Central Water and Power Research Station has been placed in protected zones with implementation of firewalls and IDS (Intrusion Detection System) and high availability solutions.

Before the launch of the Central Water and Power Research Station, simulated penetration tests have been conducted. Penetration testing has also been conducted x times after the launch of the Central Water and Power Research Station.

Central Water and Power Research Station has been audited for known application-level vulnerabilities before the launch, and all known vulnerabilities have been addressed.

Hardening of servers has been done as per the guidelines of the Cyber Security division before the launch of the Central Water and Power Research Station.

Access to web servers hosting the Central Water and Power Research Station is restricted both physically and through the network as far as possible.

Logs at x number of different locations are maintained for authorized physical access to Central Water and Power Research Station servers.

Web servers hosting the Central Water and Power Research Station are configured behind IDS, IPS (Intrusion Prevention System), and with system firewalls on them.

All development work is done in a separate development environment and is well-tested on the staging server before updating it on the production server.

After testing properly on the staging server, the applications are uploaded to the production server using SSH and VPN through a single point.

The content contributed by/from remote locations is duly authenticated and is not published on the production server directly. Any content contributed has to go through the moderation process before final publishing to the production server.

All contents of the web pages are checked for intentional or unintentional malicious content before final upload to web server pages.

Audit and log of all activities involving the operating system, access to the system, and access to applications are maintained and archived. All rejected accesses and services are logged and listed in exception reports for further scrutiny.

Help Desk staff at the IT Division monitor the Central Water and Power Research Station at weekly intervals to check the web pages to confirm that the web pages are up and running, that no unauthorized changes have been made, and that no unauthorized links have been established.

All newly released system software patches, bug fixes, and upgrades are expediently and regularly reviewed and installed on the web server.

On production web servers, Internet browsing, mail, and any other desktop applications are disabled. Only server administration-related tasks are performed.

Server passwords are changed at intervals of 3 months and are shared by 2 persons, Yashwant and S. Annadurai.

Shri Vikram Singh, DS(IT), and Shri Navin Kumar Karn, Senior Director (NIC), have been designated as Administrators for the Central Water and Power Research Station and shall be responsible for implementing this policy for each of the web servers. The administrator shall also coordinate with the Audit Team for required auditing of the server(s).

Central Water and Power Research Station has been re-audited for application-level vulnerabilities after major modifications in application development [Not applicable at first launch].

Central Water and Power Research Station has been audited before launch and has complied with all the points mentioned in the policies document of the Cyber Security Group mentioned above.

Central Water and Power Research Station has also been subjected to an automated risk assessment performed through vulnerability identification software before and after the launch, and all known vulnerabilities have been addressed.