
Welcome to
ONLiNE UPSC
(GS Paper III – Internal Security and Technology)
The Indian Computer Emergency Response Team (CERT-In), operating under the Ministry of Electronics and Information Technology (MeitY), has released the Comprehensive Cyber Security Audit Policy Guidelines (2025). This initiative aims to standardise the process of cyber audits across India, ensuring that organisations are better prepared to handle the growing number of digital threats.
The policy seeks to:
Auditors: Firms empanelled by CERT-In to perform cyber security audits.
Auditees: All public or private entities managing digital infrastructure such as data centres, websites, banking systems, hospitals, or government portals.
Example: A PSU bank’s data centre or a private hospital’s patient-data system must undergo regular cyber audits under this policy.
Example: An audit of a city’s water-supply control system ensures that hackers cannot manipulate valves or pressure levels remotely.
Example: If a vulnerability is found in a railway ticketing app, auditors must prove it through testing rather than speculation.
Example: After discovering weak passwords in a cloud portal, the auditor recommends multi-factor authentication, and the organisation confirms compliance before submission.
Example: Launching a new online payment gateway or updating hospital software requires a new audit cycle.
Example: Screenshots or test logs from a telecom audit must be deleted after submission to prevent misuse.
Failure to follow the policy may lead to:
Example: A power-grid audit not only detects vulnerabilities but also recommends long-term safeguards such as network segmentation and offline recovery systems.
The CERT-In Cyber Security Audit Policy (2025) introduces a national standard for digital safety audits across all sectors. It mandates annual or event-based audits, emphasises secure data handling within India, and promotes evidence-based evaluations using ISO and OWASP frameworks. The policy shifts India’s cybersecurity approach from mere compliance to proactive risk management and national-level resilience.
What is the purpose of this policy?
To ensure all organisations follow consistent and reliable cybersecurity audit procedures.
Who conducts these audits?
CERT-In-empanelled auditors who are certified to assess IT systems.
How often are audits required?
At least once every year or after significant technological changes.
What happens after an audit?
The organisation must address vulnerabilities and confirm compliance to CERT-In.
What is the penalty for non-compliance?
Suspension of auditor empanelment or legal action under the IT Act.
Kutos : AI Assistant!