{"id":23088,"date":"2024-09-30T10:32:38","date_gmt":"2024-09-30T05:02:38","guid":{"rendered":"https:\/\/ivaluegroup.com\/en-in\/?p=23088"},"modified":"2025-04-25T13:11:39","modified_gmt":"2025-04-25T07:41:39","slug":"securing-customer-communications-portfolio-data-sebi-compliance","status":"publish","type":"post","link":"https:\/\/ivaluegroup.com\/en-in\/resources\/blogs\/securing-customer-communications-portfolio-data-sebi-compliance\/","title":{"rendered":"Securing Customer Communications &#038; Portfolio Data: Achieving SEBI Compliance for Portfolio Managers &#038; Investment Advisors"},"content":{"rendered":"<h2>The Need for SEBI Compliance in Securing Customer Data and Communications<\/h2>\n<p><span style=\"font-weight: 400;\">India\u2019s growth story is reflected in the emergence of its financial markets. The total market capitalization of India\u2019s stock market exceeded <a href=\"https:\/\/www.jpmorgan.com\/insights\/global-research\/markets\/india-stock-market-outlook#:~:text=Since%20the%20low%20of%20the,long%2Dterm%20economic%20growth%20potential\" target=\"_blank\" rel=\"noopener\">$5 trillion<\/a> recently, and a key reason for this is the democratization of access to these markets. In FY24, non-institutional investors accounted for more than <a href=\"https:\/\/www.icicidirect.com\/research\/equity\/finace\/which-state-in-india-has-the-highest-number-of-stock-market-investors#:~:text=Stock%20market%20investors%20in%20India&amp;text=Demat%20accounts%20surged%20from%2036,in%20FY14%20and%20FY19%2C%20respectively\" target=\"_blank\" rel=\"noopener\">half of the stock market\u2019s cash volumes<\/a>, and two key players integral in facilitating that are <\/span><b>portfolio managers <\/b><span style=\"font-weight: 400;\">and <\/span><b>investment advisors.<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Not only are they flag bearers of this emerging industry, they are also custodians of extremely sensitive customer data. Both deal with developing and implementing investment strategies based on clients\u2019 particular financial goals and risk tolerance, which requires the use of state-of-the-art <\/span><b>software that is also secure<\/b><span style=\"font-weight: 400;\">. They also have to constantly allocate assets by moving them around, and that requires <\/span><b>secure communications<\/b><span style=\"font-weight: 400;\">. In a world where Indian companies face the second highest number of weekly attacks per organization at <a href=\"https:\/\/www.thehindu.com\/sci-tech\/technology\/internet\/india-businesses-face-over-3000-cyberattacks-per-week-second-only-to-taiwan-firms\/article68417640.ece\" target=\"_blank\" rel=\"noopener\">3,201<\/a> attacks per week &#8211; the worldwide average is 1,636 &#8211; it is imperative for organizations like yours to protect your sensitive data. Failure to do that can lead to erosion of customer confidence, and that could significantly affect your bottom line.\u00a0<\/span><\/p>\n<h3>Understanding SEBI\u2019s Cybersecurity and Cyber Resilience Framework (CSCRF)<\/h3>\n<p><span style=\"font-weight: 400;\">To aid you in improving your organizational cybersecurity posture, SEBI recently released the <\/span><b>Cybersecurity and Cyber Resilience Framework (CSCRF)<\/b><span style=\"font-weight: 400;\"> on August 20, 2024. The framework has certain mandates for all its <\/span><b>Regulated Entities (REs)<\/b><span style=\"font-weight: 400;\">, including portfolio managers and investment advisors. This blog will focus on the guidelines mandated by CSCRF when it comes to <\/span><b>securing your software<\/b><span style=\"font-weight: 400;\"> and <\/span><b>securing your communications<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Let\u2019s start by mentioning that not all REs will have the same guidelines. The requirements specific to your organization depend on which one of these five REs you fall under, in descending order of requirements: <\/span><b>Market Infrastructure Institutions (MIIs), Qualified REs, Mid-size REs, Small-size REs<\/b><span style=\"font-weight: 400;\"> and<\/span><b> Self-certification REs<\/b><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For <\/span><b>investment advisors<\/b><span style=\"font-weight: 400;\">, individual IAs are exempt from CSCRF requirements, while non-individual IAs are categorized as <\/span><b>small-size REs.<\/b><\/p>\n<p><span style=\"font-weight: 400;\">For <\/span><b>portfolio managers<\/b><span style=\"font-weight: 400;\">, the criteria for categorization is the value of <\/span><b>Assets Under Management (AUM):<\/b><\/p>\n<table>\n<tbody>\n<tr>\n<td><b>Self-certification REs<\/b><\/td>\n<td><b>Small-size REs<\/b><\/td>\n<td><b>Mid-size REs<\/b><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">Less than \u20b91000 cr.<\/span><\/td>\n<td><span style=\"font-weight: 400;\">\u20b91000 cr. and above, but less than \u20b93000 cr.<\/span><\/td>\n<td><span style=\"font-weight: 400;\">\u20b93000 cr. and above<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Now that you\u2019ve figured out which RE classification your organization comes under, let\u2019s start with the mandates for\u2026<\/span><\/p>\n<h3>How Portfolio Managers &amp; Advisors Can Secure Their Software<\/h3>\n<p><span style=\"font-weight: 400;\">A key factor towards achieving this goal is the CSCRF mandate of <\/span><b>Secure Software Development Life Cycle (SSDLC)<\/b><span style=\"font-weight: 400;\">, which is all about integrating security testing at every stage of software development, from design to development to deployment and beyond.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here are the SSDLC requirements mandated for <\/span><b>all REs<\/b><span style=\"font-weight: 400;\">:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">It starts with formulating a <\/span><b>business requirement document<\/b><span style=\"font-weight: 400;\"> with mentions of security requirements, logging, session management, audit trail, data integrity, security event tracking, exception handling, etc.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">During development, <\/span><b>threat modeling<\/b><span style=\"font-weight: 400;\"> and <\/span><b>application security testing<\/b><span style=\"font-weight: 400;\"> has to be conducted for secure rollout of software &amp; applications.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">For application security, one must follow security guidelines and other protection measures given by <\/span><b>OWASP<\/b><span style=\"font-weight: 400;\">, like OWASP-ASVS.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">For layered security, the principle of <\/span><b>defence-in-depth<\/b><span style=\"font-weight: 400;\"> has to be incorporated.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Before introducing new technologies to your critical systems, your security team has to assess security concerns and <\/span><b>achieve a fair level of maturity<\/b><span style=\"font-weight: 400;\"> with these technologies before incorporating them into your infrastructure.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Here are additional SSDLC requirements mandated for <\/span><b>all REs except small-size and self-certification REs<\/b><span style=\"font-weight: 400;\">:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Regression testing<\/b><span style=\"font-weight: 400;\"> has to be applied whenever new or modified systems are implemented, with the scope of these tests covering security controls, business logic, system performance under various stressful conditions, etc.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">For all major releases, <\/span><b>vulnerability assessment and penetration testing (VAPT)<\/b><span style=\"font-weight: 400;\"> has to be conducted beforehand to assess risk &amp; vulnerabilities arising from recent additions or modifications to the application or software. You can read more about CSCRF\u2019s VAPT requirements in our blog &#8220;<a href=\"https:\/\/ivaluegroup.com\/en-in\/resources\/blogs\/cybersecurity-for-stock-brokers-custodians-sebi-cscrf\/\">Cybersecurity for Stock Brokers &amp; Custodians: Meeting SEBI\u2019s CSCRF Mandates&#8221;.<\/a><\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Furthermore, there is a realization that software developers and vendors often create new products by using existing open source &amp; commercial software components. However, recent security breaches at third party vendors like Apache and Solarwinds have mandated the requirement of a <\/span><b>Software Bill of Materials (SBOM)<\/b><span style=\"font-weight: 400;\">, a formal record containing details &amp; supply chain relationship of various components used in building that particular software.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">All REs have to retain SBOMs for their existing critical systems before February 20, 2025, so <\/span><span style=\"font-weight: 400;\">click here<\/span><span style=\"font-weight: 400;\"> for us to help you out with that if you haven\u2019t started. Additionally, SBOMs have to be obtained for all new software products\/SaaS to be used in critical systems.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A typical SBOM includes all these elements:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">License information<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Name of supplier<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">All primary components with their respective transitive dependencies<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Encryption used<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Cryptographic hash of components<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Frequency of updates<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Known unknowns where SBOM does not include the full dependency graphs<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Access Control Methods<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Methods for accommodating occasional incidental errors<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">With SBOMs, you become more aware of all the myriad elements involved in your software, thus having more information to make better security decisions. It also helps mitigate supply chain risks that are proving to be a big issue for many organizations.<\/span><\/p>\n<h3>Securing Communications: Encryption &amp; Safe Transmission<\/h3>\n<p><span style=\"font-weight: 400;\">SEBI defines a <\/span><b>secure channel<\/b><span style=\"font-weight: 400;\"> as \u2018a protected communications link established between a cryptographic module and the sender\/receiver to securely communicate and verify the validation of plaintext CSPs, keys, authentication data and other sensitive data.\u2019<\/span><\/p>\n<p><span style=\"font-weight: 400;\">CSCRF mandates the protection of data-at-rest and data-in-transit for all REs. Like we mentioned earlier, <\/span><b>encryption<\/b><span style=\"font-weight: 400;\"> used is a key element of the SBOM requirements, as it is the driver for securing all the data in that particular software. You can read more about how encryption can be used for data-at-rest <\/span><span style=\"font-weight: 400;\">here<\/span><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Similarly, encryption plays a key role in securing communications and protecting your data in transit. Here are the CSCRF requirements for the same:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">When an application transmitting sensitive data communicates over the Internet with the REs systems (ex. IBT communication from client\u2019s web browser), it should be done over a secure, encrypted channel using a strong transport encryption mechanism like <\/span><b>Transport Layer Security (TLS)<\/b><span style=\"font-weight: 400;\">. The asymmetric public key cryptography used in TLS helps prevent Man in the Middle (MITM) attacks.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">For applications carrying sensitive data served as web pages over the Internet, a valid, properly configured <\/span><b>TLS certificate<\/b><span style=\"font-weight: 400;\"> on that web server is mandatory. This is shown through the HTTP(S) padlock sign on your browser.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Use secure protocols like <\/span><b>FTP(S), SSH and VPN tunnels<\/b><span style=\"font-weight: 400;\">.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">iValue\u2019s state-of-the-art cybersecurity suite can help secure your software, secure your communications and adhere to all the myriad requirements mandated by SEBI.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here are the solutions we provide to help <\/span><b>secure your software and applications<\/b><span style=\"font-weight: 400;\">:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Risk assessment tools<\/b><span style=\"font-weight: 400;\"> like <\/span><b>Nessus<\/b><span style=\"font-weight: 400;\"> and <\/span><b>Tenable<\/b><span style=\"font-weight: 400;\"> that perform vulnerability scans and provide detailed reports for mitigation.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">An advanced <\/span><b>SSDLC solution<\/b><span style=\"font-weight: 400;\"> that provides threat modeling to identify potential threats &amp; attack vectors, secure coding standards, code review &amp; static analysis, and dynamic application security testing (DAST).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Web Application Security Testing<\/b><span style=\"font-weight: 400;\"> through solutions like <\/span><b>Tenable<\/b><span style=\"font-weight: 400;\">, <\/span><b>Opentext Fortify<\/b><span style=\"font-weight: 400;\"> and <\/span><b>Levo<\/b><span style=\"font-weight: 400;\">, which help identify vulnerabilities in web applications.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The required experience and processes to take you through the <\/span><b>SBOM<\/b><span style=\"font-weight: 400;\"> mandate for all your vendors.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Additionally, we provide a wide variety of <\/span><b>encryption solutions<\/b><span style=\"font-weight: 400;\">, from symmetric to asymmetric and full disk encryption to file based encryption, through partnerships with industry leaders like <\/span><b>Thales<\/b><span style=\"font-weight: 400;\"> and <\/span><b>Ultimaco<\/b><span style=\"font-weight: 400;\">. We can also help you obtain TLS certificates to secure your communication through the Internet. You can read more about our encryption solutions <\/span><span style=\"font-weight: 400;\">here<\/span><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We close it by saying that if you fall under SEBI\u2019s REs, the next year could get pretty hectic with all the various requirements. If you need a partner to streamline that for you while you focus on what you do best, <\/span><a href=\"https:\/\/ivaluegroup.com\/en-in\/contact-us\/\"><span style=\"font-weight: 400;\">click here<\/span><span style=\"font-weight: 400;\"> to set up a meeting with us.<\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Need for SEBI Compliance in Securing Customer Data and Communications India\u2019s growth story is reflected in the emergence of its financial markets. The total market capitalization of India\u2019s stock market exceeded $5 trillion recently, and a key reason for this is the democratization of access to these markets. In FY24, non-institutional investors accounted for &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/ivaluegroup.com\/en-in\/resources\/blogs\/securing-customer-communications-portfolio-data-sebi-compliance\/\"> <span class=\"screen-reader-text\">Securing Customer Communications &#038; Portfolio Data: Achieving SEBI Compliance for Portfolio Managers &#038; Investment Advisors<\/span> Read More \u00bb<\/a><\/p>\n","protected":false},"author":1,"featured_media":20191,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[131],"tags":[182,136,268,383,379,378,382,377,381,380],"whitepapers":[],"case_studies":[],"acf":[],"_links":{"self":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts\/23088"}],"collection":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/comments?post=23088"}],"version-history":[{"count":5,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts\/23088\/revisions"}],"predecessor-version":[{"id":23099,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts\/23088\/revisions\/23099"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/media\/20191"}],"wp:attachment":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/media?parent=23088"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/categories?post=23088"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/tags?post=23088"},{"taxonomy":"whitepapers","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/whitepapers?post=23088"},{"taxonomy":"case_studies","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/case_studies?post=23088"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}