Chapter 2 - Trading Software and Technology - P
Chapter 2 - Trading Software and Technology - P
Page 1 of 142
Definition ................................................................................................................................. 51
Guidelines to the stock exchanges and the stock brokers ................................................ 51
8. ANNUAL SYSTEMS AUDIT ............................................................................. 56
8.1. Annual System Audit of Stock Exchanges .......................................................... 56
8.2. Annual System Audit of Stock Brokers ................................................................ 70
ANNEXURE ................................................................................................................... 71
9. BUSINESS CONTINUITY PLAN AND DISASTER RECOVERY ............. 97
9.1. Guidelines for Business Continuity Plan (BCP) and Disaster Recovery (DR) of
Market Infrastructure Institutions (MIIs) ........................................................................... 97
9.2. Business Continuity Plan (BCP) and Disaster Recovery (DR) framework –
Limited Purpose Clearing Corporation (LPCC) .............................................................. 101
10. CYBER SECURITY AND CYBER RESILIENCE........................................ 103
10.1. Cyber Security and Cyber Resilience framework for Stock Exchanges and
Clearing Corporations ......................................................................................................... 103
10.2. Cyber Security and Cyber Resilience framework – Limited Purpose Clearing
Corporation (LPCC) ............................................................................................................. 110
10.3. Strengthening Resiliency of Websites of Stock Exchanges, Clearing
Corporations and Depositories (MIIs) ............................................................................. 112
10.4. Bolstering Cyber Resiliency ................................................................................. 113
10.5. Comprehensive Review of Cyber Security at MIIs of Stock Exchanges, Clearing
Corporations and Depositories (MIIs) .............................................................................. 114
10.6. Cyber Security and Cyber Resilience framework of Stock Exchanges, Clearing
Corporations and Depositories .......................................................................................... 121
10.7. Cyber Security Operations Center for SEBI registered intermediaries.......... 129
10.8. Reporting for Artificial Intelligence (AI) and Machine Learning (ML)
applications and systems offered and used by Market Infrastructure Institutions (MIIs)
130
11. CO-LOCATION / PROXIMITY HOSTING ............................................... 132
11.1. Co-location / proximity hosting facility offered by stock exchanges ............ 132
11.2. Measures to strengthen Algorithmic Trading and Co-location/ proximity
Hosting Framework ............................................................................................................. 133
11.3. Review of guidelines for Co-location / proximity hosting facility offered by
stock exchanges .................................................................................................................... 137
12. CAPACITY PLANNING ................................................................................ 139
12.1. Capacity planning framework of stock exchanges and clearing corporations
139
Page 2 of 142
13. Data Feeds ......................................................................................................... 140
13.1. Capacity planning framework of stock exchanges and clearing corporations
140
14. REFERENCE: List of Circulars ...................................................................... 140
Page 3 of 142
1. INTERNET TRADING
1.1. Conditions to be met by Broker for providing Internet Based Trading Service1
1.1.1. To provide Internet Based Trading Service the broker will be required to apply
to the respective stock exchange for a formal permission. The stock exchange
should grant approval or reject the application as the case may be, and
communicate its decision to the member within 30 calendar days of the date of
completed application submitted to the exchange.
1.1.2. However before giving permission to broker to start internet based services,
stock exchange shall ensure that the broker meets the minimum condition of the
criteria’s’ mentioned in circular. The criteria are mentioned as below:
The broker must have a minimum net worth of Rs.50 lacs if the broker is
providing the Internet based facility on his own. However, if some brokers
collectively approach a service provider for providing the internet trading
facility, net worth criteria as stipulated by the stock exchange will apply. The
net worth will be computed as per the SEBI circular no FITTC/DC/CIR-1/98
dated June 16, 1998.
1.1.2.2.1. Operational Integrity – The Stock Exchange must ensure that the system
used by the broker has provision for security, reliability and
confidentiality of data through use of encryption technology. (Basic
minimum security standards are specified in following paras). The Stock
Exchange must also ensure that records maintained in electronic form by
the broker are not susceptible to manipulation.
1.1.2.2.2. System Capacity - The Stock Exchange must ensure that the brokers
maintain adequate backup systems and data storage capacity. The Stock
Exchange must also ensure that the brokers have adequate system
capacity for handling data transfer, and arranged for alternative means
of communications in case of Internet link failure.
Page 4 of 142
1.1.2.2.3. Qualified Personnel - The Stock Exchange must lay down the minimum
qualification for personnel to ensure that the broker has suitably
qualified and adequate personnel to handle communication including
trading instructions as well as other back office work which is likely to
increase because of higher volumes.
1.1.2.2.4. Written Procedures - Stock Exchange must develop uniform written
procedures to handle contingency situations and for review of incoming
and outgoing electronic correspondence.
1.1.2.2.5. Signature Verification/ Authentication - It is desirable that participants
use authentication technologies. For this purpose, it should be
mandatory for participants to use certification agencies as and when
notified by Government / SEBI. They should also clearly specify when
manual signatures would be required.
1.1.2.3.1. Know Your Client - The Stock Exchange must ensure that brokers
comply with all requirements of “Know Your Client” and have sufficient,
verifiable information about clients, which would facilitate risk
evaluation of clients.
1.1.2.3.2. Broker-Client Agreement - Brokers must enter into an agreement with
clients spelling out all obligations and rights. This agreement should also
include inter alia, the minimum service standards to be maintained by
the broker for such services specified by SEBI/Exchanges for the Internet
based trading from time to time. Exchanges will prepare a model
agreement for this purpose. The broker agreement with clients should
not have any clause that is less stringent/contrary to the conditions
stipulated in the model agreement prepared by the Exchanges for this
purpose.
1.1.2.3.3. Investor Information - The broker web site providing the internet based
trading facility should contain information meant for investor protection
such as rules and regulations affecting client broker relationship,
arbitration rules, investor protection rules etc. The broker web site
providing the Internet based trading facility should also provide and
display prominently, hyper link to the web site/ page on the web site of
the relevant stock exchange(s) displaying rules/ regulations/circulars.
Ticker/quote/order book displayed on the web-site of the broker should
Page 5 of 142
display the time stamp as well as the source of such information against
the given information.
1.1.2.3.4. Order/Trade Confirmation - Order/Trade confirmation should also be
sent to the investor through email at client’s discretion at the time period
specified by the client in addition to the other mode of display of such
confirmations on real time basis on the broker web site. The investor
should be allowed to specify the time interval on the web site itself within
which he would like to receive this information through email. Facility
for reconfirmation of orders which are larger than that specified by the
member’s risk management system should be provided on the internet
based system.
1.1.2.3.5. Handling Complaints by Investors - Exchanges should monitor
complaints from investors regarding service provided by brokers to
ensure a minimum level of service. Exchange should have separate cell
specifically to handle Internet trading related complaints. It is desirable
that exchanges should also have facility for on-line registration of
complaints on their web-site.
1.1.2.4.1. Exchanges must ensure that brokers have a system-based control on the
trading limits of clients, and exposures taken by clients. Brokers must set
pre-defined limits on the exposure and turnover of each client.
1.1.2.4.2. The broker systems should be capable of assessing the risk of the client
as soon as the order comes in. The client should be informed of
acceptance/rejection of the order within a reasonable period. In case
system based control rejects an order because of client having exceeded
limits etc., the broker system may have a review and release facility to
allow the order to pass through.
1.1.2.4.3. Reports on margin requirements, payment and delivery obligations, etc.
should be informed to the client through the system.
Page 6 of 142
1.1.2.4.3.3. Others – The other criteria’s mentioned deal with Network Security
Protocols and Interface Standards, Network Security, Standards of
Web Interface Protocols and System operations.
1.2.1. A broker providing stock trading through WAP must be a SEBI registered
broker who also has an Internet website which complies with all the
requirements laid down by SEBI in its circular no. SMDRP/Policy/Cir-06/2000
dated January 31, 2000. With regard to the requirements mentioned in the
aforesaid circular, some additional requirements are to be met by the broker for
providing securities transaction through WAP. These requirements are
provided in the following criteria’s:
1.2.1.1.1. The break in data encryption at the WAP gateway server raises security
issues. Until the shortcoming is addressed by WAP, the WAP server
should be hosted by the broker itself and not by a third party.
1.2.1.1.2. Suitable firewalls should be installed between trading set-up directly
connected to an Exchange trading system and the WAP server.
1.2.1.1.3. WTLS (Wireless Transport Layer Security) level security or a higher level
of security (as and when available) for wireless communication is
mandatory for wireless transactions.
1.2.1.1.4. The WTLS encrypts data upto the WAP Gateway server. Transmission
from the WAP Gateway server to the Internet server should be secured
using Secured Socket Level Security, preferably with 128 bit encryption,
for server access through Internet. Alternately, the WAP Gateway server
and Internet server may be co-hosted. The server resource should not be
shared for any other applications.
Page 7 of 142
1.2.1.1.5. The following security measures applicable for fixed Internet based
systems should be made mandatory:
1.2.1.1.5.1. User ID
1.2.1.1.5.2. First Level password (Private code)
1.2.1.1.5.3. Automatic expiry of passwords at the end of a reasonable duration.
Reinitialize access on entering fresh passwords
1.2.1.1.5.4. All transaction logs with proper audit facilities to be maintained in the
system.
1.2.1.3.1. Brokers should follow the similar logic/priorities used by the Exchange
to treat client orders.
1.2.1.3.2. Orders/ trades placed through either fixed Internet or WAP system
should be accessible from both systems.
1.2.1.3.3. Brokers should maintain all activities/ alerts log with audit trail facility.
1.2.1.3.4. Broker Web Server should have internally generated unique numbering
for all client order/trades.
Page 8 of 142
1.2.1.4. Risk Management
1.3.1. It has been decided that SEBI registered brokers who provide Internet Based
Trading as specified by SEBI circular no. SMDRP/POLICY/CIR-06/2000 dated
January 31, 2000 shall be eligible to provide securities trading using wireless
technology. All relevant requirements applicable to internet based trading shall
also be applicable to securities trading using wireless technology.
1.3.2. Securities Trading using Wireless technology shall include devices such as
mobile phone, laptop with data card, etc, that use Internet Protocol (IP).
1.3.3. In addition, the stock exchange shall ensure that the broker complies with the
following:
1.3.3.1. There shall be secure access, encryption and security of communication for
internet based trading and securities trading using wireless technology. DOT
policy and regulation shall govern the level of encryption.
1.3.3.2. Adequate measures should be taken for user identification, authentication
and access control using means such as user-id, passwords, smart cards,
biometric devices or other reliable means, to prevent misuse of facility by
unauthorized persons.
1.3.3.3. Unique identification number as given in case of internet based trading shall
be made applicable for securities trading using wireless technology.
1.3.3.4. In case of failure of the wireless network, alternative means of
communication for placing orders should be available.
1.3.3.5. Additional provisions specifying possible risks, responsibilities and
liabilities associated with securities trading using wireless technology should
be incorporated in the Broker-Client agreement as an addendum or by
bringing to the notice of clients, who are desirous of availing such facility,
and taking their concurrence on the same.
1.3.3.6. As it may not be possible to give detailed information to the investor on a
hand held device e.g. mobile phones, it may be ensured that minimum
Page 9 of 142
information may be given with addresses of the Internet web site/web page
where detailed information would be available.
1.3.3.7. Order confirmation should be provided to the user on submitting the order.
Order modification / cancellation facilities should also be provided. Trade
confirmation should be provided to the user, along with history of trades for
the day.
1.3.3.8. Session login details should not be stored on the devices used for internet
based trading and securities trading using wireless technology.
1.3.3.9. Network security protocols and interface standards should be as per
prevalent industry standards and sound audit trails should be available for
all transactions conducted using wireless devices.
1.3.3.10. The broker’s server routing orders to the exchange trading system shall be
located in India.
1.3.3.11. Stock exchanges shall arrange for periodic systems audits of broker systems
to ensure that requirements specified in the circulars are being met.
1.3.3.12. Stock exchange shall also include securities trading using wireless
technology in their ongoing investor awareness and educational programme
1.4. Additional Requirements for Internet Based Trading (IBT) and Securities
trading using Wireless Technology (STWT)4
1.4.1. The stock exchange shall ensure that the broker comply with the following:
1.4.1.1. The broker shall capture the IP (Internet Protocol) address (from where the
orders are originating), for all IBT/ STWT orders.
1.4.1.2. The brokers system should have built-in high system availability to address
any single point failure.
1.4.1.3. There should be secure end-to-end encryption for all data transmission
between the client and the broker through a Secure Standardized Protocol. A
procedure of mutual authentication between the client and the broker server
should be implemented.
1.4.1.4. The broker system should have adequate safety features to ensure it is not
susceptible to internal/ external attacks.
1.4.1.5. In case of failure of IBT/ STWT, the alternate channel of communication shall
have adequate capabilities for client identification and authentication.
Page 10 of 142
1.4.1.6. Two-factor authentication for login session may be implemented for all
orders emanating using Internet Protocol. Public Key Infrastructure (PKI)
based implementation using digital signatures, supported by one of the
agencies certified by the government of India, is advisable. Further the two
factors in the Two-factor authentication framework should not be same.
1.4.1.7. In case of no activity by the client, the system should provide for automatic
trading session logout.
1.4.1.8. Further to the above, the following practice is advisable –
1.4.1.8.1. The back-up and restore systems implemented by the broker should be
adequate to deliver sustained performance and high availability. The
broker system should have on-site as well as remote site back-up
capabilities.
Page 11 of 142
2. DIRECT MARKET ACCESS FACILITY5
2.1. Direct Market Access (DMA) is a facility which allows brokers to offer clients
direct access to the exchange trading system through the broker’s infrastructure
without manual intervention by the broker. Some of the advantages offered by
DMA are direct control of clients over orders, faster execution of client orders,
reduced risk of errors associated with manual order entry, greater transparency,
increased liquidity, lower impact costs for large orders, better audit trails and
better use of hedging and arbitrage opportunities through the use of decision
support tools / algorithms for trading.
2.2. While ensuring conformity with the provisions of the Securities Contract
(Regulations) Act, 1956 (42 of 1956), Stock Exchanges may facilitate Direct Market
Access for investors subject to the following conditions:
2.2.1.1. Brokers interested to offer DMA facility shall apply to the respective stock
exchanges giving details of the software and systems proposed to be used,
which shall be duly certified by a Security Auditor as reliable.
2.2.1.2. The stock exchange should grant approval or reject the application as the case
may be, and communicate its decision to the member within 30 calendar days
of the date of completed application submitted to the exchange.
2.2.1.3. The stock exchange, before giving permission to brokers to offer DMA facility
shall ensure the fulfillment of the conditions specified hereinafter.
2.2.2.1. All DMA orders shall be routed to the exchange trading system through the
broker’s trading system. The broker’s server routing DMA orders to the
exchange trading system shall be located in India.
2.2.2.2. The broker should ensure sound audit trail for all DMA orders and trades,
and be able to provide identification of actual user-id for all such orders and
trades. The audit trail data should available for at least 5 years.
Page 12 of 142
2.2.2.3. Exchanges should be able to identify and distinguish DMA orders and trades
from other orders and trades. Exchanges shall maintain statistical data on
DMA trades and provide information on the same to SEBI on a need basis.
2.2.2.4. The DMA system shall have sufficient security features including password
protection for the user ID, automatic expiry of passwords at the end of a
reasonable duration, and re-initialisation of access on entering fresh
passwords.
2.2.2.5. In case where the clients access the DMA server of the broker through a third
party service provider, the password maintenance and authentication can be
done either by the broker of by third party network service provider, so long
as the exchange/broker ensures secured access and communication and a
sound audit trail for all DMA orders/ trades. The authorized user and client
details should be part of the order details received and authenticated at the
DMA server of the broker.6
2.2.2.6. Brokers should follow the similar logic/priorities used by the Exchange to
treat DMA client orders. Brokers should maintain all activities/ alerts log
with audit trail facility. The DMA Server should have internally generated
unique numbering for all such client order/trades.
2.2.2.7. A systems audit of the DMA systems and software shall be periodically
carried out by the broker as may be specified by the exchange and certificate
in this regard shall be submitted to the exchange.
2.2.2.8. The exchanges and brokers should provide for adequate systems and
procedures to handle the DMA trades.
2.2.3.1. Exchange shall specify from time to time the categories of investors to whom
the DMA facility can be extended. Currently, this facility is available for
institutional clients. Brokers shall specifically authorize clients or investment
managers acting on behalf of clients for providing DMA facility, after
fulfilling Know Your Client requirements and carrying out necessary due
diligence. The broker shall maintain proper records of such due diligence.
2.2.3.2. In order to bring uniformity on the requirement of documentation for trading
account opening process, in view of the SEBI circular no
CIR/MIRSD/16/2011 dated August 22, 2011, the specific Broker – Client
Page 13 of 142
Agreement for the purpose of DMA shall be replaced with the “Terms and
Condition” document as specified at Annexure I. The “Terms and
Conditions” shall be provided to the client or investment manager acting on
behalf of a client (s) for availing the DMA facility. In case the DMA facility
provided by the stock broker is used by the client the paragraphs one to
eighteen of Part A of Annexure-I shall be applicable. In case the DMA facility
provided by the stock broker is used by the client through an investment
manager the paragraphs one to eighteen of Part B of Annexure-I shall be
applicable and additionally, the investment manager shall provide to the
stock broker the details as specified at Annexure-II.
2.2.4.1. The facility of DMA provided by the stock broker shall be used by the client
or an investment manager of the client. A SEBI registered entity shall be
permitted to act as an investment manager on behalf of institutional clients.
In case the facility of DMA is used by the client through an investment
manager, the investment manager may execute the necessary documents on
behalf of the client(s).
2.2.4.2. The exchange/ broker shall ensure that proper audit trails are available to
establish identity of the ultimate client.
2.2.5.1. The broker shall ensure that trading limits/ exposure limits/ position limits
are set for all DMA clients based on risk assessment, credit quality and
available margins of the client. The broker system shall have appropriate
authority levels to ensure that the limits can be set up only by persons
authorized by the risk / compliance manager.
2.2.5.2. The broker shall ensure that all DMA orders are routed through
electronic/automated risk management systems of the broker to carry out
appropriate validations of all risk parameters including Quantity Limits,
Price Range Checks, Order Value, and Credit Checks before the orders are
released to the Exchange.
2.2.5.3. All DMA orders shall be subjected to the following limits:
Page 14 of 142
2.2.5.3.1. Order quantity / order value limit in terms of price and quantity
specified for the client.
2.2.5.3.2. All the position limits which are specified in the derivatives segment as
applicable.
2.2.5.3.3. Net position that can be outstanding so as to fully cover the risk
emanating from the trades with the available margins of the specific
client.
2.2.5.3.4. Appropriate limits for securities which are subject to FII limits as
specified by RBI.
2.2.5.4. The broker may provide for additional risk management parameters as they
may consider appropriate.
2.2.6.1. The broker shall be fully responsible and liable for all orders emanating
through their DMA systems. It shall be the responsibility of the broker to
ensure that only clients who fulfill the eligibility criteria are permitted to use
the DMA facility.
2.2.7.1. Brokers using DMA facility for routing client orders shall not be allowed to
cross trades of their clients with each other. All orders must be offered to the
market for matching.
Page 15 of 142
ANNEXURE I
TERMS AND CONDITIONS
PART – A: DMA FACILITY USED BY THE CLIENT
1. The client is expected to be fully aware of the risks associated with the market and the
financial instruments being traded on stock exchanges through DMA. The client shall
be responsible for complying with laws, rules, regulations, notifications etc issued by
regulatory authorities as may be applicable from time to time.
2. The client shall ensure that DMA facility provided by the Broker is used only to
execute the trades of the client and shall not be used for transactions on behalf of any
other person / entity.
3. The client shall be responsible for ensuring that, only persons authorized by it shall
access and use the DMA facility provided by the Broker. All orders originating from
such facility / system shall be deemed to be authorized by the client.
4. Where the client accesses or proposes to access the Broker’s DMA platform through
external applications, including but not restricted to services of third party service
provider(s), own application(s), etc., the client shall ensure that such applications have
adequate security features including but not limited to access controls, password
protection etc; and that appropriate agreement(s) with such third party service
provider(s) etc. for ensuring secured access and communication has been executed
and are in place.
5. The client shall ensure that no person authorized by them to place orders through
DMA facility provided by the broker has been / is involved in any adverse action by
any regulatory authorities in any jurisdiction.
6. The client shall provide the names of authorized individual users to the broker prior
to placing DMA orders.
7. The client shall not use or allow the use of DMA facility to engage in any form of
market misconduct including insider trading and market manipulation or conduct
that is otherwise in breach of applicable laws, rules and regulation.
8. The client is aware that Algorithmic trading i.e. generation of orders using automated
execution logic is governed by Algorithmic trading guidelines issued by SEBI and
Page 16 of 142
Exchanges and requires prior approval of the exchanges. The client shall ensure that
new algorithms and changes to existing approved algorithms are not used through
the DMA facility without prior approval of concerned stock exchanges. The client
shall ensure that it has necessary checks and balances, in place to identify and control
dysfunctional algorithms and the Broker shall have the right to shut down the DMA
facility and remove any outstanding client orders in case of any suspected
dysfunctional algo.
9. The client is aware that authentication technologies and strict security measures are
required for routing orders through DMA facility and undertakes to ensure that the
password of the client and/or his representative are not revealed to any third party.
10. The client acknowledges that all DMA orders placed by them through the DMA
facility would be validated by the risk management system of the broker. The Broker
has the right to accept or reject any DMA order placed by the client at its sole
discretion.
11. The client shall be solely responsible for all acts or omissions of any person using a
DMA facility and shall be bound to accept and settle all transactions executed through
the DMA facility provided by the Broker notwithstanding that such order(s) may have
been submitted erroneously or by an unauthorized user, or that its data is inaccurate
or incomplete when submitted, or the client subsequently determines for whatever
reason that the order should not have been submitted.
12. The client shall notify the Broker in the event of DMA facility being compromised.
Upon receipt of this notice, client’s DMA facility shall be promptly disabled but the
client shall continue to be responsible for any misuse of the DMA facility or any orders
placed through the DMA facility as a result of the compromise of the DMA facility at
their end. The Broker shall not be liable for any loss, liability or cost whatsoever
arising as a result of any unauthorized use of DMA facility at the client’s end.
13. In the event of winding-up or insolvency of the client or his otherwise becoming
incapable of settling their DMA obligation, broker may close out the transaction of the
client as permissible under bye-laws, rules, regulations of the exchanges. The client
shall continue to be liable for any losses, costs, damages arising thereof.
Page 17 of 142
14. The client is fully aware of the risks of transmitting DMA orders to the Broker’s DMA
facility through vendor systems or service providers and the Broker is not responsible
for such risks.
15. The client should be aware of the fact that neither the DMA facility will be
uninterrupted nor error free nor the results that may be obtained from the use of the
service or as to the timeliness, sequence, accuracy, completeness, reliability or content
of any information, service or transaction provided through DMA. The DMA service
is provided on an "as is", "as available" basis without warranties of any kind, either
express or implied, including, but not limited to, those of information access, order
execution, merchantability and fitness for a particular purpose. The Broker shall not
be liable for any loss, damage or injury including but not limited to direct lost profits
or trading losses or any consequential, special, incidental, indirect, or similar damages
from the use or inability to use the service or any part thereof.
16. The Broker shall have the right to withdraw the DMA facility in case of:-
a. Breach of the limits imposed by the broker or any regulatory authority.
b. On account of any misuse of the DMA facility by the client or on instructions from
SEBI/Exchanges.
c. Any other reason, at the discretion of the broker
Broker shall endeavor to give reasonable notice to the client in such instances
17. The Broker shall not be liable or responsible for non-execution of the DMA orders of
the client due to any link/system failure at the client/ Broker/ exchange(s) end.
18. This document shall not be altered, amended and /or modified by the parties in a
manner that shall be in contravention of any other provisions of this document. Any
additional terms and conditions should not be in contravention with rules /
regulations /bye-laws/circulars, of the relevant authorities including applicable stock
exchanges as amended from time to time.
Page 18 of 142
PART – B: DMA FACILITY USED BY THE CLIENT THROUGH AN INVESTMENT
MANAGER
1. The client shall be solely responsible for all acts or omissions of any person using a
DMA facility and shall be bound to accept and settle all transactions executed through
the DMA facility provided by the Broker to the investment manager acting on behalf
of the client, notwithstanding that such order(s) may have been submitted
erroneously or by an unauthorized user, or that its data is inaccurate or incomplete
when submitted, or the client subsequently determines for whatever reason that the
order should not have been submitted.
2. The investment manager is expected to be fully aware of the risks associated with the
market and the financial instruments being traded on stock exchanges through DMA.
The investment manager shall be responsible for complying with laws, rules,
regulations, notifications etc issued by regulatory authorities as may be applicable
from time to time.
3. Where the DMA facility provided by the Broker is used to execute trade on behalf of
one or more clients, by the investment manager, then it is represented and warranted
that, at each time an order is placed by such investment manager through the DMA
facility of the Broker -
a. The investment manager has due authority to deal on behalf of the client(s)
through the Broker, specifying the roles and responsibilities of the investment
manager in execution of transactions on behalf of the client(s).
b. The investment manager shall comply with any applicable laws, rules and
regulations affecting or relating to trading operations.
c. The investment manager and the client(s) are bound by the terms and conditions
hereof;
d. The investment manager using the DMA facility for routing client(s) orders shall
not cross trades of their client(s) with each other. Accordingly, all orders should
be offered in the market.
e. The stock exchange or SEBI may at any time call for any information from a
client(s) or an investment manager acting on behalf of the client(s) with respect to
any matter relating to the activity of the investment manager. The investment
manager shall also furnish any information specifying the roles and
responsibilities of the investment manager in execution of transactions on behalf
of the client(s), as and when required by the exchanges or SEBI.
Page 19 of 142
4. The investment manager shall be responsible for ensuring that, only persons
authorized by it shall access and use the DMA facility provided by the Broker. All
orders originating from such facility / system shall be deemed to be authorized by
the client.
5. Where the investment manager accesses or proposes to access the Broker’s DMA
platform through external applications, including but not restricted to services of
third party service provider(s), own application(s), etc., the investment manager shall
ensure that such applications have adequate security features including but not
limited to access controls, password protection etc; and that appropriate agreement(s)
with such third party service provider(s) etc. for ensuring secured access and
communication has been executed and are in place.
6. The investment manager shall ensure that no person authorized by them to place
orders through DMA facility provided by the broker has been / is involved in any
adverse action by any regulatory authorities in any jurisdiction.
7. The investment manager shall provide the names of authorized individual users to
the broker prior to placing DMA orders.
8. The investment manager shall not use or allow the use of DMA facility to engage in
any form of market misconduct including insider trading and market manipulation
or conduct that is otherwise in breach of applicable laws, rules and regulation.
9. The investment manager is aware that Algorithmic trading i.e. generation of orders
using automated execution logic is governed by Algorithmic trading guidelines
issued by SEBI and Exchanges and requires prior approval of the exchanges. The
investment manager shall ensure that new algorithms and changes to existing
approved algorithms are not used through the DMA facility without prior approval
of concerned stock exchanges. The investment manager shall ensure that it has
necessary checks and balances, in place to identify and control dysfunctional
algorithms and the Broker shall have the right to shut down the DMA facility and
remove any outstanding client orders in case of any suspected dysfunctional algo.
10. The investment manager is aware that authentication technologies and strict security
measures are required for routing orders through DMA facility and undertakes to
Page 20 of 142
ensure that the password of the investment manager and/or his representative are
not revealed to any third party.
11. The investment manager acknowledges that all DMA orders placed by them through
the DMA facility would be validated by the risk management system of the broker.
The Broker has the right to accept or reject any DMA order placed by the investment
manager at its sole discretion.
12. The investment manager shall notify the Broker in the event of DMA facility being
compromised. Upon receipt of this notice, client’s DMA facility shall be promptly
disabled but the client shall continue to be responsible for any misuse of the DMA
facility or any orders placed through the DMA facility as a result of the compromise
of the DMA facility at their end. The Broker shall not be liable for any loss, liability or
cost whatsoever arising as a result of any unauthorized use of DMA facility at the
client’s end.
13. In the event of winding-up or insolvency of the client or his otherwise becoming
incapable of honoring their DMA obligation, broker may close out the transaction of
the client as permissible under bye-laws, rules, regulations of the exchanges. The
client shall continue to be liable for any losses, costs, damages arising thereof.
14. The investment manager is fully aware of the risks of transmitting DMA orders to the
Broker’s DMA facility through vendor systems or service providers and the Broker is
not responsible for such risks.
15. The investment manager should be aware of the fact that neither the DMA facility will
be uninterrupted nor error free nor the results that may be obtained from the use of
the service or as to the timeliness, sequence, accuracy, completeness, reliability or
content of any information, service or transaction provided through DMA. The DMA
service is provided on an "as is", "as available" basis without warranties of any kind,
either express or implied, including, but not limited to, those of information access,
order execution, merchantability and fitness for a particular purpose. The Broker shall
not be liable for any loss, damage or injury including but not limited to direct lost
profits or trading losses or any consequential, special, incidental, indirect, or similar
damages from the use or inability to use the service or any part thereof.
16. The Broker shall have the right to withdraw the DMA facility in case of:
a. Breach of the limits imposed by the broker or any regulatory authority.
Page 21 of 142
b. On account of any misuse of the DMA facility by the client/ investment manager
or on instructions from SEBI/Exchanges.
c. Any other reason, at the discretion of the broker
Broker shall endeavor to give reasonable notice to the client in such instances.
17. The Broker shall not be liable or responsible for non-execution of the DMA orders of
the client due to any link/system failure at the client/Broker/exchange(s) end.
18. This document shall not be altered, amended and /or modified by the parties in a
manner that shall be in contravention of any other provisions of this document. Any
additional terms and conditions should not be in contravention with
rules/regulations /bye-laws/circulars, of the relevant authorities including
applicable stock exchanges as amended from time to time.
ANNEXURE II
On the letter head of the Investment manager
PART A
PART B
CLIENT(s) DETAILS:
Page 22 of 142
3. ELECTRONIC CONTRACT NOTE
The contract notes can be issued by the brokers in electronic form authenticated
by means of digital signatures.
All the members of stock exchanges who are desirous of issuing Electronic
Contract Notes (ECNs) to their clients shall comply with the following conditions:
The digitally signed ECNs may be sent only to those clients who have opted to
receive the contract notes in an electronic form, either in the Member – Client
agreement / Tripartite agreement or by a separate letter. The mode of
confirmation shall be as per the agreement entered into with the clients.
The usual mode of delivery of ECNs to the clients shall be through e-mail. For
this purpose, the client shall provide an appropriate e-mail account to the
member which shall be made available at all times for such receipts of ECNs.
Page 23 of 142
3.3.3. Requirement of digital signature
All ECNs sent through the e-mail shall be digitally signed, encrypted, non-
tamperable and shall comply with the provisions of the IT Act, 2000. In case the
ECN is sent through e-mail as an attachment, the attached file shall also be
secured with the digital signature, encrypted and non-tamperable.
3.3.4.1. Acknowledgement
3.3.4.2.1. The proof of delivery i.e., log report generated by the system at the time
of sending the contract notes shall be maintained by the member for the
specified period under the extant regulations of SEBI/stock exchanges
and shall be made available during inspection, audit, etc.
3.3.4.2.2. The member shall clearly communicate to the client in the agreement
executed with the client for this purpose that non-receipt of bounced mail
notification by the member shall amount to delivery of the contract note
at the e-mail ID of the client.
3.3.4.3.1. The log report shall also provide the details of the contract notes that are
not delivered to the client/e-mails rejected or bounced back.
3.3.4.3.2. Also, the member shall take all possible steps (including settings of mail
servers, etc.) to ensure receipt of notification of bounced mails by the
member at all times within the stipulated time period under the extant
regulations of SEBI/stock exchanges.
Page 24 of 142
3.3.5. When to issue or send in Physical mode
In the case of those clients who do not opt to receive the contract notes in the
electronic form, the member shall continue to send contract notes in the
physical mode to such clients.
Wherever the ECNs have not been delivered to the client or has been rejected
(bouncing of mails) by the e-mail ID of the client, the member shall send a
physical contract note to the client within the stipulated time under the extant
regulations of SEBI/stock exchanges and maintain the proof of delivery of
such physical contract notes.
In order to enable clients to access the ECNs posted in the designated website
in a secured way, the member shall allot a unique user name and
password for the purpose, with an option to the client to access the same and
save the contract note electronically or take a print out of the same.
The member shall retain/archive such electronic documents as per the extant
rules/regulations/circulars/guidelines issued by SEBI/Stock Exchanges
from time to time.
Page 25 of 142
3.4. Format for Issuance of Electronic Contract Notes12
3.4.1. The format of the electronic contract notes, prescribed by the exchanges were
not in conformity with the format of the physical contract note particularly with
respect to the pre-printed terms and conditions. Hence members issuing
electronic contract notes were also issuing physical contract notes which
amounted to duplication and unnecessary reconciliation between the physical
and electronic contract notes.
3.4.2. In order to streamline the issuance of electronic contract notes as a legal
document like the physical contract note, the exchanges are advised to
implement the following:
3.4.2.1. The exchanges would prescribe a standard format for the electronic contract
note (based on the model format prescribed in Annexure (for Equity) and (for
Debt13) in its bye-laws, rules and regulations.
3.4.2.2. The exchange bye-laws, rules and regulations for issuance of electronic
contract note shall be amended to include all the standard pre-printed terms
and conditions in the physical contract note. The electronic contract note
would mention the relevant bye-laws / rules / regulations of the exchange
subject to which the said contract note is being issued.
3.4.2.3. The exchange shall also modify / amend other relevant bye-laws, rules and
regulations with respect to signing of the electronic contract note with a
digital signature so as to make the modified format of the electronic contract
note a valid legal document like the physical contract note.
3.4.2.4. The mechanism of record keeping of electronic contract notes in a soft non-
tamperable form shall be prescribed by the exchange in compliance with the
provisions of the IT Act, 2000.
Page 26 of 142
4. STRAIGHT THROUGH PROCESSING
4.1. Mechanism14
4.2.1. While several STP Service Providers provide STP service to the market
participants to resolve the issue of inter-operability between the STP Service
Providers it was decided in consultation with the stock exchanges and the STP
Service Providers that a STP Centralised Hub would be setup.
4.2.2. The system flow for the STP framework shall be as follows:
4.2.2.1. STP user intending to send an instruction would send the message to his STP
service provider after digitally signing the same.
4.2.2.2. The STP service provider would verify the signature of the STP user and
forward it to the
4.2.2.2.1. recipient STP user, if the recipient STP user is availing services of the same
STP service provider; or the
Page 27 of 142
4.2.2.2.2. STP centralized hub if the recipient STP user is not with the same STP
service provider. In such a case the STP service provider would be
required to prepare a message as per the STP centralized hub prescribed
message format, enclose the user’s message, digitally sign the message and
then send it to the STP centralized hub
4.2.2.3. On receipt of the message by the STP centralized hub, the STP centralized
hub would:
4.2.2.3.1. verify the signature of the sending STP service provider only.
4.2.2.3.2. send an acknowledgment to the sending STP service provider.
4.2.2.4. The STP centralized hub would forward the message to the recipient STP
service provider after digitally signing on the message.
4.2.2.5. The recipient STP service provider on receipt of the message from the STP
centralized hub shall verify the signature of the STP centralized hub, verify
if the recipient STP user is associated with it and send an appropriate
acknowledgment with digital signature to the STP centralized hub. The STP
centralized hub would in turn forward the acknowledgment (received from
the recipient STP service provider) duly signed to the sending STP service
provider.
4.2.2.6. The recipient STP service provider shall forward the message to the recipient
STP user. The recipient STP user would receive the message and verify the
signature of the recipient STP service provider and sending STP user.
4.2.3. To enable inter-operation, the STP centralized hub would provide a utility /
client software to the STP service provider. The STP service provider’s point of
interface with the STP centralized hub would be through this utility / client
software. The PKI (Public key infrastructure) system for the interface shall be
implemented at a later stage.
Page 28 of 142
4.2.4. The block diagram of the entire STP System is enclosed in Annexure I.
4.3. SEBI (STP centralised hub and STP service providers) Guidelines, 200416
4.3.1. SEBI in order to regulate the STP service has issued the SEBI (STP centralised
hub and STP service providers) Guidelines, 2004 (herein referred to as “STP
Guidelines”) which also prescribe the model agreement between the STP
centralised hub and the STP service providers.
4.3.2. The STP guidelines prescribe the eligibility criteria and conditions of approval
for the STP centralised hub and the STP service providers, obligations and
responsibilities of the STP centralised hub and the STP service providers and
code of conduct for the STP service providers. The STP centralised hub and the
STP service providers shall abide by these Guidelines.
4.3.3. To prescribe contractual obligations between the STP centralised hub and the
STP service providers and to facilitate standardisation of service, a model
agreement between the STP centralised hub and the STP service providers has
also been prescribed by SEBI and is prescribed as Schedule II of the STP
Guidelines. The agreement between the STP centralised hub and the STP service
provider shall include the provisions included in the model agreement.
Page 29 of 142
4.4. Work flow for institutional investors17
4.4.1. SEBI in consultation with the STP centralized hub, STP service providers and
the STP users has prescribed the transaction work flow for the STP system. All
institutional investors shall follow the following transaction work flow on a
mandatory basis from July 1, 2004:
4.4.1.1. A contract note in electronic form in the prescribed format (IFN 515
messaging format) shall be issued by the broker & sent to the custodian and/
or the institutional investor.
4.4.1.2. In case the contract note is processed directly by the institutional investor,
the institutional investor shall send the trade confirmation of acceptance or
rejection of the contract note to the broker by using the IFN 598 messaging
format. The custodian shall also send the confirmation of acceptance or
rejection of such contract note to the broker using the messaging standard
IFN 548.
4.4.1.3. In case the contract note is processed by the custodian on behalf of the
institutional investor, the custodian shall send the confirmation of acceptance
or rejection of the contract note to the broker by using the IFN 548 messaging
format.
4.4.1.4. The institutional investor shall send settlement instructions to its custodian
in IFN 540 to IFN 543 messaging formats to the custodian for the following
trade types:
4.4.1.4.1. IFN 540: settlement instruction for a clearing house buy trade
4.4.1.4.2. IFN 541: settlement instruction for a delivery-v/s-payment (DVP) buy
trade
4.4.1.4.3. IFN 542: settlement instruction for a clearing house sell trade
4.4.1.4.4. IFN 543: settlement instruction for a delivery-v/s-payment (DVP) sell
trade
4.4.1.5. The custodian shall confirm/ reject the execution of the settlement
instructions to the institutional investor in IFN 544 to IFN 547 messaging
formats in the following manner:
Page 30 of 142
4.4.1.5.2. IFN 545: confirmation / rejection of an instruction received in messaging
format IFN 541
4.4.1.5.3. IFN 546: confirmation / rejection of an instruction received in messaging
format IFN 542
4.4.1.5.4. IFN 547: confirmation / rejection of an instruction received in messaging
format IFN 543
4.4.1.6. It is clarified that if a message (for the activities mentioned above) is sent
using the STP centralised hub framework from one user to another user, then
the confirmation / rejection for such a message shall also be sent using the
STP centralised hub framework.
4.4.2. SEBI vide circular no. DNPD/Cir-9/04 dated February 3, 2004 had prescribed
the format of the contract note in electronic form. After deliberation with the
STP service providers and the market participants the following changes have
been incorporated to the existing messaging format (IFN 515):
4.4.2.2. The clause of ‘payment of consolidated stamp duty’ for each contract note
shall be mentioned in the broker-client agreement and the tripartite
agreement between the broker-AP-client agreement (if applicable). The said
clause may be stated in the free text field (as mentioned in point 2 (a) (iii)
above) of each contract note.
4.4.2.3. In the field "market type" (field 70E) a category of ‘TT’ i.e. trade for trade and
‘OT’ i.e. Others shall be added to represent the supplementary categories of
market types.
Page 31 of 142
4.4.2.4. The order time was prescribed as a mandatory field in the contract note. The
order time shall now be included in the optional fields.
4.4.2.5. There are certain securities which are not de-materalised and hence do not
have an ISIN code. For such securities (where ISIN number is not available)
the STP users would be required to input the security code given by the
exchange in the ISIN number field. In case the number length of the exchange
scrip code is shorter than the prescribed field length of 12 characters, the code
shall be prefixed with zeros.
4.4.2.6. In order to maintain a complete audit trail, it is clarified that in case an
electronic contract note is rejected, the custodian (in messaging format IFN
548) or the fund manager (in messaging format IFN 598) shall be required to
send a rejection message to the broker. Only on receipt of the rejection
message, the broker shall cancel the rejected contract note and issue a fresh
contract note bearing a new number.
4.4.2.7. In order to bring in standardisation in the input of the identification codes in
the prescribed messaging standards, it is clarified that the following codes
shall be used by the various entities:
4.4.2.8. All market participants shall issue the electronic contract note for
institutional trades in the modified format enclosed in Annexure I.
4.4.3. The prescribed messaging formats for IFN 540, IFN 541, IFN 542, IFN 543, IFN
544, IFN 545, IFN 546, IFN 547, IFN 548 and IFN 598 are enclosed in Annexure
II. After consultation with the market participants and confirming their
Page 32 of 142
preparedness, it has been decided to make these messaging formats (in addition
to IFN 515) mandatory for all institutional trades.
4.4.4. It is reiterated that the STP system shall be initially mandatory for all
institutional trades in the equity segment.
4.4.5. The standard terms of contract as are required to be mentioned in the Contract
Notes as per the Bye-laws and Regulations of exchanges, which are not
contained in electronic contract notes, shall be incorporated in the Client Broker
Agreement or where applicable, the Tripartite Agreement between the stock
broker, AP and the client. The stamp duty in respect of the electronic contract
notes shall be paid by the broker.
4.5. Clarification18
4.5.1.1. IFN 540: settlement instruction for a buy trade free of payment
4.5.1.2. IFN 541: settlement instruction for a buy trade against payment
4.5.1.3. IFN 542: settlement instruction for a sell trade free of payment
4.5.1.4. IFN 543: settlement instruction for a sell trade against payment
4.5.1.5. IFN 544: confirmation of a settlement instruction for a buy trade free of
payment (response to IFN 540)
4.5.1.6. IFN 545: confirmation of a settlement instruction for a buy trade against
payment (response to IFN 541)
4.5.1.7. IFN 546: confirmation of a settlement instruction for a sell trade free of
payment (response to IFN 542).
4.5.1.8. IFN 547: confirmation of a settlement instruction for a sell trade against
payment (response to IFN 543).
4.5.2. It is also clarified that in the IFN 515 message, if trade is intended to be settled
by the custodian with the Clearing Corporation (by accepting the settlement
obligation), then it shall be termed as “FREE” and if the trade is intended to be
settled by the broker with the Clearing Corporation then it shall be termed as
“APMT” (meaning against payment) in the tag 22h of the IFN 515 message.
Page 33 of 142
4.6. Modifications in the prescribed messaging formats19
In order to integrate the STT in the STP system, it would be necessary to provide
for necessary fields in the appropriate messaging standards. After deliberation
with the STP centralised hub and the STP service providers, it has been decided
to make the following modifications in the prescribed messaging formats:
4.6.1. Message Types that shall be modified are IFN515, IFN540, IFN541, IFN542 and
IFN543
4.6.2. The change in the ISO Structure for the impacted message types shall be as
follows:
M 16R AMT Start of block
Format: (Qualifier)
//(Currency Code) (Amount)
For: Securities Transaction tax
Amount
Qualifier: "COUN" (4 Upper
To identify case Characters)
the Securities Narrative: "INR" (3 Upper
M 19A Amount :4!c//3!a11d
Transaction Letters)
Tax Amount Amount: Up to 10 digits (only
Integer value allowed) followed
by a comma (used as decimal
sign) . Comma is mandatory.
Amount can be zero or greater
than zero.
M 16S AMT End of block
4.6.3. Securities Transaction Tax Block shall be placed before the Settlement
Amount Block in the stated Message Types. (IFN515, IFN540, IFN541, IFN542
and IFN543)
Page 34 of 142
4.6.4. Securities Transaction Tax block will be mandatory amount block in IFN515
and optional amount block in IFN540, IFN541, IFN542 and IFN543.
4.6.5. If the Contract Note (issued by means of IFN 515) is rejected on the basis of
Securities Transaction Tax amount then the reason for the rejection shall be
specified in the "Tag70D Narrative" field and "Tag 24B Reason" specified should
be "NARR".
Page 35 of 142
5. TRADING TERMINALS
5.1.1. Meaning
For the purpose of this section, 'Software’ shall mean electronic systems or
applications used by stock brokers / trading members for connecting to the
stock exchanges and for the purposes of trading and real-time risk management,
including software used for Internet Based Trading (IBT), Direct Market Access
(DMA), Securities Trading using Wireless Technology (STWT), Smart Order
Routing (SOR), Algorithmic Trading (AT), etc.
5.1.2.2.1. Stock exchanges shall organize mock trading sessions on regular basis, at
least once in a calendar month, to facilitate testing of new software or
existing software that has undergone any change of functionality, in a
close-to-real trading environment. Stock exchanges shall suitably design
and plan such mock trading sessions to ensure maximum participation
and sufficient trading volumes for the purpose of testing.
20Circular No. CIR/MRD/DP/24/2013 dated August 19, 2013 and CIR/MRD/DP/06/2014 dated
February 07, 2014
Page 36 of 142
5.1.2.2.2. Stock exchanges shall mandate a minimum time period for such testing
in the mock trading sessions.
5.1.2.2.3. In order to improve the efficacy of the mock trading sessions, all stock
brokers / trading members shall ensure that all user-ids approved for
Algo trading, irrespective of the algorithm having undergone change or
not, shall participate in the mock trading sessions.
5.1.2.2.4. User Acceptance Test (UAT): The stock broker/ trading member shall
undertake UAT of the software to satisfy itself that the newly developed/
modified software meets its requirements.
5.1.2.2.5. The requirement of mandatory mock trading sessions to facilitate testing
of new software or existing software that has undergone any change of
functionality shall be optional, if a Stock Exchange provides suitable
simulated test environment to test new software or existing software that
has undergone any change of functionality and ensures the following21:
5.1.2.2.5.1. The test environment shall be made available to all the members.
5.1.2.2.5.2. The test environment shall be made available for at least two hours
after market hours and at least on two trading days in a week.
5.1.2.2.5.3. For the purpose of testing, Stock Exchange shall make available data
from at least one trading day in all segments and the same shall not be
older than one month from the day of the testing environment.
5.1.2.2.5.4. All trading members (excluding those who use only Exchange
provided front end and/or ASP services) having approved
Algorithms available with the member, irrespective of the algorithm
having undergone change or not, shall participate in the Simulated
Environment at least on one trading day during each calendar month
at all the exchanges where they are members. This shall be audited
and reported in the System Auditors report.
5.1.2.2.5.5. Exchange shall provide a daily log, including Algos used, of members
participation in Simulated Environment to all participating members.
The Exchange shall provide summary report of such activity to SEBI
in the monthly development report (MDR).
5.1.2.3. With respect to testing of software related to (a) fixes to bugs in the software,
(b) changes undertaken to the stock brokers’ software/ systems pursuant to
a change to any stock exchange's trading system, and (c) software
Page 37 of 142
purchased from a software vendor that has already been tested in the mock
environment by certain number of stock brokers, stock exchanges may
prescribe a faster approval process to make the process of approval
expeditious.
5.1.3. Stock brokers / trading members shall also engage system auditor(s) to examine
reports of mock tests and UAT in order to certify that the tests were
satisfactorily undertaken.
5.1.4. Stock exchanges shall monitor compliance of stock brokers / trading members,
who use trading algorithm, with regard to the requirement of participation in
mock trading session as mandated with this circular. In cases where stock
exchanges find that the stock broker / trading member has failed to participate
in such mock trading sessions, stock exchange shall call for reasons and if found
unsatisfactory, shall suspend the proprietary trading rights of the stock broker/
trading member for a minimum period of one trading day.
5.1.5. Stock exchanges shall also ensure that the system auditors examine the
compliance of stock broker / trading member, who use trading algorithms, with
regard to the requirement of participation in mock trading session, as mandated
with this circular, and provide suitable comments in the periodic system audit
report. In cases where the system audit report indicate that the stock broker /
trading member has failed to participate in such mock trading sessions, stock
exchange shall call for reasons from the stock broker/trading member and if
found unsatisfactory, shall suspend the proprietary trading rights of the stock
broker / trading member for a minimum period of one trading day.
5.1.6. For pre-approval / periodic system audit of Computer-to-Computer Link
(CTCL) or Intermediate Messaging Layer (IML), IBT, DMA, STWT, SOR and
AT, stock brokers / trading members shall engage a system auditor with any of
the certifications specified vide SEBI circular dated CIR/MRD/DP/16/2013
dated May 21, 2013. While finalizing the system auditor, stock brokers / trading
members shall ensure the system auditor does not have any conflict of interest
with the stock broker and the directors/promoters of the system auditor are not
directly or indirectly related to the current directors or promoters of stock
broker / trading member.
5.1.7.1. Stock brokers / trading members shall seek approval of the respective stock
exchanges for deployment of the software in the securities market by
Page 38 of 142
submitting necessary details required by stock exchange including details
of software, tests undertaken and certificate / report provided by the
system auditor. Stock exchange may seek additional details as deemed
necessary for evaluating the application of the stock broker / trading
member.
5.1.7.2. Stock exchanges shall grant approval or reject the application of the stock
broker as the case may be, and communicate the decision to the stock broker
/ trading member within fifteen working days from the date of receipt of
completed application (or within any other such time period specified vide
SEBI circulars on DMA, IBT, STWT, SOR, AT, etc.). In case of rejection of
the application, the stock exchange shall also communicate reasons of
rejection to the stock broker / trading member within such time period.
5.1.7.3. Before granting approval to use software in securities market, stock
exchange shall ensure that the requirements specified by SEBI / stock
exchange with regard to software are met by the stock broker / trading
member.
5.1.7.4. Stock exchanges may suitably schedule the requirements of mock testing,
certification of test reports by system auditor(s) and the software approval
process, so as to facilitate a speedy approval and a smooth transition of the
stock brokers to the new / upgraded software.
5.1.8. In order to ensure that stock brokers are not using software without requisite
approval of the stock exchanges, stock exchanges are advised to put in place
suitable mechanism to prevent any unauthorized change to the approved
software.
5.1.9.1.1. M/s (name of the stock broker / trading member) will take all necessary steps to ensure
that every new software and any change thereupon to the trading and/or
risk management functionalities of the software will be tested as per the
framework prescribed by SEBI / stock exchange before deployment of
such new / modified software in securities market.
5.1.9.1.2. M/s (name of the stock broker / trading member) will ensure that approval of the stock
exchange is sought for all new / modified software and will comply with
Page 39 of 142
various requirements specified by SEBI or the stock exchange from time
to time with regard to usage, testing and audit of the software.
5.1.9.1.3. The absolute liability arising from failure to comply with the above
provisions shall lie entirely with M/s (name of the stock broker / trading member) .
5.1.9.2. Stock exchanges may include additional clauses as deemed necessary in the
undertaking.
5.1.10.1. API is an interface that enables interaction of software with other software
and typically includes language and message format that is used by an
application program to communicate with the operating system or other
application program. Stock brokers / trading members and software
vendors require relevant API specifications to facilitate interaction of the
developed software with the systems of the stock exchanges.
5.1.10.2. Technical Advisory Committee (TAC) had engaged with stock exchanges,
software vendors and stock brokers / trading members to review the
framework of sharing of APIs by stock exchanges.
5.1.10.3. Based on the recommendations of the committee, it is decided that stock
exchanges shall provide relevant API specifications to all stock brokers /
trading members and software vendors who are desirous of developing
software for the securities market, after establishing their respective
credentials.
5.1.10.4. In case of refusal to share APIs, stock exchanges shall provide reasons in
writing to the desirous stock brokers / trading members or software
vendors within a period of fifteen working days from the date of receipt of
such request for sharing of API.
5.1.10.5. Further, stock exchanges shall not selectively release updates /
modifications, if any, of the existing API specifications to few stock brokers
/ trading members or software vendors ahead of others and shall provide
such updated / modified API specifications to all stock brokers / trading
members and software vendors with whom the earlier API specifications
were shared.
Page 40 of 142
5.1.11. Penalty on malfunction of software used by stock broker/ trading member:
5.1.11.1. include suitable clauses in their agreement with the software vendors to
define liabilities of software vendor and stock broker / trading member in
case of software malfunction, and / or,
5.1.11.2. consider taking suitable insurance cover to meet probable losses in case of
software malfunction.
5.1.12. With regard to changes / updates to stock broker's trading software that intend
to modify the 'look and feel' and do not affect the risk management system of
the stock broker or the connectivity of the trading software with stock
exchange's trading system, it is clarified that mock testing and consequent
system audit may not be insisted upon by the stock exchanges.
5.1.13. Stock exchanges shall direct their stock brokers to put in place adequate
mechanism to restore their trading systems to 'production state' at the end of
testing session so as to ensure integrity of stock brokers' trading system.
5.2.1. A standing Committee shall be set up by each Stock Exchange to investigate the
problem of computerised trading system, such as hanging/ slowdown/
breakdown. The Standing Committee shall introduce an outside computer
expert. The Committee will submit a report to the Governing Board/ Council
of Stock Exchange. The Board/Council will deliberate on the report and suitable
action/remedial measure will be taken.
5.2.2. The standing committee is required to be set up with the objective to investigate
problems of computerised trading system, such as, hanging/ slowdown/
Page 41 of 142
breakdown. With the view to ensure implementation/ compliance, the
exchanges are advised as under:
5.2.2.1. All instances of hanging /slowdown / breakdown and any other problem
in the computerized trading system, even if the disruption is less than five
minutes, should be reported to the Committee for its consideration.
5.2.2.2. The Committee, upon examination of the issue/s shall submit a report to
the Governing Board / Council of the Stock Exchange.
5.2.2.3. The Governing Board / Council of the Stock Exchange shall deliberate on
the aforesaid report and take suitable action / remedial measure.
5.2.2.4. Further, in case of stoppage beyond five minutes the exchange should also
explain and report to SEBI about the incident as well as the remedial
measures taken. The Stock Exchange shall also issue a press release in this
regard for greater transparency and in the interest of investors.
The stock exchanges are allowed to set-up terminals at any place in the country,
subject to the following conditions:
5.3.1. The Exchange would ensure that there is adequate monitoring and surveillance
mechanism for such outstation terminals in order to oversee the trades;
5.3.2. All such trades would be subject to usual margin, capital adequacy and inter-
day trading limits fixed for the brokers by the Exchange;
5.3.3. The Exchange would ensure that investors eventually do not pay the brokerage
on such trades exceeding the maximum brokerage permitted as per the rules of
the Exchanges; and
5.3.4. The Exchange would introduce the system of guaranteeing trades or set up a
Clearing Corporation.
Page 42 of 142
Procedure, Surveillance and Monitoring, Jurisdiction etc. for opening trading
terminals abroad are provided in the Annexure.
With the rapid expansion of the Indian capital market it was felt that a facility
should be provided whereby an eligible overseas investor can place an order on
a real-time basis, rather than telephonically. The Stock Exchanges/ Members shall
follow the following guidelines for opening and maintaining the trading
terminals abroad:
Such trading terminals shall be opened only by the Stock Brokers of the stock
exchanges registered with SEBI and opening of terminals through APs shall not
be permitted. These terminals shall be opened by the members only after
obtaining permission from the respective stock exchanges.
Such terminals abroad would be opened subject to the guidelines laid down by
the RBI from time to time.
The installation of such trading terminals shall be subject to the prior permission
of the concerned regulatory authorities of the respective foreign countries,
wherever required.
Page 43 of 142
the respective exchange may provide for connecting its trading terminal abroad
to its trading system in India.
The contract note in favour of the client abroad shall be issued in India, however
the same could be printed in the broker’s office abroad and shall be subject to
the jurisdiction of the respective stock exchanges.
5.5.6.1. All such trades would be subject to usual margins, capital adequacy and
intra-day trading limits and such other requirements fixed for the brokers by
the Exchange.
5.5.6.2. The respective stock exchange shall ensure that investors do not pay the
brokerage on such trades exceeding the maximum brokerage permitted as
per the rules, regulations and bye-laws of the exchange.
5.5.6.3. No Negotiated Deals shall be permitted through these terminals and only
screen based order matching system shall be available on these terminals.
All trades shall be settled in India in dematerialized form only. Clients with
status of FPIs shall settle the trade through their registered custodian/
designated bank. Clients with the status of NRIs/PIOs/OCBs shall settle the
trade through a designated bank. Such a designated bank shall be responsible
for repatriation of funds.
The respective stock exchange shall ensure that there is adequate monitoring
and surveillance mechanism for such overseas terminals in order to oversee
trades.
5.5.9.1. The investors’ grievance for such cases shall be resolved by the respective
Indian Stock Exchange through the existing arbitration mechanism.
Page 44 of 142
5.5.9.2. The concerned Stock Exchange shall ensure that their members have the
adequate arrangements for resolving the investors grievances and timely
settlement of arbitration cases arising out of trades which are executed on
these terminals.
5.5.10. Jurisdiction
The agreement between the trading member and constituent should, inter alia,
state that, all trades, transactions and contracts are subject to the Rules, Bye
Laws and Regulations of the Exchange and shall be deemed to be and shall take
effect as wholly made, entered into and to be performed in the city of _________,
India and the parties to such trade shall be deemed to have submitted to the
jurisdiction of the Courts in _________, India for the purpose of giving
effect to the provisions of the Rules, Bye Laws and Regulations of the Exchange.
Page 45 of 142
5.6.3.2. development of expertise at the end of the stock broker through appropriate
training with regard to software usage and maintenance;
5.6.3.3. appropriate penalty clauses for cases of disruptions to the trading system of
the stock broker on account of (a) software vendor failing to provide
continuous and timely services to the stock broker or (b) glitches to the
software provided by the software vendor;
5.6.3.4. obligation on the part of the software vendor to cooperate in case of audit of
software including forensic audit, if required.
Page 46 of 142
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
6.1.1. SEBI has received proposal from the stock exchanges and market participants
for introducing Smart Order Routing which allows the brokers trading engines
to systematically choose the execution destination based on factors viz. price,
costs, speed, likelihood of execution and settlement, size, nature or any other
consideration relevant to the execution of the order.
6.1.2. Upon examination of the proposal, feedback of the stock exchanges and based
on the recommendations of the Technical Advisory Committee, it has been
decided to permit Smart Order Routing in Indian Securities Market.
6.1.3. Stock Exchanges are advised to ensure the following conditions with regard to
the Smart Order Routing facility:
6.1.3.1. Stock broker interested to offer Smart Order Routing facility shall apply to
the respective stock exchanges.
6.1.3.2. Stock broker shall submit a third party system audit of its Smart Order
Routing system and software. Stock exchanges shall disseminate to its stock
brokers a list of approved system auditors (CISA or equivalent) qualified to
undertake such system audits.
6.1.3.3. Stock broker shall provide the following to the respective stock exchanges:
6.1.3.4. Stock exchange shall communicate its decision to the broker within 30
calendar days from the date of receipt of complete application by the stock
exchange. Stock exchange shall not consider testing and demonstration of the
SOR system/software as a criterion for declaring the application of the
broker as ‘complete’. Further, testing and demonstration of SOR
system/software, if required, shall be suitably scheduled within the
aforesaid period of 30 calendar days.
47
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
48
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
6.1.3.16. Stock exchange shall ensure that within a period of three months from
implementation of Smart Order Routing, a system is put in place to time
stamp market data feed that is disseminated to the market, if the same is not
already available.
6.1.3.17. Stock exchange shall strengthen investor grievance cell in order to address
complaints, if any, received with regard to Smart Order Routing. Further, in
case of any disputes or complaints, stock exchanges shall share necessary
data as and when required in order to facilitate necessary examination.
6.1.3.18. Stock exchange shall synchronise their system clocks with atomic clock
before the start of market.
6.1.3.19. The broker server routing orders placed through Smart Order Routing
system to the exchange trading system shall be located in India. Stock
exchange shall permit SOR approved brokers to offer SOR facility through
all their servers irrespective of their location in India.29
6.1.3.20. All other existing obligations for the broker as per current regulations and
circulars will continue.
6.1.3.21. Stock exchange may specify additional safeguards as they deem fit for
allowing Smart Order Routing facility to their brokers.
6.1.3.22. Stock exchange shall permit smart order routing for all orders, without
restricting to any specific type of order. The choice on order types shall be
left to the client.30
6.1.3.23. If stock exchange desires to advise its brokers to seek re-approval, it may do
so only in case of 31
6.1.3.23.1. Inclusion of a new stock exchange for offering SOR facility; and/or,
6.1.3.23.2. Material changes in the software/system of the smart order routing
facility.
6.1.4. The initial list of system auditors for SOR for all the three stock exchanges i.e.
BSE, NSE and MCX-SX is given below32:
6.1.4.1. HCL Technologies
6.1.4.2. iSec Services Pvt. Ltd
6.1.4.3. Tata Consultancy Services
49
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
50
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
7. ALGORITHMIC TRADING33
Definition
7.1.1. Algorithmic Trading: Any order that is generated using automated execution
logic shall be known as algorithmic trading.
7.1.2. Stock exchanges shall ensure the following while permitting algorithmic
trading:
7.1.2.1. The stock exchange shall have arrangements, procedures and system
capability to manage the load on their systems in such a manner so as to
achieve consistent response time to all stock brokers. The stock exchange
shall continuously study the performance of its systems and, if necessary,
undertake system upgradation, including periodic upgradation of its
surveillance system, in order to keep pace with the speed of trade and
volume of data that may arise through algorithmic trading.
7.1.2.2. In order to ensure maintenance of orderly trading in the market, stock
exchange shall put in place effective economic disincentives with regard to
high daily order-to-trade ratio of algo orders of the stock broker. Further, the
stock exchange shall put in place monitoring systems to identify and initiate
measures to impede any possible instances of order flooding by algos.
7.1.2.3. In order to discourage repetitive instances of high daily order-to-trade ratio,
stock exchanges shall impose an additional penalty in form of suspension of
proprietary trading right of the stock broker for the first trading hour on the
next trading day in case a stock broker is penalized for maintaining high daily
order-to-trade ratio, provided penalty was imposed on the stock broker on
more than ten occasions in the previous thirty trading days.
7.1.2.4. The stock exchange shall ensure that all algorithmic orders are necessarily
routed through broker servers located in India and the stock exchange has
appropriate risk controls mechanism to address the risk emanating from
33Circular No. CIR/MRD/DP/09/2012 dated March 30, 2012 and Circular No. CIR/MRD/DP/16/2013
dated May 21, 2013
51
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
algorithmic orders and trades. The minimum order-level risk controls shall
include the following:
7.1.2.4.1. Price check - The price quoted by the order shall not violate the price
bands defined by the exchange for the security. For securities that do not
have price bands, dummy filters shall be brought into effective use to serve
as an early warning system to detect sudden surge in prices.
7.1.2.4.2. Quantity Limit check - The quantity quoted in the order shall not violate
the maximum permissible quantity per order as defined by the exchange
for the security.
7.1.2.5. In the interest of orderly trading and market integrity, the stock exchange
shall put in place a system to identify dysfunctional algos (i.e. algos leading
to loop or runaway situation) and take suitable measures, including advising
the member, to shut down such algos and remove any outstanding orders in
the system that have emanated from such dysfunctional algos. Further, in
exigency, the stock exchange should be in a position to shut down the
broker’s terminal.
7.1.2.6. Terminals of the stock broker that are disabled upon exhaustion of collaterals
shall be enabled manually by the stock exchange in accordance with its risk
management procedures.
7.1.2.7. The stock exchange may seek details of trading strategies used by the algo
for such purposes viz. inquiry, surveillance, investigation, etc.
7.1.2.8. In order to strengthen the surveillance mechanism related to algorithmic
trading and prevent market manipulation, stock exchanges are directed to
take necessary steps to ensure effective monitoring and surveillance of orders
and trades resulting from trading algorithms. Stock exchanges shall
periodically review their surveillance arrangements in order to better detect
and investigate market manipulation and market disruptions.
7.1.2.9. The stock exchange shall include a report on algorithmic trading on the stock
exchange in the Monthly Development Report (MDR) submitted to SEBI
inter-alia incorporating turnover details of algorithmic trading, algorithmic
trading as percentage of total trading, number of stock brokers / clients using
algorithmic trading, action taken in respect of dysfunctional algos, status of
grievances, if any, received and processed, etc.
52
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
7.1.2.10. The stock exchange shall synchronize its system clock with the atomic clock
before the start of market such that its clock has precision of atleast one
microsecond and accuracy of atleast +/- one millisecond.
7.1.3. Stock exchange shall ensure that the stock broker shall provide the facility of
algorithmic trading only upon the prior permission of the stock exchange. Stock
exchange shall subject the systems of the stock broker to initial conformance
tests to ensure that the checks mentioned below are in place and that the stock
broker’s system facilitate orderly trading and integrity of the securities market.
Further, the stock exchange shall suitably schedule such conformance tests and
thereafter, convey the outcome of the test to the stock broker.
For stock brokers already providing algo trading, the stock exchange shall
ensure that the risk controls specified in this circular are implemented by the
stock broker.
7.1.4. The stock brokers that provide the facility of algorithmic trading shall subject
their algorithmic trading system to a system audit every six months in order to
ensure that the requirements prescribed by SEBI / stock exchanges with regard
to algorithmic trading are effectively implemented. Such system audit of
algorithmic trading system shall be undertaken by a system auditor who
possess any of the following certifications:
7.1.5. Deficiencies or issues identified during the process of system audit of trading
algorithm / software shall be reported by the stock broker to the stock exchange
immediately on completion of the system audit. Further, the stock broker shall
take immediate corrective actions to rectify such deficiencies / issues.
7.1.6. In case of serious deficiencies / issues or failure of the stock broker to take
satisfactory corrective action, the stock exchange shall not allow the stock
53
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
broker to use the trading software till deficiencies / issues with the trading
software are rectified and a satisfactory system audit report is submitted to the
stock exchange. Stock exchanges may also consider imposing suitable penalties
in case of failure of the stock broker to take satisfactory corrective action to its
system within the time-period specified by the stock exchanges. Further, the
stock exchange shall subject the stock broker systems to more frequent system
audits, if required.
7.1.7. The stock broker, desirous of placing orders generated using algos, shall satisfy
the stock exchange with regard to the implementation of the following
minimum levels of risk controls at its end -
7.1.7.1. Price check – Algo orders shall not be released in breach of the price bands
defined by the exchange for the security.
7.1.7.2. Quantity check – Algo orders shall not be released in breach of the quantity
limit as defined by the exchange for the security.
7.1.7.3. Order Value check - Algo orders shall not be released in breach of the ‘value
per order’ as defined by the stock exchanges.
7.1.7.4. Cumulative Open Order Value check – The individual client level cumulative
open order value check, may be prescribed by the broker for the clients.
Cumulative Open Order Value for a client is the total value of its unexecuted
orders released from the stock broker system.
7.1.7.5. Automated Execution check – An algo shall account for all executed, un-
executed and unconfirmed orders, placed by it before releasing further
order(s). Further, the algo system shall have pre-defined parameters for an
automatic stoppage in the event of algo execution leading to a loop or a
runaway situation.
7.1.7.6. All algorithmic orders are tagged with a unique identifier provided by the
stock exchange in order to establish audit trail.
7.1.8. The other risk management checks already put in place by the exchange shall
continue and the exchange may re-evaluate such checks if deemed necessary in
view of algo trading.
7.1.9. The stock broker, desirous of placing orders generated using algos, shall submit
to the respective stock exchange an undertaking that -
7.1.9.1. The stock broker has proper procedures, systems and technical capability to
carry out trading through the use of algorithms.
54
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
7.1.9.2. The stock broker has procedures and arrangements to safeguard algorithms
from misuse or unauthorized access.
7.1.9.3. The stock broker has real-time monitoring systems to identify algorithms that
may not behave as expected. Stock broker shall keep stock exchange
informed of such incidents immediately.
7.1.9.4. The stock broker shall maintain logs of all trading activities to facilitate audit
trail. The stock broker shall maintain record of control parameters, orders,
trades and data points emanating from trades executed through algorithm
trading.
7.1.9.5. The stock broker shall inform the stock exchange on any modification or
change to the approved algos or systems used for algos.
7.1.10. The stock exchange, if required, shall seek conformance of such modified algo
or systems to the requirements specified in the circular.
55
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
8.1.1. MIIs are advised to conduct an Annual System Audit as per the framework
enclosed as Annexure 1 and Terms of Reference (TOR) enclosed as Annexure 2.
MIIs are also advised to maintain a list of all the relevant SEBI circulars/
directions/ advices, etc. pertaining to technology and compliance thereof, as
per format enclosed as Annexure 3 and the same shall be included under the
scope of System Audit.
8.1.2. Further, MIIs are advised to submit information with regard to exceptional
major Non-Compliances (NCs)/ minor NCs observed in the System Audit as
per format enclosed as Annexure 4 and are advised to categorically highlight
those observations/NCs/suggestions pointed out in the System Audit (current
and previous) which remain open.
8.1.3. The Systems Audit Report including compliance with SEBI circulars/
guidelines and exceptional observation format along with compliance status of
previous year observations shall be placed before the Governing Board of the
MII and then the report along with the comments of the Management of the MII
shall be communicated to SEBI within a month of completion of audit. Further,
along with the audit report, MIIs are advised to submit a declaration from the
MD / CEO certifying the security and integrity of their IT Systems.
56
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
Annexure 1
1. For the Annual System Audit, the following broad areas shall be considered in order
to ensure that the audit is comprehensive and effective:
a. The Audit shall be conducted according to the Norms, Terms of Reference (TOR)
and Guidelines issued by SEBI.
b. The Governing Board of the Market Infrastructure Institution (MII) shall appoint
the Auditors based on the prescribed Auditor Selection Norms and TOR. An
Auditor can perform a maximum of 3 successive audits.
c. The scope of the Audit may be broadened to incorporate any new developments
that may arise due to issuance of circulars/ directions/ advice by SEBI from time
to time.
d. The period of Audit shall not be for more than 12 months. Further, the audit shall
be completed within 2 months from the end of the audit period.
e. In the Audit report, the Auditor shall include its comments on whether the areas
covered in the Audit are in compliance with the norms/ directions/ advices
issued by SEBI, internal policy of the MII, etc. Further, the report shall also
57
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
f. For each of the NCs/ observations and suggestions made by the Auditor,
specific corrective action as deemed fit by the MII may be taken. The
management of the MII shall provide its comments on the NCs, observations
and suggestions made by the Auditor, corrective actions taken or proposed
to be taken along with time-line for such corrective action.
g. The Audit report along with the comments of management shall be placed
before the Governing Board of the MII. The Audit report along with
Management Comments shall be submitted to SEBI, within 1 month of
completion of audit.
h. The overall timeline from the last date of the audit period till completion of
final compliance by MII, including follow-on audit, if any, should not exceed
one year. In exceptional cases, if MII is of the view that compliance with
certain observations may extend beyond a period of 1 year, then the
concerned MII shall seek specific approval from the Governing Board.
i. If follow-on audit is not required, the MII shall submit an Action Taken
Report (ATR) to the Auditor. After verification of the ATR by the Auditor, the
MII shall submit a report to SEBI within 1 month from the date of completion
of verification by the Auditor. The report shall include updated Issue-Log to
indicate the corrective actions taken and specific comments of the auditor on
the ATR.
2. MII shall ensure compliance with the following norms while appointing System
Auditor:
a. Auditor must have minimum 3 years of demonstrable experience in IT audit
of securities industry participants e.g. stock exchanges, clearing
corporations, depositories, intermediaries, etc. and/ or financial services
sector i.e. banking, insurance, Fin-tech.
58
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
b. The team performing system audit must have experience in / direct access
to experienced resources in the areas covered under TOR. It is recommended
that resources deployed by the Auditor for the purpose of system audit shall
have relevant industry recognized certifications e.g. CISA (Certified
Information Systems Auditor) from ISACA, CISM (Certified Information
Securities Manager) from ISACA, GSNA (GIAC Systems and Network
Auditor), CISSP (Certified Information Systems Security Professional) from
International Information Systems Security Certification Consortium,
commonly known as (ISC).
d. The Auditor should have the capability to undertake forensic audit and
undertake such audit as part of annual system audit, if required.
e. The Auditor must not have any conflict of interest in conducting fair,
objective and independent audit of the exchange / depository/ clearing
corporation. It should not have been engaged over the last three years in any
consulting engagement with any departments / units of the entity being
audited.
f. The Auditor should not have any cases pending against it, which point to its
incompetence and/or unsuitability to perform the audit task.
h. Any other criteria that the MII may deem fit for the purpose of selection of
Auditor.
3. The Audit report should cover each of the major areas mentioned in the TOR and
compliance with SEBI circulars/directions/advices, etc. related to technology.
The Auditor in the Audit Report shall give its views indicating the NCs to the
59
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
60
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
Annexure 2
1. IT environment
1.1. Organization details
a. Name
b. Address
c. IT team size (in house- employees)
d. IT team size (vendors)
1.2. IT set up and usage
a. Data Centre, near site and DR site and Regional/ Branch offices (location,
owned/ outsourced)
b. System Architecture
2. IT Governance
2.1. Whether IT Governance framework exists to include the following:
a. IT organization structure including roles and responsibilities of key IT
personnel;
b. IT governance processes including policy making, implementation and
monitoring to ensure that the governance principles are followed;
2.2. IT policies and procedures
a. Whether the organization has defined and documented IT policy? If yes, is it
approved by the Governing Board (GB)?
b. Is the current System Architecture including infrastructure, network and
application components to show system linkages and dependencies
documented?
c. Whether defined and documented Standard Operating Procedures (SOPs) for
the following processes are in place?
i. IT Assets Acquisition
ii. Access Management
iii. Change Management
iv. Backup and Recovery
61
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
v. Incident Management
vi. Problem Management
vii. Patch Management
viii. Data Centre Operations
ix. Operating Systems and Database Management
x. Network Management
xi. DR Site Operations
xii. Data Retention and Disposal
3. Business Controls
3.1. General Controls for Data Centre Facilities
a. Application Access – segregation of duties, database and application access
etc. (Approved Policy clearly defining roles and responsibilities of the
personnel handling business operations)
b. Maintenance Access – vendor engineers
c. Physical Access – permissions, logging, exception reporting & alerts
d. Environmental Controls – fire protection, AC monitoring, etc.
e. Fault Resolution Mechanism
f. Folder Sharing and Back Up Controls – safeguard of critical information on
local desktops
g. Incidences of violations in last year and corrective action taken
3.2. Software change control
a. Whether pre-implementation review of application controls (including
controls over change management) was undertaken?
b. Adherence to secure Software Development Life Cycle (SDLC) / Software
Testing Life Cycle (STLC) standards/ methodologies
c. Whether post implementation review of application controls was
undertaken?
d. Is the review of processes followed by implementation team to ensure data
integrity post implementation of new application or system?
e. User awareness
f. Processing of new feature request
g. Fault reporting / tracking mechanism & process for resolutions
h. Testing of New releases / Bug-fixes – Testing process (automation level)
i. Version Control – History, Change Management process etc.
j. Development / Test/ Production environment – Segregation
k. New Release in Production – Promotion, Release note approvals
62
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
63
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
64
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
5.2. Onboarding
5.3. Offboarding
7. E-Mail system
7.2. Regulations governing file transfer and exchange of messages with external
parties
65
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
Non Time-
Date of
Technolo complia line for
SEBI
gical Mechan nces Compli taking
circular Commen
Sl. requirem ism put with ance correctiv
/ Subj ts of the
N ents in place SEBI status e action
directio ect Manage
o. specified by the circulars (Open/ in case
ns/ ment
by SEBI MIIs / closed) of open
advice,
in brief guidelin observat
etc.
es ions
66
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
Annexure 4
Note: MIIs are expected to submit following information with regard to exceptional
major non-compliances (NCs) / minor NCs observed in the System Audit. MIIs should
also categorically highlight those observations/NCs/suggestions pointed out in the
System Audit (current and previous) which are not yet complied with.
67
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
Rating Description
Represents weakness in control with respect to threat(s) that is /are
sufficiently capable and impacts asset (s) leading to regulatory non-
HIGH
compliance, significant financial, operational and reputational loss.
These observations need to be addressed with utmost priority.
Represents weakness in control with respect to threat(s) that is /are
sufficiently capable and impacts asset (s) leading to exposure in terms of
MEDIUM
financial, operational and reputational loss. These observations need to
be addressed reasonably promptly.
Represents weaknesses in control, which in combination with other
LOW weakness can develop into an exposure. Suggested improvements for
situations not immediately/directly affecting controls. .
68
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
69
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
8.2.1. The stock exchanges should ensure that system audit of stock brokers / trading
members are conducted in accordance with the prescribed guidelines enclosed
in the annexure of this section.
8.2.2. Exchanges are advised to keep track of findings of system audits of all brokers
on quarterly basis and ensure that all major audit findings, specifically in critical
areas, are rectified / complied in a time bound manner failing which follow up
inspection of such brokers may be taken up for necessary corrective steps /
actions thereafter, if any.
8.2.3. Stock Exchange should report all major non-compliances / observations of
system auditors, broker wise, on a quarterly basis to SEBI.
8.2.4. For the current year, in case the stock brokers have commenced their annual
system audit, they may follow existing annual system audit framework
prescribed by exchanges. However, stock brokers who are yet to commence
annual system audit should carry out their annual system audit as per the
framework given in this circular.
70
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
ANNEXURE
71
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
observations reported in the audit reports of the stock brokers and directions issued
by SEBI from time to time in this regard.
5. The auditor in its report shall specify compliance / non-compliance status with regard
to areas mentioned in ToR. Observations on minor / major deviations as well as
qualitative comments for scope for improvement shall also be specified in the report.
The auditor shall also take into consideration the observations / issues mentioned in
the previous audit reports and cover open items in the report. The audit report
submitted by the auditor should be forwarded to the stock exchange by the Stock
Broker along with management comments, within 1 month of submission of report
by the auditor.
6. Stock exchange shall ensure that the management of the stock broker provides their
comment about the non-compliance / non-conformities (NCs) and observations
mentioned in the report. For each NC, specific time-bound (within 3 months of
submission of report by the exchange) corrective action must be taken and reported
to the stock exchange. The auditor should indicate if a follow-on audit is required to
review the status of NCs.
7. In order to ensure that the corrective actions are taken by the stock broker, follow-on
audit, if any, shall be scheduled by the stock broker within 6 months of submission of
the audit report by the system auditor.
8. The system auditors should follow the reporting standard as specified in Annexure –
IV of this Framework for the executive summary of the System Audit report to
highlight the major findings of the System Audit.
1. The Auditor shall have minimum 3 years of experience in IT audit of securities market
participants e.g. stock exchanges, clearing corporations, depositories, stock brokers,
depository participants etc. The audit experience should cover all the major areas
mentioned under Terms of Reference (ToR) of the system audit specified by SEBI /
stock exchange.
2. It is recommended that resources employed shall have relevant industry recognized
certifications e.g. D.I.S.A. (ICAI) Qualification, CISA (Certified Information System
Auditor) from ISACA, CISM (Certified Information Securities Manager) from ISACA,
CISSP (Certified Information Systems Security Professional) from International
Information Systems Security Certification Consortium, commonly known as (ISC).
3. The Auditor should have experience of IT audit/governance frameworks and
processes conforming to industry leading practices like CobiT.
72
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
4. The Auditor shall not have any conflict of interest in conducting fair, objective and
independent audit of the Stock Broker. Further, the directors / partners of Auditor
firm shall not be related to any stock broker including its directors or promoters either
directly or indirectly.
The Auditor shall not have any cases pending against its previous audited
companies/firms, which fall under SEBI’s jurisdiction, which point to its incompetence
and/or unsuitability to perform the audit task.
73
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
Annexure I
Terms of Reference (ToR) for Type I Broker
The system auditor shall at the minimum cover the following areas:
74
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
75
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
c. Inactive Session – Whether the system allows for automatic trading session
logout after a system defined period of inactivity.
d. Log Management – Whether the system generates and maintain logs of
Number of users, activity logs, system logs, Number of active clients.
5. Network Integrity
a. Seamless connectivity – Whether stock broker has ensured that a backup
network link is available in case of primary link failure with the exchange.
b. Network Architecture – Whether the web server is separate from the
Application and Database Server.
c. Firewall Configuration – Whether appropriate firewall is present between
stock broker's trading setup and various communication links to the exchange.
Whether the firewall is appropriately configured to ensure maximum security.
6. Access Controls
a. Access to server rooms – Whether adequate controls are in place for access to
server rooms and proper audit trails are maintained for the same.
b. Additional Access controls – Whether the system provides for any
authentication mechanism to access to various components of the exchange
provided terminals. Whether additional password requirements are set for
critical features of the system. Whether the access control is adequate.
7. Backup and Recovery
a. Backup and Recovery Policy – Whether the organization has a well-
documented policy on periodic backup of data generated from the broking
operations.
b. Log generation and data consistency - Whether backup logs are maintained
and backup data is tested for consistency.
c. System Redundancy – Whether there are appropriate backups in case of
failures of any critical system components.
8. BCP/DR (Only applicable for Stock Brokers having BCP / DR site)
a. BCP / DR Policy – Whether the stock broker has a well-documented BCP/ DR
policy and plan. The system auditor should comment on the documented
incident response procedures.
b. Alternate channel of communication – Whether the stock broker has provided
its clients with alternate means of communication including channel for
communication in case of a disaster. Whether the alternate channel is capable
of authenticating the user after asking for additional details or OTP (One-Time-
Password).
76
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
77
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
78
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
Annexure II
ToR for Type II Broker
The system auditor shall at the minimum cover the following areas:
1. System controls and capabilities (CTCL / IML terminals and servers)
a. Order Tracking – The system auditor should verify system process and
controls at CTCL / IML terminals and CTCL/ IML servers covering order
entry, capturing of IP address of order entry terminals, modification / deletion
of orders, status of current order/outstanding orders and trade confirmation.
b. Order Status/ Capture – Whether the system has capability to generate /
capture order id, time stamping, order type, scrip details, action, quantity, price
and validity, etc.
c. Rejection of orders – Whether system has capability to reject orders which do
not go through order level validation at CTCL servers and at the servers of
respective stock exchanges.
d. Communication of Trade Confirmation / Order Status – Whether the system
has capability to timely communicate to Client regarding the Acceptance/
Rejection of an Order / Trade via various media including e-mail; facility of
viewing trade log.
e. Client ID Verification – Whether the system has capability to recognize only
authorized Client Orders and mapping of Specific user Ids to specific
predefined location for proprietary orders.
f. Order type distinguishing capability – Whether system has capability to
distinguish the orders originating from (CTCL or IML) / IBT/ DMA / STWT.
2. Software Change Management - The system auditor should check whether proper
procedures have been followed and proper documentation has been maintained for
the following:
a. Processing / approval methodology of new feature request or patches
b. Fault reporting / tracking mechanism and process for resolution
c. Testing of new releases / patches / modified software / bug fixes
d. Version control- History, Change Management process, approval etc.
e. Development / Test / Production environment segregation.
f. New release in production – promotion, release note approvals
g. Production issues / disruptions reported during last year, reasons for such
disruptions and corrective actions taken.
h. User Awareness
79
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
The system auditor should check whether critical changes made to the (CTCL or IML)
/ IBT / DMA / STWT/ SOR are well documented and communicated to the Stock
Exchange.
3. Risk Management System (RMS)
a. Online risk management capability – The system auditor should check
whether system of online risk management including upfront real-time risk
management, is in place for all orders placed through (CTCL or IML) / IBT /
DMA / STWT.
b. Trading Limits – Whether a system of pre-defined limits /checks such as
Order Quantity and Value Limits, Symbol wise User Order / Quantity limit,
User / Branch Order Limit, Order Price limit, etc., are in place and only such
orders which are within the parameters specified by the RMS are allowed to be
pushed into exchange trading engines. The system auditor should check that
no user or branch in the system is having unlimited limits on the above
parameters.
c. Order Alerts and Reports – Whether the system has capability to generate
alerts when orders that are placed are above the limits and has capability to
generate reports relating to margin requirements, payments and delivery
obligations.
d. Order Review – Whether the system has capability to facilitate review of such
orders that were not validated by the system.
e. Back testing for effectiveness of RMS – Whether system has capability to
identify trades which have exceeded the pre-defined limits (Order Quantity
and Value Limits, Symbol wise User Order / Quantity limit, User / Branch
Order Limit, Order Price limit) and also exceed corresponding margin
availability of clients. Whether deviations from such pre-defined limits are
captured by the system, documented and corrective steps taken.
f. Log Management – Whether the system maintains logs of alerts / changes /
deletion / activation / deactivation of client codes and logs of changes to the
risk management parameters mentioned above. Whether the system allows
only authorized users to set the risk parameter in the RMS.
4. Smart order routing (SOR) - The system auditor should check whether proper
procedures have been followed and proper documentation has been maintained for
the following:
a. Best Execution Policy – System adheres to the Best Execution Policy while
routing the orders to the exchange.
80
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
6. Session Management
a. Session Authentication – Whether system has provision for Confidentiality,
Integrity and Availability (CIA) of the session and the data transmitted during
81
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
9. Access Controls
a. Access to server rooms – Whether adequate controls are in place for access to
server rooms and proper audit trails are maintained for the same.
b. Additional Access controls – Whether the system provides for two factor
authentication mechanism to access to various CTCL or IML components.
Whether additional password requirements are set for critical features of the
system. Whether the access control is adequate.
10. Backup and Recovery
a. Backup and Recovery Policy – Whether the organization has a well-
documented policy on periodic backup of data generated from the broking
operations.
82
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
b. Log generation and data consistency - Whether backup logs are maintained
and backup data is tested for consistency
c. System Redundancy – Whether there are appropriate backups in case of
failures of any critical system components
11. BCP/DR (Only applicable for Stock Brokers having BCP / DR site)
a. BCP / DR Policy – Whether the stock broker has a well-documented BCP/ DR
policy and plan. The system auditor should comment on the documented
incident response procedures.
b. Alternate channel of communication – Whether the stock broker has provided
its clients with alternate means of communication including channel for
communication in case of a disaster. Whether the alternate channel is capable
of authenticating the user after asking for additional details or OTP (One-Time-
Password).
c. High Availability – Whether BCP / DR systems and network connectivity
provide high availability and have no single point of failure for any critical
operations as identified by the BCP/ DR policy.
d. Connectivity with other FMIs – The system auditor should check whether
there is an alternative medium to communicate with Stock Exchanges and
other FMIs.
12. Segregation of Data and Processing facilities – The system auditor should check and
comment on the segregation of data and processing facilities at the Stock Broker in
case the stock broker is also running other business.
13. Back office data
a. Data consistency – The system auditor should verify whether aggregate client
code data available at the back office of broker matches with the data submitted
/ available with the stock exchanges through online data view / download
provided by exchanges to members.
b. Trail Logs – The system auditor should specifically comment on the logs of
Client Code data to ascertain whether editing or deletion of records have been
properly documented and recorded and does not result in any irregularities.
14. User Management
a. User Management Policy – The system auditor should check whether the stock
broker has a well-documented policy that provides for user management and
the user management policy explicitly defines user, database and application
Access Matrix.
b. Access to Authorized users – The system auditor should check whether the
system allows access only to the authorized users of the CTCL or IML System.
83
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
84
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
17. Software Testing Procedures - The system auditor should check whether the stock
broker has complied with the guidelines and instructions of SEBI / stock exchanges
with regard to testing of software and new patches, including the following:
a. Test Procedure Review – The system auditor should evaluate whether the
procedures for system and software testing were proper and adequate.
b. Documentation – The system auditor should verify whether the
documentation related to testing procedures, test data, and resulting output
were adequate and follow the organization's standards.
c. Test Cases – The system auditor should review the internal test cases and
comment upon the adequacy of the same with respect to the requirements of
the Stock Exchange and SEBI.
85
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
Annexure III
ToR for Type III Broker
The system auditor shall at the minimum cover the following areas:
1. System controls and capabilities (CTCL/IML Terminals and servers)
a. Order Tracking – The system auditor should verify system process and
controls at CTCL / IML terminals and CTCL/ IML servers covering order
entry, capturing IP address of order entry, modification / deletion of orders,
status of current order/outstanding orders and trade confirmation.
b. Order Status/ Capture – Whether the system has capability to generate /
capture order id, time stamping, order type, scrip details, action, quantity, price
and validity etc.
c. Rejection of orders – Whether the system has capability to reject orders which
do not go through order level validation at CTCL servers and at the servers of
respective exchanges.
d. Communication of Trade Confirmation / Order Status – Whether the system
has capability to timely communicate to client regarding the Acceptance/
Rejection of an Order / Trade via various media including e-mail; facility of
viewing trade log.
e. Client ID Verification – Whether the system has capability to recognize only
authorized Client Orders and mapping of Specific user Ids to specific
predefined location for proprietary orders.
f. Order type distinguishing capability – Whether the system has capability to
distinguish the orders originating from (CTCL or IML) / IBT / DMA / STWT
/ SOR / Algorithmic Trading.
2. Software Change Management - The system auditor should check whether proper
procedures have been followed and proper documentation has been maintained for
the following:
a. Processing/approval methodology of new feature request or patches
b. Fault reporting / tracking mechanism and process for resolution
c. Testing of new releases / patches / bug fixes
d. Version control- History, Change Management process, approval etc.
e. Development / Test/ Production environment segregation.
f. New release in production – promotion, release note approvals
g. Production issues/ disruptions reported during last year, reasons for such
disruptions and corrective actions taken.
h. User Awareness
86
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
The System Auditor should check whether critical changes made to the (CTCL or
IML) / IBT / DMA / STWT / SOR are well documented and communicated to the
Stock Exchange.
87
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
88
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
e. Check for preventing loop or runaway situations – The system auditor should
check whether the brokers have real time monitoring systems to identify and
shutdown/stop the algorithms which have not behaved as expected.
f. Algo / Co-location facility Sub-letting – The system auditor should verify if
the algo/ co-location facility has not been sub-letted to any other firms to access
the exchange platform.
g. Audit Trail – The system auditor should check the following areas in audit
trail:
i. Whether the audit trails can be established using unique identification for
all algorithmic orders and comment on the same.
ii. Whether the broker maintains logs of all trading activities.
iii. Whether the records of control parameters, orders, traders and data
emanating from trades executed through algorithmic trading are
preserved/ maintained by the Stock Broker.
iv. Whether changes to the control parameters have been made by
authorized users as per the Access Matrix. The system auditor should
specifically comment on the reasons and frequency for changing of such
control parameters. Further, the system auditor should also comment on
the possibility of such tweaking leading to run away/loop situation.
v. Whether the system captures the IP address from where the algo orders
are originating.
h. Systems and Procedures – The system auditor should check and comment on
the procedures, systems and technical capabilities of stock broker for carrying
out trading through use of Algorithms. The system auditor should also identify
any misuse or unauthorized access to algorithms or the system which runs
these algorithms.
i. Reporting to Stock Exchanges – The system auditor should check whether the
stock broker is informing the stock exchange regarding any incidents where
the algos have not behaved as expected. The system auditor should also
comment upon the time taken by the stock broker to inform the stock
exchanges regarding such incidents.
6. Password Security
a. Organization Access Policy – The system auditor should whether the stock
broker has a well-documented policy that provides for a password policy as
well as access control policy for exchange provided terminals and for API
based terminals.
89
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
8. Database Security
a. Access – Whether the system allows CTCL or IML database access only to
authorized users / applications.
b. Controls – Whether the CTCL or IML database server is hosted on a secure
platform, with username and password stored in an encrypted form using
strong encryption algorithms.
9. Network Integrity
a. Seamless connectivity – Whether the stock broker has ensured that a backup
network link is available in case of primary link failure with the exchange.
b. Network Architecture – Whether the web server is separate from the
Application and Database Server.
90
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
91
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
92
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
93
भारतीय प्रततभूतत और तितिमय बोर्ड
Securities and Exchange Board of India
Annexure -IV
Executive Summary Reporting Format
I. For Preliminary Audit
Status Deadli
Risk Audi Sugges
Aud / Root Impac ne for
Descript Ratin t ted Closi
it Observat Departm Natur Audit Cause t the Verifi
ion of g of TOR Correct ng
Dat ion No ent e of ed By Analy Analy Correct ed By
Finding Findi Clau ive Date
e Findi sis sis ive
ngs se Action
ngs Action
12. Risk Rating of Findings – A rating has to been given for each of the observations based on their impact and severity to
reflect the risk exposure, as well as the suggested priority for action.
Page 94 of 142
भारतीय प्रततभूतत और तितिमय बोर्ड
Securities and Exchange Board of India
Rating Description
Weakness in control those represent exposure to the organization or risks that could lead
HIGH to instances of noncompliance with the requirements of TORs. These risks need to be
addressed with utmost priority.
Potential weakness in controls, which could develop into an exposure or issues that
MEDIUM represent areas of concern and may impact internal controls. These should be addressed
reasonably promptly.
Potential weaknesses in controls, which in combination with other weakness can develop
LOW into an exposure. Suggested improvements for situations not immediately/directly
affecting controls.
13. Audit TOR Clause – The TOR clause corresponding to this observation
14. Root cause Analysis –A detailed analysis on the cause of the nonconformity
15. Impact Analysis – An analysis of the likely impact on the operations/ activity of the organization
16. Suggested Corrective Action –The action to be taken by the broker to correct the nonconformity
Deadline
Preliminar Preliminar Curren
Preliminar Sr. Curren Revised for the
y Preliminar y t Verifie Closin
y Audit N t Correctiv Revised
Observatio y Status Corrective Findin d By g Date
Date o Status e Action Correctiv
n Number Action g
e Action
95
भारतीय प्रततभूतत और तितिमय बोर्ड
Securities and Exchange Board of India
96
भारतीय प्रततभूतत और तितिमय बोर्ड
Securities and Exchange Board of India
9.1. Guidelines for Business Continuity Plan (BCP) and Disaster Recovery
(DR) of Market Infrastructure Institutions (MIIs)37
9.1.1. The framework for Business Continuity Plan (BCP) and Disaster
Recovery (DR) shall be as under:
99
भारतीय प्रततभूतत और तितिमय बोर्ड
Securities and Exchange Board of India
100
भारतीय प्रततभूतत और तितिमय बोर्ड
Securities and Exchange Board of India
9.1.5. MIIs should ensure that clause 9.1.3.6 and 9.1.4.1.5 mentioned above is
also included in the scope of System Audit.
9.2. Business Continuity Plan (BCP) and Disaster Recovery (DR) framework
– Limited Purpose Clearing Corporation (LPCC)38
9.2.1. SEBI Board in its meeting held on September 29, 2020 permitted setting
up of a Limited Purpose Clearing Corporation (LPCC) for clearing and
settling repo transactions in debt securities and accordingly Securities
Contracts (Regulation) (Stock Exchanges and Clearing Corporations)
(Amendment) Regulations, 2020, have been notified on October 08,
2020 (SECC Amendment Regulations 2020).
9.2.2. Additionally, the LPCC has been permitted to have arrangements with
any of the existing Clearing Corporations for the purposes of putting in
place a BCP and DR mechanism.
9.2.3. The framework governing arrangements with existing Clearing
Corporations for the purpose of BCP and DR is placed at Annexure II.
Annexure I
102
भारतीय प्रततभूतत और तितिमय बोर्ड
Securities and Exchange Board of India
10.1. Cyber Security and Cyber Resilience framework for Stock Exchanges
and Clearing Corporations39
10.1.1. SEBI as a member of IOSCO has adopted the Principles for Financial
Market Infrastructures (PFMIs) laid down by CPMI-IOSCO and has
issued guidance for implementation of the principles in the securities
market.
10.1.2. Principle 17 of PFMI that relates to management and mitigation of
‘Operational risk’ requires that systemically important market
infrastructures institutions “should identify the plausible sources of
operational risk, both internal and external, and mitigate their impact through
the use of appropriate systems, policies, procedures, and controls. Systems
should be designed to ensure a high degree of security and operational
reliability and should have adequate, scalable capacity. Business continuity
management should aim for timely recovery of operations and fulfilment of
the FMI’s obligations, including in the event of a wide-scale or major
disruption.”
Annexure
1. Cyber attacks and threats attempt to compromise the Confidentiality,
Integrity and Availability (CIA) of the computer systems, networks and
databases.40 Cyber security framework include measures, tools and processes that
are intended to prevent cyber attacks and improve cyber resilience. Cyber
Resilience is an organisation’s ability to prepare and respond to a cyber-attack and
to continue operation during, and recover from, a cyber attack.
Governance
2. As part of the operational risk management framework to manage risk to
systems, networks and databases from cyber attacks and threats, MII should
formulate a comprehensive cyber security and cyber resilience policy document
encompassing the framework mentioned hereunder. The policy document should
be approved by the Board, and in case of deviations from the suggested
framework, reasons for such deviations should also be provided in the policy
document. The policy document should be reviewed by the MII’s Board at least
annually with the view to strengthen and improve its cyber security and cyber
resilience framework.
3. The cyber security and cyber resilience policy should include the following
process to identify, assess, and manage cyber security risk associated with
processes, information, networks and systems.
a. ‘Identify’ critical IT assets and risks associated with such assets,
b. ‘Protect’ assets by deploying suitable controls, tools and measures,
c. ‘Detect’ incidents, anomalies and attacks through appropriate
monitoring tools / processes,
d. ‘Respond’ by taking immediate steps after identification of the incident,
anomaly or attack,
e. ‘Recover’ from incident through incident management, disaster
recovery and business continuity framework.
4. The Cyber security policy should encompass the principles prescribed by
National Critical Information Infrastructure Protection Centre (NCIIPC) of
National Technical Research Organisation (NTRO), Government of India in the
report titled ‘Guidelines for Protection of National Critical Information
Infrastructure’ and subsequent revisions, if any, from time to time.
40 Confidentiality refers to limiting access of systems and information to authorized users, Integrity
is the assurance that the information is reliable and accurate, and Availability refers to guarantee
of reliable access to the systems and information by authorized users
104
भारतीय प्रततभूतत और तितिमय बोर्ड
Securities and Exchange Board of India
5. MII should also incorporate best practices from standards such as ISO
27001, ISO 27002, COBIT 5, etc., or their subsequent revisions, if any, from time to
time.
6. MII should designate a senior official as Chief Information Security Officer
(CISO) whose function would be to assess, identify and reduce cyber security
risks, respond to incidents, establish appropriate standards and controls, and
direct the establishment and implementation of processes and procedures as per
the cyber security and resilience policy approved by the Board of the MII.
7. The Oversight Standing Committee on Technology41 of the stock exchanges
and of the clearing corporations and the IT Strategy Committee42 of the
depositories should on a quarterly basis review the implementation of the cyber
security and resilience policy approved by their Boards, and such review should
include review of their current IT and cyber security and resilience capabilities, set
goals for a target level of cyber resilience, and establish a plan to improve and
strengthen cyber security and cyber resilience.
8. MII should establish a reporting procedure to facilitate communication of
unusual activities and events to CISO or to the senior management in a timely
manner.
9. The aforementioned committee and the senior management of the MII,
including the CISO, should periodically review instances of cyber attacks, if any,
domestically and globally, and take steps to strengthen cyber security and cyber
resilience framework.
10. MII should define responsibilities of its employees, outsourced staff, and
employees of vendors, members or participants and other entities, who may have
access or use systems / networks of MII, towards ensuring the goal of cyber
security.
Identify
11. MII should identify critical assets based on their sensitivity and criticality
for business operations, services and data management. To this end, MII should
maintain up-to-date inventory of its hardware and systems, software and
information assets (internal and external), details of its network resources,
connections to its network and data flows.
12. MII should accordingly identify cyber risks (threats and vulnerabilities)
41Refer SEBI Circulars SMD/POLICY/Cir-2/98 dated January 14, 1998 and CIR/MRD/DSA/33/2012
dated December 13, 2012.
42 Refer SEBI CIR/MRD/DMS/ 03 /2014 dated January 21, 2014.
105
भारतीय प्रततभूतत और तितिमय बोर्ड
Securities and Exchange Board of India
that it may face, alongwith the likelihood of such threats and impact on the
business and thereby, deploy controls commensurate to the criticality.
13. MII should also encourage its third-party providers, such as service
providers, stock brokers, depository participants, etc. to have similar standards of
Information Security.
Protection
Access Controls
14. No person by virtue of rank or position should have any intrinsic right to
access confidential data, applications, system resources or facilities.
15. Any access to MII’s systems, applications, networks, databases, etc., should
be for a defined purpose and for a defined period. MII should grant access to IT
systems, applications, databases and networks on a need-to-use basis and based on
the principle of least privilege. Such access should be for the period when the access
is required and should be authorized using strong authentication mechanisms.
16. MII should implement strong password controls for users’ access to
systems, applications, networks and databases. Password controls should include
a change of password upon first log-on, minimum password length and history,
password complexity as well as maximum validity period. The user credential
data should be stored using strong and latest hashing algorithms.
17. MII should ensure that records of user access are uniquely identified and
logged for audit and review purposes. Such logs should be maintained and stored
in encrypted form for a time period not less than two (2) years.
18. MII should deploy additional controls and security measures to supervise
staff with elevated system access entitlements (such as admin or privileged users).
Such controls and measures should inter-alia include restricting the number of
privileged users, periodic review of privileged users’ activities, disallow
privileged users from accessing systems logs in which their activities are being
captured, strong controls over remote access by privileged users, etc.
19. Account access lock policies after failure attempts should be implemented
for all accounts.
20. Employees and outsourced staff such as employees of vendors or service
providers, who may be given authorised access to the MII’s critical systems,
networks and other computer resources, should be subject to stringent
supervision, monitoring and access restrictions.
21. Two-factor authentication at log-in should be implemented for all users that
connect using online / internet facility.
106
भारतीय प्रततभूतत और तितिमय बोर्ड
Securities and Exchange Board of India
22. MII should formulate an Internet access policy to monitor and regulate the
use of internet and internet based services such as social media sites, cloud-based
internet storage sites, etc.
23. Proper ‘end of life’ mechanism should be adopted to deactivate access
privileges of users who are leaving the organization or who access privileges have
been withdrawn.
Physical security
24. Physical access to the critical systems should be restricted to minimum.
Physical access of outsourced staff / visitors should be properly supervised by
ensuring at the minimum that outsourced staff / visitors are accompanied at all
times by authorised employees.
25. Physical access to the critical systems should be revoked immediately if the
same is no longer required.
26. MII should ensure that the perimeter of the critical equipments room are
physically secured and monitored by employing physical, human and procedural
controls such as the use of security guards, CCTVs, card access systems, mantraps,
bollards, etc. where appropriate.
Security of Data
30. Data-in motion and Data-at-rest should be in encrypted form by using
strong encryption methods such as Advanced Encryption Standard (AES), RSA,
SHA-2, etc.
31. MII should implement measures to prevent unauthorised access or copying
107
भारतीय प्रततभूतत और तितिमय बोर्ड
Securities and Exchange Board of India
Patch Management
37. MII should establish and ensure that the patch management procedures
include the identification, categorization and prioritisation of security patches. An
implementation timeframe for each category of security patches should be
established to implement security patches in a timely manner.
38. MII should perform rigorous testing of security patches before deployment
into the production environment so as to ensure that the application of patches do
not impact other systems.
destruction, as applicable.
Sharing of information
51. Quarterly reports containing information on cyber attacks and threats
experienced by MII and measures taken to mitigate vulnerabilities, threats and
attacks including information on bugs / vulnerabilities / threats that may be
useful for other MIIs, should be submitted to SEBI.
52. Such details as are felt useful for sharing with other MIIs in masked and
anonymous manner shall be shared using mechanism to be specified by SEBI from
time to time.
Training
53. MII should conduct periodic training programs to enhance awareness level
among the employees and outsourced staff, vendors, etc. on IT / Cyber security
policy and standards. Special focus should be given to build awareness levels and
skills of staff from non-technical disciplines.
54. The training program should be reviewed and updated to ensure that the
contents of the program remain current and relevant.
Periodic Audit
55. The Terms of Reference for the System Audit of MII specified vide circular
CIR/MRD/DMS/13/2011 dated November 29, 2011 shall be accordingly
modified to include audit of implementation of the aforementioned areas.
10.2.1. SEBI Board in its meeting held on September 29, 2020 permitted setting
up of a Limited Purpose Clearing Corporation (LPCC) for clearing and
settling repo transactions in debt securities and accordingly Securities
Contracts (Regulation) (Stock Exchanges and Clearing Corporations)
(Amendment) Regulations, 2020, have been notified on October 08,
2020 (SECC Amendment Regulations 2020).
10.2.2. Additionally, the LPCC has been permitted to have arrangements with
any of the existing Clearing Corporations for the purposes of Cyber
Security.
10.2.3. The framework governing arrangements with existing Clearing
Corporations for the purpose of BCP and DR is placed at Annexure II.
Annexure II
****************
111
भारतीय प्रततभूतत और तितिमय बोर्ड
Securities and Exchange Board of India
10.3.1. MII shall take necessary steps to ensure that its website(s) are resilient
to cyber-attack(s).
10.3.2. Redundant websites: MII shall host its website(s) at multiple DNS
(Domain Naming Servers) and hosts. MII shall put-in place suitable
systems to switch to alternate website(s) hosted on a different DNS /
hosts in the event of a cyber-attack on its primary website(s) and at the
same time, shall take necessary steps to recover from the cyber-attack
on the its primary website(s).
10.3.3. Web Application Firewall (WAF): MII shall mandatorily deploy Web
Application firewalls of demonstrated capabilities.
10.3.4. Continuous monitoring of the website(s): MII shall deploy suitable and
adequate resources for 24x7 monitoring of its website(s), including
monitoring of their website(s) through the SOCs (Security Operations
Center).
10.3.5. MII shall periodically conduct penetration testing of its website(s) and
related systems, at the minimum, once in a calendar year.
10.3.6. In cases where services of 3rd party vendors / service providers are
availed by the MII for hosting of its website(s) and for other related
areas, MII shall ensure that the cyber security and resilience
framework of such 3rd party vendors / service providers are as per the
requirements specified by SEBI for MIIs. Further, MII shall include
audit of the cyber security and resilience framework of such 3rd party
vendors / service providers (limited to the services availed by MIIs) in
the scope of its annual system audit.
10.3.7. MII shall implement the principles mentioned in the 'Guidelines for
Indian Government Websites' developed by National Informatics Centre
(NIC) and adopted by Department of Administrative reforms and Public
Grievances (DARPG) on the areas of 'Website Hosting', 'Website
Management', 'Development', etc. The said guidelines are available at
http://web.guidelines.gov.in/assets/documents/pdf/hand_book.p
df
10.3.8. MII shall frame and implement a Web Server Security Policy that
should cover Network and Host Security Policy, Web Server Backup
and Logging Policy, Web Server Administration and Updation Policy,
Classification of documents to be published on Web Server, Password
Management Policy, Encryption Policy, and Physical Security
10.3.9. In addition to the above, MIIs shall ensure implementation of the
following:
10.3.9.1. MIIs shall advise their auditors to give additional emphasis on the
Application Security audit.
10.3.9.2. MIIs shall include suitable IT / Cyber security related certifications
requirements in the criteria for selection of software developers /
vendors.
10.3.9.3. MIIs shall ensure that their software vendors undertake security
audit of their systems on a periodic basis (at least once a year).
45 SEBI email dated November 11, 2107 captioned Bolstering Cyber Resiliency
113
भारतीय प्रततभूतत और तितिमय बोर्ड
Securities and Exchange Board of India
manage such threat vectors and scenarios, before its SCOT or IT-CS
for assessing the adequacy of steps taken / efficacy of plans and
further improvements. Thereafter, the MII should place a report in
this regard before its Board before submitting the same to SEBI.
10.4.1.5. In addition to the periodic vulnerability assessment and
penetration testing conducted by MIIs to evaluate security posture
of the MII, the MIIs should also conduct periodic table-top
exercises, mock drills, etc. to improve its preparedness to handle
cyber breach/incident. Such exercises should be followed-up with
a detailed review before its SCOT or IT-CS.
10.5.1. Vide circular dated July 06, 2015, SEBI had prescribed the Cyber
Security and Cyber Resilience framework that Stock Exchanges,
Clearing Corporations and Depositories are required to implement.
10.5.2. With the view to further strengthen the said framework and increase
the level of cyber security at MIIs, SEBI has been issuing various
advisories based on the extant cyber threats in the Indian securities
markets from time to time.
10.5.3. Based on internal deliberations, guidance received from CERT-ln and
the recommendations of SEBI's High Powered Steering Committee on
Cyber Security (HPSC-CS) it has been decided that MIIs should
conduct a comprehensive review/ audit of Cyber Security.
10.5.4. ln this regard you are advised to conduct a detailed review/ audit of
the implementation of the SEBI circular and advisories issued by SEBI
from time to time w.r.t. Cyber Security as per the framework enclosed.
The framework includes:
10.5.5. The stipulated timeline for the auditor to submit the report from
commencement of the review / audit is 6 weeks.
10.5.6. The Cyber Security Review Audit Reports and compliance status of the
same should be placed before the Standing Committee on Technology
(SCoT) of Stock Exchanges/ Clearing Corporations and before the IT
Strategy committee (IT-SC) of Depositories for review. The SCoT / IT-
SC should also review the corrective actions taken by the MII and
submit its report to the Governing Board of the MII.
10.5.7. The comments of the SCoT/ IT-SC and the Governing Board of the MII
should be communicated to SEBI.
10.5.8. In order to achieve uniformity in reporting across MIIs, the review/
audit report format and the format followed by the auditor while
reporting findings / observations is being standardized. The draft
structure of the report and the Standardized Observation Reporting
Format are enclosed herein.
10.5.9. As advised by the HPSC-CS, the MIIs should conduct the
comprehensive review/audit at least two times a year.
10.5.10. MIIs are advised to submit a compliance report to SEBI within one
month of the review/audit and the report on corrective action report
within three months post the submission of the compliance report.
115
भारतीय प्रततभूतत और तितिमय बोर्ड
Securities and Exchange Board of India
1.1 SEBI Circular Dated July 06,2015 on Cyber Security and Cyber Resilience
framework of Stock Exchanges, Clearing Corporation and Depositories
1.2 SEBI Advisory dated October 19,2016
1.3 SEBI Advisory dated November 24,2016 on Strengthening Resiliency of
Websites of Stock Exchanges, Clearing Corporations and Depositories (Mils)
1.4 SEBI Advisory dated May 15,2017 on WannaCry Ransomware
1.5 SEBI Advisory dated June 30,2017 on Petya Ransomware
1.6 SEBI Advisory dated September 04,2017 on Locky Ransomware
1.7 SEBI Advisory dated August 09,2017 w.r.t. Communique from NCSC
1.8 Cyber Threat Vectors and Cyber Attack Scenarios communicated vide email
dated August 29, 2017.
In order to achieve uniformity in reporting across MIIs, the review/ audit report
format and the format followed by the auditor while reporting findings/
observations be standardized. The structure of the report and the Standardized
Observation Reporting Format are also attached.
116
भारतीय प्रततभूतत और तितिमय बोर्ड
Securities and Exchange Board of India
Note:
MII’s are expected to submit following information with regards to each major/minor NCs/ suggestion / Observation made in
the Cyber Security Review Audit
MIIs should also categorically highlight those observations/NCs/Suggestions pointed out in their System Audit (current &
previous) which are not yet complied with, which corresponding to the current review finding.
iate syste
Risks m
audit
s
6. C/I/A Affected – Principle of Confidentiality / Integrity / Availability affected due to issue left unaddressed.
7. Risk Rating of Findings as per Auditor - A rating has to been given for each of the observations based on their impact and
severity to reflect the risk exposure, as well as the suggested priority for action.
Rating Description
119
भारतीय प्रततभूतत और तितिमय बोर्ड
Securities and Exchange Board of India
Weakness in control which represent exposure to the organization or risks that could lead
HIGH to instances of noncompliance with the requirements of TORs. These risks need to be
addressed with utmost priority.
Potential weakness in controls, which could develop into an exposure or issues that
MEDIUM represent areas of concern and may impact internal controls. These should be addressed
reasonably promptly.
Potential weaknesses in controls, which in combination with other weakness can develop
LOW into an exposure. Suggested improvements for situations not immediately/directly
affecting controls.
8. SEBI Cyber Security Clause – The clause corresponding to this observation w.r.t SEBI Circular dated July 06, 2015 on Cyber
Security
9. Audited By – Name (s) of audit team member
10. Test Cases used – The details of test cases used for arriving at this observation, provide annexure numbers in case of
detailed test cases.
11. Root Cause Analysis – A detailed analysis on the cause of the nonconformity
12. Impact Analysis – An analysis of the likely impact on the operations/activity of the organization
13. Corrective Action proposed by auditor – The action taken to correct the non- conformity
14. Deadline for the Corrective Action – The auditor should specify the deadline not only for the corrective action on the
system where the NC/ Observation was found, but also should specify the deadline for corrective action on systems where
similar observations could have been found/ are found.
15. Management response in case of acceptance of associate Risks
16. Whether similar issue was observed in any of the previous 3 system audits
17. List of Documentary evidence verified during review / audit (Annexure Nos.)
120
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
10.6. Cyber Security and Cyber Resilience framework of Stock Exchanges, Clearing
Corporations and Depositories47
10.6.1. Recognizing the need for a robust Cyber Security and Cyber Resilience framework
at Market Infrastructure Institutions (MIIs), i.e., Stock Exchanges, Clearing
Corporations and Depositories, vide SEBI Circular CIR/MRD/DP/13/2015 dated
July 06, 2015, a detailed regulatory framework on cyber security and cyber
resilience was prescribed.
10.6.2. With the view to further strengthening the aforesaid framework particularly in
respect of monitoring of cyber threats and cyber resiliency, the matter was
discussed with SEBI’s Technical Advisory Committee (TAC), SEBI’s High
Powered Committee on Cyber Security (HPSC-CS) and the MIIs.
10.6.3. Accordingly, it has been decided that MIIs shall have a Cyber Security Operation
Center (C-SOC) that would be a 24x7x365 set-up manned by dedicated security
analysts to identify, respond, recover and protect from cyber security incidents.
10.6.4. The C-SOC shall function in accordance with the framework specified in SEBI
Circular CIR/MRD/DP/13/2015 dated July 06, 2015. Illustrative list of broad
functions and objectives to be carried out by a C-SOC are mentioned hereunder:
10.6.5. Further to the above, the C-SOC of MII shall, at the minimum, undertake the
following activities:
10.6.5.1. In order to detect intrusions / security incidents in real time, the C-SOC should
monitor and analyze on a 24x7x365 basis relevant logs of MII’s network
devices, logs of MII’s systems, data traffic, suitable cyber intelligence (intel)
feeds sourced from reliable vendors, inputs received from other MIIs, inputs
received from external agencies such as CERT-In, etc. The cyber intelligence
(intel) feeds may include cyber news feeds, signature updates, incident reports,
threat briefs, and vulnerability alerts.
10.6.5.2. To this end, appropriate alert mechanisms should be implemented including a
comprehensive dashboard, tracking of key security metrics and provide for
cyber threat scorecards.
10.6.5.3. The C-SOC should conduct continuous assessment of the threat landscape
faced by the MII including undertaking periodic VAPT (Vulnerability
Assessment and Penetration Testing).
10.6.5.4. The C-SOC should have the ability to perform Root Cause Analysis, Incident
Investigation, Forensic Analysis, Malware Reverse Engineering, etc. to
determine the nature of the attack and corrective and/or preventive actions to
be taken thereof.
10.6.5.5. The C-SOC should conduct periodic (at the minimum quarterly) cyber attack
simulation to aid in developing cyber resiliency measures. The C-SOC should
develop and document mechanisms and standard operating procedures to
recover from the cyber-attacks within the stipulated RTO of the MII. The C-
SOC should also document various scenarios and standard operating
procedures for resuming operations from Disaster Recovery (DR) site of MII.
10.6.5.6. The C-SOC should conduct periodic awareness and training programs at the
MII and for its members / participants / intermediaries with regard to cyber
security, situational awareness and social engineering.
10.6.5.7. The C-SOC should be capable to prevent attacks similar to those already faced.
The C-SOC should also deploy multiple honey pot services which are dynamic
in characteristics to avoid being detected as honey pot by attackers.
10.6.6. As building an effective C-SOC requires appropriate mix of right people, suitable
security products (Technology), and well-defined processes and procedures
(Processes), an indicative list of areas that MIIs should consider while designing
and implementing a C-SOC are as follows:
122
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
10.6.6.1. The MII shall ensure that the governance and reporting structure of the C-SOC
is commensurate with the risk and threat landscape of the MII. The C-SOC shall
be headed by the Chief Information Security Officer (CISO) of the MII. The CISO
shall be designated as a Key Managerial Personnel (KMP) and relevant
provisions relating to KMPs in the SEBI Securities Contracts (Regulation) (Stock
Exchanges and Clearing Corporations) Regulations, 2012 and the subsequent
circulars issued by SEBI relating to KMPs, shall apply to the CISO.48
10.6.6.2. While the CISO is expected to work closely with various departments of MIIs,
including MII’s Network team, Cyber Security team and Information
Technology (IT) team, etc., the reporting of CISO shall be directly to the MD &
CEO of the MII.
10.6.6.3. The roles and responsibilities of CISO may be drawn from Ministry of
Electronics and IT notification No. 6(12)/2017-PDP-CERT-In dated March 14,
2017.49
10.6.6.4. The C-SOC should deploy appropriate technology tools of adequate capacity
to cater to its requirements. Such tools shall, at the minimum, include
Security Analytics Engine, Malware detection tools, Network and User Traffic
Monitoring and Behavior Analysis systems, Predictive Threat Modelling tools,
Tools for monitoring of System parameters for critical systems / servers, Deep
Packet Inspection tools, Forensic Analysis tools, etc.
10.6.6.5. Each MII is advised to formulate a Cyber Crisis Management Plan (CCMP)
based on its architecture deployed, threats faced and nature of operations. The
CCMP should define the various cyber events, incidents and crisis faced by the
MII, the extant cyber threat landscape, the cyber resilience envisaged, incident
prevention, cyber crisis recognition, mitigation and management plan. The
CCMP should be approved by the respective Standing Committee on
Technology / IT- Strategy Committee of the MIIs and the governing board of
the MII. The CCMP should also be reviewed and updated annually.
10.6.6.6. The C-SOC should have well-defined and documented processes for
monitoring of its systems and networks, analysis of cyber security threats and
potential intrusions / security incidents, usage of appropriate technology tools
deployed by C-SOC, classification of threats and attacks, escalation hierarchy
of incidents, response to threats and breaches, and reporting (internal and
external) of the incidents.
10.6.6.7. The C-SOC should employ domain experts in the field of cyber security and
resilience, network security, data security, end-point security, etc.
SEBI Securities Contracts (Regulation) (Stock Exchanges and Clearing Corporations) Regulations, 2012
48
CISO roles & responsibilities - Ministry of Electronics and IT notification No. 6(12)/2017-PDP-CERT-In dated
49
10.6.6.8. The MIIs are also advised to build a contingent C-SOC at their respective DR
sites with identical capabilities w.r.t. the primary C-SOC in line with the SEBI
Circular CIR/MRD/DMS/12/2012 dated April 13, 2012 read with SEBI
Circular CIR/MRD/DMS/17/2012 dated June 22, 2012. Additionally, the MIIs
should perform monthly live-operations from their DR-C-SOC.
10.6.6.9. The C-SOC should document the cases and escalation matrices for declaring a
disaster.
10.6.7. In view of the feedback received from MIIs, it has been decided that MIIs may
choose any of the following models to set-up their C-SOC:
10.6.8. A report on the functioning of the C-SOC, including details of cyber-attacks faced
by the MII, major cyber events warded off by the MII, cyber security breaches,
data breaches should be placed on a quarterly basis before the board of the MII.
10.6.9. The system auditor of the MII shall audit the implementation of the aforesaid
guidance in the annual system audit of the MII. The Scope and/or Terms of
Reference (ToR) of the annual system would accordingly be modified to include
audit of the implementation of the aforementioned areas.
10.6.10. Further, in continuation to the requirement specified at para 52 of the Annexure
A to the aforementioned SEBI Circular dated July 06, 2015, the C-SOC shall share
relevant alerts and attack information with members / participants /
intermediaries of the MII, other MIIs, external cyber response agencies such as
CERT-In, and SEBI.
124
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
Annexure A
1.1. Security Analyst Level 1 (L1): This function may be mostly outsourced
(a) Monitoring SIEM Solution console for identifying the security events
generated by the log sources integrated with SIEM tools.
(b) Identification of security events that are false +ve before qualifying event as
an incident.
(c) Identify the exceptions which are identified as an event (e.g. VA scanning
performed by SEBI appointed 3rd party which may be identified as port
scanning attack) .
(d) Perform first level event analysis before qualifying the incidents.
(e) Qualifying the event as an incident using Knowledgebase.
(f) Escalating exceptions & Events to L2 level.
(g) Log Incident tickets in service management tool and assign it to the
respective team.
(h) Follow-up for the closure of the incident tickets generated.
1.5. Security Subject Matter Expert for Security technologies: In-house with reliance
on external expertise
(a) Subject Matter Expert (SME) for SIEM and Advance security solutions.
(b) Assist you with troubleshooting steps to be performed by you in order to
re-establish connectivity between the SIEM System and SEBI’s locations.
(c) Provide software-level management for the SIEM System components;
(d) Verify data collection and log continuity;
(e) Manage user access including user and group permissions updates;
(f) Review application performance, capacity, and availability make
recommendations as appropriate;
(g) Review SIEM System disk space usage;
(h) Verify time synchronization among SIEM System components;
(i) Perform archival management and retrieval per change management
process;
126
भारतीय प्रततभतू त और तितिमय बोर्ड
Securities and Exchange Board of India
essentials- enterprise-defender
4) MGT414: SANS Training Program for CISSP® Certification
https://www.sans.org/course/sans-plus-s-training-program-cissp-
certification-exam
128
भारतीय प्रततभूतत और तितिमय बोर्ड
Securities and Exchange Board of India
10.7.1. Recognizing the need for a robust Cyber Security and Cyber Resilience
framework at Market Infrastructure Institutions (MIIs), i.e. Stock
Exchanges, Clearing Corporations and Depositories, SEBI vide Circular
CIR/MRD/DP/13/2015 dated July 06, 2015, prescribed a detailed
regulatory framework on cyber security and cyber resilience.
10.7.2. With the view to further strengthening cyber security in securities market
the Cyber Security and Cyber Resilience framework has been extended to
Stock Brokers/ Depository Participants vide circular
SEBI/HO/MIRSD/CIR/PB/2018/147 dated December 03, 2018.
10.7.3. During the discussions held with the market participants, it was gathered
that compliance with the cyber security guidelines may be onerous for
smaller intermediaries because of the lack of knowledge in cyber security
and also the cost factor involved in setting up own Security Operations
Center (SOC). These intermediaries may utilize the services of Market SOC
which is proposed to be set up by MIIs with the objective of providing
cyber security solution to such intermediaries. The intermediaries’
membership in Market SOC is non mandatory.
10.7.4.1. The Market SOC shall be set up as a separate entity and MIIs shall have
at least 51% stake in the new entity.
10.7.4.2. Intermediaries who don’t have capability to set up a SOC on their own
can opt for the Market SOC.
10.7.4.3. The Market SOC should be in accordance to the circular
SEBI/HO/MIRSD/CIR/PB/2018/147 dated December 03, 2018 and
should ensure that participating intermediaries are in compliance to
the said circular, should they opt for the market SOC. Market SOC
would provide only the technology perspective for the
abovementioned cyber security guidelines and the people & process
perspectives of cyber security as mandated by the aforementioned
circular would still be have to be managed by the intermediaries.
10.7.4.4. The Market SOC should be evolving continuously in order to be able
to manage new security controls and guidelines that may issue by SEBI
from time to time.
129
भारतीय प्रततभूतत और तितिमय बोर्ड
Securities and Exchange Board of India
10.7.4.5. The Market SOC to ensure that intermediaries participating in their SOC
should adhere to the minimum IT guidelines and security protocols all
the time.
10.7.4.6. MII will carry out audit of their Market SOC activity annually and
submit the report to SEBI.
10.7.4.7. The Market SOC will issue an audit report as prescribed in the circular
SEBI/HO/MIRSD/CIR/PB/2018/147 dated December 03, 2018, to the
participating intermediary.
10.7.4.8. If an intermediary is subscribed to Market SOC, audit report submitted
by intermediary through the Market SOC would be deemed compliant.
10.7.4.9. Approval for the Market SOC which is to be set up as a separate entity
would be in terms of Regulation 38 of Securities Contracts (Regulation)
(Stock Exchanges and Clearing Corporations) Regulations, 201851.
10.8. Reporting for Artificial Intelligence (AI) and Machine Learning (ML)
applications and systems offered and used by Market Infrastructure
Institutions (MIIs)52
Background
130
भारतीय प्रततभूतत और तितिमय बोर्ड
Securities and Exchange Board of India
Regulatory requirements
10.8.4. All MIIs shall fill in the AI / ML reporting form (Annexure B) in respect
of the AI or ML based applications or systems as defined in Annexure A
offered or used by them, and submit the same in soft copy only at
[email protected] (for Stock Exchanges)/ [email protected]
(for Depositories)/ [email protected] (for Clearing Corporations) to
SEBI on a quarterly basis within 15 days of the expiry of the quarter, with
effect from quarter ending March 31, 2019.
131
भारतीय प्रततभूतत और तितिमय बोर्ड
Securities and Exchange Board of India
132
भारतीय प्रततभूतत और तितिमय बोर्ड
Securities and Exchange Board of India
11.1.4. In order to ensure that the facility of co-location / proximity hosting does
not compromise integrity and security of the data and trading systems,
stock exchanges shall:
11.2.1. SEBI, vide circular CIR/MRD/DP/09/2012 dated March 30, 2012 and
circular CIR/MRD/DP/16/2013 dated May 21, 2013 put in place the
broad guidelines for algorithmic trading in the securities market. Further,
SEBI, vide circular CIR/MRD/DP/07/2015 dated May 13, 2015 and
circular SEBI/HO/MRD/DP/CIR/P/2016/129 dated December 01, 2016
laid down guidelines to ensure fair and equitable access to the Co-
location/proximity hosting facility offered by stock exchanges.
11.2.2. In order to address the concerns relating to algorithmic trading and co-
location/ proximity hosting facility offered by stock exchanges and to
provide a level playing field between Algorithmic/ Co-located trading
and manual trading, SEBI issued a discussion paper on August 5, 2016
requesting market participants to provide their views on the efficacy and
133
भारतीय प्रततभूतत और तितिमय बोर्ड
Securities and Exchange Board of India
11.2.4. In order to facilitate small and medium sized Members, who otherwise find
it difficult to avail colocation facility, due to various reasons including but
not limited to high cost, lack of expertise in maintenance and
troubleshooting, etc. to avail co-location facility, stock exchanges shall
introduce ‘Managed Co-location Services’. Under this facility, space/rack
in co-location facility shall be allotted to eligible vendors by the stock
exchange along with provision for receiving market data for further
dissemination of the same to their client members and the facility to place
orders (algorithmic / non-algorithmic) by the client members from such
facility.
11.2.5. The vendors shall provide the technical knowhow, hardware, software
and other associated expertise as services to trading members and shall be
responsible for upkeep and maintenance of all infrastructure in the racks
provided to them.
11.2.6. Stock exchanges shall supervise and monitor such facilities on a
continuous basis. While allowing such services, stock exchanges shall
continue to abide by the provisions of SEBI circular
CIR/MRD/DP/07/2015 dated May 13, 2015 and circular
SEBI/HO/MRD/DP/CIR/P/2016/129 dated December 01, 2016,
including remaining responsible and accountable for actions of vendors
providing Managed Co-location Services and ensuring integrity, security
and privacy of data, being handled at the facility.
11.2.7. Further, in order to have fair competition, stock exchanges are advised to
ensure that multiple vendors are permitted for providing Managed Co-
location Services at their co-location facility.
11.2.8. Clause 3.9 of SEBI circular CIR/MRD/DP/07/2015 dated May 13, 2015,
mandated stock exchanges to publish suitable quarterly reports on their
websites on latencies observed at the exchange.
134
भारतीय प्रततभूतत और तितिमय बोर्ड
Securities and Exchange Board of India
11.2.9. Currently, latency is measured by the Stock Exchange as the time taken to
complete the round trip from the Core Router (Core Router is the place
where both Colo-location orders and Non-colocation orders meet) to the
matching engine and back. In order to bring in greater transparency, stock
exchanges shall additionally publish minimum, maximum and mean
latencies and latencies at 50th and 99th percentile.
11.2.10. Stock Exchanges shall also publish reference latency, which is the time
taken for an order message to travel between a reference rack in the
Colocation facility and the Core Router.
Free of Charge Tick-by-Tick Data feed (TBT Feed)
11.2.14. In order to ensure orderly trading in the market, vide circulars no.
CIR/MRD/DP/ 09 /2012 dated March 30, 2012 and CIR/MRD/DP/ 16
/2013 dated May 21, 2013, stock exchanges were advised to put in place
effective economic disincentives for high daily order-to-trade ratio (OTR)
of algo orders placed by trading members. In order to encourage algo
traders to place more orders closer to the last traded price (LTP), the
following modification shall be carried out in the existing OTR framework:
11.2.14.1. Instead of orders placed within ±1%, orders placed within ±0.75% of
the LTP shall be exempted from the framework for imposing penalty
for high OTR.
11.2.14.2. Orders placed in the cash segment and orders placed under the
liquidity enhancement schemes shall also be brought under the OTR
framework.
135
भारतीय प्रततभूतत और तितिमय बोर्ड
Securities and Exchange Board of India
11.2.15. Further, on the basis of request received from the stock exchange(s), the
following modification shall be carried out in the existing OTR
framework55:
11.2.16. Clause 6 (vi) of SEBI circular CIR/MRD/DP09/2012 dated March 30, 2012,
prescribed that all algorithmic orders be tagged with a unique identifier
provided by the stock exchange in order to establish audit trail.
11.2.17. In order to ensure enhanced surveillance, stock exchanges shall now allot a
unique identifier to each algorithm approved by them. Stock exchanges
shall ensure that every algorithm order reaching on exchange platform is
tagged with the unique identifier allotted to the respective algorithm and
that such unique identifier tags are part of the data set sent / shared with
SEBI for surveillance purpose.
11.2.18. SEBI, vide Circular no. CIR/MRD/DP/24/2013 dated August 19, 2013,
inter alia, prescribed the testing procedure to be followed by market
participants before deployment of software and algorithms. In order to
further streamline and strengthen the process of testing of software and
algorithms, stock exchanges may provide a simulated market
environment for testing of software including algos. Such a facility may be
made available over and beyond the current framework of mock trading
prescribed by SEBI.
Stock exchanges shall ensure that the tagging of each order each algorithm
with its unique identifier is completed by September 30, 2018, while the
136
भारतीय प्रततभूतत और तितिमय बोर्ड
Securities and Exchange Board of India
other provisions of the circular shall be complied with at the earliest but
not later than June 30, 2018.
137
भारतीय प्रततभूतत और तितिमय बोर्ड
Securities and Exchange Board of India
11.3.3.3. Facility that allows stock brokers/ data vendors to connect to the
stock exchange trading system over a Local Area Network (LAN)
shall fall within the definition of “Colocation / proximity hosting” as
provided in SEBI circular dated May 13, 2015.
138
भारतीय प्रततभूतत और तितिमय बोर्ड
Securities and Exchange Board of India
12.1.1. Being critical infrastructure of the securities market, it is imperative for the
stock exchanges and clearing corporations to continuously assess and
monitor their system capacities. Over the years, stock exchanges and
clearing corporations have experienced increase in volumes owing to the
growth of the market and have accordingly taken steps to increase
capacities of their trading, clearing and settlement infrastructure.
12.1.2. Stock exchanges and Clearing corporations are advised to ensure the
following requirements while planning capacities of their trading, clearing
and settlement and risk management related infrastructure:
12.1.2.1. The installed capacity shall be at least 1.5 times (1.5x) of the projected
peak load.
12.1.2.2. The projected peak load shall be calculated for the next 60 days based
on the per-second peak load trend of the past 180 days.
12.1.2.3. All systems in trading, clearing and settlement ecosystem shall be
considered in this process including all technical components such as
network, hardware, software, etc., and shall be adequately sized to
meet the capacity requirements.
12.1.2.4. In case the actual capacity utilisation exceeds 75% of the installed
capacity, immediate action shall be taken to enhance the capacity.
139
भारतीय प्रततभूतत और तितिमय बोर्ड
Securities and Exchange Board of India
13.1.4. Further, SEBI vide circular dated March 30, 2013 had inter alia directed
stock exchanges to synchronize their system clocks with the atomic clock
before the start of market such that their clocks have precision of at least
one microsecond and accuracy of at least +/-one millisecond. In this
regard, the stock exchange should ensure that all clocks of the servers and
other related systems are synchronized. Stock exchanges may adopt
suitable mechanism to ensure such synchronization of system clocks.
140
भारतीय प्रततभूतत और तितिमय बोर्ड
Securities and Exchange Board of India
141
भारतीय प्रततभूतत और तितिमय बोर्ड
Securities and Exchange Board of India
142