Overview

Critical infrastructure -- the systems and assets so vital that their incapacitation would have a debilitating impact on national security, economy, public health, or safety -- has become a primary target in modern security threats. Cyber attacks on power grids, ransomware on hospitals, and satellite jamming represent a new frontier where traditional kinetic warfare converges with digital and space-based threats.

India's critical infrastructure spans power, telecom, banking, transport, defence, space, and water systems. The National Critical Information Infrastructure Protection Centre (NCIIPC), established under Section 70A of the Information Technology Act, 2000, is the nodal agency for protecting these assets. The alleged RedEcho cyber intrusion targeting India's power grid infrastructure in 2020 demonstrated the severity of this threat.

Space security has emerged as a contested domain. India's successful ASAT test (Mission Shakti, 27 March 2019) demonstrated its capability to defend space assets, while the establishment of the Defence Space Agency in 2019 signals India's recognition of space as a warfighting domain. Simultaneously, undersea cable vulnerabilities, drone threats, and electromagnetic pulse (EMP) risks represent emerging security challenges that transcend traditional categories.


Critical Infrastructure -- Definition and Sectors

Definition

FrameworkDefinition
IT Act, 2000 (Section 70)Critical Information Infrastructure (CII) means "those computer resources, the incapacitation or destruction of which, shall have debilitating impact on national security, economy, public health or safety"
NCIIPCCII includes ICT resources that support critical sectors; their disruption can cascade across interconnected systems
Global perspectiveMost countries define critical infrastructure to include physical and cyber assets essential for societal functioning

Critical Sectors in India

SectorExamples of Critical Assets
Power and EnergyPower generation plants (thermal, nuclear, hydro), transmission grids, Regional Load Despatch Centres (RLDCs), oil and gas pipelines
TelecomTelecom networks, internet backbone, submarine cable landing stations, data centres
Banking and Financial ServicesCore banking systems, payment gateways (UPI, NEFT, RTGS), stock exchanges, insurance networks
TransportRailways signalling systems, air traffic control, port management, highway toll systems
DefenceMilitary communication networks, command and control systems, defence manufacturing systems
SpaceISRO ground stations, satellite communication systems, GPS/NavIC infrastructure
WaterWater treatment plants, dam control systems, irrigation networks with SCADA systems
Governmente-Governance platforms, Aadhaar/UIDAI systems, DigiLocker, tax administration
HealthcareHospital management systems, medical device networks, telemedicine infrastructure

NCIIPC -- National Critical Information Infrastructure Protection Centre

FeatureDetail
EstablishedGazette notification dated 16 January 2014
Legal basisSection 70A of the Information Technology Act, 2000 (amended 2008)
NatureA unit of the National Technical Research Organisation (NTRO)
Reports toPrime Minister's Office (PMO) through NTRO
RoleDesignated as the National Nodal Agency for Critical Information Infrastructure Protection
MandateIdentify CII, direct protective measures, oversee compliance, coordinate national-level incident response
OperationsMaintains a 24x7 Help Desk for incident reporting; issues advisories and alerts
CoordinationWorks closely with CERT-In (Indian Computer Emergency Response Team) and sector-specific CERTs

NCIIPC Functions

FunctionDetail
CII identificationIdentifies and designates critical information infrastructure across sectors in consultation with sector regulators
Threat intelligenceMonitors cyber threats targeting CII; shares intelligence with relevant stakeholders
Vulnerability assessmentConducts audits and assessments of CII systems
Incident responseCoordinates response to cyber incidents affecting CII in collaboration with CERT-In
Capacity buildingConducts training programmes, workshops, and cyber exercises for CII operators
Standards and guidelinesIssues guidelines for protection of CII; mandates security practices

Related Cyber Security Bodies

BodyRole
CERT-InIndian Computer Emergency Response Team -- nodal agency for cyber security incident response (under MeitY)
NCIIPCSpecifically for Critical Information Infrastructure protection (under NTRO/PMO)
Defence Cyber AgencyTri-service agency for military cyber operations
I4CIndian Cyber Crime Coordination Centre (under MHA) -- coordinates cyber crime investigation
Sector CERTsSector-specific teams -- e.g., CERT-Fin (financial), RBI-CERT (banking)

For Prelims: NCIIPC established 16 January 2014 under Section 70A of IT Act 2000; a unit of NTRO under PMO; nodal agency for CII protection. CERT-In is the nodal agency for general cyber security incident response under MeitY. CII defined as computer resources whose incapacitation would have debilitating impact on national security, economy, public health, or safety.


Threats to Critical Infrastructure

Cyber Attacks

Threat TypeDetail
State-sponsored attacksNation-state actors targeting power grids, defence systems, and financial infrastructure for espionage, disruption, or coercion
RansomwareMalware that encrypts systems and demands payment; AIIMS Delhi ransomware attack (November 2022) affected hospital operations for weeks
Supply chain attacksCompromise of hardware or software supply chains to insert backdoors into critical systems
APT (Advanced Persistent Threats)Long-term, stealthy intrusions into networks for espionage or pre-positioning for future attacks

Mumbai Power Grid Incident (2020)

FeatureDetail
Date12 October 2020
EventMassive power outage across Mumbai lasting over 10 hours; hospitals switched to generators, trains halted, stock exchange disrupted
AttributionCybersecurity firm Recorded Future identified a China-linked threat group RedEcho as having planted malware in Indian power sector systems
Targets identifiedAt least 10 Indian power sector companies and 2 seaports; 4 of 5 Regional Load Despatch Centres targeted
DisputeMaharashtra's Energy Minister confirmed cyber attack; Central government attributed the outage to human error -- attribution remains contested
SignificanceDemonstrated the vulnerability of India's power grid to state-sponsored cyber intrusions; highlighted the cyber-physical convergence threat

Other Threats

ThreatDetail
Insider threatsEmployees or contractors with access to critical systems who misuse access -- intentionally or through negligence
Physical-cyber convergenceSCADA/ICS (Industrial Control Systems) controlling physical infrastructure (dams, power plants, water treatment) are increasingly connected to networks, creating cyber-physical attack vectors
Drone threatsDrones used for surveillance, payload delivery (explosives), or disruption of airports and military installations
EMP (Electromagnetic Pulse)Nuclear or non-nuclear EMP devices can disable electronic systems across large areas; a catastrophic threat to all networked infrastructure

Protection Framework

MeasureDetail
Air-gapped networksCritical systems isolated from the internet to prevent remote cyber attacks -- used in defence and nuclear infrastructure
RedundancyBackup systems and alternative pathways to ensure continuity if primary systems are compromised
Zero Trust ArchitectureSecurity model that assumes no user or system is trusted by default -- continuous verification required
Security auditsRegular vulnerability assessments and penetration testing of critical systems mandated by NCIIPC
Incident response plansPre-defined response protocols for cyber incidents affecting CII
Cyber exercisesNCIIPC and CERT-In conduct regular cyber drills simulating attacks on critical infrastructure
Sector-specific regulationsRBI cyber security framework for banks; SEBI guidelines for stock exchanges; TRAI security regulations for telecom

Space Security

Space as a Contested Domain

FeatureDetail
Dependence on spaceModern military operations, communications, navigation (GPS/NavIC), weather forecasting, and surveillance depend heavily on space-based assets
Contested domainSpace is no longer a sanctuary -- ASAT weapons, satellite jamming, and cyber attacks on ground stations threaten space assets
Space powersUSA, Russia, China, and India have demonstrated ASAT capabilities
Militarisation vs weaponisationMilitarisation (use of space for military support -- satellite reconnaissance, communication) is widespread; weaponisation (placing weapons in space or using weapons against space assets) is the emerging concern

Mission Shakti -- India's ASAT Test (27 March 2019)

FeatureDetail
Date27 March 2019
Code nameMission Shakti
TargetMicrosat-R -- a 740 kg satellite launched by ISRO on 24 January 2019 specifically to serve as the target
AltitudeTarget struck at approximately 283 km in Low Earth Orbit (LEO)
WeaponModified PDV Mk-II (ballistic missile defence interceptor)
Launch siteIntegrated Test Range (ITR), Abdul Kalam Island (Wheeler Island), Odisha
Interception timeTarget hit 168 seconds after launch
SignificanceIndia became the 4th country (after USA, Russia, China) to successfully test an ASAT weapon
Space debrisConducted at low altitude to ensure debris decayed rapidly; India argued minimal long-term debris generation
Announced byPrime Minister Narendra Modi in a national address

For Prelims: Mission Shakti -- 27 March 2019; target Microsat-R at 283 km altitude; weapon PDV Mk-II; India became 4th country with ASAT capability (after USA, Russia, China); launched from Abdul Kalam Island (ITR), Odisha.


Defence Space Agency (DSA)

FeatureDetail
Established1 June 2019
NatureTri-service agency of the Indian Armed Forces
HeadquartersBengaluru
CompositionMilitary personnel from Army, Navy, and Air Force
MandateProtect Indian interests in outer space; develop space warfare strategy; deal with potential space conflicts
FunctionsSpace situational awareness, satellite operations for defence, space-based ISR (Intelligence, Surveillance, Reconnaissance), counter-space operations

Outer Space Treaty, 1967

FeatureDetail
Full nameTreaty on Principles Governing the Activities of States in the Exploration and Use of Outer Space, including the Moon and Other Celestial Bodies
Adopted1967; entered into force 10 October 1967
Key provisions(1) Space exploration is free for all nations; (2) No country can claim sovereignty over outer space or celestial bodies; (3) Nuclear weapons and WMDs prohibited in space; (4) Moon and celestial bodies used for peaceful purposes only; (5) States liable for damage caused by space objects
IndiaSigned March 1967; ratified 1982
LimitationDoes not ban conventional weapons in space or ASAT tests -- this is the legal gap that allows ASAT weapons
Other space treatiesIndia has signed all 5 UN space treaties; ratified 4 (not ratified the Moon Agreement, 1979)

Space Threats

ThreatDetail
ASAT weaponsKinetic kill vehicles (as tested by India, China, USA, Russia) that physically destroy satellites
Satellite jammingDisrupting satellite signals (GPS, communication) through electronic interference
Satellite spoofingSending false signals to deceive GPS or communication receivers -- can misdirect navigation systems
Cyber attacks on ground stationsHacking satellite control centres to commandeer or disable satellites
Space debrisDebris from ASAT tests and collisions threatens all operational satellites -- Kessler Syndrome (cascading collisions) is a long-term concern
GPS dependencyIndia's armed forces, aviation, shipping, and civilian navigation depend on GPS (USA) -- vulnerability if signals are jammed or spoofed; NavIC provides Indian alternative

India's Space Situational Awareness

FeatureDetail
Network for Space Objects Tracking and Analysis (NETRA)ISRO project for monitoring space debris and protecting Indian space assets
ISTRACISRO Telemetry, Tracking and Command Network -- tracks Indian satellites
NavICIndian Regional Navigation Satellite System -- India's indigenous alternative to GPS; 7 satellites providing navigation coverage over India and surrounding region
SignificanceReduces dependence on foreign navigation systems; ensures continuity during conflict

International Space Governance and India's Position

Key International Frameworks

FrameworkDetail
Outer Space Treaty (1967)Foundation treaty; prohibits WMDs in space; India ratified 1982
Rescue Agreement (1968)Mandates rescue and return of astronauts; return of space objects; India ratified
Liability Convention (1972)Establishes liability for damage caused by space objects; launching state absolutely liable for ground damage; India ratified
Registration Convention (1976)Requires registration of space objects with the UN; India ratified
Moon Agreement (1979)Declares Moon and its resources as "common heritage of mankind"; India has not ratified (like most space powers)

India's Position on Space Governance

FeatureDetail
No First PlacementIndia supports the principle of no first placement of weapons in outer space
PAROSIndia supports the Prevention of an Arms Race in Outer Space (PAROS) resolution at the UN
Artemis AccordsIndia signed the Artemis Accords in June 2023 -- US-led framework for cooperative lunar exploration
Space debris mitigationIndia follows IADC Space Debris Mitigation Guidelines; Mission Shakti conducted at low altitude to minimise debris
Indian Space Policy 2023Liberalised space sector; IN-SPACe as regulatory body; encourages private sector participation

Undersea Cable Vulnerability

FeatureDetail
ScaleOver 95% of international data traffic passes through undersea fibre optic cables
India's dependenceIndia's internet connectivity, financial transactions, and communications heavily depend on submarine cables landing at Chennai, Mumbai, and Kochi
ThreatsSabotage (state or non-state actors cutting cables), natural damage (earthquakes, anchors, trawlers), and espionage (tapping cable traffic)
ExamplesMultiple cable cuts have disrupted internet in regions worldwide; the Red Sea cable damage (2024) affected India-Europe connectivity
ProtectionCable landing stations are designated as critical infrastructure; monitoring through NCIIPC; redundancy through multiple cable routes

Drone Threats to Critical Infrastructure

FeatureDetail
Emerging threatDrones (UAVs) used for surveillance, payload delivery (explosives, contraband), and disruption of sensitive installations
India-specificDrone-based attacks on Jammu Air Force Station (June 2021) -- first such attack on a military installation in India
Airport disruptionDrone sightings near airports cause shutdowns -- Gatwick (UK, 2018) demonstrated the economic impact
Critical infrastructurePower plants, refineries, military bases, nuclear installations, and ports all vulnerable
Counter-drone measuresAnti-drone systems (detection radar, jamming, directed energy), drone regulations (DGCA), and no-drone zones around critical infrastructure

Recent Developments (2024–2026)

NCIIPC CIIEX 2024 and CERT-In Audits Scale-Up

In April 2024, NCIIPC organised the Critical Information Infrastructure Security Exercise (CIIEX 2024) for Chief Information Security Officers (CISOs), Chief Technology Officers (CTOs), and Chief Risk Officers (CROs) of all CII-designated entities — a hands-on cyber defence exercise simulating coordinated attacks on critical infrastructure. NCIIPC also released the National Cyber Security Reference Framework (NCRF 2024) — shared with over 100 critical sector entities — as an interim governance framework while India's comprehensive National Cyber Security Strategy remains under finalisation. Separately, CERT-In conducted over 9,700 cybersecurity audits across critical sectors in 2024-25, through 200 empanelled cybersecurity organisations, as stated by the Union Minister of State for Electronics and IT in July 2025. These audits represent a significant scaling-up of India's critical infrastructure audit regime.

UPSC angle: NCIIPC CIIEX 2024, NCRF 2024, and CERT-In's 9,700+ audits (2024-25) — are specific verified figures connecting institutional framework with operational capability for GS-III.

Undersea Cable Damage — Red Sea Crisis Impact on India (2024)

The Red Sea crisis (2024), driven by Houthi attacks on commercial shipping, caused damage to multiple submarine cables in the region, disrupting internet and data connectivity between Asia, Europe, and Africa. Several cables routing through the Red Sea were either damaged or rerouted, affecting India's data bandwidth, cloud connectivity, and financial transaction latency. This incident underscored the vulnerability of India's internet infrastructure to geopolitical crises in distant regions. India's three major cable landing stations (Mumbai, Chennai, Kochi) handle over 95% of India's international internet traffic, and their disruption would have cascading effects on banking, telecom, and e-governance systems. NCIIPC and CERT-In issued advisories to affected entities to activate backup routes and alternative capacity.

UPSC angle: Red Sea crisis undersea cable damage — submarine cable vulnerability, India's cable landing stations (Mumbai, Chennai, Kochi), NCIIPC response — directly tests the "undersea cable as critical infrastructure" dimension for GS-III.

ISRO Space Cybersecurity Training Initiative (2024–2025)

In a recognition of the growing cyber-physical threat to space infrastructure, India's National Security Council Secretariat (NSCS), ISRO, and Rashtriya Raksha University (RRU) jointly organised cybersecurity training for ISRO personnel in 2024. This initiative reflects growing awareness that ground stations, satellite control networks, and launch facilities face cyber threats from state-sponsored actors. India's NETRA (Network for Space Objects Tracking and Analysis) system continues to evolve for space situational awareness. In 2024, ISRO launched INSAT-3DS (February 2024, geostationary meteorological satellite) and advanced preparations for Gaganyaan (human spaceflight). The Defence Space Agency (DSA) has been working on Space Situational Awareness protocols for India's growing constellation of defence satellites.

UPSC angle: NSCS-ISRO-RRU cybersecurity training, space as a critical infrastructure domain, DSA Space Situational Awareness, and India's defence satellite protection measures — link space security with cybersecurity for GS-III.

India-Pakistan Drone Warfare and Critical Infrastructure Risk (May 2025)

The May 2025 India-Pakistan crisis (Operation Sindoor) demonstrated the real threat of drone attacks on critical infrastructure. Pakistan's response included drone and missile strikes targeting Amritsar, Jalandhar, Ludhiana, and Chandigarh — cities hosting key power, telecom, and military infrastructure. India deployed counter-drone systems (radar, jamming, directed energy) in a concerted counter-UAS (Unmanned Aerial System) response. The crisis exposed: (1) the need for hardened critical infrastructure against drone swarms; (2) the importance of air-gapped SCADA systems for power grids near border areas; (3) CISF and CRPF rapid-reaction protocols for protecting industrial installations under air threat. Post-crisis reviews have led to accelerated deployment of counter-drone systems at airports, power plants, and defence installations.

UPSC angle: Drone attacks on critical infrastructure during Operation Sindoor — counter-UAS systems, SCADA air-gapping, CISF rapid reaction — are cutting-edge security developments linking space/tech security with internal security for GS-III.


Key Terms for Quick Revision

TermMeaning
CIICritical Information Infrastructure -- IT Act definition: computer resources whose incapacitation has debilitating impact on national security/economy/safety
NCIIPCNational Critical Information Infrastructure Protection Centre -- under NTRO/PMO; Section 70A IT Act; established 16 January 2014
CERT-InIndian Computer Emergency Response Team -- nodal agency for cyber security under MeitY
RedEchoChina-linked threat group attributed with targeting India's power grid infrastructure (2020)
Mission ShaktiIndia's ASAT test -- 27 March 2019; target Microsat-R at 283 km; PDV Mk-II; India 4th ASAT nation
DSADefence Space Agency -- tri-service; established 1 June 2019; HQ Bengaluru
Outer Space Treaty1967; prohibits WMDs in space; peaceful use of celestial bodies; India signed 1967, ratified 1982
NavICIndian Regional Navigation Satellite System -- indigenous GPS alternative; 7 satellites
NETRAISRO project for space situational awareness and debris tracking
Kessler SyndromeCascading collisions in orbit creating ever-more debris -- makes space increasingly unusable
SCADASupervisory Control and Data Acquisition -- systems controlling physical infrastructure (power, water, dams)
EMPElectromagnetic Pulse -- can disable electronic systems across large areas

Exam Strategy

For Mains Answer Writing: Critical infrastructure and space security questions require you to demonstrate understanding of the convergence of cyber and physical threats. For CII protection, discuss the NCIIPC framework, the Mumbai 2020 power grid incident as a case study, and the need for public-private partnership (most critical infrastructure is privately operated). For space security, trace India's journey: Mission Shakti (2019) to DSA (2019) to the broader space threat landscape. Discuss the gap in the Outer Space Treaty (no ban on conventional weapons/ASAT) and the need for a new space governance framework. Connect emerging threats -- drones, undersea cables, EMP -- to the evolving nature of warfare.

For Prelims: NCIIPC (Section 70A IT Act, under NTRO/PMO, established 2014); CERT-In (under MeitY); Mission Shakti (27 March 2019, Microsat-R, 283 km, PDV Mk-II, 4th ASAT nation); DSA (1 June 2019, Bengaluru, tri-service); Outer Space Treaty 1967 (prohibits WMDs in space, India ratified 1982); NavIC (7 satellites, Indian GPS alternative); CII definition (IT Act Section 70); Jammu Air Force drone attack (June 2021).


Vocabulary

Kinetic Kill Vehicle

  • Pronunciation: /kɪˈnɛtɪk kɪl ˈviːɪkl/
  • Definition: A projectile that destroys its target purely through the force of impact at extremely high velocity, without using any explosive warhead -- the kinetic energy of the collision is sufficient to obliterate the target. Used in ASAT weapons and ballistic missile defence systems.
  • Origin: From Greek kinetikos ("of or for putting in motion") + English kill + vehicle; the concept emerged in Cold War ballistic missile defence research (1960s-70s); operationalised in modern ASAT and missile defence systems.

Critical Infrastructure

  • Pronunciation: /ˈkrɪtɪkl ˈɪnfrəstrʌktʃə/
  • Definition: The physical and cyber systems, assets, and networks so essential to a nation that their incapacitation or destruction would have a debilitating effect on national security, economic stability, public health, or public safety -- includes power grids, telecom networks, financial systems, water supply, transport, and defence installations.
  • Origin: The term gained prominence in the United States after Presidential Decision Directive 63 (PDD-63) issued by President Clinton in 1998 on Critical Infrastructure Protection; critical from Latin criticus ("decisive, crucial") + infrastructure from French infra- ("below") + structure ("building").

Sources: NCIIPC (nciipc.gov.in), CERT-In (cert-in.org.in), PIB (pib.gov.in), ISRO (isro.gov.in), Ministry of Defence, Recorded Future — RedEcho Report (recordedfuture.com), UNOOSA — Outer Space Treaty (unoosa.org), DGCA — Drone Regulations, IT Act 2000 (indiacode.nic.in)