logotype

Compliance Management

ISO/IEC 27001 - INFORMATION SECURITY MANAGEMENT

A global standard for information security management that outlines the standards for establishing, implementing, maintaining, and continuously upgrading an information security management system assisting companies in securing their information assets

PCIDSS - PAYMENT CARD INDUSTRY DATA SECURITY STANDARD

A collection of operational and technical regulations that must be followed by all entities that handle consumer bankcard data to improve the security of credit, debit, and cash card transactions and protect cardholders from identity theft.

UIDAI COMPLIANCE SECURITY AUDIT

Client applications of organizations employing Aadhaar-based authentication must undergo periodic annual or need-based audits by Information Systems Auditors qualified by CERT-IN, according to UIDAI rules.

SOC2 - SYSTEM AND ORGANIZATION CONTROLS

The reports are intended for users who demand extensive information and assurance about the controls at a service organisation linked to the security, availability, and processing integrity of the systems, as well as the confidentiality and privacy of the data processed by these systems.

SAR (SYSTEM AUDIT REPORT FOR DATA LOCALIZATION)

The RBI has mandated the submission of a System Audit Report for Data Localization (SAR) & Storage of Payment System Data to guarantee suitable security and data localization procedures for the storage of payment-related data.

RBI GUIDELINES FOR PAYMENT INDUSTRY

A guideline has been in place since April 1, 2020, saying that they are used to open and operate accounts, as well as to settle payments for electronic payment operations involving intermediaries.

CERT-IN SECURITY AUDIT CERTIFICATIONS FOR INFRASTRUCTURE

A CERT-IN certification is a document issued after a thorough security examination by a CERT Empanelled Security Auditor. An audit of this nature must examine all aspects of the organization's network, including websites, systems, and apps.

GDPR - GENERAL DATA PROTECTION REGULATION

The GDPR is a key piece of EU privacy and human rights legislation. Its main goal is to give people more control and rights over their personal data while also simplifying the regulatory environment for foreign businesses.

SEBI CYBERSECURITY FRAMEWORK

SEBI has created a framework for cyber security and cyber resilience, which must be followed by all SEBI-registered stock brokers and depository participants..

RBI GUIDELINES SECURITY AUDIT FOR NBFC SECTOR

NBFCs are expected to improve security measures to ensure the safety and security of their customers and the NBFC. A formal gap analysis must be completed on a regular basis by a CERT-IN accredited organization.

icons8-iso-64

ISO/IEC 27001 - INFORMATION SECURITY MANAGEMENT

A global standard for information security management that outlines the standards for establishing, implementing, maintaining, and continuously upgrading an information security management system assisting companies in securing their information assets

icons8-company-100

SOC2 - SYSTEM AND ORGANIZATION CONTROLS

The reports are intended for users who demand extensive information and assurance about the controls at a service organisation linked to the security, availability, and processing integrity of the systems, as well as the confidentiality and privacy of the data processed by these systems.

GDPR

GDPR - GENERAL DATA PROTECTION REGULATION

The GDPR is a key piece of EU privacy and human rights legislation. Its main goal is to give people more control and rights over their personal data while also simplifying the regulatory environment for foreign businesses.

icons8-payment-64

PCIDSS - PAYMENT CARD INDUSTRY DATA SECURITY STANDARD

A collection of operational and technical regulations that must be followed by all entities that handle consumer bankcard data to improve the security of credit, debit, and cash card transactions and protect cardholders from identity theft.

SAR

SAR (SYSTEM AUDIT REPORT FOR DATA LOCALIZATION)

The RBI has mandated the submission of a System Audit Report for Data Localization (SAR) & Storage of Payment System Data to guarantee suitable security and data localization procedures for the storage of payment-related data.

sebi

SEBI CYBERSECURITY FRAMEWORK

SEBI has created a framework for cyber security and cyber resilience, which must be followed by all SEBI-registered stock brokers and depository participants..

uidai

UIDAI COMPLIANCE SECURITY AUDITUIDAI COMPLIANCE SECURITY AUDIT

Client applications of organizations employing Aadhaar-based authentication must undergo periodic annual or need-based audits by Information Systems Auditors qualified by CERT-IN, according to UIDAI rules.

rbi-payment

RBI GUIDELINES FOR PAYMENT INDUSTRY

Comprehensive and specialized service portfolio to meet the emerging cyber security challenges.

rbi-nbfc

RBI GUIDELINES SECURITY AUDIT FOR NBFC SECTOR

NBFCs are expected to improve security measures to ensure the safety and security of their customers and the NBFC. A formal gap analysis must be completed on a regular basis by a CERT-IN accredited organization.

icons8-certificate-100

CERT-IN SECURITY AUDIT CERTIFICATIONS FOR INFRASTRUCTURE

A CERT-IN certification is a document issued after a thorough security examination by a CERT Empanelled Security Auditor. An audit of this nature must examine all aspects of the organization’s network, including websites, systems, and apps.

    Service Request Form

    Select Service(s) You Want:

    Information & cyber security program strategy & roadmapEnterprise & cyber security risk assessment & managementThird party risk managementVirtual CISO serviceCyber security awareness programPhishing simulation programThreat modelingUser access governance & certificationIncident management and response planISO 27001/22301/27701/9001RBI master directionNHB cyber security guidelinesIRDAI cyber security guidelinesNIST FrameworkSOC1/SOC2Data localization as per RBI circular of storage of payment system dataCIS frameworkInternal audit managementCloud assessment as per CISDesigning cloud security architectureCSPM security monitoringGap assessment as per applicable guidelinesNetwork architecture reviewFirewall rule reviewFirewall configuration reviewSystem hardening checksVulnerability assessment program managementWeb application penetration testingMobile application penetration testingInfrastructure vulnerability assessmentAPI vulnerability assessmentAPI fuzzingRed teaming ExerciseData protection advisoryData flow diagramDigital personal data protection acData protection controls implementationData discovery and classificationDesigning of data protection policyData governance programDigital personal data protection acGap assessmentArticulation of policy and proceduresISO 27001/22301/27701/9001, PCI-DSS, SOC1/SOC2, COBIT, COSO, HIPPA, RBI, IRDAI, NIST, Data Localization, CISGRC tool implementationArticulation of BCP plan and strategyCrisis management planBCP/DR planning and implementationImplementation of BCMS standard (ISO 22301)Conducting actual and tabletop DR drillsFunctional recovery planGRC resource deployment onsite/offsiteSecurity services resource deployment onsite/offsite

    Contact Details:

    Name (required):

    Organization Name (required):

    Email (required):

    Contact No (required):

    Detail about the requirement (optional):