ManageEngine x Forrester | Workforce Identity Platforms Landscape Report

Uncategorized

Report breaches to CERT-In within six hours: Indian government’s order to organizations

On April 28, the Indian government’s Computer Emergency Response Team (CERT-In), the cyber response wing of Ministry of Electronics and IT (MeitY), issued a fresh order directing organizations (including service providers, intermediaries, data centers and corporate bodies) to report major security incidents, within six hours after notice.

In a move to improve incident response, protect organizational data/information and ICT infrastructure, the advisory stated: “CERT-In has issued directions relating to information security practices, procedure, prevention, response and reporting of cyber incidents under the provisions of sub-section (6) of section 70B of the Information Technology Act, 2000. These directions will become effective after 60 days.”

The report added, “The directions cover aspects relating to synchronization of ICT system clocks; mandatory reporting of cyber incidents to CERT-In; maintenance of logs of ICT systems; subscriber/customer registrations details by Data centers, Virtual Private Server (VPS) providers, VPN Service providers, Cloud service providers; KYC norms and practices by virtual asset service providers, virtual asset exchange providers and custodian wallet providers. These directions shall enhance overall cyber security posture and ensure a safe & trusted Internet in the country.”

The rule is said to take effect within sixty days post the order’s release.

Related posts
Uncategorized

How to secure your emails using Azure Information Protection

Uncategorized

One-time passcode authentication for Azure AD B2B Guest Users

E-bookUncategorized

Mitigating cybersecurity risks in healthcare: A proactive approach with Cyber Essentials and user life cycle management

Uncategorized

How Azure AD Pass-Through Authentication strengthens your security

×

There are over 8,500 people who are getting towards perfection in Active Directory, IT Management & Cyber security through our insights from Identitude.

Wanna be a part of our bimonthly curation of IAM knowledge?

  • -Select-
  • By clicking 'Become an insider', you agree to processing of personal data according to the Privacy Policy.