Security Control Checklist

Last Updated: 14 Sep , 2024

Appendix – A

Limited Technical Info for Troubleshooting (NO Prod Data)
SnoControlDomainEvidence Requirement
1Whether third party has processes in place to permanently erase SBI data from all environments (LIVE/archived or data in external media), immediately after the need or clearly defined retention period as per the business engagement? Whether mechanism is in place to monitor the same?Data SecuritySelf-certificate from the Third Party.
Lead Data Shared Acknowledgement Sent including CO-lending and NBFCs (where data originates from Third Party)
SnoControlDomainEvidence Requirement
1Whether the PII/ SPDI data is secured in transit by encryption with best-in-class encryption standards as per global best practises?Data SecurityEvidence of encryption techniques implemented
2Whether the Third Party has a Secure Software Development Lifecycle Environment that includes both Software Development and secured usage of Open-Source Tools.Security AssessmentRegulator/ Gov approved or CERT empanelled auditors report on assessment of the security practices at third party environment (or) Evidence for implementation of the Control Objective
Data Shared for fetching (enquiry) – Sync API calls. No data Stored at Third Party
SnoControlDomainEvidence Requirement
1Whether the PII/ SPDI data is secured in transit by encryption with best-in-class encryption standards as per global best practises?Data SecurityEvidence of encryption techniques implemented
2Whether the Third Party has a Secure Software Development Lifecycle Environment that includes both Secure Software Development in terms of the Production Code but also addressing vulnerabilities in the Open-Source Tools used in Software DevelopmentSecurity AssessmentRegulator/ Gov approved or CERT empanelled auditors report on assessment of the security practices at third party environment (or) Evidence for implementation of the Control Objective
Software Procurement (IPR not with the Bank)
SnoControlDomainEvidence Requirement
1Whether the Third Party has a Secure Software Development Lifecycle Environment that includes both Software Development and secured usage of Open-Source Tools.Security AssessmentRegulator/ Gov approved or CERT empanelled auditors report on assessment of the security practices at third party environment (or) Evidence for implementation of the Control Objective
2Assurance from independent third party on security stature of the procured products, indicating that product is free from vulnerabilities.Application SecurityFor Products with Integrations:

Regulator/ Gov approved or CERT empanelled auditors report on the Build deployed in SBI (covering various aspects of security Review like Application Security, Source Code Review, API Security, Authentication. mechanism, Log Review etc

For Stand Alone Products :

Relevant assurance as per the Approved Software Procurement Note
Development Offsite
SnoControlDomainEvidence Requirement
1Whether third party has implemented physical controls to allow access to computing facilities only to authorized users? If yes, whether the sufficiency and effectiveness of physical controls is assessed by independent security auditors?Physical SecurityISO27001 certification or any other equivalent Audit Certificate covering the Control Point
2Whether resources deployed by third party for development, are properly skilled /trained in Secure Coding Practices, Secure Data management Practices?Human Resource SecurityISO27001 certification or Undertaking with Evidence covering the control point
3Whether employee on-boarding process of third party covers background verification of the officials before allowing access to the systems/ data?Human Resource SecurityISO27001 certification or Undertaking with evidence covering the control point.
4Whether a properly documented Change Management process has been instituted by the 3rd Party/ Vendor?Change ManagementISO Certification or Change Management Procedures, Release Trackers
5Wherever any work or part of work is outsourced by the Third Party to any other party(subletting), whether the Security posture of the subsequent Party(ies) are reviewed to ensure that same are equivalent to those of the third Party (i.e. SBI vendor)?GovernanceSLA Clause and Self Certification of having reviewed the systems of sub-letting entity by vendor i.e. 3rd party.
6Whether the 3rd Party/Vendor/Vendor has (Board/Top Management approved) Information Security Policy and Procedures, in place with periodic reviews (minimum annually) by Top Management? The policy should cover below aspects of Information Security:
1. Human Resource Mgmt
2. Asset Management
3. Cryptographic Controls
4. Access Management
5. Log Management
6. Third Party Cyber Risk Mgmt
7. Network Security Mgmt
8. Application Security Mgmtt
9. End-point Security Mgmt
10. Incident Management
11. Physical Security
12. Change Management
GovernanceISO Certification or Content Table/ Page of IS Policy and review history page
Sensitive Technical Data Shared Offsite
SnoControlDomainEvidence Requirement
1Whether third party has implemented physical controls to allow access to computing facilities only to authorized users? If yes, whether the sufficiency and effectiveness of physical controls is assessed by independent security auditors?Physical SecurityISO27001 certification or any other equivalent Audit Certificate covering the Control Point
2Whether the 3rd Party/Vendor’s Endpoints is suitably protected from data exfiltration through Security Solutions like DLP etcNetwork SecurityEvidence for implementation of the Control
3Whether the third party has a dedicated Incident Management Mechanism to handle Cyber Incidents well within the timelines prescribed as per their internal guidelines?Incident ManagementISO27001 certification or Evidence showing latest Policy Review and Approval
4Whether third party has a mechanism in place to ensure that the employees of third party return the assets containing SBI/SBI Customer data after role change or completion/ termination of the project or company?Human Resource SecurityISO27001 certification or Asset Mgmt Procedures Approved, Asset Issue Register
5Whether employee on-boarding process of third party covers background verification of the officials before allowing access to the systems/ data?Human Resource SecurityISO27001 certification or Undertaking with evidence covering the control point.
6Wherever any work or part of work is outsourced by the Third Party to any other party(subletting), whether the Security posture of the subsequent Party(ies) are reviewed to ensure that same are equivalent to those of the third Party (i.e. SBI vendor)?GovernanceSLA Clause and Self Certification of having reviewed the systems of sub-letting entity by vendor i.e. 3rd party.
7Whether the PII/ SPDI data is secured in transit by encryption with best-in-class encryption standards as per global best practises?Data SecurityEvidence of encryption techniques implemented
8Whether third party has processes in place to permanently erase SBI data from all environments (LIVE/ archived or data in external media), immediately after the need or clearly defined retention period as per the business engagement? Whether mechanism is in place to monitor the same?Data SecuritySelf-certification in case of Govt entity and Approved Purging Process & timeline and Evidence of actual implementation for nonGovt entities duly verified by CERT empanelled auditor.
9Whether Data at Rest encryption is ensured for both Live and archived data/ backup in external media etc? Are encryption keys stored in HSM?Data SecurityEvidence of encryption techniques implemented
10Whether the application and database (containing SBI data) are hosted in Public Cloud? If yes, a. Is there a Secure Migration Process b. Is there a Secure Deletion Process c. Is Cloud Security Review performed on regular basisCloud SecurityCloud Controls reviewed by CERT-In auditors. Or ISO27018 and SOC 2 certification
11Whether the 3rd Party/ Vendor configures or provides access to officials based on a documented and approved Role Conflict Matrix?Access ManagementRole Conflict Matrix and evidence of following the same.
12Whether third party permits remote access to internal systems/ applications? If yes whether they are secured by MDM and/or VPN through Hardened Mobile devices like Laptop/ Desktop or MobilesAccess ManagementEvidence for implementation of the Control
Production Support from Offsite Location
SnoControlDomainEvidence Requirement
1Whether third party has implemented physical controls to allow access to computing facilities only to authorized users? If yes, whether the sufficiency and effectiveness of physical controls is assessed by independent security auditors?Physical SecurityISO27001 certification or any other equivalent Audit Certificate covering the Control Point
2Whether the 3rd Party/Vendor’s Endpoints is suitably protected from data exfiltration through Security Solutions like DLP etcNetwork SecurityEvidence for controls in place
3Whether the Third party periodically monitors/ reviews the firewall rules including that of Open Vulnerable Ports to ensure that only need based rules are in place.Network SecurityApproved Process of Firewall Rules and self-certification (signed by IS Head of the company) for non-presence of overly permissible such as Any-Any Rules or generic rules/evidence for latest FW
4Whether the privilege access activities are logged IN PIM, (traceable to a specific user id with no default admin or generic id used), monitored, controlled and governed as per best security practices?Log Management and MonitoringEvidence of Privileged access logs and PIMS implementation
5Whether the third party has a dedicated Incident Mgmt Mechanism to handle Cyber Incidents well within the timelines prescribed as per their internal guidelines?Incident ManagementISO27001 certification or Evidence showing latest Policy Review and Approval
6Whether resources deployed by third party for development, are properly skilled /trained in Secure Coding Practices, Secure Data management Practices?Human Resource SecurityISO27001 certification or Undertaking with Evidence covering the control point
7Whether third party has a mechanism in place to ensure that the employees of third party return the assets containing SBI/SBI Customer data after role change or completion/ termination of the project or company?Human Resource SecurityISO27001 certification or Asset Management Procedures Approved, Asset Issue Register
8Whether employee on-boarding process of third party covers background verification of the officials before allowing access to the systems/ data?Human Resource SecurityISO27001 certification or Undertaking with evidence covering the control point
9Whether suitable Security certifications (ISO, PCI-DSS, SOC1 and SOC2 etc) of the security posture at vendor environment are in place?GovernanceCertificate with validity period, if available
10Wherever any work or part of work is outsourced by the Third Party to any other party(subletting), whether the Security posture of the subsequent Party(ies) are reviewed to ensure that same are equivalent to those of the third Party (i.e. SBI vendor)?GovernanceSLA Clause and Self Certification of having reviewed the systems of sub-letting entity by vendor i.e. 3rd party.
11Whether the PII/ SPDI data is secured in transit by encryption with best-in-class encryption standards as per global best practises?Data SecurityEvidence of encryption techniques implemented
12Whether the 3rd Party/Vendor configures or provides access to officials based on a documented and approved Role Conflict Matrix?Access ManagementRole Conflict Matrix and evidence of following the same.
13Whether third party permits remote access to internal systems/ applications? If yes whether they are secured by MDM and/or VPN through Hardened Mobile devices like Laptop/ Desktop or MobilesAccess ManagementEvidence for implementation of the Control
Customer Data Shared for Processing / Storage Offsite
SnoControlDomainEvidence Requirement
1Whether third party has implemented physical controls to allow access to computing facilities only to authorized users? If yes, whether the sufficiency and effectiveness of physical controls is assessed by independent security auditors?Physical SecurityISO27001 certification or any other equivalent Audit Certificate covering the Control Point
2Whether third party conducts security Assessment of all their applications (SBI related) covering activities (including not limited to) Appsec, API Testing, Source Code Review, DFRA, Process Review, Access Control, Vulnerability Assessment, Penetration Testing etc through regulator/ government (CERTempanelled or others) approved auditors. Any device hosted by Third party in SBI environment should also be coveredSecurity AssessmentEvidence of latest CERT In empanelled auditors report along with Scope
3Whether the 3rd Party/Vendor’s Servers are suitably protected from external threats by way of security solutions like firewall, IDS/IPS, AV, DLP etc.?Network SecurityEvidence for controls in place
4Whether the 3rd Party/Vendor’s Endpoints is suitably protected from data exfiltration through Security Solutions like DLP etcNetwork SecurityEvidence for controls in place
5Whether the 3rd Party/Vendor follows the best practices of creation of separate network zones (VLAN segments) for Production and non-Production such as UATNetwork SecurityCERT empanelled auditor’s Report on verification of its implementation.
6Whether the Third party periodically monitors/ reviews the firewall rules including that of Open Vulnerable Ports to ensure that only need based rules are in placeNetwork SecurityApproved Process of Firewall Rules and self-certification (signed by IS Head of the company) for non-presence of overly permissible such as Any-Any Rules or generic rules/evidence for latest FW
7Whether internal servers are exposed to direct Internet access?Network SecurityEvidence of purpose/need of this and verification of controls in place by CERT empanelled auditors.
8Whether the privilege access activities are logged, (traceable to a specific user id with no default admin or root id used), monitored, controlled and governed as per best security practices?Log Management and MonitoringEvidence of Privileged access logs and PIMS implementation
9Whether Sufficient logs for Forensic Assessments are generated, stored securely and reviewed regularly through a SOCLog Management and MonitoringLog generation, storage and review process certified by CERT empanelled auditor.
10Whether the third party has a dedicated Incident Mgmt Mechanism to handle Cyber Incidents well within the timelines prescribed as per their internal guidelines?Incident ManagementISO27001 certification or Evidence showing latest Policy Review and Approval
11Whether resources deployed by third party for development, are properly skilled /trained in Secure Coding Practices, Secure Data management Practises?Human Resource SecurityISO27001 certification or Undertaking with Evidence covering the control point
12Whether third party has a mechanism in place to ensure that the employees of third party return the assets containing SBI/SBI Customer data after role change or completion/ termination of the project or company?Human Resource SecurityISO27001 certification or Asset Mgmt Procedures Approved, Asset Issue Register
13Whether employee on-boarding process of third party covers background verification of the officials before allowing access to the systems/ data?Human Resource SecurityISO27001 certification or Undertaking with evidence covering the control point.
14Whether the 3rd Party/Vendor/Vendor has (Board/Top Management approved) Information Security Policy and Procedures, in place with periodic reviews (minimum annually) by Top Management? The policy should cover below aspects of Information Security:
1. Human Resource Management
2. Asset Management
3. Cryptographic Controls
4. Access Management
5. Log Management
6. Third Party Cyber Risk Management
7. Network Security Management
8. Application Security Management
9. End-point Security Management
10. Incident Management
11. Physical Security
12. Change Management
GovernanceISO Certification or Content Table/ Page of IS Policy and review history page
15Whether suitable Security certifications (ISO, PCI-DSS, SOC1 and SOC2 etc) of the security posture at vendor environment are in place?GovernanceCertificate with validity period, if available
16Wherever any work or part of work is outsourced by the Third Party to any other party(subletting), whether the Security posture of the subsequent Party(ies) are reviewed to ensure that same are equivalent to those of the third Party (i.e. SBI vendor)?GovernanceSLA Clause and Self Certification of having reviewed the systems of sub-letting entity by vendor i.e. 3rd party.
17Whether the PII/ SPDI data is secured in transit by encryption with best-in-class encryption standards as per global best practises?Data SecurityEvidence of encryption techniques implemented
18Whether the key management system of the third party ensures segregation and uniqueness of keys for SBI visà-vis other clients?Data SecurityApproved Process for Key Mgmt. and Evidence of actual implementation of Key Sharing
19Whether SBI data, stored at 3rd party, is appropriately segregated from other clients at least through logical isolation at database level?Data SecurityEvidence of logical segregation
20Whether third party has processes in place to permanently erase SBI data from all environments (LIVE/ archived or data in external media), immediately after the need or clearly defined retention period as per the business engagement? Whether mechanism is in place to monitor the same?Data SecuritySelf-certification in case of Govt entity and Approved Purging Process & timeline and Evidence of actual implementation for nonGovt entities duly verified by CERT empanelled IS auditor.
21Whether Data at Rest encryption is ensured for both Live and archived data/ backup in external media etc? Are encryption keys sored in HSM.Data SecurityEvidence of encryption techniques implemented
22Whether the application and database (containing SBI data) are hosted in Public Cloud? If yes, a. Is there a Secure Migration Process b. Is there a Secure Deletion Process c. Is Cloud Security Review performed on regular basisCloud SecurityCloud Controls reviewed by CERT-In auditors. Or ISO27018 and SOC 2 certification
23Whether a properly documented Change Management process has been instituted by the 3rd Party/ Vendor?Change ManagementISO Certification or Change Management Procedures, Release Trackers
24Whether the Vendor performs periodic DR DrillsBusiness ContinuityISO27001 Certification or Evidence of conducting DR drills, and lessons learnt and their detailed recordings.
25Whether third party has a Patch Management process for all systems is in place and the same is meticulously adhered to as per defined timelines?Application SecurityEvidence of latest patch applied, Patch Mgmt Procedures
26Whether the 3rd Party/Vendor configures or provides access to officials based on a documented and approved Role Conflict Matrix?Access ManagementRole Conflict Matrix and evidence of following the same
27Whether third party permits remote access to internal systems/ applications? If yes whether they are secured by MDM and/or VPN through Hardened Mobile devices like Laptop/ Desktop or MobilesAccess ManagementEvidence for implementation of the Control
28Whether the Third Party has a Secure Software Development Lifecycle Environment that includes both Software Development and secured usage of Open-Source Tools.Security AssessmentRegulator/ Gov approved or CERT empanelled auditors report on assessment of the security practices at third party environment
Data Shared with Govt/ Statutory/ Regulatory Bodies through any Mode (SFG/API etc)
SnoControlDomainEvidence Requirement
1Security of the Data stored and processed at Govt / Regulator end.Data SecuritySelf Certificate from competent authority of the Govt / Regulator Entity

Appendix – C

Description for Nature of Services
TermDescription
Limited Technical Data for TroubleshootingLimited Technical / Non-Technical data (Exclusive of Customer Information or Internal Sensitive Information), shared with OEM for technical troubleshooting purpose.
Lead Data Shared Acknowledgement Sent including CO-lending and NBFCsData is originated at third-party and received at SBI for further action or internal consumption. However, acknowledgement / confirmation is sent to third party without any SBI identifiable data/ information.
Data Shared for fetching (enquiry) - Sync API calls. No data Stored at Third PartyData is shared for fetching some info about existing SBI customer to third-party like CIBIL. Sync API calls where there is no offline processing or Storage of data sent (except for any reference number for such communication) .
Software Procurement (IPR/ source code not with the Bank)Software procured directly where IPR for Source code is not with Bank
Development OffsiteWhere Software development is done offsite, and Source Code is shared with Bank for review at our end.
Sensitive Technical Data Shared OffsiteTechnical Data that identifies SBI internal technical information such as IP address etc., is shared at the third party’s environment that is outside SBI controlled environment.
Production Support from Offsite LocationAny support services requiring access to Production Servers from offsite location i.e. third party’s environment which is outside the SBI controlled environment. This includes handling of Customer/ Production data as well
Customer Data Shared for Processing / Storage OffsiteCustomer Data means any data that Singly or jointly identifies SBI Customer. Sharing means any Such data shared by Bank for Storing or Processing (exclusive of Sync API Call Processing), at the third party’s environment that is outside SBI controlled environment.
Data Shared OnsiteWhen any data is shared to Onsite third-party resources either for Development, Production Support or otherwise.
Services without any data sharingAny Services obtained from Third Party without data sharing. (e.g. Software or Hardware Procurement)
Data Received from Merchants/ Third Parties/ through any Mode (SFG/API etc)Data received from Third Parties (by any mode like API, SFG etc)

Appendix – E

CONTROL POINTS FOR CONTINUOUS MONITORING BY IT AOs (at least half-yearly)
  1. Status of observations for Vulnerability Assessment scanning and Penetration Testing for assets and resources controlled by at vendor (deployed on-premises or offsite).
  2. Status of security patch implementation for assets and resources controlled by at vendor (deployed on-premises or offsite)
  3. Changes implemented during the relevant period by vendor in the IT environment under their control. The change reports should also be accompanied by security assessment report from a regulator approved independent security auditor.
  4. Reporting of incidents impacting the IT systems (deployed on-premises or offsite) controlled by the vendor, for the relevant period

NOTE: Any other control points that the IT AO may consider relevant in view of criticality of data and/ or service, may also be included as part of continuous monitoring process