Singapore Announces Major Cybersecurity Regulatory Overhaul

Singapore Plans Major Cybersecurity Overhaul, Mandating PQC and Expanding CII Oversight

INFORMATIONAL
April 28, 2026
4m read
Policy and ComplianceRegulatoryThreat Intelligence

Related Entities

Organizations

SingaporeCyber Security Agency of Singapore (CSA) Infocomm Media Development Authority (IMDA)GovTech SingaporeNational Institute of Standards and Technology (NIST)

Products & Tech

Post-Quantum Cryptography (PQC)

Other

Cyber Trust Mark (CTM)Critical Information Infrastructure (CII)

Full Report

Executive Summary

The government of Singapore has unveiled a comprehensive roadmap for significant cybersecurity regulatory developments. Announced by Senior Minister of State for Digital Development and Information, Mr Tan Kiat How, these changes aim to fortify the nation's resilience against evolving cyber threats. Key initiatives include expanding the scope of cybersecurity laws to cover systems interconnected with Critical Information Infrastructure (CII), establishing Post-Quantum Cryptography (PQC) as the national standard, imposing stricter security requirements on telecommunications operators, and mandating the Cyber Trust Mark (CTM) certification for a wider range of organizations.

Regulatory Details

The upcoming changes will be implemented progressively over the next two years, affecting multiple sectors of Singapore's economy.

Expansion of CII Oversight

The Cyber Security Agency of Singapore (CSA) will review its standards to extend cybersecurity obligations beyond designated CII to include non-CII systems that are interconnected with them. This acknowledges the risk posed by lateral movement from less secure, connected systems into critical ones. To support this, the CSA will also begin selectively sharing classified threat intelligence with CII Owners and provide them with proprietary government-developed threat detection tools to augment their commercial security solutions.

Telecommunications Security

In response to recent attacks, the Infocomm Media Development Authority (IMDA) will introduce enhanced cybersecurity regulations for telecommunications operators. These new rules will focus on key areas such as the secure management of virtualized infrastructure and robust credential management practices.

Adoption of Post-Quantum Cryptography (PQC)

Singapore is taking a forward-looking stance by officially adopting PQC as its mainstream solution for ensuring long-term data security against the threat of quantum computing. The nation will align its standards with those developed by the U.S. National Institute of Standards and Technology (NIST), positioning itself as an early adopter of quantum-safe technology.

Expansion of Cyber Trust Mark (CTM)

The CTM certification, which signifies that an organization has put in place robust cybersecurity practices, will become mandatory for a broader set of entities. GovTech will require CTM certification for government vendors handling critical systems and sensitive data. The CSA will also mandate CTM for CII Owners, their auditors, and licensed cybersecurity service providers, including penetration testers and MSSOCs.

Affected Organizations

  • Critical Information Infrastructure (CII) Owners: Will face expanded oversight and new compliance requirements, including CTM certification.
  • Companies with Systems Connected to CII: Will be brought under new regulatory scrutiny.
  • Telecommunications Operators: Must comply with stricter regulations from the IMDA.
  • Government Vendors: Those managing critical systems or sensitive data will need to achieve CTM certification.
  • Cybersecurity Service Providers: Licensed penetration testing and MSSOC firms will be required to obtain CTM certification.

Compliance Requirements

Organizations will need to prepare for a range of new obligations:

  • Conducting risk assessments to determine if their systems are interconnected with CII.
  • Implementing PQC-compliant cryptographic solutions in line with NIST standards.
  • Upgrading security controls for virtualized environments and credential management (for telcos).
  • Undergoing the CTM certification process, which involves audits of cybersecurity policies, processes, and technical controls.

Implementation Timeline

The regulatory changes will be introduced progressively over the next two years. This phased approach is intended to allow for stakeholder consultation and give affected organizations time to prepare for the new requirements.

Impact Assessment

These new regulations represent a significant step-up in Singapore's national cybersecurity strategy. For businesses, this means increased compliance costs and the need for greater investment in cybersecurity technology and expertise. However, it also presents an opportunity to strengthen security postures and build greater trust with customers and partners. The move towards PQC is particularly notable, as it addresses a long-term, strategic threat. The expansion of CTM will create a higher baseline of security across critical sectors and the government supply chain.

Compliance Guidance

  1. Conduct a Gap Analysis: Affected organizations should immediately begin a gap analysis to compare their current security posture against the upcoming requirements.
  2. Engage with Regulators: Participate in stakeholder consultations to understand the nuances of the new rules and provide feedback.
  3. Develop a PQC Migration Strategy: Begin researching PQC solutions and develop a long-term migration plan for cryptographic systems.
  4. Prepare for CTM Certification: Review the CTM framework and start implementing the necessary controls to achieve certification.
  5. Review Third-Party Risk: Assess the security of all interconnected systems and vendors, as these will now fall under greater scrutiny.

Timeline of Events

1
April 28, 2026
This article was published

MITRE ATT&CK Mitigations

Regularly scan for vulnerabilities, which is a foundational requirement for many compliance and certification frameworks like CTM.

A core component of resilience that is often mandated by regulations governing critical infrastructure.

The move to PQC directly relates to strengthening data encryption against future threats.

Enhanced credential management for telcos will almost certainly involve stronger enforcement of MFA.

D3FEND Defensive Countermeasures

The new Singaporean regulations emphasize hardening across multiple domains. For CII and interconnected systems, platform hardening involves implementing the CSA's recommended security configurations, disabling unnecessary services, and ensuring timely patching. For telecom operators, this extends to securing virtualized infrastructure by applying vendor hardening guides for hypervisors and cloud management platforms. Achieving the Cyber Trust Mark (CTM) will require organizations to provide evidence of a systematic platform hardening program, making this a foundational activity for compliance.

Singapore's mandate to adopt Post-Quantum Cryptography (PQC) directly impacts the future of encrypted communications. Organizations, particularly CII owners, must begin inventorying all systems that rely on public-key cryptography (e.g., VPNs, TLS/SSL, code signing). The next step is to develop a roadmap for migrating to NIST-approved PQC algorithms like CRYSTALS-Kyber for key exchange and CRYSTALS-Dilithium for digital signatures. This involves engaging with vendors to ensure their products will support PQC and planning for a hybrid approach during the transition period to maintain interoperability.

The IMDA's focus on enhanced credential management for telecommunications operators will necessitate the widespread implementation of robust Multi-factor Authentication. This should apply not only to user-facing services but, more critically, to all administrative access to network infrastructure, management planes, and virtualized environments. Telcos should prioritize phishing-resistant MFA methods (e.g., FIDO2/WebAuthn) over less secure options like SMS-based codes to defend against sophisticated adversaries. Demonstrating comprehensive MFA deployment will be a key requirement for meeting the new, stricter regulations.

Sources & References

Singapore: Cybersecurity Regulatory Developments Ahead
Baker McKenzie (bakermckenzie.com) β€’April 27, 2026
UK – AI cyber alert
Bird & Bird (twobirds.com) β€’April 27, 2026

Article Author

Jason Gomes

Jason Gomes

β€’ Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

SingaporeRegulationPolicyCompliancePQCPost-Quantum CryptographyCIICyber Trust MarkCSA

πŸ“’ Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

πŸ›‘οΈ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

πŸ”— STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph β€” relationships between actors, malware, techniques, and indicators.

⚑ Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.