ISMS Copilot
CERT-In Directions 2022

CERT-In Directions 2022 Copilot

Understand India's mandatory cyber-incident reporting and log-retention obligations under the CERT-In Directions

What the CERT-In Directions 2022 Copilot Can Do

Identify which of the six Directions apply to your entity type

Understand the 6-hour reporting trigger and all twenty Annexure I incident categories

Navigate the 180-day ICT log retention requirement under Direction (iv)

Map subscriber data and 5-year retention obligations under Direction (v) for VPS, cloud, and VPN providers

Interpret KYC and transaction record requirements under Direction (vi) for virtual asset providers

Draft a Point of Contact submission aligned with the Annexure II format for Direction (iii)

About CERT-In Directions 2022 Copilot

The CERT-In Directions (No. 20(3)/2022-CERT-In, dated 28 April 2022) impose mandatory cyber-incident reporting, ICT log retention, time synchronisation, and subscriber or KYC record-keeping obligations on service providers, intermediaries, data centres, body corporates, and government organisations in India. ISMS Copilot helps you interpret each of the six Directions, map your obligations by entity type, and prepare for compliance.

Frequently Asked Questions

What are the CERT-In Directions 2022?

The CERT-In Directions (No. 20(3)/2022-CERT-In) are legally binding directions issued by the Indian Computer Emergency Response Team under s. 70B(6) of the Information Technology Act, 2000, imposing obligations on service providers, intermediaries, data centres, body corporates, and government organisations covering cyber-incident reporting, ICT log retention, NTP synchronisation, subscriber record-keeping, and KYC maintenance.

How does the CERT-In Directions 2022 Copilot help?

The Copilot helps you interpret each of the six Directions by reference to the source text, identify which obligations apply to your organisation's entity type, and understand the scope of reportable incident categories listed in Annexure I — so your team can make informed decisions about compliance steps.

Which incidents must be reported to CERT-In, and how quickly?

Direction (ii) requires reporting of all twenty incident categories listed in Annexure I — including data breach, data leak, ransomware, DoS/DDoS, and unauthorised access — within 6 hours of noticing the incident or being brought to notice of it, to CERT-In via email at incident@cert-in.org.in, phone 1800-11-4949, or fax 1800-11-6969.

Ready to streamline your compliance work?

Built for speed, accuracy, and audit-ready output.