{"id":4052,"date":"2020-01-07T21:57:04","date_gmt":"2020-01-07T16:27:04","guid":{"rendered":"http:\/\/yourcareerheights.com\/?p=4052"},"modified":"2020-01-07T21:58:09","modified_gmt":"2020-01-07T16:28:09","slug":"4052","status":"publish","type":"post","link":"https:\/\/yourcareerheights.com\/?p=4052","title":{"rendered":"Comprehensive Cyber Security Framework for Primary (Urban) Cooperative Banks (UCBs) \u2013 A Graded Approach"},"content":{"rendered":"<div id=\"pl-4052\"  class=\"panel-layout\" ><div id=\"pg-4052-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-4052-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-4052-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"0\" ><div class=\"panel-widget-style panel-widget-style-for-4052-0-0-0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<div class=\"row\">\n<div class=\"heading-part\">\n<h2 class=\"synopsis\">As per the Statement on Developmental and Regulatory policies of the Fifth Bi-monthly Monetary Policy Statement for 2019-20 dated December 5, 2019 the RBI has also decided to prescribe a comprehensive cyber security framework for UCBs, as a graded approach, based on their digital depth and interconnectedness with the payment systems landscape, digital products offered by them and assessment of cyber security risk.<\/h2>\n<p><strong>A comprehensive Cyber Security Framework for UCBs has been formulatedby RBI\u00a0 based on a graded approach. The <span style=\"text-decoration: underline;\">UCBs have been categorised into four levels based on their digital depth and inter-connectedness to the payment systems landscape<\/span>. The levels are defined as below:<\/strong><\/p>\n<table class=\"tablebg\" border=\"0\" width=\"95%\" cellspacing=\"1\" cellpadding=\"0\" align=\"center\">\n<tbody>\n<tr class=\"head\">\n<td align=\"center\" width=\"7%\">Level<\/td>\n<td align=\"center\" width=\"33%\">Criteria<\/td>\n<td align=\"center\" width=\"30%\">Regulatory Prescription<\/td>\n<td align=\"center\" width=\"30%\">Remarks<\/td>\n<\/tr>\n<tr>\n<td class=\"head\" valign=\"top\">Level I<\/td>\n<td valign=\"top\">All UCBs<\/td>\n<td valign=\"top\">Level I controls prescribed in\u00a0<a class=\"links\" href=\"https:\/\/www.rbi.org.in\/Scripts\/NotificationUser.aspx?Id=11772&amp;Mode=0#AN_1\">Annex I<\/a><\/td>\n<td valign=\"top\">In addition to the controls prescribed to the UCBs vide circular dated October 19, 2018, bank specific email domain with DMARC controls, two factor authentication for CBS etc., are salient controls prescribed.<\/td>\n<\/tr>\n<tr>\n<td class=\"head\" valign=\"top\">Level II<\/td>\n<td valign=\"top\">All UCBs, which are sub-members of Centralised Payment Systems<sup title=\"Ref: Master Direction DPSS.CO.OD.No.1846\/04.04.009\/2016-17 dated January 17, 2017 on \u201cMaster Directions on Access Criteria for Payment Systems\u201d\" data-toggle=\"tooltip\"><a class=\"links\" href=\"https:\/\/www.rbi.org.in\/Scripts\/NotificationUser.aspx?Id=11772&amp;Mode=0#F1\">1<\/a><\/sup>\u00a0(CPS) and satisfying at least one of the criteria given below:<\/p>\n<ul>\n<li>offers internet banking facility to its customers (either view or transaction based)<\/li>\n<li>provides Mobile Banking facility through application (Smart phone usage)<\/li>\n<li>is a direct Member of CTS\/IMPS\/UPI.<\/li>\n<\/ul>\n<\/td>\n<td valign=\"top\">Level II controls given in\u00a0<a class=\"links\" href=\"https:\/\/www.rbi.org.in\/Scripts\/NotificationUser.aspx?Id=11772&amp;Mode=0#AN_2\">Annex II<\/a>, in addition to Level I controls.<\/td>\n<td valign=\"top\">Additional controls include Data Loss Prevention Strategy, Anti-Phishing, VA\/PT of critical applications.<\/td>\n<\/tr>\n<tr>\n<td class=\"head\" valign=\"top\">Level III<\/td>\n<td valign=\"top\">UCBs having at least one of the criteria given below:<\/p>\n<ul>\n<li>Direct members of CPS<\/li>\n<li>having their own ATM Switch<\/li>\n<li>having SWIFT interface<\/li>\n<\/ul>\n<\/td>\n<td valign=\"top\">Level III controls given in\u00a0<a class=\"links\" href=\"https:\/\/www.rbi.org.in\/Scripts\/NotificationUser.aspx?Id=11772&amp;Mode=0#AN_3\">Annex III<\/a>, in addition to Level I and II controls.<\/td>\n<td valign=\"top\">Additional controls include Advanced Real-time Threat Defence and Management, Risk based transaction monitoring<sup title=\"Risk Based Transaction Monitoring applicable only to those banks as discussed in Annex III of the draft circular\" data-toggle=\"tooltip\"><a class=\"links\" href=\"https:\/\/www.rbi.org.in\/Scripts\/NotificationUser.aspx?Id=11772&amp;Mode=0#F2\">2<\/a><\/sup><\/td>\n<\/tr>\n<tr>\n<td class=\"head\" valign=\"top\">Level IV<\/td>\n<td valign=\"top\">UCBs which are members\/ sub-members of CPS and satisfy at least one of the criteria given below:<\/p>\n<ul>\n<li>having their own ATM Switch\u00a0<span class=\"head\">and<\/span>\u00a0having SWIFT interface<\/li>\n<li>hosting data centre or providing software support to other banks on their own or through their wholly owned subsidiaries<\/li>\n<\/ul>\n<\/td>\n<td valign=\"top\">Level IV controls given in\u00a0<a class=\"links\" href=\"https:\/\/www.rbi.org.in\/Scripts\/NotificationUser.aspx?Id=11772&amp;Mode=0#AN_4\">Annex IV<\/a>, in addition to Level I, II and III controls<\/td>\n<td valign=\"top\">Additional controls include setting up of a Cyber Security Operation Center (C-SOC) (either on their own or through service providers), IT and IS Governance Framework<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n<div class=\"row\">\n<div class=\"leftpanel\">\n<div class=\"story-details\">\n<div class=\"main-story\">\n<div class=\"articles\">\n<div class=\"full-details\">\n<div class=\"share-social\">\n<div class=\"comments\">\n<div class=\"icons\">\n<div class=\"append_social_share\">\n<div class=\"m-story-meta__share-actions\">\n<ul class=\"custom-share\">\n<li class=\"facebook\">The Board of Directors is ultimately responsible for the information security of the UCB and shall play a proactive role in ensuring an effective IT(Information Technology) and IS (Information Security) governance. The major role of top management involves implementing the Board approved cyber security policy, establishing necessary organisational processes for cyber security and providing necessary resources for ensuring adequate cyber security.<\/li>\n<li class=\"facebook\">\u00a0UCBs shall undertake a self-assessment of the level in which they fit into, based on the criteria given in the table above and report the same to their respective RBI Regional Office, Department of Supervision within 45 days from the date of issuance of this circular.<\/li>\n<li class=\"facebook\">All UCBs shall comply with the control requirements prescribed in <a class=\"links\" href=\"https:\/\/www.rbi.org.in\/Scripts\/NotificationUser.aspx?Id=11772&amp;Mode=0#AN_1\">Annex I<\/a>\u00a0within 3 months from the date of issuance of this circular. Similarly, Level II, III and IV UCBs are required to implement additional controls prescribed in\u00a0<a class=\"links\" href=\"https:\/\/www.rbi.org.in\/Scripts\/NotificationUser.aspx?Id=11772&amp;Mode=0#AN_2\">Annex \u2013II<\/a>,\u00a0<a class=\"links\" href=\"https:\/\/www.rbi.org.in\/Scripts\/NotificationUser.aspx?Id=11772&amp;Mode=0#AN_3\">III<\/a>\u00a0and\u00a0<a class=\"links\" href=\"https:\/\/www.rbi.org.in\/Scripts\/NotificationUser.aspx?Id=11772&amp;Mode=0#AN_4\">IV<\/a>\u00a0respectively.<\/li>\n<li class=\"facebook\">UCBs may adopt higher level of security measures based on their own assessment of risk and capabilities. Further, if a UCB, irrespective of its asset size already has a dedicated CISO and\/or governance framework as discussed in <a class=\"links\" href=\"https:\/\/www.rbi.org.in\/Scripts\/NotificationUser.aspx?Id=11772&amp;Mode=0#AN_4\">Annex IV<\/a>, then as a matter of best practice, it is desirable that it continues with the existing governance structure.<\/li>\n<\/ul>\n<p>For Full Details of\u00a0Comprehensive Cyber Security Framework for Primary (Urban) Cooperative Banks (UCBs) \u2013 A Graded Approach please click on the following link:\u00a0<a href=\"https:\/\/www.rbi.org.in\/Scripts\/NotificationUser.aspx?Id=11772&amp;Mode=0\" target=\"_blank\" rel=\"noopener\">Comprehensive Cyber Security Framework for Primary (Urban) Cooperative Banks (UCBs) \u2013 A Graded Approach<\/a><\/p>\n<p>Source: rbi.org.in<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>The RBI has also decided to prescribe a comprehensive cyber security framework for UCBs, as a graded approach, based on their digital depth and inter- connectedness with the payment systems landscape, digital products offered by them and assessment of cyber security risk. A comprehensive Cyber Security Framework for UCBs has been formulated based on a graded approach. The UCBs have been categorised into four levels based on their digital depth and interconnectedness to the payment systems landscape.<\/p>\n","protected":false},"author":1,"featured_media":3594,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[38,548,780,45],"tags":[789,40,788],"class_list":["post-4052","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-banking","category-developmental-and-regulatory-policy","category-primary-urban-cooperative-banks","category-rbi","tag-cyber-security","tag-rbi","tag-urban-cooperative-banks"],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/yourcareerheights.com\/wp-content\/uploads\/2019\/06\/RBI-1.jpeg?fit=615%2C262&ssl=1","jetpack_sharing_enabled":true,"jetpack-related-posts":[],"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/yourcareerheights.com\/index.php?rest_route=\/wp\/v2\/posts\/4052","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/yourcareerheights.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/yourcareerheights.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/yourcareerheights.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/yourcareerheights.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4052"}],"version-history":[{"count":2,"href":"https:\/\/yourcareerheights.com\/index.php?rest_route=\/wp\/v2\/posts\/4052\/revisions"}],"predecessor-version":[{"id":4054,"href":"https:\/\/yourcareerheights.com\/index.php?rest_route=\/wp\/v2\/posts\/4052\/revisions\/4054"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/yourcareerheights.com\/index.php?rest_route=\/wp\/v2\/media\/3594"}],"wp:attachment":[{"href":"https:\/\/yourcareerheights.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4052"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/yourcareerheights.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4052"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/yourcareerheights.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4052"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}