New Cybersecurity Guidelines by CERT-In

In News

  • Recently, the Indian Computer Emergency Response Team (CERT-In) has issued new guidelines for cyber incidents.

New Guidelines

  • Mandatory: The Indian Computer Emergency Response Team (CERT-In) has mandated that:
    • All cybersecurity incidents must be informed to it by the respective companies within six hours of either being made aware of the incident or becoming aware itself.
    • Service providers, intermediaries, data centres, companies and government organisations enable logs of all their ICT systems and maintain them securely for a rolling period of 180 days.
  • Incidents includes: 
    • Targeted scanning or probing of critical networks and systems, 
    • Compromise of critical systems and information, 
    • Unauthorised access of data and systems among others.
  • Maintain information: 
    • Virtual asset service providers, virtual asset exchange providers and custodian wallet service providers shall maintain all the information they have gathered as a part of the know your customer (KYC) process and records of financial transactions for a period of five years.
  • Information retrieval:
    • With respect to transaction records, accurate information shall be maintained in such a way that individual transactions can be reconstructed. 
    • It is to be done along with the relevant elements comprising of, but not limited to:
      • Information relating to the identification of the relevant parties including IP addresses along with timestamps and time zones, 
      • Transaction ID, 
      • The public keys (or equivalent identifiers), 
      • Addresses or accounts involved (or equivalent identifiers), 
      • The nature and date of the transaction, and 
      • The amount transferred
  • Reason for New Guidelines:
    • The guidelines came because during the course of handling cyber incidents and interactions with the constituency, it has identified certain gaps causing hindrance in the analysis of breach incidents.

Issues in Present System

  • Accurate information relating to customers/subscribers were not present.
  • Mostly the information is either deleted or not stored at all.
  • Proper maintenance or reporting of the data was missing.
  • Personal data leakage has also been a troublesome issue. Some companies continued to ignore alerts by cyber security researchers and acted only after the data was made public.
  • Users are not informed of the data breach and hence are not able to protect themselves from cyber crimes.
  • Users are still unaware if their KYC (Know Your Customer) and financial data is safe or not.

Indian Computer Emergency Response Team (CERT-In)

  • Operational: CERT-In has been operational since January 2004. 
  • The constituency of CERT-In is the Indian Cyber Community. 
  • CERT-In is the national nodal agency for responding to computer security incidents as and when they occur.
  • Power: CERT-In is empowered under Section 70B of the Information Technology Act to collect, analyse and disseminate information on cyber security incidents. 
  • It has been designated to serve as the national agency to perform the following functions in the area of cyber security:
    • Collection, analysis and dissemination of information on cyber incidents.
    • Forecast and alerts of cyber security incidents
    • Emergency measures for handling cyber security incidents
    • Coordination of cyber incident response activities.
    • Issue guidelines, advisories, vulnerability notes and whitepapers relating to information security practices, procedures, prevention, response and reporting of cyber incidents.
    • Such other functions relating to cyber security as may be prescribed.

What are the reasons for increasing Cyber attacks?

  • Adverse relations with China: China is considered one of the world leaders in information technology. Therefore, it is expected to have capabilities to disable or partially interrupt the information technology services in another country. 
  • Asymmetric and covert warfare: Unlike conventional warfare with loss of lives and eyeball to eyeball situations, cyber warfare is covert warfare with the scope of plausible deniability, i.e. the governments can deny their involvement even when they are caught. Therefore, cyber warfare has increasingly become the chosen space for conflict between nations.
  • Increasing dependency on technology: As we grow faster, more and more systems are being shifted to virtual space to promote access and ease of use. However, the downside to this trend is the increased vulnerability of such systems to cyber-attacks. 

Government steps to ensure Cyber Security

  • Institutional Structure: India has a well-organised structure to regulate and strengthen the national information technology systems across the country. This includes the National Cyber Security Council as well as Computer Emergency Response Team – India (CERT-In).
  • Banning of potentially unsafe apps: Recently, India had banned many apps (mostly of Chinese origin), which were found to be unsafe for usage by the Indian citizens. The apps were allegedly transferring data to the servers located outside India and did not have proper safeguards to ensure that the private data of Indian citizens was protected from unauthorised access.
  • Personal Data Protection Bill: The bill mandates strengthening of data infrastructure by the private companies to safeguard the data of individuals. Therefore, there is a focus on including the private companies in the ambit of data protection, rather than restricting it to the government only.
  • Upcoming Cyber Security Strategy: Cyber Security Strategy aims to prepare a comprehensive document on preparing for and dealing with the cyber-attacks and securing the cyberspace in the country. For e.g. the strategy identifies three stages in the arena of cyber-attacks:
    • Pre attack or Preparatory Phase: In this stage, the systems’ gaps are identified and they are plugged in. The focus is on strengthening the defence mechanism and the firewalls and keeping the system up to date so that any potential threat is averted and the system is not compromised.
    • During the Attack: At the time of the attack, the focus is on stopping it as soon as possible and minimising the damage to the system. Also, it is to be ensured that the critical assets and data are not lost to the attack. When the attackers have been pushed out of the system, the focus shifts to restoring the services so that the consumers do not face long outages.
    • Post-Attack Phase: After the attack is over and the system is restored to normalcy, the focus is on identifying the loopholes or gaps in the system, understanding how the reaction could have been more swift and creating Standard Operating Procedure (SOPs) in case of similar future attacks.

Challenges with Cyber Security

  • Low digital literacy among the general public: The general level of awareness in India about internet etiquette is low. It is often reported that people are duped easily by click-baiting them into clicking interesting content, which often has malware attached to itself. 
  • Vulnerable points in the system: There is a need to find and address the vulnerable points in the system, which might allow unauthorised entry into the system. For e.g. it is expected that the sensitive nuclear data is protected by heavy encryption, but the users may be vulnerable to human errors while accessing the systems. 
  • State-sponsored Cyber Attacks: The problem with such state-sponsored attacks is the unlimited funding received by the hackers to break into the foreign systems. This means that to counter such threats from China or other countries, we need to allocate sufficient resources, which can proportionately deter the systems from being compromised. 

Way Ahead

  • Increased awareness and monitoring:  In the era of cyber wars, the only thing which has the potential to prevent vulnerability is information control. There is a need to enhance the general awareness levels of the government installations as well as the general public to counter such threats.
  • Strengthening the policy and ecosystem: The need of the hour is to come up with a futuristic National Cyber-Security Policy which allocates adequate resources and addresses the concerns of the stakeholders. 
  • Pre-empting the cyber-attacks: There is a need to invest in the right tools and technologies apart from the human resources, which can predict and detect the cyber attacks early, so that preventive steps could be taken while the time is still on our side. 
  • Capacity Building: Unlike other sectors requiring huge machinery and equipment, information technology is one sector which is highly dependent upon the skill level of human resources more than anything else.
  • Continuous Testing: There is a need to conduct regular and frequent checks of the existing system by bringing in ethical hackers and other experts on board so that if there are chinks in the system, they can be addressed swiftly before they are exploited by the hackers.
  • Partnership with the private sector: There is a need to collaborate and cooperate in erecting defences against outside intruders, who try to gain unauthorised entry into the system.
  • Classification and prioritisation of the assets: Although all sectors are important and need to be protected from outside intrusion, there is a need for classification of assets and systems in such a way that the core systems have multiple layers of protection. This includes power and energy systems, which might lead to a cascading effect on the economy as the supply of power is critical for the proper functioning of the dependent systems.
  • Sharing the Best Practices: Cyber systems are extensive in nature. Also, they are staggered across the spectrum. Therefore, it makes sense to collate the experience of the different entities together to form a comprehensive knowledge base, which can be utilised in case of future incidents.

Source: IE + TH

 

Other News of the Day

In Context  Women in Chhattisgarh recreate the ‘Chipko movement’ to save Hasdeo Aranya Forest. Hasdeo forest The Hasdeo forest covering Chhattisgarh’s Korba, Sarguja and Surajpur districts, spans an area of 170,000 hectares.  It is a noted migratory corridor and has a significant presence of elephants. It is also the catchment area of the Hasdeo river,...
Read More

In Context  The National Bank for Agriculture and Rural Development (Nabard) is planning to formulate a Farmer Distress Index (FDI) to track, identify and support “needy and distressed farmers.” About Farmer Distress Index (FDI) It can integrate the available high-frequency data on key agricultural variables like deviation of monsoon rains, excessive rainfall, drought and dry...
Read More

In Context Delhi government is considering bringing Malcha Mahal for tourists after renovating the heritage structure. About Malcha Mahal It was built by the then Sultan Firoz Shah Tughlaq in the 14th century and was used as a hunting lodge by him. It is located in Delhi. It later became the residence of the descendants...
Read More

In News The Union Ministry of Culture granted ?3.75 crores under the ‘Upgradation of Museums Scheme’ for the ?5-crore project in Eluru town of Andhra Pradesh. What is a Museum? As per the ICOM (International Council of Museums), A museum is a non-profit, permanent institution in the service of society and its development, open to...
Read More

In News An IndiGo-operated aircraft landed at Kishangarh airport using an approach process guided by India’s own satellite-based augmentation system named GAGAN, or GPS-aided GEO Augmented Navigation. About India is the first country in the Asia Pacific Region to achieve this. Deadline: The Directorate General of Civil Aviation (DGCA) had set a deadline of July...
Read More

In News The Uttarakhand administration imposed Section 144 CrPC in Roorkee to prohibit assembly of more than four persons in a Dharam Sansad. Need In the aftermath of communal tension in a village in Roorkee after a Hanuman Jayanti procession was allegedly pelted with stones, certain groups tried to hold a Dharam Sansad. Supreme Court...
Read More

In News  The year 2022 marks the 70th Anniversary of the Establishment of the Diplomatic Relations between Japan and India. India and Japan established diplomatic relations on April 28, 1952. India- Japan Relations  Historical: The friendship between India and Japan has a long history rooted in spiritual affinity and strong cultural and civilization ties dating...
Read More

In News Recently, the seventh edition of the Raisina Dialoge was held in New Delhi. Raisina Dialogue, 2022 The theme for the Conference was ‘Terranova- Impassioned, Impatient, Imperiled’. It had six thematic pillars: Rethinking Democracy: trade, technology and ideology End of Multilateralism: a networked global order Water Caucuses: turbulent tides in the Indo-Pacific Communities Inc:...
Read More

In News New genetic proof links 246 Indian soldiers killed in Punjab’s Ajnala during the 1857 uprising to Gangetic plains. Latest findings Archaeologists have called the site the largest possessing skeletal remains linked to any single event during the 1857 Indian rebellion. With the mass killing being a highly sensitive issue with the potential to...
Read More