National Cyber Security Policy-
2013
PREAMBLE
 Cyberspace is a complex environment consisting of
interactions between people, software and services,
supported...
 Plans for rapid social transformation and inclusive growth,
creating secure computing environment and adequate trust
and...
 The cyber security policy is an evolving task and
caters to home users and small, medium and large
enterprises and Gover...
Vision
“To build a secure and resilient cyberspace for
citizens, businesses and Government.”
Mission
To protect information and information infrastructure
in cyberspace, build capabilities to prevent and
respond to ...
Objectives
1) To create a secure cyber ecosystem in the country,
generate adequate trust and confidence in IT systems
and ...
7) To develop suitable indigenous security technologies
through frontier technology research, solution oriented
research, ...
STRATEGIES
A. Creating a secure cyber ecosystem
1. To designate a National nodal agency to coordinate all
matters related ...
5) To provide fiscal schemes and incentives to encourage
entities to install, strengthen and upgrade information
infrastru...
B. Creating an assurance
framework
1. To promote adoption of global best practices in information
security and compliance ...
C. Encouraging Open
Standards
1. To encourage use of open standards to facilitate
interoperability and data exchange among...
D. Strengthening the Regulatory
Framework
1. To develop a dynamic legal framework and its periodic
review to address the c...
E. Creating mechanisms for
security threat early warning,
vulnerability management and
response to security threats
1. To ...
4) To implement Cyber Crisis Management Plan.
5) To conduct and facilitate regular cyber security drills
and exercises at ...
F. Securing E-Governance
Services
1. To mandate implementation of global security best
practices, business continuity mana...
G. Protection and resilience of
Critical Information
Infrastructure
1. To develop a plan for protection of Critical Inform...
H. Promotion of research and
development in cyber security
1. To undertake research and development programs for
addressin...
I. Reducing Supply Chain
Risks
1. To create and maintain testing information infrastructure
and facilities for IT security...
J. Human Resource
Development
1. To foster education and training programs to both in
formal and informal sectors to suppo...
K. Creating cyber security
awareness
1. To promote and launch a comprehensive national
awareness program on security of cy...
L. Developing effective Public
Private Partnerships
1. To facilitate collaboration and cooperation among
stakeholder entit...
M. Information sharing and
cooperation
1. To develop bilateral and multi-lateral relationships in the
area of cyber securi...
N. Prioritized Approach for
implementation
 To adopt a prioritized approach to implement the policy so
as to address the ...
O. Operationalization of the
Policy
 This policy shall be operational by way of detailed
guidelines and plans of action a...
of 25

National Cyber Security Policy-2013

Published on: Mar 3, 2016
Source: www.slideshare.net


Transcripts - National Cyber Security Policy-2013

  • 1. National Cyber Security Policy- 2013
  • 2. PREAMBLE  Cyberspace is a complex environment consisting of interactions between people, software and services, supported by worldwide distribution of information and communication technology devices and networks.  The cyberspace is used by citizens, businesses, critical information infrastructure, military and governments and is expected to grow more complex.  IT is one of the critical sectors of cyberspace and is responsible for contribution to socio-economic factors like employment, living standards and diversity.
  • 3.  Plans for rapid social transformation and inclusive growth, creating secure computing environment and adequate trust and confidence in electronic transactions, software's, services, devices and networks, has become a priority for India.  Cyberspace is vulnerable to incidents, whether intentional or accidental, manmade or natural, and the data exchanged in the cyberspace can be exploited by nation- states and non-state actors. Some examples of cyber threats are identity theft, phishing, social engineering, hactivism, cyber terrorism, compromised digital certificates, persistent attacks, denial of service, bot nets, supply chain attacks, data leakage, etc.  Due to the dynamic nature of cyberspace, there is now a need for actions against all threats to be unified under a National Cyber Security Policy, with an integrated vision
  • 4.  The cyber security policy is an evolving task and caters to home users and small, medium and large enterprises and Government and non-Government entities. It serves as an umbrella framework for defining and guiding actions relating to cyberspace security.
  • 5. Vision “To build a secure and resilient cyberspace for citizens, businesses and Government.”
  • 6. Mission To protect information and information infrastructure in cyberspace, build capabilities to prevent and respond to cyber threats, reduce vulnerabilities and minimize damage from cyber incidents through a combination of institutional structures, people, processes, technology and cooperation.
  • 7. Objectives 1) To create a secure cyber ecosystem in the country, generate adequate trust and confidence in IT systems and transactions in cyberspace and thus enhance adoption of IT in all sectors. 2) To create an assurance framework for design of security policies 3) To strengthen the Regulatory framework for ensuring a secure cyberspace ecosystem. 4) To enhance and create National and Sectoral level 24 X 7 mechanisms for obtaining information regarding threats to ICT infrastructure, creating scenarios for responsive, resolution and crisis management through predictive, preventive, protective, response and recovery actions 5) Operating a 24 x 7 National Critical Information
  • 8. 7) To develop suitable indigenous security technologies through frontier technology research, solution oriented research, proof of concept, pilot development, transition, diffusion and commercialization. 8) To create a workforce of 500,000 professionals skilled in cyber security in the next 5 years through capacity building, skill development and training. 9) To provide fiscal benefits to businesses for adoption of standard security practices and processes. 10) To enable protection of information while in process, handling, storage and transit to safeguard citizen’s data. 11) To create a culture of cyber security and privacy enabling responsible user behavior and actions through effective communication and promotion. 12) To enhance global cooperation by promoting shared understanding and leveraging relationships for furthering the cause of security of cyberspace.
  • 9. STRATEGIES A. Creating a secure cyber ecosystem 1. To designate a National nodal agency to coordinate all matters related to cyber security in the country. 2. To encourage all organizations, private and public to designate a member of senior management, as Chief Information Security Officer (CISO), responsible for cyber security efforts and initiatives. 3. To encourage all organizations to develop information security policies duly integrated with their business plans and implement such policies as per international best practices. 4. To ensure that all organizations earmark a specific
  • 10. 5) To provide fiscal schemes and incentives to encourage entities to install, strengthen and upgrade information infrastructure with respect to cyber security. 6) To prevent occurrence and recurrence of cyber incidents by way of incentives for technology development, cyber security compliance and proactive actions. 7) To establish a mechanism for sharing information and for identifying and responding to cyber security incidents and for cooperation in restoration efforts. 8) To encourage entities to adopt guidelines for procurement of trustworthy ICT products and provide for procurement of indigenously manufactured ICT products.
  • 11. B. Creating an assurance framework 1. To promote adoption of global best practices in information security and compliance and thereby enhance cyber security posture. 2. To create infrastructure for conformity assessment and certification of compliance to cyber security test practices, standards and guidelines. 3. To enable implementation of global security best practices in formal risk assessment and risk management processes, business continuity management and cyber crisis management plan by all entities within Government and in critical sectors, to reduce the risk of disruption and improve the security posture. 4. To identify and classify information infrastructure facilities and assets at entity level with respect to risk perception for undertaking commensurate security protection measures. 5. To create conformity assessment framework to periodically
  • 12. C. Encouraging Open Standards 1. To encourage use of open standards to facilitate interoperability and data exchange among different products or services. 2. To promote consortium of Government and private sector to enhance the availability of tested and certified IT products based on open standards.
  • 13. D. Strengthening the Regulatory Framework 1. To develop a dynamic legal framework and its periodic review to address the cyber security challenges arising out of technological developments in cyber space and its harmonization with international frameworks including those related to Internet governance. 2. To mandate periodic audit and evaluation of the adequacy and effectiveness of security of information infrastructure as may be appropriate, with respect to regulatory framework. 3. To enable, educate, and facilitate awareness of the regulatory framework.
  • 14. E. Creating mechanisms for security threat early warning, vulnerability management and response to security threats 1. To create National level systems, processes, structures and mechanisms to generate necessary situational scenario of existing and potential cyber security threats and enable timely information sharing for proactive, preventive and protective actions by the individual entities. 2. To operate a 24 X 7 National Level Computer Response Team (CERT) to function as a nodal Agency for coordination of all efforts for cyber security emergency response. 3. To operationalize 24x7 sectoral CERT’s for all
  • 15. 4) To implement Cyber Crisis Management Plan. 5) To conduct and facilitate regular cyber security drills and exercises at all levels.
  • 16. F. Securing E-Governance Services 1. To mandate implementation of global security best practices, business continuity management, etc. 2. To encourage wider usage of Public Key Infrastructure (PKI) with Government for trusted communication and transaction. 3. To engage information security professionals/ organizations to assist e-Governance initiatives and ensure conformance to security best practices.
  • 17. G. Protection and resilience of Critical Information Infrastructure 1. To develop a plan for protection of Critical Information Infrastructure and its integration with business plan at the entity level and implement such plan. 2. To operate a 24 x 7 National Critical Information Infrastructure Protection Centre (NCIIPC) to function as the nodal agency for information. 3. To facilitate identification, prioritization, assessment, remediation and protection of critical Infrastructure. 4. To mandate certification for all security roles right from CISO/CSO to those involved in critical information infrastructure.
  • 18. H. Promotion of research and development in cyber security 1. To undertake research and development programs for addressing all aspects of development aimed at short term, medium term and long term goals. 2. To facilitate transition, diffusion and commercialization of the outputs of Research and Development. 3. To set up centers of excellence in areas of strategic importance for the point of security of cyber space. 4. To collaborate in joint Research and Development Projects with industry and academia in frontline technologies and solution oriented research.
  • 19. I. Reducing Supply Chain Risks 1. To create and maintain testing information infrastructure and facilities for IT security product evaluation and compliance verification as per global standards. 2. To build trusted relationships with product/system vendors. 3. To create awareness of the threats, vulnerabilities and consequences of breach of security.
  • 20. J. Human Resource Development 1. To foster education and training programs to both in formal and informal sectors to support cyber security threats. 2. To establish cyber security training infrastructure across the country. 3. To establish cyber security concept labs for awareness and skill development. 4. To establish institutional mechanisms for capacity building for Law Enforcement Agencies.
  • 21. K. Creating cyber security awareness 1. To promote and launch a comprehensive national awareness program on security of cyberspace. 2. To sustain security literacy awareness and publicity campaign. 3. To conduct support and enable cyber security workshops/ seminars and certifications.
  • 22. L. Developing effective Public Private Partnerships 1. To facilitate collaboration and cooperation among stakeholder entities including private sector, in the area of cyber security in general and protection of critical information infrastructure in particular for actions related to cyber threats, vulnerabilities, breaches, potential protective measures, and adoption of best practices. 2. To create models for collaborations and engagement with all relevant stakeholders. 3. To create a think tank for cyber security policy inputs, discussions and deliberations.
  • 23. M. Information sharing and cooperation 1. To develop bilateral and multi-lateral relationships in the area of cyber security with other countries. 2. To enhance National and global cooperation among security agencies, CERT’s, defense agencies and forces, Law Enforcement Agencies and the judicial systems. 3. To create mechanisms for dialogue related to technical and operational aspects with industry in order to facilitate efforts in recovery and resilience of systems.
  • 24. N. Prioritized Approach for implementation  To adopt a prioritized approach to implement the policy so as to address the most critical areas in the first instance.
  • 25. O. Operationalization of the Policy  This policy shall be operational by way of detailed guidelines and plans of action at various levels as national, sectoral, state, ministry, department and enterprise, as may be appropriate, to Address the challenging requirements of security of the cyber space.

Related Documents