3. Summary of Changes
(3.1) In summary, the CS Bill introduces the following key changes to the CS Act:
- Updating of CII-related provisions under the CS Act to account for changes in technology and business models to include virtual systems and CIIs located overseas.
- Expanding the scope of cyber incidents reportable by CII owners to the CSA.
- Expanding the scope of the CS Act to include owners of systems of temporary cybersecurity concern (STCC); entities of special cybersecurity interest (ESCI); and providers of major foundational digital infrastructure services (FDI).
- Enhancing administrative powers and the penalty regime.
Updating of CII-related provisions
(3.2) At present, the CS Act primarily imposes obligations on CII owners. This regulatory approach reflects the business norm when the CS Act was enacted in 2018 where providers of essential services (PES) owned and operated the CII necessary for the delivery of essential services.
(3.3) To account for changes in the technology operating environment, the CS Act has been updated with new definitions of “computer” and “computer system”, as well as a new Part 3A to regulate PES that rely on third-party owned CII.
Updating definitions of “computer” and “computer system”
(3.4) At present, the definitions of “computer” and “computer system” were based on the premise that such devices and systems were physical computers built out of dedicated hardware, such as hard disk drives, memory and processor chips.2 This is because the prevailing norm at the time of enactment of the CS Act envisaged CIIs as physical systems. However, the use of virtualisation and cloud computing technologies surged since 2018 and it is now possible for a CII to be based on a virtual computing system. Definitions of “computer” and “computing system” focused on regulating physical hardware (which could be easily replaced or shared in a virtual computing system) are therefore out of step with such virtual computing systems.
(3.5) Accordingly, the relevant definitions of “computer” and “computer system” in the CS Act will be updated to include “virtual computers” and “virtual computer systems”.3 Additionally, provisions clarifying what “ownership” means in relation to “virtual computers” and “virtual computing systems” have been included. These changes allow the CS Act to regulate both physical and virtual CIIs. This new definition also clarifies that a CII owner is responsible for the cybersecurity of their virtual CII, not third-party vendors that supply the underlying physical infrastructure.4
(3.6) In addition, the CS Act has been amended to designate and regulate CIIs located overseas that support an essential service in Singapore.5 This applies if its owner is in Singapore and the computer system would have been designated as a CII had it been located wholly or partly in Singapore.
New Part 3A – regulating PES that rely on third-party owned CII
(3.7) Part 3A of the CS Act will extend regulatory powers over PES that rely on third-party owned CII for the continuous delivery of a given essential service.6 This will allow PES to leverage efficiencies and effectiveness of such computer systems operated by third parties, who may have greater expertise or cost-effectiveness in operating such systems, due to demand aggregation.
(3.8) Under the new Part 3A, PES will remain responsible for the cybersecurity and cyber resilience of the computer systems relied upon to provide the essential services. This makes clear that PES cannot outsource their responsibility to third-party vendors in reliance of their computer systems.
(3.9) In this regard, the Senior Minister of State for Communications and Information, Janil Puthucheary, clarified during the Second Reading of the CS Bill that while the new Part 3A of the CS Act does not seek to regulate the third-party owners of these systems used by PES, such PES must ensure that the systems they rely on meet comparable cybersecurity standards and requirements of a CII through legally binding commitments, such as contractual provisions.7
Expanding the scope of cyber incidents reportable by CII owners to the CSA
(3.10) At present, a CII owner is generally required to report to the CSA cyber incidents relating to the CII, or computers or computer systems that are interconnected with or communicate with the CII.
(3.11) To counter the evolving tactics of threat actors targeting systems at the periphery or supply chains to attack CIIs, the CS Act will now require CII owners to additionally report incidents that affect: (a) other computers under the CII owner’s control; and (b) computers under the control of a supplier that are interconnected with or communicates with the CII.8
Expanding the scope of the CS Act to include STCC, ESCI and FDI
(3.12) Apart from regulatory changes in relation to CIIs, the CS Act has now been expanded to regulate STCC, ESCI and FDI.
- Under the new Part 3B, the CSA will be able to designate and regulate STCCs, which are designated systems that, for a time limited period, are at high risk of cyber-attacks and would have a serious detrimental effect on Singapore’s national interests if compromised.
- Under the new Part 3C, the CSA will be able to designate and regulate ESCIs, which are particularly attractive targets for malicious threat actors, either due to the disruption of the function they perform, or due to the fact that the disclosure of sensitive information held in their computer systems will likely have a significant detrimental effect on Singapore’s defence, foreign relations, economy, public safety or public order. In this regard, it was clarified during the Second Reading of the CS Bill that no specific list of designated ESCIs will be disclosed to avoid inadvertent advertising of these entities to threat actors.9
- Under the new Part 3D, the CSA will be able to designate and regulate major providers of FDI, which refers to entities that serve large numbers of businesses or organisations. This would safeguard against the risk of widespread disruption or deterioration of activities that rely on or are enabled by FDI services. The list of providers of FDI services are specified in the new Third Schedule to the CS Act, which as a start, will include cloud computing services and data centre facility services.10 Additional FDI services may be included in the Third Schedule to the CS Act as new types of digital infrastructure emerge and grow in importance to Singapore’s needs.
Enhancing administrative powers and the penalty regime
(3.13) The administrative powers of the Commissioner of Cybersecurity (Commissioner) will be enhanced to address non-compliance of the CS Act. For instance, the Commissioner will be empowered to conduct on-site inspections of CII owners if it appears to the Commissioner that a CII owner failed to meet compliance requirements or has submitted false, misleading, inaccurate or incomplete information.11 The Commissioner can also grant a time extension to any person required to do any relevant action under the CS Act, provided there are good reasons to do so.12
(3.14) To improve CSA’s ability to monitor and supervise persons who provide licensable cybersecurity services under Part 5 of the CS Act, the CS Act will now provide monitoring powers for licensing officers under the provisions of a new section 29A. The new provisions give the CSA powers to enter and inspect premises, request records, and make inquiries to ensure compliance.
(3.15) Presently, non-compliance with the statutory obligations in relation to CII is enforced through criminal penalties. To provide the CSA with a wider toolkit to secure compliance with the CS Act (especially given the broader set of obligations introduced), sections 37A to 37D of the CS Act will give the Commissioner flexibility to, with the Public Prosecutor’s consent, bring a civil action in court for civil penalties instead of criminal enforcement.13 Depending on provisions contravened, such civil penalties could range from a sum not exceeding S$100,000 to 10% of the annual turnover of the person’s business in Singapore.14