There are various methodologies for the identification of the CII including the use of a service-based approach, application of sectorial or functional criteria, as well as an assessment of stakeholders. The Guide to Developing a National Cybersecurity Strategy recommends cyber risk assessment and threat modelling to identify, designate, and protect the CI, the CII, or essential services.
Good practice: (National And Cross-Border) Dependency Analysis
Dependencies can be recognised during the process of CI identification and risk assessments. These are CI dependencies within a nation and those of neighbouring nations and regions. Dependencies may influence the criticality of a particular national infrastructure and can be determined through stakeholder consultations.
Good practice: Develop A National Risk Profile
In developing a National Risk Profile, a country’s stakeholders would gain a common understanding of the risks, consequences, and their relative priority. The use of the EU Risk Management Capability Assessment Guidelines may be used by countries in carrying out a risk assessment.
The assessment based on a set of 51 questions on coordination, expertise, methodology, stakeholders, information and communication, equipment, and financing helps with risk identification and prioritisation, and presents the basis for the:
The National Institute of Standards and Technology (NIST) Framework for Improving Critical Infrastructure Cybersecurity helps owners and operators of critical infrastructure to identify, assess, and manage cybersecurity risks using a prioritised, flexible, repeatable, performance-based, and cost-effective approach, including information security measures and controls.
Good practice: Adopt a methodology to identify CI sectors and services systematically
A structured four-step approach to the identification of CI sectors and services is recommended in ENISA’s Methodologies for the identification of Critical Information Infrastructure assets and services for the evaluation of a sector or service that could potentially be critical:
The most useful order of these steps depends on the information available to national policy-makers.
Resource: How to identify and classify the CI and CII
ITU 2021 Global CyberDrill Training Video: How to identify and classify critical information infrastructure assets and services.