NCIIPC Cybersecurity Framework
NCIIPC Cybersecurity Framework
1. Introduction ................................................................................................................. 1
2. PHASE-I: Identify Infrastructure ................................................................................. 4
2.1. Organisational cyber security structure: ................................................................... 4
2.2. Systems ....................................................................................................................... 5
2.3. Industrial Control System (ICS/SCADA) .................................................................. 10
2.4. Networks .................................................................................................................... 10
2.5. Services ..................................................................................................................... 16
2.6. Criticalities ................................................................................................................. 17
2.7. Interdependencies..................................................................................................... 18
2.8. Asset Owners ............................................................................................................ 19
3. PHASE-II: Assess/Evaluate Vulnerabilities/Threats/Risks ..................................... 20
3.1. Evaluate Vulnerability-Threat-Risk Assessment ..................................................... 20
3.2. Evaluate Network Architecture (with Security Devices in place) ........................... 20
3.3. Evaluate International Standards applied................................................................ 20
3.4. Evaluate Organisational Policies ............................................................................. 20
3.5. Human Resource Management Policies Specific to Cyber Security Controls ...... 22
3.6. Compliance ................................................................................................................ 23
4. PHASE-III: Implement Security Controls ................................................................. 27
5. PHASE-IV: Verify Implementation of Security Controls ......................................... 27
6. PHASE-V: Ensure Compliance to Audit ................................................................... 28
7. Conclusion................................................................................................................. 28
1. Introduction
1.1. Since the creation of the National Critical Information Infrastructure
Protection Centre (NCIIPC) in January 2014, we have had frequent interactions
with various organisations spread across all critical information infrastructure
sectors. During these interactions, one of the most common concerns we faced
was the lack of an accurate assessment of the present status of the cyber
security controls implemented by organisations. We realised that even within an
organisation, personnel across various verticals viewed this differently, based on
their own specialisations and the vertical they represented.
1.2. This is a worrying aspect. We noticed that in some organisations the
Information Technology (IT) and Operational Technology (OT) personnel had
distinctly divergent views. Resultantly, the organisational cyber security posture
was considerably weaker than it should have been.
1.3. A large number of technical documents indicating measures required to
implement strong cyber security architecture are available. However, there is
little guidance available for organisations wishing to determine the efficacy of
cyber security controls implemented, as well as that of the actual implementation
process. It is with a view to close this gap that NCIIPC has created this
document.
1.4. In addition, the present method of assessing the efficacy of implemented
controls is largely by means of cyber security audits. While there is no denial on
the role and importance of these audits, it is also important to stress that a cyber
security audit is essentially a snapshot of controls as they existed at the time of
the audit. What is crucial for any organisation however; is the steady state,
ongoing status of their cyber security mechanisms. This document outlines the
basic aspects requiring consideration. The emphasis here is also on the fact that
any analysis is worthless unless shortcomings are remediated. In order to ease
the remediation process, it is important for a clear and actionable plan involving
the concurrence and support of the senior most management of the
organisation.
1.5. It is expected that a systematic analysis of the processes outlined in this
document would enable organisations to determine with a large degree of
accuracy, their present status, the major gaps (if any), and the way ahead
1|Page
towards strengthening and maintaining the strength and resilience of their cyber
security posture.
1.6. In order to address the requirements of the largest cross section of our
constituency, we have made a deliberate attempt to be technology and process
agnostic. In addition, the resultant outcome of this exercise, when undertaken by
any organisation would enable their senior most management to understand the
present status, along with steps required to enhance their cyber security
posture. A deliberate effort has been made to keep the entire process as jargon
free as possible. In addition, wherever possible, an attempt has been made to
ensure that the process itself indicates expectations from CISOs and their cyber
security teams.
1.7. Diagram given in Figure-1 depicts the work flow for establishing the
above, as part of the NCIIPC Framework for Evaluating Cyber Security in
Critical Information Infrastructure:
2|Page
Figure-1: NCIIPC Framework for Evaluating Cyber Security in Critical
Information Infrastructure
Steps/phases for conducting the evaluation of cyber security are explained in detail
in subsequent paragraphs.
3|Page
2. PHASE-I: Identify Infrastructure
In this step/phase, Organisation needs to identify organisational critical business
processes, Cyber Assets and incoming & outgoing dependencies, along with
existing Cyber Security Controls:
b) Systems
d) Network
e) Services
f) Criticalities
g) Interconnectivity/interdependency
h) Continuity
4|Page
2.1.14 Cyber Security Incident Response Team
2.1.15 Roles and Responsibilities of owners of cyber security processes
2.1.16 Senior Management Accountability
Sample Questions:
2.2. Systems
Organisation needs to identify its systems, related processes and existing security
controls:
Sample Question:
2.2.1.2 Vendors/contractors
Sample Question:
5|Page
Are OEMs providing Security Support/pre-public release for yet to be
patched vulnerabilities?
Sample Question:
2.2.2.1 Outsourcing
Sample Question:
Sample Question:
6|Page
2.2.3.1 Flaw Remediation and Functional Verification
Sample Question:
Does the system notify the system administrator when anomalies are
discovered?
Sample Question:
Sample Question:
Sample Question:
7|Page
Is the system periodically reviewed to identify and eliminate unnecessary
functions, ports, protocols, and/or services?
Sample Question:
Sample Question:
Sample Question:
8|Page
2.2.4.6 Application Partitioning
Sample Question:
Sample Question:
Sample Question:
Sample Question:
9|Page
Do you apply all critical control system supplier approved operating system
updates in accordance with company policy?
2.4. Networks
Organisation needs to identify its networks; and security controls applied for
protection of all data that leaves or enters the local computer or local server
from a network. This includes:
10 | P a g e
2.4.1.1 Identification (User ID) and Authentication
2.4.1.2 Passwords
Sample Question:
Sample Question:
Sample Question:
11 | P a g e
2.4.3.2 Audit (Events) Alerts and Monitoring
2.4.3.3 Logging inclusive of , but is not limited to, critical host file changes,
unauthorized and authorized client connection activity, and ad-hoc
network creation.
Sample Question:
Are public facing servers placed in a DMZ i.e. behind a firewall with an
additional firewall between that and any systems on the internal network?
Are security servers placed directly in the DMZ (e.g., patch management,
anti-virus, IDS, etc.)?
Sample Question:
Web Protocols
12 | P a g e
2.4.4.3 Fault Management
Sample Question:
Sample Question:
Sample Question:
Is control system traffic given priority over any non-control system traffic?
Sample Question:
13 | P a g e
Is the DCOM protocol used only between the control network and the
DMZ networks and is the protocol between the DMZ and the corporate
network explicitly blocked?
Sample Question:
2.4.4.8 Modems
Sample Question:
Are modems disconnected when not in use, and is there a timeout after a
fixed period of inactivity?
2.4.4.10 Firewall
2.4.5 Encryption
14 | P a g e
Organisation needs to identify appropriate usage of encryption to protect
confidentiality of data during transitions and processes such as key
management.
Sample Question:
Are initial configuration settings documented and held by a third party within
the organisation?
Sample Question:
Sample Question:
15 | P a g e
2.4.9 Control System and Enterprise Network Security Coordination Process
Sample Question:
Sample Question:
2.5. Services
Organisation needs to identify the services: services being used and the
services being provided, along with existing cyber security controls.
16 | P a g e
Organisation needs to identify all service continuity processes, such as
disaster recovery, backup, and restoration.
Sample Question:
Do alternate telecommunications services avoid sharing a single point of
failure with primary telecommunications services (e.g., radio and lease
lines)?
2.5.4 Cross-Organization
Identify service sharing/linkages/dependencies on other organisations.
Sample Question:
Does the organization share services with other organizations and coordinate
audit information transmitted across organizational boundaries?
2.5.5 Personnel
Organisation needs to identify personnel risk assessment/mitigation
processes applied for security of its services.
Sample Question:
Are the results of personnel risk assessments documented, and are
personnel risk assessments of contractor and service vendor personnel
conducted pursuant to Standard?
2.6. Criticalities
Organisation needs to identify criticalities of their CII. This includes the
following:
17 | P a g e
2.7. Interdependencies
Organisation needs to identify its dependencies on other organisations, risk
associated and security controls considered:
2.7.1 Cross-Organization
Identify service dependencies on other organisations.
Sample Question:
Does the organization share services with other organizations and coordinate
audit information transmitted across organizational boundaries?
2.7.2 Continuity
Organisation needs to identify its business dependencies on other
organisations.
Sample Question:
Do alternate telecommunications services avoid sharing a single point of
failure with primary telecommunications services (e.g., radio and lease
lines)?
2.7.3 Outsourcing
Sample Question:
Does Security Policy/Procedure exist for outsourcing?
Has SLA compliance with the security policy been ensured?
2.7.4 Supply Chain Protection
Organisation needs to identify the complete supply chain of its cyber
resources and the existing security controls applied to prevent any supply-
chain contamination.
Sample Question:
Are supply chain vulnerabilities protected from threats initiated against
organizations, people, information, and resources that provide products or
services to the organization?
2.7.5 Service acquisition contracts/SLA
Sample Question:
Are formal contractual and confidentiality agreements established for hiring
service from the external parties?
2.7.6 Vendors/contractors/ Personnel
Sample Question:
18 | P a g e
Are the results of personnel risk assessments documented, and are
personnel risk assessments of contractor and service vendor personnel
conducted pursuant to Standard?
2.8.1 Personnel
Sample Question:
Are documents and data files in the terminated employee's possession
transferred to new authorized owners?
2.8.2 Roles & Responsibilities
Sample Question:
Does the cyber-security team establish and document a framework in
accordance with company policy that defines the security organization and
the roles, responsibilities, and accountabilities of the system owners and
users?
2.8.3 Asset Location
Sample Question:
Are the risks associated with physical and environmental hazards considered
while planning new system facilities or reviewing existing facilities?
Have necessary risk mitigation processes employed for such physical and
environmental hazards?
2.8.4 Configuration Management
2.8.4.1 Asset Inventory
Sample Question:
Has an inventory of the components of the system been developed,
documented and maintained that accurately reflects the current system?
Has an inventory of the components of the system been developed,
documented, and maintained?
Does the asset inventory include information deemed necessary to achieve
effective property accountability?
19 | P a g e
3. PHASE-II: Assess/Evaluate Vulnerabilities/Threats/Risks
This phase/step involves assessment/evaluation of the Security Controls
(technological and/or procedural) identified in above phase/step.
20 | P a g e
Standards and Technology (NIST) etc. Organisations may evaluate whether
their set of security policy covers following:
21 | P a g e
3.4.26 Malicious Code Protection Policy
3.4.27 CDA (Critical Digital Assets) Policy & Procedures
3.4.28 Change Control Policy & Procedures
3.4.29 Contingency Policy & Procedures
3.4.30 BCP(Business Continuity Plan) Policy & Procedures
3.4.31 Crisis Management Plan (CMP)
3.4.32 Cloud Computing Security Policy
3.4.33 SCADA and ICS Specific Policy
3.4.34 IT (Information Technology) and OT (Operation Technology) Sub-policies
3.5.1 Personnel
Sample Question:
Has risk designations been assigned to all positions and are screening
criteria established for individuals filling those positions?
3.5.1.1. Personnel Screening
3.5.1.2. Personnel Termination
3.5.1.3. Personnel Accountability
Sample Question:
Does a formal accountability process exist that clearly documents
potential disciplinary actions for failing to comply?
3.5.2. Access Agreements
Sample Question:
Is access to classified information with special protection measures granted
only to individuals who have a valid access authorization that is
demonstrated by assigned official government duties?
3.5.3. Training & Awareness
3.5.3.1. Training Requirements
22 | P a g e
3.5.3.2. Security Awareness
3.5.3.3. Security Training
Sample Question:
Does training cover all levels / designations of personnel?
Does the frequency and depth of training reflect the role of the individual?
3.6. Compliance
Organisation needs to evaluate correctness, consistency and completeness
of their cyber security audit process for compliance check. Following
parameters/clauses may also be assessed:
23 | P a g e
Sample Question:
Is execution of privileged functions (account creations, modifications, and
object permission changes) included in the list of events to be audited by
the system?
3.6.1.2. Audit Generation
Sample Question:
Are audit records produced that contain sufficient information to establish
what events occurred, when the events occurred, where the events
occurred, the sources of the events, and the outcomes of the events?
3.6.1.3. Audit Protection General
Sample Question:
Is compliance to the security policy demonstrated through audits in
accordance with the audit program?
3.6.1.4. Audit Failure Response
Sample Question:
Does the response to audit failures include using an external system to
provide these capabilities?
3.6.1.5. Audit Monitor/Analysis
Sample Question:
Is the auditing capability implemented on NHMIs to ensure that all
operator activity is recorded and monitored by authorized and qualified
personnel and are historical records maintained?
3.6.1.6. Protection of Audit Information
3.6.1.7. Information Disclosure
Example: Non Disclosure Agreement by Auditors
3.6.1.8. Frequency of Audits
3.7. Procedures
Organisation needs to evaluate correctness, consistency and completeness of
their security procedures. Following parameters/clauses may also be checked:
24 | P a g e
3.7.1.1. Audit and Accountability
Sample Question:
Does logging include, but is not limited to, critical host file changes,
unauthorized and authorized client connection activity, and ad-hoc
network creation?
25 | P a g e
Sample Question:
Are backups of critical system software, applications, and data created
and secured?
3.8.3. Contingency Plan
Sample Question:
Is normal operation of the system resumed in accordance with its
policies and procedures after a security event?
3.8.4. Alternate Storage Site
Sample Question: Is alternate storage sites identified and are
agreements in place to permit the storage of system configuration
information?
3.8.5. Alternative Command and Control Methods
Sample Question:
Are alternate command/control methods identified, and are agreements
in place to permit the resumption of operations within a defined time
period when the primary system capabilities are unavailable?
Are necessary communications for the alternate control centre
identified, and are agreements in place to permit the resumption of
system operations for critical functions within a defined time period
when the primary control centre is unavailable?
3.8.6. Disaster Recovery
Sample Question:
Is there a capability to recover and reconstitute the system to a known
secure state after a disruption, compromise, or failure?
3.8.7. Fail-Safe Response
Sample Question:
Is the system able to execute an appropriate fail-safe procedure upon
the loss of communications with the system or the loss of the system
itself?
3.8.8. Continuity of Operations Plan Update
Sample Question:
Are updates to the recovery plan(s) communicated to personnel
responsible for the activation and implementation of the recovery plan(s)
within 30 calendar days of the change being completed?
3.8.9. Info System Recovery
26 | P a g e
Sample Question:
Does the organization protect backup and restoration hardware,
firmware, and software?
3.8.10. Denial of Service Protection
Sample Question:
Does the organization employ monitoring tools to detect indicators of
denial of service attacks against the information system and monitors
system resources to determine if sufficient resources exist to prevent
effective denial-of-service attacks?
4.2. It is expected that the findings would be recorded for the organisation as
a whole, rather than across segments or verticals within an organisation. This is
a key part of the entire exercise in order to ensure that the senior most
management has a view of the Organisational security posture, rather than a
segmented / fractured view as normally seen.
4.3. It is expected that organizations from the Critical sectors would share
their findings with the NCIIPC alongwith their plans for ensuring that their cyber
security posture is maintained at the appropriate level.
27 | P a g e
5.2. Audit reports are expected to be shared with NCIIPC, as it would help in
ensuring that their cyber security controls have been implemented at the
appropriate levels.
6.2. Residual Risks must be properly documented and sign off of senior
management be obtained.
7. Conclusion
7.1. While a large amount of literature outlining processes and procedures
required to achieve desirable levels of cyber security exists, there is a need to
provide a clear assessment to senior management regarding their present
status and effectiveness.
7.3. NCIIPC is available throughout this evaluation exercise for providing any
assistance required.
28 | P a g e