Securiti leads GigaOm's DSPM Vendor Evaluation with top ratings across technical capabilities & business value.

View

An Overview of Malaysia Cyber Security Act 2024

Contributors

Anas Baig

Product Marketing Manager at Securiti

Syeda Eimaan Gardezi

Associate Data Privacy Analyst at Securiti

Rohma Fatima Qayyum

Associate Data Privacy Analyst at Securiti

Published January 15, 2025

Listen to the content

I. Introduction

Malaysia introduced the Cyber Security Act 2024 (Act) to strengthen its cybersecurity framework in an increasingly data-driven digital landscape. The Act received Royal Assent on July 18, 2024, and was published in the Official Gazette on June 26, 2024.

It provides a comprehensive legal foundation for addressing and managing cyber threats. To this end, it establishes the National Cyber Security Committee (NCSC) to coordinate cybersecurity strategies, grants expanded powers to the National Cyber Security Agency (NACSA) and mandates specific cybersecurity protocols for entities classified as having National Critical Information Infrastructure (NCII).

The Act also introduces strict restrictions, such as mandatory risk assessments, incident reporting, and licensing requirements for cybersecurity service providers, to safeguard Malaysia's digital ecosystem against evolving cyber threats. Read on to learn more.

II. Who Needs to Comply with the Act

A. Material Scope

The Act applies to licensed cybersecurity service providers that are designated as National Critical Information Infrastructure (NCII) entities and operate in the following sectors:

  • government,
  • banking and finance,
  • transportation,
  • defense,
  • national security,
  • information, communication and digital,
  • healthcare services,
  • water, sewerage, and waste management,
  • energy, agriculture and plantation,
  • trade, industry, and economy,
  • science, technology, and innovation.

However, as per the Cybersecurity (Exemption) Order 2025, several companies have been exempted from the provisions of the Cybersecurity Act 2024.

B. Territorial Scope

This Act gives Malaysia extraterritorial jurisdiction over offenses committed under it, regardless of the offender's nationality or location. It applies specifically if the offense involves Malaysia's national critical information infrastructure (NCII).

III. Definitions of Key Terms

a. Chief Executive

The Chief Executive of the National Cyber Security Agency (NCSA).

b. National Critical Information Infrastructure Entity (NCII Entity)

An NCII Entity is any government agency or individual.

c. National Critical Information Infrastructure (NCII)

NCII is a computer or computer system that, if disrupted or destroyed, will negatively affect the ability of the government to conduct its duties or deliver any services that are necessary for Malaysia's security, defense, foreign relations, economy, public health, public safety, or public order.

d. Cyber Security Threat

An unauthorized act or conduct done on or through a computer or computer system that could immediately put at risk or undermine the cyber security of that computer or computer system or another computer or computer system

e. Cyber Security Incident

An unauthorized act or conduct done on or through a computer or computer system that could put at risk or threaten the cyber security of that computer or computer system or another computer or computer system

f. Cyber Security

The state in which a computer or computer system is protected from attacks or unauthorized access, ensuring its availability, operational functionality, integrity, and confidentiality of its stored, processed, or transmitted information.

g. Cyber Security Service Provider

An individual who provides a cyber security service.

IV. Obligations for NCII Entities Under the Act

A. Establishment of the National Cyber Security Committee (NCSC)

The Act establishes the NCSC. The prime minister is the chair of NCSC and other members include the chief secretary to the government, the chief of the defense force, the director general of national security, the inspector general of police, and important ministers in charge of finance, foreign policy, defense, home affairs, communications, and digital issues. Up to two seasoned cybersecurity professionals may also be assigned as members of NCSC.

Functions of the National Cyber Security Committee

In addition to advising the government on cybersecurity policies, the NCSC is in charge of planning, developing, and determining national cybersecurity policies; identifying strategies to address cybersecurity issues; monitoring the implementation of policies and strategies; guiding the Chief Executive and infrastructure sector leads on cybersecurity matters; ensuring the Act is implemented effectively; and carrying out other pertinent tasks.

B. Appointment of Cyber Security Expert

The Chief Executive may appoint any qualified individual as a cybersecurity expert in writing for a duration deemed suitable to fulfill the office's responsibilities.

C. Information Provision

NCII entities must provide the appropriate sector lead with information on their critical infrastructure upon request. This involves disclosing significant adjustments to cybersecurity, including security protocols or design improvements.

If the Chief Executive has good cause, they may request that individuals believed to have records, evidence, or information relevant to their official responsibilities produce it within a certain deadline via a written directive. Additionally, the Chief Executive, by notice, could mandate that such persons appear before a designated official to deliver evidence or submit documentation, with extensions provided if necessary. These authorities provide the Chief Executive access to crucial data for conducting their duties under the Act.

D. Adherence to Codes of Practice

According to the sector-specific codes of practice, entities must implement cybersecurity procedures, standards, and safeguards. While compliance with the established rules is required, alternative measures may be used if they provide equivalent or better protection.

The NCII sector lead must develop a code of practice that outlines procedures, standards, and measurements and is approved by the Chief Executive. While developing this code, the sector lead must consider the roles of NCII entities, relevant cybersecurity regulations, and feedback from regulatory bodies and NCII entities.

If the code complies with or exceeds certain requirements, considers necessary factors, and is consistent with the Act's provisions, the Chief Executive will approve it. When approved, the code immediately takes effect on the date of endorsement. If the decision is not approved, the Chief Executive is required to notify the sector leader and explain why.

E. Cyber Security Risk Assessments and Audits

According to the instructions in the code of practice and directive of the Chief Executive, an NCII entity must conduct a cybersecurity risk assessment and audit within the allotted time frame to ensure compliance with the Act. After being carried out by an authorized auditor, these assessments and audits must be submitted to the Chief Executive within 30 days.

If the Chief Executive is unsatisfied with the assessment or audit results, further action, such as re-evaluation or correction, may be necessary. The Chief Executive may also request further assessments or audits if significant adjustments are made to the NCII's operations or security.

More details on cyber security risk assessments and audits are available in the Cyber Security (Period for Cyber Security Risk Assessment and Audit) Regulations 2024.

F. Incident Reporting

NCII entities must promptly notify their sector lead and the Chief Executive of any cybersecurity incident or possible risk impacting their infrastructure. A comprehensive report should be sent within 6 hours from the time the incident comes to the knowledge of the NCII entity, and a follow-up report should be sent within 14 days.

Moreover, details on notification of cyber security incidents are available in the Cyber Security (Notification of Cyber Security Incident) Regulations 2024.

G. Participation in Cybersecurity Exercises

The Chief Executive can lead cybersecurity exercises to assess an NCII entity's readiness to manage cybersecurity threats or events. Before conducting such an activity, the Chief Executive shall provide written notice to the NCII entity and may provide instructions to assist with the procedure.

H. Licensing for Cybersecurity Service Providers

NCII entities that provide cybersecurity services must apply for a NACSA license. This criterion ensures service providers meet certain requirements and comply with set guidelines.

More details on licensing of cyber security service providers are available in the Cyber Security (Licensing of Cyber Security Service Provider) Regulations 2024.

I. Record of Processing Activities

For every engagement, a licensee providing cybersecurity services must keep detailed records, including the client's name and address, the service provider's name, date, time, service details, and any other information the Chief Executive requests. The Chief Executive must have access to these documents upon request and must be retained for at least six years.

V. Regulatory Authority

The Act establishes the National Cyber Security Committee and defines the roles and responsibilities of the Chief Executive of the National Cyber Security Agency (NACSA). These bodies oversee the implementation of cybersecurity policies and ensure compliance across sectors.

The Minister charged with the responsibility for cyber security may authorize public officials to conduct their duties under this Act. An authorization card, signed by the Minister, shall be given to each authorized official and must be shown upon request to exercise these rights.

VI. Penalties for Non-Compliance

The Act outlines stringent noncompliance penalties, including:

a. Non-compliance by National Critical Information Infrastructure (NCII) Entities

  • Failure to Implement Codes of Practice

    • NCII entities must follow sector-specific codes of practice. Non-compliance can result in fines of up to RM500,000, imprisonment for up to 10 years, or both.

  • Inadequate Cybersecurity Risk Assessments and Audits

    • NCII entities must conduct regular cybersecurity risk assessments and audits. Failure to do so or submit reports may result in fines of up to RM200,000, imprisonment for up to 3 years, or both.

  • Failure to Report Cybersecurity Incidents

    • NCII entities must promptly report cybersecurity incidents to the NACSA’s Chief Executive and their respective NCII sector leads. Failure to report can result in fines up to RM500,000, imprisonment for up to 10 years, or both.

b. Non-compliance by Cybersecurity Service Providers

  • Unlicensed Service Provision

    • Offering or advertising cybersecurity services without a valid license is punishable by a fine of up to RM500,000, imprisonment for up to 10 years, or both.

  • Unauthorized or Illegal Transfer or Assignment of License

    • Violating licensing conditions may result in a fine of up to RM200,000, imprisonment for up to 3 years, or both.
  • Failure to Maintain Service Records

    • Failure to keep required records of services provided can result in fines of up to RM100,000, imprisonment for up to 2 years, or both.

c.  Non-compliance with Cybersecurity Exercises

  • Failure to Comply with Directions

    • NCII entities must follow the Chief Executive's directions regarding cybersecurity exercises. Non-compliance can result in fines of up to RM100,000.

VII. How Can an Organization Operationalize the Act

To operationalize the Act, an organization must take the following steps:

a. Conduct a Compliance Assessment

Compare the Act's standards with current cybersecurity policies to determine documentation, reporting, or process gaps.

b. Establish a Cybersecurity Compliance Team

Assign an individual or a team to understand and comply with the Act's obligations while communicating with regulatory agencies.

c. Develop and Implement Cybersecurity Policies

Develop or revise cybersecurity policies, including incident response, data protection, and employee obligations to comply with the Act.

d. Conduct Regular Risk Assessments and Audits

Conduct regular audits and cybersecurity risk assessments while recording results and improvement strategies.

e. Train Employees on Compliance Requirements

Provide adequate training on the Act’s requirements to ensure all employees understand their roles in maintaining compliance and reporting incidents.

f. Implement Incident Reporting Mechanisms

Establish procedures for promptly identifying, recording, and reporting cybersecurity incidents to comply with the Act's obligations.

g. Ensure Record-Keeping Practices

Maintain accurate records of cybersecurity services, including details of engagements and client information, to comply with record-keeping and reporting obligations.

h. Engage in Regular Cybersecurity Exercises

Participate in or lead cybersecurity exercises while complying with regulatory agency guidelines to evaluate and enhance the organization's incident response readiness.

i. Obtain Necessary Licenses for Cybersecurity Services

Obtain the necessary license and maintain compliance with licensing requirements when advertising or providing cybersecurity services.

VIII. How Securiti Can Help

Securiti emerges as a pivotal catalyst for organizations seeking to navigate and comply with Malaysia’s Cyber Security Act 2024 and privacy laws in Malaysia. Securiti’s robust modules fortify organizations against potential cyber threats and ensure alignment with Saudi Arabia’s stringent data privacy laws.

Securiti is the pioneer of the Data Command Center, a centralized platform that enables the safe use of data and GenAI. Securiti provides unified data intelligence, controls, and orchestration across hybrid multi-cloud environments. Large global enterprises rely on Securiti's Data Command Center for data security, privacy, governance, and compliance.

Request a demo to learn more.

Join Our Newsletter

Get all the latest information, law updates and more delivered to your inbox



More Stories that May Interest You
Videos
View More
Mitigating OWASP Top 10 for LLM Applications 2025
Generative AI (GenAI) has transformed how enterprises operate, scale, and grow. There’s an AI application for every purpose, from increasing employee productivity to streamlining...
View More
Top 6 DSPM Use Cases
With the advent of Generative AI (GenAI), data has become more dynamic. New data is generated faster than ever, transmitted to various systems, applications,...
View More
Colorado Privacy Act (CPA)
What is the Colorado Privacy Act? The CPA is a comprehensive privacy law signed on July 7, 2021. It established new standards for personal...
View More
Securiti for Copilot in SaaS
Accelerate Copilot Adoption Securely & Confidently Organizations are eager to adopt Microsoft 365 Copilot for increased productivity and efficiency. However, security concerns like data...
View More
Top 10 Considerations for Safely Using Unstructured Data with GenAI
A staggering 90% of an organization's data is unstructured. This data is rapidly being used to fuel GenAI applications like chatbots and AI search....
View More
Gencore AI: Building Safe, Enterprise-grade AI Systems in Minutes
As enterprises adopt generative AI, data and AI teams face numerous hurdles: securely connecting unstructured and structured data sources, maintaining proper controls and governance,...
View More
Navigating CPRA: Key Insights for Businesses
What is CPRA? The California Privacy Rights Act (CPRA) is California's state legislation aimed at protecting residents' digital privacy. It became effective on January...
View More
Navigating the Shift: Transitioning to PCI DSS v4.0
What is PCI DSS? PCI DSS (Payment Card Industry Data Security Standard) is a set of security standards to ensure safe processing, storage, and...
View More
Securing Data+AI : Playbook for Trust, Risk, and Security Management (TRiSM)
AI's growing security risks have 48% of global CISOs alarmed. Join this keynote to learn about a practical playbook for enabling AI Trust, Risk,...
AWS Startup Showcase Cybersecurity Governance With Generative AI View More
AWS Startup Showcase Cybersecurity Governance With Generative AI
Balancing Innovation and Governance with Generative AI Generative AI has the potential to disrupt all aspects of business, with powerful new capabilities. However, with...

Spotlight Talks

Spotlight 11:29
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Not Hype — Dye & Durham’s Analytics Head Shows What AI at Work Really Looks Like
Watch Now View
Spotlight 11:18
Rewiring Real Estate Finance — How Walker & Dunlop Is Giving Its $135B Portfolio a Data-First Refresh
Watch Now View
Spotlight 13:38
Accelerating Miracles — How Sanofi is Embedding AI to Significantly Reduce Drug Development Timelines
Sanofi Thumbnail
Watch Now View
Spotlight 10:35
There’s Been a Material Shift in the Data Center of Gravity
Watch Now View
Spotlight 14:21
AI Governance Is Much More than Technology Risk Mitigation
AI Governance Is Much More than Technology Risk Mitigation
Watch Now View
Spotlight 12:!3
You Can’t Build Pipelines, Warehouses, or AI Platforms Without Business Knowledge
Watch Now View
Spotlight 47:42
Cybersecurity – Where Leaders are Buying, Building, and Partnering
Rehan Jalil
Watch Now View
Spotlight 27:29
Building Safe AI with Databricks and Gencore
Rehan Jalil
Watch Now View
Spotlight 46:02
Building Safe Enterprise AI: A Practical Roadmap
Watch Now View
Spotlight 13:32
Ensuring Solid Governance Is Like Squeezing Jello
Watch Now View
Latest
Shrink The Blast Radius: Automate Data Minimization with DSPM View More
Shrink The Blast Radius
Recently, DaVita disclosed a ransomware incident that ultimately impacted about 2.7 million people, and it’s already booked $13.5M in related costs this quarter. Healthcare...
Why I Joined Securiti View More
Why I Joined Securiti
I’m beyond excited to join Securiti.ai as a sales leader at this pivotal moment in their journey. The decision was clear, driven by three...
View More
Decoding Saudi Arabia’s Cybersecurity Risk Management Framework
Discover the Kingdom of Saudi Arabia’s National Framework for Cybersecurity Risk Management by the NCA. Learn how TLP, risk assessment and proactive strategies protect...
Sensitive Data Discovery Explained View More
Sensitive Data Discovery Explained: What it is and Why it Matters
Discover the ins and outs of sensitive data discovery, what it is, why it matters, benefits, etc. Learn how Securiti helps in sensitive data...
View More
Is Your Business Ready for the EU AI Act August 2025 Deadline?
Download the whitepaper to learn where your business is ready for the EU AI Act. Discover who is impacted, prepare for compliance, and learn...
View More
Getting Ready for the EU AI Act: What You Should Know For Effective Compliance
Securiti's whitepaper provides a detailed overview of the three-phased approach to AI Act compliance, making it essential reading for businesses operating with AI.
Navigating the Minnesota Consumer Data Privacy Act (MCDPA) View More
Navigating the Minnesota Consumer Data Privacy Act (MCDPA): Key Details
Download the infographic to learn about the Minnesota Consumer Data Privacy Act (MCDPA) applicability, obligations, key features, definitions, exemptions, and penalties.
EU AI Act Mapping: A Step-by-Step Compliance Roadmap View More
EU AI Act Mapping: A Step-by-Step Compliance Roadmap
Explore the EU AI Act Mapping infographic—a step-by-step compliance roadmap to help organizations understand key requirements, assess risk, and align AI systems with EU...
The DSPM Architect’s Handbook View More
The DSPM Architect’s Handbook: Building an Enterprise-Ready Data+AI Security Program
Get certified in DSPM. Learn to architect a DSPM solution, operationalize data and AI security, apply enterprise best practices, and enable secure AI adoption...
Gencore AI and Amazon Bedrock View More
Building Enterprise-Grade AI with Gencore AI and Amazon Bedrock
Learn how to build secure enterprise AI copilots with Amazon Bedrock models, protect AI interactions with LLM Firewalls, and apply OWASP Top 10 LLM...
What's
New