{"id":23085,"date":"2024-09-30T10:27:59","date_gmt":"2024-09-30T04:57:59","guid":{"rendered":"https:\/\/ivaluegroup.com\/en-in\/?p=23085"},"modified":"2025-04-25T13:11:40","modified_gmt":"2025-04-25T07:41:40","slug":"cybersecurity-for-stock-brokers-custodians-sebi-cscrf","status":"publish","type":"post","link":"https:\/\/ivaluegroup.com\/en-in\/resources\/blogs\/cybersecurity-for-stock-brokers-custodians-sebi-cscrf\/","title":{"rendered":"Cybersecurity for Stock Brokers &#038; Custodians: Meeting SEBI&#8217;s CSCRF Mandates"},"content":{"rendered":"<h2>Cybersecurity Challenges in India\u2019s Financial Market<\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Since the beginning of this decade, India has undergone further rapid strides in retail investing. There were over 40 million active demat accounts in 2020, which has ballooned to over 150 million now. In the same year, it was also reported that 1 in 5 Indian households channel their savings into the financial market. This increased participation entails that people are having more confidence in our markets.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The role of <\/span><b>stock brokers, custodians<\/b><span style=\"font-weight: 400;\"> and <\/span><b>depository participants<\/b><span style=\"font-weight: 400;\"> in these markets is crucial to maintaining this confidence. <\/span><b>Stock brokers<\/b><span style=\"font-weight: 400;\"> facilitate the buying &amp; selling of securities, <\/span><b>custodians<\/b><span style=\"font-weight: 400;\"> manage the securities of institutional investors and <\/span><b>depository participants<\/b><span style=\"font-weight: 400;\"> serve as intermediaries between investors and depositories, facilitating electronic storage &amp; transfer of securities. They all have to facilitate millions of transactions daily, with the responsibility of keeping sensitive investor data safe. Negligence in carrying out this responsibility, even for a single transaction, could be highly detrimental in the face of increasing cyberattack attempts aimed at the sector. According to the 2023 Kaspersky Cybersecurity Report, India experienced a 25% increase in malware attacks on financial institutions last year.<\/span><\/p>\n<h2>SEBI\u2019s Cybersecurity &amp; Cyber Resilience Framework (CSCRF) Overview<\/h2>\n<p><span style=\"font-weight: 400;\">Therefore, <\/span><b>continuous monitoring<\/b><span style=\"font-weight: 400;\"> for threats, combined with <\/span><b>consistent improvement of security posture<\/b><span style=\"font-weight: 400;\"> becomes crucial in upholding investor confidence and maintaining the sector\u2019s upward trajectory. To that end, SEBI recently released the <\/span><b>Cybersecurity &amp; Cyber Resilience Framework (CSCRF)<\/b><span style=\"font-weight: 400;\"> on August 20, 2024, which has several mandates for regulated entities (REs) including stock brokers, custodians and depository participants.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A major component of CSCRF, which helps in both continuous monitoring and strengthening your organization\u2019s security posture, is the requirement of a 24x7x365 <\/span><a href=\"https:\/\/ivaluegroup.com\/en-in\/resources\/blogs\/what-is-soc-as-a-service-socaas\/\"><b>Security Operations Centre (SOC)<\/b><\/a><span style=\"font-weight: 400;\"> to monitor, prevent, predict, detect, investigate and respond to cyber threats. This blog talks about the various SOC requirements you have to undertake as part of the framework, including incorporation of advanced audits like vulnerability assessment &amp; penetration testing (VAPT).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is important to note here that you will have specific CSCRF requirements based on what RE classification your organization falls under. There are 5 categories in the framework, shown in decreasing order of requirements: Market Infrastructure Institutions (MIIs), qualified REs, mid-size REs, small-size REs and self-certification REs.\u00a0<\/span><\/p>\n<p><strong>Stock Brokers: CSCRF SOC Requirements Based on Active Client<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">For <\/span><b>stock brokers<\/b><span style=\"font-weight: 400;\">, the classification is based on the <\/span><b>number of active clients<\/b><span style=\"font-weight: 400;\"> you have:\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">(Note: As per CSCRF guidelines, client-based stock brokers having less than 100 clients do not require a SOC.)<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><b>Self-Certification REs<\/b><\/td>\n<td><b>Small-size REs\u00a0<\/b><\/td>\n<td><b>Mid-size REs<\/b><\/td>\n<td><b>Qualified REs<\/b><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Less than or equal to 10,000 active clients without providence of IBTs or algo trading facility<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Less than or equal to 10,000 active clients if providing IBTs\/algo trading, <\/span><i><span style=\"font-weight: 400;\">if not,<\/span><\/i><span style=\"font-weight: 400;\"> they should have active clients between 10,000 and 50,000<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Between 50,000 to 5 lac active clients<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Over 5 lac active clients<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>Custodians: Meeting CSCRF Mandates Based on AUC<\/h2>\n<p><span style=\"font-weight: 400;\">For <\/span><b>custodians<\/b><span style=\"font-weight: 400;\">, the distinction is made keeping <\/span><b>assets under custody (AUC)<\/b><span style=\"font-weight: 400;\"> as the consideration:<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><b>Small-size REs<\/b><\/td>\n<td><b>Mid-size REs<\/b><\/td>\n<td><b>Qualified REs<\/b><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Less than 1 lakh crores<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Between 1 lakh cr. and 10 lakh cr.<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Over 10 lakh cr.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Finally, for <\/span><b>depository participants, <\/b><span style=\"font-weight: 400;\">it is dependent on type:<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><b>Mid-size REs<\/b><\/td>\n<td><b>Qualified REs<\/b><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Non-institutional depository participants<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Institutional depository participants<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>SOC Options Under CSCRF: Choosing the Right Fit<\/h2>\n<p><span style=\"font-weight: 400;\">Being cognizant of the fact that setting up an in-house SOC could lead to great difficulties for smaller REs, CSCRF provides three SOC options: your <\/span><b>own\/group SOC<\/b><span style=\"font-weight: 400;\">, a <\/span><b>market SOC <\/b><span style=\"font-weight: 400;\">(implemented mandatorily by NSE &amp; BSE and optionally by NSDL &amp; CDSL) and a <\/span><b>third-party managed SOC<\/b><span style=\"font-weight: 400;\">, like the <\/span><span style=\"font-weight: 400;\">state-of-the-art solution we at iValue possess<\/span><span style=\"font-weight: 400;\">. It is important to note here that small-size and self-certification REs are <\/span><b>mandated <\/b><span style=\"font-weight: 400;\">to be on-boarded to the aforementioned Market SOC. It is also noteworthy that Qualified REs must measure the functional efficacy of their SOC every 6 months, while all other REs having managed SOC must do it on a yearly basis. (Should you opt for our SOC solution, we will make this process extremely streamlined for your organization.)<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The scope of your SOC with regards to your IT infrastructure shall cover but not be limited to: networks, endpoints, activities of third parties, physical environments, malicious code and monitoring of unauthorized personnel, devices, connections and software. Here are the key SOC functions as mandated by the framework:<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Continuous Monitoring: <\/b><span style=\"font-weight: 400;\">Constantly keeping an eye on all the aforementioned vectors, and immediately notifying relevant authorities whenever there is an instance of abnormal or suspicious behavior.<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>Log management: <\/b><span style=\"font-weight: 400;\">Aggregating and correlating data from various networks, endpoints, apps, firewalls, OS, etc. to establish a baseline for normal behaviour. These logs will come in handy for your various audits, including VAPT which we will get to soon.<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>Threat response: <\/b><span style=\"font-weight: 400;\">Acting as a \u2018first responder\u2019 during incidents, isolating endpoints and limiting the fallout with as little disruption to your business as possible. We have a robust incident management policy in the rare case of an incident occurring while adopting our SOC.<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>Alert Management: <\/b><span style=\"font-weight: 400;\">Monitoring all the alerts issued by the diverse tools of your cybersecurity package and closely analyzing each to discard false positives &amp; determine potential impact of threats.<\/span><\/li>\n<li aria-level=\"1\"><b>Root Cause Investigation: <\/b><span style=\"font-weight: 400;\">Post incident occurrence, SOCs are responsible for analyzing all logs to identify the root cause and prevent its reoccurrence.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Additionally, for all REs except small-size and self-certification REs, SOCs are designed keeping in mind future capacity requirements (for data storage, processing power and communications capacity) to ensure future business objectives are met.\u00a0<\/span><\/p>\n<h2>Vulnerability Assessments &amp; Penetration Testing (VAPT): A Key Audit<\/h2>\n<p><span style=\"font-weight: 400;\">Furthermore, to constantly measure the effectiveness of your SOC, cybersecurity audits must be regularly conducted. One essential audit is <\/span><b><a href=\"https:\/\/ivaluegroup.com\/en-in\/resources\/blogs\/introduction-to-vapt-vulnerability-assessment-penetration-testing\/\">vulnerability assessment &amp; penetration testing<\/a> (VAPT)<\/b><span style=\"font-weight: 400;\">, which has to be undertaken prior to commissioning new systems part of your critical infrastructure and after every major release of your applications or software. Vulnerability asssessments scan systems, networks and apps for outdated software, missing patches, misconfigurations and insecure settings, while penetration testing simulates real-world attacks to test your security controls. For qualified REs, red teaming has to be undertaken on top of VAPT.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">VAPTs have to be undertaken yearly, starting in the beginning of the financial year, for all REs except those identified as protected systems by NCIIPC &#8211; they have to do it twice a year. Additionally, self-certification REs are required to conduct VAPT audits through CERT-In empanelled auditing organizations. Stock brokers and depository participants must submit the report to their respective stock exchanges and depositories with the following timeline:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The report has to be submitted <\/span><b>1 month<\/b><span style=\"font-weight: 400;\"> after completion of VAPT activities.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Closure of findings identified during the activities must be completed within <\/span><b>3 months<\/b><span style=\"font-weight: 400;\"> of VAPT submission<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Revalidation to be completed within <\/span><b>5 months<\/b><span style=\"font-weight: 400;\"> of submission<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">We know this sounds like a lot, and we also know that your prime focus should be on providing value for your investors. Therefore, by opting for <a href=\"https:\/\/ivaluegroup.com\/en-gl\/enterprise-security-management\/\">iValue\u2019s SOC solution<\/a>, you free up time to do what you do best, with the confidence of knowing that our state-of-the-art suite will help minimize threats and maximize your security posture.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Our suite includes the following cutting-edge solutions:<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Continuous monitoring <\/b><span style=\"font-weight: 400;\">solutions including Splunk Observability for tracking network activity, Opentext ITOM for system performance monitoring, Zabbix for identifying potential security threats and Tenable for managing vulnerabilities effectively.<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>Threat detection <\/b><span style=\"font-weight: 400;\">through SIEM solutions like Google Chronicle, Splunk, ArcSight and InnSpark for real-time monitoring, log management and correlation of security events. Additionally, we use threat intelligence platforms like Recorded Future, Anomali and Google Threat Intel to gather &amp; analyze threat intelligence data, enhancing your response to threats.<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>Incident response <\/b><span style=\"font-weight: 400;\">through SOAR solutions incorporating various security tools like Google Siemplify and Splunk Phantom to coordinate responses and ensure timely resolution of incidents. This is done by having predefined playbooks for the same.<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>Root cause analysis <\/b><span style=\"font-weight: 400;\">through EnCase, which aids in remediation of incidents.<\/span><\/li>\n<li aria-level=\"1\"><b>VAPT <\/b><span style=\"font-weight: 400;\">solutions through a mix of tools like Nessus, Qualys and OpenVAS, combined with our strict adherence to CSCRF PT requirements.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">All these myriad processes can be effortlessly kept tabs on using our unified dashboard that simplifies and streamlines the vast amounts of data received from these programs. It will aid you vastly in keeping track of your CSCRF requirements, while minimizing the chance of an incident. It\u2019s a win-win for your organization, and if you want to check out the magic for yourself, <\/span><span style=\"font-weight: 400;\">click here<\/span><span style=\"font-weight: 400;\"> for a demo of our SOC.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Challenges in India\u2019s Financial Market &nbsp; Since the beginning of this decade, India has undergone further rapid strides in retail investing. There were over 40 million active demat accounts in 2020, which has ballooned to over 150 million now. In the same year, it was also reported that 1 in 5 Indian households channel &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/ivaluegroup.com\/en-in\/resources\/blogs\/cybersecurity-for-stock-brokers-custodians-sebi-cscrf\/\"> <span class=\"screen-reader-text\">Cybersecurity for Stock Brokers &#038; Custodians: Meeting SEBI&#8217;s CSCRF Mandates<\/span> Read More \u00bb<\/a><\/p>\n","protected":false},"author":1,"featured_media":20191,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[131],"tags":[376,374,373,375,184],"whitepapers":[],"case_studies":[],"acf":[],"_links":{"self":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts\/23085"}],"collection":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/comments?post=23085"}],"version-history":[{"count":2,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts\/23085\/revisions"}],"predecessor-version":[{"id":23087,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts\/23085\/revisions\/23087"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/media\/20191"}],"wp:attachment":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/media?parent=23085"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/categories?post=23085"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/tags?post=23085"},{"taxonomy":"whitepapers","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/whitepapers?post=23085"},{"taxonomy":"case_studies","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/case_studies?post=23085"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}