CERT-In Directions 2026: MSP Compliance Checklist (India)
December 31, 2025|10:19 AM
Unlock Your Digital Potential
Whether it’s IT operations, cloud migration, or AI-driven innovation – let’s explore how we can support your success.
December 31, 2025|10:19 AM
Whether it’s IT operations, cloud migration, or AI-driven innovation – let’s explore how we can support your success.
The CERT-In (Indian Computer Emergency Response Team) Directions 2022, issued on April 28, 2022, under Section 70B of the Information Technology Act, 2000, establish mandatory cybersecurity incident reporting and information security practices for a wide range of entities operating in India. These directions significantly expand the scope and specificity of cybersecurity compliance requirements.
The directives apply to a broad spectrum of organizations, including:
For Managed Service Providers specifically, these directions create both compliance obligations and new service opportunities. MSPs must not only ensure their own operations comply with the directives but also help their clients implement compliant security practices. This dual responsibility makes understanding the technical and operational requirements especially critical.
The directives are legally binding under Indian law, with non-compliance potentially resulting in penalties under the IT Act. For MSPs, this creates both a compliance imperative and a strategic opportunity to develop and deliver CERT-In compliance services to clients who fall within the scope of these requirements.
The most time-sensitive requirement in the CERT-In Directions is the mandatory 6-hour incident reporting timeline. MSPs must design their security operations to detect, validate, and report cybersecurity incidents to CERT-In within this narrow window. This requires:
Reportable incidents include targeted scanning of critical systems, compromised critical systems, unauthorized access to IT systems, website defacements, malware deployments, identity theft, phishing attacks, DDoS, ransomware incidents, and data breaches. MSPs must establish clear criteria for each category to ensure consistent reporting.
The CERT-In Directions mandate maintaining logs of all ICT systems for a rolling period of 180 days within Indian jurisdiction. This requirement necessitates a robust log management architecture that includes:
MSPs must design their log retention architecture to balance performance, storage costs, and compliance requirements. This typically involves a tiered approach with hot storage for recent logs and cold storage for older logs, all while maintaining searchability and integrity throughout the 180-day retention period.
The CERT-In Directions require all ICT systems to be synchronized to the Network Time Protocol (NTP) Server of the National Informatics Centre (NIC) or the National Physical Laboratory (NPL), or with NTP servers traceable to these agencies. This requirement demands:
Accurate time synchronization is critical for security operations, as it ensures that logs from different systems can be correlated during incident investigation. MSPs must implement robust time synchronization architectures and monitoring to maintain compliance and support effective security operations.
The CERT-In Directions impose specific requirements for handling customer information, particularly for VPN, VPS, cloud service, and virtual asset service providers. While the applicability varies by service type, MSPs must establish:
MSPs must review their service offerings to determine which aspects trigger the enhanced KYC and information retention requirements. Service contracts and privacy notices should be updated to reflect these requirements while maintaining compliance with data protection regulations.
Beyond the specific requirements for log retention, MSPs must establish comprehensive evidence retention practices to demonstrate compliance with the CERT-In Directions. This includes:
This documentation serves as evidence of compliance during audits and investigations. MSPs should implement secure, searchable repositories for compliance documentation with appropriate retention policies and access controls.
To meet the 6-hour reporting requirement consistently, MSPs must establish a Security Operations Center (SOC) with specific capabilities and processes designed for CERT-In compliance. Key elements include:
A CERT-In-ready SOC requires a well-defined operational model that ensures continuous monitoring and rapid response:
The severity matrix should clearly define criteria for each incident type, helping analysts quickly determine whether an event meets the reporting threshold. The decision authority framework should designate specific roles authorized to approve and submit reports to CERT-In, ensuring that reports can be sent within the 6-hour window even during non-business hours.
Regular testing of incident response and reporting procedures is essential to ensure readiness for actual incidents:
These exercises should test the end-to-end incident response process, from initial detection through analysis, decision-making, and report preparation. Scenarios should cover various incident types specified in the CERT-In Directions, with particular attention to complex scenarios that test the limits of the 6-hour reporting window.
MSPs must maintain comprehensive documentation to demonstrate compliance with the 6-hour reporting requirement during audits or investigations:
This documentation should be maintained in a secure, easily accessible repository to support audit readiness. Regular reviews of documentation completeness and accuracy should be conducted to ensure that evidence of compliance is always available.
A robust technical architecture is the foundation for CERT-In compliance. The reference architecture should include:
This architecture should be designed for scalability, reliability, and compliance with the 180-day retention requirement. Performance considerations are critical, as the system must support both real-time analysis for incident detection and historical searches for investigations.
Effective alerting is essential for detecting reportable incidents within the timeframe required for CERT-In compliance. Key alert categories include:
These alerts should be tuned to balance sensitivity with precision, ensuring that potential reportable incidents are detected quickly while minimizing false positives that could overwhelm the SOC team.
To manage the challenge of meeting the 6-hour reporting window while avoiding unnecessary reports, MSPs should implement:
These controls should be continuously refined based on performance metrics and lessons learned from both real incidents and exercises. The goal is to create a detection and triage process that reliably identifies reportable incidents while filtering out false positives, all within a timeframe that allows for proper analysis and reporting within the 6-hour window.
A comprehensive Incident Response Standard Operating Procedure (SOP) is essential for CERT-In compliance. This document should include:
The SOP should emphasize the 6-hour reporting requirement and include process flows that ensure this timeline can be met consistently. It should be regularly reviewed and updated based on changes to CERT-In requirements, lessons from incidents, and feedback from exercises.
A formal Log Retention Policy and accompanying System Design Note should document the approach to meeting the 180-day retention requirement. These documents should cover:
The System Design Note should provide technical details on the implementation, including component specifications, data flows, and security controls. This documentation serves both as an operational reference and as evidence of compliance during audits.
A Time Synchronization Policy and accompanying Monitoring Report template should document the approach to meeting the NTP synchronization requirement. These documents should include:
The Monitoring Report should provide a snapshot of time synchronization status across the environment, highlighting any systems that are out of compliance and documenting remediation actions. This report should be generated regularly to demonstrate ongoing compliance with the time synchronization requirement.
The 6-hour reporting timeline begins from the point of detection or notification of the incident, not from the point of confirmation. This interpretation is based on the language in the CERT-In Directions, which states that organizations must report “within 6 hours of noticing such incidents or being brought to notice about such incidents.”
This means that MSPs must establish efficient triage and validation processes to quickly determine whether a detected event constitutes a reportable incident. While thorough analysis is important to avoid unnecessary reports, the process must be designed to complete within the 6-hour window, even for complex incidents.
Best practice is to implement a staged approach where initial detection triggers immediate triage, followed by rapid validation and escalation for potential reportable incidents. The final determination and report preparation should be completed with enough margin to ensure submission within the 6-hour window.
The CERT-In Directions require retention of “all logs of all ICT systems” for a period of 180 days within Indian jurisdiction. This broad language encompasses a wide range of log types, including:
The minimum retention design should include:
Organizations should implement a risk-based approach to log verbosity, capturing detailed logs for critical systems while implementing more selective logging for lower-risk systems, all while ensuring that security-relevant events are consistently captured across the environment.
Multi-tenant environments present unique challenges for CERT-In compliance, particularly around log management and incident reporting. Best practices for managing these challenges include:
MSPs should implement technical controls that maintain separation between tenant data while still enabling efficient log collection and analysis. This typically involves tagging logs with tenant identifiers at the point of collection and enforcing access controls throughout the log management lifecycle.
Service agreements should clearly define the roles and responsibilities of the MSP and the customer in meeting CERT-In requirements, particularly around incident reporting and log retention. These agreements should address scenarios where incidents affect multiple tenants and establish protocols for coordinating responses while maintaining appropriate separation.
Implementing CERT-In compliance requirements involves complex technical and operational considerations. Our team of security and compliance specialists can help you design and implement a comprehensive CERT-In compliance program tailored to your MSP environment. Contact us today for a consultation on your specific compliance needs.
The CERT-In Directions 2022 represent a significant evolution in India’s cybersecurity regulatory landscape, imposing specific and time-sensitive requirements on MSPs and other service providers. Successfully implementing these requirements demands a combination of technical infrastructure, operational processes, and organizational readiness.
By establishing robust incident detection and reporting capabilities, implementing comprehensive log management solutions, ensuring accurate time synchronization, and maintaining appropriate documentation, MSPs can achieve compliance while enhancing their overall security posture. These capabilities not only satisfy regulatory requirements but also improve the MSP’s ability to protect both their own environment and those of their clients.
As the regulatory landscape continues to evolve, MSPs that establish strong foundations for CERT-In compliance will be well-positioned to adapt to new requirements and maintain the trust of their clients. By treating compliance as an opportunity to enhance security capabilities rather than simply a regulatory burden, MSPs can derive strategic value from their compliance investments.