Operations & Best Practices

Operational Resilience Frameworks for Indian Insurance Intermediaries

Operational resilience has moved from a banking concept to an IRDAI expectation for insurance brokers, corporate agents, and TPAs. The framework is more demanding than business continuity but less prescriptive than regulators in the UK or Singapore.

Tarun Kumar Singh
Tarun Kumar SinghStrategic Risk & Compliance SpecialistAIII · CRICP · CIAFP
5 min read
operational-resiliencebusiness-continuitybrokerstpairdai

Last reviewed: April 2026

Why Resilience Is Now an Intermediary Topic

Operational resilience was a banking concept first, drawn from the Bank of England Discussion Paper of 2018 and operationalised by FCA/PRA expectations a few years later. The Indian insurance regulator has begun adapting the idea for the intermediary segment. The IRDAI (Insurance Brokers) Regulations, 2018, amended in 2024, now require brokers to maintain documented business-continuity and incident-management arrangements. The IRDAI Information Security Guidelines, 2023 apply to all entities holding policyholder data, including TPAs and corporate agents. The IRDAI Master Circular on Outsourcing, 2024 treats critical broker functions as outsourced services for the insurer principal, with attendant resilience expectations.

The regulatory direction is clear: an intermediary that cannot meet its obligations to policyholders or insurers during a disruption is no longer just a commercial failure, it is a regulatory failure.

Resilience Is Not Business Continuity

The two concepts overlap but the differences matter. Business continuity focuses on the intermediary's ability to resume normal operations after a disruption, often measured by recovery time objectives (RTO) and recovery point objectives (RPO) for specific systems. Operational resilience focuses on the intermediary's ability to deliver important business services to policyholders and insurers through a disruption, measured by impact tolerance for each service.

The distinction has three practical consequences:

  • resilience starts from the policyholder's experience, not the internal system inventory
  • resilience is service-centric, not technology-centric, although technology is usually the critical dependency
  • resilience tolerates degraded service, but only within a defined impact tolerance, after which the disruption is unacceptable regardless of internal recovery progress

An Indian broker whose internal claims-tracking system is down for 8 hours has a continuity problem. If 8 hours of downtime means a policyholder's motor claim notification is missed past the insurer's 14-day window, the broker has a resilience problem, regardless of how quickly the internal system is restored.

Identifying Important Business Services

The first step in any resilience programme is mapping important business services (IBS). For an Indian broker, these typically include:

  • claims notification to insurer within insurer-mandated windows
  • policy issuance and endorsement processing
  • premium collection and remittance to insurer
  • renewal notice and quotation issuance for retention
  • policyholder grievance handling
  • regulatory reporting (IRDAI returns, GST, TDS)

For a TPA, the IBS list shifts towards claim adjudication, cashless authorisation, hospital coordination, and IRDAI's claim-status reporting. For a corporate agent, the list centres on suitability documentation, free-look refund processing, and policy servicing.

For each IBS, define an impact tolerance: the maximum tolerable disruption before policyholder or insurer harm becomes material. Tolerances should be expressed in concrete terms: "cashless authorisation for emergency admissions must not be delayed beyond 60 minutes for more than 5% of cases". Avoid the trap of setting tolerances equal to RTOs; the two metrics measure different things and should diverge.

Mapping Dependencies and Concentration Risk

For each IBS, document the dependencies that, if disrupted, would breach the impact tolerance. Dependencies typically span four categories:

  1. People: which roles must function, and what is the bench depth
  2. Process: documented procedures and their digital workflows
  3. Technology: applications, infrastructure, and the cloud or on-premise location
  4. Third parties: insurers, banks, regulators, TPAs, SaaS vendors

Scenario Testing and Severe-but-Plausible Events

Operational resilience requires testing against severe-but-plausible scenarios, not just realistic ones. Indian intermediaries should run at least quarterly scenarios across the following categories:

  • a ransomware event that encrypts the primary claim or policy-management system
  • a prolonged power and network outage at the main operations centre
  • the sudden unavailability of a critical third party (cloud provider, primary banking partner, key insurer's claim portal)
  • a key-person event affecting two or more critical roles simultaneously
  • a pandemic-style absence of 30 to 50% of front-office staff for 4 to 6 weeks

Scenario testing should not be a tabletop exercise alone. At least once a year, test failover infrastructure under load with realistic data. Documented test results are now an expected element of IRDAI inspections; failure to demonstrate testing or to act on findings is itself a finding.

Use insurer-mandated drills as supplementary testing. Most major Indian insurers now run quarterly partner drills; brokers and TPAs that treat these as compliance theatre miss an inexpensive opportunity to validate their own resilience.

Third-Party and Outsourcing Risk

The IRDAI Master Circular on Outsourcing, 2024 sharpened expectations on third-party risk management. For intermediaries, the practical impact lies in three areas:

  • the intermediary remains responsible to the policyholder and insurer regardless of which third party fails
  • material outsourcing arrangements require board-approved policy and annual review of third-party controls
  • the third party's resilience is now the intermediary's resilience; due diligence cannot stop at the contract signing

A working third-party programme includes a tiered vendor inventory, periodic re-assessment of tier-one vendors, contractual rights to audit and to terminate on resilience failures, and a documented exit plan for each tier-one vendor showing how the service would be migrated within the impact tolerance window.

Cloud concentration is a particular concern. Many Indian brokers and TPAs run on AWS, Azure, or Indian sovereign-cloud providers like CtrlS or Yotta. A multi-region or multi-cloud strategy is rarely justified for a small broker, but the resilience plan should at least include a documented strategy for the named provider's outage, drawing on the provider's own published incident-response architecture.

Governance, Self-Assessment, and What Comes Next

Operational resilience is a board-level matter for any intermediary above a moderate size. The annual self-assessment should be tabled at the board, signed by the chief executive, and form part of the IRDAI return where applicable. The self-assessment should cover:

  • the IBS inventory and any changes in the period
  • the impact tolerances and any breaches
  • the scenario tests run, the findings, and the remediation status
  • material third-party events and their resolution
  • the board's view of residual resilience risk

Where the broker or TPA is part of a larger group (insurance brokers held by banks, large NBFCs, or technology platforms), the group-level resilience policy should explicitly cover the insurance entity, but the entity's board cannot delegate accountability to the group.

Looking ahead, the IRDAI is likely to formalise operational-resilience expectations through a dedicated guideline within the next 18 months, modelled on the FCA's PS21/3 and the EU DORA framework. Intermediaries that have built the discipline now will face a smoother transition than those who treat the topic as a banking import that does not apply to them.

About the Author

Tarun Kumar Singh

Tarun Kumar Singh

Strategic Risk & Compliance Specialist

  • AIII
  • CRICP
  • CIAFP
  • Board Advisor, Finexure Consulting
  • Developer of the Behavioural Underinsurance Risk Index (BURI)

Tarun Kumar Singh is a seasoned risk management and insurance professional based in Bengaluru. He serves as Board Advisor at Finexure Consulting, where he advises insurance, fintech, and regulated firms on governance, growth, and trust. His work spans insurance broker regulatory frameworks across India, UAE, and ASEAN, IRDAI compliance and Corporate Agency model reform, VC governance in insurtech, and MSME insurance gap analysis. He is the developer of the Behavioural Underinsurance Risk Index (BURI), a framework applying behavioural economics to underinsurance and insurance fraud risk.

Frequently Asked Questions

How is operational resilience different from business continuity?
Business continuity asks how quickly an internal system or process can resume normal operation after a disruption, typically measured by recovery time and recovery point objectives. Operational resilience asks whether the policyholder or insurer continues to receive an important business service through the disruption, measured by an impact tolerance defined from the customer's perspective. The two are related but the resilience view often surfaces dependencies and concentrations that a system-by-system continuity plan does not.
What size of intermediary should adopt a formal resilience framework?
Any IRDAI-registered broker handling commercial business, any TPA, any corporate agent with significant cross-sell volumes, and any digital aggregator handling material policyholder data should adopt a formal framework. The depth can scale with size: a small broker may run a documented but informal framework reviewed annually by the principal officer, while a large broking group will have a dedicated resilience officer and quarterly board reporting. The IRDAI's 2024 inspection focus suggests informal arrangements alone are no longer sufficient even for mid-sized intermediaries.
Are scenario tests required by IRDAI?
The current rules do not specify test frequency or scenarios in detail, but the IRDAI Information Security Guidelines 2023 and the Outsourcing Master Circular 2024 both expect documented testing of business-continuity and incident-management arrangements. Quarterly tabletop tests and an annual technical failover test are emerging as the de facto minimum, with the technical test using realistic data and load. Documented test outcomes are now requested during IRDAI inspections; failure to demonstrate testing is treated as a control deficiency.
How should we plan for a critical cloud provider outage?
A small or mid-sized broker is unlikely to run multi-cloud or active-active failover; the cost rarely justifies the benefit. The realistic plan is a documented degraded-service mode: which IBS continue to operate, which pause, what manual workarounds are used, and how the policyholder is informed. Maintain offline access to critical policy and claim documentation for the top 50 to 100 accounts so that immediate insurer communications can continue. Update the plan against the cloud provider's published incident architecture and run it through a tabletop annually.

Related Glossary Terms

Related Insurance Types

Related Industries

Related Articles

Sarvada

Ready to see Sarvada in action?

Explore the platform workflow or start a product conversation with our underwriting automation team.

Explore the platform