Sop PPP
Sop PPP
Mar 2020
1. Introduction ..................................................................................................................... 1
2. Objective ......................................................................................................................... 1
7. Steering Committee.......................................................................................................... 3
8.2.3. Certifications.......................................................................................... 4
9. Review ............................................................................................................................ 4
1.2. To facilitate the above, a subgroup was constituted during the first NCIIPC
Advisory Board Meeting, held on 11th December 2015. The subgroup
included members from Ministry of L&J (Law and Justice), DoT
(Department of Telecommunication), IB (Intelligence Bureau), MeitY
(Ministry of Electronics & Information Technology) and NCIIPC. The
subgroup was required to frame a SOP for “Identification of PPP for
partnership with NCIIPC and formulation of training requirements along-
with guidelines for conducting training”.
2. Objective
This document provides standard operating procedure for identification of PPP
entities for partnership and formulates training requirements and guidelines for
conducting training for all stakeholders.
3.1.2. The organisation must organically possess the requisite skill set with
minimum three years of experience in providing such training course
and not perform outsourcing of manpower for conduct of training.
P age |1
Government agency or authority.
3.2.4. Leading ICS/ SCADA OEMs and major public sector organisations
such as Powergrid and ONGC.
4. PPP Proposals
4.1. To identify suitable PPPs across critical sectors, NCIIPC Sectoral
Coordinators, including Incident Response (IR), Security Operation Centre
(SOC), and Research and Development units shall submit their PPP
engagement proposals to NCIIPC for examination and approval.
P age |2
4.2.8. Proposed timelines for the training.
7. Steering Committee
NCIIPC shall constitute a Steering Committee for each PPP partnership. The
Steering Committee shall be headed by the concerned Sectoral Coordinator and
shall provide guidance, direction and control to the project and monitor progress
or outcomes. Steering Committee shall have five members in total with members
from NCIIPC, CERT-In and STQC along with two co-opted members to be
nominated by DG NCIIPC. Secretariat support shall be provided by NCIIPC.
P age |3
Officers (CISOs) about Critical Information Infrastructure Protection,
Information Security & Policies, Cyber Security, Vulnerability/ Threat/ Risk
Analysis, Incident Management & Handling, Cyber Audit etc. The training
curriculum is placed at Appendix ‘B’.
For conducting the above training critical sector organisations may contact
NCIIPC. NCIIPC, in turn may organise training in partnership with PPPs as
described in paragraphs above.
However, the critical sector organisation may also organise the NCIIPC
CISO Training Curriculum by hiring training entities suitable to their
organisational needs. For example, an organisation may include the
NCIIPC CISO Training Curriculum in its annual training plan and select a
training provider on its own.
8.2.3. Certifications
9. Review
P age |4
Appendix ‘A’
2. Scope
3. Steering Committee
9. Notice
10. Miscellaneous
P age |5
Appendix ‘B’
P age |6
C Specialist Trg
Conducted in one part Targeted towards cyber security specialist
For Cyber over 5 days personnel carrying out deep cyber-technical
Security functions.
specialist Training will be done
personnel through lectures, demos, Objective of training is to help them develop
hands-on labs, specialized skills in specific areas such as
interactions with technical malware analysis, reverse engineering, open
and subject matter experts source tools and technologies, programming,
on any one of following machine learning, AI, forensics, threat
topics(a) Power modelling, threat intelligence, threat hunting,
(b) Transport cryptography, CVE/ STIX/ TAXII analysis.
(c) Telecom
(d) Banking
(e) Any other Topic
3. Criteria for nomination of candidates for the training sessions are as follows:
P age |7
Course Content
P age |8
Critical Infrastructure
Policy Issues
Module 25 - Understanding Security Frameworks 2 hrs
Information Security Security Standards
Policy and Procedures
Understanding organizational requirements from an
information security point of view
Security Policy, Procedures, and Practices
Develop information security policies and
procedures
Implement information security policies and
procedures
Collaborate with other departments within the
organization for effective implementation of
security provisions.
Understand the organization and individual
behaviours for information security
Update and upgrade Key Performance Indicators for
security implementation
Best practices and Guidelines in developing
information security policies and procedures
Module 31 – Senior Support security within the organization through 1 hr
Management support clear direction, demonstrated commitment, explicit
to Critical Information assignment and acknowledgment of information
Infrastructure security responsibilities
Protection
Ensuring the information security policy and the
information security objectives are established and
are compatible with the strategic direction of the
organization.
Directing and supporting persons to contribute to
the effectiveness of the information security
management system.
Top management shall establish an information
security policy.
Top management shall ensure that the
responsibilities and authorities for roles relevant to
information security are assigned and
communicated.
Total Duration 7 hrs
P age |9
Module 17 - Business Need of BCP 1 hr
Continuity Plans BCP standards and frameworks
Who Is Ready?
Pieces of the BCP
BCP Development
BCP Risk Analysis
Determining backup strategy
What Items Need to Be Considered in a Recovery?
BCP Plans Creation, Reviews, and Updates
Module 18 - Disaster Proper Planning 1 hr
Recovery Planning Backup/Redundancy Options
Recovery Strategy
Recovery
Testing and Drills
Module 19 - Incident Seriousness of Computer Incidents 1 hr
Management and Incidents Management
Handling Process
Triage
Incident Notification and Communication
Guidelines for handling security Incidents
Role of CERT in case of Incident
Module 20 - Third Need for Third Party Management 1 hr
Party Management Identification and management of Third Party Risks
Categorization of Third Parties Based on Risk
Perception
Controls for Mitigating Third Parties Risks
Security Considerations when Procuring Services
and Products from Third Parties
Auditing of Third Parties
Best Practices and guidelines for managing Third
Party Risks
Module 21 - Legal Need for Legal Framework and its enforcement 1 hr
Framework Types of Law
Historic Examples of Computer Crimes
IT (Amendment) Act 2008
National Cyber Security Policy Identification
Protection & Prosecution
Role of Evidence in a Trial
Privacy of Sensitive Data
Sets of Ethics
P a g e | 10
GAISP- Generally Accepted Information Security
Principles
Module 22 - Privacy Understanding Privacy as a Domain 1 hr
Protection Relationship between security and privacy
Revitalizing security program to enable Privacy
Protection
Assess privacy implications of security technologies
Privacy impact assessment
Develop and implement privacy protection
measures within the organization
Module 23 - Audit and What is Information Security Audit? 1 hr
Testing Importance of Information Security Audit
Identifying the Information Security Audit
Objectives
Audit Planning and preparations
Performing Security Audits and Reviews
Vulnerability assessment and Penetration testing
Code reviews
Audit Controls
Logical security audit
Ethics and codes of conduct for Auditors
Security Policies and Procedure Audits and
Compliance Audits
Conduct and Close internal audits
Information Security audit tools
Reporting to senior management on defined
parameters
Module 24 - Computer What is Computer Forensics? 1 hr
Forensics What are the benefits of Computer Forensics?
Legal Aspects of Computer Forensics
Role of Computer Forensics in collection of
evidence in Cyber Crimes
Digital Evidences
Spoliation and Data Fraud Cases
Understanding Digital Forensic Process and
Procedures
Understanding Computer Forensic investigating and
analysis procedures, techniques, and tools
Total Duration 8 hrs
P a g e | 11
B Technical Trg (Core) PPP Course Content
Module and Name Objectives Duration Remarks
(hrs)
Module 1 – Overview Understanding Information Security 1 hr
of Information Why Care About Security?
Security
Understanding techniques to enforce IS in an
organization
Module 2 – Overview Overview of Information Security Threats 2 hrs
of Security threats Types of threats – DDoS, Malicious codes,
Espionage, etc
Identification of Threats
Modus Operandi
Sources of Threats
Best Practices or Guidelines used to Identify Threats
Best Practices or Guidelines used in mitigation of
threats
Collaborate with peers and experts through
different forums to understand contemporary
issues and solutions
Module 3 – Why do Information Security Vulnerabilities exists 2 hrs
Information Security Understanding Security Vulnerabilities
Vulnerabilities
Understanding Vulnerability Assessment Tools and
Techniques
Techniques to Exploit Vulnerabilities
Techniques to Fix the Vulnerabilities
Best Practices and Guidelines to mitigate security
Vulnerabilities
Module 4 – Risk What is Risk? 2 hrs
Management Relationship between Threat, Vulnerability& Risk
P a g e | 12
Best Practices and Guidelines in Mitigating Risks.
Governance, Enterprise Risk Management,
Proactive Risk identification & Management
Module 8 - Access Control Administration 3 hrs
Understanding Accountability and Access Control
Security Architecture
and Technologies Security Features and Implications of technology
solutions
Security Technologies and Techniques
Defense in Depth Security Model
Understanding of technology solutions deployed by
the organization (servers, applications, databases,
OS, routers, switch, etc.)
Hardening of IT and security solutions
Improving Security
Design, implement, and maintain security
architecture of the organization
Best Practices and Security Guidelines
Creation of DMZ Zones for servers
Module 11 - Focus on Types of Viruses & Malware 1 hr
Malware, viruses and Potential threats, Emerging class of Malware
how they subvert
security Means of Propagating
Protection Measures
Special attention to critical infrastructure systems
Module 12 - Operations Issues 3 hrs
Operations Security Specific Operations Tasks
Fault-Tolerance Mechanisms
Backups
Facsimile Security
Email Security
Module 15 - Cloud Introduction 3 hrs
Computing and IAAS
Security
PAAS
SAAS
Public Cloud
Private Cloud
Hybrid Cloud
Components of Cloud Computing
Understanding Network and security in Cloud
P a g e | 13
Understanding Data, Application, and Service
Control and Ownership in Cloud
Security issues for Clouds
Legal and jurisdictional challenges
Evaluating security of cloud service providers
Standards and frameworks for security and privacy
in the cloud
Resource scheduling
Third party secure data publication applied to cloud
Data and information Control Issues and
Vulnerabilities
Security Compliance for Cloud Computing
Encrypted data storage for cloud
Module 19 - Incident Seriousness of Computer Incidents 2 hrs
Management and Incidents Management: Determine the IRP of your
Handling Process organisation, gather the right stakeholders to create
a program, the six phases of IRP, how to remain
creative during the IRP process, write an IRP for
(part of) your organisation
Triage
Incident Notification and Communication
Guidelines for handling security Incidents
Role of CERT in case of Incident
P a g e | 14
Policy and Procedures Understanding organizational requirements from an
information security point of view
Security Policy, Procedures, and Practices
Develop information security policies and
procedures
Implement information security policies and
procedures
Collaborate with other departments within the
organization for effective implementation of
security provisions.
Understand the organization and individual
behaviours for information security
Update and upgrade Key Performance Indicators for
security implementation
Best practices and Guidelines in developing
information security policies and procedures
Total Duration 21 hrs
OSI Layers
Protocols at Each Layer
Devices Work at Different Layers
Networking Devices
Firewall – First line of defense
Firewall Types
Firewall Placement
Firewall Architecture Types
IDS – Second line of defense
IPS – Last line of defense?
Host-based Intrusion Protection System
Network Service
VLAN concept in switch
Static and Dynamic Routing
Securing Internetworks using ACLs
Module 6 - Introduction to Directory Services 4 hrs
P a g e | 15
Understanding Benefits of DS in a network
Directory Services DS implementations in different Operating Systems
Introduction to Active Directory
Logical structure of Active Directory
Physical structure of Active Directory
Creating Domain
Creating Additional DC and Read Only DC
Understanding trees and forest
Creating and managing Global Catalog Servers
Understanding Sites and Securing domain/ network
through sites
Organizing resources in OU
Understanding Users and Groups concepts
Groups and their rights
Assigning permissions to users using group
membership
Securing environment using Local and Domain
Group policies
Group policies object and Group policy templates
Inheritance of group policies
Execution of Group Policies
Backup and Restoration of AD
Module 7 - Access Access Control Administration 4 hrs
Control Accountability and Access Control
Trusted Path
Who Are You?
Authentication Mechanisms
Strong Authentication
Authorization
Access Criteria
Role of Access Control
Control Combinations
Accountability
Types of Classification Levels
Models for Access
MAC Enforcement Mechanism – Labels
Rule-Based Access Control
Remote Centralized Administration
P a g e | 16
Module 9 - Cryptography 3 hrs
Understanding Use of certificates in authentication, encryption,
Cryptography, and e- commerce
Tunnelling, and
Wireless Security What Is a Tunnelling Protocol?
Wireless Technologies – WAP
Software Engineering and System Survivability
Module 10 - Securing Database Security Issues 2 hrs
your Database Redundancy and availability of Database
Types of attacks
Module 13 - Software How Did We Get Here? 2 hrs
Development Security Issues in application security (SQL injection, cross
scripting, etc.)
Security in SDLC
Modularity of Objects and Security
Security of Embedded Systems
Common Gateway Interface
Virtualization
How to develop secure applications; Application
security design, architecture and design software,
quality assurance techniques, secure coding
standards, Threat risk modelling
Module 14 - Physical Physical Security – Threats 2 hrs
Security Different Types of Threats & Planning
Entrance Protection
Perimeter Protection
Surveillance/Monitoring
Types of Physical IDS
Facility Attributes
Fire Prevention
Physical Security Compliance and Auditing
Convergence of physical and logical security
Total Duration 21 hrs
Module 16 – Securing ICS Characteristics, Threats and Vulnerabilities. 4 hrs
Industrial Control ICS Security Program Development and
Systems Deployment.
Additional Module for
CII Organisations and Network Architecture.
Personnel handling OT ICS Security Controls.
P a g e | 17
C Cyber Security PPP Course Content
Specialist Trg
Module and Name Objectives Duration Remarks
(hrs)
Module – Introduction Definitions of hacking 7 hrs
to Ethical Hacking Hacker tools
Process hacker
‘Do it yourself’ (using hacker tools)
Methods for intrusion detection
Dealing with ethical hackers and Responsible
Disclosure
P a g e | 18
o Access
o Denial of service
o Worms, viruses, and Trojan horses
Vulnerability Analysis
o Policy identification
o Network analysis
o Host analysis
Vulnerability-Threats Assessment for Enterprise
Network
Threat and risk assessment/ analysis
Risk Assessment/ Analysis
o Identifying Potential Risks to Network Security
o Asset Identification
o Vulnerability Assessment
o Threat Identification
o Open Versus Closed Security Models
Risk evaluation - relationships - most critical assets,
and threats - assets and the vulnerability impacts
Threat and risk assessment/ analysis
o Identify the safeguards to be adapted to maintain
confidentiality
Network security integrity strategy
o Identifying the areas of greatest risk and
concentrate on those triggers like Trojan horses,
viruses, and malwares
Risk Assessment Framework
o The Concepts of Return on Investment
o Botnets Propagation Mechanism
o Vulnerability Access Control
o Estimating Risk and Return on Investment
The Emergence of Threats on Enterprise Network
Information Systems
o Threats and the Vulnerabilities
o Network Exploitation
o Client – Side and Client to Client Exploitation
o Governance, Enterprise Risk Management,
Proactive Risk identification & Management
Analysis Tools
Total Duration 35 hrs
P a g e | 19