Guidelinies 84007 2
Guidelinies 84007 2
Guidelinies 84007 2
Table of Content
1. Introduction ......................................................................................................................... 5
2. Vision and Objective ........................................................................................................... 7
3. Applicability ......................................................................................................................... 8
4. Terms &Definitions ............................................................................................................. 9
5. Enterprise Security ........................................................................................................... 10
5.1 Governance, Policy & Standards, Strategy ................................................................................ 10
5.2 Establishment of governance framework ................................................................................... 10
5.3 Chief Information Security Officer (CISO) .................................................................................. 10
5.4 Roles and responsibilities of CISO............................................................................................. 10
5.5 Information Security Committee (ISC) ....................................................................................... 11
5.6 Role of the Board....................................................................................................................... 12
5.7 Heads of functional Departments ............................................................................................... 12
5.8 Information Security Team ......................................................................................................... 12
5.9 Implementation .......................................................................................................................... 13
5.10 Conformance ........................................................................................................................... 15
5.11 Enforcement ............................................................................................................................ 15
5.12 Awareness............................................................................................................................... 16
5.13 Training ................................................................................................................................... 16
5.14 Identity and Access Management ............................................................................................ 17
5.15 Change Management .............................................................................................................. 18
5.16 Change Implementation ........................................................................................................... 19
5.17 Vendor/Third party Risk Management ..................................................................................... 19
5.18 Business Continuity Plan ......................................................................................................... 22
6. Information Asset Management ....................................................................................... 23
7. Physical and environmental security .............................................................................. 24
8. Human resource security ................................................................................................. 25
9. System acquisition, development and maintenance ..................................................... 26
10. Information Security Risk Management ........................................................................ 27
10.1 Managing Information Security Risk Assessment .................................................................... 27
10.2 Information Security Policy - Acceptable Use .......................................................................... 28
10.3 Business Continuity & Disaster Recovery Framework ............................................................. 29
11. Data Security ................................................................................................................... 31
11.1 Scheme of the data security policy .......................................................................................... 31
12. Application Security........................................................................................................ 34
12.1 Each application to have an owner. ......................................................................................... 34
12.2 Information security requirements analysis and specification ................................................... 35
12.3 Technical review of applications after operating platform changes........................................... 35
12.4 Secure system engineering principles ..................................................................................... 35
Insurance Regulatory and Development Authority of India (IRDAI) Page 2 of 80
Guidelines on Information and Cyber Security for Insurers
12.5 Secure development environment ........................................................................................... 36
12.6 Outsourced development ......................................................................................................... 36
12.7 System functionality and security testing ................................................................................. 36
12.8 Others ..................................................................................................................................... 37
13. Cyber Security ................................................................................................................. 38
13.1 Classification of Critical Systems and Cyber Security Incidents: .............................................. 38
13.2 Organization’s Cyber Resilience program ................................................................................ 38
13.3 Identification ............................................................................................................................ 38
13.4 Protection ................................................................................................................................ 39
13.5 Detection ................................................................................................................................. 39
13.6 Response and Recovery ......................................................................................................... 39
13.7 Testing .................................................................................................................................... 39
13.8 Situational Awareness ............................................................................................................. 40
13.9 Learning and Reporting ........................................................................................................... 40
14. Platform/Infrastructure Security .................................................................................... 41
14.1 Secure Configuration Documents & Periodic Assessments ..................................................... 41
14.2 Patch Management ................................................................................................................. 42
15. Network Security ............................................................................................................. 43
16. Cryptography & Key Management ................................................................................. 44
16.1 General directives on keys....................................................................................................... 44
16.2 Retention of electronic keys ..................................................................................................... 44
17. Security Logging & Monitoring ...................................................................................... 45
17.1 Logging & Monitoring ............................................................................................................... 45
18. Incident Management ...................................................................................................... 46
18.1 Incident Reporting & Escalation handling Processes & Procedures ......................................... 47
18.2 Review of the functioning of the preventive and detective controls .......................................... 47
19. Endpoint Security............................................................................................................ 48
19.1 Objective Endpoint Security ..................................................................................................... 48
19.2 Identity and access to end points ............................................................................................. 48
19.3 Network access control............................................................................................................ 48
19.4 Remote access ........................................................................................................................ 48
19.5 Application Control .................................................................................................................. 49
19.6 Device control .......................................................................................................................... 49
20.Virtualization ..................................................................................................................... 50
20.1 Access Control ........................................................................................................................ 50
20.2 Hardening of Operating Systems ............................................................................................. 50
20.3 Partitioning and resource allocation....................................................................................... 51
20.4 File Sharing ............................................................................................................................. 51
20.5 Back up ................................................................................................................................... 51
20.6 Monitoring................................................................................................................................ 51
1. Introduction
All insurers regardless of size, complexity, or lines of business, collect, store, and share with
various third-parties (e.g., service providers, reinsurers etc.), substantial amounts of personal
and confidential policyholder information, including in some instances sensitive health-related
information.
Insurance repositories, call centers, Common Service Centers etc. also have access to
policyholders’ data.
While Information sharing is essential for conducting the business operations, it is essential to
ensure that adequate systems and procedures are in place for ensuing that there is no leakage
of information and information is shared only on need-to-know basis.
Further, due to rapid development Information Technology, there are many challenges in
maintaining confidentiality of information. The technology even though has many advantages,
brings in risks associated with it like any other technology. With the fast growth of web based
applications, cyber threat landscape has been growing and there is concern across all sectors.
Cyber risks have grown and cyber criminals have become increasingly sophisticated. For
insurers, cyber security incidents can harm the ability to conduct business, compromise the
protection of personal and proprietary data, and undermine confidence in the sector. It is
observed that the level of awareness of cyber threats and cyber security within the insurance
sector, as well as supervisory approaches to combat the risks, appear to vary across
organizations.
Information obtained from regulated entities through cyber-crime may be used for financial gain
through extortion, identity theft, misappropriation of intellectual property, or other criminal
activities. Exposure of personal data can potentially result in severe harm for the affected
policyholders, as well as reputational damage to insurance sector participants. Similarly,
malicious cyber-attacks against an insurer’s and Insurance Intermediaries’ critical systems may
impede its ability to conduct business.
Such security related issues have the potential to undermine public confidence and may lead to
reputation risks to insurers. Hence, it is essential to ensure that a uniform framework for
information and cyber security is implemented for insurers and an in-built governance
mechanism is in place within the regulated entities in order to make sure that all such security
related issues are addressed time to time.
(i) To ensure that a Board approved Information and Cyber Security policy is in place with all
insurers.
(ii) To ensure that necessary implementation procedures are laid down by insurers for
Information and Cyber Security related issues.
(iii) To ensure that insurers are adequately prepared to mitigate Information and cyber security
related risks.
(iv) To ensure that an in-built governance mechanism is in place for effective implementation of
Information and cyber security frame work.
3. Applicability
This guidelines document is applicable to all insurers regulated by Insurance Regulatory and
Development Authority of India (IRDAI).
These guidelines are applicable to all data created, received or maintained by insurers wherever
these data records are and whatever form they are in, in the course of carrying out their
designated duties and functions.
4. Terms &Definitions
Admin Administration
BCM/BCP –. Business Continuity Management/Plan
BYOD Bring Your Own Device
CA Certification Authority
CCA Controller of Certifying Authority
CERT In Computer Emergency Response Team - India
CCMP Comprehensive Cyber crisis Management Plan
CIO Chief Information Officer
CIA Confidentiality, Integrity and Availability
CISA Certified Information Systems Auditor
CISO Chief Information Security Officer
CRO Chief Risk Officer
DDoS Distributed Denial of Service
DISA Diploma in Information Systems Audit
DLP Data Loss Prevention
DR Disaster Recovery
HR Human Resource
IDS Intruder Detection System
IMEI International Mobile Equipment Identity
IPS Intruder Prevention System
IRDAI Insurance Regulatory and Development Authority of India.
IRM Information Risk Management
ISC Information Security Committee.
MAC Media access control
NCIIPC National Critical Information Infrastructure Protection
Centre
NDA Non -Disclosure Agreement
OEM Original Equipment Manufacturer
Organization Insurance company registered with IRDAI
PII Personally identifiable information
SCD Secure Configuration Document
SLA Service Level Agreement
SOC Security Operations Centre
SOP Standard Operating Procedure
VLAN Virtual Local Area Network
VM Virtual Machine
VPN Virtual Private Network
5. Enterprise Security
5.1 Governance, Policy & Standards, Strategy
The organization shall adopt, direct, monitor and communicate an information and Cyber
security policy/policies (herein after referred to as ‘IS Policy’), approved by the Board in order
to ensure that the organization’s overall objective to information security is achieved.
The Framework for information security governance shall be established by the organization.
Every Organization shall appoint/ designate a suitably qualified and experienced Senior Level
Officer exclusively as Chief Information Security Officer (CISO) who will be responsible for
articulating and enforcing the policies to protect their information assets.
a) Responsible for articulating Information and Cyber Security policy for the
Organisation
b) Be responsible for providing advice and support to management and information
users in the implementation of Information and Cyber Security Policy.
c) Build and lead the information security team with appropriate competencies and
attitude to deliver the information security program.
d) Promote user awareness initiatives within the organization.
e) Propose Information and Cyber Security Policy to the ISC, incorporate feedback
on the implications of the policy from the ISC and other business areas into the
policy-making process.
f) Be responsible for providing advice and support to management and information
users in the implementation of Information and Cyber Security Policy.
g) Build and lead the information security team with appropriate competencies and
attitude to deliver the information security program.
h) Promote user awareness initiatives within the organization .
Insurance Regulatory and Development Authority of India (IRDAI) Page 10 of 80
Guidelines on Information and Cyber Security for Insurers
The CISO shall to report to the Head of Risk Management and will have a working relationship
with the CIO to develop the required rapport to understand the IT infrastructure and operations,
to build effective security in IT across the organization, in tune with business requirements and
objectives. The organization shall ensure segregation of duties for Information Security & IT
operations.
The organization shall form an Information Security Committee (ISC) headed by a senior level
executive with a reporting line to the Board to take overall responsibility for the information
security governance framework.
Members of ISC shall include functional heads from Operations, Information Technology, Legal,
Compliance, Finance, HR, Risk etc.
a) Review and recommend to the Board necessary changes to the high level IS
Policy. The Committee shall approve standards and procedures in line with the
Board-approved IS policy. Individual business functions should create and get
their SOP’s approved (in line with above standards & procedures) by the
respective functional heads.
b) Review and approve exceptions to the Information Security Policy, any significant
risk to be reported to the Board. However Operational level exceptions can be
approved by Respective Business owner in consultation with CISO.
d) Review, discuss and direct information security risk mitigation (which includes
reporting security incidents) and ensure that risks are accurately reported and
appropriately dealt with.
g) The ISC shall ensure that the information security governance framework is supported by
an information security assurance programme (Implementation Plan).
h) ISC should report to Risk Management Committee of the Board a minimum of two
times in a year.
Each functional Head shall provide leadership and sponsorship to the agreed security
program by driving the same to the teams under their management and mandate
compliance. Individual functional head will be responsible for implementation of
information and cyber security management related policies.
5.9 Implementation
5.9.1 Technology/Operations/Admin/HR/ Functional teams shall –
a) Have primary responsibility for ensuring that appropriate and adequate security
mechanisms are provided in the systems and network infrastructure shared across
systems and business units.
b) Be responsible for agreeing to security classification of all infrastructure components
in agreement with the business owners.
c) Have primary ownership to comply with specific security policies, which will be
applicable for systems development and acquisition.
d) Be responsible for maintenance of the various security tools and solutions.
e) Be responsible for monitoring of secure status on each system and network within its
control. Report on weaknesses or breaches of security to be made to the relevant
Insurance Regulatory and Development Authority of India (IRDAI) Page 13 of 80
Guidelines on Information and Cyber Security for Insurers
Business owners or Infrastructure owners and to the CISO, who shall in turn co-
ordinate, the incident response.
f) Technology/Operations/Admin/HR/ functional teams shall designate a suitable and
qualified team member who will be responsible for reporting the incidents &
effectiveness of security control to CISO /Information Security Team/ CIO.
g) Legal Team — Legal Team is responsible for Engagement with Cyber security police
officials, lawyers and Government agencies as required. Necessary details with
regards to the incident are provided by information security team.
h) Users and Information Owners — System users and data owners are responsible for
the application of the policies relating to the systems, data, and other information
resources under their care or control. They are also responsible for reporting any
suspected cyber security incident to Information Security Team/IT Head.
5.9.2 Responsibilities of Business Owners:
a) Hold the primary responsibility for defining the value and classification of assets
within their control by participating in the risk management process and
undertaking business impact assessment. b) Be responsible for authorizing access
and segregation of duties for individual users and groups including Third parties to
the information contained within the applications.
b) Ensure that appropriate access of administration roles or teams exist for their
applications to administer access in accordance with the IS Policy.
d) Be primarily responsible for risk, data security and access of Third party partners
and vendors to whom line of business has been outsourced
g) Define Information Security requirements for third parties in concurrence with the
Information Security team of the organization
5.10 Conformance
Users of following category shall be responsible for complying with the IS Policy
5.11 Enforcement
a) Internal Audit plan of the organization shall have a separate IS audit plan covering
IT/Technology infrastructure and applications. The audit plan and the reports shall be
presented to the Audit Committee of the Board
b) Conduct audit for third party /vendors handling critical data on planned and ad hoc basis
to measure the effectiveness of the third party security controls implemented.
c) All instances of non-compliance related to Information security shall be communicated
and discussed with relevant line management and CISO.
a) Be responsible for undertaking regular monitoring of secure status on each system and
network within its control.
b) Report on weaknesses or breaches of security to the relevant Business Owners or
Infrastructure Owners and to the CISO, who shall be responsible to manage the incident
response.
c) Responsible for driving end point system and server security.
5.12 Awareness
All stakeholders (employees, contract staff etc.) are made aware of organizational
information security policies, procedures and guidelines, threat exposures etc. They
should be aware of their roles, responsibilities and abide by them to reduce the risk of
human error.
5.13 Training
The organization shall ensure that all personnel who are assigned the responsibilities are
competent to perform the required tasks and provided with regular training.
All employees and, where applicable, contract staff, 3rd party service providers and
vendors shall receive appropriate information security awareness training or periodic
updates as relevant to their function to ensure secure business operations
Insurance Regulatory and Development Authority of India (IRDAI) Page 16 of 80
Guidelines on Information and Cyber Security for Insurers
b) Privileged access -
Additional controls should be applied to special access privileges, including high level
privileges (e.g. 'root' in Unix or ‘Administrator' in Windows systems/powerful utilities and
privileges that can be used to authorize payments or perform financial transactions)
a) Modification/ Deletions-group: -
i) Access shall be timely modified as required when 'Users' moves internally
ii) Access shall be timely revoked when 'Users' exits
b) Re-certifications -
i) All user-IDs and their access right shall be reviewed by the respective functional
business owner on a regular basis to avoid existence of stray/orphan user accounts
and ensuring that access rights are based on the need to know basis principle.
ii) The review shall include verification that the user's access rights and privileges are
still in line with job requirements.
c) Generic IDs-
i) Generic User-Ids/Service IDs shall be avoided and where no alternative exists, it
shall be controlled, authorized by Business/Asset Owner, to avoid misuse to
compromise user accountability.
ii) Privilege generic user-IDs shall allow the user to only perform the intended activities
for which the user-IDs was created. Such IDs shall be authorized by business/Asset
owners
d) Remote Access-
i) Remote access to the Organization’s infrastructure shall be highly restricted and
controlled to prevent unauthorized access to the Organization’s infrastructure from
untrusted networks
ii) 'Users' seeking to gain privileged access to the Organization’s IT facilities via public or
other external networks shall do so via two factor authentications.
There shall be a process for managing the security of relationships with external parties. The
vendor risk management process shall involve the information security function, and include
i. Agreeing security arrangements (e.g. based on business security requirements and the
relationship with third compliance needs) for each external party with security team.
ii. All arrangements with external party/vendors shall have a well-defined service level
agreement (SLA) that shall specify information security requirements and controls,
service levels and liability of suppliers in case of SLA violations, non-mitigation of IS
vulnerabilities, IS incidents etc. External party shall demonstrate compliance with all SLA
requirements.
iii. Validating security arrangements for each vendor.
iv. Handling termination of a relationship with a vendor.
v. Sub-contracting arrangements should cover due diligence aspects
vi. Right to audit /inspection.
However, the ultimate responsibility lies with the organization.
The risks to the Organization’s information and related information processing facilities from
business processes involving external parties shall be identified and appropriate controls
implemented in following scenarios.
For each of the identified assets, ownership of the asset should be assigned and the
classification should be identified.
All employees and external party users should return all of the organizational assets in their
possession upon termination of their employment, contract or agreement.
The termination process should be formalized to include the return of all previously issued
physical and electronic assets owned by or entrusted to the organization.
In cases where an employee or external party user purchases the organization’s equipment or
uses their own personal equipment, procedures should be followed to ensure that all relevant
information is transferred to the organization and securely erased from the equipment.
An appropriate set of procedures for information labeling should be developed and implemented
in accordance with the information classification scheme adopted by the organization.
Media should be disposed of securely when no longer required, using formal procedures.
Security perimeters should be defined and used to protect areas that contain either sensitive or
critical information, and information processing facilities.
Physical barriers should, where applicable, be built to prevent unauthorized physical access.
Surveillance systems shall be in place and regularly monitored to cover all major areas
Secure areas should be protected by appropriate entry controls to ensure that only authorized
personnel are allowed access.
Access rights to secure areas should be regularly reviewed and updated, and revoked when
necessary.
Appropriate controls shall be implemented to manage calamities like fire, flood, earthquake,
explosion, civil unrest and other forms of natural or man-made disaster.
Mock drills shall be conducted periodically to test the effectiveness of the controls.
IT equipment should be protected from power failures and other disruptions caused by failures
in supporting utilities.
Secure computers or mobile devices from unauthorized use by a key lock or an equivalent
control, e.g. password access, when not in use.
A clear desk policy for papers and removable storage media and a clear screen policy for
information processing facilities should be adopted.
Background verification checks on all candidates for employment should be carried out in
accordance with relevant laws, regulations and ethics and should be proportional to the
business requirements, the classification of the information to be accessed and the perceived
risks.
Information security roles and responsibilities should be communicated to job candidates during
the pre-employment process.
A code of conduct may be used to state the employee’s or contractor’s information security
responsibilities regarding confidentiality, data protection, ethics, appropriate use of the
organization’s equipment and facilities, as well as reputable practices expected by the
organization.
Awareness, education and training activities should be suitable and relevant to the individual’s
roles, responsibilities and skills.
There should be a formal and communicated disciplinary process in place to take action against
employees who have committed an information security breach.
Criteria for accepting products (software & solutions) should be defined e.g. in terms of their
functionality, which will give assurance that the identified security requirements are met.
Products should be evaluated against these criteria before acquisition.
Policy Procedure and Guidelines: The Organization should have a risk management program
to undertake information security risk assessment for target environments (e.g. critical business
environments, business processes, business applications, computer systems and networks) on
a periodic basis
10.1.1 There shall be formal, documented standard/procedures for performing information risk
assessments, which apply across the organization. Standards procedures to cover
a. Need for information security risk assessment
b. Types of target environment that would be assessed for information risks, e.g. IT
Applications, hardware and software, vendors, etc.
c. Circumstances in which information assessments will be performed
d. Individuals that need to be involved and their specific responsibilities – business owners,
experts in risk assessment, IT, etc.
e. Method of managing and mitigating to the results of information risk assessments
10.1.2 Results from information security risk assessments conducted across the organization
to be:
Scope: Organizations need to define and implement procedures to ensure the Confidentiality,
Integrity, Availability and Consistency of all data stored in different forms. These guidelines are
applicable to all information/records/data created, received or maintained by all permanent and
temporary employees and consultants (collectively “the employees”), third party vendors of the
organization and business distributors who have access to the organization’s data, wherever
this data records are and whatever form they are in, in the course of carrying out their designated
duties and functions
processing, use and transmission to its eventual destruction or decay. The value of, and risks
to, data assets may vary during their lifetime, but data security remains important to some extent
at all stages.
Hence at every stages of data life cycle, organizations shall ensure due care of security to the
Confidentiality, integrity and availability. Following data security controls to be considered as
Insurance Regulatory and Development Authority of India (IRDAI) Page 31 of 80
Guidelines on Information and Cyber Security for Insurers
mentioned below:
Consistency & accuracy of data entered into the system should be verified through a
maker checker process wherever applicable. There should be a process to ensure that
such maker/ checker functions for conflicting roles follow segregation of duties and the
same user cannot perform both the functions
Audit trail of critical data access shall be maintained. Audit trails should be secured to
ensure the integrity of the information captured, including the preservation of evidence.
Retention of audit trails should be in line with business, regulatory and legal
requirements.
Access should be provided on “Need to Know” or “Least Privileges” based to ensure that
necessary personnel (Employee) have access to essential system & this access should
be reviewed periodically.
For data generated /created on paper, user shall ensure that it follows data classification
policy, stores it in a safe place in the office and maintain the CIA of data.
Organizations should have a process to verify job application information on all new
employees. Organizations should verify that contractors are also subject to similar
screening procedures
When deciding upon protection of specific organizational data records, their
corresponding classification based on the organizations classification scheme, should be
considered. Once the data is classified, it shall be the responsibility of users to ensure
that adequate controls followed as per policy and an inventory of critical data storage
locations shall be identified & documented
In order to secure business sensitive/ critical data, a mechanism to identify critical data
based on its impact to the business shall be defined.
Regular awareness program to the users about handling of the critical data, classification
levels of data shall be imparted on regular basis.
Confidentiality undertaking shall be obtained from the users
The critical data on the laptops and other mobile devices shall be protected to avoid
disclosure of data in case of loss of the laptop or other devices.
There should be secure storage of media. Controls could include physical and
environmental controls such as fire and flood protection, limiting access by means like
physical locks, keypad, passwords, biometrics, etc., labeling, and logged access.
Cryptographic/password management techniques need to be used to control access to
critical and sensitive data/information in transit and storage.
The following are the important Application control and risk mitigation measures which should
be considered for implementation by the Organization:
12.1 Each application to have an owner.
a. All application systems to be tested during the implementation in a robust manner regarding
functionality controls to ensure that they satisfy business policies/rules of the organization
and regulatory and legal prescriptions/requirements
b. Robust system based controls need to be built into the system and thereby reducing the
reliance on any manual controls
c. All applications to be tested for security controls to check for known vulnerabilities initially
and during major changes.
d. Before the system is live, there should be clarity on the audit trails and the specific fields that
are required to be captured as part of audit trails and an audit trail or log monitoring process
including personnel responsible for the same.
12.8 Others
a. Direct back-end updates to database should not be allowed except during exigencies,
with a clear business need and after due authorization as per the relevant policy.
b. Applications should be configured to logout the users after a specific period of inactivity
c. There should be suitable interface controls in place to prevent any unauthorized
modification
d. Establish a suitable backup policy for the application
It is generally recognized that best practices for cyber resilience should include but not limited
to below key areas:
13.3 Identification
a. Identification means identifying critical assets, business functions and processes that
should be protected against compromise.
b. Information assets (including sensitive personal information) and related system access
should be part of the identification process.
c. Business process or Vendor risk should be identified and assessed as a part of on-
13.7 Testing
Testing programmes, vulnerability assessments and penetration tests are cornerstones in the
testing phase. Testing should be included when systems are specified, developed, and
integrated.
Cyber security incidents which are critically affecting the business operations and large number
of customers should be reported to IRDAI within a Maximum period of 48 hours, upon
knowledge.
Organizations must report information security incidents, where the confidentiality, integrity, or
availability of critical information is potentially compromised, to the IRDAI and Cert-Fin with the
required data elements, as well as any other available information, within 48 hours of being
identified by the Organization’s Information Security Team, Security Operations Center (SOC),
or information technology department. In some cases, it may not be feasible to have complete
and validated information prior to reporting. Organizations should provide their best estimate at
the time of notification and report updated information as it becomes available
SCD should be reviewed for currency on a periodic basis by Information Security Team. The
exceptions to configurations as recommended in SCDs owning to certain business
requirements/limitations should be approved through formal exception process after adequate
risk assessment.
Regular scheduled assessments, such as internal and external vulnerability scans should be
conducted for the IT Infrastructure including but not limited to software, applications, server,
network, database, operating system, wireless devices, and other network equipment.
Frequency of conducting vulnerability assessment shall depend upon the criticality of the
Information Asset (application, software, database, operating system, network devices and
wireless networks). All Internet facing applications shall undergo vulnerability assessments
before deployment in the production environment.
a. Network shall be segmented into zones/subnets based on function and possibly location.
Each of the zone/subnet may be further segregated into separate VLANs based on
business and security requirements.
b. All network devices should be HARDENED based on their respective secure configuration
documents before being deployed in production.
c. Logical position of firewall in network architecture should ensure that firewall is not
bypassed. Defence-in-depth through placement of IDS/IPS solution shall be implemented
to further control the internet traffic passing through these networks. These solutions shall
be regularly updated with current signatures / characteristics of threats.
d. Remote access to organization’s network resources over an un-trusted network
(Internet/Extranet) shall be integrated into the overall network security management.
e. Clocks of all relevant information processing systems within an organization or security
domain shall be synchronized with an agreed accurate time source.
f. Routing controls should be implemented for networks to ensure that computer connections
and information flows do not breach the access control system of the business applications.
g. There should be segregation of duties for approval and implementation of configurations
for network devices.
h. Adequate redundancy should be provided for network links and network devices.
REDUNDANT NETWORK LINKS AND DEVICES SHOULD HAVE THE SAME LEVEL OF
SECURITY AS THE PRIMARY LINKS. All single points of failure within the
organization network shall be identified and the risks in such a design shall be
assessed. Where possible, failover technologies shall be in place to address network
failure. Network diagram (including wireless network) shall be documented and kept up to
date.
i. Logs generated by critical network devices shall be collected and analyzed to identify
threats and exceptions. Network security shall be monitored through a Security Operations
Centre (SOC) to provide immediate response to threats.
Objective: Organizations shall establish logging and monitoring capabilities to detect security
events in timely manner.
b. User rights should be allocated based on the principle of least privilege in accordance
with their business/functional requirements. User rights should be based on a “NEED
TO HAVE” AND “NEED TO KNOW BASIS”.
Authentication mechanism for end points connecting from Organization WAN or external
network shall be implemented to ensure entry of only authorized users.
19.4 Remote access
a. Organization should regularly review remote access approvals and revoke those that
no longer have a compelling business justification
b. Organization should ensure appropriate and timely patching, updating and maintaining
Insurance Regulatory and Development Authority of India (IRDAI) Page 48 of 80
Guidelines on Information and Cyber Security for Insurers
all software on remote access devices
c. Encryption should be used to protect communications of critical data between the
access device and the organization
d. VLANs, network segments, directories, and other techniques should be used to restrict
remote access to authorized network areas and applications within the organization
a. Organization can evaluate the likelihood associated with the threat agent, attack vector,
and security weakness and combine it with an estimate of the technical and business
impact to the Organization.
c. Whenever connecting to the LAN, it must be ensured that anti-virus agent is installed
with latest signatures on the device.
d. Organization may consider to deploy security software like Data Loss Prevention (DLP)
to identify, monitor and protect data in use, data in motion and data at rest.
20.Virtualization
Objective: To ensure protection of information during use of virtual environment within the IT
infrastructure of the company.
Policy, Procedures & Guidelines: Approved Policy, Procedures & Guidelines for Virtualization
of the systems shall be in place, which will detail, at least, the following:
Centralized Administration of virtualized systems
Provisioning and allocation of resources between different systems in virtualized
machine
Securing information resides in the host and virtualized machines
20.5 Back up
Virtual systems shall need to be regularly backed-up for error recovery and continuity of
operations.
20.6 Monitoring
Appropriate mechanism for monitoring the operations between the host and the guest
should be put in place to ensure no unauthorized operations or no malicious operations or
no resource monopoly happens between the VMs.
Policy, Procedures & Guidelines: Policy, Procedures & Guidelines shall be framed to provide
direction for hosting the type of information, its criticality and the level of security controls to be
adopted, on cloud or on any external hosting infrastructure
With reference to the Electronic maintenance of core business records, records shall be
hosted within India.
The selection of cloud hosting model shall depend on the criticality of the information
being hosted
Wherever application/data/system hosting in a cloud is considered inevitable -for
commercial, business, regulatory, legal or other reasons, approvals should be obtained
by the organization from their respective senior management.
Business justification for considering inevitable to host the data and system in Cloud.
Classification of data to be hosted on Cloud Viz. Secret/Highly Confidential, Confidential,
Public, Internal, etc.
It should cover:
o Security Control measures to be implemented by Cloud service provider/ Application
Service Provider/Any Third-Party/Company for guarding against Data leakage /
Data corruption /Security breach etc. as well as control measures in place to prevent,
detect and react to breaches including data leakage
o Due diligence process for selecting a suitable service provider
a. Mobile devices containing confidential, personal, sensitive and generally all information
belonging to company, except public information, shall employ encryption or equally
strong measures to protect the corporate data stored on the device.
b. All mobile computing devices and all information assets used in tele-working, using
corporate applications shall have anti-virus and/or anti-malware software installed and
running.
Independent Assurance Audit shall be carried out by qualified external systems Auditor holding
certifications like CISA/ DISA/Cert-in empaneled Auditor.
a. Scope of Audit shall include controls defined as per the annexure enclosed with this
document.
b. Annual IS Audits should also cover branches on sample basis, with focus on large and
medium branches, in critical areas like password controls, control of user ids, operating
system security, anti-malware controls, maker-checker controls, Identity & Access
management, physical security, review of exception reports/audit trails, BCP policy and
testing etc.
c. This Assurance Audit shall be driven by the Information Security Team.
23.3 Frequency:
During audit, auditors should obtain evidences, perform test procedures, appropriately
document the findings, and conclude a report.
a. There should be proper reporting of the findings of the auditors. For this purpose, each
Organization should prepare a structured format.
b. The major deficiencies/aberrations noticed during audit should be highlighted in a special
note and given immediately to the ISC and IT Department.
c. Minor irregularities pointed out by the auditors are to be rectified immediately.
d. Follow-up action on the audit reports should be given high priority and rectification should
be done without any loss of time.
e. Audit reports need to be presented to the Risk Management Committee of the Board.
f. A copy of executive summary of the Audit report along with action taken note should be
submitted to IRDAI within 30 days of completion of Audit
A Control Check List covering the domains specified in this report is provided in Annexure A
This section may provide the organizations a broad idea about various statutory provisions
available for Information and Cyber Security. An attempt has been made here to consolidate
various legal provisions available on Information Technology, Cyber Security and Information
Security for reference. While these consolidated provisions in Annexure B may be used for
reference, the same may not be treated as exhaustive. The Organizations are requested to refer
the relevant Act/regulation/rules/Amendments for updates/latest provisions.
***********
The critical issues which revolve around with the legal aspects of transactions in cyber space
would mainly evolve around the following:
e- contracts and authentication
e-signature and digital signature
privacy and data protection
Data retention and retrieval
Electronic Evidence and admissibility
Intermediary liability
IP protection
Dispute Resolution
Jurisdiction and
Cyber Crimes and enforcement
India’s legislative framework to deal with the internet laws and online world is enshrined in the
Information Technology Act, 2000 and Rules made there under. This was later amended by
Information Technology (Amendment) Act 2008. It also leads to in the amendment in Indian
Penal Code 1860, Indian Evidence Act 1872, the Bankers’ Book Evidence Act, 1891 and the
RBI Act, 1934 and related matters.
The IT Act and various Rules there under have provided the legal framework for storing,
dissemination, processing and retrieval of electronic data. The Act also lays down guidelines
and responsibility of conducting due diligence by body corporates and Insurance Intermediaries
and adoption of reasonable security practices while handling information and data including
sensitive personal data and information. There are also obligations entrusted for reporting of
cyber security incidences to government authorities. Violation of these provisions can lead to
Insurance Regulatory and Development Authority of India (IRDAI) Page 60 of 80
Guidelines on Information and Cyber Security for Insurers
offences and penalties.
The definition of Information is quite wide under the IT Act and it means as under:
“Information” includes data, message, text, images, sound, voice, codes, computer
programmes, software and databases or micro film or computer generated microfiche”
The term Data as defined under IT Act means as under:
The term "Cyber Security" as defined under Section 2(nb) of the IT Act means
“protecting information, equipment, devices, computer, computer resource, communication
device and information stored therein from unauthorized access, use, disclosure, disruption,
modification or destruction”.
Cyber Crimes can be classified into two broad categories:
In this regard, the Government has notified The Information Technology (Reasonable Security
Practice and Procedure and Sensitive Personal Data or Information) Rules 2011.
Pursuant to the above rules, Bodies corporate possessing, dealing or handling any sensitive
personal data or information are required to observe following compliance requirements:
The following table lists out the key requirements and actionable for compliance of SPDI rules
OBLIGATIONS ACTIONABLE
Policy for privacy and Provide a privacy policy for handling of or dealing in
disclosure of information personal information including sensitive personal data or
information. The policy shall provide for:
Clear and easily accessible statements of its practices
and policies;
type of personal or sensitive personal data or
information collected;
purpose of collection and usage of such information;
disclosure of information including sensitive personal
data or information;
reasonable security practices and procedures
Policy shall be published on website
Collection of information Consent for collection should be obtained in writing. The
information so collected should only be
for a lawful purpose,
considered necessary and
In order to ensure the intermediary handling and processing information remain protected
against the liability, they shall ensure adequate due diligence while handling third party
information. Section 79 of the IT Act, 2000 provides for the liability of Insurance Intermediaries
including internet service providers. Section 79 of the IT Act was amended by the IT
(Amendment) Act 2008. Pursuant to the said amendment, an Intermediary shall not be liable for
any third party information, data or communication link made available or hosted by them if:
the function of the Intermediary is limited to providing access to a communication system
over which information made available by third parties is transmitted or temporarily
stored;
the Intermediary does not initiate the transmission or select the receiver of the
transmission, and select or modify the information contained in the transmission
the Intermediary observes due diligence while discharging its duties and also observes
such other guidelines as the Central Government may prescribe in this behalf.
It may be noted that the Intermediary shall lose the above immunity if the Intermediary is found
to have conspired or abetted or aided or induced whether by threats or promise or otherwise in
the commission of the unlawful act. Further, if the Intermediary upon receiving actual
knowledge, or on being notified that any information, data or communication link residing in or
connected to a computer resource controlled by the Intermediary is being used to commit the
unlawful act, the Intermediary fails to expeditiously remove or disable access to that material
on that resource without vitiating the evidence in any manner.
The Central Government additionally has notified The Information Technology (Intermediaries
guidelines) Rules, 2011 vide notification dated 11th April, 2011. These rules provide the
guidelines and procedure to be dealt by Intermediaries as part of the due diligence and
administration of takedown and procedural obligations by intermediaries.
The Government of India has notified The Information Technology (The Indian Computer
Emergency Response Team and manner of performing functions and duties) Rules, 2013.
As per Rule 12 (1) (a) of IT (The Indian Computer Emergency Response Team and Manner of
Performing Functions and Duties) Rules, 2013 any individual, organization or corporate entity
affected by cyber security incidents may report the incident to CERT-In. Service Providers,
intermediaries, data centers and body corporate shall report the cyber security incidents to
CERT- In within a reasonable time of occurrence on noticing the incident to have scope for
timely action.
The following type of cyber security incidents shall be mandatorily reported to CERT-In as early
as possible to leave scope of action.
Targeted scanning/probing of critical networks/systems
Compromise of critical systems/information
Unauthorized access of IT systems/data
Defacement of website or intrusion into a website and unauthorized changes such as
inserting malicious codes, link to external websites etc.
Malicious code attacks such as spreading of virus/worm/Trojan/Botnets/spyware
Attacks on servers such as Database, Mail and DNS and network devices such as
Routers
Identity Theft, Spoofing and Phishing attacks
Denial of Service (DOS) and Distributed Denial of Service (DDOS) attacks
Attacks on Critical Infrastructure, SCADA Systems and Wireless networks
Attacks on Applications such as E-Governance, E-Commerce etc.
Data theft involves issues of copyright violation, violation of privacy under IT Act 2000, as well
criminal breach of trust and dishonest misappropriation under Indian Penal Code, 1860.
Section 43(b), read with Section 66 of the Information Technology Act 2000 and Section 379,
405 & 420 of Indian Penal Code deals with framework of data theft and penal provisions thereto.
Section 43 clearly provides for the provisions of damages by way of compensation against the
person who without the permission of the owner or any other person who is in charge of a
computer, computer system or computer network
(a) accesses or secures access to such computer, computer system or computer network or
computer resource
(b) downloads, copies or extracts any data, computer data base or information from such
computer, computer system or computer network including information or data held or stored in
any removable storage medium;
(c) introduces or causes to be introduced any computer contaminant or computer virus into any
computer, computer system or computer network;
(d) damages or causes to be damaged any computer, computer system or computer network,
data, computer data base or any other programmes residing in such computer,
computer system or computer network;
(e) disrupts or causes disruption of any computer, computer system or computer network;
(f) denies or causes the denial of access to any person authorized to access any computer,
computer system or computer network by any means;
(g) provides any assistance to any person to facilitate access to a computer, computer system
or computer network in contravention of the provisions of this Act, rules or regulations made
there under,
(h) charges the services availed of by a person to the account of another person by tampering
with or manipulating any computer, computer system, or computer network,
(i) destroys, deletes or alters any information residing in a computer resource or diminishes its
value or utility or affects it injuriously by any means
(j) Steals, conceals, destroys or alters or causes any person to steal, conceal, destroy or alter
any computer source code used for a computer resource with an intention to cause damage.
Section 72A provides obligation to ensure confidentiality and privacy of electronic records or
information to which any person has secured access. No such information/record can be
disclosed without the consent of the person concerned, to any other person. Failure to maintain
confidentiality and privacy shall make the person liable.
Similarly, Section 72A also provides obligation to person including intermediary who while
providing the services has secured access under the terms of lawful contract to any material
containing personal information about another person, discloses, without the consent of the
person concerned, or in breach of a lawful contract, such person shall be liable.
Penal Provisions
The following chart captures the gist of penal provisions as applicable under the Information
Technology Act 2000 dealing with the consequences of violations
Adjudication Officer
As per Section 46, the central government / state government can appoint an officer not below
the rank of a Director to be an adjudication officer to hold enquiry in the matter with the power
to decide if any person has committed any contravention of the Act or any rules, direction or
order under the Act. The pecuniary jurisdiction is Rs 5 Crore.
The Government has constituted CAT to whom the appeals from the decisions of an AO may
be preferred. Appeal against the decision of CAT can be made before the High Court.
Penal Provisions
The following chart captures the gist of penal provisions as applicable under the Information
Technology Act 2000 dealing with the consequences of violations
Act/Statute Requirement
The Information Procedure for collection, Covered above
Technology transfer, storing, disclosure &
(Reasonable processing of sensitive
Security Practice personal data and information
and Procedure Implementation of reasonable
and Sensitive security practices & code of
Personal Data or best practices
Information) Certification/Audit on a regular
basis through independent
Auditor once in a year
The Information Due diligence by Intermediary Covered above
Technology and their liability
(Intermediary Implementation of reasonable
Guidelines) security practices by
Rules, 2011 Intermediary
Reporting of Cyber Security
Incident to ICERT
Certification of compliance to
cyber security best practices,
standards and guidelines
**************************
61 Asset Management
62 Asset Management
63 Asset Management
64 Asset Management
65 Asset Management
66 Asset Management
67 Asset Management
68 Asset Management
69 Asset Management
70 Asset Management
71 Asset Management
72 Asset Management
73 Asset Management
74 Asset Management
75 Asset Management
76 Asset Management
77 Asset Management
78 Asset Management
79 Asset Management
80 Access Control
81 Access Control
82 Access Control
83 Access Control
84 Access Control
85 Access Control
86 Access Control
87 Access Control
88 Access Control
89 Access Control
90 Access Control
91 Access Control
92 Access Control
93 Access Control
94 Access Control
95 Access Control
96 Access Control
97 Access Control
98 Access Control
99 Access Control
100 Access Control
101 Access Control
119 cryptography
288 Compliance
289 Compliance
290 Compliance
291 Compliance
292 Compliance
293 Compliance
294 Compliance
295 Compliance
296 Compliance
297 Compliance
298 Compliance
299 Compliance
300 Compliance
301 Compliance
302 Compliance
Segregation of duties
Segregation of duties
Teleworking
Prior to employment - Roles and
responsibilities
Prior to employment - Roles and
responsibilities
Return of asset
Labelling of information
Management of removable media
Management of removable media
Handling of asset
Communication security
Communication security
Teleworking
Teleworking
Secure areas
Secure areas
Securing the offices, room and facility
Secure areas
Secure areas
Secure areas
Secure areas
Cabling security
Secure areas
Secure areas
Securing the offices, room and facility
Secure areas
Physical Security
Physical Security
Physical Security
Physical Security
Physical Security
Physical Security
Physical Security
Secure areas
Secure areas
Physical Security
Physical Security
Unattended user equipment
Secure disposal or re-use of equipment
Equipment Maintenance
Security of equipment off-premises
Security of equipment off-premises
Secure disposal or re-use of equipment
Removal of assets
Disposal of media
Operating Procedures
Change management
Capacity Management
Capacity Management
Information backup
Information backup
Information backup
Information backup
Information backup
Information backup
Information backup
Information backup
Information backup
Event logging
Event logging
Event logging
Clock synchronization
Clock synchronization
Clock synchronization
Separation of development, testing &
operational environments
Separation of development, testing &
operational environments
Change management
Change management
Change management
Change management
Change management
Change management
Change management
Change management
Change management
Change management
Outsourced development.
Collection of evidence
Compliance with legal and contractual
requirements
Intellectual property rights (IPR)
Are any information systems audit tools (e.g., software or data files) accessible to
any users in any unprotected area?
Whether access to information system audit tools such as software or data files
are protected to prevent any possible misuse or compromise.
Is there a policy implemented for privacy and protection of personally identifiable
information developed and implemented? IS this policy communicated to all
persons involved in the processing of personally identifiable information?
Is regular compliance review of any system, service, or infrastructure, or any
physical location and procedures within their area of responsibility with the
appropriate security policies, standards and any other security requirements
done? Has a review of security policies, standards, procedures, and/or guidelines
been performed within the last 12 months?
Are Information systems regularly reviewed for compliance with the organization’s
information security policies and standards? Has a network penetration test been
conducted within the last 12 months?
Whether all relevant statutory, regulatory, contractual requirements and
organizational approach to meet the requirements were explicitly defined and
documented for each information system and organization.
Whether specific controls and individual responsibilities to meet these
requirements were defined and documented.
Does the cloud hosting policy ensure that critical business records are maintained
within India
Does the policy cover security requirements for data and systems hosted on cloud
services?
Do changes to cloud-based systems follow the change management policy?