---Advertisement---

What is India’s ‘Zero Trust Model’ To Avert Cyber Attacks During G20 Summit?

India is leaving no stone unturned in fortifying its cybersecurity for the G20 Summit. Stay informed about the cyber threat landscape in Delhi.

Edited By : Mayank Kasyap | Updated: Sep 7, 2023 07:36 IST
Share :
G20 Cyber Security
G20 Cyber Security

New Delhi: As India gears up to host the G20 Summit in Delhi, the country has intensified its cybersecurity measures to counter cyber threats originating from foreign sources. The level of alertness has been heightened around critical infrastructure, including government websites, due to concerns over cyber warfare, especially from China-Pakistan cyber warriors.

Securing critical infrastructure

Indian authorities are working diligently to safeguard against cyber threats. The Computer Emergency Response Team (CERT) is overseeing cybersecurity for the summit, while the Delhi Police’s cybersecurity wing is responsible for securing the rest of the city.

Enhanced alert at key locations

Security measures have been elevated at 28 hotels designated for VVIPs and delegates during the event. Cyber squads have been deployed at venues like ITC Maurya, where US President Joe Biden will stay, and at other prominent hotels such as The Lalit, Shangri-La, Claridges, Eros Hotel, Radisson Blue, Taj Hotel, and more.

The “Zero Trust” model

In preparation for the G20 Summit, all participating hotels are operating under the “zero trust” principle, which involves continuous monitoring of all IT assets. The Home Ministry’s cyber unit has emphasized the importance of this model, emphasizing strong authentication and authorization for every device and individual accessing private networks. This approach shifts from the traditional “trust but verify” mindset to “never trust, always verify.”

ALSO READ: G20 Summit: DMRC Restricts Passengers At Supreme Court Metro Station; Check Here

Raising the bar on cybersecurity

Under the “zero trust” model, no user or device is presumed trustworthy for accessing resources until their identity and authorization are verified. This stringent protocol applies not only to individuals within the private network but also to external entities seeking access.

Learnings from past G20 events

The decision to bolster cybersecurity stems from past incidents during G20 Summits. In previous years, cyberattacks and data breaches have occurred during these high-profile events, making robust cybersecurity measures crucial.

Misinformation challenge

In addition to the cyber threat, Indian authorities are combatting a surge in misinformation campaigns, primarily targeting Jammu and Kashmir. Social media platforms have become conduits for spreading false information, prompting efforts to identify and block fake accounts.

As India prepares to host the G20 Summit, the nation remains vigilant against cyber threats, ensuring a secure and resilient environment for this globally significant event.

HISTORY

Written By

Mayank Kasyap

First published on: Sep 07, 2023 07:28 AM IST

Get Breaking News First and Latest Updates from India and around the world on News24. Follow News24 on Facebook, Twitter.

Related Story