compliance.tf
Compliance FrameworksSpecialized Frameworks

RBI Cyber Security Framework for UCBs

Best for: All Urban Cooperative Banks (UCBs) regulated by the Reserve Bank of India, regardless of size or asset base. The RBI circular applies uniformly to scheduled and non-scheduled UCBs. If your institution holds a UCB license from RBI and operates core banking or digital payment channels, this framework applies. Technology service providers and managed security vendors serving UCBs should also align to these requirements to support their clients' compliance obligations.

Mandatory?Mandatory for Urban Cooperative Banks regulated by RBI
Who validates?RBI supervisory examination ยท No self-assessment
RenewalAnnual compliance reporting
ScopeUrban Cooperative Banks; IT systems and cybersecurity controls

๐Ÿ› Reserve Bank of India (RBI), Department of Supervision ยท RBI Cyber Security Framework for UCBs (2018) Official source โ†’

Get Started

module "..." {
  source  = "rbicybersecurity.compliance.tf/terraform-aws-modules/<module>/aws"
  version = "<version>"
}

What Compliance.tf Covers vs. What You Handle

What Compliance.tf automates

  • Encryption at Rest: Runs controls checking DynamoDB table encryption (both default and KMS CMK), API Gateway cache encryption, and CloudTrail log encryption with customer-managed keys. Flags any resource using only default encryption when the framework expects KMS CMK.
  • Encryption in Transit: Validates that API Gateway stages have SSL certificates attached and checks ACM certificate expiry within 30 days. Detects endpoints without TLS enforcement.
  • Audit Trail and Logging: Checks for multi-region CloudTrail enablement, S3 data event logging (read and write), CloudWatch integration, API Gateway stage logging, and log group retention of at least 365 days. Covers 10 controls in this area.
  • Network Exposure Prevention: Detects Auto Scaling launch configs with public IPs enabled, DMS replication instances with public accessibility, and API Gateway stages missing WAF web ACL association.
  • Backup and Disaster Recovery: Verifies DynamoDB tables are included in AWS Backup plans. Flags tables without any backup configuration.
  • Governance and Account Structure: Checks whether the AWS account belongs to an AWS Organizations structure, confirming centralized governance and policy enforcement.

What you handle

  • Encryption at Rest: Key rotation schedules, IAM access policies on CMKs, and a key custodian register are your responsibility. RBI expects documented key management procedures, not just the technical controls.
  • Encryption in Transit: Procure and renew certificates before expiry, enforce minimum TLS version policies across all banking channels, and document SSL/TLS configurations for audit evidence.
  • Audit Trail and Logging: Log review is a function, not a configuration. Your SOC or designated monitoring team owns alerting thresholds and SIEM integration. Periodic log analysis is explicitly called out in RBI's monitoring provisions.
  • Network Exposure Prevention: Design and maintain network architecture diagrams, implement firewall rules beyond AWS-native controls, conduct periodic penetration testing, and document network segmentation rationale.
  • Backup and Disaster Recovery: Define recovery time objectives (RTO) and recovery point objectives (RPO) per RBI guidelines, conduct periodic DR drills, maintain offsite backup documentation, and test restoration procedures at least annually.
  • Governance and Account Structure: Establish an IT Steering Committee and a dedicated information security function as mandated by RBI. Document organizational reporting lines, define roles and responsibilities, and maintain board-approved cybersecurity policies.

Controls by Category

Audit Logging and Trail Management (3 controls)

Auditors verify that all API and infrastructure activity is logged across every region with no gaps. They expect evidence of centralized log aggregation via CloudWatch integration and will flag accounts where trails cover only a single region. Common finding: CloudTrail enabled but S3 data event logging missing, leaving object-level access unaudited.

Data Protection and Encryption (5 controls)

KMS customer-managed keys, not AWS default encryption, are what assessors want to see on DynamoDB tables, CloudTrail logs, and API Gateway cache. Valid SSL certificates on all external endpoints are checked as well. Expired or soon-to-expire ACM certificates are a recurring finding during assessments.

Log Retention and Evidence Preservation (1 control)

Unset retention policies on CloudWatch log groups are one of the most common findings in this category. The minimum bar is 365 days, and assessors check this directly during RBI supervisory inspections. Left unaddressed, default groups either accumulate cost indefinitely or get cleaned up, destroying the forensic record in the process.

Network Security and Access Restrictions (1 control)

RBI expects UCBs to prevent unauthorized network exposure of banking infrastructure. Auditors check that compute instances and database replication endpoints are not directly internet-accessible, and WAF association on API stages is verified to confirm protection against OWASP Top 10 threats. Legacy launch configurations that still assign public IPs are a persistent problem.

Additional Controls (69)

NIST 800-53 Rev 5 โ€” ๐ŸŸก Medium overlap (45%)

RBI's cyber security framework draws heavily from NIST 800-53 concepts, particularly in the access control (AC), audit and accountability (AU), and system and communications protection (SC) families. NIST provides more granular control specifications, while RBI focuses on banking-specific implementation guidance.

PCI DSS v3.2.1 โ€” ๐ŸŸก Medium overlap (35%)

Both frameworks address encryption, logging, and network segmentation for payment infrastructure. PCI DSS is more prescriptive about cardholder data environments specifically, while RBI covers broader banking operations including core banking and SWIFT.

SOC 2 โ€” ๐ŸŸก Medium overlap (30%)

SOC 2 trust service criteria for security and availability partially overlap with RBI's requirements on access control, monitoring, and business continuity. SOC 2 is attestation-based with broader applicability, whereas RBI is a regulatory mandate specific to Indian UCBs.

Frequently Asked Questions

Does this framework apply to all cooperative banks or only certain categories?
It applies to all Urban Cooperative Banks (UCBs) regulated by RBI, both scheduled and non-scheduled. State cooperative banks and district central cooperative banks fall under separate NABARD guidelines, not this framework. If your banking license is from RBI and you are classified as a UCB, you must comply.
What is the compliance timeline and reporting cadence?
UCBs were expected to implement baseline controls upon issuance of the circular in December 2019. Ongoing compliance requires annual self-assessment and submission of a cyber security posture report to RBI's Regional Office. RBI supervisory inspection teams may also evaluate controls during scheduled or thematic inspections.
Is there a formal certification or just self-assessment?
RBI does not mandate third-party certification. Compliance is demonstrated through self-assessment reports submitted to RBI, internal audit findings, and evidence produced during RBI inspections. That said, many UCBs engage external IS auditors (CERT-In empaneled or CISA-certified professionals) to strengthen their assessment credibility.
How does this framework interact with RBI's broader IT governance guidelines?
This cyber security framework supplements the RBI Master Direction on Information Technology Framework for UCBs (2018). The IT Framework covers broader IT governance, IS audit, and IT service management. The cyber security circular adds specific requirements for SOC operations, incident reporting to CERT-In and RBI, vulnerability management, and advanced threat detection. Both must be addressed together.
What happens if a UCB fails to comply?
RBI can issue supervisory directions, impose monetary penalties under Section 46 of the Banking Regulation Act 1949, or restrict certain digital banking services. Repeated non-compliance may trigger enhanced supervisory scrutiny, restrictions on branch expansion, or other corrective action under RBI's Prompt Corrective Action framework for UCBs.

On this page

Ask AI about this

Help improve this page