{"id":58705,"date":"2022-06-06T11:21:02","date_gmt":"2022-06-06T05:51:02","guid":{"rendered":"https:\/\/enterslice.com\/learning\/?p=58705"},"modified":"2022-09-13T16:02:39","modified_gmt":"2022-09-13T10:32:39","slug":"sebi-modifies-cyber-resilience-and-cyber-security-framework-of-kras","status":"publish","type":"post","link":"https:\/\/enterslice.com\/learning\/sebi-modifies-cyber-resilience-and-cyber-security-framework-of-kras\/","title":{"rendered":"SEBI Modifies Cyber Resilience and Cyber Security Framework of KRAs"},"content":{"rendered":"<p class=\"has-drop-cap\">Recently, a circular was released by the Securities and Exchange Board of India (SEBI), which has modified the cyber security framework and cyber resilience framework of all the registered Know Your Customer (KYC) Registration Agencies (KRAs). The modified cyber security framework of KRAs released by SEBI mandates the KRAs to conduct a comprehensive <a class=\"text-primary\" href=\"https:\/\/enterslice.com\/cyber-security-audit\"><strong>cyber audit<\/strong><\/a> at least twice in a financial year. Apart from the cyber audit report, the KRAs have also been instructed to submit a statement signed by the Managing Director (MD) and Chief Executive Officer (CEO) certifying that the all the compliances have been undertaken by the KRA, which SEBI has recommended in its guidelines and notices issued periodically. &nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Who are the entities to whom the circular on the cyber security framework of KRAs is applicable?<\/h2>\n\n\n\n<p>The circular titled &ldquo;Modification in Cyber Security and Cyber Resilience framework of <strong>Know Your Customer<\/strong><sup><a href=\"https:\/\/en.wikipedia.org\/wiki\/Know_your_customer\"><strong>[1]<\/strong><\/a><\/sup> (KYC) Registration Agencies (KRAs)&rdquo; is applicable to all the KYC Registration Agencies only.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Highlights of the Circular on Cyber Security Framework of KRAs&nbsp;&nbsp;<\/h2>\n\n\n\n<p>On 30<sup>st<\/sup> May 2022, SEBI came out with a circular titled &ldquo;Modification in Cyber Security and Cyber Resilience framework of Know Your Customer (KYC) Registration Agencies (KRAs)&rdquo;, wherein SEBI laid down a revised cyber security framework of KRAs. Under the revised cyber security framework of KRAs, SEBI has laid down the following guidelines: &nbsp;<\/p>\n\n\n\n<p><strong>Identification and Classification of Critical Assets<\/strong><\/p>\n\n\n\n<p>The KRAs are supposed to identify and classify critical assets based on their sensitivity and criticality of services, business operations and data management. The critical assets to be identified include business critical systems, systems containing sensitive data, internet facing applications\/ systems, sensitive financial data, sensitive personal data, Personally Identifiable Information (PII) data, etc. All the ancillary systems that are used for communicating\/ accessing the critical systems either for maintenance or operations are also classified as critical systems. The list of these critical systems is approved by the Board of the KRAs. &nbsp;<\/p>\n\n\n\n<p>For the above purposes, KRAs are supposed to maintain an up-to-date inventory list of the software and information assets (internal and external), hardware and systems, connections to its networks, details of the network resources and data flows.<\/p>\n\n\n\n<p><strong>KRAs to Carry Out Periodic VAPT<\/strong><\/p>\n\n\n\n<p>The circular on cyber security framework of KRAs mandate the KRAs to carry out periodic vulnerability assessment and penetration tests (VAPT) which include the critical assets and other infrastructure components such as security devices, servers, networking systems, load balancers and other IT systems which pertain to the activities carried out by KRAs etc. These periodic assessments have to be carried out with a view to detect security vulnerabilities that exist in the IT environment and also to carry out in-depth evaluation of the security posture of the systems by carrying out simulations of actual attacks on their systems and networks.<\/p>\n\n\n\n<p>The cyber security framework on KRAs also expects the KRAs to conduct VAPT at least once in a financial year. However, for the KRAs, whose systems have been identified as &ldquo;protected system&rdquo; by NCIIPC under the Information Technology (IT) Act of 2000, VAPT shall be carried out at least twice in a financial year. The framework also makes it mandatory for all the KRAs to engage the services of only CERT-In empanelled organisations for conducting VAPT.<\/p>\n\n\n\n<p>Once the final approval has been given from the Technology Committee of respective KRAs, the result of the VAPT shall be submitted to SEBI. Such submission has to be made within a period of one month from the date of completion of the VAPT activity. &nbsp;&nbsp;<\/p>\n\n\n\n<p><strong>Remedial Action on the Vulnerabilities Detected<\/strong><\/p>\n\n\n\n<p>The gaps or vulnerabilities that have been identified during the VAPT are supposed to be remedied on an immediate <a class=\"glossaryLink\"  aria-describedby=\"tt\"  data-cmtooltip=\"&lt;div class=glossaryItemTitle&gt;Basis&lt;\/div&gt;&lt;div class=glossaryItemBody&gt;In finance, the &amp;quot;basis&amp;quot; is a term with several applications, including representing the difference between the spot price and the future contract price of an asset, which is vital in investment(...)&lt;\/div&gt;\"  href=\"https:\/\/enterslice.com\/learning\/terms\/basis\/\"  data-gt-translate-attributes='[{\"attribute\":\"data-cmtooltip\", \"format\":\"html\"}]'>basis<\/a>, and the compliance of completion of closure of findings identified during the VAPT has to be submitted to SEBI within a period of three months after the submission of final VAPT report. &nbsp;<\/p>\n\n\n\n<p><strong>Perform Vulnerability Scanning and Penetration Testing &nbsp;<\/strong><\/p>\n\n\n\n<p>The cyber security framework of KRAs also makes it mandatory on the part of the KRAs to perform vulnerability scanning and to conduct penetration testing before a new system is commissioned, which is a critical system or part of an existing critical system.<\/p>\n\n\n\n<p><strong>Conduct Comprehensive Cyber Security Audit<\/strong><\/p>\n\n\n\n<p>The revised version of cyber security framework of KRAs also makes it mandatory on the part of the KRAs to conduct a comprehensive cyber audit at least twice in a financial year. A declaration shall also be submitted to the Managing Director or Chief Executive Officer certifying compliance by the KRAs with all the SEBI circulars and advisories related to cyber security from time to time. A cyber audit report shall also be attached along. &nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Date of Coming into Effect<\/h2>\n\n\n\n<p>All the KRAs have been directed to communicate the implementation of the provisions of this circular within a period of ten days from the date of coming into force of this circular.<\/p>\n\n\n\n<p>The framework released by SEBI shall come into effect from 30<sup>th<\/sup> May, 2022 onwards and will be applicable to all the existing SEBI registered KRAs.<\/p>\n\n\n\n<p class=\"text-left\"><b>Read Our Article<\/b>: <mark style=\"background: #fffd03 !important;\"><a href=\"https:\/\/enterslice.com\/learning\/sebi-guidelines-amend-sebi-kra-regulations\/\">SEBI guidelines amend SEBI KRA Regulations, 2011<\/a><\/mark><\/p>\n\n\n<a href=\"https:\/\/enterslice.com\/learning\/wp-content\/uploads\/2022\/06\/SEBI-Modifies-Cyber-Resilience-and-Cyber-Security-Framework-of-KRAs.pdf\" class=\"pdfemb-viewer\" style=\"width: 767px; \" data-width=\"767\" data-height=\"max\" data-toolbar=\"bottom\" data-toolbar-fixed=\"on\">SEBI-Modifies-Cyber-Resilience-and-Cyber-Security-Framework-of-KRAs<br><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recently, a circular was released by the Securities and Exchange Board of India (SEBI), which has modified the cyber security framework and cyber resilience framework of all the registered Know Your Customer (KYC) Registration Agencies (KRAs). The modified cyber security framework of KRAs released by SEBI mandates the KRAs to conduct a comprehensive cyber audit [&hellip;]<\/p>\n","protected":false},"author":59,"featured_media":58706,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[2828],"tags":[4554],"acf":{"service_id":"227"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v14.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>SEBI Modifies Cyber Resilience &amp; Security Framework of KRAs-Enterslice<\/title>\n<meta name=\"description\" content=\"The modified cyber security framework of KRAs released by SEBI mandates the KRAs to conduct a comprehensive cyber audit at least twice in a financial year.\" \/>\n<meta name=\"robots\" content=\"index, follow\" \/>\n<meta name=\"googlebot\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta name=\"bingbot\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/enterslice.com\/learning\/sebi-modifies-cyber-resilience-and-cyber-security-framework-of-kras\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SEBI Modifies Cyber Resilience &amp; Security Framework of KRAs-Enterslice\" \/>\n<meta property=\"og:description\" content=\"The modified cyber security framework of KRAs released by SEBI mandates the KRAs to conduct a comprehensive cyber audit at least twice in a financial year.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/enterslice.com\/learning\/sebi-modifies-cyber-resilience-and-cyber-security-framework-of-kras\/\" \/>\n<meta property=\"og:site_name\" content=\"Enterslice\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/enterslice\" \/>\n<meta property=\"article:author\" content=\"omvir\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-06T05:51:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-13T10:32:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/enterslice.com\/learning\/wp-content\/uploads\/2022\/06\/HSEBI-modifies-cyber-resilience-and-cyber-security-framework-of-KRAs-PRABHAT-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"670\" \/>\n\t<meta property=\"og:image:height\" content=\"352\" \/>\n<meta name=\"twitter:card\" content=\"summary\" \/>\n<meta name=\"twitter:creator\" content=\"@enterslice\" \/>\n<meta name=\"twitter:site\" content=\"@enterslice\" \/>\n<!-- \/ Yoast SEO plugin. -->","authorName":"Prabhat Nigam","authorImageUrl":"https:\/\/enterslice.com\/learning\/wp-content\/uploads\/2021\/12\/prabhat.nigam_.jpg","authorDescription":"Prabhat has done his BA LLB (Hons) and has been writing research papers since his law school days. His interest in content writing made him pursue a career in legal research and content writing. His core areas of interest are indirect taxes, finance and real estate.","postViews":440,"readingTime":3,"nextPost":{"id":58726,"slug":"sebi-streamlines-process-of-change-in-control-of-portfolio-manager"},"prevPost":{"id":58701,"slug":"sebi-issues-circular-on-modified-sop-on-defaulting-members"},"featuredMediaUrl":"https:\/\/enterslice.com\/learning\/wp-content\/uploads\/2022\/06\/HSEBI-modifies-cyber-resilience-and-cyber-security-framework-of-KRAs-PRABHAT-1.jpg","postTerms":"SEBI","_links":{"self":[{"href":"https:\/\/enterslice.com\/learning\/wp-json\/wp\/v2\/posts\/58705"}],"collection":[{"href":"https:\/\/enterslice.com\/learning\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/enterslice.com\/learning\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/enterslice.com\/learning\/wp-json\/wp\/v2\/users\/59"}],"replies":[{"embeddable":true,"href":"https:\/\/enterslice.com\/learning\/wp-json\/wp\/v2\/comments?post=58705"}],"version-history":[{"count":0,"href":"https:\/\/enterslice.com\/learning\/wp-json\/wp\/v2\/posts\/58705\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/enterslice.com\/learning\/wp-json\/wp\/v2\/media\/58706"}],"wp:attachment":[{"href":"https:\/\/enterslice.com\/learning\/wp-json\/wp\/v2\/media?parent=58705"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/enterslice.com\/learning\/wp-json\/wp\/v2\/categories?post=58705"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/enterslice.com\/learning\/wp-json\/wp\/v2\/tags?post=58705"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}