AGL 40.00 No Change ▼ 0.00 (0%)
AIRLINK 129.06 Decreased By ▼ -0.47 (-0.36%)
BOP 6.75 Increased By ▲ 0.07 (1.05%)
CNERGY 4.49 Decreased By ▼ -0.14 (-3.02%)
DCL 8.55 Decreased By ▼ -0.39 (-4.36%)
DFML 40.82 Decreased By ▼ -0.87 (-2.09%)
DGKC 80.96 Decreased By ▼ -2.81 (-3.35%)
FCCL 32.77 No Change ▼ 0.00 (0%)
FFBL 74.43 Decreased By ▼ -1.04 (-1.38%)
FFL 11.74 Increased By ▲ 0.27 (2.35%)
HUBC 109.58 Decreased By ▼ -0.97 (-0.88%)
HUMNL 13.75 Decreased By ▼ -0.81 (-5.56%)
KEL 5.31 Decreased By ▼ -0.08 (-1.48%)
KOSM 7.72 Decreased By ▼ -0.68 (-8.1%)
MLCF 38.60 Decreased By ▼ -1.19 (-2.99%)
NBP 63.51 Increased By ▲ 3.22 (5.34%)
OGDC 194.69 Decreased By ▼ -4.97 (-2.49%)
PAEL 25.71 Decreased By ▼ -0.94 (-3.53%)
PIBTL 7.39 Decreased By ▼ -0.27 (-3.52%)
PPL 155.45 Decreased By ▼ -2.47 (-1.56%)
PRL 25.79 Decreased By ▼ -0.94 (-3.52%)
PTC 17.50 Decreased By ▼ -0.96 (-5.2%)
SEARL 78.65 Decreased By ▼ -3.79 (-4.6%)
TELE 7.86 Decreased By ▼ -0.45 (-5.42%)
TOMCL 33.73 Decreased By ▼ -0.78 (-2.26%)
TPLP 8.40 Decreased By ▼ -0.66 (-7.28%)
TREET 16.27 Decreased By ▼ -1.20 (-6.87%)
TRG 58.22 Decreased By ▼ -3.10 (-5.06%)
UNITY 27.49 Increased By ▲ 0.06 (0.22%)
WTL 1.39 Increased By ▲ 0.01 (0.72%)
BR100 10,445 Increased By 38.5 (0.37%)
BR30 31,189 Decreased By -523.9 (-1.65%)
KSE100 97,798 Increased By 469.8 (0.48%)
KSE30 30,481 Increased By 288.3 (0.95%)

ISLAMABAD: The Ministry of Information Technology and Telecommunication has drafted National Cyber Security Policy 2021, with guiding principle regard a cyber-attack on Pakistan as an act of aggression against national sovereignty and will defend itself with appropriate response measures and will act in accordance with national and international laws and expect reciprocal respect of our national digital sovereignty.

The draft policy envisages developing secure and resilient cyber systems and networks for national cyber security and response.

The policy framework envisaged to secure entire cyberspace of Pakistan including all information and communication systems used in both public and private sectors.

The objective of the policy is to establish a governance and institutional framework for secure cyber ecosystem, create protection and information sharing mechanism (CERTs/ SOCs) at all tiers capable to monitor, detect, protect and respond against threats to national ICT/CII infrastructures, protect National Critical Information Infrastructure by mandating national security standards and processes related to the design, acquisition, development, use and operation of information systems, enhance security of government information systems and infrastructure, create an information assurance framework of audits and compliance for all entities in both public and private sectors, ensure integrity of ICT products, systems and services by establishing a mechanism of testing, screening, forensics and accreditation, develop public private partnerships and collaborative mechanism through technical and operational cooperation, create a country wide culture of cyber security awareness through mass communication and education programs, develop and create skilled cyber security professionals through capacity building, skill development and training programs.

To mitigate cyber threats the country faces today and to improve the national cyber security outlook, it is imperative to undertake the strengthening of national cyber security capabilities through development of essential and well-coordinated mechanisms, implementation of security standards and regulations under a policy and legislative framework, it added.

The guiding principles to achieve policy objectives are; all actions will be driven by the need to protect people and enhance national and public prosperity, respective public and private organizations will be responsible to ensure cyber security of their online data, services, ICT products and systems, in case of any incident, government will lead the national response with support from both public and private sector, will regard a cyber-attack on Pakistan CI/CII as an act of aggression against national sovereignty and will defend itself with appropriate response measures and will act in accordance with national and international laws and expect reciprocal respect of our national digital sovereignty.

To achieve the objectives, an implementation framework shall be developed by a designated organization of the federal government, dealing with the subject of cyber security.

This organisation shall also act at the central entity at the federal level for coordination and implementing all cyber security-related matters.

National Level: The Central Entity along with its National Computer Emergency Response Team (nCERT) and National Security Operation Center (nSOC).

Sectoral Level: Sectoral Regulator(s)/ CERTs (Defense, Telecom, Banking and finance, Power, Federal and Provincial public sector).

Organizational Level: Enterprises, entities and individual users.

The Central Entity will also undertake specific actions which including but not limited to the following: working with Internet Service Providers (ISP) and telecom operators to block malware attacks, by restricting access to specific domains or websites that are known sources of malware (known as Domain Name System (DNS) blocking/filtering), preventing email phishing and spoofing activity on public networks, promoting security best practice through internet governance organisations; such as Internet Corporation for Assigned Names and Numbers (ICANN), the Internet Engineering Task Force (IETF), European Regional Internet Registry (RIPE) and UN Internet Governance Forum (IGF) etc; Work with international law enforcement channels to protect Pakistan citizens from cyber-attacks from unprotected infrastructure overseas; Work towards implementation of controls to secure the routing of internet traffic for government departments to avoid illegitimately re-routed by malicious actors; Investing in capabilities enhancement programs of law enforcement agencies (LEAs) and concerned ministries/divisions to enable them for response against state-sponsored and criminal cyber activities targeting Pakistan networks and systems.

The Central Entity will initiate actions, including but not limited to: develop an Internet Protocol (IP) reputation service to protect government digital services (this would allow online services to get information about an IP address connecting to them, helping the service get more informed on risk management decisions in real time), seek to install products on government networks to ensure that software are running correctly and not being maliciously interfered, look to expand beyond the gov.pk domain into other digital services measures that notify users who are running out-of-date browsers.

To achieve this critical objective, the Central Entity will; operate requisite technical platforms to protect National Critical Information Infrastructure and work as nodal organization in the country; Institute processes for identification, prioritization, assessment and protection of Critical Information Infrastructure, ensure secure ICT environment including mobile systems and cloud based solutions through state of the art security measures, mandate implementation of national security standards by all critical sector entities, to reduce the risk of disruption, develop a mechanism for protection of Critical Information Infrastructure and its integration at the entity level through relevant sectoral CERTs, establish and enforce risk management methodologies according to international standards inter alia ISO/IEC 27005:2008 and ISACA RISK IT etc, mandate all operators of national, provincial and organisational Critical Information Infrastructure to hire qualified information security individuals and add an appointment of Chief Information Security Officer (CISO).

To cater for specific need of public sector information infrastructure, the Central Entity will: define and enforce a robust Government Authentication and Data Protection Framework, create vulnerability assessment and patch management process for all government technical systems, work with relevant government entities to ensure mandatory allocation of a certain percentage of ICT project budget for Information Security Assurance, formulate a mechanism for creation and enforcement of staff vetting and clearance scheme across the government, improve security in government outsourcing and procurement through vetting of suppliers and enforcement of security clauses in contracts.

The implementation mechanism provided for this policy may require considerable time in order to be completely functional.

Therefore, during this interim time period, the capacities and capabilities which state organizations and institutions currently have and are supportive of the implementation of this policy will be utilized and their continual use will be integrated with all encompassing implementation mechanism.

The Pakistan Telecommunication Authority as per Telecom Act 1996, Telecommunications Policy 2015 and PECA 2016 will implement telecom sector technical platform (sectoral CERT as provided herein) in collaboration with the telecom industry.

Copyright Business Recorder, 2021

Comments

Comments are closed.