Infrastructure audits and vulnerability assessments, carried out periodically against minimum standards, are critical for the protection of national security. They are an essential component of the national cybersecurity strategy and contribute to the formulation of the National Risk Profile (NRP).
The national cybersecurity strategy should outline the minimum outcome-focussed cybersecurity baselines that are relevant across the CI and CII operators based on international standards and best practices. In determining compliance to national priorities and consistent interoperable practises, audits and assessments make reference to security baselines.
Resource: Cybersecurity Audit Baseline Requirements India
The Cybersecurity Audit Baseline Requirements for Cyber Information Infrastructure provide a minimum, common, and harmonised baseline criterion for cyber security audits. It provides guidance to auditors and auditees and is mandatorily applicable to owners and regulators of Critical Information Infrastructure.
Cyber Security audit baseline is defined as the minimum controls to be audited for cybersecurity of an organisation which are grouped into six categories:
The outcome of the risk assessment is the classification of the organisation as high, medium or low-risk information infrastructure.
Source: National Critical Information Infrastructure Protection Centre (NCIIPC).
Good practice: Defining minimum security baselines
The Guide to Developing a National Cybersecurity Strategy recommends that countries identify and follow good practice elements that support the vision and objectives of the National Cybersecurity Strategy. Defining minimum cybersecurity strategy is one of these good practice elements.
Legislation or regulations should outline the minimum cybersecurity baselines for CI and CII operators. To ensure consistency, better outcomes, greater efficiency and interoperability, security baselines should be outcome-focused and should reference internationally recognized standards and best practices.
The security baselines address:
Case study: Country audits of the CII
Ghana’s Directive for the Protection of Critical Information Infrastructure (CII) establishes audit measures and procedures to ensure compliance pursuant to Section 38 of the Cybersecurity Act, 2020. The audit of a designated CII is carried out by the Cyber Security Authority (CSA) or its authorised auditor reference to submit reports, risk register, and any cybersecurity activities conducted. Planned significant changes in design, configuration, security, or operation of the CII must be approved by the Authority.
The baseline security requirements for designated CII owners are:
Resource: Agence nationale de la sécurité des systèmes d’information (ANSSI) cross-sectoral, security rules for CII and CI operators
The French Network and Information Security Agency, Agence nationale de la sécurité des systèmes d’information (ANSSI) has defined cross-sectoral, security rules for CII and CI operators, based on operational experience and existing international standards which mostly include cyber hygiene measures and fall within 20 categories: