

The Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) final rule is expected to be finalized in May 2026, and it's about to change how you support clients in healthcare, financial services, manufacturing, government, and 12 other critical infrastructure sectors.
As part of the rule, covered entities must report substantial cyber incidents to CISA within 72 hours and ransomware payments within 24 hours. These aren't suggestions—they're legal requirements backed by potential penalties for non-compliance.
The 72-hour reporting clock creates a real problem for small to mid-market organizations. They need:
In conversations with MSPs across the country, the most common response is confusion about whether CIRCIA is law or still being discussed. The biggest gaps we're seeing:
That last one is critical. Small and mid-market organizations absolutely can be covered entities under CIRCIA. The first step in CISA's covered entity determination process identifies critical infrastructure presence regardless of organization size. A small community hospital serving 15,000 people? Covered. A regional IT service provider supporting county elections infrastructure? Covered. A 50-person manufacturing operation engaged in critical production? Potentially covered.
Here's where this gets interesting for MSPs. Clients who've been resistant to investing in SIEM, MXDR, or continuous monitoring suddenly have an external driver that makes these services non-negotiable. CIRCIA gives you permission to have harder conversations about security investments that were previously "too expensive" or "not a priority right now."
That compliance-focused client who only cared about checking boxes? They now need operational security capabilities, not just policy documentation. That cost-conscious client who questioned the value of 24x7 monitoring? They're facing legal reporting obligations that require exactly that. Even clients who've never been breached and thought they were safe need these capabilities to avoid non-compliance penalties.
The tight timelines also make it clear that clients can't handle this alone. They need their MSP to provide the monitoring infrastructure, detection capabilities, and expert guidance that makes 72-hour reporting possible. This isn't something they can retrofit after the fact—they need it in place before incidents occur.
CIRCIA covers organizations across 16 critical infrastructure sectors, but the specific criteria are more nuanced than just "are you in healthcare?"
Covered entities include:
For MSPs supporting public sector clients, you may be a covered entity yourself. And even if you're not directly covered, your clients' obligations become your obligations when they're counting on you for detection and response capabilities.
The small business exception provides some relief. Organizations that meet SBA small business size standards are exempt from CIRCIA requirements, which takes some of your clients out of scope. But for everyone else who falls into one of the 16 sectors, compliance is mandatory.
Not sure if a client is covered? CISA has published a covered entity fact sheet.
CIRCIA requires reporting of substantial cyber incidents, which means incidents that lead to:
In practice, reportable incidents include:
The challenge is twofold: determining if an incident crosses the "substantial" threshold quickly enough to meet the 72-hour reporting deadline, and gathering the detailed information needed to complete CISA's reporting requirements. You need visibility into what happened, when it happened, what systems were affected, how the attacker gained access, what actions they took, and what data or systems were impacted.
MSPs will need to ensure proper visibility and logging to tell the complete story of the incident and fill out the required reporting material to the fullest extent. Incomplete reports, false claims, or insufficient documentation could trigger scrutiny from CISA or other government agencies. This means your logging infrastructure can't have gaps—you need comprehensive telemetry from all critical systems so you can reconstruct the attack chain when incidents occur.
The good news is there's still time to prepare, but you need to start now. Here's the roadmap based on what's working for MSPs who are ahead of this curve.
1. Identify which clients are covered entities
Use CISA's sector-based criteria to systematically review your client portfolio. Focus initially on:
For each client, document whether they meet the sector criteria and whether the small business exception applies. This gives you a clear picture of which clients face mandatory compliance requirements.
2. Assess current capabilities for covered clients
Evaluate whether they can:
Most clients will have significant gaps, particularly around 24x7 monitoring and expert incident analysis.
3. Integrate all data sources into SIEM immediately
Don't slow roll SIEM deployment or take a phased approach to log integration. You need complete visibility across all systems to satisfy CIRCIA's monitoring requirements. Prompt integration of all data sources promotes better visibility, more accurate detection, and faster use case tuning. This is much easier to achieve through managed SIEM and MXDR services than trying to do it yourself with limited security resources.
4. Review and update incident response plans
Every covered entity needs a documented incident response plan that addresses CIRCIA reporting requirements. Review your current IR plans alongside your MXDR provider or security experts for recommendations on accuracy and execution capability.
Key questions to answer:
MSPs should honestly assess their own skillsets, readiness, and processes for executing incident response that includes federal reporting obligations. Do you have the security expertise to make reportability determinations? Can you gather and document all required information within 72 hours? Do you have templates and procedures that align with CISA's reporting format?
The timeline for getting clients ready depends on their existing security posture, but with proper governance and documentation, it should be relatively quick. The key is not treating this as a long-term project but as an urgent capability gap that needs to be closed.
This is where Todyl's unified platform becomes your competitive advantage. Instead of cobbling together separate tools for SIEM, MXDR, EDR, and GRC—each with its own agent, console, and billing relationship—you deliver comprehensive CIRCIA readiness through a single integrated platform.
Todyl SIEM provides:
Your clients get the comprehensive monitoring the rule demands without the complexity and cost of traditional SIEM solutions.
Todyl MXDR delivers:
Todyl GRC provides:
A quality incident response plan is a key CIRCIA requirement, and Todyl GRC helps simplify the documentation and governance process.
The unified platform advantage:
The key to positioning CIRCIA with clients is framing it as validation for security investments you've already been recommending, not as a new burden to bear. These clients need SIEM and MXDR whether or not CIRCIA existed, because the threats are real and the business impact of incidents is severe. CIRCIA simply makes these capabilities mandatory rather than optional.
When you reach out to covered clients, lead with the business impact. When the final rule goes into effect, they'll face legal obligations to report substantial cyber incidents within 72 hours. The tight timeline requires monitoring and detection capabilities they likely don't have today. You can assess their readiness, identify specific gaps, and implement solutions that achieve compliance while genuinely protecting their business.
Frame this positively. You're not selling them compliance overhead—you're helping them build the security infrastructure that lets them detect and respond to real threats before those threats cause major damage. CIRCIA reporting is just one benefit of having proper visibility into their environment.
The biggest objection you'll likely face is ambiguity about who's in scope. Many clients will assume they're too small or not important enough to be covered. Point them directly to CISA's covered entity fact sheet and decision tree. Work through the determination process together rather than making assumptions. This positions you as a value-added advisor who understands the regulatory landscape, not just a vendor trying to sell services.
Implementing comprehensive monitoring and detection across a portfolio of clients takes time. You need to deploy logging infrastructure, integrate data sources, tune detection rules, establish SOC procedures, and document response workflows. Clients need to understand their obligations, approve budgets, and work through any technical or operational challenges that come up during deployment.
MSPs who start this process now will have clients ready from day one. Those who wait will be scrambling to retrofit compliance capabilities while already facing reporting obligations for incidents that occur during the transition period.
The federal government has made it clear that visibility into critical infrastructure cyber incidents is now a matter of national security. That visibility depends on covered entities having the monitoring and detection capabilities to know when incidents occur—capabilities that most organizations can only access through their managed service provider.
This is your opportunity to step up, differentiate your services, and deliver real value to clients who need you now more than ever.
Contact our team to discuss how Todyl's unified platform can help you deliver CIRCIA readiness services across your client portfolio. We've worked with MSPs in all 16 critical infrastructure sectors and can share proven strategies for positioning and implementing these capabilities.
Learn how you can protect what you built.
Subscribe to our newsletter to get our latest insights.