Cyber Security Policy
This policy outlines the framework and responsibilities necessary to ensure organizational compliance with the cybersecurity directions issued by the Indian Computer Emergency Response Team (CERT-In) on April 28, 2022, as mandated under sub-section (6) of section 70B of the Information Technology Act, 2000. These directions are legally binding and are critical for strengthening the national cybersecurity posture.
The policy specifically addresses the following areas of compliance:
A. Synchronization of All ICT System Clocks with Authorized NTP Servers:
Accurate time synchronization is vital for the integrity, traceability, and analysis of cybersecurity events. Discrepancies in system clocks can hinder incident investigation, log correlation, and evidence validation. To this end, all Information and Communication Technology (ICT) systems within the organization must ensure their internal clocks are synchronized with Network Time Protocol (NTP) servers authorized by the Government of India, such as those operated by the National Informatics Centre (NIC) or the National Physical Laboratory (NPL). This synchronization must be maintained continuously to support reliable timestamping of logs and ensure forensic readiness.
B. Designation of a Point of Contact (PoC) to Interface with CERT-In:
To facilitate effective communication and coordination with CERT-In, the organization shall designate an official Point of Contact (PoC). The PoC will serve as the primary liaison for all CERT-In related activities, including but not limited to incident reporting, response coordination, compliance documentation, and implementation of cybersecurity advisories and directives. The PoC must be available 24×7 or ensure an alternate mechanism for timely response. The contact details of the PoC shall be formally communicated to CERT-In and updated promptly in case of any changes.
- Scope: This policy applies to all employees, contractors, and third-party service providers who manage or operate the organization's Information and Communication Technology (ICT) systems.
-
Policy Statements:
-
Synchronization of ICT System Clocks:
- Requirement: All ICT systems must synchronize their internal clocks with the NTP servers of the National Informatics Centre (NIC) or the National Physical Laboratory (NPL), or with NTP servers traceable to these servers.
-
Authorized NTP Servers:
- NIC: samay1.nic.in, samay2.nic.in
- NPL: time.nplindia.org
-
Implementation:
- System administrators must configure all servers, network devices, and other ICT systems to synchronize time with the authorized NTP servers.
- For organizations with operations across multiple geographies, alternative accurate and standard time sources may be used, provided they do not deviate from the NTP servers of NIC or NPL.
-
Synchronization of ICT System Clocks:
-
Log Retention and Security:
- Mandatory Log Enablement and Retention: All service providers, intermediaries, data centres, body corporates, and government organizations associated with NACL Industries Limited shall mandatorily enable logs of all their ICT systems.
- Retention Period and Jurisdiction: These logs must be maintained securely for a rolling period of 180 days and must be stored within the jurisdiction of India, as mandated by CERT-In.
- Access and Availability: Logs shall be made available to CERT-In as and when required for cybersecurity incident investigation or audit purposes, in accordance with applicable laws and regulations.
-
Monitoring and Compliance:
- Regular audits must be conducted to ensure all systems are correctly synchronized.
- Any discrepancies must be addressed promptly to maintain compliance.
-
Designation of Point of Contact (PoC) to Interface with CERT-In:
- Requirement: The organization must designate a PoC to interface with CERT-In for communication and compliance purposes.
-
PoC Information Submission:
- The following details of the designated PoC must be submitted to CERT-In via email at info@cert-in.org.in in the specified format:
- Name: Shubhashish Dutta
- Designation: VP – IT & CIO
- Organization Name: NACL Industries Limited
- Office Address: Plot no12A,C, Opposite Corporation Bank, Nagarjuna Hills, Punjagutta, Hyderabad, Telangana 500082
- Email ID: shubhashish@naclind.com
- Mobile Number: 9717595300
- Office Phone Number: 040 24405211
-
Responsibilities of the PoC:
- Act as the primary liaison between the organization and CERT-In.
- Ensure timely reporting of cyber incidents as per CERT-In guidelines.
- Coordinate incident response and compliance activities within the organization.
- Updating PoC Information: Any changes to the PoC's contact information must be communicated to CERT-In promptly.
-
Roles and Responsibilities:
-
IT Department:
- Implement and maintain time synchronization across all ICT systems.
- Conduct regular audits to ensure compliance.
-
Designated PoC:
- Serve as the official communication channel with CERT-In.
- Coordinate internal responses to cybersecurity incidents.
- Compliance Officer: Shall oversee adherence to this policy and facilitate training and awareness programs related to cybersecurity compliance.
-
IT Department:
- Enforcement: Non-compliance with this policy may result in disciplinary action, including but not limited to suspension of system access, termination of employment, or legal action, depending on the severity of the breach.
- Review and Revision: This policy shall be reviewed annually or as required to accommodate changes in regulatory requirements or organizational needs.
-
References:
- CERT-In Directions under sub-section (6) of section 70B of the Information Technology Act, 2000, dated April 28, 2022.
- CERT-In Frequently Asked Questions on Cyber Security Directions of April 28, 2022.
- Conclusion: NACL Industries Limited is committed to maintaining the highest standards of cybersecurity in alignment with national regulations and best practices. This policy establishes a structured approach to complying with the directions issued by CERT-In under the Information Technology Act, 2000. By ensuring accurate system time synchronization and maintaining a designated Point of Contact for CERT-In coordination, the organization enhances its ability to detect, respond to, and recover from cybersecurity incidents. All stakeholders are expected to adhere strictly to this policy to safeguard the organization's digital infrastructure and contribute to national cybersecurity resilience.