NASSCOM-DSCI Cyber Security Advisory Group (CSAG) Report
NASSCOM-DSCI Cyber Security Advisory Group (CSAG) Report
NASSCOM-DSCI Cyber Security Advisory Group (CSAG) Report
securing our
cyber frontiers
About NASSCOM
NASSCOM is the premier body and the chamber of commerce of the IT-BPO industries in India. NASSCOM is a global
trade body with more than 1200 members which include both Indian and multinational companies that have a
presence in India. NASSCOM's member and associate member companies are broadly in the business of software
development, software services, software products, consulting services, BPO services, e-commerce & web services,
engineering services offshoring and animation and gaming and constitute over 95 % of the industry revenues in India
and employs over 2.24 million professionals.
NASSCOM's Vision is to maintain India's leadership position in the global sourcing IT industry, to grow the market by
enabling industry to tap into emerging opportunity areas and to strengthen the domestic market in India. NASSCOM
aims to drive the overall growth of the global offshoring market and maintain India's leadership position, by taking up
the role of a strategic advisor to the industry.
About DSCI
DSCI is a focal body on data protection in India, setup as an independent Self-Regulatory Organization (SRO) by
NASSCOM, to promote data protection, develop security and privacy best practices & standards and encourage the
Indian industries to implement the same.
DSCI is engaged with the Indian IT/BPO industry, their clients worldwide, Banking and Telecom sectors, industry
associations, data protection authorities and other government agencies in different countries. It conducts industry
wide surveys and publishes reports, organizes data protection awareness seminars, workshops, projects, interactions
and other necessary initiatives for outreach and public advocacy. DSCI is focused on capacity building of Law
Enforcement Agencies for combating cyber crimes in the country and towards this; it operates several Cyber labs
across India to train police officers, prosecutors and judicial officers in cyber forensics.
Public Advocacy, Thought Leadership, Awareness and Outreach and Capacity Building are the key words with which
DSCI continues to promote and enhance trust in India as a secure global sourcing hub, and promotes data protection
in the country.
For more information on this report, contact:
Disclaimer
This document contains information that is Intellectual Property of NASSCOM and DSCI. NASSCOM and DSCI expressly disclaim to the
maximum limit permissible by law, all warranties, express or implied, including, but not limiting to implied warranties of merchantability,
fitness for a particular purpose and non-infringement. NASSCOM and DSCI disclaim responsibility for any loss, injury, liability or damage
of any kind resulting from and arising out of use this material/information or part thereof. Views expressed herein are views of NASSCOM
and DSCI and /or their respective authors and should not be construed as legal advice or legal opinion. Further, the general availability of
information or part thereof does not intend to constitute legal advice or to create a Lawyer/Attorney-Client relationships, in any manner
whatsoever.
Foreword
action. The key recommendations made by the group, identify ten such areas along with the role of government
and the industry for each area. These recommendations have been developed after taking into consideration the
ongoing global cyber security efforts and developments while keeping the Indian environment in context. I strongly
believe that the government will find the CSAG Report thought provoking and useful in creating appropriate policy
instruments for enhancing cyber security in the country.
I would like to thank all the CSAG members for actively participating in this initiative and making valuable contributions.
My special thanks to Dr. Kamlesh Bajaj, CEO, DSCI for steering this Group and leading the DSCI team in preparing
this Report. Under his leadership DSCI has helped bring cyber security into focus among the industry and other
stakeholders in the country and is emerging as a think tank in data protection and cyber security. On behalf of the
Group, I extend my thanks to the DSCI team for driving the overall process in an efficient, effective and collaborative
manner.
Rajendra Pawar
22 March, 2012
Chairman, CSAG
Chairman, Executive Council, NASSCOM
Chairman & Co-founder, NIIT Group
Executive Summary
Cyberspace is emerging as a game changer in the information age. Developed and developing countries are exploiting
cyberspace to leap ahead in the future development and augmentation of critical infrastructure, electronic delivery
of government & business services, increasing productivity, new business models, etc. However, the same cyberspace
is being equally exploited by terrorists, criminals and even adversary nation-states for disrupting critical infrastructures,
stealing secrets, carrying financial frauds, recruiting criminals, etc. What makes cyberspace even more attractive to
criminals is that attribution in cyberspace is difficult, especially given that cyberspace is borderless and cuts across
jurisdictions. It allows criminals to launch attacks remotely from anywhere in the world. Cyberspace is changing the
power equations a bunch of cyber criminals can now take on powerful nations. Whats even worse is that the effects
of cyber attacks can be similar to physical attacks. National security is getting increasingly linked to cyber security.
A nations cyberspace is part of the global cyberspace and no nation can protect its cyberspace in isolation. Cyber
security is a global problem requiring mobilization of action both at national and international levels. Nations are at
cross roads and there are lot of cyber security policy related discussions and debates taking place around the world.
Nations have taken significant efforts to secure their cyberspace and yet they have been repeatedly attacked.
India is leveraging the power of technology to address its social, economic and development challenges. However,
if cyber threats are not addressed through appropriate policy measures, they can disrupt countrys economic
development. Though several initiatives have been taken by the government and industry, these efforts need to
be further augmented, given the gravity of the problem. NASSCOM and DSCI created the Cyber Security Advisory
Group (CSAG), having representation from public and private sectors, to recommend the priority policy action items
for the government based on the global developments and learning.
The key recommendations of the CSAG are listed below:
1.
Create a National Structure for Cyber Security which clearly defines roles and responsibilities for every
stakeholder, establishes coordination & information sharing mechanisms, focuses on building Public Private
Partnership models and creates environment for enhancing trust between the industry and government.
A fully empowered head for Cyber Security should be appointed, positioned at the highest level within
the government.
2.
Design and Implement a Competency Framework for building a competent and adequate Cyber Security
Workforce. The Competency Framework should assess the security skills requirements, identify existing gaps
& challenges, define competency areas across different security roles and devise strategies and programs
for building the required capacity.
3.
Create and maintain an Inventory of Critical Information Infrastructure in the country to provide the
required visibility over the critical information infrastructure and help prioritize deployment and monitoring
of the protection measures.
4.
Establish a Centre of Excellence for Best Practices in Cyber Security to institutionalize the development,
sharing, collation, distribution and implementation of best practices in the country.
5.
Establish a National Threat Intelligence Centre which should integrate all the existing information sources
such as sectoral CERTs, intelligence bodies, security alerts issued by security vendors, threats seen by critical
sectors and industry to enable cross-domain awareness and a comprehensive view of cyber threats at a
national level.
SECURING OUR CYBER FRONTIERS
6.
Build Capacity of the Law Enforcement Agencies in Cyber Crime Investigations and Cyber Forensics by
establishing training facilities in every state and union territory.
7.
Build Lawful Interception Capabilities for balancing national security and economic growth by establishing
a national centre for performing research in encryption and cryptanalysis.
8.
Establish a Centre of Excellence for Cyber Security Research to develop solutions that will protect countrys
information infrastructure in the future by defining and executing a research roadmap developed based
on countrys research needs.
9.
Set up Testing Labs for accreditation of ICT products to mitigate security risks arising from procurement
of ICT products especially from foreign vendors and yet take full benefits from the global supply chain that
includes access to world class products, services and expertise at competitive prices.
10. Establish a Cyber Command within the defence forces to defend the Indian Cyberspace. The Cyber
Command should be equipped with defensive and offensive cyber weapons, and manpower trained in
cyber warfare.
The government should implement the above recommendations in parallel through effective public-private
partnerships. The industry should actively support the government in the implementation of these recommendations.
Government and industry cannot overcome the cyber security challenge in isolation; the imperative is to work
together in a trusted and collaborative environment, leveraging each others strengths to strengthen the cyber
security posture of the country and take lead in global cyber security efforts
Contents
1.
Background ..........................................................................................................................................7
2.
Cyber
2.1
2.2
2.3
2.4
3.
4.
5.
CSAG Recommendations..................................................................................................................31
5.1
Key CSAG Recommendations..............................................................................................31
5.2
Additional CSAG Recommendations..................................................................................37
6.
Epilogue..............................................................................................................................................43
Appendix............................................................................................................................................45
I.
Proposed National Cyber Security Structure.................................................................................47
II.
Global Cyber Security Initiatives......................................................................................................48
United States of America......................................................................................................48
United Kingdom.....................................................................................................................61
Australia..................................................................................................................................65
Japan.......................................................................................................................................69
1. Background
Over the years NASSCOM has played a vital role in the area of public policy through advocacy in India. It works with the
Indian government on a variety of initiatives and issues affecting not only the IT/BPO industry but also infrastructure,
education and manpower development; employment generation through skill development in the country at large.
DSCI, a not for profit company set up by NASSCOM, has also been closely working with the government on a number
of initiatives and issues pertaining to data security, data privacy and cyber security.
Today, given the increasing dependence on information and communication technologies (ICT), especially the
Internet, for delivery of services, one of the biggest challenges the world faces is that of cyber security. Governments
around the world are formulating cyber security strategies and policies to effectively manage the risks, which are
global in nature. Department of Information Technology (DIT), Government of India has launched a number of
initiatives over the last few years, to enhance cyber security; it has also released a draft national cyber security policy
for public consultation. It highlighted Public-Private Partnership (PPP) as a key component as more and more Critical
Information Infrastructure is owned and operated by the private sector.
Given the importance of cyber security because of it being closely associated with national security, and the role
of private sector; NASSCOM and DSCI constituted Cyber Security Advisory Group (CSAG) with representation of
various stakeholders - both from the public and private sectors - to provide recommendations to the government on
PPP in capacity building and policy making. The CSAG was chaired by the Chairman of NASSCOM Executive Council,
with the CEO of DSCI acting as Member Secretary.
The first meeting of the CSAG was held on 4th October, 2011 at DSCI office. As a result of the discussions held, NASSCOM
DSCI formed 7 sub-groups namely - Critical Infrastructure Protection, Best Practices for Cyber Security, Early
Watch and Warning System, Education & Awareness, Law Enforcement Capability Development, Assurance
in ICT Supply Chain and Cyber Warfare. Members in these sub-groups were requested to deliberate on the threats
in their respective areas, study emerging trends and policy evolution and the experience of implementing them in
other countries, and evolve policies of relevance to the Indian context.
DSCI consolidated the preliminary recommendations provided by the CSAG members and also did an extensive study
by studying polices and initiatives of these countries1 and Indias initiatives to develop its own recommendations.
The consolidated preliminary recommendations were brainstormed in the second meeting of the CSAG held on 6th
February, 2012 at NASSCOM office. In this meeting, it emerged that the CSAG group should prioritize the existing
recommendations to provide the government key priority areas for action, detailing the role of the industry in each
such area. As a result, the CSAG group has come out with ten key pragmatic and actionable recommendations
which also detail the role of the government and industry. Other recommendations are also detailed for completeness
of the CSAG Report.
1 The detailed study of cyber security initiatives of US, UK, Australia and Japan have been presented in the Appendix of this report
On one hand, cyberspace has evolved from a totally unregulated techies domain, where innovation, new technologies,
new services were the only drivers. Indeed its innovations in cyberspace that have led to economic growth and
globalization. On the other, cyber attacks are on the rise, cyber crimes have been fructifying, cyber espionage is
gaining traction and cyber warfare is touted as the realm of next world war.
10
- earning profit or creating havoc unite them. Given their large funding streams and cross-border free flow of
information, existing laws are not able to restrain their growing network community. Unlike criminals, the lawful
agencies require frameworks to operate, and trust in one another, which is relatively difficult.
From a national security perspective, security of critical information infrastructure is becoming a top priority. Over
the years, targeted attacks on critical information infrastructures of nations meant to disrupt and impact normal
functioning with wide economic consequences have been observed. Attacks on power grids, oil rigs and other critical
infrastructures causing heavy outage have made digital nations realize the significance of securing their critical
assets due to their increasing interdependency in digital arena. Be it cyber attack on Irans nuclear reactor by use of
specially crafted stuxnet or attacks on Georgia and Estonia, these attacks have impacted severely and got the nations
think tanks to re-strategize their policies. Possible scenarios that experts are considering as a result of cyber attacks
include: mid air collisions of airplanes, trains bumping into each other due to signal malfunctioning, nuclear reactors
and power plants becoming un-operational, breakdown of stock markets impacting millions of traders and investors,
banking infrastructure coming to a grinding halt, water grids being operated by cyber attackers, unavailability of
telecom services etc. Only an armed attack could have led to such disasters before the Internet. No wonder cyber
security is getting increasingly linked with national security.
In banking and financial sector, most of the operations are now done online. This sector is arguably the most targeted
as the returns are much higher. Millions and billions of dollars, as direct cash cost, have been lost on account of attacks
on financial infrastructure. Stealing financial information, credit card details, financial frauds etc. has been on the
rise. The fact that more and more personal information is crossing the borders in trans-border data flows means that
data breaches often affect people in multiple countries, and may result in financial frauds as in TJX case, a retailer in
the United States. Nearly 100 million credit and debit cards belonging to people from various regions were exposed
when hackers broke into its computer systems and converted some of these into ready-to-use bank cards. Hackers
sold the stolen credit card information to people in the United States of America (US) and Europe via the Internet.
National ICT assets are attacked from cyberspace commons without the fear of being identified. Even though most
of the assets are owned privately, individual countries are finding it difficult to handle the criminals, since the origin
of cyber attack can be camouflaged. Growing instances of cyber espionage for stealing critical information and
intellectual property have been witnessed. Researchers are of the opinion that some of these high profile attacks
may have been carried out by nation-states directly or through non-state actors or working under the direction and
control of the former. Corporate are interested in confidential information such as business plans of their competitors
and nation-states are interested in the military secrets and strategic plans of other nations. In May 2009, President
Obama cited one estimate that a trillion dollars worth of intellectual property is stolen worldwide every year.
In March 2011, hackers penetrated French3 government computer networks in search of sensitive information on
upcoming G-20 meetings. Also in that month, hackers used phishing techniques to obtain data that compromised
RSAs SecureID authentication technology; the data acquired was then used to penetrate Lockheed Martins networks.
Google reported a phishing effort to compromise hundreds of Gmail passwords for accounts of prominent people,
including senior US officials. Approximately 24,000 files were reported to be stolen from Pentagon in a major cyber
attack. In the year 2011 alone, National Aeronautics and Space Administration (NASA) witnessed thirteen major
breaches, which NASA said could compromise US national security.4
To stay ahead of the curve, many nation-states are reportedly developing offensive cyber weapons and are even
known to have raised army of cyber attackers. They engage patriotic geeks and provide them with a career path in
security operations at an early age. On lines of nuclear weapons, an arms race is slowly picking up among nations in
cyberspace. This has been one of the reasons for growing disharmony among nations.
2
3
4
www.washingtontimes.com/news/2011/sep/29/pentagon-seeks-probe-of-the-cost-of-hacking/
List of Cyber Incidents: http://csis.org/files/publication/120313_Significant_Cyber_Incidents_Since_2006.pdf
Source- Reuters
11
12
5, 6 The Cybersecurity Agenda, Mobilizing for International Action- Dr. Kamlesh Bajaj
13
In the information age, Internet is the engine for global economic growth and the cyber security initiatives of any
country should not impede it, instead these initiatives should create enablers for growth of the Internet and other
technology innovations. The world has to find a way to cooperate so that the cyberspacethe biggest global
commonsremains a driver of economic prosperity of nations and a cloud where people from all countries can
safely interact and exchange goods and services.
14
Boston Consulting Report 2012 : The Connected World- The Internet Economy in G-20
15
in the vision statement of NeGP8. The NeGP comprises 27 mission mode projects (MMPs) and 8 common
core and support infrastructure including State Wide Area Networks and State Data Centres.
Aadhaar' is one of the most ambitious projects of the Indian government which is issuing 12-digit unique
number to Indian residents. The number will be stored in a centralized database and linked to the basic
demographics and biometric information photograph, ten fingerprints and iris of each enrolled resident.
The Aadhaar number provides unique identity, which will become acceptable across India. The project
promises that this identity will be robust enough to eliminate duplicate and fake identities through effective
verification and authentication. Many of the governments social benefit programs are envisaged to be
linked with the Aadhaar number. The disbursements of government entitlements like Mahatma Gandhi
National Rural Employment Gurantee scheme, social security pension, handicapped old age pension, etc
are expected to be made through Aadhaar-Enabled Payment Systems (AEPS), using aadhaar number and
associated personal information for authentication. The Aadhaar initiative is also expected to give a boost
to governments efforts for financial inclusion by providing the means for delivery of banking services
through Business Correspondents (appointed by Banks) in rural areas.
e-Commerce this industry is witnessing phenomenal growth; B2C e-commerce is expected to touch USD
10 billion a growth of 47% from 20109. e-payments in India account for 35.3% of the total transactions in
terms of volume and 88.3% in terms of value10, card circulation - both credit and debit - was around 200
million in 201011. The e-commerce is still an untapped potential given that the Internet penetration12 in
India is only around 8% (rising exponentially) with around 120 million Internet users13 and India is projected
to become the third largest Internet user base by 201314. With around 894 million mobile subscribers15 (as
on December 2011), m-commerce market is a big opportunity, especially as it promises to bring rural India
into the realm of e-commerce.
IT/BPO sector India is the preferred global supplier for IT software and services and is emerging as the
knowledge hub of the world with many global companies opening their R&D and innovation centres in
India. The industry has provided job opportunities to over 10 million people through direct and indirect
employment and accounts for 6.4% of Indias GDP. It aims to grow revenues to USD 225 billion by 202016
out of which USD 175 billion will be on account of export of software and services. Domestic IT market,
including telecommunications services and equipment, is expected to touch USD 110 billion by 2012. Cloud
Computing is a huge opportunity for India - next wave of growth for the Indian IT industry as worldwide
cloud services revenue are expected to reach around USD 150 billion in 201417. The Indian cloud computing
market opportunity is expected to reach USD 16 billion by 202018. Data protection (security and privacy)
is perceived to be one of the major challenges in adoption of the cloud.
Modernization of Police and Defence Police agencies and Defence are making strategic use of technology
to modernize. Projects such as Crime and Criminal Tracking Network and Systems (CCTNS) and National
Intelligence Grid (NATGRID) are flagship projects for modernization of police. CCTNS will connect 14,000
police stations and 6,000 police officers to a centralized database. The goal of CCTNS is to facilitate collection,
storage, retrieval, analysis, transfer and sharing of data and information at the police station and between
8
9
10
11
12
13
14
15
16
17
18
16
www.mit.gov.in/content/national-e-governance-plan
Internet and Mobile Association Of India
Reserve Bank of India
Payments in India is going e-way, Celnet report
Google India
http://timesofindia.indiatimes.com/tech/news/internet/121m-internet-users-in-India-by-2011-end-Report/articleshow/10641973.cms
Forrester
TRAI
NASSCOM-Mckinsey Study: Perspective 2020
Gartner
NASSCOM Deloitte Study Deconstructing the CLOUD: The New Growth Frontier for Indian IT-BPO Sector
the police station and the State Headquarters and the Central Police Organizations.19 NATGRID, in its first
phase, will network 21 sets of data sources to provide quick and secure access to information required by
10 intelligence and law enforcement agencies as part of the counter terror-related investigative processes.20
Defence has also taken similar initiatives most notably the creation of an Army Wide Area Network
(AWAN) designed to connect all Army formations, units, training establishments and logistic installations
in the country for secure and direct information exchange.21 Army also launched project Shakti a fully
digitized and integrated Artillery Combat Command and Control System, which is a network of military
grade tactical computers automating and providing decision support for all operational aspects of Artillery
functions from the corps down to a battery level.22
Social Media With around 45 million23 Indians using the social media, and the number increasing every
day, social media is emerging as a very powerful phenomenon in Indian cyberspace. It is revolutionizing the
way society interacts. It is growing rapidly and becoming addictive especially for young Indians who love
to connect with one another, make friends, chat, and publish photographs of family and friends. Personal
Information is becoming the economic commodity on which social networking is thriving. Businesses,
Non-Governmental Organizations (NGOs) and even the governments are using this platform for variety of
reasons communication, marketing, branding, awareness, etc. Whole new communities that encourage
people to discuss important issues and come up with innovative solutions to local problems are emerging.
The social media has also caught the attention of the governments and the regulators worldwide (for
wrong reasons) including the Indian government and there is an ongoing debate on regulating the social
media.
http://ncrb.nic.in/cctns.htm
http://blogs.wsj.com/indiarealtime/2011/06/29/qa-natgrid-chief-raghu-raman/
http://www.defenceindustrydaily.com/indias-army-launches-awan-network-02014/
http://pib.nic.in/newsite/erelease.aspx?relid=49161
http://www.watconsult.com/2011/05/45-million-indians-on-social-media-by-2012-are-you-on-it-yet/
17
cellphones with switchable SIM cards, e-mails routed through servers in different locations, which made it harder
to trace them.
Cyber attacks targeted at critical information infrastructures (energy, telecom, financial services, defence, and
transportation) have the potential of adversely impacting a nations economy and public safety, and citizens lives.
These critical infrastructures are mainly owned and operated by the private sector. For example, the telecom sector
is mostly owned by the private players, except Mahanagar Telephone Nigam Ltd. and Bharat Sanchal Nigam Ltd.;
Major stock exchanges - Bombay Stock Exchange and National Stock Exchange are private players wherein most
of the transactions are done through electronic medium; Airline industry is dominated by private players with Air
India being the only the government enterprise; Energy & Utility sector though dominated by government players,
the distribution is largely controlled by private partners; the banking sector has large number of private banks. The
investments made by these private players in securing the infrastructure are driven by business requirements and
not national security concerns. This may leave possible security loop holes. India recently witnessed a cyber attack
on its critical information infrastructure - cyber attack on state-of-the-art T3 terminal at New Delhi airport that made
check-in counters of all airlines non-operational causing public inconvenience. Stuxnet - the deadliest attack vector
that has been designed so far which destroyed a nuclear reactor in Iran has reportedly infected systems in India.24
As the dependency of critical information infrastructure on technology increases in future and if such infrastructures
remain vulnerable, it is possible that adversaries may use cyber attacks on critical information infrastructure to produce
impact similar to that in physical attacks / accidents, at worst leading to physical harm collision of aircrafts because
of manipulation with Air Traffic Controlling system, train accidents due to signal malfunctioning; or could adversely
affect the national economy failure of telecommunication services, power grids, oil production and distribution,
breakdown of stock markets and banking infrastructure.
Given the increased usage of Internet in the country, India is witnessing sharp rise in cyber crimes. Data released by
National Crime Records Bureau (NCRB) in 2010 shows this trend - 966 cyber crimes cases were registered in 2010
under the IT Act across India (an increase of around 128% over 2009 and 235% over 2008) and 799 persons in
2010 were arrested (an increase of around 177% over 2009 and around 349% over 2008) for cyber crimes included
hacking, obscene transmission, tampering, etc.
Cyber attackers have also been repeatedly defacing Indian websites especially government websites. In January
2012 alone, 1425 websites were defaced, with 834 target websites being hosted on .in domain25. Many high profile
cyber espionage attacks targeting systems of senior Indian bureaucrats have been reported in the media.26
24
25
26
18
http://www.tehelka.com/story_main51.asp?filename=Ne261111India.asp
http://www.cert-in.org.in/
http://articles.timesofindia.indiatimes.com/2010-01-16/india/28147357_1_cyber-criminals-pmo-standalone-computers
http://www.dsci.in/sites/default/files/India-Building%20an%20New%20Ecosystem_Vinayak%20v4.pdf
19
transactions. The draft policy tries to layout the cyber security ecosystem for the country. It covers the following:
Based on the key policy considerations and threat landscape, the draft policy identifies priority areas for
action
Identifies PPP as a key component
Identifies key actions to reduce security threats and vulnerabilities
Establishment of a National Cyber Alert System for early watch and warning, information exchange,
responding to national level cyber incidents and facilitating restoration
Defines role of sectoral CERTs and establishment of local incident response teams for each critical sector
organization
Implementation of best practices in critical information and government infrastructure protection through
creation, establishment and operation of Information Security Assurance Framework
Establishes framework for Crisis Management Plan for Countering Cyber Attacks and Cyber Terrorism
Identifies priorities for action for legal framework and law enforcement capability development
Defines priorities for international cooperation for information sharing
Identifies indigenous Research & Development as an essential component of cyber security and enlists
thrust areas for R&D
Identifies major actions and initiatives for user awareness, education, and training (capacity building)
Defines responsible actions for network service providers, large corporates and small/medium & home
users to secure information and systems
Identifies various stakeholders (ministries and government departments only) in cyber security and their
responsibilities
The final version of the National Cyber Security Policy, post public consultation is yet to be announced by the
government.
20
All the three draft policies address cyber security, in line with draft National Cyber Security policy. From cyber
security perspective, the focus of the triad policies is on indigenous development of ICT products, services
and techniques to reduce dependence on imports of such products for national security reasons. These draft
policies include following policy items on cyber security:
21
22
system administrators and government officers and spreading awareness on cyber security in the country. The current
status of this program can be found at ISEAs website.28
Sectoral Security
Critical sectors such as banking and telecommunication are strongly regulated through Reserve Bank of India (RBI)
28
29
30
http://www.isea.gov.in/isea/isea/currentstatus.jsp
http://www.dsci.in/sites/default/files/India-Building%20an%20New%20Ecosystem_Vinayak%20v4.pdf
http://www.commoncriteria-india.gov.in/Pages/CCSOverview.aspx
23
and Department of Telecommunications (DoT)/ Telecom Regulatory Authority of India (TRAI) respectively. The
regulators keep issuing security guidelines, mandating the companies to implement the same. For example, RBI
constituted a working group on information security, electronic banking, technology risk management, and cyber frauds,
which provided a set of guidelines to banks, covering areas such as IT governance, information security (including
electronic banking channels like Internet banking, ATMs, cards), IT operations, IT services outsourcing, information
system audit, cyber frauds, business continuity planning, customer education and legal issues. These guidelines
serve as a common minimum standard for all banks to adopt.31 DoT made amendments to the Unified Access Service
License Agreement (UASL) in 2011, incorporating security related measures and made the Licensee (Telecom Service
Providers) completely and totally responsible for security.
31
24
http://www.rbi.org.in/scripts/BS_PressReleaseDisplay.aspx?prid=23789
DSCI Initiatives
Since its inception, DSCI has developed strong linkages with the Indian government, industry and global think
tanks and provided platforms to bring all the stakeholders in cyber security together for discussing cyber security
issues and solutions. It has emerged as a thought leader in cyber security DSCI has developed best practices in
data security and data privacy, published studies and surveys, contributed in development of global standards/
frameworks, represented India at various international forums, trained Indian LEAs and provided advisory/ policy
inputs to government/ industry. It has strengthened the government-industry interactions and has developed the
operational capability to deliver cyber security projects in PPP mode. Following are some of the major initiatives
undertaken by DSCI:
DSCI Security Framework: To overcome the checklist based and compliance based approach to security
which fails to address the evolving threats, DSCI has developed DSCI Security Framework (DSF) which
focuses on bringing dynamism in security. It is an improvement over existing security standards and
frameworks as it enables an organization to focus on real threats in its environment, without worrying
about compliance. It enables assessment of organizations maturity in implementing security in different
areas with a view to continually improve the same. Such an assessment further helps organization draw
a strategic plan based on evolution of different disciplines of security, and their interdependencies, with
continuous focus on protecting data. DSCI is promoting the implementation of DSF in the industry. DSCI
has also developed DSCI Privacy Framework (DPF) which helps organizations design, implement and
monitor privacy program.
LEA Capacity Building Programs: Augmenting NASSCOMs efforts to build the capacity of LEAs in India,
DSCI has expanded the Cyber Labs program. Presently, 4 out of 8 cyber labs have been funded jointly by
DIT, respective state and DSCI. Through these labs over 9,000 police officers and other officials in the LEAs,
including judiciary and public prosecutors for investigation and prosecution of cyber crimes, are being
trained annually. The knowledge developed, over a period of time, has been systematized in the Cyber
Crime Investigation Manual and distributed to police stations across India. Based on its experience of
running cyber labs, DSCI submitted a detailed project report to the MHA, which has been accepted by the
ministry and the program will be extended to the entire country in the form of CCIP. This initiative will
25
have active support of the industry through DSCI and NASSCOM. The DSCI core team on cyber forensics
will liaise with the National Centre of Excellence (CoE), and contribute knowledge inputs to all their areas
of work; it will mentor and guide the State agencies to operationalize the cyber crime police stations and
training centres. DSCI will track cyber crimes, cyber forensic tools, emerging curricula, conferences and
other developments to continuously develop the training material and update the content.
DSCI Excellence Awards: To reward organizations and individuals who have shown high level of
preparedness and have excelled in the area of information security, DSCI has institutionalized DSCI
Excellence Awards. Among various categories, it also has India Cyber Cop Award category to recognize,
reward and honour a police officer who has done the most outstanding investigation in solving a cyber
crime to encourage the police officers who have put in extra efforts to learn cyber forensics to solve cyber
crimes.
DSCI Chapters: To create a network of security professionals in the country, DSCI has established DSCI
Chapters across major cities in India. Presently, over 1200 security professionals are connected together
through these chapters. The chapters provide a platform to security professionals in India to collaborate
and share best practices. It also provides a mechanism for DSCI to engage with the security experts in the
country.
Cyber Security Awareness Program: Under the DIT-NASSCOM funded Cyber Security Awareness Program
(Nov08 Dec10), DSCI conducted Cyber Security Awareness Campaigns across the country, published
Security Surveys and Publication, conducted Training for over 700 government officials, developed
Computer based Trainings, developed a national security portal, among other activities.
26
Source- Reuters
27
on information infrastructure for production and delivery of products & services, the new responsibility of securing
the critical information infrastructure against the rising number of cyber attacks has come within the ambit of national
security. This new responsibility, however, does not lie solely with the government; private sector has a major role
to play since more than 80% of the critical information infrastructure is owned and operated by the private sector.
However, private sectors investment in security is driven by business requirements and not by national security
concerns. So how can government intervene? By incentivizing or regulating the private sector? Though strong and
effective PPPs are obviously essential, such questions need to be debated and discussed in detail.
US policy focus since Clinton Administration (1998) has been on voluntary PPP and information sharing, with market
driven approach to address the problem of critical infrastructure protection. The policy has emphasized on assessing
available alternatives to direct regulation including providing economic incentives to encourage the desired behaviour
and to regulate only in case of market failure. However, this US policy approach has been criticized primarily for
following three main reasons:33
underestimating antitrust, liability and competition related issued in information sharing by private
organizations
undermining issues in sharing of classified information by the government with the private sector; and
wrongly assuming that organizations will take action if they are made aware of the threats.
The existing policy approach, advocates believe, fails to understand that the market forces cannot deliver the required
investments and efforts for ensuring public safety and national security voluntary efforts will always be inadequate.
To this extent, the cyber security legislation proposal released by the US government last year focuses on improving
cyber security for the citizens, critical infrastructure, and the Federal governments own networks and computers. For
critical information infrastructure protection the proposal aims at establishing a regulatory framework to enhance
cyber security of critical infrastructure which includes: owners and operators of critical infrastructure to develop cyber
security plans; third party audit of the cyber security plans and reporting to Security & Exchange Commission of the
US. Also, to improve voluntary information sharing, it provides industry, state and local governments the required
immunity to share cyber security related information with the Department of Homeland Security.
So which approach should India take? Regulate or incentivize the private sector? Though regulations are necessary
they should not add to cost without necessarily improving security of critical information infrastructure. Too much of
government intervention through regulations can also undermine business innovation; it can make it uncompetitive.
The better approach would be to incentivize the private sector to invest in security beyond what is required by business
requirements through appropriate instruments such as the government funding, tax reliefs, awards & recognition,
liability protection, cyber insurance, etc. Only when such market driven approach fails, should the government think
of bringing light weight legislation for critical information infrastructure protection that is developed in partnership
with the industry.
28
Cybersecurity Two Years Later: A Report of the CSIS Commission on Cybersecurity for the 44th Presidency
of the country consistent with international commitments. The US policy, on the other hand, emphasises on building
global and national capabilities to address supply chain risks without undermining the international competiveness
and legitimate trade flow:Understand threats, vulnerabilities, and consequences associated with acquisition decisions
Develop and employ tools to technically and operationally mitigate risk across the lifecycle of products
Develop new acquisition policies and practices that reflect the complex global market place
Develop partnership with industry to develop and adopt supply chain and risk management standards
and best practices
India should be able to mitigate security risks arising from procurement of ICT products especially from foreign
vendors and yet take full benefits from the global supply chain that includes access to world class products, services
and expertise at competitive prices. Giving preference to domestic vendors for national security reasons may not be
the right policy direction, primarily for two reasons Firstly, deploying domestically developed products may not
necessarily reduce the supply chain risks, since these need to be tested globally in real life environment. Secondly if
other countries take such an approach to this problem, it will adversely impact Indias outsourcing industry, which
will be set to lose out to domestic companies in such countries. Therefore, to effectively address such risks without
affecting business competitiveness and countrys image as a promoter of global trade & market, India should build
its capacity to mitigate ICT supply chain risks.
34
http://www.nsa.gov/public_info/press_room/2012/new_facility_georgia.shtml
29
30
5. CSAG Recommendations
5.1. Key Recommendations
1. Create a National Structure for Cyber Security35
The Indian government should lay down a well structured and positioned organization for designing, implementing,
driving, monitoring and coordinating cyber security initiatives in the country. The structure should enable effective
and efficient decision making which involves consultation across multiple stakeholders policy makers, various
ministries, state governments, defence, intelligence, LEAs, private sector among others. The structure should clearly
define roles and responsibilities for every stakeholder, establish coordination and information sharing mechanisms,
focus on building PPP models and create environment for enhancing trust between the industry and government.
Given the increasing linkage between cyber security and national security and the involvement of multiple
stakeholders, it is very crucial that the cyber security in India is positioned at the highest level within the
government. This will give cyber security the much needed impetus and will help address inter-agency concerns
and improve coordination.
2. Design and Implement a Competency Framework for building a competent and adequate Cyber
Security Workforce
India has a dearth of cyber security manpower required to defend corporate and government ICT infrastructure and
this shortage is expected to grow in future as the digitization of processes increases, resulting in increased number
of cyber attacks and crimes. To prepare for the future, a competent cyber security workforce needs to be created.
To start with a Competency Framework that assesses the security skills requirements, identifies existing gaps &
challenges, defines competency areas across different security roles (leaders, auditors, managers, administrators,
developers, etc.) and devises strategies and programs for building the capacity such as security certifications, cyber
security courses and specialization in schools, graduate and post graduate programs, career path in government,
etc. should be created and implemented.
35
A proposed National Structure for Cyber Security has been detailed in the Appendix of this document
31
32
36
37
Cybersecurity, Innovation and the Internet Economy, The Department of Commerce, Internet Policy Task Force
The PricewaterhouseCoopers, The Global State of Information Security, found that organizations that followed best practices had
zero downtime and zero financial impact, despite being targeted more often by malicious actors.
33
5. Establish a National Threat Intelligence Centre for Early Watch and Warning
Information sharing on cyber threats, vulnerabilities, cyber incidents / attacks is one of the most critical elements of
cyber security. To facilitate information sharing and situational awareness across different stakeholders industry
to industry, government to government, government to industry, intelligence-government, intelligence-industry,
intelligence-LEAs, etc, an Information sharing environment should be created by establishing a National Threat
Intelligence Centre (NTIC), enabled by a real time 365X24X7 network, wherein different stakeholders can access
the information through a secure connection, based on the authorization granted. The NTIC should integrate all the
existing information sources such as sectoral CERTs, intelligence bodies, security alerts issued by security vendors,
threats seen by critical sectors and industry to enable cross-domain awareness and a comprehensive view of cyber
threats at a national level. NTIC may also be given the responsibility of closing botnets, phishing sites, etc. through
a lawful process.
6. Build Capacity of the Law Enforcement Agencies in Cyber Crime Investigations and Cyber
Forensics
To curb the increasing number of cyber crimes and ensure speedier trial of cyber crimes, LEAs need to build their
capacity in cyber crime investigation and cyber forensics. Presently, Indian LEAs face the following challenges in
handling cyber crimes:
34
7. Build Lawful Interception Capabilities for Balancing National Security and Economic Growth
The Indian Law Enforcement and Intelligence Agencies should build lawful interception capabilities to monitor
electronic communications including encrypted communications in real time. Lawful interception is a genuine
national security requirement, given the increased usage of technology by criminals and terrorists. At the same
time, encrypted communication is a must for economic growth of India as it fosters trust in electronic transactions
including e-commerce, e-governance, online banking, etc. Not allowing strong encryption usage in the country,
to fulfill national security concerns will hamper the growth and progress of the country. Instead, the Indian Law
Enforcement and Intelligence Agencies should build capabilities in cryptanalysis & encryption technologies. For
this purpose, a National Centre for performing research in encryption and cryptanalysis to build interception
capabilities should be established in India. Such a centre will help to national security requirements without hindering
economic growth.
35
9. Set up Testing Labs for Accreditation of ICT Products to Manage ICT Supply Chain Risks
Testing Labs for accreditation of ICT products that are to be deployed in critical sectors should be established across
India. Through these labs, the country should be able to mitigate security risks arising from procurement of ICT
products especially from foreign vendors and yet take full benefits from the global supply chain that includes access to
world class products, services and expertise at competitive prices. Giving preference to domestic vendors for national
security reasons may not be the right policy direction, primarily for two reasons Firstly, deploying domestically
developed products may not necessarily reduce the supply chain risks, since these need to be tested globally in real
life environment. Secondly, if other countries take such an approach to this problem, it will adversely impact Indias
outsourcing industry, which will be set to lose out to domestic companies in such countries. Therefore, to effectively
address such risks without affecting business competitiveness and countrys image as a promoter of global trade &
market, India should build its capacity to test ICT products through testing labs. Also, active participation should be
taken in the ongoing global efforts for mitigation of ICT supply chain risks.
36
Some countries around the world including US, South Korea have already established and others are in the process of establishing such
command centres.
Each critical sector, through appropriate PPP, should develop and implement a Sectoral Critical Information
Infrastructure Protection Plan which should include Risk Management Framework, Mitigation Plan,
Incident Response, Crisis Management, Education & Awareness, etc along with clearly defined responsibilities
and implementation deadlines. These sectoral plans should be based on a National Critical Information
Infrastructure Protection Framework, which aligns different sectoral plans to meet cyber security
requirements of the country. Through sectoral specific plan, it will be possible to address the sector security
requirements, nature and complexity of operations, security maturity, challenges, technology adoption,
applicable laws and regulations, past incidents and trends, etc.
2.
A zero tolerance audit process should be established for critical information infrastructure, to ensure that
no risks are accepted in critical sectors, as even a single vulnerability, if left unaddressed, can be exploited by
adversaries. Critical information infrastructures such as SCADA and PLC systems should be tested regularly
to find vulnerabilities in such systems.
3.
Consolidate government networks for better security by deploying common robust security solutions,
facilitating the reduction of external access points, establishing baseline security capabilities and centralized
monitoring.
4.
Government should subject its infrastructure to independent third party security audits and testing
regularly, given the rising number of cyber attacks against government infrastructure. This will help in the
early identification of vulnerabilities and taking corrective actions well in time. It is important to realize that
the national infrastructure including government infrastructure is exposed in cyber space and it is better
to get audited by a competent external agency, howsoever damaging the findings may be, than being
easily attacked by cyber criminals or non-state actors.
Best Practices
5.
Promote adoption of security automation protocols to enable efficient and accurate collection, correlation,
and sharing of security relevant information including software vulnerabilities, system configurations and
network events across disparate systems including government, industry, critical sectors, etc.
Develop and implement a regularly tested National Cyber Incident Response Plan that establishes a
strategic framework for institutional roles & responsibilities, and actions to prepare for, assess, respond
to and coordinate recovery from a cyber incident. Such a plan will ensure a unified and well coordinated
response to a cyber incident.
37
7.
Create a National Vulnerability Database and a National Cyber Threat Database and correlate them
to provide effective guidance to critical sectors on cyber risks at a national level. Such a mechanism will
optimize organizational efforts on risk management and more importantly provide the much needed risk
intelligence from a central authentic source.
8.
Authorize an agency for monitoring critical information infrastructure networks through Intrusion
Detection & Prevention Systems or other mechanisms to enable proactive defence and collation of threat
related data across networks to generate threat intelligence. However, adequate steps should be taken to
ensure that privacy and civil liberties are not compromised in such surveillance.
9.
Consolidate Internet gateways for better monitoring including identification and curbing of malicious
activities at the gateway level to enable proactive defence and optimization of security efforts.
10. Promote security testers community to share existing vulnerabilities in critical information infrastructure.
There are a lot of youngsters, known as ethical hackers, in the country who have passion for security and
want to contribute in countrys cyber security initiative. It is in the interest of the country to tap this talent
pool by offering them incentives and legal protection.
38
17. Take effective steps to efficiently operationalize Mutually Legal Assistance Treaty (MLAT) with maximum
possible number of countries. This will help in expediting the prosecution of cyber criminals, by increasing
collaboration and information sharing with LEAs of other countries and reducing the legal and procedural
delays in cyber crime investigations.
18. Actively participate in international efforts on framing conventions, agreements, laws and collaboration
mechanisms on curbing cyber crimes. Given the global nature of cyber crimes, it is impossible for any
particular country alone to curb cyber crimes. India, having a huge stake in cyber space, needs to ensure
that its interests are represented at such international forums.
19. Establish Memorandum of Understanding (MoU) with the LEAs of other countries to learn global best
practices. LEAs of many advanced countries have made significant progress in the handling cyber crimes.
India has started to develop its capabilities and can immensely benefit from the practices followed by LEAs
and learning of other such countries.
39
Cyber Warfare
26. Define cyber warfare policy, objectives, doctrines, rules, etc that lay down offensive and defensive contexts
and actions, capability development, roles and responsibilities of different agencies, coordination and
collaboration mechanisms, etc.
27. Expand cyberspace cooperation with allies and partners to increase collective security - participate actively
in international efforts for establishing global watch and warning system and mechanism for sharing cyber
threat intelligence. Also, build and enhance existing military alliances to confront potential threats in
cyberspace.
28. Create and implement standards and best practices to secure military networks in partnership with the
private sector, which has developed the required expertise and capability by managing majority of the
critical information infrastructure over the years. Also, establish .mil domain, and operate it professionally
for email, and hosting of military server.
40
6. Public-Private Partnerships in
Cyber Security and Role of DSCI
Building successful PPPs in cyber security is critical for India to ensure a secure cyberspace. Majority of the
recommendations identified in this report can be effectively implemented only through such PPPs. To enable the
partnerships, an interfacing agency which brings the government and industry together through an institutionalized
framework is required. DSCI, which has worked very closely with the government and the industry since its
inception, can play a pivotal role in cyber security initiatives of the country including implementation of the CSAG
recommendations by facilitating PPPs. The following credentials validate DSCIs interfacing role:
Thought Leadership - DSCI is a not for profit company, working specifically in the area of cyber security,
data security and data privacy. It has created best practices in security and privacy through DSF and DPF
and has published various study and survey reports in data protection. It is engaged with global think tanks
and institutions through various programs.
Industry Linkage- DSCI is an industry body having representation across sectors IT/BPO, Banking,
Financial Services & Insurance, Telecommunication, Energy, etc. It has around 600 corporate members and
is connected to over 1200 security and privacy professionals across 10 cities in India.
Government Linkage - DSCI works with different government agencies - DIT, MHA, Ministry of External
Affairs, Department of Commerce, Department of Personnel & Training, and Planning Commission on data
protection initiatives undertaken by these ministries / departments.
Experience in PPP projects DSCI has rich experience of executing PPPs in cyber security. It successfully
delivered DIT-NASSCOM Cyber Security Awareness Program and is running the DSCI Cyber Labs
program for training LEAs through establishment of cyber labs, jointly funded by DIT, respective State and
DSCI.
DSCI can leverage the above credentials to deliver the following services (not limited to) to enhance cyber security
in the country and specifically with respect to the implementation of the CSAG recommendations:
Advisory and Consultation DSCI can provide strategy, policy and program related inputs to the
government after consulting the industry on specific subjects.
Define Partnership Models For implementing specific cyber security initiative or program in PPP mode,
DSCI can consult both the government and the industry and recommend best possible partnership model
that is capable of meeting the strategic goals of such a project / initiative. As a section 25 not-for-profit
company, it can develop approach for executing projects with government funding, through industry that
is acceptable by the government.
Program Management and Execution For a particular PPP project, DSCI can provide the program
management services defining governance mechanisms, monitoring performance and completion,
managing budgets & resources, communication, etc. DSCI can also be appointed as the agency for end to
end project execution requirement definition & consensus, deployment of in-house resources or sourcing,
procurement of infrastructure (IT & non-IT), development of content, distribution, etc.
Knowledge Partner- DSCI can act as a knowledge partner in PPP projects to provide the required expertise
during conceptualization and implementation.
41
Create Platforms DSCI can create platforms for bringing together the government and industry for
discussions on specific issues and concerns.
Establish Centres of Excellence DSCI can build and operate Centres of Excellence (CoE) on different
subjects that are of mutual interest to the government and the industry. Such CoEs can be established for
creation, sharing, compilation and dissemination of Best Practices in security, Research in cyber security,
Technology trends, among others.
Trainings DSCI can conduct ongoing trainings for identified set of audiences in government and / or
industry by arranging relevant experts in security and establishing the required training environment,
which can be repeatedly used for conducting training sessions.
Outreach To increase education and awareness level within the country, DSCI can conduct cyber security
campaigns across the country bringing together government, industry, LEAs, academia, school children,
home users, etc.
Information Sharing Environment Being a third party, DSCI can act as an Information Clearing House
for enabling information exchange within industry and between industry and government.
Based on the activities identified above, DSCI will act as Single Point of Contact for both the government and industry
in PPP, helping government and industry save efforts to identify right people, institutions, expertise, channels, etc. The
knowledge and learning of running PPP projects will get consolidated at DSCI and can be leveraged to design and
run PPP projects in future. Also, a common infrastructure (IT & non-IT) can be created through DSCI, which may be
reused for PPP projects, resulting in cost and resource optimization. Very importantly, DSCI, as an interfacing agency,
can solve the who will do what problem which is very common in a multi-stakeholder environment and more so
when government and industry both cannot afford to allocate resources on full time basis for executing projects.
42
Epilogue
Cyber security, as part of national security, is, and will continue to be on the governments policy agenda. As the
threat scenario evolves, critical information infrastructure protection, government services delivery, public sector
services along with industry and national defence will have to respond with appropriate cyber security policies that
will involve implementation, and testing of security practices. LEAs will require upgradation of training and cyber
forensics tools; R&D in cutting edge security technology will be essential. All of these and many other projects of
national importance will be conceptualised and implemented in PPP. The policy scenario will evolve too. This calls
for a vibrant relationship between the government and the industry.
To address this challenge, it is proposed to convert the CSAG to DSCI Cyber Security Policy Forum (CSPF), which
will act as a standing committee of PPP. It will institutionalise the cyber security initiative of the industry and its
engagement with the government. As the focal agency for data protection and cyber security, DSCI will anchor and
spearhead CSPF.
43
44
Appendix
45
46
47
II
Clinton Administration
The starting point of the major US cyber security initiatives dates back to 1996, when the Presidents Commission on
Critical Infrastructure Protection (CIP) was set up under the administration of President Bill Clinton. The Commission
released its report to President Clinton in October 1997, making the following key recommendations:39
facilitate greater cooperation and communication between the private sector and appropriate government
agencies by: setting a top level policy-making office in the White House; establishing a council that
includes corporate executives, state and local government officials, and cabinet secretaries; and setting
up information clearinghouses;
develop a real-time capability of attack warning
establish and promote a comprehensive awareness and education program
streamline and clarify elements of the legal structure to support assurance measures (including clearing
jurisdictional barriers to pursuing hackers electronically); and
expand research and development in technologies and techniques, especially technologies that allow for
greater detection of intrusions
Subsequent to the Commissions Report, Presidential Decision Directive No. 63 (PDD-63) was released in 1998,
with a national goal to build the national capability to defend nations critical infrastructure from intentional physical
#
A detailed study of cyber security initiatives of US, UK, Australia and Japan was conducted by the CSAG, based on the publically available resources.
NASSCOM and DSCI does not guarantee, and accept no legal liability whatsoever arising from or connected to, the accuracy, iability,
relevance or completeness of any content presented in this study.
39
48
and cyber attacks in five years. To achieve this goal PDD-63 established the necessary structure and programs, based
on the recommendations of the Presidents Commission on CIP. The Directive40 focused on the following policy items,
reflecting the policy direction taken by the country in cyber security:
Genuine, mutual and cooperative public-private partnerships
Voluntary participation of the private sector
Market driven approach to address the problem of critical infrastructure protection; regulation to be used
only in case of market failure
Identifying and assessing available alternatives to direct regulation including providing economic incentives
to encourage the desired behavior
Government to act as a role model for private sector
Based on the above policy items, following structure and programs were created by PDD-63:
Assignment of duties to National Coordinator for Security, Infrastructure Protection and CounterTerrorism with reporting to the President through the Assistant to the President for National Security Affairs,
including responsibility for implementation of PDD-63, interagency coordination for policy development
and implementation, review crisis activities among others.
Assignment of a Lead Agency (government department) for each critical sector for sector liaison. Each lead
agency was directed to appoint a Sector Liaison Official to coordinate with appropriate private sector
organizations, through Sector Coordinator.
Creation of National Infrastructure Assurance Council comprising major infrastructure providers and state
40
http://www.fas.org/irp/offdocs/pdd/pdd-63.htm
49
and local government officials to enhance the partnership of the public and private sectors in protecting
critical infrastructures.
Creation of Critical Infrastructure Coordination Group comprising senior representatives from Lead
Agencies, as well as representatives from other relevant departments and agencies, for interagency
coordination for implementation of PDD-63.
Sector Liaison Official and Sector Coordinators to work together to create a Sectoral National Infrastructure
Assurance Plan.
Establishment of Critical Infrastructure Assurance Office to integrate sectoral plans to develop
National Infrastructure Assurance Plan which covers vulnerability assessment, remedial plans to reduce
vulnerabilities, warning requirements and procedures, response strategies, reconstitution of minimum
required capabilities, education and awareness programs, research and development needs, intelligence
gathering and sharing, needs and opportunities for international cooperation and legislative and budgetary
requirements.
Appointment of Critical Infrastructure Assurance Officer in each federal agency with the responsibility
of securing agencys critical infrastructure.
Establishment of National Infrastructure Protection Center (NIPC) to be the focal point for federal threat
assessment, vulnerability analysis, early warning capability, law enforcement investigations, and response
coordination.
Creation of ISACs (by encouraging the private sector to establish the same) for gathering, analyzing,
appropriately sanitizing and disseminating private sector information to both industry and the NIPC.
Through the establishment of above identified structures, institutions, councils, plans, etc., the PDD-63 laid the
foundational framework for cyber security in the US. The following governments built on this framework to further
augment the countrys cyber security initiatives.
Bush Administration
Policy direction and approach of the Bush Administration for critical infrastructure protection was evolutionary
expansion of the previous administration. The primary effort was directed at working collaboratively and voluntarily
with the private sector. However, the focus of Bush Administrations efforts was more oriented towards physical threats
esp. post 9/11 terrorist attacks, whereas the focus of PDD-63 was more towards cyber threats.
Organizationally, following changes were made during the Bush Administration:
Department of Homeland Security (DHS) was established post 9/11 attacks with a mission of preventing
terrorist attacks, reducing the vulnerability of the nation to such attacks, and responding rapidly should such
an attack occur. Its responsibilities include safeguarding and securing countrys cyberspace - securing civilian
government computer systems, and work with industry and state, local, tribal and territorial governments to
secure critical infrastructure and information systems.41 Since its creation, DHS has played much more active
role in identifying critical assets, assessing vulnerabilities, and recommending and supporting protective
measures. Also, the manpower and resources devoted to these activities have greatly increased.
The Sector Liaison and Sector Coordinator model of PDD-63 was expanded into Government Coordinating
Councils and Sector Coordinating Councils for each critical sector, as depicted below, for increased
representation within all the sectors.
41
50
http://www.dhs.gov/xabout/gc_1240609042614.shtm
Homeland Security Council, supported by the Critical Infrastructure Protection Policy Coordinating
Committee acting as an Interagency coordination group.
National Infrastructure Advisory Council comprising private sector executives, academia, state & local
governments to advise the President on enhancing PPP, monitoring development of ISACs and encouraging
private sector to perform vulnerability assessments of critical systems.
Appointment and then abolishment of Special Advisor to the President for Cyberspace Security and
Presidents Critical Infrastructure Protection Board (consisting of federal officials to recommend policies
and coordinate programs for protecting information systems for critical infrastructure).
Operational units created by PDD-63, such as Critical Infrastructure Assurance Office and National
Infrastructure Protection Centre were moved and restructured within DHS.
In addition to the above identified organizational changes, following major developments took place during Bush
Administration:
Development of National Infrastructure Protection Plan (NIPP) covering (a) strategy to identify, prioritize
& coordinate critical infrastructure protection (b) activities to achieve strategy (c) initiatives for information
sharing (d) coordination with other federal emergency management agencies.42 Creation of Sector Specific
Plans, utilizing processes outlines in NIPP43.
Enactment of Federal Information Security Management Act (FISMA) in 2002 which requires each federal
agency to develop, document, and implement an agency-wide program to provide information security for
the information and information systems that support the operations and assets of the agency, including
those provided or managed by another agency, contractor, or other source.44
Release of National Strategy to Secure Cyberspace in 2003, which outlined an initial framework (as
depicted in the figure below) for both organizing and prioritizing cybersecurity efforts. It provided direction
to the federal government departments and agencies that have roles in cyberspace security. It also identified
steps that state and local governments, private companies and organizations, and citizens could take to
improve nations collective cybersecurity.45
42
43
44
45
Final version of NIPP was approved in 2006. It was revised in early 2009.
Sector Specific Plans for all the identified critical sectors were developed and reviewed in 2006-2007
http://csrc.nist.gov/groups/SMA/fisma/overview.html
The National Strategy to Secure Cyberspace, February 2003
51
46
47
52
http://www.dhs.gov/xnews/releases/pr_1207684277498.shtm
The Comprehensive National Cybersecurity Initiative
Creation of National Asset Database which contained the list of critical infrastructure across the country.
This database has now been automated by DHS through web-enabled Automated Critical Asset
Management System (ACAMS).
Creation of Homeland Security Information Network (HSIN) a national secure and trusted web-based
portal for information sharing and collaboration between federal, state, local, tribal, territorial, private
sector, and international partners. It comprises Communities of Interest, which are organized by state
organizations, federal organizations, or mission areas such as emergency management, law enforcement,
critical sectors, and intelligence. Users can securely share within their communities or reach out to other
communities as needed. HSIN provides secure, real-time collaboration tools, including a virtual meeting
space, instant messaging and document sharing. HSIN allows partners to work together instantly, regardless
of their location, to communicate, collaborate, and coordinate.48
48
http://www.dhs.gov/files/programs/gc_1156888108137.shtm
53
Obama Administration
Digital infrastructure to be treated as a strategic national asset; Protecting this infrastructure will be a national
security priority; Americas economic prosperity in the 21st century will depend on cybersecurity.
Remarks by President Obama on Securing Americas Cyber Infrastructure
Obama Administration retained the policy and organization of the preceding administration, but directed
comprehensive, clean-slate review to assess US policies and structures for cybersecurity, soon after President
Obama assumed office (in Feb09). Based on the recommendations of the policy review following actions have
been taken:49
Appointment of Cybersecurity Coordinator in the White House.
Cybersecurity designated as one of the Presidents key management priorities and establishment of
performance metrics through CyberStats program.50
Updation of metrics for FISMA which is used for grading federal agencies on cybersecurity. Shifting
the Federal approach from a static, paper-based certification to a dynamic, relevant process based on
continuous monitoring and risk assessment.
Privacy and civil liberties official designated to the National Security Council cybersecurity directorate
to ensure privacy of citizens is duly considered during development and implementation of cyber security
initiatives.
Development of a formal interagency process that clarifies roles, responsibilities, and application
of authorities across the federal government and identified additional authorities required by the
government to fulfil its mission.
Creation of National Initiative for Cybersecurity Education (NICE) for cyber-savvy citizens and building
cyber-capable workforce. The draft NICE strategic plan released in Aug11 defines strategic goals and
objectives, identifies partners, defines cybersecurity knowledge stages and a cybersecurity workforce
capability & development model, communication & outreach activities, among other things to achieve
NICE mission. The strategic outcomes of this initiative have been depicted in the figure below:
49
50
54
Release of International Strategy for Cyberspace, which provides a unified foundation for the Americas
international engagement on cyberspace issues. The policy priorities laid down by this strategy have been
summarized51 below:
51
International Strategy for Cyberspace: Prosperity, Security, and Openness in a Networked World (May 2011)
55
Release of Cyber Research and Development Framework Trustworthy Cyberspace: Strategic Plan for
the Federal Cybersecurity Research and Development Program to replace the piecemeal approaches
to research with a set of coordinated research priorities. It provides for a framework for prioritizing
cybersecurity R&D in a way that concentrates research efforts on limiting current cyberspace deficiencies,
precluding future problems, and expediting the infusion of research accomplishments into the marketplace.
52
The framework also defines the national structure for cybersecurity R&D coordination.
Release of National Strategy for Trusted Identities in Cyberspace which envisions establishing a national
level Identity Ecosystem an online environment where individuals and organizations will be able
to trust each other because they follow agreed upon standards to obtain and authenticate their digital
identitiesand the digital identities of devices. 53 This ecosystem is an attempt to overcome the existing
shortcomings in the online authentication of individuals and devices that make identity theft and online
fraud easier. The strategy emphasizes on collaboration between public and private sectors for creating
such an ecosystem.
Release of Cybersecurity Legislation Proposal54 focused on improving cybersecurity for the citizens,
critical infrastructure, and the Federal governments own networks and computers by:
Establishing regulatory framework to enhance cybersecurity of critical infrastructure which
includes: owners and operators of critical infrastructure to develop cyber security plans; third party
audit of the cybersecurity plans and reporting to Security and Exchange Commission.
Simplifying and standardizing the existing patchwork of 47 data breach notification state laws
Synchronizing penalties for computer related crimes with other crimes
Enabling DHS to quickly help organizations (private-sector company, state, or local government) when
they solicit help and also defining the type of assistance that can be provided by DHS
Providing industry, state and local governments the required immunity to share cybersecurity related
information with DHS.
Updating FISMA to shift focus from a static, paper-based certification to a dynamic, relevant process
Giving DHS more flexibility in hiring highly qualified cybersecurity professional and permitting
the government and private industry to temporarily exchange experts, so that both can learn from
each others expertise
Creating a new framework of privacy and civil liberties protection designed expressly to address the
challenges of cybersecurity
Development of an interim National Cyber Incident Response Plan which has been tested during
CyberStormIII (national cyber exercise). It defines organizational roles and responsibilities for cyber incidents,
incident response cycle, national cyber risk alert levels, coordination & collaboration mechanisms among
other elements required for preparing, responding and recovering from a cyber incident.
52
53
54
56
Trustworthy Cyberspace: Strategic Plan for the Federal Cybersecurity Research and Development Program, December 2011
National Strategy for Trusted Identities in Cyberspace, April 2011
http://www.whitehouse.gov/the-press-office/2011/05/12/fact-sheet-cybersecurity-legislative-proposal
57
In addition to implementing the recommendations of the policy review, following major developments have been
made / are in the pipeline:
Release of Department of Defense Strategy for Operating in Cyberspace which lays down following
five strategic initiatives55 for enabling the defence to operate in cyberspace:
Treat cyberspace as an operational domain to organize, train, and equip to take full advantage of
cyberspaces potential
Employ new defence operating concepts to protect defence networks and systems
Partner with other US government departments and agencies and the private sector to enable a wholeof-government cybersecurity strategy
Build robust relationships with US allies and international partners to strengthen collective
cybersecurity
Leverage the nations ingenuity through an exceptional cyber workforce and rapid technological
innovation
To effectively operate within cyberspace, through an appropriate organizational structure, a US Cyber
Command has been created. It is single four-star command which consolidates defenses cyber organizations
and operations A single chain of command runs from the head of Cyber Command to individual units around
the world, enabling the command to oversee all cyber operations and to direct the training and equipping of
our force.56
Release of National Strategy for Global Supply Chain Security to achieve following two goals57:
Promote efficient and secure movement of goods by resolving threats early, improving verification
and detection capabilities, enhancing security of infrastructure and maximizing the flow of legitimate
trade
Foster a resilient supply chain by mitigating systemic vulnerabilities and promoting trade resumption
policies & practices
Establishment of National Cybersecurity and Communications Integration Centre (NCCIC) a national
Early Watch and Warning Centre which works closely with the government at all levels and with the
private sector to coordinate the integrated and unified response to cyber and communications incidents
affecting homeland security. It integrates DHS, Department of Defence, Intelligence Community, Law
Enforcement and Private sector and non-governmental partners. It is a 24x7 operations centre that provides
both situational awareness and analysis, and significant cyber incident response capabilities.58
Introduction of Cybersecurity Enhancement Act (yet to become a law) which would allocate USD 396
million for cybersecurity research and USD 94 million for providing scholarships to students pursuing
cybersecurity studies, over a period of four years. The Act also focuses on increasing public awareness
through various campaigns.59
58
organizations (b) undermining issues in sharing of classified information by the government with the private sector;
and (c) wrongly assuming that organizations will take action if they are made aware of the threats. The existing policy
approach, advocates believe, fails to understand that the market forces cannot deliver the required investments and
efforts for ensuring public safety and national security voluntary efforts will always be inadequate. To overcome
this, Center for Strategic and International Studies (CSIS) advocates creation of a light weight regulatory framework,
developed in partnership with the industry.
Other main criticisms of the policy include:
Outdated and incoherent legal framework, given the advancements in technology. To overcome this,
the policy review recommended development of a new legislative framework to rationalize the patchwork
of overlapping laws that apply to information, telecommunications, networks, and technologies, or the
application of new interpretations of existing laws in ways to meet technological evolution and policy
goals, consistent with U.S. Constitutional principles.61
Lack of integrated cybersecurity strategy which aligns priorities, programs, actions, etc. across agencies
and stakeholders for well coordinated, unified response to cyber threats.
DHS defends the government systems and DoD defends military and intelligence networks, however,
there is no particular agency for defending private networks. The policy relies on voluntary efforts and
market forces for defending private networks, which has been inadequate.62
More focus has wrongly been placed on preventing physical damage though the main motive of cyber
attacks has been to steal intellectual property and secrets. It's been estimated that in year 2008 alone cyber
criminals stole intellectual property from businesses worldwide worth up to $1 trillion. 63
Former Special Advisor to the President Bush for Cyberspace Security, who was also the National Coordinator to
President Clinton - Mr. Richard Clarke, has also criticized the Obama Administrations cybersecurity policies. As per Mr.
Clarke, the Obama administration so far has failed to do the necessary with regard to cyberwar; DHS cybersecurity
programs are underfunded and the department has done nothing about cyber threats to critical infrastructure such
as the electric grid; and the Administration has failed to engage public on cybersecurity matters.64
61
62
63
64
65
59
Internal Agency plans for protection of federal systems were too general and lacked understanding of
what constitutes critical asset and their interdependencies. To overcome this issue, a new program called
Project Matrix was launched, which provided the required guidance to the federal agencies to identify
critical assets, identify their interdependencies and prioritize.
There were communication gaps leading to confusion over applicability of the PDD 63 directive. Many
agencies believed that they were not covered under the PDD 63 directive and hence were not required to
develop internal agency plans. These issues were later clarified.
There were enforcement issues as many internal agency plans developed by federal agencies were found
to be incomplete many did not identify critical assets and their interdependencies and had not conducted
vulnerability assessments; Homeland Security Presidential Directive (HSPD 7) and FISMA helped overcome
such enforcement issues.
The Sector Specific Plans created utilizing the processes outlined in the NIPP were inconsistent some
were more developed and comprehensive than others.
FISMA implementation laid too much focus on documentation, which wrongly channelized the efforts
of the federal agencies towards compliance to FISMA by documentation creation rather than addressing
the real risks.
While creating the National Asset Database for critical infrastructure, there were many infrastructures
included that were claimed to be of local importance rather than national importance. There was
confusion on what this database should contain an inventory of assets from which the list of critical
assets could be derived or an inventory containing only the prioritized assets.
There were issues when it came to information sharing between different agencies including private
and government because of bureaucratic reluctance, legal restraints, lack of trust and confidence, fears of
information misuse, technological difficulties, among others.
60
United Kingdom
The Digital Britain, a policy document published in 2009 by the UK government, described the potential of
cyberspace - Only a Digital Britain will secure the wonders of an information revolution that could transform every part
of our lives.66 To achieve the full potential of the cyberspace, UK realizes the importance of securing the cyberspace.
Announcing the UKs first cyber security strategy, alongside updates on national security strategy, UK Prime Minister
David Cameron said, Just as in the nineteenth century we had to secure the seas for our national safety and prosperity,
and in the twentieth century we had to secure the air, in the twenty first century we also have to secure our position in
cyberspace in order to give people and businesses the confidence they need to operate safely there.67
The first Cyber Security Strategy launched in 2009 highlighted
the need for government, organizations across all sectors,
international partners and the public to work together to meet
strategic cyber security objectives by:68
Reducing risk from the UKs use of cyberspace
Reduce the threat of cyber operations by reducing
an adversarys motivation and capability;
Reduce the vulnerability of UK interests to cyber
operations;
Reduce the impact of cyber operations on UK
interests;
Exploiting opportunities in cyberspace
Gather intelligence on threat actors;
Promote support for UK policies; and
Intervene against adversaries;
Improving knowledge, capabilities and decision-making
Improve knowledge and awareness;
Develop doctrine and policy;
Develop governance and decision making;
Enhance technical and human capabilities.
The UK Cyber Security Strategy has been republished by the government in 2011 with a broader perspective and
coverage, formulating many new initiatives, collaboration mechanisms and creating of new institutions / groups along
with the operationlization of tasks identified in the first strategy document. This strategy was framed to address the
cyber security challenges and risks by:
Enhancing the level of knowledge and awareness of the field of cyber security
Developing a set of guidelines, policies, doctrines for legal & regulatory issues
Developing & defining governance model, roles & responsibilities
Encouraging knowledge & skills development at technological & personal front
Promoting innovation in the field of cyber security with additional funding
Establish a cross-government program
Safe secure & resilient systems
66
67
68
http://www.official-documents.gov.uk/document/cm76/7650/7650.pdf
http://c4i-technology-news.blogspot.in/2011/11/uk-cyber-security-strategy.html
http://www.official-documents.gov.uk/document/cm76/7642/7642.pdf
61
62
http://www.cabinetoffice.gov.uk/content/office-cyber-security-and-information-assurance-ocsia
UK cyber security strategy 2011
www.gchq.gov.uk/
partnership in the form of a joint public-private sector Cyber Security Hub is being established. It will pool the
government and private threat information and pass that out to nodes in key business sectors, helping them identify
what needs to be done and providing a framework for sharing best practice.
To make security a market differentiator and thereby incentivize industry to develop standards and provide guidance
to customers when they buy products, Department for Business, Innovation and Skills (BIS) is working with the
users, industry and appropriate standards organizations (domestic, European and international) to develop security
kitemarks. The kitemarks will ensure that customers are able to differentiate various products based on security.
Government is developing a community of ethical hackers to minimize the existing vulnerabilities that could be
exploited to perform cyber crimes and to ensure that UKs infrastructure is robustly protected. Supported by GCHQ
and Scotland Yards e-crime unit, UK organizes exercises - the Cyber Security Challenge with intent to help bridge
the talent gap in cyber security. The exercise draws thousands of participants who spend weeks shoring up vulnerable
home networks, cracking weak codes and combing through corrupted hard drives in a series of tests.72 The government
is also planning to develop cyber specialists by setting up a cyber crime unit within the National Crime Agency.73
This will help police departments across the country in tackling cyber-crimes and will also support cyber crime
investigations. Given the global nature of cyber crimes, UK is encouraging adoption of international convention on
cyber crimes and creation & implementation of compatible frameworks of law that enable effective cross-border law
enforcement. It also denies safe havens to cyber criminals and encourages other countries to join the 24/7 Network
for cross-border law enforcement that ensures availability of urgent assistance when required.74 UK has established
a twenty-four hour centre called National Technical Assistance Centre (NTAC), which is under the control of the
Home Office,75 to address the problem of usage of encryption by criminals and terrorists. NTAC facilitates LEAs in
complex processing of encrypted material derived from lawfully intercepted computer communications.
To ensure proactive defence against cyber attacks and securing military networks, a new UK Joint Forces Command
is envisaged from April 2012 which will develop and integrate defence cyber capabilities. As a part of this initiative,
UK is setting up a new Defence Cyber Operations Group to bring together cyber capabilities from across defence
services. This group will include a Joint Cyber Unit, hosted by GCHQ, to develop new tactics, techniques and plans to
deliver military effects, including enhanced security, through operations in cyberspace. To have a focused system of
cyber defence for the armed forces, a new Global Operations and Security Control Centre has been recently started
by UK. There is another Joint Cyber Unit embedded within this centre with the primary purpose of developing and
using a range of new techniques, including proactive measures, to disrupt threats to UKs information security.
While it is important to build capability to defend and protect the country from the cyber attacks, it is equally important
to keep an eye on emerging threats. With this in view, government is monitoring the most significant emergencies
that UK and its citizens could face over the next five years, and has published it in the form of the National Risk
Register (NRR).76 For the identified frauds there is an Action Fraud tool that helps people report them online. This
online tool is also going through various improvements for its functionality and accessibility. To raise awareness on
online security among general public and small businesses, a joint public-private sector campaign - Get Safe Online
has been launched. It is sponsored by government and private companies. It works with a range of community groups
and aims to give people the confidence and know-how to use the Internet securely. It combines marketing and PR
activities with a comprehensive website (www.getsafeonline. org) giving up-to-date advice, tools and guidance on
cyber good practice. It includes advice on topics such as online shopping, social networking sites, data theft and
identity fraud.77
72
73
74
75
76
77
http://timesofindia.indiatimes.com/home/science/Amateurs-roped-in-to-fight-malware-hackers/articleshow/12241559.cms
http://www.cabinetoffice.gov.uk/sites/default/files/resources/uk-cyber-security-strategy-final.pdf
http://www.cabinetoffice.gov.uk/sites/default/files/resources/uk-cyber-security-strategy-final.pdf
http://www.cyber-rights.org/documents/ntac.htm
www.cabinetoffice.gov.uk/resource-library/national-risk-register
UK cyber security strategy 2011
63
UKs vision for 2015 is to help shape an open, stable and vibrant cyberspace which the UK public can use safely and
which supports open societies with crosscutting knowledge, skills and capability it needs to underpin all the cyber
security objectives. UK is planning to derive huge economic and social value from a vibrant, resilient and secure
cyberspace, where actions, guided by its core values of liberty, fairness, transparency and the rule of law, enhance
prosperity, national security and a help build a strong society.
64
Australia
The Australian Prime minister, in a statement has indicated that cyber security is top tier national priority. To tackle
cyber crimes and related issues, Australian government has taken several initiatives. As a major step, the Australian
Cyber Security Strategy was released in 2009. It aims to create a safe and secure digital space for government
and private networks. The strategy document has identified seven strategic priorities, namely: developing threat
awareness and response, changing civilian security culture, promoting publicprivate partnerships, securing
government systems, pursuing international engagement, creating an effective legal framework and building a
skilled cyber workforce. Emphasis was also placed on international collaboration & focused efforts for development
of global standards, expansion of the international legal systems capacity to combat cyber crime, engagement in
bilateral or multilateral agreements to strengthen cooperation on cyber security and active participation in regional
forums such as the UN, International Telecommunication Union (ITU), Asia-Pacific Economic Cooperation (APEC)
etc.; and international working groups such as the Forum of Incident Response and Security Teams (FIRST) and the
International Watch and Warning Network (IWWN).
Below is the description of Australian cyber space and security structure. It discusses the responsible departments &
agencies, Australian governments initiatives in efforts to secure cyber space, special attention to critical infrastructure
protection, existing legal framework and other important parameters.
Attorney-Generals Department (AGD)78 is the lead agency for cyber security policy and chairs the Cyber
Security Policy and Coordination (CSPC) Committee. It is responsible for providing government wide
coordination on cyber security policy, including crisis management and international collaboration, and
providing cyber security guidance to owners and operators of critical infrastructure.
The CSPC79 Committee is the Australian government interdepartmental committee that coordinates the
development of cyber security policy for the Australian government. The CSPC Committee:
provides whole of government strategic leadership on cyber security
determines priorities for the Australian government
coordinates the response to cyber security events, noting that its coordination and policy functions
do not extend to the oversight of operations, and
coordinates Australian governments cyber security policy internationally.
Australian Communications and Media Authority (ACMA) is responsible for the regulation of broadcasting,
the Internet, radio and telecom. It gathers evidence and assists in computer fraud and identity theft cases.
It also ensures that ISPs and Telecom Service Providers are meeting their regulatory obligations regarding
misuse and illegal content. It has also encouraged and played a vital role in the development of cyber
security Code of Practice, known as iCode, which provides a consistent approach for Australian ISPs to
help inform, educate and protect their clients in relation to cyber security issues. It works with ISPs for the
identification of compromised computers and investigates & acts against those involved in the distribution
of spam.
The Australian Internet Security Initiative (AISI) collects data from various sources on computers exhibiting
bot like behaviour on the Australian Internet space. Using this data, ACMA provides daily reports to
participating ISPs who in turn inform their customer that their computer appears to be compromised and
provide advice on how they can fix it.
Australian Federal Police (AFP) enforces criminal law and ensures its enactment. In relation to cyber
security, the AFP provides a specialized investigative capacity to support investigation and prosecution of
78
79
http://www.ag.gov.au/Cybersecurity/Pages/default.aspx
http://www.ema.gov.au/www/agd/agd.nsf/Page/OrganizationalStructure_E-SecurityPolicyandCoordinationBranch
65
complex technology enabled crime offences. It actively engages in the implementation of crime prevention
strategies and cooperates with international agencies to solve cyber crime.
Australian Security Intelligence Organization (ASIO)80 has the responsibility of investigating electronic
attacks conducted for purpose of espionage, sabotage, terrorism or other forms of politically motivated
violence, attacks on the defence system. It collects intelligence both domestically and internationally. It
produces threat assessments and protective security advice for government and critical infrastructure.
According to media news, a new cyber espionage watchdog has been created within the ASIO. The reason
cited for its setup is to monitor espionage attempts against Australian critical infrastructure assets and
releases alerts to agencies and critical infrastructure owners in a manner similar to the Computer Emergency
Response Team (CERT) Australia. ASIO has reportedly also established a specialist cyber investigations unit
to investigate and provide advice on state-sponsored cyber attacks against, or involving, Australian interests.
The unit operates under the supervision of the First Assistant Director-General for Counter-Espionage and
Interference.
CERT Australia81 was established in January 2010 and is the national coordination point within the
government for the provision of cyber security information. It assists the owners and operators of critical
infrastructure and systems of national interest. CERT Australia is also Australias official point of contact in
the global CERTs to support international collaborations.
Defence Signals Directorate (DSD) is the national authority responsible for the security of ICT across
government. It ensures that sensitive government electronic information systems are not susceptible to
unauthorized access, compromise or disruption. DSDs functions and responsibilities include:
providing material, advice and other assistance to State authorities on security issues
providing assistance in relation to cryptography and communications technologies and
through Cyber Security Operations Centre (CSOC), it is responsible for maintaining a comprehensive
national picture of cyber security threats, through monitoring and analysis of all information sources and
rapidly respond to cyber attacks. It provides a central point for sharing information across government
and coordinates with other agencies on response activities to enhance Australian governments
ability to prevent cyber attacks. The CSOC provides cyber situational awareness and an enhanced
ability to facilitate coordinated responses to, and management of, cyber security events of national
importance.
Joint Operating arrangements (JOA) were established by the Australian government whereby operational
cyber security agencies (DSD, AFP and ASIO) identify, analyze and respond to cyber events of serious national
consequence. The JOA agencies determine which agency has primary carriage of a security event response
on the basis of the nature of the event and individual agency responsibilities.
Department of Broadband, Communications and the Digital Economy (DBCDE) has responsibility of
working with the ACMA and Internet industry and collaborating internationally ensuring that its international
activities align with whole of government objectives.
Australian Government Information Management Office (AGIMO) works with government agencies
to ensure that Australian government ICT proposals have adequately considered cyber security risks. It
preaches adoption of a government wide approach to the management of common assets and data
sharing. It also promotes security and resilience as essential requirements of e-Government initiatives. One
of the major tasks carried out by AGIMO is to develop government strategies to help match demand for
increasing requirements of skilled cyber security practitioners. Also, it coordinates a strategy with ACMA
for managing Internet gateways for the Australian government agencies.
80
81
66
http://www.asio.gov.au/
http://www.cert.gov.au/
OnSecure is a cooperative project between DSD and AGIMO with the aim of improving the collection of
information security event reports in the government and improving the analysis capabilities of such events.
Important information on potential threats, vulnerabilities and mitigation derived from the analysis is then
disseminated via OnSecure to all government agencies. OnSecure is the central Australian government
Internet site for information security material provided by DSD.
Other than the above mentioned agencies and initiatives, Department of Prime Minister & Cabinet has set up
National Security and International Policy Group Executive which is supported by various functions such as:
National Security Advisor provides a high level of leadership, direction and coordination amongst
national security and intelligence agencies. The NSA is the principal source of advice to the Secretary of
the Prime Minister and Cabinet on all policy matters relating to the security of the nation and oversees the
implementation of all national security policy. Dy. NSA supports the function of NSA.
National Security Chief Information Officer (NSCIO) provides strategic direction and coordination
for information sharing across the national security community. This includes harmonizing the broad
policy, governance and legislative arrangements currently in place so as to improve interoperability and
collaboration, and provide oversight of the national security information management environment.
Cyber Policy Coordinator (CPC) coordinates the whole-of-government approach to cyber policies and
activities. The CPC provides strategic leadership and coordination on matters of cyber policy and strategies
across the entire cyber spectrum, from online consumer protection to cyber defence.
In the context of Australian cyberspace, a total of 17 sectors have been labeled as critical infrastructure sectors. CIP
is a top priority for Australian government. Since the creation of the Program in 2003, its primary focus has been
to share information & best practices with the owners and operators of critical infrastructure and to strengthen &
improve their security measures and to help prioritize their risk management. Under this program, they have also
developed resilience strategy to protect critical infrastructure. As part of strategy, they have:
Trusted Information Sharing Network (TISN) comprising 7 critical infrastructure Sector Groups (SGs),
2 Expert Advisory Groups (EAGs), Communities of Interest (CoI) and the Critical Infrastructure Advisory
Council (CIAC). TISN members include owners and operators of critical infrastructure, government agency
representatives and peak national bodies. The TISN, through its SGs and EAGs , seeks to promote the need
for investment in resilient, reliable infrastructure with market regulators. It also builds up risk management
framework for infrastructure such as SCADA and prepares protective security risk reviews for critical
infrastructure.
Critical Infrastructure Program for Modelling and Analysis (CIPMa) is a computer modelling program
that uses a vast array of data and information from a range of sources (including the owners and operators of
critical infrastructure) to model and determine the consequences of different disasters and threats (human
and natural) to critical infrastructure. CIPMa also helps government shape policies on national security and
critical infrastructure resilience.
The Australian government has established a new company to build and operate a National Broadband Network
(NBN)82 to deliver superfast broadband access for all Australians. In the 200708 Budget, the Australian government
allocated funds over four years to implement a range of initiatives (listed below) designed to enhance the protection
of home users and small businesses from electronic attacks and fraud. Few of these are:
National Cyber Security Awareness Week is organized each year in partnership with industry, community
organizations and all levels of government. The Awareness Week aims to educate users on the simple steps
they can take to protect their personal and financial information online.
82 http://www.minister.dbcde.gov.au/media/media_releases/2009/022
67
Cyber security website named Stay Smart Online provides information for Australian internet users on
cyber security issues and necessary measures. It offers information on a wide variety of topics including
securing computer, tips to safely bank & shop online and links to resources for parents and teachers to
help them protect their children online. Users can also subscribe to free alerts via e-mail, sms and RSS feeds
about the latest cyber security threats & vulnerabilities and possible solutions to address them.
Budd:e cyber security education package is a key component of the Australian Governments commitment
to raising the cyber security awareness among school going children. These modules are interactive and
self learning and are designed to help students adopt secure online practices and behaviours in a fun way.
Cyber security topics covered in the modules include malicious software, securing personal information
online and social networking.
National Identity Security Strategy aims to combat the misuse of stolen/assumed identities and fight
identity crime. Measures adopted include a new system for the electronic verification of documents used as
evidence of identity thereby improving registration and enrolment procedure, enhanced security features
and Strong authentication standards, ensuring accuracy in the identity information held by government
agencies and Biometric interoperability, to confirm the identity of individuals.
Cyber White Paper: A Cross agency team will develop Cyber White Paper which will bring together and
describe the important relationships in the cyber environment between social well-being, economic
prosperity and broader national interests. It will provide a framework for interaction across intra government
agencies & departments and between government and industry. The first version will be released sometime
around June 2012.
Other than the above mentioned programs/initiatives, one of the major initiatives taken by the government is for
engaging resources capable of undertaking security practice from an early age. Multi level executable career path
is designed to cater to national security requirements and retain the skilled professionals for protection of national
assets. The Australian Qualifications Framework is the national policy for regulated qualifications in Australian
education and training. Specially tailored security training programs contribute to a number of career pathways
like protective security, security risk management, government investigation and specialist security practitioners,
including physical security, ICT security.
Australia has a comprehensive cyber security legal framework, comprising Commonwealth and State legislation.
At the Commonwealth level, the key elements of this framework include Australian Security Intelligence Organization
Act 1979, Telecommunications (Interception and Access) Act 1979, Criminal Code Act 1995 (as amended by the
Cybercrime Act 2001), Telecommunications Act 1997, Intelligence Services Act 2001, Spam Act 2003 and Surveillance
Devices Act 2004.
Australia has partnered with allies under Cyber Storm with US, UK, Canada and New Zealand (Five Eye Countries) in
cyber storm initiative, to conduct cyber security mock drill exercises for both public and private sector organization
that helps them assess their security preparedness simulating crisis as would occur under cyber attack on national
critical infrastructure. Cyber storm also conducts regular online war games with organizations and shares online
defence and critical information across designated agencies within the DSD and the AGs Department. It is in news that
US and Australian officials have decided to include cooperation on cyber security as part of their defence treaty.
From the analysis above, it can be clearly seen that significant steps have been taken by the Australian government
to secure its digital ecosystem. Departments and offices have well defined functions and roles to play with respect
to cyber security.
68
Japan
Japan was one of the first countries to formulate a national cyber security strategy. The Government of Japan started
to address IT security issues in 1999. Prior to this, Security Measures for Computer Networks in Large Industrial
Facilities and Countermeasures against Cyber Terrorism & Cracking was released in March 1998.
It was followed by the Action Plan for Building Foundations of Information Systems Protection from Hackers
and Other Cyber threats which was adopted by the Interagency Director-Generals Meeting on IT Security on 21
January, 2000. This plan highlighted the need for a governmental structure to respond to cyber threats. It established
the need for a national IT security policy. Developing cyber-terrorism countermeasures to protect critical infrastructures
and putting the government in-line with the transition to an e-government were also prioritized. Also, raising private
sector awareness and enhancing international cooperation were stressed upon. Based on this plan, the Cabinet
Secretariat came up with Guidelines for IT Security in July, 2000 and Special Action Plan on Countermeasures
to Cyber terrorism of Critical Infrastructure in December, 2000.
The Cabinet Secretariat IT Security Office was established in February, 2000. Following that, in April, 2000, Branch
for IT Security was established in Cabinet Office for National Security Affairs and Crisis Management in order
to better coordinate the policy and measures among ministries and agencies. The branch is composed of experts
from ministries, agencies concerned and from private sector. It proposed the following administrative structures for
strengthening IT security:83
Inter-ministerial Coordination Body
Established by the Prime Minister's Decision on February, 29, 2000 under the auspice of the Advanced
Information and Telecommunication Society Promotion Headquarters.
Composed of Director General level officers
Wisemen Committee for IT Security
Composed of academia, experts and representatives of the private critical infrastructure
2 Working Groups were created under this committee - IT security & Cyber terrorism
In March 2001, IT Strategy Headquarters established e-Japan Priority Policy Program. As a result of this program, an
action plan to secure IT infrastructure of the government was created which included establishment of Government
- Private Sector Partnerships and National Incident Response Team.
In 2005, as a major step, National Information Security Centre and Information Security Policy Council were setup to
strengthen the cyber security posture in Japan. Following that, the first National Strategy on Information Security
(NSIS) was published in 2006.
Next to follow were the annual plans, focusing on specific themes:
Secure Japan 2006 First step toward a trustworthy society
Secure Japan 2007 - Upgrading of information security measures for safe and secure cyberspace
Secure Japan 2008 - Intensive efforts for enhancing information security infrastructure
Secure Japan 2009 - All entities should assume they may be subject to accidents
Information Security Strategy for Protecting the Nation (May 2010)
Information Security Research and Development Strategy (July 2011)
83
http://www.kantei.go.jp/foreign/it/security/2000/0519taisei.html
69
70
In February 2009, the Japanese government adopted the second NSIS for the years 2009 through 2011. The three year
plan includes four subjects: central and local governments, critical infrastructure, business entities, and individuals.
As part of the NSIS process, the Japanese government adopted Secure Japan 2009. During this period, large- scale
cyber attacks in the US and South Korea, particularly alerted Japan. On 11th May 2010, Information Security Policy
Council came up with Information Security Strategy for Protecting the Nation. This Strategy is a compehensive
approach that inlcudes the 2nd NSIS and applies for four years (FY2010 to FY2013). Based on this strategy, two annual
plans for information security have been devised - 2010 & 2011.
71
84
85
86
72
Japan Network Security Association (JNSA)87 is to promote standardization related to network security, and to
contribute to greater technological standards in the field, enhancing the public welfare through awareness, education,
research and information-dissemination activities related to network security.
Information Security Operation providers Group Japan (ISOG-J)88 has been established to encourage familiarizing
the security operation services to improve their service-level through improvement of security operation technologies,
training organizations, to contribute to the realization of the IT environment which is safe and can be used with
ease.
Information Security Education Providers Association (ISEPA)89 coordinates with NISC, METI & MIC on various
education and awareness initiatives. Its activities include information sharing with multiple agencies, providing
consultancy and advisory services to organizations and governments, promoting information security as a concept,
career map development program, training content development among others. Members include Japan Information
Security Audit Association, JNSA, CompTIA, Information Systems Audit and Control Association (ISACA) Tokyo
Chapter, International Information Systems Security Certification Consortium (ISC)2, SysAdmin, Audit, Network,
Security (SANS) etc.
National Institute of Information and Communications Technology (NICT)90 is the sole national research institute
in the information and communications field. It works for advancement of national technologies, contributes to
national policies and promotes research and development by cooperating with and supporting outside parties.
Japan Information Security Audit Association (JASA) 91 was established to maintain the prevalence and penetration
of the Information Security Audit based on the Authorized Information Security Audit System.
Internet Association Japan (IAJapan)92 is a non-profit and industry-based organization which was established by
the consolidation with Internet Association of Japan and Electronic Network Consortium and was legally permitted
by Ministry of Internal Affairs and Communications MIC and METI. It provides leadership in promoting advanced
systems of the Internet and in solving problems which ISPs encounter to when they operate services.
Government Security Operations Centre (GSOC) was established in April 2008 and has the responsibility of
monitoring and responding to attacks on government and critical infrastructure.
In total, 10 sectors have been identified as critical based on the first national strategy on information security namely:
Telecom, Finance, Civil aviation, Railways, Electricity, Gas, Administrative Services, Medical Services, Water works,
Logistics.
Capability for Engineering of Protection, Technical Operation, Analysis and Response (CEPTOAR)93 was created
in each of the 10 critical infrastructure fields. CEPTOAR is the function for sharing and analyzing information to
improve the ability to maintain and recover services of critical infrastructures. Critical infrastructure companies
communicate and share information provided from governments for prevention of IT-malfunctions, prevention of
expansion of suffering, rapid resumption from suffering and prevention of recurrence.
87
88
89
90
91
92
93
http://www.jnsa.org/en/aboutus/index.html
http://www.jnsa.org/isog-j/e/about_overview.html
http://www.nca.gr.jp/jws2008/WS6-07-isepa.pdf
http://www.nict.go.jp/about/charter-e.html
http://www.jasa.jp/
http://www.iajapan.org/
http://www.soumu.go.jp/main_sosiki/joho_tsusin/eng/presentation/pdf/070522_1.pdf
73
All these agencies collaborate and coordinate by sharing information based on the following structure:
74
Member Secretary
Dr. Kamlesh Bajaj
Members
(Listed in alphabetical order)
Public Sector
Mr. Anil Kumar
Chief Information Security Officer, Oil & Natural Gas Cooperation Limited
Mr. M. D. Agrawal
Mr. R. K. Sharma
Private Sector
Mr. Adapa Raja Vijay Kumar
Senior Vice President & Global Chief Information Security Officer, Bharti Airtel
Chief Information Security Officer & General Manager Information Risk Management & Policy Compliance, Wipro
DSCI Team
Mr. Vinayak Godse
Director-Data protection
Security Analyst
A NASSCOM Initiative
L: Niryat Bhawan, 3rd Floor, Rao Tula Ram Marg, New Delhi - 110057, India
P: +91-11-26155071 | F: +91-11-26155070 | E: [email protected] | W: www.dsci.in