Compliance

RBI Cyber Security Framework: Practical Compliance Checklist (2026)

April 10, 2026 10 min read Headx Team
Key takeaways

The RBI Cyber Security Framework for Banks (June 2016, updated guidance issued since) sets the baseline for Indian banks, NBFCs, payment system operators, and increasingly small finance banks and cooperative banks. This checklist maps each requirement to a specific implementation, the audit evidence inspectors look for, and realistic effort.

This is a practical implementation checklist, not a substitute for legal advice or your own RBI consultant. The framework continues to evolve via specific advisories; the points below reflect the broadly stable expectations as of May 2026.

Domain 1: Cyber security policy

Requirement: Board-approved cyber-security policy with annual review.

What you need:

Audit evidence: board-meeting extract + signed policy version history.

Domain 2: Cyber security organisation

Requirement: Designated CISO reporting outside the IT function.

What you need:

Domain 3: Inventory and classification

Requirement: Inventory of all IT assets with risk classification.

What you need:

Audit evidence: latest asset register export with timestamp. Inspectors will sample-check by asking for the classification of specific data stores.

Domain 4: Network security

Requirement: Network segmentation, firewall rule reviews, IDS/IPS coverage.

What you need:

Domain 5: Endpoint security

Requirement: EDR / endpoint protection, USB control, DLP, privileged-access controls.

This is the domain where monitoring tools intersect most. Specific requirements:

ControlImplementationAudit evidence
Endpoint malware protectionEDR on all endpointsCoverage report ≥99%
USB device controlUSB write block + whitelist + content inspection (see our USB control guide)Device whitelist register; USB event logs (1 year)
Endpoint DLPRules for PAN, Aadhaar, account numbers, customer data (see our fintech DLP rules)Alert log with disposition; tuning history
Activity monitoringScreenshot, application, website monitoring with consentSample reports; consent registry
Privileged-access loggingAll admin actions logged with immutable storage1-year audit log retention

Domain 6: Application security

Requirement: Secure SDLC, vulnerability scanning, penetration testing.

What you need:

Domain 7: Incident response

Requirement: Documented incident response playbook with regular tabletop exercises.

What you need:

Audit evidence: playbook version history + tabletop exercise minutes + any actual incident timelines.

Domain 8: Continuous monitoring and reporting

Requirement: SOC operating 24×7 (for larger banks) with documented alert-handling.

What you need:

The three commonly missed controls

Across 30+ RBI audits we have helped customers prepare for, three findings appear repeatedly:

  1. Privileged-access logging without immutable storage. Admin actions are logged but to a system the same admins can edit. RBI inspectors are increasingly explicit that logs must be immutable (write-once or append-only) for audit defensibility.
  2. DLP alerts without dispositions. Alerts fire, get acknowledged, no investigation record. Each alert needs: who reviewed, when, what they concluded, action taken. "Auto-closed" is not a disposition.
  3. Tabletop exercises that exist on paper only. Documenting "we did a tabletop in March" without attendee names, scenario script, and lessons-learned write-up is treated as no exercise at all.

Implementation effort estimates

For a mid-size bank or NBFC with 500-2,000 endpoints starting near zero:

Control areaRealistic effort to ready state
Policy and governance4-6 weeks (legal review is the bottleneck)
Asset inventory and classification6-12 weeks (depending on starting hygiene)
Endpoint DLP and USB control4-8 weeks (vendor selection + deployment + tuning)
Network segmentation12-24 weeks (architecture-heavy)
Privileged access controls6-10 weeks (process + tool)
Incident response programme4-8 weeks (playbook + first tabletop)
SOC operations8-16 weeks (people + tooling + runbooks)

Critical-path sequence: policy → asset inventory → endpoint controls → SOC → incident response. Network segmentation runs in parallel as a separate workstream.

FAQ

Does the framework apply to NBFCs?

Yes, with risk-tiered application. RBI has issued specific guidance for NBFC-MFIs, NBFC-IFCs, and HFCs. The principles are identical; the depth of implementation scales with the entity's size and systemic importance.

How does this overlap with DPDP Act compliance?

Significantly. The DPDP Act adds consent and rights workflows on top of the cyber-security controls. Most controls (encryption, access management, breach response) satisfy both frameworks. See our DPDP Act guide.

What is the typical first audit finding for banks newly deployed against this framework?

The two most common findings: (1) "DLP control exists but evidence of effectiveness is insufficient" — solve by keeping disposition records on every alert. (2) "Privileged-access logs lack immutability" — solve by sending logs to a write-once store (S3 Object Lock, dedicated SIEM bucket).

How does Headx help with this checklist?

Headx covers Domain 5 (endpoint security: DLP, USB control, activity monitoring, privileged-access logging) and contributes to Domain 8 (continuous monitoring via SOC integration). See our integrations page for SIEM forwarders.

RBI BFSI Compliance Banking

Want to put this into practice?

Headx ships every capability mentioned in this post on every plan. Cloud (SaaS) at ₹1,900/PC/mo or On-Premise at ₹1,499/PC/mo. 30-day money-back guarantee.

Get Started