What is the 57580.1-2017 standard and how is it related to cybersecurity

Standard 57580.1 is a national standard for information security in the financial sector, created taking into account current threats and the specifics of the activities of credit and other financial organizations (NFO). The Bank of Russia`s Directive No. 821-P, which entered into force in 2018, made it mandatory for all financial market entities, including banks and microfinance companies. This standard is not just a document — it defines the requirements for the implementation of organizational and technical measures to ensure the protection of information, including personal data and banking transactions in electronic form.

GOST was developed as a response to the growing level of threats: from data leaks to compromise of money processing systems. It works in conjunction with other documents and explicitly states what measures should be implemented to ensure the protection of the critical IT infrastructure of the financial sector. Standard 57580.1-2017 is a detailed methodology that defines the specific parameters of a basic set of information security measures. The document clearly regulates the gradation of information security levels depending on the type and class of information systems. This standard is of particular importance in the financial sector, as it provides practical guidance on meeting information security requirements when conducting monetary transactions.

How are the requirements of GOST 57580.1-2017/821-P implemented in practice

Key areas of implementation

The implementation of GOST requirements begins with building an information security architecture in relation to banking business processes. The most affected areas:

  • Access control: setting up the differentiation of rights by roles, control of privileged accounts.
  • Incident response and investigation: defining response procedures, connecting SIEM, organizing SOC.
  • Logging and auditing: maintaining logs for at least 1 year, monitoring administrators` actions.
  • Protection of communication channels: mandatory encryption, control of tunnels on the perimeter.

Real cases show that failures most often occur at points of human or process factor. One regional bank ignored the requirement to manage tenants in a cloud environment. As a result, unauthorized copying of client documents by the system administrator occurred, which was not included in the audit system. — the incident was revealed only during an external inspection.

What does the regulator check during the 821-P compliance audit?

The Bank of Russia evaluates during an on-site or documentary inspection:

  • The presence of an approved threat model and an intruder.
  • Documents: information security policy, information systems register, information security risk matrix.
  • Recovery readiness: incident logs, recovery plans.
  • Availability of information security event monitoring services: SOC, SIEM, CMDB.

Especially important: in 30% of cases, according to the Central Bank, The failure is due to the lack of current risk analysis and the lack of relevance of threats. A typical error is incomplete logs, especially in microservice and hybrid architectures.

How to minimize the costs of implementing requirements

A complete one-step implementation of a standard set of information security measures is costly and not always effective.

Recommended:

  • Select priority protection measures that correspond to the most critical systems.
  • Use standard solutions: connecting a cloud SOC instead of a full-time team, an open-source CMDB, and built-in IAM mechanisms in existing IT platforms.
  • Inventory processes: The flexible process of setting up privileges and storing data often provides more than an expensive SIEM without trained personnel.

Reasonable automation and control of the feasibility of organizational measures (for example, mandatory two-time review of access rights per quarter) provide significant savings on long-term support for the requirements of the standard.

How to understand if your organization meets the requirements of GOST 57580.1-2017/821-P

Compliance can be assessed without hiring external consultants. Start by answering the checklist:

  • Has the threat model and classification of IP criticality been approved?
  • Is there a person responsible for meeting the requirements of GOST 57580.1-2017/821-P?
  • Is access control implemented, logging and analyzing changes?
  • Are up-to-date risk matrices and incident logs maintained?
  • Is there an incident response and recovery plan?
  • Has a centralized monitoring system for information security events been implemented?
  • Are counterparties checked for compliance with information security requirements?
  • Have the regulations been agreed with the legal department?

If more than three answers are "no", meet with the participants in the process.:

  • The Information Security Department is the owner of standards and knowledge.
  • IT/DevOps services - implementers of technical measures.
  • Legal Service — legal grounds for interaction.
  • Guide — prioritization and financing of initiatives.

For Valex`s customers and partners, compliance with GOST 57580.1-2017/821-P means a real reduction in risks.:

  • users` personal and financial data are protected from leaks and modifications;
  • the system is ready for regulatory checks and audits;
  • platform integration into corporate structures does not require security improvements;
  • information security requirements relevant to the banking industry are supported;
  • compliance with the laws of the Russian Federation, including acts of the Central Bank.

Valek — does not just meet the requirements of GOST 57580.1-2017/821-P. The platform was initially built with these standards in mind, and therefore it is ready for the real challenges of the financial infrastructure.

Issue an invoice for payment in 2 clicks

Need to make a payment quickly? In your personal account, you can instantly issue an invoice for payment in any of the cryptocurrencies offered by the service for the required amount. After the customer pays the bill, the funds will be credited to your account within a few minutes.

After paying the client`s bill, the daily messages will be published on your website within a few minutes.

Contact us


E-Mail
Telegram
WhattsApp
Make a call
Wallex

Your request has been sent successfully!

You will be contacted as soon as possible.

Support is available in our Telegram Bot


Write to support

Support is available in our WhattsApp


Go to WhattsApp

Phone number for contacting us


+7 (495) 185-63-92

Reliable infrastructure

Compliance

Start

Thank you for your interest in our solutions. Fill out the form and we will contact you soon to discuss the right solution for your business.

Wallex

Your request has been sent successfully!

You will be contacted as soon as possible.

Wordpress module

Opencart module

Joomla module

Drupal module

1C Bitrix module

API For Developers

Payout API

PHP SDK

Python SDK