The GFCE-MERIDIAN good practice guide reference to EC 2008 defines Critical Information Infrastructure Protection (CIIP) as: ‘All activities aimed at ensuring the functionality, continuity and integrity of CII in order to deter, mitigate and neutralise a threat, risk or vulnerability or minimise the impact of an incident.’
CIIP is a vital element of cyber security and included as a component of the national cyber security strategy. A country may consider developing a CIIP policy to establish coherence and coordination of the activities, resources and initiatives necessary to secure critical infrastructure from natural disasters and cyber related incidents.
A national policy for the protection of the CI and CII is guided by a set of principles determined by the government and influenced by international and regional conventions, standards, and best practices. The objective of the policy is to establish a national framework for the harmonisation and coordination of critical infrastructure protection.
The Internet Infrastructure Guidelines for Africa recommend that policymakers use four essential principles as a guide in developing strategies and policies for Internet infrastructure security. These principles are:
Good practice: G8 Principles for Protecting Critical Information Infrastructures
G8 Principles for Protecting Critical Information Infrastructures include national, regional, and international coordination and collaboration, information sharing, identification of interdependencies, determination of stakeholders’ roles and responsibilities, enhancement of capabilities, adequate legal provision, research and development, and application of internationally certified standards.
The basic steps of developing and maintaining a current CIIP policy are:
Step 1. Make the CIIP a national priority: The effectiveness of a CIIP policy is improved if embedded in the National Risk Profile (NRP) and National Cybersecurity Strategy and implemented by a committee with high ranking multisectoral stakeholder representation.
Step 2. Identification of critical information infrastructure: Critical infrastructure can be identified by using the four methodological stepping stones inspired by the European Critical Infrastructure Directive (EC2008). The four stepping stones are:
Step 3. Development of a critical information infrastructure protection policy including:
Good practice: Adopt a multi-agency approach and start information sharing
Governments should adopt a multi-agency approach to address the risk and complexity associated with the CIIP at strategic, tactical and operational and technical levels.
Regular meetings of stakeholders selected based on their legal mandate, ownership and operation of critical infrastructure should be considered. These stakeholders include government ministries and agencies, national security, defence and police, the national Computer Security Emergency Response Team and private sector owners and operators of critical infrastructure.
Other networking and information sharing good practices are:
Step 4. Monitoring and continuous improvement: The successful implementation of the policy depends on periodic monitoring and evaluation (M&E). Monitoring involves the tracking of the proposed interventions, initiatives, and resources against the expected policy outcomes while evaluation involves the determination of the value of the policy implementation and achievements. The M&E results are shared with stakeholders and feedback is provided to enhance future initiatives.