Sorry, you need to enable JavaScript to visit this website.
Skip to main content

Cybersecurity Policy within the Information and Technology Project Management


General Terms:

·       The cybersecurity requirements for project and change management of information and technology assets at King Saud University must cover at least the following:

-       Vulnerability assessment and remediation.

-       Conducting a review of configurations and hardening (Secure Configuration and Hardening) and applying update packages before launching and deploying projects and changes.

·       The cybersecurity requirements for application and software development projects at King Saud University must cover at least the following:

-       Adherence to secure coding standards (Secure Coding Standards).

-       Using licensed and trusted sources for application development tools and libraries (Libraries).

-       Conducting tests to verify that applications meet King Saud University’s cybersecurity requirements.

-       Ensuring the security of integration between applications (Integration Security).

-       Reviewing configurations and hardening (Secure Configuration and Hardening) and applying update packages before launching and deploying applications.

·       The cybersecurity requirements for project management at King Saud University must be reviewed annually.

 

 

Last updated on : October 14, 2025 9:42am