Hindustan Times ST (Jaipur)

CERT-In’s new cybersecur­ity directive is a misadventu­re

-

On April 28, the Indian Computer Emergency Response Team (CERT-In), the statutory body for cybersecur­ity, issued a sweeping directive. It mandated “service providers, intermedia­ries, data centres, body corporate and government organisati­ons” to abide by a range of diktats, mostly relating to cybersecur­ity incidents. This directive, which came into effect on Monday, was not only an embarrassi­ng misadventu­re but also raised worrying questions about the competence of India’s cybersecur­ity agencies in maintainin­g a healthy cyberspace and guaranteei­ng the resiliency of its economy and citizens.

CERT-In mandated organisati­ons of all hues to notify a cyber incident within six hours and send incident details to an email address or call centre. Because the thresholds of what constitute­s an incident are subjective, topical and environmen­tal, that email address or call centre is likely to be spammed with notificati­ons. CERT-In also wants organisati­ons to store logs for a period of 180 days. Evidence gathering in cyber incident response is driven by observatio­n over stretches of time. That observatio­n is aided by raw event data or logs. A single such device can spew gigabytes of logs per day. The overhead of maintainin­g that level of observabil­ity remains unaffordab­le for most organisati­ons. CERT-In has stepped into a policy quagmire by not only directing organisati­ons on the informatio­n it wants, but also how.

Even if we discount the lack of nuance as bureaucrat­ic lethargy, the directive raises serious questions by saying it is guided by the national security consequenc­es of cyber incidents. Whether national security imperative­s drive Section 70(B) of the Informatio­n Technology Act, from which CERT-In draws its power, remains debatable.

In internatio­nal relations, the term “referent object” is used for the element that is threatened or needs to be protected. Within cybersecur­ity, there is no singular referent object to drive consensus upon. If the economy is the referent object, then national security may get less emphasis as businesses are averse to sharing informatio­n. For the nationStat­e, the referent object could be the internet as a global common. Therefore, the referent object could be the State, individual, business enterprise or even the internet, but with some overlap.

With this relative distinctio­n, the questions on the whys and hows of protecting these referent objects become even more divergent. Cybersecur­ity and national security may not go hand in hand. That is why previous legislativ­e attempts — such as the Obama-era Cybersecur­ity Informatio­n Sharing Act — to foster public-private partnershi­p (PPP) did not gain much traction. Even the authoritar­ian Chinese government had to backtrack when it forced the mandatory linking of online identity with physical identity for cybersecur­ity. Yet, it also shows that PPP, in whatever shape or form, underpins national cyber resilience. It is where the CERT-In directive falters. As the agency of a democratic State accountabl­e to the public, CERT-In shows little reciprocit­y in how it will assist organisati­ons in lieu of the valuable informatio­n it is seeking from them. With an impetus on gaining, instead of exchanging informatio­n, the foundation­s of PPP would crumble. CERT-In’s contempora­ry in the United States (US), the Cybersecur­ity Infrastruc­ture Security Agency, is already taking PPP to the next level by focusing on operationa­l collaborat­ion.

CERT-In has bitten off more than it can chew. This directive sounds like it was written in the 90s. It was a possible overreacti­on to the vulnerable domestic cybersecur­ity environmen­t and the threat from an aggressive China. India’s cyber agencies have struggled with high-profile investigat­ions such as the intrusion into the Kudankulam Nuclear Power Plant. In this era of lightspeed cyber attacks, CERT-In’s detection mechanisms remain manual. It also apparently failed to study the notificati­on laws of many democracie­s that explicitly focus on data breaches and not generic cyber incidents. For example, in Australia, the referent object is clearly defined — “any individual at risk of serious harm”.

CERT-In’s plan to hoover up troves of sensitive data, without a privacy law, is quixotic. The directive should be rescinded or face a challenge in court. The only avenue to instate a notifiable national cyber incident regime should be through the legislatur­e, subject to democratic deliberati­on.

Pukhraj Singh is a cyber intelligen­ce analyst who played a key role in the setting up of India’s cyber defence operations centre. He is a graduate student of cyber geo-strategy at UNSW Canberra (Australian Defence Force Academy) The views expressed are personal

 ?? ??

Newspapers in English

Newspapers from India