"Time is Critical in Cybersecurity"
Mandatory 6-hour reporting timeline, 20 incident types, CERT-In portal usage, reporting format, escalation matrix, and practical documentation requirements.
Important Clarification: The 6-hour window begins from the moment the incident is "noticed" or becomes known to the organization, NOT from when it occurred.
Example: If a breach occurred at 2:00 AM but was detected at 10:00 AM, the 6-hour deadline is 4:00 PM (not 8:00 AM).
Implication: Strong monitoring systems help detect incidents early, giving more response time.
| Channel | Details | Use Case |
|---|---|---|
| Online Portal | https://www.cert-in.org.in | Primary reporting method |
| incident@cert-in.org.in | Alternative/backup method | |
| Phone | 1800-11-4949 (Toll Free) | Urgent incidents, follow-up |
| Fax | 1800-11-6969 | Documentation backup |
Organization Details:
1. Organization name, address, sector
2. Point of Contact (POC) - Name, designation, mobile, email
3. Alternate POC details
Incident Details:
4. Incident type (from 20 categories)
5. Date and time of occurrence
6. Date and time of detection
7. Systems affected (IP addresses, hostnames)
8. Initial impact assessment
Technical Details:
9. Attack vectors identified
10. Indicators of Compromise (IOCs)
11. Immediate actions taken
12. Evidence preserved (log files, memory dumps)
| Sector | Primary Regulator | Reporting Timeline | Additional To |
|---|---|---|---|
| Banking | RBI | 2-6 hours | CERT-In + RBI + IDRBT |
| Capital Markets | SEBI | 6 hours | CERT-In + SEBI |
| Insurance | IRDAI | 6 hours | CERT-In + IRDAI |
| Telecom | DoT/TRAI | 6 hours | CERT-In + DoT |
| Power | CEA/NCIIPC | Immediate | CERT-In + NCIIPC + CEA |
| Healthcare | MoHFW | 6 hours | CERT-In + Ministry notification |
| E-commerce | MeitY | 6 hours | CERT-In |
| General IT | MeitY | 6 hours | CERT-In |
Criminal Incidents: In addition to CERT-In, file NC/FIR at Maharashtra Cyber
Data Breach: Consider DPDPA obligations to Data Protection Board
Banking/Finance: Report to RBI Mumbai office
Listed Companies: SEBI disclosure requirements may apply
Immediate (within 1 hour):
1. System logs - Firewall, IDS/IPS, application logs
2. Network traffic captures (if feasible)
3. Memory dump of affected systems
4. Screenshots of anomalies
Within 24 hours:
5. Full disk images of affected systems
6. User access logs
7. Email headers (for phishing incidents)
8. Malware samples (quarantined)
Ongoing:
9. Timeline documentation
10. Communication records
11. Remediation actions log
Scenario: E-commerce company detected ransomware on Friday evening, delayed reporting until Monday.
Consequence: CERT-In issued show-cause notice; regulatory scrutiny increased; reputation damage when breach became public.
Lesson: 6-hour rule applies regardless of weekends/holidays. Maintain 24x7 incident response capability.
Scenario: Bank reported phishing attack but omitted number of affected customers and financial loss estimate.
Consequence: Multiple follow-up queries from CERT-In and RBI; extended investigation period; additional compliance burden.
Lesson: Provide complete information even if approximate; update as investigation progresses.
1. Pre-defined roles and responsibilities
2. Escalation matrix with contact details
3. Pre-approved report templates
4. Communication protocols (internal and external)
5. Legal team involvement triggers
6. Regular drills and tabletop exercises