Within All Government Websites
Frequently Asked Questions
All of these words
This exact phrase
Any of these words
Without these words
Whole of Government
Top 5 Most Popular FAQs
What is a Critical Information Infrastructure?
Under section 7(1) of the Cybersecurity Act, a Critical Information Infrastructure is a computer or a computer system located wholly or partly in Singapore, necessary for the continuous delivery of an essential service, and the loss or compromise of the computer or computer system will have a debilitating effect on the availability of the essential service in Singapore.
What is the profile of the Critical Information Infrastructure (CII) in Singapore?
The Cyber Security Agency of Singapore (CSA) has worked closely with Sector Leads to identify the Critical Information Infrastructure (CII) supporting the provision of essential services across 11 critical sectors.
The critical sectors are Energy, Water, Banking & Finance, Healthcare, Transport (which includes Land, Maritime, and Aviation), Government, Infocomm, Media, and Security & Emergency Services. The list of essential services in these sectors are published in the First Schedule of the Act.
Under Section 7 of the Act, CII refers to specific computers and computer systems that are explicitly designated by the Commissioner of Cybersecurity. It is not the case that firms and sectors will be considered as CII.
The list of CII and CII owners will be finalised, before CSA and Sector Leads implement the Cybersecurity Act in the second half of 2018. The list of CII and CII owners are secret for national security reasons.
How does the Cyber Security Agency of Singapore (CSA) determine the list of essential services?
In arriving at the list of essential services in the Cybersecurity Act, the Cyber Security Agency of Singapore (CSA) took reference from the list of critical sectors in the Computer Misuse and Cybersecurity Act (CMCA). CSA also surveyed the definition of "essential services" in other jurisdictions.
CSA then identified a total of 11 sectors with Critical Information Infrastructure. For each of these 11 sectors, CSA worked with the relevant Sector Lead to identify their essential services based on criteria such as impact to Singapore's economy.
We do not preclude gazetting new essential services in the future.
How vulnerable are our Critical Information Infrastructures (CII)? Have any of our CII networks been compromised or experienced attacks?
As a hyper-connected business hub, Singapore is vulnerable to cyber-attacks which are increasing in scale and sophistication. While we were fortunate to have escaped relatively unscathed so far, we have seen our share of cyber-attacks. One example is the breach of MINDEF's I-net system in February 2017 where the personal data of 850 national servicemen were leaked. In May 2017, Advanced Persistent Threat (APT) actors targeted two of our top universities.
Although none of our Critical Information Infrastructure (CII) has been disrupted, the global WannaCry and Petya malware attacks, which also surfaced in Singapore, are reminders of our vulnerability. We can expect more attempts to breach our cyber defences.
To enhance our defences against increasingly sophisticated cyber-attacks, the Cyber Security Agency of Singapore (CSA) works closely with Sector Leads to ensure that CII owners have capabilities and measures to detect, respond to and recover from cyber threats and cyber-attacks. CSA has been advocating that organisations should take cybersecurity into consideration when designing systems and networks to develop robust systems with defences against attacks, and not add them later as an afterthought.
I would like to report a cybersecurity incident. Who do I contact?
The Singapore Computer Emergency Response Team (SingCERT) responds to cybersecurity incidents.
To report an incident, please call the SingCERT hotline at 6323 5052. Alternatively, please email SingCERT at
If you have encountered any of the following security policy violations, you can contact SingCERT for technical assistance.
Attempts (either failed or successful) to gain unauthorised access to a system or its data
Unwanted disruption or denial of service
The unauthorised use of a system for the processing or storage of data
Changes to system hardware, firmware, or software characteristics without the owner's knowledge, instruction, or consent
Email-related security issues
If you are unable to find an answer to your query, please submit your
to let us know how we can help you.
Rate this Website
© 2019, Government of Singapore