The Singapore Cybersecurity Strategy 2021 sets a proactive national approach to an evolving cyberthreat landscape, recognising the emergence of disruptive technologies like edge computing and quantum technologies, alongside increasingly sophisticated threat actors exploiting pervasive connectivity.
The 2021 strategy aims to proactively defend Singapore’s cyberspace, simplify cybersecurity for users, advance international cybersecurity norms, and emphasises the importance of a strong cybersecurity workforce and ecosystem as key enablers of Singapore’s cybersecurity. Key components of the 2021 strategy include the following.
In terms of cybersecurity regulation, the Cybersecurity Act 2018 (see further details at 1.2 Cybersecurity Laws) was updated in 2024 to keep pace with changes in technology, business models and the cyberthreat landscape. In so doing, the amendments will allow the Cyber Security Agency (CSA) to extend their regulatory oversight to important systems and entities not previously covered under the Cybersecurity Act 2018, adopting a risk-based approach to regulating entities for cybersecurity. In particular, the amendments extend the Act’s scope to regulate additional systems where compromise could be detrimental to Singapore’s national interests to better account for new technology and business models.
Cybersecurity and cyber-risk management in Singapore is broadly regulated by a set of overlapping pieces of legislation which address the issues of national cybersecurity, cybercrimes and personal data protection. In addition, certain sectoral regulators are empowered to directly address cybersecurity issues in their respective sectors through regulatory codes, guidelines, notices, and instruments.
Cybersecurity Act 2018 (Cybersecurity Act)
The Cybersecurity Act is the dedicated cybersecurity law which sets out the overarching framework for the oversight of national cybersecurity issues in Singapore, including the designation of computer systems (physical and virtual) as Critical Information Infrastructure (CII) in essential sectors and co-ordinating the national response to cybersecurity incidents, amongst other things. Under the Cybersecurity Act, the Commissioner of Cybersecurity is empowered to issue binding codes of practice, standards of performance and directions to regulated entities.
The Cybersecurity Act requires owners of CII to notify the Commissioner of Cybersecurity in the event of the occurrence of certain cybersecurity incidents related to their CII. A cybersecurity incident refers to an act or activity carried out without lawful authority on or through a computer or computer system that jeopardises or adversely affects its cybersecurity or the cybersecurity of another computer or computer system.
Since 2022, the Cybersecurity Act provides for the licensing of certain cybersecurity service providers (CSPs). At present, this includes CSPs that provide penetration-testing and managed security operations centre monitoring services.
To keep up with the evolving cybersecurity threats and nature of businesses, the Cybersecurity (Amendment) Bill was passed in Singapore Parliament on 7 May 2024 to expand the CSA’s oversight to new entities beyond CII owners. The four new categories of entities are:
Importantly, the amendments have extended the definition of CIIs to include any computer or computer system, whether they are physical or virtual, located wholly or partly in Singapore which may be designated as CII. Such designation may arise if the Commissioner is satisfied that the computer or computer systems are necessary for the continuous delivery of an essential service, and the loss or compromise of such systems will have a debilitating effect on the availability of the essential service in Singapore. On 31 October 2025, several key provisions of the Cybersecurity (Amendment) Act 2024 came into force. Please refer to 2.2 Critical Infrastructure Cybersecurity Requirements for more details.
Computer Misuse Act 1993 (CMA)
The CMA sets out the enforcement and penalty framework against perpetrators of cyber-related offences, such as the unauthorised access to and modification of computer material, unauthorised use or interception of a computer service, unauthorised obstruction of use of a computer and unauthorised disclosure of a password or access code. The CMA empowers the police and other government authorities to investigate and prosecute perpetrators of cybercrimes. Where an offence under the CMA is committed by any person outside Singapore, the person may be dealt with as if the offence had been committed within Singapore under specific scenarios.
Personal Data Protection Act 2012 (PDPA)
The PDPA applies to all private sector organisations that collect, use, disclose or otherwise process personal data (both electronic and non-electronic data). Personal data is defined as data about an individual who can be identified from that data, or from that data and other information to which the organisation has or is likely to have access.
As part of complying with the PDPA, organisations are required to make reasonable security arrangements to protect personal data in their possession or under their control to prevent (i) unauthorised access, collection, use, disclosure, copying, modification, disposal, or similar risks; or (ii) the loss of any storage device or medium on which personal data is stored. Under the PDPA, the Personal Data Protection Commission (PDPC) is empowered to issue advisory guidelines which indicate the manner in which the PDPC will interpret the provisions of the PDPA.
The PDPA also includes notification requirements in the event of a data breach (see 6.1 Cybersecurity and Data Protection).
The Do Not Call (DNC) provisions under the PDPA regulate the sending of certain marketing messages to Singapore telephone numbers. These provisions are intended to give individuals more control over the type of marketing messages they may receive by allowing individuals to register their telephone numbers with the DNC Registry and imposing obligations on organisations in respect of sending marketing messages. This thereby reduces the number of unsolicited messages received by individuals and the risk of being exposed to cybersecurity attacks.
Spam Control Act 2007 (SCA)
The SCA provides for the control of spam and for matters connected with spam in Singapore. The SCA generally regulates the sending of electronic messages with a Singapore link and contains specific obligations relating to senders of unsolicited commercial electronic messages in bulk. The SCA also prohibits the sending of an electronic message to an electronic address obtained through the use of a dictionary attack or address-harvesting software. The SCA is a civil penalty regime where non-compliance with these requirements may result in civil actions against the spammer.
Public Sector (Governance) Act 2018 (PSGA)
Aside from the confidentiality and secrecy provisions found across various legislation, data protection and management in the public sector is also governed under the PSGA. The PSGA imposes criminal penalties on public officers who recklessly or intentionally disclose data without authorisation, misuse data for a gain or re-identify anonymised data. Specific data security policies are further set out in the Government Instruction Manual on IT Management.
Other Sectoral Frameworks
Two notable examples are in the telecommunications and banking and finance sectors.
First, the telecoms and media regulator, the Info-communications Media Development Authority (IMDA), has published a Telecommunications Cybersecurity Code of Practice to enhance cybersecurity preparedness of designated telecommunication licensees such as internet service providers in Singapore. This Code of Practice, which was formulated in line with international standards and best practices including the ISO/IEC 27011 and IETF Best Current Practices, sets out requirements on security incident management and other controls to help licensees prevent, protect, detect and respond to cybersecurity threats.
Second, the Singapore financial regulatory authority, the Monetary Authority of Singapore (MAS), has issued its Technology Risk Management (TRM) Guidelines (the “TRM Guidelines”), which set out risk management principles and best practices to guide financial institutions (FIs) in establishing sound and robust technology risk governance and oversight, as well as in maintaining IT and cyber-resilience. In conjunction with this, the MAS has also issued legally binding Notices on TRM and Cyber Hygiene which give effect to some of the requirements in the TRM Guidelines. Please also see 3.1 Scope of Financial Sector Operation Resilience Regulation for further details.
Cyber Security Agency of Singapore
The regulatory authority responsible for the administration and enforcement of the Cybersecurity Act is the CSA. The CSA is part of the Prime Minister’s Office and is managed by the Ministry of Digital Development and Information (MDDI), and led by the Commissioner of Cybersecurity. The Minister for Digital Development and Information (as the Minister-in-charge of Smart Nation and Cybersecurity) may appoint Assistant Commissioners from sectoral regulators who understand the unique context and complexity of their respective sectors to advise and assist the Commissioner on the co-ordination of cybersecurity efforts.
Under the Cybersecurity Act, the Commissioner’s functions and duties include, but are not limited to:
In general, the Cybersecurity Act applies to any computer or computer system, whether physical or virtual, and located wholly or partly in Singapore which may be designated as CII. The Commissioner may confer such a designation when satisfied that the computer or computer systems are necessary for the continuous delivery of an essential service, and the loss or compromise of such systems will have a debilitating effect on the availability of the essential service in Singapore.
Where an essential service provider relies on third-party-owned computers or computer systems that are necessary for delivering the essential service, the Commissioner may designate the provider as responsible for the cybersecurity of that third-party-owned CII, and the provider must ensure comparable cybersecurity standards through legally binding commitments.
If the risk of a cyber-attack is high and the loss or compromise of the computer or computer system will have a serious detrimental effect on the national security, defence, foreign relations, economy, public health, public safety or public order of Singapore, the Commissioner may designate the computer or computer system as a STCC, and subject the STCC to obligations similar to CII.
The Cybersecurity Services Regulation Office (CSRO) was set up within the CSA in 2022 to administer the licensing framework of CSPs under the Cybersecurity Act, responding to the industry’s queries and feedback, and sharing of resources on licensable cybersecurity services.
Currently, there are 11 sectors in which there may be essential services (ie, services which are essential to national security, defence, foreign relations, the economy, public health, public safety or the public order of Singapore):
The Commissioner has broad powers to investigate and prevent cybersecurity threats or incidents, including making requests for information to be provided or, in serious cases, direct remedial measures to be taken by any person (including those who are not owners of CII).
The CSA operates the Singapore Cyber Emergency Response Team (SingCERT), which is Singapore’s national cyber-incident response team for its constituents. SingCERT facilitates the detection, resolution and prevention of cybersecurity-related incidents and provides a public channel for incident reporting.
Personal Data Protection Commission
The PDPC was established in January 2013 as Singapore’s data protection authority. It is under the purview of the MDDI and tasked with enforcing and administering the PDPA. The PDPC is led by the Commissioner for Personal Data Protection. Please refer to 1.2 Cybersecurity Laws.
The PDPA confers powers on the PDPC to enforce the PDPA, which include powers relating to:
Please refer to 1.2 Cybersecurity Laws and 1.3 Cybersecurity Regulators.
Generally, owners of CII are required to comply with a set of general duties, such as:
The Cybersecurity Code of Practice for Critical Information Infrastructure (the “CII Cybersecurity Code”) requires owners of CII to put in place security baseline configuration standards for all operating systems, applications and network devices of a piece of CII that is commensurate with the cybersecurity risk profile of that CII. The security baseline configuration standards address the following security principles:
Following the commencement of the Cybersecurity (Amendment) Act, the Cybersecurity Act has been updated to cover four additional classes of entities.
The amendments to the Cybersecurity Act impose obligations on these new entities that are similar to those already in force relating to CIIs, such as:
Under the Cybersecurity (Provider-Owned Critical Information Infrastructure) Regulations 2018 and Cybersecurity (Systems of Temporary Cybersecurity Concern) Regulations 2025, cybersecurity incidents that must be reported to the Commissioner include:
Since 31 October 2025, incident reporting for owners of CII was expanded to include the following circumstances, where the CII owner:
The competent supervisory authority for the CII incident notification regime is the Commissioner of Cybersecurity within the CSA. The CII owner must submit an initial report (with the prescribed details) of the cybersecurity incident or occurrence of one of the above-mentioned circumstances within two hours after the occurrence of the cybersecurity incident or circumstance. This notification must be made by calling the telephone number specified by the Commissioner.
Where the owner of the CII is unable to submit the prescribed details via calling the specified telephone number within a reasonable time, the owner may provide the details by text message to the specified telephone number or in writing via the form on CSA’s website.
Supplementary details of the cybersecurity incident/circumstance must be provided in writing in the form set out on CSA’s website within 72 hours after becoming aware of such occurrence. This includes any updates and supplementary details following from the initial notification, the cause of the cybersecurity incident, the impact of the cybersecurity incident and what remedial measures have been taken.
A final incident report containing all the details in the initial notification and supplementary details (and any updates thereto) must be submitted via the form on CSA’s website within 30 days after the submission of the supplementary details.
Sections 16I(1) and 17E(1) of the Cybersecurity Act also impose similar reporting obligations on designated providers responsible for third-party-owned CII and owners of STCCs.
When the new Parts 3C and 3D under the Cybersecurity (Amendment) Act are brought into force, there will be reporting obligations imposed on ESCIs and major FDI service providers as well.
A single cyber-incident may trigger parallel reporting obligations under other regulatory regimes, depending on the nature of the affected information and the regulated sector. If the incident involves a notifiable personal data breach, the organisation may also have to notify the PDPC within the statutory timeline and, where required, notify affected individuals.
Under Section 5 of the Cybersecurity Act, the Commissioner of Cybersecurity has a duty to monitor cybersecurity threats in or outside of Singapore, advise the government or any other public authority on the national needs and policies in respect of cybersecurity matters generally, and respond to cybersecurity incidents that threaten the national security, defence, economy, foreign relations, public health, public order or public safety, or any essential services of Singapore, whether such cybersecurity incidents occur in or outside Singapore, among other duties.
Additionally, SingCERT routinely issues cybersecurity and cyber-hygiene advisories and alerts. SingCERT also works with the sectoral regulators to issue relevant alerts and advisories to industry players and to inform companies and affected individuals on cybersecurity threats and incidents.
The CSA has established programmes to raise baseline cyber-resilience across the economy and institutionalise engagement with industry partners. The SG Cyber Safe Programme provides structured support for organisations to strengthen cybersecurity, and the SG Cyber Safe Partnership Programme is intended to mobilise industry partners to develop training content, products, services and outreach initiatives that encourage adoption of good cybersecurity practices.
Please refer to 1.2 Cybersecurity Laws for a summary of the sectoral cybersecurity laws applicable to the banking and finance sector.
In the banking and finance sector, the MAS has issued a set of legally binding Notices on TRM and Cyber Hygiene which apply to FIs (eg, banks, insurers, capital markets services licence holders, operators, and settlement institutions of designated payment systems). These Notices impose obligations on FIs to enhance information security and mitigate the growing risks of cyberthreats.
The TRM Notices include requirements to:
The Notices on Cyber Hygiene include requirements to:
The MAS has also published Guidelines on Outsourcing for banks and other FIs, which set out the MAS’s expectations of entities that have entered into an arrangement for ongoing outsourced services which are obtained or received by the bank/FI. The guidelines list measures which include requiring the relevant entities to conduct due diligence, maintain ongoing oversight, and implement contractual safeguards that preserve auditability and supervisory access.
Under the TRM Guidelines, MAS sets out principles and best practices to in relation to third-party service providers, which include:
Under the MAS Guidelines on Outsourcing, MAS expects banks/FIs to conduct a self-assessment of their existing outsourcing arrangements against the several risk management practices, including (non-exhaustive):
ICT service providers may fall under the upcoming category of designated providers of major FDI services under the Cybersecurity Act. “FDI services” are services that promote the availability, latency, throughput or security of digital services, and will be specified in the Third Schedule to the Cybersecurity Act once these provisions under the Cybersecurity (Amendment) Act come into force. This will include “cloud computing service” and “data centre facility service” (as defined under the Act).
Once these provisions under the Cybersecurity (Amendment) Act come into force, designated providers of major FDI services will be subject to obligations such as providing the Commissioner with information, reporting prescribed cybersecurity incidents, and complying with codes of practices and directions that may be issued or approved by the Commissioner.
The key obligations relating to governance and risk management can be derived from Part 3 and 4 of the TRM Guidelines relating to Technology Risk Governance and Oversight. The best practices that FIs should aim to comply with include (non-exhaustive):
The key obligations relating to digital operation resilience generally in the financial sector can be derived from Part 8 of the TRM Guidelines relating to IT resilience. The best practices that FIs should aim to comply with include (non-exhaustive):
FIs should establish cyber-incident response and management plans to swiftly isolate and neutralise cyber threats and to securely resume affected services. The plan should describe communication, co-ordination and response procedures to address plausible cyber threat scenarios. Each FI should seek to understand their exposure to technology risks and place a robust risk management framework to ensure cyber-resilience.
FIs may also be a designated entity under the Cybersecurity Act. For more information on the designation of entities and their obligations under the Cybersecurity Act, please refer to 1.2 Cybersecurity Laws, 1.3 Cybersecurity Regulators and 2.2 Critical Infrastructure Cybersecurity Requirements.
There are no specific obligations relating to operation resilience in relation to critical ICT service providers. However, critical ICT service providers in the financial sector can take guidance from Part 8 of the TRM Guidelines (please refer to 3.3 Key Operational Resilience Obligations for further details).
Generally, under Section 29(1) of the Financial Services and Markets Act, MAS has the power to issue directions or make regulations concerning any FI or class of FIs as the MAS considers necessary for:
An FI that fails to comply with a direction issued to it under Section 29(1) or contravenes any regulation mentioned in that subsection shall be guilty of an offence and shall be liable on conviction to a fine not exceeding SGD1 million and, in the case of a continuing offence, to a further fine of SGD100,000 for every day or part of a day during which the offence continues after conviction.
Under the Cybersecurity Act, the Commissioner has broad powers under Sections 19 and 20 to investigate and prevent cybersecurity incidents and “serious” cybersecurity incidents respectively. These include powers to require persons to attend interviews, require the production of relevant information, give directions to carry out remedial measures or cease activities, enter premises, access and inspect computer systems, among others.
It is an offence for any person to fail to co-operate with the CSA without reasonable excuse and such persons shall be liable on conviction to be punished in accordance with the fines, terms of imprisonment or both, as set out in the relevant statutory provisions.
Under the upcoming Section 18K(1) in Part 3D of the amended Cybersecurity Act, the Commissioner may require major FDI service providers to furnish information. If the major FDI service provider fails to, without reasonable excuse, furnish the required cybersecurity-related information within the specified period or continues providing the designated FDI service despite the non-compliance, they shall be guilty of an offence. They shall be liable for a fine not exceeding the greater of SGD200,000 or 10% of the annual turnover of the service provider’s business in Singapore.
The upcoming Section 18L(1) also empowers the Commissioner to issue written instructions to major FDI service providers which may relate to the action to be taken by the provider in relation to a cybersecurity threat, compliance with any prescribed technical standards relating to cybersecurity, among others. Any major FDI service provider who fails to comply with such a written direction and continues to provide FDI infrastructure service after the deadline for compliance will be liable on conviction to a fine not exceeding the greater of SGD200,000 or 10% of the annual turnover of the person’s business in Singapore.
Further, under the upcoming Section 18M (1), major FDI service providers must notify the Commissioner of the occurrence of a prescribed cybersecurity incident in respect of the major FDI, where the incident results in a disruption or degradation to the continuous delivery of the foundational digital infrastructure service or the major FDI service provider’s business operations in Singapore. Any major FDI service provider who, without reasonable excuse, fails to comply with this obligation shall be guilty of an offence and liable on conviction to a fine not exceeding the greater of SGD200,000 or 10% of the annual turnover of the person’s business in Singapore.
As the provisions relating to the obligations for major FDI service providers have not yet commenced, there are no enforcement decisions against major FDI service providers for the failure to comply with the Cybersecurity Act.
There are no specific obligations imposed by MAS in relation to financial institutions carrying out international data transfers. However, organisations transferring personal data overseas must comply with Section 26 of the PDPA. Under Section 26, organisations need to ensure that the personal data transferred overseas is accorded a standard of protection that is comparable to the protection under the PDPA.
Under the Personal Data Protection Regulations 2021 (the “PDP Regulations”), the transferring organisation must take appropriate steps to ascertain whether, and to ensure that, the recipient of the personal data is bound by legally enforceable obligations (as defined under the PDP Regulations) to provide to the transferred personal data a standard of protection that is at least comparable to the protection under the PDPA.
Alternatively, this requirement is deemed to have been met if:
As good practice, organisations are encouraged to rely on the above circumstances only if they are unable to rely on legally enforceable obligations or specified certifications.
Critical Information Infrastructure
Under the CII Cybersecurity Code, owners of CII are required to conduct regular penetration testing on their own CII to identify security vulnerabilities that could be exploited by a cyber threat actor.
Owners of CII are required to conduct a penetration test on the CII at least once:
Owners of CII must conduct penetration tests on relevant CII assets after implementing any major system changes to the CII.
It is the responsibility of CII owners to ensure that third-party penetration testing service providers and their penetration testers possess industry-recognised accreditations and certifications respectively, for example CREST or equivalent accreditations and certifications.
Owners of CII are required to establish a red teaming or purple teaming attack simulation plan, and conduct a red teaming or purple teaming attack simulation on its CII at least once every 24 months.
Cybersecurity Service Provider Licences
The Cybersecurity Services Regulation Office (CSRO) was set up to administer the licensing framework for CSPs under the Cybersecurity Act.
All providers of a managed security operations centre monitoring services and penetration testing services as defined in the Cybersecurity Act to the Singapore market must apply to the CSRO for a cybersecurity service provider’s licence.
IoT Devices
In 2020, the MDDI (then Ministry of Communication and Information) introduced the Cybersecurity Labelling Scheme (CLS). The CLS was, initially a voluntary scheme for Wi-Fi routers and smart home hubs, and was subsequently expanded to include all smart home devices.
The CLS provides four cybersecurity rating levels for registered IoT devices and other smart devices to help consumers easily assess the level of security offered and make informed choices in purchasing a device. At Level 1, the product meets basic security requirements, whilst at Level 4, the product has undergone structured penetration tests by approved third-party test labs.
In 2024, the CSA updated Singapore’s Operational Technology Cybersecurity Masterplan. It now includes operators of operational technologies that support physical control functions such as IoT and industrial IoT devices, as such devices have become new attack surfaces for threat actors to exploit. The key initiatives under the masterplan include:
The Singapore Cybersecurity Strategy 2021 emphasises enhancing response capabilities for the state, organisations and individuals rather than expanding legislation relating to cyber-resilience (please refer to 1.1 Cybersecurity Regulation Strategy for more details).
Apart from the Cybersecurity Act and the other legislation mentioned in 1.2 Cybersecurity Laws, the legislative status of cyber-resilience in Singapore remains relatively sparse compared to that of other jurisdictions. Instead, security-by-design outcomes for connected products are driven through product assurance and labelling schemes, as well as technical requirements in targeted areas. Notably, the CLS is intended to incentivise manufacturers to build in stronger cybersecurity provisions. Residential gateways are also subject to IMDA technical security specifications, with compliant routers qualifying for CLS recognition.
For cloud and digital infrastructure services, the amended Cybersecurity Act introduces a framework to regulate major FDI service providers. Foundational digital infrastructure services are currently specified to include cloud computing services and data centre facility services, with definitions that expressly contemplate services delivered from systems in Singapore or outside Singapore. In addition, the government has been studying a Digital Infrastructure Act to enhance resilience and security of key digital infrastructure and services, and the IMDA has issued advisory guidelines for cloud services and data centres as interim uplift measures.
Please refer to 1.2 Cybersecurity Laws, 2.2 Critical Infrastructure Security Requirements, 3.2 ICT Service Provider Contractual Requirements, 3.3 Key Operational Resilience Obligations, 3.4 Operational Resilience Enforcement and 4.1 Cyber-Resilience Legislation.
While there is no prescribed cybersecurity certification legislation in Singapore, the CSA offers, administers and supports the use of certification schemes to provide assurance to customers that the product has been objectively assessed from a cybersecurity standpoint.
The CSA Cybersecurity Certification Centre operates several schemes which cover ICT product security in general. For example, besides the CLS, the Singapore Common Criteria Scheme provides a cost-effective regime to evaluate and certify the security of IT products in Singapore against the Common Criteria (CC) standards (ie, ISO/IEC 15408 series).
The CSA also operates the National IT Evaluation Scheme. This scheme evaluates IT products for high security assurance by referencing international standards such as the CC.
The PDPC and the IMDA jointly developed the Data Protection Trustmark (DPTM) Certification to help organisations demonstrate compliance with the PDPA. The DPTM Certification also incorporates elements of international benchmarks and data protection best practices. Since 2025, the DPTM has been administered by the Singapore Accreditation Council.
General Requirements Under the PDPA
In the context of personal data protection, organisations are required to put in place data protection policies and practices to ensure and demonstrate compliance with their obligations under the PDPA. Specifically, these requirements include:
Protection Obligation
Under Section 24 of the PDPA, an organisation is required to make reasonable security arrangements to protect personal data in their possession or under their control.
Data Breach Notification
A “data breach” is defined in the PDPA to mean:
Where an organisation has reason to believe that a data breach affecting personal data in its possession or control has occurred, it must conduct an assessment of whether it is a “notifiable data breach” in a reasonable and expeditious manner.
A data breach is a “notifiable data breach” if the data breach (i) results in, or is likely to result in, significant harm to an affected individual; or (ii) is, or is likely to be, on a significant scale (ie, affecting at least 500 persons).
According to the Personal Data Protection (Notification of Data Breaches) Regulations 2021 (the “Data Breach Regulations”), a data breach is deemed to result in significant harm to an individual if it relates to the following:
Upon assessing that the data breach is a “notifiable data breach”, the organisation must notify the PDPC in the prescribed form no later than three calendar days after assessment.
The organisation must also notify each individual affected by the data breach, if the data breach results in, or is likely to result in significant harm to an affected individual, unless one of the following exceptions applies:
Where a data intermediary processing personal data on behalf of another organisation has reason to believe a data breach has occurred, it must, without undue delay, notify the primary organisation.
Computers or computer systems which support AI solutions may be designated as a CII (or as another designated entity) under the Cybersecurity Act if they are necessary for the continuous delivery of an essential service, and the loss or compromise of the computer or computer system will have a debilitating effect on the availability of the essential service in Singapore. Following the amendments to the Cybersecurity Act that took effect on 31 October 2025, such systems can be physical or virtual, and in certain cases, may be located outside Singapore where the statutory designation criteria are met. For further details, please refer to 1.2 Cybersecurity Laws, 1.3 Cybersecurity Regulators and 2.2 Critical Infrastructure Cybersecurity Requirements.
While there are currently no express cybersecurity obligations relating to AI in Singapore, several voluntary frameworks and guidelines have been published relating to the development and use of AI.
Amongst these, the Model AI Governance Framework for Generative AI sets out a systematic and balanced approach to address generative AI concerns while facilitating innovation. It recommends adapting the “security-by-design” concept. The framework also makes recommendations regarding incident reporting. After incidents happen, organisations need internal processes to ensure timely notification and remediation of the incident. Depending on the impact of the incident and how extensively AI was involved, organisations should consider notifying both the public and the government.
On 15 October 2024, the CSA published the Guidelines and Companion Guide on Securing AI Systems (the “Guidelines on Securing AI Systems”). The Guidelines on Securing AI Systems set clear expectations that AI systems should be secure by design and by default, and that security should be addressed holistically across the AI system lifecycle. The Guidelines on Securing AI Systems address potential security risks through the AI lifecycle and help to protect AI systems against traditional cybersecurity risks, such as supply chain attacks, as well as novel risks such as Adversarial Machine Learning. Key recommendations include taking a lifecycle approach to consider security risks, starting with a risk assessment.
Furthermore, in October 2025, the CSA launched a public consultation on Securing Agentic AI ‒ An Addendum to the Guidelines and Companion Guide on Securing AI Systems. This addendum is meant to be read together with the Guidelines on Securing AI Systems and advises system owners on securing their agentic AI systems. It also outlines how risks can be identified and assessed based on the capabilities of agentic AI systems, and provides practical controls to mitigate relevant risks across the development lifecycle.
The Engaging with Artificial Intelligence guide, which was published on 25 January 2024 by the Australian Signals Directorate’s Australian Cyber Security Centre in conjunction with the CSA and other international agencies, also provides organisations with guidance on how to use AI systems securely. The guide summarises some important threats related to AI systems and prompts organisations to consider the steps they can take to engage with AI while managing risk. The document provides cybersecurity mitigations to assist organisations that use self-hosted and/or third-party hosted AI systems.
A Model Governance Framework for Agentic AI was published by the IMDA on 22 January 2026. The framework provides a structured overview of the risks of agentic AI and emerging best practices in managing such risks. In particular, it highlights that agentic components are different from simple LLM-based applications and necessitate additional controls throughout the entire lifecycle. In particular, it recommends the following.
While there are no specific cybersecurity obligations pertaining to the healthcare sector, the healthcare sector has been gazetted as one of 11 sectors providing essential services. As such, designated owners of CII (and other designated entities under the Cybersecurity Act) within the healthcare sector are subject to the same requirements as laid out in 2.2 Critical Infrastructure Cybersecurity Requirements.
Where applicable, healthcare providers must also comply with the National Telemedicine Guidelines, which include data protection and security requirements. In so far as a medical device is used by an organisation to collect personal data (eg, device test results are uploaded onto a server owned by the organisation), the organisation must comply with the protection obligation under the PDPA (as described in 6.1 Cybersecurity and Data Protection).
The Cyber and Data Security Guidelines for Healthcare Providers (the “Healthcare Guidelines”) provide guidance on the cyber and data security measures to be put in place for the proper storage, access, use and sharing of health information to improve the security posture among healthcare providers. Healthcare providers can also refer to the Cyber and Data Security Guidebook for healthcare providers for explanations and references to resources from the CSA and the PDPC. While not mandatory, the requirements within the Healthcare Guidelines will eventually be imposed as regulatory requirements under the forthcoming Health Information Act.
In October 2024, the Cybersecurity Labelling Scheme for Medical Devices (CLSMD), jointly developed by the CSA, the Ministry of Health, the Health Sciences Authority and Synapxe, was launched. Under this voluntary scheme, medical devices are rated according to four levels of cybersecurity provisions. The label aims to improve security awareness by making the cybersecurity provisions of medical devices more transparent. The CLSMD applies to medical devices as described in the First Schedule of the Health Products Act 2007.
At the time of writing, Singapore’s parliament is also debating the Health Information Bill, which will establish a dedicated statutory framework for contributing to and accessing the National Electronic Health Record system, as well as for wider health information sharing and protection. Under the Health Information Bill, healthcare providers are required to report a confirmed cybersecurity incident or data breach to the Ministry of Health, with an initial report required within two hours and a detailed incident report required within 14 days. This framework also includes cybersecurity and data security requirements for healthcare providers and other persons who contribute to or access the National Electronic Health Record system.
10 Collyer Quay
10th Floor
Ocean Financial Centre
Singapore 049315
+65 6531 4110
+65 6535 4864
chongkin.lim@drewnapier.com www.drewnapier.com
Introduction
The rapid acceleration of AI adoption and deployment has elevated the cybersecurity risk to businesses to an all-time high. Cybersecurity risk is a core pillar of national security and the digital infrastructure. In today’s world, cybersecurity risks are no longer confined to data breaches or isolated system outages; they increasingly implicate supply chains, critical digital infrastructure, AI systems, and cross-border operations. As cyberthreats become more sophisticated, persistent, and geopolitically motivated, governments worldwide are strengthening regulatory frameworks and enforcement mechanisms to safeguard digital ecosystems. Businesses, particularly those operating in sensitive and critical sectors, also need to address this increasing risk to their business and meet the growing compliance requirements being imposed on them through new laws and regulations.
For Singapore, cybersecurity remains a strategic imperative (see here and here). As a global financial hub, data centre nexus, and emerging AI powerhouse, Singapore faces heightened exposure to cyber-risks. In 2025, it continued to refine its regulatory framework to address evolving threats, putting increasing pressure on organisations operating in Singapore to demonstrate cyber-resilience, operational continuity, and regulatory compliance.
Cybersecurity Threats and Trends
AI emerges as a major threat
The accelerated adoption and deployment of AI have become a force multiplier for cyber-attackers. Threat actors use AI to automate vulnerability discovery, generate realistic phishing content, create convincing audio and video using deepfakes, and optimise attack timing. These capabilities significantly reduce the cost and complexity of sophisticated attacks.
A study commissioned by Fortinet found that almost 56% of organisations in Singapore experienced AI-driven cyberthreats over the past year. Among these, 52% observed a twofold rise in the number of threats, while 42% saw a threefold increase (see here). These attacks are more difficult to detect and frequently take advantage of gaps in visibility, governance, and internal procedures.
The rise of AI-driven impersonation attacks poses particular risks for senior management, finance functions, and trusted intermediaries. Traditional security awareness training is increasingly insufficient to address these threats, necessitating advanced detection tools and behavioural safeguards.
Against this backdrop, the Monetary Authority of Singapore issued two information papers addressing the cyber-risks for financial institutions arising from generative AI (GenAI) and deepfakes (see here and here). The papers highlight various key points.
Threat actors are increasingly leveraging GenAI to create convincing phishing messages, forged documents, and synthetic identities through manipulated media, which can undermine staff-led customer due diligence and enhanced checks during onboarding and reviews. GenAI lowers the barrier for malware creation, including polymorphic malware that changes form to evade traditional detection, compounding cyber-intrusion risks alongside social engineering. Deployments of GenAI introduce risks of data leakage and model manipulation through employee misuse, vulnerable add-ons, software bugs, supply chain exposures, prompt injection, and jailbreak techniques.
Further, deepfakes enable impersonation, document falsification, and fraudulent transactions, and have defeated biometric onboarding and authentication in real incidents across multiple jurisdictions. Remote and cross-border channels are especially exposed, as synthetic media can bypass controls across distributed teams and systems, increasing the risk of evasion of anti-money laundering, countering the financing of terrorism, and countering proliferation financing frameworks and controls. Deepfakes also enable misinformation and disinformation that can harm reputation, reduce trust, and move markets. Organisations should therefore monitor for brand abuse and impersonation and respond quickly with verified communications.
Mitigation measures include robust document checks and image forensics, metadata analysis, liveness detection across video, image and voice, regular adversarial testing, and protections on devices to block injected media during live verification. High-risk processes can be strengthened with additional verification, multi-factor authentication, separation of duties, role-based access, and dual control to reduce the risk of single-point failure during a scam or impersonation attempt. Biometric data should be protected with strong encryption in transit, at rest, and in use, together with certificate pinning, perfect forward secrecy, and secure enclaves to reduce the impact of interception or compromise. Real-time detection should be deployed on endpoints and communications to flag manipulated media, integrate threat intelligence into monitoring, and include deepfake scenarios in incident response plans, with sector-wide information sharing to accelerate detection, takedown, and recovery.
Continued threat of cybercrime
Cybercrime has further matured into a highly organised, commercially driven ecosystem. Threat actors increasingly operate as co-ordinated groups, offering “cybercrime-as-a-service” models that lower barriers to entry and enable large-scale attacks (see here). These actors leverage automation, AI, and data analytics to identify vulnerabilities, select high-value targets, and scale operations efficiently.
Singapore continues to face a disproportionately high number of cybercrime attacks on its nationals, including both cyber-dependent crimes and cyber-enabled crimes (see here). The growing integration of digital payment systems, e-commerce platforms, and digital identity frameworks has expanded the attack surface for both cyber-dependent and cyber-enabled crimes. Losses are exacerbated not only by direct financial theft but also by downstream costs such as regulatory investigations, business interruption, reputational harm, and litigation exposure.
Singapore continues to experience one of the highest incidences of cybercrime loss globally, amounting to SGD456.4 million in the first half of 2025 (see here). Law enforcement stepped up their efforts to tackle this, including arresting cybercrime syndicates, taking action against money “mules” and working with other governments in Southeast Asia (see here, here and here).
A notable case to highlight relates to the UNC3886 cyber-espionage group, which has been responsible for several sophisticated attacks against critical information infrastructure (CII) in Singapore. In July 2025, Singapore officially attributed ongoing cyber-espionage and disruption of its CII to UNC3886, marking the first time the country publicly named an advanced persistent threat (APT) attacker (see here). The attack prompted Singapore’s Cyber Security Agency (CSA) to raise the National Cyber Threat Alert Level and introduce new mandatory reporting requirements for CII owners to immediately report suspected APT incidents (see here).
Industrial-scale phishing and social engineering
Phishing remained one of the most prevalent attack vectors in 2025, but its nature has evolved significantly. Generic phishing emails have given way to targeted attacks known as spear phishing (see here). Spear phishing exploits personal data, organisational structure, and contextual data. AI-generated content allows threat actors to produce convincing emails, messages, and even voice communications that are difficult to distinguish from legitimate correspondence. The result is a higher success rate for phishing attacks and a reduced window for detection and response.
In Singapore, the banking and financial services, government and e-commerce industries were the most spoofed in 2024. Around 6,100 phishing attempts were reported to the CSA in 2024, marking a 49% increase compared with 2023 (see here). Phishing scams recorded the highest number of reported cases among all scam types in the first half of 2025, with a 10.9% increase to 3,779 cases in the first half of 2025 (see here). The amount lost to phishing scam cases also increased significantly, rising by 134% to approximately SGD30.4 million in the first half of 2025, compared with around SGD13 million during the same period in 2024 (see here).
Evolution of ransomware into multi-dimensional extortion
Ransomware continues to pose a significant threat. Ransomware attacks increased by more than 20% in 2024 (see here). The CSA noted that ransomware threats are increasing in frequency and sophistication. The attack model has evolved beyond simple data encryption. Threat actors now routinely employ “double” or “triple” extortion tactics, living-off-the-land techniques, and the exploitation of zero-day or unpatched vulnerabilities. Some also utilise social engineering, compromised credentials, and supply chain attacks to gain covert access to target networks (see here).
An example of ransomware is LockBit, first identified in September 2019, and which has become increasingly prevalent and sophisticated. Its prevalence has led to the CSA, Personal Data Protection Commission and the Singapore Police Force (SPF) releasing a joint technical advisory providing information on the model and recommended mitigation measures (see here).
In Singapore, the manufacturing sector is the primary target of ransomware, accounting for 31.58% of reported incidents. Other affected industries include wholesale trade (12.87%) and real estate (11.11%), emphasising the ransomware threat’s reach into both industrial and service-oriented sectors (see here). The reputational and regulatory risks associated with data leakage increase pressure on victims to resolve incidents quickly. At the same time, law enforcement and regulators continue to discourage ransom payments, highlighting the tension between commercial realities and public policy objectives.
Cyber-insurance cover is low compared to Europe and USA
The cyber-insurance market is much smaller than expected, with many businesses reluctant to invest in plans and undergo the necessary review for the purpose of obtaining insurance. The Singapore business cyber-insurance market was valued at only USD56.72 million in 2025 and is projected to only grow to USD87.42 million by 2030 (see here). Insurers have responded to rising claims and systemic risks by tightening underwriting standards, narrowing coverage, and imposing stricter cybersecurity preconditions (see here and here). Policies now commonly require demonstrable cyberhygiene, incident response planning, and regular security testing (see here).
Legal and Regulatory Developments in Singapore
Issuance of implementation directives
In 2025, the government issued implementation directives to several tech titans to combat government impersonation scams, relying on provisions under Part 4 of the Online Criminal Harms Act 2023 (OCHA) applying to designated online services. Between June 2024 and June 2025, the SPF identified an estimated 2,000 advertisements and online profiles on Facebook linked to government impersonation scams. Under the issued implementation directive, Meta was required to adopt measures such as facial recognition to prevent such scams on Facebook (see here). Apple and Google were also directed to take certain steps to prevent spoofing of Singapore government agencies via their phone messaging platforms (see here). Pursuant to Section 51 of the OCHA, failure to comply with an implementation directive may result in fines of up to SGD1 million, as well as additional daily fines of up to SGD100,000. These directives issued to Meta, Apple and Google are the first to be made under the OCHA since the provisions empowering authorities to issue implementation directives came into force on 24 June 2024. The issuance of implementation directives to Apple and Google also indicates that their respective phone messaging platforms have been added to the initial list of designated online services, which includes Carousell, Facebook Marketplace, Facebook Advertisements and Facebook Pages (see here).
Cybersecurity (Amendment) Act 2024
On 31 October 2025, key provisions of the Cybersecurity (Amendment) Act 2024 came into force, significantly expanding the operational scope of the Cybersecurity Act 2018. The commencement introduced new regulatory regimes for third-party-owned CII, systems of temporary cybersecurity concern, and monitoring powers over licensed cybersecurity service providers. Provisions relating to entities of special cybersecurity interest and major foundational digital infrastructure service providers remain pending.
Under the new regime for third-party-owned CII, organisations relying on CII they do not own must secure upstream commitments from third-party providers, ensuring accountability “through the chain” for outsourced or third-party-hosted critical systems. The regime for systems of temporary cybersecurity concern provides targeted intervention during heightened threat periods.
Practically, the amendments require organisations to identify non-owned systems critical to essential services and prepare upstream agreements, implement mechanisms to detect and report prescribed cybersecurity incidents, and establish procedures to comply with commissioner directions and track evolving legal requirements.
Overall, the amendments deepen operational levers for the commissioner and broaden the scope of accountability across third-party infrastructure and high-risk systems.
The Digital Infrastructure Act
Singapore is preparing a Digital Infrastructure Act (DIA), intended to complement the Cybersecurity Act 2018 by regulating foundational digital infrastructure such as cloud service providers and data centres (see here). The purpose of the DIA is to improve resiliency and security across systems that underpin the digital economy. While full details and the timing of enactment are still evolving, the DIA represents an effort to integrate cybersecurity requirements with resilience and stability obligations for critical digital platforms.
In February 2025, the Infocomm Media Development Authority issued advisory guidelines for cloud services and data centres (see here, here and here). These guidelines set out recommended measures that cloud service providers and data centre operators in Singapore are encouraged to implement to strengthen the resilience and security of their services, reduce the likelihood of service disruptions, and limit potential impacts on the economy and society.
Proposed new online safety legislation
In October 2025, the Singapore parliament tabled the Online Safety (Relief and Accountability) Bill to establish a new online safety commission with authority to tackle harmful online content and behaviours, expanding the regulatory environment around digital harms that also intersect with cybersecurity concerns (see here and here).
Securing AI systems
As organisations deploy AI across operations, customer engagement, and decision-making, AI systems themselves have emerged as valuable attack targets. Risks include data poisoning, model manipulation, unauthorised access, and exploitation of AI outputs.
In 2024, the CSA published Singapore’s Guidelines on Securing Artificial Intelligence Systems to help organisations adopt AI in a secure manner (see here and here). The guidelines lay out the foundational security principles for system owners to secure the use of AI throughout its lifecycle, while the companion guide provides practical measures and controls that system owners may consider when observing the guidelines.
In 2025, the CSA released an addendum for public consultation to support system owners in securing agentic AI systems (see here). This was driven by the emergence of agentic AI, which is able to understand context, formulate plans, and autonomously take actions to achieve specified objectives, thereby introducing new risks with potentially greater impact due to its expanded capabilities and access to tools and data.
Regulators are increasingly focused on ensuring AI governance frameworks integrate cybersecurity by design rather than as an afterthought.
Looking Ahead: Key Predictions for 2026
Regulatory developments in cybergovernance
As Singapore strengthens its regulatory frameworks to address online harms and cyberthreats, new legal structures, such as online safety commissions, along with stricter regulatory expectations, will influence how companies manage risk and build in relevant safeguards in their platforms.
Boards and executives are expected to face heightened responsibility for cybersecurity governance failures, and compliance teams will need to integrate legal and ethical risk management into their strategies.
Quantum-ready security
Forrester’s Asia Pacific predictions highlight quantum security as a top priority for enterprises across the region. As cybercriminals increasingly adopt “harvest now, decrypt later” strategies, over 90% of Asia Pacific organisations are expected to invest in post-quantum technologies (see here). Government initiatives, including Singapore’s National Quantum-Safe Network Plus (see here), are set to accelerate quantum security investments.
In October 2025, the CSA released a quantum-safe handbook and a quantum readiness index (see here). The handbook offers guidance to organisations, particularly CII owners and government agencies, on how to prepare for the transition to quantum-safe technologies. The quantum readiness index enables system owners and security professionals to assess their organisation’s level of preparedness, identify and prioritise critical actions, and support informed engagement with senior management.
Cyber support for SMEs
Singapore plans a Cyber Resilience Centre for SMEs in 2026, offering diagnostics, advisory services, and incident support, acknowledging that smaller firms are frequent targets due to limited resources (see here and here). National efforts will expand to uplift baseline cyberhygiene and resilience, particularly for SMEs.
Conclusion
In 2025, Singapore’s cybersecurity landscape was characterised by increased complexity, heightened regulatory expectations, and rapidly evolving threats driven by AI and digital interconnectivity. What is becoming clearer, is that traditional perimeter-based defences are no longer sufficient to address the scale and sophistication of modern cyber-risks.
In 2026, cybersecurity will increasingly be viewed through the lens of systemic resilience, governance, and accountability. Organisations must adopt forward-looking, integrated approaches to cyber-risk management encompassing technology, people, processes, and third-party ecosystems. Continued collaboration between government, industry, and international partners will be essential to safeguarding Singapore’s digital future and maintaining trust in its role as a global financial and technology hub.
7 Straits View
Marina One East Tower #19-01
Singapore 018936
+65 6720 8278
+65 6720 8279
www.cms.law/en/sgp