National Cyber Security Policy-2013
Published on: Mar 3, 2016
Transcripts - National Cyber Security Policy-2013
National Cyber Security Policy-
Cyberspace is a complex environment consisting of
interactions between people, software and services,
supported by worldwide distribution of information and
communication technology devices and networks.
The cyberspace is used by citizens, businesses,
critical information infrastructure, military and
governments and is expected to grow more complex.
IT is one of the critical sectors of cyberspace and is
responsible for contribution to socio-economic factors
like employment, living standards and diversity.
Plans for rapid social transformation and inclusive growth,
creating secure computing environment and adequate trust
and confidence in electronic transactions, software's,
services, devices and networks, has become a priority for
Cyberspace is vulnerable to incidents, whether intentional
or accidental, manmade or natural, and the data
exchanged in the cyberspace can be exploited by nation-
states and non-state actors. Some examples of cyber
threats are identity theft, phishing, social engineering,
hactivism, cyber terrorism, compromised digital certificates,
persistent attacks, denial of service, bot nets, supply chain
attacks, data leakage, etc.
Due to the dynamic nature of cyberspace, there is now a
need for actions against all threats to be unified under a
National Cyber Security Policy, with an integrated vision
The cyber security policy is an evolving task and
caters to home users and small, medium and large
enterprises and Government and non-Government
entities. It serves as an umbrella framework for
defining and guiding actions relating to cyberspace
“To build a secure and resilient cyberspace for
citizens, businesses and Government.”
To protect information and information infrastructure
in cyberspace, build capabilities to prevent and
respond to cyber threats, reduce vulnerabilities
and minimize damage from cyber incidents
through a combination of institutional structures,
people, processes, technology and cooperation.
1) To create a secure cyber ecosystem in the country,
generate adequate trust and confidence in IT systems
and transactions in cyberspace and thus enhance
adoption of IT in all sectors.
2) To create an assurance framework for design of security
3) To strengthen the Regulatory framework for ensuring a
secure cyberspace ecosystem.
4) To enhance and create National and Sectoral level 24 X
7 mechanisms for obtaining information regarding
threats to ICT infrastructure, creating scenarios for
responsive, resolution and crisis management through
predictive, preventive, protective, response and
5) Operating a 24 x 7 National Critical Information
7) To develop suitable indigenous security technologies
through frontier technology research, solution oriented
research, proof of concept, pilot development,
transition, diffusion and commercialization.
8) To create a workforce of 500,000 professionals skilled in
cyber security in the next 5 years through capacity
building, skill development and training.
9) To provide fiscal benefits to businesses for adoption of
standard security practices and processes.
10) To enable protection of information while in process,
handling, storage and transit to safeguard citizen’s data.
11) To create a culture of cyber security and privacy
enabling responsible user behavior and actions through
effective communication and promotion.
12) To enhance global cooperation by promoting shared
understanding and leveraging relationships for
furthering the cause of security of cyberspace.
A. Creating a secure cyber ecosystem
1. To designate a National nodal agency to coordinate all
matters related to cyber security in the country.
2. To encourage all organizations, private and public to
designate a member of senior management, as Chief
Information Security Officer (CISO), responsible for cyber
security efforts and initiatives.
3. To encourage all organizations to develop information
security policies duly integrated with their business plans
and implement such policies as per international best
4. To ensure that all organizations earmark a specific
5) To provide fiscal schemes and incentives to encourage
entities to install, strengthen and upgrade information
infrastructure with respect to cyber security.
6) To prevent occurrence and recurrence of cyber incidents
by way of incentives for technology development, cyber
security compliance and proactive actions.
7) To establish a mechanism for sharing information and for
identifying and responding to cyber security incidents and
for cooperation in restoration efforts.
8) To encourage entities to adopt guidelines for procurement
of trustworthy ICT products and provide for procurement of
indigenously manufactured ICT products.
B. Creating an assurance
1. To promote adoption of global best practices in information
security and compliance and thereby enhance cyber security
2. To create infrastructure for conformity assessment and
certification of compliance to cyber security test practices,
standards and guidelines.
3. To enable implementation of global security best practices
in formal risk assessment and risk management processes,
business continuity management and cyber crisis
management plan by all entities within Government and in
critical sectors, to reduce the risk of disruption and improve
the security posture.
4. To identify and classify information infrastructure facilities
and assets at entity level with respect to risk perception for
undertaking commensurate security protection measures.
5. To create conformity assessment framework to periodically
C. Encouraging Open
1. To encourage use of open standards to facilitate
interoperability and data exchange among different
products or services.
2. To promote consortium of Government and private
sector to enhance the availability of tested and certified IT
products based on open standards.
D. Strengthening the Regulatory
1. To develop a dynamic legal framework and its periodic
review to address the cyber security challenges arising
out of technological developments in cyber space and
its harmonization with international frameworks
including those related to Internet governance.
2. To mandate periodic audit and evaluation of the
adequacy and effectiveness of security of information
infrastructure as may be appropriate, with respect to
3. To enable, educate, and facilitate awareness of the
E. Creating mechanisms for
security threat early warning,
vulnerability management and
response to security threats
1. To create National level systems, processes, structures
and mechanisms to generate necessary situational
scenario of existing and potential cyber security threats
and enable timely information sharing for proactive,
preventive and protective actions by the individual
2. To operate a 24 X 7 National Level Computer Response
Team (CERT) to function as a nodal Agency for
coordination of all efforts for cyber security emergency
3. To operationalize 24x7 sectoral CERT’s for all
4) To implement Cyber Crisis Management Plan.
5) To conduct and facilitate regular cyber security drills
and exercises at all levels.
F. Securing E-Governance
1. To mandate implementation of global security best
practices, business continuity management, etc.
2. To encourage wider usage of Public Key Infrastructure
(PKI) with Government for trusted communication and
3. To engage information security professionals/
organizations to assist e-Governance initiatives and
ensure conformance to security best practices.
G. Protection and resilience of
1. To develop a plan for protection of Critical Information
Infrastructure and its integration with business plan at the
entity level and implement such plan.
2. To operate a 24 x 7 National Critical Information
Infrastructure Protection Centre (NCIIPC) to function as
the nodal agency for information.
3. To facilitate identification, prioritization, assessment,
remediation and protection of critical Infrastructure.
4. To mandate certification for all security roles right from
CISO/CSO to those involved in critical information
H. Promotion of research and
development in cyber security
1. To undertake research and development programs for
addressing all aspects of development aimed at short
term, medium term and long term goals.
2. To facilitate transition, diffusion and commercialization of
the outputs of Research and Development.
3. To set up centers of excellence in areas of strategic
importance for the point of security of cyber space.
4. To collaborate in joint Research and Development
Projects with industry and academia in frontline
technologies and solution oriented research.
I. Reducing Supply Chain
1. To create and maintain testing information infrastructure
and facilities for IT security product evaluation and
compliance verification as per global standards.
2. To build trusted relationships with product/system
3. To create awareness of the threats, vulnerabilities and
consequences of breach of security.
J. Human Resource
1. To foster education and training programs to both in
formal and informal sectors to support cyber security
2. To establish cyber security training infrastructure
across the country.
3. To establish cyber security concept labs for
awareness and skill development.
4. To establish institutional mechanisms for capacity
building for Law Enforcement Agencies.
K. Creating cyber security
1. To promote and launch a comprehensive national
awareness program on security of cyberspace.
2. To sustain security literacy awareness and publicity
3. To conduct support and enable cyber security workshops/
seminars and certifications.
L. Developing effective Public
1. To facilitate collaboration and cooperation among
stakeholder entities including private sector, in the
area of cyber security in general and protection of
critical information infrastructure in particular for
actions related to cyber threats, vulnerabilities,
breaches, potential protective measures, and adoption
of best practices.
2. To create models for collaborations and engagement
with all relevant stakeholders.
3. To create a think tank for cyber security policy inputs,
discussions and deliberations.
M. Information sharing and
1. To develop bilateral and multi-lateral relationships in the
area of cyber security with other countries.
2. To enhance National and global cooperation among
security agencies, CERT’s, defense agencies and
forces, Law Enforcement Agencies and the judicial
3. To create mechanisms for dialogue related to technical
and operational aspects with industry in order to
facilitate efforts in recovery and resilience of systems.
N. Prioritized Approach for
To adopt a prioritized approach to implement the policy so
as to address the most critical areas in the first instance.
O. Operationalization of the
This policy shall be operational by way of detailed
guidelines and plans of action at various levels as national,
sectoral, state, ministry, department and enterprise, as may
be appropriate, to Address the challenging requirements of
security of the cyber space.