Get SAR Audit Report

The RBI Data Localization Mandate

The Reserve Bank of India issued a directive via circular DPSS.CO.OD.No 2785/06.08.005/2017-18 on April 8, 2018, making it mandatory for all transaction data to be stored exclusively within India. As the central banking authority overseeing monetary policies, the RBI mandates unrestricted supervisory access to payment data, leading to the enforcement of this critical mandate.

Under this directive, all companies handling transactions in India, whether global or local (such as fintech companies and gateway operators), are required to store payment data exclusively within the country.

What is SAR Audit?

A System Audit Report (SAR) is a mandatory document for organizations, especially those handling payment data, to submit to the Reserve Bank of India (RBI) in compliance with the data localization mandate. The SAR serves as an official record that certifies the organization has complied with the requirement to store end-to-end transaction data within India

How Does It Work?

01

The audit must be conducted by auditors empaneled with CERT-In (Indian Computer Emergency Response Team).

01

The SAR includes a certification from auditors confirming the completion of the data localization activity.

03

The SAR should be approved by the board of the organization, indicating leadership agreement with the findings

04

Once the SAR is prepared, certified, and approved, it is submitted to the Reserve Bank of India, demonstrating compliance with regulatory requirements.

The Benefits of SAR Audits

each-get1
Data Localization

In times of geopolitical uncertainty, SAR audits fortify the security of financial and personal data belonging to Indian citizens. By ensuring data stays within India, these audits protect against vulnerabilities during geopolitical crises.

each-get1
Anti-Money Laundering

SAR audits help in identifying and preventing suspicious financial activities, strengthening the organization’s defenses and contributing to the global fight against illicit financial practices.

each-get1
Enhanced IT Governance

Effective IT governance is crucial for payment service providers. By identifying and addressing potential weaknesses in data storage, access management, and security protocols, SAR audits improve the overall integrity of IT governance

How It Works?

Audit Methodology

The SAR audit includes:

Audit Initiation
The audit begins by defining the scope and objectives based on the SEBI Cyber Security & Cyber Resilience framework.
Document
Requirement List
A detailed list of required documentation is collected to assess your existing cybersecurity measures.
Identification &
Analysis
We identify vulnerabilities and analyze the effectiveness of your IT security controls across various domains.
Risk Response
After analyzing the risks, we provide actionable insights on mitigating vulnerabilities and improving your security systems.
Post-Deployment
Review
A final review ensures that the necessary measures have been implemented effectively, and compliance has been achieved.

Do You Know?

4,847,839

Number of SARs filed in 2022.

1,761,722

Number of SARs involving financial fraud in 2022.

1,172,851

Number of SARs involving cybercrime in 2022.

Want a Quick Audit?

Key Data Requirements for System Audit Report for Data Localization (SAR)

Payment Data Elements

Classification of data elements, including payment credentials, transaction data, and customer information.

Transaction/Data Flow

Diagram detailing the full transaction flow, distinguishing between data at rest and in motion.

Application Architecture

Diagram outlining the full application architecture detailing all involved components.

Online System Security

Evaluation of security controls ensuring protection for payment information systems and mobile applications.

Network Diagram/Architecture

Network architecture diagram that adheres to the Network Security Policy.

Data Storage

Diagram explaining data retention and database architecture with retention policies.

Transaction Processing

Detailed transaction/data flow with evidence of SOPs or organizational policies.

Data Backup & Restoration

Compliance with guidelines for backup, restoration, and disaster recovery.

Data Security

Verification of security measures like encryption, masking, and database access monitoring.

Access Management

Assessment of data access from outside India and adherence to access control checks.

Information Security Governance

Evaluation of management's oversight of information security with an appropriate governance policy.

Asset Management

Assessment of physical security, hardware change management, and adherence to an asset management policy.

Human Resource Management

HR policies regarding recruitment, training, and termination processes.

Business Continuity Management

Disaster recovery capabilities and business continuity planning (BCP).

Incident Management

Examination of incident response policies and security incident management mechanisms.

IT Project Management

Evaluation of controls related to system development/acquisition and adherence to Secure SDLC policies.

Third-Party Risk Management

Controls for managing outsourcing risks, including vendor contracts and TPRM policies.

What You Get

each-get1
Audit Draft
Report

Initial findings emphasizing discoveries from the audit.

each-get1
Remediation
Support

GAP Assessment Report outlining remediations for non-compliant controls.

each-get1
Final Audit
Report

Comprehensive report that elaborates on the final audit findings.

each-get1
Compliance
Letter

A letter confirming the requirements are met and that all applicable controls are fulfilled.

Detect and prevent attacks before they succeed.

Stay ahead of the rapidly evolving threat landscape and ensure your data protection without overspending.

Contact now
red-team-bg
sample-report

Take a Peek into Our Sample Report

Our deliverables cater to both technical and business audiences comprehensively.

Request Report
sample-report

What Our Clients Say

Learn what our customers say about our work.

Testimonials

Press Releases

Empanelled by CERT-In for Auditing Services

Digital Defense is empanelled by CERT-In for providing Information Security Auditing Services.

Read more

Digital Defense Recognized as One of the Top 10 Most Promising Cybersecurity Consulting Startups - 2021 by CIOReviewIndia

We provide watertight security solutions for businesses, ensuring comprehensive protection.

Read more

Digital Defense Wins RSAC 2019 Launch Pad Award for Strobes

Strobes, our innovative solution for vulnerability management, earned us the RSA Conference 2019 Asia Pacific & Japan Launch Pad Award.

Read more

‘Emerge-X’ Winner at Microsoft’s ‘Highway to a Hundred Unicorns’

Recognized by Microsoft for our innovative approach to vulnerability management and enterprise security.

Read more

Have You Implemented the Right Security Practices?

Talk To Our Delivery Head