The Reserve Bank of India issued a directive vide circular DPSS.CO.OD.No 2785/06.08.005/2017-18 April 8, 2018, making it mandatory for all transaction data to be stored exclusively within India. As the central banking institution overseeing monetary policies, the RBI necessitates unrestricted supervisory access to payment data, leading to the enforcement of this mandate.
According to this mandate, all companies handling transactions in India, whether they’re global or local, like fintech companies doing peer-to-peer transactions or gateway operators handling global fund transfers, must keep all payment data within India.
The audit, as outlined by the RBI, is to be conducted by auditors who are empaneled with CERT-IN (Indian Computer Emergency Response Team).
The SAR is expected to include a certification from the auditors confirming the completion of the data localization activity.
The SAR should be duly approved by the Board of the system provider, indicating that the organization's leadership is in agreement with and supports the findings and conclusions presented in the audit report.
Once the SAR is prepared, certified, and approved, it is then submitted to the Reserve Bank of India. This submission is a crucial step in demonstrating compliance with the regulatory requirement.
Audit Initiation
Document
Requirement List
Identification &
Analysis
Risk Response
Post-Deployment
Review
Classification of various data elements including payment credentials, transaction data, and customer information.
Detailed diagram specifying the entire transaction flow, distinguishing between data at rest and in motion.
Requirement for a comprehensive application architecture diagram detailing all involved components.
Assessment of controls ensuring security for payment information systems and mobile applications against malicious attacks.
Detailed network architecture diagram and adherence to a Network Security Policy.
Architecture diagram explaining data retention, along with a database architecture diagram and retention policy.
Detailed transaction/data flow with evidence of SOP or organizational policy.
Compliance with guidelines for backup and restoration, supported by policies for Data Backup, Disaster Recovery, and Log Management.
Verification of security controls such as masking, encryption, and policies for Data Security, Database Access Monitoring, and Data Purging.
Assessment of data access from outside India and adherence to Access Control Checks in organizational policy.
Evaluation of top management's role in overseeing information security, supported by an Information Security Governance policy.
Requirements for hardware and change management, physical security, system scalability, and adherence to an Asset Management policy.
HR policy considerations for recruitment, training, and termination processes.
Assessment of disaster recovery capabilities and BCP DR Plan.
Examination of the incident management policy and the organization's response mechanism to security incidents.
Evaluation of controls for developing/acquiring new systems, focusing on project risk, and adherence to a Secure SDLC Policy.
Assessment of controls for managing outsourcing risks, including vendor contracts, TPRM policy, and vendor outsourcing policy.
Stay ahead of the rapidly evolving threat landscape and keep your data protected without having to spend a fortune.