
HIPAA compliance and cell phones is possible, but SMS, unmanaged BYOD, and unencrypted devices create real exposure most teams overlook.
Complete SAMA compliance checklist for Saudi financial institutions. Domain-by-domain requirements, obligations, and practical implementation steps.
Saudi Arabia's financial sector is under mounting pressure. From January to April 2025, threat intelligence firm Foresiet reported a significant rise in both external and internal threats targeting financial systems and critical infrastructure, and with over 280 active fintech firms operating under Vision 2030's expansion mandate, the regulatory stakes have never been higher. A structured SAMA compliance checklist is no longer a project management convenience, it is an operational requirement.
So what does a SAMA compliance checklist actually cover? It spans four control domains, Cyber Security Leadership and Governance, Risk Management and Compliance, Operations and Technology, and Third-Party Cyber Security, and every item must be documented against a six-level maturity model. Level 3 is the mandatory minimum for all Member Organizations.
The SAMA Cybersecurity Framework (CSF) applies to every regulated entity operating in Saudi Arabia's financial sector, banks, insurers, fintechs, payment providers, and exchange companies alike. There are no size exemptions, no grace periods for newer licensees, and no external certification that substitutes for the mandatory annual self-assessment.
This article walks through each domain's checklist items, explains what Level 3 actually requires, names the five most common audit failure points, and shows how device-level controls, including Mobile Device Management, fit directly into the framework.
The SAMA Cybersecurity Framework (CSF) applies to all SAMA-regulated entities, banks, fintechs, insurers, payment providers, and exchange companies, with no size exemptions.
The framework has four control domains: Governance, Risk Management and Compliance, Operations and Technology, and Third-Party Security.
All Member Organizations must reach at least Level 3 (Defined and Formalized) on the six-level maturity scale.
SAMA compliance requires annual self-assessments with documented evidence per control, not just implemented policies.
Mobile Device Management (MDM) is explicitly named in the SAMA Cyber Resilience section as a required technology control.
A checklist is a starting point; continuous monitoring and documented evidence close the gap between paper compliance and real security posture.
If you're already familiar with SAMA's scope and Member Organization definition, skip ahead to the domain-by-domain checklist below.
The SAMA Cybersecurity Framework is a mandatory cybersecurity standard issued by the Saudi Arabian Monetary Authority (also known as the Saudi Central Bank). Version 1.0 was issued in 2017 and applies to all SAMA-regulated entities, banks, insurance companies, finance companies, fintech companies, payment service providers, and exchange companies operating in Saudi Arabia, along with their employees, subsidiaries, and third-party associates. SAMA compliance starts with confirming your organization falls within this scope, because the framework's obligations extend to anyone who handles financial services under a SAMA license.
One distinction matters more than most: SAMA CSF is non-certifiable. There is no external certification body, no third-party auditor who stamps your organization as SAMA-compliant. Organizations self-assess, submit to SAMA, and are held accountable through SAMA's supervisory process. This is fundamentally different from ISO 27001, which can be certified externally. ISO 27001 is complementary and can strengthen your documentation posture, but it does not substitute for the SAMA self-assessment, and treating it as a proxy creates a specific compliance gap that SAMA reviewers have learned to spot.
Regulatory compliance requirements, including SAMA, NCA, and Vision 2030 mandates, are the dominant driver of cybersecurity spending decisions across Saudi Arabia's financial sector, which reflects just how central the CSF has become to institutional planning. The framework's four control domains cover governance, risk, technical operations, and third-party relationships. One additional regime runs in parallel: the Personal Data Protection Law (PDPL), which became enforceable on 14/09/2023, applies independently to all Saudi financial institutions and overlaps with several SAMA CSF controls, particularly in data encryption and breach notification.
SAMA does not tier its requirements by institution size. A 10-person fintech licensed last year faces the same Level 3 obligations as a major commercial bank. Smaller organizations frequently underestimate this, which is one of the most common scoping mistakes practitioners report.
SAMA CSF structures its requirements across four primary control domains. Following a domain-by-domain structure is the most efficient way to run a gap assessment, because each domain maps to a distinct ownership area, governance, risk, IT operations, and vendor management. A practical tip from experienced practitioners: start with your highest-risk or lowest-maturity domain, not with controls listed alphabetically or by reference number. This SAMA compliance checklist organizes items the same way SAMA expects them documented.
Before working through the domains, confirm you have a SAMA checklist owner assigned for each domain. Without named ownership, evidence collection becomes a last-minute scramble.
Governance must be in place before technical controls are implemented. Without a Cybersecurity Committee and a defined CISO role, technical compliance efforts lack the authority and accountability SAMA requires.
Evidence expected: Approved policy documents with version history, board meeting minutes showing cybersecurity agenda items, training completion records.
This domain is where PDPL and SAMA CSF intersect most visibly. Dual compliance pressure here is a live requirement, not a future concern, organizations must manage both obligations in parallel.
Evidence expected: Dated risk assessment reports, risk register with defined ownership, audit reports, documented PDPL alignment mapping.
This is the largest domain and the one most likely to require tooling investments. It covers the broadest set of IT compliance controls in the framework, and practitioners on Saudi network administration forums consistently flag device management and access centralization as the most technically demanding items to evidence.
Evidence expected: Asset inventory exports, IAM policy documents, MFA enrollment records, vulnerability scan reports, MDM enrollment records and policy configurations, tested BCP/DR plans with exercise records.
Troubleshooting note: If your Domain 3.3 audit evidence is rejected, check whether your asset inventory is current and complete first, it is the foundational dependency for every other operational control in this domain.
Second-order note: Enforcing MFA across all systems will surface legacy applications that do not support modern authentication protocols. Plan for application exceptions documentation before the self-assessment, not during it.
Practitioners consistently report that evidence collection, not control implementation, is the hardest part of the annual self-assessment. The solution is a living evidence repository updated continuously throughout the year, not assembled in the weeks before the submission deadline.
Which SAMA domain should you prioritize first?
No governance structure yet (no Cybersecurity Committee, no documented CISO role) → Start with Domain 3.1. Without governance, technical controls have no authority or accountability behind them.
Governance in place but no formal risk assessment completed → Move to Domain 3.2 first. The risk assessment output feeds directly into the controls you prioritize in Domain 3.3.
Governance and risk assessment complete, now implementing technical controls → Work through Domain 3.3 systematically, starting with asset inventory, it is the dependency for all other operational controls.
Not sure? → Run a gap assessment across all four domains before starting implementation. Map your current state to Level 2 criteria; anything you haven't yet documented is your starting point.
Evidence expected: Vendor contract security clauses, outsourcing risk assessments, cloud provider compliance documentation.
The maturity model runs from Level 0 to Level 5, and every Member Organization must reach Level 3 at minimum. Each level builds on the one before, you cannot self-assess at Level 3 without satisfying all Level 0, 1, and 2 criteria first.
Here is what each level means in practice:
The distinction between Level 2 and Level 3 is where most organizations get stuck during a SAMA audit. Having controls in place is Level 2. Having documented, formally approved, and regularly evaluated controls is Level 3. That gap, between operational reality and documented, reviewed evidence, is exactly where self-assessments fail.
SAMA applies identical Level 3 requirements to all Member Organizations, regardless of size. A recently licensed payment provider faces the same threshold as an established commercial bank. The real obstacle for smaller fintechs is rarely technical capability, it's a documentation culture gap. Informal processes that work in practice have simply never been written down, approved, or formally reviewed.
A second-order effect to plan for: when your team formally documents all controls for Level 3 compliance, it will surface undocumented informal processes that are actually effective. Those processes must then be formally approved before they can serve as audit evidence, which creates a short-term workload spike. Building that sprint into your project plan early prevents it from becoming a bottleneck at submission time.
SAMA reviewers have become increasingly sophisticated at identifying compliance gaps. Organizations building a SAMA compliance Saudi Arabia checklist frequently overlook these five areas, and they are consistently the root cause of cited deficiencies.
Controls exist, but there is no formal approval trail behind them. Policies are drafted but never submitted to the Cybersecurity Committee or board for approval. SAMA requires version-controlled documentation with a clear approval record, a shared folder of working drafts does not satisfy this requirement.
Organizations purchase ISO 27001 or generic ISMS template packages and submit them as SAMA evidence without modification. SAMA reviewers have become effective at identifying copy-paste documentation that lacks Saudi-specific operational context. A policy that references generic "applicable law" instead of SAMA CSF, PDPL, and NCA ECC-2 by name is a flag.
Asset inventory is the foundational control in Domain 3.3, every other operational control depends on knowing what assets exist. Outdated or partial inventories create a cascading problem: if reviewers find gaps in the inventory, they will question the validity of every downstream control that relies on it.
If your self-assessment evidence is challenged by SAMA reviewers, check your asset inventory completeness first, it is the most common root cause of downstream evidence failures.
Organizations that compile their evidence binder from scratch before each annual self-assessment create inconsistencies that experienced reviewers spot immediately, logs that don't match policy dates, training records with gaps, vulnerability scans from outside the assessment period. Using automated compliance software eliminates this scramble by maintaining continuous evidence records throughout the year, not just at submission time.
Domain 3.4 requires documented cybersecurity obligations in every vendor contract. Many organizations have verbal or informal vendor arrangements that have never been formalized with security language. Foreign vendors sometimes actively resist accepting SAMA-specific contract clauses. This is a procurement and legal problem, not an IT problem, looping in procurement and legal teams early in the compliance program is a non-technical bottleneck that delays more organizations than any technical control gap.
Download your SAMA Compliance Checklist to gain a clear, actionable overview of SAMA’s regulatory and cybersecurity requirements. Use this resource to evaluate your current controls, identify compliance gaps, and take structured steps toward achieving and maintaining full SAMA compliance.
SAMA's Cyber Resilience section explicitly requires Mobile Device Management as a technology control. The SAMA compliance checklist items in Domain 3.3 for endpoint and device controls require documented evidence, enrollment records, applied policy configurations, and proof that controls are actively monitored. Trio MDM addresses these requirements directly.
Centralized device inventory: Trio MDM enrolls and centrally manages devices across Android, iOS/iPadOS, macOS, Windows, and Linux. The Device List provides a real-time view of every enrolled device, including enrollment date, compliance status, serial number, and last check-in time, which directly supports the asset inventory requirement in Domain 3.3.
Security policy enforcement: Trio MDM deploys and enforces security profiles and device policies at scale. Policies are applied automatically, supporting the formalized and consistently implemented controls that Level 3 requires across all enrolled endpoints.
Compliance automation: Trio MDM continuously tests devices against framework controls and provides one-click remediation for most compliance issues. After remediation, devices are retested automatically. This directly addresses Level 3's requirement for controls to be "regularly evaluated", closing the gap between annual SAMA compliance automation cycles and real-time device posture.
MFA support: Trio MDM supports Multi-Factor Authentication, including Google Authenticator, Microsoft Authenticator, hardware security keys, and passkeys, which maps directly to SAMA's IAM and access control requirements in Domain 3.3.
BYOD and COD management: Trio MDM manages both BYOD and corporate-owned devices under separate policy tracks. For BYOD, policies apply only to the managed workspace, isolating corporate data from personal data. For corporate-owned devices, full compliance visibility and policy enforcement apply. This is directly relevant to financial institutions with mixed device fleets.
Remote lock and wipe: Trio MDM includes remote lock and remote wipe capability, supporting the device security controls SAMA reviewers check as part of endpoint management evidence.
These capabilities map directly to the device-level evidence requirements in Domain 3.3. For institutions building toward Level 3, having an MDM solution in place is not optional, SAMA lists it explicitly in the framework. Start your free trial or Book a demo to see how Trio MDM maps to your SAMA compliance checklist.
Ready-to-use Templates
Must-have Template Toolkit for IT Admins
Template ToolkitEvery organization today needs a solution to automate time-consuming tasks and strengthen security. Without the right tools, manual processes drain resources and leave gaps in protection. Trio MDM is designed to solve this problem, automating key tasks, boosting security, and ensuring compliance with ease.
Every organization today needs a solution to automate time-consuming tasks and strengthen security. Without the right tools, manual processes drain resources and leave gaps in protection. Trio MDM is designed to solve this problem, automating key tasks, boosting security, and ensuring compliance with ease.





Related
The related industry news, interviews, technologies, and resources.

HIPAA compliance and cell phones is possible, but SMS, unmanaged BYOD, and unencrypted devices create real exposure most teams overlook.

Saudi private sector organizations now face mandatory NCA compliance, this guide shows which ECC-2:2024 controls to automate first and how.

The NCA compliance checklist your team actually needs: ECC-2:2024 domains, NCNICC-1:2025, and what auditors look for as evidence.

Explore top NIST compliance automation tools and strategies. Save time, reduce risk, and simplify compliance management with this practical IT guide.

NIST compliance checklist with a free template. Learn how to meet NIST cybersecurity requirements and streamline your compliance process.

Discover automated PCI DSS compliance tools - what they do, key features, and how to choose the right solution for your business needs.

Learn what ISO 27001 compliance automation actually covers, what it cannot replace, and step-by-step guidance for successful implementation.

Explore HIPAA compliance automation capabilities, limitations, and implementation steps. Learn what you can automate and what needs human oversight.

Learn how to achieve ISO 27001 compliance for small businesses with practical steps, real cost breakdowns, and tips to get certified on a tight budget.