Risk, compliance, incidents, and architecture — one platform. Native GCC depth. 12 role views. Zero configuration.
Trusted by security teams across regulated industries
Risk, GRC, incidents, architecture, vendors, and evidence — one platform. Native Arabic support. Every role covered.
Every major Gulf regulatory framework — CBUAE ISR, NCA ECC, SAMA CSF, ADGM FSRA, VARA CSF — built in and maintained. No manual mapping.
AI Suggest surfaces control gaps, drafts policy text, triages incident severity, and recommends treatment plans — all in context.
Each of the 14 security roles sees exactly what they need — no more, no less. CISO gets board-ready posture; analyst gets their queue.
CBUAE ISR 4-hour breach reporting, SAMA CSF, PDPL, QCB, NESA — pre-built frameworks with jurisdiction-aware incident workflows.
Regulatory frameworks covered
Every domain connects — risks link to incidents, incidents link to controls, controls map to frameworks, frameworks generate evidence.
No consultants. No 6-month implementation. Import your frameworks, map your team, and get signal from day one.
Select from 40+ pre-built templates — NCA ECC, ISO 27001, PCI DSS, SAMA CSF. Controls import instantly.
Assign your 12 security roles. Set risk thresholds. Jurisdictions auto-populate regulatory deadlines.
Log risks, declare incidents, upload evidence — all linked across frameworks. Every action audit-logged.
CISO dashboard, executive reports, and compliance scorecards update in real time. No manual assembly.
Security teams in banking, government, and critical infrastructure rely on Scale Risk as their single system of record.
Scale Risk replaced three separate tools we were using for GRC, incident tracking, and evidence management. The CBUAE ISR framework was ready out of the box — nothing else in the market comes close for GCC coverage.
Khalid Al-Mansouri
CISO · Regional Banking Group, UAE
The 12-role permission model is exactly what a large security team needs. Our SOC analysts see their queue, our CISO sees the board summary, our GRC team manages controls — all from one platform.
Priya Nair
GRC Manager · FinTech Enterprise, Riyadh
Implementation took two days, not six months. We imported ISO 27001 and NCA ECC, assigned roles, and had our first risk register within the week. AI Suggest for control gaps saved my team hours.
Omar Al-Rashid
Head of Cybersecurity · Government Authority, KSA
Most GRC tools retrofit compliance onto generic project management. Scale Risk was built from day one for security teams in regulated industries.
| Feature | Scale Risk | Vanta | Drata | OneTrust | Archer |
|---|---|---|---|---|---|
| GCC Regulatory Coverage | |||||
| Built-in Frameworks | 40+ | 20+ | 15+ | 30+ | 10+ |
| Role-Based Dashboards | 12 roles | 3 roles | 3 roles | 5 roles | 4 roles |
| Incident Breach Workflow | |||||
| Vendor Risk Management | |||||
| Multi-Framework Mapping | |||||
| Evidence Multi-Tagging | |||||
| OT/ICS Security | |||||
| RTL / Arabic Support |
Every framework ships with pre-mapped controls. Import in one click, or build your own.
International standard for information security management systems (ISMS).
ISACA COBIT 2019 framework for IT governance and management.
Payment Card Industry Data Security Standard version 4.0.
Digital Operational Resilience Act — ICT risk management for EU financial entities.
BSI Cloud Computing Compliance Criteria Catalogue — German cloud security.
FCA Operational Resilience Policy Statement for UK regulated firms.
Saudi Arabian Monetary Authority Cybersecurity Framework.
UAE National Electronic Security Authority Information Assurance Standards.
UAE Securities & Commodities Authority cybersecurity requirements.
Qatar National Information Assurance Cybersecurity Framework.
Central Bank of Bahrain insurance cybersecurity requirements.
Central Bank of Kenya Cybersecurity Guidelines for financial institutions.
RBI cybersecurity guidelines for Payment Aggregators and Gateways.
India Digital Personal Data Protection Act 2023.
Australian Prudential Regulation Authority Information Security standard.
South Africa Protection of Personal Information Act.
Abu Dhabi Global Market Data Protection Regulations 2021 for ADGM-registered entities.
Oman Personal Data Protection Law — fully effective February 2025. NCSI enforcement.
Bank of Ghana Cybersecurity Directive for BOG-supervised financial institutions.
Central Bank of Jordan Cybersecurity Instructions for CBJ-licensed financial institutions.
Bank Al-Maghrib Circular 5/W/2021 on cybersecurity for Moroccan credit institutions.
International standard for information security management systems (ISMS).
ISACA COBIT 2019 framework for IT governance and management.
Payment Card Industry Data Security Standard version 4.0.
Digital Operational Resilience Act — ICT risk management for EU financial entities.
BSI Cloud Computing Compliance Criteria Catalogue — German cloud security.
FCA Operational Resilience Policy Statement for UK regulated firms.
Saudi Arabian Monetary Authority Cybersecurity Framework.
UAE National Electronic Security Authority Information Assurance Standards.
UAE Securities & Commodities Authority cybersecurity requirements.
Qatar National Information Assurance Cybersecurity Framework.
Central Bank of Bahrain insurance cybersecurity requirements.
Central Bank of Kenya Cybersecurity Guidelines for financial institutions.
RBI cybersecurity guidelines for Payment Aggregators and Gateways.
India Digital Personal Data Protection Act 2023.
Australian Prudential Regulation Authority Information Security standard.
South Africa Protection of Personal Information Act.
Abu Dhabi Global Market Data Protection Regulations 2021 for ADGM-registered entities.
Oman Personal Data Protection Law — fully effective February 2025. NCSI enforcement.
Bank of Ghana Cybersecurity Directive for BOG-supervised financial institutions.
Central Bank of Jordan Cybersecurity Instructions for CBJ-licensed financial institutions.
Bank Al-Maghrib Circular 5/W/2021 on cybersecurity for Moroccan credit institutions.
NIST Cybersecurity Framework 2.0 — six functions: Govern, Identify, Protect, Detect, Respond, Recover.
Industrial Automation and Control Systems cybersecurity standard for OT/ICS environments.
AICPA SOC 2 Trust Services Criteria for service organisations.
General Data Protection Regulation — EU data protection and privacy.
BSI baseline protection methodology for comprehensive information security.
Saudi National Cybersecurity Authority Essential Cybersecurity Controls.
Central Bank of the UAE Cyber Risk Management Guidelines.
Dubai Virtual Assets Regulatory Authority Cyber Security Framework.
Dubai Health Authority cybersecurity requirements for healthcare.
Qatar CERT National Cybersecurity Framework for critical infrastructure.
Oman NCSI National Cybersecurity Framework for critical infrastructure.
Central Bank of Uzbekistan cybersecurity requirements for banks.
IRDAI Information and Cyber Security Guidelines for Indian insurance entities.
SEBI Cybersecurity and Cyber Resilience Framework for regulated entities.
Australian Signals Directorate Essential Eight Maturity Model.
UAE Federal Decree-Law No. 45/2021 on Personal Data Protection. TDRA/UAEDAPT enforcement.
EU Regulation 2024/1689 — comprehensive AI regulation with extraterritorial scope affecting EU persons.
Kuwait Personal Data Protection Law. CITRA enforcement. 72-hour breach notification.
FSCA Cybersecurity guidance for South African financial institutions. Complements POPIA.
Central Bank of Egypt Cybersecurity Framework for CBE-regulated financial institutions.
NIST Cybersecurity Framework 2.0 — six functions: Govern, Identify, Protect, Detect, Respond, Recover.
Industrial Automation and Control Systems cybersecurity standard for OT/ICS environments.
AICPA SOC 2 Trust Services Criteria for service organisations.
General Data Protection Regulation — EU data protection and privacy.
BSI baseline protection methodology for comprehensive information security.
Saudi National Cybersecurity Authority Essential Cybersecurity Controls.
Central Bank of the UAE Cyber Risk Management Guidelines.
Dubai Virtual Assets Regulatory Authority Cyber Security Framework.
Dubai Health Authority cybersecurity requirements for healthcare.
Qatar CERT National Cybersecurity Framework for critical infrastructure.
Oman NCSI National Cybersecurity Framework for critical infrastructure.
Central Bank of Uzbekistan cybersecurity requirements for banks.
IRDAI Information and Cyber Security Guidelines for Indian insurance entities.
SEBI Cybersecurity and Cyber Resilience Framework for regulated entities.
Australian Signals Directorate Essential Eight Maturity Model.
UAE Federal Decree-Law No. 45/2021 on Personal Data Protection. TDRA/UAEDAPT enforcement.
EU Regulation 2024/1689 — comprehensive AI regulation with extraterritorial scope affecting EU persons.
Kuwait Personal Data Protection Law. CITRA enforcement. 72-hour breach notification.
FSCA Cybersecurity guidance for South African financial institutions. Complements POPIA.
Central Bank of Egypt Cybersecurity Framework for CBE-regulated financial institutions.
Center for Internet Security Critical Security Controls version 8.
SWIFT Customer Security Programme mandatory and advisory controls.
Health Insurance Portability and Accountability Act — PHI privacy and security.
Network and Information Security Directive 2 — EU cybersecurity requirements.
FCA Senior Management Arrangements, Systems and Controls — UK FCA sourcebook.
Saudi NCA Critical Systems Cybersecurity Controls for OT systems.
Central Bank of the UAE Information Security Regulation — 14-domain framework.
Abu Dhabi Global Market Cyber Risk Management Framework.
UAE Ministry of Health cybersecurity and health data protection standards.
Central Bank of Bahrain Cyber Risk Module for financial institutions.
UAE National Cybersecurity Authority CSF — mandated for UAE federal entities and critical infrastructure operators.
Reserve Bank of India Cyber Security Framework for banks and NBFCs.
Indian CERT incident reporting and cybersecurity obligations.
Monetary Authority of Singapore Technology Risk Management Guidelines.
Singapore Personal Data Protection Act for organisations.
DIFC Regulation 10 on AI — first binding AI regulation in MEASA. Combined with DIFC Data Protection Law.
Qatar Central Bank AI Governance Guidelines — binding for Qatar financial sector. Rollout 2024–2027.
Central Bank of Nigeria Cybersecurity Framework — mandatory for CBN-regulated financial institutions.
State Bank of Pakistan Cybersecurity Framework for SBP-regulated financial institutions.
Turkey BDDK Cybersecurity Regulation with KVKK overlap for Turkish financial institutions.
Center for Internet Security Critical Security Controls version 8.
SWIFT Customer Security Programme mandatory and advisory controls.
Health Insurance Portability and Accountability Act — PHI privacy and security.
Network and Information Security Directive 2 — EU cybersecurity requirements.
FCA Senior Management Arrangements, Systems and Controls — UK FCA sourcebook.
Saudi NCA Critical Systems Cybersecurity Controls for OT systems.
Central Bank of the UAE Information Security Regulation — 14-domain framework.
Abu Dhabi Global Market Cyber Risk Management Framework.
UAE Ministry of Health cybersecurity and health data protection standards.
Central Bank of Bahrain Cyber Risk Module for financial institutions.
UAE National Cybersecurity Authority CSF — mandated for UAE federal entities and critical infrastructure operators.
Reserve Bank of India Cyber Security Framework for banks and NBFCs.
Indian CERT incident reporting and cybersecurity obligations.
Monetary Authority of Singapore Technology Risk Management Guidelines.
Singapore Personal Data Protection Act for organisations.
DIFC Regulation 10 on AI — first binding AI regulation in MEASA. Combined with DIFC Data Protection Law.
Qatar Central Bank AI Governance Guidelines — binding for Qatar financial sector. Rollout 2024–2027.
Central Bank of Nigeria Cybersecurity Framework — mandatory for CBN-regulated financial institutions.
State Bank of Pakistan Cybersecurity Framework for SBP-regulated financial institutions.
Turkey BDDK Cybersecurity Regulation with KVKK overlap for Turkish financial institutions.
Every role sees exactly the signal they need. No shared generic dashboards. Each view is purpose-built for its owner.
Board-ready posture, every morning
Framework gaps, deadlines, evidence
Your queue, nothing else
Incidents end-to-end