"Protecting National Digital Assets"
IT Act Section 70, NCIIPC Role, CII Identification Process, Protected Systems Declaration, Sector-Specific Requirements for Power, Banking, Telecom, Transport, and Government.
IT Act Section 70(1) Explanation:
"Critical Information Infrastructure" means the computer resource, the incapacitation or destruction of which, shall have debilitating impact on:
1. National Security
2. Economy
3. Public Health
4. Safety
Key Characteristic: Debilitating impact if compromised or destroyed
| Aspect | Details |
|---|---|
| Full Form | National Critical Information Infrastructure Protection Centre |
| Establishment | 2014 (under NTRO) |
| Parent | National Technical Research Organisation (NTRO), PMO |
| Legal Basis | IT Act Section 70A |
| Headquarters | New Delhi |
| Function | Protection of CII in India |
1. Take all measures to protect CII
2. Identify CII across sectors
3. Issue guidelines for CII protection
4. Coordinate with sector regulators
5. Develop and maintain national CII protection strategy
6. Respond to CII security incidents
7. Share threat intelligence with CII operators
| Sector | CII Examples | Maharashtra Specific |
|---|---|---|
| Power | Power generation plants, transmission grid, distribution systems | MSEDCL, Tata Power Mumbai, BEST |
| Banking/Finance | Core banking systems, payment gateways, ATM networks | RBI Mumbai, NSE, BSE, NPCI |
| Telecom | Network operations centers, switching systems, submarine cables | Major telco operations in Mumbai |
| Transport | Air traffic control, railway signaling, port management | Mumbai Airport, Konkan Railway, JNPT |
| Government | E-governance portals, citizen databases, defense systems | MahaOnline, Aaple Sarkar, MH State Data Centre |
| Healthcare | Hospital management systems, health databases | Major hospital chains, CoWIN infrastructure |
| Emergency Services | 112 emergency response, disaster management systems | Maharashtra Emergency Response System |
Under IT Act Section 70:
1. Access Control: Only authorized persons can access
2. Audit Trails: Complete logging of all access
3. Security Measures: Enhanced security controls
4. Incident Reporting: Immediate reporting to NCIIPC/CERT-In
5. Background Verification: Personnel handling CII
| Violation | Section | Punishment |
|---|---|---|
| Unauthorized access to protected system | 70(2) | Up to 10 years + fine |
| Attempt to access protected system | 70(2) | Up to 10 years + fine |
| Misuse of CII information | 72A | Up to 3 years + Rs. 5 lakh fine |
| Cyber terrorism (CII attack) | 66F | Life imprisonment |
RBI Cybersecurity Framework (2016, updated):
1. Board-approved IT/Cyber Security Policy
2. Dedicated CISO appointment
3. Security Operations Centre (SOC)
4. Vulnerability Assessment and Penetration Testing (VAPT)
5. Incident reporting to RBI within 2-6 hours
6. Customer data protection measures
Central Electricity Authority Cyber Security Guidelines:
1. SCADA/ICS security measures
2. Air-gapped networks for critical systems
3. OT/IT segmentation
4. Incident response plan
5. Regular security audits
6. Personnel training