In late April, the Indian Computer Emergency Response Team (CERT-In) mandated cybersecurity reporting to the authorities within six hours for all incidents. The directive is part of a growing global trend to ensure that law enforcement agencies are informed of any new and ongoing incidents, and those impacted by a breach are made aware that their data is at risk.

The Indian directive is considerably more aggressive than those passed by the US and the European Union; each of those regions allows for 72 hours to pass after an incident before reporting. CERT-In’s previous rules required that those within its jurisdiction report incidents in a “reasonable time”. Clearly, CERT-In felt the existing timeframe was ineffective and significantly increased the pressure.

This legislation will impact service providers, intermediaries, data centres, corporate bodies, and government organisations. Many of these types of organisations will find it challenging to comply with the directive based on their current cybersecurity posture and the size of their cyberteams.

However, the bigger question is whether tighter reporting rules can strengthen and improve India’s cybersecurity?

The compliance factor

Beginning June 28, when the directive will be in force, Indian organisations will need to report cybersecurity incidents, including targeted scanning or probing of critical networks and systems, compromises to critical systems and information, and any unauthorised access of data and systems.

The organisations under attack must include specific details in their report. They must identify the affected systems, networks, or devices and describe how the breach occurred. The report must also include an estimated time frame when the breach took place, describe the impact to operations, and discuss the vulnerability that enabled the attacker to break through the company’s cyber-defences. When available, they must also include the attacker’s identification. Lastly, they must submit all IT logs from the previous 180 days.

Capturing the data required for reporting isn’t simple, and the tight time frame makes it even more difficult for organisations. To be truly compliant, Indian organisations need to implement effective detection tools that can identify and notify security personnel when an attack is in progress.

Security teams must be capable of discerning between true attacks and false positives, and quickly investigate the incident to understand the scope. Then, they must have the tools in place to gather all the relevant data needed to aid CERT’s investigation and potential mitigation.

Today, many Indian organisations lack the sophisticated cybersecurity tools and personnel needed to comply with CERT-In's requirements. They need state-of-the-art security and detection platforms, such as an XDR (extended detection and response) being operated by highly skilled cybersecurity professionals that are trained and evaluated based on response rate and speed. Fortunately, some XDR platforms are highly autonomous, thereby improving the skill set of operators while reducing staffing needs.

Complying with the 6-hour directive will be difficult for many Indian organisations, but one of the consequences of this action will be a significantly improved cybersecurity posture across the country.

Organisations will have no choice but to upgrade their existing security apparatus to a modern system capable of thwarting the world’s biggest threat actors. New XDR systems will be deployed, and companies will either hire new employees or outsource some of their security operations to leading vendors.

As part of being compliant, they will conduct cybersecurity assessments of their entire on-premises and cloud footprint, improve employee training, and upgrade their threat detection. Organisations will have the capacity to develop actionable responses to imminent threats, ingest actionable intel, and proactively find threats.

As a result, we expect to see increased cybersecurity across the board in India. Data received by CERT-In will allow them to stay abreast of any attacks and help further improve Indian cybersecurity.

Demanding reports within six hours of identifying a breach won’t be easy, and with an existing shortage of cybersecurity specialists in India, organisations will need to compete for talent.

However, this will push Indian organisations to improve their security posture. Tools like Singularity XDR, which extends beyond the endpoint with end-to-end enterprise visibility and protection will start to be deployed more effectively, protecting every corner of the enterprise.

Powered by machine learning, Singularity XDR makes the technology autonomous, enabling organisations to achieve machine-speed cybersecurity with any kind of staffing model. Improving cybersecurity and reducing threats is always the right response.

The writer is Managing Director for India and SAARC, SentinelOne

comment COMMENT NOW