Securing Critical Infrastructure: Understanding Sabotage Reporting in Cybersecurity
Dr.Sundararaman Chintamani
Business Storyteller | Bus. Storytelling Coach | Empowering Leaders to Inspire & Transform | Professional Speaker | Corporate Trainer| Author | Oil & Gas Consultant | Distinguished Toastmaster | Cyber Security | Humorist
In this edition of Cybersecurity 101, we explore Article 12: Sabotage Reporting, a key element of the Central Electricity Authority (CEA) guidelines. Sabotage, whether physical or digital, can severely disrupt critical operations, posing risks to national security and public safety. This article delves into the procedural and technical mandates of Article 12 and provides actionable insights for effective implementation.
This article is divided into two sections:
Section 1: Verbatim Clauses of Article 12 – Sabotage Reporting
a) The Responsible Entity shall incorporate procedures for identifying and reporting sabotage in their Cyber Security Policy within 30 days from the issue of the guidelines or grant of license under the appropriate legal provisions to the Responsible Entity.
b) The CISO shall be held liable for non-reporting of identified sabotage(s) as per procedures laid for identifying and reporting sabotage in the Cyber Security Policy of the Responsible Entity.
c) The CISO shall prepare a detailed report on disturbances or unusual occurrences, identified, suspected, or determined to be caused by sabotage in the Critical System of the Responsible Entity, and shall submit the report to the Sectoral CERT as well as to CERT-In within 24 hours of its occurrence.
d) The CISO shall submit to NCIIPC within 24 hours of occurrence the report on every sabotage classified as cyber incidents on "Protected Systems."
e) The CISO, upon the occurrence of every sabotage, shall take custody of all log records as well as digital forensic records of affected Cyber Assets, Intrusion Detection System, Intrusion Protection System, and SIEM and shall preserve them for at least 90 days, making them available for investigation by concerned agencies.
Note: Sabotage includes disturbances or unusual occurrences suspected or determined to be caused by forced intrusion in unmanned/manned facilities, taking control of operations of Critical Systems through a communicating device.
Section 2: Analysis of Article 12 – Objectives, Challenges, and Suggestions
Clause (a): Incorporating Sabotage Reporting in Cyber Security Policy
Objective:
Challenges:
Suggestions:
Clause (b): Accountability of the CISO
Objective:
Challenges:
Suggestions:
Clause (c): Reporting Sabotage to Sectoral CERT and CERT-In
Objective:
Challenges:
Suggestions:
Clause (d): Reporting to NCIIPC for Protected Systems
Objective:
Challenges:
Suggestions:
Clause (e): Preservation of Log and Digital Forensic Records
Objective:
Challenges:
Suggestions:
Conclusion
Article 12: Sabotage Reporting is a cornerstone of the CEA guidelines, emphasizing proactive measures to identify, report, and address sabotage incidents effectively. While implementation poses challenges such as tight timelines, technical complexities, and resource constraints, adopting modern tools, standardized processes, and interdepartmental collaboration can significantly enhance organizational readiness. With the power sector being a critical infrastructure, strict adherence to these guidelines will play a pivotal role in safeguarding national interests and ensuring operational resilience.
#CyberSecurity #SabotageReporting #CEA #PowerSector #Sabotage