Cybersecurity

CERT-In 6-Hour Reporting: What You Must Operationalise Before An Incident

Updated: Feb 25, 2026

cybersecurity alert and CERT-in 6 hour reporting readiness illustration
5 Minutes Read

Summary 

CERT-In requires certain cyber incidents to be reported within six hours of detection or awareness. If your detection, classification, and escalation chain exceeds two hours, you risk non-compliance under CERT-In directions in India. 

What Is The CERT-In 6-Hour Reporting Requirement? 

The CERT-In six-hour reporting requirement mandates that organisations in India report specified cybersecurity incidents within six hours of noticing or becoming aware of them. The rule applies to incidents such as unauthorised access, data breaches, ransomware, and attacks on critical systems. Reporting must follow the format and process defined under the current CERT-In directions. 

This is a statutory obligation. It requires operational readiness, not post-incident documentation. 

The Clock Starts Before You Notice 

At 01:40 a.m., an IT manager in Noida sees unusual outbound traffic from a finance server. By 03:10 a.m., the SOC confirms possible data exfiltration. By 08:30 a.m., legal asks a simple question. Is this reportable under CERT-In directions? 

Silence follows. 

You do not fail the six-hour window because you ignore it. You fail because you do not know, fast enough, what happened, how severe it is, and whether it meets reporting criteria. 

CERT-In does not measure your intent. It measures your response time. 

What The Six-Hour Rule Really Tests 

The CERT-In direction requires you to report certain cyber incidents within six hours of noticing them. That clock does not wait for your internal debates. This requirement tests five operational capabilities: 

  1. Detection speed 
  2. Log visibility 
  3. Incident classification 
  4. Executive escalation 
  5. Clear ownership of reporting 

If one breaks, the clock keeps running. 

CERT-In Reporting Maturity Model 

Most enterprises believe they are compliant. Few have tested their reporting chain under pressure. You can assess your position across three maturity levels. 

Level 1: Reactive 

  • Detection relies on isolated tools 
  • Logs are fragmented across platforms 
  • No defined severity matrix aligned to CERT-In categories 
  • Reporting ownership unclear 
  • Escalation depends on the availability of specific individuals 

At this level, the six-hour window is at risk during nights, weekends, and complex incidents. 

Level 2: Tool-Heavy, Workflow-Light 

  • Central logging exists, but correlation is manual 
  • Severity matrix documented but not rehearsed 
  • SOC escalates incidents, but executive briefing lacks structure 
  • Reporting templates drafted but not tested under time pressure 

At this level, compliance is possible but inconsistent. Delays occur during scope validation and cross-team coordination. 

Level 3: Operationalised And Tested 

  • Unified visibility across endpoint, network, identity, and cloud 
  • Defined severity model mapped to CERT-In reporting triggers 
  • Detection-to-escalation target under two hours, measured monthly 
  • Named reporting owner with pre-approved authority 
  • Tabletop exercises conducted quarterly with legal and executive presence 

At this level, reporting becomes procedural rather than reactive. The organisation can detect, classify, and report within four hours during simulation. 

You should know your current level. If you cannot state it clearly, you are likely operating at Level 1 or Level 2. 

CERT-In Reporting Maturity Summary Table 

CERT-In Reporting Maturity Summary Table

What Triggers Mandatory Reporting Under CERT-In 

You must report incidents such as: 

  • Targeted scanning and probing 
  • Unauthorised access 
  • Data breaches 
  • Ransomware 
  • Attacks on critical systems 

The challenge is not knowing the list. The challenge is deciding, within hours, whether your situation fits the criteria. 

In Pune’s industrial belt, a manufacturing firm saw lateral movement across shop-floor systems. The SOC tagged it as suspicious but low impact. Four hours later, a forensic review showed credential abuse. The reporting clock had already narrowed. 

Classification delays create regulatory risk. 

Why Most Enterprises Miss The Window 

Detection Gaps 

You cannot report what you do not detect. Many firms still lack unified visibility across endpoint, network, identity, and cloud. 

Log Fragmentation 

Logs sit in silos. Endpoint logs live in one tool. Firewall logs sit elsewhere. SaaS activity remains outside central monitoring. During an incident, analysts waste time stitching events together. 

Undefined Severity Model 

If you lack a severity matrix aligned to CERT-In categories, your team debates instead of deciding. 

Weekend Escalation Failure 

In one Gurugram-based services firm, the breach surfaced on Sunday. Legal, compliance, and executive sign-off waited until Monday morning. The six-hour window did not. 

What You Must Operationalise Before An Incident 

1. A Reportability Decision Tree 

Build a simple matrix that maps incident types to CERT-In reporting requirements. Train SOC analysts to use it. Remove ambiguity. 

2. Detection To Escalation In Under Two Hours 

Set a measurable target. If detection to executive alert exceeds two hours, fix it. Measure this monthly. 

3. Centralised Logging With Evidence Readiness 

You need searchable logs across endpoint, network, identity, and cloud. Retain them as mandated. Test log retrieval under time pressure. 

4. Named Reporting Owner 

Assign one accountable executive. When the threshold is met, that person reports. No committee. No delay. 

5. Pre-Approved Reporting Template 

Draft your CERT-In reporting format in advance. Store it securely. During crisis, you fill blanks, not draft from scratch. 

The Architecture Question You Must Ask 

Can your security stack answer these within one hour: 

Which systems are affected? 

  • Which identities were used? 
  • What data left the network? 
  • When did it start? 
  • Is the threat still active? 

If the answer is no, the six-hour rule exposes a structural weakness. 

Policy alone will not fix this. You need integrated detection across identity, endpoint, and network layers. You need segmentation that limits the spread. You need clear workflows that link technical findings to executive action. 

How To Build Certainty Into The First Six Hours 

A mature model includes: 

  • Identity enforcement using phishing-resistant MFA 
  • Policy-based network segmentation to reduce lateral movement 
  • Central telemetry across critical systems 
  • SOC playbooks aligned to reporting criteria 
  • Quarterly tabletop exercises with legal present 

Technology without discipline fails. Discipline without visibility fails. 

A Practical India-Focused Model 

In Hyderabad’s IT corridor, a mid-sized enterprise implemented a defined escalation matrix, identity enforcement for privileged users, and segmented finance workloads. When abnormal access surfaced, the SOC confirmed the scope in ninety minutes. Legal received a clear brief. Reporting happened within four hours. 

The difference was not a panic response. It was preparation. 

The Outcome You Should Demand 

You should be able to detect, classify, escalate, and report a notifiable cyber incident within four hours, with documented evidence, executive alignment, and containment underway. 

Measure this monthly: 

  • Detection to SOC validation under 60 minutes 
  • SOC validation to executive escalation under 60 minutes 
  • Escalation to reporting decision under 60 minutes 
  • Log retrieval time under 30 minutes for critical systems 

If you cannot meet these targets during simulation, your CERT-In six-hour reporting readiness is weak. 

Proactive Data Systems works with enterprises across India to operationalise CERT-In reporting compliance. As a Cisco Preferred Security Partner, Proactive designs and deploys integrated security architectures that combine identity control, network segmentation, central visibility, and incident workflows into a single accountable operating model. 

We test your detection-to-reporting chain under real-world scenarios. You receive a clear gap assessment, defined remediation steps, and measurable targets. If you want certainty on your CERT-In compliance posture, request a focused reporting readiness assessment. 

Frequently Asked Questions On CERT-In 6-Hour Reporting

It starts when you notice or become aware of the incident. Internal validation delays do not extend the reporting window.
Incidents such as unauthorised access, ransomware, data breaches, targeted scanning, and attacks on critical systems must be reported when they meet defined criteria under CERT-In directions.
No. You report based on available evidence that meets reporting criteria. You can submit updates as the investigation progresses.
You expose your organisation to regulatory scrutiny. Failure to demonstrate a structured detection and escalation process increases compliance risk.
Organisations must retain relevant logs as directed under current CERT-In requirements and ensure they are accessible for investigation and reporting.
Reduce detection time, centralise logs, define a severity matrix aligned to reporting triggers, assign a single reporting owner, and test the process through tabletop exercises.

Whitepapers

E-Books

Contact Us

We value the opportunity to interact with you, Please feel free to get in touch with us.