Section 3(3)(k) in The Information Technology (Information Security Practices and Procedures for Protected System) Rules, 2018
(k)establish a Network Operation Center (NOC) using tools and techniques to manage control and monitor the network(s) of "Protected System" for ensuring continuous network availability and performance;