CybersecurityHong Kong Introduces Code of Practice for Critical Infrastructure Cybersecurity

Hong Kong Introduces Code of Practice for Critical Infrastructure Cybersecurity

Key Takeaways:

  • The Office of the Commissioner of Critical Infrastructure (Computer-system Security) has issued a Code of Practice (CoP) to clarify key requirements under Hong Kong’s new critical infrastructure cybersecurity regime.
  • The CoP provides practical guidance for critical infrastructure operators (CIOs) to fulfill their obligations under the Protection of Critical Infrastructures (Computer Systems) Ordinance (Cap. 653).
  • The CoP sets out indicators for Critical Computer System (CCS) designation, including materiality to a critical infrastructure’s core function, severe impact if disrupted, and processing of sensitive digital data.
  • CIOs must comply with three categories of obligations: organisational (category 1), preventive (category 2), and incident reporting and response (category 3).
  • The CoP provides guidance on security drills, emergency response plans, and notification obligations for CIOs.

Introduction to the Code of Practice
The Office of the Commissioner of Critical Infrastructure (Computer-system Security) issued a Code of Practice (CoP) on 1 January 2026, under the Protection of Critical Infrastructures (Computer Systems) Ordinance (Cap. 653). The CoP clarifies key requirements under Hong Kong’s new critical infrastructure cybersecurity regime and sets a baseline for compliance across sectors. The CoP is not subsidiary legislation, but it will be a central reference point for supervisory expectations and enforcement directions addressing non-compliance under the Ordinance. The Commissioner may issue written directions with reference to the CoP’s requirements, and failure to comply with such directions is an offense.

Understanding Critical Computer Systems
A computer system that is accessible by a CIO in or from Hong Kong and is essential to the core function of a critical infrastructure operated by the CIO may be designated as a Critical Computer System (CCS). The CoP sets out indicators for CCS designation, including materiality to a critical infrastructure’s core function, severe impact if disrupted, processing of sensitive digital data, and strong dependencies with other CIOs or CCSs. The CoP expressly brings industrial control systems within scope as computer systems, including supervisory control and data acquisition (SCADA) systems, distributed control systems (DCS), and programmable logic controllers (PLC). Underlying IT infrastructure, such as network components, operating platforms, middleware, Internet-of-Things (IoT) devices, and uninterruptible power supply systems, may be treated as components of a computer system.

Obligations for Critical Infrastructure Operators
The CoP provides practical guidance to help CIOs fulfill their obligations under the Ordinance, which are categorized into three areas: organisational (category 1), preventive (category 2), and incident reporting and response (category 3). Category 1 obligations include maintaining an office in Hong Kong, notifying the relevant Regulating Authority of changes to the operator of a critical infrastructure, and setting up and maintaining a computer-system security management unit. The CoP clarifies that "maintaining an office in Hong Kong" means carrying on actual business activities in Hong Kong, and provides a non-exhaustive list of qualifications evidencing adequate professional knowledge in relation to computer-system security.

Preventive Obligations
Category 2 obligations include notifying material changes to certain computer systems, submitting and implementing a computer-system security management plan, and conducting security audits. The CoP supplies operational detail and clarifies how CIOs should comply with these obligations. Material changes are defined as changes reasonably expected to have a significant effect on the security risk of a CCS or the risk to the core function of the relevant critical infrastructure. The CoP provides concrete examples of events that may constitute material changes, including platform migrations, major version upgrades of core components, and changes to computing platforms or hardware.

Incident Reporting and Response
Category 3 obligations include incident reporting and response, security drills, and emergency response plans. The CoP clarifies incident response obligations, including security drills, emergency response plans, and notification obligations. The Commissioner may require a CIO to participate in a security drill to test readiness to respond to computer-system security incidents. CIOs must submit an emergency response plan detailing protocols for responding to computer-system security incidents in respect of the CCSs of their critical infrastructures. The CoP clarifies what constitutes a "computer-system security incident" and provides examples of incidents, including large-scale or volumetric DDoS attacks, ransomware attacks, and malicious exfiltration of sensitive digital data.

Conclusion and Next Steps
The CoP clarifies governance expectations, technical baselines, and operational processes under the new cybersecurity regime, and resolves key uncertainties around CCS designation, material change triggers, and incident reporting thresholds and timelines. Although non-statutory in form, the CoP helps CIOs translate legal duties into implementable controls and measures, and anchors supervisory expectations that will be central to compliance audits and enforcement. The Commissioner may review and revise the CoP from time to time to reflect technological developments and industry best practice. Organisations that have been, or are likely to be, designated as CIOs should treat the CoP as the operative compliance benchmark and implement structured programmes to align governance and controls with both the CoP and the Ordinance.

- Advertisement -spot_img

More From UrbanEdge

Fake Job Recruiters’ Malware in Developer Coding Challenges

Cybercriminals are exploiting developer job hunts by embedding malware in coding challenges. These attacks are effective as they leverage routine aspects of the developer workflow. Fake recruiters promise unrealistic salaries while embedding malicious code, making vigilance crucial for job-seekers in the tech industry...

Business Data, Emails & Browsing History Theft by Malicious Chrome Extensions

Cybercriminals exploit Chrome extensions to access confidential business data, emails, and browsing history from millions of users. These malicious tools often disguise themselves as legitimate productivity extensions, putting unsuspecting users at risk. Discover how to identify threats and protect your sensitive information from stealthy cyber intrusions...

Valentine’s Day Cyber Threats & Risks: Protect Yourself

Valentine's Day creates a perfect storm for cybercriminals, with romance scams accounting for $697 million in losses and phishing attempts spiking by 28%. Protect yourself by employing security measures like two-factor authentication and understanding swift actions post-scam to minimize risk and financial damage...

PlayStation 2026 State of Play Games Reveals & Announcements

PlayStation's 2026 State of Play unveiled over 15 new titles, including a surprise God of War spin-off and a remake of the original trilogy. Fans thrilled over the John Wick game reveal featuring Keanu Reeves, with new IPs and third-party revivals like Castlevania also showcased...

Queensland Flood Alerts: Storms to End Extreme Heatwave

Queensland Flood Alerts: Storms to End Extreme Heatwave Projected Rainfall...

Queensland Flood Warning, Alerts & Weekend Forecast

Queensland braces for heavy rain and potential flooding as a low-pressure trough stalls over the state. With predicted rainfall of 100-300mm through Sunday, authorities urge preparedness. SE regions may face disruptions, extending the alert to northeast New South Wales. Prepare emergency kits and plans now...

Brisbane Flood Risk: Storms Predicted to End Heatwave

Brisbane residents brace for storms set to end the relentless heatwave. Expect heavy rainfall, with up to 150mm in some areas, increasing flood risks, especially in low-lying regions. Flash floods are possible, and temperatures could drop by 10 degrees. Prepare emergency kits and stay updated on weather developments...

Apple Zero-Day Fix: Sophisticated Attack Solution & Patch

Apple has urgently patched two zero-day vulnerabilities in WebKit used in highly complex attacks targeting specific individuals. Security experts emphasize immediate updates to protect against these threats, linked to advanced actors, possibly nation-states. The overlapping nature of these exploits suggests a coordinated effort...

Windows 11 Notepad Vulnerability: Silent File Execution via Markdown Links

A critical vulnerability in Windows 11 Notepad's Markdown feature allows remote code execution via malicious links, posing a serious risk to users. Microsoft has issued a patch, but immediate updates and extra defenses are essential to prevent exploitation and ensure secure computing environments...
- Advertisement -spot_img