
The compliance requirements of the Securities and Exchanges Board of India (SEBI) span a range of areas including financial reporting, disclosures, governance, third-party risk, data retention, insider trading, and cyber resilience. Of these, Akku makes compliance with SEBI’s Cybersecurity and Cyber Resilience Framework (CSCRF) simpler and quicker with its range of cybersecurity controls.

SEBI regulations apply to a range of entities including stock brokers, investment advisors, portfolio managers, mutual funds, RTAs, KRAs, and market infrastructure institutions (MIIs).



A subset of SEBI’s compliance requirements are cybersecurity system-driven — requiring controls such as IAM, PAM, MFA, access restrictions, and log monitoring, and that’s where Akku can streamline your path to compliance.
| Security Area | Akku’s Coverage | Description |
|---|---|---|
| Identity & Access Management (IAM) | Full | Access controls by user, group, IP, device, time, and location across cloud and on-prem apps can be enforced |
| Multi-Factor Authentication (MFA) | Full | Adaptive MFA, desktop MFA, and BYOF are supported |
| Privileged Access Management (PAM) | Partial | Dynamic, time-bound, single-use access is provided; no credential vaulting and no session video recording |
| Endpoint & DLP Controls | Partial | USB access, screen capture, file uploads, and access to non-corporate cloud and email accounts can be blocked; no deep content scanning |
| User Lifecycle Management (ULM) | Full | Provisioning and deprovisioning are automated with a join-move-exit lifecycle |
| Security Event Logging & Audit Trails | Full | Logs are maintained across IAM, MFA, ULM, and endpoints with analytics and risk scoring |
| Cloud Service & SaaS Access Security | Full | SSO-IDP with access policies for cloud and proprietary applications is provided |
| Insider Threat Detection & Anomalous Behavior Monitoring | Partial | Risk analytics are provided based on access logs; full UEBA requires external tools |
Let’s have a discussion on how Akku can support your journey to compliance with the RBI’s cybersecurity framework.