What is CERT-In?
Historical Background
Key Points
13 points- 1.
CERT-In is mandated to collect, analyze, and disseminate information on cybersecurity incidents. This means it gathers data on attacks, understands their patterns, and shares this knowledge with government agencies, critical infrastructure operators, and even the public, so everyone is better prepared.
- 2.
The agency issues alerts and advisories on the latest cybersecurity vulnerabilities and threats. For example, if a new type of ransomware is detected globally, CERT-In will quickly issue an advisory detailing how it works and what steps organizations can take to protect themselves, acting as an early warning system.
- 3.
It provides emergency measures for handling cybersecurity incidents. If a major government system or a critical utility like a power grid faces a cyberattack, CERT-In steps in to help contain the damage, recover systems, and investigate the breach, much like a digital fire department.
- 4.
CERT-In coordinates cyber incident response activities with various agencies, both government and private. This ensures that when a large-scale attack occurs, there's a unified and efficient response, preventing confusion and duplication of effort across different sectors.
Visual Insights
CERT-In: Mandate, Functions & Key Directives
This mind map details the mandate, core functions, and recent directives of CERT-In, India's national agency for cybersecurity incident response, highlighting its role in protecting India's digital space.
CERT-In (Indian Computer Emergency Response Team)
- ●Mandate & Establishment
- ●Core Functions
- ●Key Focus Areas
- ●Recent Directives (April 2022)
CERT-In's Key Directives & Mandates (April 2022)
This dashboard highlights key numerical mandates issued by CERT-In in April 2022, which are crucial for cybersecurity compliance in India.
- Incident Reporting Timeline
- 6 hours
- User Data Retention Period
- 5 years
All service providers, data centers, and corporate bodies must report cybersecurity incidents within this timeframe to CERT-In.
VPN providers, cloud service providers, and data centers are mandated to store user data (names, email IDs, IP addresses) for this period.
Recent Real-World Examples
1 examplesIllustrated in 1 real-world examples from Mar 2026 to Mar 2026
Source Topic
Iran's Cyber Attacks on AWS Infrastructure: Data Centers as Strategic Targets
Polity & GovernanceUPSC Relevance
Frequently Asked Questions
121. What is the most common MCQ trap related to CERT-In's 2022 directives, specifically concerning the reporting and data retention timelines?
The primary trap lies in confusing the two distinct timelines mandated by the 2022 directives: Incident Reporting: Cybersecurity incidents must be reported to CERT-In within 6 hours of noticing them. This is a short, immediate reporting requirement. Data Retention: VPN providers, cloud service providers, and data centers must store user data for a period of 5 years. This is a long-term data storage mandate. A common MCQ might swap these numbers or associate the wrong timeline with the wrong action.
Exam Tip
Remember "6 hours for reporting, 5 years for storing". The shorter time is for immediate action (reporting), the longer for historical record (storage).
2. Under which specific legal framework does CERT-In derive its powers, and why is understanding Section 70B of the IT Act, 2000 crucial for Prelims?
CERT-In derives its legal authority primarily from the Information Technology Act, 2000, specifically Section 70B. This section is crucial because it mandates the establishment of a national agency for cybersecurity incident response and outlines its core functions and powers. Prelims questions often test the specific Act and section under which statutory bodies are formed, making 70B a direct knowledge point.
