{"id":23093,"date":"2024-09-30T10:43:26","date_gmt":"2024-09-30T05:13:26","guid":{"rendered":"https:\/\/ivaluegroup.com\/en-in\/?p=23093"},"modified":"2025-04-25T13:11:37","modified_gmt":"2025-04-25T07:41:37","slug":"sebi-cscrf-explained","status":"publish","type":"post","link":"https:\/\/ivaluegroup.com\/en-in\/resources\/blogs\/sebi-cscrf-explained\/","title":{"rendered":"SEBI Cybersecurity &#038; Cyber Resilience Framework (CSCRF) Explained: Strengthening Investor Protection"},"content":{"rendered":"<h2>Overview of SEBI\u2019s Cybersecurity &amp; Cyber Resilience Framework (CSCRF)<\/h2>\n<p><span style=\"font-weight: 400;\">India\u2019s financial sector has always been an attractive target for cyberattackers. RBI\u2019s Financial Stability Report claims that the financial sector faced 20,000 cyberattacks in the last 2 decades, resulting in losses of <a href=\"https:\/\/www.hindustantimes.com\/business\/rbi-warns-banks-of-cyberattacks-scheduled-commercial-banks-at-highest-risk-101719637827991.html\" target=\"_blank\" rel=\"noopener\">$20 billion<\/a>. Recently, cryptocurrency platform <a href=\"https:\/\/www.thehindu.com\/sci-tech\/technology\/what-is-wazirxs-legal-status-after-a-230-million-wallet-hack\/article68595715.ece\" target=\"_blank\" rel=\"noopener\">WazirX<\/a> faced the biggest cyberattack on an Indian exchange, with hackers stealing more than $230 million worth of investor holdings.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This precarious climate comes at a time when technological developments in securities markets are moving at a rapid pace. Therefore, maintaining a robust cybersecurity posture becomes necessary to protect investor interests. To that end, SEBI recently released the <\/span><b>Cybersecurity &amp; Cyber Resilience Framework (CSCRF)<\/b><span style=\"font-weight: 400;\"> on August 20, 2024, featuring various mandates for its <\/span><b>regulated entities (REs)<\/b><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The framework was created through a collaborative process with various stakeholders like several Market Infrastructure Institutions (MIIs) and Regulated Entities (REs), Indian Computer Emergency Response Team (CERT-In), National Critical Information Infrastructure Protection Centre, Industry Standard Forum (ISF), information security auditors and Cloud Service Providers (CSPs). The guidelines are based taking into account international standards like ISO 27000, CIS Controls Version 8, NIST SP 800-53, BIS Financial Stability Institute Guidelines and CPMI-IOSCO principles.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This blog gives a general overview of the CSCRF, highlighting certain important mandates in the framework and how solutions in iValue\u2019s cybersecurity suite can help you adhere to the requirements and in turn, create a better cybersecurity posture for your organization.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We start with the 5 cyber resilience goals prescribed by the CSCRF:<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Anticipate <\/b><span style=\"font-weight: 400;\">involves maintaining a state of preparedness to avoid business function compromises from cyberattacks<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>Withstand <\/b><span style=\"font-weight: 400;\">involves the continuation of essential business functions in the event of a successful attack<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>Contain <\/b><span style=\"font-weight: 400;\">involves isolating trusted systems from untrusted systems in the event of a successful attack<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>Restore <\/b><span style=\"font-weight: 400;\">involves restoring business functions to the maximum extent subsequent to a successful attack<\/span><\/li>\n<li aria-level=\"1\"><b>Evolve <\/b><span style=\"font-weight: 400;\">involves upgrading your organization\u2019s cybersecurity capabilities to minimize the negative impact from actual or predicted attacks<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">These goals can be linked to one or more of these 6 cybersecurity functions: <\/span><b>Governance, Identify, Detect, Protect, Respond<\/b><span style=\"font-weight: 400;\"> &amp; <\/span><b>Recover<\/b><span style=\"font-weight: 400;\">. Most of these functions will come under the <\/span><b>Anticipate <\/b><span style=\"font-weight: 400;\">goal, as prevention is always preferable to the cure when it comes to cyberattacks.<\/span><\/p>\n<h2><b>Cyber Resilience Goal: Anticipate | Cybersecurity Function: Governance<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">This goal dictates that the leadership in organizations like yours is responsible for nurturing a risk-aware, cybersecurity conscious culture. To that end, there is a mandate to prepare a cybersecurity <\/span><b>risk management <\/b><span style=\"font-weight: 400;\">framework to access, mitigate &amp; monitor risks, and define processes to address them using the learnings. This includes assessing risk in your supply chains &#8211; for example, you require a Software Bill of Materials (SBOM) from all your vendors to account for any third-party or open source components. You can read more about that <\/span><span style=\"font-weight: 400;\">in our blog: <a href=\"https:\/\/ivaluegroup.com\/en-in\/resources\/blogs\/securing-customer-communications-portfolio-data-sebi-compliance\/\">Securing Customer Communications &amp; Portfolio Data: Achieving SEBI Compliance for Portfolio Managers &amp; Investment Advisors<\/a><\/span><\/p>\n<p><span style=\"font-weight: 400;\">An ideal risk management framework should involve these facets:<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Identify:<\/b><span style=\"font-weight: 400;\"> Determining threats &amp; vulnerabilities that could compromise your organization.<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>Analyze: <\/b><span style=\"font-weight: 400;\">Assessing risk through the likelihood of occurrence and the expected negative impact.<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>Evaluate: <\/b><span style=\"font-weight: 400;\">Evaluating against threshold of acceptable risk.<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>Prioritize: <\/b><span style=\"font-weight: 400;\">Mitigating high risk observations on priority.<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>Respond: <\/b><span style=\"font-weight: 400;\">Crafting an effective Incident Response &amp; Management Plan.<\/span><\/li>\n<li aria-level=\"1\"><b>Monitor: <\/b><span style=\"font-weight: 400;\">Continuous monitoring to ensure levels are always below pre-determined level of acceptable risk.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">We use state-of-the-art risk assessment tools like <\/span><span style=\"font-weight: 400;\">Nessus<\/span><span style=\"font-weight: 400;\"> &amp; <\/span><span style=\"font-weight: 400;\">Tenable<\/span><span style=\"font-weight: 400;\"> to perform continuous vulnerability scans that identify potential vulnerabilities across your IT environment and provide detailed reports for mitigation.<\/span><\/p>\n<h2><b>Cyber Resilience Goal: Anticipate | Cybersecurity Function: Identify<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">In this peg, data, personnel, devices, systems and facilities that enable you to achieve your business purposes are identified &amp; managed according to your risk strategy. It is crucial to identify your <\/span><b>critical systems<\/b><span style=\"font-weight: 400;\"> at this phase, since this will require most fortification. Our data classification solutions with industry leaders like <\/span><span style=\"font-weight: 400;\">Forcepoint<\/span><span style=\"font-weight: 400;\"> and <\/span><span style=\"font-weight: 400;\">Digital Guardian<\/span><span style=\"font-weight: 400;\"> help streamline this process for you.\u00a0<\/span><\/p>\n<h2><b>Cyber Resilience Goal: Anticipate | Cybersecurity Function: Protect<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">This is the page that has the most mandates in CSCRF, as it involves protecting all the potential attack vectors that an attacker could target. This includes:<\/span><\/p>\n<h3><i><span style=\"font-weight: 400;\">Securing Access\u00a0<\/span><\/i><\/h3>\n<p><span style=\"font-weight: 400;\">CSCRF requires the incorporation of the <\/span><b>principle of least privilege<\/b><span style=\"font-weight: 400;\"> and <\/span><b>zero trust<\/b><span style=\"font-weight: 400;\"> to ensure users in your organization get access only to data relevant to them, for a fixed period of time. Our Identity Governance &amp; Administration solutions like <\/span><span style=\"font-weight: 400;\">Opentext NetIQ <\/span><span style=\"font-weight: 400;\">and <\/span><span style=\"font-weight: 400;\">RSA SecurID <\/span><span style=\"font-weight: 400;\">seamlessly control &amp; monitor user access.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Furthermore, access to critical systems requires the use of multi-factor authentication (MFA). Our partnership with <\/span><span style=\"font-weight: 400;\">Yubikey<\/span><span style=\"font-weight: 400;\"> ensures a strong authentication factor in the form of a physical key.<\/span><\/p>\n<h3><i><span style=\"font-weight: 400;\">Securing your APIs<\/span><\/i><\/h3>\n<p><span style=\"font-weight: 400;\">This has to be done keeping in mind OWASP guidelines, with emphasis on secure-by-design API development, rate limiting, zero-trust access management and clarified API discovery in terms of knowing how many APIs are exposed and how many are being used. Our integration with <\/span><span style=\"font-weight: 400;\">Google Apigee API<\/span><span style=\"font-weight: 400;\"> ensures seamless adherence to these guidelines.<\/span><\/p>\n<h3><i><span style=\"font-weight: 400;\">Securing your data<\/span><\/i><\/h3>\n<p><span style=\"font-weight: 400;\">CSCRF mandates protection of <\/span><b>data-at-rest<\/b><span style=\"font-weight: 400;\"> and <\/span><b>data-in-transit<\/b><span style=\"font-weight: 400;\">, with encryption being key to this. Data-at-rest is protected through:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Full-disk encryption<\/b><span style=\"font-weight: 400;\"> which secures entire disks with a single key, provided by our partners <\/span><span style=\"font-weight: 400;\">Thales<\/span><span style=\"font-weight: 400;\"> &amp; <\/span><span style=\"font-weight: 400;\">Entrust<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>File-based encryptions<\/b><span style=\"font-weight: 400;\"> which secure individual files instead of the entire disk, provided by our partners <\/span><span style=\"font-weight: 400;\">Ultimaco<\/span><span style=\"font-weight: 400;\"> &amp; <\/span><span style=\"font-weight: 400;\">Fortanix<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Data-in-transit is protected through asymmetric encryption in the form of TLS.<\/span><\/p>\n<h2><b>Cyber Resilience Goal: Anticipate | Cybersecurity Function: Detect<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">This mandates the incorporation of a <\/span><b>24x7x365 Security Operations Centre (SOC)<\/b><span style=\"font-weight: 400;\"> to monitor, prevent, predict, detect, investigate and respond to cyber threats. Undertaking of periodic audits like <\/span><b>Vulnerability Assessment &amp; Penetration Testing (VAPT)<\/b><span style=\"font-weight: 400;\"> comes under this.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Being cognizant of the fact that setting up an in-house SOC could be difficult for smaller REs, CSCRF gives three options: your <\/span><b>own\/group SOC<\/b><span style=\"font-weight: 400;\">, a <\/span><b>market SOC<\/b><span style=\"font-weight: 400;\">, and <\/span><b>third-party managed SOC<\/b><span style=\"font-weight: 400;\">, like the <\/span><span style=\"font-weight: 400;\">state-of-the-art solution we have at iValue<\/span><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h2><b>Cyber Resilience Goals: Withstand &amp; Contain | Cybersecurity Function: Respond<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">This involves the construction of solid incident response plans &amp; procedures to respond to known cybersecurity incidents. Incident response can be broken down into 4 broad phases:<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Preparation: <\/b><span style=\"font-weight: 400;\">Focused on preventative measures and response templates.<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>Detection &amp; Analysis: <\/b><span style=\"font-weight: 400;\">This involves collection of logs, identification of IOAs, setting a baseline for normal behavior, and correlating events to check deviations in behavior.<\/span><\/li>\n<\/ul>\n<ul>\n<li aria-level=\"1\"><b>Containment, Eradication &amp; Recovery: <\/b><span style=\"font-weight: 400;\">Containment involves mitigating the incident before it overwhelms your resources and causes more damage. Eradication &amp; recovery ensure all the affected systems get isolated from your network, post which remediation steps are undertaken.<\/span><\/li>\n<li aria-level=\"1\"><b>Post-incident activity: <\/b><span style=\"font-weight: 400;\">Evaluating the incident that has occurred, and taking learnings from it to ensure it doesn\u2019t happen again.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Our Incident Response &amp; Management solutions include <\/span><span style=\"font-weight: 400;\">Google Simplify<\/span><span style=\"font-weight: 400;\"> and <\/span><span style=\"font-weight: 400;\">Splunk Phantom<\/span><span style=\"font-weight: 400;\">, which coordinate &amp; automate incident response and ensure timely resolution of cybersecurity incidents.<\/span><\/p>\n<h2><b>Cyber Resilience Goal: Recover | Cybersecurity Function: Recover<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">This ensures that recovery processes &amp; procedures are executed &amp; maintained to ensure timely restoration of systems or assets affected by cybersecurity incidents. Our forensic tools with partners like <\/span><span style=\"font-weight: 400;\">EnCase<\/span><span style=\"font-weight: 400;\"> help in root cause analysis and aid in remediation of incidents.<\/span><\/p>\n<h3><b>Cyber Resilience Goal: Evolve<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">One of the main pillars of CSCRF is the ability to adapt &amp; improve your security posture to stay ahead of threats. Security awareness training could be crucial to this, something we facilitate through our partnerships with <\/span><span style=\"font-weight: 400;\">KnowBe4<\/span><span style=\"font-weight: 400;\"> and <\/span><span style=\"font-weight: 400;\">Progist<\/span><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These are the general guidelines provided by CSCRF, but one thing to consider is that you will have different requirements based on which of these 5 categorizations you fall under: <\/span><b>MIIs, qualified REs, mid-size REs, small-size REs<\/b><span style=\"font-weight: 400;\"> and <\/span><b>self-certification REs<\/b><span style=\"font-weight: 400;\">. For example, MIIs and qualified REs have to measure their SOC\u2019s functional efficacy every 6 months, while for the rest, it is yearly.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So, if you\u2019re in doubt about which classification you fit in and what exact requirements apply for your organization, <\/span><a href=\"https:\/\/ivaluegroup.com\/en-in\/contact-us\/\"><span style=\"font-weight: 400;\">click here<\/span><\/a><span style=\"font-weight: 400;\"> to set up a meeting with us so we can streamline it for you.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview of SEBI\u2019s Cybersecurity &amp; Cyber Resilience Framework (CSCRF) India\u2019s financial sector has always been an attractive target for cyberattackers. RBI\u2019s Financial Stability Report claims that the financial sector faced 20,000 cyberattacks in the last 2 decades, resulting in losses of $20 billion. Recently, cryptocurrency platform WazirX faced the biggest cyberattack on an Indian exchange, &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/ivaluegroup.com\/en-in\/resources\/blogs\/sebi-cscrf-explained\/\"> <span class=\"screen-reader-text\">SEBI Cybersecurity &#038; Cyber Resilience Framework (CSCRF) Explained: Strengthening Investor Protection<\/span> Read More \u00bb<\/a><\/p>\n","protected":false},"author":1,"featured_media":20195,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"default","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[131],"tags":[205,391,393,377,373,392],"whitepapers":[],"case_studies":[],"acf":[],"_links":{"self":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts\/23093"}],"collection":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/comments?post=23093"}],"version-history":[{"count":3,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts\/23093\/revisions"}],"predecessor-version":[{"id":23096,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/posts\/23093\/revisions\/23096"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/media\/20195"}],"wp:attachment":[{"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/media?parent=23093"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/categories?post=23093"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/tags?post=23093"},{"taxonomy":"whitepapers","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/whitepapers?post=23093"},{"taxonomy":"case_studies","embeddable":true,"href":"https:\/\/ivaluegroup.com\/en-in\/wp-json\/wp\/v2\/case_studies?post=23093"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}