
Welcome to
ONLiNE UPSC
The Indian Computer Emergency Response Team (CERT-In), under the Ministry of Electronics and Information Technology, has introduced the Comprehensive Cyber Security Audit Policy Guidelines (2025). This policy aims to standardise how cybersecurity audits are conducted across India, ensuring that organisations remain resilient against rising digital threats and cyber vulnerabilities.
The new policy ensures:
Auditors: CERT-In empanelled firms authorised to conduct cybersecurity audits.
Auditees: Public or private entities managing digital infrastructure — including data centres, banks, hospitals, telecom operators, and government portals.
Example: A PSU bank’s data centre or a private hospital’s patient management system must undergo regular cybersecurity audits as per the new policy.
Example: An audit of a city’s water-supply control system ensures hackers cannot manipulate valves or pressure remotely.
Example: If a vulnerability is reported in a railway ticketing app, auditors must confirm it through testing rather than assumption.
Example: After detecting weak passwords in a cloud portal, the auditor recommends multi-factor authentication. The organisation fixes the issue and submits proof of compliance to CERT-In.
Example: Launching a new payment gateway or updating hospital management software requires a fresh cybersecurity audit.
Auditee Organisation:
Auditor:
Example: Screenshots or test logs from a telecom audit must be erased after submission to prevent data misuse.
Failure to adhere to the policy may result in:
Example: A power-grid audit not only identifies vulnerabilities but also recommends long-term measures like network segmentation and offline recovery systems.
The CERT-In Cyber Security Audit Policy (2025) introduces a unified national framework for cybersecurity audits across all sectors. It mandates annual or event-based audits, emphasises data protection within Indian borders, and relies on global standards like ISO and OWASP. The policy promotes evidence-based testing, strict reporting timelines, and secure data handling — transforming India’s approach from reactive compliance to proactive cyber defence.
1. What is the purpose of this policy?
To ensure that all organisations follow consistent and reliable cybersecurity audit procedures.
2. Who conducts these audits?
Only CERT-In empanelled auditors who are certified to assess IT systems and networks.
3. How often are audits required?
At least once annually or after major technological upgrades.
4. What happens after an audit?
The organisation must fix all vulnerabilities and confirm compliance with CERT-In.
5. What is the penalty for non-compliance?
Suspension of audit empanelment, loss of project eligibility, or legal action under the IT Act.
Kutos : AI Assistant!