{"id":6123,"date":"2017-07-04T11:34:39","date_gmt":"2017-07-04T06:04:39","guid":{"rendered":"http:\/\/www.naavi.org\/wp\/?p=6123"},"modified":"2017-07-04T15:13:03","modified_gmt":"2017-07-04T09:43:03","slug":"information-technology-structure-for-nbfcs-rbi-issues-guidelines","status":"publish","type":"post","link":"https:\/\/www.naavi.org\/wp\/information-technology-structure-for-nbfcs-rbi-issues-guidelines\/","title":{"rendered":"Information Technology Structure for NBFCs.. RBI issues guidelines"},"content":{"rendered":"<p style=\"text-align: justify;\">On June 8, 2017, RBI issued an important document containing guidelines for Information Technology Framework for NBFC sector. The <a href=\"https:\/\/www.rbi.org.in\/scripts\/FS_Notification.aspx?Id=10999&amp;fn=14&amp;Mode=0\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\"><strong>Master Direction\u00a0<\/strong><\/span><\/a>sets detailed guidelines for managing the IT infrastructure by \u00a0NBFCs in order to enhance the safety, security and efficiency of IT operations. The guidelines are on the lines of the <a href=\"http:\/\/www.naavi.org\/archives\/archive_2011\/comments_ggwg.htm\" target=\"_blank\" rel=\"noopener\">Gopala Krishna Working Group<\/a> (GGWG) recommendations for Banks and cover<\/p>\n<ol style=\"text-align: justify;\">\n<li>IT Governance<\/li>\n<li>IT Policy<\/li>\n<li>Information and Cyber Security<\/li>\n<li>IT Operations<\/li>\n<li>IS Audit<\/li>\n<li>Business Continuity Planning and<\/li>\n<li>IT Services Outsourcing.<\/li>\n<\/ol>\n<p style=\"text-align: justify;\">Subsequently in 2016, a <span style=\"text-decoration: underline;\"><strong><a href=\"https:\/\/www.naavi.org\/wp\/new-cyber-security-frameworks-banks-will-shakeup-cisos-banks\/\" target=\"_blank\" rel=\"noopener\">Cyber Security Framework for Banks<\/a>\u00a0<\/strong><\/span>was also mandated.<\/p>\n<p style=\"text-align: justify;\">While the directions proceed on expected general principles of Good IT Governance, it is interesting to note that the Information Security has been defined to include &#8220;Authenticity&#8221; as one of the basic tenets apart from the well known CIA principle (Confidentiality, Integrity and Availability). The<a href=\"http:\/\/www.naavi.org\/cl_editorial_12\/edit_nov_19_TIA.html\" target=\"_blank\" rel=\"noopener\"> Total Information Assurance model<\/a> which the undersigned recommends is on the similar thought process and infact extends it to the fifth tenet which is &#8220;Non Repudiation&#8221;. &#8220;Non Repudiation&#8221; is an extension of &#8220;Authenticity&#8221; and hence we can equate the new RBI quartet of CIAA as not different from Naavi&#8217;s adoption of CIAA and Non Repudiation.<\/p>\n<p style=\"text-align: justify;\">The IS policy is recommended to be built on<\/p>\n<ol style=\"text-align: justify;\" type=\"a\">\n<li><span style=\"text-decoration: underline;\"><strong><span class=\"head\">Identification and Classification of Information Assets.<\/span><\/strong><\/span>\u00a0NBFCs shall maintain detailed inventory of Information Asset with distinct and clear identification of the asset.<\/li>\n<li><span style=\"text-decoration: underline;\"><strong><span class=\"head\">Segregation of functions:<\/span><\/strong><\/span>\u00a0There should be segregation of the duties of the Security Officer\/Group (both physical security as well as cyber security) dealing exclusively with information systems security and the Information Technology division which actually implements the computer systems. The information security function should be adequately resourced in terms of the number of staff, level of skill and tools or techniques like risk assessment, security architecture, vulnerability assessment, forensic assessment, etc. Further, there should be a clear segregation of responsibilities relating to system administration, database administration and transaction processing.<\/li>\n<li><span class=\"head\"><span style=\"text-decoration: underline;\"><strong>Role based Access Control<\/strong><\/span> \u2013<\/span>\u00a0Access to information should be based on well-defined user roles (system administrator, user manager, application owner etc.), NBFCs shall avoid dependence on one or few persons for a particular job. There should be clear delegation of authority for right to upgrade\/change user profiles and permissions and also key business parameters (eg. interest rates) which should be documented.<\/li>\n<li><span class=\"head\"><span style=\"text-decoration: underline;\"><strong>Personnel Security<\/strong><\/span> &#8211;<\/span>\u00a0A few authorized application owners\/users may have intimate knowledge of financial institution processes and they pose potential threat to systems and data. NBFC should have a process of appropriate check and balance in this regard. Personnel with privileged access like system administrator, cyber security personnel, etc should be subject to rigorous background check and screening.<\/li>\n<li><span class=\"head\"><span style=\"text-decoration: underline;\"><strong>Physical Security<\/strong><\/span> &#8211;<\/span>\u00a0The confidentiality, integrity, and availability of information can be impaired through physical access and damage or destruction to physical components. NBFCs need to create a secured environment for physical security of IS Assets such as secure location of critical data, restricted access to sensitive areas like data center etc.<\/li>\n<li><span style=\"text-decoration: underline;\"><strong><span class=\"head\">Maker-checker<\/span>\u00a0<\/strong><\/span>is one of the important principles of authorization in the information systems of financial entities. For each transaction, there must be at least two individuals necessary for its completion as this will reduce the risk of error and will ensure reliability of information.<\/li>\n<li><span class=\"head\"><span style=\"text-decoration: underline;\"><strong>Incident Management<\/strong><\/span> &#8211;<\/span>\u00a0The IS Policy should define what constitutes an incident. NBFCs shall develop and implement processes for preventing, detecting, analysing and responding to information security incidents.<\/li>\n<li><span style=\"text-decoration: underline;\"><strong><span class=\"head\">Trails-<\/span><\/strong><\/span>\u00a0NBFCs shall ensure that audit trails exist for IT assets satisfying its business requirements including regulatory and legal requirements, facilitating audit, serving as forensic evidence when required and assisting in dispute resolution. If an employee, for instance, attempts to access an unauthorized section, this improper activity should be recorded in the audit trail.<\/li>\n<li><span class=\"head\"><span style=\"text-decoration: underline;\"><strong>Public Key Infrastructure (PKI)<\/strong><\/span> &#8211;<\/span>\u00a0NBFCs may increase the usage of PKI to ensure confidentiality of data, access control, data integrity, authentication and nonrepudiation.<\/li>\n<\/ol>\n<p style=\"text-align: justify;\">It is interesting to note that RBI stops at making a suggestion that NBFCs may increase the usage of PKI and does not go for a mandate though any prudent NBFC would like its operations to be fully compliant with the law of the land though the regulatory authority has given them a certain cushion.<\/p>\n<p style=\"text-align: justify;\">A separate mention has been made of a &#8220;Cyber Security Policy&#8221; though experts would consider both Information Security and Cyber Security as inter dependent.<\/p>\n<p style=\"text-align: justify;\">As indicated in the Cyber Security Framework (CSF) for Banks, the directions require that &#8220;The adequacy of and adherence to cyber resilience framework should be assessed and measured through development of indicators to assess the level of risk\/preparedness. These indicators should be used for comprehensive testing through independent compliance checks and audits carried out by qualified and competent professionals. The awareness among the stakeholders including employees may also form a part of this assessment.&#8221;<\/p>\n<p style=\"text-align: justify;\">Similarly, a &#8220;Cyber Crisis Management Plan&#8221; has also been suggested which includes DEtection&lt; Response, Recovery and Containment principles. As in the CSF, it has been stated that NBFCs are &#8220;Expected&#8221; to \u00a0be well prepared to face emerging cyber-threats such as \u2018zero-day\u2019 attacks, remote access threats, and targeted attacks.<\/p>\n<p style=\"text-align: justify;\">A specific mention has also been made of the necessity to take necessary preventive and corrective measures in addressing various types of cyber threats including, but not limited to, denial of service, distributed denial of services (DDoS), ransom-ware \/ crypto ware, destructive malware, business email frauds including spam, email phishing, spear phishing, whaling, vishing frauds, drive-by downloads, browser gateway fraud, ghost administrator exploits, identity frauds, memory update frauds, password related frauds, etc.<\/p>\n<p style=\"text-align: justify;\">Additionally, a Cyber Incident Reporting mechanism has also been suggested on the format similar to that meant for the Banks and the reporting has to be done within 24 hours. (<a href=\"https:\/\/rbidocs.rbi.org.in\/rdocs\/content\/pdfs\/MD52E07062017_AN1.pdf\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: underline;\"><strong>Format<\/strong><\/span><\/a>)<\/p>\n<p style=\"text-align: justify;\">On the mobile, &#8220;End to End Encryption&#8221; has been mandated to maintain information security. A warning has also been sounded on the risks of using Social Media for marketing and the possibility of malware distribution through this channel.<\/p>\n<p style=\"text-align: justify;\">For smaller NBFCs with an asset size of less than Rs 500 crores, it has been suggested that the appropriate Information Technology policy is put in place by September 30, 2018.<\/p>\n<p style=\"text-align: justify;\">In summary one can observe that RBI like its earlier guidelines, is washing its hands off by sending out a circular. It has been observed that RBI does not normally care to follow up on implementation of any of its Information Security related circulars at least as we have seen in the Banking sector. Hopefully they will be more pro active in implementation since NBFCs are not as powerful as Banks and cannot arm twist the RBI.<\/p>\n<p style=\"text-align: right;\">Naavi<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On June 8, 2017, RBI issued an important document containing guidelines for Information Technology Framework for NBFC sector. The Master Direction\u00a0sets detailed guidelines for managing the IT infrastructure by \u00a0NBFCs in order to enhance the safety, security and efficiency of &hellip; <a href=\"https:\/\/www.naavi.org\/wp\/information-technology-structure-for-nbfcs-rbi-issues-guidelines\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_editorskit_title_hidden":false,"_editorskit_reading_time":0,"_editorskit_is_block_options_detached":false,"_editorskit_block_options_position":"{}","_uag_custom_page_level_css":"","footnotes":""},"categories":[7],"tags":[],"class_list":["post-6123","post","type-post","status-publish","format-standard","hentry","category-cyber-law"],"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"post-thumbnail":false},"uagb_author_info":{"display_name":"Vijayashankar Na","author_link":"https:\/\/www.naavi.org\/wp\/author\/naavi\/"},"uagb_comment_info":13,"uagb_excerpt":"On June 8, 2017, RBI issued an important document containing guidelines for Information Technology Framework for NBFC sector. The Master Direction\u00a0sets detailed guidelines for managing the IT infrastructure by \u00a0NBFCs in order to enhance the safety, security and efficiency of &hellip; Continue reading &rarr;","_links":{"self":[{"href":"https:\/\/www.naavi.org\/wp\/wp-json\/wp\/v2\/posts\/6123","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.naavi.org\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.naavi.org\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.naavi.org\/wp\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.naavi.org\/wp\/wp-json\/wp\/v2\/comments?post=6123"}],"version-history":[{"count":2,"href":"https:\/\/www.naavi.org\/wp\/wp-json\/wp\/v2\/posts\/6123\/revisions"}],"predecessor-version":[{"id":6125,"href":"https:\/\/www.naavi.org\/wp\/wp-json\/wp\/v2\/posts\/6123\/revisions\/6125"}],"wp:attachment":[{"href":"https:\/\/www.naavi.org\/wp\/wp-json\/wp\/v2\/media?parent=6123"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.naavi.org\/wp\/wp-json\/wp\/v2\/categories?post=6123"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.naavi.org\/wp\/wp-json\/wp\/v2\/tags?post=6123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}