As India’s power sector becomes increasingly dependent on digital technologies and faces a sharp rise in cyber threats, the Central Electricity Authority (CEA) has released the Draft CEA Cyber Security Regulations, 2024. It is a critical step in strengthening India’s critical power infrastructure. The draft is subject to consultation with various stakeholders, and the final rules have not yet been issued. Building on the CEA (Cyber Security in Power Sector) Guidelines, 2021, the draft expands its scope with a stronger focus on incident response, vendor security, and, operational technology (OT) systems.
These regulations will introduce mandatory cybersecurity audits, define clear roles for CISOs, and set out incident response frameworks. In this blog, we will walk you through the draft overview with key insights for chapter-specific information regarding the draft regulation to help you understand the responsibilities of various stakeholders concerning their specific roles and steps to achieving compliance.
These regulations will apply to all entities in the power sector, including generating companies, transmission licensees, distribution licensees, and control centres. They also require all vendors, contractors, and government organizations dealing with the power sector to adhere to them.
The key objectives of this 2024 Draft Regulations are aligned with what we often recommend to our clients in critical infrastructure sectors:
This chapter defines the regulations’ applicability and clarifies that these rules apply to all stakeholders involved in the supply chain—from power generation and transmission distribution companies to vendors. Important definitions, such as Critical Cyber Assets and Cyber Resilience, help everyone understand what types of assets and capabilities need protection.
The creation of CSIRT-Power is one of the most pioneering aspects of the regulation. It will serve as a central point of contact for handling cyber incidents in the power sector. It will help manage and mitigate cyber incidents capable of disrupting the stability and security of power infrastructure. CSIRT-Power will collect and analyse traffic data to identify potential cyber threats, providing a comprehensive view of the threat landscape. CSIRT-Power has already been set up in April 2023.
Additionally, Sectoral Computer Emergency Response Teams (CERTs) have been set up for the thermal, hydro, transmission, distribution, grid operations, and renewable energy sectors. CSIRT-Power collaborates with sectoral CERTs for specific sectors, such as transmission and renewable energy.
This chapter outlines basic yet fundamental cybersecurity practices entities must adopt. These efforts include designating CISO and Alternate CISO, promulgating a cybersecurity policy, deploying security controls (e.g., firewalls, IDS/IPS, etc.), etc.
This chapter clearly defines the cybersecurity responsibilities of power sector entities. Key highlights of these responsibilities are the establishment of a 24/7 active ISD, the need for cybersecurity training for all personnel, acquiring an ISO/IEC 27001 certificate, and ensuring physical and logical segregation between the IT and OT domains.
This chapter enlists the ISD’s functions in protecting CIIs and protected systems, including policy implementation, compliance review, incident reporting, and threat intelligence management. The ISD will ensure asset vulnerability management and retain secure documentation.
ISD will enforce measures at the entity level using security controls such as system hardening, secure remote access, and cybersecurity requirements in procurements and SLAs. The chapter also emphasizes adherence to the directives of NCIIPC, CERT-In, and CSIRT-Power to maintain a robust level of cybersecurity.
This chapter contains minimum requirements for CISO & Alternate CISO Qualifications. The CISO will have to serve as the nodal officer for cybersecurity, coordinate with authorities, communicate CCMP matters, and make sure cybersecurity documents are secured as per IS 16335.
This chapter presents minimum requirements to be included in the cybersecurity policies of all entities in the power sector.
This chapter outlines the key requirements of the Cyber Crisis Management Plan (CCMP), which includes event categorization, crisis criteria, stakeholders’ roles, SOPs, communication methods, and recovery plans for critical systems. CERT-In should vet and approve the CCMP.
This chapter highlights that vendors are required to deliver regular security updates and patches throughout the lifecycle of their products, ensuring their long-term security against cyber threats. It also includes a recovery and restoration plan along with an intimation of the end of life and end of support of all supplied materials.
This chapter stresses the need for regular cybersecurity audits to maintain an organization’s overall security posture. IT systems are supposed to be audited bi-annually, whereas OT systems are supposed to be audited annually. The regulations also stress the need to address vulnerabilities through timely and systematic patching.
This chapter highlights the physical security requirement for all critical cyber and non-cyber assets.
This chapter contains requirements for CII identification and notification. All entities must provide the information NCIIPC requires to identify CII. Details of new cyber assets need to be submitted within 30 days.
This chapter explains the monitoring and compliance framework, focusing on third-party audits and self-audits to ensure cybersecurity laws are followed. It describes the rules for sending yearly self-audit reports to CISO-MoP and CSIRT-Power, including non-compliance details and actions to fix issues. It also includes rules for reviewing cybersecurity policies, training staff, and raising awareness through ongoing education. To address operational problems, the authority can still change or relax regulations.
The entities in the energy sector can use the following checklist to align their efforts with the Draft Regulations:
The Draft CEA Cyber Security Regulations, 2024 will change how the power sector handles cybersecurity. It sets clear rules for managing cybersecurity, responding to incidents, and ensuring compliance. These regulations will be a step towards safeguarding critical power infrastructure from ever-evolving cyber threats.
Compliance with these exhaustive regulations is challenging. Payatu offers professional assistance for compliance and security:
The collaboration with Payatu will enable entities in the energy sector to confidently address the challenges of complying with the Draft CEA Cyber Security Regulations, 2024.