SEBI Cybersecurity and Cyber Resilience Framework for Regulated Entities
Securities and Exchange Board of India mandatory cybersecurity framework for all SEBI-regulated entities including stock exchanges, depositories, clearing corporations, mutual funds, brokers, and portfolio managers. 5 cyber resilience goals (anticipate, withstand, contain, recover, evolve) across 41 control areas covering governance, risk assessment, asset management, identity and access management, data protection, network security, application security, endpoint security, vulnerability management, security monitoring, incident management, business continuity, third-party risk, and cloud security. Entity classification into 5 categories with graded compliance requirements.
Clauses: 41
Avg Coverage: 73.8%
Publisher: Securities and Exchange Board of India (SEBI) Version: 2024 | Clause | Title | SP 800-53 Controls |
|---|---|---|
| AUDIT | Periodic Audit and Compliance Reporting | |
| BCP-DR | Business Continuity and Disaster Recovery | |
| CAPACITY | Capacity Building and Cyber Awareness | |
| CCI | Cyber Capability Index Assessment | |
| CCMP | Cyber Crisis Management Plan | |
| CERTIF | ISO 27001 Certification and Standards Compliance | |
| CLASSIFY | Entity Classification and Compliance Matrix | |
| CYBER-INS | Cyber Insurance | |
| DATALOC | Data Localisation and Cross-Border Data Transfer | |
| DE.AU | Detect — Audit Logging and Monitoring | |
| DE.CM | Detect — Security Continuous Monitoring and SOC | |
| DE.DP | Detect — Detection Processes and Threat Intelligence | |
| DE.VA | Detect — Vulnerability Assessment and Penetration Testing | |
| EMAIL-SEC | Secure Communication and Email Security | |
| GV.OC | Governance — Organisational Context | |
| GV.OV | Governance — Oversight and Compliance | |
| GV.PO | Governance — Cybersecurity and Cyber Resilience Policy | |
| GV.RM | Governance — Cyber Risk Management Framework | |
| GV.RR | Governance — Roles, Responsibilities and Authorities | |
| GV.SC | Governance — Supply Chain Risk Management | |
| ID.AM | Identify — Asset Management | |
| ID.RA | Identify — Risk Assessment | |
| PR.AA | Protect — Identity Management, Authentication and Access Control | |
| PR.AS | Protect — Application Security and SBOM | |
| PR.AT | Protect — Awareness and Training | |
| PR.CS | Protect — Cloud Security | |
| PR.DS | Protect — Data Security and Classification | |
| PR.ES | Protect — Endpoint and Platform Security | |
| PR.IP | Protect — Information Protection Processes and Procedures | |
| PR.MA | Protect — Maintenance | |
| PR.NS | Protect — Network Security and Segmentation | |
| PR.PE | Protect — Physical and Environmental Security | |
| RC.CO | Recover — Recovery Communication | |
| RC.IM | Recover — Recovery Improvements | |
| RC.RP | Recover — Incident Recovery Plan Execution | |
| RS.AN | Respond — Incident Analysis and Forensics | |
| RS.CO | Respond — Incident Reporting and Communication | |
| RS.IM | Respond — Incident Response Improvements | |
| RS.MA | Respond — Incident Management | |
| SOC | Security Operations Centre Requirements | |
| VAPT | VAPT and Red Team Exercises |