1 Act Overview & Timeline

The Cybersecurity Act 2018 established Singapore's framework for protecting Critical Information Infrastructure (CII). The Cybersecurity (Amendment) Act 2024 substantially expanded this framework, with key provisions coming into force on 31 October 2025.

$100K
Max Fine
2hr
Reporting Window
4
New Entity Types

Legislative Timeline

DateMilestone
2018Original Cybersecurity Act enacted
May 2024Cybersecurity (Amendment) Act passed in Parliament
7 May 2024Amendment Act received Presidential assent
31 Oct 2025Key provisions commence (Part 3A, 3B, STCC)
PendingPart 3C (Entities of Special Cybersecurity Interest) — not yet in force
PendingPart 3D (Major Foundational Digital Infrastructure) — not yet in force
KEY CONTEXT

The original Act only regulated CII (computers essential to vital services). The 2024 amendment significantly broadens scope — adding provider-owned CIIs, overseas CIIs, STCCs, and future categories. This is the most significant expansion of Singapore's cybersecurity regulatory perimeter since 2018.

2 Who's Affected — New Categories

1. Provider-Owned CIIs (Part 3A)

Third-party owned computers/systems used by CII owners to deliver essential services can now be designated as CIIs in their own right. This means cloud providers, managed service providers, and outsourced IT operators supporting essential services are now directly regulated.

2. Overseas CIIs (Section 7)

Systems located entirely outside Singapore can now be designated as provider-owned CIIs if:

This gives Singapore extraterritorial regulatory reach — a significant development for multinational organizations and offshore cloud providers.

3. Systems of Temporary Cybersecurity Concern (STCC) — Section 17

A new category for systems facing heightened risks due to temporary events:

4. Not Yet in Force

⚠️ COMING SOON
  • Part 3C — Entities of Special Cybersecurity Interest (ESCIs): Will extend obligations to entities that, while not operating CIIs, are significant to national cybersecurity. Commencement date pending.
  • Part 3D — Major Foundational Digital Infrastructure (FDI): Will regulate providers of foundational digital services (cloud, data centers, CDNs, etc.). This is the most impactful pending change for tech companies. Commencement date pending.
3 Key Obligations & Requirements

Expanded Incident Reporting

CII owners must now report incidents involving:

⏰ REPORTING DEADLINE

CII owners must notify CSA within 2 hours of becoming aware of a reportable incident. This is one of the tightest reporting windows globally (EU NIS2: 24h early warning; Singapore: 2 hours).

Third-Party Vendor Obligations

Essential service providers must now:

STCC-Specific Duties

When a system is designated as an STCC, the owner must:

Procedural Safeguards

The designation notice must:

4 Penalties & Enforcement
OffenceMax FineMax ImprisonmentDaily Fine
Non-compliance with Section 3B (info request)SGD 100,0002 yearsYes (continuing breach)
STCC: Fail to report incidentsSGD 100,0002 years
STCC: Fail to implement measuresSGD 100,0002 years
CII: Fail to report within 2 hoursAs per 2018 ActAs per 2018 ActYes
Use of system after cessation orderAs per 2018 ActAs per 2018 ActYes
⚠️ ENFORCEMENT REALITY

SGD 100,000 fines and criminal liability are significant for SMEs. But the real business risk is the Commissioner's power to order cessation of use of non-compliant systems. If your cloud provider is designated as a provider-owned CII and you can't demonstrate compliance, you could be forced to stop using them — which is operationally devastating.

5 Bundling with ISO 9001:2026 — The Play
🎯 THE BUSINESS CASE

"While we're updating your QMS for ISO 9001:2026, let us also assess whether your cybersecurity posture aligns with the new Cybersecurity Act amendments. One review, two compliance upgrades."

Why This Works

Overlapping Requirements

Cybersecurity Act RequirementISO 9001:2026 Equivalent
Risk assessment & managementClause 6.1 — Actions to address risks and opportunities
Documented policies & proceduresClause 7.5 — Documented information
Internal audit / Commissioner-approved auditClause 9.2 — Internal audit
Management review / governanceClause 9.3 — Management review
Incident reporting & responseClause 8.7 — Control of nonconforming outputs
Vendor/supplier managementClause 8.4 — Control of externally provided processes
Competence & awarenessClause 7.2/7.3 — Competence & awareness
Continuous improvementClause 10 — Improvement

What You Can Offer (Without Being a Cybersecurity Expert)

⚠️ BOUNDARY

You are not a cybersecurity technical assessor. Don't offer penetration testing, vulnerability assessments, or technical security architecture. Your value is in the governance, documentation, and management system integration — not the technical controls. Partner with a cybersecurity firm for the technical layer.

6 Impact on Singapore SMEs

Who Needs to Act Now

Who Should Prepare (But Not Panic)

Common Gaps for SMEs

💡 OPPORTUNITY ANGLE

Most Singapore SMEs in CII-adjacent sectors have zero readiness for these requirements. They don't have incident response plans, vendor risk frameworks, or cybersecurity documentation. This is where your QMS expertise intersects perfectly — because these are all management system problems, not purely technical ones. Build the framework, partner for the technical bits.

7 Sources

Report prepared: April 18, 2026. Information current as of research date. Parts 3C and 3D of the Amendment Act are not yet in force — monitor CSA announcements for commencement dates.