Close Menu
    What's Hot

    Scanning & Enumeration in Cyber Attacks: How Hackers Discover Systems, Services, and Hidden Vulnerabilities

    March 31, 2026

    European Commission Confirms Cyberattack on Public Web Systems, Possible Data Breach Under Investigation

    March 30, 2026

    Uber Fined €290 Million for Data Transfer Violations – A Major Cybersecurity and Privacy Case Study (2024)

    March 29, 2026

    Anthropic Claude Leak Sparks Global Cybersecurity Shock: A Turning Point for the Industry

    March 28, 2026

    How Hackers Use Reconnaissance to Collect Information Before an Attack: Tools and Techniques Explained

    March 27, 2026
    Facebook X (Twitter) Instagram
    Tuesday, March 31
    CyberNexora News
    X (Twitter) Instagram LinkedIn
    • Home
    • Cyber Incidents
    • laws & government
    • Penalties
    • Learn & Protect
    • Resources
    • Contact Us
    Get Cyber Alerts
    CyberNexora News
    Home»laws & government»CERT-In Cyber Security Directions (2022): Why They Still Matter in 2026 and What Organizations Must Comply With

    CERT-In Cyber Security Directions (2022): Why They Still Matter in 2026 and What Organizations Must Comply With

    Zeel_CyberexpertBy Zeel_CyberexpertFebruary 11, 2026Updated:March 4, 20263 Mins Read
    Facebook Twitter LinkedIn Email Telegram

    Why This Matters in 2026

    Many organizations still believe that the CERT-In Cyber Security Directions, 2022 are outdated because of the year mentioned in the title.
    This is incorrect.

    The year 2022 only refers to the notification date, not validity.
    As of 2026, these directions are fully active, legally binding, and enforced under the Information Technology Act, 2000.

    πŸ”— Official CERT-In Notification (Primary Proof)
    https://www.cert-in.org.in/PDF/CERT-In_Directions_70B_28.04.2022.pdf

    Are CERT-In Directions Still Applicable in 2026?

    Yes. 100% applicable.

    • No expiry date is mentioned in the notification
    • No withdrawal or replacement has been issued by CERT-In or MeitY
    • CERT-In continues to reference these directions officially

    πŸ”— CERT-In Official Website
    https://www.cert-in.org.in/

    πŸ‘‰ This makes the directions current compliance requirements, not historical rules.

    Who Must Follow CERT-In Directions (2026)

    As per the official document, the following must comply:

    • Companies & body corporates
    • Cloud service providers
    • VPS & hosting providers
    • Data centres
    • VPN providers
    • Intermediaries & platforms
    • Virtual asset service providers
    • Government organizations

    πŸ”— Scope Defined by CERT-In (Official PDF)
    https://www.cert-in.org.in/PDF/CERT-In_Directions_70B_28.04.2022.pdf

    CERT-In 6-Hour Incident Reporting Rule (Explained)

    Organizations must report specific cyber incidents within 6 hours of detection or notification.

    Reportable incidents include:

    • Data breach or data leak
    • Ransomware or malware attacks
    • Unauthorized system access
    • DDoS attacks
    • Phishing & identity theft
    • Attacks on cloud, IoT, mobile apps

    πŸ”— Annex-I – Official Incident List
    https://www.cert-in.org.in/PDF/CERT-In_Directions_70B_28.04.2022.pdf

    πŸ”— CERT-In Incident Reporting Portal
    https://www.cert-in.org.in/

    πŸ“§ incident@cert-in.org.in
    πŸ“ž 1800-11-4949

    Log Retention Rule – 180 Days (India Only)

    All organizations must:

    • Enable system logs
    • Retain logs for 180 days
    • Store logs inside India
    • Share logs with CERT-In when requested

    πŸ”— Log Retention Rule – Official Proof
    https://www.cert-in.org.in/PDF/CERT-In_Directions_70B_28.04.2022.pdf

    This applies to servers, firewalls, authentication systems, DNS, email, and applications.

    Time Synchronization Requirement (NTP Rule)

    ICT systems must sync time with:

    • NIC (National Informatics Centre) servers
    • NPL (National Physical Laboratory)
    • Or traceable equivalent sources

    πŸ”— Time Sync Rule – Official Source
    https://www.cert-in.org.in/PDF/CERT-In_Directions_70B_28.04.2022.pdf

    Accurate timestamps are critical for cyber-incident investigations.

    Cloud, VPS & VPN Data Retention – 5 Years

    Cloud, VPS, VPN, and data-centre providers must maintain:

    • Verified customer identity
    • IP address allocation records
    • Usage timestamps
    • Contact & ownership details

    Retention period:

    • Minimum 5 years, even after service termination

    πŸ”— Data Retention Clause – Official Proof
    https://www.cert-in.org.in/PDF/CERT-In_Directions_70B_28.04.2022.pdf

    Point of Contact (PoC) Requirement

    Every organization must appoint a Point of Contact (PoC) for CERT-In coordination.

    πŸ”— Annex-II – PoC Format (Official)
    https://www.cert-in.org.in/PDF/CERT-In_Directions_70B_28.04.2022.pdf

    Penalties for Non-Compliance

    Failure to follow CERT-In directions can lead to:

    • Legal action under Section 70B(7) of the IT Act
    • Regulatory scrutiny
    • Investigation delays
    • Reputational damage

    πŸ”— CERT-In FAQs (Official Clarifications)
    https://www.cert-in.org.in/PDF/FAQs_on_CyberSecurityDirections_May2022.pdf

    Share. Facebook Twitter LinkedIn Email Telegram

    letest news

    Scanning & Enumeration in Cyber Attacks: How Hackers Discover Systems, Services, and Hidden Vulnerabilities

    March 31, 2026

    European Commission Confirms Cyberattack on Public Web Systems, Possible Data Breach Under Investigation

    March 30, 2026

    Uber Fined €290 Million for Data Transfer Violations – A Major Cybersecurity and Privacy Case Study (2024)

    March 29, 2026

    Anthropic Claude Leak Sparks Global Cybersecurity Shock: A Turning Point for the Industry

    March 28, 2026

    How Hackers Use Reconnaissance to Collect Information Before an Attack: Tools and Techniques Explained

    March 27, 2026

    β‚Ή10.6 Crore Cyber Fraud Network Busted by Delhi Police; Multiple Arrests Across States

    March 26, 2026

    DarkSword Spyware Exposes Millions of Apple Devices to Critical Cyber Risk

    March 25, 2026

    Telegram β€œEasy Task” Scam: How Small Payments Turn Into Big Losses (And How to Stay Safe)

    March 24, 2026

    AU Small Finance Bank Fraud Probe Deepens: Former Regional Head Under Scanner in β‚Ή590 Crore Case

    March 23, 2026

    Pune Online Scam: Senior Citizen Loses β‚Ή3.10 Lakh in Fake Electric Stove Purchase Amid Gas Shortage

    March 22, 2026
    Recent Posts
    • Scanning & Enumeration in Cyber Attacks: How Hackers Discover Systems, Services, and Hidden Vulnerabilities
    • European Commission Confirms Cyberattack on Public Web Systems, Possible Data Breach Under Investigation
    • Uber Fined €290 Million for Data Transfer Violations – A Major Cybersecurity and Privacy Case Study (2024)
    Top Posts

    Unauthorized Access Incident at Coupang Exposes Customer Data

    December 29, 2025

    Significant Data Breach at Korean Air Subcontractor Exposes Employee Records

    December 29, 2025

    Scanning & Enumeration in Cyber Attacks: How Hackers Discover Systems, Services, and Hidden Vulnerabilities

    March 31, 2026
    About

    CyberNexora Blog provides trusted cybersecurity news, attack analysis, and security awareness updates. Our goal is to educate and inform readers about emerging cyber threats and best protection practices.

    Facebook X (Twitter) Instagram Pinterest LinkedIn
    Pages
    • Home
    • Cyber Incidents
    • laws & government
    • Penalties
    • Learn & Protect
    • Resources
    • Contact Us
    Subscribe to Our Newsletter

    Get Cyber Security Alerts

    Get trusted cybercrime alerts and security updates.

    Thanks! Please check your email to confirm subscription.

    • About Us
    • Privacy Policy
    © 2025 CyberNexora News. All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.