Skip to Content
  • Craft’s easy-to-use platform simplifies supply chain resilience and speeds time to value with new enhanced capabilities

    Learn More
Craft Logo
  • Platform
  • Solutions
    • Supplier Intelligence

      Conduct checks in hours instead of weeks with comprehensive supplier intelligence you can trust.

    • Supplier Risk Management

      Stay alerted to changes in supplier health to understand threats and avoid disruption.

    • Supply Chain Risk Management

      Gain insights into supplier dependencies and risks to predict and prevent disruption.

  • Risk and Compliance
    • Risk and Compliance Solutions

    • Compliance Hub

      Navigate complex regulatory landscapes

    • Cybersecurity

      Defend against cyber threats.

    • ESG

      Empower sustainable practices with ESG insights.

    • Financial

      Identify and navigate financial risks.

    • Geopolitical

      Navigate geopolitical risks with confidence.

  • Industries
    • Aerospace and Defense

      Simplify risk management in this complex and crucial sector.

    • Federal Government

      Enhance risk visibility and mitigation in federal government.

    • Financial Services

      Navigate challenges within the financial services sector.

    • Manufacturing

      Optimize risk management in manufacturing.

  • Resource Center
    • Resources

      Learn more about Craft, our vision, and what we’re doing to strengthen global supply chain resilience.

    • Blog

      Explore Craft thought leadership from our technology and supply chain experts.

    • Events

      Get the latest industry news, topics, and trends from Craft experts.

  • Company
    • About Us

      Learn about our mission, world-class technology, and esteemed investors.

    • Culture & Careers

      Learn about our culture and check out our current job postings.

    • Newsroom

      Stay up to date on our latest news and announcements.

    • Contact Us

      Learn more about the Craft platform and how we can mitigate risk to your supply chain.

  • Request a Demo
CybersecurityQuick GuidesRegulatory & Compliance

Understanding the Singapore Cybersecurity Act

Share


What Is the Singapore Cybersecurity Act?

The Singapore Cybersecurity Act was enacted in 2018 as a key regulatory framework to enhance the cybersecurity of critical information infrastructure (CII) in Singapore. The Act empowers the Cyber Security Agency of Singapore (CSA) to oversee and enforce cybersecurity measures across various sectors, ensuring the protection of national interests and infrastructure from cyber threats.

Why Was the Singapore Cybersecurity Act Created?

As cyber threats evolve, robust cybersecurity becomes increasingly critical. The Cybersecurity Act addresses these growing risks and challenges. Its primary objectives include:

  • Protecting Critical Infrastructure: Safeguard the CII that is vital for the functioning of essential services.
  • Enhancing National Security: Strengthen the overall cybersecurity framework to protect against cyber attacks and incidents.
  • Promoting Cyber Hygiene: Ensure that organizations adhere to best practices in cybersecurity to prevent breaches and mitigate risks.

Who has to comply with the Singapore Cybersecurity Act?

The Singapore Cybersecurity Act applies to:

  • Operators of Critical Information Infrastructure (CII): Entities that manage or operate infrastructure deemed critical to national security, economy, or public safety. This includes sectors such as energy, water, banking, and transport. The CSA provides guidelines for determining which sectors and infrastructure qualify as critical information infrastructure.
  • Public Sector Organizations: Government agencies and public sector organizations that are responsible for CII.
  • Cybersecurity Service Providers: Organizations providing cybersecurity services or products to CII operators.

What do you comply with the Singapore Cybersecurity Act?

Compliance with the Cybersecurity Act involves:

  • Designation of CII: Identify and register critical information infrastructure within your organization.
  • Risk Management Measures: Implement and maintain robust cybersecurity measures to protect CII from threats and vulnerabilities. A risk management plan should include risk assessment, security controls, incident response procedures, and regular audits.
  • Incident Reporting: Report significant cybersecurity incidents to the CSA promptly, including breaches, attacks, or other security-related events.
  • Security Reviews and Audits: Conduct regular security reviews and audits to ensure the effectiveness of your cybersecurity measures and compliance with the Act.
  • Coordination with CSA: Cooperate with the CSA in investigations and assessments related to cybersecurity incidents.

How will the Singapore Cybersecurity Act affect businesses?

Here are the key penalties associated with non-compliance:

  • Non-compliance with a notice or direction from the Commissioner regarding critical information infrastructure
    Fine up to SGD 100,000 and/or imprisonment up to 2 years, with an additional fine of SGD 5,000 per day for ongoing offenses.
  • Failure to notify changes in ownership of critical information infrastructure within 7 days
    Fine up to SGD 100,000 and/or imprisonment up to 2 years.
  • Failure to report a prescribed cybersecurity incident to the Commissioner
    Fine up to SGD 100,000 and/or imprisonment up to 2 years.
  • Failing to conduct required cybersecurity audits (every 2 years) and risk assessments (annually), or obstructing these processes
    Fine up to SGD 100,000 and/or imprisonment up to 2 years, with an additional fine of SGD 5,000 per day for ongoing offenses.
  • Failure to submit the audit and assessment report to the Commissioner within 30 days
    Fine up to SGD 25,000 and/or imprisonment up to 12 months, with an additional fine of SGD 2,500 per day for ongoing offenses.
  • Failure to comply with a direction to conduct cybersecurity readiness exercises
    Fine up to SGD 100,000.

Action Plan for Complying with the Singapore Cybersecurity Act

  1. Assess CII Status: Identify and register any critical information infrastructure within your organization.
  2. Develop a Cybersecurity Strategy: Create a comprehensive cybersecurity strategy that includes risk management, security controls, and incident response plans.
  3. Implement Security Measures: Apply necessary security measures and protocols to protect CII.
  4. Train Employees: Provide training for staff on cybersecurity best practices and compliance requirements.
  5. Report Incidents: Establish procedures for timely reporting of cybersecurity incidents to the CSA.
  6. Conduct Audits: Regularly review and audit your cybersecurity measures to ensure ongoing compliance.

How can Craft help?

Craft’s supplier risk management solutions support organizations in meeting the requirements of the Singapore Cybersecurity Act by offering:

  • Identify risky suppliers with in-depth company profiles and easily scalable due diligence
  • Continuously monitor your supplier network for changes and potential violations.
  • Document your efforts for proof of compliance
  • Collaborate and share information across teams for faster risk mitigation.

Learn More

Related Regulations

  • General Data Protection Regulation (GDPR)
  • Health Insurance Portability and Accountability Act (HIPAA)
  • Payment Card Industry Data Security Standard (PCI DSS)
  • Federal Information Security Modernization Act (FISMA)
  • ISO/IEC 27001

By understanding and adhering to the Singapore Cybersecurity Act, procurement and supply chain professionals can ensure the security of critical infrastructure, manage risks effectively, and maintain compliance with national cybersecurity standards.

For an overview of regulations affecting the global supply chain, visit our compliance hub.

Share

In this article

  • What Is the Singapore Cybersecurity Act?

  • Why Was the Singapore Cybersecurity Act Created?

  • Who has to comply with the Singapore Cybersecurity Act?

  • What do you comply with the Singapore Cybersecurity Act?

  • How will the Singapore Cybersecurity Act affect businesses?

  • Action Plan for Complying with the Singapore Cybersecurity Act

  • How can Craft help?

  • Related Regulations

  • Risk and Compliance Solutions

    Get the visibility and insights you need to identify and mitigate risk and build a more resilient supply chain.

    Learn More

Related Posts

View All
  • Procurement & Supply Chain

    The Risk Savvy Report: April 22 – May 12, 2025

    Read Now
  • Procurement & Supply Chain

    The Risk Savvy Report: April 1 – 21, 2025

    Read Now
  • Procurement & Supply Chain

    The Risk Savvy Report: March 18 – 31, 2025

    Read Now

Ready to learn more?

Schedule a risk assessment session with our team to learn more about Craft.

Get Risk Assessment
Craft.co

Craft provides organizations with the 360-degree visibility, timely insights, and agility needed to mitigate risk and build stronger supplier networks and more resilient supply chains.


Sign up for our newsletter

  • Platform
  • Solutions
    • Supplier Intelligence
    • Supplier Risk Management
    • Supply Chain Risk Management
  • Risk and Compliance
    • Risk and Compliance Solutions
    • Compliance Hub
    • Cybersecurity
    • ESG
    • Financial
    • Geopolitical
  • Industries
    • Aerospace and Defense
    • Federal Government
    • Financial Services
    • Manufacturing
  • Resource Center
    • Resources
    • Blog
    • Events
  • Company
    • About Us
    • Culture & Careers
    • Newsroom
    • Contact Us
  • Request a Demo
  • Facebook
  • LinkedIn
  • Twitter
  • Terms of Service
  • Privacy Policy
  • Security

© 2025 Craft.co. All rights reserved.

We value your privacy
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits.
By clicking “Accept”, you consent to the use of ALL the cookies.
Privacy Policy
In case of sale of your personal information, you may opt out by using the link Do not sell my personal information.
CustomizeAccept
Consent Preferences

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
Reject All Save My Preferences Accept All