Wednesday, February 21, 2024
-Advertisement-
Reimagining Public Sector Analytics
Reimagining Public Sector Analytics
HomeNewsCyber SecurityTo mitigate data breaches, Sebi issues cybersecurity framework for KYC registration agencies

To mitigate data breaches, Sebi issues cybersecurity framework for KYC registration agencies

Follow Tech Observer on Google News
Google News

Amid growing concerns over possible data breaches, markets regulator put in place a detailed cybersecurity framework for KYC registration agencies, requiring them to define responsibilities of employees, including outsourced staff, who have privileged access to networks. Besides, the watchdog said that no person should have any intrinsic right to access confidential data by virtue of their rank or position.

With the new norms, to be effective from January 1, 2020, KYC registration agencies or KRAs would be required to define the responsibilities of its employees, including outsourced staff, who have privileged access to the networks, the (Sebi) said in a circular.

Sebi said that rapid technological developments in securities market have highlighted the need for maintaining robust and cyber resilience framework to protect the integrity of data and guard against breaches of privacy.

Cybersecurity framework includes measures, tools and processes that are intended to prevent cyber-attacks and improve cyber resilience.

“Since KRAs perform important function of maintaining KYC records of the clients in the securities market, it is desirable that KRAs have robust Cyber Security and Cyber Resilience framework in order to provide essential facilities and perform systemically critical functions relating to securities market,” Sebi noted.

Accordingly, Sebi has asked KRAs to formulate a comprehensive cybersecurity and cyber resilience policy document encompassing the framework.

The policy document should be approved by the board of KRAs and in case of deviations from the suggested framework, reasons for such deviations, technical or otherwise, should be provided in the policy document. The document should be reviewed by the board of KRAs at least annually.

KRAs will have to define responsibilities of its employees, outsourced staff, and employees of vendors, members and other entities, who may have privileged access to the networks. Further, such staff should also be subject to stringent supervision, monitoring and access restrictions.

They need to establish a reporting procedure to facilitate communication of unusual activities and events to the designated officer in a timely manner.

KRAs should establish appropriate security monitoring systems and processes to facilitate continuous monitoring of security events and timely detection of unauthorised or malicious activities, held in contractual or fiduciary capacity, by internal and external parties.

Sebi said that alerts generated from monitoring and detection systems need to be suitably investigated in order to determine activities that are to be performed to prevent expansion of such incident of cyber attack or breach, mitigate its effect and eradicate the incident.

Get the day's headlines from Tech Observer straight in your inbox

By subscribing you agree to our Privacy Policy, T&C and consent to receive newsletters and other important communications.
Tech Observer Desk
Tech Observer Desk
Tech Observer Desk at TechObserver.in is a team of technology reporters led by a senior editor who brings latest updates and developments from the world of technology.
- Advertisement -
Reimagining Public Sector Analytics
Reimagining Public Sector Analytics
- Advertisement -Veeam
- Advertisement -Reimagining Public Sector Analytics
- Advertisement -ESDS SAP Hana

Subscribe to our Newsletter

83000+ Industry Leaders read it everyday

By subscribing you agree to our Privacy Policy, T&C and consent to receive newsletters and other important communications.
- Advertisement -

How technology can combat ‘street veto’

In any democratic society, the essence of governance lies in representing the will and aspirations of all the citizens. Yet, even in today's digital age, the voices of the many can often be drowned out by a few motivated and resourceful groups.

RELATED ARTICLES