COI Report – Part VII
Page
335 of
425 networks, and advised on possible measures to mitigate a similar incident. c)
CSA called up other users of the SCM database to explain the vulnerabilities observed in the SCM database and to ask them to take immediate measures to protect themselves. d)
CSA organised a briefing for relevant stakeholders of all CII sectors and recommended that they review their protection and management of large databases. e) Following the public announcement
of the Cyber Attack, CSA directed that CII sectors adopt heightened measures, in anticipation of potential opportunistic attacks on sensitive systems. f)
CSA published two advisories on protection and precautionary measures (i) a technical advisory for companies on measures to protect their systems and customers personal data and (ii) to encourage members of the public to take personal precautionary measures against scams that could arise from the theft of the personal data that had been lost in the Cyber Attack.
970.
In our view, it is critical for the government,
through CSA, to continue to ensure sharing of threat intelligence across the CII sectors (inline with its information management process. As Vivek noted, the attackers have the ability to move across
the whole fabric of systems, the defenders must thus have visibility across the same range of systems, in order to provide an adequate defence.