Cyber incidents have always required investigation. What’s changing is the expectation of speed.
The Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) establishes federal reporting requirements for certain cyber incidents affecting critical infrastructure. For covered entities, the timeline is tight: an initial incident report may be due within 72 hours, and a ransomware payment report may be due within 24 hours.
https://www.law.cornell.edu/uscode/text/6/681b
Even though the rulemaking process is still unfolding, most organizations can’t afford to “wait and see.” Incident response workflows take time to redesign, and the hard part of CIRCIA isn’t the form… It’s being ready to submit a defensible report while the situation is still moving.
That’s the real shift: CIRCIA pushes organizations to become report-ready early, not just thorough later.
What CIRCIA Is and Why 2026 Becomes an Operations Deadline
CIRCIA became law in 2022, as part of federal legislation meant to improve cybersecurity visibility across critical infrastructure sectors.
https://www.govinfo.gov/content/pkg/PLAW-117publ103/html/PLAW-117publ103.htm
CISA runs the program and is responsible for implementing the reporting process.
https://www.cisa.gov/topics/cyber-threats-and-advisories/information-sharing/cyber-incident-reporting-critical-infrastructure-act-2022-circia
The organizations most impacted tend to be the ones the public relies on every day, including:
- Healthcare and public health
- Education systems
- State, local, tribal, and territorial government
- Electric utilities and energy infrastructure
- Water and wastewater utilities
- Communications and IT providers
The intent is straightforward: help the federal government get timely, consistent information about incidents that could disrupt essential services or economic stability.
For the organizations doing the reporting, the impact is operational. Teams that historically had time to investigate before escalating now need a workflow that supports early reporting, even when the picture is incomplete.
The Reporting Clocks: 72 Hours and 24 Hours
CIRCIA introduces two primary clocks that change how teams triage and document incidents.
The 72-hour incident reporting clock
Covered entities must report certain cyber incidents within 72 hours of “reasonably believing” a covered cyber incident occurred.
https://www.law.cornell.edu/uscode/text/6/681b
That phrase matters because it’s practical. You’re not expected to wait for a full forensic narrative. Instead, you should be prepared to submit an initial report based on what you can support at the time, then submit supplemental reports as you learn more.
In day-to-day terms, this usually means your clock starts when your team reaches a credible conclusion that “this is real, it’s significant, and it’s likely to qualify,” not when every indicator is confirmed.
If you want to pressure-test your interpretation of “reasonable belief,” this matters: the clock often starts mid-investigation, not at the beginning of the attack and not at the end of forensics.
We break down the four scenarios that typically trigger the belief moment (SOC confirmation, tooling signals, vendor notice, operational disruption).
Read next: When Does the CIRCIA 72-Hour Clock Actually Start?
/circia-72-hour-clock-reasonable-belief
The 24-hour ransomware payment clock
CIRCIA also requires reporting within 24 hours of a ransomware payment.
https://www.law.cornell.edu/uscode/text/6/681b
This hits a different part of the organization. Ransom payments, if they happen, tend to involve finance leadership, legal counsel, insurers, and incident response partners, all operating under pressure. If you don’t already have a payment decision workflow and documentation plan, you end up reconstructing decisions after the fact, when you can least afford the distraction.
Are You a Covered Entity? Start With a Simple 3-step Test
The most common early question is also the most important:
Are we actually covered?
CISA has encouraged a step-based approach that examines sector alignment, size thresholds, and your role in delivering critical infrastructure. In practice, that means building and saving a written rationale, rather than guessing.
Coverage indicators can include factors like:
- K–12 districts that meet certain student thresholds
- Local governments serving 50,000+ residents
- Electric entities tied to reporting to NERC or DOE
- Community water systems serving 3,300+ people
The “right” answer here is the one you can defend later, because many organizations sit on the edge of coverage depending on structure, partnerships, and services.
What’s Reportable: Defining a “Covered Cyber Incident” in Practice
Not every alert, intrusion attempt, or policy violation triggers reporting. CISA’s covered cyber incident fact sheet is a useful reference for teams making fast triage calls.
https://www.cisa.gov/resources-tools/resources/covered-cyber-incident-fact-sheet
Across sectors, the incidents that tend to force the question are the ones that meaningfully disrupt operations or show a serious compromise pattern, for example:
- Ransomware that interrupts clinical systems, classroom operations, election services, or utility delivery
- Intrusions that impact systems used to provide essential services
- Vendor or managed service compromises that spread across multiple environments
- Significant data exfiltration with clear operational or public impact
- Operational technology disruptions, including SCADA-related events
The hard part isn’t knowing what these are. It’s being able to quickly determine whether your situation fits the definition well enough to trigger the clock.
Build “Report-ready” Evidence: What You Need in the First Eight Hours
CIRCIA pushes organizations to collect the basics early, while the timeline is still clean and the evidence is still available.
A practical “first eight hours” target is to capture enough information to answer these questions without hand-waving:
- When did you first detect the incident, and what triggered that detection?
- Which systems, services, or locations appear impacted?
- What operational impact are you seeing right now?
- What’s your current working theory of initial access or attack path?
- What containment actions have you already taken, and when?
This is also where organizations get burned, quietly. When you can’t assemble facts early, reporting becomes the least of your problems, response costs climb, downtime stretches, and leadership ends up making decisions with incomplete information.
If you want the “what breaks most often” view (logs, vendors, approvals, ownership), read: What Happens If You Get CIRCIA Reporting Wrong?
circia-reporting-failure-missed-72-hour-window
Don’t overcomplicate this. The goal isn’t perfection, it’s clarity. If you can’t quickly assemble these facts, you’ll lose time later rebuilding timelines from scattered tickets, vendor emails, and partial logs.
Third Parties and Shared Services: The Hidden Failure Point
Many critical infrastructure incidents don’t start inside the organization. They start with a third party you depend on.
That could be your MSP, your cloud provider, a SaaS platform, a shared service environment, or an OT integrator. When something goes wrong, you often need that vendor’s evidence to complete your own reporting picture:
- logs and telemetry
- investigation findings
- indicators of compromise
- scope confirmation and remediation steps
If contracts and service expectations don’t define who provides what, and by when, the reporting clock becomes a coordination problem, not a security problem.
One simple improvement that pays off fast: set explicit evidence and response timelines with your key vendors, and test that process in a tabletop, before you need it.
A Practical 30 to 60-day Readiness Sprint
You don’t need a multi-year compliance program to make meaningful progress. Most organizations can improve readiness in 30 to 60 days if they focus on workflow, ownership, and evidence.
A sprint that works in the real world usually looks like this:
Weeks 1 to 2
Document likely coverage status, assign a reporting owner, and define escalation triggers that start the 72-hour clock.
Weeks 3 to 4
Inventory logging and evidence sources (including vendors), identify gaps, and draft reporting templates that match the way your team actually works.
Weeks 5 to 6
Run a tabletop that forces timeline reconstruction, decision documentation, and vendor coordination. Then update the runbook based on what broke.
If you do only one thing in this window, do this: prove you can produce a defensible first report from real evidence in a tight timeframe.
One Workflow, Lower Cost, Fewer Surprises
CIRCIA readiness isn’t just regulatory. It’s operational resilience.
Organizations that prepare well tend to see the same outcomes during incidents:
- faster investigation, because the evidence is accessible
- fewer internal debates about “who owns the clock.”
- less scramble across finance, legal, and IT during ransomware decisions
- smoother vendor coordination, because expectations are already defined
The teams that make CIRCIA workable usually converge on a simple approach:
One timeline.
One evidence set.
One coordinated workflow across security, operations, compliance, and finance.