CyberDudeBivash Major Incident Response Playbook (India)

a

0) Pre-incident readiness (do this today)

  • RACI & war-room: name an Incident Commander (IC), Comms Lead, Forensics Lead, Legal/Compliance POC, IT Ops Lead, HR. Keep a 24×7 on-call rota and a single “/warroom” channel.
  • CERT-In pack: prefill incident-report template; list channels — incident@cert-in.org.in, helpline 1800-11-4949, fax 1800-11-6969 — and your org’s CERT-In POC details. en.vikaspedia.inlexcomply.com
  • Time & logs: ensure clocks are NTP-synced to NIC/NPL (or traceable) and retain security logs for 180 days in India so you can produce them during reporting/investigations. azbCERT-In
  • Process baseline: adopt a standard IR lifecycle (Prepare → Detect → Contain → Eradicate → Recover → Lessons). Use NIST SP 800-61 r3 as your current reference (r2 was withdrawn on Apr 3, 2025). NIST Publications

1) First 15 minutes — detect, declare, stabilize

  • Validate the alert; open an “INC-####” ticket; appoint the IC.
  • Snapshot & preserve: collect volatile artifacts (process list, netstat, memory image), start a timeline, and don’t reboot affected hosts.
  • Isolate safely: block egress to known C2/IOCs, disable compromised accounts, and move impacted assets to quarantine VLANs.

2) Minutes 15–60 — contain & scope fast

  • Triage severity (High if data exfil, ransomware, widespread lateral movement, or crown-jewel impact).
  • Scoping: hunt for persistence (scheduled tasks, services, startup items, cloud tokens), enumerate blast radius (users, endpoints, SaaS, cloud).
  • Comms: brief Execs/Legal; pre-draft external holding line (“We’re investigating a security incident; services remain available; more updates to follow”).

3) Within 6 hours — comply with CERT-In

  • Report to CERT-In within 6 hours of noticing/being notified, even if initial info is partial. Include incident type, time, indicators, affected systems, actions taken, and a 24×7 contact. Send to incident@cert-in.org.in; you may also call 1800-11-4949Trilegallexcomply.com
  • Be ready to provide logs and other details on demand; the 2022 Directions require timely reporting and evidence production. Trilegal

Tip: keep a one-click export from SIEM/EDR for the last 7–14 days focused on the MITRE ATT&CK techniques observed. Your 180-day log retention policy ensures deeper lookback if CERT-In requests it. azb

4) 6–24 hours — eradicate & harden

  • Kill persistence: remove scheduled tasks, rogue services, startup artifacts; rotate creds, API keys, and SSO secrets; invalidate OAuth refresh tokens.
  • Patch & block: fix exploited CVEs; add network/DNS blocks; enable stricter email auth (SPF, DKIM, DMARC) if BEC played a role.
  • Forensics chain-of-custody: hash every artifact, record who collected/handled it, and preserve originals.

5) Up to 72 hours — data-breach obligations

  • If personal data is involved, evaluate notification under India’s Digital Personal Data Protection (DPDP) regime. Draft 2025 Rules propose a 72-hour window to inform the Data Protection Board and (where required) affected users — confirm applicability with counsel and follow the latest notified rules. MEDIANAMAIAPPsaikrishnaassociates.com

6) Recovery — clean, verify, monitor

  • Rebuild worst-hit systems from known-good images; re-baseline EDR and integrity monitoring.
  • Gradual restoration behind feature flags/rate limits; enable heightened detection rules and 7–14 days of surge monitoring.

7) After-Action (within 7–10 days)

  • Root-cause with a clear kill-chain; quantify dwell time, MTTD/MTTR, and control gaps.
  • Lessons & fixes: codify new detection rules, tabletop the scenario, and update the IR plan, playbooks, and runbooks.
  • Regulatory wrap-up: file follow-ups to CERT-In with refined details; document evidence of compliance steps (timestamps, logs, contacts). Trilegal

Quick checklists you can paste into your ticket

A) One-page IR checklist

  •  IC named & war-room open
  •  Incident ticket created & severity set
  •  Volatile data captured (mem, net, proc)
  •  Affected assets isolated
  •  Leadership & Legal briefed
  •  CERT-In notified (≤6h); evidence/logs ready
  •  DPDP assessment started (breach/not breach)
  •  Persistence removed; creds/keys rotated
  •  Recovery validated & monitoring heightened
  •  After-action scheduled; docs updated

B) Ransomware first moves (add to A)

  •  Stop spread: isolate; disable SMB where feasible
  •  Identify initial access (phish, exposed RDP, vuln)
  •  Search for exfil (cloud storage links, C2, TOR)
  •  Contact law enforcement where appropriate; preserve notes for insurance/regulatory needs

C) BEC / Payment fraud (India-specific)

  •  Freeze the transaction immediately with bank nodal officer; open case on National Cyber Crime Reporting Portal/Helpline 1930 to try fund-freeze within the “golden hour.” i4c.mha.gov.inCybercrime.gov.in
  •  Enable DMARC “p=reject”, tighten vendor verification (call-back checks), and rotate mailbox rules/tokens.

Copy-paste templates

CERT-In initial email (subject & body)
Subject: [URGENT] Cyber Incident Notification — <Org>, <INC-####>, <Initial Severity>
Body:

  • When noticed: <IST date & time>
  • Incident type: <e.g., ransomware/BEC/cloud key abuse>
  • Affected systems/users/tenants: <high-level>
  • Indicators: <hashes, IPs, domains, URLs>
  • Actions taken so far: <containment/eradication>
  • Point of Contact (24×7): <name, title, phone, email>
  • Logs available: <SIEM/EDR/network>
    (Send to incident@cert-in.org.in; follow with helpline if needed.) en.vikaspedia.in

Customer holding statement (if services affected):
“We detected and contained a security incident on <date>. There’s no evidence of ongoing risk to transactions. As a precaution, we rotated credentials and increased monitoring. If we confirm personal-data impact, we will inform affected users and the authorities per law. Updates will be posted at <status page/URL>.”


Minimum technical evidence kit (per endpoint)

  • Memory dump, process tree, network connections, autoruns/persistence list, EDR timeline, recent Windows Event Logs or Linux journal, browser storage/tokens, cloud access logs.

What “good” looks like in India (controls to prove)

  • CERT-In 6-hour reporting is wired into runbooks, with logs & contacts ready. Trilegal
  • 180-day log retention and NTP sync demonstrably in place. azbCERT-In
  • NIST-aligned lifecycle followed (current SP 800-61 r3). NIST Publications
  • DPDP breach assessment completed and, if applicable, 72-hour notifications prepared per latest rules.
  • 🚀 Stay Ahead of Cyber Threats!
    Daily Cybersecurity News, Threat Intel & AI Security Insights. Visit 👉 https://cyberdudebivash.com 🔐 #CyberDudeBivash

Leave a comment

Design a site like this with WordPress.com
Get started