SlideShare a Scribd company logo
C
Principal solution architect
& co-founder
Mithi Software
Author
Understanding and complying
with RBI’s Cyber security
guidelines for Email systems
Manu Sharma
Chief Manager I.T. (Network and
System Admin)
Capital Small Finance Bank ltd.
Sunil Uttam
Contributor
JULY 09 2019
12:00PM - 01:00PM IST
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
The context
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Modernization is unavoidable for banks to stay competitive.
Modernization means extensive digitalization
Digitalization without adequate security, means direct exposure
and increased incidents of cyber attacks.
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
In August 2018, a Small Bank was faced
with a cyber attack, resulting in nearly Rs
100 crore being siphoned off.
- Economic Times
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
During 2008-17, banks in India faced
1,30,000 reported cases of cyber fraud
involving an estimated Rs 700 crore.
- Economic Times
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
The financial services industry topped the
list of 26 different industries that cyber
criminals most targeted.
- Deloitte
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
While Frauds are high frequency and low
impact
Cyber attacks/breaches can cripple a
bank or a financial services institute
e.g. the money siphoned off from the small
Bank, in August 2018, is 14 times the bank’s
FY18 profit.
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
POLL
In your organisation, which one of these is the biggest
threat to cyber security?
• DDOS
• Insider threats (human)
• Ransomware
• Out of date OS, software
and security patches
• Technology complexity
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Thus, Indian banks do not have
much choice concerning a major
revamp of cyber security.
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Big Brother takes notice
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Inventory Management
of Business IT Assets
Preventing execution of
unauthorized software
Environmental Controls
Network Management
and Security
Secure Configuration
Application Security Life
Cycle (ASLC)
Patch/Vulnerability &
Change Management
User Access Control /
Management
Authentication
Framework for
Customers
Secure mail and
messaging systems
Vendor Risk
Management
Removable Media
Advanced Real-time
Threat Defense and
Management
Anti-Phishing
Data Leak prevention
strategy
Maintenance,
Monitoring, and Analysis
of Audit Logs
Audit Log settings
Vulnerability assessment
and Penetration Test and
Red Team Exercises
Incident Response &
Management
Risk based transaction
monitoring
Metrics Forensics
User / Employee/
Management Awareness
Customer Education and
Awareness
RBI's Cyber security framework in detail
CSR - Annex 1
Baseline Cyber Security and Resilience Requirements
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
C-SOC Functional Requirements Governance Requirements Integration Requirements
People Requirements Process Requirements Technology Requirements
RBI's Cyber security framework in detail
C-SOC - Annex 2
Cyber Security Operation Centre (C-SOC)
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Template for reporting Cyber Incidents Cyber Security Incident Reporting (CSIR) Form
RBI's Cyber security framework in detail
CSIR – Annex 3
Cyber Security Incident Reporting (CSIR)
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Secure Be Vigilant Report and correct to remain Resilient.
Continuous improvement
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
POLL
In your organisation, which one of these 3 is your priority?
• Security measures
• Vigilance – Security Operations centre
• Resilience – Ability to bounce back and improve the security
measures
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
The Scope
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Inventory Management
of Business IT Assets
Preventing execution of
unauthorized software
Environmental Controls
Network Management
and Security
Secure Configuration
Application Security Life
Cycle (ASLC)
Patch/Vulnerability &
Change Management
User Access Control /
Management
Authentication
Framework for
Customers
Secure mail and
messaging systems
Vendor Risk
Management
Removable Media
Advanced Real-time
Threat Defense and
Management
Anti-Phishing
Data Leak prevention
strategy
Maintenance,
Monitoring, and Analysis
of Audit Logs
Audit Log settings
Vulnerability assessment
and Penetration Test and
Red Team Exercises
Incident Response &
Management
Risk based transaction
monitoring
Metrics Forensics
User / Employee/
Management Awareness
Customer Education and
Awareness
Our focus is on Secure Mail and Messaging
Baseline Cyber Security and Resilience Requirements
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
The Approach
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Map relevant guidelines to Solution layers
LAYERS ELEMENTS CSR C-SOC CSIR
SOLUTION LAYERS
User Education
and awareness
Best practices, security
awareness, etc
A1.23 - Education on phising, risks
& human element
Vigilance via dashboards,
monitoring, escalations.
Protect, Detect, respond,
recover.
Forensic analysis and
improvements
Report all incidents to
RBI to improve
accountability
Network Data Flow and user Access
A1.8.1 - Encrypt in transit
A1.13.2 - End point security
Periphery Malware, spam, virus detection
A1.10.1, A1.13.2, A1.14.1 - Spam,
Virus, Phising, malware
protection, Email security
gateway, Anti phishing
Application Mobility, Web, Desktop access
A1.10.2, A1.8.10 - Mail policies,
DDOS, etc
A1.10.1 - Spoof, email
authenticity, sandbox
A1.7.4, A1.18 - Periodic VAPTs
Services
Mail, Directory, Calendar,
administration, etc
A1.8.1 - Access control from
trusted zones
A1.8.4 - Role based IAM
Data
User information, Mail data,
Audit trails
A1.8.1 - Encrypt at rest
A1.6.4, A1.17.1, A1.16.1 - Audit
trails, Capturing Audit logs
Infra
mail, relay, directory, front end
servers, storage, OS
Data Residency
A1.5.1 - OS hardening
A1.7.2 - Patch Management
SECURITY VIGILANCE RESILIENCE
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Demystification
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
A1.23 - Education on phishing, risks & human
element
Sensitize users to how the human element
is the weak link in cyber security.
From being alert to phishing mail to keeping
passwords secure to reporting incidents, this weak
link has to be strengthened
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
A1.8.1 - Encrypt in transit
Prevent sniffing
Use TLS to ensure every communication between
the client to server and server to server is
happening on an encrypted channel.
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
A1.13.2 - End point security
Build sanity into the end point jungle.
Keeping end points clean is good hygiene and
goes a long way to stop malware infections from
the user devices.
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
A1.10.1, A1.13.2, A1.14.1 - Spam, Virus, Phishing, malware
protection, Email security gateway, Anti phishing
A robust, active email gateway, especially one with guarantees
on virus, spam and malware protection can disallow infected
content to pass through and prevent a lot of security incidents.
“Financial services remains the industry most susceptible to malicious email
traffickers, as consumers are seven times more likely to be the victim of an
attack originating from a spoofed email with a bank brand versus one from
any other industry.”
- Deloitte
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
A1.10.2, A1.8.10 - Mail policies, DDOS, etc
Prevention is better than cure form the basis
for these guidelines.
These guidelines are about adopting best practice
secure configurations to secure the applications
from hack attempts, DOS attacks, misuse, overuse,
attachment type controls, etc.
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
A1.10.1 - Spoof, email authenticity, sandbox
Authenticate all email communication.
Ensure the person authenticating is the person
sending the email, ensure the email is marked as
authentically originating from the bank, ensure mail
does not receive, nor sends malicious content, etc.
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
A1.7.4, A1.18 - Periodic VAPTs
Stay vigilant
Perform periodic third party audits by CERT IN
empanelled vendors, with timely mitigation of
risks, and reporting to the board/senior team
members.
Audits to be done throughout the lifecycle of
the internet facing applications/devices (pre-
implementation, post implementation, after
changes etc.)
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
A1.8.4, A1.8.1 - Role based IAM
Differentiate exposure, gain control
Allow levels of access to users based on role and
source of connection.
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
A1.8.1 - Encrypt at rest
Prevents data visibility in the event of its
unauthorized access or theft
Encrypt the data when it is stored on any storage
medium
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
A1.6.4, A1.17.1, A1.16.1 - Audit trails, Capturing
Audit logs
Keep track of all events
Capturing, storing and being able to retrieve audit logs when required is
an important capability to support forensics
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
A1.5.1, A1.7.2 - Data Residency, OS hardening,
Patch Management
Secure Infrastructure located in country of
domicile
Operate, manage, and control the IT components
from the host operating system and virtualization
layer down to the physical security of the facilities in
which the services operate. Have all data within the
host country.
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
The Audit fact sheet
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Agencies NCIIPC, CERT IN, RBI CSITE
Types Internal, External, On Site
Frequency Annual
Scope PCIDSS, ISO, IT systems, Data, Physical inspection
Duration 10-15 days each
NCIIPC (National Critical Information Infrastructure protection centre)
CERT IN (Indian Computer Emergency Response Team)
CSITE RBI (Cyber security and IT examination cell of RBI)
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
External
Audit done by
a CERT IN
empaneled
vendor
Informs
RBI of
audit
Presents
to board
Bank forms
mitigation
plan with
target dates
Gives
report to
bank
Works to
close
audit
points
External Audit Process
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
CSite
Follows
process
depending on
bank's
category
Collect
evidence
Follow
checklist &
guidelines to
review each
and every
aspect
Starts with
external
audit
report
submit
correction
report to
Bank
Bank
fixes
issues
On Site Audit Process
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
The Disparity and the way forward
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Levels of cyber resilience vary vastly across sizes
and categories of banks
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
This is caused mainly due to the difference in
infrastructure, capability, maturity and
investment
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
System Maturity Matrix for Email
CAPABILITY
High End Open Private Cloud
SaaS
Benefit:
High Performance, Low TCO, High
Flexibility
Risks:
Un-optimal Cost Management and
Capability Integration
Low End Private SaaS
Benefit:
Low Cost, Easy Start
Risks:
Performance & Dependability, Security,
Lack of Data Durability guarantees
Public and Free to use Apps
Benefit:
Low or no cost, easy access, popular
usage
Risks:
Data Security, Data Fragmentation, Lack
of Data Access
RISK
Private in-Premise Set-up
Benefit:
Leveraging existing investment
Risks:
Performance, High TCO, High
Maintenance, Slow Upgrades
High End Proprietary Cloud
based SaaS
Benefit:
High Performance, High Capability
Risks:
Lack of Flexibility, High TCO, Lock-in
concerns
lowhigh
low high
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
POLL
Which of the these 5 solution categories does your
organisation use for communication and collaboration?
• Low End Private SaaS (software hosted and managed at an
external DC – Exchange, Linux servers, etc)
• Private in-premise setup (software hosted and managed at
your own DC – Exchange, Lotus Notes, Linux, etc)
• Public and Free to use Apps (Gmail, Yahoo, Whatsapp, etc)
• High End proprietary cloud based SaaS (Gsuite, O365)
• A Hybrid (mix of cloud, on-premise, etc)
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Hence for most banks, adhering to these
guidelines, is an uphill and never ending task.
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Leveraging SaaS and Cloud can level this playing field.
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
“Banks can benefit from far greater security postures in the
cloud than they can achieve in traditional datacenters.”
“The ultimate benefit of the cloud is that banks can spend
less time on undifferentiated tasks and more time focusing
on the core competencies that add value to their
organisations.”
IDRBT FAQs on Cloud Adoption for Indian Banks, September 2017
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
“Cloud accreditation certifications and evaluations provide
banks with assurance that cloud providers have effective
physical and logical security controls in place. When banks
leverage these reports, they avoid subjecting themselves to
overly burdensome processes or approval workflows that
may not be required for a cloud environment. ”
Institute for Development and Research in Banking Technology
(IDRBT) FAQs on Cloud Adoption for Indian Banks, September 2017
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
“With readily deployable and scalable infrastructure, business
continuity is always built into the business model. Banks can
initiate business continuity plan of IT infrastructure with
minimal effort and do not have to invest upfront.”
IDRBT FAQs on Cloud Adoption for Indian Banks, September 2017
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Why cloud platforms make it easy to adhere to RBI's
cyber security guidelines?
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
From DOING to CONFIRMING
By deploying fully managed, guaranteed cloud
platforms, you are delegating a bulk of the cyber
security adherence responsibility to the vendor.
Then the cyber security guidelines can be an effective
checklist to confirm compliance.
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
Why our solution are a good fit for Banks
Data Residency
A choice of region for storing your data, ensuring
compliance with data residency regulations of
governments.
Business Continuity
By having all email & data stored on a highly
elastic, available, durable cloud platform instances
of outages are reduced to near zero. And quick
recovery from any glitches.
Privacy Guaranteed
Designed to ensure customer data privacy in the
multitenant SaaS setup. For highly sensitive
customers. Can also be offered as a dedicated
private setup on the cloud for large installations.
Reduced IT Costs
Fully managed SaaS, which implies Zero
hardware at your end, Zero management and
Zero maintenance.
Multi-layered Security
Tight security at multiple layers of the stack to ensure
that sensitive data stored on our platform is encrypted,
immutable and tamper proof.
No Vendor Lockin
Built on the premise that the ownership of data is that of
the customer.
Processes and tools are specially designed to prevent
vendor lock in, are in place to allow extraction of data
on demand.
Your peers across BFSI, PSU and Government
sectors have chosen our cloud solutions for
their Security, Reliability and Data Residency
Collaboration Solutions for an Interdependent World
Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
UNLIMITED Q & A
Alright, Lets talk until you run out of
questions...SHOOT !

More Related Content

PPTX
Cybersecurity Risk Management Tools and Techniques (1).pptx
PDF
Cybersecurity in Banking Sector
PDF
Cybersecurity Roadmap Development for Executives
ODP
Cyber Security for Financial Institutions
PPTX
Insider threat kill chain
PDF
Enterprise Security Architecture
PDF
The Incident Response Playbook for Android and iOS
PPTX
Cyber Security roadmap.pptx
Cybersecurity Risk Management Tools and Techniques (1).pptx
Cybersecurity in Banking Sector
Cybersecurity Roadmap Development for Executives
Cyber Security for Financial Institutions
Insider threat kill chain
Enterprise Security Architecture
The Incident Response Playbook for Android and iOS
Cyber Security roadmap.pptx

What's hot (20)

PPTX
Swift-cyber-attacks.pptx
PPSX
Board and Cyber Security
PDF
Cybersecurity in the Boardroom
PDF
Security+ SY0-701 CERTIFICATION TRAINING.pdf
PDF
A CASE STUDY ON PLANNING OF REWA ULTRA MEGA SOLAR POWER PROJECT
PPTX
New Paradigms for the Next Era of Security
PDF
Artificial Intelligence for Cyber Security
PDF
Basics of Cyber Security
PDF
Information technology risks
PDF
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
PPTX
Security audits & compliance
PDF
Compare and Contrast Security Controls and Framework Types
PDF
Bulding Soc In Changing Threat Landscapefinal
PPTX
Security Operation Center - Design & Build
PDF
Strategies for Managing OT Cybersecurity Risk
PDF
Combating Cyber Security Using Artificial Intelligence
PPTX
Cyber attacks and IT security management in 2025
PPTX
Cybersecurity Audit
PDF
Introduction to Cybersecurity
Swift-cyber-attacks.pptx
Board and Cyber Security
Cybersecurity in the Boardroom
Security+ SY0-701 CERTIFICATION TRAINING.pdf
A CASE STUDY ON PLANNING OF REWA ULTRA MEGA SOLAR POWER PROJECT
New Paradigms for the Next Era of Security
Artificial Intelligence for Cyber Security
Basics of Cyber Security
Information technology risks
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Security audits & compliance
Compare and Contrast Security Controls and Framework Types
Bulding Soc In Changing Threat Landscapefinal
Security Operation Center - Design & Build
Strategies for Managing OT Cybersecurity Risk
Combating Cyber Security Using Artificial Intelligence
Cyber attacks and IT security management in 2025
Cybersecurity Audit
Introduction to Cybersecurity
Ad

Similar to Understanding and complying with RBI’s Cyber security guidelines for Email systems (20)

PPT
Cyber crime with privention
PPTX
E Commerce basic concepts and fundamentals
PPTX
Cybersecurity Basics of awareness presentation .pptx
PPTX
afafafafa of afafafafafafaf kingdom.pptx
PPTX
Protecting Your Business - All Covered Security Services
PPT
Dr K Subramanian
PDF
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
PDF
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
PPTX
Introduction-to-Cybersecurit57hhfcbbcxxx
PPTX
Ways To Protect Your Company From Cybercrime
PPTX
CyberCare Pro - Cybersecurity for SME's updated.pptx
PDF
(eBook PDF) Effective Cybersecurity: A Guide to Using Best Practices and Stan...
PPTX
Add-Structure-and-Credibility-to-Your-Security-Portfolio-with-CIS-Controls-v8...
PDF
(eBook PDF) Effective Cybersecurity: A Guide to Using Best Practices and Stan...
PDF
(eBook PDF) Effective Cybersecurity: A Guide to Using Best Practices and Stan...
PDF
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
PDF
15466 mba technology_white_paper
PDF
15466 mba technology_white_paper
PDF
What is Cyber Security_ The Different Types of Cybersecurity.pdf
Cyber crime with privention
E Commerce basic concepts and fundamentals
Cybersecurity Basics of awareness presentation .pptx
afafafafa of afafafafafafaf kingdom.pptx
Protecting Your Business - All Covered Security Services
Dr K Subramanian
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
Introduction-to-Cybersecurit57hhfcbbcxxx
Ways To Protect Your Company From Cybercrime
CyberCare Pro - Cybersecurity for SME's updated.pptx
(eBook PDF) Effective Cybersecurity: A Guide to Using Best Practices and Stan...
Add-Structure-and-Credibility-to-Your-Security-Portfolio-with-CIS-Controls-v8...
(eBook PDF) Effective Cybersecurity: A Guide to Using Best Practices and Stan...
(eBook PDF) Effective Cybersecurity: A Guide to Using Best Practices and Stan...
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
15466 mba technology_white_paper
15466 mba technology_white_paper
What is Cyber Security_ The Different Types of Cybersecurity.pdf
Ad

More from Vaultastic (20)

PPTX
Webinar mccia sm_bs_ how cloud backup can help you reduce risks and gain...
PDF
3 simple strategies to preserve and manage unstructured data of former emplo...
PDF
5 email data management strategies and choosing the right one
PDF
Comply with Email retention regulations in India and cut costs using cloud em...
PDF
Webinar: Keep legacy email data safe and search ready with zero hardware
PDF
Webinar: Small businesses and the cost of poor data management
PDF
Webinar: Worried about privacy of your data on public cloud - Bring your own key
PDF
Email Mastery Series: How an Email Archival Solution can improve an Organisat...
PDF
Webinar Mastery Series: Email Retention Regulations in India and How Business...
PDF
Mastery Webinar Series: How Cloud Email Archival Setups are 30% lower than In...
PPT
Mastery Webinar Series: Strategies to Simplify Email Data Management
PPT
Webinar: How Mahanagar Co-operative bank uses cloud email archiving to reduce...
PPT
Mahanagar Bank: Reduce the risk of Data Loss and Control Email Storage Bloat
PPT
Featured Webinar: How Alembic Pharma Secures and Leverages Email Data with Ar...
PPT
AWS - Why cloud is the best platform for securely managing large data
PPT
Alembic Pharma: Secure and Leverages Email data with Archival and Ediscovery
PDF
Case Study: T and T Motor's Success Story With Vaultastic
PPT
Featured Webinar: How T&T Motors used Email Archival and Ediscovery to contro...
PDF
Case Study: Cashpor Micro Credit's Success Story with Vaultastic
PPT
Featured Webinar: How Cashpor increased their mail service performance by ado...
Webinar mccia sm_bs_ how cloud backup can help you reduce risks and gain...
3 simple strategies to preserve and manage unstructured data of former emplo...
5 email data management strategies and choosing the right one
Comply with Email retention regulations in India and cut costs using cloud em...
Webinar: Keep legacy email data safe and search ready with zero hardware
Webinar: Small businesses and the cost of poor data management
Webinar: Worried about privacy of your data on public cloud - Bring your own key
Email Mastery Series: How an Email Archival Solution can improve an Organisat...
Webinar Mastery Series: Email Retention Regulations in India and How Business...
Mastery Webinar Series: How Cloud Email Archival Setups are 30% lower than In...
Mastery Webinar Series: Strategies to Simplify Email Data Management
Webinar: How Mahanagar Co-operative bank uses cloud email archiving to reduce...
Mahanagar Bank: Reduce the risk of Data Loss and Control Email Storage Bloat
Featured Webinar: How Alembic Pharma Secures and Leverages Email Data with Ar...
AWS - Why cloud is the best platform for securely managing large data
Alembic Pharma: Secure and Leverages Email data with Archival and Ediscovery
Case Study: T and T Motor's Success Story With Vaultastic
Featured Webinar: How T&T Motors used Email Archival and Ediscovery to contro...
Case Study: Cashpor Micro Credit's Success Story with Vaultastic
Featured Webinar: How Cashpor increased their mail service performance by ado...

Recently uploaded (20)

PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
1. Introduction to Computer Programming.pptx
PDF
August Patch Tuesday
PDF
project resource management chapter-09.pdf
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PPTX
TLE Review Electricity (Electricity).pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Hybrid model detection and classification of lung cancer
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
MIND Revenue Release Quarter 2 2025 Press Release
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Building Integrated photovoltaic BIPV_UPV.pdf
Univ-Connecticut-ChatGPT-Presentaion.pdf
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Encapsulation_ Review paper, used for researhc scholars
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
A comparative analysis of optical character recognition models for extracting...
1. Introduction to Computer Programming.pptx
August Patch Tuesday
project resource management chapter-09.pdf
Group 1 Presentation -Planning and Decision Making .pptx
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
TLE Review Electricity (Electricity).pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Hindi spoken digit analysis for native and non-native speakers
A comparative study of natural language inference in Swahili using monolingua...
NewMind AI Weekly Chronicles - August'25-Week II
Hybrid model detection and classification of lung cancer

Understanding and complying with RBI’s Cyber security guidelines for Email systems

  • 1. C Principal solution architect & co-founder Mithi Software Author Understanding and complying with RBI’s Cyber security guidelines for Email systems Manu Sharma Chief Manager I.T. (Network and System Admin) Capital Small Finance Bank ltd. Sunil Uttam Contributor JULY 09 2019 12:00PM - 01:00PM IST
  • 2. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. The context
  • 3. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Modernization is unavoidable for banks to stay competitive. Modernization means extensive digitalization Digitalization without adequate security, means direct exposure and increased incidents of cyber attacks.
  • 4. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. In August 2018, a Small Bank was faced with a cyber attack, resulting in nearly Rs 100 crore being siphoned off. - Economic Times
  • 5. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. During 2008-17, banks in India faced 1,30,000 reported cases of cyber fraud involving an estimated Rs 700 crore. - Economic Times
  • 6. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. The financial services industry topped the list of 26 different industries that cyber criminals most targeted. - Deloitte
  • 7. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. While Frauds are high frequency and low impact Cyber attacks/breaches can cripple a bank or a financial services institute e.g. the money siphoned off from the small Bank, in August 2018, is 14 times the bank’s FY18 profit.
  • 8. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. POLL In your organisation, which one of these is the biggest threat to cyber security? • DDOS • Insider threats (human) • Ransomware • Out of date OS, software and security patches • Technology complexity
  • 9. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Thus, Indian banks do not have much choice concerning a major revamp of cyber security.
  • 10. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Big Brother takes notice
  • 11. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved.
  • 12. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Inventory Management of Business IT Assets Preventing execution of unauthorized software Environmental Controls Network Management and Security Secure Configuration Application Security Life Cycle (ASLC) Patch/Vulnerability & Change Management User Access Control / Management Authentication Framework for Customers Secure mail and messaging systems Vendor Risk Management Removable Media Advanced Real-time Threat Defense and Management Anti-Phishing Data Leak prevention strategy Maintenance, Monitoring, and Analysis of Audit Logs Audit Log settings Vulnerability assessment and Penetration Test and Red Team Exercises Incident Response & Management Risk based transaction monitoring Metrics Forensics User / Employee/ Management Awareness Customer Education and Awareness RBI's Cyber security framework in detail CSR - Annex 1 Baseline Cyber Security and Resilience Requirements
  • 13. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. C-SOC Functional Requirements Governance Requirements Integration Requirements People Requirements Process Requirements Technology Requirements RBI's Cyber security framework in detail C-SOC - Annex 2 Cyber Security Operation Centre (C-SOC)
  • 14. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Template for reporting Cyber Incidents Cyber Security Incident Reporting (CSIR) Form RBI's Cyber security framework in detail CSIR – Annex 3 Cyber Security Incident Reporting (CSIR)
  • 15. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Secure Be Vigilant Report and correct to remain Resilient. Continuous improvement
  • 16. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. POLL In your organisation, which one of these 3 is your priority? • Security measures • Vigilance – Security Operations centre • Resilience – Ability to bounce back and improve the security measures
  • 17. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. The Scope
  • 18. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Inventory Management of Business IT Assets Preventing execution of unauthorized software Environmental Controls Network Management and Security Secure Configuration Application Security Life Cycle (ASLC) Patch/Vulnerability & Change Management User Access Control / Management Authentication Framework for Customers Secure mail and messaging systems Vendor Risk Management Removable Media Advanced Real-time Threat Defense and Management Anti-Phishing Data Leak prevention strategy Maintenance, Monitoring, and Analysis of Audit Logs Audit Log settings Vulnerability assessment and Penetration Test and Red Team Exercises Incident Response & Management Risk based transaction monitoring Metrics Forensics User / Employee/ Management Awareness Customer Education and Awareness Our focus is on Secure Mail and Messaging Baseline Cyber Security and Resilience Requirements
  • 19. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. The Approach
  • 20. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Map relevant guidelines to Solution layers LAYERS ELEMENTS CSR C-SOC CSIR SOLUTION LAYERS User Education and awareness Best practices, security awareness, etc A1.23 - Education on phising, risks & human element Vigilance via dashboards, monitoring, escalations. Protect, Detect, respond, recover. Forensic analysis and improvements Report all incidents to RBI to improve accountability Network Data Flow and user Access A1.8.1 - Encrypt in transit A1.13.2 - End point security Periphery Malware, spam, virus detection A1.10.1, A1.13.2, A1.14.1 - Spam, Virus, Phising, malware protection, Email security gateway, Anti phishing Application Mobility, Web, Desktop access A1.10.2, A1.8.10 - Mail policies, DDOS, etc A1.10.1 - Spoof, email authenticity, sandbox A1.7.4, A1.18 - Periodic VAPTs Services Mail, Directory, Calendar, administration, etc A1.8.1 - Access control from trusted zones A1.8.4 - Role based IAM Data User information, Mail data, Audit trails A1.8.1 - Encrypt at rest A1.6.4, A1.17.1, A1.16.1 - Audit trails, Capturing Audit logs Infra mail, relay, directory, front end servers, storage, OS Data Residency A1.5.1 - OS hardening A1.7.2 - Patch Management SECURITY VIGILANCE RESILIENCE
  • 21. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Demystification
  • 22. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. A1.23 - Education on phishing, risks & human element Sensitize users to how the human element is the weak link in cyber security. From being alert to phishing mail to keeping passwords secure to reporting incidents, this weak link has to be strengthened
  • 23. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. A1.8.1 - Encrypt in transit Prevent sniffing Use TLS to ensure every communication between the client to server and server to server is happening on an encrypted channel.
  • 24. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. A1.13.2 - End point security Build sanity into the end point jungle. Keeping end points clean is good hygiene and goes a long way to stop malware infections from the user devices.
  • 25. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. A1.10.1, A1.13.2, A1.14.1 - Spam, Virus, Phishing, malware protection, Email security gateway, Anti phishing A robust, active email gateway, especially one with guarantees on virus, spam and malware protection can disallow infected content to pass through and prevent a lot of security incidents. “Financial services remains the industry most susceptible to malicious email traffickers, as consumers are seven times more likely to be the victim of an attack originating from a spoofed email with a bank brand versus one from any other industry.” - Deloitte
  • 26. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. A1.10.2, A1.8.10 - Mail policies, DDOS, etc Prevention is better than cure form the basis for these guidelines. These guidelines are about adopting best practice secure configurations to secure the applications from hack attempts, DOS attacks, misuse, overuse, attachment type controls, etc.
  • 27. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. A1.10.1 - Spoof, email authenticity, sandbox Authenticate all email communication. Ensure the person authenticating is the person sending the email, ensure the email is marked as authentically originating from the bank, ensure mail does not receive, nor sends malicious content, etc.
  • 28. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. A1.7.4, A1.18 - Periodic VAPTs Stay vigilant Perform periodic third party audits by CERT IN empanelled vendors, with timely mitigation of risks, and reporting to the board/senior team members. Audits to be done throughout the lifecycle of the internet facing applications/devices (pre- implementation, post implementation, after changes etc.)
  • 29. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. A1.8.4, A1.8.1 - Role based IAM Differentiate exposure, gain control Allow levels of access to users based on role and source of connection.
  • 30. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. A1.8.1 - Encrypt at rest Prevents data visibility in the event of its unauthorized access or theft Encrypt the data when it is stored on any storage medium
  • 31. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. A1.6.4, A1.17.1, A1.16.1 - Audit trails, Capturing Audit logs Keep track of all events Capturing, storing and being able to retrieve audit logs when required is an important capability to support forensics
  • 32. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. A1.5.1, A1.7.2 - Data Residency, OS hardening, Patch Management Secure Infrastructure located in country of domicile Operate, manage, and control the IT components from the host operating system and virtualization layer down to the physical security of the facilities in which the services operate. Have all data within the host country.
  • 33. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. The Audit fact sheet
  • 34. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Agencies NCIIPC, CERT IN, RBI CSITE Types Internal, External, On Site Frequency Annual Scope PCIDSS, ISO, IT systems, Data, Physical inspection Duration 10-15 days each NCIIPC (National Critical Information Infrastructure protection centre) CERT IN (Indian Computer Emergency Response Team) CSITE RBI (Cyber security and IT examination cell of RBI)
  • 35. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. External Audit done by a CERT IN empaneled vendor Informs RBI of audit Presents to board Bank forms mitigation plan with target dates Gives report to bank Works to close audit points External Audit Process
  • 36. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. CSite Follows process depending on bank's category Collect evidence Follow checklist & guidelines to review each and every aspect Starts with external audit report submit correction report to Bank Bank fixes issues On Site Audit Process
  • 37. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. The Disparity and the way forward
  • 38. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Levels of cyber resilience vary vastly across sizes and categories of banks
  • 39. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. This is caused mainly due to the difference in infrastructure, capability, maturity and investment
  • 40. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. System Maturity Matrix for Email CAPABILITY High End Open Private Cloud SaaS Benefit: High Performance, Low TCO, High Flexibility Risks: Un-optimal Cost Management and Capability Integration Low End Private SaaS Benefit: Low Cost, Easy Start Risks: Performance & Dependability, Security, Lack of Data Durability guarantees Public and Free to use Apps Benefit: Low or no cost, easy access, popular usage Risks: Data Security, Data Fragmentation, Lack of Data Access RISK Private in-Premise Set-up Benefit: Leveraging existing investment Risks: Performance, High TCO, High Maintenance, Slow Upgrades High End Proprietary Cloud based SaaS Benefit: High Performance, High Capability Risks: Lack of Flexibility, High TCO, Lock-in concerns lowhigh low high
  • 41. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. POLL Which of the these 5 solution categories does your organisation use for communication and collaboration? • Low End Private SaaS (software hosted and managed at an external DC – Exchange, Linux servers, etc) • Private in-premise setup (software hosted and managed at your own DC – Exchange, Lotus Notes, Linux, etc) • Public and Free to use Apps (Gmail, Yahoo, Whatsapp, etc) • High End proprietary cloud based SaaS (Gsuite, O365) • A Hybrid (mix of cloud, on-premise, etc)
  • 42. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Hence for most banks, adhering to these guidelines, is an uphill and never ending task.
  • 43. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Leveraging SaaS and Cloud can level this playing field.
  • 44. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. “Banks can benefit from far greater security postures in the cloud than they can achieve in traditional datacenters.” “The ultimate benefit of the cloud is that banks can spend less time on undifferentiated tasks and more time focusing on the core competencies that add value to their organisations.” IDRBT FAQs on Cloud Adoption for Indian Banks, September 2017
  • 45. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. “Cloud accreditation certifications and evaluations provide banks with assurance that cloud providers have effective physical and logical security controls in place. When banks leverage these reports, they avoid subjecting themselves to overly burdensome processes or approval workflows that may not be required for a cloud environment. ” Institute for Development and Research in Banking Technology (IDRBT) FAQs on Cloud Adoption for Indian Banks, September 2017
  • 46. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. “With readily deployable and scalable infrastructure, business continuity is always built into the business model. Banks can initiate business continuity plan of IT infrastructure with minimal effort and do not have to invest upfront.” IDRBT FAQs on Cloud Adoption for Indian Banks, September 2017
  • 47. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Why cloud platforms make it easy to adhere to RBI's cyber security guidelines?
  • 48. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. From DOING to CONFIRMING By deploying fully managed, guaranteed cloud platforms, you are delegating a bulk of the cyber security adherence responsibility to the vendor. Then the cyber security guidelines can be an effective checklist to confirm compliance.
  • 49. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. Why our solution are a good fit for Banks Data Residency A choice of region for storing your data, ensuring compliance with data residency regulations of governments. Business Continuity By having all email & data stored on a highly elastic, available, durable cloud platform instances of outages are reduced to near zero. And quick recovery from any glitches. Privacy Guaranteed Designed to ensure customer data privacy in the multitenant SaaS setup. For highly sensitive customers. Can also be offered as a dedicated private setup on the cloud for large installations. Reduced IT Costs Fully managed SaaS, which implies Zero hardware at your end, Zero management and Zero maintenance. Multi-layered Security Tight security at multiple layers of the stack to ensure that sensitive data stored on our platform is encrypted, immutable and tamper proof. No Vendor Lockin Built on the premise that the ownership of data is that of the customer. Processes and tools are specially designed to prevent vendor lock in, are in place to allow extraction of data on demand.
  • 50. Your peers across BFSI, PSU and Government sectors have chosen our cloud solutions for their Security, Reliability and Data Residency
  • 51. Collaboration Solutions for an Interdependent World
  • 52. Copyright © 2019 Mithi Software Technologies Pvt Ltd. All rights reserved. UNLIMITED Q & A Alright, Lets talk until you run out of questions...SHOOT !