<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>India on IntelliXBOM</title><link>https://intellixbom.com/tags/india/</link><description>Recent content in India on IntelliXBOM</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Mon, 13 Apr 2026 18:00:00 +0530</lastBuildDate><atom:link href="https://intellixbom.com/tags/india/index.xml" rel="self" type="application/rss+xml"/><item><title>SEBI's CSCRF Names SBOMs Here's What GV.SC.S5 Actually Demands (and Where It Still Leaves Gaps)</title><link>https://intellixbom.com/blog/sebi-cscrf-sbom-gv-sc-s5-capital-markets/</link><pubDate>Mon, 13 Apr 2026 18:00:00 +0530</pubDate><guid>https://intellixbom.com/blog/sebi-cscrf-sbom-gv-sc-s5-capital-markets/</guid><description>&lt;p&gt;When SEBI published its &lt;strong&gt;Cybersecurity and Cyber Resilience Framework (CSCRF)&lt;/strong&gt; in August 2024 (&lt;strong&gt;Circular SEBI/HO/ITD-1/ITD_CSC_EXT/P/CIR/2024/113&lt;/strong&gt;, 20 August 2024), many teams scanned the document for one question: &lt;em&gt;does the capital markets regulator treat software supply chain risk as a first class problem?&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;The answer is &lt;strong&gt;yes, explicitly&lt;/strong&gt;. Under &lt;strong&gt;Governance → Supply Chain Risk Management&lt;/strong&gt;, Standard &lt;strong&gt;GV.SC.S5&lt;/strong&gt; mandates &lt;strong&gt;Software Bills of Materials (SBOMs)&lt;/strong&gt; for Regulated Entities (REs), with &lt;strong&gt;SolarWinds&lt;/strong&gt; and &lt;strong&gt;Apache Log4j&lt;/strong&gt; cited as motivating context. That level of specificity is unusual and welcome for a financial sector framework.&lt;/p&gt;</description></item><item><title>Don't Trust the SBOM Your Vendor Gave You</title><link>https://intellixbom.com/blog/dont-trust-vendor-sbom-certin/</link><pubDate>Thu, 09 Apr 2026 12:00:00 +0530</pubDate><guid>https://intellixbom.com/blog/dont-trust-vendor-sbom-certin/</guid><description>&lt;p&gt;Regulators across the world are finally getting serious about the software supply chain. India&amp;rsquo;s CERT-In SBOM Technical Guidelines (v2.0, July 2025) go beyond just SBOMs they extend to a broader BOM ecosystem, including CBOM, QBOM, AIBOM, and HBOM. This makes the requirement not just about software components, but about understanding the full composition of modern systems.&lt;/p&gt;
&lt;p&gt;Globally, the direction is the same whether it&amp;rsquo;s the US Executive Order 14028, the EU Cyber Resilience Act, RBI Advisory 11/2024, or MeitY&amp;rsquo;s 2025 guidelines.&lt;/p&gt;</description></item><item><title> Your Vendor NDA Won't Stop a Supply Chain Attack</title><link>https://intellixbom.com/blog/irdai-cybersecurity-2026/</link><pubDate>Mon, 06 Apr 2026 00:00:00 +0000</pubDate><guid>https://intellixbom.com/blog/irdai-cybersecurity-2026/</guid><description>&lt;p&gt;&lt;strong&gt;IRDAI&amp;rsquo;s New Rules Won&amp;rsquo;t Save You.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;What the 2026 IRDAI Guidelines on Information and Cyber Security for Regulated Entities get right, what they miss, and the one capability every regulated insurer needs to deploy now.&lt;/em&gt;&lt;/p&gt;
&lt;hr&gt;
&lt;p&gt;The Insurance Regulatory and Development Authority of India (IRDAI) has significantly raised the bar with its amended Cybersecurity Guidelines 2023 (Annexure A). For every insurer and insurance intermediary operating in India, these amendments are not optional fine print they are a direct signal that cybersecurity governance must now match the sophistication of today&amp;rsquo;s threat landscape.&lt;/p&gt;</description></item></channel></rss>