{"id":13975,"date":"2023-01-27T07:57:09","date_gmt":"2023-01-27T07:57:09","guid":{"rendered":"https:\/\/www.esds.co.in\/blog\/?p=13975"},"modified":"2023-01-27T07:58:13","modified_gmt":"2023-01-27T07:58:13","slug":"is-your-organization-ready-for-the-new-cert-in-guidelines","status":"publish","type":"post","link":"https:\/\/www.esds.co.in\/blog\/is-your-organization-ready-for-the-new-cert-in-guidelines\/","title":{"rendered":"Is Your Organization Ready For the New CERT-In Guidelines?"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Heres_the_best_way_to_prep_your_IT_infrastructure_and_manpower_for_these_new_cybersecurity_directives\"><\/span><strong>Here\u2019s the best way to prep your IT infrastructure and manpower for these new cybersecurity directives<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"628\" src=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Blog_New-CERT-In-Guidelines.jpg\" alt=\"is your organisation ready for the new CERT-In guideline?\" class=\"wp-image-13976\" srcset=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Blog_New-CERT-In-Guidelines.jpg 1200w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Blog_New-CERT-In-Guidelines-300x157.jpg 300w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Blog_New-CERT-In-Guidelines-1024x536.jpg 1024w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Blog_New-CERT-In-Guidelines-150x79.jpg 150w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure><\/div>\n\n\n<p style=\"text-align: justify;\">12.67 lakh was the number of Cyber Attacks registered in India till November 2022. With this severity there was a rising need of stringent directives and guidelines in order to enhance and strengthen the cyber security of the country. It was on <strong>28<sup>th<\/sup> April 2022<\/strong> when the Computer Emergency Response Team (CERT-In), a department working under the <strong>Ministry of Electronics and Information Technology (MeitY)<\/strong>, issued new policies and procedures under subsection (6) of section 70B of the Information Technology Act, 2000, relating to information security practices, procedures, prevention, response and reporting of cyber incidents for Safe &amp; Trusted Internet. This was in line with the directive to enhance and improve <strong><a href=\"https:\/\/www.esds.co.in\/blog\/cybersecurity-in-the-cloud-heres-what-it-means\/cyber-security-in-cloud\/\" title=\"\">cyber security<\/a><\/strong> in the country. The directions were to be effective from 60 days from the date of the issue of the guidelines.<\/p><div id=\"ez-toc-container\" class=\"ez-toc-v2_0_76 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.esds.co.in\/blog\/is-your-organization-ready-for-the-new-cert-in-guidelines\/#Heres_the_best_way_to_prep_your_IT_infrastructure_and_manpower_for_these_new_cybersecurity_directives\" >Here\u2019s the best way to prep your IT infrastructure and manpower for these new cybersecurity directives<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.esds.co.in\/blog\/is-your-organization-ready-for-the-new-cert-in-guidelines\/#Time_Clock_Synchronization_to_NTP_servers_of_NIC\" >Time Clock Synchronization to NTP servers of NIC<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.esds.co.in\/blog\/is-your-organization-ready-for-the-new-cert-in-guidelines\/#Cyber_Incidents_Reporting_Within_6_Hours_to_CERT-In\" >Cyber Incidents Reporting Within 6 Hours to CERT-In<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.esds.co.in\/blog\/is-your-organization-ready-for-the-new-cert-in-guidelines\/#Single_POC_to_Communicate_with_CERT-In\" >Single POC to Communicate with CERT-In<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.esds.co.in\/blog\/is-your-organization-ready-for-the-new-cert-in-guidelines\/#Maintain_180_Days_Logs\" >Maintain 180 Days Logs<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.esds.co.in\/blog\/is-your-organization-ready-for-the-new-cert-in-guidelines\/#Maintain_KYC_data_and_records_of_financial_transactions_for_5_years\" >Maintain KYC data and records of financial transactions for 5 years<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.esds.co.in\/blog\/is-your-organization-ready-for-the-new-cert-in-guidelines\/#Is_Your_Organization_Ready_to_Adhere_to_all_the_guidelines\" >Is Your Organization Ready to Adhere to all the guidelines?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.esds.co.in\/blog\/is-your-organization-ready-for-the-new-cert-in-guidelines\/#ESDS_SOC_as_a_Service_Your_Helping_Hand_To_Adhere_To_All_The_CERT-In_Guidelines\" >ESDS SOC as a Service: Your Helping Hand To Adhere To All The CERT-In Guidelines<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.esds.co.in\/blog\/is-your-organization-ready-for-the-new-cert-in-guidelines\/#To_Conclude\" >To Conclude<\/a><\/li><\/ul><\/nav><\/div>\n\n\n\n\n<p style=\"text-align: justify;\"><strong>Following are some of the major requisites mentioned in the guidelines<\/strong><\/p>\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\"><span class=\"ez-toc-section\" id=\"Time_Clock_Synchronization_to_NTP_servers_of_NIC\"><\/span><strong>Time Clock Synchronization to NTP servers of NIC<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"628\" src=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Image-2-3.jpg\" alt=\"time clock synchronization\" class=\"wp-image-13977\" srcset=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Image-2-3.jpg 1200w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Image-2-3-300x157.jpg 300w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Image-2-3-1024x536.jpg 1024w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Image-2-3-150x79.jpg 150w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure><\/div>\n\n\n<p style=\"text-align: justify;\">All the service providers, <strong><a href=\"https:\/\/www.esds.co.in\/our-datacenter\" title=\"\">Data Centers<\/a><\/strong>, intermediaries, government organizations, and body corporates in India shall compulsorily connect and synchronize their time with either the <strong>Network Time Protocol (NT<\/strong>P) server of the <strong>National Informatics Center (NIC)<\/strong> or the <strong>National Physical Laboratory (NPL)<\/strong>, or with servers traceable to these NTP servers.<\/p>\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\"><span class=\"ez-toc-section\" id=\"Cyber_Incidents_Reporting_Within_6_Hours_to_CERT-In\"><\/span><strong>Cyber Incidents Reporting Within 6 Hours to CERT-In<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"628\" src=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Image3.jpg\" alt=\"cyber incidents reporting within 6 hours to CERT-In\" class=\"wp-image-13978\" srcset=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Image3.jpg 1200w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Image3-300x157.jpg 300w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Image3-1024x536.jpg 1024w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Image3-150x79.jpg 150w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure><\/div>\n\n\n<p style=\"text-align: justify;\">In case of incidents all the service providers, intermediary, Data Center Government Organization, or a body corporate will here on have an obligation to report these incidents within 6 hours of noticing or being brought to notice about such incidents via email, phone or fax.<\/p>\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\"><span class=\"ez-toc-section\" id=\"Single_POC_to_Communicate_with_CERT-In\"><\/span>Single POC to Communicate with CERT-In<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"628\" src=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Image4.jpg\" alt=\"single POC to communicate with CERT-In\" class=\"wp-image-13979\" srcset=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Image4.jpg 1200w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Image4-300x157.jpg 300w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Image4-1024x536.jpg 1024w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Image4-150x79.jpg 150w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure><\/div>\n\n\n<p style=\"text-align: justify;\">The service providers, intermediary, Data Center, Government Organization, or a body corporate must designate a single point of contact to interface with <strong>CERT-In<\/strong>, who when ordered or directed by <strong>CERT-In<\/strong> must take action or provide information or any similar assistance in a defined format to <strong>CERT-In<\/strong> that will contribute towards <strong><a href=\"https:\/\/www.esds.co.in\/blog\/cybersecurity-mesh-how-does-it-impact-your-business\/\" title=\"\">cyber security<\/a><\/strong> mitigation actions and enhanced cyber security situational awareness.<\/p>\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\"><span class=\"ez-toc-section\" id=\"Maintain_180_Days_Logs\"><\/span><strong>Maintain 180 Days Logs<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"628\" src=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Image5.jpg\" alt=\"Maintain 180 Days Logs\" class=\"wp-image-13980\" srcset=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Image5.jpg 1200w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Image5-300x157.jpg 300w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Image5-1024x536.jpg 1024w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Image5-150x79.jpg 150w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure><\/div>\n\n\n<p style=\"text-align: justify;\">It will be mandatory for all service providers, intermediaries, <strong><a href=\"https:\/\/www.esds.co.in\/blog\/different-types-of-data-centers-and-their-different-tasks\/\" title=\"\">Data Centers<\/a><\/strong>, body corporate, and Government organisations to securely maintain logs of their ICT systems for a rolling period of 180 days within the Indian jurisdiction.<\/p>\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\"><span class=\"ez-toc-section\" id=\"Maintain_KYC_data_and_records_of_financial_transactions_for_5_years\"><\/span>Maintain KYC data and records of financial transactions for 5 years<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"628\" src=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Image6.jpg\" alt=\"KYC data and records of financial transaction for 5 years\" class=\"wp-image-13981\" srcset=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Image6.jpg 1200w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Image6-300x157.jpg 300w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Image6-1024x536.jpg 1024w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Image6-150x79.jpg 150w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure><\/div>\n\n\n<p style=\"text-align: justify;\">The virtual asset service providers, virtual asset exchange providers, and custodian wallet providers should compulsorily maintain the records obtained as Know Your Customer or of financial transactions for a period of five years.<\/p>\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\"><span class=\"ez-toc-section\" id=\"Is_Your_Organization_Ready_to_Adhere_to_all_the_guidelines\"><\/span>Is Your Organization Ready to Adhere to all the guidelines?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"628\" src=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Image7.jpg\" alt=\"is your organization ready to adhere to all the guidelines?\" class=\"wp-image-13982\" srcset=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Image7.jpg 1200w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Image7-300x157.jpg 300w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Image7-1024x536.jpg 1024w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Image7-150x79.jpg 150w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure><\/div>\n\n\n<p style=\"text-align: justify;\">In addition to requiring the reporting of cyber events in India (as mentioned above), the new CERT-In guideline also encourages enterprises to overhaul and rethink their entire IT and network security architecture. In these instances, the main concern is whether <strong>CERT-In&#8217;s new guidelines<\/strong> will help your organisation run its operations smoothly or be another tedious task that all organizations will need to adhere to in the Indian jurisdiction.<\/p>\n\n\n\n<p style=\"text-align: justify;\">The biggest concern for organizations still lies with reporting a cyber-incident within a six-hour time frame. Analyzing the overall security posture of the organization is vital and aligning the IT strategy with the entire business is now an important part of the boardrooms.<\/p>\n\n\n\n<p style=\"text-align: justify;\">As technology advances, so do the cyber threats that organizations must face. To help combat these threats is the main motto for the new guidelines for organizations to follow in order to strengthen their cyber security posture. But is your organization ready to implement these new guidelines?<\/p>\n\n\n\n<p style=\"text-align: justify;\">One key aspect of the new guidelines is the emphasis on incident management. <strong>CERT-In<\/strong> stresses the importance of having a clear incident management plan in place, which should include procedures for identifying, assessing, and responding to security incidents. This is crucial in today&#8217;s digital age where cyber-attacks are becoming more frequent and sophisticated.<\/p>\n\n\n\n<p><strong>Following are some of the crucial queries that organizations functioning within the Indian jurisdiction need to answer.<\/strong><\/p>\n\n\n\n<p style=\"text-align: justify;\">Does your organization have an incident response plan in place? Are your employees trained to recognize and report security incidents?<\/p>\n\n\n\n<p style=\"text-align: justify;\">Another key aspect of the guidelines is the focus on <strong><a href=\"https:\/\/www.esds.co.in\/blog\/make-your-endpoint-security-a-reality\/\" title=\"\">securing the endpoint<\/a><\/strong>. The guidelines recommend using endpoint security solutions such as antivirus software, firewall, and intrusion detection systems to protect against malware and other cyber threats. But are all the endpoints in your organization secured? Are they regularly updated and patched?<\/p>\n\n\n\n<p style=\"text-align: justify;\">The guidelines also recommend the use of encryption to protect sensitive data and suggest organizations implement a data classification scheme to identify and protect sensitive data. But is your organization&#8217;s sensitive data encrypted? Is it classified and protected accordingly?<\/p>\n\n\n\n<p style=\"text-align: justify;\">The guidelines also recommends for the organizations to conduct regular security audits and penetration testing, to identify and remediate vulnerabilities in their IT infrastructure. But when was the last time your organization conducted a security audit?<\/p>\n\n\n\n<h2 class=\"has-text-align-center wp-block-heading\"><span class=\"ez-toc-section\" id=\"ESDS_SOC_as_a_Service_Your_Helping_Hand_To_Adhere_To_All_The_CERT-In_Guidelines\"><\/span>ESDS SOC as a Service: Your Helping Hand To Adhere To All The CERT-In Guidelines<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1200\" height=\"628\" src=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Image8.jpg\" alt=\"ESDS SOC as a Service\" class=\"wp-image-13983\" srcset=\"https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Image8.jpg 1200w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Image8-300x157.jpg 300w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Image8-1024x536.jpg 1024w, https:\/\/www.esds.co.in\/blog\/wp-content\/uploads\/2023\/01\/Image8-150x79.jpg 150w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/figure><\/div>\n\n\n<p style=\"text-align: justify;\">The new guidelines are to facilitate organizations to follow in order to strengthen their cyber security posture. But as cyber threats continue to evolve, it can be a daunting task for organizations to keep up with the latest security technologies and best practices. This is where ESDS SOC as a Service comes in as a helping hand.<\/p>\n\n\n\n<p style=\"text-align: justify;\"><strong><a href=\"https:\/\/www.esds.co.in\/soc-as-a-service\" title=\"\">ESDS SOC as a Service<\/a><\/strong> is a comprehensive security solution that can help organizations adhere to all the CERT-In guidelines. By outsourcing security operations to a third-party provider, organizations can access the expertise and resources they need to protect their networks and data.<\/p>\n\n\n\n<p style=\"text-align: justify;\">One of the key features of <strong>ESDS SOC as a Service<\/strong> is incident management. <strong>ESDS SOC as a Service<\/strong> provides a clear incident management plan that includes procedures for identifying, assessing, and responding to security incidents, which is in line with the new CERT-In guidelines. This ensures that organizations are prepared to handle any security incidents that may arise.<\/p>\n\n\n\n<p style=\"text-align: justify;\">Another important aspect of <strong>ESDS SOC as a Service<\/strong> is endpoint security. <strong>ESDS SOC<\/strong> as a Service provides endpoint security solutions such as antivirus software, firewall, and intrusion detection systems to protect against malware and other <strong>cyber threats<\/strong>, which is in line with the CERT-In guidelines. This helps organizations secure all the endpoints in their network, ensuring they are protected against cyber threats.<\/p>\n\n\n\n<p style=\"text-align: justify;\"><strong><a href=\"https:\/\/www.esds.co.in\/\" title=\"\">ESDS<\/a><\/strong> SOC as a Service also provides encryption solutions to protect sensitive data and suggests organizations implement a data classification scheme to identify and protect sensitive data, which is in line with the new CERT-In guidelines. This helps organizations keep their sensitive data protected and secure.<\/p>\n\n\n\n<p style=\"text-align: justify;\">The <strong>ESDS SOC<\/strong> <strong>as a Service<\/strong> also recommends regular security audits and penetration testing, to identify and remediate vulnerabilities in their IT infrastructure, which is in line with the new CERT-In guidelines. This ensures that organizations stay compliant with the latest security standards.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"To_Conclude\"><\/span>To Conclude<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p style=\"text-align: justify;\">Implementing the new CERT-In guidelines is essential for any organization to stay protected from cyber threats. It is important for organizations to regularly evaluate and assess their security posture to ensure they are complying with these guidelines. In the event of non-compliance, organizations may face penalties and reputational damage. So it is important for organizations to take the necessary steps to ensure they are in compliance with the new CERT-In guidelines. Regularly evaluating and assessing your organization&#8217;s security posture is crucial in protecting your organization from cyber threats.<\/p>\n\n\n\n<p style=\"text-align: justify;\">In summary, <strong>ESDS SOC<\/strong> <strong>as a Service<\/strong> is a comprehensive security solution that can help organizations adhere to all the CERT-In guidelines. It provides a range of security solutions that can help organizations protect their networks and data, as well as stay compliant with the latest security standards. Organizations that are looking for a helping hand to adhere to all the CERT-In guidelines, <strong>ESDS SOC<\/strong> <strong>as a Service<\/strong> is the perfect solution.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Here\u2019s the best way to prep your IT infrastructure and manpower for these new cybersecurity directives 12.67 lakh was the number of Cyber Attacks registered in India till November 2022. With this severity there was a rising need of stringent directives and guidelines in order to enhance and strengthen the cyber security of the country&#8230;. <\/p>\n<div class=\"clear\"><\/div>\n<p><a href=\"https:\/\/www.esds.co.in\/blog\/is-your-organization-ready-for-the-new-cert-in-guidelines\/\" class=\"gdlr-button small excerpt-read-more\">Read More<\/a><\/p>\n","protected":false},"author":73,"featured_media":13984,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[1271],"tags":[3211,1832,1344,3212,3214,3215,3213,1816],"class_list":["post-13975","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-2","tag-cert-in-guidelines","tag-cybersecurity","tag-data-centers","tag-ministry-of-electronics-and-information-technology-meity","tag-national-informatics-center","tag-national-physical-laboratory","tag-network-time-protocol","tag-soc-as-a-service"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/13975","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/users\/73"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/comments?post=13975"}],"version-history":[{"count":2,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/13975\/revisions"}],"predecessor-version":[{"id":13987,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/posts\/13975\/revisions\/13987"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/media\/13984"}],"wp:attachment":[{"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/media?parent=13975"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/categories?post=13975"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esds.co.in\/blog\/wp-json\/wp\/v2\/tags?post=13975"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}