ITSAR Latest News
- The Union Government is considering legally enforcing Indian Telecom Security Assurance Requirements (ITSAR) for smartphones, involving 83 security standards, including source code disclosure, software controls, and user-permission restrictions.
- This has triggered strong resistance from global smartphone makers like Apple (5% market share in India), Samsung (15%), Google, and Xiaomi (19%), who argue that many provisions lack global precedent and threaten proprietary technologies.
Background
- India is the world’s second-largest smartphone market with nearly 750 million users.
- Rising online fraud, cybercrime, and data breaches have prompted the government to strengthen device-level security.
- The proposals align with the Indian PM’s broader push for digital security and data sovereignty.
- Similar tensions have emerged earlier over mandatory cyber safety apps (later revoked), and stringent testing norms for security cameras due to national security concerns.
Key Features of the Proposed Security Standards
- Source code disclosure:
- Manufacturers must submit proprietary source code for review and vulnerability analysis by government-designated labs.
- Objective: Detect backdoors and systemic vulnerabilities.
- Industry response:
- The Manufacturers’ Association for Information Technology (MAIT) calls it “not possible” due to corporate secrecy and privacy norms.
- No such requirement exists in the EU, North America, Australia, or Africa.
- Background permission restrictions:
- Apps cannot access camera, microphone, or location in the background. Mandatory continuous status-bar alerts when permissions are active.
- Concern: No global precedent or standardized testing method.
- Permission review alerts: Devices must periodically prompt users to review app permissions. Industry wants alerts limited to “highly critical” permissions to avoid user fatigue.
- One-year log retention:
- Phones must store security audit logs (logins, app installs) for 12 months.
- Industry concern: Consumer devices lack sufficient storage capacity.
- Periodic malware scanning: Mandatory automatic malware scans. Concerns: Battery drain, slower device performance, etc.
- Removal of pre-installed apps: All non-essential pre-installed apps must be removable. Companies argue many apps are integral system components.
- Mandatory notification of software updates:
- Manufacturers must inform the National Centre for Communication Security before releasing major updates or patches.
- Industry view: This will be impractical during zero-day vulnerabilities. Delays may increase user exposure to active cyber threats.
- Tamper detection (Rooting/Jailbreaking): Devices must detect tampering and show persistent warnings. Industry response: No reliable universal detection mechanism exists.
- Anti-rollback protection: Blocking installation of older software versions, even if manufacturer-signed.
- Concern: No global standard; may restrict legitimate use cases.
Key Challenges and Way Ahead
- Data Security vs proprietary rights: Risk of exposing trade secrets. Risk-based regulation focusing on critical vulnerabilities rather than blanket controls.
- Lack of global precedent: Potential regulatory overreach. Adopt global best practices aligned with OECD and EU cybersecurity norms.
- Ease of doing business: Compliance costs may deter investment. Ensure time-bound clearance mechanisms for security updates. Strengthen user-level security awareness alongside device-level controls.
- Operational practicality: Update delays, battery drain, storage constraints. Explore independent third-party audits instead of direct source code disclosure.
- Innovation chill: Excessive regulation may impact R&D. Maintain a balance between national security, privacy, and innovation.
Conclusion
- India’s proposed smartphone security framework (ITSAR) reflects legitimate concerns over cybersecurity, data protection, and national security in a rapidly digitising economy.
- However, enforcing intrusive measures like source code disclosure without global precedent risks undermining innovation, trust, and market competitiveness.
- A consultative, proportionate, and globally harmonised approach is essential to safeguard users while preserving India’s attractiveness as a major digital and manufacturing hub.
ITSAR FAQs
Q1: What is the rationale behind India’s proposal to mandate source code disclosure by smartphone manufacturers?
Ans: To enhance national cybersecurity and data sovereignty by identifying vulnerabilities and preventing exploitation.
Q2: Why have global smartphone manufacturers opposed India’s proposed ITSAR?
Ans: They argue that measures like source code review, malware scanning are operationally impractical.
Q3: How do India’s proposed smartphone security norms raise concerns related to Ease of Doing Business?
Ans: Mandatory disclosures, compliance costs, may discourage investment and innovation in India’s digital ecosystem.
Q4: What is the significance of background permission restrictions in the proposed smartphone security framework?
Ans: They aim to protect user privacy by preventing unauthorised background access to location services, thereby reducing cyber misuse.
Q5: How can India address cybersecurity concerns without hampering technological innovation?
Ans: India should adopt a risk-based, consultative, and globally aligned cybersecurity framework.