Indian companies experienced the highest rate of ransomware attacks in Asia in 2024, with 68% of organizations falling victim . The average cost of a data breach in India reached ₹19.5 crore .Â
What happens when an attack succeeds?Â
For too many organizations, the answer is chaos. Regulatory deadlines are missed. Evidence is lost. Customer trust evaporates.Â
A basic cyber incident response plan is not complicated. It requires clarity, preparation, and alignment with India’s regulatory framework.Â
The Regulatory Landscape
Sector-specific regulations (RBI, SEBI, IRDAI, etc.) may impose additional requirements, but CERT-In and DPDPA apply to every organization handling digital data in India.Â
The Five Phases of Incident Response
Phase 1: Prepare
Phase 2: Detect
How incidents are detected:Â
- Automated tools (endpoint detection, IDS)Â
- Employee reports of suspicious activityÂ
- Customer complaints about fraudÂ
- Vendor notificationsÂ
When alerted:Â
- Validate whether it is a real incidentÂ
- Determine affected systems and dataÂ
- Assess business impactÂ
- Log everything—timestamps, actions, decisionsÂ
Phase 3:Â ContainÂ
Document every containment action. Regulators will ask.Â
Phase 4: Eradicate and Recover
Do not rush. A partially recovered system with remaining malware is a disaster waiting to happen.Â
Phase 5: Report and Learn
CERT-In ReportingÂ
- Deadline: Within 6 hours of noticing an incidentÂ
- What: Targeted attacks, unauthorized access, malware, ransomware, data breaches, DoS attacksÂ
DPDPA Breach NotificationÂ
- Deadline: Within 72 hours to Data Protection BoardÂ
- Also notify affected individuals without delayÂ
- Penalty for non-compliance: Up to ₹250 croreÂ
After-Action Review
Ask:
- How did we detect the incident?Â
- How quickly did we respond?Â
- Where did we hesitate?Â
- What would we do differently?Â
Update your plan based on lessons learned.Â
Retain logs for 180 days (CERT-In requirement).Â
Common MistakesÂ
Conclusion
Organizations with a plan respond faster, contain damage effectively, meet regulatory deadlines, and preserve customer trust.Â
Organizations without a plan face regulatory action, financial loss, and reputational damage.Â
The five phases are simple:Â
- Prepare – Build your team and toolsÂ
- Detect – Know what happenedÂ
- Contain – Stop the damageÂ
- Eradicate & Recover – Remove and restoreÂ
- Report & Learn – CERT-In (6 hrs), DPDPA (72 hrs), update planÂ
Start today. You do not need perfection. You need a plan that works.Â
References :
- CERT-In. (2022). Directions regarding information security practices, procedure, prevention, response and reporting of cyber incidents.Â
- Ministry of Electronics & Information Technology. (2025). Digital Personal Data Protection Rules, 2025.Â
- IBM / Ponemon Institute. (2024). Cost of a Data Breach Report 2024: India findings.Â
- Sophos. (2024). State of Ransomware in Asia 2024.Â

