Fact-checked by Grok 2 weeks ago

Indian Computer Emergency Response Team

The Indian Computer Emergency Response Team (CERT-In) is the national nodal agency under the Ministry of Electronics and Information Technology, , tasked with coordinating the response to cybersecurity incidents affecting the Indian cyberspace. Operational since January 2004 and formalized under Section 70B of the , CERT-In's core functions encompass collecting and analyzing , issuing advisories and alerts, providing incident response support, conducting vulnerability assessments, and fostering security awareness among stakeholders. It maintains a 24x7 for incident reporting and operates as the point of contact for cybersecurity coordination, enabling rapid dissemination of threat information to mitigate risks such as website intrusions, malware propagation, and phishing campaigns. In alone, CERT-In processed 1,402,809 reported incidents, underscoring its pivotal role in handling high-volume cyber threats amid India's expanding digital ecosystem. While praised for bolstering national defenses through empirical incident and proactive guidelines, CERT-In's 2022 directions mandating six-hour incident reporting and five-year by intermediaries have drawn scrutiny for potentially straining compliance burdens on entities without commensurate safeguards.

History and Establishment

The Indian Computer Emergency Response Team (CERT-In) derives its legal foundation from Section 70B of the (IT Act), which mandates the to appoint, by notification in the Official Gazette, a to serve as the national for addressing cyber security incidents. This section outlines CERT-In's core functions, including incident coordination, early warning, and response guidelines, while granting it authority to collect information and issue directions to service providers and intermediaries. The IT Act itself was enacted by on June 9, 2000, to provide legal recognition for electronic transactions and combat cyber threats, with most provisions coming into force on October 17, 2000. CERT-In was formally designated as India's nodal agency under this framework and became operational in January 2004, marking the inception of structured national cyber incident response capabilities. This establishment addressed the growing need for centralized coordination amid rising cyber vulnerabilities in India's expanding digital infrastructure, building on international models like the U.S. CERT while adapting to domestic legal and technical contexts. Prior to 2004, cyber security efforts were , handled by various ministries without a unified response mechanism, underscoring the causal link between legislative empowerment and operational readiness. The agency's placement under the Ministry of Electronics and (initially under Communications and Information Technology) ensured alignment with national IT policy objectives. Subsequent notifications, such as the October 27, 2009, gazette clarifying CERT-In's status and functions under Section 70B(4), reinforced its mandate but did not alter the foundational 2004 inception. This legal structure emphasizes proactive threat mitigation over reactive measures, privileging empirical incident data for policy formulation.

Initial Operations and Evolution

CERT-In commenced operations in January 2004, shortly after its inauguration on 19 January 2004 by , the Minister of Communications, , and Disinvestment. The facility, established under the Department of (now Ministry of Electronics and ), served as the nodal point for addressing incidents reported by the Indian cyber community, with an initial emphasis on real-time monitoring, threat forecasting, and coordinated emergency responses. Its core functions from inception included collecting and analyzing incident data, issuing security alerts to mitigate vulnerabilities, and providing guidance to affected entities such as government departments, service providers, and private organizations. Early activities prioritized building foundational cybersecurity capacity amid rising internet penetration and nascent threats like malware propagation and unauthorized access. CERT-In handled initial incidents through a structured response lifecycle involving detection, , eradication, , and post-incident review, often collaborating with domestic stakeholders to prevent escalation. Awareness initiatives, including advisories and training sessions, were launched to educate users on secure practices, while assessments targeted sectors. By 2004–2005, the agency had begun disseminating regular threat intelligence, marking a shift from reactive firefighting to proactive in India's expanding . The evolution of CERT-In's operations accelerated with the Information Technology (Amendment) Act, 2008, which enshrined its status as the agency under Section 70B, mandating functions like incident coordination and policy formulation. This legislative reinforcement enabled expanded capabilities, including mandatory reporting protocols for service providers and enhanced forensic analysis tools. Incident volumes grew substantially, reflecting increased activities; for instance, by the late , CERT-In was processing thousands of reports annually, evolving from ad-hoc responses to systematic threat hunting and international liaisons with bodies like US-CERT. Subsequent milestones included the 2013 Security Policy integration, which broadened its remit to and , adapting to sophisticated attacks such as advanced persistent threats. Over this period, resource allocation shifted toward intelligence-driven operations, with annual reports documenting a transition to handling multifaceted incidents involving data breaches and network intrusions.

Organizational Structure and Governance

Leadership and Administrative Oversight

The Indian Computer Emergency Response Team (CERT-In) is led by a Director General, who functions as the head of the organization and oversees its operational and strategic activities, including incident response coordination and policy implementation. As of September 2025, Dr. Sanjay Bahl serves in this role, concurrently holding the position of Controller of Certifying Authorities. The reports to the Ministry of Electronics and Information Technology (MeitY) and is empowered under Section 70B of the , which designates CERT-In as the national nodal agency for cybersecurity threats. Administrative oversight of CERT-In resides with MeitY, which exercises control over its functions, , and alignment with cybersecurity policies since the agency's formal designation in 2004. This structure ensures CERT-In's integration into broader government digital initiatives, though in July 2024, the advocated for supervisory authority amid debates on coordinating internal security threats, with no subsequent transfer reported. Governance is supplemented by an Advisory Committee, which provides strategic guidance on emerging threats, policy formulation, and operational enhancements, drawing from expertise in government, academia, and technology sectors. Known members include Prof. N. Balakrishnan, Chairman of the Division of Information Sciences at the , and the Director General of the , reflecting a multi-stakeholder approach to oversight. The committee's composition supports CERT-In's without altering MeitY's primary administrative .

Internal Operations and Resource Allocation

CERT-In's internal operations are structured around a hierarchical framework led by a , with core functions divided into specialized groups: the Assurance Group, responsible for vulnerability assessments and compliance; the CERT Operations Group, handling incident detection and response; the CERT Infrastructure Group, managing and systems; and the Training Group, focused on and skill development. These groups coordinate to process cybersecurity incidents, issue advisories, and conduct audits, with operational activities scaling to address over 1.5 million reported incidents in 2023. Resource allocation prioritizes incident response and , as evidenced by the execution of nearly 9,700 cybersecurity audits across critical sectors in 2024–25. Budgetary provisions from the Ministry of Electronics and Information Technology support these efforts, with CERT-In receiving ₹255 in the 2025–26 budget estimates, marking a 5.8% increase from the ₹241 revised estimate for 2024–25 to enhance operational capabilities amid rising threats. Funds are directed toward maintaining 24/7 response mechanisms, tools, and personnel , though specific breakdowns by group remain undisclosed in public allocations. Manpower constraints have impacted efficiency, with the agency reporting an urgent need for additional staff to manage escalating and other incidents, as highlighted in submissions to parliamentary panels in early 2025. Recruitment drives, including calls for technical experts in October 2024, aim to bolster teams, but persistent shortages limit proactive resource deployment for forecasting and recovery operations. Despite these challenges, internal protocols emphasize coordinated group-level responses, leveraging centralized for real-time intelligence sharing.

Core Functions and Responsibilities

Cyber Incident Response

The Indian Computer Emergency Response Team (CERT-In) serves as the national nodal agency for coordinating and responding to cybersecurity incidents across India's cyberspace, as designated under Section 70B of the Information Technology Act, 2000 (amended 2008). Its primary responsibilities include collecting, analyzing, and disseminating information on incidents; issuing emergency measures for containment and mitigation; and providing technical assistance to affected entities for recovery and prevention. CERT-In coordinates response activities among government, private sector, and international partners, ensuring a unified approach to incident handling that prioritizes rapid threat neutralization and lessons learned dissemination. Incident response begins with mandatory reporting by service providers, intermediaries, data centers, and body corporates for specified cyber events, such as targeted scanning of critical networks, unauthorized access leading to data breaches, , or denial-of-service attacks, required within six hours of detection or awareness as per CERT-In's directions. Reports must include details like the nature of the incident, affected systems, exploited, and steps taken, submitted via CERT-In's online portal. Upon receipt, CERT-In verifies the report, conducts forensic analysis where necessary, and issues advisories or directives under Section 70B to enforce protective actions, such as system isolation or patch deployment. This process aligns with global standards outlined in RFC 2350, emphasizing structured handling to minimize damage and prevent recurrence. CERT-In provides specialized assistance to victims, including guidance on incident , , and , while maintaining a 24/7 operations center for real-time monitoring and response. It also conducts post-incident reviews to extract actionable intelligence, sharing anonymized lessons through vulnerability notes and advisories to bolster . In cases, for instance, CERT-In advises on decryption feasibility, backup restoration, and attacker attribution without endorsing ransom payments, focusing instead on systemic hardening. Operational scale underscores CERT-In's impact: it recorded 1.3 million incidents in 2022 and 1.5 million in , spanning categories like , propagation, and intrusions, with coordinated responses aiding resolution in sectors. Drills such as "Cyber Shock-3" in simulated multi-sector attacks on banking and financial entities, testing response protocols and enhancing inter-agency collaboration. These efforts contribute to a Crisis Management Plan, emphasizing proactive forecasting integrated with reactive handling to address evolving threats like state-sponsored intrusions.

Threat Forecasting and Intelligence

CERT-In conducts threat forecasting by continuously monitoring domestic and international cyber threat environments, enabling the prediction and early warning of potential incidents to stakeholders. This includes the proactive collection and analysis of threat data to generate forecasts, alerts, and indicators of compromise (IoCs) that inform defensive strategies. The agency maintains an automated cyber threat intelligence exchange platform designed for real-time gathering, processing, and distribution of customized alerts across sectors, facilitating rapid response to emerging risks. CERT-In's intelligence efforts emphasize forensic analysis of incidents to derive actionable insights, including evidence collection and trend identification that underpin forecasting models. Key outputs of these activities include regular security alerts, advisories, and vulnerability notes disseminated to elevate awareness and preparedness. In 2023, CERT-In released 657 security alerts, 52 advisories, and 397 vulnerability notes, reflecting analyzed threats such as campaigns, vectors, and network vulnerabilities. Incident further supports ; with 1.5 million cybersecurity incidents handled in 2023—up from 1.3 million in 2022—CERT-In categorizes threats to project patterns like rising or attacks, aiding national prioritization of defenses.

Public Awareness and Capacity Building

CERT-In conducts public awareness campaigns to educate individuals and organizations on cybersecurity risks, emphasizing best practices for threat mitigation. These initiatives include the release of the Cyber Security Awareness Booklet during National Cyber Security Awareness Month (NCSAM) in October, targeting digital users ("Digital Nagriks") and enterprises with guidance on recognizing and countering threats such as , vishing, , malicious mobile apps, and frauds. The 2023 edition, themed "Secure Our World," addressed vulnerabilities specific to groups like senior citizens, children, women, and persons with disabilities, while promoting tools like free bot removal software, eScan antivirus, and M-Kavach 2 for endpoint protection, alongside reporting mechanisms via CERT-In's portal or the national helpline 1930. Annually, CERT-In observes NCSAM to foster nationwide vigilance, with the 2025 edition under the theme "CyberJagritBharat" (Cyber Awake ) promoting proactive cyber hygiene and incident reporting to reduce fraud and attacks. These efforts extend to advisories on emerging threats, encouraging public adoption of secure practices, software updates, and avoidance of suspicious or attachments, as detailed in CERT-In's vulnerability notes and public alerts. For , CERT-In collaborates with cybersecurity firms and product vendors to develop best practices, facilitate threat intelligence sharing, and enhance organizational response capabilities, including support for establishing sectoral Computer Security Incident Response Teams (CSIRTs). This includes training components aimed at building technical expertise among stakeholders, such as and entities, to improve incident handling and resilience against cyber incidents, though specific program metrics remain limited in public disclosures.

Regulatory Guidelines and Directives

Incident Reporting Mandates

The Directions for Information Security Practices, Procedure and Response to Cyber Security Incidents in India, issued by CERT-In on 28 April 2022 under Section 70B of the Information Technology Act, 2000, establish mandatory reporting obligations for cyber incidents to enhance national cybersecurity coordination. These directives apply to a broad range of entities, including service providers, intermediaries, data centres, body corporates, and government organisations handling computer resources in India or providing services to Indian users. Compliance became enforceable 60 days after issuance, effective from 27 June 2022, with no subsequent revocation or major amendments as of October 2025. Entities must notify CERT-In of specified cyber security incidents within six hours of noticing the event or being informed of it, enabling rapid triage and response. The report must be submitted in the prescribed format available on the CERT-In website, detailing the incident's nature, affected systems, and initial impact assessment. Reporting channels include the online form at https://www.cert-in.org.in/portal/emergency-incident-response/reporting-form.do, email to [email protected], toll-free phone (1800-11-4949), or fax (1800-11-6969). Failure to report promptly may result in penalties under the IT Act, though specific enforcement actions remain at CERT-In's discretion. The directives enumerate 21 categories of reportable incidents, encompassing threats to , system , and : In addition to reporting, entities are required to maintain detailed logs of cyber security events and retention policies for 180 days, furnishing them to CERT-In upon request to facilitate investigations. These mandates extend to providers and VPN services, mandating real-time information sharing on user data for incidents involving Indian IP addresses or users. CERT-In verifies report authenticity, conducts , and may coordinate further , underscoring the directives' focus on proactive threat intelligence over retrospective compliance.

Compliance Frameworks for Entities

The primary compliance framework for entities under CERT-In's mandate derives from the Directions issued on April 28, 2022, under Section 70B(7) of the , which apply to service providers, intermediaries, data centres, body corporates, and government organizations. These require reporting of specified cybersecurity incidents—such as targeted scanning of critical networks, unauthorized access to IT systems, , compromise of critical systems, theft of sensitive data, attacks on or critical information infrastructure, malicious code, denial-of-service, and , among 22 categories—within six hours of becoming aware or reasonably suspecting the incident. Entities must designate a for such reporting and enable comprehensive logging of infrastructure, retaining logs securely for a rolling period of 180 days to support forensic analysis and regulatory enforcement. Additional retention obligations target specific intermediaries: (VPS) providers, cloud service providers, and record-of-purchase maintainers must log and retain subscriber details, including KYC information, addresses, addresses, and timestamps, for five years, while records require similar five-year retention of user identification and usage data. All entities are directed to synchronize system clocks with via trusted (NTP) servers and report any identified vulnerabilities or exposures in systems. Non-adherence constitutes an offense under the IT Act, punishable by fines up to ₹1 or imprisonment, emphasizing CERT-In's authority to direct measures for securing critical information infrastructure. CERT-In supplements these directives with advisory guidelines to facilitate proactive compliance, including the 2023 Guidelines on Practices for Government Entities, which prescribe controls for , access management, , and incident response, such as mandatory and regular vulnerability assessments. For private and MSME entities, frameworks encompass the Guidelines for Secure Application Design, Development, Deployment, and Maintenance (emphasizing input validation, secure coding, and penetration testing) and the 2025 15 Elemental Cyber Defense Controls for MSMEs, outlining baseline measures like asset inventory, access controls, backups, and employee training to mitigate common threats. The July 2025 Comprehensive Cyber Security Audit Policy Guidelines establish standardized audit methodologies, including risk assessments, control evaluations, and reporting protocols, enabling empaneled auditors to verify adherence, with implications for sectors handling sensitive or . These frameworks collectively aim to enforce minimum cybersecurity hygiene, though implementation challenges persist due to varying entity capacities and the directives' broad scope.

International Cooperation and Agreements

Bilateral and Multilateral Partnerships

CERT-In has established bilateral partnerships primarily through memoranda of understanding (MoUs) focused on threat intelligence sharing and incident response coordination. In January 2017, CERT-In signed an MoU with the United States Computer Emergency Readiness Team (US-CERT), enabling real-time exchange of cybersecurity information, collaborative vulnerability analysis, and mutual assistance in handling cross-border incidents. Similarly, India entered into a cybersecurity cooperation agreement with Brazil, which includes provisions for CERT-level exchanges on cyber attack data, joint response mechanisms, and technology sharing relevant to emergency operations, though the exact signing date remains unspecified in public records. These agreements emphasize operational interoperability but have been limited in number, reflecting CERT-In's selective approach to formal bilateral ties amid geopolitical considerations. On the multilateral front, CERT-In maintains active membership in key global and regional forums to facilitate standardized incident handling and threat dissemination. It has been a full member of the Forum of Incident Response and Security Teams (FIRST) since 2006, participating in its collaborative platform for over 600 teams worldwide to share indicators of compromise and coordinate responses to large-scale attacks. As an operational member of the Computer Emergency Response Team (AP-CERT) since the same year, CERT-In engages in regional exercises and intelligence feeds tailored to threats, such as state-sponsored intrusions prevalent in the area. CERT-In's multilateral engagements extend to high-level diplomatic platforms, including the , where it led a cybersecurity exercise and drill on January 31, 2023, involving over 400 participants from more than 12 countries to simulate cross-border incident response. Through these forums, CERT-In contributes to and benefits from global norms on vulnerability disclosure and , though participation often prioritizes over binding commitments. Such collaborations enhance India's but depend on reciprocal trust, which can be strained by differing national priorities in attribution and enforcement.

Role in Global Cyber Diplomacy

CERT-In facilitates India's engagement in global diplomacy by serving as the technical focal point for international information sharing on threats and vulnerabilities, acting as a liaison with foreign and agencies to align incident response practices across borders. As a member of the Forum of Incident Response and Security Teams (FIRST), a global association of over 600 incident response teams, CERT-In participates in collaborative exercises and threat coordination that underpin diplomatic . Similarly, its involvement in the Asia-Pacific (APCERT) network supports regional multilateral efforts to standardize responses to transnational attacks, contributing to broader diplomatic initiatives on norms. Through bilateral agreements, such as the 2020 operational collaboration protocol with Spain's counterpart agency, CERT-In enables real-time exchange of incident data, best practices, and technical infrastructure support, which strengthens diplomatic ties and mutual legal assistance in cyber investigations. It also engages with networks like the 24/7 International Contact Group for , sharing intelligence to facilitate arrests and evidence preservation in cross-jurisdictional cases. In , CERT-In contributed to planning and scenario development for three international exercises while participating as an active player in seven others, demonstrating its role in building operational interoperability that informs India's positions in multilateral forums. These activities extend to partnerships with , where CERT-In aids in attributing state-sponsored threats, thereby supporting diplomatic attributions and sanctions discussions. CERT-In's technical inputs have indirectly advanced India's advocacy for inclusive governance frameworks, such as those discussed in UN processes, by providing empirical on incident trends that highlight the need for attributable without endorsing unverified attribution claims from biased sources. Annual reports emphasize ongoing expansion of these partnerships to address evolving threats like attacks, positioning CERT-In as a key enabler of India's in diplomacy amid geopolitical tensions.

Achievements and Operational Impact

Key Metrics and Incident Resolutions

CERT-In has tracked and coordinated responses to a rapidly increasing volume of cybersecurity incidents, reflecting the growing threat landscape in . In 2022, it handled 1,391,457 incidents, encompassing website intrusions, malware propagation, malicious code, , and distributed denial-of-service attacks. This rose to 1,592,917 incidents in 2023 and further to 2,041,360 in 2024, with coordination involving mitigation of vulnerable services and targeted responses to high-impact threats like viruses and malicious codes, where 161,757 such incidents were addressed in 2022 alone. Key response metrics include proactive issuance of vulnerability notes, security alerts, and advisories to enable rapid resolutions across sectors. In 2023, CERT-In published 397 vulnerability notes detailing exploitable flaws, 657 security alerts on emerging threats, and 52 advisories providing mitigation guidance, contributing to the containment of incidents such as campaigns that saw a 53% year-over-year increase in reports during 2022. These outputs support entity-level resolutions by outlining patching, scanning, and recovery steps, with CERT-In's coordination facilitating takedowns of sites and distribution networks.
YearIncidents HandledNotable Response Outputs
20221,391,457488 notes; 653 alerts; 38 advisories; 19,793 defacements addressed
1,592,917397 notes; 657 alerts; 52 advisories
20242,041,360Enhanced analysis and sector-specific mitigations
Incident resolutions emphasize forensic analysis, stakeholder collaboration, and preventive hardening, though detailed closure rates remain limited in due to operational sensitivities; for instance, CERT-In's handling of and incidents in 2022 involved direct interventions reducing propagation, as evidenced by tracked reductions in active exploits post-alerts. Overall, these metrics underscore CERT-In's role in scaling national response capacity amid escalating threats.

Contributions to National Cybersecurity Posture

The Indian Computer Emergency Response Team (CERT-In) has strengthened India's national cybersecurity posture by serving as the central nodal agency for incident coordination and response, handling 1.3 million cybersecurity incidents in 2022 and 1.5 million in 2023, which facilitated timely , forensic , and the development of a Crisis Management Plan to guide large-scale handling. This response capability has enabled the aggregation of from diverse sectors, improving predictive intelligence and reducing the propagation of attacks across . In 2024, CERT-In processed over 2 million incidents, primarily website intrusions and , contributing to enhanced visibility into evolving threats like . CERT-In's issuance of cybersecurity guidelines and advisories has standardized protective measures nationwide, with over 1,750 advisories released in alone to address vulnerabilities in software, networks, and emerging technologies such as . These directives, enforced under Section 70B of the Information Technology Act, mandate compliance for service providers and critical entities, fostering proactive defenses that have mitigated risks in sectors like and utilities. Additionally, the conduct of over 9,700 audits in fiscal year has identified systemic weaknesses, enforced regulatory adherence, and elevated the overall maturity of organizational security practices. Capacity-building initiatives by CERT-In, including 92 cybersecurity mock drills across sectors by mid-2024, have tested and bolstered institutional readiness against simulated attacks, revealing gaps in coordination and response times. Training programs have equipped thousands of professionals with skills in incident handling and forensics, while annual awareness campaigns, such as National Cyber Security Awareness Month, promote best practices among government, industry, and the public, indirectly fortifying the human element of national defenses. These efforts collectively enhance by integrating empirical threat data into policy, though rising incident volumes underscore the need for sustained investment in enforcement and technology adoption.

Controversies and Criticisms

2022 Directives and Privacy Debates

In April 2022, the Indian Computer Emergency Response Team (CERT-In) issued directives under Section 70B(6) of the Information Technology Act, 2000, mandating service providers, intermediaries, data centers, body corporates, and government organizations to report cybersecurity incidents within six hours of detection or awareness. These directions expanded the scope of reportable incidents to include targeted scanning, unauthorized access, website defacement, and compromised systems used for attacks, requiring detailed submissions via specified channels. Additionally, entities such as Virtual Private Network (VPN) providers, cloud services, and Virtual Server providers were required to maintain specified logs—including user names, email addresses, IP addresses, and timestamps—for at least 180 days, with certain records retained for five years, and to enable identification of users upon request. The directives sparked significant debates, with critics arguing that the broad mandates conflicted with user expectations, particularly for privacy-focused tools like VPNs, and lacked proportionality in the absence of a comprehensive protection framework. Industry stakeholders, including VPN operators, contended that mandatory undermined core service functionalities, potentially exposing users to risks without judicial oversight or clear breach thresholds, and could violate constitutional rights as affirmed in the 2017 Justice K.S. Puttaswamy judgment. In response, several international VPN providers, such as ProtonVPN, , , and , either geoblocked Indian users or discontinued services entirely to avoid compliance, citing irreconcilability with no-logs policies essential for user trust. Domestic challenges emerged, including a petition by hosting provider S.N. Hosting against the directives' retrospective application and overreach, highlighting operational burdens on small entities. CERT-In addressed some concerns through Frequently Asked Questions released in May 2022, clarifying that logs could be stored outside if readily producible to authorities and that the six-hour reporting applied only to confirmed incidents, not mere alerts. Enforcement for data retention aspects was deferred by three months to September 2022 to allow adaptation, though the core reporting obligations took effect in 2022. Proponents of the directives emphasized their necessity for rapid threat intelligence amid rising cyberattacks, such as ransomware incidents affecting Indian entities, arguing that enhanced traceability bolsters without inherently enabling mass surveillance. However, ongoing critiques from organizations like the noted risks to innovation in privacy-enhancing technologies and potential chilling effects on freedoms, underscoring tensions between cybersecurity imperatives and individual in India's evolving regulatory landscape.

Inter-Ministerial Conflicts and Transparency Issues

In July 2024, the (MHA) and the (MeitY) engaged in a public dispute over administrative control of CERT-In, with MHA advocating for its transfer to enhance capabilities in investigations. MHA argued that integrating CERT-In with its (I4C) would streamline threat intelligence sharing and response, given the increasing overlap between cybersecurity incidents and criminal probes, such as those involving or state-sponsored attacks. In contrast, MeitY maintained that CERT-In's mandate under Section 70B of the , focuses on technical coordination, incident response, and national cybersecurity policy, extending beyond MHA's purview to include protection and partnerships. This jurisdictional friction exemplifies broader inter-ministerial coordination challenges in India's cybersecurity apparatus, where parallel entities—such as CERT-In under MeitY, the National Critical Information Infrastructure Protection Centre (NCIIPC) under the , and I4C under MHA—operate with overlapping remits but insufficient unified oversight. Reports indicate that these silos have delayed responses to incidents, with MHA pushing for CERT-In's realignment to prioritize threats amid rising cross-border cyber activities from actors in and . The Prime Minister's Office has been drawn into deliberations to resolve the impasse, underscoring how such conflicts risk fragmenting national strategy at a time when India reported over 1.3 million cyber incidents in 2023 alone. Transparency concerns compound these tensions, as CERT-In's operations lack independent external audits or detailed public disclosures on incident handling and practices, despite mandatory reporting under its 2022 directives. Critics, including industry bodies, have highlighted opaque decision-making in CERT-In's enforcement, such as unannounced audits and limited justification for data retention periods up to five years, which fuels perceptions of gaps amid the ministerial tug-of-war. The absence of a centralized exacerbates this, with no statutory mechanism for inter-ministerial or mandatory annual transparency reports on CERT-In's and metrics, potentially undermining trust in its impartiality. As of late 2024, these issues persist without formal resolution, contributing to calls for legislative reforms to clarify CERT-In's reporting lines and enhance oversight.

Resource and Efficacy Challenges

CERT-In operates under notable resource constraints, including insufficient manpower for comprehensive incident response. The Ministry of Electronics and Information Technology (MeitY) informed a parliamentary panel in March 2025 that CERT-In faces challenges due to limited staff, particularly in conducting onsite activities to assist affected entities against threats like . This shortfall limits the agency's capacity for hands-on mitigation in high-impact cases, relying instead on remote advisories and coordination. India's overall cybersecurity workforce gap amplifies these pressures, with the country requiring approximately one million skilled professionals but possessing only about 500,000 as of 2025. Around 40% of cybersecurity teams, including those supporting response efforts, understaffing, compounded by retention difficulties and skill mismatches. Funding for CERT-In remains modest relative to the threat volume, with an allocation of ₹255 in the 2025 Union Budget, a slight increase from ₹238 in 2024-25. This budget supports operations amid escalating demands but has drawn implicit scrutiny for not scaling proportionally to incident surges. Efficacy is strained by these resources, as evidenced by CERT-In handling 1,592,917 incidents in —a quadrupling from 394,499 in —primarily through and rather than exhaustive analysis for all cases. Manpower limitations hinder proactive onsite interventions, potentially delaying containment of sophisticated attacks and reducing overall resilience against persistent threats like and propagation. Additionally, discrepancies in CERT-In's incident compared to sector-specific , such as in healthcare, suggest gaps in verification and granularity that undermine coordinated responses.

Recent Developments

2023-2025 Threat Responses

In 2023, CERT-In recorded approximately 1.5 million cybersecurity incidents, a rise from 1.3 million in , prompting enhanced coordination of incident response activities and the formulation of a Cyber Crisis Management Plan to counter cyber attacks and across entities. The agency issued advisories in November 2023 to ministries, outlining measures for strengthening cybersecurity, including vulnerability assessments and incident reporting protocols. These efforts addressed a surge in threats such as and advanced persistent threats (APTs), with CERT-In providing technical assistance to affected organizations for recovery and . During 2024, CERT-In responded to escalating incidents by publishing a comprehensive Ransomware Report analyzing trends, exploited vulnerabilities, and vectors observed throughout the year, emphasizing the need for offline backups and rapid isolation of infected systems. The agency participated in the APCERT Cyber Drill on August 29, 2024, focused on APT group responses, simulating detection and strategies to bolster national preparedness. Amid 22.68 reported incidents nationwide—doubling from 10.29 in 2022—CERT-In coordinated with sector-specific entities, issuing vulnerability notes on critical software flaws to preempt exploits in infrastructure like financial and healthcare systems. In 2025, CERT-In intensified responses to emerging hybrid threats, joining the APCERT Cyber Drill on themed "When Ransomware Meets Generative ," which tested defenses against AI-augmented extortion tactics. The agency released multiple advisories on high-severity vulnerabilities, including CIAD-2025-0039 for products on October 22 and CIAD-2025-0038 for other software on October 18, urging immediate patching to mitigate remote code execution risks. In March, CERT-In advised against unmitigated use of models due to inherent vulnerabilities like injection and data poisoning, recommending secure deployment practices. By mid-2025, cumulative incidents exceeded 2.2 million since 2021, with CERT-In mandating enhanced logging and access controls via a June advisory to industries facing , DDoS, and data breaches. These measures aligned with a recorded 369.01 million detections in 2024, averaging 702 per minute, underscoring CERT-In's role in proactive threat intelligence dissemination.

Policy and Guideline Updates

In July 2025, CERT-In issued the Comprehensive Cyber Security Audit Policy Guidelines under the , mandating standardized annual cybersecurity audits for government entities, sectors, and CERT-In-empanelled auditors. These guidelines expand audit scope to encompass (OT), application programming interfaces (), supply chains, and cloud environments, with requirements for leadership accountability, centralized log retention for at least 180 days, and reporting of incidents within six hours of detection. The policy aims to enhance national by enforcing structured processes, including assessments and verification, applicable to public and private organizations handling sensitive data. On September 1, 2025, CERT-In released Security Guidelines CISG-2025-03, outlining 15 elemental cyber defense controls tailored for micro, small, and medium enterprises (MSMEs). These controls emphasize basic measures such as access management, patch deployment, and incident response planning, with a focus on cost-effective implementation to address the high of smaller entities, which reported over 20% of national incidents in prior years. The guidelines integrate with existing directives, requiring MSMEs to align with six-hour breach reporting timelines established in 2022 amendments. CERT-In also updated technical guidelines on Bills of Materials (BOM) in July 2025 (version 2.0), covering Software BOM (SBOM), Quality BOM (QBOM), Component BOM (CBOM), AI BOM (AIBOM), and Hardware BOM (HBOM) for transparency in critical systems. These directives mandate documentation of components to mitigate risks from third-party vulnerabilities, building on 2024 releases and applying to sectors like defense and . Sector-specific updates include the February 2025 Cyber Security Guidelines for Infrastructure, which require secure deployment of devices, regular firmware updates, and integration with national incident frameworks. In April 2025, CERT-In published good practices for Unmanned Aircraft Systems (UAS), stressing BOM adherence, for telemetry , and geo-fencing controls to counter aerial cyber threats. These guidelines reflect CERT-In's shift toward proactive, technology-specific policies amid rising incidents, with over 1.5 million reported in 2023 alone.

References

  1. [1]
    Indian Computer Emergency Response Team (CERT-In)
    CERT-In is the national nodal agency for responding to computer security incidents as and when they occur. In the Information Technology Amendment Act 2008,CERT ...Missing: establishment | Show results with:establishment
  2. [2]
    [PDF] The Indian Computer Emergency Response Team (CERT-In ...
    The Information Technology Act 2000, designated CERT-In to serve as the national agency to perform the following functions in the area of cyber security:.
  3. [3]
    Top Cybersecurity Regulations in India [Updated 2025] - UpGuard
    Jul 2, 2025 · Made official in 2004, the Computer Emergency Response Team (CERT-In) is the national nodal agency for collecting, analyzing, forecasting, and ...
  4. [4]
    Safeguarding India's Digital Landscape
    Jul 25, 2024 · Operating a 24x7 incident response Help Desk, CERT-In ensures timely responses to reported cybersecurity incidents. The organization offers ...<|separator|>
  5. [5]
    Understanding Computer Emergency Response Team (CERT-In)
    Dec 13, 2024 · CERT-In serves as a point of contact for receiving and disseminating information about threats and vulnerabilities from international sources, ...
  6. [6]
    [PDF] CERT-In Annual Report (2021)
    In the year 2021, Indian Computer Emergency Response Team (CERT-In) handled. 1402809 incidents. The type of incidents handled were Website Intrusion & Malware.<|separator|>
  7. [7]
    New CERT-In Directions: Overview And Implications - Social Media
    Oct 14, 2022 · 1. Section 70B(6) authorises CERT-In to call for information and give directions to IT service providers, intermediaries, data centres, body ...
  8. [8]
    CERT-IN Directions - AZB & Partners
    CERT-In is empowered to call for information and issue directions to service providers, intermediaries, data centres, body corporates and any other person.
  9. [9]
    Section 70B - India Code
    --(1) The Central Government shall, by notification in the Official Gazette, appoint an agency of the Government to be called the Indian Computer Emergency ...
  10. [10]
    Cert-In - Authority - Indian - Computer Emergency Response Team
    Directions by CERT-In under Section 70B, Information Technology Act 2000 ... Date of Commencement of IT Act 2000 pdf · Notification regarding the status of ...Missing: legal foundation establishment
  11. [11]
    [PDF] Information Technology Act, 2000
    THE INFORMATION TECHNOLOGY ACT, 2000. (No. 21 OF 2000). [9th June, 2000]. An Act to provide legal recognition for transactions carried out by means of ...Missing: foundation | Show results with:foundation
  12. [12]
    [PDF] Cyber Security & the CERT-In A Report on the Indian Computer ...
    The Indian Computer Emergency Response Team (CERT-In) is India's nodal agency under. Section 70B of the Information Technology Act, 2000, as amended in 2008 ...
  13. [13]
    [PDF] Page 1 of 8 No. 20(3)/2022-CERT-In Government of India Ministry of ...
    Apr 28, 2022 · notification dated 27th October 2009 published in the official Gazette and as per provisions of sub-section (4) of section 70B of IT Act, 2000 ...
  14. [14]
    [PDF] The Indian Computer Emergency Response Team (CERT-In ... - NET
    CERT-In is an organisation of Ministry of Electronics and Information. Technology, Government of India, with the objective of securing Indian cyber space. CERT- ...Missing: history | Show results with:history
  15. [15]
    Shourie inaugurates national facility 'CERT-In' to handle computer ...
    ... (CERT-In) to respond to computer security incidents reported by the Indian cyber community. The objectives of CERT-In include enhancing awareness among the cyber ...<|separator|>
  16. [16]
    When Did Cyber Security Start in India? A Timeline of Events, Laws ...
    May 14, 2025 · Legalized cyber law enforcement in India. 2004, CERT-In established, India's first official cyber defense unit. 2008, IT Act amended, Introduced ...Missing: inception | Show results with:inception
  17. [17]
    [PDF] Annual Report 2010 CERT-In
    CERT-In was operational since January 2004. The constituency of CERT-In is the Indian cyber community. In the Information Technology (Amendment) Act 2008, CERT- ...Missing: milestones | Show results with:milestones
  18. [18]
    Cyber Security in e-Governance: Safeguarding Trust, Infrastructure ...
    Sep 21, 2025 · We are honored to welcome Dr. Sanjay Bahl, Director General, CERT-In, as a panelist for Plenary Session VI: Cyber Security in e-Governance: ...
  19. [19]
    Dr. Sanjay Bahl on CERT-In's initiatives for Indian cyberspace
    Apr 11, 2025 · Dr. Sanjay Bahl, Director General, CERT-In briefed about CERT-In's initiatives to make Indian cyberspace more safe & trusted during his interview with Mr. ...
  20. [20]
    Computer Emergency Response Team (CERT-in) - WBLP
    The Indian Computer Emergency Response Team (CERT-In) is a Government organisation under Ministry of Electronics and Information Technology, Government of India ...
  21. [21]
    Both Home and IT ministries pitch for control of nodal cyber security ...
    Jul 13, 2024 · Two key ministries, Information Technology and Home Affairs, are making a strong pitch for the ownership of Computer Emergency Response Team (Cert-In).<|separator|>
  22. [22]
    Advisory Committee - CERT-In
    3, Prof. N. Balakrishnan Chairman Division of Information Sciences Indian Institute of Science, Member ; 4, Director General National Informatics Center, Member.Missing: leadership | Show results with:leadership
  23. [23]
    [PDF] CERT-In-Organisation Structure Director General, CERT-In
    CERT-In-Organisation Structure. Director General, CERT-In. Security Assurance. Group. CERT. Operations. Group. CERT. Infrastructure. Group. Training. Group.Missing: teams divisions
  24. [24]
    Mapping India's Cybersecurity Administration in 2025
    Sep 1, 2025 · In 2022 and 2023, CERT-In recorded 1.3 and 1.5 million cybersecurity incidents, respectively, and formulated a Cyber Crisis Management Plan to ...Missing: budget | Show results with:budget
  25. [25]
    Press Release: Press Information Bureau - PIB
    Jul 26, 2025 · Government Strengthens Cybersecurity Across Critical Sectors; Over 9,700 CERT-In Audits Conducted in 2024–25 · 1. CERT-In issues the necessary ...
  26. [26]
    Union Budget 2025: MeitY gets a 48% boost; PLI in electronics ...
    Feb 1, 2025 · Budget allocation for the national cybersecurity agency Cert-In (Indian Computer Emergency Response Team) increased about 6% to Rs 255 crore in ...
  27. [27]
    Budgetary allocation for MeitY up by 48%; focus on electronics ...
    Feb 1, 2025 · Allocation for the Computer Emergency Response Team (CERT-In) increased marginally from ₹241 crore (RE FY25) to ₹255 crore (BE FY26), a 5.8% ...
  28. [28]
    Cert-In short of staff to help curb ransomware: Meity to parliamentary ...
    Mar 21, 2025 · Meity said that Cert-In is in “urgent” need of additional manpower to deal with increase in cyber security incidents and issues.Missing: human | Show results with:human
  29. [29]
    [PDF] F. No. 4(3)/2023-CERT-In - Government of India
    Oct 16, 2024 · 3. The details including number of posts, eligibility criteria, Terms & Conditions etc., are enclosed as Annexure-I. 3.1 The requirement of ...
  30. [30]
    Roles & Functions - CERT-In
    ROLES AND FUNCTIONS · Provide a single point of contact for reporting local problems. · Assist the organisational constituency and general computing community in ...Missing: human | Show results with:human
  31. [31]
    Directions70B - Cert-In
    ... reporting of cyber incidents for Safe & Trusted Internet (dated 28.04.2022). bullet Frequently Asked Questions on Cyber Security Directions of 28.04.2022.
  32. [32]
    Reporting of a Security Incident - CERT-In
    CERT-In will verify the authenticity of the report. Triage : CERT-In will then analyse the information provided by the reporting authority and identify the ...
  33. [33]
    Indian Computer Emergency Response Team (ICERT), New Delhi
    The Indian Computer Emergency Response Team (CERT-In) aims to deal with cyber security threats like hacking and phishing. It strengthens security-related ...Missing: administrative oversight
  34. [34]
    Indian Computer Emergency Response Team Role in Cybersecurity
    Nov 8, 2024 · CERT-In has been actively involved in responding to ransomware incidents, providing guidance to affected organizations on how to recover their ...
  35. [35]
    Press - CERT-In
    Indian Computer Emergency Response Team (CERT-In) successfully conducted a 10-day long Cybersecurity Drill "Cyber Shock -3" for Banks, Insurance Companies, SEBI ...Missing: early | Show results with:early
  36. [36]
    Government of India Taking Measures to Protect Critical ...
    Mar 28, 2025 · CERT-In operates an automated cyber threat intelligence exchange platform for proactively collecting, analysing and sharing tailored alerts ...
  37. [37]
    [PDF] government of india - Digital Sansad
    Aug 8, 2025 · CERT-In operates an automated cyber threat intelligence exchange platform for sharing tailored alerts with organisations across sectors for ...
  38. [38]
    [PDF] Annual Report 2023 - CERT-In
    a) CERT-In is a Government organization under Ministry of Electronics and. Information Technology (MeitY), Government of India established with the objective ...Missing: history | Show results with:history
  39. [39]
    [PDF] Cyber Security Awareness Booklet - CERT-In
    This Awareness Booklet for Digital Nagriks and Digital. Enterprises is released as a part of CERT-In's awareness initiatives to educate the users on the best ...
  40. [40]
    CERT-In is observing October 2025 as National Cyber Security ...
    Oct 2, 2025 · CERT-In is observing October 2025 as National Cyber Security Awareness Month (NCSAM) 2025 with the theme "CyberJagritBharat".
  41. [41]
  42. [42]
    Responsibilities of CERT-In: Key Roles in Cybersecurity | Securityium
    Nov 8, 2024 · CERT-In's efforts have significantly improved India's cybersecurity resilience. By monitoring the cyber landscape, responding to incidents, and ...
  43. [43]
    [PDF] Guidelines on Information Security Practices for Government Entities
    These guidelines relating to information security practices, procedures, prevention and response are issued by the Indian Computer Emergency Response Team ( ...Missing: overview | Show results with:overview
  44. [44]
    [PDF] Guidelines for Secure Application Design, Development ... - CERT-In
    One of the key reason for vulnerabilities in the applications are lack of secure design, development, implementation, and operations.
  45. [45]
    [PDF] 15 Elemental Cyber Defense Controls for Micro, Small, and Medium ...
    Sep 1, 2025 · To safeguard Cyber Infrastructure, confidential data, adhere to legal requirements, reduce financial risk, maintain customer confidence, ...
  46. [46]
    [PDF] Comprehensive Cyber Security Audit Policy Guidelines - CERT-In
    Jul 25, 2025 · They outline the auditor's responsibilities, methodologies, and best practices, enabling them to provide independent, impartial and constructive.
  47. [47]
    India-CERT signs an MoU with US-CERT | SCC Times - SCC Online
    Jan 13, 2017 · India and USA have signed a Memorandum of Understanding (MoU) between the Indian Computer Emergency Response Team (CERT- In) under the ...
  48. [48]
    [PDF] memorandum of understanding - Portal Gov.br
    Exchange of information on Cyber attacks and mutual response to cyber security incidents;. 2. Cyber security technology cooperation relevant to CERT activities;.<|separator|>
  49. [49]
    Member Teams - APCERT
    APCERT members include Operational, Liaison, Strategic, and Corporate Partners. Operational members include teams like ACSC (Australia), bdCERT (Bangladesh), ...
  50. [50]
    [PDF] government of india - Digital Sansad
    Dec 18, 2024 · CERT-In is an operational member of Asia Pacific Computer Emergency Response Teams, a regional forum for Internet security in the Asia-Pacific ...<|separator|>
  51. [51]
    [PDF] operational collaboration on cyber security
    vo The Israeli National Cyber Directorate of the State of Israel (INCD) and the Indian Computer. Emergency Response Team (CERT-In), Ministry of Electronics ...Missing: first | Show results with:first
  52. [52]
    How Does International Cooperation Strengthen India's Cyber ...
    Sep 10, 2025 · India strengthens cyber defense through agreements: Bilateral MLATs: With countries like the US and UK for evidence sharing. Multilateral ...
  53. [53]
    The role of National CERTs/CSIRTs in Implementing the UN Norms ...
    Mar 14, 2025 · Capacity Building: CERTs/CSIRTs should engage in capacity-building efforts, particularly with less-resourced nations, to enhance their ability ...
  54. [54]
    CERT-In tackled over 1.39 million cybersecurity incidents in 2022
    Nov 15, 2023 · Apart from mitigating vulnerable services, CERT-In tackled 161,757 incidents of attacks using viruses or malicious codes; and 324,620 incidents ...
  55. [55]
    Cybersecurity incidents tracked by CERT-In quadrupled in last 5 years
    Dec 7, 2024 · CERT-In tracked 394,499 cybersecurity in 2019, a number that ballooned to 1,592,917 in 2023. 2022 is the only year that saw a marginal dip over ...<|separator|>
  56. [56]
    [PDF] Ransomware Report - CERT-In
    Overall, there is 53% increase in Ransomware incidents reported in 2022 Year over Year. IT & ITeS was majorly impacted sector followed by Finance and ...
  57. [57]
    [PDF] Annual Report 2022 - CERT-In
    Dec 23, 2022 · A total of 653 security alerts, 38 advisories and 488 Vulnerability Notes were issued during the year 2022. c) CERT-In conducted 23 cyber ...
  58. [58]
    1.39 million cyberattacks handled in 2022, phishing attacks rise
    Nov 15, 2023 · Cert-In also dealt with 19,793 incidents of website defacements. This is a type of cyberattack that alters or compromises the contents of a ...
  59. [59]
    [PDF] RANSOMWARE REPORT - CERT-In
    This present report provides an analysis of the ransomware trend insights observed in the year 2024 along with known vulnerabilities exploited by Ransomware.
  60. [60]
    [PDF] APCERT_Annual_Report_2024.pdf
    Jun 18, 2025 · Providing inputs and/or recommendations to help address legal issues related to cyber security and incident response across regional boundaries.
  61. [61]
    Why Is CERT-In Critical for India's Cybersecurity Infrastructure?
    Sep 10, 2025 · Handled 1.97 million cyber incidents in 2024, up 33% from 2023. Issued 1,750 advisories, mitigating threats like ransomware. Trained 3,000 ...
  62. [62]
    Annual Report - CERT-In
    The Annual Report provides details on the activities performed by CERT-In during the year 2024. It provides summary of security incidents handled, ...Missing: history controversies
  63. [63]
    Internet Impact Brief: India CERT-In Cybersecurity Directions 2022
    Jun 1, 2022 · On 28 April 2022, the Indian Computer Emergency Response Team (CERT-In) issued new cybersecurity directions under section 70B of the parent ...
  64. [64]
    VPN Providers Flee India as a New Data Law Takes Hold - WIRED
    Sep 25, 2022 · After CERT first announced the rules in April, it caused a flurry of panic among VPN companies. It then gave them a three-month window to comply ...
  65. [65]
    Why an Indian VPN provider is suing the government's cybersecurity ...
    Oct 4, 2022 · But Indian VPN providers have only one option, which is to shut down their business as the law mandates to log everything of every client ...
  66. [66]
    India's New Cybersecurity Directives: Why Industry Players Are ...
    Jul 1, 2022 · The 2022 directives require entities to maintain logs for all ICT systems for 180 days and to store these logs in India. These logs are also ...Missing: debate | Show results with:debate
  67. [67]
    CERT-In publishes Frequently Asked Questions in furtherance of its ...
    The CERT-In has published Frequently Asked Questions (“FAQ's”) in furtherance of its Cyber Security Directions dated 28th April 2022 (“CERT-In Directions”).
  68. [68]
    [PDF] Faq on Cyber Security Directions - CERT-In
    May 20, 2022 · Ans.: These Cyber Security Directions of 28.04.2022 are applicable to all entities in so far as reporting of a cyber incident is concerned. Q 29 ...<|separator|>
  69. [69]
    India delays VPN rules to log customers' data by 3 months
    Jun 27, 2022 · The new rules also mandate firms to report incidents of security lapses such as data breaches within six hours of noticing such cases.
  70. [70]
    India's CERT- In Cyber Security Direction - The National Law Review
    Timeline for reporting: Incidents have to be reported by the Identified Entity within 6 hours of noticing such incident or being brought to notice about such ...<|separator|>
  71. [71]
    Cybersecurity Turf War: Why Home ministry and IT ministry are at ...
    Jul 15, 2024 · Two key ministries in India, the Information Technology and Home Affairs, are locked in a debate over control of CERT-In, the nation's primary cybersecurity ...
  72. [72]
    Why Home ministry and IT ministry want control of ... - Times of India
    Jul 16, 2024 · The MHA reportedly argues that bringing Cert-In under its wing would enhance law enforcement's ability to investigate cybercrimes. They believe ...
  73. [73]
    [PDF] Both Home and IT Ministries pitch for control of Cert-In - AWS
    Jul 13, 2024 · ... Coordination Centre (I4C) under the Ministry of Home Affairs. (MHA). This division is contributing to the dispute over Cert-In's control.
  74. [74]
    A Tale of two Ministries and the Prime Minister's Office
    Dec 8, 2024 · MeitY also argued that CERT's role extends beyond the scope of law enforcement. The claim by MHA is on the basis of the functional ...
  75. [75]
    The Tug of War for CERT-IN: IT Ministry vs. Home Affairs
    Jul 13, 2024 · Two key ministries in India, Information Technology (IT) and Home Affairs (MHA), are in a dispute over control of the CERT-IN. Positions of the ...Missing: MeitY | Show results with:MeitY
  76. [76]
    What Challenges Does India Face in Updating Its Cybersecurity ...
    Sep 10, 2025 · Agencies like CERT-In (under MeitY), NCIIPC (under NTRO), and I4C (under MHA) all play roles, but coordination isn't seamless. The 2024 ...
  77. [77]
    The Missing Link: Why India's Cybersecurity Framework Needs Inter ...
    Mar 25, 2025 · The notification assigns the monitoring of cyber threats and cybersecurity to CERT-In (Indian Computer Emergency Response Team) under MeitY and ...
  78. [78]
    CERT-IN the good and bad side of India's nodal cybersecurity body
    Aug 1, 2023 · CERT-In handled a total of 1,158,208 incidents in 2020, including website intrusion and malware propagation, malicious code, phishing, ...Missing: history achievements controversies
  79. [79]
    Problems with the new India cybersecurity rules | Law.asia
    Dec 19, 2022 · The cybersecurity framework from the Indian Computer Emergency Response Team (CERT-In) was laid out by the Ministry of Electronics and ...Missing: ministerial conflicts
  80. [80]
    Interpreting India's Cyber Statecraft
    Mar 27, 2025 · This paper explores India's cyber statecraft by illustrating how India uses its cyber capabilities, policies, and engagement in cyber diplomacy to further its ...
  81. [81]
    [PDF] Cyber Security Legal Framework in India – Overlaps, Problems and ...
    Mar 9, 2025 · The Ministry of Home Affairs (MHA) plays a critical role in India's cybersecurity legal frame- work, focusing on cybercrime prevention, national ...
  82. [82]
    India's Cybersecurity Talent Shortage: Mounting Risk To Digital Ascent
    Aug 12, 2025 · According to industry data, India requires one million such experts, but currently musters only half that number. This vast deficit carries ...
  83. [83]
    Bridging India's cybersecurity skill gap - Mint
    Aug 10, 2025 · A report by NASSCOM states thatIndia needs at least one million cybersecurity professionals, but currently has less than half that number. The ...
  84. [84]
    40% Of Indian Cybersecurity Teams Understaffed, Almost 70 ...
    Oct 8, 2025 · According to ISACA's survey, 40 per cent of India-based cybersecurity teams are understaffed and 68 per cent have unfilled positions, pointing ...
  85. [85]
    Understaffing in cybersecurity roles and ways to stem skill gaps
    Oct 22, 2023 · The global data showed that 59% of global cybersecurity leaders felt their teams were understaffed. In India, the understaffing percentage was ...
  86. [86]
    Union Budget 2025 will boost AI - S.S. Rana & Co.
    Feb 4, 2025 · Indian Computer Emergency Response Team (CERT-In) has been allocated INR 255 crore (2,550 million), a rise from INR 238 crore (2,380 million) ...
  87. [87]
    India's Cybersecurity and AI Leap: The Union Budget 2024-25 ...
    Jul 25, 2024 · Additionally, the Indian Computer Emergency Response Team (CERT-In) has been allocated Rs 238 crore to handle cybersecurity incidents and ...<|separator|>
  88. [88]
    an evidence-based investigation of cert-in's reporting on cyber ...
    This research aims to analyze government records and secondary sources to understand the cyber-threat landscape, particularly in the healthcare industry. Using ...
  89. [89]
    Curbing Cyber Frauds in Digital India
    Oct 8, 2025 · [14]. Responding to Cyber Incidents. Indian Computer Emergency Response Team (CERT-In) is the national agency for responding to cybersecurity ...
  90. [90]
    CERT-In issues advisory against use of AI Models - S.S. Rana & Co.
    Apr 4, 2025 · The Computer Emergency Response Team (hereinafter referred to as the “CERT-In”) on March 26, 2025 issued an advisory on best practices against vulnerabilities ...
  91. [91]
    25 Major Cyber Attacks in India: Threats and Strategies - EIMT
    Oct 6, 2025 · According to CERT-IN, between 2021 and mid-2025, India recorded more than 2.2 million cybersecurity incidents, averaging more than 3,000 attacks ...Missing: responses | Show results with:responses
  92. [92]
    CERT-In Issues Advisory For All Industries To Safeguard Business ...
    Jun 16, 2025 · The Advisory underscores the increasing frequency and sophistication of cyberattacks including ransomware, DDoS incidents, website defacements, data breaches ...
  93. [93]
    Cybersecurity 2025 - India - Chambers Global Practice Guides
    Mar 13, 2025 · In 2024, India recorded 369.01 million malware detections across 8.44 million endpoints, averaging 702 detections per minute. This represents a ...
  94. [94]
    New CERT-In Rules for Cybersecurity Audits in India - MediaNama
    Jul 31, 2025 · CERT-In has released the Comprehensive Cyber Security Audit Policy Guidelines under the IT Act, 2000 to standardise how audits are conducted ...
  95. [95]
    Guideline - CERT-In
    Guidelines for Secure Application Design, Development, Implementation & Operations. CERT-In Security Guidelines CISG-2023-01. (June 29, 2023). Guidelines on ...<|separator|>
  96. [96]
    [PDF] Technical Guidelines on | SBOM | QBOM & CBOM | AIBOM | HBOM
    Jul 9, 2025 · Overview of SBOM ... CERT-In advisories, threat intelligence platforms, and vendor bulletins to.
  97. [97]
    [PDF] Cyber Security Guidelines for Smart City Infrastructure
    Feb 17, 2025 · CERT-In (www.cert-in.org.in) and will be updated from time to time ... b) Technical Guidelines on SBOM https://www.cert-in.org.in/PDF ...
  98. [98]
    [PDF] Good Practices for protecting Unmanned Aircraft Systems (UAS ...
    Apr 18, 2025 · Refer CERT-In guidelines on. SBOM3 released in October 2024. HBOM (Hardware Bill of Materials): Document all hardware components to.