Institutional Architecture
Segments 18 & 19 — Mapping the fragmented authority structure of India's cybersecurity governance
47 Ministry Matrix
Cyber responsibility score by ministry (0-100)
Jurisdictional Overlap Matrix
Authority claim by domain (0-100%)
State Cyber Cell Readiness
Personnel count vs readiness score (28 states with cells)
Power/Authority Distribution
Relative cyber governance authority by agency
MeitY Hierarchical Structure
MeitY subordinate bodies - complete cybersecurity value chain control
MOD Tri-Service Cyber Architecture
Fractured across service silos - IC4 proposal stalled repeatedly
Agency Interrelationship Network
Coordination without command - information flow dependencies
Institutional Mandate Overlap
Authority claims by domain - no single entity has comprehensive authority
State Cyber Capability Radar
Multi-dimensional comparison: Maharashtra vs Tier 3 states
Threat Exposure vs Capability
Population exposure vs state cyber capability (bubble = population scale)
Procurement & Acquisition Timeline
Market entry pathways - 12 months to 7+ years
Cumulative Capability Gap Analysis
National average vs minimum viable standards - no state meets minimum
The Ministry of Electronics and Information Technology controls the most cybersecurity-relevant portfolio in Indian government. This concentration reflects the reality that cybersecurity in India is treated primarily as an IT governance problem rather than a national security problem.
MeitY Org Structure
Most powerful cyber governance position
Public-Private Information Flow
International Partnership Network
Budget vs Expertise Alignment
Coordination Failures
Critical Assessment: Structural Coordination Failure
India's cybersecurity governance is not merely inadequate — it is incoherent. The architecture distributes authority without establishing clear lead responsibility, creates coordination mechanisms without providing enforcement power, and allocates resources in proportion to institutional prestige rather than operational need. The result: when a significant cyber incident occurs, no single entity has visibility into the full picture, and no single entity has authority to coordinate response across the multiple agencies that hold fragments of the solution.