EXECUTIVE BRIEF FOR INDIAN ENTERPRISES

The India CISO Incident Response Playbook

CERT-In And DPDP Ready In The First Six Hours

 

Your CERT-In clock starts the moment you know. Not when you’re ready.

If your first six hours are not operationally engineered - with named owners, a tested severity matrix, centralised logs, and a pre-built report template - your compliance posture rests on luck, not process.

 

Why This Matters Now

India’s regulatory environment has tightened sharply. CERT-In’s Directions require reporting of specified cyber incidents within six hours of detection or awareness. The Digital Personal Data Protection Act, 2023, adds structured breach assessment and notification obligations wherever personal data is involved.

The cost of a data breach in India averaged INR 220 million in 2025, up 13% from 2024 (IBM Cost of a Data Breach Report). That figure compounds with every hour of detection delay. A 10–15% escalation in breach cost linked to delayed containment translates to INR 22–33 million in avoidable additional impact.

Regulators expect speed, documented decision-making, and a defensible evidence chain. The question is not whether you have an incident response policy. The question is whether your first six hours have been engineered and tested.

 

What Failure Looks Like

Consider a mid-sized NBFC in Mumbai. On a Friday evening, a privileged account authenticates from an unfamiliar geography. The SIEM fires an alert - one of several hundred that shift.

 

How the next six hours unfold without readiness:

08:40 PM  Alert triggers. Analyst flags it for review.

09:55 PM  True positive confirmed — but MFA logs are not centralised. Retrieval stalls.

10:40 PM  Legal is called. Debate begins on whether this is a CERT-In reportable incident.

11:20 PM  Customer data repository access confirmed.

12:15 AM  CISO is reached. Reporting ownership still being established.

02:30 AM  Initial report drafted. The six-hour window has closed.

The breach itself was contained. The regulatory exposure was not. It arose from delay, ambiguity, and log retrieval gaps — not from the severity of the incident.

 

Three Failure Patterns. One Structural Cause.

Across BFSI, IT/ITeS, and manufacturing, the same three failures recur:

 

  Failure

  What It Costs You

Detection Delay  

Identity misuse goes undetected for hours. Alerts fragment across tools. By      the time the SOC validates, the window is half gone.

Classification Delay  

No pre-agreed severity matrix. Teams debate reportability. Legal arrives late. The clock does not pause for internal alignment.

Escalation Delay  

No named reporting officer. No out-of-hours rotation. Weekend incidents go unreported because no one has the authority to act.

 

These are not technology failures. They are process and governance failures - and they are entirely preventable before an incident occurs.

 

Download The Full Playbook

Get the severity matrix, DPDP checklist, role-based runbooks, and 90-day roadmap — everything you need to pass the six-hour test.

[  Request Access  →  ]

For CISOs, Legal Counsel, CROs, and SOC Leaders accountable for CERT-In and DPDP compliance

 

Where Does Your Organisation Sit?

Use the snapshot below to self-locate. Most Indian enterprises arriving at this page sit at Level 2. The gap between Level 2 and Level 3 is not a technology investment - it is a process and rehearsal investment. The full playbook provides the tools to close it.

 

  Capability   Level 1 Reactive

  Level 2  Tool-  Driven  

  Level    Operationalised

  Level 4 Board-Tested  

Detection  Speed

Manual discovery.Hours pass before validation.

Alert-driven    but fragmented across  consoles.

Correlated multi-domain telemetry. Alert-to- validation under 60 min.

Tested under simulation.    Benchmark achieved consistently.

Log    Readiness

Siloed. Retrieval requires manual effort.

Central storage but  limited correlation.

Unified timeline. Critical logs  retrieved within 30 minutes.

Retrieval tested under pressure.  Results documented for board.

Reporting   Ownership  

Unclear. No named officer for after-hours. 

Named but untested.  No rotation schedule.

Defined, rehearsed, and on an out-of-hours rotation.

Executive-approved. Deputy  named. Tested quarterly.

Escalation  Workflow

Ad hoc. Weekend escalation frequently breaks down.

Documented but not  time-bound.

Time-bound and measured.  Escalation under 60 min of classification.

Simulated quarterly.  CISO and  Legal participate. Results minuted.

 

If you cannot confidently place your organisation at Level 3 across all four capabilities, your six-hour window is at risk.

The full playbook is designed to take you from wherever you are today to Level 3 within 90 days - with documented, board-presentable evidence that you got there.

 

What The Full Playbook Gives You

The gated version is an operational toolkit. Each asset below solves a specific part of the six-hour problem:

 

  Asset

  What It Enables You To Do

CERT-In Reportability Decision    Tool  

Give your SOC a one-page flow they can run at 2am to determine reportability without escalating to Legal.

Severity Matrix (CERT-In Aligned)        

Classify incidents against CERT-In’s specified categories in under 15 minutes, without debate.

DPDP Breach AssessmentChecklist 

Confirm personal data scope, assess harm likelihood, and document your rationale in a single structured form.

Role-Based Runbooks  (CISO, SOC, Legal)     

Eliminate ambiguity about who does what, in what order, within what      timeframe.

Executive Incident Brief Template

Deliver a structured, decision-ready brief to your CISO and board within 60 minutes of classification.

Evidence Capture Protocol  

Preserve chain of custody from alert to report - so your timeline is factual, not reconstructed.

90-Day Readiness Roadmap

A phased implementation plan with named owners, measurable benchmarks, and board-presentable outputs.

Tabletop Exercise Script  

Run a realistic six-hour simulation with your CISO, Legal, and SOC - with a  scoring model to measure the gap.

 

This is an operational document, not commentary. Every asset is designed to be used on the day of an incident, not read in preparation for one.

What You Should Be Able To Prove In 90 Days

These are the measurable outcomes the playbook is designed to deliver. Use them as your acceptance criteria.

  • Detection-to-escalation under two hours, tested under simulation
  • Named reporting officer with documented deputy and out-of-hours rotation
  • Critical log retrieval under 30 minutes, verified by rehearsal
  • Severity matrix applied without Legal debate in tabletop exercise
  • CERT-In initial submission template pre-populated and approved
  • Simulation results documented and presented to Audit Committee

If you cannot demonstrate these six outcomes, readiness remains assumed, not confirmed.

 

About Proactive

Proactive Data Systems works with Indian enterprises to operationalise the first six hours. As a Cisco Preferred Security Partner, Proactive designs and deploys integrated identity, access, segmentation, and detection architectures — and then tests them under realistic incident conditions.

Every engagement delivers a scored maturity assessment, a quantified gap report, a 90-day remediation plan, and a simulated six-hour drill with documented results.

 

Architecture capabilities Proactive deploys:

  • Phishing-resistant MFA (Cisco Duo) — reducing the frequency of credential-based incident triggers
  • Centralised identity and access log platform — enabling log retrieval within 15–30 minutes
  • Policy-based network segmentation (Cisco ISE) — limiting lateral movement post-compromise
  • Unified XDR telemetry (Cisco XDR) — correlated alerts across identity, endpoint, network, and cloud
  • Vendor access governance — immediate session revocation on alert

 

Download The Full Playbook

Get the severity matrix, DPDP checklist, role-based runbooks, and 90-day roadmap - everything you need to pass the six-hour test.

[  Request Access  →  ]

For CISOs, Legal Counsel, CROs, and SOC Leaders accountable for CERT-In and DPDP compliance

Six hours. Engineered, not improvised.

 

Related Resources