SEBI Control Mapping
SEBI Control Mapping
Customer
instances have
no access to
physical disk
devices, but
instead are
presented with
virtualized
disks. The AWS
proprietary
disk
virtualization
layer
automatically
erases every
block of
10 Data shall be encrypted at all Technical RE AWS offers https://docs.a
lifecycle stages (at rest, in services & ws.amazon.co
motion and in use), source or mechanisms m/whitepaper
location to ensure the for data s/latest/introd
confidentiality, privacy and encryption. RE uction-aws-
integrity. as per their use security/data-
10 RE shall retain complete Technical RE Data https://aws.a
ownership of all its data, ownership & mazon.com/bl
encryption keys, logs etc. processing ogs/security/a
residing in cloud. controls ddressing-data-
https://aws.a
mazon.com/co
mpliance/data-
https://aws.a
mazon.com/bl
ogs/security/t
10 Compliance with legal and Process RE
regulatory requirements,
including the requirements
provided in this framework,
has to be ensured by the RE at
all times.
10 The cloud deployments of RE Technical RE AWS provides
shall be monitored through mechanisms to
Security Operations Centre build &
(SOC) [in-house, third-party operate SOC,
SOC or a managed SOC]. there are also
10 The agreement between the Complianc RE & CSP AWS Customer https://aws.a
RE and CSP shall cover e Agreement & mazon.com/ag
security controls, legal and Shared reement/
regulatory compliances, clear Responsibility
demarcation of roles, and Model, Details
liabilities, appropriate services are covered in
and performance standards customer
etc. agreement as
https://aws.a
mazon.com/co
mpliance/shar
ed-
10 The reporting of compliance Process RE AWS provides https://aws.a
(with this framework) shall be mechanisms to mazon.com/co
done by the REs in their meet mpliance/
systems audit, cybersecurity compliance for
audit and VAPT reports, and it Security OF the
shall be done in the Cloud as well
standardized format notified as In the Cloud
by SEBI from time to time
e 2: Selection of Cloud Service Providers
21 The storage/ processing of Complianc RE AWS India has https://aws.a
data (DC, DR, near DR etc.) e two regions, mazon.com/bl
including logs and any other Mumbai is ogs/publicsect
data pertaining to RE in any empaneled or/aws-
form in cloud, should be done with MeiTY, achieves-full-
within the MeitY empaneled Hyderabad empanelment-
being new for-the-
valid STQC (or any other region is delivery-of-
equivalent agency appointed currently cloud-services-
by Government of India) audit under process by-indias-
status. for MeiTY ministry-of-
empanelment. electronics-
21 For selection of CSPs offering Complianc RE AWS India has https://aws.a
PaaS and SaaS services in e two regions, mazon.com/bl
India, the RE shall choose only Mumbai is ogs/publicsect
those CSPs which: empaneled or/aws-
with MeiTY, achieves-full-
Hyderabad empanelment-
being new for-the-
region is delivery-of-
currently cloud-services-
1. Utilize the underlying https://www.
infrastructure/ platform of meity.gov.in/c
only MeitY empaneled CSPs ontent/gi-
for providing services to RE. cloud-meghraj
2. Host the application/
platform/ services (DC, DR,
near DR, etc.) provided to the
RE as well as store/ process
data of the RE, only within the
data centers as empaneled by
MeitY and holding a valid
STQC (or any other equivalent
agency appointed by
Government of India) audit
status.
3. Have a back-to-back, clear
and enforceable agreement
with their partners/ vendors/
sub-contractors (including
those that provide the
underlying infrastructure/
platform) for ensuring their
compliance with respect to
the requirements provided in
this framework including
those in Principles 6 (Security
Controls), 7 (Contractual and
Regulatory Obligations) and 8
(BCP, Disaster Recovery &
Cyber resilience).
https://aws.a
mazon.com/co
mpliance/data-
https://aws.a
mazon.com/bl
ogs/security/t
Principle
3: Data
22 Data Ownership: The RE shall Complianc RE Data https://aws.a
retain the complete e Process Ownership & mazon.com/bl
ownership of all its data and related ogs/security/a
logs, encryption keys, etc. decisions are ddressing-data-
residing in cloud. The CSP shall under RE's residency-with-
be working only in a fiduciary control - aws
capacity. Therefore, the RE, storage,
SEBI and any other processing &
Government authority lifecycle
authorized under law, shall management,
always have the right to Encryption
access any or all of the data at
any or all point of time.
https://aws.a
mazon.com/co
mpliance/data-
https://aws.a
mazon.com/bl
ogs/security/t
22 Visibility: Whenever required Complianc CSP AWS supports https://aws.a
(by RE/ SEBI), the CSP shall e more security mazon.com/co
provide visibility to RE as well standards and mpliance/
compliance
infrastructure and processes, certifications
and its compliance to than any other
applicable policies and offering,
regulations issued by SEBI/ including PCI-
Government of India/ DSS,
respective state government. HIPAA/HITECH,
22 Data Localization: Complianc RE & CSP Data https://aws.a
e Ownership & mazon.com/bl
related ogs/security/a
decisions are ddressing-data-
In order to ensure that RE and
AWS provides
mechanism to
setup desired
Security
architecture
Security
27OF the Vulnerability Management Complianc RE & CSP AWS Security Details
and Patch Management: e performs available
regular under SOC 2
vulnerability Report (Page
scans on the 36)
host operating
systems, web
applications,
and databases
in the AWS
environment
using a variety
of tools
(Control
AWSCA-3.4).
AWS Security
1. RE shall ensure that CSP has https://aws.a
a vulnerability management mazon.com/se
process in place to mitigate curity/vulnera
vulnerabilities in all bility-
components of the services reporting/
that the CSP is responsible for
(i.e. managed by the CSP). The
RE shall assess and ensure
that the patch management
of CSP adequately covers the
components for which the CSP
is responsible (i.e.
components managed by the
CSP). The patch management
framework shall include the
timely patching of all
components coming under
the purview of CSP.
https://health.
aws.amazon.c
om/health/sta
28 Key Management: Wherever Complianc CSP AWS is https://aws.a
Key management is being e committed to mazon.com/ar
done by CSP for platform level protecting its tifact/
encryption (for example, full
disk encryption or VM level data and
encryption), RE shall assess maintaining
and ensure that the entire Key compliance
lifecycle management is being with applicable
done by CSP in a secure regulatory
manner. requirements.
This is
demonstrated
by the
consolidated
annual
operational
plan that
includes
regulatory and
compliance
SOC Report
28 & 29 Secure User Complianc RE & CSP While AWS Refer to the
Management:Wherever the e/Process follows Secure following AWS
user management is done by User Artifacts for
CSP, the RE shall ensure that Management additional
role based access and rule practice, CSP details: MTCS,
based access are strictly does not have HKMA TM-G-
followed by CSP for its users created 1, PCI 3.2, ISO
resources and it shall be based in REs 27001, ISO
on the principle of least enviornment. 27017, HIPAA,
privilege. The following shall IRAP, NIST 800-
also be ensured: 53 (FEDRAMP
1. Administrators and User access
privileged users shall be given privileges are
only minimal administrative restricted
capabilities for a pre-defined based on
time period, and in response business need
to specific issues/ needs. and job
responsibilities
. AWS employs
the concept of
least privilege,
allowing only
the necessary
access for
users to
accomplish
2. With respect to
administrative privileges/
users, the following shall also
be followed:
a. All administrative
privileges/ users shall be
tracked via a ticket/ request
by the CSP, and the same shall
be provided to the RE on
request. Further, the RE shall
also track any additional
privilege granted to any user
by the CSP.
b. Access to systems or
interfaces that could provide
Amazon Virtual
The objective
of this
architecture is
to isolate AWS
resources and
data in one
Amazon VPC
from another
Amazon VPC,
and to help
30 Safe Disposal: The RE shall Complianc RE & CSP Management SOC 2 Reports
ensure that the agreement e/Process of Media (Page 74)
with the CSP contains
clause(s) for safe deletion/
from data
creation/transfer/etc. in the
cloud till final expunging of
data.
https://aws.a
mazon.com/ar
Security IN
The Cloud Vulnerability Management
31 Technical RE AWS provides AWS Inspector
and Patch Management: mechanisms of
Vulnerabblity
scanning &
patch
Management
The RE shall have a well-
defined Vulnerability
Management policy in place
and should strictly adhere
with the same. The policy
should also address the
vulnerability management
aspects of the infrastructure
/services /etc. managed by RE
in the cloud. The components
managed by RE shall be up to
date in terms of
patches/OS/version etc. The
patch management policy
shall also mandate timely
patch application.
Or RE can bring AWS System
in their choice Manager