14 DISC
Indigenous Cyber Deception Framework
Cyber security threats continue to evolve and traditional defence mechanisms alone are insufficient to protect sensitive information. The proposal outlines the development and implementation of and indigenous Cyber Deception Framework leveraging honeypots and various other methodologies. This framework aims to enhance IAF’s ability to detect, analyse and respond to cyber threats proactively.
1. Technical Requirements.
1.1 Customised honeypot deployment.
1.2 Integration with existing SIEM and threat intelligence platforms.
1.3 AI/ML based algorithms for anomaly deception, deployment and expansion.
1.4 Automated incident response mechanisms.
2. Compliance.
2.1 Ensure compliance with data protection regulations.
2.2 Regular audits, updates and tech support to maintain compliance
3. Adequate awareness/training on the framework