\"\"
<\/span><\/figcaption><\/figure>New Delhi: US-based technology industry body ITI<\/a>, having global tech firms such as Google<\/a>, Facebook, IBM and Cisco<\/a> as its members, has sought a revision in the Indian government's directive on reporting of cyber security breach incidents. ITI said that the provisions under the new mandate may adversely impact organisations and undermine cyber security in the country.

ITI country manager for India Kumar Deep, in a letter to
CERT-In<\/a> chief Sanjay Bahl dated May 5, asked for a wider stakeholder consultation with the industry before finalising on the directive.

\"The directive has the potential to improve India's cyber security posture if appropriately developed and implemented, however, certain provisions in the bill, including counterproductive incident reporting requirements, may negatively impact Indian and global enterprises and undermine cyber security,\" Deep said.

Indian Computer Emergency Response Team (CERT-In) on April 28 issued a directive asking all government and private agencies, including
internet<\/a> service providers, social media platforms and data centres, to mandatorily report cyber security breach incidents to it within six hours of noticing them.

The new circular issued by the CERT-In mandates all service providers, intermediaries, data centres, corporates and government organisations to mandatorily enable logs of all their ICT (Information and Communication Technology) systems and maintain them securely for a rolling period of 180 days and the same shall be maintained within the Indian jurisdiction.

ITI has raised concerns over the mandatory reporting of breach incidents within six hours of noticing, to enable logs of all ICT systems and maintain them within Indian jurisdiction for 180 days, the overbroad definition of reportable incidents and the requirement that companies connect to the servers of Indian government entities.

Deep, in the letter, said that the organisations must be given 72 hours to report an incident in line with global best practices and not just six hours.

ITI said that the government's mandate to enable logs of all covered entities' information and communications technology systems, maintain logs \"securely for a rolling period of 180 days\" within India and make them available to the Indian government upon request is not a best practice.

\"It would make such repositories of logged information a target for global threat actors, in addition to requiring significant resources (both human and technical) to implement,\" Deep said.

ITI also raised concern on the requirement that \"all service providers, intermediaries, data centres, body corporate and government organisations shall connect to the NTP servers of Indian labs and other entities for synchronisation of all their ICT systems clocks\".

The global body said that the provisions could negatively affect companies' security operations as well as the functionality of their systems, networks and applications.

ITI said that the government's current definition of reportable incident to include activities such as probing and scanning is far too broad given probes and scans are everyday occurrences.

\"It would not be useful for companies or CERT-In to spend time gathering, transmitting, receiving and storing such a large volume of insignificant information that arguably will not be followed up on,\" Deep said.

ITI has asked the government to defer timeline for implementation of the new directive and launch a wider consultation with all stakeholders for its effective implementation.

ITI demanded CERT-In to \"revise the directive to address the concerning provisions with regard to incident reporting obligations, including related to the reporting timeline, scope of covered incidents and logging data localisation requirements\".<\/body>","next_sibling":[{"msid":91388974,"title":"Airtel broadband suffers major outage in India","entity_type":"ARTICLE","link":"\/news\/airtel-broadband-suffers-major-outage-in-india\/91388974","category_name":null,"category_name_seo":"telecomnews"}],"related_content":[],"msid":91389005,"entity_type":"ARTICLE","title":"Global tech industry body seeks revision in India's directive on reporting of cyber security breach","synopsis":"ITI country manager for India Kumar Deep, in a letter to CERT-In chief Sanjay Bahl dated May 5, asked for a wider stakeholder consultation with the industry before finalising on the directive.","titleseo":"telecomnews\/global-tech-industry-body-seeks-revision-in-indias-directive-on-reporting-of-cyber-security-breach","status":"ACTIVE","authors":[],"analytics":{"comments":0,"views":284,"shares":0,"engagementtimems":1174000},"Alttitle":{"minfo":""},"artag":"PTI","artdate":"2022-05-07 07:14:35","lastupd":"2022-05-07 07:16:41","breadcrumbTags":["Cybersecurity","CERT-in","Cybersecurity news","ITI","Cisco","Google","cyber incident reporting","internet","technology news"],"secinfo":{"seolocation":"telecomnews\/global-tech-industry-body-seeks-revision-in-indias-directive-on-reporting-of-cyber-security-breach"}}" data-authors="[" "]" data-category-name="" data-category_id="" data-date="2022-05-07" data-index="article_1">

全球科技行业组织在印度寻求修改指令的网络安全漏洞的报告

来印度国家经理Kumar深,在一封给、首席桑杰巴尔日期为5月5日要求更广泛的利益相关者与业界磋商之前敲定的指令。

  • 更新2022年5月7日凌晨07:16坚持
阅读: 100年行业专业人士
读者的形象读到100年行业专业人士
新德里:美国科技行业的身体来发现,在全球科技公司等谷歌、Facebook、IBM和思科作为其成员,寻求在印度政府指令修订报告网络安全漏洞事件。来表示,根据新规定授权可能造成负面影响组织和破坏网络安全。

来印度国家经理Kumar深,在一封给首席桑杰巴尔日期为5月5日要求更广泛的利益相关者与业界磋商之前敲定的指令。

“指令有可能改善印度的网络安全态势如果适当的开发和实施,然而,某些规定的法案,包括适得其反事件报告要求,可能产生负面影响印度和全球企业和破坏网络安全,“深说。

广告
印度计算机紧急响应小组(、)4月28日发布了一项指令,要求所有政府和私人机构,包括互联网服务提供者、社交媒体平台和数据中心,网络安全漏洞事件强制报告在6个小时的注意。

新发行的圆形、授权服务提供商,中介机构,数据中心,企业和政府机构强制要求启用日志的ICT(信息通信技术)系统和维护安全滚动一段180天,同样应保持在印度管辖范围内。

来引发了担忧的强制性报告违反事件关注的六个小时内,启用日志的ICT系统和维护它们在印度管辖范围内为180天,过于宽泛的定义可报告的事件,并要求公司的印度政府实体连接到服务器。

深,在信中说,组织必须有72小时报告一个事件不仅符合全球最佳实践和6个小时。

来表示,政府的授权,使覆盖的所有日志实体的信息和通信技术系统、维护日志“安全地滚动一段180天”在印度和才能获得印度政府要求不是一个最佳实践。

广告
“这将使这些存储库记录信息的全球威胁的目标演员,除了需要大量资源(人力和技术)来实现,“深说。

来也担忧的要求“所有服务供应商、中介机构、数据中心、法人团体和政府机构应当连接到印度实验室和其他实体的国家结核控制规划服务器同步的ICT系统时钟”。

全球身体说规定可以影响公司的安全操作以及系统的功能、网络和应用程序。

来表示,政府目前的定义可报告的事件包括的活动,如探测和扫描太广泛的探测和扫描是家常便饭。

“这对公司或不会有用、花时间收集、传输、接收和存储大量无关紧要的信息,可以说不会跟进,“深说。

来要求政府推迟时间表实施新的指令和启动一个更广泛的磋商与所有利益相关者的有效实施。

来要求、“修改指令地址的有关规定对事故报告义务,包括相关的报告时间,范围覆盖事件和日志数据本地化需求”。
  • 发布于2022年5月7日凌晨07:14坚持
是第一个发表评论。
现在评论

加入2 m +行业专业人士的社区

订阅我们的通讯最新见解与分析。乐动扑克

下载ETTelec乐动娱乐招聘om应用

  • 得到实时更新
  • 保存您最喜爱的文章
扫描下载应用程序
\"\"
<\/span><\/figcaption><\/figure>New Delhi: US-based technology industry body ITI<\/a>, having global tech firms such as Google<\/a>, Facebook, IBM and Cisco<\/a> as its members, has sought a revision in the Indian government's directive on reporting of cyber security breach incidents. ITI said that the provisions under the new mandate may adversely impact organisations and undermine cyber security in the country.

ITI country manager for India Kumar Deep, in a letter to
CERT-In<\/a> chief Sanjay Bahl dated May 5, asked for a wider stakeholder consultation with the industry before finalising on the directive.

\"The directive has the potential to improve India's cyber security posture if appropriately developed and implemented, however, certain provisions in the bill, including counterproductive incident reporting requirements, may negatively impact Indian and global enterprises and undermine cyber security,\" Deep said.

Indian Computer Emergency Response Team (CERT-In) on April 28 issued a directive asking all government and private agencies, including
internet<\/a> service providers, social media platforms and data centres, to mandatorily report cyber security breach incidents to it within six hours of noticing them.

The new circular issued by the CERT-In mandates all service providers, intermediaries, data centres, corporates and government organisations to mandatorily enable logs of all their ICT (Information and Communication Technology) systems and maintain them securely for a rolling period of 180 days and the same shall be maintained within the Indian jurisdiction.

ITI has raised concerns over the mandatory reporting of breach incidents within six hours of noticing, to enable logs of all ICT systems and maintain them within Indian jurisdiction for 180 days, the overbroad definition of reportable incidents and the requirement that companies connect to the servers of Indian government entities.

Deep, in the letter, said that the organisations must be given 72 hours to report an incident in line with global best practices and not just six hours.

ITI said that the government's mandate to enable logs of all covered entities' information and communications technology systems, maintain logs \"securely for a rolling period of 180 days\" within India and make them available to the Indian government upon request is not a best practice.

\"It would make such repositories of logged information a target for global threat actors, in addition to requiring significant resources (both human and technical) to implement,\" Deep said.

ITI also raised concern on the requirement that \"all service providers, intermediaries, data centres, body corporate and government organisations shall connect to the NTP servers of Indian labs and other entities for synchronisation of all their ICT systems clocks\".

The global body said that the provisions could negatively affect companies' security operations as well as the functionality of their systems, networks and applications.

ITI said that the government's current definition of reportable incident to include activities such as probing and scanning is far too broad given probes and scans are everyday occurrences.

\"It would not be useful for companies or CERT-In to spend time gathering, transmitting, receiving and storing such a large volume of insignificant information that arguably will not be followed up on,\" Deep said.

ITI has asked the government to defer timeline for implementation of the new directive and launch a wider consultation with all stakeholders for its effective implementation.

ITI demanded CERT-In to \"revise the directive to address the concerning provisions with regard to incident reporting obligations, including related to the reporting timeline, scope of covered incidents and logging data localisation requirements\".<\/body>","next_sibling":[{"msid":91388974,"title":"Airtel broadband suffers major outage in India","entity_type":"ARTICLE","link":"\/news\/airtel-broadband-suffers-major-outage-in-india\/91388974","category_name":null,"category_name_seo":"telecomnews"}],"related_content":[],"msid":91389005,"entity_type":"ARTICLE","title":"Global tech industry body seeks revision in India's directive on reporting of cyber security breach","synopsis":"ITI country manager for India Kumar Deep, in a letter to CERT-In chief Sanjay Bahl dated May 5, asked for a wider stakeholder consultation with the industry before finalising on the directive.","titleseo":"telecomnews\/global-tech-industry-body-seeks-revision-in-indias-directive-on-reporting-of-cyber-security-breach","status":"ACTIVE","authors":[],"analytics":{"comments":0,"views":284,"shares":0,"engagementtimems":1174000},"Alttitle":{"minfo":""},"artag":"PTI","artdate":"2022-05-07 07:14:35","lastupd":"2022-05-07 07:16:41","breadcrumbTags":["Cybersecurity","CERT-in","Cybersecurity news","ITI","Cisco","Google","cyber incident reporting","internet","technology news"],"secinfo":{"seolocation":"telecomnews\/global-tech-industry-body-seeks-revision-in-indias-directive-on-reporting-of-cyber-security-breach"}}" data-news_link="//www.iser-br.com/news/global-tech-industry-body-seeks-revision-in-indias-directive-on-reporting-of-cyber-security-breach/91389005">