The CERT-In Log Retention Mandate: Is Your Firewall Compliant?
A detailed guide with background, requirements, implications, and practical steps
In an era where cyber threats are rapidly increasing in scale and sophistication, governments around the world are tightening regulations to improve incident response and forensic readiness. In India, one of the most impactful regulatory shifts has come from the Indian Computer Emergency Response Team (CERT-In), the national agency charged with cyber security preparedness and response under the Information Technology Act, 2000. Wikipedia
Among the recent directives, the log retention mandate stands out as a foundational requirement that affects almost every organization running networked systems—including firewalls, servers, cloud platforms, and security infrastructure. Failing to comply isn’t just a security hygiene gap; it can lead to legal penalties and operational risks.
What Is the CERT-In Log Retention Mandate?
In April 2022, CERT-In issued mandatory directions under Section 70B of the Information Technology Act, 2000, which became effective after a prescribed period. These directions require covered entities to enable and retain system logs for a rolling period of at least 180 days (approximately six months) within Indian jurisdiction. Internet Society
These logs must be maintained in a secure, tamper-resistant manner and must be made available to CERT-In when reporting cyber incidents, or upon order from CERT-In during investigations or audits. TTA
Who Must Comply?
The mandate broadly applies to:
- Service providers
- Intermediaries
- Data centers and cloud service providers
- Virtual private server (VPS) and VPN service providers
- Body corporates
- Government organizations
…and, in effect, almost any organization that operates ICT (Information and Communication Technology) systems covered within India. Internet Society
Why Log Retention Matters
Logs are the forensic building blocks of cybersecurity. They record what happened, where, when, and by whom. In incident investigations—like breaches, ransomware attacks, data leaks, or suspicious access attempts—logs help answer questions such as:
- Which user accessed what system and when?
- Did a threat actor attempt lateral movement?
- What sequence of events preceded the security incident?
Without properly retained logs, incident analysis is slow, incomplete, or even impossible.
CERT-In’s log retention mandate pushes organizations to adopt disciplined logging practices so that when a cyber incident occurs, evidence is readily available for analysis and reporting to national authorities.
Moreover, logs help in internal audit, threat hunting, compliance reporting, and in some cases, legal proceedings.
What Kind of Logs Are Required?
The mandate does not list every possible log type, but guidance and industry interpretations identify the kinds of logs that should be retained, including:
Security & network logs
- Firewall logs
- Intrusion Detection/Prevention System (IDS/IPS) logs
- VPN gateway logs
- Proxy server logs
System & application logs
- Authentication and authorization events
- Operating system event logs
- Database access logs
- Web server logs
Cloud and network infrastructure logs
- Cloud control plane logs
- Network flow logs
- API access logs
The frequency and granularity of these logs should be sufficient to support forensic analysis and incident reporting. AM Legals
Log Retention Duration and Jurisdiction
The core requirement is simple:
Enable logs on all ICT systems and retain them securely for a minimum of 180 days. Internet Society
This includes logs from firewalls and other critical security devices.
Indian Jurisdiction
While some CERT-In FAQs have suggested flexibility (e.g., logs may be stored outside India if they can be produced on demand), many legal interpretations emphasize that logs should be retained within India or made available promptly upon request—especially when incident response or investigations are underway. saikrishnaassociates.com
This has important implications for global organizations serving Indian users: your logging infrastructure and retention policies must ensure logs are available in a timely manner within Indian jurisdiction.
Why Firewalls Matter in Log Retention
Firewalls are often the first line of defense—and one of the richest sources of security-relevant logs. They record:
- Traffic allowed or denied
- Source and destination IPs
- Timestamps for every session
- Protocols and ports used
- Anomalies and blocked attack attempts
These logs are invaluable in investigating incidents and fulfilling CERT-In’s reporting obligations.
If your firewall isn’t logging the right events, or isn’t storing them for at least 180 days, you are likely non-compliant. Firewalls must be configured to generate and export logs to a secure log repository or centralized logging system with long-term retention.
Best Practices for CERT-In Compliance
Log Generation and Collection
Ensure all critical devices are capable of generating detailed logs. For firewalls, this usually means:
- Session logs (allowed/blocked)
- Threat prevention logs
- Authentication and admin activity logs
Centralized Log Storage
Rather than storing logs only on devices (which are often rotated or overwritten), use a centralized log management infrastructure (e.g., SIEM or log lakes) that can:
- Consolidate logs from firewalls and other sources
- Store them securely for 180 days with integrity protections
- Support quick retrieval when needed
Time Synchronization
Logs are useful only if timestamps are accurate. CERT-In directions also mandate synchronization with trusted clocks, such as NTP servers from:
- National Informatics Centre (NIC)
- National Physical Laboratory (NPL)
Accurate timestamps aid forensic analysis and help correlate logs across systems. Internet Society
Secure and Tamper-Resistant Storage
Logs must be stored in a way that prevents tampering or deletion. Techniques include:
- Write Once Read Many (WORM) storage
- Immutable storage tiers
- Retention policies that automatically enforce data aging
Documentation and Audit Trails
Maintain documented policies for logging, retention, access controls, and incident reporting. During audits, you’ll need to show not only logs but also the policies that govern them.
How CERT-In Uses Logs
When a cyber incident is reported, CERT-In may require:
- Logs from the impacted devices (including the firewall)
- Correlation of activities across multiple systems
- Incident timelines
- Supporting artifacts like configuration snapshots or session traces
Providing complete and accurate logs can dramatically accelerate investigation and incident containment.
Compliance Challenges
Data Volume and Costs
Storing 180 days of logs—especially detailed firewall logs—can be storage intensive. Organizations must balance retention needs with infrastructure costs.
Privacy and Data Protection
Logs can contain sensitive user information. Organizations must ensure that log retention complies not only with CERT-In directives but also with applicable privacy regulations.
Multi-Cloud and Hybrid Networks
Many enterprises operate hybrid environments. Ensuring consistent logging and retention across on-premises firewalls, cloud workloads, and third-party services can be complex.
The Penalty for Non-Compliance
Non-compliance with CERT-In directives is not just a technical deficiency. Under the Information Technology Act, failing to comply with directions can lead to legal penalties, including fines and other enforcement measures, particularly if deficiencies impact incident response or undermine national cyber readiness. Ardent Privacy
Key Takeaways
- CERT-In mandates the retention of logs for at least 180 days for all covered entities, including firewalls. Internet Society
- Logs must be securely stored, preferably within Indian jurisdiction or made promptly available. saikrishnaassociates.com
- Firewalls are essential log sources and must be configured for detailed logging and export.
- Effective compliance requires centralized logging infrastructure, time-synchronization, tamper-resistant retention, and clear policies.
Preparing for audits and incident reporting now not only ensures regulatory compliance, but also strengthens your organization’s overall security posture and resilience.