RFD. for ICERT ( ) RESULTS-FRAMEWORK DOCUMENT. Department of Information Technology. Results-Framework Document (RFD) for CERT-In ( )

Similar documents
Government of India R F D. (Results-Framework Document) for. Education and Research Network (ERNET) ( )

Results-Framework Document (RFD) for the year of ERNET India R F D RESULTS -FRAMEWORK DOCUMENT. for. ERNET India

Presentation to the ITU on the Q-CERT Incident Management Team. Ian M Dowdeswell Incident Manager, Q-CERT

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013

STRATEGIC PLAN. USF Emergency Management

Crisis Management Plan

RFC2350 TLP1: WHITE. Έκδοση National CSIRT-CY RFC2350

Cybersecurity governance in Europe. Sokratis K. Katsikas Systems Security Laboratory Dept. of Digital Systems University of Piraeus

METHODOLOGY AND CRITERIA FOR THE CYBERSECURITY REPORTS

Concept Note: GIDC. Feasibility Study(F/S) on Government Integrated Data Center (GIDC) for the Republic of Nicaragua

Regional Workshop on Frameworks for Cybersecurity and CIIP Feb 2008 Doha, Qatar

GDPR Update and ENISA guidelines

PIPELINE SECURITY An Overview of TSA Programs

DHS Cybersecurity: Services for State and Local Officials. February 2017

Global Response Centre (GRC) & CIRT Lite. Regional Cyber security Forum 2009, Hyderabad, India 23 rd to 25 th September 2009

CSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague

Brussels, 19 May 2011 COUNCIL THE EUROPEAN UNION 10299/11 TELECOM 71 DATAPROTECT 55 JAI 332 PROCIV 66. NOTE From : COREPER

Bradford J. Willke. 19 September 2007

Why you should adopt the NIST Cybersecurity Framework

Panelists. Moderator: Dr. John H. Saunders, MITRE Corporation

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION

ISAO SO Product Outline

Information Security and Cyber Security

Defense Security Service. Strategic Plan Addendum, April Our Agency, Our Mission, Our Responsibility

Defining Computer Security Incident Response Teams

Fundamentals of Cybersecurity/CIIP. Building Capacity: Using a National Strategy & Self-Assessment

ITU-IMPACT Capacity Building for Least Developed & Developed Countries

About Issues in Building the National Strategy for Cybersecurity in Vietnam

Security and resilience in Information Society: the European approach

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -

Critical Infrastructure Protection Committee Strategic Plan

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

The NIST Cybersecurity Framework

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation)

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Disaster Recovery and Business Continuity Planning (Mile2)

Member of the County or municipal emergency management organization

Bonnie A. Goins Adjunct Industry Professor Illinois Institute of Technology

Cyber Resilience. Think18. Felicity March IBM Corporation

Department of Management Services REQUEST FOR INFORMATION

ASEAN COOPERATION ON DISASTER MANAGEMENT. Disaster Management & Humanitarian Assistance Division, ASEAN Secretariat

National Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director

Cyber Security Strategic Level Landscape in Poland. Krzysztof Silicki NASK Institute, Poland ENISA MB, EB

Critical Infrastructure Partnership

Asian Disaster Preparedness Center

Security Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location:

The Case for National CSIRTs

UNCLASSIFIED. National and Cyber Security Branch. Presentation for Gridseccon. Quebec City, October 18-21

Business Continuity Management Standards A Side-by-Side Comparison

NCSF Foundation Certification

RFC 2350 YOROI-CSDC. Expectations for Computer Security Incident Response. Date 2018/03/26. Version 1.0

Business Continuity Management

Critical Information Infrastructure Protection. Role of CIRTs and Cooperation at National Level

Cybersecurity-Related Information Sharing Guidelines Draft Document Request For Comment

STRATEGY ATIONAL. National Strategy. for Critical Infrastructure. Government

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

6 CONCLUSION AND RECOMMENDATION

Continuous protection to reduce risk and maintain production availability

COPE-ing with Cyber Risk Exposures

CCISO Blueprint v1. EC-Council

National Policy and Guiding Principles

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

Provisional Translation

Government-Industry Collaboration: 7 Steps for Resiliency in Critical Infrastructure Protection

Cyber Security & Homeland Security:

A Framework for Managing Crime and Fraud

Position Description. Engagement Manager UNCLASSIFIED. Outreach & Engagement Information Assurance and Cyber Security Directorate.

Action Plan to enhance preparedness against CBRN security risks

Enhancing the security of CIIPs in Europe - ENISA s Approach Dimitra Liveri Network and Information Security Expert

Cyber Security Technologies

Texas Reliability Entity, Inc. Strategic Plan for 2017 TEXAS RE STRATEGIC PLAN FOR 2017 PAGE 1 OF 13

Position Title: IT Security Specialist

SAINT PETERSBURG DECLARATION Building Confidence and Security in the Use of ICT to Promote Economic Growth and Prosperity

EU policy on Network and Information Security & Critical Information Infrastructures Protection

Threat and Vulnerability Assessment Tool

Business continuity management and cyber resiliency

Nebraska CERT Conference

THE CYBER SECURITY ENVIRONMENT IN LITHUANIA

Framework for Improving Critical Infrastructure Cybersecurity

June 5, 2018 Independence, Ohio

CEF Telecom Calls: CEF-TC : Cyber Security TZAFALIAS ARISTOTELIS POLICY OFFICER DG CONNECT

Awareness as a Cyber Security Vulnerability. Jack Whitsitt Team Lead, Cyber Security Awareness and Outreach TSA Office of Information Technology

TURNING STRATEGIES INTO ACTION DISASTER MANAGEMENT BUREAU STRATEGIC PLAN

Cyber Security Program

Emergency response plan in the event of an attack against information systems or. a technical flaw in the information systems

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

FSOR. Cyber security in the financial sector VISION 2020 FINANCIAL SECTOR FORUM FOR OPERATIONAL RESILIENCE

The Science and Technology Roadmap to Support the Implementation of the Sendai Framework for Disaster Risk Reduction

An overview of the CERT/CC and CSIRT Community

Implementation Strategy for Cybersecurity Workshop ITU 2016

POSITION DESCRIPTION

CALIFORNIA CYBERSECURITY TASK FORCE

TEL2813/IS2820 Security Management

Current procedures, challenges and opportunities for collection and analysis of Criminal Justice statistics CERT-GH

Building Global CSIRT Capabilities

Risk Advisory Academy Training Brochure

Panel 1 National CSIRT Experience

Greg Garcia President, Garcia Cyber Partners Former Assistant Secretary for Cyber Security and Communications, U.S. Department of Homeland Security

Transcription:

Results-Framework Document (RFD) for CERT-In (-) RFD RESULTS-FRAMEWORK DOCUMENT for ICERT Department of Information Technology (-) Page 1 of 13

Results-Framework Document (RFD) for CERT-In (-) SECTION 1: Vision, Mission, Objectives and Functions Vision Proactive Contribution in Securing India s cyber space Mission: Objectives: To enhance the security of India's Communications and Information Infrastructure through reactive and proactive action and effective collaboration with cyber users and industry. Preventing against the country s cyber space Responding to and minimizing damage and recovery time Reducing national vulnerability to Enhancing security awareness among common citizens Functions: In the Information Technology (Amendment) Act 2008, CERT-In has been designated to serve as the national agency to perform the following functions in the area of cyber security: Collection, analysis and dissemination of information on cyber incidents Forecast and alerts of cyber security incidents Page 2 of 13

Results-Framework Document (RFD) for CERT-In (-) Emergency measures for handling cyber security incidents Coordination of cyber incident response activities Issue guidelines, advisories, vulnerability notes and whitepapers relating to information security practices, procedures, prevention, response and reporting of cyber incidents Such other functions relating to cyber security as may be prescribed Page 3 of 13

Results-Framework Document (RFD) for CERT-In (-) SECTION 2: Inter se Priorities among Key Objectives, Success indicators and Targets (1 st April 31 st March ) Column 1 Column 2 Column 3 Column 4 Column 5 Column 6 Target / Criteria Value Objective Weight Actions Success Indicator Unit Weight Excellent Very Good Fair Poor Good 100% 90% 80% 70% 60% Objective 1 Preventing against the country s cyber space 40 Action 1 Improving the security posture of organisations and cyber users and enhancement in the ability of IT systems to resist Release of Upgraded Crisis Management Plan for countering and cyber terrorism Conducting Security audits of critical sector organisations Date 10 Number 10 25 Feb 5 March 15 March 25 March 31 March 5 4 3 2 1 Conducting cyber security mock drills at national level and participation in international drills Number 10 4 3 2 1 - Page 4 of 13

Results-Framework Document (RFD) for CERT-In (-) Action 2 Conducting awareness trainings for exposure Number of topics Number 10 covered for awareness trainings 20 18 16 14 12 Objective 2 Responding to and minimizing damage and recovery time 20 Action 1 Security incident response Average time taken to register, initiate action and provide initial response to a reported security incident Hours 20 6 12 18 24 30 Objective 3 Reducing national vulnerability to 20 Action 1 Issuance of security alerts on latest threats and vulnerabilities Average time taken to issue security alert upon recognizing the issue Days 20 2 3 4 5 6 Objective 4 Enhancing security awareness among common citizens 9 Action 1 Publicize the security site for common citizens Number of Publicity insertions in media Number 9 4 3 2 1 1 Page 5 of 13

Results-Framework Document (RFD) for CERT-In (-) Mandatory Success Indicators Objective Actions Success Indicator Unit Weight Excellent 100% Target/Very Good 90% Criteria Good 80% Value Fair 70% Poor 60% 1 Efficient Functioning of the RFD System Timely submission of RFD for -12 Timely submission of Results for -12 On-time submission Date 2 March 31 April 3 April 4 On-Time submission Date 1 May 1 May 3 May 4 April 5 May 5 April 6 May 6 Finalize a Strategic Plan for RC Finalize the Strategic Plan for next 5 year Date 2 Dec. 10 Dec. 15 Dec. 20 Dec. 24 Dec. 31 Identify potential areas of corruption related to organization activities and develop an action plan to mitigate them Finalize an action plan to mitigate potential areas of corruption. Date 2 Dec. 10 Dec. 15 Dec. 20 Dec. 24 Dec. 31 Implementation of Sevottam Create a Sevottam complaint system to implement, monitor and review Citizen s Charter Create a Sevottam Complaint system to redress and monitor public Grievances Date 2 Dec. 10 Date 2 Dec. 10 Dec. 15 Dec. 20 Dec. 15 Dec. 20 Dec. 24 Dec. 24 Dec. 31 Dec. 31 TOTAL WEIGHT= 11 Page 6 of 13

Results-Framework Document (RFD) for CERT-In (-) SECTION 3: Trend Values for Success Indicators Objective Actions Success Indicator Unit Actual Value for FY 09-10 Objective 1 Preventing against the country s cyber space Action 1 Improving the security posture of organisations and cyber users and enhancement in the ability of IT systems to resist Release of Upgraded Crisis Management Plan for countering and cyber terrorism Conducting Security audits of critical sector organisations Conducting cyber security mock drills at national level and participation in international drills Date 31 March 2010 Actual Value for FY 10-11 15 March Target Value for FY 11-12 5 March Projected Value for FY 12-13 5 March 2013 Projected Value for FY 13-14 5 March 2014 Number - - 4 4 4 Number 4 4 3 3 3 Page 7 of 13

Results-Framework Document (RFD) for CERT-In (-) Action 2 Conducting awareness trainings for exposure Number of topics covered for awareness trainings Number 21 27 18 18 18 Objective 2 Action 1 Responding to Security incident response and minimizing damage and recovery time Average time taken to register, initiate action and provide initial response to a reported security incident Hours - - 12 12 12 Objective 3 Reducing national vulnerability to Action 1 Issuance of security alerts on latest threats and vulnerabilities Average time taken Days to issue security alert upon recognizing the issue - - 3 3 3 Objective 4 Enhancing security awareness among common citizens Action 1 Publicize the security site for common citizens Number of Publicity insertions in media Number - - 3 3 3 Page 8 of 13

Results-Framework Document (RFD) for CERT-In (-) SECTION 4: Description and Definition of Success Indicators and Proposed Measurement Methodology Success indicators Description and definition Measurement methodology Release of Upgraded Crisis Management Plan for countering cyber attacks and cyber terrorism Conducting Security audits of critical sector organisations Conducting cyber security mock drills at national level and participation in international drills The Crisis Management Plan for countering and cyber terrorism needs to be updated yearly once Security auditing will help in assessing the implementation of security best practices and status of compliance, giving an indication of the security posture The cyber security mock drills are conducted at the national level to assess the readiness of organizations to withstand. The international cyber security drills enable reinforcing the cooperation and coordination between CERT- In and international CERTs. Date of release of upgraded Crisis Management Plan Number of security audits conducted No. of Mock drills conducted at national level and number of drills participated at international level per year Number of topics covered for awareness trainings Average time taken to register, initiate action The training programmes conducted in different relevant areas of cyber security for targeted audience to enhance their awareness for threats to different systems and suitable countermeasures to prevent the attacks and reduce the risk. With the advent and growth of Information Technology and associated systems and services, the number of incidents also No. of topics covered in different training programmes conducted per year. Average time taken to register, initiate action and provide initial Page 9 of 13

Results-Framework Document (RFD) for CERT-In (-) and provide initial response to a reported security incident Average time taken to issue security alert upon recognizing the issue Number of Publicity insertions in media increase. CERT-In has to register, initiate action and provide initial response to all the incidents reported to it within an average time of 6 hours. The exact time of handling an incident depends on nature and severity of incident. The cyber security alerts are issued by CERT-In on its website & emails and postal mail in certain cases to appraise organizations and users about specific threats and advise them on suitable countermeasures. The issues are recognized based on information available from constituency, collaborative partners, Industry, external CERTs and security agencies apart from information available on Internet. Alerts are prioritized based on severity of the threat and impact. The website called secureyourpc.in is hosted by CERT-In to educate common citizens on cyber security issues. Contents specific to parents, children, women, business and individual users are published on this site. The content is updated periodically to enhance awareness of general users on cyber threats and safeguards. This website needs to be publicized in print and electronic media to increase its outreach. response to a reported security incident Average time taken to issue security alert upon recognizing the issue. Number of Publicity insertions in print and electronic media. Page 10 of 13

Results-Framework Document (RFD) for CERT-In (-) SECTION 5: Specific Performance Requirements from other Departments Departments Relevant Success Indicator What do you need? Why do you need it? How much you need? What happens if you do not get it? Ministry of Finance Release of Upgraded Crisis Management Plan for countering and cyber terrorism Conducting Security audits of critical sector organisations Sanction of manpower CERT-In operates on 24X7 basis. Present manpower strength is 26 and requires to be enhanced significantly in line with the responsibility reposed on CERT-In. Additional 34 persons It will affect the achievement and realisation of targets Conducting cyber security mock drills at national level and participation in international drills Security incidents handled Average time taken to register, initiate action and provide initial response to a reported security incident Average time taken to issue security alert upon recognizing the issue Page 11 of 13

Results-Framework Document (RFD) for CERT-In (-) Concerned Ministries/Depa rtments in Central Government and critical sector organisations Release of Upgraded Crisis Management Plan for countering and cyber terrorism Comments on Crisis Management Plan The Crisis Management Plan envisages different roles and responsibilities to be performed by concerned Ministries / Departments. The plan will be upgraded based on their inputs. Delays the process of upgradation of Crisis Management Plan Conducting Security audits of critical sector organisations Readiness of critical sector organisations Critical sector organisations are required to implement CMP and security best practices before audit is conducted Appropriate assessment of security posture will not be possible Conducting cyber security mock drills at national level Readiness of critical sector organisations Critical sector organisations are required to implement CMP and security best practices before mock drills are conducted Appropriate assessment of security posture will not be possible Page 12 of 13

S. No Results-Framework Document (RFD) for CERT-In (-) SECTION 6: Outcome / Impact of activities of ICERT 1 2 3 4 5 6 7 8 9 Outcome / Impact of organisation / RCs 1 Improvement of the security of information and communications infrastructure and effective cyber incident resolution Jointly responsible for influencing this outcome/impact with the following organisation(s)/ departments/ ministry(ies) CERT-In, Concerned Ministries/Departments in central government, States/UTs and their critical sector organisations CERT-In, Concerned Ministries/Departments in central government, States/UTs and their critical sector organisations CERT-In, Concerned Ministries/Departments in central government, States/UTs and their critical sector organisations CERT-In Success Indicator(s) 2009-2010 Release of updated CMP Number of security audits of critical sector organisations conducted Number of cyber security mock drills conducted at national level Average time taken to register, initiate action and provide initial response to a reported security incident 31 March 2010 2010- - -2013 2013-2014 15 March 5 March 5 March 2013 5 March 2014 - - 5 5 5 4 4 4 4 4 6 Hrs 6 Hrs 6 Hrs CERT-In CERT-In Average time taken to issue security alert upon recognizing the issue Number of skill and awareness enhancement programmes conducted on cyber security 2 days 2 days 2 days 21 27 20 20 20 Page 13 of 13