The cyber security and cyber resilience policy (“Policy”) has been formulated in accordance with the regulatory requirements of various RBI circulars.
RBI circulars make it mandatory for all NBFC entities operating in India to adopt a comprehensive policy on Security Incident and Event Management Procedure.
The main purpose of Security Incident and Event Management Procedure is to:
This Policy informs, protects and is applicable to all informational assets and operational systems accessed and utilised by Zerodha Capital’s employees, partners, service providers, vendors, third party contractors and customers.
The policy statements written in this document are applicable to all of Zerodha Capital’s resources at all levels of sensitivity; including:
This policy covers all information assets defined in the Risk Assessment Scope Document and will be used as a foundation for information security management.
This policy shall be reviewed once every year by the IT Committee unless the owner considers an earlier review necessary to ensure that the policy remains current. Changes of this policy shall be exclusively performed by the Designated Officer and approved by Management. A change log shall be kept current and be updated as soon as any change has been made.
Compliance with this policy is mandatory and it is to be reviewed periodically by the Designated Officer. Zerodha Capital’s tech departments shall ensure continuous compliance monitoring with this policy. In case of ignoring or infringing the information security directives, the fallible persons will be made responsible resulting in disciplinary or corrective actions (e.g., dismissal) and could face legal investigations. A correct and fair treatment of employees who are under suspicion of violating security directives (e.g., disciplinary action) has to be ensured. For the treatment of policy violations, Management and Human Resources Department have to be informed and deal with the handling of policy violations.
The IT security team shall consider exceptions on an individual basis. For an exception to be approved, a business case outlining the logic behind the request shall accompany the request. Exceptions to the policy compliance requirement shall be authorized and approved by the Designated Officer. Each waiver request shall include justification and benefits attributed to the waiver. The policy waiver period has a maximum period of 4 months, and shall be reassessed and re-approved, if necessary for maximum three consecutive terms. No policy shall be provided for a waiver for more than three consecutive terms.
Table 1 shows the RACI matrix 1 that identifies who is responsible, accountable, consulted or informed for every task that needs to be performed. There are a couple of roles involved in this policy respectively: Management, Information Security Officer/Designated Officer (ISO), IT Committee (ITC), Legal Department and User (Employee and Contractor).
Responsibilities | Role: Management | Role: ITC | Role: ISO | Role: Legal | Role: User |
---|---|---|---|---|---|
Establishing security incident management framework. | I | R,C | R,A | I | |
Developing and reviewing the processes, framework, policy and procedures for incident management. | I | R,C | R,A | I | |
Developing and reviewing the guidelines for incident handling and classification. | I | R,C | R,A | I | |
Identifying, documenting and maintaining rules for collection, retention and presentation of information security incident evidence. | I | R,C | R,A | I | |
Coordinating a response to actual or suspected breaches in the confidentiality, integrity or availability of critical Zerodha Capital’s business information. | I | R,C | R,A | ||
Investigating breaches of security controls, and implementing additional compensating controls when necessary. | I | R,C | R,A | ||
Managing the response to an incident and ensuring that all procedures are correctly followed. | I | R,C | R,A | ||
Reviewing incidents to determine what lessons can be learnt and what process improvement may be required. | I | R,C | R,A | ||
Reviewing and recommending technologies to manage and respond to any possible incidents. | I | R,C | R,A | ||
Reporting to Management any serious incidents that may require a critical decision. | I | R,C | R,A | ||
Providing the expert legal advice that is necessary for other departments to provide services in a manner that is fully compliant with existing laws and regulations. | C | C | R,A | I | |
Adhering to information security policies, guidelines and procedures pertaining to the protection of information. | C | C | R,A,I | ||
Reporting actual or suspected security incidents to IC Deanship. | I | C | C | R,A,I |
R - Responsible, A - Accountable (or Approver), C - Consulted, I - Informed
The followings are all relevant policies and procedures to this policy:
The following subsections present the policy statements in two main aspects:
REF: [ISO/IEC 27001: A.6.8]
SOP in case of instant reporting
SOP in case of quarterly reporting
Phase | Responsibilities |
---|---|
Discovery |
|
Investigation |
|
Communication |
|
Containment |
|
Eradication |
|
Recovery |
|
Post-incident Analysis |
|
Follow the crisis communication plan as per the predefined communication channels and loop in the designated personnel
Order | POC |
---|---|
Incident Response Team | Esha S Marakini ([email protected]) |
Board/KMP | Meetal T Jain ([email protected]) |
As outlined in the aforementioned exchange circular the following timelines will be applicable for post incident reporting(s) / submissions:
Sr. No. | Name of the Report / Activity | Timeline for Submission |
---|---|---|
1. | Submission of Cyber Incident reporting (Immediate Submission) | Within 6 hours |
2. | Immediate Mitigation Measure Report | On same day |
3. | Interim Report | T + 3 Days |
4. | Mitigation Measure Report | T + 7 Days |
5. | Root Cause Analysis (RCA) report along with recommendations from Technology Committee of the RE | T + 30 Days |
6. | Forensic Audit Report (on the incident) and its closure report* | Refer Forensic Investigation/Audit section given below* |
7. | Vulnerability Assessment and Penetration Testing (VAPT) for cyber incident and its closure reports | T + 45 days |
8. | Any other report advised by RBI | To be submitted as per timelines advised by RBI |
*Forensic Investigation/Audit
Security information and event management (SIEM) systems aggregate security data from across the organization (Zerodha Capital); help security teams detect and respond to security incidents; and create compliance and regulatory reports about security-related events. Because SIEM is a core security infrastructure with access to data across Zerodha Capital, there are a large variety of SIEM use cases. .
As such, the IT Security team shall consider the use cases presented in the Policy document to detect any compromising incidents, identify the users and entities affected, investigate the impact such incidents on the organization, and prevent further damage.
Should there be any Information Security Incident within the organization, it is crucial to learn from the incident, understand its nature, identify its root cause, and implement proactive measures to prevent any recurrence of any incident of a similar nature.
Therefore, a post–mortem report of the incident, must be furnished to all relevant stakeholders using any/all of the organization’s internal communication mediums. The report may comprise the following attributes:
Incident Reporting Form |
|||
1. Letter / Report Subject - | |||
Name of the Member / Depository Participant - Name of the Stock Exchange / Depository - Member ID / DP ID - |
|||
2. Reporting Periodicity Year - | |||
3. Designated Officer (Reporting Officer details) - | |||
Name: | Organization: | Title: Compliance Officer | |
Phone / Fax No: 080-47181888 | Mobile: | Email: | |
Address:192A 4th Floor, Kalyani Vista, 3rd Main Road JP Nagar, JP Nagar 4th Phase, Bengaluru, Karnataka 560076 | |||
Cyber-attack / breach observed in Quarter: (If yes, please fill Annexure I) Yes |
|||
Date & Time | Brief information on the Cyber-attack / breached observed |
Annexure I |
||||
1. Physical location of affected computer / network and name of ISP - | ||||
2. Date and time incident occurred - | ||||
3. Information of affected system - | ||||
IP Address: | Computer / Host Name: | Operating System (incl. Ver. / release No.): | Last Patched/ Updated: | Hardware Vendor/ Model: |
4. Type of incident | ||||
|
|
|
||
5. Description of incident - | ||||
6. Unusual behavior/symptoms- | ||||
|
|
|||
7. Details of unusual behavior/symptoms - | ||||
8. Has this problem been experienced earlier? If yes, details - | ||||
9. Agencies notified - | ||||
Law Enforcement | Private Agency | Affected Product Vendor | Other | |
10. IP Address of apparent or suspected source - | ||||
Source IP address: | Other information available: | |||
11. How many host(s) are affected - | ||||
1 to 10 | 10 to 100 | More than 100 | ||
12. Details of actions taken for mitigation and any preventive measure applied - |