(i) Central Bureau of Communication website (https://cbcindia.gov.in/ ) has been placed in protected zones with implementation of firewalls and IDS (Intrusion Detection System) and high availability solutions.
(ii) Before launch of the Central Bureau of Communication website (https://cbcindia.gov.in/) simulated penetration tests have been conducted. Penetration testing has also been conducted 2 times after the launch of the
Website.
(iii) The Central Bureau of Communication website (https://cbcindia.gov.in/) has been audited for known application level vulnerabilities before the launch and all the known vulnerability has been addressed.
(iv) Hardening of servers has been done as per the extant cyber security guidelines before the launch of the Central Bureau of Communication website.(https://cbcindia.gov.in/).
(v) Access to web servers hosting the Central Bureau of Communication website (https://cbcindia.gov.in/) is restricted both physically and through the network as
far as possible.
(vi) BECIL is maintaining the CBC website (https://cbcindia.gov.in/) backups, including both website and database backups. These backups are performed on a 12 daily, weekly, monthly, and yearly basis, with retention policies in place. Azure Backup Vaults are used for this purpose, with geo-redundant locations ensuring high availability. The backups are accessible to the CBC team for authorized access and monitoring.
(vii) Web-servers hosting The Central Bureau of Communication website (https://cbcindia.gov.in/) are configured behind IDS, IPS (Intrusion Prevention System) and with system firewalls on them.
(viii) All the development work is done in a separate development environment and is well tested on the staging server before updating it on the production server.
(ix) After testing properly on the staging server the applications are uploaded to the production server using SSH and VPN through a single point.
(x) The content contributed by/from remote locations is duly authenticated & is not published on the production server directly. Any content contributed has to go through the moderation process before final publishing to the production server.
(xi) All contents of the web pages are checked for intentional or unintentional malicious content before final upload to web server pages.
(xii) Audit and Log of all activities involving the operating system, access to the system, and access to applications are maintained and archived. All rejected accesses and services are logged and listed in exception reports for further scrutiny.
(xiii) Help Desk staff at the CBC monitor the Central Bureau of Communication website (https://cbcindia.gov.in/) at intervals of weekly to check the web pages to confirm that the web pages are up and running, that no unauthorized changes have been made, and that no unauthorized links have been established.
(xiv) All newly released system software patches; bug fixes and upgrades are expediently and regularly reviewed and installed on the web server.
(xv) On Production web servers, Internet browsing, mail and any other desktop applications are disabled. Only server administration related tasks are performed. Server passwords are changed at the interval of every month and are shared
by two persons.
(xvi) BECIL has been designated as Administrator for the Central Bureau of Communication website (https://cbcindia.gov.in/) and shall be responsible for implementing this policy for each of the web servers. The administrator shall also coordinate with the Audit Team for required auditing of the server(s).
(xvii) The Central Bureau of Communication website (https://cbcindia.gov.in/) has been audited before launch and has complied with all the points mentioned in the policies document of the Cyber Security Group mentioned above.
(xviii) The Central Bureau of Communication website (https://cbcindia.gov.in/) has also been subjected to an automated risk assessment performed through vulnerability identification software before and after the launch and all the known vulnerabilities have been addressed.