India’s Cyber Doctrine has an Ambitious Vision, but there are Implementation Challenges

India’s Cyber Doctrine has an Ambitious Vision, but there are Implementation Challenges 12 Aug 2025

India’s Cyber Doctrine has an Ambitious Vision, but there are Implementation Challenges

On August 7 this year, the Chief of Defence Staff of India, released the Joint Doctrine for Cyberspace Operations. 

  • The unveiling of this declassified document represents India’s formal acknowledgement that future warfare will be as much about bytes as bullets

About Joint Doctrine For Cyberspace Operations

  • Core Objective: The doctrine’s primary aim is to achieve cyber immunity for India
    • It recognises that in future warfare, data will be as vital as bullets in conventional conflict.
  • Key Understanding in Cyber Warfare: Unlike traditional warfare, cyber warfare has no fixed boundaries. 
    • In cyber warfare, a nation’s capacity and capability define the boundaries of its defence.
  • Strategic Emphasis: The doctrine places strong emphasis on threat-informed planning to counter evolving cyber risks.
    • It prioritises the integration of real-time intelligence to strengthen national defence.
    • A major objective is to achieve true jointness among the Army, Navy, and Air Force to bridge operational gaps in tackling cyber threats.
  • National Security Perspective: The doctrine strategically recognises cyberspace as a critical domain for national security.
  • Lessons from Past Incidents: The 2007 cyber attacks on Estonia demonstrated how digital infrastructure can be paralysed.
    • The 2010 Stuxnet attack on Iran’s nuclear facilities showed that cyber attacks can cause physical, kinetic effects.
    • The 2020 Mumbai power grid attack, allegedly linked to Chinese hackers, highlighted vulnerabilities in India’s critical infrastructure.
  • Information Warfare Challenges: The spread of misinformation during Operation Sindoor underscored the need for stronger countermeasures in the information domain.

Challenges  in implementation of the Doctrine

  • Difficulty in Attacker Attribution: In cyber warfare, it is incredibly challenging to identify the source of an attack
    • It could be a state actor, a criminal network, or even a lone hacker. 
    • Traditional response mechanisms are difficult to apply when the attacker is unknown. 
      • For instance, the 2017 WannaCry ransomware attack demonstrated how over 300,000 computers could be globally paralysed without clear attribution.
  • Lack of Tri-Service Integration:
    • The Army, Navy, and Air Force have historically operated in separate domains, each with distinct focus areas—regional tactics, maritime domain awareness, and space/cyber integration, respectively.
    • Separate procurement systems, distinct operational protocols, and varied technological preferences among the services hinder unified action.
    • Previous attempts, such as establishing the Defence Cyber Agency in 2019, have struggled with resource allocation, operational authority, and effective intelligence sharing, failing to achieve desired outcomes.
  • Continuous Updation: There is a conceptual misunderstanding that cyber integration is a one-time effort. 
    • Cyber space demands continuous organisational adjustment to keep pace with rapidly evolving technologies like Artificial Intelligence and Machine Learning.
    • Even the advanced US military, with its Cyber Command established in 2009, faces struggles with inter-service coordination, indicating the complexity of this challenge.
  • Severe Human Capital Shortage: India faces a critical deficit of skilled cybersecurity professionals, with an estimated requirement for 1 million experts that current supply cannot meet
    • Military cyber operations demand specialised skills beyond general cybersecurity expertise, requiring personnel to continuously adapt to technological advancements. 
    • The half-life of cybersecurity knowledge is measured in months, not years, necessitating unprecedented investment in continuous learning. 
    • The military also finds it challenging to compete with private sector salaries and work conditions for top cyber talent.
  • Confidentiality Issues: A significant portion of India’s critical infrastructure, including power and transportation networks, is managed by the private sector. 
    • While integrating civilian expertise and private entities into military cyber operations is essential for strengthening national defence, it also presents complexities, particularly in maintaining confidentiality. 
  • Dependence on Foreign Technologies: Despite the National Cyber Security Strategy aiming for self-reliance in cybersecurity for over a decade, India remains heavily dependent on foreign technologies for tools and systems. 
    • Even Indian cybersecurity startups often rely on major funding from foreign IT companies, further perpetuating this dependence. 
    • Building truly indigenous capabilities requires massive investments in research and development with uncertain timelines for operational readiness.
  • Limited Applicability of Foreign Models:
    • China’s comprehensive national power model is incompatible with India’s democratic values and the significant role of its private sector. 
      • China’s ability to mobilise private sector cyber capabilities through national intelligence laws has no equivalent in India’s democratic framework.
    • Russia’s model, which reportedly utilises non-state actors or criminals for national defence, raises ethical issues that conflict with India’s governance principles, as it tolerates criminal cyber activities when they serve state interests.
    • The US model of ‘persistent engagement’, involving continuous monitoring and expansion of cyber expertise against neighbours, is impractical for the conflict-prone South Asian subcontinent
      • This approach could escalate regional hostilities and complicate relationships with neighbours, creating new vulnerabilities.
  • Ambiguity in the Doctrine: The current doctrine lacks clear timelines for implementation, specific resource commitments, and a detailed operational blueprint. 
  • Cyber Deterrence Complexities: Unlike nuclear deterrence, where the physical presence and potential damage are calculable, cyber deterrence is complicated by the anonymity of attackers and the unpredictable nature of potential damage
    • The doctrine’s deterrence strategy requires clearer articulation.

Way Forward

  • Eliminate Institutional Barriers: India needs to actively address and bridge the existing gaps in decision-making, resource allocation, and procurement processes within the tri-services to foster genuine integration.
  • Embrace Continuous Adaptation: Cyber security requires constant organisational adjustment to keep pace with rapid technological advancements and evolving threats.
  • Invest Heavily in Human Capital Development: Implement robust and continuous training programmes to develop specialised cybersecurity professionals, effectively addressing the severe talent shortage.
  • Strengthen Civil-Military and Private Sector Collaboration: Establish clear mechanisms for effectively integrating civilian expertise and private sector entities into national cyber defence, ensuring critical infrastructure protection while safeguarding sensitive information.
  • Prioritise Indigenisation through Robust R&D: Significantly increase investment in research and development to cultivate indigenous capabilities in cybersecurity technologies. 
    • This will reduce reliance on foreign systems and enhance national self-reliance.
  • Refine the Doctrine with Clarity: The doctrine must be refined to include precise timeframes, specific resource commitments, and a detailed operational blueprint for its implementation.

Conclusion

India’s Cyber Doctrine represents a strategic and essential step in acknowledging the complexities of modern warfare and the critical imperative of cyber security. 

  • Translating doctrinal ambitions into operational capabilities, therefore, will require sustained political commitment, significant resource allocation, and institutional reforms that extend far beyond military structures.
Mains Practice

Q. India’s cyberspace faces expanding vulnerabilities across critical infrastructure, defence networks, and citizen data. Critically examine the newly released Joint Doctrine for Cyberspace Operations (JDCO), assessing its strengths and gaps. Suggest a roadmap to enhance India’s cyber resilience. (15 Marks, 250 words)

Need help preparing for UPSC or State PSCs?

Connect with our experts to get free counselling & start preparing

Aiming for UPSC?

Download Our App

      
Quick Revise Now !
AVAILABLE FOR DOWNLOAD SOON
UDAAN PRELIMS WALLAH
Comprehensive coverage with a concise format
Integration of PYQ within the booklet
Designed as per recent trends of Prelims questions
हिंदी में भी उपलब्ध
Quick Revise Now !
UDAAN PRELIMS WALLAH
Comprehensive coverage with a concise format
Integration of PYQ within the booklet
Designed as per recent trends of Prelims questions
हिंदी में भी उपलब्ध

<div class="new-fform">






    </div>

    Subscribe our Newsletter
    Sign up now for our exclusive newsletter and be the first to know about our latest Initiatives, Quality Content, and much more.
    *Promise! We won't spam you.
    Yes! I want to Subscribe.