CybersecurityStandardIn 6clicks App

UAE IA V2UAE Information Assurance Standard Version 2

The UAE Information Assurance Standard Version 2 (UAE IA V2) is a national cybersecurity framework issued by the UAE Cyber Security Council in 2025. It builds upon the previous version with updated controls and integrations to address modern technologies, such as AI/ML, IoT, cloud, and post-quantum cryptography.

The UAE Information Assurance Standard V2 (UAE IA V2) represents a significant update to the country's cybersecurity standard, published by the UAE Cyber Security Council. It reduces previous control overlaps, reorganizes controls into 15 families and 134 controls with 449 sub-controls, and aligns with seven National Cybersecurity Policies. New areas, such as post-quantum cryptography, threat intelligence, secure software development, and AI/ML security, address emerging threats and technologies. Key enhancements include modular risk-driven control architecture, explicit accountability assignments, and a prioritization model of 'Always Applicable' and 'Based on Risk' controls. The guideline harmonizes national and international standards, fostering better governance, continuous improvement, and simplified compliance across both government and critical infrastructure entities.
#cybersecurity#information assurance#critical infrastructure#risk management#AI security#IoT security#post-quantum cryptography

Related in Cybersecurity

CybersecurityStandardIn 6clicks App

OWASP ASVS — OWASP Application Security Verification Standard

The OWASP Application Security Verification Standard (ASVS) is an open standard for testing and verifying the security of web applications. It provides developers with a comprehensive list of requirements for secure development and helps establish confidence in application security.

Issuer
OWASP Foundation
Version
4.0.2
Updated
May 2025
View detailsapplication security · web security
CybersecurityFrameworkIn 6clicks App

CMMC — Cybersecurity Maturity Model Certification

The Cybersecurity Maturity Model Certification (CMMC) Assessment Guide defines how organizations are evaluated for compliance with cybersecurity requirements when working with the U.S. Department of Defense. It outlines assessment methods, evidence expectations, and control validation aligned with standards like NIST SP 800-171. The guide ensures consistent and rigorous verification of an organization’s ability to protect sensitive information.

Issuer
US Government
Jurisdiction
USA
Version
2.13
View detailsinformation security · cybersecurity
CybersecurityFrameworkIn 6clicks App

SOC2 — SOC2 Trusted Services Criteria

SOC 2 is a framework for managing and reporting on controls at service organizations relevant to security, availability, processing integrity, confidentiality, and privacy. It aims to provide detailed information and assurance to stakeholders about how these controls are implemented to protect user data.

Issuer
American Institute of Certified Public Accountants (AICPA)
Jurisdiction
USA
Updated
Sep 2022
View detailssoc 2 · security