SEBI System Audit

SEBI System Audit

Overview

The SEBI circular SEBI/HO/MIRSD/CIR/PB/2018/147 dated on December 03, 2018 made it mandatory for all stockbrokers must comply with the SEBI cyber security framework to maintain robust cyber security and cyber resilience framework to protect the integrity of data and privacy.

It focuses on protecting the data and the privacy of security holders by improving the Cyber Security and Cyber Resilience of the Stockbrokers and Depository Participants. It governs data created, received, or maintained by them wherever these data records are and whatever form they are in, while carrying out their designated duties and functions.

 

SEBI has been vested with the following powers to discharge its functions efficiently

  • Approval of by−laws of Securities exchanges.
  • Amendment of by-laws through the Securities exchange
  • Inspection of the books of accounts from recognized Securities exchanges.
  • Inspection of the books of accounts of financial intermediaries.
  • Listing of shares by certain companies in one or more Securities exchanges.
  • Brokers and sub-brokers are registered
  •  

    Applicability

    The applicability of the guidelines issued by SEBI extend to the following:

  • Dec 03, 2018: SEBI Guidelines for Stockbrokers and Depository Participants.
  • Jan 10, 2019, SEBI Guidelines for Mutual Funds / Asset Management Companies (AMCs).
  • Dec 07, 2018, SEBI Guidelines for Stock Exchanges, Clearing Corporations and Depositories.
  • All the stockbrokers are required to conduct audit and ensure compliance to the guidelines as mentioned above by CISA certified auditor.

    Objective

    The objectives of conduct SEBI System Audit:

  • To monitor the activities of the stock exchange and ensure integrity and privacy of data is maintained.
  • To safeguard the rights of the investors
  • Cyber Security and Cyber Resilience Framework is robust
  • To ensure compliance with SEBI guidelines and ToR (Terms of Reference)
  • To curb fraudulent practices by maintaining a balance between statutory regulations and self-regulation.
  •  

    Approach

    Our approach has been covered in 4 phases as mentioned below:

    Phase 1: Audit Planning

    Planning and preparation of the audit scope and objectives.

    Phase 2: Risk Assessment and Business Process Analysis

    Assessment, measuring, managing, and controlling IT-related risks, thus enhancing the reliability of processes and the entire information system.

    Phase 3: Audit Performance (Compliance and System Review) 

    Assessment of controls over critical system platforms, network and physical components, IT infrastructure supporting relevant business processes.

    Phase 4: Reporting

    Report audit findings, conclusions, and recommendations of the audit in terms of conformance, non-conformance, and opportunities to improve.

    Request a Quote

    Copyright 2022 Cybertryzub. Designed By