The plain-English glossary for Indian BFSI compliance.
54 terms that decide whether software clears an Indian audit — grouped by regulator, written for buyers.
Regulators
8 terms- RBI
The Reserve Bank of India is India’s central bank and the primary regulator for banks, NBFCs, payment systems, and many digital lending workflows.
Why it matters · RBI-regulated buyers care deeply about outsourcing, IT governance, cyber resilience, customer data, auditability, KYC, digital lending, and operational risk.
RBI IT GovernanceRBI Outsourcing Master DirectionDigital LendingKFS- SEBI
The Securities and Exchange Board of India regulates India’s securities markets, including brokers, mutual funds, exchanges, depositories, portfolio managers, and market infrastructure institutions.
Why it matters · SEBI buyers often require stronger cybersecurity, cyber resilience, SOC monitoring, incident classification, and technology-risk controls.
SEBI CSCRFType-A BrokerMIICyber-SOC- IRDAI
The Insurance Regulatory and Development Authority of India regulates insurers, insurance intermediaries, and insurance-sector governance.
Why it matters · Insurance software must handle sensitive personal data, claims data, policyholder records, intermediary access, and cyber controls.
IRDAI Cyber GuidelinesPIIData Fiduciary- MeitY
The Ministry of Electronics and Information Technology is India’s central ministry for digital policy, including the IT Act and DPDP framework.
Why it matters · MeitY-led rules affect privacy, data processing, digital signatures, cyber policy, and compliance design for all digital vendors.
DPDP ActIT Act 2000CERT-In- UIDAI
The Unique Identification Authority of India runs Aadhaar and governs Aadhaar authentication and e-KYC use.
Why it matters · Vendors touching Aadhaar workflows must support the right authentication, consent, identity, security, and ecosystem requirements.
Aadhaar OTPAadhaar eSigne-KYC- CERT-In
The Indian Computer Emergency Response Team is India’s national agency for cyber incident response and reporting directions.
Why it matters · Vendors must help BFSI customers detect, classify, preserve logs, and report incidents within regulatory timelines.
CERT-In Direction April 2022VAPT- CCA
The Controller of Certifying Authorities licenses and regulates certifying authorities for digital signatures and electronic signatures under the IT Act.
Why it matters · eSign and DSC workflows depend on whether the signing method is legally valid and issued through licensed trust infrastructure.
DSCAadhaar eSignIT Act §5- NPCI
The National Payments Corporation of India operates major retail payment rails such as UPI, IMPS, RuPay, NACH, and Aadhaar-linked payment infrastructure.
Why it matters · Payment, mandate, lending, collections, and account-verification tools often touch NPCI-linked rails.
e-NACHeMandateAccount Aggregator
Acts & Regulations
10 terms- DPDP Act 2023
India’s Digital Personal Data Protection Act creates obligations for processing digital personal data, including notice, consent, duties of data fiduciaries, and rights of data principals.
Why it matters · BFSI vendors handling customer data must support consent, data minimization, retention, security, breach handling, and contractual processing controls.
Data FiduciaryData PrincipalSignificant Data Fiduciary- DPDP Rules 2025
The Digital Personal Data Protection Rules, 2025 operationalize parts of the DPDP Act, including phased commencement for specific obligations.
Why it matters · Buyers need to know whether vendors can support compliance timelines, notices, consent mechanisms, child-data handling, and breach workflows.
Consent ManagerNegative List- IT Act 2000
The Information Technology Act gives legal recognition to electronic records, electronic signatures, cyber offences, certifying authorities, and certain security practices.
Why it matters · It decides when electronic records and electronic signatures are legally recognized in India.
IT Act §5DSCAadhaar eSign- PMLA
The Prevention of Money Laundering Act is India’s anti-money-laundering framework for reporting entities and financial-sector due diligence.
Why it matters · KYC, onboarding, transaction monitoring, screening, and record-retention tools often need PMLA-aware controls.
e-KYC- RBI Master Direction on IT Governance
RBI’s IT governance direction sets expectations for governance, risk, controls, assurance, vendor risk, business continuity, and auditability for regulated entities.
Why it matters · Software vendors must fit into governance, audit, source-code, access, data-integrity, and third-party-risk controls.
RBI Outsourcing Master Direction- RBI Outsourcing Master Direction
RBI’s IT outsourcing direction governs how regulated entities manage third-party technology service providers and outsourced IT arrangements.
Why it matters · SaaS vendors become part of the regulated entity’s risk perimeter; contracts, audit rights, data controls, and exit plans matter.
Material OutsourcingConcentration Risk- SEBI CSCRF
SEBI’s Cybersecurity and Cyber Resilience Framework sets cybersecurity and resilience expectations for SEBI-regulated entities.
Why it matters · Vendors serving brokers, AMCs, MIIs, and market intermediaries must support SOC, incident response, cyber drills, access controls, and resilience evidence.
Cyber-SOCType-A BrokerMII- IRDAI Information & Cyber Security Guidelines 2023
IRDAI’s 2023 guidelines strengthen information and cyber security governance for insurers and insurance intermediaries.
Why it matters · Insurance buyers require security governance, access control, data classification, encryption, incident management, and third-party controls.
IRDAI- CERT-In Direction April 2022
CERT-In’s 2022 directions require specified entities to report listed cyber incidents within six hours of noticing or being informed of them.
Why it matters · Vendors must preserve logs, detect incidents fast, provide reporting evidence, and support forensic readiness.
CERT-InVAPT- IT Reasonable Security Practices Rules 2011
These rules define reasonable security practices for sensitive personal data under India’s IT framework.
Why it matters · They remain relevant for baseline security controls, privacy practices, consent, and sensitive personal information handling.
Reasonable Security Practices
Compliance Concepts
8 terms- Data Fiduciary
A person or organization that determines the purpose and means of processing personal data under the DPDP Act.
Why it matters · BFSI institutions are usually data fiduciaries; vendors may be processors but still need contractual and technical safeguards.
Data PrincipalDPDP Act 2023- Data Principal
The individual to whom personal data relates under the DPDP Act.
Why it matters · Customers, borrowers, policyholders, employees, and users may all be data principals whose rights must be supported.
DPDP Act 2023Consent Manager- Significant Data Fiduciary
A data fiduciary designated for heightened obligations based on factors such as volume, sensitivity, risk, and impact.
Why it matters · Large BFSI institutions may need stronger governance, audits, DPO-style ownership, and risk assessments.
DPDP Act 2023Data Fiduciary- Material Outsourcing
Outsourcing that materially affects business operations, customer service, risk management, compliance, or regulatory supervision.
Why it matters · If a SaaS product becomes operationally critical, procurement must evaluate audit rights, exit plans, concentration risk, and resilience.
RBI Outsourcing Master DirectionConcentration Risk- Concentration Risk
The risk of relying too heavily on one vendor, cloud, geography, or service provider.
Why it matters · BFSI buyers need multi-vendor, multi-region, or exit strategies when one failure could affect critical operations.
Material Outsourcing- Reasonable Security Practices
Security controls considered adequate under applicable law, contracts, or regulatory expectations.
Why it matters · Buyers must map vendor controls to security baselines such as access control, encryption, logging, audit, and incident response.
VAPT- Cyber Resiliency Goals
Objectives that ensure systems can withstand, respond to, and recover from cyber incidents.
Why it matters · A product is not just judged by whether it prevents attacks, but whether it helps recover without business collapse.
SEBI CSCRF- Risk-Based Supervision
A regulatory approach that applies deeper scrutiny where risk is higher.
Why it matters · Systemically important institutions, high-volume fintechs, and sensitive-data processors should expect tougher vendor reviews.
Significant Data FiduciaryTop Layer NBFCType-A Broker
Authentication & eSign
8 terms- Aadhaar OTP
A one-time password sent to the mobile number linked to an Aadhaar number, used for Aadhaar authentication and certain e-KYC/eSign flows.
Why it matters · Retail lending, KYC, and Aadhaar-linked signing workflows may require Aadhaar-compatible identity verification.
Aadhaar eSignUIDAIe-KYC- Aadhaar eSignFeatured
A regulated electronic signature method that uses Aadhaar or other approved e-KYC-based authentication to issue a short-lived digital signature certificate.
Why it matters · Generic eSignature is not always enough; some Indian workflows need legally valid eSign under the IT Act framework.
CCAIT Act §5DSCRead the long-form analysis →- Digital Signature Certificate (DSC)
A certificate issued by a licensed certifying authority that enables legally recognized digital signatures.
Why it matters · Board resolutions, statutory filings, high-assurance approvals, and certain regulated workflows may require DSC-grade signing.
CCAIT Act 2000- Video KYC
A video-based customer identification process used by regulated entities under KYC rules.
Why it matters · Vendor tooling must support recording, audit trails, consent, location checks, agent controls, and secure storage.
e-KYC- e-KYC
Electronic Know Your Customer verification, often using Aadhaar, offline XML, OTP, biometric, or other digital identity methods.
Why it matters · Onboarding tools must prove identity, preserve evidence, and avoid unauthorized Aadhaar or personal-data handling.
Aadhaar OTPUIDAI- e-NACH
Electronic National Automated Clearing House mandate setup for recurring payments and collections.
Why it matters · Lenders, insurers, and subscription-based BFSI products need mandate validity, authentication, and payment-rail integration.
NPCIeMandate- eMandate
A digital authorization that permits recurring debits from a customer’s account.
Why it matters · It affects lending collections, insurance premiums, SIPs, subscription finance, and repayment automation.
e-NACHNPCI- IT Act §5
Section 5 of the IT Act gives legal recognition to electronic signatures when prescribed conditions are met.
Why it matters · Buyers must distinguish between convenience signatures and signatures that satisfy Indian legal-recognition requirements.
Aadhaar eSignDSCCCA
BFSI Entity Types
8 terms- Type-A Broker
A higher-risk or higher-scale securities intermediary classification under SEBI cyber frameworks.
Why it matters · Type-A entities often face stronger cyber, SOC, and resilience expectations than smaller intermediaries.
SEBI CSCRF- Top Layer NBFC
The highest-risk layer in RBI’s scale-based NBFC regulatory framework.
Why it matters · A Top Layer NBFC should assume deep supervisory scrutiny and enterprise-grade vendor controls.
Risk-Based Supervision- MII
A Market Infrastructure Institution, such as a stock exchange, clearing corporation, or depository.
Why it matters · MIIs require very high resilience, availability, cyber governance, and operational continuity.
SEBISEBI CSCRF- AMC
An Asset Management Company that manages mutual fund schemes and investment products.
Why it matters · AMCs need investor-data controls, SEBI compliance, cybersecurity, access governance, and outsourcing oversight.
SEBISEBI CSCRF- Payment Aggregator
An entity that facilitates merchants in accepting payments from customers and settling funds.
Why it matters · Payment aggregators face RBI authorization, cybersecurity, data, settlement, and merchant-risk expectations.
RBI- Account Aggregator
A consent-based financial data-sharing entity under India’s account aggregator framework.
Why it matters · Tools integrated into AA workflows need strict consent, data minimization, security, and audit controls.
Consent ManagerData Fiduciary- NBFC-MFI
A non-bank finance company focused on microfinance lending.
Why it matters · Tools must support small-ticket lending, customer consent, repayment, collections, KYC, and RBI scrutiny.
KFS- Small Finance Bank
A bank category focused on financial inclusion, smaller borrowers, and underserved segments.
Why it matters · SFB software must handle banking-grade controls with often leaner operational teams.
RBI
Security Frameworks
4 terms- Zero Trust
A security model that assumes no user, device, network, or workload is trusted by default.
Why it matters · BFSI buyers need identity, device posture, least privilege, segmentation, and continuous verification.
ZTNA- ZTNA
Zero Trust Network Access gives users access to specific applications instead of broad network access.
Why it matters · It can reduce VPN risk, improve access control, and simplify audit evidence for remote and third-party access.
Zero Trust- Cyber-SOC
A Security Operations Center that monitors, detects, investigates, and responds to cyber threats.
Why it matters · SEBI, RBI, and insurance cyber expectations increasingly reward operational monitoring, not just policy documents.
SEBI CSCRF- VAPT
Vulnerability Assessment and Penetration Testing identifies weaknesses before attackers exploit them.
Why it matters · Buyers must check whether vendors undergo regular testing and can share remediation evidence.
CERT-In
Data & Privacy
4 terms- Cross-Border Data Transfer
The transfer of personal data outside India, subject to applicable law, contract, and regulatory controls.
Why it matters · BFSI buyers must understand where customer data is stored, processed, replicated, supported, and backed up.
DPDP Act 2023Negative List- Data Localization
Keeping certain data within India, either because law, regulator, contract, or internal policy requires it.
Why it matters · Residency can be the difference between an audit-ready product and a conditional-risk product.
RBI- Consent Manager
A registered or regulated mechanism that helps individuals manage consent for data sharing.
Why it matters · Consent-heavy workflows such as account aggregation and data sharing need trustworthy consent architecture.
Data PrincipalAccount Aggregator- Negative List
A list of countries or destinations to which data transfer may be restricted or prohibited.
Why it matters · Procurement must check whether vendors can restrict data movement, support regional controls, and prove processing locations.
DPDP Rules 2025Cross-Border Data Transfer
Operational Tech
4 terms- Master Direction
A consolidated RBI direction that groups regulatory instructions on a specific topic.
Why it matters · Master Directions often become the procurement checklist for regulated buyers.
RBI- FLDG
First Loss Default Guarantee is an arrangement where a lending service provider absorbs part of loan losses, subject to RBI rules.
Why it matters · Digital-lending vendors must structure guarantees, disclosures, and risk-sharing within RBI limits.
RBI- KFS
A Key Fact Statement is a standardized summary of loan terms given to borrowers before execution.
Why it matters · Lending platforms must generate accurate, transparent, auditable KFS disclosures.
RBI- Tokenization
Replacing sensitive payment data with tokens to reduce exposure of card or payment credentials.
Why it matters · Payment and checkout tools must reduce data exposure and support compliant payment processing.
NPCI