Documentation Overview
Please select the required menu item to read the documentation.
Please select the required menu item to read the documentation.
Documentation related to cyberspace and federated digital ecosystem.
The interconnected and digitalised world requires a constant alignment of an enterprise’s mission, objectives, and functions with the larger context of the national, regional, and sectoral ecosystem in which the enterprise or organisation operates. The external context of an entity includes the customers/ users of an entity’s services, as well as the suppliers, auditors and supporting agencies. In the case of regulated entities and CSEs, the national bodies, viz. the government, regulators, nodal agencies, and other authorities, are important stakeholders/ interested parties, having legal, regulatory, oversight and advisory responsibilities over the entities.
In modern business, it is very rare that an entity operates in isolation. Besides the customers and users and national bodies, the regulated and critical sector entities provide or use the services of other external entities in a cooperative, coordinated, or federated manner. In addition, the entities also connect with their suppliers and service providers by means of various “channels” and operate using a variety of federated business processes. This business ecosystem is termed in this documentation as functional business ecosystem of an entity.
The business ecosystem of an entity can also be described in terms of the use of IT in the provisioning and consumption of business services, the underlying business processes and information flows between the entity and its users, customers, partners, service providers and national bodies. This technology ecosystem is widely applicable in today’s digital environment and is termed in this documentation as federated digital ecosystem of an entity.
The business and digital ecosystems of an entity in the Indian context is pictorally shown below:
Each organisation in the federated ecosystem is responsible for its own IT and information security. The organisations however must be aware and responsive to the information security needs of other participating entities within the federated ecosystem, and comply with directions, guidelines and standards prescribed by law, regulation, and mandates of nodal agencies. Every organisation in the complex, federated ecosystem is ultimately responsible for carrying out due diligence, not only about its own information security but also with respect to all parties in its external context.
A pictoral view of the national cyberspace is shown below:
The pictorial above describes the digital ecosystem elements (blobs) of the national cyberspace from an ownership perspective (who uses, owns, provides, manages and controls what). Usage, ownership, management and control of elements of the digital ecosystem are important criteria to assess the trustworthiness and risk associated with the elements, specifically from the perspective of external threats.
Entities are encouraged to print out a blank diagram and populate it with their own information infrastructure components (web portals, email system, ERP, CRM, OEM subscriptions & support etc). It will give them a high level perspective of their digital landscape.
The business and digital ecosystems of critical sector entities are highly complex and fast evolving. Generally, the top leadership of entities have a good grasp and understanding of the business complexities and are able to handle them well. However, the complexities of the digital ecosystem are not well understood by the top leadership and it is left to the CIOs, CISOs and their teams to handle the same. In most cases the technical and project teams adopt a technology-driven approach, which leads to misalignment between the business needs and the use of technology provided by the underlying digital ecosystem.
The integration of IT at the sectoral, regional, and national levels will only increase in future. Hence, at the national level, there is need to develop capabilities for a smart, resilient, and sustainable digital ecosystem. These terms are described below:
‘Smart’ describes the high levels of automation, analytics and decision support capabilities that are enabled by the use of IT.
‘Resilient’ describes the ability of the IT ecosystem to not only withstand large scale attacks and mitigate its destructive power but also the capability to recover from a successful attack in the shortest possible time with minimal damage or disruption.
‘Sustainable’ describes the ability of the critical sector entities and the nation as a whole to be able to use IT for delivery of national critical functions and business services efficiently and effectively over a long period of time that extends into decades.
In general, smart capabilities are achieved through the use of intelligent devices, analytics, AI, and machine learning, which can significantly improve the functioning, performance and resilience of the digital ecosystem. Automation agents and bots provide an infinitely scalable non-human workforce that can complement the limited human workforce. Resilience is a key component of business and organisational needs and achieved through well-designed operating procedures, processes, and practices. Sustainability is achieved through a combination of institutional structures, people, policies, governance, risk, and compliance (GRC) mechanisms.
Resilience and sustainability of IT and Information Security are strategic goals of organisations. Hence, they must be driven by the top leadership and management, who must take a long-term strategic view of both the use of IT to achieve business objectives and use of Information and Cyber Security to protect IT and business. Governing bodies and top leadership should assess whether they have adequate in-house capabilities to strategise on these two goals or they require external expertise to support their leaders and teams.
A smart, resilient, and sustainable federated digital ecosystem is best achieved through a strategic program approach that regularly addresses all issues related to the following:
Documentation related to entities at organisational level.
Organisational governance is defined as “a system by which an organisation makes and implements decisions in pursuit of its objectives.” Organisational governance is achieved by a mix of standards, rules, processes, practices, and technology platforms that support maturity in governance.
In view of enhanced role of ICT for achieving the business mission and objectives, governance of IT and information security are considered as a subset or domain of organisational (entity) governance. Definitions of governance in specific context of IT and Information security are provided in ISO/IEC 26000, ISO/IEC 38500:2015 and ISO/IEC 27014:2020.
Governance of Enterprise IT deals with resources required to acquire, process, store and disseminate information.
Enterprise Information Security Governance deals with assurance of information confidentiality, integrity and availability and effective communication of the same with various external stakeholders.
Documentation related to use of IT by entities.
Documentation related to cybersecurity of entities
The glossary of terms and definitions listed below may be used by stakeholders to communicate their perspectives for common understanding. The terms and definitions are derived from various standards, applicable laws (e.g. The IT Act 2000), regulations and public sources. The source(s) of definitions of the terms are also provided, where available.
Note: In addition, other properties such as authenticity, accountability, non-repudiation and reliability can also be involved.
Note 1: The terms Information Security (IS) and Cyber Security (CS) are often used interchangeably, since there are only some minor distinctions between the two terms. Notes 2 to 5 below provide guidance for specific situations in which one term is more appropriate than the other.
Note 2: In general, the information security is used in the context of securing information that is held and managed in both digital and non-digital (paper-based) forms. Cybersecurity is used in the context of securing the cyber-ecosystem (IT, OT, and IIoT) from cyber-attacks.
Note 3: Data and information content encompasses i) content created, used and managed using office productivity tools, ii) content stored in databases and other electronic repositories, which may be located on-premises or on cloud, iii) content searched, accessed and shared using web, email and other technologies, iv) machine to machine exchange of content through information exchange standards and protocols (EDI, API, STIX/TAXII), and OT-specific communication protocols (Modbus, DNP3/ IEEE 1815-2012, IEC-60870, IEC 61850, IEC 61131, IEC 62351) and, v) archival content stored in online and offline backups.
Note 4: Data and information related activities encompass i) content creation, updation and deletion (CRUD activities), ii) data processing, iii) view, copy, scan, search and print, iv) content integrity and confidentiality protection using digital signatures and encryption, v) masking or redaction of sensitive content and reclassification of the masked/ redacted content, vi) content exchange and distribution through electronic media and communication channels, vii) short-term and long-term storage of content and, viii) secure disposal of content from all the electronic stores, as per the organisation policies.
Note 5: Most OT systems are process control systems. Typically, the input and output OT data of such systems have a short period of utility. Hence, confidentiality of such data exchanged through OT protocols, as well as intermittent data loss are minor concerns. As regards data integrity, the concern is more about the integrity of the process control systems that generate, consume and process the data using OT protocols. The most important concerns of such systems are the availability of the systems themselves, safety of the physical environment around the systems or influenced by them. In summary, focus of OT security is more about protecting critical processes (Safety, Availability, Integrity) and less about data loss (Confidentiality).
Note: Cybersecurity is the practice of protecting the digital infrastructure from unauthorised access, data breaches, and cyber-attacks. Cyber resilience is an organisation’s capability to prepare for, respond to, and recover from cyber threats and disruptions. Both functions require a combination of technologies, practices and processes, policies and controls, peope and governance for delivering the required outcomes.
Note: Typically, Enterprise IT Governance deals with resources required to acquire, process, store and disseminate information. Enterprise Information Security Governance deals with assurance of information confidentiality, integrity and availability and effective communication of the same with various external stakeholders.
Note: The term management describes the coordinated activities to direct and control an organisation (ISO 9000:2015). It can include establishing policies and objectives, and processes to achieve the objectives. It is also used as a collective term for those with responsibility for controlling an organisation or parts of an organisation. The term managers is used to avoid confusion with management systems.
Note: ISO/IEC 27014:2020 provides the distinction between entity and organisation in the context of ISMS. By definition, the ISMS covers the whole of an organisation, which by itself may cover the whole of the entity or part of the entity. Typically the two terms defined in ISO 27014:2020 are applied to both the governance of IT and Information Security.
EXAMPLE: Consumer, client, beneficiary, sponsor, purchaser.
Note 1: A customer can be internal or external to the organisation delivering the service or services.
Note 2: A customer can also be a user. A customer can also act as a supplier.
EXAMPLE - procurement, infrastructure, finance, human resources, facilities.
Note: The role of the service integrator supports the promotion of end-to-end service management, particularly in complex supply chains by ensuring all parties are aware of, enabled to perform, and are held accountable for their role in the supply chain.
Note: Examples of users include a person or community of people. A customer can also be a user.
Note: Objectives are usually defined using SMART - Specific, Measurable, Achievable, Relevant and Time bound - statements of purpose.
Note: The term ‘Resource’ is also used, when there is no ambiguity that it refers to computer resource.
Note: The definition is also applied to OT and IIoT devices having programmable or upgradable software or firmware, such as i) PLCs, RTUs etc, and ii) CCTV cameras, smartcard and biometric readers etc.
Note: The definition is also applied to OT and IIoT systems having programmable or upgradable OT and IIoT devices, such as i) SCADA, DCS etc, and ii) smart grid technologies, such as automatic meter infrastructure etc.
Note: Authority can be delegated, Responsibility can be shared but cannot be delegated, Accountability can neither be shared nor delegated.
Example: an enterprise could be a government agency, a whole corporation, a division of a corporation, a single department, or a chain of geographically distant Organizations linked together by common ownership. An extended enterprise nowadays frequently includes partners, suppliers, and customers.
Entities usually have the following levels of management hierarchy with regard to business/ IT / Information Security goals, plans, activities and functions:
Strategic Level: long term (multi-year) planning, goal setting, management oversight activities and accountability lies with the governing body and top management. IS/ISO/IEC 9001:2015 defines the term ‘strategic direction’.
Tactical Level: short term (quarterly/ half-yearly/ yearly) planning, target setting, management oversight activities and responsibility lies with the top management and senior management.
Operational Level: ultra-short term (daily/ weekly/ fortnightly/ monthly) planning, target setting, management activities and responsibility lies with the senior, middle level and lower-level management.
Note 1: The term Business as Usual (BAU) is also used for operational level functions and activities.
Note 2: Audit and compliance verification/ validation is usually done across the three time-frames – long term, short term and ultra-short term.
Note 3: One mechanism to distinguish the levels of hierarchy within an entity is by the financial powers and decision authority that is delegated to each level. Another mechanism is the type of decision making that is allowed (strategic, tactical or operational) and the chain of command/ reporting.
Note: In an entity/ organisational context, the term ‘mission’ is also used.
Note: Objectives are rooted in intention and planning. Outcomes are the results of execution. Achievement of objectives can be measured through the outcomes.