Skip to main content

Public advisory of scammers impersonating CSA and the SPF

Cyber Security Agency of Singapore
  1. Home
  2. Frequently Asked Questions
  3. Cybersecurity Risk Assessment for CII

Cybersecurity Risk Assessment for CII

FAQs on the process for conducting cybersecurity risk assessments for Critical Information Infrastructure (CII), detailing its importance for compliance with Singapore's Cybersecurity Act.

Last updated 20 January 2025
Can the risk assessment guidance document be shared with service providers whom my organisation has engaged to perform risk assessments?
The Security-by-Design (SBD) Framework mentions the need to perform Threat & Risk Assessment (TRA) in the initiation phase of a project lifecycle. Should my organisation reference the risk assessment guidance document when performing such TRA?
My organisation is currently using a better risk assessment methodology than the one provided in the risk assessment guidance. Are we still required to follow the prescribed methodology in CSA’s risk assessment guidance?
Should my organisation use a 5-by-5 risk matrix (i.e. a scale between 1 and 5 for both likelihood and impact) stipulated in the risk assessment guidance document to determine risk levels?
The NIST 800-30 publication, a recommended resource for threat scenarios, includes physical threats. Is my organisation required to include such scenarios in the risk assessments?