Six services covering the core obligations under Kenya's CII Regulations. Each is mapped directly to Legal Notice 44 of 2024.
Annual cybersecurity risk assessment is mandatory for all designated CII owners. The 12-month deadline from commencement fell in February 2025. Most operators are already in breach. We deliver a structured assessment that satisfies the Director's compliance reporting requirements and gives your Chief Information Security Officer (CISO) a defensible risk posture.
Regulation 71(3) permits CII owners to adopt global best practices on their own initiative. IEC 62443 is the only international standard purpose-built for SCADA (Supervisory Control and Data Acquisition) systems and industrial control systems:the kind running Kenya's energy grids, water treatment plants, and transport networks. We hold all four ISA/IEC 62443 Expert certificates and map your operational environment against the standard to produce an actionable remediation programme.
Under Regulations 44–50, designated CII owners are subject to formal compliance audits by the Director of NC4:the National Computer and Cybercrimes Co-ordination Committee, Kenya's CII enforcement authority. Auditors can enter your premises with 30 days' notice and require production of documents. They work from Form CMCA 6, a prescribed audit template covering network, system, data, application, and physical security. We conduct pre-audit readiness assessments against this exact template so gaps are found before the auditors arrive.
Regulation 39(d) explicitly requires regular security audits and penetration testing for critical information infrastructure. We hold OSCP and OSEP certifications. Testing is designed for operational environments:identifying vulnerabilities in SCADA, ICS (Industrial Control Systems), and IT/OT boundary systems without disrupting live processes.
Every designated CII owner must appoint a CISO:Kenyan citizen, master's degree, five years' CII experience. Mandatory policies under Regulation 34 were due August 2024. We design the CISO function, develop the required policies and procedures, and provide ongoing technical advisory behind a locally-credentialed appointment.
CII owners must report all cybersecurity incidents to the Sectoral Cybersecurity Operations Centre (COC) within 24 hours. Regulation 42 requires a geographically separate disaster recovery site. Without tested IR plans and a Business Continuity/Disaster Recovery (BC/DR) programme, most organisations cannot meet either obligation.
Not sure where your organisation stands against the CII Regulations? We start with a structured obligation mapping:identifying which requirements apply to your CII, what you've already met, and where the gaps are.