Now Accepting Clients
WMBE Certified
USPAACC Certified Pan Asian American & Diverse Business

Compliance Is
Not a Checklist.
It's Architecture.

The only WMBE-certified GRC & cybersecurity architecture firm in NJ. We replace manual audit chaos with automated Infrastructure as Code — delivering CMMC, FedRAMP, and Zero Trust compliance at scale.

25+
Years Experience
100%
Audit Pass Rate
12+
GRC Frameworks
VinfraSec Services India Ltd.
CERT-In Ready

Securing
Bharat's Digital
Sovereignty

VinfraSec Services India Ltd bridges global innovation with domestic compliance. "Made in India" security solutions for Defense, Energy, BFSI, and Critical Infrastructure sectors.

vis-compliance-engine v3.1
LIVE
$ vis-scan --target NJ_Manufacturing_01 --framework CMMC --target IND_Critical_Infra_01 --framework DAP
→ Establishing secure tunnel... DONE
→ Loading control framework... NIST 800-171 r2DPDPA + CEA 2026
CMMC 2.0 ComplianceDAP 2026 Readiness 98% ✓
Zero Trust Policy ENFORCED ✓
IaC Remediation RUNNING...
> terraform apply --auto-approve
> Enforcing IAM boundary policies...
> Drift detection: 0 violations found
Assessment complete. All systems nominal.
Audit Ready
Zero Trust

Trusted by Regulated Industries · USA

Microsoft Partner
AWS Partner
WMBE Certified
CMMC-AB Registered
USPAACC Certified USPAACC Certified
ITAR / US Person
FedRAMP Expert
NIST 800-171
SOC 2 Type II
Microsoft Partner
AWS Partner
WMBE Certified
CMMC-AB Registered
USPAACC Certified USPAACC Certified
ITAR / US Person
FedRAMP Expert
NIST 800-171
SOC 2 Type II

Securing Critical Infrastructure Across India

DAP 2026 Ready
CEA 2026 Compliant
DPDPA Experts
RBI / SEBI Audits
CERT-In 6hr Reporting
MeitY Empanelled
DAP 2026 Ready
CEA 2026 Compliant
DPDPA Experts
RBI / SEBI Audits
CERT-In 6hr Reporting
MeitY Empanelled
The Problem

The "Checklist" Approach
Is Dead.

Legacy compliance methods don't scale. Manual spreadsheets, reactive audits, and point-in-time assessments leave regulated organizations perpetually exposed.

Manual Documentation

Takes months, filled with human error, and becomes obsolete the moment you save the file. Point-in-time compliance is compliance theater.

The "Lift & Shift" Trap

Moving legacy applications to cloud without architectural modernization creates compounding security holes and massive cost overruns.

Audit Anxiety

Scrambling to collect evidence screenshots right before the assessor arrives. Reactive compliance is not a strategy — it's a liability.

The VIS Difference: Compliance as Code.

We automate controls directly into your infrastructure — so every deployment is audit-ready by default.

The Platform

Engineered Outcomes.

We don't sell hourly support. We engineer specific, measurable results. Explore our four core pillars.

Compliance Engineering

Audit-ready by default. Automating CMMC, NIST 800-53 & FedRAMP controls via Infrastructure as Code.

CMMC 2.0 & NIST 800-171
FedRAMP Authorization
ISO 27001 / SOC 2

IT Infrastructure

Escape the legacy trap. Re-architecting monolithic apps into microservices and Data Fabric on modern cloud.

App Modernization
Microservices & SDDC
Azure VMware

Cybersecurity & Identity

Zero Trust Architecture. IAM, vCISO services, threat detection, and endpoint hardening.

Zero Trust Design
vCISO Services
24/7 Threat Detection

Data & AI Intelligence

From data hoarding to data intelligence. Governed Data Lakes and secure Generative AI integration.

Data Fabric Architecture
Secure GenAI
AI Governance

Compliance Engineering — Deep Dive

Specific frameworks. Specific outcomes. No ambiguity.

CMMC & NIST

Automated CMMC 2.0 & NIST 800-171

For Defense Contractors & Manufacturers

Real-time SPRS Score Calculation
Automated Gap Analysis Report
Remediation Roadmap & IaC Templates
Continuous Compliance Monitoring
FedRAMP

FedRAMP & NIST 800-53

Cloud Service Provider Readiness

NIST 800-53 Control Implementation
FedRAMP Readiness Assessment
Authorization Package Engineering
3PAO Coordination Support
ISO / SOC 2

Audit Readiness — ISO & SOC 2

Global Enterprise & SaaS

ISO 27001 Controls Implementation
SOC 2 Type I & II Preparation
Evidence Collection Automation
Risk Register Management
NIST 800-171 Specialist

NIST SP 800-171 —
Complete Compliance Coverage

NIST Special Publication 800-171 defines 110 security requirements across 14 control families for protecting Controlled Unclassified Information (CUI) in non-federal systems. Defense contractors, subcontractors, and any organization handling CUI must comply — or risk losing DoD contracts.

What Is It?

A NIST publication that specifies security requirements for protecting CUI handled by non-federal contractors. It maps directly to CMMC 2.0 Level 2 — all 110 requirements must be implemented and evidenced.

Who Must Comply?

Any organization with a DoD contract that touches CUI — prime contractors, subcontractors, IT service providers, manufacturers, universities, and research labs handling sensitive defense data.

Consequences of Non-Compliance

Contract termination, disqualification from future DoD awards, False Claims Act liability, and reputational damage. DFARS clause 252.204-7012 makes compliance a contractual obligation — not optional.

SPRS Score

Supplier Performance Risk System (SPRS)

SPRS is the DoD's publicly visible score for every defense contractor. Starting at +110, points are deducted for each unimplemented NIST 800-171 requirement based on its weighted severity. A low or negative score can disqualify you from contract awards.

Target: +110
Minimum Acceptable: +70
Risk Flag: Below 0

SPRS Score Visualization

Access Control (AC)22 pts
Configuration Mgmt (CM)9 pts
Incident Response (IR)3 pts
Risk Assessment (RA)3 pts
Composite SPRS Score +110 / 110

All 14 Control Families — Covered

110 security requirements across 14 domains. We implement every one using automated Infrastructure as Code.

22 req.
Access Control

AC · 3.1.x

Limit system access to authorized users, processes, and devices. Control CUI flow to prevent unauthorized disclosure.

3 req.
Awareness & Training

AT · 3.2.x

Ensure personnel are aware of security risks and trained to recognize threats including social engineering and insider threats.

9 req.
Audit & Accountability

AU · 3.3.x

Create and retain system audit logs to enable monitoring, analysis, investigation, and reporting of unlawful activity.

9 req.
Configuration Management

CM · 3.4.x

Establish and maintain baseline configurations. Control changes to systems with CUI. Restrict, disable, or prevent use of non-essential functions.

11 req.
Identification & Authentication

IA · 3.5.x

Identify system users, processes, and devices. Authenticate their identities before granting access to CUI systems. Enforce MFA requirements.

3 req.
Incident Response

IR · 3.6.x

Establish incident handling capabilities, track incidents, and test the incident response plan. Report CUI incidents to DCSA within 72 hours.

6 req.
Maintenance

MA · 3.7.x

Perform maintenance on organizational systems. Provide controls on tools, techniques, and personnel used for system maintenance.

9 req.
Media Protection

MP · 3.8.x

Protect system media containing CUI — both paper and digital. Limit access, sanitize or destroy media before disposal or reuse.

2 req.
Personnel Security

PS · 3.9.x

Screen individuals prior to granting access. Ensure CUI is protected during and after personnel actions such as terminations or transfers.

6 req.
Physical Protection

PE · 3.10.x

Limit physical access to organizational systems, equipment, and operating environments to authorized individuals. Protect and monitor physical infrastructure.

3 req.
Risk Assessment

RA · 3.11.x

Periodically assess risk to systems, operations, and assets. Scan for vulnerabilities. Remediate flaws consistent with risk assessments.

3 req.
Security Assessment

CA · 3.12.x

Periodically assess security controls, develop and implement plans of action, monitor on an ongoing basis to ensure effectiveness.

16 req.
System & Comm. Protection

SC · 3.13.x

Monitor, control, and protect organizational communications. Implement architectural designs and network segmentation for CUI systems.

7 req.
System & Info. Integrity

SI · 3.14.x

Identify, report, and correct information and system flaws. Protect against malicious code. Monitor security alerts and perform ongoing scanning.

CUI Data Lifecycle

How We Protect Your CUI

01

CUI Discovery & Classification

Automated scanning to locate all CUI across endpoints, cloud storage, email, and collaboration tools.

02

Boundary Definition (CUI Enclave)

We architect a hardened CUI enclave — physically or logically separated from general IT systems with Zero Trust controls.

03

Control Implementation via IaC

Every required control is codified in Terraform/Ansible — automated, version-controlled, and reproducible.

04

Continuous SPRS Score Monitoring

Real-time dashboards track your SPRS score with automated alerts for any drift below your target threshold.

Required Documentation

SSP & POA&M — Engineered, Not Templated

System Security Plan (SSP)

We generate a living SSP that automatically reflects your actual control implementation state — not a static Word document that goes stale the moment it's written.

Plan of Action & Milestones (POA&M)

Gaps are automatically captured in a structured POA&M with assignees, due dates, and integration into your project management workflow.

SPRS Self-Assessment Submission

We walk you through the SPRS portal submission process and provide audit-trail evidence packages acceptable to C3PAO assessors.

Limited Slots Available

What's Your SPRS Score?

Most DoD contractors don't know their true SPRS score — and many are submitting inflated numbers that expose them to False Claims Act liability. Book a free NIST 800-171 readiness call and we'll calculate your actual score in under 48 hours.

Get My SPRS Score — Free
Our Capabilities

Strategic Verticals

"Made in India" security solutions for the nation's most sensitive and heavily regulated sectors.

Defense & National Security

DAP 2026 READINESS

With the 2026 update to the Defence Acquisition Procedure (DAP), indigenization is no longer optional.

IDDM Audits: Verify design & source code ownership
Supply Chain: Eradicate untrusted components
Space-Cyber: Satellite payload security (CERT-In/SIA)

Green Energy & Utilities

CEA 2026 COMPLIANCE

The Central Electricity Authority mandates the power grid be treated as Critical Infrastructure.

Asset Hardening: Inverters, SCADA, BESS protection
Trusted Source: NSCS Trusted Telecom Portal
OT Audits: Annual security assessments (CEA)

Critical Info Infrastructure

NCIIPC PROTECTED SYSTEMS

Protecting the pillars of the economy: Telecom, Transportation, and Energy sectors.

Protected System Alignment: IT Act Section 70
CCMP: Cyber Crisis Management Planning
Cross-Vertical Audits: Bi-annual IT & OT

Digital Privacy

DPDPA 2023 / 2026 RULES

Navigate the ₹250 Cr penalty landscape of India's strict data protection era safely.

Resident DPO: As-a-Service for SDF entities
Consent Architecture: 2026 interoperability standard
Data Localization: MeitY-empanelled clouds

BFSI, Health & Manufacturing

RBI / ABDM COMPLIANCE

Specialized oversight for financial systems, digital health stacks, and smart factories.

RBI/SEBI/IRDAI: Audits for fintechs and brokers
ABDM Security: National health stack integration
Smart Factory: OT ransomware & IP theft protection
2026 Inflection Point

India's Strategic Compliance Convergence

The year 2026 marks a foundational shift in India's regulatory architecture — driven by national security, digital sovereignty, and Indo-Pacific geopolitical pressure. Five overlapping frameworks now carry real financial teeth. VinfraSec Services India Ltd. is your engineered path through every one of them.

₹250 Cr
Max DPDPA Penalty
6 hrs
CERT-In Incident Report Window
1.5 M+
Cyberattack Attempts (Op. Sindoor)
31%
Mfg. Incidents via Ransomware
DAP 2026 · CERT-In/SIA · IDDM

Defense & National Security

The 2026 Mandate

DAP 2026 marks a total strategic departure from India's historical reliance on licensed foreign manufacturing. Indigenization is no longer optional — it is a rigid prerequisite for participation in the defense economy, codified as a navigation chart for India's journey to 2047.

The Buy (Indian-IDDM) classification now requires demonstrable ownership of design documents, software source codes, microchip circuit layouts, and operational architecture — not merely domestic assembly. Purchased foreign design licenses are explicitly disqualified unless full IP ownership is permanently and irrevocably transferred.

VinfraSec Service Delivery

IDDM Audit & IP Verification
End-to-end audit of source code ownership, design documentation, and circuit layout rights for IDDM classification eligibility
Supply Chain Trust Assessment
Deep sub-tier vendor screening for untrusted microprocessors, sensors, and communication modules from adversarial nations
Space-Cyber SatCom Security
Segment-wise controls across Space, Ground, Communication Links, and User Segments per CERT-In/SIA-India joint guidelines — including 6-hour incident reporting compliance
TRL Banding & LCCA/LTBA Advisory
Technology Readiness Level banding, Low Cost Capital Acquisition pathways, and Long Term Bulk Acquisition indigenization roadmaps
DAP Capability: Pre-2026 vs. DAP 2026 Mandate
DAP CapabilityPre-2026 RealityDAP 2026 Mandate & VinfraSec Response
Intellectual Property Licensed assembly via ToT; foreign OEMs retained source code Full transfer of source code & circuit layouts required. VinfraSec conducts IDDM IP ownership audits.
Exportability Secondary objective, often restricted by foreign OEM end-user agreements Sole Indian export rights mandated. VinfraSec verifies FDI eligibility and ownership control structures.
Indigenous Content Loosely audited; basic import-led integration often qualified Tiered, highly auditable, with enforceable penalties. VinfraSec provides continuous compliance monitoring and IaC remediation.
Space-Cyber Security Ad hoc; no unified framework across SatCom operators Mandatory 6-hr CERT-In reporting; "defense in depth, breadth & height" across 4 segments. VinfraSec implements AI-assisted telemetry monitoring and LEO supply chain controls.
CEA 2026 · NSCS Trusted Telecom · CERT-In OT Audits

Green Energy & Critical Utilities

The 2026 Mandate

The CEA (Measures relating to Safety and Electric Supply) Amendment Regulations, 2026 — effective April 1, 2027 — elevate BESS and SCADA from supplementary assets to heavily regulated critical infrastructure components, with an entirely new legislative chapter (Chapter XA).

The foundational technical mandate is "two-fault tolerance" — BESS architectures must sustain safe operation or controlled shutdown even after two cascading hardware/software failures. Battery Management Systems must provide continuous, granular telemetry at cellular, modular, rack, and container levels.

Effective January 1, 2026, all IT and telecom equipment in the power sector must be cleared through the NSCS Trusted Telecom Portal prior to deployment — blocking adversarial hardware implants, backdoors, and logic bombs from the national grid.

VinfraSec Service Delivery

BESS & SCADA Architecture Hardening
Two-fault tolerant design reviews, BMS telemetry security, grounding compliance to IEEE Standard 80 / IEC 61936-1, and inverter firmware integrity validation
NSCS Trusted Telecom Portal Advisory
End-to-end vendor screening, whitelist submissions, and PCS/grid router procurement vetting through the intelligence-backed NSCS portal
Annual OT & Bi-Annual IT Audits
CERT-In empanelled OT security assessments on annual cadence; IT system vulnerability checks every six months per CSIRT-Power scope
Data Sovereignty & IaC Enforcement
All critical operational data flows engineered to remain within Indian national boundaries through Infrastructure as Code policy controls
NCIIPC · IT Act Section 70 · CCMP · Protected Systems

Critical Information Infrastructure Protection

The 2026 Mandate

Under Sections 70 and 70A of the IT Act 2000, NCIIPC (under the Prime Minister's Office) designates and safeguards networks whose incapacitation would cripple national security, public health, or the economy. Focus sectors: Telecom, Transportation, and Energy.

Once designated a Protected System, organizations must appoint a board-reporting CISO, establish an ISSC, implement an ISMS (ISO/IEC 27001 aligned), and conduct mandatory V/T/R analyses on every system change.

The Cyber Crisis Management Plan (CCMP) dictates CEO briefing within 30 minutes and Board briefing within 120 minutes of a Level 4 crisis. General incidents: 6-hour CERT-In reporting. Protected System incidents: simultaneous 6-hour reporting to both CERT-In and NCIIPC.

VinfraSec Service Delivery

Protected System Designation Advisory
Category I/II classification analysis, NCIIPC notification preparation, CISO appointment advisory, and ISSC charter development
CCMP Design & Crisis Simulation
Full Cyber Crisis Management Plan authoring, tabletop crisis exercises, escalation matrix engineering, and 30/120-minute executive briefing protocol testing
SOC-as-a-Service (24/7 Monitoring)
Continuous alert correlation across firewalls, IPS, and antivirus telemetry for CCMP "Readiness to Detect" phase compliance
Cross-Vertical IT & OT Audits
Annual Protected System assessments; bi-annual Category I audits; comprehensive validation every two years — all executed by CERT-In empanelled / STQC-vetted auditors

CCMP Escalation Timeline — VinfraSec Engineering Standard

T+0
Incident Detected
SOC raises alert; CCMT activation begins
T+30m
CEO Briefed
NCIIPC Level 4 mandatory executive brief
T+2h
Board Briefed
Full Board of Directors notification required
T+6h
CERT-In + NCIIPC
Dual simultaneous regulatory reporting for Protected Systems
DPDPA 2023 · 2026 Rules · ₹250 Cr Penalties · SDF Compliance

Digital Personal Data Protection Act

The 2026 Mandate

India's DPDPA replaces a fragmented patchwork of legacy IT rules with a comprehensive extra-territorial framework. The defining feature of 2026 is the transition from legislative theory to aggressive enforcement. MeitY has proposed compressing the SDF compliance deadline to November 13, 2026 — with ₹250 crore penalties applying from Day 1, no grace period.

Significant Data Fiduciaries (SDFs) — entities in defense, BFSI, healthcare, e-commerce, and AI — must appoint a physically India-resident DPO, an Independent Data Auditor, and conduct exhaustive annual Data Protection Impact Assessments (DPIAs).

The 2026 Consent Architecture mandates digitally signed, immutable Consent Artifacts with real-time API validation before every processing event — and instantaneous, API-propagated revocation to all downstream third-party processors.

VinfraSec Service Delivery

Resident DPO-as-a-Service
Fractional India-resident DPO on 90-day sprints — DPIA screenings, DSAR management, cross-border transfer mapping, and board-level compliance dashboards; officially represents the entity before India's Data Protection Board
Consent Management System (CMS) Implementation
Consent Artifact generation, real-time API validation layer, instant revocation propagation, and elimination of pre-checked / bundled consent — per MeitY/NeGD BRD 2026 interoperability standard
MeitY Empanelled Cloud Advisory
Category A data localization on NIC, State Data Centres, BSNL, CDAC, and RailTel; ISO 27001 / 27017 / 27018 / 20000-1 certification guidance for hyperscaler empanelment
SDF Designation Readiness Assessment
Risk-scored analysis across data volume, sensitivity, societal impact, and sovereignty criteria; full readiness roadmap for November 2026 enforcement deadline
Consent Lifecycle: Legacy vs. DPDPA 2026 Standard — VinfraSec Implementation
Consent PhaseLegacy ArchitectureDPDPA 2026 Standard & VinfraSec Delivery
Consent Generation Internal, easily altered DB flags; bundled consent forms Immutable, digitally signed Consent Artifacts mapped to granular purposes. VinfraSec engineers the Artifact schema and signing infrastructure.
Processing Validation Periodic audits; presumed ongoing consent Real-time API validation before every processing task. VinfraSec builds and tests the validation middleware layer.
Consent Revocation Delayed, manual removal; downstream vendors often ignored Instantaneous API-alert propagation; all processors halt and purge immediately. VinfraSec automates the revocation pipeline across the entire vendor chain.
Data Localization Cross-border transfers unrestricted; no sovereign controls MeitY-empanelled sovereign infrastructure for Category A data. VinfraSec architects the localization boundary and audit controls.
RBI · SEBI · IRDAI · ABDM · Smart Factory OT

BFSI, Health & Manufacturing

BFSI Regulatory Compliance

RBI · SEBI · IRDAI · TRAI 1600 Series

India's BFSI sector shifted from principle-based guidance to active, punitive supervision. The RBI levied hundreds of penalties across banks and NBFCs for KYC, cybersecurity, and fraud reporting lapses.

SEBI Board-Level Governance: Integrated governance reports require full BoD oversight — VinfraSec engineers the board reporting framework
RBI DLG / ECL Compliance: Ind AS-aligned ECL recalculation and digital lending data minimization (no contacts/photos/call log access)
TRAI '1600' Migration (Feb 15, 2026): Voice communication migration audit and phishing hardening strategy
Account Aggregator (AA) Alignment: DPDPA consent interoperability integration for RBI-regulated AA entities

ABDM & National Health Stack

ABHA · AB-PMJAY · DPDPA Sensitive Data

ABDM integration has transitioned from optional to critically audited for AB-PMJAY hospitals and health IT vendors. Medical histories are legally classified as sensitive personal data under DPDPA — requiring MeitY Consent Artifact standards natively.

ABHA ID Integration Security: Sandbox environment navigation, Aadhaar OTP validation, and webhook configuration for real-time consent notifications
Health Data Consent Architecture: MeitY Consent Artifact integration for granular patient control across providers
DPDPA-ABDM Intersection Mapping: Sensitive data classification, processing lawfulness, and cross-provider data-sharing controls

Smart Factory & OT Security

Industry 4.0 · IT/OT Convergence · Zero Trust

Ransomware is used in over 31% of manufacturing cyber incidents, deliberately halting production lines for extortion. The convergence of cloud, IoT, AI, and robotics has expanded the attack surface to the physical engineering floor.

Zero Trust IT/OT Segmentation: Strict isolation ensuring corporate email breaches cannot propagate to PLCs, HMIs, or robotics arms
Immutable Backup Architecture: Ransomware-free backups for ERP, MES, and SCADA servers enabling rapid recovery without extortion yield
IP Theft & Sensor Integrity Protection: End-to-end payload encryption, agent-based OT scanning, and spoofed-signal detection for predictive maintenance AI

The VinfraSec Advantage in India

CapabilityThe VinfraSec DifferenceFrameworks Covered
Sovereign Control Indian-owned and operated subsidiary (VinfraSec Services India Ltd). No foreign data dependency or external OEM approval required. DAP 2026 DPDPA
6-Hour CERT-In Readiness Managed SOC services and incident response protocols engineered around the mandatory 6-hour CERT-In and NCIIPC dual-reporting window. NCIIPC CEA
MeitY Alignment All deployments hosted on MeitY-empanelled sovereign infrastructure. ISO 27001/27017/27018/20000-1 compliance engineered via IaC. DPDPA BFSI
IaC-Driven OT/IT Controls Security controls embedded directly into infrastructure code — BESS telemetry, SCADA segmentation, and Zero Trust policies deployed as code. CEA Smart Factory
Resident DPO Network Fractional India-resident DPOs on 90-day sprints — officially representing entities before India's Data Protection Board for SDF obligations. DPDPA ABDM
End-to-End GRC Coverage Single-vendor coverage across DAP 2026, CEA, NCIIPC, DPDPA, RBI/SEBI/IRDAI, ABDM, and Smart Factory OT — eliminating framework gaps. All 5 Verticals
0+
Years Experience
0%
Audit Pass Rate
0+
GRC Frameworks
0
Global Operations
Our Process

From Gap to Certified
in 4 Steps.

01

Discovery

We map your current infrastructure, controls, and existing compliance posture against your target framework.

02

Gap Analysis

Automated gap analysis generates a prioritized remediation roadmap with timelines and resource estimates.

03

Engineering

We implement controls directly as Infrastructure as Code — every deployment is audit-ready from day one.

04

Continuous

Ongoing drift detection and automated remediation ensures compliance never lapses between assessments.

The Leadership

Architect-Led. Expert-Driven.

We don't employ junior generalists. We deploy domain-specific masters across our US and India operations.

Upendar Vellore

Principal Architect & RP

25+ years bridging complex regulatory requirements with modern execution. Expert in FedRAMP, NIST 800-53, and global GRC mapping across regulated industries.

FedRAMP NIST 800-53 vCISO Zero Trust
Let's Talk

Ready to Engineer
Your Compliance Future?

Don't let regulatory hurdles slow your deployment. Schedule a discovery call with our leadership team — zero obligation, maximum value.

NJ Headquarters
South Brunswick, New Jersey

What you get in the free assessment:

Automated SPRS / compliance score vs. your target framework
Prioritized gap analysis with remediation timeline
IaC-based architecture recommendations
No sales pitch — just expert technical guidance
Let's Talk

Does Your Organization Meet
2026 India Compliance Mandates?

Stay ahead of DAP, CEA, and DPDPA requirements with VinfraSec Services India Ltd. Schedule your gap analysis today.

Schedule 2026 Gap Analysis
India Operations
VinfraSec Services India Ltd.