Core Banking Systems
Core Banking Systems
Core Banking Systems
To be able to meet the requirements of its customers, to be able to meet the global challenges in banking
and to enhance its service delivery models; banks in India adopted CORE BANKING SYSTEMS
(CBS). CBS are centralized systems allowing banks to scale up operations, better service delivery and
improved customer satisfaction thereby improving the overall efficiency and performance of its operations.
Core Banking System/Solution (CBS) refers to a common IT solution wherein a central shared
database supports the entire banking application. It allows the customers to use various banking facilities
irrespective of the bank branch location. Examples are Finncle by Infosys, FinnOne, Flexcube by Oracle,
BaNCS, bankMateThe characteristics of CBS are:
• There is a common database in a central server located at a Data Centre, which gives a consolidated
view of the bank’s operations.
• Branches function as delivery channels providing services to its customers.
• CBS is centralized Banking Application software that has several components which have been
designed to meet the demands of the banking industry.
• CBS is supported by advanced technology infrastructure and has high standards of business
functionality.
• Core Banking Solution brings significant benefits such as a customer is a customer of the bank and not
only of the branch.
• CBS is modular in structure and is capable of being implemented in stages as per requirements of the
bank.
• A CBS software also enables integration of all third-party applications including in-house banking
software to facilitate simple and complex business processes.
In the case of a CBS, at the core is Central server. All key modules of banking such as back office, branch,
data warehouse, ATM Switch, mobile banking, internet banking, phone banking and credit-card system are
all connected and related transactions are interfaced with the central server
Back Office: The Back Office is the portion of a company made up of administration and support
personnel, who are not client-facing.
Data Warehouse: Data warehouses take care of the difficult data management - digesting large quantities
of data and ensuring accuracy - and make it easier for professionals to analyse data
33
Credit-Card System: Credit card system provides customer management, credit card management,
account management, customer information management and general ledger functions; provides the online
transaction authorization
Automated Teller Machines (ATM)
Central Server: Nowadays, most banks use core banking applications to support their operations creating
a Centralized Online Real-time Exchange (or Environment) (CORE). All the bank's branches access
applications from centralized data centers/ servers, therefore any deposits made in any branch are reflected
immediately and customer can withdraw money from any other branch throughout the world.
Mobile Banking and Internet Banking
Branch Banking
components. Arrangements for alternate connectivity of the banks with the data centre should be
established whenever there is a disruption in the primary connectivity
Online Transaction monitoring for fraud risk management: Risk evaluations are carried out and
considering the risk profile and other regulatory requirements of the bank, effective monitoring should be
done as a part of managing fraud risk management.
CBS IT Environment
A. Application Server
All the transactions of the customer are processed by the data center. The Application Server performs
necessary operations the data is transmitted to the application software at the data center. The results are
updated in the database server at the centralized data center.
B. Database Server
The Database Server of the Bank contains the entire data of the Bank. The data would consist of various
accounts of the customers and master data. Application software would access the database server.
C. Automated Teller Machines (ATM) Channel Server
This server contains the details of ATM account holders. Soon after the facility of using the ATM is
created by the Bank, the details of such customers are loaded on to the ATM server.
Implementation of CBS
• Planning: Planning for implementing the CBS should be done as per strategic and business objectives of
bank.
• Approval: The decision to implement CBS requires high investment and recurring costs and will impact
how banking services are provided by the bank. Hence, the decision must be approved by the board of
directors.
• Selection: Although there are multiple vendors of CBS, each solution has key differentiators.
• Design and develop or procured: CBS solutions used to be earlier developed in-house by the bank.
Currently, most of the CBS deployments are procured. There should be appropriate controls covering the
design or development or procurement of CBS for the bank.
• Testing: Testing is to be done at different phases at procurement stage to test suitability to data
migration to ensure all existing data is correctly migrated and testing to confirm processing of various types
of transactions of all modules produces the correct results.
• Implementation: CBS must be implemented as per pre-defined and agreed plan with specific project
milestones to ensure successful implementation.
• Maintenance: CBS must be maintained as required. E.g. program bugs fixed, version changes
implemented, etc.
• Support: CBS must be supported to ensure that it is working effectively.
• Updation: CBS modules must be updated based on requirements of business processes, technology
updates and regulatory requirements;
• Audit: Audit of CBS must be done internally and externally as required to ensure that controls are
working as envisaged.
(c) Market Risk: Market risk refers to the risk of losses in the bank’s trading book due to changes in
equity prices, interest rates, credit spreads, foreign-exchange rates, commodity prices, and other indicators
whose values are set in a public market.
(d) Strategic Risk: Strategic risk, sometimes referred to as business risk, can be defined as the risk that
earnings decline due to a changing business environment.
(f) IT Risk: From a risk assessment and coverage point of view, it is critical to ensure that the Bank can
impart advanced training to its permanent staff in the core areas of technology for effective and efficient
technology management and in the event of outsourcing to take over the functions at a short notice at
times of exigencies. Some of the common IT risks related to CBS are:
Ownership of Data/ process: Data resides at the Data Centre. Establish clear ownership so that
accountability can be fixed and unwanted changes to the data can be prevented.
Authorization process: Anybody with access to the CBS, including the customer himself, can enter data
directly. If the process is not robust, it can lead to unauthorized access to the customer information.
Authentication procedures: Usernames and Passwords, Personal Identification Number (PIN), One
Time Password (OTP) are some of the most commonly used authentication methods. However, these may
be inadequate and hence the user entering the transaction may not be determinable or traceable.
Several software interfaces across diverse networks: A Data Centre can have as many as 75-100
different interfaces and application software. A data centre must contain adequate infrastructure, such as
power distribution and supplemental power subsystems, including electrical switching; uninterruptable
power supplies; backup generators and so on. Lapse in any of these may lead to real-time data loss.
Maintaining response time: Maintaining the interfacing software and ensuring optimum response time
and up time can be challenging.
User Identity Management: Some Banks may have more than 5000 users interacting with the CBS at
once.
Access Controls:. Bank environments are subject to all types of attacks; thus, a strong access control
system is a crucial part of a bank’s overall security plan.
Incident handling procedures: Incident handling procedures are used to address and manage the
aftermath of a security breach or cyberattack. However, these at times, may not be adequate considering
the need for real-time risk management.
Change Management: It reduces the risk that a new system or other change will be rejected by the users
Information Security
Information security is critical to mitigate the risks of Information technology. Security refers to ensure
Confidentiality, Integrity and Availability of information. Information security is comprised of the
following sub-processes:
• Information Security Policies, Procedures and practices: The security policy is basis on which
detailed procedures and practices are developed and implemented at various units/department and layers
of technology, as relevant.
• User Security Administration: The security administration policy documents define how users are
created and granted access as per organization structure and access matrix.
• Application Security: This refers to how security is implemented at various aspects of application right
from configuration, setting of parameters and security for transactions through various application
controls.
• Database Security: This refers to various aspects of implementing security for the database software.
• Operating System Security: This refers to security for operating system software which is installed in
the servers and systems which are connected to the servers.
37
• Network Security: This refers to how security is provided at various layers of network and connectivity
to the servers.
• Physical Security: This refers to security implemented through physical access controls.
IT Controls in Banks
IT risks need to be mitigated by implementing the right type and level of controls in the automated
environment. This is done by integrating controls into IT. Sample list of IT related controls are as follows:
• The system maintains a record of all log-ins and log-outs.
• If the transaction is sought to be posted to a dormant (or inoperative) account, the processing is halted
and can be proceeded with only with a supervisory password.
• The system checks whether the amount to be withdrawn is within the drawing power.
• The system flashes a message if the balance in a lien account would fall below the lien amount after the
processing of the transaction.
• Access to the system is available only between stipulated hours and specified days only.
• Individual users can access only specified directories and files. Users should be given access only on a
‘need-to-know basis’ based on their role in the bank.
• Exception situations such as limit excess, reactivating dormant accounts, etc. can be handled only with a
valid supervisory level password.
• A user timeout is prescribed. This means that after a user logs-in and there is no activity for a pre-
determined time, the user is automatically logged out of the system.
• Once the end-of-the-day process is over, the ledgers cannot be opened without a supervisory level
password.
Application Software
Application Software whether it is a high-end CBS software, ERP software or a simple accounting
software, have primarily four gateways through which enterprise can control functioning, access and use
the various menus and functions of the software. These are Configuration, Masters, Transactions and
38
Reports. CBS software has extensive reporting features with standard reports and options to generate
adhoc reports as required by user or the bank.
Treasury Process
Front Office
1. Pre Deal Analytics
2. Trade Deals Capture
3. Position management
Middle Office
1. Risk Management
2. Asset liability management
3. Pricing and Valuations
4. Position management/Limit management
Back Office
39
1. Reconciliation
2. Confirmations
3. Securities/Funds Settlements
4. Accounting
Money Laundering is the process by which the proceeds of the crime and the true ownership of those
proceeds are concealed or made opaque so that the proceeds appear to come from a legitimate source
40
As per Section 12 of Prevention of Money Laundering Act, 2002, every reporting entity shall:
(a) maintain a record of all transactions, including information relating to transactions covered under clause
in such manner as to enable it to reconstruct individual transactions;
(b) furnish to the Director within such time as may be prescribed, information relating to such
transactions, whether attempted or executed, the nature and value of which may be prescribed;
(c) maintain record of documents evidencing identity of its clients and beneficial owners as well as account
files and business correspondence relating to its clients fpr 5 years from the end of business relationship