ICISAs Study Paper and Presentation
ICISAs Study Paper and Presentation
Circular
iCISA’s Study Paper & Presentation during webinar on ‘Data Privacy in e-Governance
Projects’, ‘Smart city pro-Evaluation and Security concerns with reference to Internet of Things
(IoT) technology’ and ‘Data Security in a Cloud Environment’ received under letter bearing
518/आईसीसा/आर एं इ आइ/वेबिनार/2020-21 dated 15.04.2021, is enclosed for general
information.
Sd/-
(Asim Pal)
Senior Accounts Officer (Admn. I)
Cloud Security-Threats &
Challenges
◦ It is able to intercept and forward the network traffic that flows within a cloud
◦ It typically exists as a service agent (or as a program pretending to be a service agent ), with
compromised or malicious logic.
◦ It may also exist as an external program , able to remotely intercept and potentially corrupt
,message contents.
Threat Agents to the Cloud ……..
3. Malicious Insider Attack
◦ A trusted attacker shares IT resources in the same cloud environment as the cloud consumer
◦ It attempts to exploit legitimate credentials to target cloud providers and the clod tenants with whom
they share IT resources.
◦ Trusted attackers usually launch their attacks from within a cloud’s trust boundaries, by abusing
legitimate credentials
◦ Exploitations include hacking of weak authentication processes, the breaking of encryption, the
spamming of email accounts or to launch common attacks like DoS .
Threat Agents to the Cloud ……..
Malicious Insider
◦ They are human threat agents acting on behalf of or in relation to the cloud provider
◦ They are typically current or former employees, or third parties with access to the cloud
provider’s premises.
◦ These agents carry tremendous damage as they may gain and have administrative privileges.
Cloud Security Threats
Common Security Threats for a Cloud
Spoofing
Tampering
Repudiation
Information Disclosure
Denial of Service
Escalation of privileges
Cloud Security Threats
1. Traffic Eavesdropping
◦ This occurs when data being transferred to or within a cloud
(usually from the cloud consumer to the cloud provider)
◦ When leasing raw infrastructure –based IT resources, the cloud consumer may not be
granted sufficient administrative control or influence over security policies
◦ Third parties(security brokers & certificates authorities), may introduce their own set of
security polices and practices.
◦ Liabilities are clearly assumed by cloud provider and level of protection cloud
provider may ask for
◦ Greater assumed liability by the cloud provider the lower risk to the cloud
consumer
◦ Where the lines are drawn between the cloud consumer and provider, assets i.e
if security breach or runtime failure occurs, how is blame determined.
Cloud Security
Cloud - Benefits
Less or No Investment
Highly Scalable
Ease of Deployment &
Management
Optimal Resource Utilization
Clients &
Create User Account & Start
Users
End
using the Apps – Eg., Gmail,
One Drive, etc.,
Developer/
Software
Take Platform & Deploy Apps
Admin’s
– Eg., Database, BI Engine,
from Amazon, Google, etc.,
System /
Admin’s
Server
provisioning Servers – Eg.,
Meghraj, AWS, etc.,
BACK
23-FEB-21 DATA SECURITY IN CLOUD ENVIRONMENT 3
RESPONSIBILITIES IN CLOUD MODELS
Business Continuity
Redundancy of Service
Data Backup & Restoration
Disaster Recovery Mitigation
BC Plan
Defined Roles & Responsibilities
Process & Procedures
BC Drills
Centralized Authentication
Access management policy
Defined Roles
Creation & Deletion Policy
Secured Storage – Sensitive Info.
Privilege Approval
Proper Security measures
Peer service
23-FEB-21 Physical DATA SECURITY IN CLOUD ENVIRONMENT
management 24
resources
OUTCOME I: BENCHMARKING OF GI CLOUD POLICY
NIST 800-53 R4 vs GoI Guidelines With Respect to the role of CSP CSA CCM v 3.0.1 vs GoI Guidelines
Benchmark of CSP empanelment with NIST 800- Benchmark of CSP empanelment with CCM
53 Rev 4 v3.0.1
ACCESS CONTROL
SYSTEM AND 90.00 AWARENESS AND Mobile Security
INFORMATION INTEGRITY TRAINING 90.00
80.00 Human Resources Identity & Access Management
SYSTEM AND AUDIT AND 80.00
COMMUNICATIONS… 70.00 ACCOUNTABILITY
60.00 Threat and Vulnerability 70.00 Business Continuity
Management 60.00 Management & Operational…
SYSTEM AND SERVICES 50.00 SECURITY ASSESSMENT
ACQUISITION 40.00 AND AUTHORIZATION 50.00
30.00 Application & Interface 40.00 Infrastructure & Virtualization
Security 30.00 Security
20.00 CONFIGURATION
RISK ASSESSMENT
10.00 MANAGEMENT 20.00
0.00 10.00
Governance and Risk
Encryption & Key Management 0.00
Management
PERSONNEL SECURITY CONTINGENCY PLANNING
25
23-FEB-21
THANK YOU
By
Vivek Vijay Sarkale, DSCI
1
®
A NASSCOM Initiative
Summary
1 Background 2
Study Facets
• 100 Smart Cities Planned in India by 2022 (investment 3 lakh cr.)
• Building Blocks and Smart Cities
• Smart Cities to function on IoT Technology
Architecture
• Risk to Smart Cities ( due to Cyber Threats ) : Kinetic Impact and Jeopardize Safety
• Best Practices ( Cyber Security )
of People
• Threat Landscape/Risk Scenarios
• Security & Privacy to be integrated at design stage
for Smart Cities
• iCISA and DSCI teams to collaborate on the research project on “Smart city
• Smart Cities RFPs in India
projects - Evolution and Security concerns with reference to Internet of Things
• Public Policies
(IoT) technology”
3 Study Outcomes
2
®
A NASSCOM Initiative
Attributes of Smart City
3
®
A NASSCOM Initiative
6
®
A NASSCOM Initiative
7
®
A NASSCOM Initiative
11
®
A NASSCOM Initiative
12
®
A NASSCOM Initiative
Outcome I: Benchmarking of MoHUA,GOI guidelines against Best Practices
Layers Areas Risk Scenarios (Global)
2. Pune(2) Smart City Operations Center Onus on SI to propose information security related policies and plan Partially Compliant#
Traffic Signal Control System
3. Bhopal Smart Parking No Gaps – Following End to End Requirements Compliant
Smart Pole & Smart lighting
4. Agra Solid Waste Management No Gaps – Following End to End Requirements Compliant
5. Rajkot Integrated Command and • Onus on SI to propose information security related policies and plan Non Compliant
Control Centre Application • ISO 27001 certification
6. Gandhi Nagar Intelligent Transport Focus on IT infrastructure components security configurations Partially Compliant#
Management System
7. Varanasi ICCC No Gaps – Following End to End Requirements Compliant
Waste Management
Traffic Management
8. Ranchi Smart Parking Focus on IT infrastructure components security configurations Partially Compliant#
GIS
9. Cochin Citizen Portals Onus on SI to propose information security related policies and plan Non Compliant
10. Shirdi Smart Utilities MSI shall prepare the detailed technical security requirement and MoHUA Partially Compliant#
ICCC Guidelines mentioned as best practices
11. Faridabad Smart Utilities No Gaps – Following End to End Requirements Compliant
ICCC
# Partial
Compliance – requirements followed for one or two layers only OR
®
A NASSCOM Initiative *Detailed Gaps in Report each layers are mapped with partial requirements
Smart City Audit Checklist
Sr. NO Areas Assessment Question Yes/No/Workinprogress Compliant/Non Compliant/Remarks
Whether city has formulated a cyber security policy with
Policy
1 dedicated governance and enforcement mechanisms?
Whether city has developed a privacy policy to ensure
Policy
2 data protection of its citizen?
Is city certified on following standards or frameworks?
Security Organization Whether city has built a program to create cyber security
8 awareness for pertinent stakeholders regularly?
Does city performs regular security and privacy risk
Security Processes assessment exercises to identify and map cyber risks for
9 smart city?
16
®
A NASSCOM Initiative
Outcome III : Way Forward for Govt. ( Public Policy )
I. Benchmarking of existing II. Minimum Cyber Security III. Develop detailed IV. A mechanism to be envisaged
Govt. Security architecture Best Practices to be guidelines for for auditing of RFPs before public
guidelines against the mandated by Government implementing cyber domain release, to provide
international best practices of India security in smart cities secondary assurance on inclusion
of cyber security requirements
V. Accountability on special VI. Ensure the VII. Create a platform for VIII. Minimum ICT
purpose vehicle to adhere to implementation of cyber cyber security infrastructure requirements
security guidelines by security guidelines and link information sharing and as a criteria to be mandated
Government of India budget sanctions to the knowledge transfer for a city to qualify as a
compliance status amongst the smart cities candidate for a smart city
and other agencies (e.g.
CERT-In, NCIIPC)
IX. Mandate smart city SPVs X. Encourage smart city SPVs XI. Smart Cities to XII. Formulate security
to appoint security to perform risk assessment leverage existing ICT guidelines for OEMs
organizations with clearly and implement solutions laws in India such as IT
defined security roles and leveraging custom-off-the- Act to expedite cyber-
responsibilities shelf (COTS)/Make in crime investigation
India/open source security scenarios
Legend
(Priority) 17
® High Medium Low
A NASSCOM Initiative
Thank You.
18
®
A NASSCOM Initiative
Data Privacy in
E-Governance Projects
Assessing criticality of E-Governance Projects
Data
Personal
Data
Sensitive
Personal data
Critical Data
To be notified by
central government 3
Any Data Relating
to an Identified or
Identifiable Natural
Person
Data Qualifies as
personal data as
soon as an
individual can be
singled out
4
Examples: Personal Data you can find in your databases
National
Taxpayer
Identification Passport number,
Identification
Bank account Number, (Social) national ID number, Vehicle registration
Credit card number Number, Tax File
number Insurance Number, driver's license plate number
Number, Permanent
Social Security number
Account Number
Number
5
Sensitive Personal Data
Personal Data
Sensitive in • Subset of Personal Data
Nature
Sensitive in relation to
subject’s fundamental • Impacts the individual’s existence in society
rights and freedoms
Its processing could
create significant
risk of harm to the • High Risk Processing
subject
Financial data;
Health data;
Official identifier;
Indian Protection Sex life;
of Personal Data Bill, 2019 Sexual orientation;
Biometric data;
Genetic data;
Transgender status;
Geographical Similarities Intersex status;
Geographical Variations Caste or tribe;
Religious or political belief or affiliation 7
Processing
Collection
Destruction Recording
Restriction Organisation
Dissemination Structuring
Transmission Storage
Alteration
8
Grounds for Processing Personal Data
Data Principal’s
Consent
Function of State
Prompt action in
case emergencies
Purposes related
to employment
Reasonable
Purpose of data
fiduciary
Individual
Security
Participation Accountability
Safeguards
Rights
10
Privacy Principles
11
Privacy Principles & Best Practices
Data Collection Data Storage Data Usage Data Flow Data Disposal
Privacy Principles
Best Practices
12
Principle Based Assessment: Notice
Role of
Notice
Trigger Instruments
Transparency Content
Recording
References
& Tracking
Notice
Integration
with Channels
Process
Lifecycle
Effectiveness
Third Party & User
Enforcement Experience
Informed Special
consent considerations
Principle Based Assessment: Collection Limitation
Due
Diligence
Assurance
User
to data
experience
subjects
Employee
Transparency
Awareness
Collection
Limitation
Recording Special
& Tracking considerations
Privacy
Culture
Corporate
Instruments
messaging
Privacy
Trigger
program
Accountability
Third Party
Transparency
Enforcement
Integration
Recording & with
Tracking Process
Lifecycle
Assessment Standard
Assessment Standard
Notice
1.1.1 Users shall have real time access to the Privacy Notice during the entire Lifecycle of their involvement with the
Digital Product. The lifecycle would extend from the time of procurement of the product from the Play
store /AppStore, to Installation, registration, usage and any further Personal Information collection that happens
during usage
1.1.3 Privacy Notice shall be updated if there are any changes to the purpose of processing the PI
1.1.4 Privacy Notice should be available in the local language of the user to ensure that the user full comprehends the
terms of the Notice.
Assessment Standard
# Area Assessment Standard
1.1.1 Personal Information Entity should provide a notice which clearly states the type of Personal Information being collected from the
Collection user, and specifically sensitive personal information like health information, financial information, etc. Notice
should also mention the indirect sources of Personal information
1.1.2 Personal Information Usage Entity should provide a Notice which clearly states the purpose of collection of Personal Information from the
User. The purpose should cover PI collected directly from the user as well as from indirect sources
1.1.3 Third Parties Disclosure Notice should list the 3rd Parties or Categories with whom the Personal Information is being shared, purpose of
sharing and any mechanisms like contractual agreements that have been agreed to ensure User Privacy
1.1.5 Information Security Notice should state the Information Security and safeguard mechanisms deployed to protect the Personal
Information. Notice should state the Security obligations and expectations from the user
1.1.6 Information Retention Notice should inform the users of the Personal Information retention mechanisms and duration for which
Personal Information is retained and the criteria used to determine the retention period. This should cover the
entire Lifecycle of product usage and post de-installation.
1.1.7 Grievance Redressal Notice should provide details of Mechanism to report misuse/ breach and also the contact point of Grievance
Officer for clarification/ recourse / query
1.1.9 Legitimate Interest & other Notice should inform the user about the Use of PI for legitimate interest of the entity and also for other lawful
lawful basis for processing basis for processing. To ensure clarity to the user, examples of legitimate interest should be listed.
1.1.10 Complaint filing Notice should clearly mention the right of user to file a complaint with the Authority as well as the process for the
same
Assurance Standard Checklist
# Parameters Standard # Question Response Observation
Yes/No/NA/
Cannot Ascertain
1 Notice
1.1 Availability
1.1.1 Users shall have real time access to the Privacy Notice 1 Does the hyperlink for privacy notice of the service exist on
during the entire Lifecycle of their involvement with the Play store/AppStore/Web Portal and is it functional?
service delivery system. The lifecycle would extend
from the time of downloading/accessing the service
from the Play store/AppStore/Web Portal, to Installation,
registration, usage and any further Personal Information
collection that happens during usage.
E-GOVERNANCE
PRIVACY AUDIT
ASSURANCE PROGRAM
International Centre for Information Systems and Audit
Data Security Council of India
A. Introduction
India is fast emerging as a global front runner in digital adoption. Digitization
and technology are bringing incredible opportunities for the Indian economy
and is set play a major role in the economic and social transformation for our
nation. The Government of India has also sought to tap into this
transformative potential of digitization through the Digital India Initiative.
Envisaging delivery of a host of welfare services and to foster an environment
of digital literacy and awareness.
1
WRIT PETITION (CIVIL) NO 494 OF 2012
disclosure without consent, the service provider will be debarred from
providing that service further. 2
But the Rules remain silent on numerous other safeguards which ought to
form part of a comprehensive legal framework protecting electronic service
delivery. For instance, anonymization/obfuscation and deletion policies are
excluded from the ambit of the Rules, despite their core importance to serve
the end of confidentiality. Similarly, privacy principles such as collection
limitation and purpose limitation delineate the precise use of databases.
However, the Rules do not provide for provisions enunciating the appropriate
uses of databases. Moreover, accountability for accuracy of data as well as
individual access and control of personal information appear to be absent
from the instant Rules.
The RTI Act arms citizens with the right to access information held by the
government and ensures transparency and accountability in working of
public authorities. The Act mandates the computerisation of records by every
public authority for wide dissemination and provision of minimum recourse
to citizens to request for information formally. It not only empowers citizens
to request for information for which States must be adequately equipped for
facile and inexpensive access to information, but also casts a positive duty
of suo moto disclosure3 of information by public bodies.
2
Rule 8(4), Information Technology (Electronic Service Delivery) Rules, 2011.
3
Section 4(1)(b) & Section 4(2), Right to Information Act, 2005, “It shall be a constant endeavour of every public
authority to take steps in accordance with the requirements of clause (b) of sub-section (1) to provide as much
information suo motu to the public at regular intervals through various means of communications, including
internet, so that the public have minimum resort to the use of this Act to obtain information.”
Notwithstanding the above discussion, it cannot be disputed that the RTI Act
is the premier legislation promoting state-citizen relationship by bringing in
transparency to government functioning and providing right to citizens to
request for information pertaining to governmental functioning.
4
Access to data in the open category will be “easy, timely, user-friendly and web-based without any process of
registration/authorization.”
5
Registered access category will be accessible “only through a prescribed process of registration/authorization by
respective departments/organizations” and available to “recognized institutions/organizations/public users,
through defined procedures.”
6
Data categorized as restricted will be made available only “through and under authorization.”
7
The Non-shareable data, termed as Negative List, consists of datasets that are confidential in nature and would
compromise the national security and privacy, if made public. Some examples in this category are identification
particulars of informants/establishments in unit level data of India of Industrial production (IIP), ASI and NSS
sample surveys; and data on prices collected from different shops of various rural and urban markets selected for
preparation of Consumer Price Index (CPI). This list contains datasets containing personal information.
8
Open list comprises of datasets that don’t fall in the category of a Negative List.
9
‘Promoting e-Governance’, 11th Report of the Second Administrative Reforms Commission, December 2008.
State Legislation
Madhya Madhya Pradesh Lok Sewaon Ke Pradhan Ki Guarantee
Pradesh Adhiniyam, 2010
Bihar Bihar Lok Sewaon ka Adhikar Adhiniyam, 2011
Jharkhand Jharkhand Right to Service Act, 2011
Punjab Punjab Right to Public Service Act, 2012
Uttarakhand Uttarakhand Right to Service Act, 2011
Delhi Delhi (Right of Citizen to Time-bound Delivery of
Services) Act, 2011
Uttar Pradesh Janhit Guarantee Act, 2011
Assam Assam Right to Public Services Act, 2012
Chhattisgarh Chhattisgarh Lok Seva Guarantee Bill, 2011
Jammu & Jammu & Kashmir Public Services Guarantee Act,
Kashmir 2011
Himachal Himachal Pradesh Public Services Guarantee Act, 2011
Pradesh
Kerala Kerala State Right to Service Act, 2012
Odisha Odisha Right to Public Services Act, 2012
Gujarat Gujarat (Right of Citizens to Public Services) Bill, 2013
Goa Goa (Right to Time-Bound Delivery of Public Services)
Act 2013
West Bengal West Bengal Right to Public Services Bill, 2013
Haryana Haryana Right to Service Act, 2014
Maharashtra Maharashtra Right to Public Services Ordinance, 2015
10
https://www.telangana.gov.in/PDFDocuments/Telangana-Cyber-Security-Policy.PDF.
on a whole-of-government approach, whereby all e-Governance systems are
interconnected and integrated to provide a wide range of services online.11
The Vision of the Andhra Pradesh Cyber Security Policy 2017 is ‘to create a
robust cyber ecosystem, wherein the citizens transact online securely and
take steps to protect their identity, privacy and finances online, the
businesses conduct their operations without any disruption or damage and
the Government ensures that its data and ICT systems are secure’. As a part
of the e-Pragati Program, the Government shall design, develop and deploy a
holistic and prioritised e-Pragati Security Architecture. The Government
shall also establish an institutional mechanism for e-Pragati Security
Governance under an e-Pragati Chief Information Security Officer.
To address the cyber security challenges and following the tenets of the
Digital India initiative of the Government, the Haryana state realised the need
to establish a State Cyber Security Policy Framework as per the National
Cyber Security Policy, to serve as an umbrella framework for defining and
guiding the actions related to security in the cyberspace. The country’s
maiden State Cyber Security Policy was launched in September 2017
ensuring confidentiality and integrity of the critical IT and ICT data from
unauthorised use, disclosure, modification and disposal. However, this
policy fails to state the implications in the event of a data breach and no
penalty has been stated in the policy if a firm fails to protect data.
11
http://www.apeita.in/wp-content/uploads/2017/05/Cyber_Security-1-1.pdf.
B. Data Privacy Assessment of E-Governance Projects
The exercise to gauge the privacy posture of E-Governance projects is twofold.
Firstly, we examine the selected sample of E-governance projects against the
existing privacy framework in India, i.e. the provisions that create privacy
obligations under the Information Technology Act, 2000. Although these
provisions have been created keeping in mind ‘body corporates’ and ensuring
their accountability to protect data privacy of data subject (provider of
information). It was felt that in the absence of an overarching framework that
regulates the operation of government projects with respect to privacy, the
same yardstick may be used to examine E-Governance projects.
Secondly, the assessment of the aforementioned projects would be done
against a model audit assurance standard that has been created by examining
various global privacy legislations and best practices. This standard also
encapsulates the recommendation of the B.N. Justice Srikrishna Data
Protection Committee.
The assessment in both instances has been carried out based on established
assessment parameters-- Privacy Principles and Best Practices. These
principles and best practices have been supplemented with audit checklists
to help audits carry out these assessments.
a. SPDI Rules Assessment Parameters
Information Technology (Reasonable Security Practices and Procedures and
Sensitive Personal Data or Information) Rules, 2011
Collection Limitation
Purpose Limitation
Consent
Security Safeguards
Disclosure of Information
Transfer of Information
Grievance Redressal
The Principles and best practices that have been inscribed in the Reasonable
Security Practices and Procedures and Sensitive Personal Data or
Information) Rules, 2011 have been depicted in the above figure.
There are 7 key privacy principles and 3 best practices that will form the
foundation for our assessment in this segment. But, it is important to note
since these requirements have been designed for private sector entities, so
some restrictions have been placed on their application to keep them relevant
for the assessment of E-Governance Projects. These restrictions have been
highlighted to the following sections.
1. Privacy Principles for Assessment
1.1 Notice
Privacy notice is a public statement of how the entity applies data protection
principles to processing Personal Information. It is a statement that describes
how the entity collects, uses, retains and discloses personal information of a
data subject.
As per Rule 4, a privacy policy for handling of or dealing in personal
information including sensitive personal data or information should be
displayed on the website of the entity and should be communicated to the
provider of information (Data Subject). This policy should be clear and easily
accessible and mention type of personal or sensitive personal data or
information collected, purpose of collection and usage of such information;
disclosure of information including sensitive personal data or information as
provided and reasonable security practices and procedures implemented.12
1.2 Storage Limitation
Retention policies or retention schedules list the types of record or information
you hold, what you use it for, and how long you intend to keep it. This
principle creates an obligation on the entity to establish and document
standard retention periods for different categories of personal data.
As per Rule 5(4), sensitive personal data or information should not be retained
for longer than is required for the purposes for which the information may
lawfully be used or is otherwise required under any other law for the time
being in force.13
12
Rule 4, Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or
Information) Rules, 2011
13
Rule 5(4), Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data
or Information) Rules, 2011
As per Rule 5(2) and Rule 5(3), information should be collected for a lawful
purpose connected with a function or activity alone; such collection of
sensitive personal data or information should be considered necessary for that
purpose.14 The subject should also be informed about the nature of collection
and identity of the agency collecting and the intended receipts of the
information.15
1.4 Purpose Limitation
This principle aims to ensure that the entity is clear and open about the
reasons for obtaining personal data, and that what you do with the data is in
line with the reasonable expectations of the individuals concerned.
The framework laid down under section 43A of Information Technology Act,
2000, clubs the purpose and usage limitation principles under Rule 5 (5). As
per this rule the information collected should be used for the purpose for
which it has been collected.16
1.5 Consent
Consent signifies any freely given, informed and unambiguous indication of
the data subject’s wishes by which they can signify agreement to the
processing of their personal information referring. Consent can be obtained
by a clear affirmative action.
However, consent maybe not be necessary in all instances of processing.
There are certain kind of processing activities which necessitate that
the data subject provides their personal data through non-consensual
grounds such as function of state. This principle would not be applicable
in its entirety in our assessment as the selected e-governance projects carry
out collection of data for provision of schemes and services that may be
deemed as falling under function of state. Keeping this in mind the
assessment of this principle would be restricted to provision of ‘optional data’
or ‘additional data’, i.e. data collection which is outside the scope of the
purpose of provision of government services.
1.6 Individual Participation Rights
Through these rights, users can make a specific request and be assured that
their personal information is not being misused for purposes other than
legitimate purpose.
As per Rule 5(6), only to right access and correction has been extended to the
data subject.17
14
Rule 5(2), Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal
Data or Information) Rules, 2011
15
Rule 5(3), Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal
Data or Information) Rules, 2011
16
Rule 5(5), Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal
Data or Information) Rules, 2011
17
Rule 5(6), Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal
Data or Information) Rules, 2011
1.7 Security Safeguards
This principle places a responsibility on the entity to ensure the reasonable
security practises have been put in place around processing of personal data.
As per Rule 8, the entity must implement such security practices and
standards and have a comprehensive documented information security
programme and information security policies that contain managerial,
technical, operational and physical security control measures that are
commensurate with the information assets.18
2. Best Practices for Assessment
2.1 Disclosure of Information
As per Rule 6, disclosure of sensitive personal data or information by the
entity any third party shall require prior permission from the provider of such
information, who has provided such information under lawful contract or
otherwise, unless such disclosure has been agreed to in the contract between
the body corporate and provider of information, or where the disclosure is
necessary for compliance of a legal obligation. 19
2.2 Transfer of Information
As per rule 7, the transfer of information may be allowed only if it is necessary
for the performance of the lawful contract between the entity or any person
on its behalf and provider of information or where such person has consented
to data transfer.20
2.3 Grievance Redressal
As per rule 5(9), the entity shall designate a Grievance Officer and publish his
name and contact details on its website. The Grievance Officer shall redress
the grievances or provider of information expeditiously but within one month
from the date of receipt of grievance.21
18
Rule 8, Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data
or Information) Rules, 2011
19
Rule 6, Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data
or Information) Rules, 2011
20
Rule 7, Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data
or Information) Rules, 2011
21
Rule 5(9), Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal
Data or Information) Rules, 2011
b. Audit Assurance Program Assessment Parameters
2. Recent developments around privacy and data protection have been taken
into consideration to keep the standard contemporary and breathable at
the same time.
To test for applicability and ensure robustness, the standards have been
applied to and tested against some of the latest set of privacy related incidents
pertaining to mobile apps and websites that have occurred in India and
globally, as increasing E-Governance services are dispensed through these
mediums.
Notice: Privacy notice is a public statement of how the entity applies data
protection principles to processing Personal Information. It is a statement that
describes how the entity collects, uses, retains and discloses personal
information of a data subject.
Use Limitation: Use Limitation principle states that entity may disclose, make
available or otherwise use the Personal Information collected from user solely for
the purposes identified in the notice and for which the user has provided consent.
Storage Limitation: The entiy shall retain personal data only as long as may be
reasonably necessary to satisfy the purpose for which it is processed; or with
respect to an established retention period.
Individual Participation Rights: Through these rights, users can make a specific
request and be assured that their personal information is not being misused for
purposes other than legitimate purpose. The rights should be clearly
communicated to the data subjects and also the process to exercise the rights.
1.1 Notice
Privacy notice is a public statement of how the entity applies data protection
principles to processing Personal Information. It is a statement that describes
how the entity collects, uses, retains and discloses personal information of a
data subject. 22
Privacy notice ensures that data subjects are informed about what is going to
happen to their Personal information once it is in the custody of the entity
and it also provides the entity an opportunity to communicate its practices
and intentions to stakeholders.23
A robust Privacy Notice can be considered an indicator of Transparency and
Openness. Data Subject can decide whether they want to avail the services
provided by a digital product based on the notice.
However, there are some challenges that have been observed in the way
entities have implemented notice. Some of these are listed below:
22
APEC Privacy Framework, page 12, available at: https://www.apec.org/Publications/2005/12/APEC-Privacy-
Framework
23
Section 8, Personal Data Protection Bill, 2018, available at:
https://meity.gov.in/writereaddata/files/Personal_Data_Protection_Bill,2018.pdf
24
Personal Information Protection and Electronic Documents Act (S.C. (Statutes of Canada) 2000 available at:
https://www.priv.gc.ca/en/privacy-topics/privacy-laws-in-canada/the-personal-information-protection-and-
electronic-documents-act-pipeda/p_principle/
25
A Free and Fair Digital Economy Protecting Privacy, Empowering Indians Committee of Experts under the
Chairmanship of Justice B.N.Srikrishna (2018), available at:
https://meity.gov.in/writereaddata/files/Data_Protection_Committee_Report.pdf
grounds such as function of state.26 This principle would not be applicable
in its entirety in our assessment as the selected e-governance projects carry
out collection of data for provision of schemes and services that may be
deemed as falling under function of state. Keeping this in mind the
assessment of this principle would be restricted to provision of ‘optional
data’ or ‘additional data’, i.e. data collection which is outside the scope
of the purpose of provision of government services.
1.3 Purpose Limitation
This requirement aims to ensure that you are clear and open about your
reasons for obtaining personal data, and that what you do with the data is in
line with the reasonable expectations of the individuals concerned.27
Specifying your purposes from the outset helps you to be accountable for your
processing, and helps you avoid ‘function creep’. It also helps individuals
understand how you use their data, make decisions about whether they are
happy to share their details, and assert their rights over data where
appropriate. It is fundamental to building public trust in how you use
personal data.
There are clear links with other principles – in particular, the fairness,
lawfulness and transparency principle.28 Being clear about why you are
processing personal data will help you to ensure your processing is fair, lawful
and transparent. And if you use data for unfair, unlawful or ‘invisible’ reasons,
it’s likely to be a breach of both principles.
Privacy Law(s) require the entities to collect Personal information from user
that is adequate, relevant and limited to what is necessary in relation to the
purposes for which they are processed.29 Mobile Apps and Websites can be
intrusive and access Personal information like camera, contacts, microphone,
location, external storage. The entity may need to access the above features
to provide relevant functionality but, in many cases, it may not be relevant.
26
Section 13, Personal Data Protection Bill, 2018, available at:
https://meity.gov.in/writereaddata/files/Personal_Data_Protection_Bill,2018.pdf
27
Section 5, Personal Data Protection Bill, 2018, available at:
https://meity.gov.in/writereaddata/files/Personal_Data_Protection_Bill,2018.pdf
28
Article 5(1), EU General Data Protection Regulation, 2016 (Regulation (EU) 2016/679) available at: https://eur-
lex.europa.eu/legal-content/EN/TXT/PDF/?uri=OJ:L:2016:119:FULL
29
Section 6, Personal Data Protection Bill, 2018, available at:
https://meity.gov.in/writereaddata/files/Personal_Data_Protection_Bill,2018.pdf
1.5 Use Limitation
Use Limitation principle states that entity may disclose, make available or
otherwise use the Personal Information collected from user solely for the
purposes identified in the notice and for which the user has provided
consent.30
Once the Personal Information has fulfilled/met the purpose, it must be
destroyed as per the identified procedures for destruction and not be retained
beyond the requisite time period.
Personal data held for too long will, by definition, be unnecessary. You are
unlikely to have a lawful basis for retention. From a more practical
perspective, it is inefficient to hold more personal data than you need, and
there may be unnecessary costs associated with storage and security.
Remember that you must also respond to subject access requests for any
personal data you hold. This may be more difficult if you are holding old data
for longer than you need. Good practice around storage limitation - with clear
policies on retention periods and erasure - is also likely to reduce the burden
of dealing with queries about retention and individual requests for erasure.
However, if you don’t have a retention policy (or if it doesn’t cover all of the
personal data you hold), you must still regularly review the data you hold,
and delete or anonymise anything you no longer need.
1.7 Security Safeguards
Entities should protect personal information that they collect or have in their
custody with reasonable security safeguards against loss, unauthorised
access, destruction, use, modification, disclosure or other reasonably
30
OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, available at:
http://www.oecd.org/sti/ieconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.h
tm
31
Section 10, Personal Data Protection Bill, 2018, available at:
https://meity.gov.in/writereaddata/files/Personal_Data_Protection_Bill,2018.pdf
foreseeable risks.32 Such safeguards should be proportional to the risk
associated with the personal information misuse and the harms. Entity
should also conduct periodic review and reassessment of the security
measures deployed. 33
1.8 Transparency
Transparency principle is a fundamental piece of the assessment standard, it
has cross cutting elements with other principle such as-Notice, purpose
limitation, etc. It places an overarching responsibility on the state to maintain
transparency over the processes and practices of the state while processing
personal data of individuals for public service delivery.
1.9 Accountability
The principle states that an entity is accountable for complying with the
privacy principles. Entity must have in place appropriate policies and
procedures that promote privacy.34 Entity should be Transparent in its
practices and should provide mechanism for data subject participation.
Accountability also implies the “Demonstration of Compliance”. The principle
of Accountability for a mobile application or website is being tested from the
perspective of an auditor and regulator. 35
1.10 Individual Participation Rights
The privacy regulations around the world aim to give users more control over
the ways in which entities’ process their personal information and this has
led to the granting of new rights to users. Through these rights, users can
make a specific request and be assured that their personal information is not
being misused for purposes other than legitimate purpose.36
GDPR has included new rights like right to erasure, restriction to processing
and objection to automated decision making. Entities are trying to implement
processes catering to these rights.37
Entity should implement processes to receive and subsequently action upon
requests from data subjects around their Rights from a PI perspective. The
rights should be clearly communicated to the data subjects and also the
32
Section 31, Personal Data Protection Bill, 2018, available at:
https://meity.gov.in/writereaddata/files/Personal_Data_Protection_Bill,2018.pdf
33
Supra 27.
34
Centre for Information Policy Leadership. (2018). The Case for Accountability: How it enables Effective Data
Protection and Trust in the Digital Society, available at:
https://www.informationpolicycentre.com/uploads/5/7/1/0/57104281/cipl_accountability_paper_1_-
_the_case_for_accountability_-
_how_it_enables_effective_data_protection_and_trust_in_the_digital_society.pdf
35
Article 5(2), EU General Data Protection Regulation, 2016 (Regulation (EU) 2016/679) available at: https://eur-
lex.europa.eu/legal-content/EN/TXT/PDF/?uri=OJ:L:2016:119:FULL
36
Privacy Rule, Health Insurance Portability and Accountability Act, 1996, HHS.gov. (2008). Privacy. Available
at: https://www.hhs.gov/hipaa/for-professionals/privacy/index.html
37
Chapter 3, EU General Data Protection Regulation, 2016 (Regulation (EU) 2016/679) available at: https://eur-
lex.europa.eu/legal-content/EN/TXT/PDF/?uri=OJ:L:2016:119:FULL
process to exercise the rights. The rights could be around Access and
Correction of PI to any other rights depending on the geography. The requests
from Data Subjects should be resolved in a reasonable time.
38
Cavoukian, Ann. (2011). Privacy by Design The 7 Foundational Principles, available at:
https://www.ryerson.ca/pbdce/certification/seven-foundational-principles-of-privacy-by-design/
39
Section 29, Personal Data Protection Bill, 2018, available at:
https://meity.gov.in/writereaddata/files/Personal_Data_Protection_Bill,2018.pdf
40
Section 36, Personal Data Protection Bill, 2018, available at:
https://meity.gov.in/writereaddata/files/Personal_Data_Protection_Bill,2018.pdf
2.4 Data Protection Impact Assessment
A data protection impact assessment (DPIA) is a process centred on evaluating
activities that involve high risks to the data protection rights of individuals.
The process can become necessary whenever a new project is taken up or a
new policy is adopted by a data controller which may involve the use of a new
technology or may have a significant impact on the data protection rights of
individuals.41 A DPIA is aimed at describing the details regarding the
processing activity, assessing the necessity and proportionality of such an
activity, and helping manage the risks that are identified in relation to this
activity.42 The DPIA is carried out before the proposed processing activity is
initiated so that the relevant data controller can plan the processing at the
outset itself.
SNo. Requirements
1 Privacy Policy in place
Some key points around the minimum criteria have been listed below.
1. Presence of a Privacy Policy and Notice are basic minimum criteria for any
organization which is committed to Privacy. Privacy Policy is typically an
internal document which states the entities’ intent and key processes to
maintain Privacy. Privacy Notice, on the other hand, is an external facing
document, which talks about the key Personal Information collected and
its uses, security posture and also point of contact in case of a grievance.
41
Section 33, Personal Data Protection Bill, 2018, available at:
https://meity.gov.in/writereaddata/files/Personal_Data_Protection_Bill,2018.pdf
42
Article 35, EU General Data Protection Regulation, 2016 (Regulation (EU) 2016/679) available at: https://eur-
lex.europa.eu/legal-content/EN/TXT/PDF/?uri=OJ:L:2016:119:FULL
Lack of policy and notice indicates a lack of cohesive planning towards
Privacy.
1. Notice
Availability Users shall have real time access to the Privacy Notice during the
entire Lifecycle of their involvement with the service delivery
system. The lifecycle would extend from the time of
downloading/accessing the service from the Play
store/AppStore/Web Portal, to Installation, registration, usage
and any further Personal Information collection that happens
during usage.
Users shall be updated of any changes to the Privacy Notice.
Privacy Notice shall be updated if there are any changes to the
purpose of processing the PI.
Privacy Notice should be available in the local language of the
user to ensure that the user full comprehends the terms of the
Notice.
Content Entity should provide a notice which clearly states the type of
Personal Information being collected from the user, and
specifically sensitive personal information like health
information, financial information, etc. Notice should also
mention the indirect sources of Personal information.
Entity should provide a Notice which clearly states the purpose
of collection of Personal Information from the User. The purpose
43
Personal Data Protection Bill, 2018, available at:
https://meity.gov.in/writereaddata/files/Personal_Data_Protection_Bill,2018.pdf
44
DSCI Privacy Assessment Framework, (2013). Data Security Council of India. Page 13-36.
45
EU General Data Protection Regulation, 2016 (Regulation (EU) 2016/679) available at: https://eur-
lex.europa.eu/legal-content/EN/TXT/PDF/?uri=OJ:L:2016:119:FULL
46
A Free and Fair Digital Economy Protecting Privacy, Empowering Indians Committee of Experts under the
Chairmanship of Justice B.N.Srikrishna (2018), available at:
https://meity.gov.in/writereaddata/files/Data_Protection_Committee_Report.pdf
should cover PI collected directly from the user as well as from
indirect sources.
Notice should list the 3rd Parties or Categories with whom the
Personal Information is being shared, purpose of sharing and any
mechanisms like contractual agreements that have been agreed
to ensure User Privacy.
Notice should communicate to the user if their Personal
Information is being transferred to another country and also the
purpose of the transfer.
Notice should state the Information Security and safeguard
mechanisms deployed to protect the Personal Information. Notice
should state the Security obligations and expectations from the
user.
Notice should inform the users of the Personal Information
retention mechanisms and duration for which Personal
Information is retained and the criteria used to determine the
retention period. This should cover the entire Lifecycle of product
usage and post de-installation.
Notice should provide details of Mechanism to report misuse/
breach and also the contact point of Grievance Officer for
clarification/ recourse / query.
Notice should mention the Standards followed by the entity.
Notice should clearly mention organizational responsibilities
towards Privacy of user and also mention scope and boundaries
of their responsibilities. (E.g. Clicking on Ads that appear on
mobile app. Once the user clicks and gets directed to the Web page
of ad, organizational boundary ends, and user needs to
understand policies of the redirected site)
Notice should clearly communicate to the user about their
various rights from a PI perspective. The rights could be around
Access and Correction of PI to any other rights (i.e. objection to
processing, data portability, erasure) depending on the
geography. The significance of the rights and process for availing
the rights should also be clearly mentioned.
Notice should inform the user about the Use of PI for legitimate
interest of the entity and also for other lawful basis for
processing. To ensure clarity to the user, examples of legitimate
interest should be listed.
Notice should clearly mention the right of user to file a complaint
with the Supervisory Authority as well as the process for the
same
Notice should provide the user some basics of the entity like
contact details and also details of the Notice like Last Updated
date
Implementation All the statements made in the Notice should have been
implemented by the entity in terms of processes and procedures
and the same should be verifiable. As other standards are
evaluated as part of the Seal, a cross check on whether the details
match with the statements in the Notice should be done. (E.g. In
Collection Limitation, as the tester reviews the Personal
Information collected from the user, one they should evaluate if
the Personal Information collected is the same as what's
mentioned in the notice).
The implementation check would only be confined to the
boundaries of the product
2 Consent Entity should take consent from User for their agreement with
the Privacy Policy/Notice for collection of optional/additional
personal data which isn’t necessary for providing the service.
Entity should clearly demarcate mandatory and optional data
when collecting data from the user. Optional data are those data
points which are not critical for the service provided by the Entity.
For optional/ additional personal data collected from the user,
they should have the option to withdraw consent at any point of
time and the process to withdraw consent should be easily
available and communicated to the user in advance. The request
should be respected within a reasonable amount of time.
3 Purpose Personal data shall be processed only for purposes that are clear,
Limitation specific and lawful.
Personal data shall be processed only for purposes specified or
for any other incidental purpose that the data principal would
reasonably expect the personal data to be used for, having regard
to the specified purposes, and the context and circumstances in
which the personal data was collected.
4 Collection Entity would only collect Personal information (PI) from user
Limitation which is Adequate and relevant to provide the services, done by
lawful (Adhering to all relevant rules of law) and fair (Without
intimidation or deception) means and in good faith and does not
harm the data subject
The PI collected by the entity from the User is in line with the
information provided in the Notice.
5 Use Limitation The PI collected by the entity from the User is used for the same
purposes and context as mentioned in the Notice.
The existing framework under SPDI Rules and the Audit Assurance program
was used to assess privacy practices of 11 E-Governance Projects in India
that make use of online dissemination of government services, through service
delivery websites, portals and mobile applications.
Notice The Privacy notice is Notice The website page displays the
available in local hyperlink to view privacy
language. notice while collecting new PI
The Privacy notice from user on subsequent
doesn’t mention if it pages of website.
uses any the other The Privacy notice is available
(indirect) sources from in local language.
where PI/SPI of user is The Privacy notice doesn’t
collected by the mention if it uses any the
Entity. other (indirect) sources from
The privacy notice where PI/SPI of user is
does not state the collected by the Entity.
security obligations The Privacy notice does not
and expectations from inform the user about the
the user to protect existence of any other
their PI/SPI. tracking mechanisms used to
The Privacy notice collect, store, transmit or
does not mention any process PII/SPI.
retention period. The privacy notice does not
state the security obligations
The Privacy Notice and expectations from the
does not inform user user to protect their PI/SPI.
about the standards it The Privacy Notice does not
follows. inform user about the
The privacy notice standards it follows.
does not inform the The privacy notice does not
user about their rights inform the user about their
and how these rights rights and how these rights
can be exercised. can be exercised.
The Privacy notice does not
mention any retention period.
Consent The website does not Consent The website does not take
take consent from consent from user for the
user for the privacy privacy notice on the landing
notice on the landing page/registration page of
page/registration website (via click of
page of website (via continue/agree or through
click of check box).
continue/agree or The website does not provide
through check box). user an option to withdraw
The Website does consent.
provide an option to The Website does provide an
user not to provide PI, option to user not to provide
which is not necessary PI, which is not necessary for
for provision of provision of services.
services. (Optional (Optional data entry fields)
data entry fields)
Purpose The privacy notice does Purpose The privacy notice does not
Limitation not clearly state the Limitation clearly state the purpose of
purpose of processing the processing the personal data and
personal data and sensitive personal data.
sensitive personal data.
Use Limitation Assessment for this principle
could not be ascertained, with the
available information.
Storage The Privacy notice Storage The Privacy notice failed to
Limitation failed to inform the Limitation inform the user about any
user about any retention period for the
retention period for personal data processed.
the personal data The privacy notice does not
processed. inform the user about the
The privacy notice criteria to determine the
does not inform the retention period.
user about the criteria Assessment did not reveal the
to determine the existence of a retention
retention period. period that the project
Assessment did not follows, with respect to
reveal the existence of processing of personal data.
a retention period that
the project follows,
with respect to
processing of personal
data.
Security The privacy notice Security The privacy notice states the
Safeguards states the security Safeguards security practices and
practices and procedures to protect the
procedures to protect PI/SPI of the user.
the PI/SPI of the user. The website does not store
The website does not any data of the user on the
store any data of the local storage.
user on the local The website doesn’t leak
storage. PI/SPI through privilege
The website doesn’t escalation.
leak PI/SPI through The website doesn’t leak
privilege escalation. PI/SPI through SQL injection
The website doesn’t attacks.
leak PI/SPI through The website doesn’t leak
SQL injection attacks. PI/SPI through XSS attacks.
The website doesn’t The website transmits the
leak PI/SPI through data collected in a secure
XSS attacks. encrypted manner.
The website transmits The website does not contain
the data collected in a any uncommon open ports.
secure encrypted The website uses session
manner. cookies for login sessions in
The website does not secure manner.
contain any The website code doesn’t
uncommon open contain
ports. Passwords/encryption key in
The website uses hard coded manner i.e.
session cookies for visible in source code.
login sessions in
secure manner.
The website code
doesn’t contain
Passwords/encryption
key in hard coded
manner i.e. visible in
source code.
Assessment for this best (A) Privacy by Design Its compliant with
practice could not be the notice
Transfer of ascertained, with the availability
Information available information. segment of the
assessment.
Is partially
compliant with the
individual
participation
rights execution.
(B) Data Protection The Passport Seva
Officer Service does not inform
the user of the
existence of a Data
Protection officer for
privacy compliance.
Grievance The website does not (C) Grievance Redressal The website does not
Redressal provide a dedicated point provide a dedicated
of contact for execution of point of contact for
rights and grievance execution of rights and
redressal, however grievance redressal,
provisions a support email however provisions a
id for assistance. support email id for
assistance.
(D) Data Protection Assessment for this
Impact Assessment principle could not be
ascertained, with the
available information.
1.2 Observations
The Passport Seva Service shows great promise in creating accountable
privacy practices. There is proactive compliance with privacy principles-
Collection Limitation and Individual Participation Rights. There are also,
their well-defined security practices, clear communication with respect to
collection limitation. The project would have to establish better practises to
enable user control and execution of rights. Absence of a touch point for
Individual participation rights and grievance redressal needs to be resolved to
ensure privacy compliance.
2. Income Tax-E-Filing Portal
This is the official portal of Income Tax Department, Ministry of Finance,
Government of India. The portal has been developed as a Mission Mode
Project under the National E-Governance Plan. The objective of this portal is
to provide a single window access to the income tax related services for
citizens and other stakeholders.
2.1 Assessment
Security The privacy notice Security The privacy notice states the
Safeguards states the security Safeguards security practices and
practices and procedures to protect the
procedures to protect PI/SPI of the user.
the PI/SPI of the user. The website does not store
The website does not any data of the user on the
store any data of the local storage.
user on the local The website doesn’t leak
storage. PI/SPI through privilege
The website doesn’t escalation.
leak PI/SPI through The website doesn’t leak
privilege escalation. PI/SPI through SQL injection
The website doesn’t attacks.
leak PI/SPI through The website doesn’t leak
SQL injection attacks. PI/SPI through XSS attacks.
The website doesn’t The website transmits the
leak PI/SPI through data collected in a secure
XSS attacks. encrypted manner.
The website transmits The website does not contain
the data collected in a any uncommon open ports.
secure encrypted The website uses session
manner. cookies for login sessions in
The website does not secure manner.
contain any The website code doesn’t
uncommon open contain
ports. Passwords/encryption key in
The website uses hard coded manner i.e.
session cookies for visible in source code.
login sessions in
secure manner.
The website code
doesn’t contain
Passwords/encryption
key in hard coded
manner i.e. visible in
source code.
2.2 Observations
The Income Tax E-filing Portal shows great promise in creating accountable
privacy practices. There is proactive compliance with privacy principles-
Purpose Limitation, Collection Limitation and Notice Availability. There
are also, their well-defined security practices. The project would have to
establish better practises to enable user control and execution of rights.
Absence of a touch point for Individual participation rights and grievance
redressal needs to be resolved to ensure privacy compliance and increasing
the level adoption of privacy by design in the project.
3. National Portal of India
This is the Official Portal of the Government of India, designed, developed
and hosted by the National Informatics Centre (NIC), a premier ICT
organization of the Government of India under the aegis of the Ministry of
Electronics & Information Technology. The Portal has been developed as a
Mission Mode Project (MMP) under the National E-Governance Plan (NEGP)
of the Government. The portal was launched in November 2005.The objective
behind the Portal is to provide a single window access to the information and
services being provided by the Indian Government for citizens and other
stakeholders. An attempt has been made through this Portal to provide
comprehensive, accurate, reliable and one stop source of information about
India and its various facets. The current Portal is a metadata driven site that
links to the other Indian Government Portals/websites for most updated
information.
3.1 Assessment
Security The privacy notice Security The privacy notice states the
Safeguards states the security Safeguards security practices and
practices and procedures to protect the
procedures to protect PI/SPI of the user.
the PI/SPI of the user. The website does not store
The website does not any data of the user on the
store any data of the local storage.
user on the local The website doesn’t leak
storage. PI/SPI through privilege
The website doesn’t escalation.
leak PI/SPI through The website doesn’t leak
privilege escalation. PI/SPI through SQL injection
The website doesn’t attacks.
leak PI/SPI through The website doesn’t leak
SQL injection attacks. PI/SPI through XSS attacks.
The website doesn’t The website transmits the
leak PI/SPI through data collected in a secure
XSS attacks. encrypted manner.
The website transmits The website does not contain
the data collected in a any uncommon open ports.
secure encrypted The website uses session
manner. cookies for login sessions in
The website does not secure manner.
contain any The website code doesn’t
uncommon open contain
ports. Passwords/encryption key in
The website uses hard coded manner i.e.
session cookies for visible in source code.
login sessions in
secure manner.
The website code
doesn’t contain
Passwords/encryption
key in hard coded
manner i.e. visible in
source code.
3.2 Observations
The India Portal shows great promise in creating accountable privacy
practices. There is proactive compliance with privacy principles- Collection
Limitation, Use Limitation and Purpose limitation. There are also, their
well-defined security practices, clear communication with respect to collection
limitation. The project would have to establish better practises to enable user
control and execution of rights. Absence of a touch point for Individual
participation rights and grievance redressal needs to be resolved to ensure
privacy compliance. The inclusion of Privacy risks in project risk assessment
is a great step towards building sustainable privacy practices.
4.1 Assessment
Notice The website page does Notice The website page does not
not display the display the hyperlink to view
hyperlink to view privacy notice while collecting
privacy notice while new PI from user on
collecting new PI from subsequent pages of website.
user on subsequent The Privacy notice is not
pages of website. available in any local
The Privacy notice is language.
not available in any The Privacy notice doesn’t
local language. mention if it uses any the
The Privacy notice other (indirect) sources from
doesn’t mention if it where PI/SPI of user is
uses any the other collected by the Entity.
(indirect) sources from The Privacy notice does not
where PI/SPI of user is inform the user about the
collected by the existence of any other
Entity. tracking mechanisms used to
The Privacy notice collect, store, transmit or
does not inform the process PII/SPI.
user about the The privacy notice does not
existence of any other state the security obligations
tracking mechanisms
used to collect, store, and expectations from the
transmit or process user to protect their PI/SPI.
PII/SPI. The Privacy Notice does not
The privacy notice inform user about the
does not state the standards it follows.
security obligations The privacy notice does not
and expectations from inform the user about their
the user to protect rights and how these rights
their PI/SPI. can be exercised.
The Privacy Notice The Privacy notice does not
does not inform user mention any retention period.
about the standards it
follows.
The privacy notice
does not inform the
user about their rights
and how these rights
can be exercised.
The Privacy notice
does not mention any
retention period.
Purpose The privacy notice clearly Purpose The privacy notice clearly states
Limitation states the purpose of Limitation the purpose of processing the
processing the personal personal data and sensitive
data and sensitive personal data.
personal data.
Use Limitation Digital Seva Portal Service is in
compliance with this principle
from the assessment of the
information provided by the
department in charge of
execution.
Storage The Privacy notice Storage The Privacy notice failed to
Limitation failed to inform the Limitation inform the user about any
user about any retention period for the
retention period for personal data processed.
the personal data The privacy notice does not
processed. inform the user about the
The privacy notice criteria to determine the
does not inform the retention period.
user about the criteria Assessment did not reveal the
to determine the existence of a retention
retention period. period that the project
Assessment did not follows, with respect to
reveal the existence of processing of personal data.
a retention period that
the project follows,
with respect to
processing of personal
data.
Security The privacy notice Security The privacy notice states the
Safeguards states the security Safeguards security practices and
practices and procedures to protect the
procedures to protect PI/SPI of the user.
the PI/SPI of the user. The website does not store
The website does not any data of the user on the
store any data of the local storage.
user on the local The website doesn’t leak
storage. PI/SPI through privilege
The website doesn’t escalation.
leak PI/SPI through The website doesn’t leak
privilege escalation. PI/SPI through SQL injection
The website doesn’t attacks.
leak PI/SPI through The website doesn’t leak
SQL injection attacks. PI/SPI through XSS attacks.
The website doesn’t The website transmits the
leak PI/SPI through data collected in a secure
XSS attacks. encrypted manner.
The website transmits The website does not contain
the data collected in a any uncommon open ports.
secure encrypted The website uses session
manner. cookies for login sessions in
The website does not secure manner.
contain any The website code doesn’t
uncommon open contain
ports. Passwords/encryption key in
The website uses hard coded manner i.e.
session cookies for visible in source code.
login sessions in
secure manner.
The website code
doesn’t contain
Passwords/encryption
key in hard coded
manner i.e. visible in
source code.
Transfer of Assessment for this best (B) Data Protection The Digital Seva Portal
Information practice could not be Officer does not inform the
user of the existence of
ascertained, with the a Data Protection
available information. officer for privacy
compliance.
Grievance The website only provides (C) Grievance Redressal The website only
Redressal a support email id for provides a support
grievances. It does not email id for grievances.
provide a point of contact It does not provide a
for execution of rights and point of contact for
grievance redressal. execution of rights and
grievance redressal.
(D) Data Protection Privacy Risks were
Impact Assessment evaluated while
performing risk
assessment for
this project.
The information
provided does not
provide more
insight into the
process of
evaluation.
4.2 Observations
The Digital Seva Portal shows promise in creating accountable privacy
practices. There is proactive compliance with privacy principles- Collection
Limitation, Use Limitation and Purpose limitation. There are also, their
well-defined security practices, clear communication with respect to collection
limitation. The project would have to establish better practises to enable user
control and execution of rights. Absence of a touch point for Individual
participation rights and grievance redressal needs to be resolved to ensure
privacy compliance. The inclusion of Privacy risks in project risk assessment
is a great step towards building sustainable privacy practices.
5. School Education- Shaala Darpan
KV Shaala Darpan is an e-Governance platform for all Kendriya Vidyalayas in
the country. It aims to improve quality of learning, efficiency of school
administration, governance of schools & service delivery to key stakeholders
namely, students, parents, teachers, community and schools. The project KV
Shaala Darpan is under implementation. The Ministry has also written to all
States/UTs to implement Shaala Darpan in their respective states.
5.1 Assessment
Notice The website page does not Notice The website page does not display
display a privacy notice to a privacy notice to the users.
the users.
Consent The website does not Consent The website does not take
take consent from user consent from user for the
for the privacy notice on privacy notice on the landing
the landing page/registration page of
page/registration page website (via click of
of website (via click of continue/agree or through
continue/agree or check box).
through check box). The Privacy notice does not
The Website does not inform the user that by
provide an option to reading the content of the
user not to provide PI, privacy notice and by
which is not necessary continuing to use the
for provision of services. application, user agrees to be
(Optional data entry bound by the terms of Privacy
fields) Notice.
The website does not provide
user an option to withdraw
consent.
The Website does not provide
an option to user not to
provide PI, which is not
necessary for provision of
services. (Optional data entry
fields)
Security The privacy notice Security The privacy notice states the
Safeguards states the security Safeguards security practices and
practices and procedures to protect the
procedures to protect PI/SPI of the user.
the PI/SPI of the user. The website does not store
The website does not any data of the user on the
store any data of the local storage.
user on the local The website doesn’t leak
storage. PI/SPI through privilege
The website doesn’t leak escalation.
PI/SPI through privilege The website doesn’t leak
escalation. PI/SPI through SQL injection
The website doesn’t leak attacks.
PI/SPI through SQL The website doesn’t leak
injection attacks. PI/SPI through XSS attacks.
The website doesn’t leak The website transmits the
PI/SPI through XSS data collected in a secure
attacks. encrypted manner.
The website transmits The website does not contain
the data collected in a any uncommon open ports.
secure encrypted The website uses session
manner. cookies for login sessions in
The website does not secure manner.
contain any uncommon The website code doesn’t
open ports. contain
The website uses Passwords/encryption key in
session cookies for login hard coded manner i.e.
sessions in secure visible in source code.
manner.
The website code
doesn’t contain
Passwords/encryption
key in hard coded
manner i.e. visible in
source code.
5.2 Observations
Shaala Darpan, follows well established security practices. But with respect
to privacy there’s a lot to be desired. Even though there exists a national level
policy for privacy, the same hasn’t been expressed in this instance. As we
have seen in recent years, the absence of a privacy notice is a major privacy
error as notice has emerged as the mode of communicating with the end
citizen their rights and enabling greater transparency in E-Governance
practices.
6. E-Vahan- Delhi
The Ministry of Road Transport & Highways (MoRTH) has been facilitating
computerization of over 1100 Road Transport Offices (RTOs) across the
country. RTOs issue Registration Certificate (RC) & Driving License (DL) that
are mandatory requirements and are valid across the country, subject to
certain provisions and permissions. Govt. of NCT of Delhi has
shifted Vahan Online Services to make these mandatory requirements
executable.
6.1 Assessment
Notice The website page does not Notice The website page does not
display a privacy notice to display a privacy notice to the
the users. users.
Consent The website does not Consent The website does not take
take consent from consent from user for the
user for the privacy privacy notice on the landing
notice on the landing page/registration page of
page/registration website (via click of
page of website (via continue/agree or through
click of check box).
continue/agree or The website does not provide
through check box). user an option to withdraw
The Website does not consent.
provide an option to The Website does not provide
user not to provide PI, an option to user not to
which is not necessary provide PI, which is not
for provision of necessary for provision of
services. (Optional services. (Optional data entry
data entry fields) fields)
Collection The Personal Data Collection The Personal Data collection
Limitation collection while Limitation while signing up is not
signing up is not specified in the privacy notice
specified in the but is functionally necessary
privacy notice but is to provide the service.
functionally necessary The Use of tracking
to provide the service. mechanisms is limited to 3rd
The Use of tracking party cookies and e-tags.
mechanisms is limited It doesn’t take access to any
to 3rd party cookies additional data through
and e-tags. microphone, camera, location
It doesn’t take access to and notification permissions.
any additional data
through microphone,
camera, location and
notification permissions.
Purpose The privacy notice doesn’t Purpose The privacy notice doesn’t state
Limitation state the purpose of Limitation the purpose of processing the
processing the personal personal data and sensitive
data and sensitive personal data.
personal data.
Use Limitation Assessment for this principle
could not be ascertained, with the
available information.
Storage The Privacy notice Storage The Privacy notice failed to
Limitation failed to inform the Limitation inform the user about any
user about any retention period for the
retention period for personal data processed.
the personal data The privacy notice does not
processed. inform the user about the
The privacy notice criteria to determine the
does not inform the retention period.
user about the criteria Assessment did not reveal the
to determine the existence of a retention
retention period. period that the project
Assessment did not follows, with respect to
reveal the existence of processing of personal data.
a retention period that
the project follows,
with respect to
processing of personal
data.
Security The privacy notice Security The privacy notice states the
Safeguards states the security Safeguards security practices and
practices and procedures to protect the
procedures to protect PI/SPI of the user.
the PI/SPI of the user. The website does not store
The website does not any data of the user on the
store any data of the local storage.
user on the local The website doesn’t leak
storage. PI/SPI through privilege
escalation.
The website doesn’t The website doesn’t leak
leak PI/SPI through PI/SPI through SQL injection
privilege escalation. attacks.
The website doesn’t The website doesn’t leak
leak PI/SPI through PI/SPI through XSS attacks.
SQL injection attacks. The website transmits the
The website doesn’t data collected in a secure
leak PI/SPI through encrypted manner.
XSS attacks. The website does not contain
The website transmits any uncommon open ports.
the data collected in a The website uses session
secure encrypted cookies for login sessions in
manner. secure manner.
The website does not The website code doesn’t
contain any contain
uncommon open Passwords/encryption key in
ports. hard coded manner i.e.
The website uses visible in source code.
session cookies for
login sessions in
secure manner.
The website code
doesn’t contain
Passwords/encryption
key in hard coded
manner i.e. visible in
source code.
6.2 Observations
Project E-Vahan- Delhi follows well established security practices. But with
respect to privacy there’s a lot to be desired. Even though there exists a
national level policy for privacy, the same hasn’t been expressed in this
instance. As we have seen in recent years, the absence of a privacy notice is
a major privacy error as notice has emerged as the mode of communicating
with the end citizen their rights and enabling greater transparency in E-
Governance practices.
7. My Gov
MyGov aims to establish a link between Government and Citizens towards
meeting the goal of good governance. MyGov encourages citizens as well as
people abroad to participate in various activities i.e. 'Do', 'Discuss', 'Poll',
'Talk', ‘Blog’, etc. There are multiple theme-based discussions on MyGov
where a wide range of people can share their thoughts and ideas. 35.6 lakh
registered users have participated in 49 groups, 492 tasks, 590 discussion
themes and 221 blogs.
7.1 Assessment
Notice The website page does Notice The website page does not
not display the display the hyperlink to view
hyperlink to view privacy notice while collecting
privacy notice while new PI from user on
collecting new PI from subsequent pages of website.
user on subsequent The Privacy notice is available
pages of website. in a local language.
The Privacy notice is Hyperlink for privacy notice
available in a local of the application does not
language. exist on the launch screen of
Hyperlink for privacy the application.
notice of the The user does not have an
application does not option to refer to the privacy
exist on the launch notice while using the
screen of the application.
application. The application page does not
The user does not display the hyperlink to view
have an option to refer privacy notice while collecting
to the privacy notice new PI from user on
while using the subsequent pages of
application. application for subscription
The application page purposes.
does not display the The privacy notice is easily
hyperlink to view accessible to the user.
privacy notice while Privacy notice is available to
collecting new PI from the user in a local Language.
user on subsequent The Privacy notice informs
pages of application the user about the cookies
for subscription used to collect, store,
purposes. transmit or process PI/SPI.
The privacy notice is The privacy notice
easily accessible to the communicates to the user
user. about the third parties or the
Privacy notice is categories of third parties to
available to the user in which the information will be
a local Language. shared and for what purpose.
The Privacy notice The privacy notice does not
informs the user state the security obligations
about the cookies and expectations from the
used to collect, store, user to protect their PI/SPI.
transmit or process The Privacy Notice does not
PI/SPI. inform user about the
The privacy notice standards it follows.
communicates to the The privacy notice does
user about the third inform the user about their
parties or the rights and how these rights
categories of third can be exercised.
parties to which the The Privacy notice does not
information will be mention any retention period.
shared and for what The Privacy notice clearly
purpose. states the type of the PI/SPI
The privacy notice collected by the Entity
does not state the The Privacy Notice clearly
security obligations states the purpose of the
and expectations from PI/SPI collected by the
the user to protect Entity.
their PI/SPI. The Privacy Notice does state
The Privacy Notice the security obligations and
does not inform user expectations from the user to
protect their PI/SPI.
about the standards it The Privacy Notice does not
follows. inform the user about any
The privacy notice retention period/ the criteria
does inform the user to determine the retention
about their rights and period.
how these rights can The Privacy notice does not
be exercised. inform the user how the
The Privacy notice PI/SPI will be treated once
does not mention any the user has uninstalled the
retention period. application.
The Privacy notice The Privacy Notice does not
clearly states the type inform user about the
of the PI/SPI collected standards it follows.
by the Entity The Privacy Notice does not
The Privacy Notice inform the user about their
clearly states the rights and how these rights
purpose of the PI/SPI can be exercised.
collected by the
Entity.
The Privacy Notice
does state the security
obligations and
expectations from the
user to protect their
PI/SPI.
The Privacy Notice
does not inform the
user about any
retention period/ the
criteria to determine
the retention period.
The Privacy notice
does not inform the
user how the PI/SPI
will be treated once
the user has
uninstalled the
application.
The Privacy Notice
does not inform user
about the standards it
follows.
The Privacy Notice
does not inform the
user about their rights
and how these rights
can be exercised.
Consent The website and Consent The website does not take
application do not consent from user for the
take consent from privacy notice on the landing
user for the privacy page/registration page of
notice on the landing website (via click of
page/registration continue/agree or through
page of website (via check box).
click of The website and application
continue/agree or do not provide user an option
through check box). to withdraw consent.
The Website and The Website and application
application do not do not provide an option to
provide an option to user not to provide PI, which
user not to provide PI, is not necessary for provision
which is not necessary of services. (Optional data
for provision of entry fields)
services. (Optional
data entry fields)
Collection The Personal Data Collection The Personal Data collection
Limitation collection while Limitation while signing up is restricted
signing up is to, which is functionally
restricted to, which is necessary to provide the
functionally necessary service.
to provide the service. The Use of tracking
The Use of tracking mechanisms is limited to 3rd
mechanisms is limited party cookies and e-tags.
to 3rd party cookies It doesn’t take access to any
and e-tags. additional data through
It doesn’t take access microphone, camera, location
to any additional data and notification permissions.
through microphone, The Application takes 6
camera, location and dangerous permissions,
notification which is lower than the
permissions. industry average.
The Application takes The application only takes 2
6 dangerous other high-risk Permissions
permissions, which is as well, which in in
lower than the combination with other
industry average. information can identify the
The application only user.
takes 2 other high-risk The Application still works if
Permissions as well, dangerous group permissions
which in in are disabled, hence not
combination with locking out the user of the
other information can service.
identify the user.
The Application still works
if dangerous group
permissions are disabled,
hence not locking out the
user of the service.
Purpose The privacy notice clearly Purpose The privacy notice clearly states
Limitation states the purpose of Limitation the purpose of processing the
processing the personal personal data and sensitive
data and sensitive personal data.
personal data.
Use Limitation MyGov Website and Application
are in compliance with this
principle in accordance with the
information supplied.
Storage The Privacy notice Storage The Privacy notice failed to
Limitation failed to inform the Limitation inform the user about any
user about any retention period for the
retention period for personal data processed.
the personal data The privacy notice does not
processed. inform the user about the
The privacy notice criteria to determine the
does not inform the retention period.
user about the criteria Assessment did not reveal the
to determine the existence of a retention
retention period. period that the project
Assessment did not follows, with respect to
reveal the existence of processing of personal data.
a retention period that
the project follows,
with respect to
processing of personal
data.
Security The privacy notice Security The privacy notice states the
Safeguards states the security Safeguards security practices and
practices and procedures to protect the
procedures to protect PI/SPI of the user.
the PI/SPI of the user. The website does not store
The website does not any data of the user on the
store any data of the local storage.
user on the local The website doesn’t leak
storage. PI/SPI through privilege
The website doesn’t escalation.
leak PI/SPI through The website doesn’t leak
privilege escalation. PI/SPI through SQL injection
The website doesn’t attacks.
leak PI/SPI through The website doesn’t leak
SQL injection attacks. PI/SPI through XSS attacks.
The website doesn’t The website transmits the
leak PI/SPI through data collected in a secure
XSS attacks. encrypted manner.
The website transmits The website does not contain
the data collected in a any uncommon open ports.
secure encrypted The website uses session
manner. cookies for login sessions in
The website does not secure manner.
contain any The website code doesn’t
uncommon open contain
ports. Passwords/encryption key in
The website uses hard coded manner i.e.
session cookies for visible in source code.
login sessions in The privacy notice states the
secure manner. security practices and
The website code procedures to protect the
doesn’t contain PI/SPI of the user.
Passwords/encryption The application stores user
key in hard coded PI/SPI on the device in
manner i.e. visible in encrypted form.
source code. Other applications on the
The privacy notice device cannot access the
states the security PI/SPI stored in folder of the
practices and application (Cross app data
procedures to protect sharing)
the PI/SPI of the user. The application doesn’t take
The application stores root level access of the device.
user PI/SPI on the The mobile application
device in encrypted code contains Passwords
form. /encryption key in hard
Other applications on coded manner i.e. visible in
the device cannot source code. This is bad
access the PI/SPI practice and needs to be
stored in folder of the corrected.
application (Cross app The application transmits the
data sharing) data collected in a secure
The application manner.
doesn’t take root level The data stored by the
access of the device. application on the device gets
The mobile wiped clean after uninstalling
application code the application.
contains Passwords
/encryption key in
hard coded manner
i.e. visible in source
code. This is bad
practice and needs
to be corrected.
The application
transmits the data
collected in a secure
manner.
The data stored by the
application on the
device gets wiped
clean after
uninstalling the
application.
8.1 Assessment
Notice The website page does not Notice The website page does not
display a privacy notice to display a privacy notice to
the users. the users.
Consent The website does not Consent The website does not take
take consent from consent from user for the
user for the privacy privacy notice on the landing
notice on the landing page/registration page of
page/registration website (via click of
page of website (via continue/agree or through
click of check box).
continue/agree or The website does not provide
through check box). user an option to withdraw
The Website does not consent.
provide an option to The Website does not
user not to provide PI, provide an option to user not
which is not necessary to provide PI, which is not
for provision of necessary for provision of
services. (Optional services. (Optional data
data entry fields) entry fields)
Collection The Personal Data Collection The Personal Data collection
Limitation collection while Limitation while signing up is not
signing up is not specified in the privacy
specified in the notice but is functionally
privacy notice but is necessary to provide the
functionally necessary service.
to provide the service. The Use of tracking
The Use of tracking mechanisms is limited to 3rd
mechanisms is limited party cookies and e-tags.
to 3rd party cookies It doesn’t take access to any
and e-tags. additional data through
It doesn’t take access to microphone, camera,
any additional data location and notification
through microphone, permissions.
camera, location and
notification permissions.
Purpose The privacy notice doesn’t Purpose The privacy notice doesn’t state
Limitation state the purpose of Limitation the purpose of processing the
processing the personal personal data and sensitive
data and sensitive personal data.
personal data.
Use Limitation Assessment for this principle
could not be ascertained, with
the available information.
Storage The Privacy notice Storage The Privacy notice failed to
Limitation failed to inform the Limitation inform the user about any
user about any retention period for the
retention period for personal data processed.
the personal data The privacy notice does not
processed. inform the user about the
The privacy notice criteria to determine the
does not inform the retention period.
user about the criteria Assessment did not reveal
to determine the the existence of a retention
retention period. period that the project
Assessment did not follows, with respect to
reveal the existence of processing of personal data.
a retention period that
the project follows,
with respect to
processing of personal
data.
Security The privacy notice Security The privacy notice states the
Safeguards states the security Safeguards security practices and
practices and procedures to protect the
procedures to protect PI/SPI of the user.
the PI/SPI of the user. The website does not store
The website does not any data of the user on the
store any data of the local storage.
user on the local The website doesn’t leak
storage. PI/SPI through privilege
escalation.
The website doesn’t The website doesn’t leak
leak PI/SPI through PI/SPI through SQL
privilege escalation. injection attacks.
The website doesn’t The website doesn’t leak
leak PI/SPI through PI/SPI through XSS attacks.
SQL injection attacks. The website transmits the
The website doesn’t data collected in a secure
leak PI/SPI through encrypted manner.
XSS attacks. The website does not contain
The website transmits any uncommon open ports.
the data collected in a The website uses session
secure encrypted cookies for login sessions in
manner. secure manner.
The website does not The website code doesn’t
contain any contain
uncommon open Passwords/encryption key
ports. in hard coded manner i.e.
The website uses visible in source code.
session cookies for
login sessions in
secure manner.
The website code
doesn’t contain
Passwords/encryption
key in hard coded
manner i.e. visible in
source code.
8.2 Observations
Project E-Seva- Andhra Pradesh follows well established security practices.
But with respect to privacy there’s a lot to be desired. Even though there
exists a national level policy for privacy, the same hasn’t been expressed in
this instance. As we have seen in recent years, the absence of a privacy notice
is a major privacy error as notice has emerged as the mode of communicating
with the end citizen their rights and enabling greater transparency in E-
Governance practices.
9. IRCTC
Indian Railway Catering and Tourism Corporation Ltd. has been set up by
the Ministry of Railways with the basic purpose of hiving off entire catering
and tourism activity of the railways to the new Corporation so as to
professionalise and upgrade these services with public-private participation.
Rail based Tourism in India will be the specific vehicle for achieving high
growth in coordination with state agencies, tour operators, travel agents and
the hospitality industry. A dynamic marketing strategy in association with
public and private agencies, tour operators, transporters, hoteliers and local
tour promoters is on the anvil. Indian Railways span global volumes in
hospitality and catering sectors with services provided to 13 million
passengers every day.
9.1 Assessment
SDPI Rules Assessment Assurance Standard Assessment
Notice The website page does Notice The website page does not
not display the display the hyperlink to view
hyperlink to view privacy notice while collecting
privacy notice while new PI from user on
collecting new PI from subsequent pages of website.
user on subsequent The Privacy notice is not
pages of website. available in any local
The Privacy notice is language.
not available in any Hyperlink for privacy notice
local language. of the application does not
Hyperlink for privacy exist on the launch screen of
notice of the the application.
application does not The user does not have an
exist on the launch option to refer to the privacy
screen of the notice while using the
application. application.
The user does not The application page does not
have an option to refer display the hyperlink to view
to the privacy notice privacy notice while
while using the collecting new PI from user
application. on subsequent pages of
The application page application for subscription
does not display the purposes.
hyperlink to view The privacy notice is not
privacy notice while easily accessible to the user.
collecting new PI from Privacy notice is not available
user on subsequent to the user in the any local
pages of application Language.
for subscription The Privacy notice doesn’t
purposes. mention if it uses any the
The privacy notice is other (indirect) sources from
not easily accessible to where PI/SPI of user is
the user. collected by the Entity.
Privacy notice is not The Privacy notice does not
available to the user in inform the user about the
the any local existence of any other
Language. tracking mechanisms used to
The Privacy notice collect, store, transmit or
doesn’t mention if it process PII/SPI.
uses any the other The privacy notice does not
(indirect) sources from state the security obligations
where PI/SPI of user is and expectations from the
collected by the user to protect their PI/SPI.
Entity. The Privacy Notice does not
The Privacy notice inform user about the
does not inform the standards it follows.
user about the
existence of any other
tracking mechanisms The privacy notice does not
used to collect, store, inform the user about their
transmit or process rights and how these rights
PII/SPI. can be exercised.
The privacy notice The Privacy notice does not
does not state the mention any retention
security obligations period.
and expectations from Privacy Notice does not
the user to protect mention other (indirect)
their PI/SPI. sources from where PI/SPI of
The Privacy Notice user is collected by the
does not inform user Entity.
about the standards it The Privacy Notice does not
follows. clearly state the purpose of
The privacy notice the PI/SPI collected by the
does not inform the Entity.
user about their rights The Privacy Notice does not
and how these rights state the security obligations
can be exercised. and expectations from the
The Privacy notice user to protect their PI/SPI.
does not mention any The Privacy Notice does not
retention period. inform the user about the
Privacy Notice does criteria to determine the
not mention other retention period.
(indirect) sources from The Privacy notice does not
where PI/SPI of user is inform the user how the
collected by the PI/SPI will be treated once
Entity. the user has uninstalled the
The Privacy Notice application.
does not clearly state The Privacy Notice does not
the purpose of the inform user about the
PI/SPI collected by the standards it follows.
Entity. The Privacy Notice does not
The Privacy Notice inform the user about their
does not state the rights and how these rights
security obligations can be exercised.
and expectations from
the user to protect
their PI/SPI.
The Privacy Notice
does not inform the
user about the criteria
to determine the
retention period.
The Privacy notice
does not inform the
user how the PI/SPI
will be treated once
the user has
uninstalled the
application.
The Privacy Notice
does not inform user
about the standards it
follows.
The Privacy Notice
does not inform the
user about their rights
and how these rights
can be exercised.
Consent The website does not Consent The website does not take
take consent from consent from user for the
user for the privacy privacy notice on the landing
notice on the landing page/registration page of
page/registration website (via click of
page of website (via continue/agree or through
click of check box).
continue/agree or The website and application
through check box). do not provide user an option
The Website does not to withdraw consent.
provide an option to The Website and application
user not to provide PI, do not provide an option to
which is not necessary user not to provide PI, which
for provision of is not necessary for provision
services. (Optional of services. (Optional data
data entry fields) entry fields)
Collection The Personal Data Collection The Personal Data collection
Limitation collection while Limitation while signing up, is not
signing up, is not functionally necessary to
functionally necessary provide the service in some
to provide the service instances
in some instances The Use of tracking
The Use of tracking mechanisms is limited to 3rd
mechanisms is limited party cookies and e-tags.
to 3rd party cookies It doesn’t take access to any
and e-tags. additional data through
It doesn’t take access microphone, camera,
to any additional data location and notification
through microphone, permissions.
camera, location and The Application takes 7
notification dangerous permissions,
permissions. which is lower than the
The Application takes industry average.
7 dangerous The application only takes 2
permissions, which is other high-risk Permissions
lower than the as well, which in in
industry average. combination with other
The application only information can identify the
takes 2 other high-risk user.
Permissions as well, The Application still works if
which in in dangerous group
combination with permissions are disabled,
other information can hence not locking out the
identify the user. user of the service.
The Application still works
if dangerous group
permissions are disabled,
hence not locking out the
user of the service.
Purpose The privacy notice does Purpose The privacy notice does not
Limitation not clearly state the Limitation clearly state the purpose of
purpose of processing the processing the personal data and
personal data and sensitive personal data.
sensitive personal data.
Use Limitation Assessment for this principle
could not be ascertained, with the
available information.
Storage The Privacy notice Storage The Privacy notice failed to
Limitation failed to inform the Limitation inform the user about any
user about any retention period for the
retention period for personal data processed.
the personal data The privacy notice does not
processed. inform the user about the
The privacy notice criteria to determine the
does not inform the retention period.
user about the criteria Assessment did not reveal
to determine the the existence of a retention
retention period. period that the project
Assessment did not follows, with respect to
reveal the existence of processing of personal data.
a retention period that
the project follows,
with respect to
processing of personal
data.
Security The privacy notice Security The privacy notice states the
Safeguards states the security Safeguards security practices and
practices and procedures to protect the
procedures to protect PI/SPI of the user.
the PI/SPI of the user. The website does not store
The website does not any data of the user on the
store any data of the local storage.
user on the local The website doesn’t leak
storage. PI/SPI through privilege
The website doesn’t escalation.
leak PI/SPI through The website doesn’t leak
privilege escalation. PI/SPI through SQL injection
The website doesn’t attacks.
leak PI/SPI through The website doesn’t leak
SQL injection attacks. PI/SPI through XSS attacks.
The website doesn’t The website transmits the
leak PI/SPI through data collected in a secure
XSS attacks. encrypted manner.
The website transmits The website does not contain
the data collected in a any uncommon open ports.
secure encrypted The website uses session
manner. cookies for login sessions in
The website does not secure manner.
contain any The website code doesn’t contain
uncommon open Passwords/encryption key in
ports. hard coded manner i.e. visible in
The website uses source code
session cookies for The privacy notice states the
login sessions in security practices and
secure manner. procedures to protect the
The website code PI/SPI of the user.
doesn’t contain The application stores user
Passwords/encryption PI/SPI on the device in
key in hard coded encrypted form.
manner i.e. visible in Other applications on the
source code. device cannot access the
The privacy notice PI/SPI stored in folder of the
states the security application (Cross app data
practices and sharing)
procedures to protect The application doesn’t take
the PI/SPI of the user. root level access of the device.
The application stores The mobile application code
user PI/SPI on the contains Passwords
device in encrypted /encryption key in hard
form. coded manner i.e. visible in
Other applications on source code. This is bad
the device cannot practice and needs to
access the PI/SPI corrected.
stored in folder of the The application transmits the
application (Cross app data collected in a secure
data sharing) manner.
The application The data stored by the
doesn’t take root level application on the device gets
access of the device. wiped clean after uninstalling
The mobile application the application.
code contains
Passwords
/encryption key in
hard coded manner
i.e. visible in source
code. This is bad
practice and needs to
corrected.
The application
transmits the data
collected in a secure
manner.
The data stored by the
application on the device
gets wiped clean after
uninstalling the
application.
Transparency The website and application
maintain basic level of
transparency of operations
by informing the user of the
data collected and processed
for the provision of the
service and clear statement
of purpose.
The E-governance services
shows limited transparency
in giving user visibility over
individual participation
rights and the process to
exercise these rights.
9.2 Observations
IRCTC project follows well established security practices, although the
project would have to establish better practises to enable user control and
execution of rights. Absence of a touch point for Individual participation
rights and grievance redressal needs to be resolved to ensure privacy
compliance. The Privacy notice needs for the project would need further
development to meet the growing privacy compliance requirements.
10. Land Records- Project Bhoomi
Project Bhoomi of Karnataka State Government is focused on Land Records
management system. The project was inaugurated in the year 2000. Under
this project, all the manual RTCs which prevailed at the time of data entry
were digitized and made available to the citizen through Kiosk Centres. All
the ownership or any other changes in the RTCs are carried out through
mutation as per KLR Act using the Land Records database. Bhoomi back
offices have been set up at all taluks of the state. In each of these centres LR
Kiosk & Application Kiosk have also been setup.
10.1 Assessment
Notice The website page does Notice The website page does not
not display the display the hyperlink to view
hyperlink to view privacy notice while collecting
privacy notice while new PI from user on
collecting new PI from subsequent pages of website.
user on subsequent The Privacy notice is not
pages of website. available in any local
The Privacy notice is language.
not available in any The Privacy notice doesn’t
local language. mention if it uses any the
The Privacy notice other (indirect) sources from
doesn’t mention if it where PI/SPI of user is
uses any the other collected by the Entity.
(indirect) sources from The Privacy notice does not
where PI/SPI of user is inform the user about the
collected by the existence of any other
Entity. tracking mechanisms used to
The Privacy notice collect, store, transmit or
does not inform the process PII/SPI.
user about the
existence of any other The privacy notice does not
tracking mechanisms state the security obligations
used to collect, store, and expectations from the
transmit or process user to protect their PI/SPI.
PII/SPI. The Privacy Notice does not
The privacy notice inform user about the
does not state the standards it follows.
security obligations The privacy notice does not
and expectations from inform the user about their
the user to protect rights and how these rights
their PI/SPI. can be exercised.
The Privacy Notice The Privacy notice does not
does not inform user mention any retention period.
about the standards it
follows.
The privacy notice
does not inform the
user about their rights
and how these rights
can be exercised.
The Privacy notice
does not mention any
retention period.
Security The privacy notice Security The privacy notice states the
Safeguards states the security Safeguards security practices and
practices and procedures to protect the
procedures to protect PI/SPI of the user.
the PI/SPI of the user. The website does not store
The website does not any data of the user on the
store any data of the local storage.
user on the local The website doesn’t leak
storage. PI/SPI through privilege
The website doesn’t escalation.
leak PI/SPI through The website doesn’t leak
privilege escalation. PI/SPI through SQL injection
The website doesn’t attacks.
leak PI/SPI through The website doesn’t leak
SQL injection attacks. PI/SPI through XSS attacks.
The website doesn’t The website transmits the
leak PI/SPI through data collected in a secure
XSS attacks. encrypted manner.
The website transmits The website does not contain
the data collected in a any uncommon open ports.
secure encrypted The website uses session
manner. cookies for login sessions in
The website does not secure manner.
contain any The website code doesn’t
uncommon open contain
ports. Passwords/encryption key in
The website uses hard coded manner i.e.
session cookies for visible in source code.
login sessions in
secure manner.
The website code
doesn’t contain
Passwords/encryption
key in hard coded
manner i.e. visible in
source code.
Assessment for this best (A) Privacy by Design It does not provide
practice could not be granularity and
Transfer of ascertained, with the option for withdrawal
Information available information. of consent.
10.2 Observations
Project Bhoomi shows great promise in creating accountable privacy
practices. There is proactive compliance with privacy principles- Purpose
Limitation, Collection Limitation and Use Limitation. There are also,
their well-defined security practices, clear communication with respect to
purpose limitation, collection limitation and use limitation. The project would
have to establish better practises to enable user control and execution of
rights. Absence of a touch point for Individual participation rights and
grievance redressal needs to be resolved to ensure privacy compliance.
11. Digi Locker
DigiLocker is a platform for issuance and verification of documents &
certificates in a digital way, thus eliminating the use of physical documents.
Indian citizens who sign up for a DigiLocker account get a dedicated cloud
storage space that is linked to their Aadhaar (UIDAI) number. Organizations
that are registered with Digital Locker can push electronic copies of
documents and certificates (e.g. driving license, Voter ID, School certificates)
directly into citizens lockers. Citizens can also upload scanned copies of their
legacy documents in their accounts. These legacy documents can be
electronically signed using the e-Sign facility.
11.1 Assessment
Notice The website page does not Notice The website page does not
display the hyperlink to display the hyperlink to
view privacy notice while view privacy notice while
collecting new PI from collecting new PI from user
user on subsequent pages on subsequent pages of
of website. website.
The Privacy notice is not The Privacy notice is not
available in any local available in any local
language. language.
Hyperlink for privacy Hyperlink for privacy
notice of the application notice of the application
does not exist on the does not exist on the
launch screen of the launch screen of the
application. application.
The user does not have an The user does not have an
option to refer to the option to refer to the
privacy notice while using privacy notice while using
the application. the application.
The application page does The application page does
not display the hyperlink not display the hyperlink to
to view privacy notice view privacy notice while
while collecting new PI collecting new PI from user
from user on subsequent on subsequent pages of
pages of application for application for
subscription purposes. subscription purposes.
The privacy notice is not The privacy notice is not
easily accessible to the easily accessible to the
user. user.
Privacy notice is not Privacy notice is not
available to the user in available to the user in the
the any local Language. any local Language.
The Privacy notice doesn’t The Privacy notice doesn’t
mention if it uses any the mention if it uses any the
other (indirect) sources other (indirect) sources
from where PI/SPI of user from where PI/SPI of user
is collected by the Entity. is collected by the Entity.
The Privacy notice does The Privacy notice does not
not inform the user about inform the user about the
the existence of any other existence of any other
tracking mechanisms tracking mechanisms used
used to collect, store, to collect, store, transmit or
transmit or process process PII/SPI.
PII/SPI. The privacy notice does not
The privacy notice does state the security
not state the security obligations and
obligations and expectations from the user
expectations from the to protect their PI/SPI.
user to protect their The Privacy Notice does not
PI/SPI. inform user about the
The Privacy Notice does standards it follows.
not inform user about the The privacy notice does not
standards it follows. inform the user about their
The privacy notice does rights and how these rights
not inform the user about can be exercised.
their rights and how these The Privacy notice does not
rights can be exercised. mention any retention
The Privacy notice does period.
not mention any retention Privacy Notice does not
period. mention other (indirect)
Privacy Notice does not sources from where PI/SPI
mention other (indirect) of user is collected by the
sources from where Entity.
PI/SPI of user is collected The Privacy Notice does not
by the Entity. clearly state the purpose of
The Privacy Notice does the PI/SPI collected by the
not clearly state the Entity.
purpose of the PI/SPI The Privacy Notice does not
collected by the Entity. state the security
The Privacy Notice does obligations and
not state the security expectations from the user
obligations and to protect their PI/SPI.
expectations from the The Privacy Notice does not
user to protect their inform the user about the
PI/SPI. criteria to determine the
The Privacy Notice does retention period.
not inform the user about The Privacy notice does not
the criteria to determine inform the user how the
the retention period. PI/SPI will be treated once
The Privacy notice does the user has uninstalled
not inform the user how the application.
the PI/SPI will be treated The Privacy Notice does not
once the user has inform user about the
uninstalled the standards it follows.
application. The Privacy Notice does not
The Privacy Notice does inform the user about their
not inform user about the rights and how these rights
standards it follows. can be exercised.
The Privacy Notice does
not inform the user about
their rights and how these
rights can be exercised.
Storage The Privacy notice failed Storage The Privacy notice failed to
Limitation to inform the user about Limitation inform the user about any
any retention period for retention period for the
the personal data personal data processed.
processed. The privacy notice does not
The privacy notice does inform the user about the
not inform the user about criteria to determine the
the criteria to determine retention period.
the retention period. Assessment did not reveal
Assessment did not reveal the existence of a retention
the existence of a period that the project
retention period that the follows, with respect to
project follows, with processing of personal
respect to processing of data.
personal data.
Individual The Privacy notice in both Individual The Privacy notice in both
Participation instances does not inform Participation instances does not inform
Rights the user of their rights: 1) Rights the user of their rights: 1)
Access and Correction. Access and Correction, 2)
to Object, 3) Data
The Privacy notice does Portability, 4) Right to be
not direct the user to a Forgotten.
designated position for The Privacy notice does not
execution of these rights. direct the user to a
designated position for
execution of these rights.
Assessment for this best (A) Privacy by Design Assessment for this
practice could not be principle could not
Transfer of ascertained, with the available be ascertained with
Information information. the available
information.
(B) Data Protection The DigiLocker
Officer Website and mobile
application does not
inform the user of the
existence of a Data
Protection officer for
privacy compliance.
Grievance The website and application (C) Grievance The website and
Redressal only list a support email id for Redressal application only list a
grievances. It does not provide support email id for
a point of contact for grievances. It does not
execution of rights and provide a point of
grievance redressal. contact for execution
of rights and
grievance redressal.
(D) Data Protection Privacy Risks
Impact were evaluated
Assessment while performing
risk assessment
for this project.
The information
provided does not
provide more insight
into the process of
evaluation.
11.2 Observations
The DigiLocker project through its website shows proactive compliance with
privacy principles- Purpose Limitation, Collection Limitation and Use
Limitation. Though shows room for improvement with respect to the
Notice, Consent, Transparency and Accountability. The DigiLocker
mobile application would need to be re-looked at through the eye glass of
privacy. Although, having stellar security safeguards, it would need some
improvement, especially with respect to emergence of granular privacy
requirements.
12. Recommendations
1. The Entity should lay utmost emphasis on drafting a privacy notice that
clearly communicates the purpose of the collection and usage of personal
data, in an easy understand manner keeping in the mind the average end
user of the government service. The translation or availability of the notice in
different languages based on the area or spread of the Project should be
carried out as well.
2. When an E-Governance Project replies on consent as a ground for
processing personal data, it should provide the ability to withdraw consent
for additional data collection. The manner of gaining consent should be
through an affirmative action (For E.g. Clicking a tick box). The entity should
also ensure the manifestation of the notice before consent is sought.
3. The Project must provide a single point of contact for execution of
Individual Participation Rights. The procedure to exercise these rights should
be clearly communicated to the user.
4. The incorporation of Privacy by Design in projects to ensure individual
interests are considered at the time of conception of a project.
13. Bibliography
Guidelines
I. OECD Guidelines on the Protection of Privacy and Transborder Flows of
Personal Data
Frameworks
I. APEC Privacy Framework
II. DSCI Privacy Framework
III. DSCI Privacy Assessment Framework
Data Security in Cloud Environment
DG, i-CISA, ……, C-DAC
Abstract— The Digital India programme is a flagship program of the having local servers or personal devices to handle applications. Cloud
Government of India with a vision to transform India into a digitally empowered services are offered through public, private or hybrid cloud storage
society and knowledge economy. Recently it has taken the form of E-kranti offerings, depending on the security needs and other considerations.
(NeGP 2.0) with a vision of “Transforming e- Governance for transforming
governance”. Some of the principles on which it is based are Transformation and Organizations can determine their level of control with as-a-service options.
not translation, integrated services and not individual services, Government
These include software as a service (SaaS), platform as a service (PaaS) and
Process Reengineering (GPR) to be mandatory in every MMP, Infrastructure on
demand, Cloud by default, Mobile first, Fast tracking approvals, mandating infrastructure as a service (IaaS). Cloud computing takes services (“cloud
standards and protocols, National GIS, language localization , security and services”) and moves them outside an organization's firewall. Applications,
Electronic Data preservation. In order to utilise and harness the benefits of Cloud storage and other services are accessed via the Web. The services are
Computing, Government of India has embarked upon an ambitious initiative - delivered and used over the Internet and are paid for by the cloud customer
"GI Cloud" which has been named as 'MeghRaj'. The focus of this initiative is to on an as-needed or pay-per-use business model.
accelerate delivery of e-services in the country while optimizing ICT spending of
the Government. This will ensure optimum utilization of the infrastructure and Many organizations are moving to the cloud, due to the obvious benefits
speed up the development and deployment of e-Gov. applications. While that it offers, which are majorly that of ease and convenience of use, lower
deployment of these technologies will no doubt provide the flexibility, agility and
infrastructure requirements, ubiquitous access, increased efficiency,
cost effectiveness in its deployment, it will bring along with it the concerns of
privacy, security, integrity, availability, inter-operability, licensing and other growing bandwidth demands, scalability etc.
governance issues. In this scenario a clear understanding of the issues involved
and ways to manage the associated risks is required for the adoption of cloud To leverage these obvious benefits of cloud technology, and to be in
technology by the government on a sustainable basis. compliance with the JAM(Jan Dhan Aadhaar-Mobile) trinity initiative of its
This paper will discuss the issues related to adopting the cloud technology and e-Kranti scheme, the Government has initiated the cloud based e-
will provide guidance to concerned authorities to build a safe and secure governance services delivery, so as to reach to the masses seamlessly. This
platform for adoption of this technology for delivery of services (Infrastructure, Government cloud has been coined as “MeghRaj”, and has been indicated,
platform, software) on demand. Due diligence at this stage may result in greater as the default cloud to be used by one and all the departments-at central and
assurance to the investors and consumers to participate in this new endeavour state level.
with increased confidence and chance of success.
However, the GI cloud has been launched without any specific guidelines
Index Terms—e-Kranti, NeGP, Meghraj, GI cloud
for the roles and risks shared by the MSP’s and without actually having a
cloud management office, well in place, to monitor and manage for a
sustainable governance. There are many lacuna in the GI cloud strategy
I.INTRODUCTION where provisional empanelment has been done without firstly defining the
roles, responsibilities, ownership for ensuring the cloud data security and
Cloud computing, simply put, is computing on the internet. It provides clear guidelines and laws for enforcement and management of the various
hardware platform, and applications as a service and enables ubiquitous cloud stakeholders.
access, convenience, on demand network access, and shared pool of Operating in the cloud comes with greater risks than operating an on-
configurable computing resources, available through internet, instead of premises IT infrastructure. Moving onto cloud based services, has its own
associated risks and comes with a package of cloud specific threats, like and responsibility of the data and its security. The term governance in the
poor security practices, insufficient identity, credential and access cloud relates to the rules, policies, and processes used by businesses to
management, poor or no governance and management practices, application operate in the cloud. These are the “what, when, who, and how” when it
vulnerabilities etc. While, many departments- both at center and states have comes to cloud security, and govern factors such as what assets can be used,
either already rolled their e-governance services through the cloud or are on when assets can be used, who has access to assets, and how assets should be
the, verge of migrating into the cloud, they have done so, without doing the protected against malicious actors (both inside and outside the business).
precursory groundwork and necessary checking of the various aspects,
related to before, after and during the use of cloud based operations and There is thus an immediate need to not only have a sound cloud governance
services. and management policy, but also a cloud enforcement policy to check and
monitor and ensure adherence to the guidelines of the policy, by the
As organizations are moving their data from on-premises into cloud, it is stakeholders. It is thus required to manage the cloud data in a professional
making their data to be shared between the CSP’s, MSP’s and the cloud manner, with cloud specific law regulations, clauses, and compliancy. The
users. The responsibility for protecting organization’s data in the cloud lies regulations and guidelines are required to indicate what measures to be
not with cloud service providers but with cloud customers. Most of the taken, if the data is lost, whom to approach, and who would be ultimately
cloud users are either not aware of this fact or do not take it seriously responsible for maintaining the integrity, confidentiality and availability of
enough to take necessary and precautionary measures to safeguard their the data.
shared data on the cloud.
The purpose of this study, is thus to sensitize the Government departments
“Every Opportunity has associated Risks” and in case of Government and the industry, about the potential risks and serious challenges, that are
Cloud, ensuring the data security is one of the major Risk. As the associated with cloud based service deployments and what safeguard
Government moves to the cloud, it must be vigilant to ensure the security measures, are needed to be adopted, for preventing, defending and
and proper management of government information to protect the privacy recovering themselves from such risks. The study presents the comparison
of citizens and national security. The Government has specific cloud of the GI cloud policy with respect to the international standards, and
computing challenges that require careful adoption considerations, provides the details of the identified gaps that are needed to be filled in the
especially in areas of cyber security, continuity of operations, information GI cloud policy. The study has derived an audit assurance checklist, as an
assurance (IA), and resilience. The risks are high, as the data is sensitive outcome for assisting in checking and monitoring of the CSP’s as well as
and in large numbers, of both the public as well as the Government, and the cloud users, while using the cloud based services.
which is also continuously on the rise.
In the sub-sequent sections of the paper, we have presented the present
So, it has become the need of the hour to understand the risks associated scenario in the deployment and adaptation of GI cloud, the challenges, and
with the cloud, create awareness and share the knowledge with all the risks associated with data security in the cloud. We have also presented the
stakeholders and take action to prevent, detect, and defend one’s data from details of some of the projects evaluated, the findings of the evaluation
these risks. results of the projects studied, and finally conclude with the cloud security
guidelines and recommendations, that are needed to be followed and the
Meghraj, Government of India’s cloud framework, has been introduced, way forward for ensuring the same.
without taking into account the implementation and management aspects of
the cloud service and the same has been left it to the user body. There are
no guidelines for handling the management of the cloud services and its II. OVERVIEW AND PRESENT SCENARIO OF GI CLOUD
stakeholders and for ensuring the strict enforcement of the policy.
For this reason effective governance in the cloud is of the utmost This section, gives a brief overview about the GI cloud, its deployment
importance, so as to have clear set of guidelines regarding the ownership models and present adaptation scenario.
connected through existing network infrastructure such as the SWANs,
The Government of India has initiated e-Kranti with the vision of NKN, as well as the internet. Based on demand assessment and taking into
“Transforming e-Governance for Transforming Governance”, based on the account security related considerations, government may also engage the
learning’s of NeGP and with the aim for continuous upgradation and services of private cloud providers.
proliferation of the Digital India initiatives. The GI Cloud will provide services to government departments, citizens
and businesses through internet as well as mobile connectivity. In addition
Amongst the key principles of e-Kranti, one of the important principles is to accelerating the delivery of e-services to citizens and businesses, the
Cloud by default, which indicates that all sensitive information of government’s cloud-based service delivery platform will also support a
Government Departments shall be stored in a Government Cloud only, number of other objectives including increased standardization,
coined as MeghRaj. This was to ensure proliferation of Cloud in interoperability and integration, a move towards an opex model, the pooling
government. Any Government Department may use a private cloud only of scarce, under-utilized resources and the spread of best practices. It will
after obtaining permission from Ministry of Electronics and Information also support on-going cost effectiveness and manageability.
Technology (MeitY), which shall do so after assessing the security and
privacy aspects of the proposed cloud. The aim of the cloud policy is to
realize a comprehensive vision of a government private cloud environment
available for use by central and state government line departments, districts
and municipalities to accelerate their ICT-enabled service improvements. In
the similar lines to the cloud model defined by NIST (shown in table 1),
GoI has also proposed three different cloud deployment models.
Figure 1
Government of India has setup National Cloud (under NIC) and also has
Table1: initiated setup of State Clouds, cloud computing environments at the State
Level – building on or augmentation of the infrastructure investments
already made, as shown in figure1.
They are the public cloud, Government Virtual Private Cloud and Based on the demand consideration, GoI has empaneled cloud service
Government Community Cloud. offerings of Service providers that the end-user departments can leverage in
Presently, the GI Cloud is being established, initially on national and state addition to the National Cloud services offered by NIC for their e-
data center assets (adapted for the cloud through virtualization) and
governance solutions. The cloud services, offered under National Cloud as their e-governance solutions The cloud services, offered under National
well as the provisionally empaneled cloud service offerings of the 13 Cloud Cloud as well as the provisionally empaneled cloud service offerings of the
Service Providers, will be published through a GI Cloud Services Directory 13 Cloud Service Providers, will be published through a GI Cloud Services
for use by government departments or agencies at the Centre and States. Directory for use by government departments or agencies at the Centre and
The cloud providers would require the common standards & guidelines on States.
the security, interoperability, data portability, SLAs, contractual terms &
conditions, service definitions that they would need to adhere to in order to Create eGovAppStore: eGovAppStore will include the setting up of a
be part of the GI Cloud environment. common platform on National Clouds to host and run applications,
Below diagram provides the high-level view of the cloud ecosystem with developed by government agencies or private players, which are easily
the various actors along with the indicative roles. customizable and configurable for reuse by various Government agencies or
departments at the central and state levels without investing effort in the
development of such applications.
With the GI cloud also based on the NIST architecture and standard model, III. CHALLENGES, RISKS & ISSUES IN CLOUD SECURITY
the MeghRaj policy, is proposed to
Cloud computing is not a new technology. Rather it is a new model of IT
Setup GI Cloud: Based on the demand consideration, GoI has empaneled service delivery. The cloud computing is yet to mature both in terms of
cloud service offerings of Service providers that the end-user departments technology and business readiness as well as adoption by the market. Issues
can leverage in addition to the National Cloud services offered by NIC for like standards for security, interoperability, licensing, governance and
contracting in cloud are still being deliberated upon and work is in progress computing systems to rapidly scale and increase the magnitude of the
worldwide. So, a clear understanding of the associated risks is required for attack;
the adoption of cloud computing by the government. • A consumer’s unauthorized access (through improper authentication or
authorization, or exploit of vulnerabilities introduced maliciously or
unintentionally) to software, data, and resources provisioned to, and owned
by another authorized cloud consumer;
• Increased levels of network-based attacks that exploit software not
designed for an Internet-based model and vulnerabilities existing in
resources formerly accessed through private networks;
• Limited ability to encrypt data at rest in a multi-tenancy environment;
• Portability constraints resulting from the lack of standardization of
cloud services application programming interfaces (APIs) that preclude
cloud consumers to easily migrate to a new cloud service provider when
availability requirements are not met;
• Attacks that exploit the physical abstraction of cloud resources and
exploit a lack of transparency in audit procedures or records;
• Attacks that take advantage of known, older vulnerabilities in virtual
machines that have not been properly updated and patched;
• Attacks that exploit inconsistencies in global privacy policies and
regulations;
• Attacks that exploit cloud computing supply chain vulnerabilities to
include those that occur while cloud computing components are in transit
from the supplier to the cloud service provider;
• Insider abuse of their privileges, especially cloud provider’s personnel
in high risk roles (e.g. system administrators; and
• Interception of data in transit (man-in-the-middle attacks).
Fig. Risk Matrix for cloud services
Further, the potential risks and issues, specific to GI cloud, grouped into
Securing the information systems and ensuring the confidentiality, integrity, various aspects are as below:
and availability of information and of the information being processed,
stored, and transmitted are particularly relevant as these are the high- Cloud standards:
priority concerns and present a higher risk of being compromised in a cloud Existing cloud standards pertaining to implementation, storage and
computing system. Cloud computing implementations are subject to local migration need to be interpreted to understand their applicability for the
physical threats as well as remote, external threats. GI Cloud environment.
Possible types of security challenges for cloud computing services include Adoption of open standards as per Government of India’s policy on open
the following: standards (http://egovstandards.gov.in/) on interoperability and data
• Compromises to the confidentiality and integrity of data in transit to portability is required in order to reduce the risk of vendor lock-in and
and from a cloud provider and at rest; inadequate data portability.
• Attacks which take advantage of the homogeneity and power of cloud Security and privacy
• Risk of compromise of confidential information and intellectual property cloud providers. This puts customers at significant risk if the need arises for
(IP). systems to interoperate across cloud and in-house environments or to
• Risk of inappropriate access to personal and confidential information. retrieve data and/or applications if a cloud provider withdraws from the
• Appropriate privacy and security measures need to be in place. market. These issues are to be managed though appropriate standards and
Application design contract provisions.
• Traditional application design approaches are different from cloud based Portability
application design. • Applications developed on one platform may not be portable to, or
• All new applications must be designed keeping basic cloud design executable on another.
premises in mind. In order to ensure this, guidelines on application Loss of control
development and design need to be adopted. • Loss of control may lead to resistance to change. As the need to
• Existing applications need to be assessed and if required customized in maintain servers and other data centre infrastructure diminishes, the form of
line with cloud design principles to make them cloud ready. the IT function in government may change.
Integration with legacy environment • Users may spawn instances unnecessarily and wastefully, just because it
• In order to have a fully operational cloud environment, cloud based is possible and easy.
applications need to be integrated with existing on-premise legacy Funding model
applications. • Due to the different funding models like pay-per-use , subscription etc.
• However the opportunity for customization of existing applications and , some part of ICT capital budgeting will need to be translated into
services may be limited, leading to increased complexity in integrating with operating expenses (OPEX), as opposed to capital expenditure (CAPEX).
existing legacy environments. This will affect budgeting for ICT and may have an effect on the ICT
Licensing procurement.
• Existing software licensing models may not facilitate cloud • New procurement guidelines, funding and a sustainability model need to
deployment especially from the point of cloud service delivery. be identified to address this.
• To facilitate Government departments in deployment of cloud services, a Performance and conformance
comprehensive framework will be developed on the usage of various • Need to ensure that guaranteed service levels are achieved in the GI
licensing models. This framework will be flexible to take into account Cloud else it may affect effective service delivery.
emerging technologies and business models to leverage the same in the best • SLAs are required to be defined for each of the services that will be
interest of government. Location of data provided by the GI Cloud. Existing contractual agreements and SLAs both
• The dynamic nature of cloud may result in uncertainty as to where data with third part data center operators, and cloud service providers, may be
actually resides (or where it is in transit) at a given point in time. This raises evaluated and customized to meet the government’s requirements
concerns related to data ownership, accessibility, privacy and security. • For failure to adhere to the service levels, proper penalty clauses must be
• The decision regarding storage and transmittal of data to different cloud incorporated. This will require proper interpretation of SLAs. Proper
models may, therefore, be based on application sensitivity, data institutional mechanism should be established to resolve any conflict and
classification and other relevant privacy and security related considerations provide for timely intervention (if required).
including the regulatory and legal framework of the hosting jurisdiction. • A fully functional 24x7 helpdesk may be incorporated.
Vendor lock-in Skills requirement
• Due to the rapid emergence of cloud computing through the initiatives • A direct result of transitioning to a cloud environment results in
of individual companies, many offerings are proprietary in nature, creating demand of resources with different skill sets than those in the traditional
challenges in migrating data and applications to the cloud, or switching environment.
• Given that the Government departments are generally under-staffed in designed for web services and the Internet, they also support the functions
ICT, this presents an opportunity for requirements identification. A well- and requirements of cloud computing. Other standards are now being
defined capacity and capability building exercise needs to be carried out developed in specific support of cloud computing functions and
across the country to ensure projects do not suffer due to lack of skilled requirements, such as virtualization.
resources
• Ongoing training programmes and plans need to be in place for training There are many International Standards in general available related to
Information Security, IT Services Management, Service Organization
existing resources and upgrading their skill set in line with the new
Control, Health Standards, Payment / Finance related standards, Education
requirement
related standards, Cloud related standards specifically related to Portability,
Identification and Authorization, Interoperability, Accessibility,
Change management Performance Management, Securing Government Systems and many more.
More than being a technology, cloud is a new model of service The major International Standards, which are deemed to fit for the security
delivery related to Cloud, are summarized with its applicability and status of
Adopting cloud across various government departments and maturity and are given in Annexure A.
agencies at centre and states would call for intensive change
management initiatives. The capacity and capability building
exercise should incorporate orientation programmes to address In order to ensure the security in the Cloud, environment, many standards
these have already evolved and each standards have their own strengths. In this
The procurement teams in state and central nodal agencies need to research report, three global standards namely ISO 27001:2013, NIST 800-
be trained on procuring for cloud and move away from the 53 r4, CCM v3.0.1 have been analyzed and the controls of these standards
traditional experience of procuring hardware and software are commonly categorized.
Such a comprehensive change management initiative would require The categorizations table is shown in Annexure B. The indicative
proper communication at all levels overlapping of the standards are depicted as below:
Applica Partial
Non-
ble Fully ly
Complia
Guideli Compliant Compl
Projects nt
ne Parameter iant
Paramet
Parame s Param
ers
ters eters
Many of the RFP;s and the applications hosted are not fully complaint
and do not meet some of the key parameters/guidelines of the GI
cloud policy
It has been observed clearly that there are no GoI guidelines for role
and risks shared by MSP
It has also been observed that some parts of the applications, are
hosted in that CSP(cloud service provider), which is not empanelled
by GoI.
As part of the study, the major threats have also been identified and
categorized, with respect to various stakeholders of cloud computing, as
below:
Further, to manage the above threats, the checklist has been formulated for
various types of cloud deployment models and services, mainly in terms of
IaaS, SaaS and PaaS, as below:
The study findings of this paper, can be used by Government departments and
industry, to understand the essential prerequisites, modalities and the follow
ANNEXURES
Project 1
GoI Guidelines Implemented GEM Portal RFP State of Punjab RFP
Contract Terms
Information Security
a. Certification/Compliance: NA Yes Yes
b. Privacy and Security Safeguards. Partial Yes No
c. Confidentiality Partial Yes Partial
d. Location of Data Partial Yes No
e. E-Discovery: NA Yes No
f. Law Enforcement Request: Partial Partial No
Audit NA Yes Yes
Transitioning/Exit NA Yes NA
Performance Management NA Yes Partial
Payment Terms NA Yes Partial
Service Levels
Availability NA Yes Yes
Support Channels - Incident and Helpdesk NA Yes Partial
Response Time NA Yes No
Performance NA Partial Partial
Security Incident and Management Reporting NA Yes Partial
Vulnerability Management NA Yes Partial
Indicative SLOs for MSP/SI: NA Yes NA
Measurement and Monitoring NA Yes Yes
Periodic Reviews NA Yes Partial
Penalties NA Yes Yes
Smart City Projects: Evolution and Security concerns
with reference to Internet of Things (IoT) Technology
First A. Author, Fellow, IEEE, Second B. Author, and Third C. Author, Jr., Member, IEEE
Abstract—Across the world governments are conceptualising smart nation, Taiwan has initiated a USD 625 million IoT
smart cities to improve the quality of life of citizens with help of fund, Korea is pushing Seoul as model city of the world,
smart technologies. Cities may become smarter, but in absence of Australia is planning 30 minutes smart cities, Denmark is
a holistic cyber security strategy it may not be a sustainable
aiming to become city with zero problems and India is aiming
preposition as with increasing level of digitization, the potential
for attack on ICT and OT components of a city is expected to to build 100 smart cities [1][2].
expand significantly. The emerging risks are rising and The livability quotient of cities is dripping due to the rapid
becoming advanced like installation of ransomware leading to population influx & urbanization that is straining the city
disruptions, botnet army building a large DDoS against city infrastructure, degrading the environment and deteriorating
infra, panic and harm to citizens disabling or sabotaging city the living conditions. Cities are facing acute pressures of:
infrastructure.The priorities of smart cities is to thwart above
population growth, economic crisis, higher than normal levels
attacks and robustly prepare for it. The plan to prepare against
complex cyber risks may consist of, strategy, policies, of pollution, increased demands of power and other resources,
procedures, capabilities and services. Emerging best practices deteriorating city infrastructure, traffic congestion etc. [6]. It
are ,but not limited to, end user awareness, end point protection, is become a daunting task for the governments and
segmentation of network traffic, data loss prevention, bi- municipalities to even furnish essential public services to the
directional DDoS mitigation etc.It is evident that investment in citizens. The only way out of this complex scenario is that the
security would be very productive as the costs of disruption may
government of a country takes focused and ambitious
be quite disproportionate to the investments to be made in cyber
security. The due diligence may result in promoting a culture of initiatives to foster sustainable smart cities for resource
secure innovation, generating new opportunities for investments, management and economic growth. For efficient utilization of
and providing impetus to vibrant and economically competitive city resources and other environmental non-renewable
cities. This paper provides guidance on cyber security of smart resources, there is an urgent need to determine and deploy
cities and is intended to serve as the starting point for smart city intelligent & innovative technological solutions for
stakeholders to build robust and resilient smart cities.
administrating and delivering the city resources [3].
But what exactly is a Smart City? What makes a city smart
Index Terms—
and intelligent? Even though there is no unanimously
accepted standard definition of what constitutes a smart city,
I. INTRODUCTION however different consortiums and organization across the
world have defined smart cities with different approaches.
I nnext two decades more than 600 cities are expected to
propel 65 % of global GDP growth and top 100 smart cities
may account for 35 % global growth,as per a Mckinsey report.
ITU-T Focus Group on Smart Sustainable Cities defines a
smart sustainable city as an “innovative city that uses
information and communication technologies (ICTs) and
The competition to excel at building smart cities across the
other means to improve quality of life, efficiency of urban
world have begun. The objectives are to make future cities
operation and services, and competitiveness, while ensuring
vibrant, business friendly, promoting innovation,
that it meets the needs of present and future generations with
strengthening infrastructure and enriching living condition of
respect to economic, social and environmental aspects. [3]”
the citizens. Global investments in smart cities are
BSI Standards Publication elucidates, “Smart cities is a term
proliferating, no country wants to lag behind, China has
denoting the effective integration of physical, digital and
currently 300 cities on drawing board, Singapore is planning a
human systems in the built environment to deliver a
This paragraph of the first footnote will contain the date on which you sustainable, prosperous and Inclusive future for its citizens
submitted your paper for review. It will also contain support information, [4]”. ECSO explains, “A smart city is an urbanised area where
including sponsor and financial support acknowledgment. For example, “This multiple sectors cooperate to achieve sustainable outcomes
work was supported in part by the U.S. Department of Commerce under
Grant BS123456.” through analysis of contextual real-time information shared
The next few paragraphs should contain the authors’ current affiliations, among sector-specific information and operational technology
including current address and e-mail. For example, F. A. Author is with the systems [6]. NIST defines, “Smart City is the integration of
National Institute of Standards and Technology, Boulder, CO 80305 USA (e-
mail: author@ boulder.nist.gov). data and digital technologies data into a strategic approach to
S. B. Author, Jr., was with Rice University, Houston, TX 77005 USA. He sustainability, citizen well-being and economic development.
is now with the Department of Physics, Colorado State University, Fort [8]”
Collins, CO 80523 USA (e-mail: [email protected]).
The systems and infrastructure either from ICT or OT
family which city planners are aiming to digitize and
integrate, are vulnerable to cyber-attacks from adversaries.
The emerging risks are rising and becoming advanced, e.g.
installation of ransomware leading to disruptions, city Smart Energy
information tampered, botnet army building a large DDoS Waste Smart
Management Mobility
against city infra, leakage of smart city databases, panic and
harm to citizens disabling or sabotaging city infrastructure. Smart
Emergency
The city architectural approaches to intertwine ICT and OT Services &
Smart
Buildings
Risk
warrants a holistic treatment. From bottom to top, it may Management
Smart Security & Face & biometric recognition and use of A. NIST [13][14]
Surveillance CCTVs & Drones for live surveillance, Real Philosophy:Smart city blocks and architecture consist of
time video analytics for crime & terrorism
prevention separate cyber security functions which warrants distinct
Treatments.
Smart Emergency Real time Social media content monitoring,
Services & Risk AR/VR assisted displays for emergency
1) Cyber Security Approaches
Management response teams, environment & weather
sensors, smart evacuation systems, Functions to be considered for cyber security
monitoring air quality, disaster management consideration are, but not limited to, asset
solutions, fire detectors
management, business environment, risk
Waste Management Sensors enabled garbage bins, solid waste management, identity management, data protection,
disposal continuous monitoring, response & recover, incident
management, protection processes, awareness &
trainings
For each cyber security function, requirement C. CSA [16]
mapping is warranted Philosophy:Cyber security of a smart city is to be
strategized and conceptualized with different stages of
2) Key Learnings planning and implementation.
City needs to build application and device inventory
Business environment mission, objectives, 1) Cyber Security Approaches
dependencies needs alignment with cyber security Cyber requirements of smart city requires attention
goals of cities from following perspectives: Design & Planning,
Cyber security policy with defined RACI matrix and Implementation, Operations & Maintenance,
mapped to compliance landscape Disposal
A separate risk management function consisting of
processes, threat maps and mitigation strategies 2) Key Learnings
Identity and access management encompasses For design and planning, cyber security constituents
authentication, credential management, remote which requires consideration are cryptography,
access, role based access, Network integrity and authentication, authorization, secure updates, alert &
device management logging, anti-tampering, secure by default, fail/safe,
Data protection at rest and in motion SLA based security, vulnerability assessment and
Detection of anomalies and its correlation augmented penetration testing
with robust security monitoring When city move into implementation stage,
Strategy and plans for response and recovery in case following cyber security contours would need to be
of cyber incidents prioritized i.e. secure delivery of technology, system
Defined protection processes for areas such as secure administration, managing dormant accounts, auditing
development, security change management, BCP/DR of security events, password protection
Awareness & Trainings for all stakeholders During operations & Maintenance, city requires
monitoring stability & abnormal behaviors, patching,
regular assessment & auditing, protecting logging
B. ENISA[15] environment, access controls, cyber threat
Philosophy:Smart city architectural components require intelligence, recovery mechanisms
integrated cyber security strategy and ICT and OT cyber Lastly for disposal stage, city needs, avoiding
requirements intertwines for a safe smart city. repurposing technology, securely erase data, vendor
replacement as and when required
1) Cyber Security Approaches
Cyber requirements defined for different layers from
D. UAE [17]
bottom to top which are field components, data
transmission network, data processing, data Philosophy: Secure key components of a smart city i.e. IoT,
aggregation & connectivity, smart processing M2M, Cloud and Big Data.
Threats mapping as per different architectural layers
1) Cyber Security Approaches
2) Key Learnings Approaching cyber security of a smart city with
layered protection which to include city data sources,
To protect field components hardware and software
IoT, infrastructure, service enablement, application
diagnostics processes and capabilities are a must,
other areas include legacy infra refresh, device
2) Key Learnings
hardening and building resiliency
Common protection mechanisms for city data
Hardware redundancy strategy and shutdown
sources and IoT layer are as follows, MPLS
procedures are to be defined for protecting
isolation, IPsec encryption, SSL, SIEM, information
components pertaining to field which is to be
security governance, device enrolment &
augmented with M2M and network security
management
For data processing key elements are encryption,
To protect infrastructure, service enablement &
monitoring, debugging, log capturing and monitoring
application layer, it requires multifactor federated
and role of response teams
authentication, web application firewall, load
Smart processing is to be protected with KPI
balancers, Storage encryption, policy management,
monitoring, design specifications, InfoSec policy of a
single sign on etc.
city, incident reporting system, web services
protection and access control
E. France Telecom Authority [18] API security, secure gateway provisioning, gateway
Philosophy:Smart city security to be envisaged basis basic tunneling and port binding, brokers communication
ICT/OT units of smart cities. encryption, inbound ports by default to be closed,
unique identifiers for devices
1) Cyber Security Approaches
Basic units to be considered for securing smart cities H. Cyber Security Guidelines of Ministry of Housing and
are application, information, management and Urban Development, India
integrated communication
India has begun its journey to envisage 100 smart cities in
Each unit to be protected basis threat analysis as
different parts of the country. The task at hand is herculean
applicable and complex, especially considering demographics of India as
a nation. At city level the infrastructure of municipalities is to
2) Key Learnings be digitized and integrated. During the journey of digitization
For application unit of a smart city one may require of city infrastructure, it is evident that new cyber and security
physical asset monitoring, embedded networks and risks are expected to emerge. This sub-section entails
industrial monitoring capabilities architecture layer wise analysis on India efforts on building
For information and management unit one may cyber security best practices. We enlist the Cyber Security
require use of monitoring capabilities, security Guidelines mandated by Ministry of Housing and Urban
process management Development to be followed by all upcoming smart cities in
To protected integrated communication refresh of India.
legacy infra, building visibility on interconnection is
warranted 1) Application Layer
Authentication and Authorization for user and
administrators of smart city applications
F. Capability Provider 1 [19] Secure API management as per its interconnections
Philosophy:Derive cyber security requirements based on with data layer
components of basic building blocks of smart cities, Web application firewall to distill harmful traffic
augmented with threat analysis. Security incident and management to build visibility
on attacks and deploy mitigations
1) Cyber Security Approaches
Identity and Access Management to secure end
Basic building blocks of smart cities can be as
citizen and workforce identities
follows: energy, transportation, connectivity,
environment & governance Intra application traffic to be encrypted
Role based access to be defined for managing city
2) Key Learnings applications
Cyber security measures to include:manual override Applications architecture to follow the principle of
zoned architecture or demilitarized zones as per
by design, Pen-test to check on stability & reliability,
business criticalities
encryption of data, patch testing, device binding,
Procedures for incident management and reporting
firmware isolation, EEPROM secure configuration,
Regular vulnerability assessment and penetration
radio signals encryption, web application firewalls,
testing to be carried out for city resiliency
security policies, privacy by design
preparedness
Secure API integration and management
G. Capability Provider I1 [20] Web architecture protection
Philosophy:Build cyber security considerations with aid of Citizen security and safety
key architectural principles. Building federated access management
Secure implementation of service orchestration
1) Cyber Security Approaches
Principles to consider the following; automation, 2) Data Layer
sensor device security, system level authorization, Deploy data leak prevention
secure data streams, threat intelligence, data To be treated as a gateway between application and
segmentation & encryption communication layer
2) Key Learnings Data classification policy, procedures and system to
be implemented
Best practices to include areas such as, but not Privacy enhancing technologies such as encryption,
limited to, secure access of devices with VPN, sensor anonymization, masking, tokenization to be
data routing based on data classification policies, leveraged as per criticality of data
securing telemetry data, role-based access controls, Data flows to be defined
Applications to be aligned with data flows technologies and city infrastructure to provide a higher quality
Creation of zoned architectures as per data flows and of living. Though technologies assist in making better lifestyle
criticality within smart city, it also exposes the end infra, data and
Visualization of data citizens to a larger cyber threat landscape. Single invasion into
Data privacy interconnected systems of smart cities can leave entire city in
Segmentation of data havoc; hence it is prudent for smart cities to focus cyber
Secure binding between app and data layer security of smart cities and provide safe and secure
environment for the end citizens.
Securing data during analytics for delivery of
Preceding sections illustrated the basic building blocks of
services
smart cities and its cyber security architectural distinctions in
global and Indian context. This section covers cyber security
3) Communication Layer
aspects of smart city infrastructure, mainly divided into three
Authentication and Authorization for user and
major areas: A. Security threats to smart city building blocks
administrators of smart city networks
B. Smart city architecture - layer wise security threats C. Risk
Network security appliances such as firewalls,
analysis, scenarios and mitigations.
IDS/IPS, anomaly detection, DDoS and APT
protection
Communication layer to be integrated with data A. Smart City Building Blocks & Threat Landscape
diodes This section maps threats against following five main
Role based access principle to be followed for systems that are essentially required to be in the smart city i.e.
network architects and administrators accounts Smart Energy, Smart Mobility, Smart Water, and Smart
Network segmentation as per city policies which is to Public Services.
be augmented with creation of zones
Gateway traffic to be encrypted 1) Smart Energy [32]
Threats to smart energy categorized into following
Unidirectional traffic
categories, but not limited to: Network availability, Data
Industrial traffic protection
Integrity, Information privacy. Some of them are discussed
Deep packet inspection below.
Pattern recognition for detection of anomalies Availability Attacks (DDoS): Open communication
Resilient network architecture infrastructure is embedded into smart grids for data
exchange, it makes smart grid vulnerable to attacks such
4) Sensor Layer as DDoS. Where it attacks on time constraint and load
Authentication and authorization of sensor and frequency control of smart grid, creating an adverse
devices impact on delivery of messages and availability of edge
Device discovery to be deployed for visibility on devices.
field components Rogue/Infected devices: Malware propagation in smart
Dynamic provisioning and onboarding of city assets grid devices exploits common hardware vulnerabilities.
All smart systems are interconnected, due to which
Secure remote administration leveraging tunneling
distribution occurs at an expedited rate within devices and
Network Segmentation as per field components and there is a possibility of its escalation to other architecture
sensors criticalities layers.
Sensor and network binding to avoid rogue Communication Protocol Vulnerabilities: Vulnerabilities
connection scenarios in communication protocols stack of IPv4, IPv6 and
Hardening of field components, sensor and devices TCP/IP which is commonly leveraged by the smart grids
SSL to securing traffic of sensors to communicate with central system is a potential to be
Operational technologies discovery exploited because of improper configurations of the
Baseline monitoring networks.
Device centric authentication Jamming Attack: Wireless power network connecting
smart grids/appliances jammed by unusual and
Securing program logic controllers
illegitimates traffic which may result in interruption of
Monitoring of signals legitimate communication.
Threat’s impact
on Security
Triad:
Availability