, admin actions) and set alerting for anomalous behavior.
  • Enforce tenant isolation and network segmentation: Use provider features (VPCs, resource groups, dedicated subnets) and strict IAM roles/policies to separate your environment from other tenants. Apply host and network-level controls (security groups, NSGs, private endpoints) to limit lateral movement and ensure virtual servers and databases are not publicly exposed by default.
  • Encryption and key management: Require encryption for data-in-transit (TLS 1.2+ or stronger) and at-rest using provider-managed or customer-managed keys. For sensitive data, prefer customer-managed keys stored in a hardware-backed key store (HSM). Ensure key rotation, access controls, and key destruction policies meet relevant laws and organizational requirements.
  • Backups and restore testing: Mandate periodic backups by the provider (or perform them yourself) and require the provider to protect backups with encryption and access controls. Define backup frequency, retention, and restore time objectives in policy and validate restores through periodic testing. Store at least one backup copy under your direct control or in a separately controlled account.
  • Termination and verification: Define a shutdown checklist: export data in a documented format, verify checksum/record counts, request a signed deletion certificate, and validate that no recoverable snapshots remain. Maintain evidence of data return and deletion in your compliance records.

Example in a Small or Medium Business

Imagine a seven-person professional services firm that uses a cloud provider for email, document storage, and a small internal application. During procurement, the firm inserts contract terms requiring all client and internal data to be hosted within the Kingdom and requests proof of data export and deletion procedures. IT configures the cloud accounts with isolated VPCs, strict IAM roles, and private endpoints so resources are not publicly accessible. They enable audit logging for storage buckets, virtual machines, and databases, and forward logs to a centralized logging account that the firm controls. The firm requires encryption at-rest using customer-managed keys in the provider's HSM and enforces TLS for all application endpoints. Backups are scheduled nightly with encrypted storage, and quarterly restore tests are performed to validate the recovery process. When terminating any service, the firm follows its shutdown checklist: exports data, verifies completeness, and obtains a deletion certificate from the provider before removing service access and closing accounts. Regular quarterly reviews ensure the provider's practices and the firm's configurations remain aligned with the organization's policy.

Summary

By combining clear contractual requirements (data residency, export, and deletion), platform configuration (logging, isolation, encryption, backups), and operational practices (testing, evidence collection, and continuous monitoring), SMBs can implement Control 4-2-2 effectively. A documented action plan and periodic compliance checks close the loop, ensuring cloud and hosting services are managed to meet both legal requirements and the organization's security posture.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes