الأمن السيبراني
تنفيذ سياسة الأمن السيبراني
في الشركة الكيميائية الحديثة للخدمات (MCS)، لا يُعدّ الأمن السيبراني مجرد متطلب تقني، بل هو ركيزة أساسية في نزاهتنا التشغيلية وثقة عملائنا.
بصفتها شركة رائدة في مجال المتفجرات المدنية وخدمات التعدين، تعمل MCS في بيئة يكون فيها الأمن والسلامة والامتثال من الأولويات القصوى. تعتمد بنيتنا التحتية الرقمية على تشغيل عمليات حيوية مثل الحفر، التفجير، اللوجستيات، والتواصل مع العملاء. وأي انقطاع أو اختراق أو تهديد قد يؤدي إلى آثار بعيدة المدى تمس السلامة التشغيلية والامتثال للوائح الوطنية.
policy Number
1864_f5866b-23>
|
CODE
1864_91185e-85>
|
topic
1864_f2857e-9d>
|
ACCESS 1864_22a2c9-7c> |
---|---|---|---|
2.1 1864_15771d-41> |
MCS-02-CD -2.1. 1864_bca82d-ca> |
Acceptable Use Policy 1864_981ced-61> | 1864_5202ad-86> |
2.2 1864_44d411-fb> |
MCS-02-CD -2.2. 1864_e2f70c-5e> |
Asset Management Policy 1864_e7d021-1a> | 1864_fee7ac-14> |
2.3 1864_764bbf-6a> |
MCS-02-CD -2.3. 1864_dca16a-8f> |
Backup policy 1864_0d2768-19> | 1864_8541ca-ce> |
2.4 1864_73e4fd-35> |
MCS-02-CD -2.4. 1864_51f81a-f3> |
Cloud Computing and Hosting Cybersecurity Policy 1864_300792-b9> | 1864_1aac1a-6a> |
2.5 1864_5781cd-04> |
MCS-02-CD -2.5. 1864_0d0b63-f7> |
Compliance with Cybersecurity Legislation and Regulations Policy 1864_8b2628-ae> | 1864_a7858c-d8> |
2.6 1864_64e35c-fb> |
MCS-02-CD -2.6. 1864_7dfcd9-88> |
Configuration and Hardening Policy 1864_ffb11e-f3> | 1864_cd720f-3d> |
2.7 1864_998d27-bf> |
MCS-02-CD -2.7. 1864_10b815-cc> |
Corporate Cybersecurity Policy 1864_8adc5e-07> | 1864_a4d4e0-b1> |
2.8 1864_6293e2-c1> |
MCS-02-CD -2.8. 1864_c5b711-50> |
Cryptography Policy 1864_0cbd3f-be> | 1864_0adacd-18> |
2.9 1864_1e8557-3b> |
MCS-02-CD -2.9. 1864_f18084-c7> |
Cybersecurity Business Continuity Policy 1864_7ed65b-d8> | 1864_0688eb-b7> |
2.10 1864_c93ea2-50> |
MCS-02-CD -2.10. 1864_85bcab-91> |
Cybersecurity Event Logs and Monitoring Management Standard 1864_241802-db> | 1864_a6a45a-7c> |
2.11 1864_9f5210-ac> |
MCS-02-CD -2.11. 1864_342533-f7> |
Cybersecurity Incident and Threat Management Policy 1864_48a184-87> | 1864_a579eb-b0> |
2.12 1864_bf1d1c-a1> |
MCS-02-CD -2.12. 1864_3719fb-78> |
Cybersecurity Policy for Operational Technology 1864_13318f-69> | 1864_bf39cf-cd> |
2.13 1864_08a015-2e> |
MCS-02-CD -2.13. 1864_aacf47-6c> |
Cybersecurity Review and Audit Policy 1864_559083-ea> | 1864_e26660-a8> |
2.14 1864_511214-92> |
MCS-02-CD -2.14. 1864_91de89-dd> |
Cybersecurity Risk Management Policy 1864_7c7d06-39> | 1864_674919-c4> |
2.15 1864_9b3d99-47> |
MCS-02-CD -2.15. 1864_06dd8e-cf> |
Data Cybersecurity Policy 1864_63520d-ac> | 1864_2cc0ad-cd> |
2.16 1864_3e0623-91> |
MCS-02-CD -2.16. 1864_023c67-7b> |
Database Security Policy 1864_e6f686-e3> | 1864_42b27a-92> |
2.17 1864_142a19-f4> |
MCS-02-CD -2.17. 1864_3d9615-3a> |
Email Security Policy 1864_d0f7e9-55> | 1864_ab067e-d4> |
2.18 1864_3487bb-27> |
MCS-02-CD -2.18. 1864_d43d76-66> |
Human Resources Cybersecurity Policy 1864_1b4893-d2> | 1864_7b4fb9-6f> |
2.19 1864_af8797-3e> |
MCS-02-CD -2.19. 1864_d4ffc8-b5> |
Identity and Access Management Policy 1864_c753a9-f6> | 1864_dda1bc-28> |
2.20 1864_390161-47> |
MCS-02-CD -2.20. 1864_cc4f3b-27> |
Malware Protection Policy 1864_9d0726-8e> | 1864_2f7824-a4> |
2.21 1864_b5eec9-0d> |
MCS-02-CD -2.21. 1864_64aee8-af> |
Network Security Policy 1864_4f11c1-a5> | 1864_25f933-7a> |
2.22 1864_811619-6d> |
MCS-02-CD -2.22. 1864_92d824-33> |
Patch Management Policy 1864_fc877f-3e> | 1864_5d9c41-fe> |
2.23 1864_447d39-6b> |
MCS-02-CD -2.23. 1864_6f05d4-f7> |
Penetration Testing Policy 1864_22e225-92> | 1864_679a1a-08> |
2.24 1864_ecfe26-c2> |
MCS-02-CD -2.24. 1864_a7e542-ee> |
Physical Security Policy 1864_753ae2-0a> | 1864_84b75e-0c> |
2.25 1864_ffb236-40> |
MCS-02-CD -2.25. 1864_a67e17-39> |
Secure Systems Development Life Cycle Policy 1864_6b5608-4a> | 1864_f85b88-e7> |
2.26 1864_7ee514-5c> |
MCS-02-CD -2.26. 1864_dafd00-3e> |
Server Security Policy 1864_f5b70f-5b> | 1864_ec1903-a6> |
2.27 1864_a7d478-6b> |
MCS-02-CD -2.27. 1864_d7a426-6d> |
Storage Media Security Policy 1864_68bf8e-2a> | 1864_93900d-fb> |
2.28 1864_9117ed-02> |
MCS-02-CD -2.28. 1864_19edfc-34> |
Third-Party Cybersecurity Policy 1864_0d7b7a-1d> | 1864_ccb0f5-bd> |
2.29 1864_65fa96-f6> |
MCS-02-CD -2.29. 1864_416902-5c> |
Vulnerabilities Management Policy 1864_42bd87-10> | 1864_639741-08> |
2.30 1864_6e65de-cf> |
MCS-02-CD -2.30. 1864_fd3cd9-1e> |
Web Application Protection Policy 1864_2524f1-32> | 1864_ebe3f3-c6> |
2.31 1864_59eece-b1> |
MCS-02-CD -2.31. 1864_3f0991-f6> |
Workstations, Mobile Devices and BYOD Security Policy 1864_785d2e-c2> | 1864_b153c1-78> |