{"id":23082,"date":"2024-09-30T10:18:32","date_gmt":"2024-09-30T04:48:32","guid":{"rendered":"https:\/\/ivaluegroup.com\/en-in\/?p=23082"},"modified":"2025-04-25T13:11:41","modified_gmt":"2025-04-25T07:41:41","slug":"how-sebi-cscrf-safeguards-indian-financial-entities-like-kras-cras","status":"publish","type":"post","link":"https:\/\/ivaluegroup.com\/en-in\/resources\/blogs\/how-sebi-cscrf-safeguards-indian-financial-entities-like-kras-cras\/","title":{"rendered":"How SEBI CSCRF Safeguards Indian Financial Entities Like KRAs &#038; CRAs"},"content":{"rendered":"<h2>The Rising Participation of Indian Retail Investors<\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">In recent times, we are seeing a trend of Indians increasingly investing in securities. SEBI reports that retail investor participation reached around <a href=\"https:\/\/www.angelone.in\/blog\/retail-investors-contribute-10-year-high-of-45-pc-to-nse-turnover\" target=\"_blank\" rel=\"noopener\">45% of total market volume in 2023<\/a>, up from 30% in 2020. The rapid democratization of technology throughout the country has led to greater participation in the market.<\/span><\/p>\n<h2>Key Entities in the Financial Market: KRAs and CRAs<\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Two types of entities that play crucial roles in this ecosystem are <strong>KYC registration agencies<\/strong> (KRAs) and <strong>credit rating agencies<\/strong> (CRAs). KRAs are institution-facing &#8211; they verify the identity of investors and maintain a centralized database of KYC records that can be accessed by various financial institutions. Meanwhile, CRAs are investor-facing &#8211; they evaluate the creditworthiness of debt instruments and give investors insight on potential investments. Both deal with extremely sensitive data, and therefore, maintaining data integrity &amp; security becomes a crucial part of operations.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The heightened state of the industry has also led to heightened levels of risk in the form of cyberattacks. The <a href=\"https:\/\/info.zscaler.com\/resources-industry-reports-2023-threatlabz-ransomware-report\" target=\"_blank\" rel=\"noopener\">2023 ZScaler ThreatLabz Report<\/a> claims that <strong>India faced a 37% increase in data breaches in the financial services sector<\/strong> last year, and the situation could become worse if there are no countermeasures to combat attackers.<\/span><\/p>\n<h2>SEBI\u2019s Cybersecurity and Cyber Resilience Framework (CSCRF) Overview<\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">To that end, SEBI recently released the <strong>Cybersecurity and Cyber Resilience Framework (CSCRF)<\/strong> on August 20, 2024, to safeguard investors, companies and overall financial markets from the crippling effects of cyberattacks. The framework applies for all of SEBI\u2019s regulated entities, including KRAs and CRAs.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Adhering to all the myriad requirements of the framework can be extremely challenging at first, mainly because most components are time-sensitive. For example, you have to produce a <strong>Software Bill of Materials (SBOM)<\/strong> for all your software vendors within 6 months of the framework being introduced. Many requirements like this demand immediate attention on your part, but the great part about CSCRF is that its holistic approach to cybersecurity enables your organization to have a vastly superior cybersecurity posture. It aids in securing your most valuable asset &#8211; <\/span><b>your data.<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Two elements of the framework that help with securing data are the mandated guidelines for <\/span><b>encryption <\/b><span style=\"font-weight: 400;\">and <\/span><b>access control <\/b><span style=\"font-weight: 400;\">respectively<\/span><b>. <\/b><span style=\"font-weight: 400;\">These form the crux of CSCRF\u2019s third cyber resiliency goal to <\/span><b>anticipate<\/b><span style=\"font-weight: 400;\">, complemented by the cybersecurity control to <\/span><b>protect<\/b><span style=\"font-weight: 400;\">, which is all about safeguarding critical assets &amp; systems from unauthorized access, use and disclosure. This blog focuses on the various CSCRF requirements for this particular peg, and how iValue\u2019s diverse range of solutions can help you seamlessly comply with all of them.<\/span><\/p>\n<h2>CSCRF Encryption Requirements for KRAs and CRAs<\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">We begin this by stating that KRAs and CRAs have several different requirements in CSCRF. Due to KRAs facilitating access to extremely sensitive customer data, they have the same requirements as Market Infrastructure Institutions (MIIs), which are the most stringent in this framework. On the other hand, CRAs have the same requirements as self-certified REs, which have lesser mandates in comparison to other REs. Many elements of the framework are universal across all REs, but we\u2019ll be sure to point out whenever there is any divergence.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Let\u2019s start with <\/span><b>encryption<\/b><span style=\"font-weight: 400;\">. CSCRF mandates that all REs encrypt <\/span><b>data-at-rest<\/b><span style=\"font-weight: 400;\"> and <\/span><b>data-in-transit<\/b><span style=\"font-weight: 400;\"> using industry standard algorithms like RSA and AES. In addition, KRAs are also supposed to do the same for <\/span><b>data-in-use<\/b><span style=\"font-weight: 400;\">. But before all this, you must identify the data in your organization that warrants encryption. Encrypting all your data is infeasible and may open up additional attack vectors, so it is critical to do an assessment before you go about choosing vendors for the same.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Based on that assessment, you will have to choose an encryption strategy that has both <\/span><b>Full Disk Encryption (FDE) <\/b><span style=\"font-weight: 400;\">and <\/span><b>File-Based Encryption (FBE). <\/b><span style=\"font-weight: 400;\">FDE encrypts all the data on a disk drive, while FBE encrypts specific files or directories in that disk. Additionally, all the encryption keys resulting from this have to be properly stored and managed, which you can read more about in our blog: <a href=\"https:\/\/ivaluegroup.com\/en-in\/resources\/blogs\/strengthening-data-protection-to-meet-sebis-encryption-mandates\/\">Strengthening Data Protection to Meet SEBI\u2019s Encryption Mandates<\/a><\/span><\/p>\n<h2>Access Control Measures Under CSCRF<\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Now, let\u2019s move on to all the <\/span><b>access control <\/b><span style=\"font-weight: 400;\">measures required by CSCRF. We begin with requirements for both KRAs and CRAs:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Access is determined by the <\/span><b>principle of least privilege<\/b><span style=\"font-weight: 400;\">, which provides access on a need-to-use basis for a defined purpose, over a defined period. This is enabled through strong and secure authentication.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">This authentication policy is implemented with a defined complexity requirement\u00a0 for user passwords.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">All critical systems accessible over the Internet must have both <\/span><b>multi-factor security <\/b><span style=\"font-weight: 400;\">(VPNs, firewall controls, etc.) and <\/span><b>multi-factor authentication <\/b><span style=\"font-weight: 400;\">(passwords and OTPs, along with a strong factor like biometrics or physical keys like our <\/span><span style=\"font-weight: 400;\">solution<\/span><span style=\"font-weight: 400;\"> with industry leaders YubiKey). MFA must be incorporated for all accounts that access systems from non-trusted environments to trusted environments.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">LANs and wireless networks have to be secured with the aforementioned access controls.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Account lock policies<\/b><span style=\"font-weight: 400;\"> after a certain amount of failure attempts have to be implemented for all your accounts.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Records have to be logged and maintained for access to critical systems, especially for users with access to shared accounts. The logs to be collected include <\/span><b>system logs, application logs, network logs, database logs, event logs, performance logs<\/b><span style=\"font-weight: 400;\"> and <\/span><b>security logs<\/b><span style=\"font-weight: 400;\">. These have to be stored in a secure location for a time period no less than 2 years.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Existing user accounts and access rights have to be periodically reviewed to detect dormant accounts, unknown accounts, accounts with excessive privileges and more. Delegated access &amp; unused tokens have to be reviewed and cleaned on a quarterly basis.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>\u2018End of life\u2019 mechanisms <\/b><span style=\"font-weight: 400;\">must be adopted to deactivate access privileges for users who leave your organization or have their privileges withdrawn.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Your organization must formulate <\/span><b>data-disposal<\/b><span style=\"font-weight: 400;\"> and <\/span><b>data retention<\/b><span style=\"font-weight: 400;\"> policies to identify value &amp; lifetime of various parcels of data, including suitable policies for disposal of storage media &amp; systems.\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">These additional requirements are mandated <\/span><b>only <\/b><span style=\"font-weight: 400;\">for KRAs:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The <\/span><b>principle of least privilege <\/b><span style=\"font-weight: 400;\">mentioned in the requirements for all REs must be part of a holistic <\/span><b>zero trust <\/b><span style=\"font-weight: 400;\">security model for KRAs, which assumes access to critical systems is denied by default and only allowed after proper authentication and authorization. While the principle of least privilege is more focused on minimizing access rights, zero trust<\/span> <span style=\"font-weight: 400;\">is driven by continuous verification &amp; authentication.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">To monitor and protect sensitive data, a <\/span><b>Data Loss Prevention (DLP)<\/b><span style=\"font-weight: 400;\"> solution must be incorporated.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A <\/span><b>Privileged Identity Management (PIM)<\/b><span style=\"font-weight: 400;\"> solution has to be implemented to keep track of privileged users, with controls like restricting the number of privileged users, not allowing users to access logs where their activities are tracked, limiting remote access and conducting periodic reviews of all activities from these accounts.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Additional password controls are mandated, including change of password upon first login and storage of passwords in your infrastructure using <\/span><b>strong hashing algorithms<\/b><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Network segmentation<\/b><span style=\"font-weight: 400;\"> has to be conducted to restrict access to sensitive data, with segment-to-segment access provided on the principle of least privilege. The same access controls apply for all APIs.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Email protection<\/b><span style=\"font-weight: 400;\"> must include strong password protection, MFA, spam filtering, email encryption, a secure email gateway and permissible attachment types.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Your organization has to monitor &amp; regulate the use of Internet based services like social media sites and cloud-based storage services within your critical IT infrastructure.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">There has to be an <\/span><b>up-to-date centralized inventory <\/b><span style=\"font-weight: 400;\">of authorized devices connected\u00a0 to your network and authorized devices enabling it.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Additionally, since KRAs involve a huge number of identity requests, measures must be executed to <\/span><b>secure Domain Controllers<\/b><span style=\"font-weight: 400;\">, with users having separate accounts for this and their day-to-day operations.<\/span><\/li>\n<\/ul>\n<h2>Centralized Management of Cybersecurity Solutions<\/h2>\n<p><span style=\"font-weight: 400;\">We realize these are a lot of requirements, with the bulk of them having to be incorporated within a time limit of 6 months post CSCRF. However, you should not let the pressures of this lead you to incorporate dozens of different solutions that have to be monitored all at once.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Instead, gain complete and comprehensive oversight over your CSCRF data integrity &amp; security demands by opting for <\/span><b>iValue\u2019s state-of-the-art security suite<\/b><span style=\"font-weight: 400;\">, which includes solutions like:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Full-disk encryption through our partnerships with <\/span><span style=\"font-weight: 400;\">Thales<\/span><span style=\"font-weight: 400;\"> and <\/span><span style=\"font-weight: 400;\">Entrust<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">File-based encryption through our partnerships with <\/span><span style=\"font-weight: 400;\">Ultimaco<\/span><span style=\"font-weight: 400;\"> and <\/span><span style=\"font-weight: 400;\">Fortanix<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Keeping track and protecting all your encryption technologies through a Data Security Posture Management Solution like our solutions with <\/span><span style=\"font-weight: 400;\">Forcepoint<\/span><span style=\"font-weight: 400;\"> and <\/span><span style=\"font-weight: 400;\">Varonis<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Enforcement of strong authentication through solutions like Yubikey<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Opentext NetIQ<\/span><span style=\"font-weight: 400;\"> and <\/span><span style=\"font-weight: 400;\">RSA SecureID<\/span><span style=\"font-weight: 400;\"> help you manage user access rights and identity policies<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Forcepoint DLP<\/span><span style=\"font-weight: 400;\"> to completely secure your sensitive data <\/span><i><span style=\"font-weight: 400;\">(only required for KRAs)<\/span><\/i><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">PIM solutions from <\/span><span style=\"font-weight: 400;\">CyberArk<\/span><span style=\"font-weight: 400;\"> to reduce risk of unauthorized privileged access <\/span><i><span style=\"font-weight: 400;\">(only required for KRAs)<\/span><\/i><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Through this suite, all the encryption and access control requirements mandated by CSCRF are synchronized and effortlessly managed through a centralized dashboard. Implementation can be done very quickly for iValue\u2019s solutions, allowing you to be well on track with your impending CSCRF deadlines.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Rising Participation of Indian Retail Investors &nbsp; In recent times, we are seeing a trend of Indians increasingly investing in securities. SEBI reports that retail investor participation reached around 45% of total market volume in 2023, up from 30% in 2020. The rapid democratization of technology throughout the country has led to greater participation &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/ivaluegroup.com\/en-in\/resources\/blogs\/how-sebi-cscrf-safeguards-indian-financial-entities-like-kras-cras\/\"> <span class=\"screen-reader-text\">How SEBI CSCRF Safeguards Indian Financial Entities Like KRAs &#038; CRAs<\/span> Read More \u00bb<\/a><\/p>\n","protected":false},"author":1,"featured_media":20191,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[131],"tags":[372,286,268,371,370],"whitepapers":[],"case_studies":[],"acf":[],"_links":{"self":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts\/23082"}],"collection":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/comments?post=23082"}],"version-history":[{"count":3,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts\/23082\/revisions"}],"predecessor-version":[{"id":23100,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts\/23082\/revisions\/23100"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/media\/20191"}],"wp:attachment":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/media?parent=23082"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/categories?post=23082"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/tags?post=23082"},{"taxonomy":"whitepapers","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/whitepapers?post=23082"},{"taxonomy":"case_studies","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/case_studies?post=23082"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}