CERT-In Cybersecurity Compliance 2026: Rules Every Business Must Follow

Dhanush Prabha
15 min read 80K views

Every business operating in India, from a two-person startup to a multinational data center, must report cybersecurity incidents to CERT-In within 6 hours of detection. This is not a guideline. It is a legal mandate under the CERT-In Directions dated April 28, 2022 (effective June 27, 2022), issued under Section 70B of the Information Technology Act, 2000. Non-compliance carries a fine of up to ₹1 lakh and imprisonment of up to 1 year. With 20 categories of reportable incidents, mandatory 180-day log retention, and NTP synchronization requirements, the compliance burden affects startups, SMEs, VPN providers, cloud platforms, and traditional businesses alike. Here is your complete breakdown of CERT-In cybersecurity compliance requirements for 2026, including what to report, how to report it, and what it will cost your business.

  • CERT-In Directions (April 28, 2022) mandate 6-hour reporting of 20 categories of cybersecurity incidents for all organizations in India
  • Penalties: up to ₹1 lakh fine and 1 year imprisonment under IT Act Section 70B. DPDP Act adds penalties up to ₹250 crore for data breaches
  • VPN, cloud, and VPS providers must maintain subscriber KYC and logs for 5 years
  • Implementation costs for SMEs range from ₹50,000 to ₹5 lakh depending on size and infrastructure
  • All system logs must be retained for 180 days within India and made available to CERT-In on demand

CERT-In (Indian Computer Emergency Response Team) is India's national nodal agency for cybersecurity incident response, operating under the Ministry of Electronics and Information Technology (MeitY). Established under Section 70B of the Information Technology Act, 2000, CERT-In collects, analyzes, and disseminates information on cybersecurity incidents across the country. It issues advisories, coordinates emergency response, and sets mandatory cybersecurity standards for all organizations operating in India.

Unlike advisory bodies in some countries, CERT-In has enforcement power. The Directions issued on April 28, 2022 carry the force of law. Non-compliance is a criminal offence. Think of CERT-In as the cybersecurity equivalent of the income tax department: you can ignore it, but the consequences catch up fast. The agency operates 24x7 through its Incident Response Help Desk, and its mandate covers private companies, government entities, academic institutions, and critical infrastructure operators.

Governed by Section 70B of the Information Technology Act, 2000. Administered by CERT-In under the Ministry of Electronics and IT (MeitY). Reporting portal: www.cert-in.org.in.

The April 2022 CERT-In Directions: What Changed

Before April 2022, India had voluntary cybersecurity incident reporting with no fixed timeline. The CERT-In Directions dated April 28, 2022 changed the entire landscape by introducing India's first mandatory, time-bound cybersecurity incident reporting framework. These directions came into effect on June 27, 2022 and apply to every entity in India without exception.

6-Hour Mandatory Reporting Window

The headline change: organizations must report cybersecurity incidents to CERT-In within 6 hours of noticing or being informed of the incident. This is faster than the EU's GDPR (72 hours) and significantly more aggressive than most global equivalents. The clock starts the moment your IT team, security vendor, or any employee detects the incident, not when the investigation concludes. You report first, investigate concurrently.

Expanded Scope of Reportable Incidents

The 2022 Directions expanded the list to 20 categories of mandatory reportable incidents, covering everything from ransomware to fake mobile apps. Previously, only a vague set of "cyber incidents" required reporting. The new framework is explicit: if your organization experiences any of the 20 listed events, the 6-hour clock starts immediately.

Log Retention and System Requirements

All organizations must maintain ICT system logs for 180 days on a rolling basis within India. Organizations must synchronize system clocks with NIC or NPL time servers (or servers traceable to them). VPN, VPS, and cloud providers face additional requirements including 5-year KYC and log retention. These requirements ensure that forensic investigations have reliable, timestamped evidence.

Stay Compliant with Expert Support

IncorpX helps businesses set up compliance frameworks covering cybersecurity, data protection, and annual filings.

Explore Compliance Services

20 Types of Cyber Incidents That Must Be Reported

CERT-In specifies 20 distinct categories of incidents that trigger the 6-hour reporting obligation. Understanding what qualifies is critical because under-reporting is as much a violation as non-reporting. Here is the complete list.

#Incident CategoryExample
1Targeted scanning/probing of critical networksPort scanning of government or critical infra servers
2Compromise of critical systems/informationUnauthorized access to financial system databases
3Unauthorized access to IT systems/dataEmployee account compromised via credential stuffing
4Defacement of website or intrusion into a websiteCompany website altered by attacker to display messages
5Malicious code attacks (virus, worm, Trojan, bots)Spyware installed through phishing email attachment
6Attack on servers (database, mail, DNS)SQL injection attack on application database
7Identity theft, spoofing, and phishing attacksFake CEO email requesting wire transfer
8Denial of Service (DoS) and DDoS attacksVolumetric traffic flood crashing e-commerce website
9Attacks on critical infrastructure, SCADA, and OT systemsMalware targeting power grid control systems
10Attacks on IoT devices and associated systemsBotnet recruitment through vulnerable smart devices
11Attacks or malicious activity affecting cloud computingUnauthorized access to cloud-hosted customer database
12Attacks or suspicious activity affecting digital payment systemsFraudulent UPI transaction attempts at scale
13Ransomware attacksFiles encrypted with demand for cryptocurrency payment
14CryptojackingUnauthorized use of server CPU for cryptocurrency mining
15Data breach or data leakCustomer records exposed through unsecured API endpoint
16Data lossAccidental or malicious deletion of critical business data
17Attacks through malicious mobile appsFake version of company app on third-party store
18Fake mobile appsPhishing app impersonating banking institution
19Unauthorized access to social media accountsCompany X (Twitter) account posting unauthorized content
20Attacks or malicious activity affecting e-Governance platformsIntrusion into state government portal

If your organization experiences any of the 20 listed incidents and fails to report within 6 hours, you face penalties under Section 70B of the IT Act. "We didn't know it was reportable" is not a valid defence. Train your team to recognize all 20 categories.

Who Must Comply: No Size-Based Exemptions

Unlike regulations such as EPF (mandatory above 20 employees) or tax audit (above ₹1 crore turnover), CERT-In compliance has no minimum threshold. Every business that uses IT systems, websites, or cloud services falls within scope. This is the part that catches most small businesses off guard.

Entities Explicitly Covered

  • All companies: Private Limited Companies, LLPs, OPCs, and partnerships
  • MSMEs and startups: Including DPIIT-recognized startups
  • Data centres and hosting providers
  • VPN service providers (Indian and foreign serving Indian users)
  • VPS providers and cloud service providers
  • Managed Security Service Providers (MSSPs)
  • Government organizations at all levels
  • Body corporates defined under IT Act, 2000
  • E-commerce platforms
  • Cryptocurrency and virtual asset service providers

If your business has a website, uses email, stores customer data on the cloud, or runs any software connected to the internet, you are within CERT-In's reporting mandate. A freelance web developer with a personal VPS is just as obligated as Infosys.

Key Compliance Requirements: The Full Checklist

CERT-In compliance goes beyond just reporting incidents. The 2022 Directions impose ongoing operational requirements that demand changes to how your business manages its IT infrastructure. Here is the complete compliance framework.

1. Incident Reporting Within 6 Hours

Report any of the 20 incident types to CERT-In through the portal (www.cert-in.org.in), email (incident@cert-in.org.in), or phone (1800-11-4949) within 6 hours. Include incident type, affected systems, detection time, IP addresses involved, and initial impact assessment. Designate a person responsible for CERT-In communication before an incident occurs.

2. ICT Log Retention for 180 Days

Maintain logs from firewalls, intrusion detection systems, servers, applications, and network devices for a minimum of 180 days on a rolling basis. Store logs within Indian jurisdiction. Use centralized log management or SIEM (Security Information and Event Management) tools. Ensure logs include timestamp, source IP, destination IP, event type, and user identity where applicable.

3. NTP Synchronization

Synchronize all system clocks to National Informatics Centre (NIC) or National Physical Laboratory (NPL) time servers. Alternatively, use global NTP servers traceable to Indian time standards. Consistent timestamps across your infrastructure are essential for forensic accuracy. Configure automatic NTP sync on all servers, workstations, and network devices.

4. Designated Point of Contact

Register a point of contact (POC) with CERT-In. This person (or team) is responsible for receiving alerts, coordinating incident response, and submitting reports. For startups, this is typically the CTO or IT head. For larger organizations, appoint a Chief Information Security Officer (CISO). Keep the POC registration updated if personnel changes occur.

5. VPN/Cloud Provider Specific Requirements

If you provide VPN, VPS, or cloud services, you must maintain: subscriber KYC with validated name, email, IP address, and contact details, usage logs for 5 years after cancellation of the subscriber's service, records of IP address allocation with timestamps, and cooperation with CERT-In investigations. These records must be produced within a reasonable time when requested.

Based on our experience helping 10,000+ businesses with compliance frameworks, the biggest mistake SMEs make is treating CERT-In compliance as a one-time exercise. It requires continuous log management, periodic security audits, and regular team training. Budget 2 to 4 hours per month for ongoing compliance maintenance after your initial setup.

Penalties for Non-Compliance: IT Act and DPDP Act

The consequences of ignoring CERT-In compliance are both criminal and financial. Two separate laws create overlapping penalty frameworks that can stack against a non-compliant organization.

IT Act, 2000 Penalties (Section 70B)

ViolationPenaltyProvision
Failure to report cyber incident within 6 hoursFine up to ₹1 lakh + imprisonment up to 1 yearSection 70B(7), IT Act
Failure to provide information/logs to CERT-InFine up to ₹1 lakh + imprisonment up to 1 yearSection 70B(7), IT Act
Non-compliance with CERT-In directionsFine up to ₹1 lakh + imprisonment up to 1 yearSection 70B(7), IT Act
Failure to maintain logs for 180 daysFine up to ₹1 lakh + imprisonment up to 1 yearSection 70B(7), IT Act

DPDP Act, 2023 Penalties (For Data Breaches)

ViolationPenaltyProvision
Failure to notify Data Protection Board of personal data breachUp to ₹200 croreDPDP Act, 2023
Failure to implement reasonable security safeguardsUp to ₹250 croreDPDP Act, 2023
Non-compliance with Data Protection Board ordersUp to ₹50 crore per instanceDPDP Act, 2023

A single data breach that goes unreported can trigger penalties under both laws simultaneously. A startup that suffers a customer data leak faces a ₹1 lakh fine under the IT Act for not reporting to CERT-In, plus up to ₹250 crore under the DPDP Act for failing to notify the Data Protection Board and affected users. The lesson: compliance is cheaper than the alternative.

Protect Your Business with Proper Registration

Registered companies have better access to compliance frameworks. Start your Pvt Ltd registration at ₹5,999.

Register Your Company

CERT-In Compliance Checklist for Startups and SMEs

If you are a startup or SME and CERT-In compliance feels overwhelming, this prioritized, step-by-step checklist breaks the process into manageable tasks. Complete these in order and your organization will meet the baseline requirements within 2 to 4 weeks.

StepAction ItemTimelineEstimated Cost (₹)
1Designate a cybersecurity point of contact and register with CERT-InDay 1Free
2Install and configure NTP synchronization on all systemsDay 1 to 2Free (open-source NTP clients)
3Deploy centralized log management (SIEM or log aggregator)Week 1₹10,000 to ₹50,000/year
4Install firewall and endpoint protection on all devicesWeek 1 to 2₹15,000 to ₹1 lakh/year
5Create an incident response plan with CERT-In reporting templatesWeek 2₹10,000 to ₹30,000 (consultant)
6Train team on identifying the 20 reportable incident typesWeek 2 to 3₹5,000 to ₹15,000 (training session)
7Configure 180-day log retention with automated backup within IndiaWeek 3₹5,000 to ₹20,000/year (storage)
8Conduct a baseline vulnerability assessmentWeek 3 to 4₹20,000 to ₹1 lakh
9Implement access controls and multi-factor authenticationWeek 4₹5,000 to ₹30,000/year
10Schedule a quarterly security review and drillOngoing₹10,000 to ₹25,000/quarter

Micro startup (1 to 5 people): ₹50,000 to ₹1.5 lakh initial setup. Small business (5 to 25 people): ₹1 lakh to ₹3 lakh. Medium enterprise (25 to 100 people): ₹2 lakh to ₹5 lakh. Annual maintenance adds 30% to 40% of the initial cost. Open-source tools (Wazuh, ELK Stack, pfSense) can reduce costs by 40% to 60%.

Building an Incident Response Plan

An incident response plan (IRP) is the document your team follows when a cybersecurity event occurs. Without one, the 6-hour reporting window will slip by while your team figures out who does what. A good IRP turns panic into process.

Essential Components of an IRP

  1. Incident Classification Matrix: Map all 20 CERT-In reportable categories to severity levels (Critical, High, Medium, Low). Define what triggers automated alerts versus manual investigation.
  2. Notification Chain: Define who gets notified first (IT lead), who approves external communication (management), and who contacts CERT-In (designated POC). Include phone numbers, not just emails.
  3. Evidence Preservation: Before cleaning up, preserve system images, memory dumps, log files, and network packet captures. Forensic evidence is required for CERT-In investigation and potential legal proceedings.
  4. CERT-In Report Template: Pre-fill a template with your organization details, designated contact, system inventory, and network topology. During an incident, you only need to fill in incident-specific fields.
  5. Recovery Procedures: Define steps for system isolation, malware removal, data restoration from backups, and service resumption. Include rollback procedures for each critical system.
  6. Post-Incident Review: Within 7 days of an incident, conduct a review. Document what happened, how it was detected, response timeline, and improvements needed. Share findings with the team.

Quarterly Drills: Test Before Reality Does

Run tabletop exercises every quarter. Simulate a ransomware attack on a Friday evening (attackers' favourite timing) and time your team's response. Can they classify the incident within 30 minutes? Can they file the CERT-In report within 6 hours? If not, revise the IRP. Organizations that conduct quarterly drills respond 4x faster than those that have a plan but never test it.

Many SMEs create an incident response plan at incorporation and never update it. Staff turnover, infrastructure changes, and new CERT-In advisories require IRP updates at least every 6 months. An outdated IRP is almost as bad as none at all.

CERT-In Compliance and the DPDP Act: Dual Obligation

The Digital Personal Data Protection Act, 2023 creates a separate but overlapping compliance framework for data breaches that businesses must navigate alongside CERT-In rules. Understanding where these two regimes intersect saves you from reporting gaps.

Where CERT-In Rules and DPDP Act Overlap

RequirementCERT-In DirectionsDPDP Act, 2023
Reporting timeline6 hours from detection"Without delay" (specific timeline pending rules)
Report to whomCERT-InData Protection Board + affected individuals
ScopeAll 20 cyber incident typesPersonal data breaches only
Penalties₹1 lakh fine + 1 year imprisonmentUp to ₹250 crore per violation
Log retention180 days within IndiaData retention per consent terms
ApplicabilityAll entities with IT systemsData fiduciaries processing personal data

A customer database breach triggers both frameworks simultaneously. You must report to CERT-In within 6 hours and notify the Data Protection Board and affected individuals under the DPDP Act. Having separate workflows for each reporting obligation prevents critical delays. Most compliance consultants now recommend a unified breach notification workflow that satisfies both requirements in parallel.

Need ISO Certification for Cybersecurity?

ISO 27001 certification demonstrates your cybersecurity commitment. CERT-In compliance gets you 60% to 70% ready.

Get ISO Certification

Special Rules for VPN, Cloud, and VPS Providers

The 2022 Directions imposed the most disruptive requirements on VPN and cloud service providers. Multiple international VPN companies pulled their Indian servers after these rules came into effect. If your business provides VPN, VPS, or cloud services, here are your specific obligations.

Mandatory Subscriber KYC

Validate and maintain the following for every subscriber: full name, email address, physical address, valid phone number, purpose of using the service, IP addresses allocated, and ownership pattern (for business subscribers). This data must be retained for 5 years after service cancellation. Anonymous or pseudonymous account registration is not permitted for services operating in India.

5-Year Activity Log Retention

Beyond the standard 180-day rolling log retention, VPN, VPS, and cloud providers must maintain activity logs and subscriber data for 5 years, even after the subscriber terminates service. These logs must be produced to CERT-In upon request. The storage and compliance cost is significant: a mid-size VPN provider serving 10,000 Indian users can expect ₹10 lakh to ₹25 lakh annually in storage and log management infrastructure.

IP Address Record Keeping

Maintain accurate records of IP addresses allocated to subscribers with timestamps. If using dynamic IP allocation, log every IP assignment and de-allocation event with the subscriber identity. This enables CERT-In to trace malicious activity to specific users. Static IP assignment simplifies compliance but is not always operationally feasible for large providers.

CERT-In Compliance vs Global Standards

India's 6-hour reporting mandate is among the strictest in the world. Placing it alongside global equivalents helps businesses operating across jurisdictions understand where they need to calibrate their response capabilities.

FrameworkReporting TimelineJurisdictionKey Penalty
CERT-In (India)6 hoursIndia₹1 lakh + 1 year imprisonment
GDPR (EU)72 hoursEuropean UnionUp to 4% of global turnover or EUR 20 million
NIS2 Directive (EU)24 hours (early warning) + 72 hours (detailed)European UnionUp to EUR 10 million or 2% of global turnover
CIRCIA (USA)72 hours (incidents) + 24 hours (ransomware)United StatesSubpoenas, civil action, contempt of court
PDPA (Singapore)"As soon as practicable" within 3 daysSingaporeUp to SGD 1 million

The 6-hour window is uniquely challenging. While GDPR gives 72 hours, many Indian businesses with global operations now default to CERT-In's 6-hour standard across all geographies: if you can report in 6 hours, you can report anywhere. This is actually a competitive advantage for Indian businesses seeking global clients who value rapid incident response.

How to Report an Incident: Step-by-Step

When a cyber incident occurs, speed and accuracy both matter. Here is the exact process for filing a report with CERT-In within the 6-hour window.

  1. Detect and Classify (0 to 30 minutes): Identify the incident type from the 20-category list. Assign severity. Alert the designated POC and management. The 6-hour clock starts at detection.
  2. Preserve Evidence (30 to 60 minutes): Capture system logs, memory dumps, network traffic data, and screenshots. Do not reboot affected systems or delete logs. Isolate compromised systems from the network without shutting them down.
  3. Prepare CERT-In Report (1 to 3 hours): Use your pre-filled template. Include: incident type, date and time of detection, affected systems and IP addresses, initial impact assessment, containment measures taken, and contact details of reporting officer.
  4. Submit Report (3 to 5 hours): File via the CERT-In online portal at www.cert-in.org.in, or email to incident@cert-in.org.in. For critical infrastructure incidents, also call 1800-11-4949. Obtain acknowledgment/reference number from CERT-In.
  5. Continue Investigation (5+ hours): After the initial report, continue your internal investigation. Provide supplementary information to CERT-In as your investigation progresses. CERT-In may issue advisories or request additional technical details.
  6. Post-Incident Compliance: If the incident involves personal data, trigger your DPDP Act notification workflow separately. Conduct a post-incident review within 7 days. Update your IRP based on lessons learned.

CERT-In Compliance and ISO 27001: Complementary Frameworks

Businesses pursuing ISO 27001 certification will find that CERT-In compliance requirements map closely to several ISO controls. Implementing one framework accelerates the other, making the combined investment more efficient than tackling them separately.

Overlapping Controls

CERT-In RequirementISO 27001 ControlArea
Incident reporting within 6 hoursA.16.1 (Information Security Incident Management)Incident Management
180-day log retentionA.12.4 (Logging and Monitoring)Operations Security
NTP synchronizationA.12.4.4 (Clock Synchronisation)Operations Security
Access control and authenticationA.9 (Access Control)Access Management
Incident response planA.17 (Business Continuity)Continuity Planning
Vulnerability managementA.12.6 (Technical Vulnerability Management)Operations Security

Organizations that have completed CERT-In compliance are typically 60% to 70% ready for ISO 27001 certification. The reverse is also true: ISO 27001 certified companies often need only minor adjustments (primarily the 6-hour reporting procedure and CERT-In-specific log formats) to achieve CERT-In compliance. Budget ₹2 lakh to ₹8 lakh for the combined implementation depending on organizational size.

Practical Tips for SMEs on a Budget

Not every business can afford a dedicated cybersecurity team. These practical, cost-effective measures help SMEs meet CERT-In requirements without breaking the bank.

Free and Low-Cost Tools

  • Wazuh (Free): Open-source SIEM for log management, intrusion detection, and compliance monitoring. Meets the 180-day log retention requirement.
  • pfSense (Free): Open-source firewall with logging capabilities. Suitable for businesses with up to 50 users.
  • ClamAV (Free): Anti-malware for servers. Not enterprise-grade but adequate for basic endpoint protection on a budget.
  • Elastic Stack / ELK (Free tier): Centralized log aggregation and search. Excellent for meeting log retention and forensic readiness requirements.
  • Google Authenticator (Free): Adds multi-factor authentication to business accounts. Essential for access control compliance.

Outsourcing Options

If your startup has 5 to 20 employees and no in-house IT security expertise, consider a Managed Security Service Provider (MSSP). Monthly costs range from ₹15,000 to ₹50,000 for basic monitoring, log management, and incident response support. This is often cheaper than hiring a part-time security consultant and ensures 24x7 coverage for the 6-hour reporting requirement.

Register Your Startup and Build a Compliance Foundation

Starting with the right business structure simplifies compliance. Register your startup with IncorpX from ₹5,999.

Start Your Registration

Common Cybersecurity Threats Facing Indian Businesses in 2026

Understanding the current threat environment helps businesses prioritize their CERT-In compliance efforts. India experienced over 15 lakh cybersecurity incidents in 2024, with SMEs and startups being disproportionately targeted due to weaker security infrastructure.

Top 5 Threats for Indian SMEs

  1. Ransomware: The most common attack vector for Indian SMEs. Attackers encrypt business data and demand ₹5 lakh to ₹50 lakh in cryptocurrency. Recovery without backups costs 10x more than prevention. Always maintain offline backups.
  2. Business Email Compromise (BEC): Fake emails impersonating the CEO or CFO directing wire transfers. Indian businesses lost over ₹1,700 crore to BEC attacks in 2024. Train employees to verify payment requests through a separate channel.
  3. Phishing and Credential Theft: Fake login pages for GST portal, bank websites, or internal tools. Multi-factor authentication blocks 99% of credential theft attempts. Deploy it on all business accounts.
  4. Supply Chain Attacks: Compromised software updates or third-party plugins infecting your systems. Audit all third-party software dependencies. Use only verified and signed software packages.
  5. Cloud Misconfiguration: Publicly accessible databases, unsecured APIs, and overly permissive IAM roles. Cloud misconfigurations accounted for 30% of data breaches in India in 2024. Use cloud security posture management (CSPM) tools.

Summary

CERT-In's 6-hour incident reporting mandate, 180-day log retention, and NTP synchronization requirements apply to every business in India, with no size-based exemptions. Non-compliance attracts penalties under Section 70B of the IT Act (₹1 lakh fine, 1 year imprisonment) and, for data breaches, up to ₹250 crore under the DPDP Act, 2023. The implementation cost for SMEs (₹50,000 to ₹5 lakh) is trivial compared to the penalty exposure. Start with the 10-step compliance checklist, build an incident response plan, train your team on the 20 reportable incident categories, and consider professional compliance support to ensure ongoing adherence.

Get Expert Compliance Support for Your Business

From company registration to annual compliance, IncorpX handles your legal and regulatory requirements.

Talk to a Compliance Expert

Frequently Asked Questions

What is CERT-In and what does it do?
CERT-In (Indian Computer Emergency Response Team) is the national nodal agency under MeitY responsible for cybersecurity incident response. Established under Section 70B of the IT Act, 2000, CERT-In collects, analyzes, and disseminates information on cyber incidents, issues alerts and advisories, and coordinates emergency measures for cybersecurity events affecting Indian organizations and critical infrastructure.
What are the CERT-In Directions dated April 28, 2022?
The CERT-In Directions dated April 28, 2022 (effective June 27, 2022) mandate that all organizations in India report cybersecurity incidents to CERT-In within 6 hours of detection. The directions also require 180-day log retention within India, NTP synchronization, and KYC maintenance by VPN and cloud providers. Non-compliance attracts penalties under Section 70B of the IT Act, 2000.
Who must comply with CERT-In cybersecurity rules?
CERT-In compliance applies to all entities operating in India, including private companies, startups, MSMEs, data centers, cloud service providers, VPN providers, VPS providers, government organizations, and managed security service providers. There is no size-based exemption. Even a two-person startup processing customer data must report qualifying cyber incidents within the 6-hour window.
What is the 6-hour incident reporting rule?
Under the 2022 Directions, organizations must report cybersecurity incidents to CERT-In within 6 hours of noticing or being informed of the incident. This is one of the strictest timelines globally. Reports must be filed through the CERT-In portal at www.cert-in.org.in or via email to incident@cert-in.org.in, covering incident type, affected systems, and initial impact assessment.
What types of incidents must be reported to CERT-In?
CERT-In mandates reporting of 20 categories of incidents including: targeted scanning of critical networks, system compromise, unauthorized access, website defacement, malware attacks (ransomware, cryptojacking), phishing, identity theft, data breaches, DDoS attacks, attacks on IoT devices, attacks on servers and databases, fake mobile apps, and unauthorized access to social media accounts.
What are the penalties for not reporting cyber incidents?
Non-compliance with CERT-In reporting directions attracts penalties under Section 70B of the IT Act, 2000: a fine of up to ₹1 lakh and imprisonment of up to 1 year, or both. Additionally, repeated non-compliance can result in blocking of services, cancellation of licences, and reputational damage. The DPDP Act, 2023 imposes separate penalties of up to ₹250 crore for data breach failures.
What is the log retention requirement under CERT-In rules?
All organizations must maintain logs of their ICT systems for a rolling period of 180 days. These logs must be stored within India and provided to CERT-In upon request during an investigation. Logs include firewall logs, intrusion detection system logs, server access logs, application logs, and network device logs. VPN and cloud service providers must maintain logs and KYC records for 5 years.
What is required for VPN and cloud service providers?
VPN providers, cloud service providers, and VPS providers must: (1) maintain validated KYC data of all subscribers for 5 years after service cancellation, (2) maintain activity logs for 5 years, (3) assign static IP addresses or maintain accurate IP allocation records, and (4) cooperate with CERT-In investigations. These rules apply to both Indian and foreign providers serving Indian customers.
What is NTP synchronization and why is it required?
NTP (Network Time Protocol) synchronization ensures all system clocks across an organization are aligned to a standard time source. CERT-In requires organizations to synchronize with the NIC or NPL time servers (Indian government time servers) or with global NTP servers traceable to these. Accurate timestamps are critical for forensic analysis, incident correlation, and establishing a reliable timeline during cybersecurity investigations.
How does the DPDP Act 2023 relate to CERT-In compliance?
The Digital Personal Data Protection Act, 2023 complements CERT-In rules on data breaches. While CERT-In requires 6-hour incident reporting to the agency, the DPDP Act requires data fiduciaries to notify the Data Protection Board and affected individuals without delay after a personal data breach. Penalties under DPDP reach ₹250 crore. Businesses must maintain parallel breach notification workflows for both CERT-In and the Data Protection Board.
What should a cybersecurity incident response plan include?
An effective incident response plan must include: (1) designated CISO or incident response lead, (2) contact details for CERT-In reporting, (3) classification matrix for 20 reportable incident types, (4) internal escalation workflow within 2 hours of detection, (5) evidence preservation procedures, (6) communication templates for CERT-In and stakeholders, and (7) quarterly review and drill schedule.
How much does CERT-In compliance cost for an SME?
Implementation costs for SMEs range from ₹50,000 to ₹5 lakh depending on business size and existing infrastructure. A basic setup for a 10-person startup costs ₹50,000 to ₹1.5 lakh (firewall, endpoint protection, log management). A 50-person SME with servers and cloud infrastructure typically spends ₹2 lakh to ₹5 lakh (SIEM, intrusion detection, incident response retainer, security audit).
Is CERT-In compliance required for startups?
Yes. CERT-In compliance is mandatory for all entities, regardless of size. A Startup India registered company with even a single server, website, or cloud application must report qualifying cyber incidents within 6 hours. Startups handling customer personal data face additional obligations under the DPDP Act, 2023. The cost of non-compliance (up to ₹1 lakh fine plus imprisonment) far exceeds the cost of basic compliance setup.
What is a cybersecurity audit and how often is it needed?
A cybersecurity audit evaluates an organization's security posture against CERT-In requirements and industry standards. Government organizations and regulated entities must conduct audits annually. Private companies should conduct audits at least once per year or after any major infrastructure change. The audit covers network security, access controls, incident response readiness, log retention compliance, and vulnerability assessment. Certified auditors empaneled by CERT-In perform these audits.
How do I report a cyber incident to CERT-In?
Report incidents through: (1) CERT-In portal at www.cert-in.org.in using the online reporting form, (2) email to incident@cert-in.org.in with incident details, (3) phone helpline at 1800-11-4949, or (4) by post in urgent situations. The report must include: incident type, affected systems/IPs, date and time of detection, initial assessment, and contact details of the reporting officer. Submit within 6 hours of detection.
What is ransomware and must it be reported to CERT-In?
Ransomware is malicious software that encrypts an organization's data and demands payment for decryption. It falls under the mandatory reporting category of malware attacks in the CERT-In Directions. Organizations must report ransomware attacks within 6 hours, preserve forensic evidence, and not pay the ransom without consulting CERT-In and law enforcement. India reported over 1.5 lakh ransomware incidents in 2024, with SMEs being the primary targets.
Do foreign companies operating in India need CERT-In compliance?
Yes. Any entity providing services in India, whether incorporated domestically or abroad, must comply with CERT-In Directions. This includes foreign VPN providers, cloud services, SaaS companies, and any business with Indian customers or infrastructure. Foreign entities must designate a point of contact in India and maintain relevant logs within Indian jurisdiction. Non-compliance may result in service blocking within India.
What is the role of a CISO in CERT-In compliance?
While CERT-In does not mandate a full-time CISO for all organizations, it requires a designated point of contact for cybersecurity incident communication. Large enterprises and regulated entities appoint a Chief Information Security Officer (CISO). For SMEs and startups, this role can be handled by the IT head or an outsourced cybersecurity consultant. This person is responsible for incident classification, CERT-In coordination, and evidence preservation.
What is the difference between CERT-In and NCIIPC?
CERT-In handles cybersecurity incidents for all organizations in India and operates under MeitY. NCIIPC (National Critical Information Infrastructure Protection Centre) specifically protects critical information infrastructure in sectors like power, banking, telecom, transport, and defence, and operates under the National Technical Research Organisation. If your systems are classified as critical infrastructure, you report to both CERT-In and NCIIPC.
Can CERT-In compliance help with ISO 27001 certification?
Yes. CERT-In compliance requirements overlap significantly with ISO 27001 controls. Incident management (A.16), logging and monitoring (A.12.4), access control (A.9), and business continuity (A.17) are common to both frameworks. Organizations that have implemented CERT-In compliance are typically 60% to 70% ready for ISO 27001 certification. Both frameworks require documented incident response procedures, regular audits, and evidence preservation protocols.
Tags:
Written by Dhanush Prabha

Dhanush Prabha is the Chief Technology Officer and Chief Marketing Officer at IncorpX, where he leads product engineering, platform architecture, and data-driven growth strategy. With over half a decade of experience in full-stack development, scalable systems design, and performance marketing, he oversees the technical infrastructure and digital acquisition channels that power IncorpX. Dhanush specializes in building high-performance web applications, SEO and AEO-optimized content frameworks, marketing automation pipelines, and conversion-focused user experiences. He has architected and deployed multiple SaaS platforms, API-first applications, and enterprise-grade systems from the ground up. His writing spans technology, business registration, startup strategy, and digital transformation - offering clear, research-backed insights drawn from hands-on engineering and growth leadership. He is passionate about helping founders and professionals make informed decisions through practical, real-world content.Dhanush Prabha is the Chief Technology Officer and Chief Marketing Officer at IncorpX, where he leads product engineering, platform architecture, and data-driven growth strategy. With over half a decade of experience in full-stack development, scalable systems design, and performance marketing, he oversees the technical infrastructure and digital acquisition channels that power IncorpX. Dhanush specializes in building high-performance web applications, SEO and AEO-optimized content frameworks, marketing automation pipelines, and conversion-focused user experiences. He has architected and deployed multiple SaaS platforms, API-first applications, and enterprise-grade systems from the ground up. His writing spans technology, business registration, startup strategy, and digital transformation - offering clear, research-backed insights drawn from hands-on engineering and growth leadership. He is passionate about helping founders and professionals make informed decisions through practical, real-world content.