logotype

System Audit ReportData Localization (SAR)

The System Audit Report for Data Localization and Storage of Payment System Data (SAR) is a compliance mandate mandated by the RBI to guarantee suitable security measures and data localization procedures for payment-related data storage.

What we do

All financial technology companies require data localization services, and the audit must be completed by CERT-IN accredited auditors who certify activity completion.

Key Criteria for System Audit Report for Data Localization (SAR)

Based on the RBI & NPCI Guidelines, the following key criteria need to be covered as part of this audit.

The audit should must be conducted by CERT-IN empanelled auditors certifying completion of activity.

SANS25 Secure Coding Guidelines

A well-known compilation of the most frequent security vulnerabilities found in all types of systems, with the goal of installing security into every developer’s head.

Approach for System Audit Report for Data Localization (SAR)

Based on our extensive experience with delivering SAR for Data Localization & Storage of Payment System Data, we have developed the following approach:

RNR’s Methodology for Creating a System Audit Report for Data Localization (SAR)

Phase 1 – Information Gathering & Documentation Review

A comprehensive survey is distributed to your teams, collecting various documentation and evidence related to the architecture, implementation, and existing controls. Our experts thoroughly examine these documents to gain insight into the implementation process and address any concerns. The questionnaire is specifically designed with the RBI FAQs in mind.

Phase 2 –Assessment, Validation & In-Depth Control Review

In this phase, we thoroughly analyze the documentation and review the provided artifacts to ensure their validity. Additionally, we assess the technical controls according to industry best practices and examine the data flow to identify any potential risks or gaps.

Phase 3–Remediation & Re-Validation

A detailed report will be provided that highlights any areas of concern, risks, or violations. In addition, we will offer appropriate recommendations and provide detailed proof of concept information to help your teams fully understand the raised concerns. Our team will work closely with you to facilitate re-validation, ensuring that all gaps are addressed and successful compliance is achieved.

Phase 4–CERT-In Empanelled Certification

As an auditor certified by CERT-IN, we thoroughly document all activities, including relevant paperwork, evidence, findings, and recommendations. We issue a CERT-IN certification for the System Audit Report (SAR) which focuses on data localization and storage of payment system data.

Pursuant to the RBI and NPCI guidelines, the following essential criteria must be considered as part of this audit
  • Payment Data Elements
  • Transaction / Data Flow
  • Application Architecture
  • Network Diagram / Architecture
  • Data Storage
  • Transaction Processing
  • Activities after Payment Processing
  • Cross Border Transactions
  • Database Storage and Maintenance
  • Data Backup & Restoration
  • Data Security
  • Access Management

All financial technology companies require data localization services, and the audit must be completed by CERT-IN accredited auditors who certify activity completion. RNR is CERT-In Empaneled Company, with us your SAR Data Localization is in place.

System Audit Report for Data Localization (SAR)

As an auditor certified by CERT-IN, we thoroughly document all the activities and gather relevant documentation, artifacts, findings, and recommendations. We issue a CERT-IN certification for the System Audit Report (SAR), specifically for the localization and storage of payment system data.

Leave us message

How May We Help You!

      Service Request Form

      Select Service(s) You Want:

      Information & cyber security program strategy & roadmapEnterprise & cyber security risk assessment & managementThird party risk managementVirtual CISO serviceCyber security awareness programPhishing simulation programThreat modelingUser access governance & certificationIncident management and response planISO 27001/22301/27701/9001RBI master directionNHB cyber security guidelinesIRDAI cyber security guidelinesNIST FrameworkSOC1/SOC2Data localization as per RBI circular of storage of payment system dataCIS frameworkInternal audit managementCloud assessment as per CISDesigning cloud security architectureCSPM security monitoringGap assessment as per applicable guidelinesNetwork architecture reviewFirewall rule reviewFirewall configuration reviewSystem hardening checksVulnerability assessment program managementWeb application penetration testingMobile application penetration testingInfrastructure vulnerability assessmentAPI vulnerability assessmentAPI fuzzingRed teaming ExerciseData protection advisoryData flow diagramDigital personal data protection acData protection controls implementationData discovery and classificationDesigning of data protection policyData governance programDigital personal data protection acGap assessmentArticulation of policy and proceduresISO 27001/22301/27701/9001, PCI-DSS, SOC1/SOC2, COBIT, COSO, HIPPA, RBI, IRDAI, NIST, Data Localization, CISGRC tool implementationArticulation of BCP plan and strategyCrisis management planBCP/DR planning and implementationImplementation of BCMS standard (ISO 22301)Conducting actual and tabletop DR drillsFunctional recovery planGRC resource deployment onsite/offsiteSecurity services resource deployment onsite/offsite

      Contact Details:

      Name (required):

      Organization Name (required):

      Email (required):

      Contact No (required):

      Detail about the requirement (optional):