RBI Cyber Security Framework for UCBs
Best for: All Urban Cooperative Banks (UCBs) regulated by the Reserve Bank of India, regardless of size or asset base. The RBI circular applies uniformly to scheduled and non-scheduled UCBs. If your institution holds a UCB license from RBI and operates core banking or digital payment channels, this framework applies. Technology service providers and managed security vendors serving UCBs should also align to these requirements to support their clients' compliance obligations.
| Mandatory? | Mandatory for Urban Cooperative Banks regulated by RBI |
| Who validates? | RBI supervisory examination ยท No self-assessment |
| Renewal | Annual compliance reporting |
| Scope | Urban Cooperative Banks; IT systems and cybersecurity controls |
๐ Reserve Bank of India (RBI), Department of Supervision ยท RBI Cyber Security Framework for UCBs (2018) Official source โ
Get Started
module "..." {
source = "rbicybersecurity.compliance.tf/terraform-aws-modules/<module>/aws"
version = "<version>"
}What Compliance.tf Covers vs. What You Handle
What Compliance.tf automates
- Encryption at Rest: Runs controls checking DynamoDB table encryption (both default and KMS CMK), API Gateway cache encryption, and CloudTrail log encryption with customer-managed keys. Flags any resource using only default encryption when the framework expects KMS CMK.
- Encryption in Transit: Validates that API Gateway stages have SSL certificates attached and checks ACM certificate expiry within 30 days. Detects endpoints without TLS enforcement.
- Audit Trail and Logging: Checks for multi-region CloudTrail enablement, S3 data event logging (read and write), CloudWatch integration, API Gateway stage logging, and log group retention of at least 365 days. Covers 10 controls in this area.
- Network Exposure Prevention: Detects Auto Scaling launch configs with public IPs enabled, DMS replication instances with public accessibility, and API Gateway stages missing WAF web ACL association.
- Backup and Disaster Recovery: Verifies DynamoDB tables are included in AWS Backup plans. Flags tables without any backup configuration.
- Governance and Account Structure: Checks whether the AWS account belongs to an AWS Organizations structure, confirming centralized governance and policy enforcement.
What you handle
- Encryption at Rest: Key rotation schedules, IAM access policies on CMKs, and a key custodian register are your responsibility. RBI expects documented key management procedures, not just the technical controls.
- Encryption in Transit: Procure and renew certificates before expiry, enforce minimum TLS version policies across all banking channels, and document SSL/TLS configurations for audit evidence.
- Audit Trail and Logging: Log review is a function, not a configuration. Your SOC or designated monitoring team owns alerting thresholds and SIEM integration. Periodic log analysis is explicitly called out in RBI's monitoring provisions.
- Network Exposure Prevention: Design and maintain network architecture diagrams, implement firewall rules beyond AWS-native controls, conduct periodic penetration testing, and document network segmentation rationale.
- Backup and Disaster Recovery: Define recovery time objectives (RTO) and recovery point objectives (RPO) per RBI guidelines, conduct periodic DR drills, maintain offsite backup documentation, and test restoration procedures at least annually.
- Governance and Account Structure: Establish an IT Steering Committee and a dedicated information security function as mandated by RBI. Document organizational reporting lines, define roles and responsibilities, and maintain board-approved cybersecurity policies.
Controls by Category
Audit Logging and Trail Management (3 controls)
Auditors verify that all API and infrastructure activity is logged across every region with no gaps. They expect evidence of centralized log aggregation via CloudWatch integration and will flag accounts where trails cover only a single region. Common finding: CloudTrail enabled but S3 data event logging missing, leaving object-level access unaudited.
Data Protection and Encryption (5 controls)
KMS customer-managed keys, not AWS default encryption, are what assessors want to see on DynamoDB tables, CloudTrail logs, and API Gateway cache. Valid SSL certificates on all external endpoints are checked as well. Expired or soon-to-expire ACM certificates are a recurring finding during assessments.
Log Retention and Evidence Preservation (1 control)
Unset retention policies on CloudWatch log groups are one of the most common findings in this category. The minimum bar is 365 days, and assessors check this directly during RBI supervisory inspections. Left unaddressed, default groups either accumulate cost indefinitely or get cleaned up, destroying the forensic record in the process.
Network Security and Access Restrictions (1 control)
RBI expects UCBs to prevent unauthorized network exposure of banking infrastructure. Auditors check that compute instances and database replication endpoints are not directly internet-accessible, and WAF association on API stages is verified to confirm protection against OWASP Top 10 threats. Legacy launch configurations that still assign public IPs are a persistent problem.
Additional Controls (69)
AWS IAM (2)
AWS Lambda (2)
Amazon CloudWatch Logs (1)
Amazon EBS (2)
Amazon EC2 (2)
Amazon EFS (2)
Amazon ElastiCache (1)
Amazon OpenSearch Service (5)
Amazon RDS (12)
Amazon Redshift (8)
Amazon S3 (11)
Amazon SageMaker (4)
Elastic Load Balancing (8)
Related Frameworks
NIST 800-53 Rev 5 โ ๐ก Medium overlap (45%)
RBI's cyber security framework draws heavily from NIST 800-53 concepts, particularly in the access control (AC), audit and accountability (AU), and system and communications protection (SC) families. NIST provides more granular control specifications, while RBI focuses on banking-specific implementation guidance.
PCI DSS v3.2.1 โ ๐ก Medium overlap (35%)
Both frameworks address encryption, logging, and network segmentation for payment infrastructure. PCI DSS is more prescriptive about cardholder data environments specifically, while RBI covers broader banking operations including core banking and SWIFT.
SOC 2 โ ๐ก Medium overlap (30%)
SOC 2 trust service criteria for security and availability partially overlap with RBI's requirements on access control, monitoring, and business continuity. SOC 2 is attestation-based with broader applicability, whereas RBI is a regulatory mandate specific to Indian UCBs.