THEOS Cyber helps critical infrastructure operators meet Hong Kong’s new cybersecurity requirements through Managed Threat Detection and Response (MTDR) for continuous monitoring, Digital Forensics and Incident Response (DF/IR) for rapid incident response, and offensive security testing to identify vulnerabilities before threat actors do. Are your capabilities ready?
Hong Kong’s Protection of Critical Infrastructures (Computer Systems) Ordinance (CI Bill) is now in effect. If you operate in one of eight designated sectors, here’s what compliance requires.
What the ordinance is
The Protection of Critical Infrastructures (Computer Systems) Ordinance establishes mandatory cybersecurity requirements for organisations operating critical infrastructure in Hong Kong. It requires designated operators to implement security management programs, conduct regular assessments and audits, and report security incidents to the Commissioner of Critical Infrastructure within strict timelines. The ordinance aims to minimise the risk of cyberattacks disrupting essential services that society depends on.
Who this applies to
- Energy
- Information technology
- Banking and financial services
- Air transport
- Land transport
- Maritime transport
- Healthcare services
- Telecommunications and broadcasting
- Major sports venue
- Major performance venues
- Research and development parks
Understanding the designation process
How infrastructures are designated as CIs
- The kind of service provided
- Whether disruption, loss of functionality, or data leakage would significantly impact critical societal or economic activities
- Other relevant factors
How organisations are designated as CI operators
- Your dependence on computer systems for core functions
- The sensitivity of digital data you control
- Your extent of control over the infrastructure’s operation and management.
How systems are designated as critical computer systems
- Whether the system is accessible in or from Hong Kong
- The system’s role in your core functions
- Impact to core functions if the system is disrupted or destroyed
- How the system relates to your other systems and to other operators’ systems
Three categories of compliance obligations
Category 1: Organisation of CI operators
- Maintain an office in Hong Kong
- Notify the authority of operator changes
- Set up and maintain a computer system security management unit with a qualified head
Category 2: Prevention of threats and incidents
- Notify the authority of significant changes to certain systems
- Submit and implement security management plans (details in Schedule 3 of the ordinance)
- Conduct security risk assessments (details in Schedule 4 of the ordinance)
- Arrange security audits (details in Schedule 5 of the ordinance)
Category 3: Incident reporting and response
- Participate in security drills
- Submit and implement emergency response plans
- Notify the Commissioner of incidents within the specified timeframe:
- For serious computer-system security incidents (defined as incidents that have disrupted, are disrupting, or will be likely to disrupt the core function of the critical infrastructure concerned): within 12 hours after becoming aware of the incident
- For other computer-system security incidents: within 48 hours after becoming aware of the incident
- Submit a written report of the incident within 14 days after becoming aware of it.
The compliance timeline
What non-compliance costs
Meeting the assessment requirements
Building incident response capabilities
Where this fits in the regional picture
How THEOS Cyber supports compliance
Getting ready
If you’re likely to be designated, start by assessing your current capabilities: