The Cyber Security Agency of Singapore (CSA) has published the Codes of Practice or Standards of Performance issued by the Commissioner of Cybersecurity for the regulation of owners of Critical Information Infrastructure (CII), in accordance with the Cybersecurity Act. The Cybersecurity Code of Practice for Critical Information Infrastructure – Second Edition (CCoP2.0) comes into effect from Jul. 4, 2022, superseding previous versions of the Code.
The CCoP2.0 is intended to specify the minimum requirements that the critical information infrastructure owner (CIIO) shall implement to ensure the cybersecurity of the CII. The CIIO is expected to implement measures beyond those stipulated in this Code to further strengthen the cybersecurity of the CII based on the cybersecurity risk profile of the CII.
The Cybersecurity Act provides a framework for the designation of Critical Information Infrastructure (CII), and CII Owners across the 11 critical sectors are required to comply with the mandatory cyber hygiene practices within the CCoP2.0 to ensure a strong cybersecurity foundation for the CII sectors.
Discover how CII complies with the CCoP2.0 through our comprehensive cybersecurity solutions and learn more about the requirements.
Thales’ solutions can help CII address the CCoP2.0 requirements, focusing on Protection and Detection Clauses, by simplifying compliance and automating security with visibility and control, thereby reducing the burden on security and compliance teams.
CCoP2.0 in Singapore Compliance Solutions
Protect applications and APIs at scale in the cloud, on-premises, or in a hybrid model. Our market leading product suite includes Web Application Firewall (WAF), protection against Distributed Denial of Service (DDoS) and malicious BOT attacks, security for APIs, and a secure Content Delivery Network (CDN)
Discover and classify sensitive data across hybrid IT and automatically protect it anywhere, whether at rest, in motion, or in use, using encryption tokenization and key management. Thales solutions also identify, evaluate, and prioritize potential risks for accurate risk assessment as well as identify anomalous behavior, and monitor activity to verify compliance, allowing organizations to prioritize where to spend their efforts.
Provide seamless, secure and trusted access to applications and digital services for customers, employees and partners. Our solutions limit the access of internal and external users based on their roles and context with granular access policies and Multi-Factor Authentication that help ensure that the right user is granted access to the right resource at the right time.
Data Security
Identity & Access Management
Identity & Access Management
Data Security
Application Security
Data Security
Application Security
Data Security