{"id":23091,"date":"2024-09-30T10:38:52","date_gmt":"2024-09-30T05:08:52","guid":{"rendered":"https:\/\/ivaluegroup.com\/en-in\/?p=23091"},"modified":"2025-04-25T13:11:38","modified_gmt":"2025-04-25T07:41:38","slug":"strengthening-data-protection-to-meet-sebis-encryption-mandates","status":"publish","type":"post","link":"https:\/\/ivaluegroup.com\/en-in\/resources\/blogs\/strengthening-data-protection-to-meet-sebis-encryption-mandates\/","title":{"rendered":"Strengthening Data Protection to Meet SEBI\u2019s Encryption Mandates"},"content":{"rendered":"<h2>Introduction to SEBI\u2019s Encryption Mandates<\/h2>\n<p><span style=\"font-weight: 400;\">India\u2019s financial markets are currently in a supercharged state. With increasing participation from retail investors, the National Stock Exchange (NSE) reported daily trading volumes averaging around \u20b945,000 cr in equities. A lot of these transactions involve sensitive data like payment details, transaction histories and personal identifiers, making it attractive for malicious actors attempting to gain unauthorized access. This is reflected by the Indian financial sector facing more than 13 lakh cyberattacks between January to October 2023, according to the RBI.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If these attackers do happen to gain access, there could be serious ramifications, leading to both a loss in revenue and customer confidence. Therefore, there is a clear incentive for financial organizations like yours to have strong security measures to guarantee privacy, availability &amp; integrity of financial data.<\/span><\/p>\n<h2>The Importance of Encryption in Financial Data Protection<\/h2>\n<p><span style=\"font-weight: 400;\">One key measure is <\/span><b>encryption<\/b><span style=\"font-weight: 400;\">, which is a crucial part of the Cybersecurity &amp; Cyber Resilience Framework (CSCRF) issued by SEBI on August 20, 2024. CSCRF has numerous mandates for SEBI\u2019s Regulated Entities (REs) &#8211; this blog will focus specifically on the framework\u2019s encryption-centric requirements. Interestingly enough, there is not much mention of encryption in the released framework, because most of the groundwork for the same was laid out last year in a SEBI circular titled \u2018Framework for Adoption of Cloud Services by SEBI Regulated Entities\u2019 on March 6, 2023.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Encryption secures data by converting it into ciphertext that is indecipherable for unauthorized persons. This is done using cryptographic keys, which are are random strings of bits generated to encrypt and decrypt. CSCRF dictates that all REs secure their <\/span><b>data-at-rest<\/b><span style=\"font-weight: 400;\"> and <\/span><b>data-in-transit<\/b><span style=\"font-weight: 400;\">, with the further mandate of securing data-in-use for only Market Infrastructure Institutions (MIIs) and Qualified REs,<\/span><\/p>\n<h3><b>Securing Data-at-rest<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">CSCRF dictates that data-at-rest encryption has to be done with strong encryption algorithms, featuring a mix of data object encryption, file level encryption and tokenization in addition to the encryption provided at platform level.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So, what type of encryption works best for your data? The answer will be extremely clear after undertaking a thorough risk assessment that identifies your most sensitive data. It is important to note that encrypting all your data is infeasible and may open up additional attack vectors, so this first step is crucial.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">One categorization for types of encryption can be based on the <\/span><b>cryptography<\/b><span style=\"font-weight: 400;\">:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Symmetric encryption<\/b><span style=\"font-weight: 400;\"> is a basic encryption technique where the same key is used to encrypt &amp; decrypt data. With it, you can achieve efficiency in processing large amounts of data while maintaining privacy. Some examples of this are <\/span><b>Advanced Encryption Standard (AES) <\/b><span style=\"font-weight: 400;\">and <\/span><b>Data Encrytion Standard (DES)<\/b><span style=\"font-weight: 400;\">. CSCRF prescribes the use of AES, preferably 256 bit.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Asymmetric encryption<\/b><span style=\"font-weight: 400;\"> uses a key pair of a public key distributed publically for users to encrypt data, and a private key kept secret within your web server. Only this key has the power to decrypt data. It is generally more secure than symmetric encryption while also being slower. Some techniques include <\/span><b>Rivest-Shamir-Adleman (RSA), Elliptic Curve Cryptography (ECC)<\/b><span style=\"font-weight: 400;\"> and the <\/span><b>Diffie-Hellman<\/b><span style=\"font-weight: 400;\"> key exchange. CSCRF mandates the use of <\/span><b>RSA<\/b><span style=\"font-weight: 400;\">.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Hybrid encryption<\/b><span style=\"font-weight: 400;\"> combines the two aforementioned encryption types, combining the high performance of symmetric with the security of asymmetric. An example for the same is using AES for data payload encryption, and RSA for key exchange.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Another categorisation is based on what you\u2019re encrypting. In this comes <\/span><b>full disk encryption (FDE)<\/b><span style=\"font-weight: 400;\"> and <\/span><b>file based encryption (FBE)<\/b><span style=\"font-weight: 400;\">. FDE encrypts all the data in a complete drive, while FBE encrypts specific files or directories. CSCRF mandates using a mix of both, and that particular mix will be dependent on the classification of your sensitive data. Here are some key differences between the two:<\/span><\/p>\n<table>\n<tbody>\n<tr>\n<td><b>FDE<\/b><\/td>\n<td><b>FBE<\/b><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">It encrypts the entire disk, including your OS, with a single key.<\/span><\/td>\n<td><span style=\"font-weight: 400;\">It encrypts individual files or folders, with a unique key for each file.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">It is comparatively less secure than FBE, because the entire disk can be decrypted with a single key.<\/span><\/td>\n<td><span style=\"font-weight: 400;\">It is comparatively more secure to FDE, since each file has a separate key.<\/span><\/td>\n<\/tr>\n<tr>\n<td><span style=\"font-weight: 400;\">It takes longer to implement, since you are dealing with larger amounts of data.<\/span><\/td>\n<td><span style=\"font-weight: 400;\">Once the files and directories are decided, it is faster to implement due to the relatively lesser load.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"font-weight: 400;\">Ultimately, despite the encryption mix you choose, a lot of different cryptographic keys will be generated. And for data-at-rest to be safely stored, key management procedures must be followed.\u00a0<\/span><\/p>\n<h2>Key Management and Hardware Security Module (HSM) for CSCRF Compliance<\/h2>\n<p><span style=\"font-weight: 400;\">To that end, CSCRF demands implementation of a dedicated <\/span><b>hardware security module (HSM)<\/b><span style=\"font-weight: 400;\"> that has complete control of key management, including generating, storing, exchanging and managing keys. Key rotation and stringent access restrictions are essential for success. It is critical to identify the right personnel in charge of the keys, as well as the right methodologies for storing them &#8211; any compromise to each will render the entire encryption process useless. Additionally, your HSM should be designed in fault tolerance mode to ensure that potential failure of the system doesn\u2019t have any impact on data retrieval and processing.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">(Note: CSCRF mandates that REs retain complete ownership of their encryption keys, so if you choose us as an encryption partner, we will take care of all the processes while the keys secretly reside in your systems.)<\/span><\/p>\n<h3><b>Securing data-in-transit<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">This includes data in your cloud. CSCRF mandates a mix of session encryption and data object encryption in addition to the encryption provided at the platform level, whenever sensitive data is in transit.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here are some things to keep in mind for the same:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">When an application transmitting sensitive data communicates over the Internet with the REs systems (ex. IBT communication from client\u2019s web browser), it should be done over a secure, encrypted channel using a strong transport encryption mechanism like <\/span><b>Transport Layer Security (TLS)<\/b><span style=\"font-weight: 400;\">. The asymmetric public key cryptography used in TLS helps prevent Man in the Middle (MITM) attacks.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">For applications carrying sensitive data served as web pages over the Internet, a valid, properly configured <\/span><b>TLS certificate<\/b><span style=\"font-weight: 400;\"> on that web server is mandatory. The transport channel, in this case, becomes HTTP(S), shown through the padlock sign on your browser.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Instead of using insecure protocols like File Transfer Protocol (FTP), use secure protocols like <\/span><b>FTP(S), SSH and VPN tunnels<\/b><span style=\"font-weight: 400;\">.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Additionally, for MIIs and qualified REs, data-in-use must be secured using confidential computing solutions.\u00a0<\/span><\/p>\n<h2>Simplifying CSCRF Encryption Compliance with iValue<\/h2>\n<p><span style=\"font-weight: 400;\">That\u2019s a lot of requirements to keep in mind for encryption, which is in itself a small but important cog in the CSCRF machine. The last thing you want is to incorporate a bunch of different solutions that makes it extremely difficult to keep track of it all.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To that end, we suggest you opt for <\/span><b>iValue\u2019s state-of-the-art suite<\/b><span style=\"font-weight: 400;\"> that gives you full visibility into all your CSCRF requirements.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Here are the solutions in our suite that fit your CSCRF encryption requirements:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Full Disk Encryption<\/b><span style=\"font-weight: 400;\"> through our partnerships with <\/span><b>Thales<\/b><span style=\"font-weight: 400;\"> and <\/span><b>Entrust<\/b><span style=\"font-weight: 400;\">. <\/span><b>Thales<\/b><span style=\"font-weight: 400;\">, in particular, focuses on tokenization, which is a crucial component in CSCRF\u2019s data-in-use encryption mix.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>File Based Encryption<\/b><span style=\"font-weight: 400;\"> through our partnerships with <\/span><b>Fortanix<\/b><span style=\"font-weight: 400;\"> and <\/span><b>Ultimaco<\/b><span style=\"font-weight: 400;\">. Both provide maximum security &#8211; <\/span><b>Fortanix Filesystem Encryption<\/b><span style=\"font-weight: 400;\">, for example, is FIDS 140-2 Level 3 certified.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Key Management Solutions<\/b><span style=\"font-weight: 400;\"> through our associations with <\/span><b>Google KMS, Entrust <\/b><span style=\"font-weight: 400;\">and<\/span><b> Thales. Entrust KeyControl<\/b><span style=\"font-weight: 400;\"> automates the entire key lifecycle, including key storage, backup, distribution, rotation and key revocation.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Facilitation of secure, most recent <\/span><b>TLS certificates<\/b><span style=\"font-weight: 400;\"> for your webpages.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">These solutions work in sync to help fortify your data, and a centralized dashboard gives you complete oversight at all times. If that\u2019s something that interests you, <\/span><span style=\"font-weight: 400;\">click here<\/span><span style=\"font-weight: 400;\"> to set up a meeting so we can go about finding your ideal encryption mix!\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction to SEBI\u2019s Encryption Mandates India\u2019s financial markets are currently in a supercharged state. With increasing participation from retail investors, the National Stock Exchange (NSE) reported daily trading volumes averaging around \u20b945,000 cr in equities. A lot of these transactions involve sensitive data like payment details, transaction histories and personal identifiers, making it attractive for &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/ivaluegroup.com\/en-in\/resources\/blogs\/strengthening-data-protection-to-meet-sebis-encryption-mandates\/\"> <span class=\"screen-reader-text\">Strengthening Data Protection to Meet SEBI\u2019s Encryption Mandates<\/span> Read More \u00bb<\/a><\/p>\n","protected":false},"author":1,"featured_media":20195,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[131],"tags":[388,389,386,390,387,384,374,385],"whitepapers":[],"case_studies":[],"acf":[],"_links":{"self":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts\/23091"}],"collection":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/comments?post=23091"}],"version-history":[{"count":1,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts\/23091\/revisions"}],"predecessor-version":[{"id":23092,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts\/23091\/revisions\/23092"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/media\/20195"}],"wp:attachment":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/media?parent=23091"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/categories?post=23091"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/tags?post=23091"},{"taxonomy":"whitepapers","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/whitepapers?post=23091"},{"taxonomy":"case_studies","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/case_studies?post=23091"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}