Cyber Law Academy
Part 13.1

CERT-In 2022 Directions

"6-Hour Rule and Mandatory Compliance"

Indian Computer Emergency Response Team (CERT-In) - History, April 2022 Mandatory Directions, Scope, Applicability, 20 Incident Types, Timeline, and Penalties under IT Act Section 70B.

1.1

CERT-In - Introduction and History

CERT-In Overview
AspectDetails
Full FormIndian Computer Emergency Response Team
Establishment2004 under IT Act 2000
Legal BasisIT Act Section 70B (inserted by Amendment 2008)
Parent MinistryMinistry of Electronics and IT (MeitY)
HeadquartersNew Delhi
FunctionNational nodal agency for cyber incidents
1.2

28 April 2022 Directions - Key Provisions

CERT-In Directions 2022 - Scope

Applicable To:

1. Service Providers

2. Intermediaries

3. Data Centres

4. Body Corporates

5. Government Organizations

Effective Date: 28 June 2022 (60 days from notification)

Extended for MSMEs/Startups: 25 September 2022

Key RequirementTimeline/DetailsNon-Compliance Penalty
Incident ReportingWithin 6 hours of noticingIT Act Section 70B(7) - Up to 1 year imprisonment or fine up to Rs. 1 lakh
Log Retention180 days (rolling)IT Act penalties apply
NTP SynchronizationICT systems synced with Indian Standard Time (IST)Compliance failure penalties
Point of ContactDesignated POC within organizationMust be available 24x7
VPN Provider KYCMaintain subscriber records for 5 yearsService disruption possible
1.3

20 Types of Mandatory Reportable Incidents

Reportable Cyber Incidents (within 6 hours)
#Incident TypeExample
1Targeted scanning/probingPort scanning, vulnerability scanning
2Compromise of critical systemsServer compromise, admin access breach
3Unauthorized access to IT systemsHacking, credential theft
4Defacement of websitesWebsite tampering
5Malicious code attacksVirus, ransomware, worm
6Attack on serversSQL injection, XSS attacks
7Identity theft, spoofing, phishingEmail spoofing, fake websites
8Denial of Service (DoS/DDoS)Traffic flooding attacks
9Attack on critical infrastructurePower grid, banking systems
10Attack on applications (e-governance, e-commerce)Payment gateway attacks
11Data breachPersonal data leak
12Data leakConfidential information exposure
13Attack on IoT devicesSmart device compromise
14Attack on digital payment systemsUPI, IMPS fraud attacks
15Attack through malicious mobile appsFake banking apps
16Fake mobile appsImpersonation apps
17Unauthorized access to social media accountsAccount takeover
18Attacks on cloud computing systemsCloud infrastructure breach
19Attacks on AI/ML systemsModel poisoning, adversarial attacks
20Any other incident not listed aboveNovel attack types
1.4

Maharashtra Context - Implementation

Maharashtra Cyber and CERT-In Coordination

Maharashtra Cyber Cell: Works in coordination with CERT-In for incident response

Reporting Path:

1. Report to CERT-In (mandatory, within 6 hours)

2. Parallel report to Maharashtra Cyber (if criminal)

3. Sector regulator (RBI, SEBI, IRDAI as applicable)

Mumbai IT/ITES Companies: Must comply with CERT-In directions, maintain POC, and ensure log retention

Pune IT Hub: Large number of IT companies must implement SOC/SIEM for compliance

Practical Scenario - Maharashtra IT Company
Compliance Example
A Pune-based IT company detects ransomware at 2:00 AM. Action Required: (1) Report to CERT-In by 8:00 AM (6-hour rule); (2) Preserve logs (180 days); (3) Notify affected clients; (4) If personal data involved, consider DPDPA obligations; (5) File NC/FIR at cyber police station if financial loss.
1.5

Penalties and Consequences

ViolationLegal ConsequenceBusiness Impact
Failure to report incident within 6 hoursSection 70B(7) - Up to 1 year / Rs. 1 lakhRegulatory scrutiny, reputation damage
Non-maintenance of logs (180 days)Compliance failure, investigation hindranceUnable to prove defense, increased liability
No designated POCDirection non-complianceCommunication gaps during incident
VPN provider KYC failureService suspension possibleBusiness disruption

Key Points - Part 13.1