Understanding IR retainer India cost before a ransomware group detonates at 2 AM on a Sunday is the difference between recovery in hours and recovery in days. The organisations that take days to recover are the ones still negotiating an SOW while the attacker moves laterally. This guide breaks down what an IR retainer costs in India, what ₹2.4 lakh per quarter actually buys, and how to evaluate a retainer against the CERT-In six-hour reporting requirement.
The article moves top-down: what an IR retainer is, the three retainer tiers, what is included and excluded, the 24×7 workflow, and how to document the engagement for regulator acceptance.
What an incident-response retainer actually is
An incident-response retainer is a pre-negotiated agreement with a security firm that provides:
- Guaranteed response-time commitment (typically 15–60 minutes)
- Pre-authorised forensic access to systems and logs
- Pre-customised playbooks and reporting templates
- Quarterly table-top exercises and readiness reviews
- Direct partner-level escalation contact
What an IR retainer is not:
- A preventative security service — it does not replace VAPT or monitoring
- An unlimited-hours arrangement — most retainers include a defined number of response hours per quarter
- A guarantee of zero impact — it guarantees speed and expertise, not outcome
IR retainer tiers in India
| Tier | Quarterly fee (INR) | Response time | Included hours/quarter | Best for |
|---|---|---|---|---|
| Essential | ₹2,40,000 | 60 minutes | 16 hours | Mid-market SaaS, non-regulated entities |
| Professional | ₹4,80,000 | 30 minutes | 32 hours | BFSI, HealthTech, SEBI-regulated entities |
| Enterprise | ₹9,60,000 | 15 minutes | 64 hours + war-room | Large BFSI, crypto exchanges, MIIs |
What ₹2.4L/quarter buys: the Essential tier
Included
- 60-minute response-time SLA (measured from acknowledged alert to analyst engagement)
- 16 hours of remote forensic analysis per quarter
- Pre-customised incident-response playbook
- CERT-In six-hour reporting template
- Quarterly table-top exercise (1 scenario)
- Monthly threat-intelligence briefing (India-focused)
- Post-incident report with root-cause analysis and remediation roadmap
Not included
- On-site response (available at ₹25,000/day + travel)
- Legal counsel or regulatory liaison
- Ransomware negotiation services
- Infrastructure rebuild or remediation labour
- Extended monitoring beyond the incident window
The 24×7 response workflow
T+0 to T+15 minutes: alert and triage
- Client calls the retainer hotline or sends the alert email
- Duty analyst acknowledges and begins triage
- Initial classification: malware, breach, DDoS, insider threat, or other
T+15 to T+60 minutes: containment
- Isolate affected systems (network segmentation, endpoint isolation)
- Preserve forensic evidence (memory dumps, disk images, log exports)
- Determine scope: how many systems, what data, what user populations
T+1 to T+6 hours: reporting and escalation
- Initial report to CERT-In (if applicable) within six hours
- Sectoral regulator notification (RBI, SEBI, IRDAI) as required
- Board / executive briefing call
T+6 to T+24 hours: analysis and eradication
- Forensic timeline construction
- Root-cause analysis
- Malware reverse engineering (if required)
- Eradication of attacker presence
T+24 to T+72 hours: recovery and hardening
- System rebuild or restoration from clean backups
- Control-gap closure
- Re-test to confirm eradication
T+72 hours+: documentation and lessons learned
- Final incident report
- Regulator follow-up
- Table-top exercise update
- Insurance claim support (if applicable)
Common IR retainer mistakes
- Buying on price without checking response time. A ₹1L retainer with 4-hour response is worthless for ransomware.
- Not testing the retainer. Table-top exercises reveal communication gaps, access issues, and playbook gaps before a real incident.
- Assuming the retainer covers everything. Most retainers have hour limits. Excess hours are billed at a standard rate.
- Forgetting regulator notification. The retainer must include CERT-In, RBI, or SEBI reporting templates specific to your sector.
- No on-site option. For breaches involving physical infrastructure or evidence seizure, remote-only response is insufficient.
Vendor evaluation rubric for IR retainers
- What is your median time-to-engagement for retainer clients? The SLA is a ceiling; the median is the real metric.
- Are you CERT-In empanelled for incident response? Non-empanelled firms cannot file CERT-In reports on your behalf.
- How many India-based incidents have you handled in the last 12 months? International firms may lack local regulator relationships.
- Do you fix the retainer fee in INR for the contract term? Variable billing destroys budget predictability.
- Will the same partner attend scoping, the incident, and the board debrief? Continuity matters for context retention.
We answer all five specifically and in writing during scoping.
Cross-framework mapping
- CERT-In Direction 20(3)/2022 — The six-hour reporting window is the hardest deadline. A retainer pre-stages the reporting workflow. See our CERT-In runbook.
- ISO 27001:2022 Annex A 5.24 — Information security incident management planning and preparation. See our ISO 27001 service page.
- SOC 2 CC7.3 — Incident detection and monitoring. See our SOC 2 service page.
Sector-specific IR retainer considerations
The three-tier framework applies broadly. Each industry vertical introduces specific drivers that affect the appropriate tier and the retainer scope.
BFSI — Professional or Enterprise tier required
Indian banks, NBFCs, and payment aggregators face the strictest IR expectations. RBI’s Cyber Security Framework expects sub-15-minute response capability for material incidents; CERT-In Direction 20(3)/2022 requires reporting within six hours; sectoral coordinator (CSIRT-Fin) expects parallel notification. The Essential tier’s 60-minute response is insufficient; BFSI organisations should retain at the Professional or Enterprise tier minimum.
Capital markets — Enterprise tier strongly recommended
SEBI-regulated entities, particularly Market Infrastructure Institutions and top-100 brokers, face SEBI-coordinated cyber-resilience drills, MSOC integration requirements, and continuous regulator scrutiny. The Enterprise tier’s war-room support and 15-minute SLA align with these expectations.
HealthTech — Professional tier for PHI exposure
Indian HealthTech platforms handling PHI face DPDP children’s-data and DISHA framework expectations on top of general cybersecurity. The Professional tier’s faster response (30 minutes) is typically appropriate; PHI exposure incidents have legal-counsel coordination requirements that the Essential tier may not adequately support.
Crypto exchanges — Enterprise tier mandatory
Crypto exchanges face threat-actor sophistication that justifies the highest tier. The Enterprise tier’s war-room support, 15-minute response, and 64 included hours per quarter align with the operational reality. Most Indian-origin crypto exchanges operate at this tier or higher.
B2B SaaS — Essential tier sufficient initially
Most Bangalore B2B SaaS platforms can begin at the Essential tier and upgrade as enterprise customer expectations evolve. The trigger for upgrade is typically the first major customer asking for SLA-backed incident response in the contract.
What “included hours” actually mean
The retainer’s included hours are operationally significant. Most retainers structure hours as:
Response hours. Time spent on actual incident handling — analyst investigation, forensic analysis, containment activities. Typically the largest category.
Preparation hours. Time spent on quarterly tabletop exercises, runbook updates, threat-intelligence briefings. Allocated explicitly per quarter.
Reporting hours. Time spent on regulatory reporting (CERT-In, RBI, SEBI), board briefings, and post-incident documentation.
Excess-hour rates. Rates for hours beyond the included tier. Typical excess rates: ₹15,000–₹25,000/hour for analyst time; ₹35,000–₹60,000/hour for senior consultant or partner time.
Procurement teams negotiating IR retainers should clarify the hour categorisation, because retainers that allocate all hours to “preparation” and zero to “response” are designed to extract excess-hour billing during real incidents.
Tabletop exercise scenarios for retainer testing
Effective retainer relationships test the engagement quarterly with realistic scenarios. The scenarios we run with Bangalore retainer clients include:
Scenario A — ransomware via compromised vendor remote-access tool. Tests vendor-incident coordination, multi-system containment, and shared-infrastructure response.
Scenario B — BEC fraudulent wire transfer initiated by finance team. Tests verification protocol, financial control, and banking partner coordination.
Scenario C — cloud account compromise via leaked GitHub credentials. Tests credential rotation, exfiltration assessment, cloud forensics.
Scenario D — insider threat with data exfiltration. Tests detection, HR-coordinated investigation, evidence preservation.
Scenario E — supply chain compromise via npm dependency. Tests software-bill-of-materials process, build verification, customer impact assessment.
Retainer clients who run all five scenarios over a year have materially better real-incident response than clients who run none.
Documenting the retainer for regulator acceptance
For Indian regulated entities, the IR retainer documentation matters for inspection acceptance.
Engagement letter content
Should explicitly include: response-time SLA, included-hour allocation, regulator-reporting workflow (CERT-In, RBI, SEBI as applicable), data-handling protocol, retention policy for forensic artefacts, jurisdiction for any disputes.
Evidence of preparation
Quarterly tabletop exercise reports, threat-intelligence briefing records, runbook update history, escalation-tree validation records.
Real-incident logs
For any real incidents handled under the retainer, documentation including: detection time, escalation time, containment time, regulatory-notification time, full forensic timeline, root-cause analysis, remediation evidence, re-test confirmation.
Regulators conducting inspection ask for this documentation; retainer relationships that maintain it pass inspections faster than relationships that reconstruct documentation post-hoc.
Practical next steps
If you do not have an incident-response playbook, use the 24×7 workflow above as a starting point. If you need to verify your auditor’s empanelment, see our CERT-In Empanelled Auditor List guide. If you want to scope an IR retainer, our Incident Response service page walks through the model and pricing.
For organisations that want a thirty-minute scoping conversation with a partner, the contact form in the site footer books the call directly. We commit to written scope, fixed retainer in INR, and 24×7 response with sub-15-minute median time-to-engagement.
IR retainer FAQ
Do I need a retainer if I have an in-house security team? Most in-house teams benefit from a retainer for forensic depth, regulator-coordination expertise, and capacity overflow during major incidents. Small in-house teams especially benefit; large enterprise security teams may not.
Is the response-time SLA the same for all incident types? Generally yes. Some retainers include faster SLA for specific incident categories (ransomware, BEC) but the standard is uniform across types.
Can I test the retainer with a fake incident? Yes — quarterly tabletop exercises are built for exactly this. Real-incident-style drill testing reveals gaps before a real incident.
What’s included in the response hours? Analyst time spent on investigation, containment, forensic analysis, and reporting. Travel time is typically separate; engagement hours focus on substantive incident work.
Are excess hours billed at premium rates? Yes, typically. Excess-hour rates are usually 25–50% higher than the implicit included-hour rate. Procurement teams should clarify these rates upfront.
Can the retainer cover multi-entity organisations? Yes — most retainers can be scoped to cover related entities. Scope-extension affects the SLA hours and pricing.
Does the retainer include legal counsel? Generally no. Some retainers include coordination with your legal counsel; substantive legal work is separate.
What about insurance coordination? Yes for cyber-insurance carriers — the retainer typically includes coordination during incident response. Specific insurers may have preferred-vendor lists.
Can the same firm provide both VAPT and IR retainer? Yes, and many do. The same firm understanding your environment from VAPT engagement provides faster incident response. Auditor-independence is preserved if the firm is not also the assurance auditor.
Is on-site response part of the standard retainer? Remote response is standard; on-site response is typically billed separately at daily rates plus travel. Pre-negotiating on-site rates avoids procurement friction during an active incident.
What happens if I need to terminate the retainer? Most retainers allow termination on 60–90 day notice. Pre-paid quarterly fees may be partially refundable depending on contract terms.
Does retaining one firm prevent me from engaging others? Generally no — the retainer is non-exclusive. You can engage additional firms for specific scopes, though most organisations consolidate to a single primary IR retainer.
Operational mechanics of an effective IR retainer relationship
Beyond the headline structure, several operational mechanics distinguish effective from nominal retainer relationships.
Onboarding depth
Strong retainer relationships invest 2–4 weeks in onboarding before the first incident. Activities: environment walkthrough, log-source mapping, escalation-tree validation, runbook customisation, key-personnel introduction. Without onboarding depth, the first-incident response is materially slower because the IR team is learning the environment under pressure.
Knowledge management
Each incident produces forensic artefacts, lessons-learned documentation, and updates to the runbook. Mature retainer relationships maintain a knowledge base that compounds over time — the second incident is faster because the first was documented thoroughly.
Cross-team integration
Retainer relationships work best when the IR team has channel-level integration with your engineering team — Slack/Teams access, ticket-system integration, pre-authorised forensic-tool deployment. Channel-level integration adds value daily; per-incident handoffs add friction.
Tabletop quality
Quarterly tabletops vary materially in quality. Effective tabletops use realistic scenarios, surface specific gaps with documented remediation, and produce after-action reports the security team treats seriously. Pro-forma tabletops produce minimal benefit.
Threat-intelligence relevance
The monthly threat-intelligence briefing should include India-specific threats relevant to your sector, not generic global threat reports. Bangalore BFSI clients want UPI-fraud-pattern intelligence; HealthTech clients want PHI-targeting actor-group intelligence. Specificity matters.
How retainer effectiveness compounds
The retainer relationship produces compounding value when sustained over multiple years.
Year 1. Onboarding completes, first tabletop, first real incident (if any). Substantial learning on both sides.
Year 2. Runbook matures based on Year 1 learnings. Tabletop scenarios diversify. The retainer firm’s knowledge of your environment becomes substantive.
Year 3. Knowledge base is mature. Real incidents (when they occur) are handled faster than in Year 1. The retainer becomes operational infrastructure rather than an external service.
Year 5+. The retainer firm has institutional knowledge of your environment that internal team turnover would otherwise have lost. Forensic baseline is established; anomaly detection is calibrated.
When to upgrade tier — practical signals
Specific signals indicate retainer-tier upgrade is warranted.
Customer requests indicating regulatory exposure. New customer SLAs requiring 30-minute incident response trigger upgrade from Essential to Professional.
Material incident exposes capacity gap. A real incident that consumed all included hours plus excess hours indicates the tier is undersized.
Sector regulatory change. RBI or SEBI framework updates that increase incident-response expectations may require upgrade.
Architectural complexity growth. Multi-cloud, multi-region, or significant headcount growth (over 200 employees) typically requires Professional or Enterprise tier.
Threat-actor activity increase. Sector-specific threat-actor activity (crypto-exchange targeting waves, BFSI-targeting campaign waves) may justify temporary or permanent upgrade.
What separates effective incident-response retainers from nominal ones
Beyond price tier and SLA, qualitative differentiators emerge during real incidents.
Speed of senior-engagement. SLA promises Hour 1 response; reality varies. Effective retainers have senior responders engaged within minutes, not just analysts. The Hour 1 conversation tone — strategic versus reactive — sets the tone for the entire response.
Quality of regulatory coordination. CERT-In, RBI, SEBI coordination during incidents is materially affected by the responder’s existing relationships with regulator-side staff. Retainers with deep regulator-coordination depth produce smoother regulator engagement.
Forensic depth. Surface forensic analysis identifies the obvious; deep forensic analysis traces attacker movement, identifies persistence mechanisms, and produces durable remediation. The forensic depth depends on the retainer firm’s investment in tooling and analyst capability.
Communication discipline. Effective retainers maintain hourly updates during active incidents, daily updates during investigation, written status documents at key milestones. Nominal retainers communicate sporadically and reactively.
Post-incident maturity. Effective retainers produce post-incident reports that drive systemic improvement; nominal retainers produce reports that satisfy compliance requirements without changing organisational behaviour.
Procurement considerations for IR retainers
Beyond the standard evaluation rubric, specific procurement considerations affect retainer-relationship quality.
Multi-year vs annual contracts. Multi-year contracts with renewal-pricing locks reduce procurement overhead but reduce flexibility. Annual contracts preserve flexibility at higher renewal-cycle effort. Most mature relationships are multi-year.
Aligned-incentive billing. Retainers structured to penalise over-billing during active incidents (capped excess hours, fixed-fee components) align retainer-firm incentives with client interests.
Insurance-aligned coverage. Cyber-insurance policies often have specific retainer-firm requirements. Retainers compatible with multiple insurance carriers preserve insurance flexibility.
Data-residency commitments. For Indian regulated entities, retainer firms should commit to Indian-resident forensic data and Indian-jurisdiction dispute resolution. Cross-border data flows during incidents create regulatory complications.
Sub-contracting transparency. Some retainer firms sub-contract specialised work (malware analysis, hardware forensics) to third parties. Transparency about sub-contracting allows informed risk acceptance.
When the retainer pays for itself — value calculation
For Bangalore CFOs evaluating IR retainer ROI, the value calculation has multiple dimensions.
Direct cost. Annual retainer fee of ₹9.6 lakh (Essential) to ₹38.4 lakh (Enterprise). This is the visible cost.
Direct benefit — incident-response cost avoidance. Without retainer, emergency IR engagement costs ₹15-50 lakh per material incident. Even one prevented or accelerated incident response covers multi-year retainer cost.
Direct benefit — regulatory penalty mitigation. DPDP Act penalties up to ₹250 Crore. Reasonable IR readiness is part of “reasonable security safeguards” defence; penalty severity reflects readiness posture.
Direct benefit — insurance premium optimisation. Cyber-insurance premiums reflect IR readiness; documented retainer typically reduces premium by 10-25%.
Indirect benefit — operational confidence. Engineering and security teams operate with confidence knowing incident-response capability is in place. The qualitative benefit is real even when quantitatively hard to measure.
Indirect benefit — customer trust. Enterprise customers conducting vendor security review value documented IR readiness. Retainer documentation improves customer-facing security narrative.
Indirect benefit — board reporting depth. vCISOs and security leads with retainer-backed capability provide board reporting depth that ad-hoc engagement cannot match.
For most Bangalore SaaS Series-B and later, IR retainer at the appropriate tier produces 3-8× ROI when measured comprehensively over multi-year time horizon.
Right-sizing the retainer to organisational maturity
Pre-Series-A startups. IR retainer typically not yet operationally justified; ad-hoc IR engagement on retainer-quality firms is acceptable. Reserve for post-product-market-fit timing.
Series A. Essential tier appropriate for first retainer relationship. Establishes the operational discipline; budget impact modest.
Series B. Professional tier as enterprise customer base grows; SLA requirements tighten. Investment increases but ROI scales with customer-base sensitivity.
Series C+. Enterprise tier for material organisations with substantial threat exposure. War-room support and 15-minute SLA align with operational reality.
Pre-IPO and growth stage. Multi-firm strategy potentially relevant — primary retainer for ongoing readiness, secondary specialist firms for incident-specific expertise (e.g., specialised malware analysis, hardware forensics).
The right-sizing principle is to match retainer investment to organisational scale and threat exposure rather than to a fixed formula.
Closing observation on IR readiness
Incident response capability is one of the highest-leverage security investments available to Bangalore SaaS and BFSI organisations. The investment is modest relative to the cost-of-incident exposure it addresses. The economic logic favours retainer relationships for any organisation with material threat exposure. Beyond economic logic, the operational confidence of knowing incident response capability exists — at the level of senior responder availability, regulator-coordination depth, and tested runbook discipline — produces qualitative benefits that justify investment alone.