The RSI security site breaks down the steps in some element, but the procedure in essence goes like this: Establish firewalls and router standards, which established procedures for enabling and denying entry to your devices. Firewall configurations need to be reviewed bi-yearly to make sure there isn't any defective entry https://www.nathanlabsadvisory.com/sama-compliance-saudi-arabia.html