"6-Hour Rule and Mandatory Compliance"
Indian Computer Emergency Response Team (CERT-In) - History, April 2022 Mandatory Directions, Scope, Applicability, 20 Incident Types, Timeline, and Penalties under IT Act Section 70B.
| Aspect | Details |
|---|---|
| Full Form | Indian Computer Emergency Response Team |
| Establishment | 2004 under IT Act 2000 |
| Legal Basis | IT Act Section 70B (inserted by Amendment 2008) |
| Parent Ministry | Ministry of Electronics and IT (MeitY) |
| Headquarters | New Delhi |
| Function | National nodal agency for cyber incidents |
Applicable To:
1. Service Providers
2. Intermediaries
3. Data Centres
4. Body Corporates
5. Government Organizations
Effective Date: 28 June 2022 (60 days from notification)
Extended for MSMEs/Startups: 25 September 2022
| Key Requirement | Timeline/Details | Non-Compliance Penalty |
|---|---|---|
| Incident Reporting | Within 6 hours of noticing | IT Act Section 70B(7) - Up to 1 year imprisonment or fine up to Rs. 1 lakh |
| Log Retention | 180 days (rolling) | IT Act penalties apply |
| NTP Synchronization | ICT systems synced with Indian Standard Time (IST) | Compliance failure penalties |
| Point of Contact | Designated POC within organization | Must be available 24x7 |
| VPN Provider KYC | Maintain subscriber records for 5 years | Service disruption possible |
| # | Incident Type | Example |
|---|---|---|
| 1 | Targeted scanning/probing | Port scanning, vulnerability scanning |
| 2 | Compromise of critical systems | Server compromise, admin access breach |
| 3 | Unauthorized access to IT systems | Hacking, credential theft |
| 4 | Defacement of websites | Website tampering |
| 5 | Malicious code attacks | Virus, ransomware, worm |
| 6 | Attack on servers | SQL injection, XSS attacks |
| 7 | Identity theft, spoofing, phishing | Email spoofing, fake websites |
| 8 | Denial of Service (DoS/DDoS) | Traffic flooding attacks |
| 9 | Attack on critical infrastructure | Power grid, banking systems |
| 10 | Attack on applications (e-governance, e-commerce) | Payment gateway attacks |
| 11 | Data breach | Personal data leak |
| 12 | Data leak | Confidential information exposure |
| 13 | Attack on IoT devices | Smart device compromise |
| 14 | Attack on digital payment systems | UPI, IMPS fraud attacks |
| 15 | Attack through malicious mobile apps | Fake banking apps |
| 16 | Fake mobile apps | Impersonation apps |
| 17 | Unauthorized access to social media accounts | Account takeover |
| 18 | Attacks on cloud computing systems | Cloud infrastructure breach |
| 19 | Attacks on AI/ML systems | Model poisoning, adversarial attacks |
| 20 | Any other incident not listed above | Novel attack types |
Maharashtra Cyber Cell: Works in coordination with CERT-In for incident response
Reporting Path:
1. Report to CERT-In (mandatory, within 6 hours)
2. Parallel report to Maharashtra Cyber (if criminal)
3. Sector regulator (RBI, SEBI, IRDAI as applicable)
Mumbai IT/ITES Companies: Must comply with CERT-In directions, maintain POC, and ensure log retention
Pune IT Hub: Large number of IT companies must implement SOC/SIEM for compliance
| Violation | Legal Consequence | Business Impact |
|---|---|---|
| Failure to report incident within 6 hours | Section 70B(7) - Up to 1 year / Rs. 1 lakh | Regulatory scrutiny, reputation damage |
| Non-maintenance of logs (180 days) | Compliance failure, investigation hindrance | Unable to prove defense, increased liability |
| No designated POC | Direction non-compliance | Communication gaps during incident |
| VPN provider KYC failure | Service suspension possible | Business disruption |