India Compliance Framework

Wealthy’s consolidated regulatory controls register β€” IRDAI Cyber Security Guidelines 2024, SEBI CSCRF Aug 2024, CERT-In Directions 2022, and DPDP Act 2023.

India Compliance Framework

Wealthy’s consolidated regulatory register. Lists every Indian regulation / circular / act that applies to Wealthy, plus a control-level register mapping each requirement onto an operational control.

Regulatory sources

Full list of regulations and circulars Wealthy operates under. Each new circular from a regulator lands here first; then, if it has operational controls, those controls are added to the register below.

Short ID Source Issued Applicability to Wealthy Key obligations
IRDAI IRDAI Cyber Security Guidelines 2024 Updated 2024 Corporate Agent / Insurance Intermediary under IRDAI Corporate Agents Regulations 2015 ISRMC quarterly, CISO independent of IT, VAPT half-yearly, CERT-In-empaneled audit annual, Annexure-III submission, cryptographic asset inventory, immutable backup, MeitY/STQC-empaneled CSPs
SEBI CSCRF SEBI Cyber Security and Cyber Resilience Framework β€” Master Circular 20 Aug 2024 (ref SEBI/HO/ITD-1/ITD_CSC_EXT/P/CIR/2024/113) Broking / market entities Six CSCRF functions, Annexure-N SOC Efficacy half-yearly, Annexure-E risk register, Annexure-F vendor register, Annexure-O incident classification, CCI tracking, privileged access weekly verification
SEBI Accessibility SEBI Circular β€” Digital Accessibility for Persons with Disabilities 31 Jul 2025 (ref SEBI/HO/ITD-1/ITD_VIAP/P/CIR/2025/111) All SEBI-Regulated Entities including Intermediaries Nodal Officer for digital accessibility, WCAG 2.1 / IS 17802 / GIGW conformance, annual IAAP-certified accessibility audit, grievance redressal, procurement clauses, annual compliance reporting
CERT-In CERT-In Directions April 2022 28 Apr 2022 All Indian service providers + intermediaries 6-hour incident reporting, 180-day log retention, Indian NTP sync, designated PoC, 20 reportable incident categories
DPDP Digital Personal Data Protection Act 2023 2023 (Rules notification awaited) All Data Fiduciaries + Data Processors handling Indian personal data Consent management, data principal rights, Grievance Officer, 72-hour breach notification, data processing register, cross-border controls
RPwD Rights of Persons with Disabilities Act 2016 + Rules 2017 2016 (Act), 2017 (Rules) All service providers with digital platforms for public use Sections 40, 42, 46 β€” accessibility for persons with disabilities; baseline for SEBI Accessibility circular above
IT Act Information Technology Act 2000 2000 (amended 2008) All Indian service providers Base law for digital identity, electronic records, intermediary liability, data protection (pre-DPDP)
IT Rules 2021 Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules 2021 2021 Significant intermediaries + social-media-like platforms Grievance officer, content takedown, user notification, safe harbour conditions β€” implemented via POL-014

Not currently in scope but monitored: RBI Outsourcing Guidelines (when loan-origination scope expands), PCI DSS 4.0 (if card data is stored in future, currently tokenised), SEBI Stock Broker Regulations 1992 (if broking license), Insurance Regulatory Framework (if underwriting license).

Status legend for the control register below: ⬜ Pending review Β· βœ… Done Β· ⚠️ Partial Β· N/A Not applicable

How this is maintained

Artefact Purpose
This page Public reference: structure, control IDs, framework mapping, current status
Internal controls register (private) Full evidence links, verification commands, action owners β€” not published
Live Google Sheet (Security Drive folder) Operational tracker; quarterly updates reviewed at ISRMC
Quarterly PDF snapshot Attached to the matching ISRMC GitHub Issue as immutable audit evidence

Each quarter the ISRMC meeting produces a PDF snapshot of the Sheet, attached to a GitHub Issue using the ISRMC Quarterly Review template. The resulting trail is what IRDAI / SEBI / CERT-In auditors walk through.

Control IDs here are the anchors referenced from the Security Governance Calendar (Framework column) and from individual Policies, Standards, and SOPs.


A. Governance

# Control IRDAI SEBI CERT-In DPDP Status
A1 Board-approved Cyber Security Policy βœ“ βœ“ - - ⬜
A2 Appoint CISO (no IT-reporting line, no business targets) βœ“ βœ“ - - ⬜
A3 Appoint CTO / Head of IT Function βœ“ - - - ⬜
A4 ISRMC meeting β€” quarterly βœ“ - - - ⬜
A5 IT Steering Committee (ITSC) β€” quarterly, CTO convener βœ“ - - - ⬜
A6 RMC must include Independent External Expert (IEE) βœ“ - - - ⬜
A7 Functional Head responsibilities documented βœ“ - - - ⬜
A8 Scenario-based Incident Response plans βœ“ βœ“ - - ⬜
A9 Designated Grievance Officer (DPDP) - - - βœ“ ⬜
A10 Designated CERT-In Point of Contact - - βœ“ - ⬜
A11 Six CSCRF Functions (Govern / Identify / Protect / Detect / Respond / Recover) - βœ“ - - ⬜
A12 Exception Management process (CISO / RMC / Board tiers) βœ“ - - - ⬜
A13 Cybersecurity budget proportional to risk appetite βœ“ βœ“ - - ⬜
A14 Training budget tracked and spent - βœ“ - - ⬜

B. Risk & Asset Management

# Control IRDAI SEBI CERT-In DPDP Status
B1 Risk Register (SEBI Annexure-E) βœ“ βœ“ - - βœ…
B2 Asset classification register (critical / client / regulatory) βœ“ βœ“ - - ⬜
B3 Cryptographic asset inventory (post-quantum readiness) βœ“ - - - ⬜
B4 Data classification scheme βœ“ βœ“ - βœ“ ⬜
B5 Data processing activity register (DPDP) - - - βœ“ ⬜
B6 Third-party / vendor risk register (SEBI Annexure-F) βœ“ βœ“ - - βœ…
B7 Cyber Capability Index tracking (SEBI Annexure-K) - βœ“ - - ⬜

C. Access Control

# Control IRDAI SEBI CERT-In DPDP Status
C1 Role-Based Access Control (RBAC) βœ“ βœ“ - - ⬜
C2 Multi-Factor Authentication (MFA) βœ“ βœ“ - - ⬜
C3 Privileged Access Management (PAM) βœ“ βœ“ - - ⚠️
C4 Privileged access weekly verification - βœ“ - - ⬜
C5 Quarterly access reviews βœ“ βœ“ - - ⬜
C6 MeitY / STQC empaneled CSP βœ“ - - - ⬜
C7 NDA with CSP (privacy / confidentiality / security / BC) βœ“ - - - ⬜
C8 Data elimination clause on CSP contract termination βœ“ - - - ⬜
C9 Prior written permission for further outsourcing βœ“ - - - ⬜

D. Detection β€” SIEM / SOC / EDR

# Control IRDAI SEBI CERT-In DPDP Status
D1 SIEM (centralised log collection + correlation) βœ“ βœ“ βœ“ - βœ…
D2 EDR on endpoints βœ“ βœ“ - - βœ…
D3 Anti-virus / Endpoint Protection Platform βœ“ βœ“ - - βœ…
D4 File Integrity Monitoring (FIM) βœ“ βœ“ - - βœ…
D5 Vulnerability Detection βœ“ βœ“ - - βœ…
D6 Database Activity Monitoring (DAM) βœ“ βœ“ - βœ“ ⬜
D7 Data Loss Prevention (DLP) - βœ“ - βœ“ ⬜
D8 Web Application Firewall (WAF) βœ“ βœ“ - - βœ…
D9 DDoS protection βœ“ βœ“ - - βœ…
D10 Email gateway security βœ“ βœ“ - - βœ…
D11 Web gateway / Secure proxy - βœ“ - - ⬜
D12 Intrusion Prevention System (IPS) - βœ“ - - ⚠️
D13 DNS Security - βœ“ - - ⚠️
D14 Encrypted traffic management - βœ“ - - ⬜
D15 User and Entity Behaviour Analytics (UEBA) - βœ“ - - ⬜
D16 Sandboxing solution - βœ“ - - ⬜
D17 Decoy / Honeypot - βœ“ - - ⬜
D18 Threat Intelligence integration with SIEM - βœ“ - - βœ…
D19 SOAR actions configured - βœ“ - - βœ…
D20 MITRE ATT&CK mapping - βœ“ - - βœ…
D21 Cloud audit logs (GCP + AWS) - βœ“ βœ“ - βœ…
D22 GitHub audit logs - βœ“ βœ“ - ⚠️
D23 API misuse detection rules - βœ“ - - βœ…
D24 Insurance / trading API log ingestion βœ“ βœ“ - - ⬜

E. Logging & Retention

# Control IRDAI SEBI CERT-In DPDP Status
E1 Log retention β€” 180 days minimum βœ“ - βœ“ - βœ…
E2 Log retention β€” 2 years (broking) - βœ“ - - βœ…
E3 NTP synchronisation - - βœ“ - ⚠️
E4 Logs of all ICT systems βœ“ βœ“ βœ“ - βœ…
E5 SIEM alert retention with defined rollover βœ“ βœ“ - - βœ…

F. Incident Response

# Control IRDAI SEBI CERT-In DPDP Status
F1 Incident detection β†’ ticket (case management) βœ“ βœ“ - - βœ…
F2 Report within 6 hours to regulator βœ“ βœ“ βœ“ - ⬜
F3 SEBI Incident Reporting Portal within 24 hours - βœ“ - - ⬜
F4 Data breach notification within 72 hours - - - βœ“ ⬜
F5 Interim Report β€” 3 days - βœ“ - - ⬜
F6 Mitigation measures report β€” 7 days - βœ“ - - ⬜
F7 Root Cause Analysis (RCA) βœ“ βœ“ - - ⬜
F8 Forensic capability - βœ“ - - ⬜
F9 Incident severity classification (SEBI Annexure-O) - βœ“ - - ⚠️
F10 Stakeholder communication plan βœ“ βœ“ - - ⬜
F11 Lessons learned / post-incident review βœ“ βœ“ - - ⬜

G. Audit & Testing

# Control IRDAI SEBI CERT-In DPDP Status
G1 VAPT β€” Grey/White box penetration test every 6 months βœ“ - - - ⬜
G2 VAPT β€” Quarterly vulnerability assessment + annual PT - βœ“ - - ⬜
G3 Test environment resembles production βœ“ - - - ⬜
G4 Annual cyber audit βœ“ βœ“ - - ⚠️
G5 CERT-In empaneled auditor only βœ“ - - - ⬜
G6 Annexure-III compliance submission to Insurer βœ“ - - - ⬜
G7 ISO 27001 certification βœ“ βœ“ - - ⬜

H. Infrastructure / Protection

# Control IRDAI SEBI CERT-In DPDP Status
H1 Encryption at rest βœ“ βœ“ - βœ“ βœ…
H2 Encryption in transit (TLS) βœ“ βœ“ - βœ“ βœ…
H3 Environment segregation (prod / staging / dev) βœ“ βœ“ - - βœ…
H4 Group company infrastructure logical / physical segregation βœ“ - - - ⬜
H5 Data localisation (India) βœ“ βœ“ - βœ“ βœ…
H6 API security controls (SEBI Annexure-G) βœ“ βœ“ - - ⬜
H7 Immutable backup for critical hardware βœ“ - - - ⬜
H8 Failover / resilient components for critical hardware βœ“ - - - ⬜
H9 Patch management βœ“ βœ“ - - ⚠️
H10 Endpoint hardening (screen lock, disk encryption, firewall) βœ“ βœ“ - - ⚠️

I. Business Continuity / DR

# Control IRDAI SEBI CERT-In DPDP Status
I1 Business Continuity Plan (BCP) βœ“ βœ“ - - βœ…
I2 Disaster Recovery (DR) Plan βœ“ βœ“ - - βœ…
I3 RTO / RPO tracking (SEBI Annexure-C) - βœ“ - - ⬜
I4 DR drill documented βœ“ βœ“ - - ⬜
I5 Backup integrity verification βœ“ βœ“ - - ⬜

J. SOC Efficacy (SEBI Annexure-N)

SEBI CSCRF mandates half-yearly Annexure-N SOC Efficacy scoring. Final score Ζ©S is weighted across five domains.

Ζ©S = (C Γ— 25 + Y Γ— 25 + P Γ— 20 + H Γ— 15 + E Γ— 15) / 100

Domain Weight Score variable
Asset Coverage (Table 30) 25% C
SOC Operations (Table 31) 25% Y
Personnel Competency (Table 32) 20% P
SOC Governance (Table 33) 15% H
SOC Enrichments (Table 34) 15% E
# Control IRDAI SEBI CERT-In DPDP Status
J1 Half-yearly SOC Efficacy Report (Annexure-N) - βœ“ - - ⬜
J2 Asset Coverage Score (Domain 1, 25%) - βœ“ - - ⬜
J3 SOC Operations Score (Domain 2, 25%) - βœ“ - - ⬜
J4 Personnel Competency Score (Domain 3, 20%) - βœ“ - - ⬜
J5 SOC Governance Score (Domain 4, 15%) - βœ“ - - ⬜
J6 SOC Enrichments Score (Domain 5, 15%) - βœ“ - - ⬜
J7 Log ingestion latency < 5 min - βœ“ - - βœ…
J8 Threat intelligence processing < 60 min - βœ“ - - βœ…
J9 Threat hunting β€” quarterly - βœ“ - - ⬜
J10 Playbooks defined per use case - βœ“ - - ⚠️
J11 Native SOC tech dashboard - βœ“ - - βœ…
J12 Custom SOC dashboard - βœ“ - - ⚠️
J13 False positive rate tracking - βœ“ - - ⬜
J14 False negative rate tracking - βœ“ - - ⬜

K. Privacy (DPDP Act 2023)

# Control IRDAI SEBI CERT-In DPDP Status
K1 Consent management system - - - βœ“ ⬜
K2 Right to access / correction / erasure - - - βœ“ ⬜
K3 Grievance redressal mechanism - - - βœ“ ⬜
K4 Data retention limits per category - - - βœ“ ⚠️
K5 Personal data breach 72h notification - - - βœ“ ⬜
K6 Cross-border data transfer controls - - - βœ“ βœ…
K7 Significant Data Fiduciary obligations (if notified) - - - βœ“ N/A

L. CERT-In Incident Categories

CERT-In Directions April 2022 prescribe 20 incident categories with a 6-hour reporting obligation. Wealthy detects these through the SIEM ruleset and alerts surface in the Incident Response runbook.

# Category
L1 Targeted scanning / probing
L2 Compromise of critical systems
L3 Unauthorised access to IT systems
L4 Website defacement / intrusion
L5 Malicious code (malware, ransomware)
L6 Attacks on servers (DB, mail, DNS)
L7 Identity theft, spoofing, phishing
L8 DDoS attacks
L9 DNS and BGP hijacking
L10 Attacks on critical infrastructure
L11 Data breach / data leak
L12 Fintech / payments attacks
L13 Fake mobile apps
L14 Social media account compromise
L15 Cloud attacks
L16 IoT device attacks
L17 Supply chain attacks
L18 Data centre attacks
L19 Cyber espionage
L20 Zero-day exploits

M. Personnel (SEBI Annexure-N Domain 3)

# Control IRDAI SEBI CERT-In DPDP Status
M1 L1 SOC Engineer (CEH, 2-4 YoE) - βœ“ - - ⬜
M2 L2 SOC Engineer (CEH + OEM cert, 5-7 YoE) - βœ“ - - ⬜
M3 L3 SOC Engineer (CEH + CISM, 8-12+ YoE) - βœ“ - - ⬜
M4 Security awareness training βœ“ βœ“ - βœ“ βœ…
M5 Training budget tracked - βœ“ - - ⬜

N. Digital Accessibility (SEBI Accessibility Circular 2025/111 + RPwD Act 2016)

Implements SEBI Circular 2025/111 (31 Jul 2025) and Rights of Persons with Disabilities Act 2016 Β§Β§40, 42, 46. Owned primarily by Product + Compliance; security’s touchpoint is in vendor procurement (STD-015).

# Control SEBI Access. RPwD Status
N1 Nodal Officer for digital accessibility designated βœ“ βœ“ ⬜
N2 Grievance redressal mechanism specific to accessibility βœ“ βœ“ ⬜
N3 WCAG 2.1 / IS 17802 / GIGW conformance for digital platforms βœ“ βœ“ ⬜
N4 Annual accessibility audit by IAAP-certified professional βœ“ - ⬜
N5 Accessibility training for staff + content creators βœ“ βœ“ ⬜
N6 Accessibility clauses in RFPs + SaaS procurement βœ“ - ⚠️
N7 KYC / e-KYC alternatives for users with disabilities βœ“ βœ“ ⬜
N8 Annual compliance report to SEBI (within 30 days of FY end) βœ“ - ⬜
N9 Disability status captured as a KYC field + human override βœ“ βœ“ ⬜

  • Security Governance Calendar β€” every calendar event maps to a control ID here
  • Policies β€” each board-approved policy cites the controls it operationalises
  • Standards β€” each standard cites the controls it implements
  • SOPs β€” each procedure cites the controls it evidences

Reviewed quarterly at ISRMC; full-year review in the Annual Risk Assessment Report. Status updates are applied after each quarterly review. This page is the public (audit-facing) snapshot; internal evidence trail is maintained separately.