India faces a cybersecurity challenge of historic proportions. With over 900 million internet users, the world's fastest-growing digital economy, and critical infrastructure spanning nuclear facilities, defence systems, and the Unified Payments Interface (UPI) processing 14+ billion transactions monthly, the nation's attack surface is vast and expanding.
CERT-In reported over 15.9 lakh (1.59 million) cybersecurity incidents in 2024 alone. The Indian Cyber Crime Coordination Centre (I4C) recorded financial fraud losses exceeding Rs 11,333 crore in the same period. State-sponsored threat actors from adversary nations routinely target Indian government networks, defence installations, and critical infrastructure operators.
In this environment, the ability to train cybersecurity professionals on realistic, hands-on exercises is not merely important -- it is a matter of national security. And yet, India's current cyber range training infrastructure relies significantly on foreign platforms, creating a dependency that undermines the very security it seeks to build.
Data Sovereignty: Why Training Data Matters
When a defence organization or government agency trains on a cyber range, the training data itself becomes sensitive intelligence. Consider what a cyber range exercise reveals:
- The network topologies used in training expose the organization's real (or aspirational) network architecture.
- Participant performance data reveals the strengths and weaknesses of the nation's cyber defenders.
- Exercise scenarios reveal what threat vectors the organization considers most likely -- essentially, its threat model.
- Skills gap analytics expose which attack techniques the organization is least prepared to defend against.
- Incident response procedures used in exercises reveal the playbooks that would be followed in a real attack.
When this data resides on, or transits through, foreign cloud infrastructure -- or when a foreign vendor's platform phones home with telemetry data -- the organization has effectively disclosed its defensive posture to a foreign entity. For commercial enterprises, this is a competitive risk. For defence and government organizations, this is a national security vulnerability.
Classified Network Training: The Air-Gap Imperative
India's armed forces, intelligence agencies, and strategic installations operate classified networks that are air-gapped from the internet by design. Training cyber warriors for these environments requires a cyber range platform that can operate under the same constraints:
Zero Internet Dependency
The platform must function with absolutely no internet connectivity. This means no cloud licensing, no content streaming from external servers, no software update dependencies, and no telemetry callbacks. Every component -- orchestration, content, scoring, analytics, and administration -- must run entirely on-premises.
No Foreign Callbacks or Telemetry
Many foreign cyber range platforms include telemetry that reports usage data, licensing status, or platform health to the vendor's cloud infrastructure. In an air-gapped classified environment, any outbound communication is a security violation. The platform must be verifiably free of any external communication.
Full Source Code Audit Capability
For classified deployments, the customer must be able to audit the platform's source code to verify that no backdoors, telemetry, or unauthorized data collection exists. Foreign vendors under their national export control laws may be unable to provide source code access for audit.
Sovereign Support and Maintenance
Platform maintenance, updates, and troubleshooting must be handled by cleared Indian personnel. Dependency on foreign vendor support teams for classified installations is operationally impractical and a security risk.
DAP 2026 and the Buy Indian-IDDM Mandate
The Defence Acquisition Procedure (DAP) 2020, updated in subsequent revisions through 2026, establishes a clear hierarchy of procurement priorities for the Indian armed forces. The highest-priority category is Buy Indian-IDDM (Indigenously Designed, Developed, and Manufactured), followed by Buy Indian, Buy and Make (Indian), Buy (Global), and other categories.
For cyber range procurement, this means:
- Platforms designed and developed in India by Indian companies receive the highest procurement priority.
- Foreign platforms may be considered only when no Indian alternative meets the technical requirements -- a bar that is increasingly difficult to justify as Indian platforms mature.
- The IDDM classification requires that the Intellectual Property (IP) resides with an Indian entity and the design, development, and manufacturing (deployment) occur in India.
- Joint ventures where the Indian partner merely resells or integrates a foreign platform do not qualify as IDDM.
- The Make in India initiative further incentivizes procurement from indigenous developers with customs duty exemptions and offset obligations for foreign vendors.
Strategic context: The Indian defence budget for 2025-26 allocates Rs 6.81 lakh crore, with increasing emphasis on indigenous procurement. The Defence Cyber Agency, established in 2019, has an expanding mandate for cyber capability building across all three services. The convergence of budget allocation, policy mandate, and operational need creates a significant opportunity for sovereign cyber range platforms.
The Risks of Foreign Platform Dependency
Beyond data sovereignty and DAP compliance, relying on foreign cyber range platforms introduces several strategic risks that are often underestimated during procurement:
Export Control and Sanctions Risk
Foreign cyber range platforms may be subject to their home country's export control regulations (such as the US EAR/ITAR or EU dual-use regulations). Changes in geopolitical relationships could result in license denials, technology restrictions, or forced discontinuation. Israel's CybExer, Estonia's Cybexer Technologies, and US-based platforms are all subject to their respective national export controls -- creating supply chain risk for Indian customers.
USD Pricing and FX Risk
Foreign vendors price in USD, creating budgetary uncertainty due to exchange rate fluctuations. A 10% depreciation of the Indian Rupee against the USD translates directly to a 10% increase in platform costs. Indian-built platforms with INR pricing eliminate this risk and simplify government budgeting.
Telemetry and Intelligence Collection
Some foreign platforms include telemetry that reports anonymized usage patterns, exercise types, and platform performance to the vendor's cloud infrastructure. Even "anonymized" data can reveal patterns about training cadence, focus areas, and organizational priorities when aggregated over time. For defence customers, any outbound data flow is unacceptable.
Vendor Discontinuation Risk
Foreign vendors may exit the Indian market, be acquired, change their product strategy, or discontinue support for on-premises deployments in favour of SaaS-only models. When this happens, organizations face costly migration or end up with an unsupported platform. An indigenous platform with source code access eliminates this risk.
What "Sovereign" Means Technically
The term "sovereign" is often used loosely in marketing. For a cyber range platform, sovereign means the following concrete technical attributes:
India's Strategic Advantage in Building Indigenous Capability
India is uniquely positioned to build world-class sovereign cyber range capability. The foundations are already in place:
- India produces over 1.5 million engineering graduates annually, with a deep talent pool in software development, cloud infrastructure, and cybersecurity.
- India's open-source community is among the world's largest. Sovereign platforms built on open-source infrastructure (OpenStack, Kubernetes, Terraform) avoid proprietary vendor lock-in.
- India's domestic cloud infrastructure is maturing rapidly, with sovereign cloud providers (NIC, Yotta, CtrlS, Nxtgen) offering on-premises and government cloud options.
- The regulatory environment (DPDP Act, CERT-In Directions, RBI CSCRF, SEBI CSCRF) creates domestic demand that can sustain indigenous platform development.
- CERT-In has conducted 122 cyber drills for 1,570 organizations, demonstrating national-scale demand for realistic cyber exercises. A sovereign platform could serve this entire ecosystem.
- India's armed forces, with the third-largest active duty personnel globally, represent a training market of hundreds of thousands of potential cyber range users -- dwarfing the defence markets of smaller nations that currently lead in cyber range technology.
The question is not whether India can build a sovereign cyber range platform -- India has the talent, the infrastructure, and the market demand. The question is whether India will invest in this capability now, or continue to depend on foreign platforms while the window of strategic opportunity closes.
The Scale of the Opportunity: CERT-In's Cyber Drill Ecosystem
CERT-In's cyber drill program illustrates the scale of India's requirement. With 122 drills conducted for 1,570 organizations across sectors -- finance, energy, telecom, transport, health, and government -- CERT-In has established the world's largest national cyber drill program.
Yet these drills currently operate on a mix of proprietary tools, manual scenario injection, and limited infrastructure simulation. A sovereign cyber range platform that integrates with CERT-In's drill framework could transform these exercises from document-based tabletops into live-fire technical exercises with realistic infrastructure, automated scoring, and measurable outcomes.
The potential impact is enormous: 1,570 organizations, each conducting quarterly drills, would generate over 6,000 exercises annually. At this scale, only a platform-based approach -- not consulting-based or manual drill management -- can deliver consistent quality and measurable improvement across the ecosystem.
Conclusion: Sovereignty Is Not a Feature -- It Is a Foundation
The case for a sovereign cyber range platform in India is not about nationalism or protectionism. It is about strategic risk management. An organization that trains its cyber defenders on a foreign platform that phones home to overseas servers, is subject to foreign export controls, and could be discontinued at the vendor's discretion has introduced a supply chain vulnerability into its most critical capability building function.
India's defence, government, and critical infrastructure sectors need a cyber range platform that is designed in India, built in India, hosted in India, and supported by Indians with the appropriate security clearances. The IP must reside in India. The source code must be auditable. The platform must operate in a complete air-gap with zero external dependencies.
The technology to build such a platform exists today. The talent exists in India. The demand -- from the Defence Cyber Agency, CERT-In, RBI, SEBI, and hundreds of enterprises -- is real and growing. What remains is the decision to invest in indigenous capability rather than accepting foreign dependency as the default. For a nation that has built indigenous fighter jets, nuclear submarines, and a space program, a sovereign cyber range platform is not just achievable -- it is overdue.