Choose Language
Google Translate
Skip to content
  • Home
  • About
    • About Us
    • CERT-In Empanelled Cybersecurity Auditor
    • Awards & Recognition
    • Our Customers
  • Services

    Peregrine

    • Managed Detection & Response
    • AI Managed SOC Services
    • Elastic Stack Consulting
    • CrowdStrike Consulting 
    • Threat Hunting Services
    • Threat Intelligence Services
    • Digital Forensics Services
    • Brand Risk & Dark Web Monitoring

    Pinpoint

    • Red Teaming Services
    • Vulnerability Assessment
    • Penetration Testing Services
    • Secure Code Review Services
    • Cloud Security Assessment
    • Phishing Simulation Services
    • Breach and Attack Simulation Services

    MSP247

    • 24 X 7 Managed Cloud Services
    • Cloud Security Implementation
    • Disaster Recovery Consulting
    • Security Patching Services
    • WAF Services

    nCompass

    • SBOM Management Tool
    • Cybersecurity Audit Services
    • Virtual CISO Services
    • DPDP Act Consulting
    • ISO 27001 Consulting
    • RBI Master Direction Compliance
    • SEBI CSCRF Framework Consulting
    • SEBI Cloud Framework Consulting
    • Security Awareness Training
    • Cybersecurity Staffing Services
  • Industries
    • Banking
    • Financial Services
    • Insurance
  • Resources
    • Blogs
    • Case Studies
    • Downloads
  • Careers
Consult With Us
  • Home
  • About
    • About Us
    • CERT-In Empanelled Cybersecurity Auditor
    • Awards & Recognition
    • Our Customers
  • Services

    Peregrine

    • Managed Detection & Response
    • AI Managed SOC Services
    • Elastic Stack Consulting
    • CrowdStrike Consulting
    • Threat Hunting Services
    • Threat Intelligence Services
    • Digital Forensics Services
    • Brand Risk & Dark Web Monitoring

    Pinpoint

    • Red Teaming Services
    • Vulnerability Assessment
    • Penetration Testing Services 
    • Secure Code Review Services
    • Cloud Security Assessment
    • Phishing Simulation Services
    • Breach and Attack Simulation Services

    MSP247

    • 24 X 7 Managed Cloud Services
    • Cloud Security Implementation
    • Disaster Recovery Consulting
    • Security Patching Services
    • WAF Services

    nCompass

    • SBOM Management Tool
    • Cybersecurity Audit Services
    • Virtual CISO Services
    • DPDP Act Consulting
    • ISO 27001 Consulting
    • RBI Master Direction Compliance
    • SEBI CSCRF Framework Consulting
    • SEBI Cloud Framework Consulting
    • Security Awareness Training
    • Cybersecurity Staffing Services
  • Industries
    • Banking
    • Financial Services
    • Insurance
  • Resources
    • Blogs
    • Case Studies
    • Downloads
  • Careers
  • Contact
Consult With Us

Conducting Third-Party Risk Assessments as per SEBI CSCRF requirements

5 min read
20 Views
  • SEBI CSCRF

Most regulated entities rely on external partners. They handle hosting, application development, cloud services and support. These connections help operations run smoothly. But they also introduce significant cyber risk.

SEBI’s Cybersecurity and Cyber Resilience Framework (CSCRF) recognise this reality. It sets clear, practical expectations for third-party risk assessment to strengthen resilience across the ecosystem.

Look at these recent real-world examples:

  • In June 2025, procurement vendor Chain IQ Group AG was hacked and data of at least 19 of its clients exposed.
  • In July 2025, Allianz Life Insurance Company of North America reported a breach via a third-party cloud system that compromised personal data of the majority of its 1.4 million customers.

These incidents highlight the risk of vendor relationships and the importance of structured assessments, contracts and monitoring. This shows that you can outsource services, but you cannot outsource responsibility. This guide helps you build a third-party risk assessment process that follows CSCRF rules and protects your organisation.

Table of Contents

Understanding the core third-party risk requirements

CSCRF expects REs to manage vendor risk with discipline. The approach changes based on category, but the responsibility remains the same.

Key rules include:

  • Mid-size REs must conduct detailed Third-Party Due Diligence.
  • All REs must review systems managed by third parties annually.
  • All vulnerabilities found through VAPT must be fixed within three months, even if the vendor owns the system.
  • REs remain accountable for confidentiality, integrity and availability at all times.

These rules help organisations stay in control, even when systems or services sit outside their environment.

Requirements for due diligence and agreements

Due diligence is a central part of third-party risk assessment. It ensures vendors follow security standards that match or exceed your own.

1. Mid-size REs

Due diligence and formal vendor agreements are mandatory. These agreements must include:

  • Security standards the vendor must follow
  • Controls for managing data, logs and access
  • Timelines for VAPT finding closures
  • Rights to audit vendor systems
  • Reporting expectations for incidents

2. Self-certified and small-size REs

Due diligence is not mandatory. But many still perform basic checks to reduce risk.

Supply chain risk management

CSCRF expects every RE to maintain a structured cybersecurity supply chain risk strategy. It must include:

  • Vendor criticality assessment
  • Security evaluation based on the service’s risk
  • Contractual controls
  • Periodic monitoring and revalidation

This ensures third-party ecosystems remain aligned with business and regulatory expectations.

Accountability and oversight

CSCRF leaves no ambiguity. The RE remains fully responsible. Even when the vendor hosts the data. Even when the provider manages the infrastructure.

This means the RE is accountable for:

  • Data confidentiality
  • System integrity
  • Service availability
  • Regulatory compliance
  • Log security and access
  • Evidence for audits

If a third-party error creates a violation, the RE answers to SEBI. This rule pushes organisations to build stronger governance and tighter controls over vendors and partners.

Annual review of systems managed by vendors

Every RE category must conduct an annual review of systems managed by third-party service providers. This includes:

  • Reviewing access logs
  • Checking compliance with contract terms
  • Ensuring data handling matches policy
  • Validating VAPT closure timelines
  • Running security checks on hosted systems
  • Confirming operational performance

We encourage REs to create a structured checklist for this annual process. It helps teams stay consistent and avoids missing critical areas.

Requirements for cloud and outsourced critical systems

Cloud Service Providers and other hosting partners come with higher expectations. CSCRF sets very specific rules because these services often house critical systems.

1. ISO 27001 certification

Any provider that hosts critical facilities like these must be ISO 27001 certified:

  • PDC
  • DR
  • NDR
  • SOC
  • Colocation

2. Patch and vulnerability responsibilities

Your contract must make patch responsibilities clear. The vendor and the RE must know:

  • Who applies patches
  • Who tests patches
  • Who verifies stability before release

3. Source code and escrow requirements

If a vendor builds a critical system for you:

  • You must obtain the source code, or
  • Maintain a source code escrow arrangement

This ensures you can still update or maintain the system even if the vendor relationship ends.

4. Audit rights and visibility

Your contract must allow:

  • System audits
  • Cybersecurity audits
  • Access to dashboards
  • Access to logs
  • Sharing of audit reports with SEBI if needed

CSPs must also extend these audit obligations to material subcontractors.

How to structure Third-Party Risk Assessment under CSCRF

Here is a practical structure that works across RE categories:

Third-Party Risk Assessment under SEBI CSCRF: Key Structure

1. Identify all vendors and their criticality

Start with a simple inventory. List every vendor. Mark systems they support. Identify who handles critical services and who handles non-critical ones.

2. Review contractual obligations

Ensure every contract includes:

  • Security responsibilities
  • Audit rights
  • Roles and access
  • Incident reporting timelines
  • VAPT closure timelines

3. Conduct due diligence (mandatory for mid-size)

Evaluate the vendor’s:

  • Certifications
  • Security posture
  • Infrastructure
  • Access models
  • Policies
  • Incident history

4. Evaluate controls and risks

Check how the vendor protects:

  • Data
  • Systems
  • Logs
  • Backups
  • User access

This helps you spot gaps early.

5. Assess cloud-specific risks when applicable

Cloud vendors require extra attention. Use CSCRF guidelines to check:

  • Multi-tenancy risks
  • Isolation
  • Patch flows
  • Log availability
  • Backup rules
  • Disaster recovery

6. Track remediation of vulnerabilities

All vulnerabilities must be closed within three months. This timeline is non-negotiable. Many REs add this requirement directly into the SLA.

7. Maintain audit trails and documentation

Clear documentation supports compliance and reduces friction during audits.

Tips to improve third-party oversight

From our experience, small changes often make the biggest impact.

  • Use a central register for vendor risks.
  • Review contract terms before renewing any service.
  • Create a simple escalation matrix for vendor-related incidents.
  • Hold quarterly meetings with critical vendors.
  • Request security updates from them at regular intervals.
  • Track access of vendor personnel to your systems.

These steps build strong, confident oversight without adding heavy workloads.

Conclusion

Third-party risk sits at the heart of modern cybersecurity. SEBI’s CSCRF recognises this and provides clear rules to help organisations stay protected. A structured Third-party risk assessment helps you remain in control. It supports compliance. And it strengthens your resilience even when services move outside your environment.

We’ve helped many REs create vendor management frameworks that match CSCRF expectations. We work with teams to simplify contracts, design due diligence steps and improve review cycles.

If you want support building a SEBI CSCRF-aligned third-party risk framework, our team is ready to assist. We can help you bring clarity, confidence and consistency to vendor oversight.

Third-party risk assessment under SEBI CSCRF FAQs

Does CSCRF require vendors to match our security standards?

Yes. Under SEBI’s Cyber Security and Cyber Resilience Framework (CSCRF), vendors are required to maintain the same or higher level of security controls as the Regulated Entity (RE). This ensures there are no weak links in your extended security ecosystem, especially when critical functions or data are managed by third parties.

Do cloud providers need to be ISO certified?

Yes. Any Cloud Service Provider (CSP) hosting critical systems or sensitive data must be ISO 27001 certified. This certification validates that the CSP follows globally recognized standards for information security management, risk assessment, and data protection practices in line with CSCRF compliance.

Are vendors responsible for VAPT closure?

Yes. All vendors must remediate VAPT (Vulnerability Assessment and Penetration Testing) findings within three months or within the timelines defined in your SLA. The RE should closely monitor closure status and obtain confirmation from vendors to ensure continuous compliance and cyber resilience.

Can REs shift responsibility to the vendor?

No. CSCRF explicitly states that the Regulated Entity (RE) retains full accountability for all outsourced or third-party functions. While vendors must comply with the framework and your internal security standards, the ultimate responsibility for compliance, oversight, and risk management lies with the RE.

Author
Krishnakant Mathuria
LinkedIn

Krishnakant has more than 12+ years of experience in the ICT domain, he has been part of building specialized teams and niche enterprises driving growth and performance culture across organizations.

Share on

WhatsApp
LinkedIn
Facebook
X
Pinterest

For Customized Plans Tailored to Your Needs, Get in Touch Today!

Connect with us

RESOURCES

Related Blogs

Explore our resources section for insightful blogs, articles, infographics and case studies, covering everything in Cyber Security.
How to Design a Board-Approved Cybersecurity Policy for SEBI CSCRF

How to Design a Board-Approved Cybersecurity Policy for SEBI CSCRF

Every regulated entity under SEBI must create and maintain a structured, actionable and board-approved cybersecurity policy. This requirement sits at

Cyber Awareness Training as per SEBI CSCRF Requirements

Conducting Cyber Awareness Training as per SEBI CSCRF Requirements

Cyber risks touch every part of the financial sector. Teams handle sensitive data and respond to constant operational demands. SEBI’s

How to Implement the Top 10 Cybersecurity Controls for SEBI CSCRF

Top 10 Cybersecurity Controls You Must Implement Under SEBI CSCRF

SEBI’s Cybersecurity and Cyber Resilience Framework (CSCRF) set a new benchmark for the securities market. It raises expectations, clarifies responsibilities

RESOURCES

Cyber Security Knowledge Hub

Explore our resources section for insightful blogs, articles, infographics and case studies, covering everything in Cyber Security.

BLOGS

Stay informed with the latest cybersecurity trends, insights, and expert tips to keep your organization protected.

CASE STUDIES

Explore real-world examples of how CyberNX has successfully defended businesses and delivered measurable security improvements.

DOWNLOADS

Learn about our wide range of cybersecurity solutions designed to safeguard your business against evolving threats.
CyberNX Footer Logo

Peregrine

  • Managed Detection & Response
  • AI Managed SOC Services
  • Elastic Stack Consulting
  • CrowdStrike Consulting
  • Threat Hunting Services
  • Threat Intelligence Services
  • Digital Forensics Services
  • Brand Risk & Dark Web Monitoring

Pinpoint

  • Red Teaming Services
  • Vulnerability Assessment
  • Penetration Testing Services
  • Secure Code Review Services
  • Cloud Security Assessment
  • Phishing Simulation Services
  • Breach and Attack Simulation Services

MSP247

  • 24 X 7 Managed Cloud Services
  • Cloud Security Implementation
  • Disaster Recovery Consulting
  • Security Patching Services
  • WAF Services

nCompass

  • SBOM Management Tool
  • Cybersecurity Audit Services
  • Virtual CISO Services
  • DPDP Act Consulting
  • ISO 27001 Consulting
  • RBI Master Direction Compliance
  • SEBI CSCRF Framework Consulting
  • SEBI Cloud Framework Consulting
  • Security Awareness Training
  • Cybersecurity Staffing Services
  • About
  • CERT-In
  • Awards
  • Case Studies
  • Blogs
  • Careers
  • Sitemap
Facebook Twitter Instagram Youtube

Copyright © 2025 CyberNX | All Rights Reserved | Terms and Conditions | Privacy Policy

Scroll to Top

WhatsApp us

We value your privacy. Your personal information is collected and used only for legitimate business purposes in accordance with our Privacy Policy.