Report an IncidentTalk to Sales

CERT-In Compliance in India: What Your SOC Must Do to Meet the 2025 Audit Guidelines

Author: Kartik Raval
Updated on: April 23, 2026
Reading Time: 8 Min
Published: 
April 23, 2026

Cybersecurity compliance in India is no longer optional. This article explains CERT-In compliance, who must comply, key audit requirements, SOC responsibilities, audit processes, preparation strategies, risks of non-compliance, and the tools and services needed to meet CERT-In 2025 guidelines effectively. 

What Is CERT-In Compliance and Why Does It Matter for Indian Organizations?

CERT-In compliance is the adherence to cybersecurity directions issued by the Indian Computer Emergency Response Team under Section 70B of the IT Act, requiring organizations to implement defined security controls, incident reporting timelines, and audit mechanisms to protect information technology systems within Indian jurisdiction. 

CERT-In compliance directly impacts cybersecurity resilience, regulatory standing, and business continuity. 

  • Regulatory enforcement 
  • Faster incident response and containment 
  • Stronger security posture 
  • Standardized cybersecurity framework 
  • Protection of critical infrastructure and enterprise systems 
  • Reduced business risk and operational disruption 

Ensure your CERT-In compliance strategy is audit-ready from day one.

Contact Now!

Who Needs to Comply With CERT-In Audit Guidelines in India?

Organizations that fall under CERT-In directions, and the auditors who assess them, need to comply with CERT-In audit guidelines in India. 

  • Organizations undergoing a cybersecurity audit 
  • CERT-In empanelled auditors and auditing firms 
  • Enterprises handling critical systems and digital infrastructure 
  • Entities required to report cyber incidents 
  • Organizations maintaining logs and forensic data 
  • Service providers, intermediaries, and supply chain partners 
  • Organizations regulated under IT Act Section 70B 
  • Entities facing audit or regulatory scrutiny due to non-compliance 

What Are the Key Requirements in CERT-In Cybersecurity Audit Guidelines?

  • Mandatory cybersecurity audit and compliance audit
    Organizations must undergo a security audit conducted through a defined audit process and produce a verifiable audit report aligned with CERT-In guidelines 
  • Time-bound incident reporting requirement
    All specified cyber incidents, including ransomware and unauthorized access, must be reported within 6 hours as per 2022 directions and continued enforcement in 2025 guidelines 
  • Centralized log retention and monitoring
    Systems must maintain log retention for 180 days across servers, network devices, and security operations to support investigation and audit validation 
  • Accurate timestamp synchronization using NTP
    All systems must maintain consistent timestamps using NTP to ensure traceability and integrity of audit evidence 
  • Coverage of critical systems and infrastructure
    The audit scope must include servers, applications, networks, and SOC environments handling enterprise security operations and cyber threats 
  • Evidence-based audit validation
    Compliance is measured through technical evidence, logs, configurations, and controls, not policy documents alone 
  • Defined incident response and SOC workflow readiness
    Organizations must demonstrate operational incident response workflows, detection capabilities, and SOC readiness for handling breaches 
  • Alignment with regulator-issued CERT-In directions
    Requirements are enforced under the national cybersecurity regulator, the Indian Computer Emergency Response Team, under the Ministry of Electronics and Information Technology 
  • Audit scope aligned with evolving cyber threats
    The audit framework evaluates preparedness against current cyber threats, including supply chain risks and advanced attack patterns 
  • Enforcement of compliance and accountability
    Organizations must remain continuously compliant, as non-compliance can trigger regulatory action, audit failure, or penalties under CERT-In 2025 guidelines 

How Does the CERT-In Compliance Audit Process Work?

  • The audit process starts with scope, roles, and planning.
    CERT-In's 2025 audit guidelines define a structured flow that covers selection of auditor, planning the audit, agreeing on the terms of engagement, performance of the audit, reporting, communication with IT governance, and audit evidence documentation. 
  • A CERT-In empanelled auditor evaluates the organization's cybersecurity posture against applicable controls, standards, and evidence.
    The process is designed for both the auditee and the auditing organization, with clear responsibilities on each side. 
  • The audit is evidence-driven, not policy-driven alone.
    Auditors review configurations, logs, observations, and other documented proof to support findings, conclusions, and the final audit report. 
  • The audit report leads to findings, corrective actions, and closure.
    CERT-In's guidelines define observations, non-compliance, root cause analysis, and a closure report to confirm that issues have been addressed. 
  • Incident readiness is part of audit relevance.
    Under CERT-In's directions, specified cyber incidents must be reported within 6 hours, so the audit process also tests whether governance, workflows, and evidence handling support that reporting obligation. 

Need expert support to close compliance gaps?

Talk To Us

What Must a SOC Do to Meet CERT-In 2025 Audit Guidelines?

  • Enable real-time incident detection and 6-hour reporting readiness
    SOC teams must detect, classify, and ensure cyber incidents are reported within 6 hours, aligning workflows with CERT-In directions 
  • Implement centralized logging and monitoring across systems
    SOC must collect, correlate, and retain logs across endpoints, servers, and network devices to support audit evidence and investigations 
  • Ensure accurate time synchronization across infrastructure
    All monitored systems must maintain consistent timestamps using NTP to preserve forensic integrity during audits 
  • Maintain incident response workflows and escalation procedures
    SOC must define and test response workflows that support rapid triage, containment, and reporting of incidents 
  • Integrate SIEM for threat visibility and correlation
    Security operations must use SIEM platforms to detect anomalies, correlate events, and generate actionable alerts 
  • Conduct regular incident response drills and validation exercises
    SOC must simulate scenarios to validate readiness for breaches and ensure reporting timelines are achievable 
  • Maintain audit-ready evidence and documentation
    SOC must preserve logs, alerts, investigation records, and response actions as verifiable audit evidence 
  • Align SOC operations with CERT-In best practices and advisory updates
    SOC must continuously update detection rules, workflows, and controls based on CERT-In advisory and evolving threat landscape 
  • Ensure coverage of critical systems and attack surfaces
    Monitoring must include all critical infrastructure, applications, and access points where cyber incidents may originate 
  • Support continuous compliance and audit validation
    SOC must operate as a continuous compliance function, ensuring systems remain audit-ready at all times under CERT-In 2025 guidelines 

Building a CERT-In-ready SOC in-house is heavy lift.

Explore our Managed SOC Services

How Should Organizations Prepare for CERT-In Compliance in 2025?

  • Assess current security maturity and identify compliance gaps 
  • Establish a structured CERT-In compliance program 
  • Implement incident detection and reporting workflows 
  • Strengthen logging, monitoring, and audit evidence collection 
  • Enable accurate time synchronization using Network Time Protocol 
  • Prepare for cybersecurity audit and certification requirements 
  • Build incident response and cyber defense capabilities 
  • Align third-party and ecosystem compliance requirements 
  • Train security teams and assign clear responsibilities 
  • Continuously update controls based on CERT-In guidelines and advisories 

What Happens if You Fail CERT-In Compliance Requirements?

  • Regulatory penalties under the Information Technology Act 
  • Failure to report cybersecurity incidents within mandated timelines 
  • Increased risk of operational disruption and breach impact 
  • Audit failure and inability to obtain compliance certification 
  • Regulatory investigations and mandatory corrective actions 
  • Loss of trust with clients, partners, and regulators 
  • Operational and contractual risks across supply chain 
  • Higher cost of remediation and delayed recovery 
  • Exposure due to weak logging, monitoring, and audit controls 
  • Continuous compliance burden without structured controls 

Don't let a failed audit or missed 6-hour window cost you crores.

Speak with a CERT-In compliance expert

What Tools and Services Support CERT-In Compliance and SOC Operations?

  • SIEM platforms
    SIEM supports log collection, correlation, alerting, and incident investigation, which are central to CERT-In reporting and SOC operations. 
  • Centralized log management tools
    Log management tools help retain and search security logs needed for incident analysis, audit readiness, and compliance evidence. 
  • NTP time synchronization services
    Systems must maintain accurate timestamps, and CERT-In permits synchronization with NPL or NIC sources, provided time does not deviate from them. 
  • Incident response platforms and playbooks
    Incident response tools help security teams investigate, contain, and report a cybersecurity incident within the required timeline. 
  • SOC monitoring and threat detection services
    SOC services provide continuous monitoring, alert triage, and escalation support for cyber security operations. 
  • CERT-In empanelled audit services
    A CERT-In empanelled auditor supports compliance audits, control validation, and audit report preparation. 
  • Compliance advisory and audit readiness services
    Compliance guide, gap assessment, and documentation support help organizations prepare for CERT-In compliance certificate readiness and ongoing control validation. 
  • Security expertise for policy and workflow design
    Specialized security expertise is needed to align existing security controls, reporting workflow, and evidence handling with CERT-In cybersecurity guidelines. 

FAQs

1. Can CERT-In compliance requirements change frequently?

Yes. CERT-In issues advisories and updates based on evolving cyber threats. Organizations must continuously monitor updates to remain compliant with new CERT-In guidelines and regulatory expectations 

2. Does CERT-In require continuous monitoring or periodic compliance?

CERT-In expects continuous monitoring through SOC operations, not just periodic audits. Compliance must be maintained daily through logging, detection, and incident response workflows 

3. Are cloud-hosted environments treated differently under CERT-In?

No. Cloud environments must follow the same cybersecurity guidelines, including logging, incident reporting, and audit readiness, as on-premise infrastructure 

4. How does CERT-In compliance impact third-party risk management?

Organizations must ensure vendors, partners, and supply chain entities follow compatible security controls, especially if they handle critical systems or sensitive data 

5. Is automation required for CERT-In compliance?

Automation is not mandatory, but it is essential for achieving real-time detection, log analysis, and timely incident reporting within regulatory timelines

Kartik Raval
Kartik is a seasoned cybersecurity professional with over 13 years of experience, currently leading SOC Engineering as Practice Head. He brings deep expertise in SOC engineering and operations, as well as SIEM, SOAR, EDR, and XDR technologies, with a strong track record of delivering scalable and effective cybersecurity solutions. He also contributes to driving organizational innovation, streamlining processes, and enhancing overall cybersecurity posture.

Report an Incident

Report an Incident - Blog

free consultation

Our team of expert is available 24x7 to help any organization experiencing an active breach.

More Topics

crossmenuchevron-down
linkedin facebook pinterest youtube rss twitter instagram facebook-blank rss-blank linkedin-blank pinterest youtube twitter instagram