• Research
  • Strategic Europe
  • About
  • Experts
Carnegie Europe logoCarnegie lettermark logo
EUUkraine
  • Donate
{
  "authors": [
    "Ananth Padmanabhan",
    "Deva Prasad M."
  ],
  "type": "legacyinthemedia",
  "centerAffiliationAll": "dc",
  "centers": [
    "Carnegie Endowment for International Peace",
    "Carnegie China",
    "Carnegie India"
  ],
  "collections": [],
  "englishNewsletterAll": "ctw",
  "nonEnglishNewsletterAll": "",
  "primaryCenter": "Carnegie India",
  "programAffiliation": "SAP",
  "programs": [
    "South Asia"
  ],
  "projects": [],
  "regions": [
    "South Asia",
    "India"
  ],
  "topics": []
}

Source: Getty

In The Media
Carnegie India

Designing Cybersecurity for the Financial Sector

India's proposed Computer Emergency Response Team for Finance can help address gaps in the cybersecurity framework, including talent-building, digital literacy, and better information flow.

Link Copied
By Ananth Padmanabhan and Deva Prasad M.
Published on May 22, 2017

Source: Live Mint

The most recent ransomware attacks, currently estimated to have locked up more than 100,000 computers across 100 countries, yet again highlights the very real peril of cyber-threats in the virtual world. The Mirai botnet’s distributed denial of service attacks last year, soon followed by BrickerBot’s permanent incapacitation of several devices forming part of the Internet of Things, exposed the vulnerabilities of a world where everything from room heaters to wearable fitness trackers is connected. Attacks of this kind have proved themselves capable of even imperilling national security, economic stability and public health.

The critical information infrastructure rules framed in 2013 under the Information Technology Act, 2000, identified banking, financial services and insurance (BFSI) as one among five critical sectors. Yet, the past years have seen an increasing number of large-scale cyber-attacks in this sector. About 3.2 million debit cards were compromised last year through a hack on Hitachi’s ATM switch server. Phishers assumed the Reserve Bank of India’s (RBI’s) identity to hoodwink a gullible staffer in the Union Bank of India and inject malware into the bank’s servers. The $171 million, transferred through unlawful access to the bank’s SWIFT codes for cross-border transactions, was fortunately rolled back due to early detection. At a lesser level of sophistication, software vulnerabilities in the Bank of Maharashtra’s Unified Payment Interface app were recently exploited to complete digital transactions even when there was insufficient balance in the sender’s account.

These attacks, coupled with the exponential growth of fintech platforms and solutions partly fuelled by the demonetisation exercise, underscore the need for strong cybersecurity initiatives. In this regard, Union finance minister Arun Jaitley’s budget speech this year, which announced the formation of a sectoral Computer Emergency Response Team for Finance (Cert-Fin), merits closer scrutiny. The design and approach of this newly proposed body is central to its success. There is no dearth of regulatory intervention at present to secure India’s financial ecosystem, and more of the same need not necessarily lead to positive outcomes.

To quickly take stock, RBI circulars have identified the key features of an optimal cybersecurity framework for banks, including network management, user access, customer authentication, and incident response and management. Similarly, the Securities and Exchange Board of India (Sebi) and the Insurance Regulatory and Development Authority of India (Irdai) have issued guidelines for strengthening the cybersecurity framework in capital markets and insurance, respectively. The Indian Computer Emergency Response Team (Icert) continues performing its statutory mandate—information sharing and management, cybersecurity alerts, emergency responses, etc.—on a non-sectoral basis. Even assuming Cert-Fin entirely replaces Icert as the cyber-warrior for the BFSI sector, can it add real value over and beyond what sectoral regulators such as RBI, Sebi and Irdai are already addressing? Or would it just be an additional layer of compliance and friction for innovators in the fast-changing fintech landscape?

We believe there are gaps in the cybersecurity framework that an appropriately designed Cert-Fin can still address better than the existing framework. Broadly these are in the areas of research, talent-building and industry-academia coordination; digital literacy; and better information flows between various actors in the security ecosystem.

Without undermining Icert’s vigilance thus far in issuing timely advisories, it is clear that the body has been unable to take leadership in knowledge creation. The white papers and other research material it has managed to put out are mostly outdated and fail to keep pace with current security trends.

A body built on the foundational principle of shared responsibility with a larger body of stakeholders, including banks, fintech start-ups, cybersecurity companies, and academic institutions, is better placed to effectively fund advanced research and even incubate cybersecurity solutions on a co-creation basis. The Biotechnology Industry Research Assistance Council serves as a good precedent.

Cert-Fin should also have a valued say in the revamping of engineering course curriculum to mitigate the existing skills and supply gap for cybersecurity professionals. The financial sector, with its growth potential highly dependent on the presence of security and trust, is a prime candidate for both skilling and hiring new talent.

Another key intervention, without which any security measure at the service provider end remains likely to fall short, is digital literacy and cybersecurity awareness for customers. Apart from taking the lead, Cert-Fin should also be vested with powers to mandate and evaluate on-the-ground initiatives by private players towards educating end users on safe and responsible access practices. Many a hack has been caused by poor password security.

Finally, Cert-Fin must serve the function of a data escrow, taking important decisions on real-time data sharing and ideally veering towards more information flows than less. A common trend today is the denial of responsibility by all actors in the security chain as soon as news of a hack breaks out. Only a well-designed Cert-Fin can prevent this attitude from regressing into a collective action problem. Suitable exceptions to the law of evidence must also be fashioned to encourage maximum information disclosure to the Cert-Fin.

If these normative goals are sought to be achieved by building them into the very design of Cert-Fin, it could hopefully serve as a healthy template for other jurisdictions too, in addition to facilitating the transition to a digital India for financial transactions.

This article was originally publised in Live Mint.

About the Authors

Ananth Padmanabhan

Former Fellow, Carnegie India

Ananth Padmanabhan was a fellow at Carnegie India, based in New Delhi. His primary research focus is technology, regulation, and public policy, and the intersection of these three fields within the Indian context.

Deva Prasad M.

Authors

Ananth Padmanabhan
Former Fellow, Carnegie India
Deva Prasad M.
South AsiaIndia

Carnegie does not take institutional positions on public policy issues; the views represented herein are those of the author(s) and do not necessarily reflect the views of Carnegie, its staff, or its trustees.

More Work from Carnegie Europe

  • Commentary
    Strategic Europe
    The EU and India in Tandem

    As European leadership prepares for the sixteenth EU-India Summit, both sides must reckon with trade-offs in order to secure a mutually beneficial Free Trade Agreement.

      Dinakar Peri

  • Article
    Learning to Do No Harm to Democracy in Engagement With Authoritarian States

    The ways in which democracies interact with autocracies can also play a role in sustaining repressive regimes. Democratic governments must adopt more holistic approaches that offset the negative implications of international engagement.

      Nic Cheeseman, Marie-Eve Desrosiers

  • Article
    Development Assistance in Different Political Regime Contexts

    In the last decade, nondemocratic regimes have received more development assistance than democratic countries. This reveals how donors struggle with autocratization despite a rhetorical commitment to democracy.

      Marc de Tollenaere

  • Article
    Democratic Innovations From Around the World: Lessons for the West

    Countries around the world are struggling to bridge the gap between citizens and political elites. Innovative practices outside the West, while far from ideal, should be considered in debates about democratic renewal in Europe.

      Richard Youngs, Ken Godfrey

  • Research
    Rewiring Globalization

    Dissatisfaction with globalization has turned into a powerful force, with unchecked globalism increasingly seen as a threat to the integrity of democratic rule. Policymakers must reframe globalization to mitigate its negative consequences while keeping its core growth-enhancing dynamics intact.

      Sinan Ülgen

Get more news and analysis from
Carnegie Europe
Carnegie Europe logo, white
Rue du Congrès, 151000 Brussels, Belgium
  • Research
  • Strategic Europe
  • About
  • Experts
  • Projects
  • Events
  • Contact
  • Careers
  • Privacy
  • For Media
  • Gender Equality Plan
Get more news and analysis from
Carnegie Europe
© 2026 Carnegie Endowment for International Peace. All rights reserved.