ASEAN Critical Information Infrastructure Protection Framework

The main purpose of the study and its point of action is to develop regional critical information infrastructure (CII) resilience practices by identifying CII that have strategic imperatives and developing coordinated approaches for cybersecurity protection. The scope of this project study is based on the ASEAN ICT Masterplan 2020 which aims to strengthen information security and assurance among ASEAN Member States (AMS).

ASEAN CRITICAL INFORMATION
INFRASTRUCTURE PROTECTION
FRAMEWORK
ASEAN CRITICAL INFORMATION
INFRASTRUCTURE PROTECTION
FRAMEWORK
Table of Contents
Introduction 1
Methodology 1
Results and Deliverable Outcome 1
I. Identifying CIIs that Have Strategic Imperatives 1
1. Identify National CIIs, Common Regional CIIs, and Cross-border CIIs Dependency
2. Identify Key Decision-making Factors to Help Identifying National CII of the AMS Who Have
Not Yet Defined Their CIIs
3. Identify Cross-border CII Dependency Risk Perception
II. Developing Coordinated Approaches for Cybersecurity Protection 4
4. Identify Common CII Sectors that Are “Sensitive” and “Feasible” for Information Sharing
among ASEAN
5. Identify Supports Needed to Raise the Protection Levels of CII Across All AMS
6. Identify Actions Needed to Enhance Information Sharing and Regional Collaboration to Raise
the CIIP Levels Across All AMS.
7. Identify Status and the Ways to Promote Bilateral or Multilateral Cooperation and
Agreements to Improve the CII Protection Levels in ASEAN
Framework Recommendation 5
ASEAN Critical Information Infrastructure Protection (CIIP) Framework 6
1. Policy Coordination,
2. Identifying CIIs,
3. Protecting CIIs,
4. Information Sharing,
5. Incident Response, and
6. Capacity Building.
Way Forward 9
1
Summary of
ASEAN Critical Information Infrastructure
Protection Framework Project
Introduction
The main purpose of the study and its point of action is to develop regional critical information
infrastructure (CII) resilience practices by identifying CII that have strategic imperatives and
developing coordinated approaches for cybersecurity protection. The scope of this project study
is based on the ASEAN ICT Masterplan 2020 which aims to strengthen information security and
assurance among ASEAN Member States (AMS).
Methodology
The project study approached its objectives in four stages. The first stage is conducting research
on country overviews dealing with AMS CII approaches, concept and definition, cross-border and
CII interdependencies, cybersecurity policy, strategies, and laws for CII protection. The second
stage is conducting the survey among AMS coordinating authorities or national cybersecurity
experts while the third stage included the sharing of best practices by experts with advanced or
long-time experience with CII protection. Last, a roundtable discussion was held where AMS
participants discussed the survey results, provided mutual agreements on different challenges,
and shared their perspectives, experiences, and implications towards a common goal of building
CII resilience to secure and protect information security in the region.
Results and Deliverable Outcome
The project study has reached its objectives and achievements which include (I) identifying CIIs
that have strategic imperatives and (II) developing coordinated approaches for cybersecurity
protection. The project results and deliverable outcome will be described by the 7 key findings
which consists of the following:
I. Identifying CIIs that Have Strategic Imperatives
1. Identify National CIIs, Common Regional CIIs, and Cross-border CIIs Dependency
Beyond national CIIs of the 7 AMS that have been previously defined (Brunei, Indonesia,Malaysia,
Philippines, Singapore, Thailand, and Vietnam), the project study identifies potential national CIIs
of the remaining AMS who have not yet defined their CIIs and participated in the survey
(Cambodia and Laos) and reached a common AMS CII.* These sectors are Government Agency,
2
Energy & Utilities, Banking/Financial Services, and Information/Communications/Telecommunications
(ICT)
Common AMS Critical Information Infrastructure (CII)*
1) Government Agency
2) Energy & Utilities
3) Banking/Financial Services
4) ICT
(* Not represented or related to cross-border CII or CII Interdependency)
Cross-border CII dependency, in other words, CIIs that could have high cross-border
cybersecurity risk impacts in the region is also investigated and identified. On a scale of ‘none’ to
‘high’ (where 0 = none, 1= low, 2 = medium, and 3 = high), the project study indicates most AMS
do not perceive or are aware of a high level of cross-border sectoral dependency in the region at
this moment. However, Information/Communications/Telecommunications (ICT) is the sector
that most AMS consider posing highest cross-border cybersecurity risk impacts in ASEAN. Other
Sector/Service/
Industry
Brunei Indonesia Malaysia Philippines Singapore Thailand Vietnam
Common
Cambodia
and
Lao PDR
# Numbers 8 10 10 12 11 7 11 Potential
1
Government
Agency/Ministry
✓
1. Law
Enforcement
2. E-GOV’T
GOV’T
(including
E-GOV’T)
GOV'T GOV'T GOV'T
1. E-GOV'T
2. Smart-
City
3. Natural
Resources
✓
2
Energy and/or
Utilities ✓
Energy and
Mineral
✓ ✓ ✓
✓ ✓ ✓
3 Water ✓ ✓ ✓ ✓
4
Banking/Financial
Services
✓ ✓
1. Banking
2. Finance
✓ ✓ ✓
1. Banking
2. Finance
✓
5 Healthcare Services ✓ ✓ ✓ ✓ ✓ ✓ ✓ 
6 ICT ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓
7 Transportation ✓ ✓ ✓
1. Land
2. Maritime
3. Air
1. Land
2. Maritime
3. Aviation
✓ ✓
8
Defense & Security
Services
Defense
Defense &
Strategic
Industry
(Resilience)
Defence &
Security
 Security &
Emergency
Services
✓ ✓
9 Emergency Services  ✓ ✓ ✓  ✓
10
Media & Public
Communications
   ✓ ✓  
11 E-Government ✓      
12
Food and
Agriculture
 Food Security ✓    
13
Business Process
Outsourcing (BPO)
   ✓   
3
sectors include Energy & Utilities, Government Agency, Transportation, and Banking/Financial
sectors, respectively.
AMS perception of cross-border CII Dependency Ranked
highest to lowest
1st ICT
2nd Energy & Utilities
3rd Government Agency/Ministry
4th Transportation
5th Banking/Financial Services
2. Identify Key Decision-making Factors to Help Identifying National CII of the AMS
Who Have Not Yet Defined Their CIIs
The project study combines and compares key decision-making factors to identify national CIIs
of AMS who have not yet defined their CIIs to those of AMS who already have CIIs. It has been
concluded that Impact on the Economy is the most important key decision-making factor that
was considered in identifying the national CIIs by all AMS.
Rank
Common Decision-Making Factors to Identify National CIIs
By the AMS
which already have CIIs defined
By the (Perception of) AMS
which have not defined their CIIs
1st
Impact on the economy
Impact on the public safety
Impact on the economy
Impact on the national security and defense
2nd
Impact on the national security and defense
Impact on the public health
Reliance on digital technologies
Impact on the gov’t capabilities to function
3rd
Impact on the public order and social well-
being
Impact on the national image
Impact on the gov’t capabilities to function
Impact on the public order and social well-
being
Impact on the public safety
Impact on the public health
4th Reliance on digital technologies Impact on the national image
Other Impact on the personal data violation
3. Identify Cross-border CII Dependency Risk Perception
The project study indicates that significant risks related to cross-border CII dependency are (1)
technological risks, (2) legal and procedural risks, and (3) social or cultural aspects.
Top technological risks include specific threats and risks (geographic risks: disruption of regional
network in one region) and man-made hazards (lack of technical expertise, operating errors, and
failure of systems). In addition, AMS have identified that threats and incidents that are likely to
have the most influence on ASEAN cross-border dependencies include availability (such as a
DDos attack), intrusion attempts, and malicious code.
Legal and procedural risks include the differences in legislation and policy (on an international
level) and the lack of equivalent security standards (on the ASEAN level). Most AMS also pointed
4
out risks in social or cultural aspect to be considered such as lack of information sharing for both
reactive and preventive activities, lack of trust, and difference in threat perception.
II. Developing Coordinated Approaches for Cybersecurity Protection
4. Identify Common CII Sectors that Are “Sensitive” and “Feasible” for Information
Sharing among ASEAN
The project study finds the most “sensitive” sectors for regional information sharing are Defense
and Security, Financial Services, and Government Agency/Ministry and the most “feasible” sectors
for information sharing among AMS are Media & Public Communications, Food and Agriculture,
and Transportation, respectively.
Most Sensitive Sectors
for AMS Information Sharing
Ranked highest to lowest
Most Feasible Sectors
for AMS Information Sharing
Ranked highest to lowest
1st Defense and Security
2nd Financial Services
3rd Government Agency/Ministry
1st Media & Public Communications
2nd Food and Agriculture
3rd Transportation
Transportation, however, is the sector that most AMS consider pose comparatively high cross-
border cybersecurity risk impacts in the region as well as being feasible for information sharing
among AMS. Therefore, the sector that AMS should consider starting and focusing on
information sharing for CII protection at this moment is the Transportation sector.
5. Identify Supports Needed to Raise the Protection Levels of CII Across All AMS
In order to increase the protection level of CII across all AMS, the following supports needed
among AMS are:
5.1 Enhancing information sharing among AMS.
5.2 Identifying their own CII assets and CIIP responsibilities as well as the member’s
dependency among AMS.
5.3 Empowering point of contact of organizations that can respond and coordinate
(aside from legislation, capacity building, and the budget) among ASEAN.
5.4 Adopting a regional CIIP framework which will be the basis and baseline for each
AMS in identifying and protecting CIIs in the region.
5.5 Developing a joint consensus to protect the CII and to ensure security and
resilience in each AMS and ASEAN.
5.6 Having a forum or working group for CIIP initiatives.
5.7 Being committed to support CII operators to achieve regional security standard
level and ensure countermeasuresof each AMS and ASEAN such as building human
resource capacity through training programs, workshops, and others relevant
activities.
The projec study finds the supports most needed by AMS in order to raise the CII protection
levels in the region is Information Sharing.
5
6. Identify Actions Needed to Enhance Information Sharing and Regional
Collaboration to Raise the CIIP Levels Across All AMS.
In order to enhance information sharing and regional collaboration to raise the CII protection
levels across the region, the major actions needed and recommended are:
6.1 Establishing an ASEAN Information Sharing and Analysis Center (ASEAN-ISAC).
6.2 Developing information sharing pilot projects for Transportation and ICT sectors.
(since both sectors are considered to pose the greatest cross-border cybersecurity
risk impacts in the region and to be feasible for comparative information sharing
among AMS).
6.3 Developing a trusted platform and building a communication forum among AMS
and ASEAN CII operators on provisions regarding cyber threats information
related to the CIIP.
7. Identify Status and the Ways to Promote Bilateral or Multilateral Cooperation and
Agreements to Improve the CII Protection Levels in ASEAN
Regarding the status of regional collaboration, the project study finds AMS are not aware of any
existing cooperation or agreements on CII protection at this moment. However, there could be
some form of AMS collaborations on CIIP that participating AMS may not recognize.
In order to promote bilateral or multilateral cooperation and agreement on CII protection levels
in the region, AMS has suggested the following:
7.1 Developing a CII sector-based approach by sharing functions and information,
having bilateral agreements on a sector-by-sector basis and then from country to
country, expanding to multilateral agreements before proceeding to an ASEAN
platform, and moving towards essential practical implementations. At the same
time, revising the existing agreements and instruments on ICT and/or
cybersecurity in CIIP specific clauses if possible.
7.2 Developing a regulatory body that can receive AMS information from each
recognized CII sector and having one central organization to collect and distribute
data in the region.
Framework Recommendation
In moving towards ASEAN’s initiative to strengthen information security and assurance among
AMS, the project study addressed a comprehensive ASEAN Critical Information Infrastructure
Protection (CIIP) Framework which provides strategic recommendations and coordinated
approaches to create more resilient cybersecurity across ASEAN’s critical information
infrastructure as follows:
Six pillars of ASEAN Critical Information Infrastructure Protection Framework
(1) Policy Coordination,
(2) Identifying CIIs,
(3) Protecting CIIs,
6
(4) Information Sharing,
(5) Incident Response, and
(6) Capacity Building.
Diagram: 6 Pillars of ASEAN Critical Information Infrastructure Protection Framework
7
1. Policy Coordination
Policy coordination among AMS through mutually agreed coordinating mechanisms which
support and promote collaborative activities across AMS borders, sectors and organizations is
essential to the security of the CIIs within the ASEAN region.
AMS are encouraged to:
➢ Develop bilateral and/or multilateral cooperative agreements to enhance security of inter-
dependent CIIs within ASEAN.
➢ Implement and enhance Public-Private Partnerships, Business Continuity Management,
Crisis Management, and sets of cyber incident exercises and tests.
➢ Establish national and regional Points of Contact (POC) for the ASEAN network of
cybersecurity experts and organizations.
➢ Participate in cyber norm development activities at the regional and global levels such as
the 2015 UNGGE recommendations that were endorsed by the ASEAN Ministerial
Conference on Cybersecurity (AMCC) and the Global Forum on Cyber Expertise (GCFE)
Meridian Good Practice Guide on Critical Information Infrastructure Protection.
2. Identifying CIIs
Identifying ASEAN CIIs and their potential cross-border interdependency is the first step toward
making ASEAN CIIs more resilient and ensuring continuity of essential CII service delivery across
the region.
AMS are encouraged to:
➢ Identify national CIIs (if not yet defined) and their cross-border CII interdependency in the
region.
➢ Identify cross-border CII dependency measures (including legal, regulatory, policy, and
strategy), cross-border CII dependency risks, and how to assess and mitigate those risks.
➢ Coordinate the development of national regulation and legislation which governs cross-
border interdependent CIIs.
3. Protecting CIIs
Effective CII protection practices in each AMS including implementationof a minimumprotection
requirement, procedural mechanisms and guidelines (especially among the CIIs that are cross-
border interdependent), determine holistic ASEAN CII resilience.
AMS are encouraged to:
➢ Implement industry-recognized CIIP procedural mechanisms and guidelines such as the
NIST Framework for Improving Critical Infrastructure Cybersecurity.
➢ Develop national and regional backup and recovery strategies to safeguard critical
information and increase resilience across the ASEAN region.
8
➢ Prioritize protectionof CIIs with high cross-border cybersecurityrisk impactsincluding (1)
energy and utilities, (2) transportation and (3) ICT sectors.
4. Information Sharing
Information sharing is a collaborative effort and a shared responsibility to enrich and improve
CII resilience practices through standardization at operational, regulatory, institutional and
policy levels across the ASEAN region.
AMS are encouraged to:
➢ Support the development of regional information sharing and collaboration platforms on
CIIP such as ASEAN Information Sharing and Analysis Center (ASEAN-ISAC).
➢ Formalize the format of information exchanges and the general terms/provisions of the
sharing agreement.
➢ Implement timely information sharing about the occurrence of cybersecurity incidents.
5. Incident Response
The ability to respond to CII security incidents in a timely and effective manner is critically
important to maintaining CII resilience. A coordinated approach should be employed when
dealing with incidents related to cross-border interdependent CIIs.
AMS are encouraged to:
➢ Enhance incident response effectiveness through cooperation, communication and
coordination among national CERTs.
➢ Support the establishment of a regional cybersecurity incident response capability, such as
the ASEAN Computer Emergency Response Team (ASEAN CERT), to support AMS national
CERTs and cybersecurity incident response agencies.
➢ Promote regional incident response readiness through the ASEAN Computer Emergency
Response Team Incident Drill (ACID) throughout the ASEAN region.
6. Capacity Building
Coordinated efforts to develop cybersecurity capacity to protect CIIs is a high priority for ASEAN
as the demand for cybersecurity experts continues to grow and remains a significant challenge.
AMS are encouraged to:
➢ Coordinate cybersecurity skills refresh and upgrade programs, including regular
provisional cybersecurity exercises.
➢ Define regional requirements and assess the effectivenessof capacity building efforts in the
region.
9
➢ Strengthen ASEAN-wide cybersecurity capacity building programs including the courses
offered by the ASEAN-Japan Cybersecurity Capacity Building Centre (AJCCBC), the ASEAN
Singapore Cybersecurity Centre of Excellence (ASCCE) and other ASEAN dialogue partners.
The ASEAN Critical Information Infrastructure Protection Framework should consist of current
and continually updated actions put into practice and improved as AMS provides feedback on
implementation progress which can then be integrated into future versions. The Framework can
be used to align cybersecurity decisions to mission objectives; organize cybersecurity
requirements originating from legislation, regulation, policy, and industry best practices;
communicate cybersecurity requirements with stakeholders, including partners and suppliers;
integrate privacy and civil liberties risk management into cybersecurity activities; measure and
express its current and desired state; prioritize cybersecurity resources and activities; and
analyze trade-offs between expenditure and risk.
Way Forward
As ASEAN prepares to deploy its Digital Masterplan 2025, the ASEAN Critical Information
Infrastructure Protection Framework will play a crucial role in building and ensuring CII
resilience, trust and security. This Framework will strengthen regional CII resilience and prevent
any potential escalation of cyber threats that could lead to national harm, disruption of services
and even loss of life. The adoption of this unified, flexible and practical protection framework will
encourage further cooperation, communication and collaboration among AMS across the region
to advance the vision of a secure ASEAN community.
Furthermore, bearing in mind that the scope of what one country considers CIIs may vary over
time and be influenced by a multitude of factors, it is recommended that ASEAN review, update
and re-assess the Framework and recommendations on a regular interval, such as every 2-3
years.

Recommandé

Security Audit View par
Security Audit ViewSecurity Audit View
Security Audit ViewPLN9 Security Services Pvt. Ltd.
3.2K vues8 diapositives
Soc par
SocSoc
SocMukesh Chaudhari
712 vues9 diapositives
Cyber threat intelligence: maturity and metrics par
Cyber threat intelligence: maturity and metricsCyber threat intelligence: maturity and metrics
Cyber threat intelligence: maturity and metricsMark Arena
9.4K vues37 diapositives
Security Information and Event Management (SIEM) par
Security Information and Event Management (SIEM)Security Information and Event Management (SIEM)
Security Information and Event Management (SIEM)k33a
43K vues41 diapositives
Chapter 11 laws and ethic information security par
Chapter 11   laws and ethic information securityChapter 11   laws and ethic information security
Chapter 11 laws and ethic information securitySyaiful Ahdan
6.1K vues39 diapositives
6 Physical Security par
6 Physical Security6 Physical Security
6 Physical SecurityAlfred Ouyang
39.2K vues60 diapositives

Contenu connexe

Tendances

Singapore's National Cyber Security Strategy par
Singapore's National Cyber Security StrategySingapore's National Cyber Security Strategy
Singapore's National Cyber Security StrategyBenjamin Ang
3.1K vues27 diapositives
Integrated Compliance Webinar.pptx par
Integrated Compliance Webinar.pptxIntegrated Compliance Webinar.pptx
Integrated Compliance Webinar.pptxControlCase
621 vues30 diapositives
Telecom Network & SIEM logs analysis using machine learning par
Telecom Network & SIEM logs analysis using machine learningTelecom Network & SIEM logs analysis using machine learning
Telecom Network & SIEM logs analysis using machine learningALTANAI BISHT
154 vues34 diapositives
Building Security Operation Center par
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation CenterS.E. CTS CERT-GOV-MD
28.7K vues37 diapositives
Audit of it infrastructure par
Audit of it infrastructureAudit of it infrastructure
Audit of it infrastructurepramod_kmr73
20.8K vues32 diapositives
Electronics Surveillance par
Electronics SurveillanceElectronics Surveillance
Electronics SurveillanceKodok Ngorex
2.8K vues16 diapositives

Tendances(20)

Singapore's National Cyber Security Strategy par Benjamin Ang
Singapore's National Cyber Security StrategySingapore's National Cyber Security Strategy
Singapore's National Cyber Security Strategy
Benjamin Ang3.1K vues
Integrated Compliance Webinar.pptx par ControlCase
Integrated Compliance Webinar.pptxIntegrated Compliance Webinar.pptx
Integrated Compliance Webinar.pptx
ControlCase621 vues
Telecom Network & SIEM logs analysis using machine learning par ALTANAI BISHT
Telecom Network & SIEM logs analysis using machine learningTelecom Network & SIEM logs analysis using machine learning
Telecom Network & SIEM logs analysis using machine learning
ALTANAI BISHT154 vues
Audit of it infrastructure par pramod_kmr73
Audit of it infrastructureAudit of it infrastructure
Audit of it infrastructure
pramod_kmr7320.8K vues
Electronics Surveillance par Kodok Ngorex
Electronics SurveillanceElectronics Surveillance
Electronics Surveillance
Kodok Ngorex2.8K vues
Cybersecurity concepts & Defense best practises par WAJAHAT IQBAL
Cybersecurity concepts & Defense best practisesCybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practises
WAJAHAT IQBAL2.4K vues
The Concept of Network Centric Warfare feat. India par Subhasis Hazra
The Concept of Network Centric Warfare feat. IndiaThe Concept of Network Centric Warfare feat. India
The Concept of Network Centric Warfare feat. India
Subhasis Hazra6.6K vues
RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio... par Adam Pennington
RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...
RH-ISAC Summit 2019 - Adam Pennington - Leveraging MITRE ATT&CK™ for Detectio...
Adam Pennington3.8K vues
The information security audit par Dhani Ahmad
The information security auditThe information security audit
The information security audit
Dhani Ahmad9.8K vues
Cisco Web and Email Security Overview par Cisco Security
Cisco Web and Email Security OverviewCisco Web and Email Security Overview
Cisco Web and Email Security Overview
Cisco Security26.5K vues
An introduction to SOC (Security Operation Center) par Ahmad Haghighi
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
Ahmad Haghighi22.5K vues
Q radar architecture deep dive par Kamal Mouline
Q radar architecture   deep diveQ radar architecture   deep dive
Q radar architecture deep dive
Kamal Mouline627 vues
Cyber Security Threats in the Financial Sector par Farook Al-Jibouri
Cyber Security Threats in the Financial SectorCyber Security Threats in the Financial Sector
Cyber Security Threats in the Financial Sector
Farook Al-Jibouri1.1K vues
Integrating Physical And Logical Security par Jorge Sebastiao
Integrating Physical And Logical SecurityIntegrating Physical And Logical Security
Integrating Physical And Logical Security
Jorge Sebastiao10.3K vues
CompTIA PenTest+: Everything you need to know about the exam par Infosec
CompTIA PenTest+: Everything you need to know about the examCompTIA PenTest+: Everything you need to know about the exam
CompTIA PenTest+: Everything you need to know about the exam
Infosec635 vues
Cyber security career development paths par Chelsea Jarvie
Cyber security career development pathsCyber security career development paths
Cyber security career development paths
Chelsea Jarvie2.4K vues
Threat Intelligence in Cyber Risk Programs par Rahul Neel Mani
Threat Intelligence in Cyber Risk ProgramsThreat Intelligence in Cyber Risk Programs
Threat Intelligence in Cyber Risk Programs
Rahul Neel Mani1.4K vues

Similaire à ASEAN Critical Information Infrastructure Protection Framework

CTO-Cybersecurity-2010-Dr. Martin Koyabe par
CTO-Cybersecurity-2010-Dr. Martin KoyabeCTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin Koyabesegughana
505 vues14 diapositives
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's par
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sDr Lendy Spires
206 vues6 diapositives
Guideline Thailand Cybersecure Strate Digital Economy par
Guideline Thailand Cybersecure Strate Digital EconomyGuideline Thailand Cybersecure Strate Digital Economy
Guideline Thailand Cybersecure Strate Digital EconomySettapong_CyberSecurity
255 vues6 diapositives
2015_ICMSS_Institutional_Cybersecurity_s02 par
2015_ICMSS_Institutional_Cybersecurity_s022015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s02Government
151 vues6 diapositives
Sophos Endpoint Protection par
Sophos Endpoint ProtectionSophos Endpoint Protection
Sophos Endpoint ProtectionSarah Michalak
4 vues40 diapositives
Why the Private Sector is Key to Cyber Defence par
Why the Private Sector is Key to Cyber DefenceWhy the Private Sector is Key to Cyber Defence
Why the Private Sector is Key to Cyber DefenceGareth Niblett
585 vues16 diapositives

Similaire à ASEAN Critical Information Infrastructure Protection Framework(20)

CTO-Cybersecurity-2010-Dr. Martin Koyabe par segughana
CTO-Cybersecurity-2010-Dr. Martin KoyabeCTO-Cybersecurity-2010-Dr. Martin Koyabe
CTO-Cybersecurity-2010-Dr. Martin Koyabe
segughana505 vues
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's par Dr Lendy Spires
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT'sWSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
WSIS10 Action Line C5 Building Confidence and Security in the use of ICT's
Dr Lendy Spires206 vues
2015_ICMSS_Institutional_Cybersecurity_s02 par Government
2015_ICMSS_Institutional_Cybersecurity_s022015_ICMSS_Institutional_Cybersecurity_s02
2015_ICMSS_Institutional_Cybersecurity_s02
Government151 vues
Why the Private Sector is Key to Cyber Defence par Gareth Niblett
Why the Private Sector is Key to Cyber DefenceWhy the Private Sector is Key to Cyber Defence
Why the Private Sector is Key to Cyber Defence
Gareth Niblett585 vues
Identify Vulnerabilities Within The Information Security... par Carla Bennington
Identify Vulnerabilities Within The Information Security...Identify Vulnerabilities Within The Information Security...
Identify Vulnerabilities Within The Information Security...
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx par bagotjesusa
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxSECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
bagotjesusa3 vues
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA par GovCloud Network
Improving Cybersecurity and Resilience Through Acquisition   Emile Monette GSAImproving Cybersecurity and Resilience Through Acquisition   Emile Monette GSA
Improving Cybersecurity and Resilience Through Acquisition Emile Monette GSA
GovCloud Network1.8K vues
Global Maritime Cyber Strategy par Ian Kelly
Global Maritime Cyber StrategyGlobal Maritime Cyber Strategy
Global Maritime Cyber Strategy
Ian Kelly417 vues
Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f... par Carolin Weisser
Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...
Lessons Learned from Implementing the Cybersecurity Capacity Maturity Model f...
Carolin Weisser229 vues
Cybersecurity: Connectivity, Collaboration and Security Controls par Kristian Alisasis Pura
Cybersecurity: Connectivity, Collaboration and Security ControlsCybersecurity: Connectivity, Collaboration and Security Controls
Cybersecurity: Connectivity, Collaboration and Security Controls
The Trade Between Canada And Canada par Amanda Marie
The Trade Between Canada And CanadaThe Trade Between Canada And Canada
The Trade Between Canada And Canada
Amanda Marie7 vues
The National Cyber Security Strategy: Success Through Cooperation par Mark Johnson
The National Cyber Security Strategy: Success Through CooperationThe National Cyber Security Strategy: Success Through Cooperation
The National Cyber Security Strategy: Success Through Cooperation
Mark Johnson1K vues
Deepening the knowledge on information security management in developing coun... par Alexander Decker
Deepening the knowledge on information security management in developing coun...Deepening the knowledge on information security management in developing coun...
Deepening the knowledge on information security management in developing coun...
Alexander Decker206 vues
Sample Cloud Security - Financial Services par ResearchFox
Sample Cloud Security - Financial ServicesSample Cloud Security - Financial Services
Sample Cloud Security - Financial Services
ResearchFox206 vues
Critical Information Infrastructure Cyberspace Situational Awareness_Measure ... par DaveNjoga1
Critical Information Infrastructure Cyberspace Situational Awareness_Measure ...Critical Information Infrastructure Cyberspace Situational Awareness_Measure ...
Critical Information Infrastructure Cyberspace Situational Awareness_Measure ...
DaveNjoga14 vues

Plus de ETDAofficialRegist

ความเสี่ยงของข้อมูลที่เปิดเผยสู่สาธารณะ ภัยคุกคามด้านเทคโนโลยีสารสนเทศต่อภาครัฐ par
ความเสี่ยงของข้อมูลที่เปิดเผยสู่สาธารณะ ภัยคุกคามด้านเทคโนโลยีสารสนเทศต่อภาครัฐความเสี่ยงของข้อมูลที่เปิดเผยสู่สาธารณะ ภัยคุกคามด้านเทคโนโลยีสารสนเทศต่อภาครัฐ
ความเสี่ยงของข้อมูลที่เปิดเผยสู่สาธารณะ ภัยคุกคามด้านเทคโนโลยีสารสนเทศต่อภาครัฐETDAofficialRegist
824 vues82 diapositives
Value of e-Commerce Survey in Thailand 2019 par
Value of e-Commerce Survey in Thailand 2019Value of e-Commerce Survey in Thailand 2019
Value of e-Commerce Survey in Thailand 2019ETDAofficialRegist
1.4K vues137 diapositives
Thailand Internet User Behavior 2019 par
Thailand Internet User Behavior 2019Thailand Internet User Behavior 2019
Thailand Internet User Behavior 2019ETDAofficialRegist
434 vues128 diapositives
The Value of E-Commerce Survey in Thailand 2018 par
The Value of E-Commerce Survey in Thailand 2018The Value of E-Commerce Survey in Thailand 2018
The Value of E-Commerce Survey in Thailand 2018ETDAofficialRegist
366 vues148 diapositives
Thailand Internet User Profile 2018 (English Version) par
Thailand Internet User Profile 2018 (English Version)Thailand Internet User Profile 2018 (English Version)
Thailand Internet User Profile 2018 (English Version)ETDAofficialRegist
219 vues146 diapositives
30.03.2020 เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี ... par
 30.03.2020  เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี ... 30.03.2020  เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี ...
30.03.2020 เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี ...ETDAofficialRegist
5K vues26 diapositives

Plus de ETDAofficialRegist(20)

ความเสี่ยงของข้อมูลที่เปิดเผยสู่สาธารณะ ภัยคุกคามด้านเทคโนโลยีสารสนเทศต่อภาครัฐ par ETDAofficialRegist
ความเสี่ยงของข้อมูลที่เปิดเผยสู่สาธารณะ ภัยคุกคามด้านเทคโนโลยีสารสนเทศต่อภาครัฐความเสี่ยงของข้อมูลที่เปิดเผยสู่สาธารณะ ภัยคุกคามด้านเทคโนโลยีสารสนเทศต่อภาครัฐ
ความเสี่ยงของข้อมูลที่เปิดเผยสู่สาธารณะ ภัยคุกคามด้านเทคโนโลยีสารสนเทศต่อภาครัฐ
Thailand Internet User Profile 2018 (English Version) par ETDAofficialRegist
Thailand Internet User Profile 2018 (English Version)Thailand Internet User Profile 2018 (English Version)
Thailand Internet User Profile 2018 (English Version)
30.03.2020 เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี ... par ETDAofficialRegist
 30.03.2020  เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี ... 30.03.2020  เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี ...
30.03.2020 เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี ...
รายงานประจำปี สพธอ. 2561 - ETDA Annual Report 2018 par ETDAofficialRegist
รายงานประจำปี สพธอ. 2561 - ETDA Annual Report 2018รายงานประจำปี สพธอ. 2561 - ETDA Annual Report 2018
รายงานประจำปี สพธอ. 2561 - ETDA Annual Report 2018
เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562 par ETDAofficialRegist
เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562
เอกสารการแถลงผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562
ETDAofficialRegist14.1K vues
รายงานผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562 par ETDAofficialRegist
รายงานผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562รายงานผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562
รายงานผลการสำรวจพฤติกรรมผู้ใช้อินเทอร์เน็ตในประเทศไทย ปี 2562
ETDAofficialRegist6.2K vues
เอกสารการแถลงผลการสำรวจมูลค่าพาณิชย์อิเล็กทรอนิกส์ ปี 2561 par ETDAofficialRegist
เอกสารการแถลงผลการสำรวจมูลค่าพาณิชย์อิเล็กทรอนิกส์ ปี 2561เอกสารการแถลงผลการสำรวจมูลค่าพาณิชย์อิเล็กทรอนิกส์ ปี 2561
เอกสารการแถลงผลการสำรวจมูลค่าพาณิชย์อิเล็กทรอนิกส์ ปี 2561
กฎหมายคุ้มครองข้อมูลส่วนบุคคลกับบริบทการคุ้มครองข้อมูลส่วนบุคคลในกฎหมายอื่น par ETDAofficialRegist
กฎหมายคุ้มครองข้อมูลส่วนบุคคลกับบริบทการคุ้มครองข้อมูลส่วนบุคคลในกฎหมายอื่นกฎหมายคุ้มครองข้อมูลส่วนบุคคลกับบริบทการคุ้มครองข้อมูลส่วนบุคคลในกฎหมายอื่น
กฎหมายคุ้มครองข้อมูลส่วนบุคคลกับบริบทการคุ้มครองข้อมูลส่วนบุคคลในกฎหมายอื่น
ETDAofficialRegist16.2K vues
ผลวิเคราะห์โครงการ mSMEs Scoring par ETDAofficialRegist
ผลวิเคราะห์โครงการ mSMEs Scoringผลวิเคราะห์โครงการ mSMEs Scoring
ผลวิเคราะห์โครงการ mSMEs Scoring
รายงานประจำปีไทยเซิร์ต 2560-2561 par ETDAofficialRegist
รายงานประจำปีไทยเซิร์ต 2560-2561รายงานประจำปีไทยเซิร์ต 2560-2561
รายงานประจำปีไทยเซิร์ต 2560-2561
ETDAofficialRegist1.1K vues
วัยใส วัยเก๋า ฉลาดรู้เน็ต 2 par ETDAofficialRegist
วัยใส วัยเก๋า ฉลาดรู้เน็ต 2วัยใส วัยเก๋า ฉลาดรู้เน็ต 2
วัยใส วัยเก๋า ฉลาดรู้เน็ต 2
ETDAofficialRegist3.3K vues

Dernier

SAP Automation Using Bar Code and FIORI.pdf par
SAP Automation Using Bar Code and FIORI.pdfSAP Automation Using Bar Code and FIORI.pdf
SAP Automation Using Bar Code and FIORI.pdfVirendra Rai, PMP
23 vues38 diapositives
Microsoft Power Platform.pptx par
Microsoft Power Platform.pptxMicrosoft Power Platform.pptx
Microsoft Power Platform.pptxUni Systems S.M.S.A.
53 vues38 diapositives
Case Study Copenhagen Energy and Business Central.pdf par
Case Study Copenhagen Energy and Business Central.pdfCase Study Copenhagen Energy and Business Central.pdf
Case Study Copenhagen Energy and Business Central.pdfAitana
16 vues3 diapositives
PRODUCT PRESENTATION.pptx par
PRODUCT PRESENTATION.pptxPRODUCT PRESENTATION.pptx
PRODUCT PRESENTATION.pptxangelicacueva6
15 vues1 diapositive
20231123_Camunda Meetup Vienna.pdf par
20231123_Camunda Meetup Vienna.pdf20231123_Camunda Meetup Vienna.pdf
20231123_Camunda Meetup Vienna.pdfPhactum Softwareentwicklung GmbH
41 vues73 diapositives
Mini-Track: Challenges to Network Automation Adoption par
Mini-Track: Challenges to Network Automation AdoptionMini-Track: Challenges to Network Automation Adoption
Mini-Track: Challenges to Network Automation AdoptionNetwork Automation Forum
13 vues27 diapositives

Dernier(20)

Case Study Copenhagen Energy and Business Central.pdf par Aitana
Case Study Copenhagen Energy and Business Central.pdfCase Study Copenhagen Energy and Business Central.pdf
Case Study Copenhagen Energy and Business Central.pdf
Aitana16 vues
Future of AR - Facebook Presentation par ssuserb54b561
Future of AR - Facebook PresentationFuture of AR - Facebook Presentation
Future of AR - Facebook Presentation
ssuserb54b56115 vues
HTTP headers that make your website go faster - devs.gent November 2023 par Thijs Feryn
HTTP headers that make your website go faster - devs.gent November 2023HTTP headers that make your website go faster - devs.gent November 2023
HTTP headers that make your website go faster - devs.gent November 2023
Thijs Feryn22 vues
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N... par James Anderson
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
GDG Cloud Southlake 28 Brad Taylor and Shawn Augenstein Old Problems in the N...
James Anderson92 vues
6g - REPORT.pdf par Liveplex
6g - REPORT.pdf6g - REPORT.pdf
6g - REPORT.pdf
Liveplex10 vues
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ... par Jasper Oosterveld
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
ESPC 2023 - Protect and Govern your Sensitive Data with Microsoft Purview in ...
Igniting Next Level Productivity with AI-Infused Data Integration Workflows par Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software280 vues
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive par Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Piloting & Scaling Successfully With Microsoft Viva par Richard Harbridge
Piloting & Scaling Successfully With Microsoft VivaPiloting & Scaling Successfully With Microsoft Viva
Piloting & Scaling Successfully With Microsoft Viva
Business Analyst Series 2023 - Week 3 Session 5 par DianaGray10
Business Analyst Series 2023 -  Week 3 Session 5Business Analyst Series 2023 -  Week 3 Session 5
Business Analyst Series 2023 - Week 3 Session 5
DianaGray10300 vues
PharoJS - Zürich Smalltalk Group Meetup November 2023 par Noury Bouraqadi
PharoJS - Zürich Smalltalk Group Meetup November 2023PharoJS - Zürich Smalltalk Group Meetup November 2023
PharoJS - Zürich Smalltalk Group Meetup November 2023
Noury Bouraqadi132 vues

ASEAN Critical Information Infrastructure Protection Framework

  • 1. ASEAN CRITICAL INFORMATION INFRASTRUCTURE PROTECTION FRAMEWORK ASEAN CRITICAL INFORMATION INFRASTRUCTURE PROTECTION FRAMEWORK
  • 2. Table of Contents Introduction 1 Methodology 1 Results and Deliverable Outcome 1 I. Identifying CIIs that Have Strategic Imperatives 1 1. Identify National CIIs, Common Regional CIIs, and Cross-border CIIs Dependency 2. Identify Key Decision-making Factors to Help Identifying National CII of the AMS Who Have Not Yet Defined Their CIIs 3. Identify Cross-border CII Dependency Risk Perception II. Developing Coordinated Approaches for Cybersecurity Protection 4 4. Identify Common CII Sectors that Are “Sensitive” and “Feasible” for Information Sharing among ASEAN 5. Identify Supports Needed to Raise the Protection Levels of CII Across All AMS 6. Identify Actions Needed to Enhance Information Sharing and Regional Collaboration to Raise the CIIP Levels Across All AMS. 7. Identify Status and the Ways to Promote Bilateral or Multilateral Cooperation and Agreements to Improve the CII Protection Levels in ASEAN Framework Recommendation 5 ASEAN Critical Information Infrastructure Protection (CIIP) Framework 6 1. Policy Coordination, 2. Identifying CIIs, 3. Protecting CIIs, 4. Information Sharing, 5. Incident Response, and 6. Capacity Building. Way Forward 9
  • 3. 1 Summary of ASEAN Critical Information Infrastructure Protection Framework Project Introduction The main purpose of the study and its point of action is to develop regional critical information infrastructure (CII) resilience practices by identifying CII that have strategic imperatives and developing coordinated approaches for cybersecurity protection. The scope of this project study is based on the ASEAN ICT Masterplan 2020 which aims to strengthen information security and assurance among ASEAN Member States (AMS). Methodology The project study approached its objectives in four stages. The first stage is conducting research on country overviews dealing with AMS CII approaches, concept and definition, cross-border and CII interdependencies, cybersecurity policy, strategies, and laws for CII protection. The second stage is conducting the survey among AMS coordinating authorities or national cybersecurity experts while the third stage included the sharing of best practices by experts with advanced or long-time experience with CII protection. Last, a roundtable discussion was held where AMS participants discussed the survey results, provided mutual agreements on different challenges, and shared their perspectives, experiences, and implications towards a common goal of building CII resilience to secure and protect information security in the region. Results and Deliverable Outcome The project study has reached its objectives and achievements which include (I) identifying CIIs that have strategic imperatives and (II) developing coordinated approaches for cybersecurity protection. The project results and deliverable outcome will be described by the 7 key findings which consists of the following: I. Identifying CIIs that Have Strategic Imperatives 1. Identify National CIIs, Common Regional CIIs, and Cross-border CIIs Dependency Beyond national CIIs of the 7 AMS that have been previously defined (Brunei, Indonesia,Malaysia, Philippines, Singapore, Thailand, and Vietnam), the project study identifies potential national CIIs of the remaining AMS who have not yet defined their CIIs and participated in the survey (Cambodia and Laos) and reached a common AMS CII.* These sectors are Government Agency,
  • 4. 2 Energy & Utilities, Banking/Financial Services, and Information/Communications/Telecommunications (ICT) Common AMS Critical Information Infrastructure (CII)* 1) Government Agency 2) Energy & Utilities 3) Banking/Financial Services 4) ICT (* Not represented or related to cross-border CII or CII Interdependency) Cross-border CII dependency, in other words, CIIs that could have high cross-border cybersecurity risk impacts in the region is also investigated and identified. On a scale of ‘none’ to ‘high’ (where 0 = none, 1= low, 2 = medium, and 3 = high), the project study indicates most AMS do not perceive or are aware of a high level of cross-border sectoral dependency in the region at this moment. However, Information/Communications/Telecommunications (ICT) is the sector that most AMS consider posing highest cross-border cybersecurity risk impacts in ASEAN. Other Sector/Service/ Industry Brunei Indonesia Malaysia Philippines Singapore Thailand Vietnam Common Cambodia and Lao PDR # Numbers 8 10 10 12 11 7 11 Potential 1 Government Agency/Ministry ✓ 1. Law Enforcement 2. E-GOV’T GOV’T (including E-GOV’T) GOV'T GOV'T GOV'T 1. E-GOV'T 2. Smart- City 3. Natural Resources ✓ 2 Energy and/or Utilities ✓ Energy and Mineral ✓ ✓ ✓ ✓ ✓ ✓ 3 Water ✓ ✓ ✓ ✓ 4 Banking/Financial Services ✓ ✓ 1. Banking 2. Finance ✓ ✓ ✓ 1. Banking 2. Finance ✓ 5 Healthcare Services ✓ ✓ ✓ ✓ ✓ ✓ ✓  6 ICT ✓ ✓ ✓ ✓ ✓ ✓ ✓ ✓ 7 Transportation ✓ ✓ ✓ 1. Land 2. Maritime 3. Air 1. Land 2. Maritime 3. Aviation ✓ ✓ 8 Defense & Security Services Defense Defense & Strategic Industry (Resilience) Defence & Security  Security & Emergency Services ✓ ✓ 9 Emergency Services  ✓ ✓ ✓  ✓ 10 Media & Public Communications    ✓ ✓   11 E-Government ✓       12 Food and Agriculture  Food Security ✓     13 Business Process Outsourcing (BPO)    ✓   
  • 5. 3 sectors include Energy & Utilities, Government Agency, Transportation, and Banking/Financial sectors, respectively. AMS perception of cross-border CII Dependency Ranked highest to lowest 1st ICT 2nd Energy & Utilities 3rd Government Agency/Ministry 4th Transportation 5th Banking/Financial Services 2. Identify Key Decision-making Factors to Help Identifying National CII of the AMS Who Have Not Yet Defined Their CIIs The project study combines and compares key decision-making factors to identify national CIIs of AMS who have not yet defined their CIIs to those of AMS who already have CIIs. It has been concluded that Impact on the Economy is the most important key decision-making factor that was considered in identifying the national CIIs by all AMS. Rank Common Decision-Making Factors to Identify National CIIs By the AMS which already have CIIs defined By the (Perception of) AMS which have not defined their CIIs 1st Impact on the economy Impact on the public safety Impact on the economy Impact on the national security and defense 2nd Impact on the national security and defense Impact on the public health Reliance on digital technologies Impact on the gov’t capabilities to function 3rd Impact on the public order and social well- being Impact on the national image Impact on the gov’t capabilities to function Impact on the public order and social well- being Impact on the public safety Impact on the public health 4th Reliance on digital technologies Impact on the national image Other Impact on the personal data violation 3. Identify Cross-border CII Dependency Risk Perception The project study indicates that significant risks related to cross-border CII dependency are (1) technological risks, (2) legal and procedural risks, and (3) social or cultural aspects. Top technological risks include specific threats and risks (geographic risks: disruption of regional network in one region) and man-made hazards (lack of technical expertise, operating errors, and failure of systems). In addition, AMS have identified that threats and incidents that are likely to have the most influence on ASEAN cross-border dependencies include availability (such as a DDos attack), intrusion attempts, and malicious code. Legal and procedural risks include the differences in legislation and policy (on an international level) and the lack of equivalent security standards (on the ASEAN level). Most AMS also pointed
  • 6. 4 out risks in social or cultural aspect to be considered such as lack of information sharing for both reactive and preventive activities, lack of trust, and difference in threat perception. II. Developing Coordinated Approaches for Cybersecurity Protection 4. Identify Common CII Sectors that Are “Sensitive” and “Feasible” for Information Sharing among ASEAN The project study finds the most “sensitive” sectors for regional information sharing are Defense and Security, Financial Services, and Government Agency/Ministry and the most “feasible” sectors for information sharing among AMS are Media & Public Communications, Food and Agriculture, and Transportation, respectively. Most Sensitive Sectors for AMS Information Sharing Ranked highest to lowest Most Feasible Sectors for AMS Information Sharing Ranked highest to lowest 1st Defense and Security 2nd Financial Services 3rd Government Agency/Ministry 1st Media & Public Communications 2nd Food and Agriculture 3rd Transportation Transportation, however, is the sector that most AMS consider pose comparatively high cross- border cybersecurity risk impacts in the region as well as being feasible for information sharing among AMS. Therefore, the sector that AMS should consider starting and focusing on information sharing for CII protection at this moment is the Transportation sector. 5. Identify Supports Needed to Raise the Protection Levels of CII Across All AMS In order to increase the protection level of CII across all AMS, the following supports needed among AMS are: 5.1 Enhancing information sharing among AMS. 5.2 Identifying their own CII assets and CIIP responsibilities as well as the member’s dependency among AMS. 5.3 Empowering point of contact of organizations that can respond and coordinate (aside from legislation, capacity building, and the budget) among ASEAN. 5.4 Adopting a regional CIIP framework which will be the basis and baseline for each AMS in identifying and protecting CIIs in the region. 5.5 Developing a joint consensus to protect the CII and to ensure security and resilience in each AMS and ASEAN. 5.6 Having a forum or working group for CIIP initiatives. 5.7 Being committed to support CII operators to achieve regional security standard level and ensure countermeasuresof each AMS and ASEAN such as building human resource capacity through training programs, workshops, and others relevant activities. The projec study finds the supports most needed by AMS in order to raise the CII protection levels in the region is Information Sharing.
  • 7. 5 6. Identify Actions Needed to Enhance Information Sharing and Regional Collaboration to Raise the CIIP Levels Across All AMS. In order to enhance information sharing and regional collaboration to raise the CII protection levels across the region, the major actions needed and recommended are: 6.1 Establishing an ASEAN Information Sharing and Analysis Center (ASEAN-ISAC). 6.2 Developing information sharing pilot projects for Transportation and ICT sectors. (since both sectors are considered to pose the greatest cross-border cybersecurity risk impacts in the region and to be feasible for comparative information sharing among AMS). 6.3 Developing a trusted platform and building a communication forum among AMS and ASEAN CII operators on provisions regarding cyber threats information related to the CIIP. 7. Identify Status and the Ways to Promote Bilateral or Multilateral Cooperation and Agreements to Improve the CII Protection Levels in ASEAN Regarding the status of regional collaboration, the project study finds AMS are not aware of any existing cooperation or agreements on CII protection at this moment. However, there could be some form of AMS collaborations on CIIP that participating AMS may not recognize. In order to promote bilateral or multilateral cooperation and agreement on CII protection levels in the region, AMS has suggested the following: 7.1 Developing a CII sector-based approach by sharing functions and information, having bilateral agreements on a sector-by-sector basis and then from country to country, expanding to multilateral agreements before proceeding to an ASEAN platform, and moving towards essential practical implementations. At the same time, revising the existing agreements and instruments on ICT and/or cybersecurity in CIIP specific clauses if possible. 7.2 Developing a regulatory body that can receive AMS information from each recognized CII sector and having one central organization to collect and distribute data in the region. Framework Recommendation In moving towards ASEAN’s initiative to strengthen information security and assurance among AMS, the project study addressed a comprehensive ASEAN Critical Information Infrastructure Protection (CIIP) Framework which provides strategic recommendations and coordinated approaches to create more resilient cybersecurity across ASEAN’s critical information infrastructure as follows: Six pillars of ASEAN Critical Information Infrastructure Protection Framework (1) Policy Coordination, (2) Identifying CIIs, (3) Protecting CIIs,
  • 8. 6 (4) Information Sharing, (5) Incident Response, and (6) Capacity Building. Diagram: 6 Pillars of ASEAN Critical Information Infrastructure Protection Framework
  • 9. 7 1. Policy Coordination Policy coordination among AMS through mutually agreed coordinating mechanisms which support and promote collaborative activities across AMS borders, sectors and organizations is essential to the security of the CIIs within the ASEAN region. AMS are encouraged to: ➢ Develop bilateral and/or multilateral cooperative agreements to enhance security of inter- dependent CIIs within ASEAN. ➢ Implement and enhance Public-Private Partnerships, Business Continuity Management, Crisis Management, and sets of cyber incident exercises and tests. ➢ Establish national and regional Points of Contact (POC) for the ASEAN network of cybersecurity experts and organizations. ➢ Participate in cyber norm development activities at the regional and global levels such as the 2015 UNGGE recommendations that were endorsed by the ASEAN Ministerial Conference on Cybersecurity (AMCC) and the Global Forum on Cyber Expertise (GCFE) Meridian Good Practice Guide on Critical Information Infrastructure Protection. 2. Identifying CIIs Identifying ASEAN CIIs and their potential cross-border interdependency is the first step toward making ASEAN CIIs more resilient and ensuring continuity of essential CII service delivery across the region. AMS are encouraged to: ➢ Identify national CIIs (if not yet defined) and their cross-border CII interdependency in the region. ➢ Identify cross-border CII dependency measures (including legal, regulatory, policy, and strategy), cross-border CII dependency risks, and how to assess and mitigate those risks. ➢ Coordinate the development of national regulation and legislation which governs cross- border interdependent CIIs. 3. Protecting CIIs Effective CII protection practices in each AMS including implementationof a minimumprotection requirement, procedural mechanisms and guidelines (especially among the CIIs that are cross- border interdependent), determine holistic ASEAN CII resilience. AMS are encouraged to: ➢ Implement industry-recognized CIIP procedural mechanisms and guidelines such as the NIST Framework for Improving Critical Infrastructure Cybersecurity. ➢ Develop national and regional backup and recovery strategies to safeguard critical information and increase resilience across the ASEAN region.
  • 10. 8 ➢ Prioritize protectionof CIIs with high cross-border cybersecurityrisk impactsincluding (1) energy and utilities, (2) transportation and (3) ICT sectors. 4. Information Sharing Information sharing is a collaborative effort and a shared responsibility to enrich and improve CII resilience practices through standardization at operational, regulatory, institutional and policy levels across the ASEAN region. AMS are encouraged to: ➢ Support the development of regional information sharing and collaboration platforms on CIIP such as ASEAN Information Sharing and Analysis Center (ASEAN-ISAC). ➢ Formalize the format of information exchanges and the general terms/provisions of the sharing agreement. ➢ Implement timely information sharing about the occurrence of cybersecurity incidents. 5. Incident Response The ability to respond to CII security incidents in a timely and effective manner is critically important to maintaining CII resilience. A coordinated approach should be employed when dealing with incidents related to cross-border interdependent CIIs. AMS are encouraged to: ➢ Enhance incident response effectiveness through cooperation, communication and coordination among national CERTs. ➢ Support the establishment of a regional cybersecurity incident response capability, such as the ASEAN Computer Emergency Response Team (ASEAN CERT), to support AMS national CERTs and cybersecurity incident response agencies. ➢ Promote regional incident response readiness through the ASEAN Computer Emergency Response Team Incident Drill (ACID) throughout the ASEAN region. 6. Capacity Building Coordinated efforts to develop cybersecurity capacity to protect CIIs is a high priority for ASEAN as the demand for cybersecurity experts continues to grow and remains a significant challenge. AMS are encouraged to: ➢ Coordinate cybersecurity skills refresh and upgrade programs, including regular provisional cybersecurity exercises. ➢ Define regional requirements and assess the effectivenessof capacity building efforts in the region.
  • 11. 9 ➢ Strengthen ASEAN-wide cybersecurity capacity building programs including the courses offered by the ASEAN-Japan Cybersecurity Capacity Building Centre (AJCCBC), the ASEAN Singapore Cybersecurity Centre of Excellence (ASCCE) and other ASEAN dialogue partners. The ASEAN Critical Information Infrastructure Protection Framework should consist of current and continually updated actions put into practice and improved as AMS provides feedback on implementation progress which can then be integrated into future versions. The Framework can be used to align cybersecurity decisions to mission objectives; organize cybersecurity requirements originating from legislation, regulation, policy, and industry best practices; communicate cybersecurity requirements with stakeholders, including partners and suppliers; integrate privacy and civil liberties risk management into cybersecurity activities; measure and express its current and desired state; prioritize cybersecurity resources and activities; and analyze trade-offs between expenditure and risk. Way Forward As ASEAN prepares to deploy its Digital Masterplan 2025, the ASEAN Critical Information Infrastructure Protection Framework will play a crucial role in building and ensuring CII resilience, trust and security. This Framework will strengthen regional CII resilience and prevent any potential escalation of cyber threats that could lead to national harm, disruption of services and even loss of life. The adoption of this unified, flexible and practical protection framework will encourage further cooperation, communication and collaboration among AMS across the region to advance the vision of a secure ASEAN community. Furthermore, bearing in mind that the scope of what one country considers CIIs may vary over time and be influenced by a multitude of factors, it is recommended that ASEAN review, update and re-assess the Framework and recommendations on a regular interval, such as every 2-3 years.