Skip to main content

Guidelines

Home » Rujukan » Guidelines

Guidelines

 

Cyber Threat Modelling for Risk Assessment

The aim of the Guidelines to Cyber Threat Modelling is to provide CII Owners with a clear and practical method to identify cyber security threats. By offering various approaches and methods, this guide equips CII owners to efficiently pinpoint relevant threat events, as outlined in the Code of Practice (CoP) section 3.2 on Risk Management.

 

 

 

Auditing & Conducting Cybersecurity Risk Assessment for Critical Information Infrastructure

This document provides guidance to CII Owners on conducting cybersecurity risk assessments and outlines expectations under the Cybersecurity Order 2023. It also sets out expectations for cybersecurity audits and guides appointed or approved auditors on key areas for CII audits under the Cybersecurity Order 2023.

Display page title
Off