Reserve Bank of India (RBI) has issued directions on cyber resilience and digital payment security controls for non-bank Payment System Operators (PSOs).
To whom are the directions applicable?
The directions shall apply to all authorised non-bank Payment System Operators (PSOs).
To effectively manage cyber and technology related risks arising out of linkages of PSOs with unregulated entities (like payment gateways, third party service providers, vendors, etc.), PSOs shall ensure adherence to the directions by such unregulated entities as well, subject to mutual agreement.
What are different categories of non-bank PSOs?
- Large non-bank PSOs –
- Clearing Corporation of India Limited (CCIL)
- National Payments Corporation of India (NPCI)
- NPCI Bharat Bill Pay Limited
- Card Payment Networks
- Non-bank ATM Networks
- White Label ATM Operators (WLAOs)
- Large Prepaid Payment Instrument (PPI) Issuers
- Trade Receivables Discounting System (TReDS) Operators
- Bharat Bill Payment Operating Units (BBPOUs)
- Payment Aggregators (PAs)
- Medium non-bank PSOs –
- Cross-border (in-bound) Money Transfer Operators under Money Transfer Service Scheme (MTSS)
- Medium PPI Issuers
- Small non-bank PSOs –
- Small PPI Issuers
- Instant Money Transfer Operators
What are the timelines for complying with the directions?
To provide adequate time to put in place the necessary compliance structure, a phased implementation approach is prescribed as under –
Regulated Entity | Timeline |
Large non-bank PSOs | April 1, 2025 |
Medium non-bank PSOs | April 1, 2026 |
Small non-bank PSOs | April 1, 2028 |
If a PPI Issuer moves to a higher category, the timeline of the category to which it moves into, would apply. For instance, if a small (or medium) PPI issuer moves into medium (or large) category, it will need to comply with the directions within 2 (or 1) years from the time of new categorisation.
What are some of the important directions on cyber resilience and digital payment security controls for non-bank PSOs?
- The Board of Directors (Board) of the PSO shall be responsible for ensuring adequate oversight over information security risks, including cyber risk and cyber resilience. However, primary oversight may be delegated to a sub-committee of the Board, headed by a member with experience in information / cyber security, which shall meet at least once every quarter.
- The PSO shall formulate a Board approved Information Security (IS) policy to manage potential information security risks covering all applications and products concerning payment systems as well as management of risks that have materialised. The policy shall be reviewed annually.
- The PSO shall prepare a distinct Board approved Cyber Crisis Management Plan (CCMP) to detect, contain, respond and recover from cyber threats and cyber attacks.
- The Board shall entrust the responsibility and accountability for implementing the IS policy and the cyber resilience framework as well as for continuously assessing the overall IS posture of PSO to a senior level executive with expertise in areas of information security including cyber security [e.g. Chief Information Security Officer (CISO)].
- The PSO shall follow a ‘secure by design’ approach such as Secure-Software Development Life Cycle (S-SDLC) for design and development of products / services.
- To safeguard applications against risks emanating from insecure Application Programming Interfaces (APIs), the PSO shall put in place, inter-alia, the following measures –
- Authentication and Authorisation – Establish identity of the communicating applications.
- Confidentiality – Ensure that the message content is not tampered with.
- Integrity – Resources are reliably transferred.
- Availability and Threat Protection – APIs are available when needed; anomalous activities identified and mitigative action taken.
- Whenever there is a change in registered mobile number or email ID linked to the payment instrument there shall be a cooling period of minimum 12 hours before allowing any payment transaction through online modes / channels.
- Audit logs shall be preserved for at least 5 years.
What are the reporting requirements?
- Unusual incidents like cyber-attacks, outage of critical system / infrastructure, internal fraud, settlement delay, etc., shall be reported to RBI within 6 hours of detection.
- Any cyber security incident shall also be reported to Indian Computer Emergency Response Team (CERT-In).
References
Reserve Bank of India. (2024, July 30). 'Master Directions on Cyber Resilience and Digital Payment Security Controls for non-bank Payment System Operators'. Retrieved from https://www.rbi.org.in/Scripts/NotificationUser.aspx?Id=12715&Mode=0
Comments
Post a Comment