Section 4(2)(a) in The Information Technology (Information Security Practices and Procedures for Protected System) Rules, 2018
(a)Details of Critical Information Infrastructure (CII)declared as "Protected System", including dependencies on and of the said Critical Information Infrastructure.