Overview of the Act
The Cyber Security Act 2024 has been officially gazetted by the Attorney General’s Chambers on 26 June 2024. This legislation is a major milestone in strengthening Malaysia’s cyber defenses and enhancing cyber resilience against a constantly evolving threat landscape. The Act introduces requirements designed to improve and monitor the security of computing environments for entities within the National Critical Information Infrastructure (NCII) sectors and to comply with specific standards and measures, as well as processes related to handling and reporting cybersecurity incidents.
Duties under the Act
The NCII entities as designated by the NCII Sector lead shall be responsible for implementing new controls and processes to strengthen the NCIIs cyber security posture as well as effectively respond to and report on cyber security incidents. These new requirements will introduce an additional burden on NCIIs and will result in higher costs, manpower shortages and increased demand for talent.
| New Provisions for NCIIs | Implications on Entities |
| Duty to Implement Code of Practice | Implementation of new standards and policies |
| Duty to Provide Information | Frequent/ad-hoc data gathering requests |
| Duty to conduct Cybersecurity Risk Assessment | Increased cost and resource overheads |
| Duty to Notify on Incidents | Need to drastically improve MTTI, MTTD and MTTR |
| Compliance and Auditing | Need for continuous enforcement and monitoring |
| Cybersecurity Exercises | Additional resources for defining playbooks, skilled teams and capability to gather real-time telemetry |
As this Act comes into enforcement, we look at how the Tanium platform is well placed to address challenges that will arise from the implementation of the Code of Practice and help with the governance, compliance, reporting and enforcement of existing and new cybersecurity measures on endpoints.
How Tanium Can Help Address These Provisions
Tanium offers end-to-end visibility into every endpoint in digital estates. It gives you a wealth of real-time and accurate data that fuels every fundamental endpoint management and security capability required to protect your environment. Tanium will help customers step up their endpoint security to manage the current and emerging risks by providing
- Real-Time Visibility of Endpoint Telemetry
- Improved Cyber Hygiene and Compliance Reporting
- Automated Enforcement of Security Controls
- Incident Response and Remediation
- Tool Consolidation across IT Ops, Security and Risk & Compliance teams
| Implementation of Code of Practice | – Tanium offers a Converged Endpoint Management platform for managing and securing endpoints. Single console, Single agent with a lightweight architecture offering tool consolidation for security, ops and risk and compliance teams Gain real time endpoint visibility and control, implement remediations in real time – Manage device lifecycle from provisioning to retirement, identify and remediate control gaps, discover configuration issues and vulnerabilities, enforce security controls and respond to operations and security incidents from a single pane of glass – Platform based approach reduces cost, reduces tool fragmentation and requires teams to upskill on fewer tools. |
| Information Gathering | – Real time – natural language – queries to gather endpoint security telemetry – Reporting for online and offline assetsSupports ad hoc data gathering requests and shorten data gathering cycles |
| Cybersecurity Risk Assessment | – Discover missing endpoints in the network Tanium often finds 20% more endpoints than what organizations thought they originally had. – Assess Risk for managed endpoints via automated Risk Scoring and Reporting – Accurate hardware and software inventory, 3rd party libraries and certificates – Assess risk across missing patches, out of date software and update systems Drive real-time, risk-based decisions about IT hygiene, security and regulatory compliance, and incident remediation |
| Compliance and Auditing | – Single Source of Truth using real time and accurate data to enrich the CMDB Continuous integration into external systems for reporting and auditing – Shortens audit cycles by real time data gathering – Enforcement of consistent security controls for domain joined as well as off domain endpoints – Offers pre-configured charts, dashboards, and reports for easy monitoring and stakeholder communications |
| Incident Notification and Response | Reduce Mean Time to Resolve (MTTR) for security incidents. Augments SIEM and EDR to accelerate and improve your end-to-end incident detection, threat hunting, investigation, containment, and remediation capabilitiesDiscover incidents in progress, investigate what caused them, and determine the full scope of the threat and how to stop it. Automatically contain threats to stop them from spreading and causing further harm before you remediate them. Stop the incident, evict the attacker, restore normal business operations, and harden against future incidents. |
| Cybersecurity Exercises | – Tanium is designed for proactive and reactive threat hunting and Incident Response at Scale. – Customizable reactions to detections and ability to defined automated playbooks to respond to incidents |

